,abstract,author,category,date,doi,journal,key,open_access,primary_category,provenance,score,title,unique_key,url 0, The paper reports on a series of asymmetric auction experiments with private-independent values and two buyers. Maskin and Riley (2000) showed under some conditions that if one buyer has a greater probability than the other of not being able to bid first-price auctions could yield lower revenues to the seller than second-price auctions. The data rejected this prediction because of an important overbidding when subjects received low values in first-price auctions. In this asymmetric setting the observed overbidding cannot be explained by the usual risk aversion hypothesis and the detection of a learning pattern indicates that subjects used more an adaptive behaviour than a static one. An ad hoc bidding strategy for the buyers who are the most likely to bid explains the observed low bids better than the risk neutral equilibrium strategy. Finally as subjects appear to have bid in equilibrium ,paul pezanis-christou,Not available,2002.0,10.1007/s001820200108,International Journal of Game Theory,Paul2002,False,,Springer,Not available,On the impact of low-balling: Experimental results in asymmetric auctions,8ae35c2b42430ffc8a3b115e41e518a9,http://dx.doi.org/10.1007/s001820200108 1, In this paper we consider the implementation of the optimal procurement auction outcome when there is a trade-off between price and quality for the buyer. The quality proposals of the competing firms are assumed to be exogenous and common knowledge. After defining the optimal auction we characterize the discriminatory first score auction and the modified second score auction implementing it when the buyer is assumed to have the same information as the firms. Then we consider an auction which requires no specific information from the buyer and show that a second score auction followed by a negotiation stage can implement the optimal auction outcome under this more realistic assumption.,florence naegelen,Not available,2002.0,10.1007/s100580200067,Review of Economic Design,Florence2002,False,,Springer,Not available,Implementing optimal procurement auctions with exogenous quality,959b0d6e5936c368cf2615c83251c470,http://dx.doi.org/10.1007/s100580200067 2,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,andrew mitchell,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 3,Artificial stock markets are models designed to capture essential properties of real stock markets in order to reproduce analyze or understand market dynamics with computational experiments. Despite research advances in modern finance many questions remain unsolved: market dynamics exhibit for instance particular statistical properties called ,bruno beaufils,Not available,2007.0,10.1007/978-3-540-73135-1_4,Artificial Markets Modeling,Julien2007,False,,Springer,Not available,Testing Double Auction as a Component Within a Generic Market Model Architecture,7be1461bc555e207cabc2b4fd94f56e3,http://dx.doi.org/10.1007/978-3-540-73135-1_4 4,Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee of availability. Observing the popularity of Amazon spot instances among the cloud users research has intensified on defining the users’ and providers’ behavior in the spot market. This work presents an exhaustive survey of spot pricing in cloud ecosystem. An insight into the Amazon spot instances and its pricing mechanism has been presented for better understanding of the spot ecosystem. Spot pricing and resource provisioning problem modeled as a market mechanism is discussed from both computational and economics perspective. A significant amount of important research papers related to price prediction and modeling spot resource provisioning bidding strategy designing etc. are summarized and categorized to evaluate the state of the art in the context. All theoretical frameworks developed for cloud spot market are illustrated and compared in terms of the techniques and their findings. Finally research gaps are identified and various economic and computational challenges in cloud spot ecosystem are discussed as a guide to the future research.,deo vidyarthi,Not available,2018.0,10.1007/s10922-017-9444-x,Journal of Network and Systems Management,Dinesh2018,False,,Springer,Not available,A Survey on Spot Pricing in Cloud Computing,03f6ba71ff6733a6c2775719560fca99,http://dx.doi.org/10.1007/s10922-017-9444-x 5,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,onur koska,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 6,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,ilke onur,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 7,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,frank stahler,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 8,The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators (MNO) to deploy novel network architectures and develop effective economic policies. Mobile data offloading through smart devices (SDs) by exploring device-to-device (D2D) communications can significantly reduce network congestion and enhance quality of service at a lower cost which is the key requirement of upcoming 5G networks. This reasonable cost solution is useful for attracting mobile users to participate in the offloading process by paying them proper incentives. It is beneficial for MNOs as well as mobile users. Moreover D2D communications promise to be one of the prominent services for 5G networks. In this paper we present a combinatorial optimal reverse auction (CORA) mechanism which efficiently selects and utilizes available high-end SDs on the basis of available resources for offloading purposes. It also decides the optimal pricing policy for the selected SDs. The efficiency of CORA has been realized in terms of bandwidth and storage demand. Subsequently we implement caching in SDs eNodeB (eNB) and evolved packet core (EPC) with the help of our novel video dissemination cache update algorithm to solve the latency or delay issues in the offloading process. Due to high popularity we specifically focus on video data. Simulation results show that the proposed SD caching scenario curtails the delay up to 75% and the combined cache (CC) scenario slashes the delay varying from 15 to 57%. We also scruitinize the video downloading time performance of various cache scenarios (i.e. CC EPC cache eNB cache and SD cache scenarios).,sachin umrao,Not available,2018.0,10.1007/s10922-018-9447-2,Journal of Network and Systems Management,Sachin2018,False,,Springer,Not available,Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services,c03086f5a201f9355902b94cc86d8f90,http://dx.doi.org/10.1007/s10922-018-9447-2 9,The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators (MNO) to deploy novel network architectures and develop effective economic policies. Mobile data offloading through smart devices (SDs) by exploring device-to-device (D2D) communications can significantly reduce network congestion and enhance quality of service at a lower cost which is the key requirement of upcoming 5G networks. This reasonable cost solution is useful for attracting mobile users to participate in the offloading process by paying them proper incentives. It is beneficial for MNOs as well as mobile users. Moreover D2D communications promise to be one of the prominent services for 5G networks. In this paper we present a combinatorial optimal reverse auction (CORA) mechanism which efficiently selects and utilizes available high-end SDs on the basis of available resources for offloading purposes. It also decides the optimal pricing policy for the selected SDs. The efficiency of CORA has been realized in terms of bandwidth and storage demand. Subsequently we implement caching in SDs eNodeB (eNB) and evolved packet core (EPC) with the help of our novel video dissemination cache update algorithm to solve the latency or delay issues in the offloading process. Due to high popularity we specifically focus on video data. Simulation results show that the proposed SD caching scenario curtails the delay up to 75% and the combined cache (CC) scenario slashes the delay varying from 15 to 57%. We also scruitinize the video downloading time performance of various cache scenarios (i.e. CC EPC cache eNB cache and SD cache scenarios).,abhishek roy,Not available,2018.0,10.1007/s10922-018-9447-2,Journal of Network and Systems Management,Sachin2018,False,,Springer,Not available,Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services,c03086f5a201f9355902b94cc86d8f90,http://dx.doi.org/10.1007/s10922-018-9447-2 10,The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators (MNO) to deploy novel network architectures and develop effective economic policies. Mobile data offloading through smart devices (SDs) by exploring device-to-device (D2D) communications can significantly reduce network congestion and enhance quality of service at a lower cost which is the key requirement of upcoming 5G networks. This reasonable cost solution is useful for attracting mobile users to participate in the offloading process by paying them proper incentives. It is beneficial for MNOs as well as mobile users. Moreover D2D communications promise to be one of the prominent services for 5G networks. In this paper we present a combinatorial optimal reverse auction (CORA) mechanism which efficiently selects and utilizes available high-end SDs on the basis of available resources for offloading purposes. It also decides the optimal pricing policy for the selected SDs. The efficiency of CORA has been realized in terms of bandwidth and storage demand. Subsequently we implement caching in SDs eNodeB (eNB) and evolved packet core (EPC) with the help of our novel video dissemination cache update algorithm to solve the latency or delay issues in the offloading process. Due to high popularity we specifically focus on video data. Simulation results show that the proposed SD caching scenario curtails the delay up to 75% and the combined cache (CC) scenario slashes the delay varying from 15 to 57%. We also scruitinize the video downloading time performance of various cache scenarios (i.e. CC EPC cache eNB cache and SD cache scenarios).,navrati saxena,Not available,2018.0,10.1007/s10922-018-9447-2,Journal of Network and Systems Management,Sachin2018,False,,Springer,Not available,Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services,c03086f5a201f9355902b94cc86d8f90,http://dx.doi.org/10.1007/s10922-018-9447-2 11,The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators (MNO) to deploy novel network architectures and develop effective economic policies. Mobile data offloading through smart devices (SDs) by exploring device-to-device (D2D) communications can significantly reduce network congestion and enhance quality of service at a lower cost which is the key requirement of upcoming 5G networks. This reasonable cost solution is useful for attracting mobile users to participate in the offloading process by paying them proper incentives. It is beneficial for MNOs as well as mobile users. Moreover D2D communications promise to be one of the prominent services for 5G networks. In this paper we present a combinatorial optimal reverse auction (CORA) mechanism which efficiently selects and utilizes available high-end SDs on the basis of available resources for offloading purposes. It also decides the optimal pricing policy for the selected SDs. The efficiency of CORA has been realized in terms of bandwidth and storage demand. Subsequently we implement caching in SDs eNodeB (eNB) and evolved packet core (EPC) with the help of our novel video dissemination cache update algorithm to solve the latency or delay issues in the offloading process. Due to high popularity we specifically focus on video data. Simulation results show that the proposed SD caching scenario curtails the delay up to 75% and the combined cache (CC) scenario slashes the delay varying from 15 to 57%. We also scruitinize the video downloading time performance of various cache scenarios (i.e. CC EPC cache eNB cache and SD cache scenarios).,sukhdeep singh,Not available,2018.0,10.1007/s10922-018-9447-2,Journal of Network and Systems Management,Sachin2018,False,,Springer,Not available,Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services,c03086f5a201f9355902b94cc86d8f90,http://dx.doi.org/10.1007/s10922-018-9447-2 12,The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators (MNO) to deploy novel network architectures and develop effective economic policies. Mobile data offloading through smart devices (SDs) by exploring device-to-device (D2D) communications can significantly reduce network congestion and enhance quality of service at a lower cost which is the key requirement of upcoming 5G networks. This reasonable cost solution is useful for attracting mobile users to participate in the offloading process by paying them proper incentives. It is beneficial for MNOs as well as mobile users. Moreover D2D communications promise to be one of the prominent services for 5G networks. In this paper we present a combinatorial optimal reverse auction (CORA) mechanism which efficiently selects and utilizes available high-end SDs on the basis of available resources for offloading purposes. It also decides the optimal pricing policy for the selected SDs. The efficiency of CORA has been realized in terms of bandwidth and storage demand. Subsequently we implement caching in SDs eNodeB (eNB) and evolved packet core (EPC) with the help of our novel video dissemination cache update algorithm to solve the latency or delay issues in the offloading process. Due to high popularity we specifically focus on video data. Simulation results show that the proposed SD caching scenario curtails the delay up to 75% and the combined cache (CC) scenario slashes the delay varying from 15 to 57%. We also scruitinize the video downloading time performance of various cache scenarios (i.e. CC EPC cache eNB cache and SD cache scenarios).,jae-il jung,Not available,2018.0,10.1007/s10922-018-9447-2,Journal of Network and Systems Management,Sachin2018,False,,Springer,Not available,Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services,c03086f5a201f9355902b94cc86d8f90,http://dx.doi.org/10.1007/s10922-018-9447-2 13,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,fu-shiung hsieh,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 14,Artificial stock markets are models designed to capture essential properties of real stock markets in order to reproduce analyze or understand market dynamics with computational experiments. Despite research advances in modern finance many questions remain unsolved: market dynamics exhibit for instance particular statistical properties called ,philippe mathieu,Not available,2007.0,10.1007/978-3-540-73135-1_4,Artificial Markets Modeling,Julien2007,False,,Springer,Not available,Testing Double Auction as a Component Within a Generic Market Model Architecture,7be1461bc555e207cabc2b4fd94f56e3,http://dx.doi.org/10.1007/978-3-540-73135-1_4 15,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,fu-min zhan,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 16,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,yi-hong guo,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 17,Market makers choose and design market rules to serve certain objectives such as to maximize revenue from the sales in the case of a single seller and multiple buyers. Given such rules market participants play against each other to maximize their utility function values on goods acquired possibly by hiding or misrepresenting their information needed in the implementation of market rules. Today’s Internet economy has changed the information collection process and may make some of the assumptions of market rule implementation obsolete. Here we make a fresh review of works on this challenge on the Internet where new economic systems operate.,yukun cheng,Not available,2018.0,10.1007/s10288-018-0385-3,4OR,Yukun2018,False,,Springer,Not available,Recent studies of agent incentives in internet resource allocation and pricing,3324bd385574f387627973e2fc471bd2,http://dx.doi.org/10.1007/s10288-018-0385-3 18,Market makers choose and design market rules to serve certain objectives such as to maximize revenue from the sales in the case of a single seller and multiple buyers. Given such rules market participants play against each other to maximize their utility function values on goods acquired possibly by hiding or misrepresenting their information needed in the implementation of market rules. Today’s Internet economy has changed the information collection process and may make some of the assumptions of market rule implementation obsolete. Here we make a fresh review of works on this challenge on the Internet where new economic systems operate.,xiaotie deng,Not available,2018.0,10.1007/s10288-018-0385-3,4OR,Yukun2018,False,,Springer,Not available,Recent studies of agent incentives in internet resource allocation and pricing,3324bd385574f387627973e2fc471bd2,http://dx.doi.org/10.1007/s10288-018-0385-3 19,Market makers choose and design market rules to serve certain objectives such as to maximize revenue from the sales in the case of a single seller and multiple buyers. Given such rules market participants play against each other to maximize their utility function values on goods acquired possibly by hiding or misrepresenting their information needed in the implementation of market rules. Today’s Internet economy has changed the information collection process and may make some of the assumptions of market rule implementation obsolete. Here we make a fresh review of works on this challenge on the Internet where new economic systems operate.,dominik scheder,Not available,2018.0,10.1007/s10288-018-0385-3,4OR,Yukun2018,False,,Springer,Not available,Recent studies of agent incentives in internet resource allocation and pricing,3324bd385574f387627973e2fc471bd2,http://dx.doi.org/10.1007/s10288-018-0385-3 20,Femtocells consisting of small femto base stations have emerged as an efficient solution for improving the capacity and coverage of wireless cellular networks. However due to limited wireless radio resources resource allocation is a key issue in two-tier femtocell networks. Motivated by this challenge in this paper we propose a resource allocation approach which satisfies the quality of service requirements and maximizes social welfare. Users compete with each other for a serving base station that fulfills their quality of service requirements and the serving base stations prefer to serve more users to make more revenue. We model the competition among these rational decision makers as the Vickrey–Clarke–Groves auction game theory in which each user as a buyer submits a bid for resources and each base station as a seller decides which users will win the auction and how much the winning users should pay and then it assigns the resources to the winning users. Unlike the previous studies we also take into account macro user’s activity as cross-tier interference in the resource allocation process. We develop an algorithm based on Q-learning in which each user gradually learns from its own past information and adjusts its bid value to achieve the Nash equilibrium as the solution of the game without any interaction with other users. We also investigate the existence and uniqueness of the Nash equilibrium. Simulation results verify the accuracy of the numerical results obtained from the proposed model.,azadeh pourkabirian,Not available,2018.0,10.1007/s11235-018-0420-x,Telecommunication Systems,Azadeh2018,False,,Springer,Not available,Dynamic resource allocation for OFDMA femtocell networks: a game-theoretic approach,d4283095f72b566575dfe65764be5535,http://dx.doi.org/10.1007/s11235-018-0420-x 21,Femtocells consisting of small femto base stations have emerged as an efficient solution for improving the capacity and coverage of wireless cellular networks. However due to limited wireless radio resources resource allocation is a key issue in two-tier femtocell networks. Motivated by this challenge in this paper we propose a resource allocation approach which satisfies the quality of service requirements and maximizes social welfare. Users compete with each other for a serving base station that fulfills their quality of service requirements and the serving base stations prefer to serve more users to make more revenue. We model the competition among these rational decision makers as the Vickrey–Clarke–Groves auction game theory in which each user as a buyer submits a bid for resources and each base station as a seller decides which users will win the auction and how much the winning users should pay and then it assigns the resources to the winning users. Unlike the previous studies we also take into account macro user’s activity as cross-tier interference in the resource allocation process. We develop an algorithm based on Q-learning in which each user gradually learns from its own past information and adjusts its bid value to achieve the Nash equilibrium as the solution of the game without any interaction with other users. We also investigate the existence and uniqueness of the Nash equilibrium. Simulation results verify the accuracy of the numerical results obtained from the proposed model.,takht dehghan,Not available,2018.0,10.1007/s11235-018-0420-x,Telecommunication Systems,Azadeh2018,False,,Springer,Not available,Dynamic resource allocation for OFDMA femtocell networks: a game-theoretic approach,d4283095f72b566575dfe65764be5535,http://dx.doi.org/10.1007/s11235-018-0420-x 22,Femtocells consisting of small femto base stations have emerged as an efficient solution for improving the capacity and coverage of wireless cellular networks. However due to limited wireless radio resources resource allocation is a key issue in two-tier femtocell networks. Motivated by this challenge in this paper we propose a resource allocation approach which satisfies the quality of service requirements and maximizes social welfare. Users compete with each other for a serving base station that fulfills their quality of service requirements and the serving base stations prefer to serve more users to make more revenue. We model the competition among these rational decision makers as the Vickrey–Clarke–Groves auction game theory in which each user as a buyer submits a bid for resources and each base station as a seller decides which users will win the auction and how much the winning users should pay and then it assigns the resources to the winning users. Unlike the previous studies we also take into account macro user’s activity as cross-tier interference in the resource allocation process. We develop an algorithm based on Q-learning in which each user gradually learns from its own past information and adjusts its bid value to achieve the Nash equilibrium as the solution of the game without any interaction with other users. We also investigate the existence and uniqueness of the Nash equilibrium. Simulation results verify the accuracy of the numerical results obtained from the proposed model.,esmaeil zeinali,Not available,2018.0,10.1007/s11235-018-0420-x,Telecommunication Systems,Azadeh2018,False,,Springer,Not available,Dynamic resource allocation for OFDMA femtocell networks: a game-theoretic approach,d4283095f72b566575dfe65764be5535,http://dx.doi.org/10.1007/s11235-018-0420-x 23,Femtocells consisting of small femto base stations have emerged as an efficient solution for improving the capacity and coverage of wireless cellular networks. However due to limited wireless radio resources resource allocation is a key issue in two-tier femtocell networks. Motivated by this challenge in this paper we propose a resource allocation approach which satisfies the quality of service requirements and maximizes social welfare. Users compete with each other for a serving base station that fulfills their quality of service requirements and the serving base stations prefer to serve more users to make more revenue. We model the competition among these rational decision makers as the Vickrey–Clarke–Groves auction game theory in which each user as a buyer submits a bid for resources and each base station as a seller decides which users will win the auction and how much the winning users should pay and then it assigns the resources to the winning users. Unlike the previous studies we also take into account macro user’s activity as cross-tier interference in the resource allocation process. We develop an algorithm based on Q-learning in which each user gradually learns from its own past information and adjusts its bid value to achieve the Nash equilibrium as the solution of the game without any interaction with other users. We also investigate the existence and uniqueness of the Nash equilibrium. Simulation results verify the accuracy of the numerical results obtained from the proposed model.,amir rahmani,Not available,2018.0,10.1007/s11235-018-0420-x,Telecommunication Systems,Azadeh2018,False,,Springer,Not available,Dynamic resource allocation for OFDMA femtocell networks: a game-theoretic approach,d4283095f72b566575dfe65764be5535,http://dx.doi.org/10.1007/s11235-018-0420-x 24,Resources in a computational grid system fall under the purview of different administrative domains of varying policies for their usages. Commercial grid offers their services (resources) on use-and-pay basis. Resource management in computational grid offers a market place for the two prominent grid market players i.e. resource provider and resource consumer. It has been observed that in the grid the request for the resources may not be uniform throughout. It fluctuates from very high demand at peak time to low or negligible at off-peak time. This information may be used to fetch the resource utilization and cost benefits out of the grid. The provider would prefer to charge extra for its resources at peak time whereas users may shift their resources usage preference to off-peak time. This work proposes a model in which the resource provider and consumer play a non-cooperative game at different time-zones and act independently to choose their actions. Some characteristic parameters such as cost execution time and reliability have been considered to facilitate the job execution. Based on the outcome of the game the grid cluster offering maximum reliability within the desired execution time and/or cost for the job execution. The model has been simulated for performance evaluation with quite encouraging results.,achal kaushik,Not available,2018.0,10.1007/s10586-017-1467-2,Cluster Computing,Achal2018,False,,Springer,Not available,A model for resource management in computational grid using sequential auction and bargaining procurement,0e3f74693c3a0b43843e34f8333e4d4c,http://dx.doi.org/10.1007/s10586-017-1467-2 25,Artificial stock markets are models designed to capture essential properties of real stock markets in order to reproduce analyze or understand market dynamics with computational experiments. Despite research advances in modern finance many questions remain unsolved: market dynamics exhibit for instance particular statistical properties called ,olivier brandouy,Not available,2007.0,10.1007/978-3-540-73135-1_4,Artificial Markets Modeling,Julien2007,False,,Springer,Not available,Testing Double Auction as a Component Within a Generic Market Model Architecture,7be1461bc555e207cabc2b4fd94f56e3,http://dx.doi.org/10.1007/978-3-540-73135-1_4 26,Resources in a computational grid system fall under the purview of different administrative domains of varying policies for their usages. Commercial grid offers their services (resources) on use-and-pay basis. Resource management in computational grid offers a market place for the two prominent grid market players i.e. resource provider and resource consumer. It has been observed that in the grid the request for the resources may not be uniform throughout. It fluctuates from very high demand at peak time to low or negligible at off-peak time. This information may be used to fetch the resource utilization and cost benefits out of the grid. The provider would prefer to charge extra for its resources at peak time whereas users may shift their resources usage preference to off-peak time. This work proposes a model in which the resource provider and consumer play a non-cooperative game at different time-zones and act independently to choose their actions. Some characteristic parameters such as cost execution time and reliability have been considered to facilitate the job execution. Based on the outcome of the game the grid cluster offering maximum reliability within the desired execution time and/or cost for the job execution. The model has been simulated for performance evaluation with quite encouraging results.,deo vidyarthi,Not available,2018.0,10.1007/s10586-017-1467-2,Cluster Computing,Achal2018,False,,Springer,Not available,A model for resource management in computational grid using sequential auction and bargaining procurement,0e3f74693c3a0b43843e34f8333e4d4c,http://dx.doi.org/10.1007/s10586-017-1467-2 27,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,xiaohu qian,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 28,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,shu-cherng fang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 29,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,min huang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 30,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,qi an,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 31,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,xingwei wang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 32,The auctioneer is a fictitious agent introduced by Leon Walras who matches supply and demand in a market with perfect competition. The process is called ‘tâtonnement’ finding the market clearing price for all commodities resulting in general equilibrium. No actual trading occurs during this process. The concept of the auctioneer sidesteps the important question of the coordinating power of the price mechanism. There are in fact only a few special cases for which the auctioneer process leads the economy to an equilibrium.,f. hahn,Not available,2018.0,10.1057/978-1-349-95189-5_399,The New Palgrave Dictionary of Economics,H.2018,False,,Springer,Not available,Auctioneer,776ad2bcbb3499dfe42c18c83500814c,http://dx.doi.org/10.1057/978-1-349-95189-5_399 33,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,cagil kocyigit,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 34,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,halil bayrak,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 35,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,mustafa pinar,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 36,Sequential and simultaneous auctions are two important mechanisms for buying/selling multiple objects. These two mechanisms yield different outcomes (i.e. different revenues and also different profits to the winning bidders). Hence both the auctioneer and the bidding agents want to know which mechanism is better for them. Given this we compare the outcomes for these mechanisms for the following scenario. There are multiple similar objects for sale each object is sold in a separate auction and each bidder needs only one object. We use English auction rules and first determine equilibrium bidding strategies for each individual auction for the simultaneous and sequential cases. We do this for both common and private value objects by treating a bidder’s information about these values as ,shaheen fatima,Not available,2007.0,10.1007/978-3-540-72502-2_12,Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets,S.2007,False,,Springer,Not available,A Comparison of Sequential and Simultaneous Auctions,f010175485843c3c9ee5e9018bf5ef0d,http://dx.doi.org/10.1007/978-3-540-72502-2_12 37,This article provides an overview of Google focusing on its economic history specifically on three topics of interest: the ad auction the IPO auction and the role of economics at Google.,hal varian,Not available,2018.0,10.1057/978-1-349-95189-5_2857,The New Palgrave Dictionary of Economics,R.2018,False,,Springer,Not available,Google,a6478d71f1d952ba38b361c626829455,http://dx.doi.org/10.1057/978-1-349-95189-5_2857 38,A bidding ring is a collection of bidders who collude in an auction in order to gain greater surplus by depressing competition. This entry describes some typical bidding rings and provides an introduction to the related theoretical and empirical literature.,john asker,Not available,2018.0,10.1057/978-1-349-95189-5_2925,The New Palgrave Dictionary of Economics,John2018,False,,Springer,Not available,Bidding Rings,e344bd4fa1c0d11ddf4f2273b4a1c368,http://dx.doi.org/10.1057/978-1-349-95189-5_2925 39,We study an advertisement transaction market which is considering a value of advertisement in addition to monetary value. This paper proposes a novel model for advertisement transactions which employs two stages auctions. To improve an advertisement value for advertisers it is important to consider not only advertisement sizes and its allocations but also its combinations for the advertisers’ marketing strategies. The two stages auction aims to improve the advertisement value and seller’s revenue. The concept of our model is that the advertisers can consider own marketing strategies for the auction. The first auction winner can choose some preferred other advertisers to make a second auction and also he/she can reject inconvenient advertisers. The first auction winner can consider the marketing strategy by making a convenient bidders set in the second auction.,satoshi takahashi,Not available,2018.0,10.1007/978-3-319-70019-9_22,Recent Advances and Future Prospects in Knowledge Information and Creativity Support Systems,Satoshi2018,False,,Springer,Not available,Revenue Improvement Mechanisms Based on Advertisement’s Values and Layouts,0ad070648c4d766e6febdfa4594e7b53,http://dx.doi.org/10.1007/978-3-319-70019-9_22 40,We study an advertisement transaction market which is considering a value of advertisement in addition to monetary value. This paper proposes a novel model for advertisement transactions which employs two stages auctions. To improve an advertisement value for advertisers it is important to consider not only advertisement sizes and its allocations but also its combinations for the advertisers’ marketing strategies. The two stages auction aims to improve the advertisement value and seller’s revenue. The concept of our model is that the advertisers can consider own marketing strategies for the auction. The first auction winner can choose some preferred other advertisers to make a second auction and also he/she can reject inconvenient advertisers. The first auction winner can consider the marketing strategy by making a convenient bidders set in the second auction.,tokuro matsuo,Not available,2018.0,10.1007/978-3-319-70019-9_22,Recent Advances and Future Prospects in Knowledge Information and Creativity Support Systems,Satoshi2018,False,,Springer,Not available,Revenue Improvement Mechanisms Based on Advertisement’s Values and Layouts,0ad070648c4d766e6febdfa4594e7b53,http://dx.doi.org/10.1007/978-3-319-70019-9_22 41," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",jose arauzo,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 42," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",felix villafanez,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 43," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",david garcia,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 44," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",javier pajares,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 45," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",juan pavon,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 46,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,chaoli zhang,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 47,We run an experiment where 97 subjects could retrieve records of completed past auctions before placing their bids in current one-bid two-bid and auction-selection games. Each subject was asked to participate in 3 current auctions; but could retrieve up to 60 records of completed (past) auctions. The results reveal a positive relation between the payoffs earned by the subjects and their history-inspection effort. Subjects act as if responding to the average bidding-ratios of the winners in the samples that they have retrieved. They apply intuitive signal-dependent stopping rules like “,doron sonsino,Not available,2006.0,10.1007/s10683-006-7050-y,Experimental Economics,Doron2006,False,,Springer,Not available,Experimental internet auctions with random information retrieval,791cc5b54eeba774f09b042cb447e270,http://dx.doi.org/10.1007/s10683-006-7050-y 48,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,fan wu,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 49,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,xiaohui bei,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 50,In this chapter we provide a framework to specify how cheating attacks can be conducted successfully on power marketing schemes in resource constrained smart micro-grids. This is an important problem because such cheating attacks can destabilise and in the worst case result in a breakdown of the micro-grid. We consider three aspects in relation to modelling cheating attacks on power auctioning schemes. First we aim to specify exactly how in spite of the resource constrained character of the micro-grid cheating can be conducted successfully. Second we consider how mitigations can be modelled to prevent cheating and third we discuss methods of maintaining grid stability and reliability even in the presence of cheating attacks. We use an Automated-Cheating-Attack (ACA) conception to build a taxonomy of cheating attacks based on the idea of adversarial acquisition of surplus energy. Adversarial acquisitions of surplus energy allow malicious users to pay less for access to more power than the quota allowed for the price paid. The impact on honest users is the lack of an adequate supply of energy to meet power demand requests. We conclude with a discussion of the performance overhead of provoking detecting and mitigating such attacks efficiently.,anesu marufu,Not available,2018.0,10.1007/978-3-319-91427-5_6,Smart Micro-Grid Systems Security and Privacy, C.2018,False,,Springer,Not available,The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids,f043bae1f5abf9bbd40354f2125dc140,http://dx.doi.org/10.1007/978-3-319-91427-5_6 51,In this chapter we provide a framework to specify how cheating attacks can be conducted successfully on power marketing schemes in resource constrained smart micro-grids. This is an important problem because such cheating attacks can destabilise and in the worst case result in a breakdown of the micro-grid. We consider three aspects in relation to modelling cheating attacks on power auctioning schemes. First we aim to specify exactly how in spite of the resource constrained character of the micro-grid cheating can be conducted successfully. Second we consider how mitigations can be modelled to prevent cheating and third we discuss methods of maintaining grid stability and reliability even in the presence of cheating attacks. We use an Automated-Cheating-Attack (ACA) conception to build a taxonomy of cheating attacks based on the idea of adversarial acquisition of surplus energy. Adversarial acquisitions of surplus energy allow malicious users to pay less for access to more power than the quota allowed for the price paid. The impact on honest users is the lack of an adequate supply of energy to meet power demand requests. We conclude with a discussion of the performance overhead of provoking detecting and mitigating such attacks efficiently.,anne kayem,Not available,2018.0,10.1007/978-3-319-91427-5_6,Smart Micro-Grid Systems Security and Privacy, C.2018,False,,Springer,Not available,The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids,f043bae1f5abf9bbd40354f2125dc140,http://dx.doi.org/10.1007/978-3-319-91427-5_6 52,In this chapter we provide a framework to specify how cheating attacks can be conducted successfully on power marketing schemes in resource constrained smart micro-grids. This is an important problem because such cheating attacks can destabilise and in the worst case result in a breakdown of the micro-grid. We consider three aspects in relation to modelling cheating attacks on power auctioning schemes. First we aim to specify exactly how in spite of the resource constrained character of the micro-grid cheating can be conducted successfully. Second we consider how mitigations can be modelled to prevent cheating and third we discuss methods of maintaining grid stability and reliability even in the presence of cheating attacks. We use an Automated-Cheating-Attack (ACA) conception to build a taxonomy of cheating attacks based on the idea of adversarial acquisition of surplus energy. Adversarial acquisitions of surplus energy allow malicious users to pay less for access to more power than the quota allowed for the price paid. The impact on honest users is the lack of an adequate supply of energy to meet power demand requests. We conclude with a discussion of the performance overhead of provoking detecting and mitigating such attacks efficiently.,stephen wolthusen,Not available,2018.0,10.1007/978-3-319-91427-5_6,Smart Micro-Grid Systems Security and Privacy, C.2018,False,,Springer,Not available,The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids,f043bae1f5abf9bbd40354f2125dc140,http://dx.doi.org/10.1007/978-3-319-91427-5_6 53,In several countries economic transition was accompanied by the emergence of ‘oligarchs’ – businessmen who amassed fortunes and used them to influence economic policies. At their height in 2003 a few oligarchs controlled much of Russia’s economy as did a similar elite in Ukraine. Oligarchs seem to run their empires more efficiently than other domestic owners. While the relative weight of their firms in the economy is huge it is not excessive by the standards of the global economy where most of them are operating. Policymakers should therefore focus on ‘political antitrust’ to prevent state capture and subversion of institutions.,sergei guriev,Not available,2018.0,10.1057/978-1-349-95189-5_2457,The New Palgrave Dictionary of Economics,Sergei2018,False,,Springer,Not available,Oligarchs,0c79947a744d34895a5e188c89d48f44,http://dx.doi.org/10.1057/978-1-349-95189-5_2457 54,We study two-stage all-pay contests in which synergy exists between the stages. The value of winning for each contestant is fixed in the first stage while it is effort-dependent in the second one. We assume that a player’s effort in the first stage either increases (positive synergy) or decreases (negative synergy) his value of winning in the second stage. The subgame perfect equilibrium of this contest is analyzed with either positive or negative synergy. We show in particular that whether the contestants are symmetric or asymmetric their expected payoffs may be higher under negative synergy than under positive synergy. Consequently they prefer smaller values of winning (negative synergy) over higher ones (positive synergy).,aner sela,Not available,2017.0,10.1007/s10058-017-0205-9,Review of Economic Design,Aner2017,False,,Springer,Not available,Two-stage contests with effort-dependent values of winning,c146f40e3d21f6f2cf28df7642bd914d,http://dx.doi.org/10.1007/s10058-017-0205-9 55,Jean-Jacques Laffont was one of the great economists of the last quarter of the 20th century with an encyclopedic mind in a time of intense specialization. He won widespread respect and recognition for his breakthroughs in both theory (including public goods contract theory and the regulation of natural monopoly) and econometrics. In addition he was energetically engaged in institution-building not only in Europe but also in Africa Asia and Latin America.,jean tirole,Not available,2016.0,10.1057/978-1-349-95121-5_1981-1,The New Palgrave Dictionary of Economics,Jean2016,False,,Springer,Not available,Laffont Jean-Jacques (1947–2004),4ce12fa9a243646d3d6ec6abebd11045,http://dx.doi.org/10.1057/978-1-349-95121-5_1981-1 56,Against the problem of group task allocation with time constraints in open and dynamic grid environments this paper proposes a decentralised indicator-based combinatorial auction strategy for group task allocation. In the proposed strategy both resource providers and consumers are modeled as intelligent agents. All the agents are limited to communicating with their neighbour agents therefore the proposed strategy is decentralised. In addition the proposed strategy allow agents to enter and leave the grid environments freely and is robust to the dynamism and openness of the grid environments. Tasks in the proposed strategy have deadlines and might need the collaboration of a group of self-interested providers to be executed. The experimental results demonstrate that the proposed strategy outperforms a well-known decentralised task allocation strategy in terms of success rate individual utility of the involved agents and the speed of task allocation.,yan kong,Not available,2016.0,10.1007/978-3-319-30307-9_8,Recent Advances in Agent-based Complex Automated Negotiation,Yan2016,False,,Springer,Not available,A Group Task Allocation Strategy in Open and Dynamic Grid Environments,139137a2626aa5ab8cd998f5b77f2280,http://dx.doi.org/10.1007/978-3-319-30307-9_8 57,Against the problem of group task allocation with time constraints in open and dynamic grid environments this paper proposes a decentralised indicator-based combinatorial auction strategy for group task allocation. In the proposed strategy both resource providers and consumers are modeled as intelligent agents. All the agents are limited to communicating with their neighbour agents therefore the proposed strategy is decentralised. In addition the proposed strategy allow agents to enter and leave the grid environments freely and is robust to the dynamism and openness of the grid environments. Tasks in the proposed strategy have deadlines and might need the collaboration of a group of self-interested providers to be executed. The experimental results demonstrate that the proposed strategy outperforms a well-known decentralised task allocation strategy in terms of success rate individual utility of the involved agents and the speed of task allocation.,minjie zhang,Not available,2016.0,10.1007/978-3-319-30307-9_8,Recent Advances in Agent-based Complex Automated Negotiation,Yan2016,False,,Springer,Not available,A Group Task Allocation Strategy in Open and Dynamic Grid Environments,139137a2626aa5ab8cd998f5b77f2280,http://dx.doi.org/10.1007/978-3-319-30307-9_8 58,We run an experiment where 97 subjects could retrieve records of completed past auctions before placing their bids in current one-bid two-bid and auction-selection games. Each subject was asked to participate in 3 current auctions; but could retrieve up to 60 records of completed (past) auctions. The results reveal a positive relation between the payoffs earned by the subjects and their history-inspection effort. Subjects act as if responding to the average bidding-ratios of the winners in the samples that they have retrieved. They apply intuitive signal-dependent stopping rules like “,radosveta ivanova-stenzel,Not available,2006.0,10.1007/s10683-006-7050-y,Experimental Economics,Doron2006,False,,Springer,Not available,Experimental internet auctions with random information retrieval,791cc5b54eeba774f09b042cb447e270,http://dx.doi.org/10.1007/s10683-006-7050-y 59,Against the problem of group task allocation with time constraints in open and dynamic grid environments this paper proposes a decentralised indicator-based combinatorial auction strategy for group task allocation. In the proposed strategy both resource providers and consumers are modeled as intelligent agents. All the agents are limited to communicating with their neighbour agents therefore the proposed strategy is decentralised. In addition the proposed strategy allow agents to enter and leave the grid environments freely and is robust to the dynamism and openness of the grid environments. Tasks in the proposed strategy have deadlines and might need the collaboration of a group of self-interested providers to be executed. The experimental results demonstrate that the proposed strategy outperforms a well-known decentralised task allocation strategy in terms of success rate individual utility of the involved agents and the speed of task allocation.,dayong ye,Not available,2016.0,10.1007/978-3-319-30307-9_8,Recent Advances in Agent-based Complex Automated Negotiation,Yan2016,False,,Springer,Not available,A Group Task Allocation Strategy in Open and Dynamic Grid Environments,139137a2626aa5ab8cd998f5b77f2280,http://dx.doi.org/10.1007/978-3-319-30307-9_8 60,Community network clouds provide for applications of local interest deployed within community networks through collaborative efforts to provision cloud infrastructures. They complement the traditional large-scale public cloud providers similar to the model of decentralised edge clouds by bringing both content and computation closer to the users at the edges of the network. Services and applications within community network clouds require connectivity to the Internet and to the resources external to the community network and here the current best-effort model of volunteers contributing gateway access in the community networks falls short. We model the problem of reserving the bandwidth at such gateways for guaranteeing quality-of-service for the cloud applications and evaluate different pricing mechanisms for their suitability in ensuring maximal social welfare and eliciting truthful requests from the users. We find second-price auction based mechanisms including Vickrey and generalised second price auctions suitable for the bandwidth allocation problem at the gateways in the community networks.,amin khan,Not available,2016.0,10.1007/978-3-319-43177-2_17,Economics of Grids Clouds Systems and Services,M.2016,False,,Springer,Not available,Towards Incentive-Compatible Pricing for Bandwidth Reservation in Community Network Clouds,83d64336b954100705e51606922ebc48,http://dx.doi.org/10.1007/978-3-319-43177-2_17 61,Community network clouds provide for applications of local interest deployed within community networks through collaborative efforts to provision cloud infrastructures. They complement the traditional large-scale public cloud providers similar to the model of decentralised edge clouds by bringing both content and computation closer to the users at the edges of the network. Services and applications within community network clouds require connectivity to the Internet and to the resources external to the community network and here the current best-effort model of volunteers contributing gateway access in the community networks falls short. We model the problem of reserving the bandwidth at such gateways for guaranteeing quality-of-service for the cloud applications and evaluate different pricing mechanisms for their suitability in ensuring maximal social welfare and eliciting truthful requests from the users. We find second-price auction based mechanisms including Vickrey and generalised second price auctions suitable for the bandwidth allocation problem at the gateways in the community networks.,xavier vilaca,Not available,2016.0,10.1007/978-3-319-43177-2_17,Economics of Grids Clouds Systems and Services,M.2016,False,,Springer,Not available,Towards Incentive-Compatible Pricing for Bandwidth Reservation in Community Network Clouds,83d64336b954100705e51606922ebc48,http://dx.doi.org/10.1007/978-3-319-43177-2_17 62,Community network clouds provide for applications of local interest deployed within community networks through collaborative efforts to provision cloud infrastructures. They complement the traditional large-scale public cloud providers similar to the model of decentralised edge clouds by bringing both content and computation closer to the users at the edges of the network. Services and applications within community network clouds require connectivity to the Internet and to the resources external to the community network and here the current best-effort model of volunteers contributing gateway access in the community networks falls short. We model the problem of reserving the bandwidth at such gateways for guaranteeing quality-of-service for the cloud applications and evaluate different pricing mechanisms for their suitability in ensuring maximal social welfare and eliciting truthful requests from the users. We find second-price auction based mechanisms including Vickrey and generalised second price auctions suitable for the bandwidth allocation problem at the gateways in the community networks.,luis rodrigues,Not available,2016.0,10.1007/978-3-319-43177-2_17,Economics of Grids Clouds Systems and Services,M.2016,False,,Springer,Not available,Towards Incentive-Compatible Pricing for Bandwidth Reservation in Community Network Clouds,83d64336b954100705e51606922ebc48,http://dx.doi.org/10.1007/978-3-319-43177-2_17 63,Community network clouds provide for applications of local interest deployed within community networks through collaborative efforts to provision cloud infrastructures. They complement the traditional large-scale public cloud providers similar to the model of decentralised edge clouds by bringing both content and computation closer to the users at the edges of the network. Services and applications within community network clouds require connectivity to the Internet and to the resources external to the community network and here the current best-effort model of volunteers contributing gateway access in the community networks falls short. We model the problem of reserving the bandwidth at such gateways for guaranteeing quality-of-service for the cloud applications and evaluate different pricing mechanisms for their suitability in ensuring maximal social welfare and eliciting truthful requests from the users. We find second-price auction based mechanisms including Vickrey and generalised second price auctions suitable for the bandwidth allocation problem at the gateways in the community networks.,felix freitag,Not available,2016.0,10.1007/978-3-319-43177-2_17,Economics of Grids Clouds Systems and Services,M.2016,False,,Springer,Not available,Towards Incentive-Compatible Pricing for Bandwidth Reservation in Community Network Clouds,83d64336b954100705e51606922ebc48,http://dx.doi.org/10.1007/978-3-319-43177-2_17 64,This article provides an overview of Google focusing on its economic history specifically on three topics of interest: the ad auction the IPO auction and the role of economics at Google.,hal varian,Not available,2016.0,10.1057/978-1-349-95121-5_2857-1,The New Palgrave Dictionary of Economics,R.2016,False,,Springer,Not available,Google,ca3ece1cc481d31e596fdddb8b4416c7,http://dx.doi.org/10.1057/978-1-349-95121-5_2857-1 65,,li-sha huang,Not available,2016.0,10.1007/978-1-4939-2864-4_94,Encyclopedia of Algorithms,Li-Sha2016,False,,Springer,Not available,CPU Time Pricing,06bd009f62fbc4945d9c10a069893080,http://dx.doi.org/10.1007/978-1-4939-2864-4_94 66,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,christian kroemer,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 67,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,martin bichler,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 68,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,andor goetzendorff,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 69,Multi-unit auctions are powerful mechanisms for the allocation of numerous resources and production contracts. However there is uncertainty about the best auction formats when multi-unit auctions are used because there are multiple equilibria and analytical descriptions of optimum strategies are intractable. Empirical studies are scarce and most experimental studies are restricted to two bidders and two units. This paper constructs an agent-based model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The results provide some confirmation of analytical predictions but also indicate that the range of bidding strategies employed is richer than what the theory expects. Bidder coordination for higher prices is possible under both the Vickrey and uniform auctions especially when the population is heterogeneous and competition low. Judged by budgetary measures the discriminatory auction is the most expensive when rationing is tight but this outcome is reversed when rationing is less stringent. Budgetary outcomes can be improved if the auction is organized among more homogeneous bidders.,atakelty hailu,Not available,2006.0,10.1007/s11403-006-0012-9,Journal of Economic Interaction and Coordination,Atakelty2006,False,,Springer,Not available,Multi-unit auction format design,502e0a67096a46782f97d33e5b643acd,http://dx.doi.org/10.1007/s11403-006-0012-9 70,A bidding ring is a collection of bidders who collude in an auction in order to gain greater surplus by depressing competition. This entry describes some typical bidding rings and provides an introduction to the related theoretical and empirical literature.,john asker,Not available,2016.0,10.1057/978-1-349-95121-5_2925-1,The New Palgrave Dictionary of Economics,John2016,False,,Springer,Not available,Bidding Rings,8a7a339e4edf27282fad9bfda5493470,http://dx.doi.org/10.1057/978-1-349-95121-5_2925-1 71,,makoto yokoo,Not available,2016.0,10.1007/978-1-4939-2864-4_141,Encyclopedia of Algorithms,Makoto2016,False,,Springer,Not available,False-Name-Proof Auction,66a91d6867cadc9be7b5aa5b11194edc,http://dx.doi.org/10.1007/978-1-4939-2864-4_141 72,In several countries economic transition was accompanied by the emergence of ‘oligarchs’ – businessmen who amassed fortunes and used them to influence economic policies. At their height in 2003 a few oligarchs controlled much of Russia’s economy as did a similar elite in Ukraine. Oligarchs seem to run their empires more efficiently than other domestic owners. While the relative weight of their firms in the economy is huge it is not excessive by the standards of the global economy where most of them are operating. Policymakers should therefore focus on ‘political antitrust’ to prevent state capture and subversion of institutions.,sergei guriev,Not available,2016.0,10.1057/978-1-349-95121-5_2457-1,The New Palgrave Dictionary of Economics,Sergei2016,False,,Springer,Not available,Oligarchs,3929296b07d7aa0454130a1e027a5ecc,http://dx.doi.org/10.1057/978-1-349-95121-5_2457-1 73,This chapter is the first to posit a potential alternative to the domination of the field by Spiegelman. Examining the most celebrated American cartoonist within the world of visual arts the chapter considers how the field of comics studies might have evolved differently had it been shaped by in disciplinary terms by art history. The chapter suggests the ways that cartoonists are disadvantaged in comics studies when they do not produce “graphic novels.”,bart beaty,Not available,2016.0,10.1057/978-1-137-53162-9_3,The Greatest Comic Book of All Time,Bart2016,False,,Springer,Not available,A Short Story by Robert Crumb?,6c030d40ad46966c1a4136c4bca4b6c7,http://dx.doi.org/10.1057/978-1-137-53162-9_3 74,This chapter is the first to posit a potential alternative to the domination of the field by Spiegelman. Examining the most celebrated American cartoonist within the world of visual arts the chapter considers how the field of comics studies might have evolved differently had it been shaped by in disciplinary terms by art history. The chapter suggests the ways that cartoonists are disadvantaged in comics studies when they do not produce “graphic novels.”,benjamin woo,Not available,2016.0,10.1057/978-1-137-53162-9_3,The Greatest Comic Book of All Time,Bart2016,False,,Springer,Not available,A Short Story by Robert Crumb?,6c030d40ad46966c1a4136c4bca4b6c7,http://dx.doi.org/10.1057/978-1-137-53162-9_3 75,Recently strategic behavior modeling has attracted much attention of the researchers focusing on designing protocols in the area of social networks. The motivation lies in the fact that the overlay peers of the social networks are selfish in nature and they typically belong to different administrative domains. In this paper we model the strategic behavior of the selfish peers by leveraging the rich theory of mechanism design using the concept of economic auctions. By considering the bandwidth of the service offered by the origin server as the commodity we design dynamic auctions in which downstream peers submit their value of bids for each commodity at the upstream peers.,mohammad rezvani,Not available,2011.0,10.1007/978-3-642-20573-6_83,Information Technology and Mobile Communication,Hossein2011,False,,Springer,Not available,An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks,0020bacd40c0be4101e05a3fa70cc5fc,http://dx.doi.org/10.1007/978-3-642-20573-6_83 76,Recently strategic behavior modeling has attracted much attention of the researchers focusing on designing protocols in the area of social networks. The motivation lies in the fact that the overlay peers of the social networks are selfish in nature and they typically belong to different administrative domains. In this paper we model the strategic behavior of the selfish peers by leveraging the rich theory of mechanism design using the concept of economic auctions. By considering the bandwidth of the service offered by the origin server as the commodity we design dynamic auctions in which downstream peers submit their value of bids for each commodity at the upstream peers.,morteza analoui,Not available,2011.0,10.1007/978-3-642-20573-6_83,Information Technology and Mobile Communication,Hossein2011,False,,Springer,Not available,An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks,0020bacd40c0be4101e05a3fa70cc5fc,http://dx.doi.org/10.1007/978-3-642-20573-6_83 77,In this paper innovative web admission auction-based algorithms are presented combined with load-balancing and QoS characteristics. Performance indexes as income of the web service or client satisfaction is discussed. Simulation experiments have been performed to validate the proposed mechanisms. They showed benefits of our developments.,jolanta wrzuszczak-noga,Not available,2011.0,10.1007/978-3-642-21332-8_15,Developing Concepts in Applied Intelligence,Jolanta2011,False,,Springer,Not available,An Approach to Auction-Based Web Server Admission Control,cc016d1f0f9fceb2f9ae4e3f23785e27,http://dx.doi.org/10.1007/978-3-642-21332-8_15 78,In this paper innovative web admission auction-based algorithms are presented combined with load-balancing and QoS characteristics. Performance indexes as income of the web service or client satisfaction is discussed. Simulation experiments have been performed to validate the proposed mechanisms. They showed benefits of our developments.,leszek borzemski,Not available,2011.0,10.1007/978-3-642-21332-8_15,Developing Concepts in Applied Intelligence,Jolanta2011,False,,Springer,Not available,An Approach to Auction-Based Web Server Admission Control,cc016d1f0f9fceb2f9ae4e3f23785e27,http://dx.doi.org/10.1007/978-3-642-21332-8_15 79,In the inspection of a known environment by a team of robots communication problems may exists between members of the team even due to the hostile environment these members can be damaged. In this paper a redundant robust and fault tolerant method to cover a known environment using a multi-agent system and where the communications are not guaranteed is presented. Through a simple auction system for cooperation and coordination the aim of this method is to provide an effective way to solve communication or hardware failures problems in the inspection task of a known environment. We have conducted several experiments in order to verify and validate the proposed approach. The results are commented and compared to other methods.,manuel martin-ortiz,Not available,2011.0,10.1007/978-3-642-21344-1_19,Foundations on Natural and Artificial Computation,Manuel2011,False,,Springer,Not available,Selective Method Based on Auctions for Map Inspection by Robotic Teams,1042ce5540683c73f932279e76cec37c,http://dx.doi.org/10.1007/978-3-642-21344-1_19 80,Multi-unit auctions are powerful mechanisms for the allocation of numerous resources and production contracts. However there is uncertainty about the best auction formats when multi-unit auctions are used because there are multiple equilibria and analytical descriptions of optimum strategies are intractable. Empirical studies are scarce and most experimental studies are restricted to two bidders and two units. This paper constructs an agent-based model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The results provide some confirmation of analytical predictions but also indicate that the range of bidding strategies employed is richer than what the theory expects. Bidder coordination for higher prices is possible under both the Vickrey and uniform auctions especially when the population is heterogeneous and competition low. Judged by budgetary measures the discriminatory auction is the most expensive when rationing is tight but this outcome is reversed when rationing is less stringent. Budgetary outcomes can be improved if the auction is organized among more homogeneous bidders.,sophie thoyer,Not available,2006.0,10.1007/s11403-006-0012-9,Journal of Economic Interaction and Coordination,Atakelty2006,False,,Springer,Not available,Multi-unit auction format design,502e0a67096a46782f97d33e5b643acd,http://dx.doi.org/10.1007/s11403-006-0012-9 81,In the inspection of a known environment by a team of robots communication problems may exists between members of the team even due to the hostile environment these members can be damaged. In this paper a redundant robust and fault tolerant method to cover a known environment using a multi-agent system and where the communications are not guaranteed is presented. Through a simple auction system for cooperation and coordination the aim of this method is to provide an effective way to solve communication or hardware failures problems in the inspection task of a known environment. We have conducted several experiments in order to verify and validate the proposed approach. The results are commented and compared to other methods.,juan pereda,Not available,2011.0,10.1007/978-3-642-21344-1_19,Foundations on Natural and Artificial Computation,Manuel2011,False,,Springer,Not available,Selective Method Based on Auctions for Map Inspection by Robotic Teams,1042ce5540683c73f932279e76cec37c,http://dx.doi.org/10.1007/978-3-642-21344-1_19 82,In the inspection of a known environment by a team of robots communication problems may exists between members of the team even due to the hostile environment these members can be damaged. In this paper a redundant robust and fault tolerant method to cover a known environment using a multi-agent system and where the communications are not guaranteed is presented. Through a simple auction system for cooperation and coordination the aim of this method is to provide an effective way to solve communication or hardware failures problems in the inspection task of a known environment. We have conducted several experiments in order to verify and validate the proposed approach. The results are commented and compared to other methods.,javier lope,Not available,2011.0,10.1007/978-3-642-21344-1_19,Foundations on Natural and Artificial Computation,Manuel2011,False,,Springer,Not available,Selective Method Based on Auctions for Map Inspection by Robotic Teams,1042ce5540683c73f932279e76cec37c,http://dx.doi.org/10.1007/978-3-642-21344-1_19 83,In the inspection of a known environment by a team of robots communication problems may exists between members of the team even due to the hostile environment these members can be damaged. In this paper a redundant robust and fault tolerant method to cover a known environment using a multi-agent system and where the communications are not guaranteed is presented. Through a simple auction system for cooperation and coordination the aim of this method is to provide an effective way to solve communication or hardware failures problems in the inspection task of a known environment. We have conducted several experiments in order to verify and validate the proposed approach. The results are commented and compared to other methods.,feliz paz,Not available,2011.0,10.1007/978-3-642-21344-1_19,Foundations on Natural and Artificial Computation,Manuel2011,False,,Springer,Not available,Selective Method Based on Auctions for Map Inspection by Robotic Teams,1042ce5540683c73f932279e76cec37c,http://dx.doi.org/10.1007/978-3-642-21344-1_19 84,A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and consequently suggest avenues for further research.,chris anderson,Not available,2011.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,K2011,False,,Springer,Not available,Name-your-own price auction mechanisms – Modeling and future implications,4f1922bcc2054f3bdd3fc547847f1667,http://dx.doi.org/10.1057/rpm.2010.46 85,A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and consequently suggest avenues for further research.,john wilson,Not available,2011.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,K2011,False,,Springer,Not available,Name-your-own price auction mechanisms – Modeling and future implications,4f1922bcc2054f3bdd3fc547847f1667,http://dx.doi.org/10.1057/rpm.2010.46 86,We study the extent to which simple auctions can simultaneously achieve good revenue and efficiency guarantees in single-item settings. Motivated by the optimality of the second price auction with monopoly reserves when the bidders’ values are drawn i.i.d. from regular distributions [12] and its approximate optimality when they are drawn from independent regular distributions [11] we focus our attention to the second price auction with general (not necessarily monopoly) reserve prices arguably one of the simplest and most intuitive auction formats. As our main result we show that for a carefully chosen set of reserve prices this auction guarantees at least 20% of both the optimal welfare and the optimal revenue when the bidders’ values are distributed according to independent not necessarily identical regular distributions. We also prove a similar guarantee when the values are drawn i.i.d. from a—possibly irregular—distribution.,constantinos daskalakis,Not available,2011.0,10.1007/978-3-642-25510-6_10,Internet and Network Economics,Constantinos2011,False,,Springer,Not available,Simple Optimal and Efficient Auctions,1d6b8095122e4ed34da175f7c97c1087,http://dx.doi.org/10.1007/978-3-642-25510-6_10 87,We study the extent to which simple auctions can simultaneously achieve good revenue and efficiency guarantees in single-item settings. Motivated by the optimality of the second price auction with monopoly reserves when the bidders’ values are drawn i.i.d. from regular distributions [12] and its approximate optimality when they are drawn from independent regular distributions [11] we focus our attention to the second price auction with general (not necessarily monopoly) reserve prices arguably one of the simplest and most intuitive auction formats. As our main result we show that for a carefully chosen set of reserve prices this auction guarantees at least 20% of both the optimal welfare and the optimal revenue when the bidders’ values are distributed according to independent not necessarily identical regular distributions. We also prove a similar guarantee when the values are drawn i.i.d. from a—possibly irregular—distribution.,george pierrakos,Not available,2011.0,10.1007/978-3-642-25510-6_10,Internet and Network Economics,Constantinos2011,False,,Springer,Not available,Simple Optimal and Efficient Auctions,1d6b8095122e4ed34da175f7c97c1087,http://dx.doi.org/10.1007/978-3-642-25510-6_10 88,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,kan takeuchi,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 89,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,john lin,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 90,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,yan chen,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 91,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,gadi fibich,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 92,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,thomas finholt,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 93,We recommend that an auction market replace the current system for submitting academic papers and show a strict Pareto-improvement in equilibrium. Besides the benefit of speed this mechanism increases the average quality of articles and journals and rewards editors and referees for their effort. The “academic dollar” proceeds from papers sold at auction go to authors editors and referees of ,jens prufer,Not available,2010.0,10.1007/s11127-009-9571-3,Public Choice,Jens2010,True,,Springer,Not available,An auction market for journal articles,5145448c01223a6f43dc0151b88d6811,http://dx.doi.org/10.1007/s11127-009-9571-3 94,We recommend that an auction market replace the current system for submitting academic papers and show a strict Pareto-improvement in equilibrium. Besides the benefit of speed this mechanism increases the average quality of articles and journals and rewards editors and referees for their effort. The “academic dollar” proceeds from papers sold at auction go to authors editors and referees of ,david zetland,Not available,2010.0,10.1007/s11127-009-9571-3,Public Choice,Jens2010,True,,Springer,Not available,An auction market for journal articles,5145448c01223a6f43dc0151b88d6811,http://dx.doi.org/10.1007/s11127-009-9571-3 95,We study a model of common-value auctions with two bidders in which bidders’ private information are independently and asymmetrically distributed. We present sufficient and necessary conditions respectively under which the expected revenues from first-price and second-price auctions can be ranked. Using these conditions and a bid-equivalence between common-value auctions and private-value auctions with resale we extend the revenue-ranking result of Hafalir and Krishna [Am Econ Rev 98 2008a] and provide necessary conditions for their ranking to hold. In addition we provide sufficient and necessary conditions for the opposite ranking of revenues respectively. Our analysis helps clarify the roles of two forms of regularity assumptions (buyer-regularity and seller-regularity) in ranking revenues and illustrates how revenue ranking is linked to submodularity and supermodularity of the common-value function and to a single-crossing property of a function derived from the monopoly or monopsony pricing function in the resale stage.,harrison cheng,Not available,2010.0,10.1007/s00199-009-0505-6,Economic Theory,H.2010,False,,Springer,Not available,Asymmetric common-value auctions with applications to private-value auctions with resale,dc399cb9eb0061d79dae9c331d66c71c,http://dx.doi.org/10.1007/s00199-009-0505-6 96,We study a model of common-value auctions with two bidders in which bidders’ private information are independently and asymmetrically distributed. We present sufficient and necessary conditions respectively under which the expected revenues from first-price and second-price auctions can be ranked. Using these conditions and a bid-equivalence between common-value auctions and private-value auctions with resale we extend the revenue-ranking result of Hafalir and Krishna [Am Econ Rev 98 2008a] and provide necessary conditions for their ranking to hold. In addition we provide sufficient and necessary conditions for the opposite ranking of revenues respectively. Our analysis helps clarify the roles of two forms of regularity assumptions (buyer-regularity and seller-regularity) in ranking revenues and illustrates how revenue ranking is linked to submodularity and supermodularity of the common-value function and to a single-crossing property of a function derived from the monopoly or monopsony pricing function in the resale stage.,guofu tan,Not available,2010.0,10.1007/s00199-009-0505-6,Economic Theory,H.2010,False,,Springer,Not available,Asymmetric common-value auctions with applications to private-value auctions with resale,dc399cb9eb0061d79dae9c331d66c71c,http://dx.doi.org/10.1007/s00199-009-0505-6 97,This paper analyzes the entrants to the 2007 ,jinzhong niu,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 98,This paper analyzes the entrants to the 2007 ,kai cai,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 99,This paper analyzes the entrants to the 2007 ,simon parsons,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 100,This paper analyzes the entrants to the 2007 ,peter mcburney,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 101,This paper analyzes the entrants to the 2007 ,enrico gerding,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 102,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,arieh gavious,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 103,I compare the value of information acquired secretly with information acquired openly prior to a first-price common-value auction. Novel information (information which is independent of the other bidder’s private information) is more valuable when learned openly but redundant information (information the other bidder already has) is more valuable when learned covertly. In a dynamic game where a bidder can credibly signal he is well-informed without disclosing the content of his information always signaling having novel information and never signaling having redundant information is consistent with (but not uniquely predicted by) equilibrium play. Full revelation of any information possessed by the seller increases expected revenue and is uniquely predicted in equilibrium.,daniel quint,Not available,2010.0,10.1007/s00199-009-0491-8,Economic Theory,Daniel2010,False,,Springer,Not available,Looking smart versus playing dumb in common-value auctions,f3b30b2ab714aaaf437a32bb44010ed0,http://dx.doi.org/10.1007/s00199-009-0491-8 104,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,bing shi,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 105,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,yalong huang,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 106,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,shengwu xiong,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 107,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,enrico gerding,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 108,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,john kagel,Not available,2016.0,10.1057/978-1-349-95121-5_2671-1,The New Palgrave Dictionary of Economics,H.2016,False,,Springer,Not available,Auctions (Experiments),2bf4c161507e679eb29c2fc7f7202215,http://dx.doi.org/10.1057/978-1-349-95121-5_2671-1 109,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,dan levin,Not available,2016.0,10.1057/978-1-349-95121-5_2671-1,The New Palgrave Dictionary of Economics,H.2016,False,,Springer,Not available,Auctions (Experiments),2bf4c161507e679eb29c2fc7f7202215,http://dx.doi.org/10.1057/978-1-349-95121-5_2671-1 110,Fantasy sports is a fast-growing multi-billion dollar industry [,aris anagnostopoulos,Not available,2016.0,10.1007/978-3-662-54110-4_8,Web and Internet Economics,Aris2016,False,,Springer,Not available,Bidding Strategies for Fantasy-Sports Auctions,f41241a5479e8298079dd2c7bef929d1,http://dx.doi.org/10.1007/978-3-662-54110-4_8 111,Fantasy sports is a fast-growing multi-billion dollar industry [,ruggiero cavallo,Not available,2016.0,10.1007/978-3-662-54110-4_8,Web and Internet Economics,Aris2016,False,,Springer,Not available,Bidding Strategies for Fantasy-Sports Auctions,f41241a5479e8298079dd2c7bef929d1,http://dx.doi.org/10.1007/978-3-662-54110-4_8 112,Fantasy sports is a fast-growing multi-billion dollar industry [,stefano leonardi,Not available,2016.0,10.1007/978-3-662-54110-4_8,Web and Internet Economics,Aris2016,False,,Springer,Not available,Bidding Strategies for Fantasy-Sports Auctions,f41241a5479e8298079dd2c7bef929d1,http://dx.doi.org/10.1007/978-3-662-54110-4_8 113,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,amnon rapoport,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 114,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,aner sela,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 115,Fantasy sports is a fast-growing multi-billion dollar industry [,maxim sviridenko,Not available,2016.0,10.1007/978-3-662-54110-4_8,Web and Internet Economics,Aris2016,False,,Springer,Not available,Bidding Strategies for Fantasy-Sports Auctions,f41241a5479e8298079dd2c7bef929d1,http://dx.doi.org/10.1007/978-3-662-54110-4_8 116,Under second-price sealed bid auctions when bidders have independent private valuations of a risky object submitting one’s valuation is no longer dominant for non-expected utility bidders. This yields a breakdown in revenue equivalence between English auctions and second-price auctions for non-expected utility bidders. In an experimental auction market selling a single risky object we find that an English auction yields higher seller revenue than the corresponding second-price auction. Further the direction of revenue difference is supported by Nash equilibrium bidding behavior of betweenness-conforming non-expected utility bidders under the additional hypothesis of bidders displaying a weak form of Allais type behavior.,chew hong,Not available,2016.0,10.1007/978-4-431-55501-8_14,Behavioral Interactions Markets and Economic Dynamics,Soo2016,False,,Springer,Not available,Revenue Non-equivalence Between the English and the Second-Price Auctions: Experimental Evidence,0382738134d3bccc98693902ff30b21c,http://dx.doi.org/10.1007/978-4-431-55501-8_14 117,Under second-price sealed bid auctions when bidders have independent private valuations of a risky object submitting one’s valuation is no longer dominant for non-expected utility bidders. This yields a breakdown in revenue equivalence between English auctions and second-price auctions for non-expected utility bidders. In an experimental auction market selling a single risky object we find that an English auction yields higher seller revenue than the corresponding second-price auction. Further the direction of revenue difference is supported by Nash equilibrium bidding behavior of betweenness-conforming non-expected utility bidders under the additional hypothesis of bidders displaying a weak form of Allais type behavior.,naoko nishimura,Not available,2016.0,10.1007/978-4-431-55501-8_14,Behavioral Interactions Markets and Economic Dynamics,Soo2016,False,,Springer,Not available,Revenue Non-equivalence Between the English and the Second-Price Auctions: Experimental Evidence,0382738134d3bccc98693902ff30b21c,http://dx.doi.org/10.1007/978-4-431-55501-8_14 118,In this chapter we examine different auction formats such as first- second- third- and ,felix munoz-garcia,Not available,2016.0,10.1007/978-3-319-32963-5_8,Strategy and Game Theory,Felix2016,False,,Springer,Not available,Auctions,6beb9d5211e970d8422cbcf701b996fe,http://dx.doi.org/10.1007/978-3-319-32963-5_8 119,In this chapter we examine different auction formats such as first- second- third- and ,daniel toro-gonzalez,Not available,2016.0,10.1007/978-3-319-32963-5_8,Strategy and Game Theory,Felix2016,False,,Springer,Not available,Auctions,6beb9d5211e970d8422cbcf701b996fe,http://dx.doi.org/10.1007/978-3-319-32963-5_8 120,It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution which aim to maximize the spectrum utilization and social welfare we propose DIARY in this paper which not only achieves approximate revenue maximization but also guarantees bid privacy via differential privacy. Furthermore we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.,chunchun wu,Not available,2016.0,10.1007/s11276-015-0955-7,Wireless Networks,Chunchun2016,False,,Springer,Not available,Designing differentially private spectrum auction mechanisms,dfeb39254ed88491114d224ae0c578c2,http://dx.doi.org/10.1007/s11276-015-0955-7 121,It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution which aim to maximize the spectrum utilization and social welfare we propose DIARY in this paper which not only achieves approximate revenue maximization but also guarantees bid privacy via differential privacy. Furthermore we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.,zuying wei,Not available,2016.0,10.1007/s11276-015-0955-7,Wireless Networks,Chunchun2016,False,,Springer,Not available,Designing differentially private spectrum auction mechanisms,dfeb39254ed88491114d224ae0c578c2,http://dx.doi.org/10.1007/s11276-015-0955-7 122,It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution which aim to maximize the spectrum utilization and social welfare we propose DIARY in this paper which not only achieves approximate revenue maximization but also guarantees bid privacy via differential privacy. Furthermore we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.,fan wu,Not available,2016.0,10.1007/s11276-015-0955-7,Wireless Networks,Chunchun2016,False,,Springer,Not available,Designing differentially private spectrum auction mechanisms,dfeb39254ed88491114d224ae0c578c2,http://dx.doi.org/10.1007/s11276-015-0955-7 123,It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution which aim to maximize the spectrum utilization and social welfare we propose DIARY in this paper which not only achieves approximate revenue maximization but also guarantees bid privacy via differential privacy. Furthermore we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.,guihai chen,Not available,2016.0,10.1007/s11276-015-0955-7,Wireless Networks,Chunchun2016,False,,Springer,Not available,Designing differentially private spectrum auction mechanisms,dfeb39254ed88491114d224ae0c578c2,http://dx.doi.org/10.1007/s11276-015-0955-7 124,It is urgent to solve the contradiction between limited spectrum resources and the increasing demand from the ever-growing wireless networks. Spectrum redistribution is a powerful way to mitigate the situation of spectrum scarcity.In contrast to existing mechanisms for spectrum redistribution which aim to maximize the spectrum utilization and social welfare we propose DIARY in this paper which not only achieves approximate revenue maximization but also guarantees bid privacy via differential privacy. Furthermore we present an effective method to address the fairness issue in spectrum auctions. Results from extensive evaluations show that DIARY has substantial competitive advantages over existing mechanisms.,shaojie tang,Not available,2016.0,10.1007/s11276-015-0955-7,Wireless Networks,Chunchun2016,False,,Springer,Not available,Designing differentially private spectrum auction mechanisms,dfeb39254ed88491114d224ae0c578c2,http://dx.doi.org/10.1007/s11276-015-0955-7 125,The present note analyzes the simultaneous ascending-bid auction with arbitrarily many asymmetric bidders with decreasing marginal valuations under complete information. We show that the game is solvable by iterated elimination of weakly dominated strategies if the efficient allocation assigns at least one unit to every player and if bid increments are sufficiently small. In that unique equilibrium bidders immediately reduce their demand to the efficient allocation and the auction ends in the first round of bidding.,frank riedel,Not available,2006.0,10.1007/s00199-005-0039-5,Economic Theory,Frank2006,False,,Springer,Not available,Immediate demand reduction in simultaneous ascending-bid auctions: a uniqueness result,f99a5e7cdb40cb64667e099a6a1d4598,http://dx.doi.org/10.1007/s00199-005-0039-5 126,We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all ,michal feldman,Not available,2016.0,10.1007/978-3-662-54110-4_10,Web and Internet Economics,Michal2016,False,,Springer,Not available,Correlated and Coarse Equilibria of Single-Item Auctions,04d56f40acf4ec19fb831cdc9daaecdb,http://dx.doi.org/10.1007/978-3-662-54110-4_10 127,We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all ,brendan lucier,Not available,2016.0,10.1007/978-3-662-54110-4_10,Web and Internet Economics,Michal2016,False,,Springer,Not available,Correlated and Coarse Equilibria of Single-Item Auctions,04d56f40acf4ec19fb831cdc9daaecdb,http://dx.doi.org/10.1007/978-3-662-54110-4_10 128,We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all ,noam nisan,Not available,2016.0,10.1007/978-3-662-54110-4_10,Web and Internet Economics,Michal2016,False,,Springer,Not available,Correlated and Coarse Equilibria of Single-Item Auctions,04d56f40acf4ec19fb831cdc9daaecdb,http://dx.doi.org/10.1007/978-3-662-54110-4_10 129,quasilinearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer’s value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions where buyers’ complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium.We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods and that a “fractional” Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium generalizing known results for both quasilinear and non-quasilnear settings.,rad niazadeh,Not available,2016.0,10.1007/978-3-662-54110-4_9,Web and Internet Economics,Rad2016,False,,Springer,Not available,Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions,1d043d89b3bff91e5e29210dffcc62c9,http://dx.doi.org/10.1007/978-3-662-54110-4_9 130,quasilinearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer’s value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions where buyers’ complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium.We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods and that a “fractional” Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium generalizing known results for both quasilinear and non-quasilnear settings.,christopher wilkens,Not available,2016.0,10.1007/978-3-662-54110-4_9,Web and Internet Economics,Rad2016,False,,Springer,Not available,Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions,1d043d89b3bff91e5e29210dffcc62c9,http://dx.doi.org/10.1007/978-3-662-54110-4_9 131,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,isabelle perrigne,Not available,2016.0,10.1057/978-1-349-95121-5_2762-1,The New Palgrave Dictionary of Economics,Isabelle2016,False,,Springer,Not available,Auctions (Empirics),3eec13e51755afd919b616886763f8c5,http://dx.doi.org/10.1057/978-1-349-95121-5_2762-1 132,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,quang vuong,Not available,2016.0,10.1057/978-1-349-95121-5_2762-1,The New Palgrave Dictionary of Economics,Isabelle2016,False,,Springer,Not available,Auctions (Empirics),3eec13e51755afd919b616886763f8c5,http://dx.doi.org/10.1057/978-1-349-95121-5_2762-1 133,Herodotus reports the use of auctions as early as 500 BC in Babylon (see Cassady 1967 pp. 26–40 for references to this and the following historical notes). The Romans made extensive use of auctions in commerce and the Roman emperors Caligula and Aurelius auctioned royal furniture and heirlooms to pay debts. Roman military expeditions were accompanied by traders who bid for the spoils of war auctioned ,vernon smith,Not available,2016.0,10.1057/978-1-349-95121-5_616-1,The New Palgrave Dictionary of Economics,L.2016,False,,Springer,Not available,Auctions,b371760a4554bac780b20ac906f3e412,http://dx.doi.org/10.1057/978-1-349-95121-5_616-1 134,In economics the applications of auction theory are very broad. The present paper examines the applications of auction theory especially in a management accounting context. Auctions are widely used in different applications. Often auctions have been used as procurement auctions with a reverse auction design for instance to choose the best supplier. In addition auctions have been used in supply chain management. In particular the present paper will take a look at internal auctions which are used to allocate scarce resources within a firm. The main purpose of the present paper is to exposit the state of the art of the applications of auctions and auction theory. But also there is already a huge potential for auction theory as an instrument of management accounting. So the present paper will also take a look at auctions that are used to generate information or to coordinate firms for example auctions could be used to determine transfer prices or budgets.,max patzenhauer,Not available,2018.0,10.1007/978-3-319-61603-2_8,Game Theory in Management Accounting,Max2018,False,,Springer,Not available,Applications and Potentials of Auction Theory in Management Accounting,a55d79088ec96e35a528ea1c8bcc9b65,http://dx.doi.org/10.1007/978-3-319-61603-2_8 135,Work at the intersection of computer science and game theory is briefly surveyed with a focus on the work in computer science. In particular the following topics are considered: various roles of computational complexity in game theory including modelling bounded rationality its role in mechanism design and the problem of computing Nash equilibria; the ,joseph halpern,Not available,2018.0,10.1057/978-1-349-95189-5_2133,The New Palgrave Dictionary of Economics,Y.2018,False,,Springer,Not available,Computer Science and Game Theory,485c95acf22129f003266a20664cca53,http://dx.doi.org/10.1057/978-1-349-95189-5_2133 136,The present note analyzes the simultaneous ascending-bid auction with arbitrarily many asymmetric bidders with decreasing marginal valuations under complete information. We show that the game is solvable by iterated elimination of weakly dominated strategies if the efficient allocation assigns at least one unit to every player and if bid increments are sufficiently small. In that unique equilibrium bidders immediately reduce their demand to the efficient allocation and the auction ends in the first round of bidding.,elmar wolfstetter,Not available,2006.0,10.1007/s00199-005-0039-5,Economic Theory,Frank2006,False,,Springer,Not available,Immediate demand reduction in simultaneous ascending-bid auctions: a uniqueness result,f99a5e7cdb40cb64667e099a6a1d4598,http://dx.doi.org/10.1007/s00199-005-0039-5 137,The basic theory of strategic and extensive games is described. Strategic games Bayesian games extensive games with perfect information and extensive games with imperfect information are defined and explained. Among the solution concepts discussed are Nash equilibrium correlated equilibrium rationalizability subgame perfect equilibrium and weak sequential equilibrium.,martin osborne,Not available,2018.0,10.1057/978-1-349-95189-5_2694,The New Palgrave Dictionary of Economics,J.2018,False,,Springer,Not available,Strategic and Extensive Form Games,1e734d295dacd2a69680cf9953b874df,http://dx.doi.org/10.1057/978-1-349-95189-5_2694 138,Experimental methods have features in common across all the sciences. All tend to use the framework of falsification but there is inherent ambiguity in knowing which of the many hypotheses necessary to construct a test are negated by observations contrary to predictions. This ambiguity tends to engender much discussion contestability and the design of new experiments that attempt to resolve the open qsts. This social process is not part of the logic of scientific testing but it explains what scientists do and how new results become established.,vernon smith,Not available,2018.0,10.1057/978-1-349-95189-5_2122,The New Palgrave Dictionary of Economics,L.2018,False,,Springer,Not available,Experimental Economics,bec9afa75a8749b04492aafb96ceb5f1,http://dx.doi.org/10.1057/978-1-349-95189-5_2122 139,Mechanism design experiments bridge the gap between a theoretical mechanism and an actual economic process. In the domain of public goods matching and combinatorial auctions and laboratory experiments identify features of mechanisms that lead to good performance when implemented among boundedly rational agents. These features include dynamic stability and security in public goods mechanisms transparency in matching mechanisms package bidding simultaneity and iteration in combinatorial auctions.,yan chen,Not available,2018.0,10.1057/978-1-349-95189-5_2071,The New Palgrave Dictionary of Economics,Yan2018,False,,Springer,Not available,Mechanism Design Experiments,976cfa674c4c5ce1b66823117d173539,http://dx.doi.org/10.1057/978-1-349-95189-5_2071 140,Mechanism design experiments bridge the gap between a theoretical mechanism and an actual economic process. In the domain of public goods matching and combinatorial auctions and laboratory experiments identify features of mechanisms that lead to good performance when implemented among boundedly rational agents. These features include dynamic stability and security in public goods mechanisms transparency in matching mechanisms package bidding simultaneity and iteration in combinatorial auctions.,john ledyard,Not available,2018.0,10.1057/978-1-349-95189-5_2071,The New Palgrave Dictionary of Economics,Yan2018,False,,Springer,Not available,Mechanism Design Experiments,976cfa674c4c5ce1b66823117d173539,http://dx.doi.org/10.1057/978-1-349-95189-5_2071 141,Behavioural game theory uses experimental regularities and psychology to model formally how limits on strategic thinking learning and social preferences interact when people actually play games. Emerging theories of behaviour in ultimatum and trust games (and others) focus on an aversion to inequality reciprocity or concern for social image. Learning models often focus on numerical updating of an unobserved propensity to choose a strategy (including fictitious play updating of beliefs as a special case). Models of limits on strategic thinking assume players are in equilibrium but respond with error or there is a cognitive hierarchy of increasingly sophisticated reasoning.,colin camerer,Not available,2018.0,10.1057/978-1-349-95189-5_2384,The New Palgrave Dictionary of Economics,F.2018,False,,Springer,Not available,Behavioural Game Theory,612a51cc937994136ad095be6e8eedf4,http://dx.doi.org/10.1057/978-1-349-95189-5_2384 142,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,john kagel,Not available,2018.0,10.1057/978-1-349-95189-5_2671,The New Palgrave Dictionary of Economics,H.2018,False,,Springer,Not available,Auctions (Experiments),20d043104cc8fc13cb9378e5edd1cd26,http://dx.doi.org/10.1057/978-1-349-95189-5_2671 143,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,dan levin,Not available,2018.0,10.1057/978-1-349-95189-5_2671,The New Palgrave Dictionary of Economics,H.2018,False,,Springer,Not available,Auctions (Experiments),20d043104cc8fc13cb9378e5edd1cd26,http://dx.doi.org/10.1057/978-1-349-95189-5_2671 144,Behavioural economics broadly defined refers to the research programme that investigates the relationship between psychology and economic behaviour. The purpose of this article is to provide an outline of behavioural economics research and to describe where research in behavioural game theory stands within this outline. The aim is not to assess the impact of particular contributions or describe and interpret specific applications. Rather the goal is to provide an organization of the literature based on the type of departures from standard theory.,faruk gul,Not available,2018.0,10.1057/978-1-349-95189-5_2284,The New Palgrave Dictionary of Economics,Faruk2018,False,,Springer,Not available,Behavioural Economics and Game Theory,b1f8670fb60ae45bfbf07a71320dcdcc,http://dx.doi.org/10.1057/978-1-349-95189-5_2284 145,Economic studies of exchange examine processes in which agents obtain gains from trade e.g. bilateral bargaining and contracting auctions and multilateral markets. Prominent descriptive theories include idealized versions that assume agents simply respond to prices that clear markets. Realistic versions recognize effects of procedural rules and strategic behavior and various impediments such as incomplete or unenforceable contracts insufficient markets imperfect information and incomplete observability. Normative versions design market procedures contract forms and settlement rules that strengthen incentives and promote efficient outcomes.,robert wilson,Not available,2018.0,10.1057/978-1-349-95189-5_136,The New Palgrave Dictionary of Economics,B.2018,False,,Springer,Not available,Exchange,e35e3e8b835890590d375a2d45de972c,http://dx.doi.org/10.1057/978-1-349-95189-5_136 146,A mechanism is a specification of how economic decisions are determined as a function of the information that is known by the individuals in the economy. Mechanism theory shows that ,roger myerson,Not available,2018.0,10.1057/978-1-349-95189-5_2675,The New Palgrave Dictionary of Economics,B.2018,False,,Springer,Not available,Mechanism Design,6f5df96631f0d68226fe62218e25343f,http://dx.doi.org/10.1057/978-1-349-95189-5_2675 147,We show that asymmetry in bidders’ capacity constraints plays an important role in inhibiting collusion and promoting competitive outcomes in multi-unit auctions in which the final value of the good is common knowledge. This effect appears to be related to the increased difficulty of coordination when there are significant differences between bidders. Due to its impact on collusive outcomes asymmetry in bidding capacities has a more powerful impact on the seller’s revenue than does the auction type. Consistent with the finding in Sade et al. (2006) that the discriminatory auction is more susceptible to collusion than the uniform-price auction asymmetry in capacity constraints has a greater impact in discriminatory auctions.,orly sade,Not available,2006.0,10.1007/s10679-006-9003-x,Review of Finance,Orly2006,False,,Springer,Not available,When Less (Potential Demand) Is More (Revenue): Asymmetric Bidding Capacities in Divisible Good Auctions,0b4db14bae4c151fb0d74038ddb20f46,http://dx.doi.org/10.1007/s10679-006-9003-x 148,We analyze a group political lobbying all-pay auction with a group specific public good prize in which one group follows a weakest-link and the other group follows a best-shot impact function. We completely characterize all semi-symmetric equilibria. There are two types of equilibria: (1) each player in the best-shot group puts mass at the upper bound of the support whereas each player in the other group puts mass at the lower bound of the support; (2) players in the best-shot group put masses at both the lower and the upper bounds while the other group randomizes without a mass point.,subhasish chowdhury,Not available,2016.0,10.1007/s00355-016-1000-1,Social Choice and Welfare,M.2016,False,,Springer,Not available,Best-shot versus weakest-link in political lobbying: an application of group all-pay auction,61c44f94589df55dba3e499432f1cd88,http://dx.doi.org/10.1007/s00355-016-1000-1 149,We analyze a group political lobbying all-pay auction with a group specific public good prize in which one group follows a weakest-link and the other group follows a best-shot impact function. We completely characterize all semi-symmetric equilibria. There are two types of equilibria: (1) each player in the best-shot group puts mass at the upper bound of the support whereas each player in the other group puts mass at the lower bound of the support; (2) players in the best-shot group put masses at both the lower and the upper bounds while the other group randomizes without a mass point.,iryna topolyan,Not available,2016.0,10.1007/s00355-016-1000-1,Social Choice and Welfare,M.2016,False,,Springer,Not available,Best-shot versus weakest-link in political lobbying: an application of group all-pay auction,61c44f94589df55dba3e499432f1cd88,http://dx.doi.org/10.1007/s00355-016-1000-1 150," We introduce test and compare two auction-based methods for eliciting discount rates. In these “patience auctions” participants bid the smallest future sum they would prefer -or- the longest time they would wait for a reward rather than receive a smaller immediate payoff. The most patient bidder receives the delayed reward; all others receive the immediate payoff. These auctions allow us to compare discounting when participants’ attention is focused on the temporal versus monetary dimension of delayed rewards. We find that the estimated parameters in the three most commonly used discount functions (exponential hyperbolic and quasi-hyperbolic) differ across these two bidding methods (time-bids vs. money-bids). Specifically our participants tend to show more impatience under time-bids. Furthermore we find that people are more likely to exhibit exponential (as opposed to hyperbolic) discounting and exhibit less present bias under time-bids compared to money-bids. To our knowledge this paper is the first to directly compare time versus money preference elicitations within the same subjects using an incentive-compatible mechanism.",christopher olivola,Not available,2016.0,10.1007/s10683-015-9472-x,Experimental Economics,Y.2016,False,,Springer,Not available,Patience auctions: the impact of time vs. money bidding on elicited discount rates,88bd9f711b6d10494c4846b0a648f0e0,http://dx.doi.org/10.1007/s10683-015-9472-x 151," We introduce test and compare two auction-based methods for eliciting discount rates. In these “patience auctions” participants bid the smallest future sum they would prefer -or- the longest time they would wait for a reward rather than receive a smaller immediate payoff. The most patient bidder receives the delayed reward; all others receive the immediate payoff. These auctions allow us to compare discounting when participants’ attention is focused on the temporal versus monetary dimension of delayed rewards. We find that the estimated parameters in the three most commonly used discount functions (exponential hyperbolic and quasi-hyperbolic) differ across these two bidding methods (time-bids vs. money-bids). Specifically our participants tend to show more impatience under time-bids. Furthermore we find that people are more likely to exhibit exponential (as opposed to hyperbolic) discounting and exhibit less present bias under time-bids compared to money-bids. To our knowledge this paper is the first to directly compare time versus money preference elicitations within the same subjects using an incentive-compatible mechanism.",stephanie wang,Not available,2016.0,10.1007/s10683-015-9472-x,Experimental Economics,Y.2016,False,,Springer,Not available,Patience auctions: the impact of time vs. money bidding on elicited discount rates,88bd9f711b6d10494c4846b0a648f0e0,http://dx.doi.org/10.1007/s10683-015-9472-x 152,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,alexander vasin,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 153,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,marina dolmatova,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 154,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,gerhard-wilhelm weber,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 155,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,erqin hu,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 156,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,yong zhao,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 157,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,congjun rao,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 158,We show that asymmetry in bidders’ capacity constraints plays an important role in inhibiting collusion and promoting competitive outcomes in multi-unit auctions in which the final value of the good is common knowledge. This effect appears to be related to the increased difficulty of coordination when there are significant differences between bidders. Due to its impact on collusive outcomes asymmetry in bidding capacities has a more powerful impact on the seller’s revenue than does the auction type. Consistent with the finding in Sade et al. (2006) that the discriminatory auction is more susceptible to collusion than the uniform-price auction asymmetry in capacity constraints has a greater impact in discriminatory auctions.,charles schnitzlein,Not available,2006.0,10.1007/s10679-006-9003-x,Review of Finance,Orly2006,False,,Springer,Not available,When Less (Potential Demand) Is More (Revenue): Asymmetric Bidding Capacities in Divisible Good Auctions,0b4db14bae4c151fb0d74038ddb20f46,http://dx.doi.org/10.1007/s10679-006-9003-x 159,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,philippe gillen,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 160,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,alexander rasch,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 161,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,achim wambach,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 162,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,peter werner,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 163,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,niall flynn,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 164,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,christopher kah,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 165,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,rudolf kerschbamer,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 166,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of economic efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve economic efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-optimal ranking) moving it either towards or away from their ranking by ,mukund sundararajan,Not available,2016.0,10.1007/s00224-016-9679-z,Theory of Computing Systems,Mukund2016,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,f3fb6390468e94ba1d8135b5c5bcd620,http://dx.doi.org/10.1007/s00224-016-9679-z 167,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of economic efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve economic efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-optimal ranking) moving it either towards or away from their ranking by ,inbal talgam-cohen,Not available,2016.0,10.1007/s00224-016-9679-z,Theory of Computing Systems,Mukund2016,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,f3fb6390468e94ba1d8135b5c5bcd620,http://dx.doi.org/10.1007/s00224-016-9679-z 168,Environmental conditions and the interplay of cognitive and affective processes both exert influences on bidding behavior. This paper brings the above together considering how the (external) auction environment determines the impact of (internal) cognitive and affective processes on bidding behavior assessed in comparison to the optimal bid. Two aspects of the auction environment were considered namely auction dynamics (low: first-price sealed-bid auction high: Dutch auction) and value uncertainty (low high). In a laboratory experiment we assess bidders’ cognitive workload and emotional arousal through physiological measurements. We find that higher auction dynamics increase the impact of emotional arousal on bid deviations but not that of cognitive workload. Higher value uncertainty conversely increases the impact of cognitive workload on bid deviations but not that of emotional arousal. Taken together the auction environment is a critical factor in understanding the nature of the underlying decision process and its impact on bids.,anuja hariharan,Not available,2016.0,10.1007/s12525-016-0224-3,Electronic Markets,Anuja2016,False,,Springer,Not available,Think feel bid: the impact of environmental conditions on the role of bidders’ cognitive and affective processes in auction bidding,0495f5711ac8d197762521e0801fa2fd,http://dx.doi.org/10.1007/s12525-016-0224-3 169,We show that asymmetry in bidders’ capacity constraints plays an important role in inhibiting collusion and promoting competitive outcomes in multi-unit auctions in which the final value of the good is common knowledge. This effect appears to be related to the increased difficulty of coordination when there are significant differences between bidders. Due to its impact on collusive outcomes asymmetry in bidding capacities has a more powerful impact on the seller’s revenue than does the auction type. Consistent with the finding in Sade et al. (2006) that the discriminatory auction is more susceptible to collusion than the uniform-price auction asymmetry in capacity constraints has a greater impact in discriminatory auctions.,jaime zender,Not available,2006.0,10.1007/s10679-006-9003-x,Review of Finance,Orly2006,False,,Springer,Not available,When Less (Potential Demand) Is More (Revenue): Asymmetric Bidding Capacities in Divisible Good Auctions,0b4db14bae4c151fb0d74038ddb20f46,http://dx.doi.org/10.1007/s10679-006-9003-x 170,Environmental conditions and the interplay of cognitive and affective processes both exert influences on bidding behavior. This paper brings the above together considering how the (external) auction environment determines the impact of (internal) cognitive and affective processes on bidding behavior assessed in comparison to the optimal bid. Two aspects of the auction environment were considered namely auction dynamics (low: first-price sealed-bid auction high: Dutch auction) and value uncertainty (low high). In a laboratory experiment we assess bidders’ cognitive workload and emotional arousal through physiological measurements. We find that higher auction dynamics increase the impact of emotional arousal on bid deviations but not that of cognitive workload. Higher value uncertainty conversely increases the impact of cognitive workload on bid deviations but not that of emotional arousal. Taken together the auction environment is a critical factor in understanding the nature of the underlying decision process and its impact on bids.,marc adam,Not available,2016.0,10.1007/s12525-016-0224-3,Electronic Markets,Anuja2016,False,,Springer,Not available,Think feel bid: the impact of environmental conditions on the role of bidders’ cognitive and affective processes in auction bidding,0495f5711ac8d197762521e0801fa2fd,http://dx.doi.org/10.1007/s12525-016-0224-3 171,Environmental conditions and the interplay of cognitive and affective processes both exert influences on bidding behavior. This paper brings the above together considering how the (external) auction environment determines the impact of (internal) cognitive and affective processes on bidding behavior assessed in comparison to the optimal bid. Two aspects of the auction environment were considered namely auction dynamics (low: first-price sealed-bid auction high: Dutch auction) and value uncertainty (low high). In a laboratory experiment we assess bidders’ cognitive workload and emotional arousal through physiological measurements. We find that higher auction dynamics increase the impact of emotional arousal on bid deviations but not that of cognitive workload. Higher value uncertainty conversely increases the impact of cognitive workload on bid deviations but not that of emotional arousal. Taken together the auction environment is a critical factor in understanding the nature of the underlying decision process and its impact on bids.,timm teubner,Not available,2016.0,10.1007/s12525-016-0224-3,Electronic Markets,Anuja2016,False,,Springer,Not available,Think feel bid: the impact of environmental conditions on the role of bidders’ cognitive and affective processes in auction bidding,0495f5711ac8d197762521e0801fa2fd,http://dx.doi.org/10.1007/s12525-016-0224-3 172,Environmental conditions and the interplay of cognitive and affective processes both exert influences on bidding behavior. This paper brings the above together considering how the (external) auction environment determines the impact of (internal) cognitive and affective processes on bidding behavior assessed in comparison to the optimal bid. Two aspects of the auction environment were considered namely auction dynamics (low: first-price sealed-bid auction high: Dutch auction) and value uncertainty (low high). In a laboratory experiment we assess bidders’ cognitive workload and emotional arousal through physiological measurements. We find that higher auction dynamics increase the impact of emotional arousal on bid deviations but not that of cognitive workload. Higher value uncertainty conversely increases the impact of cognitive workload on bid deviations but not that of emotional arousal. Taken together the auction environment is a critical factor in understanding the nature of the underlying decision process and its impact on bids.,christof weinhardt,Not available,2016.0,10.1007/s12525-016-0224-3,Electronic Markets,Anuja2016,False,,Springer,Not available,Think feel bid: the impact of environmental conditions on the role of bidders’ cognitive and affective processes in auction bidding,0495f5711ac8d197762521e0801fa2fd,http://dx.doi.org/10.1007/s12525-016-0224-3 173,Taking advantage of peer-to-peer transmission underlying cellular networks device-to-device (D2D) communications offer various benefits such as coverage extension traffic offloading and improved energy efficiency. In this paper we focus on a promising scenario where a D2D local area network is formed to relay packets for an out-of-coverage source device. A one-sided auction model is formulated from a unique perspective in which the source device decides the allocation of its packets among the helpers and charges reserve payments to the helpers according to their bids. The winning helpers only collect rewards from the source’s deposit at the base station when the assigned packets are successfully relayed. In this model we further take into account the budget constraints of the helpers to capture the helpers’ resource limits and the risks that the helpers are willing to take. Based on this model we propose three auction mechanisms targeting economic properties such as individual rationality efficiency and truthfulness. An enhanced Martello & Toth algorithm is first developed for the VCG-based auction to determine packet allocation that optimizes the source’s quality of service. The probabilistic entrance auction mechanism uses sequential second price auction to achieve a low computational cost. The randomized mechanism involves a randomization over the above two mechanisms to satisfy certain requirement for social welfare while minimizing the computational time. We also conduct extensive simulations to examine the performance of the proposed mechanisms.,peijian ju,Not available,2016.0,10.1007/s11276-015-1099-5,Wireless Networks,Peijian2016,False,,Springer,Not available,Truthful budget constrained auction for device-to-device relaying packet allocation,f2dbae7cb8569db9d50d92729c0e472e,http://dx.doi.org/10.1007/s11276-015-1099-5 174,Taking advantage of peer-to-peer transmission underlying cellular networks device-to-device (D2D) communications offer various benefits such as coverage extension traffic offloading and improved energy efficiency. In this paper we focus on a promising scenario where a D2D local area network is formed to relay packets for an out-of-coverage source device. A one-sided auction model is formulated from a unique perspective in which the source device decides the allocation of its packets among the helpers and charges reserve payments to the helpers according to their bids. The winning helpers only collect rewards from the source’s deposit at the base station when the assigned packets are successfully relayed. In this model we further take into account the budget constraints of the helpers to capture the helpers’ resource limits and the risks that the helpers are willing to take. Based on this model we propose three auction mechanisms targeting economic properties such as individual rationality efficiency and truthfulness. An enhanced Martello & Toth algorithm is first developed for the VCG-based auction to determine packet allocation that optimizes the source’s quality of service. The probabilistic entrance auction mechanism uses sequential second price auction to achieve a low computational cost. The randomized mechanism involves a randomization over the above two mechanisms to satisfy certain requirement for social welfare while minimizing the computational time. We also conduct extensive simulations to examine the performance of the proposed mechanisms.,wei song,Not available,2016.0,10.1007/s11276-015-1099-5,Wireless Networks,Peijian2016,False,,Springer,Not available,Truthful budget constrained auction for device-to-device relaying packet allocation,f2dbae7cb8569db9d50d92729c0e472e,http://dx.doi.org/10.1007/s11276-015-1099-5 175,Different types of position auctions are considered. A position auction is a mechanism for the allocation of advertising space in search engine results to a user-defined query. Advertisers make bids they are willing to pay the search engine for a click to their website. The search engine determines whose advertisements will get to the page and in what position based on the bids of all the advertisers. Different types of such auctions are discussed using the example of the Yandex search engine based on the Vickrey–Clarke–Grovesmechanism. The main result is a formalization of the concept of an auction with two-stage ranking and its balance test.,n. blinov,Not available,2016.0,10.3103/S0278641916040026,Moscow University Computational Mathematics and Cybernetics,G.2016,False,,Springer,Not available,Theoretical game analysis of position auctions according to the Vickrey–Clarke–Groves mechanism with two-stage ranking,de043351d02df3bde11106e50d712416,http://dx.doi.org/10.3103/S0278641916040026 176,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,emmanuel dechenaux,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 177,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,dan kovenock,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 178,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,roman sheremeta,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 179," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",andreas drichoutis,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 180,This paper investigates the allocative efficiency of two non-price allocation mechanisms – the lottery (random allocation) and the waiting-line auction (queue system) – for the cases where consumers possess identical time costs (the homogeneous case) and where time costs are correlated with time valuations (the heterogeneous case). We show that the relative efficiency of the two mechanisms depends critically on a scarcity factor (measured by the ratio of the number of objects available for allocation over the number of participants) and on the shape of the distribution of valuations. We show that the lottery dominates the waiting-line auction for a wide range of situations and that while consumer heterogeneity may improve the relative allocative efficiency of the waiting-line auction the ranking on relative efficiency is not reversed.,winston koh,Not available,2006.0,10.1007/s00355-006-0134-y,Social Choice and Welfare,H.2006,False,,Springer,Not available,Lottery Rather than Waiting-line Auction,b05d35cf3f1d714103ff47962f3d0c36,http://dx.doi.org/10.1007/s00355-006-0134-y 181," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",jayson lusk,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 182," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",rodolfo nayga,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 183,This study focuses on how hedonic versus utilitarian bidding values affect bidding behavior in e-auctions. The bidding behavioral data was collected through a quasi-experimental design on an authentic e-auction website. The results derived from 121 participants showed that bidders with high utilitarian bidding values were more likely to win bids than those with high hedonic bidding values. In addition bidders with high utilitarian bidding values were more likely to offer a higher final bid than those with high hedonic bidding values because they estimated a higher reasonable price for the item. Finally bidders with high hedonic bidding values were more likely to use a manual bidding approach whereas those with high utilitarian bidding values were more likely to use an automatic bidding approach.,lien-ti bei,Not available,2015.0,10.1007/s10660-015-9197-0,Electronic Commerce Research,Lien-Ti2015,False,,Springer,Not available,The effects of hedonic and utilitarian bidding values on e-auction behavior,99c2562f8cd499749d6af8daaf3b4347,http://dx.doi.org/10.1007/s10660-015-9197-0 184,This study focuses on how hedonic versus utilitarian bidding values affect bidding behavior in e-auctions. The bidding behavioral data was collected through a quasi-experimental design on an authentic e-auction website. The results derived from 121 participants showed that bidders with high utilitarian bidding values were more likely to win bids than those with high hedonic bidding values. In addition bidders with high utilitarian bidding values were more likely to offer a higher final bid than those with high hedonic bidding values because they estimated a higher reasonable price for the item. Finally bidders with high hedonic bidding values were more likely to use a manual bidding approach whereas those with high utilitarian bidding values were more likely to use an automatic bidding approach.,ming-yi chen,Not available,2015.0,10.1007/s10660-015-9197-0,Electronic Commerce Research,Lien-Ti2015,False,,Springer,Not available,The effects of hedonic and utilitarian bidding values on e-auction behavior,99c2562f8cd499749d6af8daaf3b4347,http://dx.doi.org/10.1007/s10660-015-9197-0 185,We compare auctioning and grandfathering as allocation mechanisms of emission permits when there is a secondary market with market power and firms have private information on their own abatement technologies. Based on real-life cases such as the EU ETS we consider a multi-unit multi-bid uniform auction. At the auction each firm anticipates its role in the secondary market either as a leader or a follower. This role affects each firms’ valuation of the permits (which are not common across firms) as well as their bidding strategies and it precludes the auction from generating a cost-effective allocation of permits as it occurs in simpler auction models. Auctioning tends to be more cost-effective than grandfathering when the firms’ abatement cost functions are sufficiently different from one another especially if the follower has lower abatement costs than the leader and the dispersion of the marginal costs is large enough.,francisco alvarez,Not available,2015.0,10.1007/s10640-014-9839-z,Environmental and Resource Economics,Francisco2015,False,,Springer,Not available,Auctioning Versus Grandfathering in Cap-and-Trade Systems with Market Power and Incomplete Information,bde045ca175396713b3a2969d5c27436,http://dx.doi.org/10.1007/s10640-014-9839-z 186,We compare auctioning and grandfathering as allocation mechanisms of emission permits when there is a secondary market with market power and firms have private information on their own abatement technologies. Based on real-life cases such as the EU ETS we consider a multi-unit multi-bid uniform auction. At the auction each firm anticipates its role in the secondary market either as a leader or a follower. This role affects each firms’ valuation of the permits (which are not common across firms) as well as their bidding strategies and it precludes the auction from generating a cost-effective allocation of permits as it occurs in simpler auction models. Auctioning tends to be more cost-effective than grandfathering when the firms’ abatement cost functions are sufficiently different from one another especially if the follower has lower abatement costs than the leader and the dispersion of the marginal costs is large enough.,francisco andre,Not available,2015.0,10.1007/s10640-014-9839-z,Environmental and Resource Economics,Francisco2015,False,,Springer,Not available,Auctioning Versus Grandfathering in Cap-and-Trade Systems with Market Power and Incomplete Information,bde045ca175396713b3a2969d5c27436,http://dx.doi.org/10.1007/s10640-014-9839-z 187,Using contests to generate innovation has been and is widely used. Such contests often involve offering a prize that depends upon the accomplishment (effort). Using an all-pay auction as a model of a contest we determine the optimal reward for inducing innovation. In a symmetric environment we find that the reward should be set to ,todd kaplan,Not available,2015.0,10.1007/s10058-015-0179-4,Review of Economic Design,R.2015,False,,Springer,Not available,The optimal design of rewards in contests,e19ffbe56f298ae1b204433243427548,http://dx.doi.org/10.1007/s10058-015-0179-4 188,Using contests to generate innovation has been and is widely used. Such contests often involve offering a prize that depends upon the accomplishment (effort). Using an all-pay auction as a model of a contest we determine the optimal reward for inducing innovation. In a symmetric environment we find that the reward should be set to ,david wettstein,Not available,2015.0,10.1007/s10058-015-0179-4,Review of Economic Design,R.2015,False,,Springer,Not available,The optimal design of rewards in contests,e19ffbe56f298ae1b204433243427548,http://dx.doi.org/10.1007/s10058-015-0179-4 189,We study the Uniform Price Auction one of the standard sealed-bid multi-unit auction formats in Auction Theory for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is generally inefficient due to a “Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. All the same the uniform pricing rule is popular by its appeal to the anticipation that identical items should be identically priced. Its applications include among others sales of U.S. Treasury notes to investors and trade exchanges over the Internet facilitated by popular online brokers. In this work we characterize pure undominated bidding strategies and give an algorithm for computing pure Nash equilibria in such strategies. Subsequently we show that their Price of Anarchy is ,evangelos markakis,Not available,2015.0,10.1007/s00224-014-9537-9,Theory of Computing Systems,Evangelos2015,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,eb3c05f68d391d2253a037224d3141d4,http://dx.doi.org/10.1007/s00224-014-9537-9 190,We study the Uniform Price Auction one of the standard sealed-bid multi-unit auction formats in Auction Theory for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is generally inefficient due to a “Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. All the same the uniform pricing rule is popular by its appeal to the anticipation that identical items should be identically priced. Its applications include among others sales of U.S. Treasury notes to investors and trade exchanges over the Internet facilitated by popular online brokers. In this work we characterize pure undominated bidding strategies and give an algorithm for computing pure Nash equilibria in such strategies. Subsequently we show that their Price of Anarchy is ,orestis telelis,Not available,2015.0,10.1007/s00224-014-9537-9,Theory of Computing Systems,Evangelos2015,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,eb3c05f68d391d2253a037224d3141d4,http://dx.doi.org/10.1007/s00224-014-9537-9 191,This paper investigates the allocative efficiency of two non-price allocation mechanisms – the lottery (random allocation) and the waiting-line auction (queue system) – for the cases where consumers possess identical time costs (the homogeneous case) and where time costs are correlated with time valuations (the heterogeneous case). We show that the relative efficiency of the two mechanisms depends critically on a scarcity factor (measured by the ratio of the number of objects available for allocation over the number of participants) and on the shape of the distribution of valuations. We show that the lottery dominates the waiting-line auction for a wide range of situations and that while consumer heterogeneity may improve the relative allocative efficiency of the waiting-line auction the ranking on relative efficiency is not reversed.,zhenlin yang,Not available,2006.0,10.1007/s00355-006-0134-y,Social Choice and Welfare,H.2006,False,,Springer,Not available,Lottery Rather than Waiting-line Auction,b05d35cf3f1d714103ff47962f3d0c36,http://dx.doi.org/10.1007/s00355-006-0134-y 192,Politicians expect green public procurement (GPP) to serve as an environmental policy instrument. However in order for GPP to work as an effective policy instrument it is important to take into consideration potential suppliers’ decisions to participate in the procurement process the total number of bidders and the screening of bidders with respect to mandatory green criteria. The aim of this paper is to empirically study GPP in this respect. The analysis presented here is based on data from Swedish cleaning service procurements that are unique in that they contain very detailed information on various environmental standards set by the contracting authorities. We find at best only a weak effect on supplier behavior and this suggests that the use of GPP in this situation does not live up to its political expectations.,sofia lundberg,Not available,2015.0,10.1007/s10018-015-0102-9,Environmental Economics and Policy Studies,Sofia2015,True,,Springer,Not available,Using public procurement to implement environmental policy: an empirical analysis,38b706f72b70031d0ab02335426a58d9,http://dx.doi.org/10.1007/s10018-015-0102-9 193,Politicians expect green public procurement (GPP) to serve as an environmental policy instrument. However in order for GPP to work as an effective policy instrument it is important to take into consideration potential suppliers’ decisions to participate in the procurement process the total number of bidders and the screening of bidders with respect to mandatory green criteria. The aim of this paper is to empirically study GPP in this respect. The analysis presented here is based on data from Swedish cleaning service procurements that are unique in that they contain very detailed information on various environmental standards set by the contracting authorities. We find at best only a weak effect on supplier behavior and this suggests that the use of GPP in this situation does not live up to its political expectations.,per-olov marklund,Not available,2015.0,10.1007/s10018-015-0102-9,Environmental Economics and Policy Studies,Sofia2015,True,,Springer,Not available,Using public procurement to implement environmental policy: an empirical analysis,38b706f72b70031d0ab02335426a58d9,http://dx.doi.org/10.1007/s10018-015-0102-9 194,Politicians expect green public procurement (GPP) to serve as an environmental policy instrument. However in order for GPP to work as an effective policy instrument it is important to take into consideration potential suppliers’ decisions to participate in the procurement process the total number of bidders and the screening of bidders with respect to mandatory green criteria. The aim of this paper is to empirically study GPP in this respect. The analysis presented here is based on data from Swedish cleaning service procurements that are unique in that they contain very detailed information on various environmental standards set by the contracting authorities. We find at best only a weak effect on supplier behavior and this suggests that the use of GPP in this situation does not live up to its political expectations.,elon stromback,Not available,2015.0,10.1007/s10018-015-0102-9,Environmental Economics and Policy Studies,Sofia2015,True,,Springer,Not available,Using public procurement to implement environmental policy: an empirical analysis,38b706f72b70031d0ab02335426a58d9,http://dx.doi.org/10.1007/s10018-015-0102-9 195,Politicians expect green public procurement (GPP) to serve as an environmental policy instrument. However in order for GPP to work as an effective policy instrument it is important to take into consideration potential suppliers’ decisions to participate in the procurement process the total number of bidders and the screening of bidders with respect to mandatory green criteria. The aim of this paper is to empirically study GPP in this respect. The analysis presented here is based on data from Swedish cleaning service procurements that are unique in that they contain very detailed information on various environmental standards set by the contracting authorities. We find at best only a weak effect on supplier behavior and this suggests that the use of GPP in this situation does not live up to its political expectations.,david sundstrom,Not available,2015.0,10.1007/s10018-015-0102-9,Environmental Economics and Policy Studies,Sofia2015,True,,Springer,Not available,Using public procurement to implement environmental policy: an empirical analysis,38b706f72b70031d0ab02335426a58d9,http://dx.doi.org/10.1007/s10018-015-0102-9 196,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,teresa briz,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 197,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,andreas drichoutis,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 198,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,lisa house,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 199,Many complex decision problems in the real world are very difficult to solve due to computational complexity. The winner determination problem (WDP) in combinatorial double auctions is one example of such complex problems. Although it allows buyers and sellers to submit bids and trade goods conveniently the WDP in combinatorial double auctions is notoriously difficult to solve from computation point of view. It relies on the development of an effective mechanism to determine the winners. Multi-agent systems (MAS) provide an approach in which several agents attempt through their interactions to jointly solve a problem. An important issue in MAS is the design of multi-agent learning algorithms. In this paper we will study the development of scalable multi-agent learning algorithms for solving the WDP in combinatorial double auctions. Instead of finding the exact solution we will set up a fictitious market based on MAS architecture and develop multi-agent learning algorithms to reduce the computational complexity in solving the WDP of combinatorial double auctions. In the fictitious market each buyer each seller and the mediator is modeled by an agent. The issue is to develop learning algorithms for all the agents in the system to collectively solve the WDP in combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach and a subgradient method to develop efficient multi-agent learning algorithms for solving the WDP in combinatorial double auctions. The effectiveness of the proposed multi-agent learning algorithms is also demonstrated by numerical examples.,fu-shiung hsieh,Not available,2015.0,10.1007/s10489-014-0643-9,Applied Intelligence,Fu-Shiung2015,False,,Springer,Not available,Scalable multi-agent learning algorithms to determine winners in combinatorial double auctions,616531ca4e7a237f970d799ce6fb08f4,http://dx.doi.org/10.1007/s10489-014-0643-9 200,Many complex decision problems in the real world are very difficult to solve due to computational complexity. The winner determination problem (WDP) in combinatorial double auctions is one example of such complex problems. Although it allows buyers and sellers to submit bids and trade goods conveniently the WDP in combinatorial double auctions is notoriously difficult to solve from computation point of view. It relies on the development of an effective mechanism to determine the winners. Multi-agent systems (MAS) provide an approach in which several agents attempt through their interactions to jointly solve a problem. An important issue in MAS is the design of multi-agent learning algorithms. In this paper we will study the development of scalable multi-agent learning algorithms for solving the WDP in combinatorial double auctions. Instead of finding the exact solution we will set up a fictitious market based on MAS architecture and develop multi-agent learning algorithms to reduce the computational complexity in solving the WDP of combinatorial double auctions. In the fictitious market each buyer each seller and the mediator is modeled by an agent. The issue is to develop learning algorithms for all the agents in the system to collectively solve the WDP in combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach and a subgradient method to develop efficient multi-agent learning algorithms for solving the WDP in combinatorial double auctions. The effectiveness of the proposed multi-agent learning algorithms is also demonstrated by numerical examples.,chi-shiang liao,Not available,2015.0,10.1007/s10489-014-0643-9,Applied Intelligence,Fu-Shiung2015,False,,Springer,Not available,Scalable multi-agent learning algorithms to determine winners in combinatorial double auctions,616531ca4e7a237f970d799ce6fb08f4,http://dx.doi.org/10.1007/s10489-014-0643-9 201,The acquisition of information is an important feature in most auctions where one’s exact private valuation is unknown ex-ante. We conducted the first experiment in testing a risk-neutral expected surplus maximization model with this feature. Varying the auction format and the cost of information acquisition we found bidders in most cases acquired too much information. Moreover bidders who remained uninformed placed bids significantly below the optimal bid. The general prediction concerning revenue and efficiency remains valid as a higher information cost was associated with lower revenues and efficiency rates. We explore different ex-post explanations for the observed behavior and show that regret avoidance can explain the data while risk aversion and ambiguity aversion cannot.,vitali gretschko,Not available,2015.0,10.1007/s10683-014-9406-z,Experimental Economics,Vitali2015,False,,Springer,Not available,Excess information acquisition in auctions,e0ca1eaddf156bb06e58fc5c7794498d,http://dx.doi.org/10.1007/s10683-014-9406-z 202,This paper investigates the allocative efficiency of two non-price allocation mechanisms – the lottery (random allocation) and the waiting-line auction (queue system) – for the cases where consumers possess identical time costs (the homogeneous case) and where time costs are correlated with time valuations (the heterogeneous case). We show that the relative efficiency of the two mechanisms depends critically on a scarcity factor (measured by the ratio of the number of objects available for allocation over the number of participants) and on the shape of the distribution of valuations. We show that the lottery dominates the waiting-line auction for a wide range of situations and that while consumer heterogeneity may improve the relative allocative efficiency of the waiting-line auction the ranking on relative efficiency is not reversed.,lijing zhu,Not available,2006.0,10.1007/s00355-006-0134-y,Social Choice and Welfare,H.2006,False,,Springer,Not available,Lottery Rather than Waiting-line Auction,b05d35cf3f1d714103ff47962f3d0c36,http://dx.doi.org/10.1007/s00355-006-0134-y 203,The acquisition of information is an important feature in most auctions where one’s exact private valuation is unknown ex-ante. We conducted the first experiment in testing a risk-neutral expected surplus maximization model with this feature. Varying the auction format and the cost of information acquisition we found bidders in most cases acquired too much information. Moreover bidders who remained uninformed placed bids significantly below the optimal bid. The general prediction concerning revenue and efficiency remains valid as a higher information cost was associated with lower revenues and efficiency rates. We explore different ex-post explanations for the observed behavior and show that regret avoidance can explain the data while risk aversion and ambiguity aversion cannot.,alexander rajko,Not available,2015.0,10.1007/s10683-014-9406-z,Experimental Economics,Vitali2015,False,,Springer,Not available,Excess information acquisition in auctions,e0ca1eaddf156bb06e58fc5c7794498d,http://dx.doi.org/10.1007/s10683-014-9406-z 204,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,t. andersson,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 205,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,c. andersson,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 206,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,a. talman,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 207,We study a keyword auction model where bidders have constrained budgets. In the absence of budget constraints Edelman et al. (Am Econ Rev 97(1):242–259 ,youngwoo koh,Not available,2013.0,10.1007/s10058-013-0147-9,Review of Economic Design,Youngwoo2013,False,,Springer,Not available,Keyword auctions with budget-constrained bidders,88f99aa310a10b05c8d52ecf3057b1d2,http://dx.doi.org/10.1007/s10058-013-0147-9 208,This paper addresses the effectiveness of auctions and legal unbundling as regulatory measures to tender a vertically integrated industry more competitive. Specifically I analyze if implementing auctions and legal unbundling can counter market power in an industry where a Vertically Integrated Corporation (VIC) has a monopoly position in an essential scarce upstream activity and also owns one of the firms active in the competitive downstream activity. In an earlier paper Van Koten (,silvester koten,Not available,2013.0,10.1007/s10657-011-9269-0,European Journal of Law and Economics,Silvester2013,False,,Springer,Not available,Legal unbundling and auctions in vertically integrated (utilities) markets,8496b00034c8edb1f0bbe1476a957835,http://dx.doi.org/10.1007/s10657-011-9269-0 209,This paper reports findings of two field studies conducted on a local online auction website that compare bidding strategies in charity and non-charity auctions focusing on the extent of jump bidding at different stages of auctions. Results indicate that jump bidding is negatively correlated with bidder entry and positively associated with ending prices. These correlations are greatest during the beginning stage of auctions and are substantially larger for charity auctions than for non-charity auctions. Additionally early-stage jump bidding occurred more often in charity auctions (consistent with bidders trying to drive up prices in charity auctions) ending-stage jump bidding was more frequent in non-charity auctions (possibly used strategically to win the auction). Further frivolous products tended to sell at a higher proportion of retail value in charity auctions providing a replication of the results of previous researchers but in a field setting.,yongfu he,Not available,2013.0,10.1007/s11002-013-9228-3,Marketing Letters,Yongfu2013,False,,Springer,Not available,The impact of jump bidding in online auctions,1a0ea2db59c537a92d6cbee25c14123b,http://dx.doi.org/10.1007/s11002-013-9228-3 210,This paper reports findings of two field studies conducted on a local online auction website that compare bidding strategies in charity and non-charity auctions focusing on the extent of jump bidding at different stages of auctions. Results indicate that jump bidding is negatively correlated with bidder entry and positively associated with ending prices. These correlations are greatest during the beginning stage of auctions and are substantially larger for charity auctions than for non-charity auctions. Additionally early-stage jump bidding occurred more often in charity auctions (consistent with bidders trying to drive up prices in charity auctions) ending-stage jump bidding was more frequent in non-charity auctions (possibly used strategically to win the auction). Further frivolous products tended to sell at a higher proportion of retail value in charity auctions providing a replication of the results of previous researchers but in a field setting.,leszczyc popkowski,Not available,2013.0,10.1007/s11002-013-9228-3,Marketing Letters,Yongfu2013,False,,Springer,Not available,The impact of jump bidding in online auctions,1a0ea2db59c537a92d6cbee25c14123b,http://dx.doi.org/10.1007/s11002-013-9228-3 211,The present paper proposes a theoretical model of the equilibrium bidding behavior in simultaneous competing private-value Internet auctions such as those on eBay. It shows that last-minute bidding and multiple bidding two commonly observed bidding strategies arise in equilibrium. It also suggests that last-minute bidding may lead to inefficient outcomes.,marta stryszowska,Not available,2013.0,10.1007/s10058-013-0142-1,Review of Economic Design,Marta2013,False,,Springer,Not available,Multiple and last-minute bidding in competing internet auctions,2c20844d1feb2d0db75e52fd96a43e14,http://dx.doi.org/10.1007/s10058-013-0142-1 212,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,isabel amigo,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 213,Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M+1)st-price auction protocols that only yield the winners' identities and the selling price. Moreover if desired losing bidders learn no information at all except that they lost. Our security model is merely based on computational intractability. In particular our approach does not rely on trusted third parties e.g. auctioneers. We present an efficient implementation of the proposed techniques based on El Gamal encryption whose security only relies on the intractability of the decisional Diffie—Hellman problem. The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids.,felix brandt,Not available,2006.0,10.1007/s10207-006-0001-y,International Journal of Information Security,Felix2006,False,,Springer,Not available,How to obtain full privacy in auctions,3f26c24726caf683a1b15edf1dbebc12,http://dx.doi.org/10.1007/s10207-006-0001-y 214,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,pablo belzarena,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 215,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,sandrine vaton,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 216,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,m iftekhar,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 217,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,a hailu,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 218,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,r lindner,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 219,In mass customization companies strive to enhance customer value by providing products and services that are approximate to customers’ needs. A company’s strategy of allocating its limited capacity to meeting diverse customer requirements directly impact customer perceived value in terms of available options cost and schedule. Proposed in this paper is an auction-based mass customization model for solving the problem of service customization under capacity constraints. The proposed model integrates customers’ customization decision making with the allocation of company’s capacity through multilateral negotiation between the company and its customers. The negotiation is conducted through a combinatorial iterative auction designed to maximize the overall customer value given limited capacity. The auction is incentive-compatible in the sense that customers will follow the prescribed myopic best-response bidding strategy. Experimental results indicate that customization solutions computed by the proposed model are very close to the optimal one. Revenue performance is also adequate when there is sufficient competition in the market.,chun wang,Not available,2013.0,10.1007/s10845-012-0689-7,Journal of Intelligent Manufacturing,Chun2013,False,,Springer,Not available,Service customization under capacity constraints: an auction-based model,519de286d72e2bbca845fcb60b54376e,http://dx.doi.org/10.1007/s10845-012-0689-7 220,In mass customization companies strive to enhance customer value by providing products and services that are approximate to customers’ needs. A company’s strategy of allocating its limited capacity to meeting diverse customer requirements directly impact customer perceived value in terms of available options cost and schedule. Proposed in this paper is an auction-based mass customization model for solving the problem of service customization under capacity constraints. The proposed model integrates customers’ customization decision making with the allocation of company’s capacity through multilateral negotiation between the company and its customers. The negotiation is conducted through a combinatorial iterative auction designed to maximize the overall customer value given limited capacity. The auction is incentive-compatible in the sense that customers will follow the prescribed myopic best-response bidding strategy. Experimental results indicate that customization solutions computed by the proposed model are very close to the optimal one. Revenue performance is also adequate when there is sufficient competition in the market.,farnaz dargahi,Not available,2013.0,10.1007/s10845-012-0689-7,Journal of Intelligent Manufacturing,Chun2013,False,,Springer,Not available,Service customization under capacity constraints: an auction-based model,519de286d72e2bbca845fcb60b54376e,http://dx.doi.org/10.1007/s10845-012-0689-7 221,The paper reports experimental data on the behavior in the first-price sealed-bid auction for a varying number of bidders when values and bids are private information. This feedback-free design is proposed for the experimental test of the one-shot game situation. We consider both within-subjects and between-subjects variations. In line with the qualitative risk neutral Nash equilibrium prediction the data show that bids increase in the number of bidders. However in auctions involving a small number of bidders average bids are above and in auctions involving a larger number of bidders average bids are below the risk neutral equilibrium prediction. The quartile analysis reveals that bidding behavior is not constant across the full value range for a given number of bidders. On the high value quartiles however the average bid–value ratio is not different from the risk neutral prediction. The behavior is different when the winning bid is revealed after each repetition.,sascha fullbrunn,Not available,2013.0,10.1007/s11238-013-9378-z,Theory and Decision,Sascha2013,False,,Springer,Not available,Varying the number of bidders in the first-price sealed-bid auction: experimental evidence for the one-shot game,5610cebc44d629f370c28fae3561465c,http://dx.doi.org/10.1007/s11238-013-9378-z 222,The paper reports experimental data on the behavior in the first-price sealed-bid auction for a varying number of bidders when values and bids are private information. This feedback-free design is proposed for the experimental test of the one-shot game situation. We consider both within-subjects and between-subjects variations. In line with the qualitative risk neutral Nash equilibrium prediction the data show that bids increase in the number of bidders. However in auctions involving a small number of bidders average bids are above and in auctions involving a larger number of bidders average bids are below the risk neutral equilibrium prediction. The quartile analysis reveals that bidding behavior is not constant across the full value range for a given number of bidders. On the high value quartiles however the average bid–value ratio is not different from the risk neutral prediction. The behavior is different when the winning bid is revealed after each repetition.,tibor neugebauer,Not available,2013.0,10.1007/s11238-013-9378-z,Theory and Decision,Sascha2013,False,,Springer,Not available,Varying the number of bidders in the first-price sealed-bid auction: experimental evidence for the one-shot game,5610cebc44d629f370c28fae3561465c,http://dx.doi.org/10.1007/s11238-013-9378-z 223,In models of first-price auctions when bidders are ,timothy hubbard,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 224,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,michael rothkopf,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 225,Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.,e ballestero,Not available,2006.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,E2006,False,,Springer,Not available,A decision approach to competitive electronic sealed-bid auctions for land,147a23f90e8272eece06b7f1b7053b5e,http://dx.doi.org/10.1057/palgrave.jors.2602097 226,In models of first-price auctions when bidders are ,rene kirkegaard,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 227,In models of first-price auctions when bidders are ,harry paarsch,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 228,Web service composition (WSC) offers a range of solutions for rapid creation of complex applications by facilitating the composition of already existing concrete web services. One critical challenge in WSC is the dynamic selection of concrete services to be bound to the abstract composite service. In our research we identify and elaborate on the challenges involved on developing a market-based mechanism for composite service selection. We propose ,mahboobeh moghaddam,Not available,2013.0,10.1007/978-3-642-37804-1_41,Service-Oriented Computing - ICSOC 2012 Workshops,Mahboobeh2013,False,,Springer,Not available,An Auction-Based Approach for Composite Web Service Selection,002847e94e7d7e0614bb8f09ce7060da,http://dx.doi.org/10.1007/978-3-642-37804-1_41 229,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,chenkun tsung,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 230,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,hannjang ho,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 231,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,singling lee,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 232,We study the following TV ad placement problem: ,xiangzhong xiang,Not available,2013.0,10.1007/978-3-319-03780-6_11,Combinatorial Optimization and Applications,Xiangzhong2013,False,,Springer,Not available,Prompt Mechanism for Online Auctions with Multi-unit Demands,6c26209a6570ce3a0f84dd7283327d1b,http://dx.doi.org/10.1007/978-3-319-03780-6_11 233,Security of various types of online auctions has received a considerable attention from researchers. However very few works have analyzed the problem of security in online sealed-bid auctions from the point of view of rational participants. The paper deals with an online auction scenario where two types of participants co-exist: 1) a party corrupted by a rational adversary that have positive utilities from information gained and that has no valuation for the items on auction enabling them to bid arbitrarily and 2) rational parties that are privacy conscious positively value information gain and have a valuation for items on auction. The secure auction protocol proposed here addresses 1) privacy concerns of the rational players from themselves as well as the rational adversary; 2) prevention of ‘throwing away’ of contracts by rational adversaries and 3) prevention of sellers from obtaining their copy of the contract while winners do not receive theirs.,sourya de,Not available,2013.0,10.1007/978-3-642-45204-8_7,Information Systems Security,Joyee2013,False,,Springer,Not available,Auctions with Rational Adversary,795ae47040061ffc1b5b2f74575952cc,http://dx.doi.org/10.1007/978-3-642-45204-8_7 234,Security of various types of online auctions has received a considerable attention from researchers. However very few works have analyzed the problem of security in online sealed-bid auctions from the point of view of rational participants. The paper deals with an online auction scenario where two types of participants co-exist: 1) a party corrupted by a rational adversary that have positive utilities from information gained and that has no valuation for the items on auction enabling them to bid arbitrarily and 2) rational parties that are privacy conscious positively value information gain and have a valuation for items on auction. The secure auction protocol proposed here addresses 1) privacy concerns of the rational players from themselves as well as the rational adversary; 2) prevention of ‘throwing away’ of contracts by rational adversaries and 3) prevention of sellers from obtaining their copy of the contract while winners do not receive theirs.,asim pal,Not available,2013.0,10.1007/978-3-642-45204-8_7,Information Systems Security,Joyee2013,False,,Springer,Not available,Auctions with Rational Adversary,795ae47040061ffc1b5b2f74575952cc,http://dx.doi.org/10.1007/978-3-642-45204-8_7 235,In digital goods auctions the auctioneer sells an item in unlimited supply to a set of potential buyers. The objective is to design a truthful auction that maximizes the auctioneer’s total profit. Motivated by the observation that the buyers’ valuation of the good might be interconnected through a social network we study digital goods auctions with positive externalities among buyers. This defines a multi-parameter auction design problem where the private valuation of every buyer is a function of the set of other winning buyers. The main contribution of this paper is a truthful competitive mechanism for subadditive valuations. Our competitive result is with respect to a new solution benchmark ,nick gravin,Not available,2013.0,10.1007/978-3-642-39212-2_50,Automata Languages and Programming,Nick2013,False,,Springer,Not available,Competitive Auctions for Markets with Positive Externalities,ea0862599634309093a7b2e207e4bdab,http://dx.doi.org/10.1007/978-3-642-39212-2_50 236,Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.,c bielza,Not available,2006.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,E2006,False,,Springer,Not available,A decision approach to competitive electronic sealed-bid auctions for land,147a23f90e8272eece06b7f1b7053b5e,http://dx.doi.org/10.1057/palgrave.jors.2602097 237,In digital goods auctions the auctioneer sells an item in unlimited supply to a set of potential buyers. The objective is to design a truthful auction that maximizes the auctioneer’s total profit. Motivated by the observation that the buyers’ valuation of the good might be interconnected through a social network we study digital goods auctions with positive externalities among buyers. This defines a multi-parameter auction design problem where the private valuation of every buyer is a function of the set of other winning buyers. The main contribution of this paper is a truthful competitive mechanism for subadditive valuations. Our competitive result is with respect to a new solution benchmark ,pinyan lu,Not available,2013.0,10.1007/978-3-642-39212-2_50,Automata Languages and Programming,Nick2013,False,,Springer,Not available,Competitive Auctions for Markets with Positive Externalities,ea0862599634309093a7b2e207e4bdab,http://dx.doi.org/10.1007/978-3-642-39212-2_50 238,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,preetinder kaur,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 239,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,madhu goyal,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 240,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,jie lu,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 241,We study online variants of weighted bipartite matching on graphs and hypergraphs. In our model for online matching the vertices on the right-hand side of a bipartite graph are given in advance and the vertices on the left-hand side arrive online in random order. Whenever a vertex arrives its adjacent edges with the corresponding weights are revealed and the online algorithm has to decide which of these edges should be included in the matching. The studied matching problems have applications e.g. in online ad auctions and combinatorial auctions where the right-hand side vertices correspond to items and the left-hand side vertices to bidders.Our main contribution is an optimal algorithm for the weighted matching problem on bipartite graphs. The algorithm is a natural generalization of the classical algorithm for the secretary problem achieving a competitive ratio of e ≈ 2.72 which matches the well-known upper and lower bound for the secretary problem. This shows that the classic algorithmic approach for the secretary problem can be extended from the simple selection of a best possible singleton to a rich combinatorial optimization problem.On hypergraphs with (,thomas kesselheim,Not available,2013.0,10.1007/978-3-642-40450-4_50,Algorithms – ESA 2013,Thomas2013,False,,Springer,Not available,An Optimal Online Algorithm for Weighted Bipartite Matching and Extensions to Combinatorial Auctions,2d767b37878e6280651bbea19c2aae79,http://dx.doi.org/10.1007/978-3-642-40450-4_50 242,We study online variants of weighted bipartite matching on graphs and hypergraphs. In our model for online matching the vertices on the right-hand side of a bipartite graph are given in advance and the vertices on the left-hand side arrive online in random order. Whenever a vertex arrives its adjacent edges with the corresponding weights are revealed and the online algorithm has to decide which of these edges should be included in the matching. The studied matching problems have applications e.g. in online ad auctions and combinatorial auctions where the right-hand side vertices correspond to items and the left-hand side vertices to bidders.Our main contribution is an optimal algorithm for the weighted matching problem on bipartite graphs. The algorithm is a natural generalization of the classical algorithm for the secretary problem achieving a competitive ratio of e ≈ 2.72 which matches the well-known upper and lower bound for the secretary problem. This shows that the classic algorithmic approach for the secretary problem can be extended from the simple selection of a best possible singleton to a rich combinatorial optimization problem.On hypergraphs with (,klaus radke,Not available,2013.0,10.1007/978-3-642-40450-4_50,Algorithms – ESA 2013,Thomas2013,False,,Springer,Not available,An Optimal Online Algorithm for Weighted Bipartite Matching and Extensions to Combinatorial Auctions,2d767b37878e6280651bbea19c2aae79,http://dx.doi.org/10.1007/978-3-642-40450-4_50 243,We study online variants of weighted bipartite matching on graphs and hypergraphs. In our model for online matching the vertices on the right-hand side of a bipartite graph are given in advance and the vertices on the left-hand side arrive online in random order. Whenever a vertex arrives its adjacent edges with the corresponding weights are revealed and the online algorithm has to decide which of these edges should be included in the matching. The studied matching problems have applications e.g. in online ad auctions and combinatorial auctions where the right-hand side vertices correspond to items and the left-hand side vertices to bidders.Our main contribution is an optimal algorithm for the weighted matching problem on bipartite graphs. The algorithm is a natural generalization of the classical algorithm for the secretary problem achieving a competitive ratio of e ≈ 2.72 which matches the well-known upper and lower bound for the secretary problem. This shows that the classic algorithmic approach for the secretary problem can be extended from the simple selection of a best possible singleton to a rich combinatorial optimization problem.On hypergraphs with (,andreas tonnis,Not available,2013.0,10.1007/978-3-642-40450-4_50,Algorithms – ESA 2013,Thomas2013,False,,Springer,Not available,An Optimal Online Algorithm for Weighted Bipartite Matching and Extensions to Combinatorial Auctions,2d767b37878e6280651bbea19c2aae79,http://dx.doi.org/10.1007/978-3-642-40450-4_50 244,We study online variants of weighted bipartite matching on graphs and hypergraphs. In our model for online matching the vertices on the right-hand side of a bipartite graph are given in advance and the vertices on the left-hand side arrive online in random order. Whenever a vertex arrives its adjacent edges with the corresponding weights are revealed and the online algorithm has to decide which of these edges should be included in the matching. The studied matching problems have applications e.g. in online ad auctions and combinatorial auctions where the right-hand side vertices correspond to items and the left-hand side vertices to bidders.Our main contribution is an optimal algorithm for the weighted matching problem on bipartite graphs. The algorithm is a natural generalization of the classical algorithm for the secretary problem achieving a competitive ratio of e ≈ 2.72 which matches the well-known upper and lower bound for the secretary problem. This shows that the classic algorithmic approach for the secretary problem can be extended from the simple selection of a best possible singleton to a rich combinatorial optimization problem.On hypergraphs with (,berthold vocking,Not available,2013.0,10.1007/978-3-642-40450-4_50,Algorithms – ESA 2013,Thomas2013,False,,Springer,Not available,An Optimal Online Algorithm for Weighted Bipartite Matching and Extensions to Combinatorial Auctions,2d767b37878e6280651bbea19c2aae79,http://dx.doi.org/10.1007/978-3-642-40450-4_50 245,This chapter focuses on an auction-based procurement framework for single coordinating platforms in humanitarian logistics. It first covers disaster relief operations humanitarian logistics and procurement in this context and illustrate many of the issues that make the management and coordination of procurement functions complex and challenging. Then the proposed framework along with the auction model is discussed including the unique design characteristics associated with disaster relief environment. Three-phase approach presents a complete representation of the procurement in humanitarian logistics. Results indicate that the proposed announcement options increase the fill rate. Announcement construction criteria allow coordinating platforms to use varying bundling choices.,mustafa ertem,Not available,2013.0,10.1007/978-1-4614-7007-6_6,Humanitarian and Relief Logistics,Alp2013,False,,Springer,Not available,A Procurement Auctions-Based Framework for Coordinating Platforms in Humanitarian Logistics,5fb0c9c7807ed0a168006d28d73f3a2c,http://dx.doi.org/10.1007/978-1-4614-7007-6_6 246,This chapter focuses on an auction-based procurement framework for single coordinating platforms in humanitarian logistics. It first covers disaster relief operations humanitarian logistics and procurement in this context and illustrate many of the issues that make the management and coordination of procurement functions complex and challenging. Then the proposed framework along with the auction model is discussed including the unique design characteristics associated with disaster relief environment. Three-phase approach presents a complete representation of the procurement in humanitarian logistics. Results indicate that the proposed announcement options increase the fill rate. Announcement construction criteria allow coordinating platforms to use varying bundling choices.,nebil buyurgan,Not available,2013.0,10.1007/978-1-4614-7007-6_6,Humanitarian and Relief Logistics,Alp2013,False,,Springer,Not available,A Procurement Auctions-Based Framework for Coordinating Platforms in Humanitarian Logistics,5fb0c9c7807ed0a168006d28d73f3a2c,http://dx.doi.org/10.1007/978-1-4614-7007-6_6 247,Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.,d pla-santamaria,Not available,2006.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,E2006,False,,Springer,Not available,A decision approach to competitive electronic sealed-bid auctions for land,147a23f90e8272eece06b7f1b7053b5e,http://dx.doi.org/10.1057/palgrave.jors.2602097 248,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,tobias scheffel,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 249,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,georg ziegler,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 250,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,martin bichler,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 251,We determine the conditions under which the seller in a first-price sealed-bid auction has an incentive to reveal his private information about the mean of bidders’ valuations in order to increase his expected revenue. With risk-neutral bidders we show that the seller’s expected revenue is higher when information is revealed. However when bidders are risk-averse this result does not necessarily hold; it depends on the bidders’ risk-aversion level and on the number of bidders.,francois marechal,Not available,2012.0,10.1007/s10058-012-0115-9,Review of Economic Design,François2012,False,,Springer,Not available,The public release of information in first-price sealed-bid auctions,5c885b02c6d71e64e800db26683c1e0a,http://dx.doi.org/10.1007/s10058-012-0115-9 252,We determine the conditions under which the seller in a first-price sealed-bid auction has an incentive to reveal his private information about the mean of bidders’ valuations in order to increase his expected revenue. With risk-neutral bidders we show that the seller’s expected revenue is higher when information is revealed. However when bidders are risk-averse this result does not necessarily hold; it depends on the bidders’ risk-aversion level and on the number of bidders.,pierre-henri morand,Not available,2012.0,10.1007/s10058-012-0115-9,Review of Economic Design,François2012,False,,Springer,Not available,The public release of information in first-price sealed-bid auctions,5c885b02c6d71e64e800db26683c1e0a,http://dx.doi.org/10.1007/s10058-012-0115-9 253,Despite attractive theoretical properties Vickrey auctions are seldom used due to the risk of information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have been proposed to protect bidders’ privacy or to prevent cheating by the bid taker. This paper focuses on incentive issues for certain CVAs. First it defines the CVAs of interest and identifies ideal goals for this class of CVAs. One of the criteria identifies an incentive problem that is new to the literature on CVAs the disincentive of bidders to complete the protocol once they have learned that they lost the auction. Any auction protocol that requires losing bidders to do additional work after learning they have lost the auction must provide the losers with proper incentives to follow the protocol. Second this paper shows that for a class of CVAs some losers must continue to participate even though they know they have lost. Finally it describes two new CVA protocols that solve the protocol-completion incentive problem. Both protocols use bidder-bidder comparisons based on a modified Yao’s Millionaires’ protocol. The first protocol performs ,phillip bradford,Not available,2008.0,10.1007/s10660-008-9013-1,Electronic Commerce Research,G.2008,False,,Springer,Not available,Protocol completion incentive problems in cryptographic Vickrey auctions,e2e163492472effe9962255dd9e2a0d1,http://dx.doi.org/10.1007/s10660-008-9013-1 254,Despite attractive theoretical properties Vickrey auctions are seldom used due to the risk of information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have been proposed to protect bidders’ privacy or to prevent cheating by the bid taker. This paper focuses on incentive issues for certain CVAs. First it defines the CVAs of interest and identifies ideal goals for this class of CVAs. One of the criteria identifies an incentive problem that is new to the literature on CVAs the disincentive of bidders to complete the protocol once they have learned that they lost the auction. Any auction protocol that requires losing bidders to do additional work after learning they have lost the auction must provide the losers with proper incentives to follow the protocol. Second this paper shows that for a class of CVAs some losers must continue to participate even though they know they have lost. Finally it describes two new CVA protocols that solve the protocol-completion incentive problem. Both protocols use bidder-bidder comparisons based on a modified Yao’s Millionaires’ protocol. The first protocol performs ,sunju park,Not available,2008.0,10.1007/s10660-008-9013-1,Electronic Commerce Research,G.2008,False,,Springer,Not available,Protocol completion incentive problems in cryptographic Vickrey auctions,e2e163492472effe9962255dd9e2a0d1,http://dx.doi.org/10.1007/s10660-008-9013-1 255,Despite attractive theoretical properties Vickrey auctions are seldom used due to the risk of information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have been proposed to protect bidders’ privacy or to prevent cheating by the bid taker. This paper focuses on incentive issues for certain CVAs. First it defines the CVAs of interest and identifies ideal goals for this class of CVAs. One of the criteria identifies an incentive problem that is new to the literature on CVAs the disincentive of bidders to complete the protocol once they have learned that they lost the auction. Any auction protocol that requires losing bidders to do additional work after learning they have lost the auction must provide the losers with proper incentives to follow the protocol. Second this paper shows that for a class of CVAs some losers must continue to participate even though they know they have lost. Finally it describes two new CVA protocols that solve the protocol-completion incentive problem. Both protocols use bidder-bidder comparisons based on a modified Yao’s Millionaires’ protocol. The first protocol performs ,michael rothkopf,Not available,2008.0,10.1007/s10660-008-9013-1,Electronic Commerce Research,G.2008,False,,Springer,Not available,Protocol completion incentive problems in cryptographic Vickrey auctions,e2e163492472effe9962255dd9e2a0d1,http://dx.doi.org/10.1007/s10660-008-9013-1 256,Despite attractive theoretical properties Vickrey auctions are seldom used due to the risk of information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have been proposed to protect bidders’ privacy or to prevent cheating by the bid taker. This paper focuses on incentive issues for certain CVAs. First it defines the CVAs of interest and identifies ideal goals for this class of CVAs. One of the criteria identifies an incentive problem that is new to the literature on CVAs the disincentive of bidders to complete the protocol once they have learned that they lost the auction. Any auction protocol that requires losing bidders to do additional work after learning they have lost the auction must provide the losers with proper incentives to follow the protocol. Second this paper shows that for a class of CVAs some losers must continue to participate even though they know they have lost. Finally it describes two new CVA protocols that solve the protocol-completion incentive problem. Both protocols use bidder-bidder comparisons based on a modified Yao’s Millionaires’ protocol. The first protocol performs ,heejin park,Not available,2008.0,10.1007/s10660-008-9013-1,Electronic Commerce Research,G.2008,False,,Springer,Not available,Protocol completion incentive problems in cryptographic Vickrey auctions,e2e163492472effe9962255dd9e2a0d1,http://dx.doi.org/10.1007/s10660-008-9013-1 257,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,ernan haruvy,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 258,Equilibrium bidding strategies under most multi-unit auction rules cannot be obtained as closed form expressions. Research in multi-unit auctions has therefore depended on implicit characterization of equilibrium strategies using the first-order conditions of the bidders’ expected payoff maximization problem. In this paper we consider the ,indranil chakraborty,Not available,2006.0,10.1007/s00199-005-0009-y,Economic Theory,Indranil2006,False,,Springer,Not available,Characterization of equilibrium in pay-as-bid auctions for multiple units,3c86af9c2453299c6772b6125e7994fb,http://dx.doi.org/10.1007/s00199-005-0009-y 259,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,leszczyc popkowski,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 260,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,octavian carare,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 261,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,james cox,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 262,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,eric greenleaf,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 263,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,wolfgang jank,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 264,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,sandy jap,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 265,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,young-hoon park,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 266,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,michael rothkopf,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 267,This article studies the possibility of using auctions as a policy instrument in conservation programs. In particular it provides insight into the main concerns that need to be dealt with when implementing conservation auctions. To show the cost saving potential of this policy instrument we also calculate the social welfare improvement that can be obtained for an afforestation project in Flanders. When developing conservation policies it is thus worthwhile to consider auctions as an alternative policy instrument.,sandra rousseau,Not available,2008.0,10.1007/s10342-007-0196-0,European Journal of Forest Research,Sandra2008,False,,Springer,Not available,The potential of auctioning contracts for conservation policy,736553016609950a448b3b997364614b,http://dx.doi.org/10.1007/s10342-007-0196-0 268,This article studies the possibility of using auctions as a policy instrument in conservation programs. In particular it provides insight into the main concerns that need to be dealt with when implementing conservation auctions. To show the cost saving potential of this policy instrument we also calculate the social welfare improvement that can be obtained for an afforestation project in Flanders. When developing conservation policies it is thus worthwhile to consider auctions as an alternative policy instrument.,ellen moons,Not available,2008.0,10.1007/s10342-007-0196-0,European Journal of Forest Research,Sandra2008,False,,Springer,Not available,The potential of auctioning contracts for conservation policy,736553016609950a448b3b997364614b,http://dx.doi.org/10.1007/s10342-007-0196-0 269,We consider an all-pay auction with complete information among the bidders; the seller does not observe the bidders’ values. We show that for some information structures in which the seller has a small uncertainty about the valuations it is profitable for him to exclude from the auction all but two (randomly selected) bidders even though the latter are ex ante identical from his point of view.,domenico menicucci,Not available,2006.0,10.1007/s00199-005-0010-5,Economic Theory,Domenico2006,False,,Springer,Not available,Banning Bidders from All-pay Auctions,296ea3cb8eae4e692b53b0546a032682,http://dx.doi.org/10.1007/s00199-005-0010-5 270,We examine theoretically and experimentally two countervailing effects of industry concentration in common value auctions. Greater concentration of information among fewer bidders reduces competition but increases the precision of private estimates. We demonstrate that this generally leads to more aggressive bidding. However the reduction in competition dominates the informational effects resulting in lower prices. We examine these hypothesized effects experimentally by conducting a series of auctions with constant informational content but distributed among a varying number of bidders. The experimental results are consistent with our theoretical predictions.,vlad mares,Not available,2008.0,10.1007/s00199-007-0223-x,Economic Theory,Vlad2008,False,,Springer,Not available,Industry concentration in common value auctions: theory and evidence,e5aeeff3d97815b02b1586b99896b567,http://dx.doi.org/10.1007/s00199-007-0223-x 271,We examine theoretically and experimentally two countervailing effects of industry concentration in common value auctions. Greater concentration of information among fewer bidders reduces competition but increases the precision of private estimates. We demonstrate that this generally leads to more aggressive bidding. However the reduction in competition dominates the informational effects resulting in lower prices. We examine these hypothesized effects experimentally by conducting a series of auctions with constant informational content but distributed among a varying number of bidders. The experimental results are consistent with our theoretical predictions.,mikhael shor,Not available,2008.0,10.1007/s00199-007-0223-x,Economic Theory,Vlad2008,False,,Springer,Not available,Industry concentration in common value auctions: theory and evidence,e5aeeff3d97815b02b1586b99896b567,http://dx.doi.org/10.1007/s00199-007-0223-x 272,This paper analyzes a procurement setting with identical firms and stochastic innovations. In contrast to the previous literature I show that a procurer who cannot charge entry fees may prefer a fixed-prize tournament to a first-price auction. The reason is that holding an auction may leave higher rents to firms when the innovation technology is subject to large random factors.,anja schottner,Not available,2008.0,10.1007/s00199-007-0208-9,Economic Theory,Anja2008,False,,Springer,Not available,Fixed-prize tournaments versus first-price auctions in innovation contests,5e83a8f6a908621cb8d75196a537f2cb,http://dx.doi.org/10.1007/s00199-007-0208-9 273,Auctions that select core allocations with respect to reported values generate competitive levels of sales revenues at equilibrium and limit bidder incentives to use shills. Among core-selecting auctions the ones that minimize seller revenues also maximize incentives for truthful reporting produce the Vickrey outcome when that lies in the core and in contrast to the Vickrey auction and create no incentive for a seller to exclude qualified bidders. Core-selecting auctions are related to and share properties with stable matching mechanisms.,robert day,Not available,2008.0,10.1007/s00182-007-0100-7,International Journal of Game Theory,Robert2008,False,,Springer,Not available,Core-selecting package auctions,7efc368fc03f6887af85bf8871292ff7,http://dx.doi.org/10.1007/s00182-007-0100-7 274,Auctions that select core allocations with respect to reported values generate competitive levels of sales revenues at equilibrium and limit bidder incentives to use shills. Among core-selecting auctions the ones that minimize seller revenues also maximize incentives for truthful reporting produce the Vickrey outcome when that lies in the core and in contrast to the Vickrey auction and create no incentive for a seller to exclude qualified bidders. Core-selecting auctions are related to and share properties with stable matching mechanisms.,paul milgrom,Not available,2008.0,10.1007/s00182-007-0100-7,International Journal of Game Theory,Robert2008,False,,Springer,Not available,Core-selecting package auctions,7efc368fc03f6887af85bf8871292ff7,http://dx.doi.org/10.1007/s00182-007-0100-7 275,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,wei lim,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 276,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,joo lee-partridge,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 277,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,soo tan,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 278," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",juan aparicio,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 279," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",juan ferrando,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 280,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,atilla bektas,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 281," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",ana meca,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 282," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",julia sancho,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 283,Efficiency and optimality are the two primary and generally conflicting goals in any auction design: the former focuses on the social welfare of the whole seller–bidder system whereas the latter emphasizes revenue-maximizing on the seller side. In this chapter we review the auctions design problem based on these two aspects in various information structures and circumstances. The most recent results are collected and analyzed. This chapter tends to complement the survey ,roger zhan,Not available,2008.0,10.1007/978-0-387-77247-9_16,Pareto Optimality Game Theory And Equilibria,L.2008,False,,Springer,Not available,Optimality and Efficiency in Auctions Design: A Survey,cda2e75e7ddcb933ce7ae1e54a1929d8,http://dx.doi.org/10.1007/978-0-387-77247-9_16 284,,miguel figliozzi,Not available,2008.0,10.1007/978-3-540-75261-5_7,Managing Complexity: Insights Concepts Applications,A.2008,False,,Springer,Not available,Repeated Auction Games and Learning Dynamics in Electronic Logistics Marketplaces: Complexity Bounded Rationality and Regulation through Information,e83ab703838ab70fa3726954a483f6ed,http://dx.doi.org/10.1007/978-3-540-75261-5_7 285,,hani mahmassani,Not available,2008.0,10.1007/978-3-540-75261-5_7,Managing Complexity: Insights Concepts Applications,A.2008,False,,Springer,Not available,Repeated Auction Games and Learning Dynamics in Electronic Logistics Marketplaces: Complexity Bounded Rationality and Regulation through Information,e83ab703838ab70fa3726954a483f6ed,http://dx.doi.org/10.1007/978-3-540-75261-5_7 286,,patrick jaillet,Not available,2008.0,10.1007/978-3-540-75261-5_7,Managing Complexity: Insights Concepts Applications,A.2008,False,,Springer,Not available,Repeated Auction Games and Learning Dynamics in Electronic Logistics Marketplaces: Complexity Bounded Rationality and Regulation through Information,e83ab703838ab70fa3726954a483f6ed,http://dx.doi.org/10.1007/978-3-540-75261-5_7 287,A large body of the mechanism design literature relies on convexity assumptions on the set of types (that is on the domain of the mechanism). In this note I show that at least for auction mechanisms with independent signals it is always possible to extend incentive compatible mechanisms to incentive compatible mechanisms defined on any larger set of types.,paulo monteiro,Not available,2009.0,10.1007/s00199-008-0386-0,Economic Theory,Klinger2009,False,,Springer,Not available,Abstract types and distributions in independent private value auctions,a1eb6688761023c23d53bb7a68dbc7a2,http://dx.doi.org/10.1007/s00199-008-0386-0 288,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,haan de,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 289,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,vries de,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 290,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,chen zhou,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 291,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,mehmet kiraz,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 292,Computational experiments with a multiagent system show that bidders use signal averaging to avoid the winner’s curse in English auctions. The results vary with the percent of common value in a two-dimensional value signal information levels uncertainty and the number of bidders. The complexity introduced by the combinations of these factors affects the bidding strategies and auction outcomes in interesting ways—usually nonlinearly and sometimes non-monotonically. Of main concern to a seller is the effect of these factors on revenue. I find that revenue increases with the percent of common value in the two-dimensional value signal decreases with uncertainty and increases with the number of bidders. There is very little impact of information level on revenue when values are pure private and pure common. However for the intermediate cases of two-dimensional value signals revenue decreases with increased information.,alan mehlenbacher,Not available,2009.0,10.1007/s10614-009-9167-5,Computational Economics,Alan2009,False,,Springer,Not available,Multiagent System Simulations of Signal Averaging in English Auctions with Two-Dimensional Value Signals,226b1ef750c9f036e1b8d0447c43362a,http://dx.doi.org/10.1007/s10614-009-9167-5 293,On the basis of the bidding history of a panel of new eBay bidders we examine the impact of different types of experiences on bidding behavior evolution. Accounting for unobserved bidder heterogeneity the results indicate that losing experiences make the bidders’ bidding behavior evolve toward the normative predictions of auction theory in that they submit fewer bids and bid later. Winning experiences however do not have such an effect. Moreover the experience effect pertains to the bidder’s entire previous bidding experience regardless of product categories. We also assess the potential bias introduced by using feedback ratings (compared with actual participation) as experience measures.,xin wang,Not available,2009.0,10.1007/s11002-009-9068-3,Marketing Letters,Xin2009,False,,Springer,Not available,The effect of experience on Internet auction bidding dynamics,d9500cce35522aba2097527bf8d51812,http://dx.doi.org/10.1007/s11002-009-9068-3 294,On the basis of the bidding history of a panel of new eBay bidders we examine the impact of different types of experiences on bidding behavior evolution. Accounting for unobserved bidder heterogeneity the results indicate that losing experiences make the bidders’ bidding behavior evolve toward the normative predictions of auction theory in that they submit fewer bids and bid later. Winning experiences however do not have such an effect. Moreover the experience effect pertains to the bidder’s entire previous bidding experience regardless of product categories. We also assess the potential bias introduced by using feedback ratings (compared with actual participation) as experience measures.,ye hu,Not available,2009.0,10.1007/s11002-009-9068-3,Marketing Letters,Xin2009,False,,Springer,Not available,The effect of experience on Internet auction bidding dynamics,d9500cce35522aba2097527bf8d51812,http://dx.doi.org/10.1007/s11002-009-9068-3 295,A simplified model of multistage bidding between two differently informed agents (insider and uninformed participant) is described using repeated games with asymmetric information. The solutions for these games are obtained in the explicit form for the case of three possible bids. The game value (the maximal guaranteed insider’s payoff) and the optimal players’ strategies are expressed using a second-order recursive sequence.,v. kreps,Not available,2009.0,10.1134/S1064230709040145,Journal of Computer and Systems Sciences International,L.2009,False,,Springer,Not available,Repeated games simulating exchange auction and recursive sequences,0b6dc089c5a697d6f3ae6b714753a852,http://dx.doi.org/10.1134/S1064230709040145 296,Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks forms virtual MIMO system and provides diversity gains. In this paper wireless video transmission protocols are proposed in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation configuration of side information subject to bandwidth and power constraints. For multiuser cases most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.,zhu han,Not available,2009.0,10.1155/2009/980304,EURASIP Journal on Advances in Signal Processing,Zhu2009,True,,Springer,Not available,Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks,970fe6c735fa5b3052697640b3a4e856,http://dx.doi.org/10.1155/2009/980304 297,Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks forms virtual MIMO system and provides diversity gains. In this paper wireless video transmission protocols are proposed in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation configuration of side information subject to bandwidth and power constraints. For multiuser cases most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.,guan-ming su,Not available,2009.0,10.1155/2009/980304,EURASIP Journal on Advances in Signal Processing,Zhu2009,True,,Springer,Not available,Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks,970fe6c735fa5b3052697640b3a4e856,http://dx.doi.org/10.1155/2009/980304 298,Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks forms virtual MIMO system and provides diversity gains. In this paper wireless video transmission protocols are proposed in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation configuration of side information subject to bandwidth and power constraints. For multiuser cases most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.,haohong wang,Not available,2009.0,10.1155/2009/980304,EURASIP Journal on Advances in Signal Processing,Zhu2009,True,,Springer,Not available,Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks,970fe6c735fa5b3052697640b3a4e856,http://dx.doi.org/10.1155/2009/980304 299,Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks forms virtual MIMO system and provides diversity gains. In this paper wireless video transmission protocols are proposed in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation configuration of side information subject to bandwidth and power constraints. For multiuser cases most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.,song ci,Not available,2009.0,10.1155/2009/980304,EURASIP Journal on Advances in Signal Processing,Zhu2009,True,,Springer,Not available,Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks,970fe6c735fa5b3052697640b3a4e856,http://dx.doi.org/10.1155/2009/980304 300,Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks forms virtual MIMO system and provides diversity gains. In this paper wireless video transmission protocols are proposed in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation configuration of side information subject to bandwidth and power constraints. For multiuser cases most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.,weifeng su,Not available,2009.0,10.1155/2009/980304,EURASIP Journal on Advances in Signal Processing,Zhu2009,True,,Springer,Not available,Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks,970fe6c735fa5b3052697640b3a4e856,http://dx.doi.org/10.1155/2009/980304 301,I study the sequence of bidding in an open-outcry English auction to examine how uncertainty affects auction outcomes. I do this by analyzing a data set that was collected from a series of public auctions of used cars in New Jersey. I conjecture that the uncertainty is related to the auction’s progress and demonstrate that empirically an increase in the uncertainty is associated with an increase in the number of rounds that is required to sell an object and with a reduction in the ratio of the selling price to the presale estimate.,yaron raviv,Not available,2009.0,10.1007/s11151-009-9212-5,Review of Industrial Organization,Yaron2009,False,,Springer,Not available,Uncertainty and Auction Outcomes: Evidence from Used Car Actions,03ced4175661cd9bb7b50b548aaf012e,http://dx.doi.org/10.1007/s11151-009-9212-5 302,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,osmanbey uzunkol,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 303,We compare uniform price auctions with fixed price offerings in Initial Public Offerings (IPO) using laboratory experiments. The experimental environment is based on the Biais and Faugeron-Grouzet (J. Financ. Intermed. 11:9–36 ,ping zhang,Not available,2009.0,10.1007/s10683-008-9210-8,Experimental Economics,Ping2009,False,,Springer,Not available,Uniform price auctions and fixed price offerings in IPOs: an experimental comparison,551c71db0b69198198ea8fa6922694b6,http://dx.doi.org/10.1007/s10683-008-9210-8 304,We characterise properties of optimal auctions if the seller may disclose information about the quality of the object for sale. We show that the seller maximizes his expected revenue by revelation of all information to all bidders and implementing a second price auction with appropriate reservation price.,alex gershkov,Not available,2009.0,10.1007/s10058-009-0084-9,Review of Economic Design,Alex2009,False,,Springer,Not available,Optimal auctions and information disclosure,73766c474920d8f65134612645053fca,http://dx.doi.org/10.1007/s10058-009-0084-9 305,This paper proposes a discrete bidding model for both quantities and pricing. It has a two-unit demand environment where subjects bid for contracts with an unknown redemption value common to all bidders. Prior to bidding the bidders receive private signals of information on the (common) value. The relevant task is to compare the equilibrium strategies and the seller’s revenue of the three most common auction formats with two players. The result is that the Vickrey auction always gives the most revenue to the seller the discriminatory auction follows closely and the uniform auction clearly is the worst due to demand reduction.,joakim ahlberg,Not available,2009.0,10.1007/s10258-009-0042-z,Portuguese Economic Journal,Joakim2009,False,,Springer,Not available,Revenues in discrete multi-unit common value auctions: a study of three sealed-bid mechanisms,1db18fa50aa2680252dfa75f88cba604,http://dx.doi.org/10.1007/s10258-009-0042-z 306,In competitive electronic marketplaces where some selling agents may be dishonest and quality products offered by good sellers are limited selecting the most profitable sellers as transaction partners is challenging especially when buying agents lack personal experience with sellers. Reputation systems help buyers to select sellers by aggregating seller information reported by other buyers (called advisers). However in such competitive marketplaces buyers may also be concerned about the possibility of losing business opportunities with good sellers if they report truthful seller information. In this paper we propose a trust-oriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy by modeling the trustworthiness (competency and willingness) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers’ preferences on product quality. Experimental results confirm that competitive marketplaces operating with our mechanism lead to better profit for buyers and create incentives for seller honesty.,zeinab noorian,Not available,2014.0,10.1007/s10458-013-9243-z,Autonomous Agents and Multi-Agent Systems,Zeinab2014,False,,Springer,Not available,Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces,f7ec81ccf4dfa9821ca49da54ef82386,http://dx.doi.org/10.1007/s10458-013-9243-z 307,In competitive electronic marketplaces where some selling agents may be dishonest and quality products offered by good sellers are limited selecting the most profitable sellers as transaction partners is challenging especially when buying agents lack personal experience with sellers. Reputation systems help buyers to select sellers by aggregating seller information reported by other buyers (called advisers). However in such competitive marketplaces buyers may also be concerned about the possibility of losing business opportunities with good sellers if they report truthful seller information. In this paper we propose a trust-oriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy by modeling the trustworthiness (competency and willingness) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers’ preferences on product quality. Experimental results confirm that competitive marketplaces operating with our mechanism lead to better profit for buyers and create incentives for seller honesty.,jie zhang,Not available,2014.0,10.1007/s10458-013-9243-z,Autonomous Agents and Multi-Agent Systems,Zeinab2014,False,,Springer,Not available,Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces,f7ec81ccf4dfa9821ca49da54ef82386,http://dx.doi.org/10.1007/s10458-013-9243-z 308,In competitive electronic marketplaces where some selling agents may be dishonest and quality products offered by good sellers are limited selecting the most profitable sellers as transaction partners is challenging especially when buying agents lack personal experience with sellers. Reputation systems help buyers to select sellers by aggregating seller information reported by other buyers (called advisers). However in such competitive marketplaces buyers may also be concerned about the possibility of losing business opportunities with good sellers if they report truthful seller information. In this paper we propose a trust-oriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy by modeling the trustworthiness (competency and willingness) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers’ preferences on product quality. Experimental results confirm that competitive marketplaces operating with our mechanism lead to better profit for buyers and create incentives for seller honesty.,yuan liu,Not available,2014.0,10.1007/s10458-013-9243-z,Autonomous Agents and Multi-Agent Systems,Zeinab2014,False,,Springer,Not available,Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces,f7ec81ccf4dfa9821ca49da54ef82386,http://dx.doi.org/10.1007/s10458-013-9243-z 309,In competitive electronic marketplaces where some selling agents may be dishonest and quality products offered by good sellers are limited selecting the most profitable sellers as transaction partners is challenging especially when buying agents lack personal experience with sellers. Reputation systems help buyers to select sellers by aggregating seller information reported by other buyers (called advisers). However in such competitive marketplaces buyers may also be concerned about the possibility of losing business opportunities with good sellers if they report truthful seller information. In this paper we propose a trust-oriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy by modeling the trustworthiness (competency and willingness) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers’ preferences on product quality. Experimental results confirm that competitive marketplaces operating with our mechanism lead to better profit for buyers and create incentives for seller honesty.,stephen marsh,Not available,2014.0,10.1007/s10458-013-9243-z,Autonomous Agents and Multi-Agent Systems,Zeinab2014,False,,Springer,Not available,Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces,f7ec81ccf4dfa9821ca49da54ef82386,http://dx.doi.org/10.1007/s10458-013-9243-z 310,In competitive electronic marketplaces where some selling agents may be dishonest and quality products offered by good sellers are limited selecting the most profitable sellers as transaction partners is challenging especially when buying agents lack personal experience with sellers. Reputation systems help buyers to select sellers by aggregating seller information reported by other buyers (called advisers). However in such competitive marketplaces buyers may also be concerned about the possibility of losing business opportunities with good sellers if they report truthful seller information. In this paper we propose a trust-oriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy by modeling the trustworthiness (competency and willingness) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers’ preferences on product quality. Experimental results confirm that competitive marketplaces operating with our mechanism lead to better profit for buyers and create incentives for seller honesty.,michael fleming,Not available,2014.0,10.1007/s10458-013-9243-z,Autonomous Agents and Multi-Agent Systems,Zeinab2014,False,,Springer,Not available,Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces,f7ec81ccf4dfa9821ca49da54ef82386,http://dx.doi.org/10.1007/s10458-013-9243-z 311,We study slow Dutch auctions where the clock does not fall instantaneously but instead falls over time. Buyers are assumed less patient than the seller. In a symmetric setting we investigate the properties of the optimal revenue-maximizing clock. We find that the clock is genuinely dynamic and the auction involves delays.,artyom shneyerov,Not available,2014.0,10.1007/s00199-014-0825-z,Economic Theory,Artyom2014,False,,Springer,Not available,An optimal slow Dutch auction,765df37a506527054edb313ed759514a,http://dx.doi.org/10.1007/s00199-014-0825-z 312,We compare two procurement mechanisms bundling and unbundling in a two-stage auction model with risk-averse suppliers. The mechanisms differ in that the two tasks of investment and production are procured through a single auction or two sequential auctions. Suppliers’ production costs are affected by two risk factors aggregate risk and idiosyncratic risk as well as by the cost-reducing investment. We show that the bundling mechanism is optimal for a buyer and socially desirable if the aggregate risk is below certain thresholds. The result may not hold true for idiosyncratic risk.,takeshi nishimura,Not available,2014.0,10.1007/s00712-013-0381-1,Journal of Economics,Takeshi2014,False,,Springer,Not available,Sequential procurement auctions with risk-averse suppliers,9cfe5cf4163271d0d56a87a6c2e622b7,http://dx.doi.org/10.1007/s00712-013-0381-1 313,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,xuejun li,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 314,Decision-making processes are studied using non-standard all-pay structures. Our interest is motivated by regulatory political legal military and economic applications in which individual actions determine the consequences for a larger group or the general public. The common features of these examples are a competitive environment a winner-takes-all reward structure and some form of all-pay-all payment rule.,thomas giebe,Not available,2014.0,10.1007/s11127-013-0127-1,Public Choice,Thomas2014,False,,Springer,Not available,All-pay-all aspects of political decision making,51e78450e6f754f956ff8de67d4e08ea,http://dx.doi.org/10.1007/s11127-013-0127-1 315,Decision-making processes are studied using non-standard all-pay structures. Our interest is motivated by regulatory political legal military and economic applications in which individual actions determine the consequences for a larger group or the general public. The common features of these examples are a competitive environment a winner-takes-all reward structure and some form of all-pay-all payment rule.,paul schweinzer,Not available,2014.0,10.1007/s11127-013-0127-1,Public Choice,Thomas2014,False,,Springer,Not available,All-pay-all aspects of political decision making,51e78450e6f754f956ff8de67d4e08ea,http://dx.doi.org/10.1007/s11127-013-0127-1 316,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,bo dai,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 317,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,haoxun chen,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 318,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,genke yang,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 319,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,olivier marce,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 320,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,hoang-hai tran,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 321,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,bruno tuffin,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 322,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,chen-kun tsung,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 323,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,hann-jang ho,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 324,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,xiangjun liu,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 325,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,sing-ling lee,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 326,State agencies in infant-formula procurement auctions receive lower bids when they are in buyer alliances than when they are unallied. The Special Supplemental Nutrition Program for Women Infants and Children (WIC) uses an auction to procure infant formula. Manufacturers bid on the right to be an agency’s sole supplier by offering a rebate on formula sold through WIC. Agencies frequently join together in buyer alliances. An empirical estimation shows that bids are lower to alliances and that lower prices result because alliances are heterogeneous. Results suggest that when heterogeneity is not controlled bids decline with alliance size which has policy implications because Congress recently limited alliance size.,david davis,Not available,2014.0,10.1007/s11151-014-9433-0,Review of Industrial Organization,E.2014,False,,Springer,Not available,Buyer Alliances as Countervailing Power in WIC Infant-Formula Auctions,25f207996553a143b9143b01953fbbb9,http://dx.doi.org/10.1007/s11151-014-9433-0 327,We study procurement auctions in which as is common in practice a group of sellers (incumbents qualified bidders) is given an advantage based for example on better reliability quality or incumbency status. We show conditions under which for any given first price handicap auction there is a simple second-price design which dominates it. This generalizes a previous result for the case of an auction with one insider and one outsider (Mares and Swinkels in J Econ Theory ,vlad mares,Not available,2014.0,10.1007/s00182-013-0392-8,International Journal of Game Theory,Vlad2014,False,,Springer,Not available,Comparing first and second price auctions with asymmetric bidders,18853e75c4d7011cbc427a29d782bf94,http://dx.doi.org/10.1007/s00182-013-0392-8 328,We study procurement auctions in which as is common in practice a group of sellers (incumbents qualified bidders) is given an advantage based for example on better reliability quality or incumbency status. We show conditions under which for any given first price handicap auction there is a simple second-price design which dominates it. This generalizes a previous result for the case of an auction with one insider and one outsider (Mares and Swinkels in J Econ Theory ,jeroen swinkels,Not available,2014.0,10.1007/s00182-013-0392-8,International Journal of Game Theory,Vlad2014,False,,Springer,Not available,Comparing first and second price auctions with asymmetric bidders,18853e75c4d7011cbc427a29d782bf94,http://dx.doi.org/10.1007/s00182-013-0392-8 329,Auction has been widely used to spectrum allocation. Most of the previous works supposed that all the spectrum are identical. However in reality spectrums are quite different in different locations and frequencies. Recently some works studied the double auction mechanism for heterogeneous spectrums. But their schemes are based on the assumption of “single-channel request”. To be more realistic each seller and buyer will bid at least one channel. The previous schemes will not work under multi-channel assumption. In this paper we propose a truthful multi-channel double auction mechanism for heterogeneous spectrums. Our scheme allows sellers and buyers to sell or buy multi-channels for heterogeneous spectrums. We introduce a novel virtual grouping method to split sellers and buyers. We prove that the proposed scheme satisfies the economic properties: truthfulness individual rationality and budget balance. The simulation results confirm that our method achieves high auction efficiency and auction revenue.,shu wang,Not available,2014.0,10.1007/s11277-014-1602-9,Wireless Personal Communications,Shu2014,False,,Springer,Not available,A Truthful Multi-Channel Double Auction Mechanism for Heterogeneous Spectrums,d807acfa12c3b79df974fa305864fcc1,http://dx.doi.org/10.1007/s11277-014-1602-9 330,Auction has been widely used to spectrum allocation. Most of the previous works supposed that all the spectrum are identical. However in reality spectrums are quite different in different locations and frequencies. Recently some works studied the double auction mechanism for heterogeneous spectrums. But their schemes are based on the assumption of “single-channel request”. To be more realistic each seller and buyer will bid at least one channel. The previous schemes will not work under multi-channel assumption. In this paper we propose a truthful multi-channel double auction mechanism for heterogeneous spectrums. Our scheme allows sellers and buyers to sell or buy multi-channels for heterogeneous spectrums. We introduce a novel virtual grouping method to split sellers and buyers. We prove that the proposed scheme satisfies the economic properties: truthfulness individual rationality and budget balance. The simulation results confirm that our method achieves high auction efficiency and auction revenue.,derong liu,Not available,2014.0,10.1007/s11277-014-1602-9,Wireless Personal Communications,Shu2014,False,,Springer,Not available,A Truthful Multi-Channel Double Auction Mechanism for Heterogeneous Spectrums,d807acfa12c3b79df974fa305864fcc1,http://dx.doi.org/10.1007/s11277-014-1602-9 331,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,hsiangchu lai,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 332,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,jack hsu,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 333,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,hao-min tu,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 334,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,d. verma,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 335,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,joydeep srivastava,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 336,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,erzhou zhu,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 337,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,n. hemachandra,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 338,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,y. narahari,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 339,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,j. tew,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 340,Can search engines increase revenues by changing their position auctions? In this paper I analyze position auctions with general pricing rules to answer this question. In these auctions there are several items that are commonly ranked by bidders with unit demand. I show that revenues remain the same for position auctions with regular pricing rules where the price for an item depends on the bids of agents who win lower-ranked items. In addition all of the bidders have the same ex post payoffs. I also show that regularity is a necessary condition to get ex post payoff equivalence.,m. yenmez,Not available,2014.0,10.1007/s00199-013-0748-0,Economic Theory,Bumin2014,False,,Springer,Not available,Pricing in position auctions and online advertising,76d3420cf5c1afb70b1aa1f861edc8ac,http://dx.doi.org/10.1007/s00199-013-0748-0 341,In this paper we mainly study the multi-attribute reverse auction mechanism with multiple winners. By the multi-attribute utility theory and the probability theory we build a multi-attribute procurement model which is more in line with reality procurement environment and then prove the supplier’s optimal bidding strategies. Moreover we compare it with the first scoring model and conclude that the optimal quality bidding strategies remain constant while the optimal price bidding strategy increases with the number of the successful bidders.,xiang-lin pan,Not available,2014.0,10.1007/978-3-642-40060-5_21,Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013),Xiang-lin2014,False,,Springer,Not available,The Optimal Bidding Strategies Research on Multi-attribute Reverse Auction Mechanism,bd6ab3b659635526fa8b867006c93100,http://dx.doi.org/10.1007/978-3-642-40060-5_21 342,In this paper we mainly study the multi-attribute reverse auction mechanism with multiple winners. By the multi-attribute utility theory and the probability theory we build a multi-attribute procurement model which is more in line with reality procurement environment and then prove the supplier’s optimal bidding strategies. Moreover we compare it with the first scoring model and conclude that the optimal quality bidding strategies remain constant while the optimal price bidding strategy increases with the number of the successful bidders.,xu-hua lv,Not available,2014.0,10.1007/978-3-642-40060-5_21,Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013),Xiang-lin2014,False,,Springer,Not available,The Optimal Bidding Strategies Research on Multi-attribute Reverse Auction Mechanism,bd6ab3b659635526fa8b867006c93100,http://dx.doi.org/10.1007/978-3-642-40060-5_21 343,The double auction marketplace usually charges fees to traders to make profits. Although the bidding strategies in double auctions have been widely studied little work has been done on analysing how market fees can affect bidding strategies and how the marketplace selects appropriate fees to make profits. In this paper we will investigate these two problems. Specifically we choose four typical types of fees and use a computational learning approach to analyse the Nash equilibrium bidding strategies of traders when different types of fees are charged. In doing so we draw insights about how different types of market fees can affect the Nash equilibrium bidding strategies. Furthermore we investigate which type of market fees is the most effective in terms of maximising market profits while keeping traders staying in the marketplace.,bing shi,Not available,2014.0,10.1007/978-3-319-13560-1_51,PRICAI 2014: Trends in Artificial Intelligence,Bing2014,False,,Springer,Not available,Bidding with Fees and Setting Effective Fees in a Double Auction Marketplace,3b0cc26eefb23fe25ab0aad9ae70c3b7,http://dx.doi.org/10.1007/978-3-319-13560-1_51 344,The actual crisis has brought to a forefront the failure in wealth distribution and it has questioned market with democracy. It has vividly demonstrated the deficiencies in the outdated current economic theories calling for rethinking Economics. Agent Based Modelling (ABM) applied to this economic rethinking is a choice a challenge and a promise. Market efficiency has received attention from ABM experts and the authors. However they have not studied the wealth distribution problem. In this paper using an agent-based model approach we study the sensitivity of wealth distribution to the agents’ behavior in a Continuous Double Auction market. We find that the inequality on wealth distribution increases as the percentage of ,marta posada,Not available,2014.0,10.1007/978-1-4471-5349-8_8,Annals of Industrial Engineering 2012,Marta2014,False,,Springer,Not available,Rethinking the Social Contract: An Agent-Based Model Approach,3d7a7411bce6ef16b2df7eacc4896564,http://dx.doi.org/10.1007/978-1-4471-5349-8_8 345,The actual crisis has brought to a forefront the failure in wealth distribution and it has questioned market with democracy. It has vividly demonstrated the deficiencies in the outdated current economic theories calling for rethinking Economics. Agent Based Modelling (ABM) applied to this economic rethinking is a choice a challenge and a promise. Market efficiency has received attention from ABM experts and the authors. However they have not studied the wealth distribution problem. In this paper using an agent-based model approach we study the sensitivity of wealth distribution to the agents’ behavior in a Continuous Double Auction market. We find that the inequality on wealth distribution increases as the percentage of ,cesareo hernandez-iglesias,Not available,2014.0,10.1007/978-1-4471-5349-8_8,Annals of Industrial Engineering 2012,Marta2014,False,,Springer,Not available,Rethinking the Social Contract: An Agent-Based Model Approach,3d7a7411bce6ef16b2df7eacc4896564,http://dx.doi.org/10.1007/978-1-4471-5349-8_8 346,The winner determination problem (WDP) in combinatorial double auctions suffers from computation complexity. In this paper we attempt to solve the WDP in combinatorial double auctions based on an agent learning approach. Instead of finding the exact solution we will set up a fictitious market based on multi-agent system architecture and develop a multi-agent learning algorithm to determine the winning bids in the fictitious market to reduce the computational complexity in solving the WDP in combinatorial double auctions. In the fictitious market each buyer and each seller is represented by an agent. There is a mediator agent that represents the mediator. The issue is to develop learning algorithms for all the agents in the system to collectively solve the winner determination problem for combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach to developing efficient multi-agent learning algorithm for solving the WDP in combinatorial double auctions. Numerical results indicate our agent learning approach is more efficient than the centralized approach.,fu-shiung hsieh,Not available,2014.0,10.1007/978-3-319-07455-9_1,Modern Advances in Applied Intelligence,Fu-Shiung2014,False,,Springer,Not available,Multi-agent Learning for Winner Determination in Combinatorial Auctions,f683510efafa3e59b41909aa5228c1d9,http://dx.doi.org/10.1007/978-3-319-07455-9_1 347,Due to the increasing number of Dementia patients the overall costs for caregiving has grown by 32 % between 2002 and 2008. The efficient use of smart decision support systems for managing ambulant care and mobile nursing services that provide professional care for Dementia patients is an important challenge to reduce cost and increase service quality. The optimal allocation of caregiving resources from different mobile nursing service firms to a growing number of Dementia patients however is a difficult problem in the healthcare domain. We approach this problem from a multiagent systems perspective by designing and implementing a distributed decision support system that utilizes an auction-based protocol for allocating caregiving resources subject to Dementia-specific service attributes. We demonstrate the usefulness of the proposed protocol by an early stage prototype implementation presenting the system’s proof-of-concept.,tobias widmer,Not available,2015.0,10.1007/978-3-319-27343-3_13,Multiagent System Technologies,Tobias2015,False,,Springer,Not available,Agent-Based Decision Support for Allocating Caregiving Resources in a Dementia Scenario,d69661d3001b0a303b33e879ac32c6be,http://dx.doi.org/10.1007/978-3-319-27343-3_13 348,The winner determination problem (WDP) in combinatorial double auctions suffers from computation complexity. In this paper we attempt to solve the WDP in combinatorial double auctions based on an agent learning approach. Instead of finding the exact solution we will set up a fictitious market based on multi-agent system architecture and develop a multi-agent learning algorithm to determine the winning bids in the fictitious market to reduce the computational complexity in solving the WDP in combinatorial double auctions. In the fictitious market each buyer and each seller is represented by an agent. There is a mediator agent that represents the mediator. The issue is to develop learning algorithms for all the agents in the system to collectively solve the winner determination problem for combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach to developing efficient multi-agent learning algorithm for solving the WDP in combinatorial double auctions. Numerical results indicate our agent learning approach is more efficient than the centralized approach.,chi-shiang liao,Not available,2014.0,10.1007/978-3-319-07455-9_1,Modern Advances in Applied Intelligence,Fu-Shiung2014,False,,Springer,Not available,Multi-agent Learning for Winner Determination in Combinatorial Auctions,f683510efafa3e59b41909aa5228c1d9,http://dx.doi.org/10.1007/978-3-319-07455-9_1 349,The paper analyses the predictive power of heterogeneous agents interacting in an evolutionary agent-based model of the stock market when simulated through Altreva Adaptive Modeler multi-agent simulation software application. The paper tests the long-term prediction accuracy of an evolutionary agent-based model when simulating the S&P500 stock market index. The model incorporates 2 000 agents which trade amongst each other on an artificial stock market which uses a double auction trading mechanism. Within the evolutionary agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to obtain new agents with better trading strategies generated from combining the trading strategies of the best performing agents and thus replacing the agents which have the worst performing trading strategies.,diana dezsi,Not available,2014.0,10.1007/978-3-319-05458-2_6,Intelligent Information and Database Systems,Diana2014,False,,Springer,Not available,Using Multi-agent Systems Simulations for Stock Market Predictions,afb56dee0db7f87b504558d2f761d7b8,http://dx.doi.org/10.1007/978-3-319-05458-2_6 350,The paper analyses the predictive power of heterogeneous agents interacting in an evolutionary agent-based model of the stock market when simulated through Altreva Adaptive Modeler multi-agent simulation software application. The paper tests the long-term prediction accuracy of an evolutionary agent-based model when simulating the S&P500 stock market index. The model incorporates 2 000 agents which trade amongst each other on an artificial stock market which uses a double auction trading mechanism. Within the evolutionary agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to obtain new agents with better trading strategies generated from combining the trading strategies of the best performing agents and thus replacing the agents which have the worst performing trading strategies.,emil scarlat,Not available,2014.0,10.1007/978-3-319-05458-2_6,Intelligent Information and Database Systems,Diana2014,False,,Springer,Not available,Using Multi-agent Systems Simulations for Stock Market Predictions,afb56dee0db7f87b504558d2f761d7b8,http://dx.doi.org/10.1007/978-3-319-05458-2_6 351,The paper analyses the predictive power of heterogeneous agents interacting in an evolutionary agent-based model of the stock market when simulated through Altreva Adaptive Modeler multi-agent simulation software application. The paper tests the long-term prediction accuracy of an evolutionary agent-based model when simulating the S&P500 stock market index. The model incorporates 2 000 agents which trade amongst each other on an artificial stock market which uses a double auction trading mechanism. Within the evolutionary agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to obtain new agents with better trading strategies generated from combining the trading strategies of the best performing agents and thus replacing the agents which have the worst performing trading strategies.,iulia maries,Not available,2014.0,10.1007/978-3-319-05458-2_6,Intelligent Information and Database Systems,Diana2014,False,,Springer,Not available,Using Multi-agent Systems Simulations for Stock Market Predictions,afb56dee0db7f87b504558d2f761d7b8,http://dx.doi.org/10.1007/978-3-319-05458-2_6 352,The paper analyses the predictive power of heterogeneous agents interacting in an evolutionary agent-based model of the stock market when simulated through Altreva Adaptive Modeler multi-agent simulation software application. The paper tests the long-term prediction accuracy of an evolutionary agent-based model when simulating the S&P500 stock market index. The model incorporates 2 000 agents which trade amongst each other on an artificial stock market which uses a double auction trading mechanism. Within the evolutionary agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to obtain new agents with better trading strategies generated from combining the trading strategies of the best performing agents and thus replacing the agents which have the worst performing trading strategies.,ramona-mihaela paun,Not available,2014.0,10.1007/978-3-319-05458-2_6,Intelligent Information and Database Systems,Diana2014,False,,Springer,Not available,Using Multi-agent Systems Simulations for Stock Market Predictions,afb56dee0db7f87b504558d2f761d7b8,http://dx.doi.org/10.1007/978-3-319-05458-2_6 353,Winning bids in reverse auctions are efficient solutions (providing that fairly weak assumptions about the bidders are met). The auctions are efficient under the assumption that the utilities of all participants are quasi-linear. Typically this assumption is unrealistic. If that is the case auctions are inefficient mechanisms. This paper outlines the limitations and impracticability of the quasi-linearity assumption and proposes augmenting reverse auctions with negotiations. It shows that when the efficient frontier is concave then it is possible to improve the winning bid through negotiations that follow auctions.,gregory kersten,Not available,2014.0,10.1007/978-3-319-07179-4_4,Group Decision and Negotiation. A Process-Oriented View,E.2014,False,,Springer,Not available,Are Procurement Auctions Good for Society and for Buyers?,e0c9f4b85c3c1dad812a75b72fc2523d,http://dx.doi.org/10.1007/978-3-319-07179-4_4 354,We study procurement games where each seller supplies multiple units of his item with a cost per unit known only to him. The buyer can purchase any number of units from each seller values different combinations of the items differently and has a budget for his total payment. For a special class of procurement games the ,hau chan,Not available,2014.0,10.1007/978-3-319-13129-0_7,Web and Internet Economics,Hau2014,False,,Springer,Not available,Truthful Multi-unit Procurements with Budgets,dd4b396ce55d84d10f87d5cb31b8779b,http://dx.doi.org/10.1007/978-3-319-13129-0_7 355,We study procurement games where each seller supplies multiple units of his item with a cost per unit known only to him. The buyer can purchase any number of units from each seller values different combinations of the items differently and has a budget for his total payment. For a special class of procurement games the ,jing chen,Not available,2014.0,10.1007/978-3-319-13129-0_7,Web and Internet Economics,Hau2014,False,,Springer,Not available,Truthful Multi-unit Procurements with Budgets,dd4b396ce55d84d10f87d5cb31b8779b,http://dx.doi.org/10.1007/978-3-319-13129-0_7 356,In this chapter we consider the problem of redistribution of spectrums via a double auction and propose truthful auctions mechanism for TV channels.,peng lin,Not available,2014.0,10.1007/978-3-319-06799-5_3,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Truthful Double Auction Mechanism for Heterogeneous Spectrums,9580608ad53f29e07ab0c435fc3c0955,http://dx.doi.org/10.1007/978-3-319-06799-5_3 357,In this chapter we consider the problem of redistribution of spectrums via a double auction and propose truthful auctions mechanism for TV channels.,xiaojun feng,Not available,2014.0,10.1007/978-3-319-06799-5_3,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Truthful Double Auction Mechanism for Heterogeneous Spectrums,9580608ad53f29e07ab0c435fc3c0955,http://dx.doi.org/10.1007/978-3-319-06799-5_3 358,Due to the increasing number of Dementia patients the overall costs for caregiving has grown by 32 % between 2002 and 2008. The efficient use of smart decision support systems for managing ambulant care and mobile nursing services that provide professional care for Dementia patients is an important challenge to reduce cost and increase service quality. The optimal allocation of caregiving resources from different mobile nursing service firms to a growing number of Dementia patients however is a difficult problem in the healthcare domain. We approach this problem from a multiagent systems perspective by designing and implementing a distributed decision support system that utilizes an auction-based protocol for allocating caregiving resources subject to Dementia-specific service attributes. We demonstrate the usefulness of the proposed protocol by an early stage prototype implementation presenting the system’s proof-of-concept.,marc premm,Not available,2015.0,10.1007/978-3-319-27343-3_13,Multiagent System Technologies,Tobias2015,False,,Springer,Not available,Agent-Based Decision Support for Allocating Caregiving Resources in a Dementia Scenario,d69661d3001b0a303b33e879ac32c6be,http://dx.doi.org/10.1007/978-3-319-27343-3_13 359,In this chapter we consider the problem of redistribution of spectrums via a double auction and propose truthful auctions mechanism for TV channels.,qian zhang,Not available,2014.0,10.1007/978-3-319-06799-5_3,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Truthful Double Auction Mechanism for Heterogeneous Spectrums,9580608ad53f29e07ab0c435fc3c0955,http://dx.doi.org/10.1007/978-3-319-06799-5_3 360,Distributed energy resources (DERs) which are characterized by small scale power generation technologies to provide an enhancement of the traditional power system have been strongly encouraged to be integrated into the smart grid and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However few of them consider the security aspects of energy trading such as privacy-preservation bid integrity and pre-filtering ability. In this chapter we introduce an efficient Searchable Encryption Scheme for Auction (SESA) in emerging smart grid marketing. Specifically SESA uses a public key encryption with keyword search technique to enable the energy sellers e.g. DERs to inquire suitable bids while preserving the privacy of the energy buyers (EBs). Additionally to facilitate the seller to search for detailed information of the bids we also propose an extension of SESA to support conjunctive keywords search.,mi wen,Not available,2014.0,10.1007/978-3-319-06355-3_2,Querying over Encrypted Data in Smart Grids,Mi2014,False,,Springer,Not available,Equality Query for Auction in Emerging Smart Grid Marketing,e91dc0a1f828b32b957a301d6a464b24,http://dx.doi.org/10.1007/978-3-319-06355-3_2 361,Distributed energy resources (DERs) which are characterized by small scale power generation technologies to provide an enhancement of the traditional power system have been strongly encouraged to be integrated into the smart grid and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However few of them consider the security aspects of energy trading such as privacy-preservation bid integrity and pre-filtering ability. In this chapter we introduce an efficient Searchable Encryption Scheme for Auction (SESA) in emerging smart grid marketing. Specifically SESA uses a public key encryption with keyword search technique to enable the energy sellers e.g. DERs to inquire suitable bids while preserving the privacy of the energy buyers (EBs). Additionally to facilitate the seller to search for detailed information of the bids we also propose an extension of SESA to support conjunctive keywords search.,rongxing lu,Not available,2014.0,10.1007/978-3-319-06355-3_2,Querying over Encrypted Data in Smart Grids,Mi2014,False,,Springer,Not available,Equality Query for Auction in Emerging Smart Grid Marketing,e91dc0a1f828b32b957a301d6a464b24,http://dx.doi.org/10.1007/978-3-319-06355-3_2 362,Distributed energy resources (DERs) which are characterized by small scale power generation technologies to provide an enhancement of the traditional power system have been strongly encouraged to be integrated into the smart grid and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However few of them consider the security aspects of energy trading such as privacy-preservation bid integrity and pre-filtering ability. In this chapter we introduce an efficient Searchable Encryption Scheme for Auction (SESA) in emerging smart grid marketing. Specifically SESA uses a public key encryption with keyword search technique to enable the energy sellers e.g. DERs to inquire suitable bids while preserving the privacy of the energy buyers (EBs). Additionally to facilitate the seller to search for detailed information of the bids we also propose an extension of SESA to support conjunctive keywords search.,xiaohui liang,Not available,2014.0,10.1007/978-3-319-06355-3_2,Querying over Encrypted Data in Smart Grids,Mi2014,False,,Springer,Not available,Equality Query for Auction in Emerging Smart Grid Marketing,e91dc0a1f828b32b957a301d6a464b24,http://dx.doi.org/10.1007/978-3-319-06355-3_2 363,Distributed energy resources (DERs) which are characterized by small scale power generation technologies to provide an enhancement of the traditional power system have been strongly encouraged to be integrated into the smart grid and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However few of them consider the security aspects of energy trading such as privacy-preservation bid integrity and pre-filtering ability. In this chapter we introduce an efficient Searchable Encryption Scheme for Auction (SESA) in emerging smart grid marketing. Specifically SESA uses a public key encryption with keyword search technique to enable the energy sellers e.g. DERs to inquire suitable bids while preserving the privacy of the energy buyers (EBs). Additionally to facilitate the seller to search for detailed information of the bids we also propose an extension of SESA to support conjunctive keywords search.,jingsheng lei,Not available,2014.0,10.1007/978-3-319-06355-3_2,Querying over Encrypted Data in Smart Grids,Mi2014,False,,Springer,Not available,Equality Query for Auction in Emerging Smart Grid Marketing,e91dc0a1f828b32b957a301d6a464b24,http://dx.doi.org/10.1007/978-3-319-06355-3_2 364,Distributed energy resources (DERs) which are characterized by small scale power generation technologies to provide an enhancement of the traditional power system have been strongly encouraged to be integrated into the smart grid and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid marketing. However few of them consider the security aspects of energy trading such as privacy-preservation bid integrity and pre-filtering ability. In this chapter we introduce an efficient Searchable Encryption Scheme for Auction (SESA) in emerging smart grid marketing. Specifically SESA uses a public key encryption with keyword search technique to enable the energy sellers e.g. DERs to inquire suitable bids while preserving the privacy of the energy buyers (EBs). Additionally to facilitate the seller to search for detailed information of the bids we also propose an extension of SESA to support conjunctive keywords search.,xuemin shen,Not available,2014.0,10.1007/978-3-319-06355-3_2,Querying over Encrypted Data in Smart Grids,Mi2014,False,,Springer,Not available,Equality Query for Auction in Emerging Smart Grid Marketing,e91dc0a1f828b32b957a301d6a464b24,http://dx.doi.org/10.1007/978-3-319-06355-3_2 365,The winner determination problem (WDP) in combinatorial double auctions suffers from computation complexity. In this paper we attempt to solve the WDP in combinatorial double auctions based on an agent learning approach. Instead of finding the exact solution we will set up a fictitious market based on multi-agent system architecture and develop a multi-agent learning algorithm to determine the winning bids in the fictitious market to reduce the computational complexity in solving the WDP in combinatorial double auctions. In the fictitious market each buyer and each seller is represented by an agent. There is a mediator agent that represents the mediator. The issue is to develop learning algorithms for all the agents in the system to collectively solve the winner determination problem for combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach to developing efficient multi-agent learning algorithm for solving the WDP in combinatorial double auctions. Numerical results indicate our agent learning approach is more efficient than the centralized approach.,fu-shiung hsieh,Not available,2014.0,10.1007/978-3-319-07455-9_1,Modern Advances in Applied Intelligence,Fu-Shiung2014,False,,Springer,Not available,Multi-agent Learning for Winner Determination in Combinatorial Auctions,f683510efafa3e59b41909aa5228c1d9,http://dx.doi.org/10.1007/978-3-319-07455-9_1 366,The winner determination problem (WDP) in combinatorial double auctions suffers from computation complexity. In this paper we attempt to solve the WDP in combinatorial double auctions based on an agent learning approach. Instead of finding the exact solution we will set up a fictitious market based on multi-agent system architecture and develop a multi-agent learning algorithm to determine the winning bids in the fictitious market to reduce the computational complexity in solving the WDP in combinatorial double auctions. In the fictitious market each buyer and each seller is represented by an agent. There is a mediator agent that represents the mediator. The issue is to develop learning algorithms for all the agents in the system to collectively solve the winner determination problem for combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach to developing efficient multi-agent learning algorithm for solving the WDP in combinatorial double auctions. Numerical results indicate our agent learning approach is more efficient than the centralized approach.,chi-shiang liao,Not available,2014.0,10.1007/978-3-319-07455-9_1,Modern Advances in Applied Intelligence,Fu-Shiung2014,False,,Springer,Not available,Multi-agent Learning for Winner Determination in Combinatorial Auctions,f683510efafa3e59b41909aa5228c1d9,http://dx.doi.org/10.1007/978-3-319-07455-9_1 367,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,ferran torrent-fontbona,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 368,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,albert pla,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 369,The overall performance of a peer-to-peer (P2P) scalable streaming system largely depends on the strategies employed in bandwidth allocation data scheduling and incentives. In this paper we develop a credit-based content-aware bandwidth auction model for scalable streaming in P2P networks. It formulates multi-overlay multi-layer bandwidth request and allocation problems as auction games. Each peer in the games acts as both auctioneer and player. Being a auctioneer it maximizes the total revenue (credits) by selling upload bandwidth; Being a player it uses the credits earned in bandwidth sales to sequentially bid for layer bandwidth so as to maximize the received video quality. Also a content-aware bidding strategy is proposed under which the required bandwidth quantity from a peer is determined by the informative video chunks and the marginal net utility that peer could provide as well as the available credits and the maximum layer bit rate. The convergence of the proposed auction algorithm is mathematically proved. Finally the performance of the proposed scheme is verified by simulation results.,junni zou,Not available,2014.0,10.1007/s11042-013-1621-7,Multimedia Tools and Applications,Junni2014,False,,Springer,Not available,Joint bandwidth allocation data scheduling and incentives for scalable video streaming over peer-to-peer networks,9408af0be84a91c0664cf425a8f94dd9,http://dx.doi.org/10.1007/s11042-013-1621-7 370,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,beatriz lopez,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 371,With the increasing requirements of electricity consumption and the wide application of renewable energy sources the traditional power grid cannot sustain the development trend. It is restructured to more intelligent power systems called smart grids [1 2]. Smart grids mainly consist of several parts: generator(s) transmission system operator distributor(s) retailer(s) and aggregator(s) [3]. Many technologies have been introduced into smart grids to ensure their availability and economic benefits [4]. For instance the energy auction market introduces commercial auctions to smart grids where energy sellers publish their auction information and then energy buyers bid for appropriate energy supplies. Thus the energy auction market can adjust energy prices and provide strong support for the practical application of smart grids [5].,hongwei li,Not available,2014.0,10.1007/978-3-319-04945-8_4,Enabling Secure and Privacy Preserving Communications in Smart Grids,Hongwei2014,False,,Springer,Not available,An Efficient Fine-Grained Keywords Comparison Scheme in the Smart Grid Auction Market,61936324f119bb5cc20a23c41b92df73,http://dx.doi.org/10.1007/978-3-319-04945-8_4 372,In wireless market major operators buy spectrum through auctions held by spectrum regulators and serve end users. How much spectrum should an operator buy and how should he set the optimal service tariff to maximize his own benefits are challenging and important research problems. On one hand a Wireless Service Provider’s (WSP’s) strategies in spectrum auction and service provision are coupled together. On the other hand spectrum holder wants to design an auction to flexibly satisfy operators’ spectrum requirement improving sales revenue and maximize social welfare. Previous works do not see the big picture and usually study one of the sub-problems.,peng lin,Not available,2014.0,10.1007/978-3-319-06799-5_5,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Flexauc Auction: Serving Dynamic Demand in Wireless Market,c8c03a86d3743107b3f0e08fb5528a00,http://dx.doi.org/10.1007/978-3-319-06799-5_5 373,In wireless market major operators buy spectrum through auctions held by spectrum regulators and serve end users. How much spectrum should an operator buy and how should he set the optimal service tariff to maximize his own benefits are challenging and important research problems. On one hand a Wireless Service Provider’s (WSP’s) strategies in spectrum auction and service provision are coupled together. On the other hand spectrum holder wants to design an auction to flexibly satisfy operators’ spectrum requirement improving sales revenue and maximize social welfare. Previous works do not see the big picture and usually study one of the sub-problems.,xiaojun feng,Not available,2014.0,10.1007/978-3-319-06799-5_5,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Flexauc Auction: Serving Dynamic Demand in Wireless Market,c8c03a86d3743107b3f0e08fb5528a00,http://dx.doi.org/10.1007/978-3-319-06799-5_5 374,In wireless market major operators buy spectrum through auctions held by spectrum regulators and serve end users. How much spectrum should an operator buy and how should he set the optimal service tariff to maximize his own benefits are challenging and important research problems. On one hand a Wireless Service Provider’s (WSP’s) strategies in spectrum auction and service provision are coupled together. On the other hand spectrum holder wants to design an auction to flexibly satisfy operators’ spectrum requirement improving sales revenue and maximize social welfare. Previous works do not see the big picture and usually study one of the sub-problems.,qian zhang,Not available,2014.0,10.1007/978-3-319-06799-5_5,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Flexauc Auction: Serving Dynamic Demand in Wireless Market,c8c03a86d3743107b3f0e08fb5528a00,http://dx.doi.org/10.1007/978-3-319-06799-5_5 375,Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms were proposed to prevent bid-rigging. The prior receipt-free mechanisms are based on two assumptions; firstly existence of untappable channel between bidders and auction authorities. Secondly mechanisms assume the authorities to be honest (not colluding). Moreover the bandwidth required to communicate the receipt-free bids is huge. This paper presents a sealed-bid auction mechanism to resist bid-rigging. The proposed method does not assume untappable channel nor consider the authorities to be necessarily honest. The proposed mechanism also manages the bandwidth efficiently and improves the performance of the system.,jaydeep howlader,Not available,2014.0,10.1007/978-3-319-12160-4_25,Information Security and Cryptology -- ICISC 2013,Jaydeep2014,False,,Springer,Not available,Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment,107491e1cf07f2c2efbb89f376bd9362,http://dx.doi.org/10.1007/978-3-319-12160-4_25 376,Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms were proposed to prevent bid-rigging. The prior receipt-free mechanisms are based on two assumptions; firstly existence of untappable channel between bidders and auction authorities. Secondly mechanisms assume the authorities to be honest (not colluding). Moreover the bandwidth required to communicate the receipt-free bids is huge. This paper presents a sealed-bid auction mechanism to resist bid-rigging. The proposed method does not assume untappable channel nor consider the authorities to be necessarily honest. The proposed mechanism also manages the bandwidth efficiently and improves the performance of the system.,sanjit roy,Not available,2014.0,10.1007/978-3-319-12160-4_25,Information Security and Cryptology -- ICISC 2013,Jaydeep2014,False,,Springer,Not available,Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment,107491e1cf07f2c2efbb89f376bd9362,http://dx.doi.org/10.1007/978-3-319-12160-4_25 377,Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms were proposed to prevent bid-rigging. The prior receipt-free mechanisms are based on two assumptions; firstly existence of untappable channel between bidders and auction authorities. Secondly mechanisms assume the authorities to be honest (not colluding). Moreover the bandwidth required to communicate the receipt-free bids is huge. This paper presents a sealed-bid auction mechanism to resist bid-rigging. The proposed method does not assume untappable channel nor consider the authorities to be necessarily honest. The proposed mechanism also manages the bandwidth efficiently and improves the performance of the system.,ashis mal,Not available,2014.0,10.1007/978-3-319-12160-4_25,Information Security and Cryptology -- ICISC 2013,Jaydeep2014,False,,Springer,Not available,Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment,107491e1cf07f2c2efbb89f376bd9362,http://dx.doi.org/10.1007/978-3-319-12160-4_25 378,This paper compares two market structures namely auction and dealership markets defined respectively as centralized order-driven and fragmented quote-driven markets. The approach used departs from previous works comparing these market mechanisms by considering both the timing of order submission (quote versus order-driven) and trading concentration (centralized versus fragmented) as distinctive features of these trading structures. Comparison between market structures is based on different measures of market performances: market viability informational efficiency price variance informed trading aggressiveness and market liquidity. Auction markets are less sensitive to the asymmetric information problem and exhibit a higher level of informational efficiency than dealership markets. Moreover the relative magnitude (in both structures) of price variance informed trading aggressiveness and market depth depend on market thickness.,moez bennouri,Not available,2014.0,10.1007/978-3-319-05212-0_3,Market Microstructure and Nonlinear Dynamics,Moez2014,False,,Springer,Not available,Trading Mechanisms in Financial Markets: A Comparison Between Auction and Dealership Markets,1e45f5924c23ffd9def3f1944a6aeb05,http://dx.doi.org/10.1007/978-3-319-05212-0_3 379,,mohammad hajiaghayi,Not available,2014.0,10.1007/978-3-642-27848-8_759-1,Encyclopedia of Algorithms,Taghi2014,False,,Springer,Not available,Prophet Inequality and Online Auctions,6cad37095935030f14cc4c853a29adc2,http://dx.doi.org/10.1007/978-3-642-27848-8_759-1 380,The overall performance of a peer-to-peer (P2P) scalable streaming system largely depends on the strategies employed in bandwidth allocation data scheduling and incentives. In this paper we develop a credit-based content-aware bandwidth auction model for scalable streaming in P2P networks. It formulates multi-overlay multi-layer bandwidth request and allocation problems as auction games. Each peer in the games acts as both auctioneer and player. Being a auctioneer it maximizes the total revenue (credits) by selling upload bandwidth; Being a player it uses the credits earned in bandwidth sales to sequentially bid for layer bandwidth so as to maximize the received video quality. Also a content-aware bidding strategy is proposed under which the required bandwidth quantity from a peer is determined by the informative video chunks and the marginal net utility that peer could provide as well as the available credits and the maximum layer bit rate. The convergence of the proposed auction algorithm is mathematically proved. Finally the performance of the proposed scheme is verified by simulation results.,lin chen,Not available,2014.0,10.1007/s11042-013-1621-7,Multimedia Tools and Applications,Junni2014,False,,Springer,Not available,Joint bandwidth allocation data scheduling and incentives for scalable video streaming over peer-to-peer networks,9408af0be84a91c0664cf425a8f94dd9,http://dx.doi.org/10.1007/s11042-013-1621-7 381,,vahid liaghat,Not available,2014.0,10.1007/978-3-642-27848-8_759-1,Encyclopedia of Algorithms,Taghi2014,False,,Springer,Not available,Prophet Inequality and Online Auctions,6cad37095935030f14cc4c853a29adc2,http://dx.doi.org/10.1007/978-3-642-27848-8_759-1 382,,tian-ming bu,Not available,2014.0,10.1007/978-3-642-27848-8_251-2,Encyclopedia of Algorithms,Tian-Ming2014,False,,Springer,Not available,Multiple Unit Auctions with Budget Constraint,2d4875b782474c0af63c12c7b7086ea2,http://dx.doi.org/10.1007/978-3-642-27848-8_251-2 383,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,silva de,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 384,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,georgia kosmopoulou,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 385,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,beatrice pagel,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 386,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,ronald peeters,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 387,In a single-item auction with agents having general preferences first-price auctions are axiomatically characterized. In this study we characterize first-price auctions by Pareto efficiency individual rationality anonymity in welfare and non-bossiness in welfare. The first three properties are satisfied by second-price auctions. Considering the well-known fact that second-price auctions are strategy-proof a clear distinction between first- and second-price auctions is reducible to the difference between non-bossiness and strategy-proofness both of which are important properties with respect to agents’ strategic behavior. In the characterization anonymity in welfare can be replaced by envy-freeness which is also a basic property related to equity among agents. Furthermore in our characterization each of the properties Pareto efficiency individual rationality and non-bossiness in welfare is independent and domains on which first-price auctions are characterized without equity properties are specified. By strengthening non-bossiness we characterize first-price auctions by a weaker equity property called equal welfare to equals.,tsuyoshi adachi,Not available,2013.0,10.1007/s40505-013-0001-9,Economic Theory Bulletin,Tsuyoshi2013,False,,Springer,Not available,First-price auctions on general preference domains: axiomatic characterizations,fa08b3f50c3c160301772b698a4c1da2,http://dx.doi.org/10.1007/s40505-013-0001-9 388,In a single-item auction with agents having general preferences first-price auctions are axiomatically characterized. In this study we characterize first-price auctions by Pareto efficiency individual rationality anonymity in welfare and non-bossiness in welfare. The first three properties are satisfied by second-price auctions. Considering the well-known fact that second-price auctions are strategy-proof a clear distinction between first- and second-price auctions is reducible to the difference between non-bossiness and strategy-proofness both of which are important properties with respect to agents’ strategic behavior. In the characterization anonymity in welfare can be replaced by envy-freeness which is also a basic property related to equity among agents. Furthermore in our characterization each of the properties Pareto efficiency individual rationality and non-bossiness in welfare is independent and domains on which first-price auctions are characterized without equity properties are specified. By strengthening non-bossiness we characterize first-price auctions by a weaker equity property called equal welfare to equals.,takumi kongo,Not available,2013.0,10.1007/s40505-013-0001-9,Economic Theory Bulletin,Tsuyoshi2013,False,,Springer,Not available,First-price auctions on general preference domains: axiomatic characterizations,fa08b3f50c3c160301772b698a4c1da2,http://dx.doi.org/10.1007/s40505-013-0001-9 389,This paper revisits recent empirical research on buyer credulity in arts auctions and auctions for assets in general. We show that elementary results in auction theory can fully account for some stylized facts on asset returns that have been held to suggest that sellers of assets can exploit buyers by providing biased estimates of asset values. We argue that rather than showing that buyers are credulous the existing evidence can serve as an indirect test of the rationality assumptions underlying auction theory.,alex gershkov,Not available,2013.0,10.1007/s40505-013-0008-2,Economic Theory Bulletin,Alex2013,False,,Springer,Not available,On seller estimates and buyer returns,10616d0914ce8042f068b0ee1584693f,http://dx.doi.org/10.1007/s40505-013-0008-2 390,This paper revisits recent empirical research on buyer credulity in arts auctions and auctions for assets in general. We show that elementary results in auction theory can fully account for some stylized facts on asset returns that have been held to suggest that sellers of assets can exploit buyers by providing biased estimates of asset values. We argue that rather than showing that buyers are credulous the existing evidence can serve as an indirect test of the rationality assumptions underlying auction theory.,flavio toxvaerd,Not available,2013.0,10.1007/s40505-013-0008-2,Economic Theory Bulletin,Alex2013,False,,Springer,Not available,On seller estimates and buyer returns,10616d0914ce8042f068b0ee1584693f,http://dx.doi.org/10.1007/s40505-013-0008-2 391,A generalised bidding model is developed to calculate a bidder’s expected profit and auctioners expected revenue/payment for both a General Independent Value and Independent Private Value (IPV) ,martin skitmore,Not available,2014.0,10.1057/jors.2013.163,Journal of the Operational Research Society,Martin2014,False,,Springer,Not available," ",2171f0a63fcd7a6d67a7fbde2d8892d8,http://dx.doi.org/10.1057/jors.2013.163 392,The problem of bandwidth allocation in wireless access networks is studied in this paper investigating the performance of two approaches. Firstly we use centralized algorithms such as bankruptcy division rules and Nash bargaining. Secondly a distributed algorithm is proposed in order to find the optimal solution of the bandwidth allocation problem. In both approaches the allocation rules are properly modified to incorporate the influence of the channel state resulting in a more efficient and fair bandwidth allocation. The channel dependent centralized and distributed schemes are compared in terms of efficiency and fairness with a view to highlighting the advantages and disadvantages of every approach.,stavroula vassaki,Not available,2013.0,10.1007/s11235-011-9481-9,Telecommunication Systems,Stavroula2013,False,,Springer,Not available,Evaluation of channel dependent bandwidth allocation in wireless access networks: centralized and distributed approach,7b301bef9618d485556888f4da1777ce,http://dx.doi.org/10.1007/s11235-011-9481-9 393,The problem of bandwidth allocation in wireless access networks is studied in this paper investigating the performance of two approaches. Firstly we use centralized algorithms such as bankruptcy division rules and Nash bargaining. Secondly a distributed algorithm is proposed in order to find the optimal solution of the bandwidth allocation problem. In both approaches the allocation rules are properly modified to incorporate the influence of the channel state resulting in a more efficient and fair bandwidth allocation. The channel dependent centralized and distributed schemes are compared in terms of efficiency and fairness with a view to highlighting the advantages and disadvantages of every approach.,athanasios panagopoulos,Not available,2013.0,10.1007/s11235-011-9481-9,Telecommunication Systems,Stavroula2013,False,,Springer,Not available,Evaluation of channel dependent bandwidth allocation in wireless access networks: centralized and distributed approach,7b301bef9618d485556888f4da1777ce,http://dx.doi.org/10.1007/s11235-011-9481-9 394,The problem of bandwidth allocation in wireless access networks is studied in this paper investigating the performance of two approaches. Firstly we use centralized algorithms such as bankruptcy division rules and Nash bargaining. Secondly a distributed algorithm is proposed in order to find the optimal solution of the bandwidth allocation problem. In both approaches the allocation rules are properly modified to incorporate the influence of the channel state resulting in a more efficient and fair bandwidth allocation. The channel dependent centralized and distributed schemes are compared in terms of efficiency and fairness with a view to highlighting the advantages and disadvantages of every approach.,philip constantinou,Not available,2013.0,10.1007/s11235-011-9481-9,Telecommunication Systems,Stavroula2013,False,,Springer,Not available,Evaluation of channel dependent bandwidth allocation in wireless access networks: centralized and distributed approach,7b301bef9618d485556888f4da1777ce,http://dx.doi.org/10.1007/s11235-011-9481-9 395,The current art in optimal combinatorial auctions is limited to handling the case of a single unit each of multiple items with each agent bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for buying multiple units of multiple items when the bidders are single minded. We develop a procurement auction that minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions this optimal auction also satisfies dominant strategy incentive compatibility. The results presented here hold true for equivalent forward auction settings as well. For the two item multi-unit procurement auction we design an optimal auction in the presence of the single minded bidders offering volume discounts.,sujit gujar,Not available,2013.0,10.1007/s12351-011-0116-4,Operational Research,Sujit2013,False,,Springer,Not available,Optimal multi-unit combinatorial auctions,007689fc79a0e498ed24fa42adb03260,http://dx.doi.org/10.1007/s12351-011-0116-4 396,The current art in optimal combinatorial auctions is limited to handling the case of a single unit each of multiple items with each agent bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for buying multiple units of multiple items when the bidders are single minded. We develop a procurement auction that minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions this optimal auction also satisfies dominant strategy incentive compatibility. The results presented here hold true for equivalent forward auction settings as well. For the two item multi-unit procurement auction we design an optimal auction in the presence of the single minded bidders offering volume discounts.,y. narahari,Not available,2013.0,10.1007/s12351-011-0116-4,Operational Research,Sujit2013,False,,Springer,Not available,Optimal multi-unit combinatorial auctions,007689fc79a0e498ed24fa42adb03260,http://dx.doi.org/10.1007/s12351-011-0116-4 397,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,bing shi,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 398,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,enrico gerding,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 399,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,perukrishnen vytelingum,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 400,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,nicholas jennings,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 401,Spectrum auctions are used by governments to assign and price licenses for wireless communications. The standard approach is the simultaneous ascending auction in which many related lots are auctioned simultaneously in a sequence of rounds. I analyze the strengths and weaknesses of the approach with examples from US spectrum auctions. I then present a variation-the combinatorial clock auction-which has been adopted by the UK and many other countries which addresses many of the problems of the simultaneous ascending auction while building on its strengths. The combinatorial clock auction is a simple dynamic auction in which bidders bid on packages of lots. Most importantly the auction allows alternative technologies that require the spectrum to be organized in different ways to compete in a technology-neutral auction. In addition the pricing rule and information policy are carefully tailored to mitigate gaming behavior. An activity rule based on revealed preference promotes price and assignment discovery throughout the clock stage of the auction. Truthful bidding is encouraged which simplifies bidding and improves efficiency. Experimental tests and early auctions confirm the advantages of the approach.,peter cramton,Not available,2013.0,10.1007/s11151-013-9376-x,Review of Industrial Organization,Peter2013,False,,Springer,Not available,Spectrum Auction Design,87fff65e409c1668363e4a769ebec760,http://dx.doi.org/10.1007/s11151-013-9376-x 402,A principal uses security bid auctions to award an incentive contract to one among several agents in the presence of hidden action and hidden information. Securities range from cash to equity and call options. “Steeper” securities are better surplus extractors yet reduce effort incentives. In view of this trade-off a hybrid share auction that includes a cash reward to the winner a minimum share and an option to call a fixed wage contract tends to outperform all other auctions although it is not an optimal mechanism. However by adding output targets a hybrid share auction can (arbitrary closely) implement the optimal mechanism.,byoung jun,Not available,2014.0,10.1007/s10058-014-0165-2,Review of Economic Design,Heon2014,False,,Springer,Not available,Security bid auctions for agency contracts,fa9df8d512524b6597ba98bea74f18f7,http://dx.doi.org/10.1007/s10058-014-0165-2 403,This work proposes a radio resource management framework employing game theoretic concepts for orthogonal frequency division multiple access the most prevalent multiple access technique for the next generation wireless networks. The subcarrier allocation problem is encountered as a combinatorial auction where the base station auctions the subcarriers and the users bid for and buy bundles of subcarriers aiming at minimising their required transmit power. Subsequently each allocated subcarrier is loaded with a number of bits decided by each user independently and the power control process is set up as a non-cooperative game. Each user responds to the interference sensed in his environment and through a best responses process the game converges to the unique Pareto optimal Nash equilibrium. In order to guarantee convergence a limit is imposed to the maximum modulation level for each subcarrier. Simulation results show that the auction algorithm follows closely the performance of the optimal algorithm whereas it is of lower computational complexity and requires less feedback information. Similarly the proposed distributed bit loading and power control scheme achieves lower transmit power per offered bit rate unit. However the distributed nature of the algorithm results in lower total offered bit rate because of the partial knowledge and exploitation of channel state information.,ioannis stiakogiannakis,Not available,2013.0,10.1007/s11277-012-0610-x,Wireless Personal Communications,N.2013,False,,Springer,Not available,A Radio Resource Management Framework for Multi-User Multi-Cell OFDMA Networks Based on Game Theory,55923425982fc48557ed44ee76356538,http://dx.doi.org/10.1007/s11277-012-0610-x 404,This work proposes a radio resource management framework employing game theoretic concepts for orthogonal frequency division multiple access the most prevalent multiple access technique for the next generation wireless networks. The subcarrier allocation problem is encountered as a combinatorial auction where the base station auctions the subcarriers and the users bid for and buy bundles of subcarriers aiming at minimising their required transmit power. Subsequently each allocated subcarrier is loaded with a number of bits decided by each user independently and the power control process is set up as a non-cooperative game. Each user responds to the interference sensed in his environment and through a best responses process the game converges to the unique Pareto optimal Nash equilibrium. In order to guarantee convergence a limit is imposed to the maximum modulation level for each subcarrier. Simulation results show that the auction algorithm follows closely the performance of the optimal algorithm whereas it is of lower computational complexity and requires less feedback information. Similarly the proposed distributed bit loading and power control scheme achieves lower transmit power per offered bit rate unit. However the distributed nature of the algorithm results in lower total offered bit rate because of the partial knowledge and exploitation of channel state information.,dimitra kaklamani,Not available,2013.0,10.1007/s11277-012-0610-x,Wireless Personal Communications,N.2013,False,,Springer,Not available,A Radio Resource Management Framework for Multi-User Multi-Cell OFDMA Networks Based on Game Theory,55923425982fc48557ed44ee76356538,http://dx.doi.org/10.1007/s11277-012-0610-x 405,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yinglei teng,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 406,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,f. yu,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 407,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,ke han,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 408,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yifei wei,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 409,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yong zhang,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 410,The pure exchange model is the foundation of the neoclassical theory of value yet equilibrium predictions and price adjustment dynamics for this model remained untested prior to the experiment reported in this paper. With the exchange economy replicated several times prices and allocations in most experiment sessions adjust toward the competitive equilibrium in continuous double auction trading though adjustment is much slower than in previous commodity flow (or perishable good) double auction market experiments. Price adjustment is evaluated by comparing its extent within each market replication (or trading period) to its extent across trading periods. More price adjustment occurs within trading periods than across trading periods so price adjustment data are evaluated with the disequilibrium Hahn process model (Hahn and Negishi in Econometrica 30:463–469 ,steven gjerstad,Not available,2013.0,10.1007/s00199-011-0651-5,Economic Theory,Steven2013,False,,Springer,Not available,Price dynamics in an exchange economy,0e18ac23a3b91b17883368dfa7344e69,http://dx.doi.org/10.1007/s00199-011-0651-5 411,We analyze the problem of selling shares of a divisible good to a large number of buyers when demand is uncertain. We characterize equilibria of two popular mechanisms a fixed price mechanism and a uniform price auction and compare the revenues. While in the auction truthful bidding is a dominant strategy we find that bidders have an incentive to overstate their demand in the fixed price mechanism. For some parameter values we find that the fixed price mechanism outperforms the auction.,jurgen bierbaum,Not available,2006.0,10.1007/s10058-006-0007-y,Review of Economic Design,Jürgen2006,False,,Springer,Not available,Selling shares to retail investors: auction vs. fixed price,cc9b6de6a0873866eee242ec6deaab9f,http://dx.doi.org/10.1007/s10058-006-0007-y 412,We analyze the problem of selling shares of a divisible good to a large number of buyers when demand is uncertain. We characterize equilibria of two popular mechanisms a fixed price mechanism and a uniform price auction and compare the revenues. While in the auction truthful bidding is a dominant strategy we find that bidders have an incentive to overstate their demand in the fixed price mechanism. For some parameter values we find that the fixed price mechanism outperforms the auction.,veronika grimm,Not available,2006.0,10.1007/s10058-006-0007-y,Review of Economic Design,Jürgen2006,False,,Springer,Not available,Selling shares to retail investors: auction vs. fixed price,cc9b6de6a0873866eee242ec6deaab9f,http://dx.doi.org/10.1007/s10058-006-0007-y 413,A principal uses security bid auctions to award an incentive contract to one among several agents in the presence of hidden action and hidden information. Securities range from cash to equity and call options. “Steeper” securities are better surplus extractors yet reduce effort incentives. In view of this trade-off a hybrid share auction that includes a cash reward to the winner a minimum share and an option to call a fixed wage contract tends to outperform all other auctions although it is not an optimal mechanism. However by adding output targets a hybrid share auction can (arbitrary closely) implement the optimal mechanism.,elmar wolfstetter,Not available,2014.0,10.1007/s10058-014-0165-2,Review of Economic Design,Heon2014,False,,Springer,Not available,Security bid auctions for agency contracts,fa9df8d512524b6597ba98bea74f18f7,http://dx.doi.org/10.1007/s10058-014-0165-2 414,The paper analyzes a problem of optimal auction design when the seller faces asymmetrically informed bidders. Specifically we consider a continuum of risk-neutral uninformed bidders taking part into the auction along with ,moez bennouri,Not available,2006.0,10.1007/s00199-005-0637-2,Economic Theory,Moez2006,False,,Springer,Not available,Optimal auctions with asymmetrically informed bidders,218befc9872d9700a6771bf20f91ae68,http://dx.doi.org/10.1007/s00199-005-0637-2 415,The paper analyzes a problem of optimal auction design when the seller faces asymmetrically informed bidders. Specifically we consider a continuum of risk-neutral uninformed bidders taking part into the auction along with ,sonia falconieri,Not available,2006.0,10.1007/s00199-005-0637-2,Economic Theory,Moez2006,False,,Springer,Not available,Optimal auctions with asymmetrically informed bidders,218befc9872d9700a6771bf20f91ae68,http://dx.doi.org/10.1007/s00199-005-0637-2 416,Employing a hedonic price approach within a framework of central tendencies no conclusive results about the impact of auction houses on final prices of art objects have been found. In order to focus on auction houses as a unit we have applied a benchmarking technique DEA developed for efficiency studies. New performance indicators are developed and calculated giving an insight into auction house differences impossible to obtain using hedonic price approach. The performance indicators may also be regarded as quality indicators assuming perfect arbitrage leads to the same unobservable quality of art object obtaining the same price.,finn forsund,Not available,2006.0,10.1007/s10479-006-0031-x,Annals of Operations Research,R.2006,False,,Springer,Not available,DEA meets Picasso: The impact of auction houses on the hammer price,04f9cf6276c24b72d7cdb0e260370c3f,http://dx.doi.org/10.1007/s10479-006-0031-x 417,Employing a hedonic price approach within a framework of central tendencies no conclusive results about the impact of auction houses on final prices of art objects have been found. In order to focus on auction houses as a unit we have applied a benchmarking technique DEA developed for efficiency studies. New performance indicators are developed and calculated giving an insight into auction house differences impossible to obtain using hedonic price approach. The performance indicators may also be regarded as quality indicators assuming perfect arbitrage leads to the same unobservable quality of art object obtaining the same price.,roberto zanola,Not available,2006.0,10.1007/s10479-006-0031-x,Annals of Operations Research,R.2006,False,,Springer,Not available,DEA meets Picasso: The impact of auction houses on the hammer price,04f9cf6276c24b72d7cdb0e260370c3f,http://dx.doi.org/10.1007/s10479-006-0031-x 418,This paper provides a swift tour of auction theory and its applications. Among the questions it considers are: How much do bidders bid in commonly studied single-object auctions? How efficient are these auctions? How much revenue do they generate? Which single-object auction maximizes the seller’s expected revenue? What is the best way to auction incentive contracts? And how efficient and complex are multi-object auctions?,emiel maasland,Not available,2006.0,10.1007/s10645-006-9002-5,De Economist,Emiel2006,False,,Springer,Not available,Going Going Gone! A Swift Tour of Auction Theory and its Applications,77c332c331568df376a7f996ed4b4bbc,http://dx.doi.org/10.1007/s10645-006-9002-5 419,This paper provides a swift tour of auction theory and its applications. Among the questions it considers are: How much do bidders bid in commonly studied single-object auctions? How efficient are these auctions? How much revenue do they generate? Which single-object auction maximizes the seller’s expected revenue? What is the best way to auction incentive contracts? And how efficient and complex are multi-object auctions?,sander onderstal,Not available,2006.0,10.1007/s10645-006-9002-5,De Economist,Emiel2006,False,,Springer,Not available,Going Going Gone! A Swift Tour of Auction Theory and its Applications,77c332c331568df376a7f996ed4b4bbc,http://dx.doi.org/10.1007/s10645-006-9002-5 420,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,jianwei huang,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 421,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,randall berry,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 422,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,michael honig,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 423,Bulow and Klemperer [1] have provided an upper bound on the value of bargaining power for a seller of an indivisible object. Specifically negotiating optimally with ,rene kirkegaard,Not available,2006.0,10.1007/s00199-004-0593-2,Economic Theory,René2006,False,,Springer,Not available,A short proof of the Bulow-Klemperer auctions vs. negotiations result,56133f9cd9a00ef7edb4cb25ec2c2817,http://dx.doi.org/10.1007/s00199-004-0593-2 424,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,vaghefi sharif,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 425,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,gian albano,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 426,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,fabrizio germano,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 427,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,stefano lovo,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 428,Most of the literature on collusive behavior in auctions ignores two important issues that make collusion difficult to sustain at least in one-shot interactions: the detection of cheating and the verification of bids. Colluding bidders may deceive each other by using shill bidders. Also if the identities of the bidders and their bids are not published then it would be difficult to verify the bid of a colluding bidder. This paper addresses these problems in one shot second price auctions where one bidder offers another bidder a side payment in exchange for not participating in the auction while the number of other bidders is stochastic. In spite of the barriers to collusion mentioned above a simple side payment mechanism which depends only on the auction price is introduced. It induces a successful collusion eliminates the verification problem provides no incentive for the use of shill bidders and guarantees that the proponent obtains ex-post non-negative payoff. The colluding bidders are ex-ante strictly better off compared with the competitive case irrespective of their types.,chien-liang chen,Not available,2006.0,10.1007/s00199-005-0612-y,Economic Theory,Chien-Liang2006,False,,Springer,Not available,Collusion in one-shot second-price auctions,f27ef376bce35124499f079516448e04,http://dx.doi.org/10.1007/s00199-005-0612-y 429,Most of the literature on collusive behavior in auctions ignores two important issues that make collusion difficult to sustain at least in one-shot interactions: the detection of cheating and the verification of bids. Colluding bidders may deceive each other by using shill bidders. Also if the identities of the bidders and their bids are not published then it would be difficult to verify the bid of a colluding bidder. This paper addresses these problems in one shot second price auctions where one bidder offers another bidder a side payment in exchange for not participating in the auction while the number of other bidders is stochastic. In spite of the barriers to collusion mentioned above a simple side payment mechanism which depends only on the auction price is introduced. It induces a successful collusion eliminates the verification problem provides no incentive for the use of shill bidders and guarantees that the proponent obtains ex-post non-negative payoff. The colluding bidders are ex-ante strictly better off compared with the competitive case irrespective of their types.,yair tauman,Not available,2006.0,10.1007/s00199-005-0612-y,Economic Theory,Chien-Liang2006,False,,Springer,Not available,Collusion in one-shot second-price auctions,f27ef376bce35124499f079516448e04,http://dx.doi.org/10.1007/s00199-005-0612-y 430,In developing open heterogeneous and distributed multi-agent systems researchers often face a problem of facilitating negotiation and bargaining amongst agents. It is increasingly common to use auction mechanisms for negotiation in multi-agent systems. The choice of auction mechanism and the bidding strategy of an agent are of central importance to the success of the agent model. Our aim is to determine the best agent learning algorithm for bidding in a variety of single seller auction structures in both static environments where a known optimal strategy exists and in complex environments where the optimal strategy may be constantly changing. In this paper we present a model of single seller auctions and describe three adaptive agent algorithms to learn strategies through repeated competition. We experiment in a range of auction environments of increasing complexity to determine how well each agent performs in relation to an optimal strategy in cases where one can be deduced or in relation to each other in other cases. We find that with a uniform value distribution a purely reactive agent based on Cliff’s ZIP algorithm for continuous double auctions (CDA) performs well although is outperformed in some cases by a memory based agent based on the Gjerstad Dickhaut agent for CDA.,anthony bagnall,Not available,2006.0,10.1007/s10458-005-4948-2,Autonomous Agents and Multi-Agent Systems,Anthony2006,False,,Springer,Not available,Autonomous Adaptive Agents for Single Seller Sealed Bid Auctions,ecbc8163bfa001d86f975bd271e49694,http://dx.doi.org/10.1007/s10458-005-4948-2 431,In developing open heterogeneous and distributed multi-agent systems researchers often face a problem of facilitating negotiation and bargaining amongst agents. It is increasingly common to use auction mechanisms for negotiation in multi-agent systems. The choice of auction mechanism and the bidding strategy of an agent are of central importance to the success of the agent model. Our aim is to determine the best agent learning algorithm for bidding in a variety of single seller auction structures in both static environments where a known optimal strategy exists and in complex environments where the optimal strategy may be constantly changing. In this paper we present a model of single seller auctions and describe three adaptive agent algorithms to learn strategies through repeated competition. We experiment in a range of auction environments of increasing complexity to determine how well each agent performs in relation to an optimal strategy in cases where one can be deduced or in relation to each other in other cases. We find that with a uniform value distribution a purely reactive agent based on Cliff’s ZIP algorithm for continuous double auctions (CDA) performs well although is outperformed in some cases by a memory based agent based on the Gjerstad Dickhaut agent for CDA.,iain toft,Not available,2006.0,10.1007/s10458-005-4948-2,Autonomous Agents and Multi-Agent Systems,Anthony2006,False,,Springer,Not available,Autonomous Adaptive Agents for Single Seller Sealed Bid Auctions,ecbc8163bfa001d86f975bd271e49694,http://dx.doi.org/10.1007/s10458-005-4948-2 432,An auction with a buyout option is modelled. Such an option allows a bidder to purchase the item being auctioned at a pre-specified buyout price instead of attempting to obtain the item through the traditional auction procedure. This analysis is motivated by internet auctions where such options are present. If all auction participants are risk neutral the seller will choose a buyout price high enough so that the option is never exercised. However a risk averse seller facing risk neutral bidders will choose a price low enough so that the option is exercised with positive probability. Further if bidders are risk neutral and the seller is risk averse this option may result in a Pareto improvement compared to a sealed bid second price auction.,timothy mathews,Not available,2006.0,10.1007/s00199-004-0571-8,Economic Theory,Timothy2006,False,,Springer,Not available,The role of varying risk attitudes in an auction with a buyout option,d250db95ae0113de8b9f892d26186868,http://dx.doi.org/10.1007/s00199-004-0571-8 433,An auction with a buyout option is modelled. Such an option allows a bidder to purchase the item being auctioned at a pre-specified buyout price instead of attempting to obtain the item through the traditional auction procedure. This analysis is motivated by internet auctions where such options are present. If all auction participants are risk neutral the seller will choose a buyout price high enough so that the option is never exercised. However a risk averse seller facing risk neutral bidders will choose a price low enough so that the option is exercised with positive probability. Further if bidders are risk neutral and the seller is risk averse this option may result in a Pareto improvement compared to a sealed bid second price auction.,brett katzman,Not available,2006.0,10.1007/s00199-004-0571-8,Economic Theory,Timothy2006,False,,Springer,Not available,The role of varying risk attitudes in an auction with a buyout option,d250db95ae0113de8b9f892d26186868,http://dx.doi.org/10.1007/s00199-004-0571-8 434,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,john kagel,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 435,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,vaghefi sharif,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 436,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,svetlana pevnitskaya,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 437,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,lixin ye,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 438,The sealed-bid first-price auction of a single object in the case of independent privately-known values is the simplest auction setting and understanding it is important for understanding more complex mechanisms. But bidders bid above the risk-neutral Nash equilibrium theory prediction. The reasons for this “over bidding” remain an unsolved puzzle. Several explanations have been offered including risk aversion social comparisons and learning. We present a new explanation based on regret and a model that explains not only the observed over bidding in sealed-bid first-price auctions but also behavior in several other settings that is inconsistent with risk aversion.,richard engelbrecht-wiggans,Not available,2007.0,10.1007/s00199-006-0180-9,Economic Theory,Richard2007,False,,Springer,Not available,Regret in auctions: theory and evidence,6900f94c6bc938b71faa47a1fc3e061f,http://dx.doi.org/10.1007/s00199-006-0180-9 439,The sealed-bid first-price auction of a single object in the case of independent privately-known values is the simplest auction setting and understanding it is important for understanding more complex mechanisms. But bidders bid above the risk-neutral Nash equilibrium theory prediction. The reasons for this “over bidding” remain an unsolved puzzle. Several explanations have been offered including risk aversion social comparisons and learning. We present a new explanation based on regret and a model that explains not only the observed over bidding in sealed-bid first-price auctions but also behavior in several other settings that is inconsistent with risk aversion.,elena katok,Not available,2007.0,10.1007/s00199-006-0180-9,Economic Theory,Richard2007,False,,Springer,Not available,Regret in auctions: theory and evidence,6900f94c6bc938b71faa47a1fc3e061f,http://dx.doi.org/10.1007/s00199-006-0180-9 440,We characterize the equilibrium of the all-pay auction with general convex cost of effort and sequential effort choices. We consider a set of ,kai konrad,Not available,2007.0,10.1007/s10058-007-0029-0,Review of Economic Design,A.2007,False,,Springer,Not available,The generalized Stackelberg equilibrium of the all-pay auction with complete information,0d30f59550a3dcad30a5026a0e30f423,http://dx.doi.org/10.1007/s10058-007-0029-0 441,We characterize the equilibrium of the all-pay auction with general convex cost of effort and sequential effort choices. We consider a set of ,wolfgang leininger,Not available,2007.0,10.1007/s10058-007-0029-0,Review of Economic Design,A.2007,False,,Springer,Not available,The generalized Stackelberg equilibrium of the all-pay auction with complete information,0d30f59550a3dcad30a5026a0e30f423,http://dx.doi.org/10.1007/s10058-007-0029-0 442,We study auctions with financial externalities i.e. auctions in which losers care about how much the winner pays. In the first-price auction larger financial externalities result in a lower expected price; in the second-price auction the effect is ambiguous. Although the expected price in the second-price auction may increase if financial externalities increase the seller is not able to gain more revenue by guaranteeing the losers a fraction of the auction revenue. With a reserve price we find that both auctions may have pooling at the reserve price. This finding suggests that identical bids need not be a signal of collusion in contrast to what is sometimes argued in anti-trust cases.,emiel maasland,Not available,2007.0,10.1007/s00199-006-0119-1,Economic Theory,Emiel2007,False,,Springer,Not available,Auctions with Financial Externalities,5d0af669d3c7861374244be571a45004,http://dx.doi.org/10.1007/s00199-006-0119-1 443,We study auctions with financial externalities i.e. auctions in which losers care about how much the winner pays. In the first-price auction larger financial externalities result in a lower expected price; in the second-price auction the effect is ambiguous. Although the expected price in the second-price auction may increase if financial externalities increase the seller is not able to gain more revenue by guaranteeing the losers a fraction of the auction revenue. With a reserve price we find that both auctions may have pooling at the reserve price. This finding suggests that identical bids need not be a signal of collusion in contrast to what is sometimes argued in anti-trust cases.,sander onderstal,Not available,2007.0,10.1007/s00199-006-0119-1,Economic Theory,Emiel2007,False,,Springer,Not available,Auctions with Financial Externalities,5d0af669d3c7861374244be571a45004,http://dx.doi.org/10.1007/s00199-006-0119-1 444," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",jawad abrache,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 445," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",teodor crainic,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 446,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,rami zwick,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 447,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,neshat beheshti,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 448," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",michel gendreau,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 449," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",monia rekik,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 450,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,hai wang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 451,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,weidong zhang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 452,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,jingjing wang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 453,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,david grether,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 454,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,charles plott,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 455,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,daniel rowe,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 456,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,martin sereno,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 457,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,john allman,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 458,We consider von Neumann–Morgenstern stable sets in assignment games with one seller and many buyers. We prove that a set of imputations is a stable set if and only if it is the graph of a certain type of continuous and monotone function. This characterization enables us to interpret the standards of behavior encompassed by the various stable sets as possible outcomes of well-known auction procedures when groups of buyers may form bidder rings. We also show that the union of all stable sets can be described as the union of convex polytopes all of whose vertices are marginal contribution payoff vectors. Consequently each stable set is contained in the Weber set. The Shapley value however typically falls outside the union of all stable sets.,dezso bednay,Not available,2014.0,10.1007/s10479-013-1439-8,Annals of Operations Research,Dezső2014,False,,Springer,Not available,Stable sets in one-seller assignment games,47b943b0dfaef8135f40c52c6e5b115f,http://dx.doi.org/10.1007/s10479-013-1439-8 459,There is much active research into the design of automated bidding agents particularly for environments that involve multiple decoupled auctions. These settings are complex partly because an agent’s strategy depends on information about other bidders’interests. When bidders’ valuation distributions are not known ,albert jiang,Not available,2007.0,10.1007/s10994-006-0477-8,Machine Learning,Xin2007,False,,Springer,Not available,Bidding agents for online auctions with hidden bids,41312d057a62cf9b3ae3be470e7e5f9d,http://dx.doi.org/10.1007/s10994-006-0477-8 460,There is much active research into the design of automated bidding agents particularly for environments that involve multiple decoupled auctions. These settings are complex partly because an agent’s strategy depends on information about other bidders’interests. When bidders’ valuation distributions are not known ,kevin leyton-brown,Not available,2007.0,10.1007/s10994-006-0477-8,Machine Learning,Xin2007,False,,Springer,Not available,Bidding agents for online auctions with hidden bids,41312d057a62cf9b3ae3be470e7e5f9d,http://dx.doi.org/10.1007/s10994-006-0477-8 461,We consider a seller who can either sell exclusively through resellers or allow potential consumers to purchase directly from him. The consumers’ willingness to pay is private information. All transactions are in the form of second-price sealed bid auctions. We show that if the resellers can gain access to a substantially bigger portion of the market than the seller himself the seller obtains a higher revenue by dealing exclusively through them i.e. by committing to not sell to any consumer. The result is due to a “winner’s curse” effect: the resellers win only if the consumers that they compete against submit lower bids i.e. if part of their customer base has low valuations. This depresses the resellers’ willingness to pay relative to what they would be willing to pay under an exclusive resale contract. Our results do not depend on the presence of transaction costs: exclusive dealing yields strictly higher revenue even when the resellers can market the item at zero cost.,subir bose,Not available,2007.0,10.1007/s00199-006-0079-5,Economic Theory,Subir2007,False,,Springer,Not available,Exclusive Versus Non-exclusive Dealing in Auctions with Resale,1455e31d9240d70d8041d03a803bcb50,http://dx.doi.org/10.1007/s00199-006-0079-5 462,We consider a seller who can either sell exclusively through resellers or allow potential consumers to purchase directly from him. The consumers’ willingness to pay is private information. All transactions are in the form of second-price sealed bid auctions. We show that if the resellers can gain access to a substantially bigger portion of the market than the seller himself the seller obtains a higher revenue by dealing exclusively through them i.e. by committing to not sell to any consumer. The result is due to a “winner’s curse” effect: the resellers win only if the consumers that they compete against submit lower bids i.e. if part of their customer base has low valuations. This depresses the resellers’ willingness to pay relative to what they would be willing to pay under an exclusive resale contract. Our results do not depend on the presence of transaction costs: exclusive dealing yields strictly higher revenue even when the resellers can market the item at zero cost.,george deltas,Not available,2007.0,10.1007/s00199-006-0079-5,Economic Theory,Subir2007,False,,Springer,Not available,Exclusive Versus Non-exclusive Dealing in Auctions with Resale,1455e31d9240d70d8041d03a803bcb50,http://dx.doi.org/10.1007/s00199-006-0079-5 463,This note uses the Theorem of the Alternative to prove new results on the implementability of general asymmetric auctions and to provide simpler proofs of known results for symmetric auctions. The tradeoff is that type spaces are taken to be finite.,kim border,Not available,2007.0,10.1007/s00199-006-0080-z,Economic Theory,C.2007,False,,Springer,Not available,Reduced Form Auctions Revisited,cea674b7143ff0bba187aa3885641f2a,http://dx.doi.org/10.1007/s00199-006-0080-z 464,Naor Pinkas and Sumner introduced and implemented a sealed-bid two-server auction system that is perhaps the most efficient and practical to date. Based on a cryptographic primitive known as oblivious transfer their system aims to ensure privacy and correctness provided that at least one auction server behaves honestly. As observed in [,ari juels,Not available,2003.0,10.1007/3-540-36504-4_6,Financial Cryptography,Ari2003,False,,Springer,Not available,A Two-Server Sealed-Bid Auction Protocol,325857ed236064eb3a3394be067d5d58,http://dx.doi.org/10.1007/3-540-36504-4_6 465,Naor Pinkas and Sumner introduced and implemented a sealed-bid two-server auction system that is perhaps the most efficient and practical to date. Based on a cryptographic primitive known as oblivious transfer their system aims to ensure privacy and correctness provided that at least one auction server behaves honestly. As observed in [,michael szydlo,Not available,2003.0,10.1007/3-540-36504-4_6,Financial Cryptography,Ari2003,False,,Springer,Not available,A Two-Server Sealed-Bid Auction Protocol,325857ed236064eb3a3394be067d5d58,http://dx.doi.org/10.1007/3-540-36504-4_6 466,Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. This paper presents a method for implementing several secure combinatorial auction protocols based on our newly developed secure dynamic programming protocol. Dynamic programming is a very effective widely used technique for tackling various combinatorial optimization problems including several types of combinatorial auctions. Our secure dynamic programming protocol utilizes secret sharing techniques and can obtain the optimal solution of a combinatorial optimization problem i.e. result of a combinatorial auction without revealing the inputs of the problem i.e. bidding prices. We discuss the application of the method to several combinatorial auctions i.e. multiple-unit single-item auctions linear-goods auctions and general combinatorial auctions.,koutarou suzuki,Not available,2003.0,10.1007/3-540-36504-4_4,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing,84e9ca7199e4d316e10777796d64430a,http://dx.doi.org/10.1007/3-540-36504-4_4 467,Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. This paper presents a method for implementing several secure combinatorial auction protocols based on our newly developed secure dynamic programming protocol. Dynamic programming is a very effective widely used technique for tackling various combinatorial optimization problems including several types of combinatorial auctions. Our secure dynamic programming protocol utilizes secret sharing techniques and can obtain the optimal solution of a combinatorial optimization problem i.e. result of a combinatorial auction without revealing the inputs of the problem i.e. bidding prices. We discuss the application of the method to several combinatorial auctions i.e. multiple-unit single-item auctions linear-goods auctions and general combinatorial auctions.,makoto yokoo,Not available,2003.0,10.1007/3-540-36504-4_4,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing,84e9ca7199e4d316e10777796d64430a,http://dx.doi.org/10.1007/3-540-36504-4_4 468,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,bart decker,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 469,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,stefano barbieri,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 470,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,gregory neven,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 471,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,frank piessens,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 472,Auction mechanisms have recently gained increasing attention as an alternative approach for pricing Internet resources. For the case of divisible commodities over single links Generalized Vickrey Auctions (GVA) are already a well-established standard mechanism whereas an abundance of unsolved problems is related to the generalization of GVAs in space and time i.e. for the case of connections over multiple links and for session holding times that require to win a series of consecutive periodic auctions. This paper focuses on the latter multi-period aspect which is typical for any type of multimedia applications like QoS-enabled conferencing or videostreaming. First a Markovian property for efficient bidding is derived and various user strategies are simulated and evaluated before a suitable auction protocol is described. Eventually the novel concept of a “Second-chance Auction Mechanism” (SAM) leads to an increase in economic efficiency without imposing significant additional overhead.,peter reichl,Not available,2003.0,10.1007/978-3-540-40012-7_25,Interactive Multimedia on Next Generation Networks,Peter2003,False,,Springer,Not available,Second-Chance Auctions for Multimedia Session Pricing,cc375b94b34dc5d1a1e0a24560f27081,http://dx.doi.org/10.1007/978-3-540-40012-7_25 473,Auction mechanisms have recently gained increasing attention as an alternative approach for pricing Internet resources. For the case of divisible commodities over single links Generalized Vickrey Auctions (GVA) are already a well-established standard mechanism whereas an abundance of unsolved problems is related to the generalization of GVAs in space and time i.e. for the case of connections over multiple links and for session holding times that require to win a series of consecutive periodic auctions. This paper focuses on the latter multi-period aspect which is typical for any type of multimedia applications like QoS-enabled conferencing or videostreaming. First a Markovian property for efficient bidding is derived and various user strategies are simulated and evaluated before a suitable auction protocol is described. Eventually the novel concept of a “Second-chance Auction Mechanism” (SAM) leads to an increase in economic efficiency without imposing significant additional overhead.,sandford bessler,Not available,2003.0,10.1007/978-3-540-40012-7_25,Interactive Multimedia on Next Generation Networks,Peter2003,False,,Springer,Not available,Second-Chance Auctions for Multimedia Session Pricing,cc375b94b34dc5d1a1e0a24560f27081,http://dx.doi.org/10.1007/978-3-540-40012-7_25 474,Auction mechanisms have recently gained increasing attention as an alternative approach for pricing Internet resources. For the case of divisible commodities over single links Generalized Vickrey Auctions (GVA) are already a well-established standard mechanism whereas an abundance of unsolved problems is related to the generalization of GVAs in space and time i.e. for the case of connections over multiple links and for session holding times that require to win a series of consecutive periodic auctions. This paper focuses on the latter multi-period aspect which is typical for any type of multimedia applications like QoS-enabled conferencing or videostreaming. First a Markovian property for efficient bidding is derived and various user strategies are simulated and evaluated before a suitable auction protocol is described. Eventually the novel concept of a “Second-chance Auction Mechanism” (SAM) leads to an increase in economic efficiency without imposing significant additional overhead.,burkhard stiller,Not available,2003.0,10.1007/978-3-540-40012-7_25,Interactive Multimedia on Next Generation Networks,Peter2003,False,,Springer,Not available,Second-Chance Auctions for Multimedia Session Pricing,cc375b94b34dc5d1a1e0a24560f27081,http://dx.doi.org/10.1007/978-3-540-40012-7_25 475,We study auctions in which bidders have severe constraints on the size of messages they are allowed to send to the auctioneer. In such auctions each bidder has a set of ,liad blumrosen,Not available,2003.0,10.1007/978-3-540-39658-1_12,Algorithms - ESA 2003,Liad2003,False,,Springer,Not available,Multi-player and Multi-round Auctions with Severely Bounded Communication,70cc5577901cdda55db90ca15ef866a8,http://dx.doi.org/10.1007/978-3-540-39658-1_12 476,We study auctions in which bidders have severe constraints on the size of messages they are allowed to send to the auctioneer. In such auctions each bidder has a set of ,noam nisan,Not available,2003.0,10.1007/978-3-540-39658-1_12,Algorithms - ESA 2003,Liad2003,False,,Springer,Not available,Multi-player and Multi-round Auctions with Severely Bounded Communication,70cc5577901cdda55db90ca15ef866a8,http://dx.doi.org/10.1007/978-3-540-39658-1_12 477,We study auctions in which bidders have severe constraints on the size of messages they are allowed to send to the auctioneer. In such auctions each bidder has a set of ,ilya segal,Not available,2003.0,10.1007/978-3-540-39658-1_12,Algorithms - ESA 2003,Liad2003,False,,Springer,Not available,Multi-player and Multi-round Auctions with Severely Bounded Communication,70cc5577901cdda55db90ca15ef866a8,http://dx.doi.org/10.1007/978-3-540-39658-1_12 478,Auctions have become popular in conducting trade negotiations on the Internet. The design of new auction formats and other negotiation protocols has become an important topic for researchers in both industry and academia. Traditional auction mechanisms typically allow price-only negotiations for which the winner determination is a computationally simple task. However the need for new auction mechanisms that allow complex bids such as bundle bids and multi-attribute bids has been raised in many situations such as corporate procurement. The winner determination in these auctions is a computationally hard problem. The computational complexity has been a significant hurdle for the wide spread use of these advanced auction models. In this paper we will outline the auction design space and classify winner determination algorithms along multiple dimensions. Then we will explain the design of an object framework providing a programming interface to different types of winner determination algorithms. This framework enables application programmers to specify buyer preferences allocation rules and supplier offerings in a declarative manner and solve the winner determination problems without having to implement the computationally complex algorithms.,juhnyoung lee,Not available,2003.0,10.1007/3-540-45036-X_42,Web and Communication Technologies and Internet-Related Social Issues — HSI 2003,Juhnyoung2003,False,,Springer,Not available,A Framework of Winner Determination Algorithms for Internet Auctions,d2c5c216505c30937df5f6133eb05dab,http://dx.doi.org/10.1007/3-540-45036-X_42 479,Auctions have become popular in conducting trade negotiations on the Internet. The design of new auction formats and other negotiation protocols has become an important topic for researchers in both industry and academia. Traditional auction mechanisms typically allow price-only negotiations for which the winner determination is a computationally simple task. However the need for new auction mechanisms that allow complex bids such as bundle bids and multi-attribute bids has been raised in many situations such as corporate procurement. The winner determination in these auctions is a computationally hard problem. The computational complexity has been a significant hurdle for the wide spread use of these advanced auction models. In this paper we will outline the auction design space and classify winner determination algorithms along multiple dimensions. Then we will explain the design of an object framework providing a programming interface to different types of winner determination algorithms. This framework enables application programmers to specify buyer preferences allocation rules and supplier offerings in a declarative manner and solve the winner determination problems without having to implement the computationally complex algorithms.,sang-goo lee,Not available,2003.0,10.1007/3-540-45036-X_42,Web and Communication Technologies and Internet-Related Social Issues — HSI 2003,Juhnyoung2003,False,,Springer,Not available,A Framework of Winner Determination Algorithms for Internet Auctions,d2c5c216505c30937df5f6133eb05dab,http://dx.doi.org/10.1007/3-540-45036-X_42 480,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,david malueg,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 481,Auctions have become popular in conducting trade negotiations on the Internet. The design of new auction formats and other negotiation protocols has become an important topic for researchers in both industry and academia. Traditional auction mechanisms typically allow price-only negotiations for which the winner determination is a computationally simple task. However the need for new auction mechanisms that allow complex bids such as bundle bids and multi-attribute bids has been raised in many situations such as corporate procurement. The winner determination in these auctions is a computationally hard problem. The computational complexity has been a significant hurdle for the wide spread use of these advanced auction models. In this paper we will outline the auction design space and classify winner determination algorithms along multiple dimensions. Then we will explain the design of an object framework providing a programming interface to different types of winner determination algorithms. This framework enables application programmers to specify buyer preferences allocation rules and supplier offerings in a declarative manner and solve the winner determination problems without having to implement the computationally complex algorithms.,suekyung lee,Not available,2003.0,10.1007/3-540-45036-X_42,Web and Communication Technologies and Internet-Related Social Issues — HSI 2003,Juhnyoung2003,False,,Springer,Not available,A Framework of Winner Determination Algorithms for Internet Auctions,d2c5c216505c30937df5f6133eb05dab,http://dx.doi.org/10.1007/3-540-45036-X_42 482,This paper examines a common value auction in which bidder default is explicitly allowed. The lack of contractual enforcement has implications for the formation of bids as well as the revenue properties of the auction. Using a common value procurement auction we explore these implications in an experimental setting. Our results show that bidders are more aggressive when default is allowed. A theoretical result shows that allowing default can actually be in the best interest of the auctioneer. Experimental evidence however indicates that this result does not hold true in practice. One possible reason for this discrepancy is that the data in our experiments is consistent with winner's curse behavior.,matthew roelofs,Not available,2002.0,10.1023/A:1020840420643,Experimental Economics,R.2002,False,,Springer,Not available,Common Value Auctions with Default: An Experimental Approach,539148a5fe1fff5255015fdcfb8d8ef6,http://dx.doi.org/10.1023/A:1020840420643 483, Despite the complexity of the first price auction in the general asymmetric case analytical results have started to emerge in the literature. Authors have also searched to gain insights by computing numerical estimates of the equilibria for some probability distributions of the valuations. This paper proves that the Nash equilibrium of the first price auction depends continuously for the weak topology on the valuation distributions and thus brings robustness to the numerical results as well as some theoretical results. As an example of application we disprove a conjecture of comparative statics.,bernard lebrun,Not available,2002.0,10.1007/s001990100227,Economic Theory,Bernard2002,False,,Springer,Not available,Continuity of the first price auction Nash equilibrium correspondence,3df07adfd3a0a3bca4b508261d5c5d8d,http://dx.doi.org/10.1007/s001990100227 484,It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this letter the faults of the most representative auction-based mechanisms are discussed. And then a new method called Uniform-Price Auction (UPA) which has the simplest auction rule is proposed and its incentive compatibility in the network environment is also proved. Finally the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market and a market mechanism for network resource allocation which is predictable riskless and simple for end-users is completed.,jiaolong wei,Not available,2002.0,10.1007/s11767-002-0074-3,Journal of Electronics (China),Jiaolong2002,False,,Springer,Not available,Uniform-price auction for bandwidth allocation in the internet,84386238278dd0c1413c47a5569a841c,http://dx.doi.org/10.1007/s11767-002-0074-3 485,It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this letter the faults of the most representative auction-based mechanisms are discussed. And then a new method called Uniform-Price Auction (UPA) which has the simplest auction rule is proposed and its incentive compatibility in the network environment is also proved. Finally the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market and a market mechanism for network resource allocation which is predictable riskless and simple for end-users is completed.,chi zhang,Not available,2002.0,10.1007/s11767-002-0074-3,Journal of Electronics (China),Jiaolong2002,False,,Springer,Not available,Uniform-price auction for bandwidth allocation in the internet,84386238278dd0c1413c47a5569a841c,http://dx.doi.org/10.1007/s11767-002-0074-3 486,I first provide a complete characterizationof the unique equilibrium of thelottery game by n lobbyists with asymmetricvaluations and then compare the lotteryand the all-pay auction models of lobbying.I show that the exclusion principlediscovered by Baye Kovenock and de Vries(1993) for all-pay auction does not applyto lottery. I also show that the perverse effectthat an exogenous cap may increase thetotal lobbying expenditure in a two-bidderall-pay auction discovered by Che and Gale(1998) does not apply to lottery.,hanming fang,Not available,2002.0,10.1023/A:1019915126367,Public Choice,Hanming2002,False,,Springer,Not available,Lottery Versus All-Pay Auction Models of Lobbying,9f623569c5f46ace568189dd4db3926a,http://dx.doi.org/10.1023/A:1019915126367 487," ",martin bichler,Not available,2001.0,10.1007/978-3-642-57547-1_47,Information Age Economy,Martin2001,False,,Springer,Not available,BidTaker: An Application of Multi-Attribute Auction Markets in Tourism,b9029307c1f25535d0989f7a145da452,http://dx.doi.org/10.1007/978-3-642-57547-1_47 488, There has been much discussion of the relative merits of selling government bonds using a uniform-price auction rather than the traditional discriminatory-price auction. Arguments in favor of the former have won the day in respect of the newly instituted auctions of index-linked bonds in the USA and UK. This short paper assesses the evidence and concludes that the advantages of uniform-price auctions have been oversold.,ken binmore,Not available,2000.0,10.1007/s100580000026,Review of Economic Design,Ken2000,False,,Springer,Not available,Treasury auctions: Uniform or discriminatory?,b12722e9fcd7b09e8140920cfdac3df8,http://dx.doi.org/10.1007/s100580000026 489, There has been much discussion of the relative merits of selling government bonds using a uniform-price auction rather than the traditional discriminatory-price auction. Arguments in favor of the former have won the day in respect of the newly instituted auctions of index-linked bonds in the USA and UK. This short paper assesses the evidence and concludes that the advantages of uniform-price auctions have been oversold.,joe swierzbinski,Not available,2000.0,10.1007/s100580000026,Review of Economic Design,Ken2000,False,,Springer,Not available,Treasury auctions: Uniform or discriminatory?,b12722e9fcd7b09e8140920cfdac3df8,http://dx.doi.org/10.1007/s100580000026 490, I study monotonicity and uniqueness of the equilibrium strategies in a two-person first price auction with affiliated signals. Existing results establish uniqueness within the class of non-decreasing bidding strategies. I show that there is an ,gustavo rodriguez,Not available,2000.0,10.1007/s001820000049,International Journal of Game Theory,E.2000,False,,Springer,Not available,First price auctions: Monotonicity and uniqueness,e8e39b363594900e0f4c4aed6732b92f,http://dx.doi.org/10.1007/s001820000049 491,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,iryna topolyan,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 492, This paper considers a model in which bidders in an auction are faced with uncertainty as to their final valuation of the auctioned object. This uncertainty is resolved after the auction has taken place. It is argued that the inclusion of a cooling-off right raises the expected revenue to the seller when bidders face a risk of the object being a strict ‘bad’ in that owning the object incurs negative utility to the winner of the auction. The model is then tested in a laboratory setting. The evidence from this experiment supports the predictions of the theory.,john asker,Not available,2000.0,10.1007/PL00020944,Economic Theory,John2000,False,,Springer,Not available,Bidding up buying out and cooling-off: an examination of auctions with withdrawal rights,6e531bef0e8a6d627cd08095afadde37,http://dx.doi.org/10.1007/PL00020944 493,The use of auctions as a pricing mechanism has grown dramatically over the last few years. The introduction of electronic auctions has significantly widened the pool of consumers who participate in auctions and increased the number of companies attempting to sell their products in an auction format. Previous empirical research on auctions has focused almost exclusively on the behavior of professional bidders in high stakes common value auctions or the behavior of students in laboratory experiments. We collect data on a large number of electronic auctions across four product categories to explore the behavior of consumers bidding in a real marketplace. In particular we focus on the role experience plays in their bidding behavior to uncover whether consumer learning drives the bidding process towards outcomes described in the theoretical literature on auctions. We find that experience does indeed lead to behavior which is more consistent with theory although the proportion of experienced bidders who behave in a manner inconsistent with theory remains quite large.,ronald wilcox,Not available,2000.0,10.1023/A:1008141313927,Marketing Letters,T.2000,False,,Springer,Not available,Experts and Amateurs: The Role of Experience in Internet Auctions,29a65ca6a5580020e1c7af4d3eabfd5b,http://dx.doi.org/10.1023/A:1008141313927 494,We describe a Vickrey-Clarke-Groves auction for supply and demand bidding in the face of market power and nonconcave benefits in which bidders are motivated to bid truthfully and evaluate its use for power and gas pipeline capacity auctions. The auction efficiently allocate resources if firms maximize profit. Simulations including an application to the PJM power market illustrate the procedure. However the auction has several undesirable properties. It risks being revenue deficient can be gamed by cooperating suppliers and consumers and is subject to the information revelation and bid-taker cheating concerns that make single item Vickrey auctions rare.,benjamin hobbs,Not available,2000.0,10.1023/A:1008151712010,Journal of Regulatory Economics,F.2000,False,,Springer,Not available,Evaluation of a Truthful Revelation Auction in the Context of Energy Markets with Nonconcave Benefits,b89ad1acf90ef637e5ac0539bce21d37,http://dx.doi.org/10.1023/A:1008151712010 495,We describe a Vickrey-Clarke-Groves auction for supply and demand bidding in the face of market power and nonconcave benefits in which bidders are motivated to bid truthfully and evaluate its use for power and gas pipeline capacity auctions. The auction efficiently allocate resources if firms maximize profit. Simulations including an application to the PJM power market illustrate the procedure. However the auction has several undesirable properties. It risks being revenue deficient can be gamed by cooperating suppliers and consumers and is subject to the information revelation and bid-taker cheating concerns that make single item Vickrey auctions rare.,michael rothkopf,Not available,2000.0,10.1023/A:1008151712010,Journal of Regulatory Economics,F.2000,False,,Springer,Not available,Evaluation of a Truthful Revelation Auction in the Context of Energy Markets with Nonconcave Benefits,b89ad1acf90ef637e5ac0539bce21d37,http://dx.doi.org/10.1023/A:1008151712010 496,We describe a Vickrey-Clarke-Groves auction for supply and demand bidding in the face of market power and nonconcave benefits in which bidders are motivated to bid truthfully and evaluate its use for power and gas pipeline capacity auctions. The auction efficiently allocate resources if firms maximize profit. Simulations including an application to the PJM power market illustrate the procedure. However the auction has several undesirable properties. It risks being revenue deficient can be gamed by cooperating suppliers and consumers and is subject to the information revelation and bid-taker cheating concerns that make single item Vickrey auctions rare.,laurel hyde,Not available,2000.0,10.1023/A:1008151712010,Journal of Regulatory Economics,F.2000,False,,Springer,Not available,Evaluation of a Truthful Revelation Auction in the Context of Energy Markets with Nonconcave Benefits,b89ad1acf90ef637e5ac0539bce21d37,http://dx.doi.org/10.1023/A:1008151712010 497,We describe a Vickrey-Clarke-Groves auction for supply and demand bidding in the face of market power and nonconcave benefits in which bidders are motivated to bid truthfully and evaluate its use for power and gas pipeline capacity auctions. The auction efficiently allocate resources if firms maximize profit. Simulations including an application to the PJM power market illustrate the procedure. However the auction has several undesirable properties. It risks being revenue deficient can be gamed by cooperating suppliers and consumers and is subject to the information revelation and bid-taker cheating concerns that make single item Vickrey auctions rare.,richard o'neill,Not available,2000.0,10.1023/A:1008151712010,Journal of Regulatory Economics,F.2000,False,,Springer,Not available,Evaluation of a Truthful Revelation Auction in the Context of Energy Markets with Nonconcave Benefits,b89ad1acf90ef637e5ac0539bce21d37,http://dx.doi.org/10.1023/A:1008151712010 498,Goods are said to be combinatorial when the value of a bundle of goods is not equal to the sum of the values of the same goods unbundled. Investigations of combinatorial allocation problems should recognize that there are two separate aspects of such problems: an ,r. isaac,Not available,2000.0,10.1023/A:1009942024096,Experimental Economics,Mark2000,False,,Springer,Not available,Robustness of the Incentive Compatible Combinatorial Auction,b6bbfee5d9684571837473ffc0e5f682,http://dx.doi.org/10.1023/A:1009942024096 499,Goods are said to be combinatorial when the value of a bundle of goods is not equal to the sum of the values of the same goods unbundled. Investigations of combinatorial allocation problems should recognize that there are two separate aspects of such problems: an ,duncan james,Not available,2000.0,10.1023/A:1009942024096,Experimental Economics,Mark2000,False,,Springer,Not available,Robustness of the Incentive Compatible Combinatorial Auction,b6bbfee5d9684571837473ffc0e5f682,http://dx.doi.org/10.1023/A:1009942024096 500,The Federal Communications Commission (FCC) spectrum auctions use a simultaneous ascending auction design. Bidders bid on numerous communication licenses simultaneously with bidding remaining open on all licenses until no bidder is willing to bid higher on any license. With full revelation of bidding information simultaneous open bidding allows bidders to send messages to their rivals telling them on which licenses to bid and which to avoid. These strategies can help bidders coordinate a division of the licenses and enforce the proposed division by directed punishments. We examine solutions to mitigate collusive bidding in the spectrum auctions and then apply these ideas to the design of daily electricity auctions.,peter cramton,Not available,2000.0,10.1023/A:1008174031940,Journal of Regulatory Economics,Peter2000,False,,Springer,Not available,Collusive Bidding: Lessons from the FCC Spectrum Auctions,fcdce56a1c1e8601051326ecbcae2275,http://dx.doi.org/10.1023/A:1008174031940 501,The Federal Communications Commission (FCC) spectrum auctions use a simultaneous ascending auction design. Bidders bid on numerous communication licenses simultaneously with bidding remaining open on all licenses until no bidder is willing to bid higher on any license. With full revelation of bidding information simultaneous open bidding allows bidders to send messages to their rivals telling them on which licenses to bid and which to avoid. These strategies can help bidders coordinate a division of the licenses and enforce the proposed division by directed punishments. We examine solutions to mitigate collusive bidding in the spectrum auctions and then apply these ideas to the design of daily electricity auctions.,jesse schwartz,Not available,2000.0,10.1023/A:1008174031940,Journal of Regulatory Economics,Peter2000,False,,Springer,Not available,Collusive Bidding: Lessons from the FCC Spectrum Auctions,fcdce56a1c1e8601051326ecbcae2275,http://dx.doi.org/10.1023/A:1008174031940 502,In an environment with dynamic arrivals of players who wish to purchase only one of multiple identical objects for which they have a private value we analyze a sequential auction mechanism with an activity rule. If the players play undominated strategies then we are able to bound the efficiency loss compared to an optimal mechanism that maximizes the total welfare. We have no assumptions on the underlying distribution from which the players’ arrival times and valuations for the object are drawn. Moreover we have no assumption of a common prior on this distribution.,ron lavi,Not available,2014.0,10.1007/s00182-013-0405-7,International Journal of Game Theory,Ron2014,False,,Springer,Not available,Efficiency levels in sequential auctions with dynamic arrivals,6999e22c1741d44fc0fee82388644e19,http://dx.doi.org/10.1007/s00182-013-0405-7 503,In general synergies across license valuations complicate the auction design process. Theory suggests that a “simple” (i.e. non-combinatorial) auction will have difficulty in assigning licenses efficiently in such an environment. This difficulty increases with increases in “fitting complexity.” In some environments bidding may become “mutually destructive.” Experiments indicate that a properly designed combinatorial auction is superior to a simple auction in terms of economic efficiency and revenue generation in bidding environments with a low amount of fitting complexity. Concerns that a combinatorial auction will cause a “threshold” problem are not borne out when bidders for small packages can communicate.,mark bykowsky,Not available,2000.0,10.1023/A:1008122015102,Journal of Regulatory Economics,M.2000,False,,Springer,Not available,Mutually Destructive Bidding: The FCC Auction Design Problem,ddf5ef419f3a39bf11cb94145c80313b,http://dx.doi.org/10.1023/A:1008122015102 504,In general synergies across license valuations complicate the auction design process. Theory suggests that a “simple” (i.e. non-combinatorial) auction will have difficulty in assigning licenses efficiently in such an environment. This difficulty increases with increases in “fitting complexity.” In some environments bidding may become “mutually destructive.” Experiments indicate that a properly designed combinatorial auction is superior to a simple auction in terms of economic efficiency and revenue generation in bidding environments with a low amount of fitting complexity. Concerns that a combinatorial auction will cause a “threshold” problem are not borne out when bidders for small packages can communicate.,robert cull,Not available,2000.0,10.1023/A:1008122015102,Journal of Regulatory Economics,M.2000,False,,Springer,Not available,Mutually Destructive Bidding: The FCC Auction Design Problem,ddf5ef419f3a39bf11cb94145c80313b,http://dx.doi.org/10.1023/A:1008122015102 505,In general synergies across license valuations complicate the auction design process. Theory suggests that a “simple” (i.e. non-combinatorial) auction will have difficulty in assigning licenses efficiently in such an environment. This difficulty increases with increases in “fitting complexity.” In some environments bidding may become “mutually destructive.” Experiments indicate that a properly designed combinatorial auction is superior to a simple auction in terms of economic efficiency and revenue generation in bidding environments with a low amount of fitting complexity. Concerns that a combinatorial auction will cause a “threshold” problem are not borne out when bidders for small packages can communicate.,john ledyard,Not available,2000.0,10.1023/A:1008122015102,Journal of Regulatory Economics,M.2000,False,,Springer,Not available,Mutually Destructive Bidding: The FCC Auction Design Problem,ddf5ef419f3a39bf11cb94145c80313b,http://dx.doi.org/10.1023/A:1008122015102 506,The FCC auctions beginning in July 1994 were a watershed event in what may be best called reengineering regulation. It was the first time a new market mechanism in the form of an auction had been developed especially to replace traditional administrative procedures for regulating access to a natural resource. The spectrum auctions and the soon to follow trading in SO,david salant,Not available,2000.0,10.1023/A:1008196131032,Journal of Regulatory Economics,David2000,False,,Springer,Not available,Auctions and Regulation: Reengineering of Regulatory Mechanisms**,d8e49e1af402f0dbcbee69a7a4cd2ce3,http://dx.doi.org/10.1023/A:1008196131032 507,This paper provides a theoretical and empirical analysis of the multi-unit Dutch teleshopping auctions of 1–2–3.tv. There are two channels for sales transactions: Customers either bid in the teleshopping auctions or purchase in the online shop for a simultaneously available fixed price. Our theoretical analysis indicates that profit-maximizing customers do not overbid the fixed price since they risk experiencing the Bidder’s Curse: Buying at a uniform auction price that is higher than the fixed price. Our data set includes nearly 700 000 recorded bids. We find that customers overbid in 26% of all bids but the Bidder’s Curse only occurs in 5% of all auctions. Offline-bidders (telephone calls) overbid both by larger amounts and more often than do online-bidders (website or app) and on average the most frequent customers do not experience learning effects.,fabian ocker,Not available,2018.0,10.1007/s12525-018-0295-4,Electronic Markets,Fabian2018,False,,Springer,Not available,“Bid more pay less” – overbidding and the Bidder’s curse in teleshopping auctions,00c3cf62165178d3790d02daed7627e7,http://dx.doi.org/10.1007/s12525-018-0295-4 508,An English auction is studied in which bidders can acquire information during the bidding process allowing for heterogeneity both in ex-ante private information and the cost of information acquisition. The best response has a simple characterization where the optimal information acquisition time is unaffected by the other bidders’ strategies. We prove the existence of an equilibrium in a novel way by characterizing it as a fixed point in the space of bid distributions rather than the space of bid functions. Furthermore we show that when bidders have homogeneous ex-ante private information about valuations: (1) The English auction generates more revenue than the Vickrey auction when the number of bidders is sufficiently large; and (2) the English auction is more efficient than the Vickrey auction when the information acquisition cost are relatively small. We present numerical simulations that show that these effects can be large. Our findings provide an additional explanation for the popularity of the English auction even in settings where the bidders’ valuations are independent.,leonardo rezende,Not available,2018.0,10.1007/s00199-017-1038-z,Economic Theory,Leonardo2018,False,,Springer,Not available,Mid-auction information acquisition,5372cab08e7f4e61a3ad83c32022a41b,http://dx.doi.org/10.1007/s00199-017-1038-z 509,I investigate the incentives to release information in markets in which auctioneers running second-price auctions compete for buyers by releasing information about their products before buyers decide in which auction they wish to participate. I provide sufficient conditions for the existence of an equilibrium in which both sellers release information even if there are only two buyers in the market. This result is in contrast to previous findings reported in the literature showing that the optimal decision for a monopolist facing a fixed set of two buyers is to not release any information. Thus the results of the paper suggest that competition between auctioneers strengthens the incentives to release information in markets in which selling mechanisms are second-price auctions.,cristian troncoso-valverde,Not available,2018.0,10.1007/s00199-017-1039-y,Economic Theory,Cristián2018,False,,Springer,Not available,Releasing information in private-value second-price auctions,55082076c6ba1fbbca1050dc77fc7254,http://dx.doi.org/10.1007/s00199-017-1039-y 510,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,junwu zhu,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 511,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,heng song,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 512,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,yi jiang,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 513,In an environment with dynamic arrivals of players who wish to purchase only one of multiple identical objects for which they have a private value we analyze a sequential auction mechanism with an activity rule. If the players play undominated strategies then we are able to bound the efficiency loss compared to an optimal mechanism that maximizes the total welfare. We have no assumptions on the underlying distribution from which the players’ arrival times and valuations for the object are drawn. Moreover we have no assumption of a common prior on this distribution.,ella segev,Not available,2014.0,10.1007/s00182-013-0405-7,International Journal of Game Theory,Ron2014,False,,Springer,Not available,Efficiency levels in sequential auctions with dynamic arrivals,6999e22c1741d44fc0fee82388644e19,http://dx.doi.org/10.1007/s00182-013-0405-7 514,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,bin li,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 515,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,gangqiang zhou,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 516,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,jigang wu,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 517,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,long chen,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 518,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,guiyuan jiang,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 519,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,siew-kei lam,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 520,For the recent decade cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed spectrum channels are not being used efficiently. The most critical issue of the cognitive radio networks is how to distribute the idle spectrum channels to the secondary users opportunistically. The auction-based market is desirable for the trade of idle spectrum channels since the secondary users can purchase a channel in timely manner and the licensed primary users can earn the additional profit while not using the channels. Among the auction algorithms proposed for the spectrum market we focus on the TASG framework which consists of two nested auction algorithms because it enables the group-buying of spectrum channels for the secondary users with limited budgets and possesses many positive properties such as budget-balance individual rationality and truthfulness. However the TASG framework is not very attractive to the market participants since the seller earns the small revenue and the buyer has the low utility. In this paper we propose a new auction framework for the spectrum markets called aDaptive and Economically robust Auction-based Leasing (DEAL) that keeps all the benefits of TASG while improving the utility (or revenue) of the participants. To this end we develop an enhanced inner-auction algorithm called the Global Auction algorithm in our DEAL framework and adapt the involved parameters dynamically based on the previous bids from the potential buyers. Simulation results demonstrate that our framework significantly outperforms the previous TASG.,muhammad shafiq,Not available,2018.0,10.1007/s10922-017-9429-9,Journal of Network and Systems Management,Muhammad2018,False,,Springer,Not available,Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks,5f2d1bb317e3becf7d3d1e5d623c7008,http://dx.doi.org/10.1007/s10922-017-9429-9 521,For the recent decade cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed spectrum channels are not being used efficiently. The most critical issue of the cognitive radio networks is how to distribute the idle spectrum channels to the secondary users opportunistically. The auction-based market is desirable for the trade of idle spectrum channels since the secondary users can purchase a channel in timely manner and the licensed primary users can earn the additional profit while not using the channels. Among the auction algorithms proposed for the spectrum market we focus on the TASG framework which consists of two nested auction algorithms because it enables the group-buying of spectrum channels for the secondary users with limited budgets and possesses many positive properties such as budget-balance individual rationality and truthfulness. However the TASG framework is not very attractive to the market participants since the seller earns the small revenue and the buyer has the low utility. In this paper we propose a new auction framework for the spectrum markets called aDaptive and Economically robust Auction-based Leasing (DEAL) that keeps all the benefits of TASG while improving the utility (or revenue) of the participants. To this end we develop an enhanced inner-auction algorithm called the Global Auction algorithm in our DEAL framework and adapt the involved parameters dynamically based on the previous bids from the potential buyers. Simulation results demonstrate that our framework significantly outperforms the previous TASG.,jin-ghoo choi,Not available,2018.0,10.1007/s10922-017-9429-9,Journal of Network and Systems Management,Muhammad2018,False,,Springer,Not available,Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks,5f2d1bb317e3becf7d3d1e5d623c7008,http://dx.doi.org/10.1007/s10922-017-9429-9 522,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,jianfu shen,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 523,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,frederik pretorius,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 524,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,alok gupta,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 525,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,k. chau,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 526,This paper employs and extends the auction method for the re-allocation of emission permits (RAEP) at the China Beijing Environment Exchange (CBEE) to meet pollution reduction targets. An optimization method is first proposed to calculate the optimal production quantity and emission permit demand/supply volume for firms with high/low pollution abatement cost. Then the double auction method is adopted and extended to construct the RAEP double auction mechanism based on the principle of maximizing the total social welfare utility. To further explain this auction method three matching mechanisms are proposed. Each mechanism achieves a balance between supply and demand of emission permits. Finally a computational analysis of the real CBEE case is used to verify both the validity and practicability of the mechanism. The results show that the extended auction method presented in this paper could effectively increase the number of traded participants improve the auction transaction efficiency and increase the utilities of trading participants compared to the auction method currently used in the CBEE; the extended method is always applicable regardless of the size of the permit market; the method could effectively realize the incentive compatibility thus encouraging each firm to provide a real bid price.,jiasen sun,Not available,2018.0,10.1007/s10479-018-2826-y,Annals of Operations Research,Jiasen2018,False,,Springer,Not available,Designing a double auction mechanism for the re-allocation of emission permits,ccb44e53626912f81d9a395a3799bbd4,http://dx.doi.org/10.1007/s10479-018-2826-y 527,This paper employs and extends the auction method for the re-allocation of emission permits (RAEP) at the China Beijing Environment Exchange (CBEE) to meet pollution reduction targets. An optimization method is first proposed to calculate the optimal production quantity and emission permit demand/supply volume for firms with high/low pollution abatement cost. Then the double auction method is adopted and extended to construct the RAEP double auction mechanism based on the principle of maximizing the total social welfare utility. To further explain this auction method three matching mechanisms are proposed. Each mechanism achieves a balance between supply and demand of emission permits. Finally a computational analysis of the real CBEE case is used to verify both the validity and practicability of the mechanism. The results show that the extended auction method presented in this paper could effectively increase the number of traded participants improve the auction transaction efficiency and increase the utilities of trading participants compared to the auction method currently used in the CBEE; the extended method is always applicable regardless of the size of the permit market; the method could effectively realize the incentive compatibility thus encouraging each firm to provide a real bid price.,guo li,Not available,2018.0,10.1007/s10479-018-2826-y,Annals of Operations Research,Jiasen2018,False,,Springer,Not available,Designing a double auction mechanism for the re-allocation of emission permits,ccb44e53626912f81d9a395a3799bbd4,http://dx.doi.org/10.1007/s10479-018-2826-y 528,This paper studies a sales mechanism prevalent in housing markets where the seller does not reveal or commit to a reserve price but instead publicly announces an asking price. We show that the seller sets an asking price such that in equilibrium buyers of certain types would accept it with positive probability. We also show that this sales mechanism with an optimally chosen asking price set prior to the seller learning her value does better than any standard auction with a reserve price equal to the seller’s reservation value. We then extend the analysis to the case where the asking price reveals information about the seller’s reservation value. We show that in this case there is a separating equilibrium with fully-revealing asking prices which is revenue-equivalent to a standard auction with a reserve price set at the seller’s reservation value.,peyman khezr,Not available,2018.0,10.1007/s00182-018-0620-3,International Journal of Game Theory,Peyman2018,False,,Springer,Not available,Auctions with an asking price,6450799e0d946148048745fb2f49e1ed,http://dx.doi.org/10.1007/s00182-018-0620-3 529,This paper studies a sales mechanism prevalent in housing markets where the seller does not reveal or commit to a reserve price but instead publicly announces an asking price. We show that the seller sets an asking price such that in equilibrium buyers of certain types would accept it with positive probability. We also show that this sales mechanism with an optimally chosen asking price set prior to the seller learning her value does better than any standard auction with a reserve price equal to the seller’s reservation value. We then extend the analysis to the case where the asking price reveals information about the seller’s reservation value. We show that in this case there is a separating equilibrium with fully-revealing asking prices which is revenue-equivalent to a standard auction with a reserve price set at the seller’s reservation value.,flavio menezes,Not available,2018.0,10.1007/s00182-018-0620-3,International Journal of Game Theory,Peyman2018,False,,Springer,Not available,Auctions with an asking price,6450799e0d946148048745fb2f49e1ed,http://dx.doi.org/10.1007/s00182-018-0620-3 530,This paper is the first attempt to propose an efficient auction mechanism for the ,xianghua chu,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 531,This paper is the first attempt to propose an efficient auction mechanism for the ,su xu,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 532,This paper is the first attempt to propose an efficient auction mechanism for the ,fulin cai,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 533,This paper is the first attempt to propose an efficient auction mechanism for the ,jiansheng chen,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 534,This paper is the first attempt to propose an efficient auction mechanism for the ,quande qin,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 535,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,stephen parente,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 536,In this paper we consider the problem of computing market equilibrium when utilties are homothetic concave functions. We use the Fisher market model. The problem of finding a tâtonnement process for equilibrium in this case has been the subject of recent papers and determining an approximation is of considerable interest. Our buy-sell algorithm starts with an arbitrary price vector and converges to an ,sanjiv kapoor,Not available,2011.0,10.1007/978-3-642-25510-6_20,Internet and Network Economics,Sanjiv2011,False,,Springer,Not available,Buy-Sell Auction Mechanisms in Market Equilibrium,cbea5473287ccfa7d3090e2175c844d8,http://dx.doi.org/10.1007/978-3-642-25510-6_20 537,Multi-attribute auctions (also called multidimensional auctions) facilitate negotiations based on multiple attributes thus escape from the standard price-only domain into a rich multidimensional domain that can comprise additional attributes like e.g. guarantee conditions or quality. Most multi-attribute preference models used in auction mechanisms are based on a ranking derived from weighted sum. Recently the Reference Point Method (RPM) approach has been applied to express the multi-attribute preference models within the auction mechanisms allowing to overcome the weighted sum drawbacks. The Ordered Weighted RPM model enables us to introduce importance weights to affect achievements importance by rescaling their measures accordingly within the distribution of all achievements. The concept presented and discussed in this paper in the context of procurement auctions takes advantage of the so-called Weighted Ordered Weighted Average (WOWA) aggregations of the partial achievements.,bartosz kozlowski,Not available,2011.0,10.1007/978-3-642-23935-9_29,Computational Collective Intelligence. Technologies and Applications,Bartosz2011,False,,Springer,Not available,On Ordered Weighted Reference Point Model for Multi-attribute Procurement Auctions,6f6e62e027a981e485e5c0cb988ab801,http://dx.doi.org/10.1007/978-3-642-23935-9_29 538,Multi-attribute auctions (also called multidimensional auctions) facilitate negotiations based on multiple attributes thus escape from the standard price-only domain into a rich multidimensional domain that can comprise additional attributes like e.g. guarantee conditions or quality. Most multi-attribute preference models used in auction mechanisms are based on a ranking derived from weighted sum. Recently the Reference Point Method (RPM) approach has been applied to express the multi-attribute preference models within the auction mechanisms allowing to overcome the weighted sum drawbacks. The Ordered Weighted RPM model enables us to introduce importance weights to affect achievements importance by rescaling their measures accordingly within the distribution of all achievements. The concept presented and discussed in this paper in the context of procurement auctions takes advantage of the so-called Weighted Ordered Weighted Average (WOWA) aggregations of the partial achievements.,wlodzimierz ogryczak,Not available,2011.0,10.1007/978-3-642-23935-9_29,Computational Collective Intelligence. Technologies and Applications,Bartosz2011,False,,Springer,Not available,On Ordered Weighted Reference Point Model for Multi-attribute Procurement Auctions,6f6e62e027a981e485e5c0cb988ab801,http://dx.doi.org/10.1007/978-3-642-23935-9_29 539,Freight business is a huge market with strong competition. In many companies planning and routing software has been introduced and optimization potentials have been widely exploited. To further improve efficiency especially the small and medium sized carriers have to cooperate beyond enterprise boundaries. A promising approach to exchange transportation requests between freight carriers is provided by combinatorial auctions and exchanges. They allow bundles of items to be traded thereby allowing participants to express complex synergies.In this paper we discuss various goals for a combinatorial request exchange in freight logistics and provide the reasoning for our design decisions. All goals aim to improve usefulness in a practical environment of less-than-truckload (LTL) carriers. We provide experimental results for both generated and real-life data that show significant savings and are often close to a heuristic solution for the global optimization problem. We study how bundling and restricting the number of submitted bids affect the solution quality.,heiner ackermann,Not available,2011.0,10.1007/978-3-642-24264-9_1,Computational Logistics,Heiner2011,False,,Springer,Not available,Combinatorial Auctions in Freight Logistics,794fb144922fa173183ef7d850d44a26,http://dx.doi.org/10.1007/978-3-642-24264-9_1 540,Freight business is a huge market with strong competition. In many companies planning and routing software has been introduced and optimization potentials have been widely exploited. To further improve efficiency especially the small and medium sized carriers have to cooperate beyond enterprise boundaries. A promising approach to exchange transportation requests between freight carriers is provided by combinatorial auctions and exchanges. They allow bundles of items to be traded thereby allowing participants to express complex synergies.In this paper we discuss various goals for a combinatorial request exchange in freight logistics and provide the reasoning for our design decisions. All goals aim to improve usefulness in a practical environment of less-than-truckload (LTL) carriers. We provide experimental results for both generated and real-life data that show significant savings and are often close to a heuristic solution for the global optimization problem. We study how bundling and restricting the number of submitted bids affect the solution quality.,hendrik ewe,Not available,2011.0,10.1007/978-3-642-24264-9_1,Computational Logistics,Heiner2011,False,,Springer,Not available,Combinatorial Auctions in Freight Logistics,794fb144922fa173183ef7d850d44a26,http://dx.doi.org/10.1007/978-3-642-24264-9_1 541,Freight business is a huge market with strong competition. In many companies planning and routing software has been introduced and optimization potentials have been widely exploited. To further improve efficiency especially the small and medium sized carriers have to cooperate beyond enterprise boundaries. A promising approach to exchange transportation requests between freight carriers is provided by combinatorial auctions and exchanges. They allow bundles of items to be traded thereby allowing participants to express complex synergies.In this paper we discuss various goals for a combinatorial request exchange in freight logistics and provide the reasoning for our design decisions. All goals aim to improve usefulness in a practical environment of less-than-truckload (LTL) carriers. We provide experimental results for both generated and real-life data that show significant savings and are often close to a heuristic solution for the global optimization problem. We study how bundling and restricting the number of submitted bids affect the solution quality.,herbert kopfer,Not available,2011.0,10.1007/978-3-642-24264-9_1,Computational Logistics,Heiner2011,False,,Springer,Not available,Combinatorial Auctions in Freight Logistics,794fb144922fa173183ef7d850d44a26,http://dx.doi.org/10.1007/978-3-642-24264-9_1 542,Freight business is a huge market with strong competition. In many companies planning and routing software has been introduced and optimization potentials have been widely exploited. To further improve efficiency especially the small and medium sized carriers have to cooperate beyond enterprise boundaries. A promising approach to exchange transportation requests between freight carriers is provided by combinatorial auctions and exchanges. They allow bundles of items to be traded thereby allowing participants to express complex synergies.In this paper we discuss various goals for a combinatorial request exchange in freight logistics and provide the reasoning for our design decisions. All goals aim to improve usefulness in a practical environment of less-than-truckload (LTL) carriers. We provide experimental results for both generated and real-life data that show significant savings and are often close to a heuristic solution for the global optimization problem. We study how bundling and restricting the number of submitted bids affect the solution quality.,karl-heinz kufer,Not available,2011.0,10.1007/978-3-642-24264-9_1,Computational Logistics,Heiner2011,False,,Springer,Not available,Combinatorial Auctions in Freight Logistics,794fb144922fa173183ef7d850d44a26,http://dx.doi.org/10.1007/978-3-642-24264-9_1 543,We study the problem of mechanism design for a double auction market where multiple buyers and sellers buy and sell a commodity. We design and implement a matching algorithm that maximizes market liquidity including the number of transactions and buy/sell-volume. We prove that given the number of matches the algorithm also maximizes auctioneer’s profit. Based on the CAT Tournament (Trading Agent Competition Market Design) platform we show with experiments that the new matching method not only increases market liquidity but also significantly improves market share and auctioneer’s profit in the long term compared with equilibrium matching the most commonly used matching method.,dengji zhao,Not available,2011.0,10.1007/978-3-642-17432-2_52,AI 2010: Advances in Artificial Intelligence,Dengji2011,False,,Springer,Not available,Maximal Matching for Double Auction,c78292538857975bf52ac2b3c7465a7e,http://dx.doi.org/10.1007/978-3-642-17432-2_52 544,We study the problem of mechanism design for a double auction market where multiple buyers and sellers buy and sell a commodity. We design and implement a matching algorithm that maximizes market liquidity including the number of transactions and buy/sell-volume. We prove that given the number of matches the algorithm also maximizes auctioneer’s profit. Based on the CAT Tournament (Trading Agent Competition Market Design) platform we show with experiments that the new matching method not only increases market liquidity but also significantly improves market share and auctioneer’s profit in the long term compared with equilibrium matching the most commonly used matching method.,dongmo zhang,Not available,2011.0,10.1007/978-3-642-17432-2_52,AI 2010: Advances in Artificial Intelligence,Dengji2011,False,,Springer,Not available,Maximal Matching for Double Auction,c78292538857975bf52ac2b3c7465a7e,http://dx.doi.org/10.1007/978-3-642-17432-2_52 545,We study the problem of mechanism design for a double auction market where multiple buyers and sellers buy and sell a commodity. We design and implement a matching algorithm that maximizes market liquidity including the number of transactions and buy/sell-volume. We prove that given the number of matches the algorithm also maximizes auctioneer’s profit. Based on the CAT Tournament (Trading Agent Competition Market Design) platform we show with experiments that the new matching method not only increases market liquidity but also significantly improves market share and auctioneer’s profit in the long term compared with equilibrium matching the most commonly used matching method.,md khan,Not available,2011.0,10.1007/978-3-642-17432-2_52,AI 2010: Advances in Artificial Intelligence,Dengji2011,False,,Springer,Not available,Maximal Matching for Double Auction,c78292538857975bf52ac2b3c7465a7e,http://dx.doi.org/10.1007/978-3-642-17432-2_52 546,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,pallab sanyal,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 547,We study the problem of mechanism design for a double auction market where multiple buyers and sellers buy and sell a commodity. We design and implement a matching algorithm that maximizes market liquidity including the number of transactions and buy/sell-volume. We prove that given the number of matches the algorithm also maximizes auctioneer’s profit. Based on the CAT Tournament (Trading Agent Competition Market Design) platform we show with experiments that the new matching method not only increases market liquidity but also significantly improves market share and auctioneer’s profit in the long term compared with equilibrium matching the most commonly used matching method.,laurent perrussel,Not available,2011.0,10.1007/978-3-642-17432-2_52,AI 2010: Advances in Artificial Intelligence,Dengji2011,False,,Springer,Not available,Maximal Matching for Double Auction,c78292538857975bf52ac2b3c7465a7e,http://dx.doi.org/10.1007/978-3-642-17432-2_52 548,In recent years Internet auctions have become increasingly widespread. The Independent Private Values (IPV) model is widely used in the studying of auction behaviour and plays a fundamental role in many analyses of Internet auction performance. This model assumes privacy and independence meaning that the private values of buyers are drawn from a common distribution or in probabilistic terms the series of values are independent and identically distributed. Since a general stochastic analysis is intractable the IPV model has a significant impact on auction behaviour. In this paper we study auction performance using an auction process simulator considering both the hard close and soft close types of Internet auctions. From our experimental findings we are able to establish quantitative relationships between the different auction process parameters and also to deploy suitable IPV distributions in modelling the characteristics of different communities of bidders.,timothy leung,Not available,2011.0,10.1007/978-3-642-22603-8_21,Digital Enterprise and Information Systems,Timothy2011,False,,Springer,Not available,The Effect of Private Valuation on E-Auction Revenues,16d0609e423ba86d1556d77af0cd32e7,http://dx.doi.org/10.1007/978-3-642-22603-8_21 549,In recent years Internet auctions have become increasingly widespread. The Independent Private Values (IPV) model is widely used in the studying of auction behaviour and plays a fundamental role in many analyses of Internet auction performance. This model assumes privacy and independence meaning that the private values of buyers are drawn from a common distribution or in probabilistic terms the series of values are independent and identically distributed. Since a general stochastic analysis is intractable the IPV model has a significant impact on auction behaviour. In this paper we study auction performance using an auction process simulator considering both the hard close and soft close types of Internet auctions. From our experimental findings we are able to establish quantitative relationships between the different auction process parameters and also to deploy suitable IPV distributions in modelling the characteristics of different communities of bidders.,william knottenbelt,Not available,2011.0,10.1007/978-3-642-22603-8_21,Digital Enterprise and Information Systems,Timothy2011,False,,Springer,Not available,The Effect of Private Valuation on E-Auction Revenues,16d0609e423ba86d1556d77af0cd32e7,http://dx.doi.org/10.1007/978-3-642-22603-8_21 550,Most developed countries allocate radio spectrum by auction. The Simultaneous Ascending Auction (SAA) has proven to work well for this application. Recently new designs that allow package bidding have been proposed. These designs have only been tried in the past few years. We first provide some historical background regarding the allocation of spectrum describe the use of the SAA design and its modifications over the past 15 years and then highlight the new advances in combinatorial auction designs and their use for the allocation of spectrum.,karla hoffman,Not available,2011.0,10.1007/978-1-4419-6111-2_7,Wireless Network Design,Karla2011,False,,Springer,Not available,Spectrum Auctions,575055492f9b3750922c862c651f5248,http://dx.doi.org/10.1007/978-1-4419-6111-2_7 551,This paper focuses on multi-agent contract formation by automated negotiation. Commonly individuals are not willing to share information or cooperate and negotiation protocols may give way to unwanted strategic behavior. Socially beneficial contract agreements require a lot of negotiation time. Furthermore possible interdependencies of contract items lead to complex contract spaces which restrain contract agreements. Therefore we propose a novel negotiation protocol applying combinatorial auctions for contract formation which consider interdependencies and yield a rapid decision rights allocation. Additionally this market-based approach utilizes Vickrey-Clarkes-Groves-mechanisms which may lead to truthful preference uncovering and information sharing through bids. However combinatorial auctions have a computational drawback: winner determination is ,fabian lang,Not available,2011.0,10.1007/978-3-642-23857-4_33,Adaptive and Intelligent Systems,Fabian2011,False,,Springer,Not available,A Combinatorial Auction Negotiation Protocol for Time-Restricted Group Decisions,e318d4bb70ee15b3f89f82788af28fa5,http://dx.doi.org/10.1007/978-3-642-23857-4_33 552,This paper focuses on multi-agent contract formation by automated negotiation. Commonly individuals are not willing to share information or cooperate and negotiation protocols may give way to unwanted strategic behavior. Socially beneficial contract agreements require a lot of negotiation time. Furthermore possible interdependencies of contract items lead to complex contract spaces which restrain contract agreements. Therefore we propose a novel negotiation protocol applying combinatorial auctions for contract formation which consider interdependencies and yield a rapid decision rights allocation. Additionally this market-based approach utilizes Vickrey-Clarkes-Groves-mechanisms which may lead to truthful preference uncovering and information sharing through bids. However combinatorial auctions have a computational drawback: winner determination is ,andreas fink,Not available,2011.0,10.1007/978-3-642-23857-4_33,Adaptive and Intelligent Systems,Fabian2011,False,,Springer,Not available,A Combinatorial Auction Negotiation Protocol for Time-Restricted Group Decisions,e318d4bb70ee15b3f89f82788af28fa5,http://dx.doi.org/10.1007/978-3-642-23857-4_33 553,The revenue between Dutch auction American auction and hybrid auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China’s treasury auction market to examine the revenue between Dutch auction American auction and hybrid auction. The paper has three important conclusions and the hybrid auction can prevent the winner’s course and collusion. It is the better treasury auction format for the seller.,yanping bai,Not available,2011.0,10.1007/978-3-642-23020-2_19,Advances in Applied Economics Business and Development,Yanping2011,False,,Springer,Not available,Empirical Study of Treasury Auction Formats,32c57361b22ce0a6a80692632817eac6,http://dx.doi.org/10.1007/978-3-642-23020-2_19 554,The revenue between Dutch auction American auction and hybrid auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China’s treasury auction market to examine the revenue between Dutch auction American auction and hybrid auction. The paper has three important conclusions and the hybrid auction can prevent the winner’s course and collusion. It is the better treasury auction format for the seller.,yu zhang,Not available,2011.0,10.1007/978-3-642-23020-2_19,Advances in Applied Economics Business and Development,Yanping2011,False,,Springer,Not available,Empirical Study of Treasury Auction Formats,32c57361b22ce0a6a80692632817eac6,http://dx.doi.org/10.1007/978-3-642-23020-2_19 555,This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face in sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers who have the choice of either selling their good directly or through a priced option after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show for a setting where the competition is formed by local bidders that using options can increase the expected profit for both buyers and sellers.We then perform a comprehensive experimental analysis of our mechanism for different market settings both with a single synergy bidder as well as with multiple synergy bidders are active simultaneously. By comparison to our previous work [18 17] this paper does not focus on analytical results and detailed proofs for the theorems (which are comprehensively reported in Mous et. al. ’08 [18]) but it does give more detailed experimental results than reported in previous wok.,lonneke mous,Not available,2011.0,10.1007/978-3-642-15612-0_1,Innovations in Agent-Based Complex Automated Negotiations,Lonneke2011,False,,Springer,Not available,Simulation of Sequential Auction Markets Using Priced Options to Reduce Bidder Exposure,bd40790e78a84e015fc10247ce21e85a,http://dx.doi.org/10.1007/978-3-642-15612-0_1 556,This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face in sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers who have the choice of either selling their good directly or through a priced option after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show for a setting where the competition is formed by local bidders that using options can increase the expected profit for both buyers and sellers.We then perform a comprehensive experimental analysis of our mechanism for different market settings both with a single synergy bidder as well as with multiple synergy bidders are active simultaneously. By comparison to our previous work [18 17] this paper does not focus on analytical results and detailed proofs for the theorems (which are comprehensively reported in Mous et. al. ’08 [18]) but it does give more detailed experimental results than reported in previous wok.,valentin robu,Not available,2011.0,10.1007/978-3-642-15612-0_1,Innovations in Agent-Based Complex Automated Negotiations,Lonneke2011,False,,Springer,Not available,Simulation of Sequential Auction Markets Using Priced Options to Reduce Bidder Exposure,bd40790e78a84e015fc10247ce21e85a,http://dx.doi.org/10.1007/978-3-642-15612-0_1 557,This research is an empirical study to find solid statistical evidence of collusion inauction for construction contracts and to gauge the possible effects of bid-rigging onauction prices in Korea. Using limited information contained in sketch bid data weshow that local construction firms enjoy statistically significant incumbency premiumsin their incumbent sites. Thus it is inferred that contractors engage in complementarybidding in which all bidders except one submit high bids so as to lose. The statisticalevidence of the incumbency effect is also confirmed in long-running civil engineeringconstruction contracts which are carried out over several years. Utilizing the transitionfrom a cooperative to non-cooperative regime we also estimate the potential damage ofstructural bid rigging in public-works contracts by year contractor and construction type. The estimated overcharge ratio based on a forecasting approach is 15.5% of the total expenditures from January 1995 to June 1998. We also present potential damage estimates by the firm. The estimated overcharge by contractor offers a guideline for the proper allocation of the total overcharges to construction contractors in case contractors are charged with bid-rigging and found guilty.,in lee,Not available,2002.0,10.1023/A:1016018505021,Review of Industrial Organization,Kwon2002,False,,Springer,Not available,Bid-Rigging in Auctions for Korean Public-Works Contracts and Potential Damage,e79ee9371826cf7254f558906ca9bfd1,http://dx.doi.org/10.1023/A:1016018505021 558,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,evan kwerel,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 559,This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face in sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers who have the choice of either selling their good directly or through a priced option after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show for a setting where the competition is formed by local bidders that using options can increase the expected profit for both buyers and sellers.We then perform a comprehensive experimental analysis of our mechanism for different market settings both with a single synergy bidder as well as with multiple synergy bidders are active simultaneously. By comparison to our previous work [18 17] this paper does not focus on analytical results and detailed proofs for the theorems (which are comprehensively reported in Mous et. al. ’08 [18]) but it does give more detailed experimental results than reported in previous wok.,han poutre,Not available,2011.0,10.1007/978-3-642-15612-0_1,Innovations in Agent-Based Complex Automated Negotiations,Lonneke2011,False,,Springer,Not available,Simulation of Sequential Auction Markets Using Priced Options to Reduce Bidder Exposure,bd40790e78a84e015fc10247ce21e85a,http://dx.doi.org/10.1007/978-3-642-15612-0_1 560,Sponsored Search Auctions (SSA) are gaining widespread attention in web commerce community because of their highly targeted customers and billion dollars revenue generating online market. Unlike other form of auctions this class possesses fairly complex interaction among its key players Users Advertisers and Search Engines. Therefore research issues pertaining to SSA are being explored with large momentum in eclectic domains e.g. game theory algorithmic theory and machine learning etc. Though problems related to different pricing schemes in SSA need more focus from researchers especially in analyzing adaptive pricing measures .This work is an effort towards making diligent use of information available in terms of different auctions’ situations by ingraining best of major popular pricing schemes in which switching among pricing is made by hierarchical fuzzy classification. Effectiveness of the proposed scheme is illustrated through experimental results.,madhu kumari,Not available,2011.0,10.1007/978-3-642-22555-0_7,Advances in Computing and Information Technology,Madhu2011,False,,Springer,Not available,An Adaptive Pricing Scheme in Sponsored Search Auction: A Hierarchical Fuzzy Classification Approach,746b3ef47c92feb81b8304e9b2ad5b76,http://dx.doi.org/10.1007/978-3-642-22555-0_7 561,Sponsored Search Auctions (SSA) are gaining widespread attention in web commerce community because of their highly targeted customers and billion dollars revenue generating online market. Unlike other form of auctions this class possesses fairly complex interaction among its key players Users Advertisers and Search Engines. Therefore research issues pertaining to SSA are being explored with large momentum in eclectic domains e.g. game theory algorithmic theory and machine learning etc. Though problems related to different pricing schemes in SSA need more focus from researchers especially in analyzing adaptive pricing measures .This work is an effort towards making diligent use of information available in terms of different auctions’ situations by ingraining best of major popular pricing schemes in which switching among pricing is made by hierarchical fuzzy classification. Effectiveness of the proposed scheme is illustrated through experimental results.,kamal bharadwaj,Not available,2011.0,10.1007/978-3-642-22555-0_7,Advances in Computing and Information Technology,Madhu2011,False,,Springer,Not available,An Adaptive Pricing Scheme in Sponsored Search Auction: A Hierarchical Fuzzy Classification Approach,746b3ef47c92feb81b8304e9b2ad5b76,http://dx.doi.org/10.1007/978-3-642-22555-0_7 562,When autonomous agents decide on their bidding strategies in real world auctions they have a number of concerns that go beyond the models that are normally analyzed in traditional auction theory. Oftentimes the agents have budget constraints and the auctions have a reserve price both of which restrict the bids the agents can place. In addition their attitude need not be risk-neutral and they may have uncertainty about the value of the goods they are buying. Some of these issues have been examined individually for single-unit sealed-bid auctions. However in this paper we extend this analysis to the multi-unit case and also analyze the multi-unit sealed-bid auctions in which a combination of these issues are present for unit-demand bidders. This analysis constitutes the main contribution of this paper. We then demonstrate the usefulness in practice of this analysis; we show in simulations that taking into account all these issues allows the bidders to maximize their utility. Furthermore using this analysis allows a seller to improve her revenue i.e. by selecting the optimal reserve price and auction format.,ioannis vetsikas,Not available,2010.0,10.1007/s10458-009-9109-6,Autonomous Agents and Multi-Agent Systems,A.2010,False,,Springer,Not available,Bidding strategies for realistic multi-unit sealed-bid auctions,5d1f4b75518ccdf8f98069d056b0a7e0,http://dx.doi.org/10.1007/s10458-009-9109-6 563,When autonomous agents decide on their bidding strategies in real world auctions they have a number of concerns that go beyond the models that are normally analyzed in traditional auction theory. Oftentimes the agents have budget constraints and the auctions have a reserve price both of which restrict the bids the agents can place. In addition their attitude need not be risk-neutral and they may have uncertainty about the value of the goods they are buying. Some of these issues have been examined individually for single-unit sealed-bid auctions. However in this paper we extend this analysis to the multi-unit case and also analyze the multi-unit sealed-bid auctions in which a combination of these issues are present for unit-demand bidders. This analysis constitutes the main contribution of this paper. We then demonstrate the usefulness in practice of this analysis; we show in simulations that taking into account all these issues allows the bidders to maximize their utility. Furthermore using this analysis allows a seller to improve her revenue i.e. by selecting the optimal reserve price and auction format.,nicholas jennings,Not available,2010.0,10.1007/s10458-009-9109-6,Autonomous Agents and Multi-Agent Systems,A.2010,False,,Springer,Not available,Bidding strategies for realistic multi-unit sealed-bid auctions,5d1f4b75518ccdf8f98069d056b0a7e0,http://dx.doi.org/10.1007/s10458-009-9109-6 564,This paper introduces a bi-objective winner determination problem which arises in the procurement of transportation contracts via combinatorial auctions where bundle bidding is possible. The problem is modelled as a bi-objective extension to the set covering problem. We consider both the minimisation of the total procurement costs and the maximisation of the service-quality level at which the transportation contracts are executed. Taking into account the size of real-world transport auctions a solution method has to cope with problems of up to some hundred contracts and a few thousand bundle bids. To solve the problem we propose a bi-objective branch-and-bound algorithm and eight variants of a multiobjective genetic algorithm. Artificial benchmark instances that comply with important economic features of the transport domain are introduced to evaluate the methods. The branch-and-bound approach is able to find the optimal trade-off solutions in reasonable time for very small instances only. The eight variants of the genetic algorithm are compared among each other by means of large instances. The best variant is also evaluated using the small instances with known optimal solutions. The results indicate that the performance largely depends on the initialisation heuristic and suggest also that a well-balanced combination of genetic operators is crucial to obtain good solutions.,tobias buer,Not available,2010.0,10.1007/s12159-010-0031-8,Logistics Research,Tobias2010,False,,Springer,Not available,Solving a bi-objective winner determination problem in a transportation procurement auction,57e74b06b92902d364f4f78e67581d34,http://dx.doi.org/10.1007/s12159-010-0031-8 565,This paper introduces a bi-objective winner determination problem which arises in the procurement of transportation contracts via combinatorial auctions where bundle bidding is possible. The problem is modelled as a bi-objective extension to the set covering problem. We consider both the minimisation of the total procurement costs and the maximisation of the service-quality level at which the transportation contracts are executed. Taking into account the size of real-world transport auctions a solution method has to cope with problems of up to some hundred contracts and a few thousand bundle bids. To solve the problem we propose a bi-objective branch-and-bound algorithm and eight variants of a multiobjective genetic algorithm. Artificial benchmark instances that comply with important economic features of the transport domain are introduced to evaluate the methods. The branch-and-bound approach is able to find the optimal trade-off solutions in reasonable time for very small instances only. The eight variants of the genetic algorithm are compared among each other by means of large instances. The best variant is also evaluated using the small instances with known optimal solutions. The results indicate that the performance largely depends on the initialisation heuristic and suggest also that a well-balanced combination of genetic operators is crucial to obtain good solutions.,giselher pankratz,Not available,2010.0,10.1007/s12159-010-0031-8,Logistics Research,Tobias2010,False,,Springer,Not available,Solving a bi-objective winner determination problem in a transportation procurement auction,57e74b06b92902d364f4f78e67581d34,http://dx.doi.org/10.1007/s12159-010-0031-8 566,This survey brings together theoretical and empirical questions that have been addressed in the economic literature on eBay focusing on understanding the behavior of buyers and sellers. We discuss several puzzles of bidder behavior and the explanations that have been put forward by the literature for each. We then discuss structural estimates of bidder behavior and measuring the consumer surplus derived from eBay. We then try to understand why there are so many selling formats being used simultaneously and then focus on the critical decision variables for a seller in an eBay English auction. Finally we analyze how trustworthy eBay sellers are on average and whether the feedback system provides strong incentives for good behavior.,kevin hasker,Not available,2010.0,10.1007/s11151-010-9257-5,Review of Industrial Organization,Kevin2010,False,,Springer,Not available,eBay in the Economic Literature: Analysis of an Auction Marketplace,18b142675bf0b5c7ed517046a8eb3367,http://dx.doi.org/10.1007/s11151-010-9257-5 567,This survey brings together theoretical and empirical questions that have been addressed in the economic literature on eBay focusing on understanding the behavior of buyers and sellers. We discuss several puzzles of bidder behavior and the explanations that have been put forward by the literature for each. We then discuss structural estimates of bidder behavior and measuring the consumer surplus derived from eBay. We then try to understand why there are so many selling formats being used simultaneously and then focus on the critical decision variables for a seller in an eBay English auction. Finally we analyze how trustworthy eBay sellers are on average and whether the feedback system provides strong incentives for good behavior.,robin sickles,Not available,2010.0,10.1007/s11151-010-9257-5,Review of Industrial Organization,Kevin2010,False,,Springer,Not available,eBay in the Economic Literature: Analysis of an Auction Marketplace,18b142675bf0b5c7ed517046a8eb3367,http://dx.doi.org/10.1007/s11151-010-9257-5 568,Experiments on second-price sealed-bid private value auctions have established that subjects typically bid more than their value despite the fact that value bidding is a dominant strategy in such auctions. Moreover the laboratory evidence shows that subjects do not learn to bid their values as they gain more experience. In the present paper we re-examine the second-price auction data from Kagel and Levin’s (Econ J 103:868–879 1993) classic paper. We find that auction efficiency increases over time even though the frequency of overbidding is unchanged. We argue that the rise in efficiency is due to a decline in the variability of overbidding. This is consistent with subjects’ learning to bid more like each other.,rodney garratt,Not available,2010.0,10.1007/s11151-010-9255-7,Review of Industrial Organization,J.2010,True,,Springer,Not available,Efficiency in Second-Price Auctions: A New Look at Old Data,bf6b7af43be7851f7ad9cb6338d33d13,http://dx.doi.org/10.1007/s11151-010-9255-7 569,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,paul lafontaine,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 570,Experiments on second-price sealed-bid private value auctions have established that subjects typically bid more than their value despite the fact that value bidding is a dominant strategy in such auctions. Moreover the laboratory evidence shows that subjects do not learn to bid their values as they gain more experience. In the present paper we re-examine the second-price auction data from Kagel and Levin’s (Econ J 103:868–879 1993) classic paper. We find that auction efficiency increases over time even though the frequency of overbidding is unchanged. We argue that the rise in efficiency is due to a decline in the variability of overbidding. This is consistent with subjects’ learning to bid more like each other.,john wooders,Not available,2010.0,10.1007/s11151-010-9255-7,Review of Industrial Organization,J.2010,True,,Springer,Not available,Efficiency in Second-Price Auctions: A New Look at Old Data,bf6b7af43be7851f7ad9cb6338d33d13,http://dx.doi.org/10.1007/s11151-010-9255-7 571,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",r malaga,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 572,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",d porter,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 573,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",k ord,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 574,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",b montano,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 575,Day and Milgrom (Int J Game Theory 36:393–407 2008) argue that package auctions that select the seller’s minimum revenue in the Core are revenue-monotone. We show that no bidder-optimal Core-selecting auction can satisfy revenue-monotonicity for general preferences when there are at least three goods for sale while the property holds for any bidder-optimal Core-selecting auction in environments with only two goods or if the characteristic function is submodular.,laurent lamy,Not available,2010.0,10.1007/s00182-009-0188-z,International Journal of Game Theory,Laurent2010,False,,Springer,Not available,Core-selecting package auctions: a comment on revenue-monotonicity,e48df02163be0dc3d321ec9b5531bcf1,http://dx.doi.org/10.1007/s00182-009-0188-z 576,We study private-value auctions with ,gadi fibich,Not available,2010.0,10.1007/s00182-009-0181-6,International Journal of Game Theory,Gadi2010,False,,Springer,Not available,Large auctions with risk-averse bidders,354108c0c5f89811e895a1bfb0234b55,http://dx.doi.org/10.1007/s00182-009-0181-6 577,We study private-value auctions with ,arieh gavious,Not available,2010.0,10.1007/s00182-009-0181-6,International Journal of Game Theory,Gadi2010,False,,Springer,Not available,Large auctions with risk-averse bidders,354108c0c5f89811e895a1bfb0234b55,http://dx.doi.org/10.1007/s00182-009-0181-6 578,This paper explores how seller reputation affects auction prices using detailed Taiwanese data. Our empirical results show that returns to reputation are nonlinear and differ considerably across different reputation scores. Marginal returns to scores drop sharply after the first reputation quartile indicating that building up sellers’ reputation is extremely important especially in the early stage. Our study reveals that the mechanism of seller reputations is effective in mitigating asymmetric information in online auctions.,chia-hung sun,Not available,2010.0,10.1007/s11187-008-9160-8,Small Business Economics,Chia-Hung2010,False,,Springer,Not available,Information asymmetry and small business in online auction market,65a8437113cdd12a94d75dc4e349c1f4,http://dx.doi.org/10.1007/s11187-008-9160-8 579,This paper explores how seller reputation affects auction prices using detailed Taiwanese data. Our empirical results show that returns to reputation are nonlinear and differ considerably across different reputation scores. Marginal returns to scores drop sharply after the first reputation quartile indicating that building up sellers’ reputation is extremely important especially in the early stage. Our study reveals that the mechanism of seller reputations is effective in mitigating asymmetric information in online auctions.,kang liu,Not available,2010.0,10.1007/s11187-008-9160-8,Small Business Economics,Chia-Hung2010,False,,Springer,Not available,Information asymmetry and small business in online auction market,65a8437113cdd12a94d75dc4e349c1f4,http://dx.doi.org/10.1007/s11187-008-9160-8 580,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,marius schwartz,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 581,We analyze first-price equilibrium bidding behavior of capacity-constrained firms in a sequence of two procurement auctions. In the model firms with a cost advantage in completing the project auctioned off at the end of the sequence may enter the unfavored first auction hoping to lose it. Equilibrium bidding in both auctions deviates from the standard Symmetric Independent Private Value auction model due to opportunity costs of bidding created by possibly employed capacity. For this sequential auction model with non-identical objects we show that revenue equivalence applies.,j. reiss,Not available,2010.0,10.1007/s00199-008-0428-7,Economic Theory,Philipp2010,True,,Springer,Not available,First-price equilibrium and revenue equivalence in a sequential procurement auction model,00de31d0a72ba9f891bd73e35f36332c,http://dx.doi.org/10.1007/s00199-008-0428-7 582,We analyze first-price equilibrium bidding behavior of capacity-constrained firms in a sequence of two procurement auctions. In the model firms with a cost advantage in completing the project auctioned off at the end of the sequence may enter the unfavored first auction hoping to lose it. Equilibrium bidding in both auctions deviates from the standard Symmetric Independent Private Value auction model due to opportunity costs of bidding created by possibly employed capacity. For this sequential auction model with non-identical objects we show that revenue equivalence applies.,jens schondube,Not available,2010.0,10.1007/s00199-008-0428-7,Economic Theory,Philipp2010,True,,Springer,Not available,First-price equilibrium and revenue equivalence in a sequential procurement auction model,00de31d0a72ba9f891bd73e35f36332c,http://dx.doi.org/10.1007/s00199-008-0428-7 583,Cooperative game theory is proposed to be used for analyzing the results of network auctions. The main properties of cooperative games simulating network markets such as superadditivity the nonempty core and convexity are studied. Cooperative game theory is used to analyze one of the laboratory network markets studied at the Laboratory for Experimental Economics at the Moscow Institute of Physics and Technology and Computer Center Russian Academy of Science,i. men'shikov,Not available,2010.0,10.1134/S2070048210020067,Mathematical Models and Computer Simulations,S.2010,False,,Springer,Not available,Game models of network auctions and their laboratory researches,15435011280c20af090b164f9c5c30cc,http://dx.doi.org/10.1134/S2070048210020067 584,Cooperative game theory is proposed to be used for analyzing the results of network auctions. The main properties of cooperative games simulating network markets such as superadditivity the nonempty core and convexity are studied. Cooperative game theory is used to analyze one of the laboratory network markets studied at the Laboratory for Experimental Economics at the Moscow Institute of Physics and Technology and Computer Center Russian Academy of Science,v. platonov,Not available,2010.0,10.1134/S2070048210020067,Mathematical Models and Computer Simulations,S.2010,False,,Springer,Not available,Game models of network auctions and their laboratory researches,15435011280c20af090b164f9c5c30cc,http://dx.doi.org/10.1134/S2070048210020067 585,This article studies the optimal design of scoring auctions used in public and private procurement. In this auction each supplier’s offer consists of both price and quality and a supplier whose offer achieves the highest score wins. The environment we consider has the feature that quality is multidimensional and the cost complementarity or cost substitutability among quality attributes significantly affects the form of a scoring rule which implements the buyer’s optimal mechanism. Our results show that the optimal scoring rule can be additively separable in the quality attributes if the degree of cost substitutability between the attributes is nonpositive and it cannot be additively separable if the degree is sufficiently high. An example shows how to compute the buyer’s loss from using an additively separable scoring rule. We also investigate how the optimal scoring rule depends on the buyer’s weight parameter on suppliers’ profits and the number of suppliers.,takeshi nishimura,Not available,2015.0,10.1007/s10058-015-0169-6,Review of Economic Design,Takeshi2015,False,,Springer,Not available,Optimal design of scoring auctions with multidimensional quality,f735fc3f9fdfabcfa0795a1198385fe0,http://dx.doi.org/10.1007/s10058-015-0169-6 586,This paper examines an efficient market organization for awarding monopoly franchises to assure investment efficiency and revenue sufficiency under conditions of increasing returns. A two-stage auction design achieves ex ante and ex post efficiency by ensuring that the firm with the best technology will be selected and after winning the firm will operate at the least cost and price at the marginal cost. Priority-differentiated subscription service fosters self-revelation of demand functions and facilitates fixed cost recovery. With known demand functions a linear subscription price schedule based on the beneficiary-pay principle achieves efficient fixed cost recovery. With unknown demand functions a two-part subscription price menu based on nonlinear Ramsey pricing attains an incentive-compatible second-best result.,hung-po chao,Not available,2015.0,10.1007/s11149-015-9273-3,Journal of Regulatory Economics,Hung-po2015,False,,Springer,Not available,Two-stage auction and subscription pricing for awarding monopoly franchises,2cab60e9288b4d4b80bbe271d30b7b0a,http://dx.doi.org/10.1007/s11149-015-9273-3 587,We examine how the bidding environment may affect the outcome of tax competition between two countries (or two regions) in attracting a firm’s foreign direct investment (FDI). We compare the equilibrium location choice and payoffs from an English auction with both complete and incomplete information relative to those in the traditional setting of a sealed-bid first-price auction. We find that an English auction leads to more aggressive bidding in “race beyond the bottom ” where the nations may bid beyond their own valuations of the FDI. We also discuss the roles of auction protocol and information asymmetry on the auction outcome.,taiji furusawa,Not available,2015.0,10.1007/s10797-014-9326-z,International Tax and Public Finance,Taiji2015,False,,Springer,Not available,A race beyond the bottom: the nature of bidding for a firm,b7a178f69f5aba39d117133d93387279,http://dx.doi.org/10.1007/s10797-014-9326-z 588,We examine how the bidding environment may affect the outcome of tax competition between two countries (or two regions) in attracting a firm’s foreign direct investment (FDI). We compare the equilibrium location choice and payoffs from an English auction with both complete and incomplete information relative to those in the traditional setting of a sealed-bid first-price auction. We find that an English auction leads to more aggressive bidding in “race beyond the bottom ” where the nations may bid beyond their own valuations of the FDI. We also discuss the roles of auction protocol and information asymmetry on the auction outcome.,kazumi hori,Not available,2015.0,10.1007/s10797-014-9326-z,International Tax and Public Finance,Taiji2015,False,,Springer,Not available,A race beyond the bottom: the nature of bidding for a firm,b7a178f69f5aba39d117133d93387279,http://dx.doi.org/10.1007/s10797-014-9326-z 589,We examine how the bidding environment may affect the outcome of tax competition between two countries (or two regions) in attracting a firm’s foreign direct investment (FDI). We compare the equilibrium location choice and payoffs from an English auction with both complete and incomplete information relative to those in the traditional setting of a sealed-bid first-price auction. We find that an English auction leads to more aggressive bidding in “race beyond the bottom ” where the nations may bid beyond their own valuations of the FDI. We also discuss the roles of auction protocol and information asymmetry on the auction outcome.,ian wooton,Not available,2015.0,10.1007/s10797-014-9326-z,International Tax and Public Finance,Taiji2015,False,,Springer,Not available,A race beyond the bottom: the nature of bidding for a firm,b7a178f69f5aba39d117133d93387279,http://dx.doi.org/10.1007/s10797-014-9326-z 590,This paper models a name-your-own-price (NYOP) retailer who allows buyers to initiate their retail interactions by describing a product and submitting a binding bid for it. The buyers have an outside option to buy the same good for a commonly known posted price that also acts as an informative upper bound on the cost the NYOP retailer faces. We conceptualize a selling strategy of such an NYOP retailer to be the probability that a buyer’s bid gets accepted. The selling strategy is a function of only the bid level; it does not depend on the particular realization of the retailer’s procurement cost. Using mechanism-design techniques we characterize the optimal selling strategy and the equilibrium bidding function that best responds to it. We show that the optimal strategy implements the first-best ex-post optimal mechanism: for every cost realization the retailer can make as much profit as he would if he could learn his cost first and use the optimal mechanism contingent on it. The complexity involved in credibly communicating an entire bid-acceptance function to buyers can make the first-best strategy impractical in some real-world markets so we also analyze several simpler NYOP strategies: setting a minimum bid charging a participation fee and accepting all bids above cost. We find that under many scenarios the minimum-bid strategy dominates the other simpler strategies and achieves a majority of the maximal profit improvement available from the first best strategy. However NYOP retailers in thin markets can do better by charging participation fees than by setting minimum bids.,robert zeithammer,Not available,2015.0,10.1007/s11129-015-9157-y,Quantitative Marketing and Economics,Robert2015,False,,Springer,Not available,Optimal selling strategies when buyers name their own prices,3edf1965d3cedc4ef0af652a17b078dc,http://dx.doi.org/10.1007/s11129-015-9157-y 591,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,tianyu wang,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 592,Fallback options are relatively common in the business context. If for example a firm fails to acquire a certain target firm—a first-best solution—it may decide to attempt the acquisition of another takeover target—a second best solution. When a decision maker tries to obtain the first-best solution she may frequently choose different levels of effort to invest into its pursuit. This level of effort is generally influenced by the availability of a fallback option in case she fails to succeed in obtaining her first-best solution. Using a second price auction mechanism we experimentally test whether subjects react to the existence and attractiveness of this fallback option by changing their bidding behavior. Our results show that subjects only partially adjust to the existence of the fallback option according to the theoretical prediction.,sascha fullbrunn,Not available,2015.0,10.1007/s10100-015-0389-4,Central European Journal of Operations Research,Sascha2015,False,,Springer,Not available,The value of a fallback option,e32fff1d0f4806b82101c27b06bdcb41,http://dx.doi.org/10.1007/s10100-015-0389-4 593,Fallback options are relatively common in the business context. If for example a firm fails to acquire a certain target firm—a first-best solution—it may decide to attempt the acquisition of another takeover target—a second best solution. When a decision maker tries to obtain the first-best solution she may frequently choose different levels of effort to invest into its pursuit. This level of effort is generally influenced by the availability of a fallback option in case she fails to succeed in obtaining her first-best solution. Using a second price auction mechanism we experimentally test whether subjects react to the existence and attractiveness of this fallback option by changing their bidding behavior. Our results show that subjects only partially adjust to the existence of the fallback option according to the theoretical prediction.,stefan kreiner,Not available,2015.0,10.1007/s10100-015-0389-4,Central European Journal of Operations Research,Sascha2015,False,,Springer,Not available,The value of a fallback option,e32fff1d0f4806b82101c27b06bdcb41,http://dx.doi.org/10.1007/s10100-015-0389-4 594,Fallback options are relatively common in the business context. If for example a firm fails to acquire a certain target firm—a first-best solution—it may decide to attempt the acquisition of another takeover target—a second best solution. When a decision maker tries to obtain the first-best solution she may frequently choose different levels of effort to invest into its pursuit. This level of effort is generally influenced by the availability of a fallback option in case she fails to succeed in obtaining her first-best solution. Using a second price auction mechanism we experimentally test whether subjects react to the existence and attractiveness of this fallback option by changing their bidding behavior. Our results show that subjects only partially adjust to the existence of the fallback option according to the theoretical prediction.,stefan palan,Not available,2015.0,10.1007/s10100-015-0389-4,Central European Journal of Operations Research,Sascha2015,False,,Springer,Not available,The value of a fallback option,e32fff1d0f4806b82101c27b06bdcb41,http://dx.doi.org/10.1007/s10100-015-0389-4 595,I analyze an auction environment where two units of an object are sold at two simultaneous sealed-bid first-price auctions to bidders who have a one-dimensional type space where a type represents the value a bidder places on each of the two units. All bidders have an identical budget constraint that binds their ability to spend in the auctions. I show that if the valuation distribution is atom-less then there does not exist any equilibrium in behavioral strategies in this auction game.,gagan ghosh,Not available,2015.0,10.1007/s00182-014-0428-8,International Journal of Game Theory,Gagan2015,False,,Springer,Not available,Non-existence of equilibria in simultaneous auctions with a common budget-constraint,59afeaaaeb57bc441f532da72d56e5f1,http://dx.doi.org/10.1007/s00182-014-0428-8 596,We derive a necessary and sufficient condition for the existence of equilibria with only two active players in the all-pay auction with complete information and identity-dependent externalities. This condition shows that the generic equilibrium of the standard all-pay auction is robust to the introduction of “small” identity-dependent externalities. In general however the presence of identity-dependent externalities invalidates well-established qualitative results concerning the set of equilibria of the first-price all-pay auction with complete information. With identity-dependent externalities equilibria are generally not payoff equivalent and identical players may earn different payoffs in equilibrium. These observations show that Siegel’s (Econometrica 77(1) 71–92 ,bettina klose,Not available,2015.0,10.1007/s00199-014-0848-5,Economic Theory,Bettina2015,False,,Springer,Not available,The all-pay auction with complete information and identity-dependent externalities,25fa25fd3a6f9f4e02400e6a6c1f27b8,http://dx.doi.org/10.1007/s00199-014-0848-5 597,We derive a necessary and sufficient condition for the existence of equilibria with only two active players in the all-pay auction with complete information and identity-dependent externalities. This condition shows that the generic equilibrium of the standard all-pay auction is robust to the introduction of “small” identity-dependent externalities. In general however the presence of identity-dependent externalities invalidates well-established qualitative results concerning the set of equilibria of the first-price all-pay auction with complete information. With identity-dependent externalities equilibria are generally not payoff equivalent and identical players may earn different payoffs in equilibrium. These observations show that Siegel’s (Econometrica 77(1) 71–92 ,dan kovenock,Not available,2015.0,10.1007/s00199-014-0848-5,Economic Theory,Bettina2015,False,,Springer,Not available,The all-pay auction with complete information and identity-dependent externalities,25fa25fd3a6f9f4e02400e6a6c1f27b8,http://dx.doi.org/10.1007/s00199-014-0848-5 598,In a stylized environment with complementary products we study a class of dominant strategy implementable direct mechanisms and focus on the objective of minimizing the expected surplus from core deviations. For this class of mechanisms we formulate the core deviation minimization problem as a calculus of variations problem and numerically solve it for some interesting special cases. We then compare the core deviation surplus in the optimal auction (CDMA) to that in Vickrey-Clark-Groves mechanism (VCG) and core-selecting auctions (CSAs). We find that the expected surplus from core deviations can be significantly smaller in CDMA than that in both VCG and CSAs.,isa hafalir,Not available,2015.0,10.1007/s00182-014-0433-y,International Journal of Game Theory,E.2015,False,,Springer,Not available,Core deviation minimizing auctions,6de2e534f33e7c9e8f10382e8b49b1fd,http://dx.doi.org/10.1007/s00182-014-0433-y 599,In a stylized environment with complementary products we study a class of dominant strategy implementable direct mechanisms and focus on the objective of minimizing the expected surplus from core deviations. For this class of mechanisms we formulate the core deviation minimization problem as a calculus of variations problem and numerically solve it for some interesting special cases. We then compare the core deviation surplus in the optimal auction (CDMA) to that in Vickrey-Clark-Groves mechanism (VCG) and core-selecting auctions (CSAs). We find that the expected surplus from core deviations can be significantly smaller in CDMA than that in both VCG and CSAs.,hadi yektas,Not available,2015.0,10.1007/s00182-014-0433-y,International Journal of Game Theory,E.2015,False,,Springer,Not available,Core deviation minimizing auctions,6de2e534f33e7c9e8f10382e8b49b1fd,http://dx.doi.org/10.1007/s00182-014-0433-y 600,We study multi-unit combinatorial auctions with ,niv buchbinder,Not available,2015.0,10.1007/s00453-013-9854-4,Algorithmica,Niv2015,False,,Springer,Not available,Incentive Compatible Mulit-Unit Combinatorial Auctions: A Primal Dual Approach,134d5e0d2e16759ee66ce144b83f7217,http://dx.doi.org/10.1007/s00453-013-9854-4 601,We study multi-unit combinatorial auctions with ,rica gonen,Not available,2015.0,10.1007/s00453-013-9854-4,Algorithmica,Niv2015,False,,Springer,Not available,Incentive Compatible Mulit-Unit Combinatorial Auctions: A Primal Dual Approach,134d5e0d2e16759ee66ce144b83f7217,http://dx.doi.org/10.1007/s00453-013-9854-4 602,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,rongqing zhang,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 603,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,karine brisset,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 604,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,francois cochard,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 605,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,francois marechal,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 606,When prices depend on the submitted bids ,arnaud dragicevic,Not available,2010.0,10.1007/978-3-642-12079-4_2,Advances in Social Computing,Z.2010,False,,Springer,Not available,Endogenous Market-Clearing Prices and Reference Point Adaptation,cd88260bfa0ae721d7d8a53ee50ec3dc,http://dx.doi.org/10.1007/978-3-642-12079-4_2 607,We extend the Coase conjecture to the case of a seller with a single object who faces ,flavio menezes,Not available,2009.0,10.1007/s00182-009-0164-7,International Journal of Game Theory,M.2009,False,,Springer,Not available,Coasian dynamics in repeated English auctions,0e59e939f1adf0da36eb877227973326,http://dx.doi.org/10.1007/s00182-009-0164-7 608,We extend the Coase conjecture to the case of a seller with a single object who faces ,matthew ryan,Not available,2009.0,10.1007/s00182-009-0164-7,International Journal of Game Theory,M.2009,False,,Springer,Not available,Coasian dynamics in repeated English auctions,0e59e939f1adf0da36eb877227973326,http://dx.doi.org/10.1007/s00182-009-0164-7 609,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.,benjamin blau,Not available,2009.0,10.1007/s12599-009-0070-3,Business & Information Systems Engineering,Benjamin2009,False,,Springer,Not available,How to Coordinate Value Generation in Service Networks,8b2e7e67c0f1666a7044f29fd890ab58,http://dx.doi.org/10.1007/s12599-009-0070-3 610,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.,clemens dinther,Not available,2009.0,10.1007/s12599-009-0070-3,Business & Information Systems Engineering,Benjamin2009,False,,Springer,Not available,How to Coordinate Value Generation in Service Networks,8b2e7e67c0f1666a7044f29fd890ab58,http://dx.doi.org/10.1007/s12599-009-0070-3 611,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.,tobias conte,Not available,2009.0,10.1007/s12599-009-0070-3,Business & Information Systems Engineering,Benjamin2009,False,,Springer,Not available,How to Coordinate Value Generation in Service Networks,8b2e7e67c0f1666a7044f29fd890ab58,http://dx.doi.org/10.1007/s12599-009-0070-3 612,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.,yongchun xu,Not available,2009.0,10.1007/s12599-009-0070-3,Business & Information Systems Engineering,Benjamin2009,False,,Springer,Not available,How to Coordinate Value Generation in Service Networks,8b2e7e67c0f1666a7044f29fd890ab58,http://dx.doi.org/10.1007/s12599-009-0070-3 613,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,lingyang song,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 614,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.,christof weinhardt,Not available,2009.0,10.1007/s12599-009-0070-3,Business & Information Systems Engineering,Benjamin2009,False,,Springer,Not available,How to Coordinate Value Generation in Service Networks,8b2e7e67c0f1666a7044f29fd890ab58,http://dx.doi.org/10.1007/s12599-009-0070-3 615,This paper suggests a genetic fuzzy system approach to develop bidding strategies for agents in online auction environments. Assessing efficient bidding strategies is a key to evaluate auction models and verify if the underlying mechanism design achieves its intended goals. Due to its relevance in current energy markets worldwide we use day-ahead electricity auctions as an experimental and application instance of the approach developed in this paper. Successful fuzzy bidding strategies have been developed by genetic fuzzy systems using coevolutionary algorithms. In this paper we address a coevolutionary fuzzy system algorithm and present recent results concerning bidding strategies behavior. Coevolutionary approaches developed by coevolutionary agents interact through their fuzzy bidding strategies in a multiagent environment and allow realistic and transparent representations of agents behavior in auction-based markets. They also improve market representation and evaluation mechanisms. In particular we study how the coevolutionary fuzzy bidding strategies perform against each other during hourly electric energy auctions. Experimental results show that coevolutionary agents may enhance their profits at the cost of increasing system hourly price paid by demand.,igor walter,Not available,2009.0,10.1007/s12065-009-0023-2,Evolutionary Intelligence,Igor2009,False,,Springer,Not available,Multiagent coevolutionary genetic fuzzy system to develop bidding strategies in electricity markets: computational economics to assess mechanism design,e7325ab752e2d5d034e7ce3707f1250d,http://dx.doi.org/10.1007/s12065-009-0023-2 616,This paper suggests a genetic fuzzy system approach to develop bidding strategies for agents in online auction environments. Assessing efficient bidding strategies is a key to evaluate auction models and verify if the underlying mechanism design achieves its intended goals. Due to its relevance in current energy markets worldwide we use day-ahead electricity auctions as an experimental and application instance of the approach developed in this paper. Successful fuzzy bidding strategies have been developed by genetic fuzzy systems using coevolutionary algorithms. In this paper we address a coevolutionary fuzzy system algorithm and present recent results concerning bidding strategies behavior. Coevolutionary approaches developed by coevolutionary agents interact through their fuzzy bidding strategies in a multiagent environment and allow realistic and transparent representations of agents behavior in auction-based markets. They also improve market representation and evaluation mechanisms. In particular we study how the coevolutionary fuzzy bidding strategies perform against each other during hourly electric energy auctions. Experimental results show that coevolutionary agents may enhance their profits at the cost of increasing system hourly price paid by demand.,fernando gomide,Not available,2009.0,10.1007/s12065-009-0023-2,Evolutionary Intelligence,Igor2009,False,,Springer,Not available,Multiagent coevolutionary genetic fuzzy system to develop bidding strategies in electricity markets: computational economics to assess mechanism design,e7325ab752e2d5d034e7ce3707f1250d,http://dx.doi.org/10.1007/s12065-009-0023-2 617,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,silva de,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 618,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,thomas jeitschko,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 619,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,georgia kosmopoulou,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 620,This paper characterizes the Nash equilibrium in a pay-as-bid (discriminatory) divisible-good procurement auction. Demand by the auctioneer is uncertain as in the supply function equilibrium model. A closed form expression is derived for a one shot game. Existence of an equilibrium is ensured if the hazard rate of the demand distribution is monotonically decreasing with respect to the shock outcome and sellers have non-decreasing marginal costs. Multiple equilibria can be ruled out for markets for which the auctioneer’s demand exceeds suppliers’ capacity with a positive probability. The derived equilibrium can be used to model strategic bidding behavior in pay-as-bid electricity auctions such as the balancing mechanism of United Kingdom. Offer curves and mark-ups of the derived equilibrium are compared to results for the SFE of a uniform-price auction.,par holmberg,Not available,2009.0,10.1007/s11149-009-9091-6,Journal of Regulatory Economics,Pär2009,False,,Springer,Not available,Supply function equilibria of pay-as-bid auctions,a30fa61380877627977bbd4f369802c0,http://dx.doi.org/10.1007/s11149-009-9091-6 621,The ,yu-an sun,Not available,2009.0,10.1007/s10614-009-9169-3,Computational Economics,Yu-An2009,False,,Springer,Not available,Auctions and Differential Pricing: Optimal Seller and Bidder Strategies in Second-chance Offers,a16ed44bb1628aa24e45b2b7472dd06c,http://dx.doi.org/10.1007/s10614-009-9169-3 622,The ,poorvi vora,Not available,2009.0,10.1007/s10614-009-9169-3,Computational Economics,Yu-An2009,False,,Springer,Not available,Auctions and Differential Pricing: Optimal Seller and Bidder Strategies in Second-chance Offers,a16ed44bb1628aa24e45b2b7472dd06c,http://dx.doi.org/10.1007/s10614-009-9169-3 623,The greenhouse gas emissions trading scheme in the European Union primarily uses grandfathering until 2012 which means that polluters get emission rights free of charge based on their historical emissions. Energy consumers accuse energy producers of making windfall profits by incorporating the market value of those free rights into the energy prices. However we develop a numerical example to illustrate that the reasoning of the producers is correct. We also explain why this market value is only partly passed on to consumers. We consider various measures and conclude that only auctioning the rights after 2012 nullifies the additional profits.,e. woerdman,Not available,2009.0,10.1007/s10657-009-9098-6,European Journal of Law and Economics,E.2009,True,,Springer,Not available,Energy prices and emissions trading: windfall profits from grandfathering?,3eb207a90f4ff9721112f7276ebbd04f,http://dx.doi.org/10.1007/s10657-009-9098-6 624,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,zhu han,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 625,The greenhouse gas emissions trading scheme in the European Union primarily uses grandfathering until 2012 which means that polluters get emission rights free of charge based on their historical emissions. Energy consumers accuse energy producers of making windfall profits by incorporating the market value of those free rights into the energy prices. However we develop a numerical example to illustrate that the reasoning of the producers is correct. We also explain why this market value is only partly passed on to consumers. We consider various measures and conclude that only auctioning the rights after 2012 nullifies the additional profits.,o. couwenberg,Not available,2009.0,10.1007/s10657-009-9098-6,European Journal of Law and Economics,E.2009,True,,Springer,Not available,Energy prices and emissions trading: windfall profits from grandfathering?,3eb207a90f4ff9721112f7276ebbd04f,http://dx.doi.org/10.1007/s10657-009-9098-6 626,The greenhouse gas emissions trading scheme in the European Union primarily uses grandfathering until 2012 which means that polluters get emission rights free of charge based on their historical emissions. Energy consumers accuse energy producers of making windfall profits by incorporating the market value of those free rights into the energy prices. However we develop a numerical example to illustrate that the reasoning of the producers is correct. We also explain why this market value is only partly passed on to consumers. We consider various measures and conclude that only auctioning the rights after 2012 nullifies the additional profits.,a. nentjes,Not available,2009.0,10.1007/s10657-009-9098-6,European Journal of Law and Economics,E.2009,True,,Springer,Not available,Energy prices and emissions trading: windfall profits from grandfathering?,3eb207a90f4ff9721112f7276ebbd04f,http://dx.doi.org/10.1007/s10657-009-9098-6 627,"Der grundlegende Paradigmenwechsel von traditionellen Wertschöpfungsketten zu agilen dienstbasierten Wertschöpfungsnetzwerken impliziert neue wirtschaftliche und organisatorische Herausforderungen. Ähnlich wie Koordinierungsmechanismen haben sich Auktionen in Situationen bewährt in denen heterogene und immaterielle Güter gehandelt werden. Allerdings sind traditionelle Ansätze auf dem Gebiet der multidimensionalen kombinatorischen Auktionen nicht gut geeignet um den Handel mit komponierten Diensten zu ermöglichen. Eine fehlerfreie Ausführung der Dienste und die damit verbundene Bewertung des Dienstnehmers hängen in hohem Maße von der genauen Reihenfolge der Teile der Komposition ab. Dies bedeutet dass im Gegensatz zu Dienstbündeln zusammengesetzte Dienste nur durch eine gültige Reihenfolge ihrer Komponenten Wert generieren.Der Beitrag stellt ein abstraktes Modell als eine Formalisierung von SVNs vor. Das Modell umfasst die Implementierung eines graphenbasierten Mechanismus zur Allokation multidimensionaler Dienstangebote innerhalb des Netzwerks zur Sanktionierung für die Nichterbringung und der Bestimmung von Preisen für komplexe Dienste. Der Mechanismus und die Gebotssprache unterstützen verschiedene Arten von QoS-Eigenschaften und deren (semantische) Aggregation. Die Autoren zeigen analytisch dass diese Variante in Bezug auf alle Dimensionen des Dienstangebots (Qualität und Preis) anreizkompatibel ist. Auf der Grundlage dieser Ergebnisse wird eine numerische Analyse des strategischen Verhaltens der beteiligten Dienstanbieter in Bezug auf mögliche Kollusionsstrategien durchgeführt.,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.",benjamin blau,Not available,2009.0,10.1007/s11576-009-0190-x,WIRTSCHAFTSINFORMATIK,Benjamin2009,False,,Springer,Not available,Koordination in Service Value Networks,ab6fa7e0d6e0f189dc7b5ee2887fa9a9,http://dx.doi.org/10.1007/s11576-009-0190-x 628,"Der grundlegende Paradigmenwechsel von traditionellen Wertschöpfungsketten zu agilen dienstbasierten Wertschöpfungsnetzwerken impliziert neue wirtschaftliche und organisatorische Herausforderungen. Ähnlich wie Koordinierungsmechanismen haben sich Auktionen in Situationen bewährt in denen heterogene und immaterielle Güter gehandelt werden. Allerdings sind traditionelle Ansätze auf dem Gebiet der multidimensionalen kombinatorischen Auktionen nicht gut geeignet um den Handel mit komponierten Diensten zu ermöglichen. Eine fehlerfreie Ausführung der Dienste und die damit verbundene Bewertung des Dienstnehmers hängen in hohem Maße von der genauen Reihenfolge der Teile der Komposition ab. Dies bedeutet dass im Gegensatz zu Dienstbündeln zusammengesetzte Dienste nur durch eine gültige Reihenfolge ihrer Komponenten Wert generieren.Der Beitrag stellt ein abstraktes Modell als eine Formalisierung von SVNs vor. Das Modell umfasst die Implementierung eines graphenbasierten Mechanismus zur Allokation multidimensionaler Dienstangebote innerhalb des Netzwerks zur Sanktionierung für die Nichterbringung und der Bestimmung von Preisen für komplexe Dienste. Der Mechanismus und die Gebotssprache unterstützen verschiedene Arten von QoS-Eigenschaften und deren (semantische) Aggregation. Die Autoren zeigen analytisch dass diese Variante in Bezug auf alle Dimensionen des Dienstangebots (Qualität und Preis) anreizkompatibel ist. Auf der Grundlage dieser Ergebnisse wird eine numerische Analyse des strategischen Verhaltens der beteiligten Dienstanbieter in Bezug auf mögliche Kollusionsstrategien durchgeführt.,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.",clemens dinther,Not available,2009.0,10.1007/s11576-009-0190-x,WIRTSCHAFTSINFORMATIK,Benjamin2009,False,,Springer,Not available,Koordination in Service Value Networks,ab6fa7e0d6e0f189dc7b5ee2887fa9a9,http://dx.doi.org/10.1007/s11576-009-0190-x 629,"Der grundlegende Paradigmenwechsel von traditionellen Wertschöpfungsketten zu agilen dienstbasierten Wertschöpfungsnetzwerken impliziert neue wirtschaftliche und organisatorische Herausforderungen. Ähnlich wie Koordinierungsmechanismen haben sich Auktionen in Situationen bewährt in denen heterogene und immaterielle Güter gehandelt werden. Allerdings sind traditionelle Ansätze auf dem Gebiet der multidimensionalen kombinatorischen Auktionen nicht gut geeignet um den Handel mit komponierten Diensten zu ermöglichen. Eine fehlerfreie Ausführung der Dienste und die damit verbundene Bewertung des Dienstnehmers hängen in hohem Maße von der genauen Reihenfolge der Teile der Komposition ab. Dies bedeutet dass im Gegensatz zu Dienstbündeln zusammengesetzte Dienste nur durch eine gültige Reihenfolge ihrer Komponenten Wert generieren.Der Beitrag stellt ein abstraktes Modell als eine Formalisierung von SVNs vor. Das Modell umfasst die Implementierung eines graphenbasierten Mechanismus zur Allokation multidimensionaler Dienstangebote innerhalb des Netzwerks zur Sanktionierung für die Nichterbringung und der Bestimmung von Preisen für komplexe Dienste. Der Mechanismus und die Gebotssprache unterstützen verschiedene Arten von QoS-Eigenschaften und deren (semantische) Aggregation. Die Autoren zeigen analytisch dass diese Variante in Bezug auf alle Dimensionen des Dienstangebots (Qualität und Preis) anreizkompatibel ist. Auf der Grundlage dieser Ergebnisse wird eine numerische Analyse des strategischen Verhaltens der beteiligten Dienstanbieter in Bezug auf mögliche Kollusionsstrategien durchgeführt.,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.",tobias conte,Not available,2009.0,10.1007/s11576-009-0190-x,WIRTSCHAFTSINFORMATIK,Benjamin2009,False,,Springer,Not available,Koordination in Service Value Networks,ab6fa7e0d6e0f189dc7b5ee2887fa9a9,http://dx.doi.org/10.1007/s11576-009-0190-x 630,"Der grundlegende Paradigmenwechsel von traditionellen Wertschöpfungsketten zu agilen dienstbasierten Wertschöpfungsnetzwerken impliziert neue wirtschaftliche und organisatorische Herausforderungen. Ähnlich wie Koordinierungsmechanismen haben sich Auktionen in Situationen bewährt in denen heterogene und immaterielle Güter gehandelt werden. Allerdings sind traditionelle Ansätze auf dem Gebiet der multidimensionalen kombinatorischen Auktionen nicht gut geeignet um den Handel mit komponierten Diensten zu ermöglichen. Eine fehlerfreie Ausführung der Dienste und die damit verbundene Bewertung des Dienstnehmers hängen in hohem Maße von der genauen Reihenfolge der Teile der Komposition ab. Dies bedeutet dass im Gegensatz zu Dienstbündeln zusammengesetzte Dienste nur durch eine gültige Reihenfolge ihrer Komponenten Wert generieren.Der Beitrag stellt ein abstraktes Modell als eine Formalisierung von SVNs vor. Das Modell umfasst die Implementierung eines graphenbasierten Mechanismus zur Allokation multidimensionaler Dienstangebote innerhalb des Netzwerks zur Sanktionierung für die Nichterbringung und der Bestimmung von Preisen für komplexe Dienste. Der Mechanismus und die Gebotssprache unterstützen verschiedene Arten von QoS-Eigenschaften und deren (semantische) Aggregation. Die Autoren zeigen analytisch dass diese Variante in Bezug auf alle Dimensionen des Dienstangebots (Qualität und Preis) anreizkompatibel ist. Auf der Grundlage dieser Ergebnisse wird eine numerische Analyse des strategischen Verhaltens der beteiligten Dienstanbieter in Bezug auf mögliche Kollusionsstrategien durchgeführt.,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.",yongchun xu,Not available,2009.0,10.1007/s11576-009-0190-x,WIRTSCHAFTSINFORMATIK,Benjamin2009,False,,Springer,Not available,Koordination in Service Value Networks,ab6fa7e0d6e0f189dc7b5ee2887fa9a9,http://dx.doi.org/10.1007/s11576-009-0190-x 631,"Der grundlegende Paradigmenwechsel von traditionellen Wertschöpfungsketten zu agilen dienstbasierten Wertschöpfungsnetzwerken impliziert neue wirtschaftliche und organisatorische Herausforderungen. Ähnlich wie Koordinierungsmechanismen haben sich Auktionen in Situationen bewährt in denen heterogene und immaterielle Güter gehandelt werden. Allerdings sind traditionelle Ansätze auf dem Gebiet der multidimensionalen kombinatorischen Auktionen nicht gut geeignet um den Handel mit komponierten Diensten zu ermöglichen. Eine fehlerfreie Ausführung der Dienste und die damit verbundene Bewertung des Dienstnehmers hängen in hohem Maße von der genauen Reihenfolge der Teile der Komposition ab. Dies bedeutet dass im Gegensatz zu Dienstbündeln zusammengesetzte Dienste nur durch eine gültige Reihenfolge ihrer Komponenten Wert generieren.Der Beitrag stellt ein abstraktes Modell als eine Formalisierung von SVNs vor. Das Modell umfasst die Implementierung eines graphenbasierten Mechanismus zur Allokation multidimensionaler Dienstangebote innerhalb des Netzwerks zur Sanktionierung für die Nichterbringung und der Bestimmung von Preisen für komplexe Dienste. Der Mechanismus und die Gebotssprache unterstützen verschiedene Arten von QoS-Eigenschaften und deren (semantische) Aggregation. Die Autoren zeigen analytisch dass diese Variante in Bezug auf alle Dimensionen des Dienstangebots (Qualität und Preis) anreizkompatibel ist. Auf der Grundlage dieser Ergebnisse wird eine numerische Analyse des strategischen Verhaltens der beteiligten Dienstanbieter in Bezug auf mögliche Kollusionsstrategien durchgeführt.,The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition meaning that in contrary to service bundles composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.",christof weinhardt,Not available,2009.0,10.1007/s11576-009-0190-x,WIRTSCHAFTSINFORMATIK,Benjamin2009,False,,Springer,Not available,Koordination in Service Value Networks,ab6fa7e0d6e0f189dc7b5ee2887fa9a9,http://dx.doi.org/10.1007/s11576-009-0190-x 632,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,haan de,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 633,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,vries de,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 634,In an Internet auction the expected payoff acts as a benchmark of the reasonableness of the price that is paid for the purchased item. Since the number of potential bidders is not observable the expected payoff is difficult to estimate accurately. We approach this problem by considering the bids as a record and 2-record sequence of the potential bidder’s valuation and using the Extreme Value Theory models to model the tail distribution of the bidder’s valuation and study the expected payoff. Along the discussions for three different cases regarding the extreme value index ,chen zhou,Not available,2009.0,10.1007/s10687-008-0077-z,Extremes,Laurens2009,True,,Springer,Not available,The expected payoff to Internet auctions,3403b318c51e47257f2222d9273355c5,http://dx.doi.org/10.1007/s10687-008-0077-z 635,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,haopeng li,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 636,We analyze the problem of selling shares of a divisible good to a large number of buyers when demand is uncertain. We characterize equilibria of two popular mechanisms a fixed price mechanism and a uniform price auction and compare the revenues. While in the auction truthful bidding is a dominant strategy we find that bidders have an incentive to overstate their demand in the fixed price mechanism. For some parameter values we find that the fixed price mechanism outperforms the auction.,jurgen bierbaum,Not available,2006.0,10.1007/s10058-006-0007-y,Review of Economic Design,Jürgen2006,False,,Springer,Not available,Selling shares to retail investors: auction vs. fixed price,cc9b6de6a0873866eee242ec6deaab9f,http://dx.doi.org/10.1007/s10058-006-0007-y 637,We analyze the problem of selling shares of a divisible good to a large number of buyers when demand is uncertain. We characterize equilibria of two popular mechanisms a fixed price mechanism and a uniform price auction and compare the revenues. While in the auction truthful bidding is a dominant strategy we find that bidders have an incentive to overstate their demand in the fixed price mechanism. For some parameter values we find that the fixed price mechanism outperforms the auction.,veronika grimm,Not available,2006.0,10.1007/s10058-006-0007-y,Review of Economic Design,Jürgen2006,False,,Springer,Not available,Selling shares to retail investors: auction vs. fixed price,cc9b6de6a0873866eee242ec6deaab9f,http://dx.doi.org/10.1007/s10058-006-0007-y 638,The paper analyzes a problem of optimal auction design when the seller faces asymmetrically informed bidders. Specifically we consider a continuum of risk-neutral uninformed bidders taking part into the auction along with ,moez bennouri,Not available,2006.0,10.1007/s00199-005-0637-2,Economic Theory,Moez2006,False,,Springer,Not available,Optimal auctions with asymmetrically informed bidders,218befc9872d9700a6771bf20f91ae68,http://dx.doi.org/10.1007/s00199-005-0637-2 639,The paper analyzes a problem of optimal auction design when the seller faces asymmetrically informed bidders. Specifically we consider a continuum of risk-neutral uninformed bidders taking part into the auction along with ,sonia falconieri,Not available,2006.0,10.1007/s00199-005-0637-2,Economic Theory,Moez2006,False,,Springer,Not available,Optimal auctions with asymmetrically informed bidders,218befc9872d9700a6771bf20f91ae68,http://dx.doi.org/10.1007/s00199-005-0637-2 640,The paper presents a model for the collaboration among independent freight forwarding entities. In the modern highly competitive transportation branch freight forwarders reduce their fulfillment costs by exploiting different execution modes (self-fulfillment and subcontraction). For self-fulfillment they use their own vehicles to execute the requests and for subcontracting they forward the orders to external freight carriers. Further enhancement of competitiveness can be achieved if the freight forwarders cooperate in coalitions in order to balance their request portfolios. Participation in such a coalition gains additional profit for the entire coalition and for each participant therefore reinforcing the market position of the partners. The integrated operational transport problem as well as existing collaboration approaches are introduced. The presented model for collaboration is based on theoretical foundations in the field of combinatorial auctions and operational research game theory. It is applicable for coalitions of freight forwarders especially for the collaboration of Profit Centres within large freight forwarding companies. The proposed theoretical approach and the presented collaboration model are suitable for a coalition of freight forwarding companies with nearly similar potential on the market.,marta krajewska,Not available,2006.0,10.1007/s00291-005-0031-2,OR Spectrum,Anna2006,False,,Springer,Not available,Collaborating freight forwarding enterprises,7f90a31b5faa735319fabe8c5662eb19,http://dx.doi.org/10.1007/s00291-005-0031-2 641,The paper presents a model for the collaboration among independent freight forwarding entities. In the modern highly competitive transportation branch freight forwarders reduce their fulfillment costs by exploiting different execution modes (self-fulfillment and subcontraction). For self-fulfillment they use their own vehicles to execute the requests and for subcontracting they forward the orders to external freight carriers. Further enhancement of competitiveness can be achieved if the freight forwarders cooperate in coalitions in order to balance their request portfolios. Participation in such a coalition gains additional profit for the entire coalition and for each participant therefore reinforcing the market position of the partners. The integrated operational transport problem as well as existing collaboration approaches are introduced. The presented model for collaboration is based on theoretical foundations in the field of combinatorial auctions and operational research game theory. It is applicable for coalitions of freight forwarders especially for the collaboration of Profit Centres within large freight forwarding companies. The proposed theoretical approach and the presented collaboration model are suitable for a coalition of freight forwarding companies with nearly similar potential on the market.,herbert kopfer,Not available,2006.0,10.1007/s00291-005-0031-2,OR Spectrum,Anna2006,False,,Springer,Not available,Collaborating freight forwarding enterprises,7f90a31b5faa735319fabe8c5662eb19,http://dx.doi.org/10.1007/s00291-005-0031-2 642,Employing a hedonic price approach within a framework of central tendencies no conclusive results about the impact of auction houses on final prices of art objects have been found. In order to focus on auction houses as a unit we have applied a benchmarking technique DEA developed for efficiency studies. New performance indicators are developed and calculated giving an insight into auction house differences impossible to obtain using hedonic price approach. The performance indicators may also be regarded as quality indicators assuming perfect arbitrage leads to the same unobservable quality of art object obtaining the same price.,finn forsund,Not available,2006.0,10.1007/s10479-006-0031-x,Annals of Operations Research,R.2006,False,,Springer,Not available,DEA meets Picasso: The impact of auction houses on the hammer price,04f9cf6276c24b72d7cdb0e260370c3f,http://dx.doi.org/10.1007/s10479-006-0031-x 643,Employing a hedonic price approach within a framework of central tendencies no conclusive results about the impact of auction houses on final prices of art objects have been found. In order to focus on auction houses as a unit we have applied a benchmarking technique DEA developed for efficiency studies. New performance indicators are developed and calculated giving an insight into auction house differences impossible to obtain using hedonic price approach. The performance indicators may also be regarded as quality indicators assuming perfect arbitrage leads to the same unobservable quality of art object obtaining the same price.,roberto zanola,Not available,2006.0,10.1007/s10479-006-0031-x,Annals of Operations Research,R.2006,False,,Springer,Not available,DEA meets Picasso: The impact of auction houses on the hammer price,04f9cf6276c24b72d7cdb0e260370c3f,http://dx.doi.org/10.1007/s10479-006-0031-x 644,This paper provides a swift tour of auction theory and its applications. Among the questions it considers are: How much do bidders bid in commonly studied single-object auctions? How efficient are these auctions? How much revenue do they generate? Which single-object auction maximizes the seller’s expected revenue? What is the best way to auction incentive contracts? And how efficient and complex are multi-object auctions?,emiel maasland,Not available,2006.0,10.1007/s10645-006-9002-5,De Economist,Emiel2006,False,,Springer,Not available,Going Going Gone! A Swift Tour of Auction Theory and its Applications,77c332c331568df376a7f996ed4b4bbc,http://dx.doi.org/10.1007/s10645-006-9002-5 645,This paper provides a swift tour of auction theory and its applications. Among the questions it considers are: How much do bidders bid in commonly studied single-object auctions? How efficient are these auctions? How much revenue do they generate? Which single-object auction maximizes the seller’s expected revenue? What is the best way to auction incentive contracts? And how efficient and complex are multi-object auctions?,sander onderstal,Not available,2006.0,10.1007/s10645-006-9002-5,De Economist,Emiel2006,False,,Springer,Not available,Going Going Gone! A Swift Tour of Auction Theory and its Applications,77c332c331568df376a7f996ed4b4bbc,http://dx.doi.org/10.1007/s10645-006-9002-5 646,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,bingli jiao,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 647,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,jianwei huang,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 648,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,randall berry,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 649,We study auction mechanisms for sharing spectrum among a group of users subject to a constraint on the interference temperature at a measurement point. The users access the channel using spread spectrum signaling and so interfere with each other. Each user receives a utility that is a function of the received signal-to-interference plus noise ratio. We propose two auction mechanisms for allocating the received power. The first is an auction in which users are charged for received SINR which when combined with logarithmic utilities leads to a weighted max-min fair SINR allocation. The second is an auction in which users are charged for power which maximizes the total utility when the bandwidth is large enough and the receivers are co-located. Both auction mechanisms are shown to be socially optimal for a limiting “large system” with co-located receivers where bandwidth power and the number of users are increased in fixed proportion. We also formulate an iterative and distributed bid updating algorithm and specify conditions under which this algorithm converges globally to the Nash equilibrium of the auction.,michael honig,Not available,2006.0,10.1007/s11036-006-5192-y,Mobile Networks and Applications,Jianwei2006,False,,Springer,Not available,Auction-Based Spectrum Sharing,04cd55b66b241240486d58e3a3c9ba36,http://dx.doi.org/10.1007/s11036-006-5192-y 650,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,gian albano,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 651,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,fabrizio germano,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 652,We consider two ascending auctions for multiple objects namely an English and a Japanese auction and derive a perfect Bayesian equilibrium of the Japanese auction by exploiting its strategic equivalence with the survival auction which consists of a finite sequence of sealed-bid auctions. Thus an equilibrium of a continuous time game is derived by means of backward induction in finitely many steps. We then show that all equilibria of the Japanese auction induce equilibria of the English auction but that many collusive or signaling equilibria of the English auction do not have a counterpart in the Japanese auction.,stefano lovo,Not available,2006.0,10.1007/s00199-005-0634-5,Economic Theory,Luigi2006,False,,Springer,Not available,Ascending auctions for multiple objects: the case for the Japanese design,4aab7e07eb98c911d990bc3fb2930860,http://dx.doi.org/10.1007/s00199-005-0634-5 653,Bulow and Klemperer [1] have provided an upper bound on the value of bargaining power for a seller of an indivisible object. Specifically negotiating optimally with ,rene kirkegaard,Not available,2006.0,10.1007/s00199-004-0593-2,Economic Theory,René2006,False,,Springer,Not available,A short proof of the Bulow-Klemperer auctions vs. negotiations result,56133f9cd9a00ef7edb4cb25ec2c2817,http://dx.doi.org/10.1007/s00199-004-0593-2 654,Most of the literature on collusive behavior in auctions ignores two important issues that make collusion difficult to sustain at least in one-shot interactions: the detection of cheating and the verification of bids. Colluding bidders may deceive each other by using shill bidders. Also if the identities of the bidders and their bids are not published then it would be difficult to verify the bid of a colluding bidder. This paper addresses these problems in one shot second price auctions where one bidder offers another bidder a side payment in exchange for not participating in the auction while the number of other bidders is stochastic. In spite of the barriers to collusion mentioned above a simple side payment mechanism which depends only on the auction price is introduced. It induces a successful collusion eliminates the verification problem provides no incentive for the use of shill bidders and guarantees that the proponent obtains ex-post non-negative payoff. The colluding bidders are ex-ante strictly better off compared with the competitive case irrespective of their types.,chien-liang chen,Not available,2006.0,10.1007/s00199-005-0612-y,Economic Theory,Chien-Liang2006,False,,Springer,Not available,Collusion in one-shot second-price auctions,f27ef376bce35124499f079516448e04,http://dx.doi.org/10.1007/s00199-005-0612-y 655,Most of the literature on collusive behavior in auctions ignores two important issues that make collusion difficult to sustain at least in one-shot interactions: the detection of cheating and the verification of bids. Colluding bidders may deceive each other by using shill bidders. Also if the identities of the bidders and their bids are not published then it would be difficult to verify the bid of a colluding bidder. This paper addresses these problems in one shot second price auctions where one bidder offers another bidder a side payment in exchange for not participating in the auction while the number of other bidders is stochastic. In spite of the barriers to collusion mentioned above a simple side payment mechanism which depends only on the auction price is introduced. It induces a successful collusion eliminates the verification problem provides no incentive for the use of shill bidders and guarantees that the proponent obtains ex-post non-negative payoff. The colluding bidders are ex-ante strictly better off compared with the competitive case irrespective of their types.,yair tauman,Not available,2006.0,10.1007/s00199-005-0612-y,Economic Theory,Chien-Liang2006,False,,Springer,Not available,Collusion in one-shot second-price auctions,f27ef376bce35124499f079516448e04,http://dx.doi.org/10.1007/s00199-005-0612-y 656,In developing open heterogeneous and distributed multi-agent systems researchers often face a problem of facilitating negotiation and bargaining amongst agents. It is increasingly common to use auction mechanisms for negotiation in multi-agent systems. The choice of auction mechanism and the bidding strategy of an agent are of central importance to the success of the agent model. Our aim is to determine the best agent learning algorithm for bidding in a variety of single seller auction structures in both static environments where a known optimal strategy exists and in complex environments where the optimal strategy may be constantly changing. In this paper we present a model of single seller auctions and describe three adaptive agent algorithms to learn strategies through repeated competition. We experiment in a range of auction environments of increasing complexity to determine how well each agent performs in relation to an optimal strategy in cases where one can be deduced or in relation to each other in other cases. We find that with a uniform value distribution a purely reactive agent based on Cliff’s ZIP algorithm for continuous double auctions (CDA) performs well although is outperformed in some cases by a memory based agent based on the Gjerstad Dickhaut agent for CDA.,anthony bagnall,Not available,2006.0,10.1007/s10458-005-4948-2,Autonomous Agents and Multi-Agent Systems,Anthony2006,False,,Springer,Not available,Autonomous Adaptive Agents for Single Seller Sealed Bid Auctions,ecbc8163bfa001d86f975bd271e49694,http://dx.doi.org/10.1007/s10458-005-4948-2 657,Budget optimization (selecting an optimal set of keywords to bid for given a limited amount of budget) and bid optimization (determining optimal bids for the selected keywords) in the face of an unpredictable keyword traffic is a challenging problem facing advertisers in sponsored search auctions. Another key requirement in sponsored search auctions is stability of the bid profile which is usually characterized through the notion of locally envy-free equilibrium. A variety of budget optimization and bid optimization ideas have been proposed in the literature; the bid profiles suggested by them have varying stability properties. In this paper our objective is to come up with a bidding strategy for advertisers that is optimal for the budget optimization as well as the bid optimization problems and also guarantees convergence to a locally envy-free equilibrium. Our approach works with a linear program for the budget optimization problem whose optimal solution is a greedy strategy which we call the OPT strategy. The OPT strategy yields a bid profile that maximizes the return on investment for the advertisers and ensures convergence of the bid profiles to a locally envy-free equilibrium in the asynchronous case as well as in a restricted synchronous case. We also suggest an improved strategy called the MAX strategy which produces equal or higher advertiser utilities compared to the OPT strategy while enjoying identical equilibrium convergence properties as OPT.,nittala chaitanya,Not available,2012.0,10.1007/s12351-010-0097-8,Operational Research,Nittala2012,False,,Springer,Not available,Optimal equilibrium bidding strategies for budget constrained bidders in sponsored search auctions,28aa9aff83533be72e1c341c200c6c06,http://dx.doi.org/10.1007/s12351-010-0097-8 658,In developing open heterogeneous and distributed multi-agent systems researchers often face a problem of facilitating negotiation and bargaining amongst agents. It is increasingly common to use auction mechanisms for negotiation in multi-agent systems. The choice of auction mechanism and the bidding strategy of an agent are of central importance to the success of the agent model. Our aim is to determine the best agent learning algorithm for bidding in a variety of single seller auction structures in both static environments where a known optimal strategy exists and in complex environments where the optimal strategy may be constantly changing. In this paper we present a model of single seller auctions and describe three adaptive agent algorithms to learn strategies through repeated competition. We experiment in a range of auction environments of increasing complexity to determine how well each agent performs in relation to an optimal strategy in cases where one can be deduced or in relation to each other in other cases. We find that with a uniform value distribution a purely reactive agent based on Cliff’s ZIP algorithm for continuous double auctions (CDA) performs well although is outperformed in some cases by a memory based agent based on the Gjerstad Dickhaut agent for CDA.,iain toft,Not available,2006.0,10.1007/s10458-005-4948-2,Autonomous Agents and Multi-Agent Systems,Anthony2006,False,,Springer,Not available,Autonomous Adaptive Agents for Single Seller Sealed Bid Auctions,ecbc8163bfa001d86f975bd271e49694,http://dx.doi.org/10.1007/s10458-005-4948-2 659,The advances in the technological infrastructure and in the Internet led electronic auctions to become popular. With online sites people buy/sell inexpensive products/services through auctions. In this paper we develop an interactive approach that provides aid to both the buyer and the bidders in a bi-attribute multi-item auction environment. Our approach is applicable for both reverse and forward auctions. We test our approach for underlying linear preference functions of the buyer. We also adapt it as a heuristic for the case the buyer has a nonlinear preference function. The test results show that our approach works well.,gulsah karakaya,Not available,2016.0,10.1007/s10479-014-1669-4,Annals of Operations Research,Gülşah2016,False,,Springer,Not available,An interactive approach for Bi-attribute multi-item auctions,ebabbbb205d49890993dafed4b9db9b8,http://dx.doi.org/10.1007/s10479-014-1669-4 660,The advances in the technological infrastructure and in the Internet led electronic auctions to become popular. With online sites people buy/sell inexpensive products/services through auctions. In this paper we develop an interactive approach that provides aid to both the buyer and the bidders in a bi-attribute multi-item auction environment. Our approach is applicable for both reverse and forward auctions. We test our approach for underlying linear preference functions of the buyer. We also adapt it as a heuristic for the case the buyer has a nonlinear preference function. The test results show that our approach works well.,murat koksalan,Not available,2016.0,10.1007/s10479-014-1669-4,Annals of Operations Research,Gülşah2016,False,,Springer,Not available,An interactive approach for Bi-attribute multi-item auctions,ebabbbb205d49890993dafed4b9db9b8,http://dx.doi.org/10.1007/s10479-014-1669-4 661,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,dirk briskorn,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 662,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,kurt jornsten,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 663,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,jenny nossack,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 664,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,feng zhao,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 665,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,huazhi nie,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 666,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,hongbin chen,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 667,The modern era is marked by magnificent advances in information and communication technologies and has created opportunities for powerful new applications. In many of these applications the research challenges can be effectively addressed using game theory and mechanism design. In this article we highlight the key role that the brilliant discoveries of John Nash continue to play in these fascinating applications of game theory and mechanism design.,y. narahari,Not available,2016.0,10.1007/s12045-016-0385-6,Resonance,Y.2016,False,,Springer,Not available,Beautiful results from a beautiful mind,4e5420fff6894c2653e4b047895a92af,http://dx.doi.org/10.1007/s12045-016-0385-6 668,This research is an empirical study to find solid statistical evidence of collusion inauction for construction contracts and to gauge the possible effects of bid-rigging onauction prices in Korea. Using limited information contained in sketch bid data weshow that local construction firms enjoy statistically significant incumbency premiumsin their incumbent sites. Thus it is inferred that contractors engage in complementarybidding in which all bidders except one submit high bids so as to lose. The statisticalevidence of the incumbency effect is also confirmed in long-running civil engineeringconstruction contracts which are carried out over several years. Utilizing the transitionfrom a cooperative to non-cooperative regime we also estimate the potential damage ofstructural bid rigging in public-works contracts by year contractor and construction type. The estimated overcharge ratio based on a forecasting approach is 15.5% of the total expenditures from January 1995 to June 1998. We also present potential damage estimates by the firm. The estimated overcharge by contractor offers a guideline for the proper allocation of the total overcharges to construction contractors in case contractors are charged with bid-rigging and found guilty.,kyungdong hahn,Not available,2002.0,10.1023/A:1016018505021,Review of Industrial Organization,Kwon2002,False,,Springer,Not available,Bid-Rigging in Auctions for Korean Public-Works Contracts and Potential Damage,e79ee9371826cf7254f558906ca9bfd1,http://dx.doi.org/10.1023/A:1016018505021 669,Budget optimization (selecting an optimal set of keywords to bid for given a limited amount of budget) and bid optimization (determining optimal bids for the selected keywords) in the face of an unpredictable keyword traffic is a challenging problem facing advertisers in sponsored search auctions. Another key requirement in sponsored search auctions is stability of the bid profile which is usually characterized through the notion of locally envy-free equilibrium. A variety of budget optimization and bid optimization ideas have been proposed in the literature; the bid profiles suggested by them have varying stability properties. In this paper our objective is to come up with a bidding strategy for advertisers that is optimal for the budget optimization as well as the bid optimization problems and also guarantees convergence to a locally envy-free equilibrium. Our approach works with a linear program for the budget optimization problem whose optimal solution is a greedy strategy which we call the OPT strategy. The OPT strategy yields a bid profile that maximizes the return on investment for the advertisers and ensures convergence of the bid profiles to a locally envy-free equilibrium in the asynchronous case as well as in a restricted synchronous case. We also suggest an improved strategy called the MAX strategy which produces equal or higher advertiser utilities compared to the OPT strategy while enjoying identical equilibrium convergence properties as OPT.,yadati narahari,Not available,2012.0,10.1007/s12351-010-0097-8,Operational Research,Nittala2012,False,,Springer,Not available,Optimal equilibrium bidding strategies for budget constrained bidders in sponsored search auctions,28aa9aff83533be72e1c341c200c6c06,http://dx.doi.org/10.1007/s12351-010-0097-8 670," Inspired by Clower’s conjecture that the necessity of trading through money in monetised economies might hinder convergence to competitive equilibrium and hence for example cause unemployment we experimentally investigate behaviour in markets where trading has to be done through money. In order to evaluate the properties of these markets we compare their behaviour to behaviour in markets without money where money cannot intervene. As the trading mechanism might be a compounding factor we investigate two kinds of market mechanism: the ",john hey,Not available,2016.0,10.1007/s10683-015-9456-x,Experimental Economics,D.2016,False,,Springer,Not available,Does money impede convergence?,56b657c44a2005f44c81d2785e10e2da,http://dx.doi.org/10.1007/s10683-015-9456-x 671," Inspired by Clower’s conjecture that the necessity of trading through money in monetised economies might hinder convergence to competitive equilibrium and hence for example cause unemployment we experimentally investigate behaviour in markets where trading has to be done through money. In order to evaluate the properties of these markets we compare their behaviour to behaviour in markets without money where money cannot intervene. As the trading mechanism might be a compounding factor we investigate two kinds of market mechanism: the ",cagno di,Not available,2016.0,10.1007/s10683-015-9456-x,Experimental Economics,D.2016,False,,Springer,Not available,Does money impede convergence?,56b657c44a2005f44c81d2785e10e2da,http://dx.doi.org/10.1007/s10683-015-9456-x 672,An auction framework is examined where each seller is uncertain about whether or not he will have a good available to sell. A timely example includes the auctioning off of radio spectrum by licensed primary users to unlicensed secondary users. A licensed primary user may not use the spectrum all of the time but may not know in advance whether or not he will need the spectrum himself and thus whether or not he will have spectrum bandwidth available to rent out. We consider two types of auctions: an ex-post auction which takes place after each seller learns about the availability of the good and an ex-ante auction which takes place before each seller learns about availability. The expected payoffs to buyers sellers and to society are then compared. The ex-ante auction can cause buyers to bid on multiple expected units to ensure that they end up with at least one actual unit. Such over purchasing can create a loss to society. Sellers will prefer the ex-post auction since if fewer units are actually available to sell then they can be sold at a higher price. Whereas in the ex-ante auction all sellers have one expected unit available to sell which results in a lower price. However if high value buyers are common then a buyer may prefer the ex-ante auction as it can be easier to win an expected unit than an ex-post actual unit. In contrast if a buyer has a high valuation and if high value buyers are uncommon then he may prefer the ex-post auction since he has a strong chance to win an actual unit.,alison watts,Not available,2016.0,10.1007/s00712-016-0483-7,Journal of Economics,Alison2016,False,,Springer,Not available,Two ways to auction off an uncertain good,87c4b63371b3d1ddc9c39377b734dbad,http://dx.doi.org/10.1007/s00712-016-0483-7 673,We show that ,david ettinger,Not available,2016.0,10.1007/s10058-016-0187-z,Review of Economic Design,David2016,False,,Springer,Not available,Creating a winner’s curse via jump bids,14a1699725506673b6c789e13f1e074f,http://dx.doi.org/10.1007/s10058-016-0187-z 674,We show that ,fabio michelucci,Not available,2016.0,10.1007/s10058-016-0187-z,Review of Economic Design,David2016,False,,Springer,Not available,Creating a winner’s curse via jump bids,14a1699725506673b6c789e13f1e074f,http://dx.doi.org/10.1007/s10058-016-0187-z 675,Establishing national corridors have been identified as a policy priority for environmental and biodiversity conservation in many parts of the world. We explore the performance of a combinatorial landscape auction design to establish environmental corridors using an agent based simulation model. This modelling technique is highly flexible in modelling decision making processes involving heterogeneous landholders. Such structures allow landholders the opportunity to submit joint bids and as such share in the benefits that synergies across the landscape provide. The contribution of the paper is threefold. First we compare spatial and non-spatial project selection to observe whether it is possible to achieve corridor outcomes with a non-spatially targeted project selection mechanism? We observe that while a corridor project selection mechanism increases the procurement cost such selection mechanisms are necessary for spatially targeted objectives. Second we study the effect of allowing agents to form coalitions and submit joint bids. We find evidence that joint bidding substantially increased procurement costs especially when the agency’s target was to secure environmental corridors. Third we study the combined effect of off-site synergies and joint bidding. We observe that relative benefits from off-site synergy are higher in spatial targeting programs compared to non-corridor targeting programs.,md. iftekhar,Not available,2016.0,10.1007/s10640-015-9882-4,Environmental and Resource Economics,Sayed2016,False,,Springer,Not available,An Agent Based Analysis of Combinatorial Bidding for Spatially Targeted Multi-Objective Environmental Programs,2b82a64ffec837cacece798060a908a6,http://dx.doi.org/10.1007/s10640-015-9882-4 676,Establishing national corridors have been identified as a policy priority for environmental and biodiversity conservation in many parts of the world. We explore the performance of a combinatorial landscape auction design to establish environmental corridors using an agent based simulation model. This modelling technique is highly flexible in modelling decision making processes involving heterogeneous landholders. Such structures allow landholders the opportunity to submit joint bids and as such share in the benefits that synergies across the landscape provide. The contribution of the paper is threefold. First we compare spatial and non-spatial project selection to observe whether it is possible to achieve corridor outcomes with a non-spatially targeted project selection mechanism? We observe that while a corridor project selection mechanism increases the procurement cost such selection mechanisms are necessary for spatially targeted objectives. Second we study the effect of allowing agents to form coalitions and submit joint bids. We find evidence that joint bidding substantially increased procurement costs especially when the agency’s target was to secure environmental corridors. Third we study the combined effect of off-site synergies and joint bidding. We observe that relative benefits from off-site synergy are higher in spatial targeting programs compared to non-corridor targeting programs.,john tisdell,Not available,2016.0,10.1007/s10640-015-9882-4,Environmental and Resource Economics,Sayed2016,False,,Springer,Not available,An Agent Based Analysis of Combinatorial Bidding for Spatially Targeted Multi-Objective Environmental Programs,2b82a64ffec837cacece798060a908a6,http://dx.doi.org/10.1007/s10640-015-9882-4 677,This paper studies second-price auctions in which bidders make participation decisions sequentially in an exogenous order and participating bidders incur bidding costs. When bidders decide whether to participate or not they know their own valuations as well as earlier bidders’ participation decisions. To analyze bidders’ participation and bidding decisions we study equilibria in cutoff strategies with which a bidder participates and bids his valuation if his valuation exceeds a cutoff given his observation on earlier bidders’ participation. Focusing on the case of two bidders we present two main results on comparative statics and revenue comparison. In the comparative statics analysis we study the effects of a change in bidders’ characteristics on equilibrium cutoffs. In revenue comparison we show that the considered sequential entry format yields lower revenue than the simultaneous entry counterpart. Finally we discuss the difficulties in generalizing these two results for the case of more than two bidders.,jinhyuk lee,Not available,2016.0,10.1007/s00199-015-0915-6,Economic Theory,Jinhyuk2016,False,,Springer,Not available,Second-price auctions with sequential and costly participation,428c82346047d8e858938fdf2977743e,http://dx.doi.org/10.1007/s00199-015-0915-6 678,This paper studies second-price auctions in which bidders make participation decisions sequentially in an exogenous order and participating bidders incur bidding costs. When bidders decide whether to participate or not they know their own valuations as well as earlier bidders’ participation decisions. To analyze bidders’ participation and bidding decisions we study equilibria in cutoff strategies with which a bidder participates and bids his valuation if his valuation exceeds a cutoff given his observation on earlier bidders’ participation. Focusing on the case of two bidders we present two main results on comparative statics and revenue comparison. In the comparative statics analysis we study the effects of a change in bidders’ characteristics on equilibrium cutoffs. In revenue comparison we show that the considered sequential entry format yields lower revenue than the simultaneous entry counterpart. Finally we discuss the difficulties in generalizing these two results for the case of more than two bidders.,jaeok park,Not available,2016.0,10.1007/s00199-015-0915-6,Economic Theory,Jinhyuk2016,False,,Springer,Not available,Second-price auctions with sequential and costly participation,428c82346047d8e858938fdf2977743e,http://dx.doi.org/10.1007/s00199-015-0915-6 679,With the dramatic growth of Internet video streaming applications resource provisioning for video streaming systems to satisfy their upload bandwidth deficit is a challenging task. The design of incentive mechanisms for taking advantage of unused upload capability of ,seyedakbar mostafavi,Not available,2016.0,10.1007/s11042-015-2771-6,Multimedia Tools and Applications,Seyedakbar2016,False,,Springer,Not available,Game theoretic bandwidth procurement mechanisms in live P2P streaming systems,c6e285584c3879166b90f1676d956900,http://dx.doi.org/10.1007/s11042-015-2771-6 680,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,patrick maille,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 681,With the dramatic growth of Internet video streaming applications resource provisioning for video streaming systems to satisfy their upload bandwidth deficit is a challenging task. The design of incentive mechanisms for taking advantage of unused upload capability of ,mehdi dehghan,Not available,2016.0,10.1007/s11042-015-2771-6,Multimedia Tools and Applications,Seyedakbar2016,False,,Springer,Not available,Game theoretic bandwidth procurement mechanisms in live P2P streaming systems,c6e285584c3879166b90f1676d956900,http://dx.doi.org/10.1007/s11042-015-2771-6 682,A retailer places a certain product (eg compact rental cars) for sale on the internet. Customers are invited to ‘name-their-own price’ for the product. The retailer will accept a given bid ,john wilson,Not available,2008.0,10.1057/rpm.2008.13,Journal of Revenue and Pricing Management,G2008,False,,Springer,Not available,Optimal design of a name-your-own price channel,751d156e780390eeccbe6736870faf76,http://dx.doi.org/10.1057/rpm.2008.13 683,A retailer places a certain product (eg compact rental cars) for sale on the internet. Customers are invited to ‘name-their-own price’ for the product. The retailer will accept a given bid ,guoren zhang,Not available,2008.0,10.1057/rpm.2008.13,Journal of Revenue and Pricing Management,G2008,False,,Springer,Not available,Optimal design of a name-your-own price channel,751d156e780390eeccbe6736870faf76,http://dx.doi.org/10.1057/rpm.2008.13 684,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,markus hinkelmann,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 685,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,andreas jakoby,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 686,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,peer stechert,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 687," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",subhash khot,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 688," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",richard lipton,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 689," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",evangelos markakis,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 690," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",aranyak mehta,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 691,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,evangelos markakis,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 692,Campbell (J Econ Theory 82:425–450 1998) develops a self-enforced collusion mechanism in simultaneous auctions based on complete comparative cheap talk and endogenous entry with two bidders. His result is difficult to generalize to an arbitrary number of bidders since the entry-decision stage of the game is characterized by strategic substitutes. This paper analyzes more-than-two-bidder symmetric-prior cases. Two results are proved: (1) as the number of objects grows large a full comparative cheap talk equilibrium exists and it yields asymptotically fully efficient collusion; and (2) there is always a partial comparative cheap talk equilibrium. All these results are supported by intuitive equilibria at the entry-decision stage (J Econ Theory 130:205–219 2006; Math Soc Sci 2008 forthcoming). Numerical examples suggest that full comparative cheap talk equilibria are not uncommon even with few objects.,antonio miralles,Not available,2008.0,10.1007/s00199-008-0403-3,Economic Theory,Antonio2008,False,,Springer,Not available,Self-enforced collusion through comparative cheap talk in simultaneous auctions with entry,a170cf03f0674d54c00197d4cbba829d,http://dx.doi.org/10.1007/s00199-008-0403-3 693,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,xin wang,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 694,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,alan montgomery,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 695,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,kannan srinivasan,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 696,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,adriano pereira,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 697,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,leonardo rocha,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 698,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,fernando mourao,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 699,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,paulo goes,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 700,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,wagner meira,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 701,We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins or having no winner rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first-price auction which gives higher performance. Thus to provide benefits the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities.,kay-yut chen,Not available,2008.0,10.1007/s11128-008-0079-4,Quantum Information Processing,Kay-Yut2008,False,,Springer,Not available,Experiments with probabilistic quantum auctions,cf53ce0f0169dc74b111a69955304eba,http://dx.doi.org/10.1007/s11128-008-0079-4 702,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,maurizio naldi,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 703,We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins or having no winner rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first-price auction which gives higher performance. Thus to provide benefits the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities.,tad hogg,Not available,2008.0,10.1007/s11128-008-0079-4,Quantum Information Processing,Kay-Yut2008,False,,Springer,Not available,Experiments with probabilistic quantum auctions,cf53ce0f0169dc74b111a69955304eba,http://dx.doi.org/10.1007/s11128-008-0079-4 704,In this paper we examine which auction format first-price or second-price a seller will choose when he can profitably cheat in a second price auction by observing all bids by possible buyers and submitting a shill bid as pretending to be a buyer. We model this choice of auction format in seller cheating as a signaling game in which the buyers may regard the selection of a second price auction by the seller as a signal that he is a shill bidder. By introducing trembling-hand perfectness as a refinement of signaling equilibrium we find two possible strictly perfect signaling equilibria. One is a separating equilibrium in which a noncheating honest seller selects a first price auction and a cheating seller does a second price auction. In another pooling equilibrium however both cheating and non-cheating sellers select a second price auction. The conclusion that a seller chooses a second price auction even if he cannot cheat is in contrast to the previous literature which focused on the case of independent values.,takahiro watanabe,Not available,2008.0,10.1007/s00199-007-0262-3,Economic Theory,Takahiro2008,False,,Springer,Not available,A choice of auction format in seller cheating: a signaling game analysis,68271bd34a1266de0809677a1f3b5558,http://dx.doi.org/10.1007/s00199-007-0262-3 705,In this paper we examine which auction format first-price or second-price a seller will choose when he can profitably cheat in a second price auction by observing all bids by possible buyers and submitting a shill bid as pretending to be a buyer. We model this choice of auction format in seller cheating as a signaling game in which the buyers may regard the selection of a second price auction by the seller as a signal that he is a shill bidder. By introducing trembling-hand perfectness as a refinement of signaling equilibrium we find two possible strictly perfect signaling equilibria. One is a separating equilibrium in which a noncheating honest seller selects a first price auction and a cheating seller does a second price auction. In another pooling equilibrium however both cheating and non-cheating sellers select a second price auction. The conclusion that a seller chooses a second price auction even if he cannot cheat is in contrast to the previous literature which focused on the case of independent values.,takehiko yamato,Not available,2008.0,10.1007/s00199-007-0262-3,Economic Theory,Takahiro2008,False,,Springer,Not available,A choice of auction format in seller cheating: a signaling game analysis,68271bd34a1266de0809677a1f3b5558,http://dx.doi.org/10.1007/s00199-007-0262-3 706,Despite the prevalence of grandfathered permits we still observe that a hybrid policy in which a fraction of initial emission permits is distributed through auctions is adopted in some cases. We also observe that some polluting industries support auctioned permits and that most environmental groups support grandfathered permits. This paper attempts to explain these phenomena from the perspective of political economy and investigates the conditions under which grandfathering auctions or a hybrid instrument will be the equilibrium policy. By constructing a two-stage lobbying game in which the type of policy instrument (auction grandfathering or a hybrid instrument) is determined in the first stage and then the number of permits is decided in the second stage we highlight the strategic interaction of the lobbying activities between the two stages in explaining the behavior of the lobbying groups.,yu-bong lai,Not available,2008.0,10.1007/s11127-008-9290-1,Public Choice,Yu-Bong2008,False,,Springer,Not available,Auctions or grandfathering: the political economy of tradable emission permits,57523ee6c3b8e8cbe88ed066002aa28b,http://dx.doi.org/10.1007/s11127-008-9290-1 707,We consider a Rothschild–Stiglitz–Spence labour market model and employ a centralised mechanism to coordinate the efficient matching of workers to firms. This mechanism can be thought of as operated by a recruitment agency an employment office or head hunter. In a centralised descending-bid multi-item procurement auction workers submit wage-bids for each job and are assigned stable jobs as equilibrium outcome. We compare this outcome to independent sequential hiring by firms and conclude that in general a stable assignment can only be implemented if firms coordinate to some extent.,paul schweinzer,Not available,2008.0,10.1007/s10058-008-0045-8,Review of Economic Design,Paul2008,False,,Springer,Not available,Labour market recruiting with intermediaries,8dcf17c7e97cae5bac98b27c403145ae,http://dx.doi.org/10.1007/s10058-008-0045-8 708,This paper presents an auction mechanism for energy trading between multiple microgrids. We consider a region consisting of multiple interconnected microgrids wherein given time ,bizzat zaidi,Not available,2018.0,10.1007/s00202-017-0570-y,Electrical Engineering,Hussain2018,False,,Springer,Not available,Combinatorial double auctions for multiple microgrid trading,a8f89e0add7dc14d2865782f7296e71f,http://dx.doi.org/10.1007/s00202-017-0570-y 709,This paper presents an auction mechanism for energy trading between multiple microgrids. We consider a region consisting of multiple interconnected microgrids wherein given time ,seung hong,Not available,2018.0,10.1007/s00202-017-0570-y,Electrical Engineering,Hussain2018,False,,Springer,Not available,Combinatorial double auctions for multiple microgrid trading,a8f89e0add7dc14d2865782f7296e71f,http://dx.doi.org/10.1007/s00202-017-0570-y 710,Almost a decade after the onset of the global financial crisis the stock of non-performing loans (NPLs) still represents a major burden for European banks’ profitability and a severe headwind for credit growth at an area-wide level. While a great deal has been done to establish stricter supervisory rules and more robust insolvency frameworks the development of an efficient secondary market for impaired assets is currently lagging behind especially in the countries where the level of troubled loans is more worrisome. To address this problem the European Banking Authority has recently proposed to set up an EU-backed asset management company (AMC) for the exchange of NPLs. In addition to the difficulties associated with a full compliance of a public AMC with EU State aid rules we argue that such a vehicle might be useful in solving just one of the three failures typically affecting the market for NPLs that is the information asymmetry between buyers and sellers. To successfully tackle the other two—namely market power and collusion—a correct design of the market is crucial. From this point of view auction theory can be of great help.,edoardo gaffeo,Not available,2018.0,10.1057/s41261-018-0069-0,Journal of Banking Regulation,Edoardo2018,False,,Springer,Not available,“The price is right”: using auction theory to enhance competition in the NPL market,dfdd2d08a03859c9b17789ee35127995,http://dx.doi.org/10.1057/s41261-018-0069-0 711,Almost a decade after the onset of the global financial crisis the stock of non-performing loans (NPLs) still represents a major burden for European banks’ profitability and a severe headwind for credit growth at an area-wide level. While a great deal has been done to establish stricter supervisory rules and more robust insolvency frameworks the development of an efficient secondary market for impaired assets is currently lagging behind especially in the countries where the level of troubled loans is more worrisome. To address this problem the European Banking Authority has recently proposed to set up an EU-backed asset management company (AMC) for the exchange of NPLs. In addition to the difficulties associated with a full compliance of a public AMC with EU State aid rules we argue that such a vehicle might be useful in solving just one of the three failures typically affecting the market for NPLs that is the information asymmetry between buyers and sellers. To successfully tackle the other two—namely market power and collusion—a correct design of the market is crucial. From this point of view auction theory can be of great help.,ronny mazzocchi,Not available,2018.0,10.1057/s41261-018-0069-0,Journal of Banking Regulation,Edoardo2018,False,,Springer,Not available,“The price is right”: using auction theory to enhance competition in the NPL market,dfdd2d08a03859c9b17789ee35127995,http://dx.doi.org/10.1057/s41261-018-0069-0 712,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,zheng-dong xia,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 713,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,george stamoulis,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 714,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,tian-ming bu,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 715,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,wen-hui gong,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 716,This paper provides a theoretical and empirical analysis of the multi-unit Dutch teleshopping auctions of 1–2–3.tv. There are two channels for sales transactions: Customers either bid in the teleshopping auctions or purchase in the online shop for a simultaneously available fixed price. Our theoretical analysis indicates that profit-maximizing customers do not overbid the fixed price since they risk experiencing the Bidder’s Curse: Buying at a uniform auction price that is higher than the fixed price. Our data set includes nearly 700 000 recorded bids. We find that customers overbid in 26% of all bids but the Bidder’s Curse only occurs in 5% of all auctions. Offline-bidders (telephone calls) overbid both by larger amounts and more often than do online-bidders (website or app) and on average the most frequent customers do not experience learning effects.,fabian ocker,Not available,2018.0,10.1007/s12525-018-0295-4,Electronic Markets,Fabian2018,False,,Springer,Not available,“Bid more pay less” – overbidding and the Bidder’s curse in teleshopping auctions,00c3cf62165178d3790d02daed7627e7,http://dx.doi.org/10.1007/s12525-018-0295-4 717,I study revenue maximizing mechanisms in the presence of agents who are loss averse in the sense of Köszegi and Rabin (Quart J Econ 121:1133–1166 ,roland eisenhuth,Not available,2018.0,10.1007/s40505-018-0144-9,Economic Theory Bulletin,Roland2018,False,,Springer,Not available,Reference-dependent mechanism design,a5b133ea87771fca9e3cf61cd45da941,http://dx.doi.org/10.1007/s40505-018-0144-9 718,I investigate the incentives to release information in markets in which auctioneers running second-price auctions compete for buyers by releasing information about their products before buyers decide in which auction they wish to participate. I provide sufficient conditions for the existence of an equilibrium in which both sellers release information even if there are only two buyers in the market. This result is in contrast to previous findings reported in the literature showing that the optimal decision for a monopolist facing a fixed set of two buyers is to not release any information. Thus the results of the paper suggest that competition between auctioneers strengthens the incentives to release information in markets in which selling mechanisms are second-price auctions.,cristian troncoso-valverde,Not available,2018.0,10.1007/s00199-017-1039-y,Economic Theory,Cristián2018,False,,Springer,Not available,Releasing information in private-value second-price auctions,55082076c6ba1fbbca1050dc77fc7254,http://dx.doi.org/10.1007/s00199-017-1039-y 719,An English auction is studied in which bidders can acquire information during the bidding process allowing for heterogeneity both in ex-ante private information and the cost of information acquisition. The best response has a simple characterization where the optimal information acquisition time is unaffected by the other bidders’ strategies. We prove the existence of an equilibrium in a novel way by characterizing it as a fixed point in the space of bid distributions rather than the space of bid functions. Furthermore we show that when bidders have homogeneous ex-ante private information about valuations: (1) The English auction generates more revenue than the Vickrey auction when the number of bidders is sufficiently large; and (2) the English auction is more efficient than the Vickrey auction when the information acquisition cost are relatively small. We present numerical simulations that show that these effects can be large. Our findings provide an additional explanation for the popularity of the English auction even in settings where the bidders’ valuations are independent.,leonardo rezende,Not available,2018.0,10.1007/s00199-017-1038-z,Economic Theory,Leonardo2018,False,,Springer,Not available,Mid-auction information acquisition,5372cab08e7f4e61a3ad83c32022a41b,http://dx.doi.org/10.1007/s00199-017-1038-z 720,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,junwu zhu,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 721,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,heng song,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 722,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,yi jiang,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 723,As technology evolves and electricity demand rises an increasing number of researches have focused on the efficient electricity allocation mechanisms so as to make consumer demand adaptive to the supply of electricity at all times. Considering the respective characteristics of the fixed price and the dynamic price model commonly used in the electricity market in this paper we formulate the problem of electricity allocation as a novel combinatorial auction model and then put forward two directly applicable mechanisms called TAMEA-FP based on fixed price model and TAMEA-DP based on dynamic price model respectively. In addition it is theoretically proven that both the proposed mechanisms are equipped with the economic properties such as individual rationality budget balance and truthfulness. Finally extensive simulation results show that both the proposed mechanisms own the allocation efficiency and computational traceability with the time complexity.,bin li,Not available,2018.0,10.1007/s11042-017-4855-y,Multimedia Tools and Applications,Junwu2018,False,,Springer,Not available,On truthful auction mechanisms for electricity allocation with multiple time slots,21e6b8bed73cf2a371259d0047cdb6ba,http://dx.doi.org/10.1007/s11042-017-4855-y 724,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,bruno tuffin,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 725,This study employs a laboratory experiment to assess the performance of tradable permit markets on dynamic efficiency arising from cost-reducing investment. The permit allocation rule is the main treatment variable with permits being fully auctioned or grandfathered. The experimental results show significant investment under both allocation rules in the presence of ex ante uncertainty over the actual investment outcome. However auctioning permits generally provides stronger incentives to invest in R&D leading to greater dynamic efficiency compared to grandfathering.,timothy cason,Not available,2018.0,10.1007/s10640-018-0247-7,Environmental and Resource Economics,N.2018,True,,Springer,Not available,Dynamic Efficiency in Experimental Emissions Trading Markets with Investment Uncertainty,d012aed5a577bf3ead4e690a453ba3a2,http://dx.doi.org/10.1007/s10640-018-0247-7 726,This study employs a laboratory experiment to assess the performance of tradable permit markets on dynamic efficiency arising from cost-reducing investment. The permit allocation rule is the main treatment variable with permits being fully auctioned or grandfathered. The experimental results show significant investment under both allocation rules in the presence of ex ante uncertainty over the actual investment outcome. However auctioning permits generally provides stronger incentives to invest in R&D leading to greater dynamic efficiency compared to grandfathering.,frans vries,Not available,2018.0,10.1007/s10640-018-0247-7,Environmental and Resource Economics,N.2018,True,,Springer,Not available,Dynamic Efficiency in Experimental Emissions Trading Markets with Investment Uncertainty,d012aed5a577bf3ead4e690a453ba3a2,http://dx.doi.org/10.1007/s10640-018-0247-7 727,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,gangqiang zhou,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 728,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,jigang wu,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 729,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,long chen,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 730,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,guiyuan jiang,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 731,Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However most of them failed to jointly consider the two techniques together and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison we compare the proposed schemes with HAF which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes.,siew-kei lam,Not available,2018.0,10.1007/s11276-018-1725-0,Wireless Networks,Gangqiang2018,False,,Springer,Not available,Efficient three-stage auction schemes for cloudlets deployment in wireless access network,7b40ba1e5bbe51c8d1f95f758f035eff,http://dx.doi.org/10.1007/s11276-018-1725-0 732," Experimental research on first price sealed bid auctions has usually involved repeated settings with information feedback on winning bids and payoffs after each auction round. Relative to the risk neutral Nash equilibrium significantly higher bidding has been reported. The present paper reports the results of experimental first price auctions with ",tibor neugebauer,Not available,2008.0,10.1007/s10683-007-9166-0,Experimental Economics,Tibor2008,False,,Springer,Not available,Bidding ‘as if’ risk neutral in experimental first price auctions without information feedback,7fb84863d02b1643d7b60efda0811187,http://dx.doi.org/10.1007/s10683-007-9166-0 733," Experimental research on first price sealed bid auctions has usually involved repeated settings with information feedback on winning bids and payoffs after each auction round. Relative to the risk neutral Nash equilibrium significantly higher bidding has been reported. The present paper reports the results of experimental first price auctions with ",javier perote,Not available,2008.0,10.1007/s10683-007-9166-0,Experimental Economics,Tibor2008,False,,Springer,Not available,Bidding ‘as if’ risk neutral in experimental first price auctions without information feedback,7fb84863d02b1643d7b60efda0811187,http://dx.doi.org/10.1007/s10683-007-9166-0 734," I analyze the committee assignment process as an all-pay auction and derive equilibrium lobbying strategies of legislators competing for vacant seats on a committee. The model illustrates the relationship between sincere and revealed preferences which earlier formal models of committee assignment do not explicitly consider. Incorporating seniority party loyalty effort constraints or committee transfers can discourage those who highly value the assignment from competitively lobbying for the seat. I also offer an alternative interpretation of the model’s parameters to consider the pure partisan assignment model where efforts are contributions to the party’s collective good. ",daniel lee,Not available,2008.0,10.1007/s11127-007-9256-8,Public Choice,J.2008,False,,Springer,Not available,Going once going twice sold! The committee assignment process as an all-pay auction,b9c3beaaa79a09162d3ccff0584ec2fd,http://dx.doi.org/10.1007/s11127-007-9256-8 735,We construct a model of multi-unit auctions in which ,francisco alvarez,Not available,2012.0,10.1007/s00199-010-0594-2,Economic Theory,Francisco2012,False,,Springer,Not available,Multi-unit auctions with private information: an indivisible unit continuous price model,ad33ed7bcf40fe21d482ba65dd6b55e5,http://dx.doi.org/10.1007/s00199-010-0594-2 736,This article considers how information and communications technologies (ICT) can be used by organised crime groups to infringe legal and regulatory controls. Three categories of groups are identified: traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; organised cybercriminal groups which operate exclusively online; and organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct. The activities of each group are then assessed in relation to five areas of risk: the use of online payment systems online auctions online gaming social networking sites and blogs. It is concluded that the distinction between traditional organised crime groups and the other two groups—cybercriminal groups and ideologically/politically motivated cyber groups—is converging with financially-motivated attacks becoming more targeted. Legislation will need to adapt to deal with new technological developments and threats that organised criminals seek to exploit.,kim-kwang choo,Not available,2008.0,10.1007/s11417-007-9035-y,Asian Journal of Criminology,Raymond2008,False,,Springer,Not available,Criminal Exploitation of Online Systems by Organised Crime Groups,2441191d7e1ea8e609eed437607a4feb,http://dx.doi.org/10.1007/s11417-007-9035-y 737,This article considers how information and communications technologies (ICT) can be used by organised crime groups to infringe legal and regulatory controls. Three categories of groups are identified: traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; organised cybercriminal groups which operate exclusively online; and organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct. The activities of each group are then assessed in relation to five areas of risk: the use of online payment systems online auctions online gaming social networking sites and blogs. It is concluded that the distinction between traditional organised crime groups and the other two groups—cybercriminal groups and ideologically/politically motivated cyber groups—is converging with financially-motivated attacks becoming more targeted. Legislation will need to adapt to deal with new technological developments and threats that organised criminals seek to exploit.,russell smith,Not available,2008.0,10.1007/s11417-007-9035-y,Asian Journal of Criminology,Raymond2008,False,,Springer,Not available,Criminal Exploitation of Online Systems by Organised Crime Groups,2441191d7e1ea8e609eed437607a4feb,http://dx.doi.org/10.1007/s11417-007-9035-y 738,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,aloisio araujo,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 739,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,luciano castro,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 740,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,humberto moreira,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 741,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. Mechanism design is concerned with settings where a social planner faces the problem of aggregating the announced preferences of multiple agents into a collective decision when the agents exhibit strategic behaviour. The objective of this paper is to provide a tutorial introduction to the foundations and key results in mechanism design theory. The paper is in two parts. Part 1 focuses on basic concepts and classical results which form the foundation of mechanism design theory. Part 2 presents key advanced concepts and deeper results in mechanism design.,dinesh garg,Not available,2008.0,10.1007/s12046-008-0008-3,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 1-Key concepts and classical results,4686335c6e30e1d5eca33833089f4916,http://dx.doi.org/10.1007/s12046-008-0008-3 742,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. Mechanism design is concerned with settings where a social planner faces the problem of aggregating the announced preferences of multiple agents into a collective decision when the agents exhibit strategic behaviour. The objective of this paper is to provide a tutorial introduction to the foundations and key results in mechanism design theory. The paper is in two parts. Part 1 focuses on basic concepts and classical results which form the foundation of mechanism design theory. Part 2 presents key advanced concepts and deeper results in mechanism design.,y. narahari,Not available,2008.0,10.1007/s12046-008-0008-3,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 1-Key concepts and classical results,4686335c6e30e1d5eca33833089f4916,http://dx.doi.org/10.1007/s12046-008-0008-3 743,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. Mechanism design is concerned with settings where a social planner faces the problem of aggregating the announced preferences of multiple agents into a collective decision when the agents exhibit strategic behaviour. The objective of this paper is to provide a tutorial introduction to the foundations and key results in mechanism design theory. The paper is in two parts. Part 1 focuses on basic concepts and classical results which form the foundation of mechanism design theory. Part 2 presents key advanced concepts and deeper results in mechanism design.,sujit gujar,Not available,2008.0,10.1007/s12046-008-0008-3,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 1-Key concepts and classical results,4686335c6e30e1d5eca33833089f4916,http://dx.doi.org/10.1007/s12046-008-0008-3 744,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. In the first part of this tutorial on mechanism design (Garg ,dinesh garg,Not available,2008.0,10.1007/s12046-008-0009-2,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results,992ae2f670cb6d41fa685c0df0caa6b2,http://dx.doi.org/10.1007/s12046-008-0009-2 745,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. In the first part of this tutorial on mechanism design (Garg ,y. narahari,Not available,2008.0,10.1007/s12046-008-0009-2,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results,992ae2f670cb6d41fa685c0df0caa6b2,http://dx.doi.org/10.1007/s12046-008-0009-2 746,We construct a model of multi-unit auctions in which ,cristina mazon,Not available,2012.0,10.1007/s00199-010-0594-2,Economic Theory,Francisco2012,False,,Springer,Not available,Multi-unit auctions with private information: an indivisible unit continuous price model,ad33ed7bcf40fe21d482ba65dd6b55e5,http://dx.doi.org/10.1007/s00199-010-0594-2 747,Mechanism design an important tool in microeconomics has found widespread applications in modelling and solving decentralized design problems in many branches of engineering notably computer science electronic commerce and network economics. In the first part of this tutorial on mechanism design (Garg ,sujit gujar,Not available,2008.0,10.1007/s12046-008-0009-2,Sadhana,Dinesh2008,False,,Springer,Not available,Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results,992ae2f670cb6d41fa685c0df0caa6b2,http://dx.doi.org/10.1007/s12046-008-0009-2 748,Procurement auction literature typically assumes that the suppliers are uncapacitated [see e.g. Dasgupta and Spulber in Inf Econ Policy 4:5–29 1990 and Che in Rand J Econ 24(4):668–680 1993]. Consequently the auction mechanisms award the contract to a single supplier. We study mechanism design in a model where suppliers have limited production capacity and both the marginal costs and the production capacities are private information. We provide a closed-form solution for the revenue maximizing direct mechanism when the distribution of the cost and production capacities satisfies a modified ,garud iyengar,Not available,2008.0,10.1007/s10058-008-0046-7,Review of Economic Design,Garud2008,False,,Springer,Not available,Optimal procurement mechanisms for divisible goods with capacitated suppliers,f0f4a40d50620e5b58cb7b4437234c43,http://dx.doi.org/10.1007/s10058-008-0046-7 749,Procurement auction literature typically assumes that the suppliers are uncapacitated [see e.g. Dasgupta and Spulber in Inf Econ Policy 4:5–29 1990 and Che in Rand J Econ 24(4):668–680 1993]. Consequently the auction mechanisms award the contract to a single supplier. We study mechanism design in a model where suppliers have limited production capacity and both the marginal costs and the production capacities are private information. We provide a closed-form solution for the revenue maximizing direct mechanism when the distribution of the cost and production capacities satisfies a modified ,anuj kumar,Not available,2008.0,10.1007/s10058-008-0046-7,Review of Economic Design,Garud2008,False,,Springer,Not available,Optimal procurement mechanisms for divisible goods with capacitated suppliers,f0f4a40d50620e5b58cb7b4437234c43,http://dx.doi.org/10.1007/s10058-008-0046-7 750,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,ernan haruvy,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 751,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,leszczyc popkowski,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 752,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,octavian carare,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 753,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,james cox,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 754,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,eric greenleaf,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 755,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,wolfgang jank,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 756,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,sandy jap,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 757,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,peter cramton,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 758,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,young-hoon park,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 759,Even though auctions are capturing an increasing share of commerce they are typically treated in the theoretical economics literature as isolated. That is an auction is typically treated as a single seller facing multiple buyers or as a single buyer facing multiple sellers. In this paper we review the state of the art of competition between auctions. We consider three different types of competition: competition between auctions competition between formats and competition between auctioneers vying for auction traffic. We highlight the newest experimental statistical and analytical methods in the analysis of competition between auctions.,michael rothkopf,Not available,2008.0,10.1007/s11002-008-9037-2,Marketing Letters,Ernan2008,False,,Springer,Not available,Competition between auctions,c0d9738c64c22d8cb915d0cbe3924919,http://dx.doi.org/10.1007/s11002-008-9037-2 760,We consider situations in which a society tries to efficiently allocate several homogeneous and indivisible goods among agents. Each agent receives at most one unit of the good. In this paper we establish that ,hiroki saitoh,Not available,2008.0,10.1007/s00199-007-0235-6,Economic Theory,Hiroki2008,False,,Springer,Not available,Vickrey allocation rule with income effect,6b7904ea760290862ed5d601c31629dc,http://dx.doi.org/10.1007/s00199-007-0235-6 761,We consider situations in which a society tries to efficiently allocate several homogeneous and indivisible goods among agents. Each agent receives at most one unit of the good. In this paper we establish that ,shigehiro serizawa,Not available,2008.0,10.1007/s00199-007-0235-6,Economic Theory,Hiroki2008,False,,Springer,Not available,Vickrey allocation rule with income effect,6b7904ea760290862ed5d601c31629dc,http://dx.doi.org/10.1007/s00199-007-0235-6 762,This article studies the possibility of using auctions as a policy instrument in conservation programs. In particular it provides insight into the main concerns that need to be dealt with when implementing conservation auctions. To show the cost saving potential of this policy instrument we also calculate the social welfare improvement that can be obtained for an afforestation project in Flanders. When developing conservation policies it is thus worthwhile to consider auctions as an alternative policy instrument.,sandra rousseau,Not available,2008.0,10.1007/s10342-007-0196-0,European Journal of Forest Research,Sandra2008,False,,Springer,Not available,The potential of auctioning contracts for conservation policy,736553016609950a448b3b997364614b,http://dx.doi.org/10.1007/s10342-007-0196-0 763,This article studies the possibility of using auctions as a policy instrument in conservation programs. In particular it provides insight into the main concerns that need to be dealt with when implementing conservation auctions. To show the cost saving potential of this policy instrument we also calculate the social welfare improvement that can be obtained for an afforestation project in Flanders. When developing conservation policies it is thus worthwhile to consider auctions as an alternative policy instrument.,ellen moons,Not available,2008.0,10.1007/s10342-007-0196-0,European Journal of Forest Research,Sandra2008,False,,Springer,Not available,The potential of auctioning contracts for conservation policy,736553016609950a448b3b997364614b,http://dx.doi.org/10.1007/s10342-007-0196-0 764,Position auction is a well-studied model for analyzing online auctions for internet advertisement in which a set of advertisers bid for a set of slots in a search result page to display their advertisement links. In particular it was proved in [10 11] that the Generalized Second Price (GSP) mechanism for position auction has many interesting properties. In this paper we extend these results to range auction in which a bidder may specify a range of slots he is interested in. We prove GSP for range auction has an envy free equilibrium which is bidder optimal and has the minimum pay property. Further this equilibrium is equal to the outcome of the Vickrey-Clarke-Groves mechanism. We also show that the social welfare of any equilibrium of GSP for range auctions is not far from the optimal; it is at least 1/2 of the optimal.,h. ting,Not available,2012.0,10.1007/978-3-642-32241-9_49,Computing and Combinatorics,F.2012,False,,Springer,Not available,Equilibria of GSP for Range Auction,ea712c82282fa51fa95bc226cd017673,http://dx.doi.org/10.1007/978-3-642-32241-9_49 765,Position auction is a well-studied model for analyzing online auctions for internet advertisement in which a set of advertisers bid for a set of slots in a search result page to display their advertisement links. In particular it was proved in [10 11] that the Generalized Second Price (GSP) mechanism for position auction has many interesting properties. In this paper we extend these results to range auction in which a bidder may specify a range of slots he is interested in. We prove GSP for range auction has an envy free equilibrium which is bidder optimal and has the minimum pay property. Further this equilibrium is equal to the outcome of the Vickrey-Clarke-Groves mechanism. We also show that the social welfare of any equilibrium of GSP for range auctions is not far from the optimal; it is at least 1/2 of the optimal.,xiangzhong xiang,Not available,2012.0,10.1007/978-3-642-32241-9_49,Computing and Combinatorics,F.2012,False,,Springer,Not available,Equilibria of GSP for Range Auction,ea712c82282fa51fa95bc226cd017673,http://dx.doi.org/10.1007/978-3-642-32241-9_49 766,This paper proposes and studies a model of multi-unit auction that allows each bidder to specify a budget and a quantity constraint. The budget tells the auctioneer how much a bidder is willing to pay and the quantity constraint specifies the maximum number of items he wants. Unlike previous studies which assume uniform valuation (i.e. the value of an item to a bidder is fixed no matter how many items are allocated to him) we assume that the total value of the items allocated to a bidder stops increasing or may even start to decrease if the number of items exceeds his acceptable quantity. We give an auction mechanism for this model and prove that when the budgets and the quantity constraints are publicly known then our mechanism is Pareto Optimal and Incentive Compatible. On the other hand we show that if the quantity constraints are private then no mechanism can be both Pareto Optimal and Incentive Compatible even if the budgets are public. We also study the revenue generated by our mechanism.,h. ting,Not available,2012.0,10.1007/978-3-642-35261-4_69,Algorithms and Computation,F.2012,False,,Springer,Not available,Multi-unit Auctions with Budgets and Non-uniform Valuations,6d6c9a61b7034e2649efccdda5fb3999,http://dx.doi.org/10.1007/978-3-642-35261-4_69 767,This paper proposes and studies a model of multi-unit auction that allows each bidder to specify a budget and a quantity constraint. The budget tells the auctioneer how much a bidder is willing to pay and the quantity constraint specifies the maximum number of items he wants. Unlike previous studies which assume uniform valuation (i.e. the value of an item to a bidder is fixed no matter how many items are allocated to him) we assume that the total value of the items allocated to a bidder stops increasing or may even start to decrease if the number of items exceeds his acceptable quantity. We give an auction mechanism for this model and prove that when the budgets and the quantity constraints are publicly known then our mechanism is Pareto Optimal and Incentive Compatible. On the other hand we show that if the quantity constraints are private then no mechanism can be both Pareto Optimal and Incentive Compatible even if the budgets are public. We also study the revenue generated by our mechanism.,xiangzhong xiang,Not available,2012.0,10.1007/978-3-642-35261-4_69,Algorithms and Computation,F.2012,False,,Springer,Not available,Multi-unit Auctions with Budgets and Non-uniform Valuations,6d6c9a61b7034e2649efccdda5fb3999,http://dx.doi.org/10.1007/978-3-642-35261-4_69 768,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,emel filiz-ozbay,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 769,When agents with independent priors bid for a single item Myerson’s optimal auction maximizes expected revenue whereas Vickrey’s second-price auction optimizes social welfare. We address the natural question of ,ilias diakonikolas,Not available,2012.0,10.1007/978-3-642-31585-5_44,Automata Languages and Programming,Ilias2012,False,,Springer,Not available,Efficiency-Revenue Trade-Offs in Auctions,3615cd656e6997fcc5fa7658b819e136,http://dx.doi.org/10.1007/978-3-642-31585-5_44 770,When agents with independent priors bid for a single item Myerson’s optimal auction maximizes expected revenue whereas Vickrey’s second-price auction optimizes social welfare. We address the natural question of ,christos papadimitriou,Not available,2012.0,10.1007/978-3-642-31585-5_44,Automata Languages and Programming,Ilias2012,False,,Springer,Not available,Efficiency-Revenue Trade-Offs in Auctions,3615cd656e6997fcc5fa7658b819e136,http://dx.doi.org/10.1007/978-3-642-31585-5_44 771,When agents with independent priors bid for a single item Myerson’s optimal auction maximizes expected revenue whereas Vickrey’s second-price auction optimizes social welfare. We address the natural question of ,george pierrakos,Not available,2012.0,10.1007/978-3-642-31585-5_44,Automata Languages and Programming,Ilias2012,False,,Springer,Not available,Efficiency-Revenue Trade-Offs in Auctions,3615cd656e6997fcc5fa7658b819e136,http://dx.doi.org/10.1007/978-3-642-31585-5_44 772,When agents with independent priors bid for a single item Myerson’s optimal auction maximizes expected revenue whereas Vickrey’s second-price auction optimizes social welfare. We address the natural question of ,yaron singer,Not available,2012.0,10.1007/978-3-642-31585-5_44,Automata Languages and Programming,Ilias2012,False,,Springer,Not available,Efficiency-Revenue Trade-Offs in Auctions,3615cd656e6997fcc5fa7658b819e136,http://dx.doi.org/10.1007/978-3-642-31585-5_44 773,We extend the framework of mixed multi-unit combinatorial auctions to include time constraints present an expressive bidding language and show how to solve the winner determination problem for such auctions using integer programming. Mixed multi-unit combinatorial auctions are auctions where bidders can offer combinations of transformations of goods rather than just simple goods. This model has great potential for applications in the context of supply chain formation which is further enhanced by the integration of time constraints. We consider different kinds of time constraints: they may be based on either time points or intervals they may determine a relative ordering of transformations they may relate transformations to absolute time points and they may constrain the duration of transformations.,andreas witzel,Not available,2012.0,10.1007/978-3-642-34200-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Andreas2012,False,,Springer,Not available,Time Constraints in Mixed Multi-unit Combinatorial Auctions,d604044bdf6e24c61731f6424ff2538b,http://dx.doi.org/10.1007/978-3-642-34200-4_9 774,We extend the framework of mixed multi-unit combinatorial auctions to include time constraints present an expressive bidding language and show how to solve the winner determination problem for such auctions using integer programming. Mixed multi-unit combinatorial auctions are auctions where bidders can offer combinations of transformations of goods rather than just simple goods. This model has great potential for applications in the context of supply chain formation which is further enhanced by the integration of time constraints. We consider different kinds of time constraints: they may be based on either time points or intervals they may determine a relative ordering of transformations they may relate transformations to absolute time points and they may constrain the duration of transformations.,ulle endriss,Not available,2012.0,10.1007/978-3-642-34200-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Andreas2012,False,,Springer,Not available,Time Constraints in Mixed Multi-unit Combinatorial Auctions,d604044bdf6e24c61731f6424ff2538b,http://dx.doi.org/10.1007/978-3-642-34200-4_9 775,Given a bipartite graph ,cristina fernandes,Not available,2012.0,10.1007/978-3-642-32147-4_39,Combinatorial Optimization,G.2012,False,,Springer,Not available,Second-Price Ad Auctions with Binary Bids and Markets with Good Competition,2c4250dd0ce973ffc115d0a52ad736cb,http://dx.doi.org/10.1007/978-3-642-32147-4_39 776,Given a bipartite graph ,rafael schouery,Not available,2012.0,10.1007/978-3-642-32147-4_39,Combinatorial Optimization,G.2012,False,,Springer,Not available,Second-Price Ad Auctions with Binary Bids and Markets with Good Competition,2c4250dd0ce973ffc115d0a52ad736cb,http://dx.doi.org/10.1007/978-3-642-32147-4_39 777,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,marcel neumann,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 778,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,karl tuyls,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 779, We derive equilibrium bidding strategies in divisible good auctions for asymmetrically informed risk neutral and risk averse bidders when there is random noncompetitive demand. The equilibrium bid schedules contain both strategic considerations and explicit allowances for the winner's curse. When the bidders' information is symmetric the strategic aspects of bidding imply that there always exist equilibria of a uniform-price auction with lower expected revenue than provided by a discriminatory auction. When bidders are risk averse there may exist equilibria of the uniform-price auction that provide higher expected revenue than a discriminatory auction.,james wang,Not available,2002.0,10.1007/s001990100191,Economic Theory,J.D.2002,False,,Springer,Not available,Auctioning divisible goods,dbc2f8a5b0c5e7fcbf2ee2fac646398a,http://dx.doi.org/10.1007/s001990100191 780,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,erkut ozbay,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 781,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,michael kaisers,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 782,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,albert pla,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 783,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,beatriz lopez,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 784,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,javier murillo,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 785,We analyze an ascending auction with anonymous item- prices when there are two items that are substitutes. This popular auction format entails increased opportunities for bidders to coordinate bids as the bidding process is longer and since bidders see the other bids and can respond to various signaling. This has happened in many real auctions e.g.  in the Netherlands 3G Telecom Auction and in the FCC auctions in the US.While on the face of it such bidding behavior seems to harm economic efficiency we show that side-communication may actually improve the social efficiency of the auction: We describe an ex-post sub-game perfect equilibrium that uses limited side-communication and is ex-post efficient. In contrast without side-communication we show that there is no ex-post equilibrium which is ex-post efficient in the ascending auction.In the equilibrium strategy we suggest bidders start by reporting their true demands at the first stages of the auction and then perform a single demand reduction at a certain concrete point determined using a single message exchanged between the bidders. We show that this limited signaling opportunity resolves the strategic problems of myopic bidding and quite surprisingly improves social welfare instead of harming it.,ron lavi,Not available,2012.0,10.1007/978-3-642-30913-7_14,Auctions Market Mechanisms and Their Applications,Ron2012,False,,Springer,Not available,Side-Communication Yields Efficiency of Ascending Auctions: The Two-Items Case,3c395362835b038a3e2f51094cb5df78,http://dx.doi.org/10.1007/978-3-642-30913-7_14 786,We analyze an ascending auction with anonymous item- prices when there are two items that are substitutes. This popular auction format entails increased opportunities for bidders to coordinate bids as the bidding process is longer and since bidders see the other bids and can respond to various signaling. This has happened in many real auctions e.g.  in the Netherlands 3G Telecom Auction and in the FCC auctions in the US.While on the face of it such bidding behavior seems to harm economic efficiency we show that side-communication may actually improve the social efficiency of the auction: We describe an ex-post sub-game perfect equilibrium that uses limited side-communication and is ex-post efficient. In contrast without side-communication we show that there is no ex-post equilibrium which is ex-post efficient in the ascending auction.In the equilibrium strategy we suggest bidders start by reporting their true demands at the first stages of the auction and then perform a single demand reduction at a certain concrete point determined using a single message exchanged between the bidders. We show that this limited signaling opportunity resolves the strategic problems of myopic bidding and quite surprisingly improves social welfare instead of harming it.,sigal oren,Not available,2012.0,10.1007/978-3-642-30913-7_14,Auctions Market Mechanisms and Their Applications,Ron2012,False,,Springer,Not available,Side-Communication Yields Efficiency of Ascending Auctions: The Two-Items Case,3c395362835b038a3e2f51094cb5df78,http://dx.doi.org/10.1007/978-3-642-30913-7_14 787,Combinatorial auctions are a common abstraction of many complex resource allocation problems: A large number of items (goods resources) should be assigned to a number of agents (bidders) with different valuations on bundles of items. They are the central representative problem for the field of algorithmic mechanism design. In this field algorithmic problems are studied in a game theoretic setting in which the input of the algorithm is not publicly known but distributed among a set of selfish agents which would possibly lie about their private information if this would give an advantage to them. A mechanism is called ,berthold vocking,Not available,2012.0,10.1007/978-3-642-31585-5_6,Automata Languages and Programming,Berthold2012,False,,Springer,Not available,Randomized Mechanisms for Multi-unit Auctions,317e44f3e55fba39e31d999dbfa84e10,http://dx.doi.org/10.1007/978-3-642-31585-5_6 788,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has been focusing on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies in particular those that can be used in open and dynamic markets in which market situation is generally constantly changing. Obviously a good bidding strategy to be used in such realistic markets cannot be obtained by analytical methods which require all market information be known before a solution can possibly be found. Machine learning based approaches are not completely appropriate either as an optimal strategy learned from one market generally no longer perform well when the market situation changes. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in such dynamic markets. A bidder adopting this strategy constantly perceives the market situation and adaptively reviews and adjusts his bid determination thus responding to the dynamic market in a timely manner. Experiment results show that agents adopting this adaptive bidding strategy perform very well even without any prior knowledge about the market.,xin sui,Not available,2011.0,10.1007/s12530-011-9035-0,Evolving Systems,Xin2011,False,,Springer,Not available,Adaptive bidding in combinatorial auctions in dynamic markets,5f227aade28b55ba3a4598e666f01f79,http://dx.doi.org/10.1007/s12530-011-9035-0 789,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has been focusing on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies in particular those that can be used in open and dynamic markets in which market situation is generally constantly changing. Obviously a good bidding strategy to be used in such realistic markets cannot be obtained by analytical methods which require all market information be known before a solution can possibly be found. Machine learning based approaches are not completely appropriate either as an optimal strategy learned from one market generally no longer perform well when the market situation changes. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in such dynamic markets. A bidder adopting this strategy constantly perceives the market situation and adaptively reviews and adjusts his bid determination thus responding to the dynamic market in a timely manner. Experiment results show that agents adopting this adaptive bidding strategy perform very well even without any prior knowledge about the market.,ho-fung leung,Not available,2011.0,10.1007/s12530-011-9035-0,Evolving Systems,Xin2011,False,,Springer,Not available,Adaptive bidding in combinatorial auctions in dynamic markets,5f227aade28b55ba3a4598e666f01f79,http://dx.doi.org/10.1007/s12530-011-9035-0 790,In a combinatorial auction a set of items is for sale and agents can bid on subsets of these items. In a voting setting the agents decide among a set of alternatives by having each agent rank all the alternatives. Many of the key research issues in these two domains are similar. The aim of this paper is to give a convenient side-by-side comparison that will clarify the relation between the domains and serve as a guide to future research.,vincent conitzer,Not available,2010.0,10.1007/s10472-010-9205-y,Annals of Mathematics and Artificial Intelligence,Vincent2010,False,,Springer,Not available,Comparing multiagent systems research in combinatorial auctions and voting,d2ea60966bd4c7a4b5b2a1297c8460b3,http://dx.doi.org/10.1007/s10472-010-9205-y 791,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,pacharasut sujarittanonta,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 792,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,chuan-hoo tan,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 793,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,hock-hai teo,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 794,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,heng xu,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 795,This paper uses computational experiments where bidders learn over nonlinear bidding strategies to compare outcomes for alternative pricing format for multi-unit multiple-bid auctions. Multi-unit multiple-bid auctions in which bidders are allowed to submit multiple price-quantity bids are promising mechanisms for the allocation of a range of resources. The main advantage of such auctions is to avoid the lumpy bid problem which arises when bidders can only compete on the basis of one bid. However there is great uncertainty about the best auction formats when multi-unit auctions are used. The theory can only supply the expected structural properties of equilibrium strategies and the multiplicity of potential equilibria makes comparisons across auction formats difficult. Empirical studies and experiments have improved our knowledge of multi-unit auctions but they remain scarce and most experiments are restricted to two bidders and two units. Moreover they demonstrate that bidders have limited rationality and learn through experience. This paper constructs an agent-based computational model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The setting is for independent private values. We show that bidding behaviour displays more interesting patterns than is depicted in the theoretical literature and that bidding patterns depend on the interplay between heterogeneity in the bidder population and the degree of rationing in the auction. Results indicate that the three auction formats have similar performance for most levels of competition but that their performances differ when competition is weak. This ranking is dependent on whether the population of bidders is homogenous or heterogeneous.,atakelty hailu,Not available,2010.0,10.1007/s10614-010-9199-x,Computational Economics,Atakelty2010,False,,Springer,Not available,What Format for Multi-Unit Multiple-Bid Auctions?,afa1e6714d34b59029d73918714e22e3,http://dx.doi.org/10.1007/s10614-010-9199-x 796,This paper uses computational experiments where bidders learn over nonlinear bidding strategies to compare outcomes for alternative pricing format for multi-unit multiple-bid auctions. Multi-unit multiple-bid auctions in which bidders are allowed to submit multiple price-quantity bids are promising mechanisms for the allocation of a range of resources. The main advantage of such auctions is to avoid the lumpy bid problem which arises when bidders can only compete on the basis of one bid. However there is great uncertainty about the best auction formats when multi-unit auctions are used. The theory can only supply the expected structural properties of equilibrium strategies and the multiplicity of potential equilibria makes comparisons across auction formats difficult. Empirical studies and experiments have improved our knowledge of multi-unit auctions but they remain scarce and most experiments are restricted to two bidders and two units. Moreover they demonstrate that bidders have limited rationality and learn through experience. This paper constructs an agent-based computational model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The setting is for independent private values. We show that bidding behaviour displays more interesting patterns than is depicted in the theoretical literature and that bidding patterns depend on the interplay between heterogeneity in the bidder population and the degree of rationing in the auction. Results indicate that the three auction formats have similar performance for most levels of competition but that their performances differ when competition is weak. This ranking is dependent on whether the population of bidders is homogenous or heterogeneous.,sophie thoyer,Not available,2010.0,10.1007/s10614-010-9199-x,Computational Economics,Atakelty2010,False,,Springer,Not available,What Format for Multi-Unit Multiple-Bid Auctions?,afa1e6714d34b59029d73918714e22e3,http://dx.doi.org/10.1007/s10614-010-9199-x 797,In the digital economy electronic auction systems are becoming more prevalent in facilitating the transactions between buyers and sellers. Auction websites such as eBay and Amazon as well as more sophisticated platforms such as Moai and FrictionlessCommerce have increased transaction volume by offering tailored auction protocols to specific customer groups. meet2trade is a generic electronic market platform that supports various auction mechanisms. This study examines the impact of a discount in a second-price sealed-bid mechanism on bidding behavior and market outcomes. Emphasis is thereby placed on bidders’ system-based perceptions beliefs about usage and institutional-based trust and intention to use such an auction. Ninety students were recruited to participate in an experiment held at a Western European university. The experiment observed user behavior in second-price auctions with and without a discount. The results demonstrate that although discounts do affect bidding behavior and economic outcomes they do not influence bidder’s intentions to use such auction mechanisms. Instead we found that intention to use is influenced by institutional and usage beliefs that are shaped by system-based perceptions which in turn provide specific advice to market engineers on the technical aspects influencing system adoption.,eva chen,Not available,2010.0,10.1007/s10726-008-9117-y,Group Decision and Negotiation,Eva2010,False,,Springer,Not available,To Discount or Not to Discount: An Assessment of Perceptions Beliefs and Intentions to Use Electronic Auctions with Discounts,58a4fa58009456b2fb9111bdc23b624e,http://dx.doi.org/10.1007/s10726-008-9117-y 798,In the digital economy electronic auction systems are becoming more prevalent in facilitating the transactions between buyers and sellers. Auction websites such as eBay and Amazon as well as more sophisticated platforms such as Moai and FrictionlessCommerce have increased transaction volume by offering tailored auction protocols to specific customer groups. meet2trade is a generic electronic market platform that supports various auction mechanisms. This study examines the impact of a discount in a second-price sealed-bid mechanism on bidding behavior and market outcomes. Emphasis is thereby placed on bidders’ system-based perceptions beliefs about usage and institutional-based trust and intention to use such an auction. Ninety students were recruited to participate in an experiment held at a Western European university. The experiment observed user behavior in second-price auctions with and without a discount. The results demonstrate that although discounts do affect bidding behavior and economic outcomes they do not influence bidder’s intentions to use such auction mechanisms. Instead we found that intention to use is influenced by institutional and usage beliefs that are shaped by system-based perceptions which in turn provide specific advice to market engineers on the technical aspects influencing system adoption.,ilka weber,Not available,2010.0,10.1007/s10726-008-9117-y,Group Decision and Negotiation,Eva2010,False,,Springer,Not available,To Discount or Not to Discount: An Assessment of Perceptions Beliefs and Intentions to Use Electronic Auctions with Discounts,58a4fa58009456b2fb9111bdc23b624e,http://dx.doi.org/10.1007/s10726-008-9117-y 799,Hourly data from the Spanish day-ahead electricity auction is used to obtain a lower bound measure of generators’ market power. Our method is not based on cost estimates but rather on the behavioral differences between strategic generators and more competitive producers. The results indicate that despite the price cap effect of regulation in this market the larger operators in the day-ahead market are able to increase significantly prices above the competitive benchmark. We also show that the two large generators do not exploit the full potential of their market power.,aitor ciarreta,Not available,2010.0,10.1007/s11149-009-9102-7,Journal of Regulatory Economics,Aitor2010,False,,Springer,Not available,Market power in the Spanish electricity auction,2184723796fb1e8bf8f12e5d45551139,http://dx.doi.org/10.1007/s11149-009-9102-7 800,Hourly data from the Spanish day-ahead electricity auction is used to obtain a lower bound measure of generators’ market power. Our method is not based on cost estimates but rather on the behavioral differences between strategic generators and more competitive producers. The results indicate that despite the price cap effect of regulation in this market the larger operators in the day-ahead market are able to increase significantly prices above the competitive benchmark. We also show that the two large generators do not exploit the full potential of their market power.,maria espinosa,Not available,2010.0,10.1007/s11149-009-9102-7,Journal of Regulatory Economics,Aitor2010,False,,Springer,Not available,Market power in the Spanish electricity auction,2184723796fb1e8bf8f12e5d45551139,http://dx.doi.org/10.1007/s11149-009-9102-7 801,We construct a variant of the Vickrey auction of a single object where the surplus is split in exogenously fixed shares between the seller and the buyers up to a margin of error vanishingly exponentially as the number of buyers grows. When the object is the common property of the participants we can similarly construct VCG mechanisms with a vanishingly small cash transfer to the residual claimant. For any integer ,herve moulin,Not available,2010.0,10.1007/s00355-009-0393-5,Social Choice and Welfare,Hervé2010,False,,Springer,Not available,Auctioning or assigning an object: some remarkable VCG mechanisms,bec98c4ac4e6555a2cad26eb40917f7f,http://dx.doi.org/10.1007/s00355-009-0393-5 802,Automated negotiation is an efficient mechanism for the coordination of interests of heterogeneous agents. However the negotiation procedure requires time which is a scarce resource in dynamic environments that are characterized by rapid and reoccurring changes of external circumstances. To ensure adaptivity negotiation protocols are needed that are able to find an adjusted consensus in almost real-time. Furthermore a protocol should achieve a preferably good social welfare and be strategy-proof. In this paper we discuss three protocols under the consideration of restricted negotiation time and interdependencies: firstly a protocol drawing on combinatorial auctions secondly a protocol drawing on self-selective clustering of agents in combinatorial auctions and thirdly an iterative negotiation protocol as benchmark. The winner determination of a combinatorial auction is ,fabian lang,Not available,2012.0,10.1007/s12530-012-9056-3,Evolving Systems,Fabian2012,False,,Springer,Not available,Negotiating in dynamic environments: time-efficient automated negotiations by means of combinatorial auctions,92376201607c69b78ce35fdd665126fc,http://dx.doi.org/10.1007/s12530-012-9056-3 803,We consider collusion in path procurement auctions where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents and in some cases they can extract any amount the procurer is willing to offer. We show that computing how much a coalition can gain by colluding is NP-complete in general but that in certain interesting restricted cases the optimal collusion scheme can be computed in polynomial time. We examine the ways in which the colluders might share their payments using the core and Shapley value from cooperative game theory. We show that in some cases the collusion game has an empty core so although beneficial manipulations exist the colluders would find it hard to form a stable coalition due to inability to decide how to split the rewards. On the other hand we show that in several common restricted cases the collusion game is convex so it has a non-empty core which contains the Shapley value. We also show that in these cases colluders can compute core imputations and the Shapley value in polynomial time.,yoram bachrach,Not available,2010.0,10.1007/978-3-642-17572-5_4,Internet and Network Economics,Yoram2010,False,,Springer,Not available,Collusion in VCG Path Procurement Auctions,9da49971ecb7a69654f4e0fade2ba425,http://dx.doi.org/10.1007/978-3-642-17572-5_4 804,We consider collusion in path procurement auctions where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents and in some cases they can extract any amount the procurer is willing to offer. We show that computing how much a coalition can gain by colluding is NP-complete in general but that in certain interesting restricted cases the optimal collusion scheme can be computed in polynomial time. We examine the ways in which the colluders might share their payments using the core and Shapley value from cooperative game theory. We show that in some cases the collusion game has an empty core so although beneficial manipulations exist the colluders would find it hard to form a stable coalition due to inability to decide how to split the rewards. On the other hand we show that in several common restricted cases the collusion game is convex so it has a non-empty core which contains the Shapley value. We also show that in these cases colluders can compute core imputations and the Shapley value in polynomial time.,peter key,Not available,2010.0,10.1007/978-3-642-17572-5_4,Internet and Network Economics,Yoram2010,False,,Springer,Not available,Collusion in VCG Path Procurement Auctions,9da49971ecb7a69654f4e0fade2ba425,http://dx.doi.org/10.1007/978-3-642-17572-5_4 805,We consider collusion in path procurement auctions where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents and in some cases they can extract any amount the procurer is willing to offer. We show that computing how much a coalition can gain by colluding is NP-complete in general but that in certain interesting restricted cases the optimal collusion scheme can be computed in polynomial time. We examine the ways in which the colluders might share their payments using the core and Shapley value from cooperative game theory. We show that in some cases the collusion game has an empty core so although beneficial manipulations exist the colluders would find it hard to form a stable coalition due to inability to decide how to split the rewards. On the other hand we show that in several common restricted cases the collusion game is convex so it has a non-empty core which contains the Shapley value. We also show that in these cases colluders can compute core imputations and the Shapley value in polynomial time.,morteza zadimoghaddam,Not available,2010.0,10.1007/978-3-642-17572-5_4,Internet and Network Economics,Yoram2010,False,,Springer,Not available,Collusion in VCG Path Procurement Auctions,9da49971ecb7a69654f4e0fade2ba425,http://dx.doi.org/10.1007/978-3-642-17572-5_4 806,The deregulation of electricity markets produced significant economic benefits reducing prices to customers and opening several opportunities for new actors e.g. new generators and distributors. A prominent scientific and technological challenge is the automation of such markets. In particular we focus our attention on ,sofia ceppi,Not available,2010.0,10.1007/978-3-642-15117-0_1,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Sofia2010,False,,Springer,Not available,A Study of Central Auction Based Wholesale Electricity Markets,460ebbc9f40f213806b056219c6b59a3,http://dx.doi.org/10.1007/978-3-642-15117-0_1 807,The deregulation of electricity markets produced significant economic benefits reducing prices to customers and opening several opportunities for new actors e.g. new generators and distributors. A prominent scientific and technological challenge is the automation of such markets. In particular we focus our attention on ,nicola gatti,Not available,2010.0,10.1007/978-3-642-15117-0_1,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Sofia2010,False,,Springer,Not available,A Study of Central Auction Based Wholesale Electricity Markets,460ebbc9f40f213806b056219c6b59a3,http://dx.doi.org/10.1007/978-3-642-15117-0_1 808,The relationship between human subjects’ cognitive capacity and their economic performances has been noticed in recent years due to the evidence found in a series of cognitive economic experiments. However there are few agent-based models aiming to characterize such relationship. This paper attempts to bridge this gap and serve as an agent-based model with a focus on agents’ cognitive capacity. To capture the heterogeneity of human cognitive capacity this paper employs genetic programming as the algorithm of the learning agents and then uses population size as a proxy parameter of individual cognitive capacity. By modeling agents in this way we demonstrate a nearly positive relationship between cognitive abilities and economic performance.,shu-heng chen,Not available,2010.0,10.1007/978-3-642-13553-8_4,Multi-Agent-Based Simulation X,Shu-Heng2010,False,,Springer,Not available,Does Cognitive Capacity Matter When Learning Using Genetic Programming in Double Auction Markets?,7801baa333cf09ca2cd46a96bc5e051b,http://dx.doi.org/10.1007/978-3-642-13553-8_4 809,The relationship between human subjects’ cognitive capacity and their economic performances has been noticed in recent years due to the evidence found in a series of cognitive economic experiments. However there are few agent-based models aiming to characterize such relationship. This paper attempts to bridge this gap and serve as an agent-based model with a focus on agents’ cognitive capacity. To capture the heterogeneity of human cognitive capacity this paper employs genetic programming as the algorithm of the learning agents and then uses population size as a proxy parameter of individual cognitive capacity. By modeling agents in this way we demonstrate a nearly positive relationship between cognitive abilities and economic performance.,chung-ching tai,Not available,2010.0,10.1007/978-3-642-13553-8_4,Multi-Agent-Based Simulation X,Shu-Heng2010,False,,Springer,Not available,Does Cognitive Capacity Matter When Learning Using Genetic Programming in Double Auction Markets?,7801baa333cf09ca2cd46a96bc5e051b,http://dx.doi.org/10.1007/978-3-642-13553-8_4 810,The relationship between human subjects’ cognitive capacity and their economic performances has been noticed in recent years due to the evidence found in a series of cognitive economic experiments. However there are few agent-based models aiming to characterize such relationship. This paper attempts to bridge this gap and serve as an agent-based model with a focus on agents’ cognitive capacity. To capture the heterogeneity of human cognitive capacity this paper employs genetic programming as the algorithm of the learning agents and then uses population size as a proxy parameter of individual cognitive capacity. By modeling agents in this way we demonstrate a nearly positive relationship between cognitive abilities and economic performance.,shu wang,Not available,2010.0,10.1007/978-3-642-13553-8_4,Multi-Agent-Based Simulation X,Shu-Heng2010,False,,Springer,Not available,Does Cognitive Capacity Matter When Learning Using Genetic Programming in Double Auction Markets?,7801baa333cf09ca2cd46a96bc5e051b,http://dx.doi.org/10.1007/978-3-642-13553-8_4 811,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,sajal mukhopadhyay,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 812,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,roshan singh,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 813,Automated negotiation is an efficient mechanism for the coordination of interests of heterogeneous agents. However the negotiation procedure requires time which is a scarce resource in dynamic environments that are characterized by rapid and reoccurring changes of external circumstances. To ensure adaptivity negotiation protocols are needed that are able to find an adjusted consensus in almost real-time. Furthermore a protocol should achieve a preferably good social welfare and be strategy-proof. In this paper we discuss three protocols under the consideration of restricted negotiation time and interdependencies: firstly a protocol drawing on combinatorial auctions secondly a protocol drawing on self-selective clustering of agents in combinatorial auctions and thirdly an iterative negotiation protocol as benchmark. The winner determination of a combinatorial auction is ,andreas fink,Not available,2012.0,10.1007/s12530-012-9056-3,Evolving Systems,Fabian2012,False,,Springer,Not available,Negotiating in dynamic environments: time-efficient automated negotiations by means of combinatorial auctions,92376201607c69b78ce35fdd665126fc,http://dx.doi.org/10.1007/s12530-012-9056-3 814,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,d. ghosh,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 815,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,jaya bhattacharjee,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 816,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,nivedita mukherjee,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 817,The Colonel Blotto game is a two-player constant-sum game in which each player simultaneously distributes his fixed level of resources across a set of contests. In the traditional formulation of the Colonel Blotto game the players’ resources are “use it or lose it” in the sense that any resources that are not allocated to one of the contests are forfeited. This article examines a non-constant-sum version of the Colonel Blotto game that relaxes this use it or lose it feature. We find that if the level of asymmetry between the players’ budgets is below a threshold then there exists a one-to-one mapping from the unique set of equilibrium univariate marginal distribution functions in the constant-sum game to those in the non-constant-sum game. Once the asymmetry of the players’ budgets exceeds the threshold this relationship breaks down and we construct a new equilibrium.,brian roberson,Not available,2012.0,10.1007/s00199-011-0673-z,Economic Theory,Brian2012,False,,Springer,Not available,The non-constant-sum Colonel Blotto game,ce3021e360dd6cd35ce1e5f06bf54a34,http://dx.doi.org/10.1007/s00199-011-0673-z 818,The Colonel Blotto game is a two-player constant-sum game in which each player simultaneously distributes his fixed level of resources across a set of contests. In the traditional formulation of the Colonel Blotto game the players’ resources are “use it or lose it” in the sense that any resources that are not allocated to one of the contests are forfeited. This article examines a non-constant-sum version of the Colonel Blotto game that relaxes this use it or lose it feature. We find that if the level of asymmetry between the players’ budgets is below a threshold then there exists a one-to-one mapping from the unique set of equilibrium univariate marginal distribution functions in the constant-sum game to those in the non-constant-sum game. Once the asymmetry of the players’ budgets exceeds the threshold this relationship breaks down and we construct a new equilibrium.,dmitriy kvasov,Not available,2012.0,10.1007/s00199-011-0673-z,Economic Theory,Brian2012,False,,Springer,Not available,The non-constant-sum Colonel Blotto game,ce3021e360dd6cd35ce1e5f06bf54a34,http://dx.doi.org/10.1007/s00199-011-0673-z 819,This paper presents a unified framework for characterizing symmetric equilibrium in simultaneous move two-player rank-order contests with complete information in which each player’s strategy generates direct or indirect affine “spillover” effects that depend on the rank-order of her decision variable. These effects arise in natural interpretations of a number of important economic environments as well as in classic contests adapted to recent experimental and behavioral models where individuals exhibit inequality aversion or regret. We provide the closed-form solution for the symmetric Nash equilibria of this class of games and show how it can be used to directly solve for equilibrium behavior in auctions pricing games tournaments R&D races models of litigation and a host of other contests.,michael baye,Not available,2012.0,10.1007/s00199-009-0489-2,Economic Theory,R.2012,True,,Springer,Not available,Contests with rank-order spillovers,9ed74c1a50a7b0b21c373a62266b8f69,http://dx.doi.org/10.1007/s00199-009-0489-2 820,This paper presents a unified framework for characterizing symmetric equilibrium in simultaneous move two-player rank-order contests with complete information in which each player’s strategy generates direct or indirect affine “spillover” effects that depend on the rank-order of her decision variable. These effects arise in natural interpretations of a number of important economic environments as well as in classic contests adapted to recent experimental and behavioral models where individuals exhibit inequality aversion or regret. We provide the closed-form solution for the symmetric Nash equilibria of this class of games and show how it can be used to directly solve for equilibrium behavior in auctions pricing games tournaments R&D races models of litigation and a host of other contests.,dan kovenock,Not available,2012.0,10.1007/s00199-009-0489-2,Economic Theory,R.2012,True,,Springer,Not available,Contests with rank-order spillovers,9ed74c1a50a7b0b21c373a62266b8f69,http://dx.doi.org/10.1007/s00199-009-0489-2 821,This paper presents a unified framework for characterizing symmetric equilibrium in simultaneous move two-player rank-order contests with complete information in which each player’s strategy generates direct or indirect affine “spillover” effects that depend on the rank-order of her decision variable. These effects arise in natural interpretations of a number of important economic environments as well as in classic contests adapted to recent experimental and behavioral models where individuals exhibit inequality aversion or regret. We provide the closed-form solution for the symmetric Nash equilibria of this class of games and show how it can be used to directly solve for equilibrium behavior in auctions pricing games tournaments R&D races models of litigation and a host of other contests.,casper vries,Not available,2012.0,10.1007/s00199-009-0489-2,Economic Theory,R.2012,True,,Springer,Not available,Contests with rank-order spillovers,9ed74c1a50a7b0b21c373a62266b8f69,http://dx.doi.org/10.1007/s00199-009-0489-2 822,We study a two-stage all-pay auction with two identical prizes. In each stage the players compete for one prize. Each player may win either one or two prizes. We analyze the unique subgame-perfect equilibrium of our model with two players where each player’s marginal values for the prizes are decreasing constant or increasing. We also analyze an equilibrium of the model with more than two players where each player’s marginal values for the prizes are nonincreasing.,aner sela,Not available,2012.0,10.1007/s00199-010-0547-9,Economic Theory,Aner2012,False,,Springer,Not available,Sequential two-prize contests,073ce273b4333d1d8847b55f68b9a048,http://dx.doi.org/10.1007/s00199-010-0547-9 823,We consider imperfectly discriminating common-value all-pay auctions (or contests) in which some players know the value of the prize others do not. We show that if the prize is always of positive value then all players are active in equilibrium. If the prize is of value zero with positive probability then there is some threshold number of informed players such that if there are less all uninformed players are active and otherwise all uninformed players are inactive.,karl warneryd,Not available,2012.0,10.1007/s00199-009-0472-y,Economic Theory,Karl2012,False,,Springer,Not available,Multi-player contests with asymmetric information,c2999adfe39d8b969eb6046b1ccd45d5,http://dx.doi.org/10.1007/s00199-009-0472-y 824,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,m. iftekhar,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 825,The implementation of monetary policy is prevalently done by interest rate targeting with a short term market rate serving as operational target. The instruments for achieving the operational target are the provision of reserves and the interest rate charged in these transactions. This paper presents a model for the estimation of the demand curve for reserves derived from the central bank’s fixed rate tender auction and the interbank money market. Using data from Switzerland the slope of the demand curve is estimated. Furthermore properties of the demand curve such as the slope patterns in the course of a maintenance period and the slope in different monetary regimes are assessed. We find a steeper demand curve towards the end of the maintenance period and an increasing slope when the general interest rate level is high. Further we investigate the role of the Swiss National Bank’s (SNB) interest rate in the fixed rate tender auctions. There is evidence that the SNB uses its auction rate to guide the interbank market rate.,sebastien kraenzlin,Not available,2012.0,10.1007/BF03399377,Swiss Journal of Economics and Statistics,Sébastien2012,True,,Springer,Not available,Demand for reserves and the central bank’s management of interest rates,9f95713fa3826ec8dec988cec4555916,http://dx.doi.org/10.1007/BF03399377 826,The implementation of monetary policy is prevalently done by interest rate targeting with a short term market rate serving as operational target. The instruments for achieving the operational target are the provision of reserves and the interest rate charged in these transactions. This paper presents a model for the estimation of the demand curve for reserves derived from the central bank’s fixed rate tender auction and the interbank money market. Using data from Switzerland the slope of the demand curve is estimated. Furthermore properties of the demand curve such as the slope patterns in the course of a maintenance period and the slope in different monetary regimes are assessed. We find a steeper demand curve towards the end of the maintenance period and an increasing slope when the general interest rate level is high. Further we investigate the role of the Swiss National Bank’s (SNB) interest rate in the fixed rate tender auctions. There is evidence that the SNB uses its auction rate to guide the interbank market rate.,martin schlegel,Not available,2012.0,10.1007/BF03399377,Swiss Journal of Economics and Statistics,Sébastien2012,True,,Springer,Not available,Demand for reserves and the central bank’s management of interest rates,9f95713fa3826ec8dec988cec4555916,http://dx.doi.org/10.1007/BF03399377 827,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,patrick maille,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 828,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,evangelos markakis,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 829,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,maurizio naldi,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 830,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,george stamoulis,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 831,We provide a broad overview of the research that has been conducted until recently on the design of sponsored search auctions. We mainly focus on game theoretic and mechanism design aspects of these auctions and we analyze the issues associated with each of the three participating entities i.e. the search engine the advertisers and the users of the search engine as well as their resulting behavior. Regarding the search engine we overview the various mechanisms that have been proposed including the currently used GSP mechanism. The issues that are addressed include analysis of Nash equilibria and their performance design of alternative mechanisms and aspects of competition among search engines. We then move on to the advertisers and discuss the problem of choosing a bidding strategy given the mechanism of the search engine. Following this we consider the end users and we examine how user behavior may create externalities and influence the performance of the advertisers. Finally we also overview statistical methods for estimating modeling parameters that are of interest to the three entities. In each section we point out interesting open problems and directions for future research.,bruno tuffin,Not available,2012.0,10.1007/s10660-012-9094-8,Electronic Commerce Research,Patrick2012,False,,Springer,Not available,Sponsored search auctions: an overview of research with emphasis on game theoretic aspects,64e62745243f31eeaf2984a8c1a67bf4,http://dx.doi.org/10.1007/s10660-012-9094-8 832,We construct a model of multi-unit auctions in which ,francisco alvarez,Not available,2012.0,10.1007/s00199-010-0594-2,Economic Theory,Francisco2012,False,,Springer,Not available,Multi-unit auctions with private information: an indivisible unit continuous price model,ad33ed7bcf40fe21d482ba65dd6b55e5,http://dx.doi.org/10.1007/s00199-010-0594-2 833,We construct a model of multi-unit auctions in which ,cristina mazon,Not available,2012.0,10.1007/s00199-010-0594-2,Economic Theory,Francisco2012,False,,Springer,Not available,Multi-unit auctions with private information: an indivisible unit continuous price model,ad33ed7bcf40fe21d482ba65dd6b55e5,http://dx.doi.org/10.1007/s00199-010-0594-2 834,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,m. iftekhar,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 835,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,a. hailu,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 836,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,a. hailu,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 837,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,r. lindner,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 838,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,yusufcan masatlioglu,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 839,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,sarah taylor,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 840,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,neslihan uler,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 841,In an experiment using two-bidder first-price sealed bid auctions with symmetric independent private values and 400 subjects we scan also the right hand of each subject. We study how the ratio of the length of the index and ring fingers (2D:4D) of the right hand a measure of prenatal hormone exposure is correlated with bidding behavior and total profits. 2D:4D has been reported to predict competitiveness in sports competition (Manning and Taylor in Evol. Hum. Behav. 22:61–69 ,matthew pearson,Not available,2012.0,10.1007/s10683-011-9311-7,Experimental Economics,Matthew2012,False,,Springer,Not available,The visible hand: finger ratio (2D:4D) and competitive bidding,7ac28f5f4007c087b4a814754a2bcbe3,http://dx.doi.org/10.1007/s10683-011-9311-7 842,In an experiment using two-bidder first-price sealed bid auctions with symmetric independent private values and 400 subjects we scan also the right hand of each subject. We study how the ratio of the length of the index and ring fingers (2D:4D) of the right hand a measure of prenatal hormone exposure is correlated with bidding behavior and total profits. 2D:4D has been reported to predict competitiveness in sports competition (Manning and Taylor in Evol. Hum. Behav. 22:61–69 ,burkhard schipper,Not available,2012.0,10.1007/s10683-011-9311-7,Experimental Economics,Matthew2012,False,,Springer,Not available,The visible hand: finger ratio (2D:4D) and competitive bidding,7ac28f5f4007c087b4a814754a2bcbe3,http://dx.doi.org/10.1007/s10683-011-9311-7 843,In a sealed-bid auction bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others’ bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the opening stage. Although existing bidding solutions focus on ensuring certain characteristics of the auction including correctness fairness privacy protection and confidentiality it is difficult for losing bidders to verify whether the winner is a genuine bidder or just a fake bidder that is manipulated by a malicious party (e.g. a malicious auctioneer). In this paper we introduce a fair indictment mechanism for an online sealed-bid auction that includes self-enforcing privacy. Our solution allows for an honest bidder to detect malicious activity and provides the bidder with verifiable evidence to indict a dishonest party. A successful indictment will give an incentive to the honest bidder and will result in a withdrawal of the result of the auction whereas a failed indictment will require the involved complainer to pay a penalty. We achieve this goal using a scheme designed with an oblivious polynomial evaluation and homomorphic cryptosystem. We also involve a semi-honest verification agent in the indictment process to help the honest party verify the winning bid. This prevents the auctioneer from controlling the entire auction process. We also provide an analysis of the indictment requirements security and efficiency of the proposed mechanism and demonstrate the use of our solution in a multiple-item sealed-bid auction (i.e. combinatorial auction).,kok-seng wong,Not available,2018.0,10.1007/s11227-017-2045-3,The Journal of Supercomputing,Kok-Seng2018,False,,Springer,Not available,Toward a fair indictment for sealed-bid auction with self-enforcing privacy,6328a8169b8ed65b8499db04fa790219,http://dx.doi.org/10.1007/s11227-017-2045-3 844,In a sealed-bid auction bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others’ bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the opening stage. Although existing bidding solutions focus on ensuring certain characteristics of the auction including correctness fairness privacy protection and confidentiality it is difficult for losing bidders to verify whether the winner is a genuine bidder or just a fake bidder that is manipulated by a malicious party (e.g. a malicious auctioneer). In this paper we introduce a fair indictment mechanism for an online sealed-bid auction that includes self-enforcing privacy. Our solution allows for an honest bidder to detect malicious activity and provides the bidder with verifiable evidence to indict a dishonest party. A successful indictment will give an incentive to the honest bidder and will result in a withdrawal of the result of the auction whereas a failed indictment will require the involved complainer to pay a penalty. We achieve this goal using a scheme designed with an oblivious polynomial evaluation and homomorphic cryptosystem. We also involve a semi-honest verification agent in the indictment process to help the honest party verify the winning bid. This prevents the auctioneer from controlling the entire auction process. We also provide an analysis of the indictment requirements security and efficiency of the proposed mechanism and demonstrate the use of our solution in a multiple-item sealed-bid auction (i.e. combinatorial auction).,myung kim,Not available,2018.0,10.1007/s11227-017-2045-3,The Journal of Supercomputing,Kok-Seng2018,False,,Springer,Not available,Toward a fair indictment for sealed-bid auction with self-enforcing privacy,6328a8169b8ed65b8499db04fa790219,http://dx.doi.org/10.1007/s11227-017-2045-3 845,The moment of order submission plays an important role for the trading outcome in a Continuous Double Auction; submitting an offer at the beginning of the trading period may yield a lower profit as the trade is likely to be settled at the own offered price whereas late offers result in a lower probability of trading. This timing problem makes the order submission strategy more difficult. We extend the behavioral model of Individual Evolutionary Learning to incorporate the timing problem and study the limiting distribution of submission moments and the resulting offer function that maps submission moments to offers. We find that traders submit different offers at different submission moments the distribution of which uni-modal with a peak moving from late to early as the market size increases. This behavior exacerbates efficiency loss from learning. If traders evaluate profitability of their strategies over longer history orders are submitted later with the same effect of market size.,michiel leur,Not available,2018.0,10.1007/s00191-017-0530-8,Journal of Evolutionary Economics,Michiel2018,False,,Springer,Not available,Timing under individual evolutionary learning in a continuous double auction,86247a5c69f89693c3cfa52fca13850d,http://dx.doi.org/10.1007/s00191-017-0530-8 846,In an iterative combinatorial auction bidders can submit bids on individual and/or on combinations of projects in a series of intermediate rounds where bid prices are revised before a final allocation is made. The iterative format is useful for conservation service procurement as landholders can rely on market information revealed through the rounds to evaluate their choices of projects and bid prices. However there is no single way of providing the market information. Different designs for generating price information have been proposed. Little is known about the performance of iterative combinatorial auction designs when heterogeneous bidders with different cost structures participate in an auction. Using an agent based model we evaluate a selected set of designs under different bidder heterogeneity scenarios. We observe that higher degrees of heterogeneity lead to lower auction efficiency and that auction outcomes are highly sensitive to price feedback design choices.,r. lindner,Not available,2012.0,10.1007/s10640-012-9553-7,Environmental and Resource Economics,S.2012,False,,Springer,Not available,The Effect of Bidder Heterogeneity on Combinatorial Conservation Auction Designs,de6817c14b0feed22c9997319ad4a83b,http://dx.doi.org/10.1007/s10640-012-9553-7 847,The moment of order submission plays an important role for the trading outcome in a Continuous Double Auction; submitting an offer at the beginning of the trading period may yield a lower profit as the trade is likely to be settled at the own offered price whereas late offers result in a lower probability of trading. This timing problem makes the order submission strategy more difficult. We extend the behavioral model of Individual Evolutionary Learning to incorporate the timing problem and study the limiting distribution of submission moments and the resulting offer function that maps submission moments to offers. We find that traders submit different offers at different submission moments the distribution of which uni-modal with a peak moving from late to early as the market size increases. This behavior exacerbates efficiency loss from learning. If traders evaluate profitability of their strategies over longer history orders are submitted later with the same effect of market size.,mikhail anufriev,Not available,2018.0,10.1007/s00191-017-0530-8,Journal of Evolutionary Economics,Michiel2018,False,,Springer,Not available,Timing under individual evolutionary learning in a continuous double auction,86247a5c69f89693c3cfa52fca13850d,http://dx.doi.org/10.1007/s00191-017-0530-8 848,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,sanshan sun,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 849,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,gang feng,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 850,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,shuang qin,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 851,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,yao sun,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 852,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,zhaorong zhou,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 853,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,jiaze wang,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 854,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,anfeng liu,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 855,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,tong yan,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 856,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,zhiwen zeng,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 857,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,yusufcan masatlioglu,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 858,In horizontal collaborations carriers form coalitions in order to perform parts of their logistics operations jointly. By exchanging transportation requests among each other they can operate more efficiently and in a more sustainable way. This exchange of requests can be organized through combinatorial auctions where collaborators submit requests for exchange to a common pool. The requests in the pool are grouped into bundles and these are offered to participating carriers. From a practical point of view offering all possible bundles is not manageable since the number of bundles grows exponentially with the number of traded requests. We show how the complete set of bundles can be efficiently reduced to a subset of attractive ones. For this we define the Bundle Generation Problem (BuGP). The aim is to provide a reduced set of offered bundles that maximizes the total coalition profit while a feasible assignment of bundles to carriers is guaranteed. The objective function however could only be evaluated whether carriers reveal sensitive information which would be unrealistic. Thus we develop a proxy for the objective function for assessing the attractiveness of bundles under incomplete information. This is used in a genetic algorithms-based framework that aims at producing attractive and feasible bundles such that all requirements of the BuGP are met. We achieve very good solution quality while reducing the computational time for the auction procedure significantly. This is an important step towards running combinatorial auctions of real-world size which were previously intractable due to their computational complexity. The strengths but also the limitations of the proposed approach are discussed.,margaretha gansterer,Not available,2018.0,10.1007/s00291-018-0516-4,OR Spectrum,Margaretha2018,True,,Springer,Not available,Centralized bundle generation in auction-based collaborative transportation,76e19c19877524fc7b25d203c489fd16,http://dx.doi.org/10.1007/s00291-018-0516-4 859,In horizontal collaborations carriers form coalitions in order to perform parts of their logistics operations jointly. By exchanging transportation requests among each other they can operate more efficiently and in a more sustainable way. This exchange of requests can be organized through combinatorial auctions where collaborators submit requests for exchange to a common pool. The requests in the pool are grouped into bundles and these are offered to participating carriers. From a practical point of view offering all possible bundles is not manageable since the number of bundles grows exponentially with the number of traded requests. We show how the complete set of bundles can be efficiently reduced to a subset of attractive ones. For this we define the Bundle Generation Problem (BuGP). The aim is to provide a reduced set of offered bundles that maximizes the total coalition profit while a feasible assignment of bundles to carriers is guaranteed. The objective function however could only be evaluated whether carriers reveal sensitive information which would be unrealistic. Thus we develop a proxy for the objective function for assessing the attractiveness of bundles under incomplete information. This is used in a genetic algorithms-based framework that aims at producing attractive and feasible bundles such that all requirements of the BuGP are met. We achieve very good solution quality while reducing the computational time for the auction procedure significantly. This is an important step towards running combinatorial auctions of real-world size which were previously intractable due to their computational complexity. The strengths but also the limitations of the proposed approach are discussed.,richard hartl,Not available,2018.0,10.1007/s00291-018-0516-4,OR Spectrum,Margaretha2018,True,,Springer,Not available,Centralized bundle generation in auction-based collaborative transportation,76e19c19877524fc7b25d203c489fd16,http://dx.doi.org/10.1007/s00291-018-0516-4 860,We consider multi-unit discriminatory auctions where ex ante symmetric bidders have single-unit demands and resale is allowed after the bidding stage. When bidders use the optimal auction to sell items in the resale stage the equilibrium in the auction without resale is no longer an equilibrium in an auction with resale. We find a symmetric and monotone equilibrium when there are two units for sale and interestingly we show that there may not be a symmetric and monotone equilibrium if there are more than two units.,isa hafalir,Not available,2018.0,10.1007/s40505-018-0152-9,Economic Theory Bulletin,Isa2018,False,,Springer,Not available,Discriminatory auctions with resale,a0c7f38e2ad05faf35a9c743dc481387,http://dx.doi.org/10.1007/s40505-018-0152-9 861,We consider multi-unit discriminatory auctions where ex ante symmetric bidders have single-unit demands and resale is allowed after the bidding stage. When bidders use the optimal auction to sell items in the resale stage the equilibrium in the auction without resale is no longer an equilibrium in an auction with resale. We find a symmetric and monotone equilibrium when there are two units for sale and interestingly we show that there may not be a symmetric and monotone equilibrium if there are more than two units.,musab kurnaz,Not available,2018.0,10.1007/s40505-018-0152-9,Economic Theory Bulletin,Isa2018,False,,Springer,Not available,Discriminatory auctions with resale,a0c7f38e2ad05faf35a9c743dc481387,http://dx.doi.org/10.1007/s40505-018-0152-9 862,Conflict occurs throughout the animal world. Such conflicts are often modelled by evolutionary games where individual animals make a single decision each within the game. These decisions can be sequential in either order or simultaneous and the outcome of the game can depend strongly upon which case is assumed to occur. Real conflicts are generally more complex however. A fight over a territory for instance can involve a succession of different stages and therefore choices to be made by the protagonists. In this paper we thus introduce a method of modelling a more complex class of interactions where each individual can make a sequence of decisions. We show that despite the inherent complexity under certain assumptions the resulting game often leads to the case where both animals fight to the fullest extent or where one concedes immediately thus mirroring the outcomes of simpler single decision games. However for other cases we see that the outcome is not so simple and intermediate level contests can occur. This happens principally in cases where the duration of contests is uncertain and partially governed by external factors which can bring the contest to a sudden end such as the weather or the appearance of a predator. We thus develop a theory grounded in simple evolutionary models but extending them in various important ways.,mark broom,Not available,2018.0,10.1007/s13235-016-0212-4,Dynamic Games and Applications,Mark2018,True,,Springer,Not available,Evolutionary Games with Sequential Decisions and Dollar Auctions,1bf72451f78dd6a3df58ec06b1859319,http://dx.doi.org/10.1007/s13235-016-0212-4 863,Conflict occurs throughout the animal world. Such conflicts are often modelled by evolutionary games where individual animals make a single decision each within the game. These decisions can be sequential in either order or simultaneous and the outcome of the game can depend strongly upon which case is assumed to occur. Real conflicts are generally more complex however. A fight over a territory for instance can involve a succession of different stages and therefore choices to be made by the protagonists. In this paper we thus introduce a method of modelling a more complex class of interactions where each individual can make a sequence of decisions. We show that despite the inherent complexity under certain assumptions the resulting game often leads to the case where both animals fight to the fullest extent or where one concedes immediately thus mirroring the outcomes of simpler single decision games. However for other cases we see that the outcome is not so simple and intermediate level contests can occur. This happens principally in cases where the duration of contests is uncertain and partially governed by external factors which can bring the contest to a sudden end such as the weather or the appearance of a predator. We thus develop a theory grounded in simple evolutionary models but extending them in various important ways.,jan rychtar,Not available,2018.0,10.1007/s13235-016-0212-4,Dynamic Games and Applications,Mark2018,True,,Springer,Not available,Evolutionary Games with Sequential Decisions and Dollar Auctions,1bf72451f78dd6a3df58ec06b1859319,http://dx.doi.org/10.1007/s13235-016-0212-4 864,This paper presents an auction mechanism for energy trading between multiple microgrids. We consider a region consisting of multiple interconnected microgrids wherein given time ,bizzat zaidi,Not available,2018.0,10.1007/s00202-017-0570-y,Electrical Engineering,Hussain2018,False,,Springer,Not available,Combinatorial double auctions for multiple microgrid trading,a8f89e0add7dc14d2865782f7296e71f,http://dx.doi.org/10.1007/s00202-017-0570-y 865,This paper presents an auction mechanism for energy trading between multiple microgrids. We consider a region consisting of multiple interconnected microgrids wherein given time ,seung hong,Not available,2018.0,10.1007/s00202-017-0570-y,Electrical Engineering,Hussain2018,False,,Springer,Not available,Combinatorial double auctions for multiple microgrid trading,a8f89e0add7dc14d2865782f7296e71f,http://dx.doi.org/10.1007/s00202-017-0570-y 866,Almost a decade after the onset of the global financial crisis the stock of non-performing loans (NPLs) still represents a major burden for European banks’ profitability and a severe headwind for credit growth at an area-wide level. While a great deal has been done to establish stricter supervisory rules and more robust insolvency frameworks the development of an efficient secondary market for impaired assets is currently lagging behind especially in the countries where the level of troubled loans is more worrisome. To address this problem the European Banking Authority has recently proposed to set up an EU-backed asset management company (AMC) for the exchange of NPLs. In addition to the difficulties associated with a full compliance of a public AMC with EU State aid rules we argue that such a vehicle might be useful in solving just one of the three failures typically affecting the market for NPLs that is the information asymmetry between buyers and sellers. To successfully tackle the other two—namely market power and collusion—a correct design of the market is crucial. From this point of view auction theory can be of great help.,edoardo gaffeo,Not available,2018.0,10.1057/s41261-018-0069-0,Journal of Banking Regulation,Edoardo2018,False,,Springer,Not available,“The price is right”: using auction theory to enhance competition in the NPL market,dfdd2d08a03859c9b17789ee35127995,http://dx.doi.org/10.1057/s41261-018-0069-0 867,Almost a decade after the onset of the global financial crisis the stock of non-performing loans (NPLs) still represents a major burden for European banks’ profitability and a severe headwind for credit growth at an area-wide level. While a great deal has been done to establish stricter supervisory rules and more robust insolvency frameworks the development of an efficient secondary market for impaired assets is currently lagging behind especially in the countries where the level of troubled loans is more worrisome. To address this problem the European Banking Authority has recently proposed to set up an EU-backed asset management company (AMC) for the exchange of NPLs. In addition to the difficulties associated with a full compliance of a public AMC with EU State aid rules we argue that such a vehicle might be useful in solving just one of the three failures typically affecting the market for NPLs that is the information asymmetry between buyers and sellers. To successfully tackle the other two—namely market power and collusion—a correct design of the market is crucial. From this point of view auction theory can be of great help.,ronny mazzocchi,Not available,2018.0,10.1057/s41261-018-0069-0,Journal of Banking Regulation,Edoardo2018,False,,Springer,Not available,“The price is right”: using auction theory to enhance competition in the NPL market,dfdd2d08a03859c9b17789ee35127995,http://dx.doi.org/10.1057/s41261-018-0069-0 868,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,sarah taylor,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 869,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,zheng-dong xia,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 870,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,tian-ming bu,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 871,Sponsored search auction has been recently studied and auctioneer’s revenue is an important consideration in probabilistic single-item second-price auctions. Some papers have analyzed the revenue maximization problem on different methods to bundle contexts. In this paper we propose a more flexible and natural method which is called the bracketing method.We prove that finding a bracketing scheme that maximizes the auctioneer’s revenue is strongly NP-hard. Then a heuristic algorithm is given. Experiments on three test cases show that the revenue of the optimal bracketing scheme is very close to the optimal revenue without any bundling constraint and the heuristic algorithm performs very well. Finally we consider a simpler model that for each row in the valuation matrix the non-zero cells have the same value. We prove that the revenue maximization problem with ,wen-hui gong,Not available,2018.0,10.1007/s11704-017-6102-0,Frontiers of Computer Science,Zheng-Dong2018,False,,Springer,Not available,Optimal bundles for sponsored search auctions via bracketing scheme,98789aacc3a289080e473c0b4393d106,http://dx.doi.org/10.1007/s11704-017-6102-0 872,The combinatorial auction problem can be modeled as a weighted set packing problem. Similarly the reverse combinatorial auction can be modeled as a weighted set covering problem. We use the set packing and set covering formulations to suggest novel iterative Dutch auction algorithms for combinatorial auction problems. We use generalized Vickrey auctions (GVA) with reserve prices in each iteration. We prove the convergence of the algorithms and show that the solutions obtained using the algorithms lie within provable worst case bounds. We conduct numerical experiments to show that in general the solutions obtained using these algorithms are much better than the theoretical bounds.,shantanu biswas,Not available,2005.0,10.1007/s10472-005-4687-8,Annals of Mathematics and Artificial Intelligence,Shantanu2005,False,,Springer,Not available,Iterative Dutch combinatorial auctions,2b8edbb709ea63e60de5a33d2d211884,http://dx.doi.org/10.1007/s10472-005-4687-8 873,The combinatorial auction problem can be modeled as a weighted set packing problem. Similarly the reverse combinatorial auction can be modeled as a weighted set covering problem. We use the set packing and set covering formulations to suggest novel iterative Dutch auction algorithms for combinatorial auction problems. We use generalized Vickrey auctions (GVA) with reserve prices in each iteration. We prove the convergence of the algorithms and show that the solutions obtained using the algorithms lie within provable worst case bounds. We conduct numerical experiments to show that in general the solutions obtained using these algorithms are much better than the theoretical bounds.,y. narahari,Not available,2005.0,10.1007/s10472-005-4687-8,Annals of Mathematics and Artificial Intelligence,Shantanu2005,False,,Springer,Not available,Iterative Dutch combinatorial auctions,2b8edbb709ea63e60de5a33d2d211884,http://dx.doi.org/10.1007/s10472-005-4687-8 874,In this paper we investigate a model of a combinatorial procurement multi-attribute auction in which each sales item is defined by several attributes called quality the buyer is the auctioneer (e.g. a government) and the sellers are the bidders. Furthermore there exist multiple items and both buyer and sellers can have arbitrary (e.g. substitutable/complementary) preferences on a bundle of items. Our goal is to develop a protocol that is strategy-proof for sellers. We first present a VickreyClarkeGroves (VCG)-type protocol. As in a standard combinatorial auction a VCG-type protocol is not false-name-proof i.e. it is vulnerable against manipulations using multiple identifiers. Next we show that any strategy-proof protocol in this model can be represented as a framework called Price-Oriented Rationing-Free (PORF) protocol in which for each bidder for each bundle of items and for each quality the payment for the bidder is determined independently of his own declaration and the bidder can obtain a bundle that maximizes his utility independently of the allocations of other bidders. We develop a false-name-proof protocol in this model.,takayuki suyama,Not available,2005.0,10.1007/s10458-005-0983-2,Autonomous Agents and Multi-Agent Systems,Takayuki2005,False,,Springer,Not available,Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction,b651e545eae030311097a54cc4334111,http://dx.doi.org/10.1007/s10458-005-0983-2 875,In this paper we investigate a model of a combinatorial procurement multi-attribute auction in which each sales item is defined by several attributes called quality the buyer is the auctioneer (e.g. a government) and the sellers are the bidders. Furthermore there exist multiple items and both buyer and sellers can have arbitrary (e.g. substitutable/complementary) preferences on a bundle of items. Our goal is to develop a protocol that is strategy-proof for sellers. We first present a VickreyClarkeGroves (VCG)-type protocol. As in a standard combinatorial auction a VCG-type protocol is not false-name-proof i.e. it is vulnerable against manipulations using multiple identifiers. Next we show that any strategy-proof protocol in this model can be represented as a framework called Price-Oriented Rationing-Free (PORF) protocol in which for each bidder for each bundle of items and for each quality the payment for the bidder is determined independently of his own declaration and the bidder can obtain a bundle that maximizes his utility independently of the allocations of other bidders. We develop a false-name-proof protocol in this model.,makoto yokoo,Not available,2005.0,10.1007/s10458-005-0983-2,Autonomous Agents and Multi-Agent Systems,Takayuki2005,False,,Springer,Not available,Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction,b651e545eae030311097a54cc4334111,http://dx.doi.org/10.1007/s10458-005-0983-2 876,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,r. isaac,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 877,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,timothy salmon,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 878,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,arthur zillante,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 879,This paper tests the behavioral equivalence of a class of strategically-equivalent mechanisms that also do not differ in terms of their procedures. In a private value setting we introduce a family of mechanisms so-called Mechanism (,neslihan uler,Not available,2012.0,10.1007/s10058-012-0123-9,Review of Economic Design,Yusufcan2012,False,,Springer,Not available,Behavioral mechanism design: evidence from the modified first-price auctions,b759ac141104ac127433f0c6b87d39d8,http://dx.doi.org/10.1007/s10058-012-0123-9 880,Decentralized multi-item auctions offer great opportunities for integrating fragmented online auction markets into larger markets with more efficient outcomes. This paper extends the theory of multi-item ascending auctions of substitutes by considering any finite positive bid increment and allowing the bidders to bid asyn-chronously instead of bidding in a round-robin fashion. We consider a setup where the bidders’ utilities over multiple items are additive and bound the maximum inefficiency in the allocation when the bidders follow a simple greedy strategy. We also obtain the limits within which the prices of individual items can vary from one outcome to another. For the special case of single unit bidder demand we also bound the maximum surplus which a bidder can extract by unilaterally switching to some other strategy. The paper suggests an upper bound for the minimum required bid increment which would be necessary for competitive price discovery and truthful bidding in a practical online implementation.,vipul bansal,Not available,2005.0,10.1007/s10660-005-6156-1,Electronic Commerce Research,Vipul2005,False,,Springer,Not available,Simultaneous Independent Online Auctions with Discrete Bid Increments,a040b972123a6b4bf5f92ddc133cb296,http://dx.doi.org/10.1007/s10660-005-6156-1 881,Decentralized multi-item auctions offer great opportunities for integrating fragmented online auction markets into larger markets with more efficient outcomes. This paper extends the theory of multi-item ascending auctions of substitutes by considering any finite positive bid increment and allowing the bidders to bid asyn-chronously instead of bidding in a round-robin fashion. We consider a setup where the bidders’ utilities over multiple items are additive and bound the maximum inefficiency in the allocation when the bidders follow a simple greedy strategy. We also obtain the limits within which the prices of individual items can vary from one outcome to another. For the special case of single unit bidder demand we also bound the maximum surplus which a bidder can extract by unilaterally switching to some other strategy. The paper suggests an upper bound for the minimum required bid increment which would be necessary for competitive price discovery and truthful bidding in a practical online implementation.,rahul garg,Not available,2005.0,10.1007/s10660-005-6156-1,Electronic Commerce Research,Vipul2005,False,,Springer,Not available,Simultaneous Independent Online Auctions with Discrete Bid Increments,a040b972123a6b4bf5f92ddc133cb296,http://dx.doi.org/10.1007/s10660-005-6156-1 882,In a general auction framework with independent private values we propose a game with a simple economic interpretation that allows to implement the revenue-maximizing auction outcome ,bernard caillaud,Not available,2005.0,10.1007/s10058-005-0125-y,Review of Economic Design,Bernard2005,False,,Springer,Not available,Implementation of the revenue-maximizing auction by an ignorant seller,2ebe5385ed5f196d94deac267a6a2714,http://dx.doi.org/10.1007/s10058-005-0125-y 883,In a general auction framework with independent private values we propose a game with a simple economic interpretation that allows to implement the revenue-maximizing auction outcome ,jacques robert,Not available,2005.0,10.1007/s10058-005-0125-y,Review of Economic Design,Bernard2005,False,,Springer,Not available,Implementation of the revenue-maximizing auction by an ignorant seller,2ebe5385ed5f196d94deac267a6a2714,http://dx.doi.org/10.1007/s10058-005-0125-y 884,Combinatorial auctions (CAs) have recently generated significant interest as an automated mechanism for buying and selling bundles of goods. They are proving to be extremely useful in numerous e-business applications such as e-selling e-procurement e-logistics and B2B exchanges. In this article we introduce combinatorial auctions and bring out important issues in the design of combinatorial auctions. We also highlight important contributions in current research in this area. This survey emphasizes combinatorial auctions as applied to electronic business situations.,y. narahari,Not available,2005.0,10.1007/BF02706244,Sadhana,Y.2005,False,,Springer,Not available,Combinatorial auctions for electronic business,a36e05cd55e9713be92c06e208f0f7ce,http://dx.doi.org/10.1007/BF02706244 885,Combinatorial auctions (CAs) have recently generated significant interest as an automated mechanism for buying and selling bundles of goods. They are proving to be extremely useful in numerous e-business applications such as e-selling e-procurement e-logistics and B2B exchanges. In this article we introduce combinatorial auctions and bring out important issues in the design of combinatorial auctions. We also highlight important contributions in current research in this area. This survey emphasizes combinatorial auctions as applied to electronic business situations.,pankaj dayama,Not available,2005.0,10.1007/BF02706244,Sadhana,Y.2005,False,,Springer,Not available,Combinatorial auctions for electronic business,a36e05cd55e9713be92c06e208f0f7ce,http://dx.doi.org/10.1007/BF02706244 886,This paper considers the problem of designing selling procedures for substitutes (like condominium units). Oral ascending auctions for the right to choose are efficient. This is a common type of auction used for the sale of real estate. Efficiency is not optimal from the seller’s viewpoint. An optimal procedure distorts the right-to-choose auction to favor in late rounds bidders whose preferred object has already been sold. This optimal auction is complex. A revenue improving departure from efficiency can be achieved by simply auctioning all the rights to choose before any of them is exerted.,roberto burguet,Not available,2005.0,10.1007/s10058-005-0121-2,Review of Economic Design,Roberto2005,False,,Springer,Not available,The condominium problem; auctions for substitutes,d49dd7a33bf0eb8298db3451ef6977e6,http://dx.doi.org/10.1007/s10058-005-0121-2 887,The paper evaluates the performance of two multi-object auction models: ,debasis mishra,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 888,The paper evaluates the performance of two multi-object auction models: ,sunil reddy,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 889,The paper evaluates the performance of two multi-object auction models: ,dharmaraj veeramani,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 890, We derive equilibrium bidding strategies in divisible good auctions for asymmetrically informed risk neutral and risk averse bidders when there is random noncompetitive demand. The equilibrium bid schedules contain both strategic considerations and explicit allowances for the winner's curse. When the bidders' information is symmetric the strategic aspects of bidding imply that there always exist equilibria of a uniform-price auction with lower expected revenue than provided by a discriminatory auction. When bidders are risk averse there may exist equilibria of the uniform-price auction that provide higher expected revenue than a discriminatory auction.,jaime zender,Not available,2002.0,10.1007/s001990100191,Economic Theory,J.D.2002,False,,Springer,Not available,Auctioning divisible goods,dbc2f8a5b0c5e7fcbf2ee2fac646398a,http://dx.doi.org/10.1007/s001990100191 891,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,jiujun cheng,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 892,In this paper we describe an analysis of two double auction markets—the clearing house auction and the continuous double auction. The complexity of these institutions is such that they defy analysis using traditional game-theoretic techniques and so we use heuristic-strategy approximation to provide an approximated game-theoretic analysis. As well as finding heuristic-strategy equilibria for these mechanisms we subject them to an evolutionary game-theoretic analysis which allows us to quantify which equilibria are more likely to occur. We then weight the design objectives for each mechanism according to the probability distribution over equilibria which allows us to provide more realistic estimates for the efficiency of each mechanism.,steve phelps,Not available,2005.0,10.1007/11575726_8,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Steve2005,False,,Springer,Not available,An Evolutionary Game-Theoretic Comparison of Two Double-Auction Market Designs,36f46332d3d9d4376e717adb5b97a91c,http://dx.doi.org/10.1007/11575726_8 893,In this paper we describe an analysis of two double auction markets—the clearing house auction and the continuous double auction. The complexity of these institutions is such that they defy analysis using traditional game-theoretic techniques and so we use heuristic-strategy approximation to provide an approximated game-theoretic analysis. As well as finding heuristic-strategy equilibria for these mechanisms we subject them to an evolutionary game-theoretic analysis which allows us to quantify which equilibria are more likely to occur. We then weight the design objectives for each mechanism according to the probability distribution over equilibria which allows us to provide more realistic estimates for the efficiency of each mechanism.,simon parsons,Not available,2005.0,10.1007/11575726_8,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Steve2005,False,,Springer,Not available,An Evolutionary Game-Theoretic Comparison of Two Double-Auction Market Designs,36f46332d3d9d4376e717adb5b97a91c,http://dx.doi.org/10.1007/11575726_8 894,In this paper we describe an analysis of two double auction markets—the clearing house auction and the continuous double auction. The complexity of these institutions is such that they defy analysis using traditional game-theoretic techniques and so we use heuristic-strategy approximation to provide an approximated game-theoretic analysis. As well as finding heuristic-strategy equilibria for these mechanisms we subject them to an evolutionary game-theoretic analysis which allows us to quantify which equilibria are more likely to occur. We then weight the design objectives for each mechanism according to the probability distribution over equilibria which allows us to provide more realistic estimates for the efficiency of each mechanism.,peter mcburney,Not available,2005.0,10.1007/11575726_8,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Steve2005,False,,Springer,Not available,An Evolutionary Game-Theoretic Comparison of Two Double-Auction Market Designs,36f46332d3d9d4376e717adb5b97a91c,http://dx.doi.org/10.1007/11575726_8 895,Some actual multi-agent automated negotiation systems using auction mechanism in e-commerce are inefficient as buyer negotiation agents are lack of enough rationality and uneasy to determine appropriate bid price automatically according to different circumstance. In order to improve the auction-based negotiation efficiency of multi-agent system in e-commerce this paper proposes a model of game agent for auction-based negotiation and a bid negotiation algorithm based on game theory which provide a new effective way to establish buyer game agent for making buyer agent determine price more accurately and bid more rationally. As buyer agents bid in a more rational way auction agents and buyer agents can finish negotiation more efficiently.,jun hu,Not available,2005.0,10.1007/11596448_56,Computational Intelligence and Security,Jun2005,False,,Springer,Not available,Model of Game Agent for Auction-Based Negotiation,329ff576599de39e2e86da3cf730a951,http://dx.doi.org/10.1007/11596448_56 896,Some actual multi-agent automated negotiation systems using auction mechanism in e-commerce are inefficient as buyer negotiation agents are lack of enough rationality and uneasy to determine appropriate bid price automatically according to different circumstance. In order to improve the auction-based negotiation efficiency of multi-agent system in e-commerce this paper proposes a model of game agent for auction-based negotiation and a bid negotiation algorithm based on game theory which provide a new effective way to establish buyer game agent for making buyer agent determine price more accurately and bid more rationally. As buyer agents bid in a more rational way auction agents and buyer agents can finish negotiation more efficiently.,chun guan,Not available,2005.0,10.1007/11596448_56,Computational Intelligence and Security,Jun2005,False,,Springer,Not available,Model of Game Agent for Auction-Based Negotiation,329ff576599de39e2e86da3cf730a951,http://dx.doi.org/10.1007/11596448_56 897,The joint problems of channel and power allocation in multi-cell MIMO-OFDM based cognitive radio networks is addressed in this work. More specifically a repeated auction is proposed for the resource allocation problem in which secondary users (SUs) share the primary spectrum under the interference constraints of primary users (PUs). With the inter-cell interference and mutual interference between PUs and SUs the resource allocation problem is formulated as a non-convex optimization problem. Auction performs well in solving non-convex problems therefore the interference auction is proposed. Moreover with the theoretical analysis of equilibrium an implementation algorithm for the auction is developed and the convergence is proved. Simulation results show that the interference auction obtains a good spectrum efficiency improvement and a rapid convergence rate.,mehdi adian,Not available,2015.0,10.1007/s11277-014-2007-5,Wireless Personal Communications,Ghamari2015,False,,Springer,Not available,An Auction Based Approach for Resource Allocation in Multi-Cell MIMO-OFDM Based Cognitive Radio Networks,c22ae01dc2264254149056417a146b6c,http://dx.doi.org/10.1007/s11277-014-2007-5 898,The joint problems of channel and power allocation in multi-cell MIMO-OFDM based cognitive radio networks is addressed in this work. More specifically a repeated auction is proposed for the resource allocation problem in which secondary users (SUs) share the primary spectrum under the interference constraints of primary users (PUs). With the inter-cell interference and mutual interference between PUs and SUs the resource allocation problem is formulated as a non-convex optimization problem. Auction performs well in solving non-convex problems therefore the interference auction is proposed. Moreover with the theoretical analysis of equilibrium an implementation algorithm for the auction is developed and the convergence is proved. Simulation results show that the interference auction obtains a good spectrum efficiency improvement and a rapid convergence rate.,hassan aghaeinia,Not available,2015.0,10.1007/s11277-014-2007-5,Wireless Personal Communications,Ghamari2015,False,,Springer,Not available,An Auction Based Approach for Resource Allocation in Multi-Cell MIMO-OFDM Based Cognitive Radio Networks,c22ae01dc2264254149056417a146b6c,http://dx.doi.org/10.1007/s11277-014-2007-5 899,We study optimal bidder collusion in an independent private value first-price auction with two bidders and two possible valuations. There is a benevolent center that knows the bidders’ valuations and sends private signals to the bidders in order to maximize their expected payoffs. After receiving their signals bidders compete in a standard first-price auction that is without side payments or bid restrictions. We find that to improve on the bidders’ payoffs the signals must depend upon the valuations. If the bidders’ signals are restricted to be non-correlated (depend only on the opponent’s valuation) then the bidders’ payoffs are strictly higher than the larger possible set of signals. If the signals are restricted to be perfectly correlated (public) only two possible signals are needed to achieve the highest bidder payoffs. However these payoffs can be improved upon if the two signals are allowed to be imperfectly correlated.,helmuts azacis,Not available,2015.0,10.1007/s00199-013-0778-7,Economic Theory,Helmuts2015,False,,Springer,Not available,Collusive communication schemes in a first-price auction,082fc5d2b735474a87122cc7743ff6b0,http://dx.doi.org/10.1007/s00199-013-0778-7 900,We study optimal bidder collusion in an independent private value first-price auction with two bidders and two possible valuations. There is a benevolent center that knows the bidders’ valuations and sends private signals to the bidders in order to maximize their expected payoffs. After receiving their signals bidders compete in a standard first-price auction that is without side payments or bid restrictions. We find that to improve on the bidders’ payoffs the signals must depend upon the valuations. If the bidders’ signals are restricted to be non-correlated (depend only on the opponent’s valuation) then the bidders’ payoffs are strictly higher than the larger possible set of signals. If the signals are restricted to be perfectly correlated (public) only two possible signals are needed to achieve the highest bidder payoffs. However these payoffs can be improved upon if the two signals are allowed to be imperfectly correlated.,peter vida,Not available,2015.0,10.1007/s00199-013-0778-7,Economic Theory,Helmuts2015,False,,Springer,Not available,Collusive communication schemes in a first-price auction,082fc5d2b735474a87122cc7743ff6b0,http://dx.doi.org/10.1007/s00199-013-0778-7 901,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg [,yurii nesterov,Not available,2015.0,10.1007/978-3-662-48433-3_29,Algorithmic Game Theory,Yurii2015,False,,Springer,Not available,Brief Announcement: Computation of Fisher-Gale Equilibrium by Auction,2bcaae25b1f2026c02b6ce2d397154e5,http://dx.doi.org/10.1007/978-3-662-48433-3_29 902,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,yuhong li,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 903,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg [,vladimir shikhman,Not available,2015.0,10.1007/978-3-662-48433-3_29,Algorithmic Game Theory,Yurii2015,False,,Springer,Not available,Brief Announcement: Computation of Fisher-Gale Equilibrium by Auction,2bcaae25b1f2026c02b6ce2d397154e5,http://dx.doi.org/10.1007/978-3-662-48433-3_29 904,In the service-oriented manufacturing model customer participation proposes higher requirements on the relationship between supply chain entities and also provides more communication opportunities. The supply chain entities will have more opportunities and challenges to be considered as a whole therefore how to use the opportunities and advantages to enhance competitiveness is an important aspect to be considered. By putting forward repeated double auction theory and initiative knowledge spillovers this paper points out that the process of cooperation game between supply chain entities should pay more attention to the long-term interests and make full advantages of initiative knowledge spillovers which can promote trust and create new cooperation opportunities so as to adopt some certain strategies to consolidate the supply chain partnership.,dan-li du,Not available,2015.0,10.2991/978-94-6239-102-4_5,Proceedings of the 21st International Conference on Industrial Engineering and Engineering Management 2014,Dan-li2015,False,,Springer,Not available,Research on Initiative Knowledge Spillovers of Supply Chain Entities Based on Service-Oriented Manufacturing,10a1140cc291aee9e86137f3947f0d24,http://dx.doi.org/10.2991/978-94-6239-102-4_5 905,In the service-oriented manufacturing model customer participation proposes higher requirements on the relationship between supply chain entities and also provides more communication opportunities. The supply chain entities will have more opportunities and challenges to be considered as a whole therefore how to use the opportunities and advantages to enhance competitiveness is an important aspect to be considered. By putting forward repeated double auction theory and initiative knowledge spillovers this paper points out that the process of cooperation game between supply chain entities should pay more attention to the long-term interests and make full advantages of initiative knowledge spillovers which can promote trust and create new cooperation opportunities so as to adopt some certain strategies to consolidate the supply chain partnership.,qiu jin,Not available,2015.0,10.2991/978-94-6239-102-4_5,Proceedings of the 21st International Conference on Industrial Engineering and Engineering Management 2014,Dan-li2015,False,,Springer,Not available,Research on Initiative Knowledge Spillovers of Supply Chain Entities Based on Service-Oriented Manufacturing,10a1140cc291aee9e86137f3947f0d24,http://dx.doi.org/10.2991/978-94-6239-102-4_5 906,In the service-oriented manufacturing model customer participation proposes higher requirements on the relationship between supply chain entities and also provides more communication opportunities. The supply chain entities will have more opportunities and challenges to be considered as a whole therefore how to use the opportunities and advantages to enhance competitiveness is an important aspect to be considered. By putting forward repeated double auction theory and initiative knowledge spillovers this paper points out that the process of cooperation game between supply chain entities should pay more attention to the long-term interests and make full advantages of initiative knowledge spillovers which can promote trust and create new cooperation opportunities so as to adopt some certain strategies to consolidate the supply chain partnership.,hong-yan zhao,Not available,2015.0,10.2991/978-94-6239-102-4_5,Proceedings of the 21st International Conference on Industrial Engineering and Engineering Management 2014,Dan-li2015,False,,Springer,Not available,Research on Initiative Knowledge Spillovers of Supply Chain Entities Based on Service-Oriented Manufacturing,10a1140cc291aee9e86137f3947f0d24,http://dx.doi.org/10.2991/978-94-6239-102-4_5 907,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,oren ben-zwi,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 908,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,monika henzinger,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 909,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,veronika loitzenbauer,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 910,The issue of collaboration amongst agents in a multi-agent system (MAS) represents a challenging research problem. In this paper we focus on a form of cooperation known as coalition formation. The problem we consider is how to facilitate the formation of a coalition in a competitive marketplace where self-interested agents must cooperate by forming a coalition in order to complete a task. Agents must reach a consensus on both the monetary amount to charge for completion of a task as well as the distribution of the required workload. The problem is further complicated because different subtasks have various degrees of difficulty and each agent is uncertain of the payment another agent requires for performing specific subtasks. These complexities coupled with the self-interested nature of agents can inhibit or even prevent the formation of coalitions in such a real-world setting. As a solution a novel auction-based protocol called ,ted scully,Not available,2015.0,10.1007/978-3-319-17130-2_10,Multi-Agent Systems,Ted2015,False,,Springer,Not available,Forming Coalitions in Self-interested Multi-agent Environments Through the Promotion of Fair and Cooperative Behaviour,a63311c460a54981fe6d96209abaa3c0,http://dx.doi.org/10.1007/978-3-319-17130-2_10 911,The issue of collaboration amongst agents in a multi-agent system (MAS) represents a challenging research problem. In this paper we focus on a form of cooperation known as coalition formation. The problem we consider is how to facilitate the formation of a coalition in a competitive marketplace where self-interested agents must cooperate by forming a coalition in order to complete a task. Agents must reach a consensus on both the monetary amount to charge for completion of a task as well as the distribution of the required workload. The problem is further complicated because different subtasks have various degrees of difficulty and each agent is uncertain of the payment another agent requires for performing specific subtasks. These complexities coupled with the self-interested nature of agents can inhibit or even prevent the formation of coalitions in such a real-world setting. As a solution a novel auction-based protocol called ,michael madden,Not available,2015.0,10.1007/978-3-319-17130-2_10,Multi-Agent Systems,Ted2015,False,,Springer,Not available,Forming Coalitions in Self-interested Multi-agent Environments Through the Promotion of Fair and Cooperative Behaviour,a63311c460a54981fe6d96209abaa3c0,http://dx.doi.org/10.1007/978-3-319-17130-2_10 912,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,maya larson,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 913,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,weiwei jiao,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 914,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,wei li,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 915,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,chunqiang hu,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 916,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,ruinian li,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 917,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,xiuzhen cheng,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 918,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,rongfang bie,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 919,In this paper we consider the auction framework of cognitive radio network consisting of a set of primary users and a set of secondary users (SUs). The spectrum has been divided into channels with the help of frequency division multiple access (FDMA). The primary users (PUs) are licensed users who lease the vacant channels to secondary user (SUs) temporarily by auction mechanism. In this paper we try to form an algorithm to determine the secondary user who wins the auction. We also discuss the effect of change of number of users on bandwidth utilization channel utility and revenue generation by using the algorithm.,subhasree bhattacharjee,Not available,2015.0,10.1007/978-81-322-2274-3_13,Computational Advancement in Communication Circuits and Systems,Subhasree2015,False,,Springer,Not available,Winner Determination Algorithm in Auction Framework of Cognitive Radio Network,cc46045665795e5555c9f1734aed000b,http://dx.doi.org/10.1007/978-81-322-2274-3_13 920,In this paper we consider the auction framework of cognitive radio network consisting of a set of primary users and a set of secondary users (SUs). The spectrum has been divided into channels with the help of frequency division multiple access (FDMA). The primary users (PUs) are licensed users who lease the vacant channels to secondary user (SUs) temporarily by auction mechanism. In this paper we try to form an algorithm to determine the secondary user who wins the auction. We also discuss the effect of change of number of users on bandwidth utilization channel utility and revenue generation by using the algorithm.,arunava bhattacharya,Not available,2015.0,10.1007/978-81-322-2274-3_13,Computational Advancement in Communication Circuits and Systems,Subhasree2015,False,,Springer,Not available,Winner Determination Algorithm in Auction Framework of Cognitive Radio Network,cc46045665795e5555c9f1734aed000b,http://dx.doi.org/10.1007/978-81-322-2274-3_13 921,In the secondary spectrum market more and more primary users (,feng tian,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 922,In the secondary spectrum market more and more primary users (,di li,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 923,In the secondary spectrum market more and more primary users (,shuyu li,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 924,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,jian ma,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 925,In the secondary spectrum market more and more primary users (,lei wang,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 926,In the secondary spectrum market more and more primary users (,naigao jin,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 927,In the secondary spectrum market more and more primary users (,liang sun,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 928,This chapter is concerned with the decentralized resource-constrained multi-project scheduling problem (DRCMPSP) which is characterized in that individual involved decision makers pursue individual goals whereas some overall coordination mechanism is needed to resolve conflicts due to the interdependencies between multiple projects. The connection between activities from these projects may result from temporal and resource-orientated constraints. In general there may be two kinds of autonomous decision makers on the one hand those that control individual projects and on the other hand those that control globally available resources. After providing a more detailed description of such kinds of problems and the resulting peculiarities of decentralized decision making a classification of respective problem types is provided which leads to related requirements for solution procedures. Overall there are two basic solution approaches namely auctions and negotiations. These methods are described in connection with a review of the related literature.,andreas fink,Not available,2015.0,10.1007/978-3-319-05915-0_2,Handbook on Project Management and Scheduling Vol. 2,Andreas2015,False,,Springer,Not available,Decentralized Multi-Project Scheduling,a1fd383d1c938a97f172432223f5abed,http://dx.doi.org/10.1007/978-3-319-05915-0_2 929,This chapter is concerned with the decentralized resource-constrained multi-project scheduling problem (DRCMPSP) which is characterized in that individual involved decision makers pursue individual goals whereas some overall coordination mechanism is needed to resolve conflicts due to the interdependencies between multiple projects. The connection between activities from these projects may result from temporal and resource-orientated constraints. In general there may be two kinds of autonomous decision makers on the one hand those that control individual projects and on the other hand those that control globally available resources. After providing a more detailed description of such kinds of problems and the resulting peculiarities of decentralized decision making a classification of respective problem types is provided which leads to related requirements for solution procedures. Overall there are two basic solution approaches namely auctions and negotiations. These methods are described in connection with a review of the related literature.,jorg homberger,Not available,2015.0,10.1007/978-3-319-05915-0_2,Handbook on Project Management and Scheduling Vol. 2,Andreas2015,False,,Springer,Not available,Decentralized Multi-Project Scheduling,a1fd383d1c938a97f172432223f5abed,http://dx.doi.org/10.1007/978-3-319-05915-0_2 930,This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case we derive an optimal randomized bidding algorithm by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general ,ming-yang kao,Not available,1997.0,10.1007/BFb0045086,Computing and Combinatorics,Ming-Yang1997,False,,Springer,Not available,Optimal bidding algorithms against cheating in multiple-object auctions,64d06baaf8dccdbcd85b0101d7e3bc4a,http://dx.doi.org/10.1007/BFb0045086 931,This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case we derive an optimal randomized bidding algorithm by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general ,junfeng qi,Not available,1997.0,10.1007/BFb0045086,Computing and Combinatorics,Ming-Yang1997,False,,Springer,Not available,Optimal bidding algorithms against cheating in multiple-object auctions,64d06baaf8dccdbcd85b0101d7e3bc4a,http://dx.doi.org/10.1007/BFb0045086 932,This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case we derive an optimal randomized bidding algorithm by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general ,lei tan,Not available,1997.0,10.1007/BFb0045086,Computing and Combinatorics,Ming-Yang1997,False,,Springer,Not available,Optimal bidding algorithms against cheating in multiple-object auctions,64d06baaf8dccdbcd85b0101d7e3bc4a,http://dx.doi.org/10.1007/BFb0045086 933,An ,brian hillier,Not available,1997.0,10.1007/978-1-349-25485-9_11,The Economics of Asymmetric Information,Brian1997,False,,Springer,Not available,Auctions,dcb79d32f2088879478a74cb77ca911d,http://dx.doi.org/10.1007/978-1-349-25485-9_11 934,This paper presents a hybrid approach for sealed bid auction that integrates linear programming and logic modeling techniques. A linear programming model for the sealed bid auction considers only prices for transaction arrangements and yields multiple market cores when goods from sellers are equally attractive to many buyers. The hybrid approach takes into account ordinal preferences of traders as well to find the best market core. On the one hand the hybrid approach uses a linear programming model to maximize total surplus of market participants based on the bid and ask prices. On the other hand it employs a logical inferencing approach to satisfy traders' ordinal preferences that are not included in a single combination of bid and ask prices. A constraint logic programming scheme which combines a mathematical program with a logical inferencing technique in an integrated formalism is introduced to implement the hybrid approach. The hybrid approach is validated through market simulations where a set of computer-generated trading data is applied to both the hybrid approach and the linear programming model for their market performance comparison.,lee geun,Not available,1997.0,10.1023/A:1018959529628,Annals of Operations Research,Ho1997,False,,Springer,Not available,A hybrid approach of linear programming and logic modeling for the market core of sealed bid auctions,f6d031a4f11b8acb02803d772de30b16,http://dx.doi.org/10.1023/A:1018959529628 935,We consider the online auction problem in which an auctioneer is selling an identical item each time when a new bidder arrives. It is known that results from online prediction can be applied and achieve a constant competitive ratio with respect to the best fixed price profit. These algorithms work on a predetermined set of price levels. We take into account the property that the rewards for the price levels are not independent and cast the problem as a more refined model of online prediction. We then use Vovk’s Aggregating Strategy to derive a new algorithm. We give a general form of competitive ratio in terms of the price levels. The optimality of the Aggregating Strategy gives an evidence that our algorithm performs at least as well as the previously proposed ones.,shigeaki harada,Not available,2006.0,10.1007/11809678_6,Computing and Combinatorics,Shigeaki2006,False,,Springer,Not available,Aggregating Strategy for Online Auctions,243b93e432e6f9d303ddbc17f83dbc11,http://dx.doi.org/10.1007/11809678_6 936,This paper presents a hybrid approach for sealed bid auction that integrates linear programming and logic modeling techniques. A linear programming model for the sealed bid auction considers only prices for transaction arrangements and yields multiple market cores when goods from sellers are equally attractive to many buyers. The hybrid approach takes into account ordinal preferences of traders as well to find the best market core. On the one hand the hybrid approach uses a linear programming model to maximize total surplus of market participants based on the bid and ask prices. On the other hand it employs a logical inferencing approach to satisfy traders' ordinal preferences that are not included in a single combination of bid and ask prices. A constraint logic programming scheme which combines a mathematical program with a logical inferencing technique in an integrated formalism is introduced to implement the hybrid approach. The hybrid approach is validated through market simulations where a set of computer-generated trading data is applied to both the hybrid approach and the linear programming model for their market performance comparison.,ronald lee,Not available,1997.0,10.1023/A:1018959529628,Annals of Operations Research,Ho1997,False,,Springer,Not available,A hybrid approach of linear programming and logic modeling for the market core of sealed bid auctions,f6d031a4f11b8acb02803d772de30b16,http://dx.doi.org/10.1023/A:1018959529628 937,In this paper I consider a common value model with independent types where the ex-post value of the good is influenced by the bidders' information at the auction stage. The seller cannot fully extract the surplus. In a symmetric model the optimal mechanism can be implemented through first price second price or English auctions; but not through a Dutch auction.Other properties of the optimal auctions are that the seller's reservation price is endogenous and that in sealed bid auctions the price may exceed the value of the object (winner's curse).,fernando branco,Not available,1996.0,10.1007/BF02499137,Economic design,Fernando1996,False,,Springer,Not available,Common value auctions with independent types,11e308f2c6cf231d66e9bea1d37c7f6a,http://dx.doi.org/10.1007/BF02499137 938,We study the first price auction game with an arbitrary number of bidders when the bidders' valuations are independent from each other. In technical words we work within the “independent private value model”. We show that if the supports of the valuation probability distributions have the same minimum and if this minimum is not a mass point of any of these distributions then a Nash equilibrium of the first price auction exists. We then modify the first price auction game by adding a closed interval of messages. Every bidder has to send a message with the bid he submits. These messages are used in the resolution of the ties. The winner of the auction is chosen randomly among the highest bidders with the highest value of the message among the highest bidders. In the general case we prove the existence of a Nash equilibrium for this “augmented” first price auction.,bernard lebrun,Not available,1996.0,10.1007/BF01213659,Economic Theory,Bernard1996,False,,Springer,Not available,Existence of an equilibrium in first price auctions,0d5e90c0546dc414fec30adef68e6349,http://dx.doi.org/10.1007/BF01213659 939,In a (first price) all-pay auction bidders simultaneously submit bids for an item. All players forfeit their bids and the high bidder receives the item. This auction is widely used in economics to model rent seeking R&D races political contests and job promotion tournaments. We fully characterize equilibrium for this class of games and show that the set of equilibria is much larger than has been recognized in the literature. When there are more than two players for instance we show that even when the auction is symmetric there exists a continuum of asymmetric equilibria. Moreover for economically important configurations of valuations there is no revenue equivalence across the equilibria; asymmetric equilibria imply higher expected revenues than the symmetric equilibrium.,michael baye,Not available,1996.0,10.1007/BF01211819,Economic Theory,R.1996,False,,Springer,Not available,The all-pay auction with complete information,087990098d0b56819f3b656d379fe5ea,http://dx.doi.org/10.1007/BF01211819 940,In a (first price) all-pay auction bidders simultaneously submit bids for an item. All players forfeit their bids and the high bidder receives the item. This auction is widely used in economics to model rent seeking R&D races political contests and job promotion tournaments. We fully characterize equilibrium for this class of games and show that the set of equilibria is much larger than has been recognized in the literature. When there are more than two players for instance we show that even when the auction is symmetric there exists a continuum of asymmetric equilibria. Moreover for economically important configurations of valuations there is no revenue equivalence across the equilibria; asymmetric equilibria imply higher expected revenues than the symmetric equilibrium.,dan kovenock,Not available,1996.0,10.1007/BF01211819,Economic Theory,R.1996,False,,Springer,Not available,The all-pay auction with complete information,087990098d0b56819f3b656d379fe5ea,http://dx.doi.org/10.1007/BF01211819 941,In a (first price) all-pay auction bidders simultaneously submit bids for an item. All players forfeit their bids and the high bidder receives the item. This auction is widely used in economics to model rent seeking R&D races political contests and job promotion tournaments. We fully characterize equilibrium for this class of games and show that the set of equilibria is much larger than has been recognized in the literature. When there are more than two players for instance we show that even when the auction is symmetric there exists a continuum of asymmetric equilibria. Moreover for economically important configurations of valuations there is no revenue equivalence across the equilibria; asymmetric equilibria imply higher expected revenues than the symmetric equilibrium.,casper vries,Not available,1996.0,10.1007/BF01211819,Economic Theory,R.1996,False,,Springer,Not available,The all-pay auction with complete information,087990098d0b56819f3b656d379fe5ea,http://dx.doi.org/10.1007/BF01211819 942,This paper analyses auctions in which the valuation of each player not only depends on whether he wins or not but also on who is the winner if it is not him.,peter funk,Not available,1996.0,10.1007/BF01254384,International Journal of Game Theory,Peter1996,False,,Springer,Not available,Auctions with interdependent valuations,0d0b9718be2194b15330b23535b9f2f6,http://dx.doi.org/10.1007/BF01254384 943,A primary commodity such as wheat rice coffee oil etc. is shipped from,gerald thompson,Not available,1996.0,10.1007/BF02205454,Annals of Operations Research,L.1996,False,,Springer,Not available,Exchanging heterogeneous goods via sealed bid auctions and transportation systems,26b73339bdb8c9e900f88d37063b00ca,http://dx.doi.org/10.1007/BF02205454 944,A primary commodity such as wheat rice coffee oil etc. is shipped from,sten thore,Not available,1996.0,10.1007/BF02205454,Annals of Operations Research,L.1996,False,,Springer,Not available,Exchanging heterogeneous goods via sealed bid auctions and transportation systems,26b73339bdb8c9e900f88d37063b00ca,http://dx.doi.org/10.1007/BF02205454 945,This paper studies the properties of several multiple unit auctions in the context of a general model that allows for private values and common values as special cases.The benchmark for the analysis is provided by the characterization of optimal selling procedures for a seller that has several units of a homogeneous indivisible good to be sold extending the analysis of a single unit model in [1]. It is shown that the seller should impose endogenous individual minimum announcements that are contingent on the bidders' reports and decreasing as the number of units allocated to the buyer increase.Implementation mechanisms are discussed in the context of a special case of the model. Under the assumption of unit demands it is shown that some generalizations (to multiple units) of standard auctions may implement the optimal mechanism but some do not. Moreover it is proven that in a sequential optimal auction the sequence of prices paid in each auction is a supermartingale which conforms to the empirical behavior of prices in sequential auctions.,fernando branco,Not available,1996.0,10.1007/BF01212013,Economic Theory,Fernando1996,False,,Springer,Not available,Multiple unit auctions of an indivisible good,4e6dd8c329eefdaedc5966aaa534d462,http://dx.doi.org/10.1007/BF01212013 946,We consider the online auction problem in which an auctioneer is selling an identical item each time when a new bidder arrives. It is known that results from online prediction can be applied and achieve a constant competitive ratio with respect to the best fixed price profit. These algorithms work on a predetermined set of price levels. We take into account the property that the rewards for the price levels are not independent and cast the problem as a more refined model of online prediction. We then use Vovk’s Aggregating Strategy to derive a new algorithm. We give a general form of competitive ratio in terms of the price levels. The optimality of the Aggregating Strategy gives an evidence that our algorithm performs at least as well as the previously proposed ones.,eiji takimoto,Not available,2006.0,10.1007/11809678_6,Computing and Combinatorics,Shigeaki2006,False,,Springer,Not available,Aggregating Strategy for Online Auctions,243b93e432e6f9d303ddbc17f83dbc11,http://dx.doi.org/10.1007/11809678_6 947,In the general symmetric auction framework of Milgrom and Weber (1982) it is shown—as a new manifestation of the,erwin amann,Not available,1995.0,10.1007/BF01258621,Journal of Economics,Erwin1995,False,,Springer,Not available,Expected revenue of all-pay and first-price sealed-bid auctions with affiliated signals,04f76448dc9404d1cf767ee8984bfb6d,http://dx.doi.org/10.1007/BF01258621 948,In the general symmetric auction framework of Milgrom and Weber (1982) it is shown—as a new manifestation of the,wolfgang leininger,Not available,1995.0,10.1007/BF01258621,Journal of Economics,Erwin1995,False,,Springer,Not available,Expected revenue of all-pay and first-price sealed-bid auctions with affiliated signals,04f76448dc9404d1cf767ee8984bfb6d,http://dx.doi.org/10.1007/BF01258621 949,Economists are interested in eliciting values at the level of the individual because market values do not provide the information needed to measure consumer surplus value new products or value goods that have no market. Direct and indirect procedures have been developed to elicit values and each has some strengths and weaknesses. The evidence points to several recommendations for best practice in the reliable elicitation of values trading off transparency and rigour.,glenn harrison,Not available,2018.0,10.1057/978-1-349-95189-5_2635,The New Palgrave Dictionary of Economics,W.2018,False,,Springer,Not available,Value Elicitation,f7b2b67adad72008085fd17d264b59e8,http://dx.doi.org/10.1057/978-1-349-95189-5_2635 950,This article reviews the recent development of search theory. We begin with a standard model of undirected (or random) search and illustrate that the equilibrium is generically inefficient. Then we show that the market can restore efficiency by allowing individuals on one side of the market to use prices to direct other individuals’ searches. Two mechanisms of directed search – price posting and auction – are analysed and a number of applications of the framework are discussed. In addition we briefly describe search theory as a microfoundation for monetary economics. Finally we conclude by speculating a few directions of future research.,shouyong shi,Not available,2018.0,10.1057/978-1-349-95189-5_2767,The New Palgrave Dictionary of Economics,Shouyong2018,False,,Springer,Not available,Search Theory (New Perspectives),ee7fd6aedcd5ec3fac17c35ddf82ce42,http://dx.doi.org/10.1057/978-1-349-95189-5_2767 951,Experimental labour economics uses experimental techniques to improve our understanding of labour economics issues. We start by putting experimental data into perspective with the data-sets typically used by empirical labour economists. We then discuss several examples of how experiments can inform labour economics.,armin falk,Not available,2018.0,10.1057/978-1-349-95189-5_2005,The New Palgrave Dictionary of Economics,Armin2018,False,,Springer,Not available,Experimental Labour Economics,e70c45ee96f45efe52a71ffa19692aa6,http://dx.doi.org/10.1057/978-1-349-95189-5_2005 952,Experimental labour economics uses experimental techniques to improve our understanding of labour economics issues. We start by putting experimental data into perspective with the data-sets typically used by empirical labour economists. We then discuss several examples of how experiments can inform labour economics.,simon gachter,Not available,2018.0,10.1057/978-1-349-95189-5_2005,The New Palgrave Dictionary of Economics,Armin2018,False,,Springer,Not available,Experimental Labour Economics,e70c45ee96f45efe52a71ffa19692aa6,http://dx.doi.org/10.1057/978-1-349-95189-5_2005 953,Cournot’s 1838 model of strategic interaction between competing firms has become the primary workhorse for the analysis of imperfect competition and shows up in a variety of fields notably industrial organization and international trade. This article begins with a tour of the basic Cournot model and its properties touching on existence uniqueness stability and efficiency; this discussion especially emphasizes considerations involved in using the Cournot model in multi-stage applications. A discussion of recent applications is provided as well as a reference to an extended bibliography of approximately 125 selected publications from 2001 through 2005.,andrew daughety,Not available,2018.0,10.1057/978-1-349-95189-5_2345,The New Palgrave Dictionary of Economics,F.2018,False,,Springer,Not available,Cournot Competition,265a2f0f925da10d734fb347090ed1f5,http://dx.doi.org/10.1057/978-1-349-95189-5_2345 954,Vernon Lomax Smith shared the 2002 Nobel Prize in Economics for his contributions to the development of experimental economics. Among his insights is the idea that ‘institutions matter’: trading institutions affect the efficiency of a market and the optimal institution depends on the market context. He has made important contributions to market and institutional design public goods bargaining experimental methodology and the philosophy of science.,catherine eckel,Not available,2018.0,10.1057/978-1-349-95189-5_2358,The New Palgrave Dictionary of Economics,C.2018,False,,Springer,Not available,Smith Vernon (Born 1927),a35bb3b581e6a77ed07d5744a8f153a7,http://dx.doi.org/10.1057/978-1-349-95189-5_2358 955,We survey some recent empirical work concerning the analysis of auctions. We begin by describing a two-step nonparametric approach for estimating bidding models that is commonly used in the applied literature. Two applications of this approach are considered: empirical work on bidding in Treasury markets and empirical tests for collusion in auctions.,patrick bajari,Not available,2018.0,10.1057/978-1-349-95189-5_2166,The New Palgrave Dictionary of Economics,Patrick2018,False,,Springer,Not available,Auctions (Applications),d2cc2c4e7dcf9a280186099e4716b4b7,http://dx.doi.org/10.1057/978-1-349-95189-5_2166 956,Until recently and despite strong interest in market outcomes economists have paid relatively little attention to the institutional structure of markets. This article considers the historical evolution of markets and poses some dilemmas concerning their definition. Several alternative definitions are considered involving different degrees of historical specificity. It is argued that developments in economics and elsewhere since the 1980s point to a more nuanced view of markets involving a recognition of different types of market mechanisms and institutions. These developments include work in experimental economics and auction theory. A definition of markets is offered that is consistent with these developments.,geoffrey hodgson,Not available,2018.0,10.1057/978-1-349-95189-5_2113,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Markets,fab348e373d0e404131eeaac85d859e6,http://dx.doi.org/10.1057/978-1-349-95189-5_2113 957,We consider the online auction problem in which an auctioneer is selling an identical item each time when a new bidder arrives. It is known that results from online prediction can be applied and achieve a constant competitive ratio with respect to the best fixed price profit. These algorithms work on a predetermined set of price levels. We take into account the property that the rewards for the price levels are not independent and cast the problem as a more refined model of online prediction. We then use Vovk’s Aggregating Strategy to derive a new algorithm. We give a general form of competitive ratio in terms of the price levels. The optimality of the Aggregating Strategy gives an evidence that our algorithm performs at least as well as the previously proposed ones.,akira maruoka,Not available,2006.0,10.1007/11809678_6,Computing and Combinatorics,Shigeaki2006,False,,Springer,Not available,Aggregating Strategy for Online Auctions,243b93e432e6f9d303ddbc17f83dbc11,http://dx.doi.org/10.1007/11809678_6 958,An allocation mechanism is a function mapping agents’ preferences into allocations. Each agent’s preferences however are private to himself so in reporting them he can misrepresent them if that achieves a more preferable allocation. A strategy-proof allocation mechanism eliminates incentives to misrepresent: each agent no matter what his preferences are and no matter what preferences other agents report maximizes by reporting his preferences truthfully. While the Gibbard-Satterthwaite theorem establishes that no useful strategy-proof allocation mechanisms exist in general useful ones do exist for a number of specific economically important classes of allocation problems.,mark satterthwaite,Not available,2018.0,10.1057/978-1-349-95189-5_1712,The New Palgrave Dictionary of Economics,A.2018,False,,Springer,Not available,Strategy-Proof Allocation Mechanisms,fa25727974120d30d010cac6c96dd9b5,http://dx.doi.org/10.1057/978-1-349-95189-5_1712 959,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This chapter presents the possible solutions to the demand response problem in multi-tenant data centers.,thant oo,Not available,2018.0,10.1007/978-3-319-66062-2_9,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Solutions,700e1c18fd8eac369c812bda29a06abb,http://dx.doi.org/10.1007/978-3-319-66062-2_9 960,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This chapter presents the possible solutions to the demand response problem in multi-tenant data centers.,nguyen tran,Not available,2018.0,10.1007/978-3-319-66062-2_9,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Solutions,700e1c18fd8eac369c812bda29a06abb,http://dx.doi.org/10.1007/978-3-319-66062-2_9 961,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This chapter presents the possible solutions to the demand response problem in multi-tenant data centers.,shaolei ren,Not available,2018.0,10.1007/978-3-319-66062-2_9,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Solutions,700e1c18fd8eac369c812bda29a06abb,http://dx.doi.org/10.1007/978-3-319-66062-2_9 962,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This chapter presents the possible solutions to the demand response problem in multi-tenant data centers.,choong hong,Not available,2018.0,10.1007/978-3-319-66062-2_9,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Solutions,700e1c18fd8eac369c812bda29a06abb,http://dx.doi.org/10.1007/978-3-319-66062-2_9 963,William Spencer Vickrey was awarded the 1996 Nobel Prize in Economics ‘for his fundamental contributions to the economic theory of incentives under asymmetric information’. While best known as the father of auction theory he made important contributions on a broad range of topics including social choice marginal cost pricing the design of tax systems transportation economics urban economics and macroeconomics.,richard arnott,Not available,2018.0,10.1057/978-1-349-95189-5_1306,The New Palgrave Dictionary of Economics,Richard2018,False,,Springer,Not available,Vickrey William Spencer (1914–1996),ac13178741f3e29a6797ac3290050651,http://dx.doi.org/10.1057/978-1-349-95189-5_1306 964,This paper examines the problem of a seller with limited supply selling to a group of agents whose private information is two-dimensional. Each agent has a constant marginal value for the good up to some capacity thereafter it is zero. Both the marginal value and the capacity are private information. We describe the revenue maximizing Bayesian incentive compatible auction for this environment. A novel feature of the analysis is an interpretation of an optimal auction design problem in terms of a linear program that is an instance of a parametric shortest path problem on a lattice.,alexey malakhov,Not available,2009.0,10.1007/s00199-007-0312-x,Economic Theory,Alexey2009,False,,Springer,Not available,An optimal auction for capacity constrained bidders: a network perspective,0869c97dacdd2894dc5d7f0939bb8725,http://dx.doi.org/10.1007/s00199-007-0312-x 965,This paper examines the problem of a seller with limited supply selling to a group of agents whose private information is two-dimensional. Each agent has a constant marginal value for the good up to some capacity thereafter it is zero. Both the marginal value and the capacity are private information. We describe the revenue maximizing Bayesian incentive compatible auction for this environment. A novel feature of the analysis is an interpretation of an optimal auction design problem in terms of a linear program that is an instance of a parametric shortest path problem on a lattice.,rakesh vohra,Not available,2009.0,10.1007/s00199-007-0312-x,Economic Theory,Alexey2009,False,,Springer,Not available,An optimal auction for capacity constrained bidders: a network perspective,0869c97dacdd2894dc5d7f0939bb8725,http://dx.doi.org/10.1007/s00199-007-0312-x 966,A simple example shows that equilibria can fail to exist in second price (Vickrey) and English auctions when there are both common and private components to bidders’ valuations and private information is held on both dimensions. The example shows that equilibrium only exists in the extremes of pure private and pure common values and that existence in standard models is not robust to a slight perturbation.,matthew jackson,Not available,2009.0,10.1007/s10058-008-0059-2,Review of Economic Design,O.2009,False,,Springer,Not available,Non-existence of equilibrium in Vickrey second-price and English auctions,4fa5f74d1042985d00ebaa458ae63e35,http://dx.doi.org/10.1007/s10058-008-0059-2 967," We compare simultaneous multi-object English-type ascending price auctions with first price sealed bid auctions in private values environments with multi-object demands. Special attention is paid to the effect of closing rules on ascending auctions’ outcomes. We find that simultaneous ascending auctions with the soft closing rule are the most efficient while the sealed bid auctions generate the highest revenue. Ascending auctions with the hard closing rule display a significant amount of late bidding resulting in the lowest among the three institutions revenue and efficiency. ",katerina sherstyuk,Not available,2009.0,10.1007/s10683-007-9189-6,Experimental Economics,Katerina2009,False,,Springer,Not available,A comparison of first price multi-object auctions,a01df14413cd3acfeb2a4cff2e2d0687,http://dx.doi.org/10.1007/s10683-007-9189-6 968,This paper studies how to relax the restrictions on bidders in two sequential English auctions. Existing work has showed that it is optimal for the auctioneer to auction objects in the decreasing order of the dispersion of the order statistics of the surpluses. But they assume each bidder can win at most one object. However in many cases each bidder needs more than one object and the objects almost affect each other. Given this the settings that have both common and private value elements by allowing each bidder winning more than one object are studied here. Firstly the single object model is extended to two objects without the limitation that a bidder can win at most one object. Secondly the equilibrium bidding strategies for each auction in a sequence are described the selling prices and winner’s total expected profits of different agendas are analyzed. Thirdly the optimal agendas are determined. Finally we make two experiments one validates that it may be the optimal agenda either by increasing order or decreasing order of the dispersion of the order statistics of the surpluses the other display the changing trend of the optimal agenda.,yu-mei chai,Not available,2006.0,10.1007/11802372_41,Agent Computing and Multi-Agent Systems,Yu-mei2006,False,,Springer,Not available,Optimal Agendas for Sequential English Auctions with Private and Common Values,831076291e6d139f5a8af6fed317583c,http://dx.doi.org/10.1007/11802372_41 969,Previous research suggests that minorities are more likely to perceive racially-based discrimination in a variety of settings than are whites in large part because of the ways their personal experiences with racism shape the lens they use to view the world. We examine a labor market that is typically considered an exception to patterns of racism in employment the industry of professional football. We interview athletes who attempted to gain employment in the National Football League a labor market where access to valued positions is heavily restricted by industry practices. Findings from field research and semi-structured interviews indicate that minority workers experience symbolic discrimination during the hiring process. Differential treatment of players reflects stereotypes about minority families and masculinity. Although minority and white players describe much of the actual content of their labor market experiences in similar fashion their perceptions of these experiences differ sharply with minority athletes identifying far more negative repercussions.,mikaela dufur,Not available,2009.0,10.1007/s11133-008-9119-8,Qualitative Sociology,J.2009,False,,Springer,Not available,Race and the NFL Draft: Views from the Auction Block,6addc5c1d79acbee10f0ed43382c8622,http://dx.doi.org/10.1007/s11133-008-9119-8 970,Previous research suggests that minorities are more likely to perceive racially-based discrimination in a variety of settings than are whites in large part because of the ways their personal experiences with racism shape the lens they use to view the world. We examine a labor market that is typically considered an exception to patterns of racism in employment the industry of professional football. We interview athletes who attempted to gain employment in the National Football League a labor market where access to valued positions is heavily restricted by industry practices. Findings from field research and semi-structured interviews indicate that minority workers experience symbolic discrimination during the hiring process. Differential treatment of players reflects stereotypes about minority families and masculinity. Although minority and white players describe much of the actual content of their labor market experiences in similar fashion their perceptions of these experiences differ sharply with minority athletes identifying far more negative repercussions.,seth feinberg,Not available,2009.0,10.1007/s11133-008-9119-8,Qualitative Sociology,J.2009,False,,Springer,Not available,Race and the NFL Draft: Views from the Auction Block,6addc5c1d79acbee10f0ed43382c8622,http://dx.doi.org/10.1007/s11133-008-9119-8 971,This article further studies ex ante efficient auctions in the setting of Stegeman (1996 Participation costs and efficient auctions ,jingfeng lu,Not available,2009.0,10.1007/s11238-007-9092-9,Theory and Decision,Jingfeng2009,False,,Springer,Not available,Why a Simple Second-Price Auction Induces Efficient Endogenous Entry,4c6707570f01e553a7a562b0e02ae1cd,http://dx.doi.org/10.1007/s11238-007-9092-9 972,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,martin bichler,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 973,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,alexander pikovsky,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 974,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,thomas setzer,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 975,This paper studies revenue-maximizing auctions in an independent private value setting where potential bidders have known positive opportunity cost of bidding. The main findings are as follows. Firstly there is no loss of generality in deriving the revenue-maximizing auctions within the class of threshold-entry mechanisms. Secondly for any given set of entry thresholds a second-price sealed-bid auction with properly set reserve prices and entry subsidy is revenue-maximizing. Thirdly a variety of auctions are revenue-maximizing within the symmetric threshold-entry class. Two of them involve no entry subsidy (fee). Fourthly we identify sufficient conditions under which it is in the seller’s interest to limit the number of potential bidders even if the revenue-maximizing symmetric threshold-entry auction is adopted. Lastly the revenue-maximizing auction implements asymmetric entry across symmetric bidders in many cases.,jingfeng lu,Not available,2009.0,10.1007/s00199-008-0331-2,Economic Theory,Jingfeng2009,False,,Springer,Not available,Auction design with opportunity cost,07ad73b1dab14b4d050c52c23605250f,http://dx.doi.org/10.1007/s00199-008-0331-2 976,The sponsored search auction problem was introduced briefly as an example in Chapter 1. In this chapter we study this problem in more detail to illustrate a compelling application of mechanism design. We first describe a framework to model this problem as a mechanism design problem under a reasonable set of assumptions. Using this framework we describe three well known mechanisms for sponsored search auctions – ,y. narahari,Not available,2009.0,10.1007/978-1-84800-938-7_3,Game Theoretic Problems in Network Economics and Mechanism Design Solutions,Y.2009,False,,Springer,Not available,Mechanism Design for Sponsored Search Auctions,9f848a93db73183f1a4b2c81ed20d403,http://dx.doi.org/10.1007/978-1-84800-938-7_3 977,The sponsored search auction problem was introduced briefly as an example in Chapter 1. In this chapter we study this problem in more detail to illustrate a compelling application of mechanism design. We first describe a framework to model this problem as a mechanism design problem under a reasonable set of assumptions. Using this framework we describe three well known mechanisms for sponsored search auctions – ,ramasuri narayanam,Not available,2009.0,10.1007/978-1-84800-938-7_3,Game Theoretic Problems in Network Economics and Mechanism Design Solutions,Y.2009,False,,Springer,Not available,Mechanism Design for Sponsored Search Auctions,9f848a93db73183f1a4b2c81ed20d403,http://dx.doi.org/10.1007/978-1-84800-938-7_3 978,The sponsored search auction problem was introduced briefly as an example in Chapter 1. In this chapter we study this problem in more detail to illustrate a compelling application of mechanism design. We first describe a framework to model this problem as a mechanism design problem under a reasonable set of assumptions. Using this framework we describe three well known mechanisms for sponsored search auctions – ,dinesh garg,Not available,2009.0,10.1007/978-1-84800-938-7_3,Game Theoretic Problems in Network Economics and Mechanism Design Solutions,Y.2009,False,,Springer,Not available,Mechanism Design for Sponsored Search Auctions,9f848a93db73183f1a4b2c81ed20d403,http://dx.doi.org/10.1007/978-1-84800-938-7_3 979,This paper studies how to relax the restrictions on bidders in two sequential English auctions. Existing work has showed that it is optimal for the auctioneer to auction objects in the decreasing order of the dispersion of the order statistics of the surpluses. But they assume each bidder can win at most one object. However in many cases each bidder needs more than one object and the objects almost affect each other. Given this the settings that have both common and private value elements by allowing each bidder winning more than one object are studied here. Firstly the single object model is extended to two objects without the limitation that a bidder can win at most one object. Secondly the equilibrium bidding strategies for each auction in a sequence are described the selling prices and winner’s total expected profits of different agendas are analyzed. Thirdly the optimal agendas are determined. Finally we make two experiments one validates that it may be the optimal agenda either by increasing order or decreasing order of the dispersion of the order statistics of the surpluses the other display the changing trend of the optimal agenda.,zhong-feng wang,Not available,2006.0,10.1007/11802372_41,Agent Computing and Multi-Agent Systems,Yu-mei2006,False,,Springer,Not available,Optimal Agendas for Sequential English Auctions with Private and Common Values,831076291e6d139f5a8af6fed317583c,http://dx.doi.org/10.1007/11802372_41 980,The sponsored search auction problem was introduced briefly as an example in Chapter 1. In this chapter we study this problem in more detail to illustrate a compelling application of mechanism design. We first describe a framework to model this problem as a mechanism design problem under a reasonable set of assumptions. Using this framework we describe three well known mechanisms for sponsored search auctions – ,hastagiri prakash,Not available,2009.0,10.1007/978-1-84800-938-7_3,Game Theoretic Problems in Network Economics and Mechanism Design Solutions,Y.2009,False,,Springer,Not available,Mechanism Design for Sponsored Search Auctions,9f848a93db73183f1a4b2c81ed20d403,http://dx.doi.org/10.1007/978-1-84800-938-7_3 981,We consider enhancing with privacy concerns a large class of auctions which include sealed-bid single-item auctions but also general multi-item multi-winner auctions our assumption being that bidders primarily care about monetary payoff and secondarily worry about exposing information about their type to other players and learning information about other players’ types that is bidders are ,peter miltersen,Not available,2009.0,10.1007/978-3-642-03356-8_32,Advances in Cryptology - CRYPTO 2009,Bro2009,False,,Springer,Not available,Privacy-Enhancing Auctions Using Rational Cryptography,29a35d80d8df0513aeda6c0678979c9b,http://dx.doi.org/10.1007/978-3-642-03356-8_32 982,We consider enhancing with privacy concerns a large class of auctions which include sealed-bid single-item auctions but also general multi-item multi-winner auctions our assumption being that bidders primarily care about monetary payoff and secondarily worry about exposing information about their type to other players and learning information about other players’ types that is bidders are ,jesper nielsen,Not available,2009.0,10.1007/978-3-642-03356-8_32,Advances in Cryptology - CRYPTO 2009,Bro2009,False,,Springer,Not available,Privacy-Enhancing Auctions Using Rational Cryptography,29a35d80d8df0513aeda6c0678979c9b,http://dx.doi.org/10.1007/978-3-642-03356-8_32 983,We consider enhancing with privacy concerns a large class of auctions which include sealed-bid single-item auctions but also general multi-item multi-winner auctions our assumption being that bidders primarily care about monetary payoff and secondarily worry about exposing information about their type to other players and learning information about other players’ types that is bidders are ,nikos triandopoulos,Not available,2009.0,10.1007/978-3-642-03356-8_32,Advances in Cryptology - CRYPTO 2009,Bro2009,False,,Springer,Not available,Privacy-Enhancing Auctions Using Rational Cryptography,29a35d80d8df0513aeda6c0678979c9b,http://dx.doi.org/10.1007/978-3-642-03356-8_32 984,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,noam nisan,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 985,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,jason bayer,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 986,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,deepak chandra,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 987,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,tal franji,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 988,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,robert gardner,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 989,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,yossi matias,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 990,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,peter bogetoft,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 991,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,neil rhodes,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 992,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,misha seltzer,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 993,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,danny tom,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 994,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,hal varian,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 995,This document describes the auction system used by Google for allocation and pricing of TV ads. It is based on a simultaneous ascending auction and has been in use since September 2008.,dan zigmond,Not available,2009.0,10.1007/978-3-642-02930-1_26,Automata Languages and Programming,Noam2009,False,,Springer,Not available,Google’s Auction for TV Ads,c3603e6d69f80799b5590732f546a5da,http://dx.doi.org/10.1007/978-3-642-02930-1_26 996,This paper considers a model in which bidders in an auction are faced with uncertainty as to their final valuation of the auctioned object. This uncertainty is resolved after the auction has taken place. It is argued that the inclusion of a cooling-off right raises the expected revenue to the seHer when bidders face a risk of the object being a strict ‘bad’ in that owning the object incurs negative utility to the winner of the auction. The model is then tested in a laboratory setting. The evidence from this experiment supports the predictions of the theory.,j. asker,Not available,2001.0,10.1007/978-3-642-56448-2_8,Advances in Experimental Markets,J.2001,False,,Springer,Not available,Bidding up buying out and cooling-off: an examination of auctions with withdrawal rights,f0caa4b1591fb6c8664eab7451dc42a4,http://dx.doi.org/10.1007/978-3-642-56448-2_8 997,,paola festa,Not available,2001.0,10.1007/0-306-48332-7_462,Encyclopedia of Optimization,Paola2001,False,,Springer,Not available,Shortest Path Tree Algorithms,11fb57eb87e094c7763a9013d770d712,http://dx.doi.org/10.1007/0-306-48332-7_462 998," ",martin bichler,Not available,2001.0,10.1007/978-3-642-57547-1_47,Information Age Economy,Martin2001,False,,Springer,Not available,BidTaker: An Application of Multi-Attribute Auction Markets in Tourism,b9029307c1f25535d0989f7a145da452,http://dx.doi.org/10.1007/978-3-642-57547-1_47 999,Truthful revelation is a dominant strategy in both English (oral ascending bid) and second-price sealed-bid private-values auctions. Controlled observations of English auctions are largely consistent with the dominant strategy prediction but laboratory second-price auctions exhibit substantial and persistent overbidding even with prior experience. However the experience of having bid in an English auction has a significant learning effect moving bidding in subsequent second-price auctions closer to the dominant strategy. I explore two treatments isolating facets of the lessons learned from English auction participation leading me to the following conclusions. Part of the lesson carried over appears to be considering prices one-by-one but most of it appears to be a crude awareness that overbidding leads to losses. A claim that English auction experience teaches subjects to recognize the dominant strategy in second-price auctions seems overly optimistic. I introduce a nonparametric technique to test coefficient restrictions when the assumption of normally distributed errors is untenable.,ronald harstad,Not available,2000.0,10.1023/A:1011476619484,Experimental Economics,M.2000,False,,Springer,Not available,Dominant Strategy Adoption and Bidders' Experience with Pricing Rules,be2b97d75bee3c29f45825b0ef07450c,http://dx.doi.org/10.1023/A:1011476619484 1000, There has been much discussion of the relative merits of selling government bonds using a uniform-price auction rather than the traditional discriminatory-price auction. Arguments in favor of the former have won the day in respect of the newly instituted auctions of index-linked bonds in the USA and UK. This short paper assesses the evidence and concludes that the advantages of uniform-price auctions have been oversold.,ken binmore,Not available,2000.0,10.1007/s100580000026,Review of Economic Design,Ken2000,False,,Springer,Not available,Treasury auctions: Uniform or discriminatory?,b12722e9fcd7b09e8140920cfdac3df8,http://dx.doi.org/10.1007/s100580000026 1001,We examine efficiency properties and incentive compatibility of alternative auction formats that an electricity network system operator may use for the procurement of ancillary services required for real-time operations. We model the procurement auction as a hierarchical multiproduct auction and study several designs such as a uniform price auction minimizing revealed “social” cost a uniform price auction minimizing the system operator's cost and a pay as bid auction minimizing revealed “social” cost. We take into account that rational bidders will respond to any market design so as to maximize their expected benefit from participating in that market. Under the assumptions of our model we show that the uniform price auction minimizing revealed “social” cost is the only one that guarantees productive efficiency. We also find that expected revenue (payment in our case) equivalence between pay as bid and uniform price auctions does not extend to the hierarchical products case and the ranking of these auctions is ambiguous and depends on the data. For the procurement auction minimizing the system operator's cost we show that misrepresentation of capability may result in capacity shortages if there are capacity constraints. For the case where only higher capability resources are constrained this will result in random price spikes decreasing in frequency with the price cap (this is the amount paid to capacity in demand states with shortages). When lower type resources are capacity constrained as well price spikes will be seen for both type of resources. Such artificial shortages result in reduced reliability in real-time operations.,rajnish kamat,Not available,2002.0,10.1023/A:1015378914995,Journal of Regulatory Economics,Rajnish2002,False,,Springer,Not available,Rational Buyer Meets Rational Seller: Reserves Market Equilibria under Alternative Auction Designs,9bb457432d6279e2879a2a760427a787,http://dx.doi.org/10.1023/A:1015378914995 1002,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,ivan damgard,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 1003, There has been much discussion of the relative merits of selling government bonds using a uniform-price auction rather than the traditional discriminatory-price auction. Arguments in favor of the former have won the day in respect of the newly instituted auctions of index-linked bonds in the USA and UK. This short paper assesses the evidence and concludes that the advantages of uniform-price auctions have been oversold.,joe swierzbinski,Not available,2000.0,10.1007/s100580000026,Review of Economic Design,Ken2000,False,,Springer,Not available,Treasury auctions: Uniform or discriminatory?,b12722e9fcd7b09e8140920cfdac3df8,http://dx.doi.org/10.1007/s100580000026 1004,In this paper we examine optimal bidding without the independence axiom in a unified framework which allows for a clear graphical representation. Thus we can show very simply the independence axiom to be a necessary and sufficient condition on preferences for strategical equivalence of the two first-price and second-price auctions respectively and for the second-price sealed-bid auction to be demand revealing. The analysis reveals that the betweenness property is necessary and sufficient for the ascending-bid auction to be demand revealing while optimal bids exceed (are less than) bidders' valuations iff preferences are quasiconcave (quasiconvex). Furthermore it can be shown that fanning out (fanning in) leads to a higher (lower) selling-price in open than in sealed-bid auctions.,veronika grimm,Not available,2000.0,10.1023/A:1026585831556,Theory and Decision,Veronika2000,False,,Springer,Not available,Equilibrium Bidding without the Independence Axiom: A Graphical Analysis,606233582bce4cf81f09b8d8db2bba9e,http://dx.doi.org/10.1023/A:1026585831556 1005,In this paper we examine optimal bidding without the independence axiom in a unified framework which allows for a clear graphical representation. Thus we can show very simply the independence axiom to be a necessary and sufficient condition on preferences for strategical equivalence of the two first-price and second-price auctions respectively and for the second-price sealed-bid auction to be demand revealing. The analysis reveals that the betweenness property is necessary and sufficient for the ascending-bid auction to be demand revealing while optimal bids exceed (are less than) bidders' valuations iff preferences are quasiconcave (quasiconvex). Furthermore it can be shown that fanning out (fanning in) leads to a higher (lower) selling-price in open than in sealed-bid auctions.,ulrich schmidt,Not available,2000.0,10.1023/A:1026585831556,Theory and Decision,Veronika2000,False,,Springer,Not available,Equilibrium Bidding without the Independence Axiom: A Graphical Analysis,606233582bce4cf81f09b8d8db2bba9e,http://dx.doi.org/10.1023/A:1026585831556 1006, This paper considers a model in which bidders in an auction are faced with uncertainty as to their final valuation of the auctioned object. This uncertainty is resolved after the auction has taken place. It is argued that the inclusion of a cooling-off right raises the expected revenue to the seller when bidders face a risk of the object being a strict ‘bad’ in that owning the object incurs negative utility to the winner of the auction. The model is then tested in a laboratory setting. The evidence from this experiment supports the predictions of the theory.,john asker,Not available,2000.0,10.1007/PL00020944,Economic Theory,John2000,False,,Springer,Not available,Bidding up buying out and cooling-off: an examination of auctions with withdrawal rights,6e531bef0e8a6d627cd08095afadde37,http://dx.doi.org/10.1007/PL00020944 1007, I study monotonicity and uniqueness of the equilibrium strategies in a two-person first price auction with affiliated signals. Existing results establish uniqueness within the class of non-decreasing bidding strategies. I show that there is an ,gustavo rodriguez,Not available,2000.0,10.1007/s001820000049,International Journal of Game Theory,E.2000,False,,Springer,Not available,First price auctions: Monotonicity and uniqueness,e8e39b363594900e0f4c4aed6732b92f,http://dx.doi.org/10.1007/s001820000049 1008," ",arlington williams,Not available,2000.0,10.1007/PL00020941,Economic Theory,W.2000,False,,Springer,Not available,Concurrent trading in two experimental markets with demand interdependence,92b1f9126d038e7344e676134c9ed0e2,http://dx.doi.org/10.1007/PL00020941 1009," ",vernon smith,Not available,2000.0,10.1007/PL00020941,Economic Theory,W.2000,False,,Springer,Not available,Concurrent trading in two experimental markets with demand interdependence,92b1f9126d038e7344e676134c9ed0e2,http://dx.doi.org/10.1007/PL00020941 1010," ",john ledyard,Not available,2000.0,10.1007/PL00020941,Economic Theory,W.2000,False,,Springer,Not available,Concurrent trading in two experimental markets with demand interdependence,92b1f9126d038e7344e676134c9ed0e2,http://dx.doi.org/10.1007/PL00020941 1011," ",steven gjerstad,Not available,2000.0,10.1007/PL00020941,Economic Theory,W.2000,False,,Springer,Not available,Concurrent trading in two experimental markets with demand interdependence,92b1f9126d038e7344e676134c9ed0e2,http://dx.doi.org/10.1007/PL00020941 1012,The use of auctions as a pricing mechanism has grown dramatically over the last few years. The introduction of electronic auctions has significantly widened the pool of consumers who participate in auctions and increased the number of companies attempting to sell their products in an auction format. Previous empirical research on auctions has focused almost exclusively on the behavior of professional bidders in high stakes common value auctions or the behavior of students in laboratory experiments. We collect data on a large number of electronic auctions across four product categories to explore the behavior of consumers bidding in a real marketplace. In particular we focus on the role experience plays in their bidding behavior to uncover whether consumer learning drives the bidding process towards outcomes described in the theoretical literature on auctions. We find that experience does indeed lead to behavior which is more consistent with theory although the proportion of experienced bidders who behave in a manner inconsistent with theory remains quite large.,ronald wilcox,Not available,2000.0,10.1023/A:1008141313927,Marketing Letters,T.2000,False,,Springer,Not available,Experts and Amateurs: The Role of Experience in Internet Auctions,29a65ca6a5580020e1c7af4d3eabfd5b,http://dx.doi.org/10.1023/A:1008141313927 1013,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,thomas jakobsen,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 1014,We consider several equilibrium formulations for the problem of managing spatially distributed auction markets of a homogeneous commodity which are joined by transmission lines in a network. At each market traders and buyers are determined by their price functions and choose their offer/bid values. We present equivalent variational inequality optimization and saddle point formulations of this problem. The corresponding models possess a special structure of constraint and cost functions and lead to different decomposition schemes. We propose proximal and splitting type methods and discuss their properties and preliminary computational results.,igor konnov,Not available,2008.0,10.1007/s11067-008-9083-6,Networks and Spatial Economics,V.2008,False,,Springer,Not available,Decomposition Approaches for Constrained Spatial Auction Market Problems,65aad9178cd8224bfe04e378452df208,http://dx.doi.org/10.1007/s11067-008-9083-6 1015,We show why the failure of the affiliation assumption prevents the double auction from achieving efficient outcomes when values are interdependent. This motivates the study of an ascending price version of the double auction. It is shown that when there is a sufficiently large but still finite number of sellers this mechanism has an ,michael peters,Not available,2008.0,10.1007/s00199-007-0297-5,Economic Theory,Michael2008,False,,Springer,Not available,An ascending double auction,2a0ddc4d0c290363d7e77421600200aa,http://dx.doi.org/10.1007/s00199-007-0297-5 1016,We show why the failure of the affiliation assumption prevents the double auction from achieving efficient outcomes when values are interdependent. This motivates the study of an ascending price version of the double auction. It is shown that when there is a sufficiently large but still finite number of sellers this mechanism has an ,sergei severinov,Not available,2008.0,10.1007/s00199-007-0297-5,Economic Theory,Michael2008,False,,Springer,Not available,An ascending double auction,2a0ddc4d0c290363d7e77421600200aa,http://dx.doi.org/10.1007/s00199-007-0297-5 1017,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,grano de,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 1018,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,d. medeiros,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 1019,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,david eitel,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 1020,We propose a powerful fully automated and numerically robust algorithm to compute (inverse) equilibrium bid functions for asymmetric Independent Private Values First-Price auctions. The algorithm relies upon a built-in algebra of local Taylor-series expansions in order to compute highly accurate solutions to the set of differential equations characterizing first order conditions. It offers an extensive user friendly menu whereby one can assign commonly-used distributions to bidders and can also create arbitrary (non-inclusive) coalitions. In addition to (inverse) bid functions the algorithm also computes a full range of auxiliary statistics of interest (expected revenues probabilities of winning probability of retention under reserve pricing and on request optimal reserve price). The algorithm also includes a built-in numerical procedure designed to automatically produce local Taylor-series expansions for any user-supplied distribution whether analytical or tabulated (empirical parametric semi- or non-parametric). It provides a tool of unparalleled flexibility for the numerical investigation of theoretical conjectures of interest and/or for easy implementation within any numerical empirical inference procedure relying upon inverse bid functions.,wayne-roy gayle,Not available,2008.0,10.1007/s10614-008-9125-7,Computational Economics,Wayne-Roy2008,False,,Springer,Not available,Numerical Solutions of Asymmetric First-Price Independent Private Values Auctions,9c429d9ac97f38833b1d7b2beedc8e7a,http://dx.doi.org/10.1007/s10614-008-9125-7 1021,We propose a powerful fully automated and numerically robust algorithm to compute (inverse) equilibrium bid functions for asymmetric Independent Private Values First-Price auctions. The algorithm relies upon a built-in algebra of local Taylor-series expansions in order to compute highly accurate solutions to the set of differential equations characterizing first order conditions. It offers an extensive user friendly menu whereby one can assign commonly-used distributions to bidders and can also create arbitrary (non-inclusive) coalitions. In addition to (inverse) bid functions the algorithm also computes a full range of auxiliary statistics of interest (expected revenues probabilities of winning probability of retention under reserve pricing and on request optimal reserve price). The algorithm also includes a built-in numerical procedure designed to automatically produce local Taylor-series expansions for any user-supplied distribution whether analytical or tabulated (empirical parametric semi- or non-parametric). It provides a tool of unparalleled flexibility for the numerical investigation of theoretical conjectures of interest and/or for easy implementation within any numerical empirical inference procedure relying upon inverse bid functions.,jean richard,Not available,2008.0,10.1007/s10614-008-9125-7,Computational Economics,Wayne-Roy2008,False,,Springer,Not available,Numerical Solutions of Asymmetric First-Price Independent Private Values Auctions,9c429d9ac97f38833b1d7b2beedc8e7a,http://dx.doi.org/10.1007/s10614-008-9125-7 1022,With the increasing demands for radio spectrum techniques are being explored that would allow dynamic access of spectrum bands that are under-utilized. In this regard a new paradigm called dynamic spectrum access is being investigated where wireless service providers (WSPs) would dynamically seek more spectrum from the under-utilized licensed bands when and where they need without interfering with the primary users. Currently there is little understanding on how such a dynamic allocation will operate so as to make the system feasible under economic terms. In this paper we consider the dynamic spectrum allocation process where multiple WSPs (bidders) compete to acquire necessary spectrum band from a common pool of spectrum. We use auction theory to analyze the allocation process when the demand from WSPs exceeds the available spectrum. We investigate various auction mechanisms under different spectrum allocation constraints to find WSPs’ bidding strategies and revenue generated by spectrum owner. We show that sequential bidding of bands provides better result than the concurrent bidding when WSPs are constrained to at most single unit allocation. On the other hand when the bidders request for multiple units (i.e. they are not restricted by allocation constraints) synchronous auction mechanism proves to be beneficial than asynchronous auctions.,shamik sengupta,Not available,2008.0,10.1007/s11036-008-0081-1,Mobile Networks and Applications,Shamik2008,False,,Springer,Not available,Designing Auction Mechanisms for Dynamic Spectrum Access,56efd06772c98a7f8ea133634437f7c6,http://dx.doi.org/10.1007/s11036-008-0081-1 1023,With the increasing demands for radio spectrum techniques are being explored that would allow dynamic access of spectrum bands that are under-utilized. In this regard a new paradigm called dynamic spectrum access is being investigated where wireless service providers (WSPs) would dynamically seek more spectrum from the under-utilized licensed bands when and where they need without interfering with the primary users. Currently there is little understanding on how such a dynamic allocation will operate so as to make the system feasible under economic terms. In this paper we consider the dynamic spectrum allocation process where multiple WSPs (bidders) compete to acquire necessary spectrum band from a common pool of spectrum. We use auction theory to analyze the allocation process when the demand from WSPs exceeds the available spectrum. We investigate various auction mechanisms under different spectrum allocation constraints to find WSPs’ bidding strategies and revenue generated by spectrum owner. We show that sequential bidding of bands provides better result than the concurrent bidding when WSPs are constrained to at most single unit allocation. On the other hand when the bidders request for multiple units (i.e. they are not restricted by allocation constraints) synchronous auction mechanism proves to be beneficial than asynchronous auctions.,mainak chatterjee,Not available,2008.0,10.1007/s11036-008-0081-1,Mobile Networks and Applications,Shamik2008,False,,Springer,Not available,Designing Auction Mechanisms for Dynamic Spectrum Access,56efd06772c98a7f8ea133634437f7c6,http://dx.doi.org/10.1007/s11036-008-0081-1 1024,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,kurt nielsen,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 1025,This paper investigates the price formation of an artificial futures market with zero-intelligence traders. It extends the zero-intelligence model to speculative agents trading for immediacy on a futures exchange with open outcry margin constraints and real-time settlement. Like prior studies it finds that the imposition of scarcity not intelligent optimization is surprisingly good at producing allocative efficiency. The double auction trading mechanism even with open outcry and real-time settlement anchors prices to a dynamic Walrasian equilibrium even when it is not unique. This study supports zero-intelligence agent-based methodology as a tool to isolate the impact of market microstructure as opposed to information on price formation.,leanne ussher,Not available,2008.0,10.1057/eej.2008.34,Eastern Economic Journal,J2008,False,,Springer,Not available,A Speculative Futures Market with Zero-Intelligence,a6b5df4d8adb2ab68fc9ca440dd30795,http://dx.doi.org/10.1057/eej.2008.34 1026,An auction house runs a second-price auction with a possibility of resale through re-auctions. It collects listing and closing fees from the seller. We find the fees which maximize the revenue of the auction house. In particular we show that the optimal listing fee is zero. Our findings are consistent with the policies of eBay Amazon Yahoo and other Internet auctions.,alexander matros,Not available,2008.0,10.1007/s10058-008-0044-9,Review of Economic Design,Alexander2008,False,,Springer,Not available,Optimal fees in internet auctions,e1ed97265aeaa67f52b96fde539f8e31,http://dx.doi.org/10.1007/s10058-008-0044-9 1027,An auction house runs a second-price auction with a possibility of resale through re-auctions. It collects listing and closing fees from the seller. We find the fees which maximize the revenue of the auction house. In particular we show that the optimal listing fee is zero. Our findings are consistent with the policies of eBay Amazon Yahoo and other Internet auctions.,andriy zapechelnyuk,Not available,2008.0,10.1007/s10058-008-0044-9,Review of Economic Design,Alexander2008,False,,Springer,Not available,Optimal fees in internet auctions,e1ed97265aeaa67f52b96fde539f8e31,http://dx.doi.org/10.1007/s10058-008-0044-9 1028," We study the complexity issues for Walrasian equilibrium in a special case of combinatorial auction called single-minded auction in which every participant is interested in only one subset of commodities. Chen et al. (J. Comput. Syst. Sci. 69(4): 675–687 ",ning chen,Not available,2008.0,10.1007/s00453-007-9103-9,Algorithmica,Ning2008,False,,Springer,Not available,Walrasian Equilibrium: Hardness Approximations and Tractable Instances,2ca7836cdd7ac1da28bca85f57edfc63,http://dx.doi.org/10.1007/s00453-007-9103-9 1029," We study the complexity issues for Walrasian equilibrium in a special case of combinatorial auction called single-minded auction in which every participant is interested in only one subset of commodities. Chen et al. (J. Comput. Syst. Sci. 69(4): 675–687 ",atri rudra,Not available,2008.0,10.1007/s00453-007-9103-9,Algorithmica,Ning2008,False,,Springer,Not available,Walrasian Equilibrium: Hardness Approximations and Tractable Instances,2ca7836cdd7ac1da28bca85f57edfc63,http://dx.doi.org/10.1007/s00453-007-9103-9 1030,Vertical electronic marketplace (EM) is a new inter-organizational intermediary within a single industry that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior research on EM design has given a heavy weight on auction mechanism design. However the feasibility of e-procurement auction to auction providers has long been ignored in academic. With an analysis on 157 vertical EMs from six different industries this paper empirically demonstrates that industry contingencies exist in vertical EMs’ adoption of e-procurement auction service.,weijun zheng,Not available,2008.0,10.1007/s10257-007-0073-x,Information Systems and e-Business Management,Weijun2008,False,,Springer,Not available,An explorative study of industry influences: on vertical e-marketplaces’ adoption of e-procurement auction,ab9e5162db6a278eec9f1f3cf561bcac,http://dx.doi.org/10.1007/s10257-007-0073-x 1031,Vertical electronic marketplace (EM) is a new inter-organizational intermediary within a single industry that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior research on EM design has given a heavy weight on auction mechanism design. However the feasibility of e-procurement auction to auction providers has long been ignored in academic. With an analysis on 157 vertical EMs from six different industries this paper empirically demonstrates that industry contingencies exist in vertical EMs’ adoption of e-procurement auction service.,xiaoqing wang,Not available,2008.0,10.1007/s10257-007-0073-x,Information Systems and e-Business Management,Weijun2008,False,,Springer,Not available,An explorative study of industry influences: on vertical e-marketplaces’ adoption of e-procurement auction,ab9e5162db6a278eec9f1f3cf561bcac,http://dx.doi.org/10.1007/s10257-007-0073-x 1032,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",wei'an li,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 1033,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",desheng wu,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 1034,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",hao xu,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 1035,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,jakob pagter,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 1036,Vehicular traffic on urban road networks is of great interest to those who monitor air quality. Combustion emissions from transport vehicles are a major contributor of air pollution. More specifically the release of fine particulate matter which has been linked to premature deaths. Travel and idle time are two factors that influence the amount of pollution generated by traffic. Reducing idle and travel times would have a positive impact on air quality. Thus it is increasingly crucial to manage intersections effectively particularly in congested cities and across a range of different types of traffic conditions. A variety of market-based multi-agent traffic management mechanisms have been proposed to improve traffic flow. In many of these systems drivers “pay” to gain access to favourable road ways (e.g. minimise travel time). A major obstacle in adopting many of these mechanisms is that the necessary communication infrastructure does not yet exist. They rely on vehicle-to-infrastructure and/or vehicle-to-vehicle communications. In this work we propose a market-based mechanism which relies on existing technology (and in some places this technology is already in use). Experimental results show that our market-based approach is better at reducing idle and travel times as compared to fixed-time signal controllers.,jeffery raphael,Not available,2017.0,10.1007/978-3-319-46331-5_6,Agent-Based Modeling of Sustainable Behaviors,Jeffery2017,False,,Springer,Not available,An Intersection-Centric Auction-Based Traffic Signal Control Framework,37e33a9e96688ad4dc5192496e44997b,http://dx.doi.org/10.1007/978-3-319-46331-5_6 1037,Vehicular traffic on urban road networks is of great interest to those who monitor air quality. Combustion emissions from transport vehicles are a major contributor of air pollution. More specifically the release of fine particulate matter which has been linked to premature deaths. Travel and idle time are two factors that influence the amount of pollution generated by traffic. Reducing idle and travel times would have a positive impact on air quality. Thus it is increasingly crucial to manage intersections effectively particularly in congested cities and across a range of different types of traffic conditions. A variety of market-based multi-agent traffic management mechanisms have been proposed to improve traffic flow. In many of these systems drivers “pay” to gain access to favourable road ways (e.g. minimise travel time). A major obstacle in adopting many of these mechanisms is that the necessary communication infrastructure does not yet exist. They rely on vehicle-to-infrastructure and/or vehicle-to-vehicle communications. In this work we propose a market-based mechanism which relies on existing technology (and in some places this technology is already in use). Experimental results show that our market-based approach is better at reducing idle and travel times as compared to fixed-time signal controllers.,elizabeth sklar,Not available,2017.0,10.1007/978-3-319-46331-5_6,Agent-Based Modeling of Sustainable Behaviors,Jeffery2017,False,,Springer,Not available,An Intersection-Centric Auction-Based Traffic Signal Control Framework,37e33a9e96688ad4dc5192496e44997b,http://dx.doi.org/10.1007/978-3-319-46331-5_6 1038,Vehicular traffic on urban road networks is of great interest to those who monitor air quality. Combustion emissions from transport vehicles are a major contributor of air pollution. More specifically the release of fine particulate matter which has been linked to premature deaths. Travel and idle time are two factors that influence the amount of pollution generated by traffic. Reducing idle and travel times would have a positive impact on air quality. Thus it is increasingly crucial to manage intersections effectively particularly in congested cities and across a range of different types of traffic conditions. A variety of market-based multi-agent traffic management mechanisms have been proposed to improve traffic flow. In many of these systems drivers “pay” to gain access to favourable road ways (e.g. minimise travel time). A major obstacle in adopting many of these mechanisms is that the necessary communication infrastructure does not yet exist. They rely on vehicle-to-infrastructure and/or vehicle-to-vehicle communications. In this work we propose a market-based mechanism which relies on existing technology (and in some places this technology is already in use). Experimental results show that our market-based approach is better at reducing idle and travel times as compared to fixed-time signal controllers.,simon maskell,Not available,2017.0,10.1007/978-3-319-46331-5_6,Agent-Based Modeling of Sustainable Behaviors,Jeffery2017,False,,Springer,Not available,An Intersection-Centric Auction-Based Traffic Signal Control Framework,37e33a9e96688ad4dc5192496e44997b,http://dx.doi.org/10.1007/978-3-319-46331-5_6 1039,Since FCC’s opening for TV White Spaces utilization database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic TV White Spaces spectrum sharing due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future.,haibo zhou,Not available,2017.0,10.1007/978-3-319-45077-3_5,Dynamic Sharing of Wireless Spectrum,Haibo2017,False,,Springer,Not available,Auction-Based White Spaces Spectrum Sharing in Multimedia Networks,15b5d793b05a8828076e4f249f9851cf,http://dx.doi.org/10.1007/978-3-319-45077-3_5 1040,Since FCC’s opening for TV White Spaces utilization database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic TV White Spaces spectrum sharing due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future.,quan yu,Not available,2017.0,10.1007/978-3-319-45077-3_5,Dynamic Sharing of Wireless Spectrum,Haibo2017,False,,Springer,Not available,Auction-Based White Spaces Spectrum Sharing in Multimedia Networks,15b5d793b05a8828076e4f249f9851cf,http://dx.doi.org/10.1007/978-3-319-45077-3_5 1041,Since FCC’s opening for TV White Spaces utilization database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic TV White Spaces spectrum sharing due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future.,xuemin shen,Not available,2017.0,10.1007/978-3-319-45077-3_5,Dynamic Sharing of Wireless Spectrum,Haibo2017,False,,Springer,Not available,Auction-Based White Spaces Spectrum Sharing in Multimedia Networks,15b5d793b05a8828076e4f249f9851cf,http://dx.doi.org/10.1007/978-3-319-45077-3_5 1042,Since FCC’s opening for TV White Spaces utilization database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic TV White Spaces spectrum sharing due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future.,shaohua wu,Not available,2017.0,10.1007/978-3-319-45077-3_5,Dynamic Sharing of Wireless Spectrum,Haibo2017,False,,Springer,Not available,Auction-Based White Spaces Spectrum Sharing in Multimedia Networks,15b5d793b05a8828076e4f249f9851cf,http://dx.doi.org/10.1007/978-3-319-45077-3_5 1043,Since FCC’s opening for TV White Spaces utilization database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic TV White Spaces spectrum sharing due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future.,qinyu zhang,Not available,2017.0,10.1007/978-3-319-45077-3_5,Dynamic Sharing of Wireless Spectrum,Haibo2017,False,,Springer,Not available,Auction-Based White Spaces Spectrum Sharing in Multimedia Networks,15b5d793b05a8828076e4f249f9851cf,http://dx.doi.org/10.1007/978-3-319-45077-3_5 1044,Crowdsourcing marketplaces link large populations of workers to an even larger number of tasks. Thus it is necessary to have mechanisms for matching workers with interesting and suitable tasks. Earlier work has addressed the problem of finding optimal workers for a given set of tasks. However workers also have preferences and will stay with a platform only if it gives them interesting tasks. We therefore analyze several matching mechanisms that take into account workers’ preferences as well. We propose that the workers pay premiums to get preferred matches and auction-based models where preferences are expressed through variations of the payment for a task. We analyze the properties of two matching different mechanisms: Split Dynamic VCG (SDV) and e-Auction. We compare both the mechanisms with Arrival Priority Serial Dictatorship (APSD) empirically for efficiency.,sujit gujar,Not available,2017.0,10.1007/978-3-319-54229-4_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Sujit2017,False,,Springer,Not available,Auction Based Mechanisms for Dynamic Task Assignments in Expert Crowdsourcing,42c49f55d8671bc05f54289cb0370797,http://dx.doi.org/10.1007/978-3-319-54229-4_4 1045,Crowdsourcing marketplaces link large populations of workers to an even larger number of tasks. Thus it is necessary to have mechanisms for matching workers with interesting and suitable tasks. Earlier work has addressed the problem of finding optimal workers for a given set of tasks. However workers also have preferences and will stay with a platform only if it gives them interesting tasks. We therefore analyze several matching mechanisms that take into account workers’ preferences as well. We propose that the workers pay premiums to get preferred matches and auction-based models where preferences are expressed through variations of the payment for a task. We analyze the properties of two matching different mechanisms: Split Dynamic VCG (SDV) and e-Auction. We compare both the mechanisms with Arrival Priority Serial Dictatorship (APSD) empirically for efficiency.,boi faltings,Not available,2017.0,10.1007/978-3-319-54229-4_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Sujit2017,False,,Springer,Not available,Auction Based Mechanisms for Dynamic Task Assignments in Expert Crowdsourcing,42c49f55d8671bc05f54289cb0370797,http://dx.doi.org/10.1007/978-3-319-54229-4_4 1046,In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics threshold cryptography and security engineering to implement secure auctions for practical real-world problems.,tomas toft,Not available,2006.0,10.1007/11889663_10,Financial Cryptography and Data Security,Peter2006,False,,Springer,Not available,A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation,0b7f39867e41a13f71e5b706cf6f0e7a,http://dx.doi.org/10.1007/11889663_10 1047,Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents’ valuations for the outcomes are nonnegative). Every AMA mechanism is characterized by a list of parameters. By focusing on the AMA mechanisms we turn mechanism design into a value optimization problem where we only need to adjust the parameters. We propose a linear programming based heuristic for optimizing within the AMA family. We apply our technique to revenue maximizing mechanism design for zero-day exploit markets. We show that due to the nature of the zero-day exploit markets if there are only two agents (one offender and one defender) then our technique generally produces a near optimal mechanism: the mechanism’s expected revenue is close to the optimal revenue achieved by the optimal strategy-proof and individually rational mechanism (not necessarily an AMA mechanism).,mingyu guo,Not available,2017.0,10.1007/978-3-319-69131-2_17,PRIMA 2017: Principles and Practice of Multi-Agent Systems,Mingyu2017,False,,Springer,Not available,Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets,2645d0d1135541155fa07ed812ed1b4c,http://dx.doi.org/10.1007/978-3-319-69131-2_17 1048,Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents’ valuations for the outcomes are nonnegative). Every AMA mechanism is characterized by a list of parameters. By focusing on the AMA mechanisms we turn mechanism design into a value optimization problem where we only need to adjust the parameters. We propose a linear programming based heuristic for optimizing within the AMA family. We apply our technique to revenue maximizing mechanism design for zero-day exploit markets. We show that due to the nature of the zero-day exploit markets if there are only two agents (one offender and one defender) then our technique generally produces a near optimal mechanism: the mechanism’s expected revenue is close to the optimal revenue achieved by the optimal strategy-proof and individually rational mechanism (not necessarily an AMA mechanism).,hideaki hata,Not available,2017.0,10.1007/978-3-319-69131-2_17,PRIMA 2017: Principles and Practice of Multi-Agent Systems,Mingyu2017,False,,Springer,Not available,Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets,2645d0d1135541155fa07ed812ed1b4c,http://dx.doi.org/10.1007/978-3-319-69131-2_17 1049,Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents’ valuations for the outcomes are nonnegative). Every AMA mechanism is characterized by a list of parameters. By focusing on the AMA mechanisms we turn mechanism design into a value optimization problem where we only need to adjust the parameters. We propose a linear programming based heuristic for optimizing within the AMA family. We apply our technique to revenue maximizing mechanism design for zero-day exploit markets. We show that due to the nature of the zero-day exploit markets if there are only two agents (one offender and one defender) then our technique generally produces a near optimal mechanism: the mechanism’s expected revenue is close to the optimal revenue achieved by the optimal strategy-proof and individually rational mechanism (not necessarily an AMA mechanism).,ali babar,Not available,2017.0,10.1007/978-3-319-69131-2_17,PRIMA 2017: Principles and Practice of Multi-Agent Systems,Mingyu2017,False,,Springer,Not available,Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets,2645d0d1135541155fa07ed812ed1b4c,http://dx.doi.org/10.1007/978-3-319-69131-2_17 1050,This paper analyzes reserve price efficiency in auctions which is defined as the relative value of the expected revenue increase induced by the optimal reserve price. We give a formal definition of competition (,v. topinskiy,Not available,2017.0,10.1134/S0005117917010155,Automation and Remote Control,A.2017,False,,Springer,Not available,Reserve price efficiency and competitive pressure in auctions,58f5fc119957f31989fd7a1af9b3845d,http://dx.doi.org/10.1134/S0005117917010155 1051,Monitoring the progress of auctions for fraudulent bidding activities is crucial for detecting and stopping fraud during runtime to prevent fraudsters from succeeding. To this end we introduce a stage-based framework to monitor multiple live auctions for In-Auction Fraud (IAF). Creating a stage fraud monitoring system is different than what has been previously proposed in the very limited studies on runtime IAF detection. More precisely we launch the IAF monitoring operation at several time points in each running auction depending on its duration. At each auction time point our framework first detects IAF by evaluating each bidder’s stage activities based on the most reliable set of IAF patterns and then takes appropriate actions to react to dishonest bidders. We develop the proposed framework with a dynamic agent architecture where multiple monitoring agents can be created and deleted with respect to the status of their corresponding auctions (initialized completed or cancelled). The adoption of dynamic software architecture represents an excellent solution to the scalability and time efficiency issues of IAF monitoring systems since hundreds of live auctions are held simultaneously in commercial auction houses. Every time an auction is completed or terminated the participants’ fraud scores are updated dynamically. Our approach enables us to observe each bidder in each live auction and manage his fraud score as well. We validate the IAF monitoring service through commercial auction data. We conduct three experiments to detect and react to shill-bidding fraud by employing datasets acquired from auctions of two valuable items Palm PDA and XBOX. We observe each auction at three-time points verifying the shill patterns that most likely happen in the corresponding stage for each one.,samira sadaoui,Not available,2017.0,10.1007/s10489-016-0818-7,Applied Intelligence,Samira2017,False,,Springer,Not available,A dynamic stage-based fraud monitoring framework of multiple live auctions,3e716ea8ec9da608d26e7f7bf3497380,http://dx.doi.org/10.1007/s10489-016-0818-7 1052,Monitoring the progress of auctions for fraudulent bidding activities is crucial for detecting and stopping fraud during runtime to prevent fraudsters from succeeding. To this end we introduce a stage-based framework to monitor multiple live auctions for In-Auction Fraud (IAF). Creating a stage fraud monitoring system is different than what has been previously proposed in the very limited studies on runtime IAF detection. More precisely we launch the IAF monitoring operation at several time points in each running auction depending on its duration. At each auction time point our framework first detects IAF by evaluating each bidder’s stage activities based on the most reliable set of IAF patterns and then takes appropriate actions to react to dishonest bidders. We develop the proposed framework with a dynamic agent architecture where multiple monitoring agents can be created and deleted with respect to the status of their corresponding auctions (initialized completed or cancelled). The adoption of dynamic software architecture represents an excellent solution to the scalability and time efficiency issues of IAF monitoring systems since hundreds of live auctions are held simultaneously in commercial auction houses. Every time an auction is completed or terminated the participants’ fraud scores are updated dynamically. Our approach enables us to observe each bidder in each live auction and manage his fraud score as well. We validate the IAF monitoring service through commercial auction data. We conduct three experiments to detect and react to shill-bidding fraud by employing datasets acquired from auctions of two valuable items Palm PDA and XBOX. We observe each auction at three-time points verifying the shill patterns that most likely happen in the corresponding stage for each one.,xuegang wang,Not available,2017.0,10.1007/s10489-016-0818-7,Applied Intelligence,Samira2017,False,,Springer,Not available,A dynamic stage-based fraud monitoring framework of multiple live auctions,3e716ea8ec9da608d26e7f7bf3497380,http://dx.doi.org/10.1007/s10489-016-0818-7 1053,In many auction settings we find a self-interested information broker that can potentially disambiguate the uncertainty associated with the common value of the auctioned item (e.g. the true condition of an auctioned car the sales forecast for a company offered for sale). This paper extends prior work that has considered mostly the information pricing question in this archetypal three-ply bidders-auctioneer-information broker model by enabling the information broker a richer strategic behavior in the form of anonymously eliminating some of the uncertainty associated with the common value for free. The analysis of the augmented model enables illustrating two somehow non-intuitive phenomena in such settings: (a) the information broker indeed may benefit from disclosing for free some of the information she wishes to sell even though this seemingly reduces the uncertainty her service aims to disambiguate; and (b) the information broker may benefit from publishing the free information to the general public rather than just to the auctioneer hence preventing the edge from the latter even if she is the only prospective customer of the service. While the extraction of the information broker’s optimal strategy is computationally hard we propose two heuristics that rely on the variance between the different values as means for generating potential solutions that are highly efficient. The importance of the results is primarily in providing information brokers with a new paradigm for improving their expected profit in auction settings. The new paradigm is also demonstrated to result in some cases in a greater social welfare hence can be of much interest to market designers as well.,shani alkoby,Not available,2017.0,10.1007/978-3-319-54229-4_1,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Shani2017,False,,Springer,Not available,Strategic Free Information Disclosure for a Vickrey Auction,0b7071910860496084e62de0306dfb76,http://dx.doi.org/10.1007/978-3-319-54229-4_1 1054,In many auction settings we find a self-interested information broker that can potentially disambiguate the uncertainty associated with the common value of the auctioned item (e.g. the true condition of an auctioned car the sales forecast for a company offered for sale). This paper extends prior work that has considered mostly the information pricing question in this archetypal three-ply bidders-auctioneer-information broker model by enabling the information broker a richer strategic behavior in the form of anonymously eliminating some of the uncertainty associated with the common value for free. The analysis of the augmented model enables illustrating two somehow non-intuitive phenomena in such settings: (a) the information broker indeed may benefit from disclosing for free some of the information she wishes to sell even though this seemingly reduces the uncertainty her service aims to disambiguate; and (b) the information broker may benefit from publishing the free information to the general public rather than just to the auctioneer hence preventing the edge from the latter even if she is the only prospective customer of the service. While the extraction of the information broker’s optimal strategy is computationally hard we propose two heuristics that rely on the variance between the different values as means for generating potential solutions that are highly efficient. The importance of the results is primarily in providing information brokers with a new paradigm for improving their expected profit in auction settings. The new paradigm is also demonstrated to result in some cases in a greater social welfare hence can be of much interest to market designers as well.,david sarne,Not available,2017.0,10.1007/978-3-319-54229-4_1,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Shani2017,False,,Springer,Not available,Strategic Free Information Disclosure for a Vickrey Auction,0b7071910860496084e62de0306dfb76,http://dx.doi.org/10.1007/978-3-319-54229-4_1 1055,The model of geographically distributed computing system with absolute priorities of jobs is described in the paper. Authors designed the decentralized scheduling algorithm using the auction methods. Two auction methods were researched and compared: the first-price sealed-bid auction and the English auction. The paper includes results of experimental comparison of researched auction methods.,anton baranov,Not available,2017.0,10.1007/978-3-319-62932-2_37,Parallel Computing Technologies,Anton2017,False,,Springer,Not available,Comparison of Auction Methods for Job Scheduling with Absolute Priorities,9b9cc1bbe2cd38a8fc6f4b626d91fc07,http://dx.doi.org/10.1007/978-3-319-62932-2_37 1056,The model of geographically distributed computing system with absolute priorities of jobs is described in the paper. Authors designed the decentralized scheduling algorithm using the auction methods. Two auction methods were researched and compared: the first-price sealed-bid auction and the English auction. The paper includes results of experimental comparison of researched auction methods.,pavel telegin,Not available,2017.0,10.1007/978-3-319-62932-2_37,Parallel Computing Technologies,Anton2017,False,,Springer,Not available,Comparison of Auction Methods for Job Scheduling with Absolute Priorities,9b9cc1bbe2cd38a8fc6f4b626d91fc07,http://dx.doi.org/10.1007/978-3-319-62932-2_37 1057,The problem of optimal winner determination in combinatorial auctions consists of finding the set of bids that maximize the revenue for the sellers. Various solutions exist for solving this problem but they are all centralized. That is they assume that all bids are sent to a centralized auctioneer who then determines the winning set of bids. In this paper we introduce the problem of distributed winner determination in combinatorial auctions which eliminates the centralized auctioneer. We present a set of distributed search-based algorithms for solving this problem and study their relative tradeoffs.,muralidhar narumanchi,Not available,2006.0,10.1007/11888727_4,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,V.2006,False,,Springer,Not available,Algorithms for Distributed Winner Determination in Combinatorial Auctions,a7c8f2d4fcb793cb4952d1d13c6ffa91,http://dx.doi.org/10.1007/11888727_4 1058,The model of geographically distributed computing system with absolute priorities of jobs is described in the paper. Authors designed the decentralized scheduling algorithm using the auction methods. Two auction methods were researched and compared: the first-price sealed-bid auction and the English auction. The paper includes results of experimental comparison of researched auction methods.,artem tikhomirov,Not available,2017.0,10.1007/978-3-319-62932-2_37,Parallel Computing Technologies,Anton2017,False,,Springer,Not available,Comparison of Auction Methods for Job Scheduling with Absolute Priorities,9b9cc1bbe2cd38a8fc6f4b626d91fc07,http://dx.doi.org/10.1007/978-3-319-62932-2_37 1059,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,bing hu,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 1060,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,lin yao,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 1061,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,yong chen,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 1062,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,zinxin sun,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 1063,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,jeannette brosig-koch,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 1064,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,werner guth,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 1065,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,torsten weiland,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 1066,Zheng has proposed a seller-optimal auction for (asymmetric) independent-private-value environments where inter-bidder resale is possible. Zheng’s construction requires novel assumptions—Resale Monotonicity Transitivity and Invariance—on the bidders’ value distribution profile. The only known examples of distribution profiles satisfying these assumptions in environments with three or more bidders are uniform distributions. Using inverse virtual valuation functions as a novel tool we characterize the set of distribution profiles satisfying Zheng’s assumptions. Our characterization result shows that the assumptions while being strong are satisfied by many non-uniform distribution profiles. Hence Zheng’s result applies more generally than one may have thought before. A crucial step in our analysis is to show that Invariance implies Resale Monotonicity and Transitivity.,tymofiy mylovanov,Not available,2009.0,10.1007/s00199-008-0383-3,Economic Theory,Tymofiy2009,False,,Springer,Not available,Optimal auction with resale—a characterization of the conditions,2c0c1db15868068d8d7129afb40eeb0d,http://dx.doi.org/10.1007/s00199-008-0383-3 1067,Zheng has proposed a seller-optimal auction for (asymmetric) independent-private-value environments where inter-bidder resale is possible. Zheng’s construction requires novel assumptions—Resale Monotonicity Transitivity and Invariance—on the bidders’ value distribution profile. The only known examples of distribution profiles satisfying these assumptions in environments with three or more bidders are uniform distributions. Using inverse virtual valuation functions as a novel tool we characterize the set of distribution profiles satisfying Zheng’s assumptions. Our characterization result shows that the assumptions while being strong are satisfied by many non-uniform distribution profiles. Hence Zheng’s result applies more generally than one may have thought before. A crucial step in our analysis is to show that Invariance implies Resale Monotonicity and Transitivity.,thomas troger,Not available,2009.0,10.1007/s00199-008-0383-3,Economic Theory,Tymofiy2009,False,,Springer,Not available,Optimal auction with resale—a characterization of the conditions,2c0c1db15868068d8d7129afb40eeb0d,http://dx.doi.org/10.1007/s00199-008-0383-3 1068,The problem of optimal winner determination in combinatorial auctions consists of finding the set of bids that maximize the revenue for the sellers. Various solutions exist for solving this problem but they are all centralized. That is they assume that all bids are sent to a centralized auctioneer who then determines the winning set of bids. In this paper we introduce the problem of distributed winner determination in combinatorial auctions which eliminates the centralized auctioneer. We present a set of distributed search-based algorithms for solving this problem and study their relative tradeoffs.,jose vidal,Not available,2006.0,10.1007/11888727_4,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,V.2006,False,,Springer,Not available,Algorithms for Distributed Winner Determination in Combinatorial Auctions,a7c8f2d4fcb793cb4952d1d13c6ffa91,http://dx.doi.org/10.1007/11888727_4 1069,Computational experiments with a multiagent system show that bidders use signal averaging to avoid the winner’s curse in English auctions. The results vary with the percent of common value in a two-dimensional value signal information levels uncertainty and the number of bidders. The complexity introduced by the combinations of these factors affects the bidding strategies and auction outcomes in interesting ways—usually nonlinearly and sometimes non-monotonically. Of main concern to a seller is the effect of these factors on revenue. I find that revenue increases with the percent of common value in the two-dimensional value signal decreases with uncertainty and increases with the number of bidders. There is very little impact of information level on revenue when values are pure private and pure common. However for the intermediate cases of two-dimensional value signals revenue decreases with increased information.,alan mehlenbacher,Not available,2009.0,10.1007/s10614-009-9167-5,Computational Economics,Alan2009,False,,Springer,Not available,Multiagent System Simulations of Signal Averaging in English Auctions with Two-Dimensional Value Signals,226b1ef750c9f036e1b8d0447c43362a,http://dx.doi.org/10.1007/s10614-009-9167-5 1070,This paper shows that the Name-Your-Own-Price (NYOP) business model can help soften competition. When consumers differ in their frictional costs (i.e. the shopping hassle) they experience when bidding at an NYOP retailer the NYOP format can be a mechanism for differentiating a retailer from a posted-price rival. Beyond providing a motivation for using an NYOP mechanism competition also has important implications for the optimal structure of the NYOP format. For example this paper shows that prohibiting rebidding may benefit an NYOP firm by reducing price rivalry.,scott fay,Not available,2009.0,10.1007/s11002-009-9070-9,Marketing Letters,Scott2009,False,,Springer,Not available,Competitive reasons for the Name-Your-Own-Price channel,30565d95b5f282dccc5f53ee5fc3f32e,http://dx.doi.org/10.1007/s11002-009-9070-9 1071,On the basis of the bidding history of a panel of new eBay bidders we examine the impact of different types of experiences on bidding behavior evolution. Accounting for unobserved bidder heterogeneity the results indicate that losing experiences make the bidders’ bidding behavior evolve toward the normative predictions of auction theory in that they submit fewer bids and bid later. Winning experiences however do not have such an effect. Moreover the experience effect pertains to the bidder’s entire previous bidding experience regardless of product categories. We also assess the potential bias introduced by using feedback ratings (compared with actual participation) as experience measures.,xin wang,Not available,2009.0,10.1007/s11002-009-9068-3,Marketing Letters,Xin2009,False,,Springer,Not available,The effect of experience on Internet auction bidding dynamics,d9500cce35522aba2097527bf8d51812,http://dx.doi.org/10.1007/s11002-009-9068-3 1072,On the basis of the bidding history of a panel of new eBay bidders we examine the impact of different types of experiences on bidding behavior evolution. Accounting for unobserved bidder heterogeneity the results indicate that losing experiences make the bidders’ bidding behavior evolve toward the normative predictions of auction theory in that they submit fewer bids and bid later. Winning experiences however do not have such an effect. Moreover the experience effect pertains to the bidder’s entire previous bidding experience regardless of product categories. We also assess the potential bias introduced by using feedback ratings (compared with actual participation) as experience measures.,ye hu,Not available,2009.0,10.1007/s11002-009-9068-3,Marketing Letters,Xin2009,False,,Springer,Not available,The effect of experience on Internet auction bidding dynamics,d9500cce35522aba2097527bf8d51812,http://dx.doi.org/10.1007/s11002-009-9068-3 1073,This paper considers the problem of assigning a finite number of indivisible objects like jobs houses positions etc. to the same number of individuals. There is also a divisible good (money) and the individuals consume money and one object each. The class of fair allocation rules that are strategy-proof in the strong sense that no coalition of individuals can improve the allocation for all of its members by misrepresenting their preferences is characterized. It turns out that given a regularity condition the outcome of a fair and coalitionally strategy-proof allocation rule must maximize the use of money subject to upper quantity bounds determined by the allocation rule. If available money is nonnegative objects may be jobs and the distribution of money a wage structure. If available money is negative the formal model may reflect a multi-object auction. In both cases fairness means equilibrium i.e. that each individual receives a most demanded object.,lars-gunnar svensson,Not available,2009.0,10.1007/s00199-008-0366-4,Economic Theory,Lars-Gunnar2009,False,,Springer,Not available,Coalitional strategy-proofness and fairness,e6f363b673c3a247a5b01fa512ecf35a,http://dx.doi.org/10.1007/s00199-008-0366-4 1074,We compare uniform price auctions with fixed price offerings in Initial Public Offerings (IPO) using laboratory experiments. The experimental environment is based on the Biais and Faugeron-Grouzet (J. Financ. Intermed. 11:9–36 ,ping zhang,Not available,2009.0,10.1007/s10683-008-9210-8,Experimental Economics,Ping2009,False,,Springer,Not available,Uniform price auctions and fixed price offerings in IPOs: an experimental comparison,551c71db0b69198198ea8fa6922694b6,http://dx.doi.org/10.1007/s10683-008-9210-8 1075,I study the sequence of bidding in an open-outcry English auction to examine how uncertainty affects auction outcomes. I do this by analyzing a data set that was collected from a series of public auctions of used cars in New Jersey. I conjecture that the uncertainty is related to the auction’s progress and demonstrate that empirically an increase in the uncertainty is associated with an increase in the number of rounds that is required to sell an object and with a reduction in the ratio of the selling price to the presale estimate.,yaron raviv,Not available,2009.0,10.1007/s11151-009-9212-5,Review of Industrial Organization,Yaron2009,False,,Springer,Not available,Uncertainty and Auction Outcomes: Evidence from Used Car Actions,03ced4175661cd9bb7b50b548aaf012e,http://dx.doi.org/10.1007/s11151-009-9212-5 1076,We characterise properties of optimal auctions if the seller may disclose information about the quality of the object for sale. We show that the seller maximizes his expected revenue by revelation of all information to all bidders and implementing a second price auction with appropriate reservation price.,alex gershkov,Not available,2009.0,10.1007/s10058-009-0084-9,Review of Economic Design,Alex2009,False,,Springer,Not available,Optimal auctions and information disclosure,73766c474920d8f65134612645053fca,http://dx.doi.org/10.1007/s10058-009-0084-9 1077,We introduce endogenous fees for participating in second-price auction which we use for a two-stage mechanism to solve King Solomon’s dilemma. They are positive for all agents. They are nonetheless shown to maintain the agents’ incentives for truthful bidding and guarantee participation by the highest-value agent. This feature of the endogenous fees is powerful enough for the efficient outcome to uniquely result from one round elimination of ,cheng-zhong qin,Not available,2009.0,10.1007/s00199-007-0304-x,Economic Theory,Cheng-Zhong2009,False,,Springer,Not available,Make a guess: a robust mechanism for King Solomon’s dilemma,750cec32305203b9749016ea368126ad,http://dx.doi.org/10.1007/s00199-007-0304-x 1078,We introduce endogenous fees for participating in second-price auction which we use for a two-stage mechanism to solve King Solomon’s dilemma. They are positive for all agents. They are nonetheless shown to maintain the agents’ incentives for truthful bidding and guarantee participation by the highest-value agent. This feature of the endogenous fees is powerful enough for the efficient outcome to uniquely result from one round elimination of ,chun-lei yang,Not available,2009.0,10.1007/s00199-007-0304-x,Economic Theory,Cheng-Zhong2009,False,,Springer,Not available,Make a guess: a robust mechanism for King Solomon’s dilemma,750cec32305203b9749016ea368126ad,http://dx.doi.org/10.1007/s00199-007-0304-x 1079,This paper presents a method for discovering and detecting shill bids in combinatorial auctions. Combinatorial auctions have been studied very widely. The Generalized Vickrey Auction (GVA) is one of the most important combinatorial auctions because it can satisfy the strategy-proof property and Pareto efficiency. As Yokoo et al. pointed out false-name bids and shill bids pose an emerging problem for auctions since on the Internet it is easy to establish different e-mail addresses and accounts for auction sites. Yokoo et al. proved that GVA cannot satisfy the false-name-proof property. Moreover they proved that there is no auction protocol that can satisfy all three of the above major properties. Their approach concentrates on designing new mechanisms. As a new approach against shill-bids in this paper we propose a method for finding shill bids with the GVA in order to avoid them. Our algorithm can judge whether there might be a shill bid from the results of the GVA’s procedure. However a straightforward way to detect shill bids requires an exponential amount of computing power because we need to check all possible combinations of bidders. Therefore in this paper we propose an improved method for finding a shill bidder. The method is based on winning bidders which can dramatically reduce the computational cost. The results demonstrate that the proposed method successfully reduces the computational cost needed to find shill bids. The contribution of our work is in the integration of the theory and detecting fraud in combinatorial auctions.,tokuro matsuo,Not available,2006.0,10.1007/11780397_1,Data Engineering Issues in E-Commerce and Services,Tokuro2006,False,,Springer,Not available,An Approach to Detecting Shill-Biddable Allocations in Combinatorial Auctions,625ee953a10ecc398819a0ac9f013582,http://dx.doi.org/10.1007/11780397_1 1080,A simple example shows that equilibria can fail to exist in second price (Vickrey) and English auctions when there are both common and private components to bidders’ valuations and private information is held on both dimensions. The example shows that equilibrium only exists in the extremes of pure private and pure common values and that existence in standard models is not robust to a slight perturbation.,matthew jackson,Not available,2009.0,10.1007/s10058-008-0059-2,Review of Economic Design,O.2009,False,,Springer,Not available,Non-existence of equilibrium in Vickrey second-price and English auctions,4fa5f74d1042985d00ebaa458ae63e35,http://dx.doi.org/10.1007/s10058-008-0059-2 1081,In mobile ad hoc network (MANET) nodes have a tendency to drop others’ packet to conserve its own energy. If most of the nodes in a network start to behave in this way either a portion of the network would be isolated or total network functionality would be hampered. This behavior is known as selfishness. Therefore selfishness mitigation and enforcing cooperation between nodes is very important to increase the availability of nodes and overall throughput and to achieve the robustness of the network. Both credit and reputation based mechanisms are used to attract nodes to forward others’ packets. In light of this we propose a game theoretic routing model Secure Trusted Auction oriented Clustering based Routing Protocol (STACRP) to provide trusted framework for MANET. Two auction mechanisms procurement and Dutch are used to determine the forwarding cost-per-hop for intermediate nodes. Our model is lightweight in terms of computational and communication requirements yet powerful in terms of flexibility in managing trust between nodes of heterogeneous deployments. It manages trust locally with minimal overhead in terms of extra messages. STACRP organizes the network into 1-hop disjoint clusters and elects the most qualified and trustworthy nodes as Clusterhead. The trust is quantified with carefully chosen parameters having deep impact on network functionality. The trust model is analyzed using Markov chain and is proven as continuous time Markov chain. The security analysis of the model is analyzed to guarantee that the proposed approach achieves a secure reliable routing solution for MANETs. The proposed model have been evaluated with a set of simulations that show STACRP detects selfish nodes and enforces cooperation between nodes and achieves better throughput and packet delivery ratio with lees routing overhead compare to AODV.,pushpita chatterjee,Not available,2012.0,10.1007/s10586-012-0198-7,Cluster Computing,Pushpita2012,False,,Springer,Not available,STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,a30968b2d3de7f0e25e90b8d33125ef6,http://dx.doi.org/10.1007/s10586-012-0198-7 1082,In mobile ad hoc network (MANET) nodes have a tendency to drop others’ packet to conserve its own energy. If most of the nodes in a network start to behave in this way either a portion of the network would be isolated or total network functionality would be hampered. This behavior is known as selfishness. Therefore selfishness mitigation and enforcing cooperation between nodes is very important to increase the availability of nodes and overall throughput and to achieve the robustness of the network. Both credit and reputation based mechanisms are used to attract nodes to forward others’ packets. In light of this we propose a game theoretic routing model Secure Trusted Auction oriented Clustering based Routing Protocol (STACRP) to provide trusted framework for MANET. Two auction mechanisms procurement and Dutch are used to determine the forwarding cost-per-hop for intermediate nodes. Our model is lightweight in terms of computational and communication requirements yet powerful in terms of flexibility in managing trust between nodes of heterogeneous deployments. It manages trust locally with minimal overhead in terms of extra messages. STACRP organizes the network into 1-hop disjoint clusters and elects the most qualified and trustworthy nodes as Clusterhead. The trust is quantified with carefully chosen parameters having deep impact on network functionality. The trust model is analyzed using Markov chain and is proven as continuous time Markov chain. The security analysis of the model is analyzed to guarantee that the proposed approach achieves a secure reliable routing solution for MANETs. The proposed model have been evaluated with a set of simulations that show STACRP detects selfish nodes and enforces cooperation between nodes and achieves better throughput and packet delivery ratio with lees routing overhead compare to AODV.,indranil sengupta,Not available,2012.0,10.1007/s10586-012-0198-7,Cluster Computing,Pushpita2012,False,,Springer,Not available,STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,a30968b2d3de7f0e25e90b8d33125ef6,http://dx.doi.org/10.1007/s10586-012-0198-7 1083,In mobile ad hoc network (MANET) nodes have a tendency to drop others’ packet to conserve its own energy. If most of the nodes in a network start to behave in this way either a portion of the network would be isolated or total network functionality would be hampered. This behavior is known as selfishness. Therefore selfishness mitigation and enforcing cooperation between nodes is very important to increase the availability of nodes and overall throughput and to achieve the robustness of the network. Both credit and reputation based mechanisms are used to attract nodes to forward others’ packets. In light of this we propose a game theoretic routing model Secure Trusted Auction oriented Clustering based Routing Protocol (STACRP) to provide trusted framework for MANET. Two auction mechanisms procurement and Dutch are used to determine the forwarding cost-per-hop for intermediate nodes. Our model is lightweight in terms of computational and communication requirements yet powerful in terms of flexibility in managing trust between nodes of heterogeneous deployments. It manages trust locally with minimal overhead in terms of extra messages. STACRP organizes the network into 1-hop disjoint clusters and elects the most qualified and trustworthy nodes as Clusterhead. The trust is quantified with carefully chosen parameters having deep impact on network functionality. The trust model is analyzed using Markov chain and is proven as continuous time Markov chain. The security analysis of the model is analyzed to guarantee that the proposed approach achieves a secure reliable routing solution for MANETs. The proposed model have been evaluated with a set of simulations that show STACRP detects selfish nodes and enforces cooperation between nodes and achieves better throughput and packet delivery ratio with lees routing overhead compare to AODV.,s. ghosh,Not available,2012.0,10.1007/s10586-012-0198-7,Cluster Computing,Pushpita2012,False,,Springer,Not available,STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,a30968b2d3de7f0e25e90b8d33125ef6,http://dx.doi.org/10.1007/s10586-012-0198-7 1084,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,alex kim,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1085,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,subramanian balachander,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1086,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,karthik kannan,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1087,A platform for the study of the whole transmission problem (arrival of ships regasification transportation and distribution) faced by gas utilities companies is proposed. The main objective of this research is to develop a platform that includes the analysis of the new capacity auctions (and not the traditional commodity auctions) that will govern the supply chain in the near future. A simulation-optimization approach has been used to favour the more realistic abstraction of the system. The discrete-event model includes a genetic algorithm to reach the solution in a satisfactory short time a requisite in auction markets. Design and optimization studies for the utilities are addressed using the platform which has been validated with real data for one of the main zones in the Spanish market.,f otamendi,Not available,2012.0,10.1057/jors.2011.128,Journal of the Operational Research Society,J2012,False,,Springer,Not available,Towards an auction-driven gas supply: a simulation-based optimization framework for utilities,48136890e700f7d11899c4659ab95550,http://dx.doi.org/10.1057/jors.2011.128 1088,A platform for the study of the whole transmission problem (arrival of ships regasification transportation and distribution) faced by gas utilities companies is proposed. The main objective of this research is to develop a platform that includes the analysis of the new capacity auctions (and not the traditional commodity auctions) that will govern the supply chain in the near future. A simulation-optimization approach has been used to favour the more realistic abstraction of the system. The discrete-event model includes a genetic algorithm to reach the solution in a satisfactory short time a requisite in auction markets. Design and optimization studies for the utilities are addressed using the platform which has been validated with real data for one of the main zones in the Spanish market.,l doncel,Not available,2012.0,10.1057/jors.2011.128,Journal of the Operational Research Society,J2012,False,,Springer,Not available,Towards an auction-driven gas supply: a simulation-based optimization framework for utilities,48136890e700f7d11899c4659ab95550,http://dx.doi.org/10.1057/jors.2011.128 1089,We suggest approximately optimal bidding strategies for games where similar items are auctioned repeatedly. Considering players’ bounded rationality in practice the results can further motivate the application of market-based approaches in resource allocation problems. We specialize the bidding algorithm for first-price payment schemes the building blocks of several simplified selling mechanisms that are common in practice.,amir danak,Not available,2012.0,10.1007/s10479-012-1148-8,Annals of Operations Research,Amir2012,False,,Springer,Not available,Approximately optimal bidding policies for repeated first-price auctions,cacb550ac0118bf714708f106a5310bb,http://dx.doi.org/10.1007/s10479-012-1148-8 1090,This paper presents a method for discovering and detecting shill bids in combinatorial auctions. Combinatorial auctions have been studied very widely. The Generalized Vickrey Auction (GVA) is one of the most important combinatorial auctions because it can satisfy the strategy-proof property and Pareto efficiency. As Yokoo et al. pointed out false-name bids and shill bids pose an emerging problem for auctions since on the Internet it is easy to establish different e-mail addresses and accounts for auction sites. Yokoo et al. proved that GVA cannot satisfy the false-name-proof property. Moreover they proved that there is no auction protocol that can satisfy all three of the above major properties. Their approach concentrates on designing new mechanisms. As a new approach against shill-bids in this paper we propose a method for finding shill bids with the GVA in order to avoid them. Our algorithm can judge whether there might be a shill bid from the results of the GVA’s procedure. However a straightforward way to detect shill bids requires an exponential amount of computing power because we need to check all possible combinations of bidders. Therefore in this paper we propose an improved method for finding a shill bidder. The method is based on winning bidders which can dramatically reduce the computational cost. The results demonstrate that the proposed method successfully reduces the computational cost needed to find shill bids. The contribution of our work is in the integration of the theory and detecting fraud in combinatorial auctions.,takayuki ito,Not available,2006.0,10.1007/11780397_1,Data Engineering Issues in E-Commerce and Services,Tokuro2006,False,,Springer,Not available,An Approach to Detecting Shill-Biddable Allocations in Combinatorial Auctions,625ee953a10ecc398819a0ac9f013582,http://dx.doi.org/10.1007/11780397_1 1091,We suggest approximately optimal bidding strategies for games where similar items are auctioned repeatedly. Considering players’ bounded rationality in practice the results can further motivate the application of market-based approaches in resource allocation problems. We specialize the bidding algorithm for first-price payment schemes the building blocks of several simplified selling mechanisms that are common in practice.,shie mannor,Not available,2012.0,10.1007/s10479-012-1148-8,Annals of Operations Research,Amir2012,False,,Springer,Not available,Approximately optimal bidding policies for repeated first-price auctions,cacb550ac0118bf714708f106a5310bb,http://dx.doi.org/10.1007/s10479-012-1148-8 1092,The Dutch-auction method of bringing IPOs to market has been used sparingly since its initiation in 1999 despite the potential for this method to lead to more fully-priced issues. The development of Dutch-auctioned IPOs is documented here and institutional details are reviewed. An empirical investigation of the characteristics of these IPOs is presented. The evidence indicates smaller magnitudes of underpricing of Dutch-auctioned IPOs relative to traditional IPOs. A multi-variate analysis indicates however that this smaller degree of underpricing is due to factors other than the Dutch-auction process. The evidence strongly reinforces the institutional rationing hypothesis for underpricing. It also contributes to the international evidence of the failure of auctioned IPOs to avoid underpricing.,mary robinson,Not available,2012.0,10.1007/s12197-010-9166-3,Journal of Economics and Finance,Ann2012,False,,Springer,Not available,Dutch-auction IPOs: institutional development and underpricing performance,a47399432dd3e143dafc1e70337dd438,http://dx.doi.org/10.1007/s12197-010-9166-3 1093,The Dutch-auction method of bringing IPOs to market has been used sparingly since its initiation in 1999 despite the potential for this method to lead to more fully-priced issues. The development of Dutch-auctioned IPOs is documented here and institutional details are reviewed. An empirical investigation of the characteristics of these IPOs is presented. The evidence indicates smaller magnitudes of underpricing of Dutch-auctioned IPOs relative to traditional IPOs. A multi-variate analysis indicates however that this smaller degree of underpricing is due to factors other than the Dutch-auction process. The evidence strongly reinforces the institutional rationing hypothesis for underpricing. It also contributes to the international evidence of the failure of auctioned IPOs to avoid underpricing.,richard robinson,Not available,2012.0,10.1007/s12197-010-9166-3,Journal of Economics and Finance,Ann2012,False,,Springer,Not available,Dutch-auction IPOs: institutional development and underpricing performance,a47399432dd3e143dafc1e70337dd438,http://dx.doi.org/10.1007/s12197-010-9166-3 1094,In 1961 Vickrey posed the problem of finding an analytic solution to a first-price auction with two buyers having valuations uniformly distributed on ,todd kaplan,Not available,2012.0,10.1007/s00199-010-0563-9,Economic Theory,R.2012,False,,Springer,Not available,Asymmetric first-price auctions with uniform distributions: analytic solutions to the general case,d2b689df28c7575231efb5484ced3408,http://dx.doi.org/10.1007/s00199-010-0563-9 1095,In 1961 Vickrey posed the problem of finding an analytic solution to a first-price auction with two buyers having valuations uniformly distributed on ,shmuel zamir,Not available,2012.0,10.1007/s00199-010-0563-9,Economic Theory,R.2012,False,,Springer,Not available,Asymmetric first-price auctions with uniform distributions: analytic solutions to the general case,d2b689df28c7575231efb5484ced3408,http://dx.doi.org/10.1007/s00199-010-0563-9 1096,Telecommunication networks are now an interconnection of competitive operators that need to cooperate to ensure end-to-end delivery of traffic. Inter-domain agreements have to be performed and pricing is seen as a relevant way to reward intermediate domains for forwarding the traffic of others. In previous works Vickrey–Clark–Groves (VCG) double-sided auctions have been applied because they provide proper incentives lead to an efficient use of the network and verify other relevant characteristics. However it has been highlighted that the resource allocation schemes applying VCG auction are neither budget-balanced nor solvable in a decentralized way. In this paper we apply combinatorial double-sided auction to allocate the bandwidth resources over nodes. While previous works were using a centralized algorithm we use here a new pricing rule leading to a new budget-balanced pricing scheme for which allocations and charges can be computed in a decentralized way. We also analyze the impact of this scheme on the game over declared costs of nodes.,hoang-hai tran,Not available,2012.0,10.1007/s12243-011-0250-2,annals of telecommunications - annales des télécommunications,Hoang-Hai2012,False,,Springer,Not available,Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach,11fd8318496185f7d77ea9f0fbe9d221,http://dx.doi.org/10.1007/s12243-011-0250-2 1097,Telecommunication networks are now an interconnection of competitive operators that need to cooperate to ensure end-to-end delivery of traffic. Inter-domain agreements have to be performed and pricing is seen as a relevant way to reward intermediate domains for forwarding the traffic of others. In previous works Vickrey–Clark–Groves (VCG) double-sided auctions have been applied because they provide proper incentives lead to an efficient use of the network and verify other relevant characteristics. However it has been highlighted that the resource allocation schemes applying VCG auction are neither budget-balanced nor solvable in a decentralized way. In this paper we apply combinatorial double-sided auction to allocate the bandwidth resources over nodes. While previous works were using a centralized algorithm we use here a new pricing rule leading to a new budget-balanced pricing scheme for which allocations and charges can be computed in a decentralized way. We also analyze the impact of this scheme on the game over declared costs of nodes.,bruno tuffin,Not available,2012.0,10.1007/s12243-011-0250-2,annals of telecommunications - annales des télécommunications,Hoang-Hai2012,False,,Springer,Not available,Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach,11fd8318496185f7d77ea9f0fbe9d221,http://dx.doi.org/10.1007/s12243-011-0250-2 1098,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,yaqiong wu,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 1099,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,yong zhao,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 1100,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,chaoyuan yue,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 1101,This paper presents a method for discovering and detecting shill bids in combinatorial auctions. Combinatorial auctions have been studied very widely. The Generalized Vickrey Auction (GVA) is one of the most important combinatorial auctions because it can satisfy the strategy-proof property and Pareto efficiency. As Yokoo et al. pointed out false-name bids and shill bids pose an emerging problem for auctions since on the Internet it is easy to establish different e-mail addresses and accounts for auction sites. Yokoo et al. proved that GVA cannot satisfy the false-name-proof property. Moreover they proved that there is no auction protocol that can satisfy all three of the above major properties. Their approach concentrates on designing new mechanisms. As a new approach against shill-bids in this paper we propose a method for finding shill bids with the GVA in order to avoid them. Our algorithm can judge whether there might be a shill bid from the results of the GVA’s procedure. However a straightforward way to detect shill bids requires an exponential amount of computing power because we need to check all possible combinations of bidders. Therefore in this paper we propose an improved method for finding a shill bidder. The method is based on winning bidders which can dramatically reduce the computational cost. The results demonstrate that the proposed method successfully reduces the computational cost needed to find shill bids. The contribution of our work is in the integration of the theory and detecting fraud in combinatorial auctions.,toramatsu shintani,Not available,2006.0,10.1007/11780397_1,Data Engineering Issues in E-Commerce and Services,Tokuro2006,False,,Springer,Not available,An Approach to Detecting Shill-Biddable Allocations in Combinatorial Auctions,625ee953a10ecc398819a0ac9f013582,http://dx.doi.org/10.1007/11780397_1 1102,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,xianglin wu,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 1103,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,peter cramton,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 1104,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,emel filiz-ozbay,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 1105,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,erkut ozbay,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 1106,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,pacharasut sujarittanonta,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 1107,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,kentaro kawasaki,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 1108,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,takeshi fujie,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 1109,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,kentaro koito,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 1110,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,norikazu inoue,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 1111,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,hiroki sasaki,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 1112,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,dipankar chakravarti,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1113,We examine efficiency properties and incentive compatibility of alternative auction formats that an electricity network system operator may use for the procurement of ancillary services required for real-time operations. We model the procurement auction as a hierarchical multiproduct auction and study several designs such as a uniform price auction minimizing revealed “social” cost a uniform price auction minimizing the system operator's cost and a pay as bid auction minimizing revealed “social” cost. We take into account that rational bidders will respond to any market design so as to maximize their expected benefit from participating in that market. Under the assumptions of our model we show that the uniform price auction minimizing revealed “social” cost is the only one that guarantees productive efficiency. We also find that expected revenue (payment in our case) equivalence between pay as bid and uniform price auctions does not extend to the hierarchical products case and the ranking of these auctions is ambiguous and depends on the data. For the procurement auction minimizing the system operator's cost we show that misrepresentation of capability may result in capacity shortages if there are capacity constraints. For the case where only higher capability resources are constrained this will result in random price spikes decreasing in frequency with the price cap (this is the amount paid to capacity in demand states with shortages). When lower type resources are capacity constrained as well price spikes will be seen for both type of resources. Such artificial shortages result in reduced reliability in real-time operations.,shmuel oren,Not available,2002.0,10.1023/A:1015378914995,Journal of Regulatory Economics,Rajnish2002,False,,Springer,Not available,Rational Buyer Meets Rational Seller: Reserves Market Equilibria under Alternative Auction Designs,9bb457432d6279e2879a2a760427a787,http://dx.doi.org/10.1023/A:1015378914995 1114,We study the design of truthful auction mechanisms for maximizing the seller’s profit. We focus on the case when the auction mechanism does not have any knowledge of bidders’ valuations especially of their upper bound. For the Single-Item auction we obtain an “asymptotically” optimal scheme: for any ,pinyan lu,Not available,2006.0,10.1007/11944874_4,Internet and Network Economics,Pinyan2006,False,,Springer,Not available,Truthful Auctions with Optimal Profit,74660ef2153a70f0d0d61ae5653a40ee,http://dx.doi.org/10.1007/11944874_4 1115,Behavioural game theory uses experimental regularities and psychology to model formally how limits on strategic thinking learning and social preferences interact when people actually play games. Emerging theories of behaviour in ultimatum and trust games (and others) focus on an aversion to inequality reciprocity or concern for social image. Learning models often focus on numerical updating of an unobserved propensity to choose a strategy (including fictitious play updating of beliefs as a special case). Models of limits on strategic thinking assume players are in equilibrium but respond with error or there is a cognitive hierarchy of increasingly sophisticated reasoning.,colin camerer,Not available,2016.0,10.1057/978-1-349-95121-5_2384-1,The New Palgrave Dictionary of Economics,F.2016,False,,Springer,Not available,Behavioural Game Theory,d5f64f4f68d1b5f4317a5322ca003200,http://dx.doi.org/10.1057/978-1-349-95121-5_2384-1 1116,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,john kagel,Not available,2016.0,10.1057/978-1-349-95121-5_2671-1,The New Palgrave Dictionary of Economics,H.2016,False,,Springer,Not available,Auctions (Experiments),2bf4c161507e679eb29c2fc7f7202215,http://dx.doi.org/10.1057/978-1-349-95121-5_2671-1 1117,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,dan levin,Not available,2016.0,10.1057/978-1-349-95121-5_2671-1,The New Palgrave Dictionary of Economics,H.2016,False,,Springer,Not available,Auctions (Experiments),2bf4c161507e679eb29c2fc7f7202215,http://dx.doi.org/10.1057/978-1-349-95121-5_2671-1 1118,Behavioural economics broadly defined refers to the research programme that investigates the relationship between psychology and economic behaviour. The purpose of this article is to provide an outline of behavioural economics research and to describe where research in behavioural game theory stands within this outline. The aim is not to assess the impact of particular contributions or describe and interpret specific applications. Rather the goal is to provide an organization of the literature based on the type of departures from standard theory.,faruk gul,Not available,2016.0,10.1057/978-1-349-95121-5_2284-1,The New Palgrave Dictionary of Economics,Faruk2016,False,,Springer,Not available,Behavioural Economics and Game Theory,d193f821093b606148beae2c2e7c4858,http://dx.doi.org/10.1057/978-1-349-95121-5_2284-1 1119,A mechanism is a specification of how economic decisions are determined as a function of the information that is known by the individuals in the economy. Mechanism theory shows that ,roger myerson,Not available,2016.0,10.1057/978-1-349-95121-5_2675-1,The New Palgrave Dictionary of Economics,B.2016,False,,Springer,Not available,Mechanism Design,1ecfc695d0bd1de46646a7b3481fcc2c,http://dx.doi.org/10.1057/978-1-349-95121-5_2675-1 1120,Contemporary experimental economics was born in the 1950s from the combination of the experimental method used in psychology and new developments in economic theory. Early experimental studies of bargaining behaviour social dilemmas individual decision making and market institutions were followed by a long period of underground growth until the booming of the field in the 1980s and 1990s.,francesco guala,Not available,2016.0,10.1057/978-1-349-95121-5_2184-1,The New Palgrave Dictionary of Economics,Francesco2016,False,,Springer,Not available,Experimental Economics History of,7f2a364db31f1c995e933a4a12c28b82,http://dx.doi.org/10.1057/978-1-349-95121-5_2184-1 1121,Robert W. Rosenthal (1944–2002) was an economic theorist whose thoughtful papers inspired a wide range of new ideas. As Radner and Ray (2003) point out Rosenthal (1978) gives one of the first formal statements of the revelation principle a result noted in Myerson’s first paper (1979) on the subject. Rosenthal (1979) initiated the study of repeated games with varying opponents a modelling device used by Milgrom et al. (1990) Kandori (1992) and others to study social norms and other issues. He also wrote influential papers on pricing (Rosenthal 1980 1982) multi-unit auctions (Krishna and Rosenthal 1996) purification of mixed strategy equilibria (Radner and Rosenthal 1982; Aumann et al. 1983) sovereign debt (Fernandez and Rosenthal 1990) analysis of experimental data (Brown and Rosenthal 1990) and many other topics.,barton lipman,Not available,2016.0,10.1057/978-1-349-95121-5_2548-1,The New Palgrave Dictionary of Economics,L.2016,False,,Springer,Not available,Rosenthal Robert W. (1944–2002),0cc917f19b49ad96766a42e255479383,http://dx.doi.org/10.1057/978-1-349-95121-5_2548-1 1122,This article provides a brief overview of equilibrium existence results for continuous and discontinuous non-cooperative games.,philip reny,Not available,2016.0,10.1057/978-1-349-95121-5_2572-1,The New Palgrave Dictionary of Economics,J.2016,False,,Springer,Not available,Non-cooperative Games (Equilibrium Existence),8bf4c3d94916c036c2794cf6277aaa62,http://dx.doi.org/10.1057/978-1-349-95121-5_2572-1 1123,Computational issues are important in mechanism design but have received insufficient research interest. This article briefly reviews some of the key ideas. I discuss computing by the ,tuomas sandholm,Not available,2016.0,10.1057/978-1-349-95121-5_2327-1,The New Palgrave Dictionary of Economics,Tuomas2016,False,,Springer,Not available,Computing in Mechanism Design,7be14cee4a02accfd2e1e2889905d219,http://dx.doi.org/10.1057/978-1-349-95121-5_2327-1 1124,Supply chain is a decentralized system where material financial and information flows connect economic agents. There is much inefficiency in supply chain behavior. Recently considerable attention of researchers is drown to provide some incentives to adjust the relationship of supply chain agents to coordinate the supply chain i.e. the total profit of the decentralized supply chain is equal to that achieved under a centralized system. There is a vast literature on supply chain coordination recently. Most of coordination mechanisms are based on game theory models and contracts between agents of the supply chain. However little work has been done on using auctions for supply chain coordination. Auctions are important market mechanisms for the allocation of goods and services. A complex trading model between layers of the supply chain is proposed in the paper. The model is based on so called multidimensional auctions. There is possible to formulate multidimensional auctions as mathematical programming problems. Iterative methods are used to solve the problems.,petr fiala,Not available,2016.0,10.1007/s11573-015-0788-y,Journal of Business Economics,Petr2016,False,,Springer,Not available,Supply chain coordination with auctions,e0dd64e170fe363b78b8e0d49bb194de,http://dx.doi.org/10.1007/s11573-015-0788-y 1125,We study the design of truthful auction mechanisms for maximizing the seller’s profit. We focus on the case when the auction mechanism does not have any knowledge of bidders’ valuations especially of their upper bound. For the Single-Item auction we obtain an “asymptotically” optimal scheme: for any ,shang-hua teng,Not available,2006.0,10.1007/11944874_4,Internet and Network Economics,Pinyan2006,False,,Springer,Not available,Truthful Auctions with Optimal Profit,74660ef2153a70f0d0d61ae5653a40ee,http://dx.doi.org/10.1007/11944874_4 1126,Mechanism design concerns the question: given some desirable outcome can we design a game which produces it? This theory provides a foundation for many important fields such as auction theory and contract theory. We survey the recent literature dealing with topics such as robustness of mechanisms renegotiation and collusion. An important issue is whether simple and intuitively appealing mechanisms can be optimal. Finally we discuss what can be learned from recent experiments.,sandeep baliga,Not available,2016.0,10.1057/978-1-349-95121-5_2134-1,The New Palgrave Dictionary of Economics,Sandeep2016,False,,Springer,Not available,Mechanism Design (New Developments),e7898921ef7bc76af36d4ec0a7e898a7,http://dx.doi.org/10.1057/978-1-349-95121-5_2134-1 1127,Mechanism design concerns the question: given some desirable outcome can we design a game which produces it? This theory provides a foundation for many important fields such as auction theory and contract theory. We survey the recent literature dealing with topics such as robustness of mechanisms renegotiation and collusion. An important issue is whether simple and intuitively appealing mechanisms can be optimal. Finally we discuss what can be learned from recent experiments.,tomas sjostrom,Not available,2016.0,10.1057/978-1-349-95121-5_2134-1,The New Palgrave Dictionary of Economics,Sandeep2016,False,,Springer,Not available,Mechanism Design (New Developments),e7898921ef7bc76af36d4ec0a7e898a7,http://dx.doi.org/10.1057/978-1-349-95121-5_2134-1 1128,We develop a model of implicit collusion in repeated procurement auctions in which suppliers can only observe past auction prices but not all bids and the identities of winners. We focus on symmetric perfect public equilibria (SPPE) and use the dynamic programming techniques to characterize the optimal SPPE. We allow for a public randomization device and find that the implementation of the optimal collusive equilibrium can be simply obtained by using the bang-bang property because suppliers just need to adopt the collusive bidding schedule and depending on the past winning bids with a certain probability they stick to that strategy or move to Nash reversion. The optimal implicit collusion is characterized by a rigid-bidding scheme with punishments occurring on the equilibrium path. As a result the optimal collusion can not achieve full efficiency.,hong wang,Not available,2016.0,10.1007/s00712-015-0457-1,Journal of Economics,Hong2016,False,,Springer,Not available,Optimal implicit collusion in repeated procurement auctions,cbd354c0e0cd7c85abf0b49a86c83ca4,http://dx.doi.org/10.1007/s00712-015-0457-1 1129,A ,sergiu hart,Not available,2016.0,10.1007/s00182-015-0485-7,International Journal of Game Theory,Sergiu2016,False,,Springer,Not available,Allocation games with caps: from Captain Lotto to all-pay auctions,c576b08438b31f6d770cddfe1c56a5e6,http://dx.doi.org/10.1007/s00182-015-0485-7 1130,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ezra einy,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 1131,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ori haimanko,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 1132,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ram orzach,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 1133,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,aner sela,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 1134,It is often observed in first-price sealed-bid auction experiments that subjects tend to bid above the risk neutral Nash equilibrium predictions. One possible explanation for this overbidding phenomenon is that bidders subjectively weight their winning probabilities. In the relevant literature the probability weighting functions (PWFs) suggested to explain overbidding imply the underweighting of all probabilities. However such functions are not in accordance with the PWFs commonly used in the literature (i.e. inverse S-shaped functions). In this paper we introduce inverse S-shaped PWFs into first-price sealed-bid auctions and investigate the extent to which such weighting functions explain overbidding. Our results indicate that bidders with low valuations underbid whereas those with high valuations overbid. We accordingly conclude that inverse S-shaped PWFs provide a partial explanation for overbidding.,kerim keskin,Not available,2016.0,10.1007/s10058-015-0183-8,Review of Economic Design,Kerim2016,False,,Springer,Not available,Inverse S-shaped probability weighting functions in first-price sealed-bid auctions,8b237605120a799b1a49fde4e9b0ab26,http://dx.doi.org/10.1007/s10058-015-0183-8 1135,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,cong feng,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 1136,We study the design of truthful auction mechanisms for maximizing the seller’s profit. We focus on the case when the auction mechanism does not have any knowledge of bidders’ valuations especially of their upper bound. For the Single-Item auction we obtain an “asymptotically” optimal scheme: for any ,changyuan yu,Not available,2006.0,10.1007/11944874_4,Internet and Network Economics,Pinyan2006,False,,Springer,Not available,Truthful Auctions with Optimal Profit,74660ef2153a70f0d0d61ae5653a40ee,http://dx.doi.org/10.1007/11944874_4 1137,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,scott fay,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 1138,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,k. sivakumar,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 1139,Auction theory has undergone two waves of innovation. The first which originated with Vickrey (,lawrence ausubel,Not available,2016.0,10.1057/978-1-349-95121-5_2746-1,The New Palgrave Dictionary of Economics,M.2016,False,,Springer,Not available,Auctions (Theory),7e0a9d66a7accf721637ec47402794a6,http://dx.doi.org/10.1057/978-1-349-95121-5_2746-1 1140,Supply chain is a decentralized system where material financial and information flows connect economic agents. There is much inefficiency in supply chain behavior. Recently considerable attention of researchers is drown to provide some incentives to adjust the relationship of supply chain agents to coordinate the supply chain i.e. the total profit of the decentralized supply chain is equal to that achieved under a centralized system. There is a vast literature on supply chain coordination recently. Most of coordination mechanisms are based on game theory models and contracts between agents of the supply chain. However little work has been done on using auctions for supply chain coordination. Auctions are important market mechanisms for the allocation of goods and services. A complex trading model between layers of the supply chain is proposed in the paper. The model is based on so called multidimensional auctions. There is possible to formulate multidimensional auctions as mathematical programming problems. Iterative methods are used to solve the problems.,petr fiala,Not available,2016.0,10.1007/s11573-015-0788-y,Journal of Business Economics,Petr2016,False,,Springer,Not available,Supply chain coordination with auctions,e0dd64e170fe363b78b8e0d49bb194de,http://dx.doi.org/10.1007/s11573-015-0788-y 1141,,wei sun,Not available,2016.0,10.1007/978-1-4939-2864-4_297,Encyclopedia of Algorithms,Wei2016,False,,Springer,Not available,Position Auction,31cf6d05ce0faaedb1bd849c42d39a60,http://dx.doi.org/10.1007/978-1-4939-2864-4_297 1142,,zhiyi huang,Not available,2016.0,10.1007/978-1-4939-2864-4_791,Encyclopedia of Algorithms,Zhiyi2016,False,,Springer,Not available,Privacy Preserving Auction,4020991c489794453302764063be8c91,http://dx.doi.org/10.1007/978-1-4939-2864-4_791 1143,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,erel segal-halevi,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1144,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,avinatan hassidim,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1145,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,yonatan aumann,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1146, This paper examines whether the seller of an object should reveal the identities of the participating bidders before bids become due. It is shown that when bidders experience identity dependent externalities and auction participation is exogenous then for a large class of standard auction mechanisms a policy of revelation serves to realize a higher surplus because it improves the accuracy of each bidder's estimate of her ex-post willingness-to-pay and therefore changes the auction allocation in a more ex-post efficient manner. Furthermore it is shown that the policy of revelation increases both the expected seller revenues as well as ex-ante expected bidder payoffs.,varma das,Not available,2002.0,10.1007/s100580200070,Review of Economic Design,Gopal2002,False,,Springer,Not available,Who else is bidding? The Pareto optimality of disclosing bidder identities,ddb23ef4981636eb15c71e44577b2e9e,http://dx.doi.org/10.1007/s100580200070 1147,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,amar cheema,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1148,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,dipankar chakravarti,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1149,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,eric greenleaf,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1150,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,atanu sinha,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1151,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,amar cheema,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1152,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,james cox,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1153,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,daniel friedman,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1154,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,teck ho,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1155,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,r. isaac,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1156,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,andrew mitchell,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1157,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,amnon rapoport,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1158,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,peter leszczyc,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1159,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,michael rothkopf,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1160,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,joydeep srivastava,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1161,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,rami zwick,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 1162, We derive equilibrium bidding strategies in divisible good auctions for asymmetrically informed risk neutral and risk averse bidders when there is random noncompetitive demand. The equilibrium bid schedules contain both strategic considerations and explicit allowances for the winner's curse. When the bidders' information is symmetric the strategic aspects of bidding imply that there always exist equilibria of a uniform-price auction with lower expected revenue than provided by a discriminatory auction. When bidders are risk averse there may exist equilibria of the uniform-price auction that provide higher expected revenue than a discriminatory auction.,james wang,Not available,2002.0,10.1007/s001990100191,Economic Theory,J.D.2002,False,,Springer,Not available,Auctioning divisible goods,dbc2f8a5b0c5e7fcbf2ee2fac646398a,http://dx.doi.org/10.1007/s001990100191 1163, We derive equilibrium bidding strategies in divisible good auctions for asymmetrically informed risk neutral and risk averse bidders when there is random noncompetitive demand. The equilibrium bid schedules contain both strategic considerations and explicit allowances for the winner's curse. When the bidders' information is symmetric the strategic aspects of bidding imply that there always exist equilibria of a uniform-price auction with lower expected revenue than provided by a discriminatory auction. When bidders are risk averse there may exist equilibria of the uniform-price auction that provide higher expected revenue than a discriminatory auction.,jaime zender,Not available,2002.0,10.1007/s001990100191,Economic Theory,J.D.2002,False,,Springer,Not available,Auctioning divisible goods,dbc2f8a5b0c5e7fcbf2ee2fac646398a,http://dx.doi.org/10.1007/s001990100191 1164,Within the common-value paradigm I examine the magnitude of the differencein expected outcome between first-price and second-price sealed-bid auctions.I limit myself to two empirical specifications of bidders' signals: Weibulland normal distribution. The optimal bid functions and the expected procurer'scost under both auction formats are derived. Simultions are undertaken toanalyze the impact that random draws of signals have on the differences inoutcome from the two auction formats. Using estimates from structuralestimation in previous empirical work on first-price auction data whereWeibull and normal distributions of signals have been applied thehypothetical expected gain from switching from a first-price sealed-bidauction to a second-price sealed-bid auction mechanism is computed.,anders lunander,Not available,2002.0,10.1023/A:1015008130780,Computational Economics,Anders2002,False,,Springer,Not available,Procurement Bidding in First-Price and Second-Price Sealed-Bid Auctions within the Common-Value Paradigm,11564b52a9e55f277a86b38eb539c7fa,http://dx.doi.org/10.1023/A:1015008130780 1165, We analyze a model of coalitional bidding in which coalitions form endogenously and compete with each other. Since the nature of this competition influences the way in which agents organize themselves into coalitions our main aim is to characterize the equilibrium coalition structure and the resulting bids. We do so in a simple model in which the seller may have good reason to allow joint bidding. In particular we study a model in which the agents are budget constrained and are allowed to form coalitions to pool their finances before engaging in the first price auction. We show that if the budget constraint is very severe the equilibrium coalition structure consists of two coalitions one slightly larger than the other; interestingly it is not the grand coalition. This equilibrium coalition structure is one which yields (approximately) the maximum expected revenue. Thus the seller can induce the optimal (revenue maximizing) degree of cooperation among budget constrained buyers simply by permitting them to collude.,in-koo cho,Not available,2002.0,10.1007/s001990000153,Economic Theory,In-Koo2002,False,,Springer,Not available,A simple model of coalitional bidding,2af03fd550053d3420358ac31a3c3922,http://dx.doi.org/10.1007/s001990000153 1166, We analyze a model of coalitional bidding in which coalitions form endogenously and compete with each other. Since the nature of this competition influences the way in which agents organize themselves into coalitions our main aim is to characterize the equilibrium coalition structure and the resulting bids. We do so in a simple model in which the seller may have good reason to allow joint bidding. In particular we study a model in which the agents are budget constrained and are allowed to form coalitions to pool their finances before engaging in the first price auction. We show that if the budget constraint is very severe the equilibrium coalition structure consists of two coalitions one slightly larger than the other; interestingly it is not the grand coalition. This equilibrium coalition structure is one which yields (approximately) the maximum expected revenue. Thus the seller can induce the optimal (revenue maximizing) degree of cooperation among budget constrained buyers simply by permitting them to collude.,kevin jewell,Not available,2002.0,10.1007/s001990000153,Economic Theory,In-Koo2002,False,,Springer,Not available,A simple model of coalitional bidding,2af03fd550053d3420358ac31a3c3922,http://dx.doi.org/10.1007/s001990000153 1167, We analyze a model of coalitional bidding in which coalitions form endogenously and compete with each other. Since the nature of this competition influences the way in which agents organize themselves into coalitions our main aim is to characterize the equilibrium coalition structure and the resulting bids. We do so in a simple model in which the seller may have good reason to allow joint bidding. In particular we study a model in which the agents are budget constrained and are allowed to form coalitions to pool their finances before engaging in the first price auction. We show that if the budget constraint is very severe the equilibrium coalition structure consists of two coalitions one slightly larger than the other; interestingly it is not the grand coalition. This equilibrium coalition structure is one which yields (approximately) the maximum expected revenue. Thus the seller can induce the optimal (revenue maximizing) degree of cooperation among budget constrained buyers simply by permitting them to collude.,rajiv vohra,Not available,2002.0,10.1007/s001990000153,Economic Theory,In-Koo2002,False,,Springer,Not available,A simple model of coalitional bidding,2af03fd550053d3420358ac31a3c3922,http://dx.doi.org/10.1007/s001990000153 1168, A class of cooperative games arising from economic and operations research situations in which agents with potential individual possibilities are connected via a hierarchy within an organization is introduced. It is shown that the games in this class form a cone which lies in the intersection of convex games and monotonic veto-rich games with the leader of the organization as veto-player. Different economic situations like auctions communication situations sequencing situations and flow situations are related to peer group games. For peer group games classical solution concepts have nice computational properties.,rodica branzei,Not available,2002.0,10.1007/s001860200176,Mathematical Methods of Operations Research,Rodica2002,False,,Springer,Not available,Tree-connected peer group situations and peer group games,3b1682e0f4230475a6d63c19419d5486,http://dx.doi.org/10.1007/s001860200176 1169,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,rajesh bagchi,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1170, A class of cooperative games arising from economic and operations research situations in which agents with potential individual possibilities are connected via a hierarchy within an organization is introduced. It is shown that the games in this class form a cone which lies in the intersection of convex games and monotonic veto-rich games with the leader of the organization as veto-player. Different economic situations like auctions communication situations sequencing situations and flow situations are related to peer group games. For peer group games classical solution concepts have nice computational properties.,vito fragnelli,Not available,2002.0,10.1007/s001860200176,Mathematical Methods of Operations Research,Rodica2002,False,,Springer,Not available,Tree-connected peer group situations and peer group games,3b1682e0f4230475a6d63c19419d5486,http://dx.doi.org/10.1007/s001860200176 1171, A class of cooperative games arising from economic and operations research situations in which agents with potential individual possibilities are connected via a hierarchy within an organization is introduced. It is shown that the games in this class form a cone which lies in the intersection of convex games and monotonic veto-rich games with the leader of the organization as veto-player. Different economic situations like auctions communication situations sequencing situations and flow situations are related to peer group games. For peer group games classical solution concepts have nice computational properties.,stef tijs,Not available,2002.0,10.1007/s001860200176,Mathematical Methods of Operations Research,Rodica2002,False,,Springer,Not available,Tree-connected peer group situations and peer group games,3b1682e0f4230475a6d63c19419d5486,http://dx.doi.org/10.1007/s001860200176 1172, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ezra einy,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1173, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ori haimanko,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1174, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ram orzach,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1175, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,aner sela,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1176, Most of the literature on auctions with endogenous entry assumes that in equilibrium the number of entrants is deterministic. We discuss a series of experiments designed to test the alternative hypothesis that even in equilibrium the number of entrants is stochastic. This distinction has strong implications for auction performance the design of optimal mechanisms and social welfare. Our results strongly reject the hypothesis of deterministic entry and tend to confirm the alternative hypothesis that entry is stochastic.,james smith,Not available,2002.0,10.1007/s001820100083,International Journal of Game Theory,L.2002,False,,Springer,Not available,Entry coordination in auctions and social welfare: An experimental investigation,d76cb9f0461ffcaec7782bd849806866,http://dx.doi.org/10.1007/s001820100083 1177, Most of the literature on auctions with endogenous entry assumes that in equilibrium the number of entrants is deterministic. We discuss a series of experiments designed to test the alternative hypothesis that even in equilibrium the number of entrants is stochastic. This distinction has strong implications for auction performance the design of optimal mechanisms and social welfare. Our results strongly reject the hypothesis of deterministic entry and tend to confirm the alternative hypothesis that entry is stochastic.,dan levin,Not available,2002.0,10.1007/s001820100083,International Journal of Game Theory,L.2002,False,,Springer,Not available,Entry coordination in auctions and social welfare: An experimental investigation,d76cb9f0461ffcaec7782bd849806866,http://dx.doi.org/10.1007/s001820100083 1178, This paper studies sequential auctions of licences to participate in a symmetric market game. Assuming that the rate at which industry profits decrease with repeated entry is ,gustavo rodriguez,Not available,2002.0,10.1007/PL00004211,Economic Theory,E.2002,False,,Springer,Not available,Auctions of licences and market structure,a0554a0da53d14cb60196df356217bcf,http://dx.doi.org/10.1007/PL00004211 1179,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,makoto yokoo,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 1180,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,richard bagozzi,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1181,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,yuko sakurai,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 1182,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,shigeo matsubara,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 1183,Sellers of goods or services wishing to participate in sponsored search auctions (SSA) must define a pool of keywords that are matched on-line to the queries submitted by the users to a search engine. Sellers must also define the value of their bid to the search engine for showing their advertisements in case of a query-keyword match. In order to optimize its revenue a seller might decide to substitute a keyword with a high cost thus likely to be the object of intense competition with sets of related keywords that collectively have lower cost while capturing an equivalent volume of user clicks. This technique is called ,michele budinich,Not available,2010.0,10.1007/978-3-642-15208-5_15,E-Commerce and Web Technologies,Michele2010,False,,Springer,Not available,On the Benefits of Keyword Spreading in Sponsored Search Auctions: An Experimental Analysis,1432c821289cfd27e150d9fb1cc08c83,http://dx.doi.org/10.1007/978-3-642-15208-5_15 1184,Sellers of goods or services wishing to participate in sponsored search auctions (SSA) must define a pool of keywords that are matched on-line to the queries submitted by the users to a search engine. Sellers must also define the value of their bid to the search engine for showing their advertisements in case of a query-keyword match. In order to optimize its revenue a seller might decide to substitute a keyword with a high cost thus likely to be the object of intense competition with sets of related keywords that collectively have lower cost while capturing an equivalent volume of user clicks. This technique is called ,bruno codenotti,Not available,2010.0,10.1007/978-3-642-15208-5_15,E-Commerce and Web Technologies,Michele2010,False,,Springer,Not available,On the Benefits of Keyword Spreading in Sponsored Search Auctions: An Experimental Analysis,1432c821289cfd27e150d9fb1cc08c83,http://dx.doi.org/10.1007/978-3-642-15208-5_15 1185,Sellers of goods or services wishing to participate in sponsored search auctions (SSA) must define a pool of keywords that are matched on-line to the queries submitted by the users to a search engine. Sellers must also define the value of their bid to the search engine for showing their advertisements in case of a query-keyword match. In order to optimize its revenue a seller might decide to substitute a keyword with a high cost thus likely to be the object of intense competition with sets of related keywords that collectively have lower cost while capturing an equivalent volume of user clicks. This technique is called ,filippo geraci,Not available,2010.0,10.1007/978-3-642-15208-5_15,E-Commerce and Web Technologies,Michele2010,False,,Springer,Not available,On the Benefits of Keyword Spreading in Sponsored Search Auctions: An Experimental Analysis,1432c821289cfd27e150d9fb1cc08c83,http://dx.doi.org/10.1007/978-3-642-15208-5_15 1186,Sellers of goods or services wishing to participate in sponsored search auctions (SSA) must define a pool of keywords that are matched on-line to the queries submitted by the users to a search engine. Sellers must also define the value of their bid to the search engine for showing their advertisements in case of a query-keyword match. In order to optimize its revenue a seller might decide to substitute a keyword with a high cost thus likely to be the object of intense competition with sets of related keywords that collectively have lower cost while capturing an equivalent volume of user clicks. This technique is called ,marco pellegrini,Not available,2010.0,10.1007/978-3-642-15208-5_15,E-Commerce and Web Technologies,Michele2010,False,,Springer,Not available,On the Benefits of Keyword Spreading in Sponsored Search Auctions: An Experimental Analysis,1432c821289cfd27e150d9fb1cc08c83,http://dx.doi.org/10.1007/978-3-642-15208-5_15 1187,We study formally discrete bidding strategies for the game induced by the Generalized Second Price keyword auction mechanism. Such strategies have seen experimental evaluation in the recent literature as parts of iterative best response procedures which have been shown not to converge. We give a detailed definition of iterative best response under these strategies and under appropriate discretization of the players’ strategy spaces we find that the discretized configurations space ,evangelos markakis,Not available,2010.0,10.1007/978-3-642-17572-5_46,Internet and Network Economics,Evangelos2010,False,,Springer,Not available,Discrete Strategies in Keyword Auctions and Their Inefficiency for Locally Aware Bidders,0a4bd89e170f98dcb819a85c0396e37a,http://dx.doi.org/10.1007/978-3-642-17572-5_46 1188,We study formally discrete bidding strategies for the game induced by the Generalized Second Price keyword auction mechanism. Such strategies have seen experimental evaluation in the recent literature as parts of iterative best response procedures which have been shown not to converge. We give a detailed definition of iterative best response under these strategies and under appropriate discretization of the players’ strategy spaces we find that the discretized configurations space ,orestis telelis,Not available,2010.0,10.1007/978-3-642-17572-5_46,Internet and Network Economics,Evangelos2010,False,,Springer,Not available,Discrete Strategies in Keyword Auctions and Their Inefficiency for Locally Aware Bidders,0a4bd89e170f98dcb819a85c0396e37a,http://dx.doi.org/10.1007/978-3-642-17572-5_46 1189,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has focused on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in dynamic markets. A bidder adopting this strategy can adjust his profit margin constantly according to his bidding history thus perceiving and responding to the dynamic market in a timely manner. Experiment results show that agents adaptive bidding strategy perform very well even without any prior knowledge about the market.,xin sui,Not available,2010.0,10.1007/978-3-642-15246-7_47,PRICAI 2010: Trends in Artificial Intelligence,Xin2010,False,,Springer,Not available,An Adaptive Bidding Strategy for Combinatorial Auction-Based Resource Allocation in Dynamic Markets,88d4aeafe8f4d484653e96d1c41f944d,http://dx.doi.org/10.1007/978-3-642-15246-7_47 1190,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has focused on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in dynamic markets. A bidder adopting this strategy can adjust his profit margin constantly according to his bidding history thus perceiving and responding to the dynamic market in a timely manner. Experiment results show that agents adaptive bidding strategy perform very well even without any prior knowledge about the market.,ho-fung leung,Not available,2010.0,10.1007/978-3-642-15246-7_47,PRICAI 2010: Trends in Artificial Intelligence,Xin2010,False,,Springer,Not available,An Adaptive Bidding Strategy for Combinatorial Auction-Based Resource Allocation in Dynamic Markets,88d4aeafe8f4d484653e96d1c41f944d,http://dx.doi.org/10.1007/978-3-642-15246-7_47 1191,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,james cox,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1192,The rule with which automated computerised auctions are closed play an important role in determining bidder strategies and auction outcomes. In this paper we examine two such rules: auctions with randomised closing times and fixed deadlines. To this end stochastic models of auctions with discrete state-space representing the prices attained are developed and analysed. The models allow us to determine the stationary probabilistic outcomes of the auctions which are used to examine the bidder performance measured as the savings it makes with respect to the maximum payable or its payoff. For this purpose one bidder is singled out as the “special bidder” (SB) and its performance is studied as a function of the speed with which it raises the price or its bid rate. The results show that with random closures the SB has incentives to place bids promptly to obtain high savings; on the other hand with fixed deadline auctions the SB should choose its bid rate with respect to the other system parameters in order to maximise payoffs.,kumaara velan,Not available,2010.0,10.1007/978-3-642-13541-5_5,Agent and Multi-Agent Systems: Technologies and Applications,Kumaara2010,False,,Springer,Not available,Analysing Bidder Performance in Randomised and Fixed-Deadline Automated Auctions,2b44ab5ecf6cfcd898a16ccab020bd5b,http://dx.doi.org/10.1007/978-3-642-13541-5_5 1193,The rule with which automated computerised auctions are closed play an important role in determining bidder strategies and auction outcomes. In this paper we examine two such rules: auctions with randomised closing times and fixed deadlines. To this end stochastic models of auctions with discrete state-space representing the prices attained are developed and analysed. The models allow us to determine the stationary probabilistic outcomes of the auctions which are used to examine the bidder performance measured as the savings it makes with respect to the maximum payable or its payoff. For this purpose one bidder is singled out as the “special bidder” (SB) and its performance is studied as a function of the speed with which it raises the price or its bid rate. The results show that with random closures the SB has incentives to place bids promptly to obtain high savings; on the other hand with fixed deadline auctions the SB should choose its bid rate with respect to the other system parameters in order to maximise payoffs.,erol gelenbe,Not available,2010.0,10.1007/978-3-642-13541-5_5,Agent and Multi-Agent Systems: Technologies and Applications,Kumaara2010,False,,Springer,Not available,Analysing Bidder Performance in Randomised and Fixed-Deadline Automated Auctions,2b44ab5ecf6cfcd898a16ccab020bd5b,http://dx.doi.org/10.1007/978-3-642-13541-5_5 1194,Online auctions in which items are sold in an online fashion with little knowledge about future bids are common in the internet environment. We study here a problem in which an auctioneer would like to sell a single item say a car. A bidder may make a bid for the item at any time but expects an immediate irrevocable decision. The goal of the auctioneer is to maximize her revenue in this uncertain environment. Under some reasonable assumptions it has been observed that the online auction problem has strong connections to the classical secretary problem in which an employer would like to choose the best candidate among ,niv buchbinder,Not available,2010.0,10.1007/978-3-642-17572-5_9,Internet and Network Economics,Niv2010,False,,Springer,Not available,Incentives in Online Auctions via Linear Programming,0c5d1b01217ee81ed3843c69cbedf3ef,http://dx.doi.org/10.1007/978-3-642-17572-5_9 1195,Online auctions in which items are sold in an online fashion with little knowledge about future bids are common in the internet environment. We study here a problem in which an auctioneer would like to sell a single item say a car. A bidder may make a bid for the item at any time but expects an immediate irrevocable decision. The goal of the auctioneer is to maximize her revenue in this uncertain environment. Under some reasonable assumptions it has been observed that the online auction problem has strong connections to the classical secretary problem in which an employer would like to choose the best candidate among ,kamal jain,Not available,2010.0,10.1007/978-3-642-17572-5_9,Internet and Network Economics,Niv2010,False,,Springer,Not available,Incentives in Online Auctions via Linear Programming,0c5d1b01217ee81ed3843c69cbedf3ef,http://dx.doi.org/10.1007/978-3-642-17572-5_9 1196,Online auctions in which items are sold in an online fashion with little knowledge about future bids are common in the internet environment. We study here a problem in which an auctioneer would like to sell a single item say a car. A bidder may make a bid for the item at any time but expects an immediate irrevocable decision. The goal of the auctioneer is to maximize her revenue in this uncertain environment. Under some reasonable assumptions it has been observed that the online auction problem has strong connections to the classical secretary problem in which an employer would like to choose the best candidate among ,mohit singh,Not available,2010.0,10.1007/978-3-642-17572-5_9,Internet and Network Economics,Niv2010,False,,Springer,Not available,Incentives in Online Auctions via Linear Programming,0c5d1b01217ee81ed3843c69cbedf3ef,http://dx.doi.org/10.1007/978-3-642-17572-5_9 1197,We extend the Coase conjecture to the case of a seller with a single object who faces ,flavio menezes,Not available,2009.0,10.1007/s00182-009-0164-7,International Journal of Game Theory,M.2009,False,,Springer,Not available,Coasian dynamics in repeated English auctions,0e59e939f1adf0da36eb877227973326,http://dx.doi.org/10.1007/s00182-009-0164-7 1198,We extend the Coase conjecture to the case of a seller with a single object who faces ,matthew ryan,Not available,2009.0,10.1007/s00182-009-0164-7,International Journal of Game Theory,M.2009,False,,Springer,Not available,Coasian dynamics in repeated English auctions,0e59e939f1adf0da36eb877227973326,http://dx.doi.org/10.1007/s00182-009-0164-7 1199,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,silva de,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 1200,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,thomas jeitschko,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 1201,In many procurement auctions bidders do not know how many rivals they face at the time that they incur the cost of preparing their bids. We show in a theoretical model that regardless of whether the procurement is characterized by private or by common values an increase in the potential number of bidders may lead to higher procurement costs. This raises potential policy questions of whether and how entry should be encouraged or limited in public procurement auctions. We use evidence from auctions of construction contracts to estimate the effect of an increase in the pool of potential bidders on entry and auction prices when entry and bidding decisions are made sequentially with no knowledge of the number or identity of the actual competitors.,georgia kosmopoulou,Not available,2009.0,10.1007/s11151-009-9223-2,Review of Industrial Organization,G.2009,False,,Springer,Not available,Entry and Bidding in Common and Private Value Auctions with an Unknown Number of Rivals,fe765375eb3a1e8c83b008592f9deb69,http://dx.doi.org/10.1007/s11151-009-9223-2 1202,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,utpal dholakia,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1203,The ,yu-an sun,Not available,2009.0,10.1007/s10614-009-9169-3,Computational Economics,Yu-An2009,False,,Springer,Not available,Auctions and Differential Pricing: Optimal Seller and Bidder Strategies in Second-chance Offers,a16ed44bb1628aa24e45b2b7472dd06c,http://dx.doi.org/10.1007/s10614-009-9169-3 1204,The ,poorvi vora,Not available,2009.0,10.1007/s10614-009-9169-3,Computational Economics,Yu-An2009,False,,Springer,Not available,Auctions and Differential Pricing: Optimal Seller and Bidder Strategies in Second-chance Offers,a16ed44bb1628aa24e45b2b7472dd06c,http://dx.doi.org/10.1007/s10614-009-9169-3 1205,This paper characterizes the Nash equilibrium in a pay-as-bid (discriminatory) divisible-good procurement auction. Demand by the auctioneer is uncertain as in the supply function equilibrium model. A closed form expression is derived for a one shot game. Existence of an equilibrium is ensured if the hazard rate of the demand distribution is monotonically decreasing with respect to the shock outcome and sellers have non-decreasing marginal costs. Multiple equilibria can be ruled out for markets for which the auctioneer’s demand exceeds suppliers’ capacity with a positive probability. The derived equilibrium can be used to model strategic bidding behavior in pay-as-bid electricity auctions such as the balancing mechanism of United Kingdom. Offer curves and mark-ups of the derived equilibrium are compared to results for the SFE of a uniform-price auction.,par holmberg,Not available,2009.0,10.1007/s11149-009-9091-6,Journal of Regulatory Economics,Pär2009,False,,Springer,Not available,Supply function equilibria of pay-as-bid auctions,a30fa61380877627977bbd4f369802c0,http://dx.doi.org/10.1007/s11149-009-9091-6 1206,Zheng has proposed a seller-optimal auction for (asymmetric) independent-private-value environments where inter-bidder resale is possible. Zheng’s construction requires novel assumptions—Resale Monotonicity Transitivity and Invariance—on the bidders’ value distribution profile. The only known examples of distribution profiles satisfying these assumptions in environments with three or more bidders are uniform distributions. Using inverse virtual valuation functions as a novel tool we characterize the set of distribution profiles satisfying Zheng’s assumptions. Our characterization result shows that the assumptions while being strong are satisfied by many non-uniform distribution profiles. Hence Zheng’s result applies more generally than one may have thought before. A crucial step in our analysis is to show that Invariance implies Resale Monotonicity and Transitivity.,tymofiy mylovanov,Not available,2009.0,10.1007/s00199-008-0383-3,Economic Theory,Tymofiy2009,False,,Springer,Not available,Optimal auction with resale—a characterization of the conditions,2c0c1db15868068d8d7129afb40eeb0d,http://dx.doi.org/10.1007/s00199-008-0383-3 1207,Zheng has proposed a seller-optimal auction for (asymmetric) independent-private-value environments where inter-bidder resale is possible. Zheng’s construction requires novel assumptions—Resale Monotonicity Transitivity and Invariance—on the bidders’ value distribution profile. The only known examples of distribution profiles satisfying these assumptions in environments with three or more bidders are uniform distributions. Using inverse virtual valuation functions as a novel tool we characterize the set of distribution profiles satisfying Zheng’s assumptions. Our characterization result shows that the assumptions while being strong are satisfied by many non-uniform distribution profiles. Hence Zheng’s result applies more generally than one may have thought before. A crucial step in our analysis is to show that Invariance implies Resale Monotonicity and Transitivity.,thomas troger,Not available,2009.0,10.1007/s00199-008-0383-3,Economic Theory,Tymofiy2009,False,,Springer,Not available,Optimal auction with resale—a characterization of the conditions,2c0c1db15868068d8d7129afb40eeb0d,http://dx.doi.org/10.1007/s00199-008-0383-3 1208,Consider an estimate of the common value of an auctioned asset that is symmetric in the bidders’ types. Such an estimate can be represented solely in terms of the order statistics of those types. This representation forms the basis for a pricing rule yielding truthful bidding as an equilibrium whether bidders’ types are affiliated or independent. We highlight the link between the estimator and full surplus extraction providing a ,vlad mares,Not available,2007.0,10.1007/s00199-006-0123-5,Economic Theory,Vlad2007,False,,Springer,Not available,Ex-post full surplus extraction straightforwardly,def5939fe510cf6ff60aea2104952432,http://dx.doi.org/10.1007/s00199-006-0123-5 1209,Consider an estimate of the common value of an auctioned asset that is symmetric in the bidders’ types. Such an estimate can be represented solely in terms of the order statistics of those types. This representation forms the basis for a pricing rule yielding truthful bidding as an equilibrium whether bidders’ types are affiliated or independent. We highlight the link between the estimator and full surplus extraction providing a ,ronald harstad,Not available,2007.0,10.1007/s00199-006-0123-5,Economic Theory,Vlad2007,False,,Springer,Not available,Ex-post full surplus extraction straightforwardly,def5939fe510cf6ff60aea2104952432,http://dx.doi.org/10.1007/s00199-006-0123-5 1210,The PRC and Taiwan are competing to gain diplomatic recognition from Pacific Islands states a number of which recognise Taiwan and serve as a barrier to its international isolation. Since much of Oceania is in Australia’s sphere of influence this struggle has often involved Canberra. This paper focuses on the intensifying conflict–with conclusions about the local political economic situations of the countries in Oceania that are most likely to switch recognition the dilemmas that the issue poses for Australia and its alliance with the US and the game theory of these auctions of diplomatic recognition. The rental of recognition is analysed as a “sovereignty business” in which some Pacific Islands states engage—similar to the offshore financial centres which are prevalent in the region.,anthony fossen,Not available,2007.0,10.1007/s11366-007-9008-0,Journal of Chinese Political Science,Anthony2007,False,,Springer,Not available,The Struggle for Recognition: Diplomatic Competition Between China and Taiwan in Oceania,957763e6c7add5e2e913980d8ef49466,http://dx.doi.org/10.1007/s11366-007-9008-0 1211,A number of recent papers in environmental economics have focused on the process of researching preferences – agents are uncertain about preferences but with effort may narrow their uncertainty. This issue has arisen in formulating bids in contingent valuation (CV) as well as the debate over the divergence between WTP and WTA. In the context of CV it has been suggested that the hypothetical nature of the preference elicitation process biases responses. This paper provides both a theoretical model and experimental evidence to contribute to this debate. The model is a model of competitive bidding for a private good with two components that are particularly relevant to the debate. The first component is that bidders are unsure of their own value for the private good but may purchase information about their own value (researching preferences). The second component is that there is a probability that the auction is hypothetical – that the winning bidder will not get the private good and will not pay the winning bid. The experiment tests this theoretical model of bidding equilibrium and analyzes the effects of variations in the parameters (hypotheticalness information costs and number of agents) on the endogenous variables (such as the proportion of bidders who become informed and the winning bid). Experimental results suggest that an increase in the hypotheticalness of an auction tends to decrease the likelihood that bidders pay for information on their valuation with an ambiguous effect on the winning bid.,rolando guzman,Not available,2007.0,10.1007/s10640-006-9034-y,Environmental and Resource Economics,M.2007,False,,Springer,Not available,Researching Preferences Valuation and Hypothetical Bias,1e439b76af266f48af99203343187415,http://dx.doi.org/10.1007/s10640-006-9034-y 1212,A number of recent papers in environmental economics have focused on the process of researching preferences – agents are uncertain about preferences but with effort may narrow their uncertainty. This issue has arisen in formulating bids in contingent valuation (CV) as well as the debate over the divergence between WTP and WTA. In the context of CV it has been suggested that the hypothetical nature of the preference elicitation process biases responses. This paper provides both a theoretical model and experimental evidence to contribute to this debate. The model is a model of competitive bidding for a private good with two components that are particularly relevant to the debate. The first component is that bidders are unsure of their own value for the private good but may purchase information about their own value (researching preferences). The second component is that there is a probability that the auction is hypothetical – that the winning bidder will not get the private good and will not pay the winning bid. The experiment tests this theoretical model of bidding equilibrium and analyzes the effects of variations in the parameters (hypotheticalness information costs and number of agents) on the endogenous variables (such as the proportion of bidders who become informed and the winning bid). Experimental results suggest that an increase in the hypotheticalness of an auction tends to decrease the likelihood that bidders pay for information on their valuation with an ambiguous effect on the winning bid.,charles kolstad,Not available,2007.0,10.1007/s10640-006-9034-y,Environmental and Resource Economics,M.2007,False,,Springer,Not available,Researching Preferences Valuation and Hypothetical Bias,1e439b76af266f48af99203343187415,http://dx.doi.org/10.1007/s10640-006-9034-y 1213,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,eric greenleaf,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1214,Heath and Tversky (1991 ,carmela mauro,Not available,2007.0,10.1007/s11238-007-9051-5,Theory and Decision,Carmela2007,False,,Springer,Not available,Uncertainty Aversion Vs. Competence: An Experimental Market Study,bbe4c61d7e73373489260ecc1c978b78,http://dx.doi.org/10.1007/s11238-007-9051-5 1215,If valuations are interdependent and agents observe their own allocation payoffs then two-stage revelation mechanisms expand the set of implementable decision functions. In a two-stage revelation mechanism agents report twice. In the first stage - before the allocation is decided - they report their private signals. In the second stage - after the allocation has been made but before final transfers are decided - they report their payoffs from the allocation. Conditions are provided under which an uninformed seller can extract (or virtually extract) the full surplus from a sale to privately informed buyers in spite of the buyers’ signals being independent random variables.,claudio mezzetti,Not available,2007.0,10.1007/s00199-006-0104-8,Economic Theory,Claudio2007,False,,Springer,Not available,Mechanism Design with Interdependent Valuations: Surplus Extraction,26eb2fa654f4ee1df49d5d5b77205074,http://dx.doi.org/10.1007/s00199-006-0104-8 1216,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,david grether,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 1217,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,charles plott,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 1218,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,daniel rowe,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 1219,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,martin sereno,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 1220,This study is the first to attempt to isolate a relationship between cognitive activity and equilibration to a Nash Equilibrium. Subjects while undergoing fMRI scans of brain activity participated in second price auctions against a single competitor following predetermined strategy that was unknown to the subject. For this auction there is a unique strategy that will maximize the subjects’ earnings which is also a Nash equilibrium of the associated game theoretic model of the auction. As is the case with all games the bidding strategies of subjects participating in second price auctions most often do not reflect the equilibrium bidding strategy at first but with experience typically exhibit a process of equilibration or convergence toward the equilibrium. This research is focused on the process of convergence.In the data reported here subjects participated in sixteen auctions after which all subjects were told the strategy that will maximize their revenues the theoretical equilibrium. Following that announcement sixteen more auctions were performed. The question posed by the research concerns the mental activity that might accompany equilibration as it is observed in the bidding behavior. Does brain activation differ between being equilibrated and non-equilibrated in the sense of a bidding strategy? If so are their differences in the location of activation during and after equilibration? We found significant activation in the frontal pole especially in Brodmann’s area 10 the anterior cingulate cortex the amygdala and the basal forebrain. There was significantly more activation in the basal forebrain and the anterior cingulate cortex during the first sixteen auctions than in the second sixteen. The activity in the amygdala shifted from the right side to the left after the solution was given.,john allman,Not available,2007.0,10.1007/s10683-006-9135-z,Experimental Economics,M.2007,False,,Springer,Not available,Mental processes and strategic equilibration: An fMRI study of selling strategies in second price auctions,922e29b22a86c00bddab4285aea50594,http://dx.doi.org/10.1007/s10683-006-9135-z 1221,There is much active research into the design of automated bidding agents particularly for environments that involve multiple decoupled auctions. These settings are complex partly because an agent’s strategy depends on information about other bidders’interests. When bidders’ valuation distributions are not known ,albert jiang,Not available,2007.0,10.1007/s10994-006-0477-8,Machine Learning,Xin2007,False,,Springer,Not available,Bidding agents for online auctions with hidden bids,41312d057a62cf9b3ae3be470e7e5f9d,http://dx.doi.org/10.1007/s10994-006-0477-8 1222,There is much active research into the design of automated bidding agents particularly for environments that involve multiple decoupled auctions. These settings are complex partly because an agent’s strategy depends on information about other bidders’interests. When bidders’ valuation distributions are not known ,kevin leyton-brown,Not available,2007.0,10.1007/s10994-006-0477-8,Machine Learning,Xin2007,False,,Springer,Not available,Bidding agents for online auctions with hidden bids,41312d057a62cf9b3ae3be470e7e5f9d,http://dx.doi.org/10.1007/s10994-006-0477-8 1223,Bidders who receive both “common-value” and “private-value” signals about the value of an auction prize cannot fully infer their opponents’ information from the bidding. So bidders may overestimate the value of the prize and subsequently regret winning. When multiple objects are on sale bidding in an auction provides information relevant to the other auctions and sequential auctions are more vulnerable to overpayment and winners’ regret than are simultaneous auctions. With information inequality among bidders the seller’s revenue is influenced by two contrasting effects. On the one hand simultaneous auctions reduce the winner’s curse of less informed bidders and allow them to bid more aggressively. On the other hand sequential auctions induce less informed bidders to bid more aggressively in early auctions to acquire information.,marco pagnozzi,Not available,2007.0,10.1007/s11151-007-9133-0,Review of Industrial Organization,Marco2007,False,,Springer,Not available,Sorry Winners,883b1d31d158e6def1ed219087b49845,http://dx.doi.org/10.1007/s11151-007-9133-0 1224,Within the common-value paradigm I examine the magnitude of the differencein expected outcome between first-price and second-price sealed-bid auctions.I limit myself to two empirical specifications of bidders' signals: Weibulland normal distribution. The optimal bid functions and the expected procurer'scost under both auction formats are derived. Simultions are undertaken toanalyze the impact that random draws of signals have on the differences inoutcome from the two auction formats. Using estimates from structuralestimation in previous empirical work on first-price auction data whereWeibull and normal distributions of signals have been applied thehypothetical expected gain from switching from a first-price sealed-bidauction to a second-price sealed-bid auction mechanism is computed.,anders lunander,Not available,2002.0,10.1023/A:1015008130780,Computational Economics,Anders2002,False,,Springer,Not available,Procurement Bidding in First-Price and Second-Price Sealed-Bid Auctions within the Common-Value Paradigm,11564b52a9e55f277a86b38eb539c7fa,http://dx.doi.org/10.1023/A:1015008130780 1225,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,amit pazgal,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1226,This note uses the Theorem of the Alternative to prove new results on the implementability of general asymmetric auctions and to provide simpler proofs of known results for symmetric auctions. The tradeoff is that type spaces are taken to be finite.,kim border,Not available,2007.0,10.1007/s00199-006-0080-z,Economic Theory,C.2007,False,,Springer,Not available,Reduced Form Auctions Revisited,cea674b7143ff0bba187aa3885641f2a,http://dx.doi.org/10.1007/s00199-006-0080-z 1227,We consider a multi-project scheduling problem where each project is composed of a set of activities with precedence relations requiring specific amounts of local and shared (among projects) resources. The aim is to complete all the project activities satisfying precedence and resource constraints and minimizing each project schedule length. The decision making process is supposed to be decentralized with as many local decision makers as the projects. A multi-agent system model and an iterative combinatorial auction mechanism for the agent coordination are proposed. We provide a dynamic programming formulation for the combinatorial auction problem and heuristic algorithms for both the combinatorial auction and the bidding process. An experimental analysis on the whole multi-agent system model is discussed.,giuseppe confessore,Not available,2007.0,10.1007/s10479-006-0158-9,Annals of Operations Research,Giuseppe2007,False,,Springer,Not available,A market-based multi-agent system model for decentralized multi-project scheduling,9071b7498fcb2905d00b7a682949133d,http://dx.doi.org/10.1007/s10479-006-0158-9 1228,We consider a multi-project scheduling problem where each project is composed of a set of activities with precedence relations requiring specific amounts of local and shared (among projects) resources. The aim is to complete all the project activities satisfying precedence and resource constraints and minimizing each project schedule length. The decision making process is supposed to be decentralized with as many local decision makers as the projects. A multi-agent system model and an iterative combinatorial auction mechanism for the agent coordination are proposed. We provide a dynamic programming formulation for the combinatorial auction problem and heuristic algorithms for both the combinatorial auction and the bidding process. An experimental analysis on the whole multi-agent system model is discussed.,stefano giordani,Not available,2007.0,10.1007/s10479-006-0158-9,Annals of Operations Research,Giuseppe2007,False,,Springer,Not available,A market-based multi-agent system model for decentralized multi-project scheduling,9071b7498fcb2905d00b7a682949133d,http://dx.doi.org/10.1007/s10479-006-0158-9 1229,We consider a multi-project scheduling problem where each project is composed of a set of activities with precedence relations requiring specific amounts of local and shared (among projects) resources. The aim is to complete all the project activities satisfying precedence and resource constraints and minimizing each project schedule length. The decision making process is supposed to be decentralized with as many local decision makers as the projects. A multi-agent system model and an iterative combinatorial auction mechanism for the agent coordination are proposed. We provide a dynamic programming formulation for the combinatorial auction problem and heuristic algorithms for both the combinatorial auction and the bidding process. An experimental analysis on the whole multi-agent system model is discussed.,silvia rismondo,Not available,2007.0,10.1007/s10479-006-0158-9,Annals of Operations Research,Giuseppe2007,False,,Springer,Not available,A market-based multi-agent system model for decentralized multi-project scheduling,9071b7498fcb2905d00b7a682949133d,http://dx.doi.org/10.1007/s10479-006-0158-9 1230,Standard auctions are known to be a revenue-maximizing way to sell an object under broad conditions when buyers are symmetric and have independent private valuations. We show that when buyers have interdependent valuations auctions may lose their advantage even if symmetry and independence of information are maintained. In particular simple alternative selling mechanisms that sometimes allow a buyer who does not have the highest valuation to win the object will in general increase all buyers’ willingness to pay possibly enough to offset the loss to the seller of not always selling to the buyer with the greatest willingness to pay.,colin campbell,Not available,2006.0,10.1007/s00199-004-0558-5,Economic Theory,M.2006,False,,Springer,Not available,When and why not to auction,b7f6974e7f020a4dfdf7e877a84a8a0a,http://dx.doi.org/10.1007/s00199-004-0558-5 1231,Standard auctions are known to be a revenue-maximizing way to sell an object under broad conditions when buyers are symmetric and have independent private valuations. We show that when buyers have interdependent valuations auctions may lose their advantage even if symmetry and independence of information are maintained. In particular simple alternative selling mechanisms that sometimes allow a buyer who does not have the highest valuation to win the object will in general increase all buyers’ willingness to pay possibly enough to offset the loss to the seller of not always selling to the buyer with the greatest willingness to pay.,dan levin,Not available,2006.0,10.1007/s00199-004-0558-5,Economic Theory,M.2006,False,,Springer,Not available,When and why not to auction,b7f6974e7f020a4dfdf7e877a84a8a0a,http://dx.doi.org/10.1007/s00199-004-0558-5 1232,We analyze a private and independent valuation first-price auction under the assumption that one of the bidders’ valuations is common knowledge. We show that no pure strategy equilibrium exists and we characterize a mixed strategy equilibrium in which the bidder whose valuation is common knowledge randomizes her bid while the other bidders play pure strategies. In an example with the uniform distribution we compare the expected profits of seller and buyers in this auction with those in a standard symmetric private valuation model.,irene martinez-pardina,Not available,2006.0,10.1007/s10058-006-0003-2,Review of Economic Design,Irene2006,False,,Springer,Not available,First-price auctions where one of the bidders’ valuations is common knowledge,5637083ae094ec38662868139051b208,http://dx.doi.org/10.1007/s10058-006-0003-2 1233,We study a variation of Myerson’s (1981) model in which we allow for uncertainty about the number of bidders. In our set-up an appropriate reserve price in a standard auction maximizes the auctioneer’s expected revenue. However entry fees can be optimal only under some special conditions. Basically there must be some homogeneity in bidders’ beliefs about the number of bidders and the auctioneer must know to some extent these beliefs.,angel hernando-veciana,Not available,2006.0,10.1007/s10058-006-0001-4,Review of Economic Design,Ángel2006,False,,Springer,Not available,On the Sub-optimality of Entry Fees in Auctions With Entry,d4824805dc66cd35bbcd57dcd98facc5,http://dx.doi.org/10.1007/s10058-006-0001-4 1234,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,gian albano,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 1235,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,fabrizio germano,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 1236,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,michael rothkopf,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1237,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,stefano lovo,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 1238,In a classical result Milgrom (1981a) established that the Monotone Likelihood Ratio Property (MLRP) is a sufficient condition for the existence of an increasing symmetric equilibrium in (,ilia tsetlin,Not available,2006.0,10.1007/s10058-006-0005-0,Review of Economic Design,Ilia2006,False,,Springer,Not available,On the existence of an increasing symmetric equilibrium in (,2df89040ac9aa18f0cb3876119041d92,http://dx.doi.org/10.1007/s10058-006-0005-0 1239,In a classical result Milgrom (1981a) established that the Monotone Likelihood Ratio Property (MLRP) is a sufficient condition for the existence of an increasing symmetric equilibrium in (,aleksandar pekec,Not available,2006.0,10.1007/s10058-006-0005-0,Review of Economic Design,Ilia2006,False,,Springer,Not available,On the existence of an increasing symmetric equilibrium in (,2df89040ac9aa18f0cb3876119041d92,http://dx.doi.org/10.1007/s10058-006-0005-0 1240,Auctions which are applicable to aid-related procurement systems have been recently recognized as an important tool for improving economic efficiency. Using data on procurement auctions for Japanese official development assistance projects the equilibrium bid function is estimated. The data reveals that a 1% increase in the number of bidders decreases the equilibrium bid by about 0.2%. This implies that strengthening competition at procurement auctions lowers contract prices and mitigates the heavy indebtedness of developing countries. Auctions are also instrumental in fostering local business environment and governance. For intensifying bidding competition it is useful to introduce an electronic bidding system encourage local firms to jointly bid and relax excessive qualification requirements.,atsushi iimi,Not available,2006.0,10.1007/s11151-006-0012-x,Review of Industrial Organization,Atsushi2006,False,,Springer,Not available,Auction Reforms for Effective Official Development Assistance,8611753d72fa376d9b3876be8fdc3378,http://dx.doi.org/10.1007/s11151-006-0012-x 1241,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,hai yu,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 1242,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,shouyang wang,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 1243,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,chuangyin dang,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 1244,The paper deals with behaviour of trading agents with the lowest level of bounded rationality on an electronic market where the double auction is applied as a trading mechanism. Two types of double auction have been considered: the clearing house and the continuous double auction. The agent behaviour is modelled using business strategies based on adaptive learning algorithms and imitation which is governed by replicator dynamics from evolutionary game theory. A case study describing optical bandwidth trading on the double auction electronic market is analyzed.,krunoslav trzec,Not available,2006.0,10.1007/11892960_39,Knowledge-Based Intelligent Information and Engineering Systems,Krunoslav2006,False,,Springer,Not available,Agent Behaviour in Double Auction Electronic Market for Communication Resources,dfb237e65581551757ec98995648ad42,http://dx.doi.org/10.1007/11892960_39 1245,The paper deals with behaviour of trading agents with the lowest level of bounded rationality on an electronic market where the double auction is applied as a trading mechanism. Two types of double auction have been considered: the clearing house and the continuous double auction. The agent behaviour is modelled using business strategies based on adaptive learning algorithms and imitation which is governed by replicator dynamics from evolutionary game theory. A case study describing optical bandwidth trading on the double auction electronic market is analyzed.,ignac lovrek,Not available,2006.0,10.1007/11892960_39,Knowledge-Based Intelligent Information and Engineering Systems,Krunoslav2006,False,,Springer,Not available,Agent Behaviour in Double Auction Electronic Market for Communication Resources,dfb237e65581551757ec98995648ad42,http://dx.doi.org/10.1007/11892960_39 1246,The paper deals with behaviour of trading agents with the lowest level of bounded rationality on an electronic market where the double auction is applied as a trading mechanism. Two types of double auction have been considered: the clearing house and the continuous double auction. The agent behaviour is modelled using business strategies based on adaptive learning algorithms and imitation which is governed by replicator dynamics from evolutionary game theory. A case study describing optical bandwidth trading on the double auction electronic market is analyzed.,branko mikac,Not available,2006.0,10.1007/11892960_39,Knowledge-Based Intelligent Information and Engineering Systems,Krunoslav2006,False,,Springer,Not available,Agent Behaviour in Double Auction Electronic Market for Communication Resources,dfb237e65581551757ec98995648ad42,http://dx.doi.org/10.1007/11892960_39 1247,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,michael shen,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1248,We derive a polynomial time algorithm to compute a stable solution in a mixed matching market from an auction procedure as presented by Eriksson and Karlander [5]. As a special case we derive an ,winfried hochstattler,Not available,2006.0,10.1007/11775096_36,Algorithmic Aspects in Information and Management,Winfried2006,False,,Springer,Not available,Note on an Auction Procedure for a Matching Game in Polynomial Time,97dba1b9650265a0ecd0522e0f5cd4c7,http://dx.doi.org/10.1007/11775096_36 1249,We derive a polynomial time algorithm to compute a stable solution in a mixed matching market from an auction procedure as presented by Eriksson and Karlander [5]. As a special case we derive an ,hui jin,Not available,2006.0,10.1007/11775096_36,Algorithmic Aspects in Information and Management,Winfried2006,False,,Springer,Not available,Note on an Auction Procedure for a Matching Game in Polynomial Time,97dba1b9650265a0ecd0522e0f5cd4c7,http://dx.doi.org/10.1007/11775096_36 1250,We derive a polynomial time algorithm to compute a stable solution in a mixed matching market from an auction procedure as presented by Eriksson and Karlander [5]. As a special case we derive an ,robert nickel,Not available,2006.0,10.1007/11775096_36,Algorithmic Aspects in Information and Management,Winfried2006,False,,Springer,Not available,Note on an Auction Procedure for a Matching Game in Polynomial Time,97dba1b9650265a0ecd0522e0f5cd4c7,http://dx.doi.org/10.1007/11775096_36 1251,We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets in terms of allocative efficiency price convergence and emergence or not of Nash equilibriums. In previous works agents have a fixed bidding strategy during the auction usually under symmetric environments. In our simulations we allow the soft-agents to learn not only about how much they should bid or offer but also about possible switching between the alternative strategies. We examine the behaviour of strategic traders under general supply and demand schedules (asymmetric environments) thus extending previous results.The results clarify the limitations and the scope of Gode and Sunder conjecture and related recent works and show the emergence of Hayeks and A. Smith endogenous order. Institutions matter and so does intelligence as far as the rate of convergence and agents surplus is concerned. These results are of importance in the design and performance of auctions in the real world and in the applications of auction theory to many problems in management and production far beyond market design (market oriented programming).,marta posada,Not available,2006.0,10.1007/3-540-37249-0_3,Advances in Artificial Economics,Marta2006,False,,Springer,Not available,Strategic Behaviour in Continuous Double Auction,2c5d9461dfd3335a4744104a22892761,http://dx.doi.org/10.1007/3-540-37249-0_3 1252,We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets in terms of allocative efficiency price convergence and emergence or not of Nash equilibriums. In previous works agents have a fixed bidding strategy during the auction usually under symmetric environments. In our simulations we allow the soft-agents to learn not only about how much they should bid or offer but also about possible switching between the alternative strategies. We examine the behaviour of strategic traders under general supply and demand schedules (asymmetric environments) thus extending previous results.The results clarify the limitations and the scope of Gode and Sunder conjecture and related recent works and show the emergence of Hayeks and A. Smith endogenous order. Institutions matter and so does intelligence as far as the rate of convergence and agents surplus is concerned. These results are of importance in the design and performance of auctions in the real world and in the applications of auction theory to many problems in management and production far beyond market design (market oriented programming).,cesareo hernandez,Not available,2006.0,10.1007/3-540-37249-0_3,Advances in Artificial Economics,Marta2006,False,,Springer,Not available,Strategic Behaviour in Continuous Double Auction,2c5d9461dfd3335a4744104a22892761,http://dx.doi.org/10.1007/3-540-37249-0_3 1253,We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets in terms of allocative efficiency price convergence and emergence or not of Nash equilibriums. In previous works agents have a fixed bidding strategy during the auction usually under symmetric environments. In our simulations we allow the soft-agents to learn not only about how much they should bid or offer but also about possible switching between the alternative strategies. We examine the behaviour of strategic traders under general supply and demand schedules (asymmetric environments) thus extending previous results.The results clarify the limitations and the scope of Gode and Sunder conjecture and related recent works and show the emergence of Hayeks and A. Smith endogenous order. Institutions matter and so does intelligence as far as the rate of convergence and agents surplus is concerned. These results are of importance in the design and performance of auctions in the real world and in the applications of auction theory to many problems in management and production far beyond market design (market oriented programming).,adolfo lopez-paredes,Not available,2006.0,10.1007/3-540-37249-0_3,Advances in Artificial Economics,Marta2006,False,,Springer,Not available,Strategic Behaviour in Continuous Double Auction,2c5d9461dfd3335a4744104a22892761,http://dx.doi.org/10.1007/3-540-37249-0_3 1254,In cognitive radio networks service providers with spare channels can sell the spectrum to those in need of them. The redistribution of the spectrum among service providers reduces the waste of spare spectrum therefore enhances the spectrum utilization. It also provides the service provider more revenue from the sail of spectrum. Traditional method of spectrum trading mainly based on double auction which requires an auctioneer is a trustworthy third-party authority to centrally enforce a certain spectrum allocation policy. In this chapter we take a different and new perspective proposing to use matching as an alternative tool to realize spectrum trading in a distributed way for a free market which consists of only buyers and sellers without a trustworthy third-party authority. In this chapter we will first give a brief introduction of the whole chapter in the first section and then present the fundamentals of the matching theory in the second section. In the third section matching theory is leveraged in spectrum trading among service providers to decide the spectrum allocation and trading price the distinctive challenge of spectrum matching compared with conventional matching is analyzed and a two-stage distributed algorithm is proposed to solve the spectrum matching problem. In the fourth section we considered a more general case where multiple channels can be bought by the same service provider and the spectrum matching algorithm for combinatorial spectrum trading is proposed to enable the spectrum allocation. For both algorithms the proposed algorithm can achieve a Nash-stable matching and the simulation shows that the proposed algorithms achieve good performance compared with centralized schemes.,jin zhang,Not available,2017.0,10.1007/978-981-10-1389-8_40-1,Handbook of Cognitive Radio,Jin2017,False,,Springer,Not available,Many-to-Many Matching for Distributed Spectrum Trading,884ce701c11ab0d99357a6e80db362fe,http://dx.doi.org/10.1007/978-981-10-1389-8_40-1 1255,In cognitive radio networks service providers with spare channels can sell the spectrum to those in need of them. The redistribution of the spectrum among service providers reduces the waste of spare spectrum therefore enhances the spectrum utilization. It also provides the service provider more revenue from the sail of spectrum. Traditional method of spectrum trading mainly based on double auction which requires an auctioneer is a trustworthy third-party authority to centrally enforce a certain spectrum allocation policy. In this chapter we take a different and new perspective proposing to use matching as an alternative tool to realize spectrum trading in a distributed way for a free market which consists of only buyers and sellers without a trustworthy third-party authority. In this chapter we will first give a brief introduction of the whole chapter in the first section and then present the fundamentals of the matching theory in the second section. In the third section matching theory is leveraged in spectrum trading among service providers to decide the spectrum allocation and trading price the distinctive challenge of spectrum matching compared with conventional matching is analyzed and a two-stage distributed algorithm is proposed to solve the spectrum matching problem. In the fourth section we considered a more general case where multiple channels can be bought by the same service provider and the spectrum matching algorithm for combinatorial spectrum trading is proposed to enable the spectrum allocation. For both algorithms the proposed algorithm can achieve a Nash-stable matching and the simulation shows that the proposed algorithms achieve good performance compared with centralized schemes.,linshan jiang,Not available,2017.0,10.1007/978-981-10-1389-8_40-1,Handbook of Cognitive Radio,Jin2017,False,,Springer,Not available,Many-to-Many Matching for Distributed Spectrum Trading,884ce701c11ab0d99357a6e80db362fe,http://dx.doi.org/10.1007/978-981-10-1389-8_40-1 1256,In cognitive radio networks service providers with spare channels can sell the spectrum to those in need of them. The redistribution of the spectrum among service providers reduces the waste of spare spectrum therefore enhances the spectrum utilization. It also provides the service provider more revenue from the sail of spectrum. Traditional method of spectrum trading mainly based on double auction which requires an auctioneer is a trustworthy third-party authority to centrally enforce a certain spectrum allocation policy. In this chapter we take a different and new perspective proposing to use matching as an alternative tool to realize spectrum trading in a distributed way for a free market which consists of only buyers and sellers without a trustworthy third-party authority. In this chapter we will first give a brief introduction of the whole chapter in the first section and then present the fundamentals of the matching theory in the second section. In the third section matching theory is leveraged in spectrum trading among service providers to decide the spectrum allocation and trading price the distinctive challenge of spectrum matching compared with conventional matching is analyzed and a two-stage distributed algorithm is proposed to solve the spectrum matching problem. In the fourth section we considered a more general case where multiple channels can be bought by the same service provider and the spectrum matching algorithm for combinatorial spectrum trading is proposed to enable the spectrum allocation. For both algorithms the proposed algorithm can achieve a Nash-stable matching and the simulation shows that the proposed algorithms achieve good performance compared with centralized schemes.,haofan cai,Not available,2017.0,10.1007/978-981-10-1389-8_40-1,Handbook of Cognitive Radio,Jin2017,False,,Springer,Not available,Many-to-Many Matching for Distributed Spectrum Trading,884ce701c11ab0d99357a6e80db362fe,http://dx.doi.org/10.1007/978-981-10-1389-8_40-1 1257,In cognitive radio networks service providers with spare channels can sell the spectrum to those in need of them. The redistribution of the spectrum among service providers reduces the waste of spare spectrum therefore enhances the spectrum utilization. It also provides the service provider more revenue from the sail of spectrum. Traditional method of spectrum trading mainly based on double auction which requires an auctioneer is a trustworthy third-party authority to centrally enforce a certain spectrum allocation policy. In this chapter we take a different and new perspective proposing to use matching as an alternative tool to realize spectrum trading in a distributed way for a free market which consists of only buyers and sellers without a trustworthy third-party authority. In this chapter we will first give a brief introduction of the whole chapter in the first section and then present the fundamentals of the matching theory in the second section. In the third section matching theory is leveraged in spectrum trading among service providers to decide the spectrum allocation and trading price the distinctive challenge of spectrum matching compared with conventional matching is analyzed and a two-stage distributed algorithm is proposed to solve the spectrum matching problem. In the fourth section we considered a more general case where multiple channels can be bought by the same service provider and the spectrum matching algorithm for combinatorial spectrum trading is proposed to enable the spectrum allocation. For both algorithms the proposed algorithm can achieve a Nash-stable matching and the simulation shows that the proposed algorithms achieve good performance compared with centralized schemes.,yanjiao chen,Not available,2017.0,10.1007/978-981-10-1389-8_40-1,Handbook of Cognitive Radio,Jin2017,False,,Springer,Not available,Many-to-Many Matching for Distributed Spectrum Trading,884ce701c11ab0d99357a6e80db362fe,http://dx.doi.org/10.1007/978-981-10-1389-8_40-1 1258,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,shyam sunder,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1259,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,saburo saito,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1260,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,mamoru imanishi,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1261,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,kosuke yamashiro,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1262,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,masakuni iwami,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1263,An allocation mechanism is a function mapping agents’ preferences into allocations. Each agent’s preferences however are private to himself so in reporting them he can misrepresent them if that achieves a more preferable allocation. A strategy-proof allocation mechanism eliminates incentives to misrepresent: each agent no matter what his preferences are and no matter what preferences other agents report maximizes by reporting his preferences truthfully. While the Gibbard-Satterthwaite theorem establishes that no useful strategy-proof allocation mechanisms exist in general useful ones do exist for a number of specific economically important classes of allocation problems.,mark satterthwaite,Not available,2017.0,10.1057/978-1-349-95121-5_1712-2,The New Palgrave Dictionary of Economics,A.2017,False,,Springer,Not available,Strategy-Proof Allocation Mechanisms,59204a5c65a84775a8cae87f152a854e,http://dx.doi.org/10.1057/978-1-349-95121-5_1712-2 1264,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,kin-woon yeow,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1265,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,swee-huay heng,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1266,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,syh-yuan tan,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1267,Monitoring the progress of auctions for fraudulent bidding activities is crucial for detecting and stopping fraud during runtime to prevent fraudsters from succeeding. To this end we introduce a stage-based framework to monitor multiple live auctions for In-Auction Fraud (IAF). Creating a stage fraud monitoring system is different than what has been previously proposed in the very limited studies on runtime IAF detection. More precisely we launch the IAF monitoring operation at several time points in each running auction depending on its duration. At each auction time point our framework first detects IAF by evaluating each bidder’s stage activities based on the most reliable set of IAF patterns and then takes appropriate actions to react to dishonest bidders. We develop the proposed framework with a dynamic agent architecture where multiple monitoring agents can be created and deleted with respect to the status of their corresponding auctions (initialized completed or cancelled). The adoption of dynamic software architecture represents an excellent solution to the scalability and time efficiency issues of IAF monitoring systems since hundreds of live auctions are held simultaneously in commercial auction houses. Every time an auction is completed or terminated the participants’ fraud scores are updated dynamically. Our approach enables us to observe each bidder in each live auction and manage his fraud score as well. We validate the IAF monitoring service through commercial auction data. We conduct three experiments to detect and react to shill-bidding fraud by employing datasets acquired from auctions of two valuable items Palm PDA and XBOX. We observe each auction at three-time points verifying the shill patterns that most likely happen in the corresponding stage for each one.,samira sadaoui,Not available,2017.0,10.1007/s10489-016-0818-7,Applied Intelligence,Samira2017,False,,Springer,Not available,A dynamic stage-based fraud monitoring framework of multiple live auctions,3e716ea8ec9da608d26e7f7bf3497380,http://dx.doi.org/10.1007/s10489-016-0818-7 1268,Monitoring the progress of auctions for fraudulent bidding activities is crucial for detecting and stopping fraud during runtime to prevent fraudsters from succeeding. To this end we introduce a stage-based framework to monitor multiple live auctions for In-Auction Fraud (IAF). Creating a stage fraud monitoring system is different than what has been previously proposed in the very limited studies on runtime IAF detection. More precisely we launch the IAF monitoring operation at several time points in each running auction depending on its duration. At each auction time point our framework first detects IAF by evaluating each bidder’s stage activities based on the most reliable set of IAF patterns and then takes appropriate actions to react to dishonest bidders. We develop the proposed framework with a dynamic agent architecture where multiple monitoring agents can be created and deleted with respect to the status of their corresponding auctions (initialized completed or cancelled). The adoption of dynamic software architecture represents an excellent solution to the scalability and time efficiency issues of IAF monitoring systems since hundreds of live auctions are held simultaneously in commercial auction houses. Every time an auction is completed or terminated the participants’ fraud scores are updated dynamically. Our approach enables us to observe each bidder in each live auction and manage his fraud score as well. We validate the IAF monitoring service through commercial auction data. We conduct three experiments to detect and react to shill-bidding fraud by employing datasets acquired from auctions of two valuable items Palm PDA and XBOX. We observe each auction at three-time points verifying the shill patterns that most likely happen in the corresponding stage for each one.,xuegang wang,Not available,2017.0,10.1007/s10489-016-0818-7,Applied Intelligence,Samira2017,False,,Springer,Not available,A dynamic stage-based fraud monitoring framework of multiple live auctions,3e716ea8ec9da608d26e7f7bf3497380,http://dx.doi.org/10.1007/s10489-016-0818-7 1269,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,robert zeithammer,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 1270,William Spencer Vickrey was awarded the 1996 Nobel Prize in Economics ‘for his fundamental contributions to the economic theory of incentives under asymmetric information’. While best known as the father of auction theory he made important contributions on a broad range of topics including social choice marginal cost pricing the design of tax systems transportation economics urban economics and macroeconomics.,richard arnott,Not available,2017.0,10.1057/978-1-349-95121-5_1306-2,The New Palgrave Dictionary of Economics,Richard2017,False,,Springer,Not available,Vickrey William Spencer (1914–1996),eab0be53a8b8902d7346fd65a31efe9b,http://dx.doi.org/10.1057/978-1-349-95121-5_1306-2 1271,The decision-theoretic approach to statistics and econometrics explicitly specifies a set of models under consideration a set of actions that can be taken and a loss function that quantifies the value to the decision-maker of applying a particular action when a particular model holds. Decision rules or procedures map data into actions and can be ordered according to their Bayes minmax or minmax regret risks. Large sample approximations can be used to approximate complicated decision problems with simpler ones that are easier to solve. Some examples of applications of decision theory in econometrics are discussed.,keisuke hirano,Not available,2017.0,10.1057/978-1-349-95121-5_2297-1,The New Palgrave Dictionary of Economics,Keisuke2017,False,,Springer,Not available,Decision Theory in Econometrics,139e72953e876df4f10e37fbca2239bc,http://dx.doi.org/10.1057/978-1-349-95121-5_2297-1 1272,Incentive compatibility – a characteristic of mechanisms whereby each agent knows that his best strategy is to follow the rules no matter what the other agents will do – is desirable because it promotes the achievement of group goals. But it is elusive because pervasive opportunities exist for misbehaviour such as by misrepresenting preferences. This article reviews attempts to solve or at least to manage the incentive compatibility problem. Incentive compatibility provides a basic constraint on the possibilities for normative analysis and so serves as the fundamental interface between what is desirable and what is possible in a theory of organizations.,john ledyard,Not available,2017.0,10.1057/978-1-349-95121-5_1042-2,The New Palgrave Dictionary of Economics,O.2017,False,,Springer,Not available,Incentive Compatibility,8b9f221dc6aba6911039acfa9d98c8bb,http://dx.doi.org/10.1057/978-1-349-95121-5_1042-2 1273,In the cloud environment there exist multiple providers offering the same or similar web service and multiple users requiring the same web service. There exist competition among web service providers and users. In this paper we investigate the interacting strategy between web service providers and users based on the double auction mechanism. In this setting web service is traded as commodity between service providers (sellers) and users (buyers). Web service providers and users interact with each other and they need to submit effective offers for the traded web service. We then use game theory to analyze how web service providers and users bid in different trading environments with different budget constraints. We find that if one-unit service is allowed in the marketplace service users shade (i.e. bid less than their types) their bids less and service providers shade (i.e. ask more than their types) their asks more when the budget increases. If multi-unit services are allowed in the marketplace when the service providers’ budgets increase service providers shade their asks less and service users shade more. In addition more service users are willing choose to enter the market. When the service users’ budget increases more and more users offer two-units services to obtain more profits. Our results will provide guidance for the efficient design of bidding algorithms between web service providers and users.,bing shi,Not available,2017.0,10.1007/978-981-10-3996-6_6,Management of Information Process and Cooperation,Bing2017,False,,Springer,Not available,A Market-Based Analysis of Bidding Strategy Between Web Service Providers and Users,399fbbdc3733c65b04e97e099d8f9cb2,http://dx.doi.org/10.1007/978-981-10-3996-6_6 1274,In the cloud environment there exist multiple providers offering the same or similar web service and multiple users requiring the same web service. There exist competition among web service providers and users. In this paper we investigate the interacting strategy between web service providers and users based on the double auction mechanism. In this setting web service is traded as commodity between service providers (sellers) and users (buyers). Web service providers and users interact with each other and they need to submit effective offers for the traded web service. We then use game theory to analyze how web service providers and users bid in different trading environments with different budget constraints. We find that if one-unit service is allowed in the marketplace service users shade (i.e. bid less than their types) their bids less and service providers shade (i.e. ask more than their types) their asks more when the budget increases. If multi-unit services are allowed in the marketplace when the service providers’ budgets increase service providers shade their asks less and service users shade more. In addition more service users are willing choose to enter the market. When the service users’ budget increases more and more users offer two-units services to obtain more profits. Our results will provide guidance for the efficient design of bidding algorithms between web service providers and users.,zhaowei wang,Not available,2017.0,10.1007/978-981-10-3996-6_6,Management of Information Process and Cooperation,Bing2017,False,,Springer,Not available,A Market-Based Analysis of Bidding Strategy Between Web Service Providers and Users,399fbbdc3733c65b04e97e099d8f9cb2,http://dx.doi.org/10.1007/978-981-10-3996-6_6 1275,In the cloud environment there exist multiple providers offering the same or similar web service and multiple users requiring the same web service. There exist competition among web service providers and users. In this paper we investigate the interacting strategy between web service providers and users based on the double auction mechanism. In this setting web service is traded as commodity between service providers (sellers) and users (buyers). Web service providers and users interact with each other and they need to submit effective offers for the traded web service. We then use game theory to analyze how web service providers and users bid in different trading environments with different budget constraints. We find that if one-unit service is allowed in the marketplace service users shade (i.e. bid less than their types) their bids less and service providers shade (i.e. ask more than their types) their asks more when the budget increases. If multi-unit services are allowed in the marketplace when the service providers’ budgets increase service providers shade their asks less and service users shade more. In addition more service users are willing choose to enter the market. When the service users’ budget increases more and more users offer two-units services to obtain more profits. Our results will provide guidance for the efficient design of bidding algorithms between web service providers and users.,guangyi hu,Not available,2017.0,10.1007/978-981-10-3996-6_6,Management of Information Process and Cooperation,Bing2017,False,,Springer,Not available,A Market-Based Analysis of Bidding Strategy Between Web Service Providers and Users,399fbbdc3733c65b04e97e099d8f9cb2,http://dx.doi.org/10.1007/978-981-10-3996-6_6 1276,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,john geweke,Not available,2017.0,10.1057/978-1-349-95121-5_188-2,The New Palgrave Dictionary of Economics,John2017,False,,Springer,Not available,Econometrics,c0dde7875cfb79e5f2a83a9a86f4cf63,http://dx.doi.org/10.1057/978-1-349-95121-5_188-2 1277,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,joel horowitz,Not available,2017.0,10.1057/978-1-349-95121-5_188-2,The New Palgrave Dictionary of Economics,John2017,False,,Springer,Not available,Econometrics,c0dde7875cfb79e5f2a83a9a86f4cf63,http://dx.doi.org/10.1057/978-1-349-95121-5_188-2 1278,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,hashem pesaran,Not available,2017.0,10.1057/978-1-349-95121-5_188-2,The New Palgrave Dictionary of Economics,John2017,False,,Springer,Not available,Econometrics,c0dde7875cfb79e5f2a83a9a86f4cf63,http://dx.doi.org/10.1057/978-1-349-95121-5_188-2 1279,Let ,oren ben-zwi,Not available,2009.0,10.1007/978-3-642-04645-2_21,Algorithmic Game Theory,Oren2009,False,,Springer,Not available,A New Derandomization of Auctions,36e9f81262240f1d67dcedc71befb3e5,http://dx.doi.org/10.1007/978-3-642-04645-2_21 1280,This paper considers a uniform-price auction in which each of ,indranil chakraborty,Not available,2005.0,10.1007/s00199-004-0549-6,Economic Theory,Indranil2005,False,,Springer,Not available,Asymptotic prices in uniform-price multi-unit auctions,c52e281884c622e50a7007d90e8f2e8d,http://dx.doi.org/10.1007/s00199-004-0549-6 1281,Let ,ilan newman,Not available,2009.0,10.1007/978-3-642-04645-2_21,Algorithmic Game Theory,Oren2009,False,,Springer,Not available,A New Derandomization of Auctions,36e9f81262240f1d67dcedc71befb3e5,http://dx.doi.org/10.1007/978-3-642-04645-2_21 1282,Let ,guy wolfovitz,Not available,2009.0,10.1007/978-3-642-04645-2_21,Algorithmic Game Theory,Oren2009,False,,Springer,Not available,A New Derandomization of Auctions,36e9f81262240f1d67dcedc71befb3e5,http://dx.doi.org/10.1007/978-3-642-04645-2_21 1283,In transportation service procurement shipper and carriers cost functions for serving a pair of origin-destination points usually called lanes are highly dependent on the opportunity to serve neighboring lanes. Traditional single-item auctions do not allow to capture this type of preferences. On the contrary they are perfectly modeled in combinatorial auctions where bids on bundles of items are allowed. In transportation service procurement the management of a combinatorial auction can be seen as a three-stage process. Each stage involves several complex decision making problems. All such problems have relevant practical implications but only some of them have received attention in the literature. In the present paper we focus on the pre-auction stage for transportation procurement. In particular we analyze the problem of a shipper who has to decide between undertaking and/or outsourcing (through an auction) his transportation requests. The problem has never been analyzed before.We propose two different models for the problem in the truckload case and provide their computational comparison on randomly generated instances.,gianfranco guastaroba,Not available,2009.0,10.1007/978-3-540-92944-4_11,Innovations in Distribution Logistics,Gianfranco2009,False,,Springer,Not available,Modeling the Pre Auction Stage The Truckload Case,8245cead40d08bbbddcf7d9030d32033,http://dx.doi.org/10.1007/978-3-540-92944-4_11 1284,In transportation service procurement shipper and carriers cost functions for serving a pair of origin-destination points usually called lanes are highly dependent on the opportunity to serve neighboring lanes. Traditional single-item auctions do not allow to capture this type of preferences. On the contrary they are perfectly modeled in combinatorial auctions where bids on bundles of items are allowed. In transportation service procurement the management of a combinatorial auction can be seen as a three-stage process. Each stage involves several complex decision making problems. All such problems have relevant practical implications but only some of them have received attention in the literature. In the present paper we focus on the pre-auction stage for transportation procurement. In particular we analyze the problem of a shipper who has to decide between undertaking and/or outsourcing (through an auction) his transportation requests. The problem has never been analyzed before.We propose two different models for the problem in the truckload case and provide their computational comparison on randomly generated instances.,renata mansini,Not available,2009.0,10.1007/978-3-540-92944-4_11,Innovations in Distribution Logistics,Gianfranco2009,False,,Springer,Not available,Modeling the Pre Auction Stage The Truckload Case,8245cead40d08bbbddcf7d9030d32033,http://dx.doi.org/10.1007/978-3-540-92944-4_11 1285,In transportation service procurement shipper and carriers cost functions for serving a pair of origin-destination points usually called lanes are highly dependent on the opportunity to serve neighboring lanes. Traditional single-item auctions do not allow to capture this type of preferences. On the contrary they are perfectly modeled in combinatorial auctions where bids on bundles of items are allowed. In transportation service procurement the management of a combinatorial auction can be seen as a three-stage process. Each stage involves several complex decision making problems. All such problems have relevant practical implications but only some of them have received attention in the literature. In the present paper we focus on the pre-auction stage for transportation procurement. In particular we analyze the problem of a shipper who has to decide between undertaking and/or outsourcing (through an auction) his transportation requests. The problem has never been analyzed before.We propose two different models for the problem in the truckload case and provide their computational comparison on randomly generated instances.,m speranza,Not available,2009.0,10.1007/978-3-540-92944-4_11,Innovations in Distribution Logistics,Gianfranco2009,False,,Springer,Not available,Modeling the Pre Auction Stage The Truckload Case,8245cead40d08bbbddcf7d9030d32033,http://dx.doi.org/10.1007/978-3-540-92944-4_11 1286,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,congjun rao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 1287,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,yong zhao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 1288,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,huiling bao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 1289,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,qing wang,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 1290,Request for Proposal (RFP) problem is a type of task allocation problem where task managers need to recruit service provider agents to handle complex tasks composed of multiple sub-tasks with the objective being to assign each sub-task to a capable agent while keeping the cost as low as possible. Most existing approaches either involve centralized algorithms or require each agent’s cost for doing each sub-task to be known publicly beforehand or attempt to force the agents to disclose such information by means of truth-telling mechanism which is not practical in many problems where such information is sensitive and private. In this paper we present an efficient multi-auction based mechanism that can produce near-optimal solutions without violating the privacy of the participating agents. By including an extra verification step after each bid we can guarantee convergence to a solution while achieving optimal results in over 97% of the times in a series of experiment.,chi-kong chan,Not available,2009.0,10.1007/978-3-642-03339-1_20,Multi-Agent Systems for Society,Chi-Kong2009,False,,Springer,Not available,Multi-auction Approach for Solving Task Allocation Problem,a981996d3fe5eaf38298a1af7ce37f48,http://dx.doi.org/10.1007/978-3-642-03339-1_20 1291,This paper considers a uniform-price auction in which each of ,richard engelbrecht-wiggans,Not available,2005.0,10.1007/s00199-004-0549-6,Economic Theory,Indranil2005,False,,Springer,Not available,Asymptotic prices in uniform-price multi-unit auctions,c52e281884c622e50a7007d90e8f2e8d,http://dx.doi.org/10.1007/s00199-004-0549-6 1292,Request for Proposal (RFP) problem is a type of task allocation problem where task managers need to recruit service provider agents to handle complex tasks composed of multiple sub-tasks with the objective being to assign each sub-task to a capable agent while keeping the cost as low as possible. Most existing approaches either involve centralized algorithms or require each agent’s cost for doing each sub-task to be known publicly beforehand or attempt to force the agents to disclose such information by means of truth-telling mechanism which is not practical in many problems where such information is sensitive and private. In this paper we present an efficient multi-auction based mechanism that can produce near-optimal solutions without violating the privacy of the participating agents. By including an extra verification step after each bid we can guarantee convergence to a solution while achieving optimal results in over 97% of the times in a series of experiment.,ho-fung leung,Not available,2009.0,10.1007/978-3-642-03339-1_20,Multi-Agent Systems for Society,Chi-Kong2009,False,,Springer,Not available,Multi-auction Approach for Solving Task Allocation Problem,a981996d3fe5eaf38298a1af7ce37f48,http://dx.doi.org/10.1007/978-3-642-03339-1_20 1293,We develop an auction system that determines a fair number of komi for holding black stones in a GO game between two players of equal strength and hence the right to the first move. It is modeled as a priority right pricing problem that demands for budget-balanced and egalitarian conditions where a negative utility is associated with the losers. We establish results involved with the incentive compatible properties for this problem under both deterministic and randomized protocols.,xiaotie deng,Not available,2009.0,10.1007/978-3-642-10841-9_51,Internet and Network Economics,Xiaotie2009,False,,Springer,Not available,Priority Right Auction for Komi Setting,8b8b3caa7ed6326e86567eb1600256c6,http://dx.doi.org/10.1007/978-3-642-10841-9_51 1294,We develop an auction system that determines a fair number of komi for holding black stones in a GO game between two players of equal strength and hence the right to the first move. It is modeled as a priority right pricing problem that demands for budget-balanced and egalitarian conditions where a negative utility is associated with the losers. We establish results involved with the incentive compatible properties for this problem under both deterministic and randomized protocols.,qi qi,Not available,2009.0,10.1007/978-3-642-10841-9_51,Internet and Network Economics,Xiaotie2009,False,,Springer,Not available,Priority Right Auction for Komi Setting,8b8b3caa7ed6326e86567eb1600256c6,http://dx.doi.org/10.1007/978-3-642-10841-9_51 1295,In this paper we introduce an experimental approach to the design analysis and implementation of market mechanisms based on double auction. We define a formal market model that specifies the market policies in a double auction market. Based on this model we introduce a set of criteria for the evaluation of market mechanisms. We design and implement a set of market policies and test them with different experimental settings. The results of experiments provide us a better understanding of the interrelationship among market policies and also show that an experimental approach can greatly improve the efficiency and effectiveness of market mechanism design.,masabumi furuhata,Not available,2009.0,10.1007/978-3-642-10439-8_1,AI 2009: Advances in Artificial Intelligence,Masabumi2009,False,,Springer,Not available,Experimental Market Mechanism Design for Double Auction,d761ca741048fab236fe4c7a9c050073,http://dx.doi.org/10.1007/978-3-642-10439-8_1 1296,In this paper we introduce an experimental approach to the design analysis and implementation of market mechanisms based on double auction. We define a formal market model that specifies the market policies in a double auction market. Based on this model we introduce a set of criteria for the evaluation of market mechanisms. We design and implement a set of market policies and test them with different experimental settings. The results of experiments provide us a better understanding of the interrelationship among market policies and also show that an experimental approach can greatly improve the efficiency and effectiveness of market mechanism design.,laurent perrussel,Not available,2009.0,10.1007/978-3-642-10439-8_1,AI 2009: Advances in Artificial Intelligence,Masabumi2009,False,,Springer,Not available,Experimental Market Mechanism Design for Double Auction,d761ca741048fab236fe4c7a9c050073,http://dx.doi.org/10.1007/978-3-642-10439-8_1 1297,In this paper we introduce an experimental approach to the design analysis and implementation of market mechanisms based on double auction. We define a formal market model that specifies the market policies in a double auction market. Based on this model we introduce a set of criteria for the evaluation of market mechanisms. We design and implement a set of market policies and test them with different experimental settings. The results of experiments provide us a better understanding of the interrelationship among market policies and also show that an experimental approach can greatly improve the efficiency and effectiveness of market mechanism design.,jean-marc thevenin,Not available,2009.0,10.1007/978-3-642-10439-8_1,AI 2009: Advances in Artificial Intelligence,Masabumi2009,False,,Springer,Not available,Experimental Market Mechanism Design for Double Auction,d761ca741048fab236fe4c7a9c050073,http://dx.doi.org/10.1007/978-3-642-10439-8_1 1298,In this paper we introduce an experimental approach to the design analysis and implementation of market mechanisms based on double auction. We define a formal market model that specifies the market policies in a double auction market. Based on this model we introduce a set of criteria for the evaluation of market mechanisms. We design and implement a set of market policies and test them with different experimental settings. The results of experiments provide us a better understanding of the interrelationship among market policies and also show that an experimental approach can greatly improve the efficiency and effectiveness of market mechanism design.,dongmo zhang,Not available,2009.0,10.1007/978-3-642-10439-8_1,AI 2009: Advances in Artificial Intelligence,Masabumi2009,False,,Springer,Not available,Experimental Market Mechanism Design for Double Auction,d761ca741048fab236fe4c7a9c050073,http://dx.doi.org/10.1007/978-3-642-10439-8_1 1299,We characterize the optimal selling mechanism for a seller who faces demand demarcated by a high and a low end and who can access an (online) auction site (by paying an access cost) in addition to using his own store that can be used as a posted price selling venue. We first solve for the optimal mechanism of a direct revelation game in which there is no venue-restriction constraint. We find that the direct optimal mechanism must necessarily incorporate a certain kind of pooling. We then show that even with the venue constraint the seller can use a two stage indirect mechanism that implements the allocation rule from the optimal direct mechanism and uses the venues in an optimal fashion. The first stage of the indirect mechanism is a posted price at the store. If the object is not sold we move to stage two which involves an auction at the auction site. A feature of this auction is a buy-now option which is essential for implementing the pooling feature of the optimal direct mechanism. We also show that the buy-now option in the optimal mechanism is of a “temporary” variety and that a “permanent” buy-now option in contrast cannot implement the optimal mechanism. Auctions with a temporary buy-now option are in widespread use on eBay.,subir bose,Not available,2009.0,10.1007/s00199-008-0345-9,Economic Theory,Subir2009,False,,Springer,Not available,Optimal sale across venues and auctions with a buy-now option,2f524502365bbb61e321f1908d8f71aa,http://dx.doi.org/10.1007/s00199-008-0345-9 1300,We characterize the optimal selling mechanism for a seller who faces demand demarcated by a high and a low end and who can access an (online) auction site (by paying an access cost) in addition to using his own store that can be used as a posted price selling venue. We first solve for the optimal mechanism of a direct revelation game in which there is no venue-restriction constraint. We find that the direct optimal mechanism must necessarily incorporate a certain kind of pooling. We then show that even with the venue constraint the seller can use a two stage indirect mechanism that implements the allocation rule from the optimal direct mechanism and uses the venues in an optimal fashion. The first stage of the indirect mechanism is a posted price at the store. If the object is not sold we move to stage two which involves an auction at the auction site. A feature of this auction is a buy-now option which is essential for implementing the pooling feature of the optimal direct mechanism. We also show that the buy-now option in the optimal mechanism is of a “temporary” variety and that a “permanent” buy-now option in contrast cannot implement the optimal mechanism. Auctions with a temporary buy-now option are in widespread use on eBay.,arup daripa,Not available,2009.0,10.1007/s00199-008-0345-9,Economic Theory,Subir2009,False,,Springer,Not available,Optimal sale across venues and auctions with a buy-now option,2f524502365bbb61e321f1908d8f71aa,http://dx.doi.org/10.1007/s00199-008-0345-9 1301,Individual differences in intellectual abilities can be observed across time and everywhere in the world and this fact has been well studied by psychologists for a long time. To capture the innate heterogeneity of human intellectual abilities this paper employs genetic programming as the algorithm of the learning agents and then proposes the possibility of using population size as a proxy parameter of individual intelligence. By modeling individual intelligence in this way we demonstrate not only a nearly positive relation between individual intelligence and performance but more interestingly the effect of decreasing marginal contribution of IQ to performance found in psychological literature.,shu-heng chen,Not available,2009.0,10.1007/978-3-642-01181-8_15,Genetic Programming,Shu-Heng2009,False,,Springer,Not available,Modeling Social Heterogeneity with Genetic Programming in an Artificial Double Auction Market,a6b1d913a356591f084ee50cbc5dd9b3,http://dx.doi.org/10.1007/978-3-642-01181-8_15 1302,We consider auction design in a setting with costly preference elicitation. Well designed auctions can help to avoid unnecessary elicitation while determining efficient allocations. Careful design can also lead to more efficient outcomes when elicitation is too costly to permit perfect allocative efficiency. An ,david parkes,Not available,2005.0,10.1007/s10472-005-4692-y,Annals of Mathematics and Artificial Intelligence,C.2005,False,,Springer,Not available,Auction design with costly preference elicitation,0e231a20ae810903a2f31ad797a9a251,http://dx.doi.org/10.1007/s10472-005-4692-y 1303,Individual differences in intellectual abilities can be observed across time and everywhere in the world and this fact has been well studied by psychologists for a long time. To capture the innate heterogeneity of human intellectual abilities this paper employs genetic programming as the algorithm of the learning agents and then proposes the possibility of using population size as a proxy parameter of individual intelligence. By modeling individual intelligence in this way we demonstrate not only a nearly positive relation between individual intelligence and performance but more interestingly the effect of decreasing marginal contribution of IQ to performance found in psychological literature.,chung-ching tai,Not available,2009.0,10.1007/978-3-642-01181-8_15,Genetic Programming,Shu-Heng2009,False,,Springer,Not available,Modeling Social Heterogeneity with Genetic Programming in an Artificial Double Auction Market,a6b1d913a356591f084ee50cbc5dd9b3,http://dx.doi.org/10.1007/978-3-642-01181-8_15 1304,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,congjun rao,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 1305,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,zhongcheng zhang,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 1306,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,june liu,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 1307,eBay and Yahoo allow sellers to list their auctions with a buy price at which a bidder may purchase the item immediately. On eBay the buy-now option disappears once a bid is placed while on Yahoo the buy-now option remains in effect throughout the auction. We show that when bidders are risk averse both types of auctions raise seller revenue for a wide range of buy prices. The Yahoo format raises more revenue than the eBay format when bidders have either CARA or DARA. Bidders with DARA prefer the eBay auction while bidders with CARA are indifferent between the two.,stanley reynolds,Not available,2009.0,10.1007/s00199-006-0182-7,Economic Theory,S.2009,False,,Springer,Not available,Auctions with a buy price,151a3944425d8cb9017e86c5a7d3f9c9,http://dx.doi.org/10.1007/s00199-006-0182-7 1308,eBay and Yahoo allow sellers to list their auctions with a buy price at which a bidder may purchase the item immediately. On eBay the buy-now option disappears once a bid is placed while on Yahoo the buy-now option remains in effect throughout the auction. We show that when bidders are risk averse both types of auctions raise seller revenue for a wide range of buy prices. The Yahoo format raises more revenue than the eBay format when bidders have either CARA or DARA. Bidders with DARA prefer the eBay auction while bidders with CARA are indifferent between the two.,john wooders,Not available,2009.0,10.1007/s00199-006-0182-7,Economic Theory,S.2009,False,,Springer,Not available,Auctions with a buy price,151a3944425d8cb9017e86c5a7d3f9c9,http://dx.doi.org/10.1007/s00199-006-0182-7 1309,Many resources such as supercomputers legal advisors and university classrooms are shared by many members of an organization. When the supply of shared resources is limited conflict usually results between contending demanders. If these conflicts can be adequately resolved then value is created for the organization. In this paper we use the methodology of applied mechanism design to examine alternative processes for the resolution of such conflicts for a particular class of scheduling problems. We construct a laboratory environment within which we evaluate the outcomes of various allocation mechanisms. In particular we are able to measure efficiency the value attained by the resulting allocations as a percentage of the maximum possible value. Our choice of environment and parameters is guided by a specific application the allocation of time on NASA's Deep Space Network but the results also provide insights relevant to other scheduling and allocation applications. We find (1) experienced user committees using decision support algorithms produce reasonably efficient allocations in lower conflict situations but perform badly when there is a high level of conflict between demanders (2) there is a mechanism called the Adaptive User Selection Mechanism (AUSM) which charges users for time and yields high efficiencies in high conflict situations but because of the prices paid in which the net surplus available to the users is less than that resulting from the inefficient user committee (a reason why users may not appreciate ‘market solutions’ to organization problems) and (3) there is a modification of AUSM in which tokens or internal money replaces real money which results in highly efficient allocations without extracting any of the users' surplus. Although the distribution of surplus is still an issue the significant increase in efficiency provides users with a strong incentive to replace inefficient user committees with the more efficient AUSM.,john ledyard,Not available,1996.0,10.1007/BF02499132,Economic design,O.1996,False,,Springer,Not available,The allocation of a shared resource within an organization,7a8597f654d78ffbbd728c7117d45dc0,http://dx.doi.org/10.1007/BF02499132 1310,Many resources such as supercomputers legal advisors and university classrooms are shared by many members of an organization. When the supply of shared resources is limited conflict usually results between contending demanders. If these conflicts can be adequately resolved then value is created for the organization. In this paper we use the methodology of applied mechanism design to examine alternative processes for the resolution of such conflicts for a particular class of scheduling problems. We construct a laboratory environment within which we evaluate the outcomes of various allocation mechanisms. In particular we are able to measure efficiency the value attained by the resulting allocations as a percentage of the maximum possible value. Our choice of environment and parameters is guided by a specific application the allocation of time on NASA's Deep Space Network but the results also provide insights relevant to other scheduling and allocation applications. We find (1) experienced user committees using decision support algorithms produce reasonably efficient allocations in lower conflict situations but perform badly when there is a high level of conflict between demanders (2) there is a mechanism called the Adaptive User Selection Mechanism (AUSM) which charges users for time and yields high efficiencies in high conflict situations but because of the prices paid in which the net surplus available to the users is less than that resulting from the inefficient user committee (a reason why users may not appreciate ‘market solutions’ to organization problems) and (3) there is a modification of AUSM in which tokens or internal money replaces real money which results in highly efficient allocations without extracting any of the users' surplus. Although the distribution of surplus is still an issue the significant increase in efficiency provides users with a strong incentive to replace inefficient user committees with the more efficient AUSM.,charles noussair,Not available,1996.0,10.1007/BF02499132,Economic design,O.1996,False,,Springer,Not available,The allocation of a shared resource within an organization,7a8597f654d78ffbbd728c7117d45dc0,http://dx.doi.org/10.1007/BF02499132 1311,Many resources such as supercomputers legal advisors and university classrooms are shared by many members of an organization. When the supply of shared resources is limited conflict usually results between contending demanders. If these conflicts can be adequately resolved then value is created for the organization. In this paper we use the methodology of applied mechanism design to examine alternative processes for the resolution of such conflicts for a particular class of scheduling problems. We construct a laboratory environment within which we evaluate the outcomes of various allocation mechanisms. In particular we are able to measure efficiency the value attained by the resulting allocations as a percentage of the maximum possible value. Our choice of environment and parameters is guided by a specific application the allocation of time on NASA's Deep Space Network but the results also provide insights relevant to other scheduling and allocation applications. We find (1) experienced user committees using decision support algorithms produce reasonably efficient allocations in lower conflict situations but perform badly when there is a high level of conflict between demanders (2) there is a mechanism called the Adaptive User Selection Mechanism (AUSM) which charges users for time and yields high efficiencies in high conflict situations but because of the prices paid in which the net surplus available to the users is less than that resulting from the inefficient user committee (a reason why users may not appreciate ‘market solutions’ to organization problems) and (3) there is a modification of AUSM in which tokens or internal money replaces real money which results in highly efficient allocations without extracting any of the users' surplus. Although the distribution of surplus is still an issue the significant increase in efficiency provides users with a strong incentive to replace inefficient user committees with the more efficient AUSM.,david porter,Not available,1996.0,10.1007/BF02499132,Economic design,O.1996,False,,Springer,Not available,The allocation of a shared resource within an organization,7a8597f654d78ffbbd728c7117d45dc0,http://dx.doi.org/10.1007/BF02499132 1312,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,john kagel,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 1313,This paper illustrates both theoretically and empirically the determinants of seller bidding at auctions. Based on search theoretical considerations seller bids are explained as the seller’s rejection of submitted price offers that fall short of his reservation price. The search model allows to derive testable implications on the seller’s bidding behavior. Using a unique data set from German auction houses the estimation results provide evidence that supports the search theoretical implications. For example seller bidding is complementary to the presence of bidding rings at auction. Moreover art and antique auctions turn out to be particularly susceptible to seller bidding practices.,michael beckmann,Not available,2004.0,10.1007/BF03396698,Schmalenbach Business Review,Michael2004,False,,Springer,Not available,Why Do Sellers at Auctions Bid for Their Own Items? Theory and Evidence,79cb96f179e1ff5b81dd45dfdc671e6a,http://dx.doi.org/10.1007/BF03396698 1314,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,dan levin,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 1315,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,ronald harstad,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 1316,Experiments on first-price sealed-bid auctions with independent private values have shown that submitted bids typically exceed Nash-equilibrium predictions for risk-neutral bidders. Existing bidding models explain this phenomenon by assuming that the bidders are risk-averse and capable of drawing complete and correct inferences about their winning probabilities. In this article we use the Choquet expected utility (CEU) theory to demonstrate that the observed bidding behavior can also be attributed to ambiguity aversion which causes the bidders to underestimate their chances of winning the auction. Empirical support for CEU bidding models is given through an analysis of recent bidding data.,ahtia salo,Not available,1995.0,10.1007/BF01067681,Journal of Risk and Uncertainty,Ahtia1995,False,,Springer,Not available,Ambiguity aversion in first-price sealed-bid auctions,2c9e3e51c36450295bdfc428d9be46be,http://dx.doi.org/10.1007/BF01067681 1317,Experiments on first-price sealed-bid auctions with independent private values have shown that submitted bids typically exceed Nash-equilibrium predictions for risk-neutral bidders. Existing bidding models explain this phenomenon by assuming that the bidders are risk-averse and capable of drawing complete and correct inferences about their winning probabilities. In this article we use the Choquet expected utility (CEU) theory to demonstrate that the observed bidding behavior can also be attributed to ambiguity aversion which causes the bidders to underestimate their chances of winning the auction. Empirical support for CEU bidding models is given through an analysis of recent bidding data.,martin weber,Not available,1995.0,10.1007/BF01067681,Journal of Risk and Uncertainty,Ahtia1995,False,,Springer,Not available,Ambiguity aversion in first-price sealed-bid auctions,2c9e3e51c36450295bdfc428d9be46be,http://dx.doi.org/10.1007/BF01067681 1318,The lottery payoff procedure does not successfully induce risk-neutral bidding behavior in first-price sealedbid auctions. This conclusion follows from both ordinary-least-squares estimation with natural data and leastabsolute-deviation estimation with transformed data from numerous experimental designs. Lottery payoffs do not succeed in inducing behavior predicted from standard expected utility theory assumptions or from assumed utility from winning and/or income thresholds. In contrast first-price auction experiments with monetary payoffs yield results that are consistent with general models of bidding in the independent private values information environment.,james cox,Not available,1995.0,10.1007/BF01132731,Journal of Risk and Uncertainty,C.1995,False,,Springer,Not available,Inducing risk-neutral preferences: Further analysis of the data,0de1091792d647fa4545c6bfaffa305e,http://dx.doi.org/10.1007/BF01132731 1319,The lottery payoff procedure does not successfully induce risk-neutral bidding behavior in first-price sealedbid auctions. This conclusion follows from both ordinary-least-squares estimation with natural data and leastabsolute-deviation estimation with transformed data from numerous experimental designs. Lottery payoffs do not succeed in inducing behavior predicted from standard expected utility theory assumptions or from assumed utility from winning and/or income thresholds. In contrast first-price auction experiments with monetary payoffs yield results that are consistent with general models of bidding in the independent private values information environment.,ronald oaxaca,Not available,1995.0,10.1007/BF01132731,Journal of Risk and Uncertainty,C.1995,False,,Springer,Not available,Inducing risk-neutral preferences: Further analysis of the data,0de1091792d647fa4545c6bfaffa305e,http://dx.doi.org/10.1007/BF01132731 1320,We show that splitting an award can result in lower expected procurement costs even in a one-time procurement setting as long as entering the bidding competition is costly. For sufficiently risk-averse bidders the split award mechanism provides additional insurance against the possiblity of losing the bid and therefore any bidding costs. This result contrasts with previous theoretical works which focus on one-time procurement and have concluded that multiple sourcing increases expected procurement costs.,dorothy klotz,Not available,1995.0,10.1007/BF01409776,Group Decision and Negotiation,E.1995,False,,Springer,Not available,Variable split awards in a single-stage procurement model,6dc4fdefd3b2fa52a43fe2681e7d26bb,http://dx.doi.org/10.1007/BF01409776 1321,We show that splitting an award can result in lower expected procurement costs even in a one-time procurement setting as long as entering the bidding competition is costly. For sufficiently risk-averse bidders the split award mechanism provides additional insurance against the possiblity of losing the bid and therefore any bidding costs. This result contrasts with previous theoretical works which focus on one-time procurement and have concluded that multiple sourcing increases expected procurement costs.,kalyan chatterjee,Not available,1995.0,10.1007/BF01409776,Group Decision and Negotiation,E.1995,False,,Springer,Not available,Variable split awards in a single-stage procurement model,6dc4fdefd3b2fa52a43fe2681e7d26bb,http://dx.doi.org/10.1007/BF01409776 1322,Recent downturns in real estate markets combined with a general acceptance of auctions have resulted in an unprecedented number of auction sales. A need therefore exists for the further development of real estate auction models that can provide insights into this emerging market institution. To facilitate this task a survey of auction theory as pertaining to its application in real estate markets is provided in this paper. Topics addressed includes bidding equilibria the role of reserve prices information disclosure the decision to use auctions bidder participation and multiple-object sales. An overview of empirical studies in this area is also provided.,daniel quan,Not available,1994.0,10.1007/BF01153587,The Journal of Real Estate Finance and Economics,C.1994,False,,Springer,Not available,Real estate auctions: A survey of theory and practice,5015f690b2502fd09359a6a77fd05363,http://dx.doi.org/10.1007/BF01153587 1323,A sequential auction of commercial properties produced evidence that bid timing matters. Prices declined as the auction proceeded an outcome consistent with expectations when bidders are either risk averse or quantity constrained.,kenneth lusht,Not available,1994.0,10.1007/BF01096996,The Journal of Real Estate Finance and Economics,M.1994,False,,Springer,Not available,Order and price in a sequential auction,740e397813c18e25e1a05084e3bea7cc,http://dx.doi.org/10.1007/BF01096996 1324,In February 2002 New Jersey completed a market process whereby the utilities were able to purchase one-year forward contracts to ensure energy needs for their default service customers for a one-year period. The auction was the first application of the simultaneous descending clock auction to power procurement. We chose this auction format to fit the specific needs of the New Jersey Electric Discount and Energy Competition Act and the New Jersey Board of Public Utilities mandate for a competitive bidding process to procure the electricity to meet the electric utilities’ default service obligations.,colin loxley,Not available,2004.0,10.1023/B:REGE.0000038932.72922.ef,Journal of Regulatory Economics,Colin2004,False,,Springer,Not available,Default Service Auctions,fd4e7a071beccee140392ebe37ae8e41,http://dx.doi.org/10.1023/B:REGE.0000038932.72922.ef 1325,A unique feature of land auctions is that the same land is auctioned twice; first the land is broken into tracts and each tract is auctioned individually. Then the tracts are reassembled and auctioned as a whole parcel. After the two auctions are completed the seller chooses the one that generates a higher revenue. The main purpose of this paper is to provide an explanation of why such an auction design is employed to sell farmland. We also show that this feature of land auctions leads to interesting interaction among the bidding strategies of the players in each of the two auction stages.,peter colwell,Not available,1994.0,10.1007/BF01097034,The Journal of Real Estate Finance and Economics,F.1994,False,,Springer,Not available,The demand for agricultural land and strategic bidding in auctions,c4a3df4b098d6eb53a68300307cc0e03,http://dx.doi.org/10.1007/BF01097034 1326,A unique feature of land auctions is that the same land is auctioned twice; first the land is broken into tracts and each tract is auctioned individually. Then the tracts are reassembled and auctioned as a whole parcel. After the two auctions are completed the seller chooses the one that generates a higher revenue. The main purpose of this paper is to provide an explanation of why such an auction design is employed to sell farmland. We also show that this feature of land auctions leads to interesting interaction among the bidding strategies of the players in each of the two auction stages.,abdullah yavas,Not available,1994.0,10.1007/BF01097034,The Journal of Real Estate Finance and Economics,F.1994,False,,Springer,Not available,The demand for agricultural land and strategic bidding in auctions,c4a3df4b098d6eb53a68300307cc0e03,http://dx.doi.org/10.1007/BF01097034 1327,Posted offer and double auction pricing institutions are examples of fixed and flexible pricing institutions respectively. In laboratory settings double auction markets dominate posted offer institutions in terms of the amount of potential surplus which traders are able to extract. These results are invariant with respect to the experience of traders or the perishability of the good traded. Performance differences across institutions may be due to information differences. The introduction of a second price-posting in the posted offer institution results in a pricing institution which is closer to the double auction's flexible pricing environment. Laboratory results suggest that under otherwise comparable conditions this innovation is sufficient to remove the performance differences which have been demonstrated to exist between the posted offer and double auction institutions.,stuart mestelman,Not available,1994.0,10.1007/BF01211120,Economic Theory,Stuart1994,False,,Springer,Not available,Price flexibility and market performance in experimental markets,05a0f91d650fdbc20aece61ee9497c42,http://dx.doi.org/10.1007/BF01211120 1328,Posted offer and double auction pricing institutions are examples of fixed and flexible pricing institutions respectively. In laboratory settings double auction markets dominate posted offer institutions in terms of the amount of potential surplus which traders are able to extract. These results are invariant with respect to the experience of traders or the perishability of the good traded. Performance differences across institutions may be due to information differences. The introduction of a second price-posting in the posted offer institution results in a pricing institution which is closer to the double auction's flexible pricing environment. Laboratory results suggest that under otherwise comparable conditions this innovation is sufficient to remove the performance differences which have been demonstrated to exist between the posted offer and double auction institutions.,douglas welland,Not available,1994.0,10.1007/BF01211120,Economic Theory,Stuart1994,False,,Springer,Not available,Price flexibility and market performance in experimental markets,05a0f91d650fdbc20aece61ee9497c42,http://dx.doi.org/10.1007/BF01211120 1329,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,kemal guler,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 1330,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,charles plott,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 1331,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,quang vuong,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 1332,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,peter cramton,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 1333,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,emel filiz-ozbay,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 1334,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,erkut ozbay,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 1335, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ezra einy,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1336,In February 2002 New Jersey completed a market process whereby the utilities were able to purchase one-year forward contracts to ensure energy needs for their default service customers for a one-year period. The auction was the first application of the simultaneous descending clock auction to power procurement. We chose this auction format to fit the specific needs of the New Jersey Electric Discount and Energy Competition Act and the New Jersey Board of Public Utilities mandate for a competitive bidding process to procure the electricity to meet the electric utilities’ default service obligations.,david salant,Not available,2004.0,10.1023/B:REGE.0000038932.72922.ef,Journal of Regulatory Economics,Colin2004,False,,Springer,Not available,Default Service Auctions,fd4e7a071beccee140392ebe37ae8e41,http://dx.doi.org/10.1023/B:REGE.0000038932.72922.ef 1337,We examine bidding behavior in a clock auction in which price is set by the lowest-accepted bid and provisional winners are reported each round (the LABpw auction). This format was used in the India 3G spectrum auction. In the standard theory the auction performs poorly. In particular it yields lower revenues and is less efficient than the more standard clock auction with exit bids and highest-rejected-bid pricing (the HRB auction). However the LABpw auction performs well in the lab achieving higher revenues than the HRB auction. We show how fear of losing provides one motivation for the overbidding that causes higher revenues in the LABpw auction.,pacharasut sujarittanonta,Not available,2012.0,10.1007/s10058-012-0121-y,Review of Economic Design,Peter2012,False,,Springer,Not available,Fear of losing in a clock auction,e11d6758e92304983a3e154eebe887c1,http://dx.doi.org/10.1007/s10058-012-0121-y 1338,We present a functional framework for automated Bayesian and worst-case mechanism design based on a two-stage game model of strategic interaction between the designer and the mechanism participants. At the core of our framework is a black-box optimization algorithm which guides the process of evaluating candidate mechanisms. We apply the approach to several classes of two-player infinite games of incomplete information producing optimal or nearly optimal mechanisms using various objective functions. By comparing our results with known optimal mechanisms and in some cases improving on the best known mechanisms we provide evidence that ours is a promising approach to parametrized mechanism design for infinite Bayesian games.,yevgeniy vorobeychik,Not available,2012.0,10.1007/s10458-011-9177-2,Autonomous Agents and Multi-Agent Systems,Yevgeniy2012,False,,Springer,Not available,Constrained automated mechanism design for infinite games of incomplete information,dfc63883ec0cf8b837a059345f90142c,http://dx.doi.org/10.1007/s10458-011-9177-2 1339,We present a functional framework for automated Bayesian and worst-case mechanism design based on a two-stage game model of strategic interaction between the designer and the mechanism participants. At the core of our framework is a black-box optimization algorithm which guides the process of evaluating candidate mechanisms. We apply the approach to several classes of two-player infinite games of incomplete information producing optimal or nearly optimal mechanisms using various objective functions. By comparing our results with known optimal mechanisms and in some cases improving on the best known mechanisms we provide evidence that ours is a promising approach to parametrized mechanism design for infinite Bayesian games.,daniel reeves,Not available,2012.0,10.1007/s10458-011-9177-2,Autonomous Agents and Multi-Agent Systems,Yevgeniy2012,False,,Springer,Not available,Constrained automated mechanism design for infinite games of incomplete information,dfc63883ec0cf8b837a059345f90142c,http://dx.doi.org/10.1007/s10458-011-9177-2 1340,We present a functional framework for automated Bayesian and worst-case mechanism design based on a two-stage game model of strategic interaction between the designer and the mechanism participants. At the core of our framework is a black-box optimization algorithm which guides the process of evaluating candidate mechanisms. We apply the approach to several classes of two-player infinite games of incomplete information producing optimal or nearly optimal mechanisms using various objective functions. By comparing our results with known optimal mechanisms and in some cases improving on the best known mechanisms we provide evidence that ours is a promising approach to parametrized mechanism design for infinite Bayesian games.,michael wellman,Not available,2012.0,10.1007/s10458-011-9177-2,Autonomous Agents and Multi-Agent Systems,Yevgeniy2012,False,,Springer,Not available,Constrained automated mechanism design for infinite games of incomplete information,dfc63883ec0cf8b837a059345f90142c,http://dx.doi.org/10.1007/s10458-011-9177-2 1341,This paper analyzes a market game in which sellers offer trading mechanisms to buyers and buyers decide which seller to go to depending on the trading mechanisms offered. In a (subgame perfect) equilibrium of this market sellers hold auctions with an efficient reserve price but charge an entry fee. The entry fee depends on the number of buyers and sellers the distribution of buyer valuations and the buyer cost of entering the market. As the size of the market increases the entry fee decreases and converges to zero in the limit. We study how the surplus of buyers and sellers depends on the number of agents on each side of the market in this decentralized trading environment.,damian damianov,Not available,2012.0,10.1007/s00199-010-0597-z,Economic Theory,S.2012,False,,Springer,Not available,Seller competition by mechanism design,602ba3c061af1717152f15f374f2f5c0,http://dx.doi.org/10.1007/s00199-010-0597-z 1342,Automated negotiation is an efficient mechanism for the coordination of interests of heterogeneous agents. However the negotiation procedure requires time which is a scarce resource in dynamic environments that are characterized by rapid and reoccurring changes of external circumstances. To ensure adaptivity negotiation protocols are needed that are able to find an adjusted consensus in almost real-time. Furthermore a protocol should achieve a preferably good social welfare and be strategy-proof. In this paper we discuss three protocols under the consideration of restricted negotiation time and interdependencies: firstly a protocol drawing on combinatorial auctions secondly a protocol drawing on self-selective clustering of agents in combinatorial auctions and thirdly an iterative negotiation protocol as benchmark. The winner determination of a combinatorial auction is ,fabian lang,Not available,2012.0,10.1007/s12530-012-9056-3,Evolving Systems,Fabian2012,False,,Springer,Not available,Negotiating in dynamic environments: time-efficient automated negotiations by means of combinatorial auctions,92376201607c69b78ce35fdd665126fc,http://dx.doi.org/10.1007/s12530-012-9056-3 1343,Automated negotiation is an efficient mechanism for the coordination of interests of heterogeneous agents. However the negotiation procedure requires time which is a scarce resource in dynamic environments that are characterized by rapid and reoccurring changes of external circumstances. To ensure adaptivity negotiation protocols are needed that are able to find an adjusted consensus in almost real-time. Furthermore a protocol should achieve a preferably good social welfare and be strategy-proof. In this paper we discuss three protocols under the consideration of restricted negotiation time and interdependencies: firstly a protocol drawing on combinatorial auctions secondly a protocol drawing on self-selective clustering of agents in combinatorial auctions and thirdly an iterative negotiation protocol as benchmark. The winner determination of a combinatorial auction is ,andreas fink,Not available,2012.0,10.1007/s12530-012-9056-3,Evolving Systems,Fabian2012,False,,Springer,Not available,Negotiating in dynamic environments: time-efficient automated negotiations by means of combinatorial auctions,92376201607c69b78ce35fdd665126fc,http://dx.doi.org/10.1007/s12530-012-9056-3 1344,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,alex kim,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1345,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,subramanian balachander,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1346,In search advertising a search engine uses a generalized second-price auction to sell advertising slots adjacent to search results on its webpage. In this paper we study an interesting question related to the design of the generalized second-price auction: how should a search engine strategically decide on the number of advertising slots? To answer this question we analyze the implication of varying the number of slots in a base model in which the click-through rates are assumed to be independent of the number of slots. When deciding the number of slots we find that a search engine’s profit is based on two counteracting factors: the incremental clicks from an extra slot and the influence of the extra slot on advertisers’ payments per click. Our analysis characterizes the conditions for optimality of the number of slots and the implications of different distributions for advertiser valuations. We also extend the base model to allow for attraction and cannibalization of clicks from existing slots by new ad slots and show how such effects affect the optimal number of slots. Our overall results show that search engines need to optimize the number of ad slots offered for auction in order to maximize profit.,karthik kannan,Not available,2012.0,10.1007/s11002-012-9193-2,Marketing Letters,Alex2012,False,,Springer,Not available,On the optimal number of advertising slots in a generalized second-price auction,2797782d908338ddc41021f1272c8ad9,http://dx.doi.org/10.1007/s11002-012-9193-2 1347,Experimental methods are currently being extensively used to elicit subjective values for commodities and projects. Three methodological problems are not systematically addressed in this emerging literature. The first is the potential for laboratory responses to be censored by field opportunities so that lab responses can be confounded by uncontrolled knowledge of the field; the second is the potential for subjective perceptions about field opportunities and hence valuation responses to be affected by the institution used to elicit values; and the third is the potential for some elicitation institutions to influence subjective perceptions of characteristics of the commodity or project being valued and hence change the very commodity being valued. All three problems result in potential loss of control over the value elicitation process. For example we show that censoring affects conclusions drawn in a major study of beef packaging valuation. We derive implications for experimental designs that minimize the potential effect of these methodological problems.,glenn harrison,Not available,2004.0,10.1023/B:EXEC.0000026975.48587.f0,Experimental Economics,W.2004,False,,Springer,Not available,Experimental Methods and Elicitation of Values,1c63ad299eb38bb92a0ada458787c1fb,http://dx.doi.org/10.1023/B:EXEC.0000026975.48587.f0 1348,We suggest approximately optimal bidding strategies for games where similar items are auctioned repeatedly. Considering players’ bounded rationality in practice the results can further motivate the application of market-based approaches in resource allocation problems. We specialize the bidding algorithm for first-price payment schemes the building blocks of several simplified selling mechanisms that are common in practice.,amir danak,Not available,2012.0,10.1007/s10479-012-1148-8,Annals of Operations Research,Amir2012,False,,Springer,Not available,Approximately optimal bidding policies for repeated first-price auctions,cacb550ac0118bf714708f106a5310bb,http://dx.doi.org/10.1007/s10479-012-1148-8 1349,We suggest approximately optimal bidding strategies for games where similar items are auctioned repeatedly. Considering players’ bounded rationality in practice the results can further motivate the application of market-based approaches in resource allocation problems. We specialize the bidding algorithm for first-price payment schemes the building blocks of several simplified selling mechanisms that are common in practice.,shie mannor,Not available,2012.0,10.1007/s10479-012-1148-8,Annals of Operations Research,Amir2012,False,,Springer,Not available,Approximately optimal bidding policies for repeated first-price auctions,cacb550ac0118bf714708f106a5310bb,http://dx.doi.org/10.1007/s10479-012-1148-8 1350,The Dutch-auction method of bringing IPOs to market has been used sparingly since its initiation in 1999 despite the potential for this method to lead to more fully-priced issues. The development of Dutch-auctioned IPOs is documented here and institutional details are reviewed. An empirical investigation of the characteristics of these IPOs is presented. The evidence indicates smaller magnitudes of underpricing of Dutch-auctioned IPOs relative to traditional IPOs. A multi-variate analysis indicates however that this smaller degree of underpricing is due to factors other than the Dutch-auction process. The evidence strongly reinforces the institutional rationing hypothesis for underpricing. It also contributes to the international evidence of the failure of auctioned IPOs to avoid underpricing.,mary robinson,Not available,2012.0,10.1007/s12197-010-9166-3,Journal of Economics and Finance,Ann2012,False,,Springer,Not available,Dutch-auction IPOs: institutional development and underpricing performance,a47399432dd3e143dafc1e70337dd438,http://dx.doi.org/10.1007/s12197-010-9166-3 1351,The Dutch-auction method of bringing IPOs to market has been used sparingly since its initiation in 1999 despite the potential for this method to lead to more fully-priced issues. The development of Dutch-auctioned IPOs is documented here and institutional details are reviewed. An empirical investigation of the characteristics of these IPOs is presented. The evidence indicates smaller magnitudes of underpricing of Dutch-auctioned IPOs relative to traditional IPOs. A multi-variate analysis indicates however that this smaller degree of underpricing is due to factors other than the Dutch-auction process. The evidence strongly reinforces the institutional rationing hypothesis for underpricing. It also contributes to the international evidence of the failure of auctioned IPOs to avoid underpricing.,richard robinson,Not available,2012.0,10.1007/s12197-010-9166-3,Journal of Economics and Finance,Ann2012,False,,Springer,Not available,Dutch-auction IPOs: institutional development and underpricing performance,a47399432dd3e143dafc1e70337dd438,http://dx.doi.org/10.1007/s12197-010-9166-3 1352,In 1961 Vickrey posed the problem of finding an analytic solution to a first-price auction with two buyers having valuations uniformly distributed on ,todd kaplan,Not available,2012.0,10.1007/s00199-010-0563-9,Economic Theory,R.2012,False,,Springer,Not available,Asymmetric first-price auctions with uniform distributions: analytic solutions to the general case,d2b689df28c7575231efb5484ced3408,http://dx.doi.org/10.1007/s00199-010-0563-9 1353,In 1961 Vickrey posed the problem of finding an analytic solution to a first-price auction with two buyers having valuations uniformly distributed on ,shmuel zamir,Not available,2012.0,10.1007/s00199-010-0563-9,Economic Theory,R.2012,False,,Springer,Not available,Asymmetric first-price auctions with uniform distributions: analytic solutions to the general case,d2b689df28c7575231efb5484ced3408,http://dx.doi.org/10.1007/s00199-010-0563-9 1354,This paper studies shill bidding in the Vickrey–Clarke–Groves (VCG) mechanism applied to combinatorial auctions. Shill bidding is a strategy whereby a single decision-maker enters the auction under the guise of multiple identities (Yokoo et al. Games Econ Behav 46 pp. 174–188 2004). I formulate the problem of ,itai sher,Not available,2012.0,10.1007/s00199-010-0566-6,Economic Theory,Itai2012,False,,Springer,Not available,Optimal shill bidding in the VCG mechanism,980200077199271b359059ad93ed291d,http://dx.doi.org/10.1007/s00199-010-0566-6 1355,Telecommunication networks are now an interconnection of competitive operators that need to cooperate to ensure end-to-end delivery of traffic. Inter-domain agreements have to be performed and pricing is seen as a relevant way to reward intermediate domains for forwarding the traffic of others. In previous works Vickrey–Clark–Groves (VCG) double-sided auctions have been applied because they provide proper incentives lead to an efficient use of the network and verify other relevant characteristics. However it has been highlighted that the resource allocation schemes applying VCG auction are neither budget-balanced nor solvable in a decentralized way. In this paper we apply combinatorial double-sided auction to allocate the bandwidth resources over nodes. While previous works were using a centralized algorithm we use here a new pricing rule leading to a new budget-balanced pricing scheme for which allocations and charges can be computed in a decentralized way. We also analyze the impact of this scheme on the game over declared costs of nodes.,hoang-hai tran,Not available,2012.0,10.1007/s12243-011-0250-2,annals of telecommunications - annales des télécommunications,Hoang-Hai2012,False,,Springer,Not available,Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach,11fd8318496185f7d77ea9f0fbe9d221,http://dx.doi.org/10.1007/s12243-011-0250-2 1356,Telecommunication networks are now an interconnection of competitive operators that need to cooperate to ensure end-to-end delivery of traffic. Inter-domain agreements have to be performed and pricing is seen as a relevant way to reward intermediate domains for forwarding the traffic of others. In previous works Vickrey–Clark–Groves (VCG) double-sided auctions have been applied because they provide proper incentives lead to an efficient use of the network and verify other relevant characteristics. However it has been highlighted that the resource allocation schemes applying VCG auction are neither budget-balanced nor solvable in a decentralized way. In this paper we apply combinatorial double-sided auction to allocate the bandwidth resources over nodes. While previous works were using a centralized algorithm we use here a new pricing rule leading to a new budget-balanced pricing scheme for which allocations and charges can be computed in a decentralized way. We also analyze the impact of this scheme on the game over declared costs of nodes.,bruno tuffin,Not available,2012.0,10.1007/s12243-011-0250-2,annals of telecommunications - annales des télécommunications,Hoang-Hai2012,False,,Springer,Not available,Combinatorial double-sided auctions for network bandwidth allocation: a budget-balanced and decentralized approach,11fd8318496185f7d77ea9f0fbe9d221,http://dx.doi.org/10.1007/s12243-011-0250-2 1357,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,jian chen,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 1358,Experimental methods are currently being extensively used to elicit subjective values for commodities and projects. Three methodological problems are not systematically addressed in this emerging literature. The first is the potential for laboratory responses to be censored by field opportunities so that lab responses can be confounded by uncontrolled knowledge of the field; the second is the potential for subjective perceptions about field opportunities and hence valuation responses to be affected by the institution used to elicit values; and the third is the potential for some elicitation institutions to influence subjective perceptions of characteristics of the commodity or project being valued and hence change the very commodity being valued. All three problems result in potential loss of control over the value elicitation process. For example we show that censoring affects conclusions drawn in a major study of beef packaging valuation. We derive implications for experimental designs that minimize the potential effect of these methodological problems.,ronald harstad,Not available,2004.0,10.1023/B:EXEC.0000026975.48587.f0,Experimental Economics,W.2004,False,,Springer,Not available,Experimental Methods and Elicitation of Values,1c63ad299eb38bb92a0ada458787c1fb,http://dx.doi.org/10.1023/B:EXEC.0000026975.48587.f0 1359,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,ya-mei gao,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 1360,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,yong-hong kuo,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 1361,I consider competitions in which conditional on winning or losing the effort exerted by a competitor does not necessarily decrease his payoff. This happens for example in competitions for promotions in which workers are intrinsically motivated and in research and development races in which better performance implies a higher payoff from winning. I characterize players’ equilibrium payoffs in closed form thereby generalizing Siegel (Econometrica 77(1):71–92 ,ron siegel,Not available,2014.0,10.1007/s00182-013-0393-7,International Journal of Game Theory,Ron2014,False,,Springer,Not available,Contests with productive effort,ac23ae4f67fe51445a405c2a2aea8452,http://dx.doi.org/10.1007/s00182-013-0393-7 1362,A model of a network market with two nodes and perfect competition is analyzed. The equilibrium depending on the throughput capacity of a system of product logistics is determined and properties of the total welfare function are examined. A method is proposed for finding the optimum throughput capacity of a system of product logistics between two markets from the point of view of the total welfare.,a. vasin,Not available,2014.0,10.3103/S027864191403008X,Moscow University Computational Mathematics and Cybernetics,A.2014,False,,Springer,Not available,Optimum throughput of a system of product logistics between two markets,b22d881f893f3df6d57c272442cf299d,http://dx.doi.org/10.3103/S027864191403008X 1363,A model of a network market with two nodes and perfect competition is analyzed. The equilibrium depending on the throughput capacity of a system of product logistics is determined and properties of the total welfare function are examined. A method is proposed for finding the optimum throughput capacity of a system of product logistics between two markets from the point of view of the total welfare.,e. daylova,Not available,2014.0,10.3103/S027864191403008X,Moscow University Computational Mathematics and Cybernetics,A.2014,False,,Springer,Not available,Optimum throughput of a system of product logistics between two markets,b22d881f893f3df6d57c272442cf299d,http://dx.doi.org/10.3103/S027864191403008X 1364,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,ludwig ensthaler,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 1365,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,thomas giebe,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 1366,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,jianpei li,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 1367,We analyze the impacts of an antitrust investigation on the purchasing practices of a buying collaboration and its common bidding agent. Using a repeated cross section of prices across procurement auctions that were and were not subjected to the investigation we find that auction prices in the targeted auctions: (i) significantly increased as soon as the targets were made aware they were under investigation; (ii) remained higher as long as the investigation was open; and (iii) systematically declined to the same low pre-knowledge state after the closure of the investigation without prosecution. Finally the counterfactual impact on auction prices by the removal of the common bidding agent and the demise of the buying collaboration at a later date was on par with the impacts of the investigation.,kalyn coatney,Not available,2014.0,10.1007/s11151-013-9415-7,Review of Industrial Organization,T.2014,False,,Springer,Not available,The Impacts of an Antitrust Investigation: A Case Study in Agriculture,4e263e9b02da63731867075d5f72489b,http://dx.doi.org/10.1007/s11151-013-9415-7 1368,We analyze the impacts of an antitrust investigation on the purchasing practices of a buying collaboration and its common bidding agent. Using a repeated cross section of prices across procurement auctions that were and were not subjected to the investigation we find that auction prices in the targeted auctions: (i) significantly increased as soon as the targets were made aware they were under investigation; (ii) remained higher as long as the investigation was open; and (iii) systematically declined to the same low pre-knowledge state after the closure of the investigation without prosecution. Finally the counterfactual impact on auction prices by the removal of the common bidding agent and the demise of the buying collaboration at a later date was on par with the impacts of the investigation.,jesse tack,Not available,2014.0,10.1007/s11151-013-9415-7,Review of Industrial Organization,T.2014,False,,Springer,Not available,The Impacts of an Antitrust Investigation: A Case Study in Agriculture,4e263e9b02da63731867075d5f72489b,http://dx.doi.org/10.1007/s11151-013-9415-7 1369,Experimental methods are currently being extensively used to elicit subjective values for commodities and projects. Three methodological problems are not systematically addressed in this emerging literature. The first is the potential for laboratory responses to be censored by field opportunities so that lab responses can be confounded by uncontrolled knowledge of the field; the second is the potential for subjective perceptions about field opportunities and hence valuation responses to be affected by the institution used to elicit values; and the third is the potential for some elicitation institutions to influence subjective perceptions of characteristics of the commodity or project being valued and hence change the very commodity being valued. All three problems result in potential loss of control over the value elicitation process. For example we show that censoring affects conclusions drawn in a major study of beef packaging valuation. We derive implications for experimental designs that minimize the potential effect of these methodological problems.,e. rutstrom,Not available,2004.0,10.1023/B:EXEC.0000026975.48587.f0,Experimental Economics,W.2004,False,,Springer,Not available,Experimental Methods and Elicitation of Values,1c63ad299eb38bb92a0ada458787c1fb,http://dx.doi.org/10.1023/B:EXEC.0000026975.48587.f0 1370,The traditional Medicare fee-for-service program may be able to purchase clinical laboratory test services at a lower cost through competitive bidding. Demonstrations of competitive bidding for clinical laboratory tests have been twice mandated or authorized by Congress but never implemented. This article provides a summary and review of the final design of the laboratory competitive bidding demonstration mandated by the Medicare Modernization Act of 2003. The design was analogous to a sealed bid (first price) clearing price auction. Design elements presented include covered laboratory tests and beneficiaries laboratory bidding and payment status under the demonstration composite bids determining bidding winners and the demonstration fee schedule and quality under the demonstration. Expanded use of competitive bidding in Medicare including specifically for clinical laboratory tests has been recommended in some proposals for Medicare reform. The presented design may be a useful point of departure if Medicare clinical laboratory competitive bidding is revived in the future.,john kautter,Not available,2014.0,10.1007/s10754-013-9139-0,International Journal of Health Care Finance and Economics,John2014,False,,Springer,Not available,Competitive bidding for Medicare Part B clinical laboratory services,39b1468b41c7a4c3a977174ea7f33fee,http://dx.doi.org/10.1007/s10754-013-9139-0 1371,The traditional Medicare fee-for-service program may be able to purchase clinical laboratory test services at a lower cost through competitive bidding. Demonstrations of competitive bidding for clinical laboratory tests have been twice mandated or authorized by Congress but never implemented. This article provides a summary and review of the final design of the laboratory competitive bidding demonstration mandated by the Medicare Modernization Act of 2003. The design was analogous to a sealed bid (first price) clearing price auction. Design elements presented include covered laboratory tests and beneficiaries laboratory bidding and payment status under the demonstration composite bids determining bidding winners and the demonstration fee schedule and quality under the demonstration. Expanded use of competitive bidding in Medicare including specifically for clinical laboratory tests has been recommended in some proposals for Medicare reform. The presented design may be a useful point of departure if Medicare clinical laboratory competitive bidding is revived in the future.,gregory pope,Not available,2014.0,10.1007/s10754-013-9139-0,International Journal of Health Care Finance and Economics,John2014,False,,Springer,Not available,Competitive bidding for Medicare Part B clinical laboratory services,39b1468b41c7a4c3a977174ea7f33fee,http://dx.doi.org/10.1007/s10754-013-9139-0 1372,We compare the expected revenue in first- and second-price auctions with asymmetric bidders. We consider “close to uniform” distributions with identical supports and show that in the case of identical supports the expected revenue in second-price auctions may exceed that in first-price auctions. We also show that asymmetry over lower valuations has a stronger negative impact on the expected revenue in first-price auctions than in second-price auctions. However asymmetry over high valuations always increases the revenue in first-price auctions.,arieh gavious,Not available,2014.0,10.1007/s00182-013-0383-9,International Journal of Game Theory,Arieh2014,False,,Springer,Not available,Ranking asymmetric auctions,8a03887ed60357a0814d878e7bbb54c3,http://dx.doi.org/10.1007/s00182-013-0383-9 1373,We compare the expected revenue in first- and second-price auctions with asymmetric bidders. We consider “close to uniform” distributions with identical supports and show that in the case of identical supports the expected revenue in second-price auctions may exceed that in first-price auctions. We also show that asymmetry over lower valuations has a stronger negative impact on the expected revenue in first-price auctions than in second-price auctions. However asymmetry over high valuations always increases the revenue in first-price auctions.,yizhaq minchuk,Not available,2014.0,10.1007/s00182-013-0383-9,International Journal of Game Theory,Arieh2014,False,,Springer,Not available,Ranking asymmetric auctions,8a03887ed60357a0814d878e7bbb54c3,http://dx.doi.org/10.1007/s00182-013-0383-9 1374,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,aniruddha bagchi,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 1375,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,brett katzman,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 1376,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,timothy mathews,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 1377,The problem of resource allocation in a spectrum leasing scenario in cooperative cognitive radio networks is addressed. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. The SU pair allocates the whole its transmission power in a portion of transmission frame to relay the primary signals. In return the PU pairs lease their unused portion of transmission frame to the SU pair. In this way the PU pairs take advantage of their unused portion of time to gain savings in their transmission power. However a few important questions must be answered: When to lease and how much to be leased. We determine when is beneficial for PUs to lease their unused spectrum portion to the SU and how much of PUs’ resources is optimum to be leased. An efficient auction mechanism is proposed and the existence and uniqueness of the Nash Equilibrium (NE) for the proposed auction game is proved. Since the NE is the solution of a set of fixed point problems two iterative algorithms synchronous and asynchronous schemes are proposed to reach the NE in an iterative manner and their convergence to the fixed point is also proved. Finally the proposed auction is extended to a network with multiple secondary user pairs. Simulation results acknowledge the more efficient utilization of resources as a result of implementing the proposed auction based resource allocation.,mehdi adian,Not available,2014.0,10.1007/s11276-013-0612-y,Wireless Networks,Ghamari2014,False,,Springer,Not available,An auction-based approach for spectrum leasing in cooperative cognitive radio networks: when to lease and how much to be leased,a284f1d0bb0e3720f07bc2d41988a3e1,http://dx.doi.org/10.1007/s11276-013-0612-y 1378,The problem of resource allocation in a spectrum leasing scenario in cooperative cognitive radio networks is addressed. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. The SU pair allocates the whole its transmission power in a portion of transmission frame to relay the primary signals. In return the PU pairs lease their unused portion of transmission frame to the SU pair. In this way the PU pairs take advantage of their unused portion of time to gain savings in their transmission power. However a few important questions must be answered: When to lease and how much to be leased. We determine when is beneficial for PUs to lease their unused spectrum portion to the SU and how much of PUs’ resources is optimum to be leased. An efficient auction mechanism is proposed and the existence and uniqueness of the Nash Equilibrium (NE) for the proposed auction game is proved. Since the NE is the solution of a set of fixed point problems two iterative algorithms synchronous and asynchronous schemes are proposed to reach the NE in an iterative manner and their convergence to the fixed point is also proved. Finally the proposed auction is extended to a network with multiple secondary user pairs. Simulation results acknowledge the more efficient utilization of resources as a result of implementing the proposed auction based resource allocation.,hassan aghaeinia,Not available,2014.0,10.1007/s11276-013-0612-y,Wireless Networks,Ghamari2014,False,,Springer,Not available,An auction-based approach for spectrum leasing in cooperative cognitive radio networks: when to lease and how much to be leased,a284f1d0bb0e3720f07bc2d41988a3e1,http://dx.doi.org/10.1007/s11276-013-0612-y 1379,We compare the effects of information acquisition during a descending auction with its static counterpart the first-price sealed-bid auction. In a framework with heterogeneous prior information we show that an equilibrium with information acquisition exists in both auction formats. We show that everything else equal information acquisition is more desirable in the dynamic auction. Moreover we characterize a set of parameter values where more information is acquired in the dynamic auction in equilibrium. If the costs of information acquisition are sufficiently low the sealed-bid auction generates more revenue although the descending auction is more efficient.,vitali gretschko,Not available,2014.0,10.1007/s00199-013-0766-y,Economic Theory,Vitali2014,False,,Springer,Not available,Information acquisition during a descending auction,104ae760528a2f92d8ee0c6f6df2de15,http://dx.doi.org/10.1007/s00199-013-0766-y 1380,We propose a Bayesian approach to inference in repeated oral English auctions. The model allows for a dynamic behavior of the sequence of selling prices. We apply the technique to a sale of antiques and find a clear evidence of dynamic effects.,gian albano,Not available,2004.0,10.1007/BF02603006,Test,Luigi2004,False,,Springer,Not available,Bayesian inference in repeated English auctions,855d4e5954d7b921f6e94d78001889ab,http://dx.doi.org/10.1007/BF02603006 1381,We compare the effects of information acquisition during a descending auction with its static counterpart the first-price sealed-bid auction. In a framework with heterogeneous prior information we show that an equilibrium with information acquisition exists in both auction formats. We show that everything else equal information acquisition is more desirable in the dynamic auction. Moreover we characterize a set of parameter values where more information is acquired in the dynamic auction in equilibrium. If the costs of information acquisition are sufficiently low the sealed-bid auction generates more revenue although the descending auction is more efficient.,achim wambach,Not available,2014.0,10.1007/s00199-013-0766-y,Economic Theory,Vitali2014,False,,Springer,Not available,Information acquisition during a descending auction,104ae760528a2f92d8ee0c6f6df2de15,http://dx.doi.org/10.1007/s00199-013-0766-y 1382,,robert marshall,Not available,2001.0,10.1007/0-306-47568-5_11,Game Theory and Business Applications,C.2001,False,,Springer,Not available,The Economics of Auctions and Bidder Collusion,51638420ae8e5f258ca6e6abebb2179f,http://dx.doi.org/10.1007/0-306-47568-5_11 1383,,michael meurer,Not available,2001.0,10.1007/0-306-47568-5_11,Game Theory and Business Applications,C.2001,False,,Springer,Not available,The Economics of Auctions and Bidder Collusion,51638420ae8e5f258ca6e6abebb2179f,http://dx.doi.org/10.1007/0-306-47568-5_11 1384,This paper considers a model in which bidders in an auction are faced with uncertainty as to their final valuation of the auctioned object. This uncertainty is resolved after the auction has taken place. It is argued that the inclusion of a cooling-off right raises the expected revenue to the seHer when bidders face a risk of the object being a strict ‘bad’ in that owning the object incurs negative utility to the winner of the auction. The model is then tested in a laboratory setting. The evidence from this experiment supports the predictions of the theory.,j. asker,Not available,2001.0,10.1007/978-3-642-56448-2_8,Advances in Experimental Markets,J.2001,False,,Springer,Not available,Bidding up buying out and cooling-off: an examination of auctions with withdrawal rights,f0caa4b1591fb6c8664eab7451dc42a4,http://dx.doi.org/10.1007/978-3-642-56448-2_8 1385,In this paper we study algorithms for agents participating in multiple simultaneous auctions for a single private-value good; we use stochastic dynamic programming to derive formal methods for optimal algorithm specification; we study a number of algorithms of complementary complexity and effectiveness and report preliminary tests on them. The methods and analysis in this paper extend naturally to more complicated scenarios such as the purchase of multiple complementary goods although different problem areas bring their own challenges with respect to computational complexity.,andrew byde,Not available,2001.0,10.1007/3-540-45598-1_15,Electronic Commerce,Andrew2001,False,,Springer,Not available,A Dynamic Programming Model for Algorithm Design in Simultaneous Auctions,1a9f9e497a4687b89abc682feb426a55,http://dx.doi.org/10.1007/3-540-45598-1_15 1386,So far all existing auction models of bank competition have used a sealed bid framework. However the assumption that bank competition is a sealed bid auction lies that banks are only allowed to make one off and do not receive any information about the rival’s bid. For large firms this is not vent realistic. In reality the interest rate is determined o a process involving repeated bidding and information revelation. The precise features of this bidding process depend very much on the specific case. However there are several reasons to assume that in general this process is rather an open than a sealed bidding. Banks certainly have incentives to learn the offer of another bank and seem sometimes to be able to do that. The firms are interested in open bidding as well. It seems to be common that firms use the credit offer of one bank to incite another bank to undercsa. They can credibly communicate the offer for example by showing the credit comma. In fact they do not even need to (lo so. We also obtain an open bid setting when a hank realizing that its credit offer will not be accepted makes a second offer. Of course in order to obtain the perfect analogy of an open bid auction firms would have to go back and forth from one hank to the other infinitely often which is definitely not realistic. Is fact firms also switch par of their bank loam quite frequently from one hank to another depending on the offers and on the outcomes of the negotiations with the Hulks they do business with. In the case of as firms this may be less frequent than N the case of larger firms. The case of switching infinitely often is thus a limiting case.,michael troge,Not available,2001.0,10.1007/978-3-663-08310-8_3,Competition in Credit Markets,Michael2001,False,,Springer,Not available,Open bid auctions,86f735c11a952e3677c30b99ea4c34a4,http://dx.doi.org/10.1007/978-3-663-08310-8_3 1387,In this chapter the incentives to acquire costly information in a sealed bid common value model of credit market competition will be analyzed. The existing work is generalized in two directions:,michael troge,Not available,2001.0,10.1007/978-3-663-08310-8_2,Competition in Credit Markets,Michael2001,False,,Springer,Not available,Information acquisition in credit auctions,4adf3197ee80b339b5cb956ac480d20d,http://dx.doi.org/10.1007/978-3-663-08310-8_2 1388,We introduce ,janos csirik,Not available,2001.0,10.1007/3-540-45598-1_14,Electronic Commerce,A.2001,False,,Springer,Not available,,84017731b673a6e52017099a868bafd9,http://dx.doi.org/10.1007/3-540-45598-1_14 1389,We introduce ,michael littman,Not available,2001.0,10.1007/3-540-45598-1_14,Electronic Commerce,A.2001,False,,Springer,Not available,,84017731b673a6e52017099a868bafd9,http://dx.doi.org/10.1007/3-540-45598-1_14 1390,We introduce ,satinder singh,Not available,2001.0,10.1007/3-540-45598-1_14,Electronic Commerce,A.2001,False,,Springer,Not available,,84017731b673a6e52017099a868bafd9,http://dx.doi.org/10.1007/3-540-45598-1_14 1391,We propose a Bayesian approach to inference in repeated oral English auctions. The model allows for a dynamic behavior of the sequence of selling prices. We apply the technique to a sale of antiques and find a clear evidence of dynamic effects.,frederic jouneau-sion,Not available,2004.0,10.1007/BF02603006,Test,Luigi2004,False,,Springer,Not available,Bayesian inference in repeated English auctions,855d4e5954d7b921f6e94d78001889ab,http://dx.doi.org/10.1007/BF02603006 1392,We introduce ,peter stone,Not available,2001.0,10.1007/3-540-45598-1_14,Electronic Commerce,A.2001,False,,Springer,Not available,,84017731b673a6e52017099a868bafd9,http://dx.doi.org/10.1007/3-540-45598-1_14 1393,In this paper we discuss the design of algorithms for agents to use when participating in multiple simultaneous English auctions aiming to purchase multiple goods. Firstly we present a coordination algorithm which ensures the agent places appropriate bids in the different auctions to buy exactly the right number of goods. Secondly we combine this with an algorithm to determine what maximum bid an agent should place in an auction that is about to terminate. This algorithm combines a belief-based model of the auctions with a utility analysis. This analysis is to trade off the certain outcome of the terminating auction against the possible outcomes of the remaining auctions and hence to place appropriate bids in each.,chris preist,Not available,2001.0,10.1007/3-540-44723-7_10,Agent-Mediated Electronic Commerce III,Chris2001,False,,Springer,Not available,Algorithm Design for Agents which Participate in Multiple Simultaneous Auctions,80decaefce84b8d0ea7ec05b3b14b63c,http://dx.doi.org/10.1007/3-540-44723-7_10 1394,In this paper we discuss the design of algorithms for agents to use when participating in multiple simultaneous English auctions aiming to purchase multiple goods. Firstly we present a coordination algorithm which ensures the agent places appropriate bids in the different auctions to buy exactly the right number of goods. Secondly we combine this with an algorithm to determine what maximum bid an agent should place in an auction that is about to terminate. This algorithm combines a belief-based model of the auctions with a utility analysis. This analysis is to trade off the certain outcome of the terminating auction against the possible outcomes of the remaining auctions and hence to place appropriate bids in each.,claudio bartolini,Not available,2001.0,10.1007/3-540-44723-7_10,Agent-Mediated Electronic Commerce III,Chris2001,False,,Springer,Not available,Algorithm Design for Agents which Participate in Multiple Simultaneous Auctions,80decaefce84b8d0ea7ec05b3b14b63c,http://dx.doi.org/10.1007/3-540-44723-7_10 1395,In this paper we discuss the design of algorithms for agents to use when participating in multiple simultaneous English auctions aiming to purchase multiple goods. Firstly we present a coordination algorithm which ensures the agent places appropriate bids in the different auctions to buy exactly the right number of goods. Secondly we combine this with an algorithm to determine what maximum bid an agent should place in an auction that is about to terminate. This algorithm combines a belief-based model of the auctions with a utility analysis. This analysis is to trade off the certain outcome of the terminating auction against the possible outcomes of the remaining auctions and hence to place appropriate bids in each.,ivan phillips,Not available,2001.0,10.1007/3-540-44723-7_10,Agent-Mediated Electronic Commerce III,Chris2001,False,,Springer,Not available,Algorithm Design for Agents which Participate in Multiple Simultaneous Auctions,80decaefce84b8d0ea7ec05b3b14b63c,http://dx.doi.org/10.1007/3-540-44723-7_10 1396,We are concerned with the issues on designing adaptive trading agents to learn bidding strategies in electronic market places. The synchronous double auction is used as a simulation testbed. We implemented agents with neural-network-based reinforcement learning called Q-learning agents (QLA) to learn bidding strategies in the double auctions. In order to compare the performances of QLAs in the electronic market places we also implemented many kinds of non-adaptive trading agents such as simple random bidding agents (SRBA) gradient-based greedy agent (GBGA) and truth telling agent (TTA). Instead of learning to model other trading agents that is computational intractable we designed learning agents to model the market environment as a whole instead. Our experimental results showed that in terms of global market efficiency QLAs could outperform TTAs and GBGAs but could not outperform SRBAs in the market of homogeneous type of agents. In terms of individual performance QLAs could outperform all three non-adaptive trading agents when the opponents they are dealing with in the market place are a purely homogeneous type of non-adaptive trading agents. However QLAs could only outperform TTAs and GBGAs and could not outperform SRBAs in the market of heterogeneous types of agents.,wei-tek hsu,Not available,2001.0,10.1007/3-540-44637-0_8,Intelligent Agents: Specification Modeling and Applications,Wei-Tek2001,False,,Springer,Not available,Market Performance of Adaptive Trading Agents in Synchronous Double Auctions,88de556777e3fc532af6f74a3a2ebb3e,http://dx.doi.org/10.1007/3-540-44637-0_8 1397,We are concerned with the issues on designing adaptive trading agents to learn bidding strategies in electronic market places. The synchronous double auction is used as a simulation testbed. We implemented agents with neural-network-based reinforcement learning called Q-learning agents (QLA) to learn bidding strategies in the double auctions. In order to compare the performances of QLAs in the electronic market places we also implemented many kinds of non-adaptive trading agents such as simple random bidding agents (SRBA) gradient-based greedy agent (GBGA) and truth telling agent (TTA). Instead of learning to model other trading agents that is computational intractable we designed learning agents to model the market environment as a whole instead. Our experimental results showed that in terms of global market efficiency QLAs could outperform TTAs and GBGAs but could not outperform SRBAs in the market of homogeneous type of agents. In terms of individual performance QLAs could outperform all three non-adaptive trading agents when the opponents they are dealing with in the market place are a purely homogeneous type of non-adaptive trading agents. However QLAs could only outperform TTAs and GBGAs and could not outperform SRBAs in the market of heterogeneous types of agents.,von-wun soo,Not available,2001.0,10.1007/3-540-44637-0_8,Intelligent Agents: Specification Modeling and Applications,Wei-Tek2001,False,,Springer,Not available,Market Performance of Adaptive Trading Agents in Synchronous Double Auctions,88de556777e3fc532af6f74a3a2ebb3e,http://dx.doi.org/10.1007/3-540-44637-0_8 1398,In this paper we provide an algorithmic approach to the study of online auctioning. From the perspective of the seller we formalize the auctioning problem as that of designing an algorithmic strategy that fairly maximizes the revenue earned by selling ,amitabha bagchi,Not available,2001.0,10.1007/3-540-44634-6_13,Algorithms and Data Structures,Amitabha2001,False,,Springer,Not available,Seller-Focused Algorithms for Online Auctioning,b26342fad16e5bdfc6147a0e7d5e51f2,http://dx.doi.org/10.1007/3-540-44634-6_13 1399,In this paper we provide an algorithmic approach to the study of online auctioning. From the perspective of the seller we formalize the auctioning problem as that of designing an algorithmic strategy that fairly maximizes the revenue earned by selling ,amitabh chaudhary,Not available,2001.0,10.1007/3-540-44634-6_13,Algorithms and Data Structures,Amitabha2001,False,,Springer,Not available,Seller-Focused Algorithms for Online Auctioning,b26342fad16e5bdfc6147a0e7d5e51f2,http://dx.doi.org/10.1007/3-540-44634-6_13 1400,In this paper we provide an algorithmic approach to the study of online auctioning. From the perspective of the seller we formalize the auctioning problem as that of designing an algorithmic strategy that fairly maximizes the revenue earned by selling ,rahul garg,Not available,2001.0,10.1007/3-540-44634-6_13,Algorithms and Data Structures,Amitabha2001,False,,Springer,Not available,Seller-Focused Algorithms for Online Auctioning,b26342fad16e5bdfc6147a0e7d5e51f2,http://dx.doi.org/10.1007/3-540-44634-6_13 1401,In this paper we provide an algorithmic approach to the study of online auctioning. From the perspective of the seller we formalize the auctioning problem as that of designing an algorithmic strategy that fairly maximizes the revenue earned by selling ,michael goodrich,Not available,2001.0,10.1007/3-540-44634-6_13,Algorithms and Data Structures,Amitabha2001,False,,Springer,Not available,Seller-Focused Algorithms for Online Auctioning,b26342fad16e5bdfc6147a0e7d5e51f2,http://dx.doi.org/10.1007/3-540-44634-6_13 1402,The ,yannick gabuthy,Not available,2004.0,10.1023/B:EJLE.0000028641.96459.51,European Journal of Law and Economics,Yannick2004,False,,Springer,Not available,Online Dispute Resolution and Bargaining,62d38d881efc283ad37007c28dbdf894,http://dx.doi.org/10.1023/B:EJLE.0000028641.96459.51 1403,In this paper we provide an algorithmic approach to the study of online auctioning. From the perspective of the seller we formalize the auctioning problem as that of designing an algorithmic strategy that fairly maximizes the revenue earned by selling ,vijay kumar,Not available,2001.0,10.1007/3-540-44634-6_13,Algorithms and Data Structures,Amitabha2001,False,,Springer,Not available,Seller-Focused Algorithms for Online Auctioning,b26342fad16e5bdfc6147a0e7d5e51f2,http://dx.doi.org/10.1007/3-540-44634-6_13 1404,In the face of multiple electronic sales sites buyers can benefit from considering multiple opportunities and devising their purchase strategy to reduce risk and increase expected utility. However human users cannot approach and rapidly monitor multiple sites. In particular sites where prices change dynamically such as auction sites pose a major difficulty for human concurrent activity. Even without concurrency the majority of human users do not have the ability or the resources to compute optimal purchase decisions. Such activities can be performed by computational agents. In this paper we present mechanisms that allow agents to perform purchases on behalf of users. In particular we devised methods that allow an agent that faces multiple dynamic sales sites to compute bids that optimized the expected utility of the user or instead reduce and manage the risk of the purchase. The proposed mechanism are currently embedded in agents we develop in our lab.,onn shehory,Not available,2001.0,10.1007/3-540-44799-7_15,Cooperative Information Agents V,Onn2001,False,,Springer,Not available,Optimality and Risk in Purchase from Multiple Auctions,f687d153152f87f759f329157e15e2c0,http://dx.doi.org/10.1007/3-540-44799-7_15 1413,This paper studies dynamic resource allocation in a decentralized communication network. The temporal aspect in the decentralized resource allocation problem presents new challenges e.g. in optimizing the delay-throughput trade-off under user-specific delay costs. A dynamic bandwidth allocation game modelling an agent-based network is presented. The dynamic noncooperative game achieves Pareto-efficient bandwidth allocation that can be implemented by a greedy algorithm with pricing. Optimal dynamic pricing is discussed for the efficient sharing of network resources. An ad hoc wireless network is an example of such self-organizing decentralized system: the mobile nodes need not be directly connected to a base station. Another application of the model is to consider distributed uplink scheduling based on local information in a WCDMA network. The discretized control variable of a mobile node is either the received power/,t. heikkinen,Not available,2004.0,10.1023/B:WINE.0000023858.20849.ab,Wireless Networks,T.2004,False,,Springer,Not available,Distributed Scheduling and Dynamic Pricing in a Communication Network,5e72d4f36cdc6fc37382efae48202f6e,http://dx.doi.org/10.1023/B:WINE.0000023858.20849.ab 1417,Attracting bidders to an auction is a key factor in determining revenue. We experimentally investigate entry and bidding behavior in first-price and English clock auctions to determine the revenue implications of entry. Potential bidders observe their value and then decide whether or not to incur a cost to enter. We also vary whether or not bidders are informed regarding the number of entrants prior to placing their bids. Revenue equivalence is predicted in all four environments. We find that regardless of whether or not bidders are informed first-price auctions generate more revenue than English clock auctions. Within a given auction format the effect of informing bidders differs. In first-price auctions revenue is higher when bidders are informed while the opposite is true in English clock auctions. The optimal choice for an auction designer who wishes to maximize revenue is a first-price auction with uninformed bidders.,diego aycinena,Not available,2018.0,10.1007/s10683-017-9558-8,Experimental Economics,Diego2018,False,,Springer,Not available,Auctions with endogenous participation and an uncertain number of bidders: experimental evidence,bbd4e427f3ec811ef1f36002b05c2cbc,http://dx.doi.org/10.1007/s10683-017-9558-8 1418,Attracting bidders to an auction is a key factor in determining revenue. We experimentally investigate entry and bidding behavior in first-price and English clock auctions to determine the revenue implications of entry. Potential bidders observe their value and then decide whether or not to incur a cost to enter. We also vary whether or not bidders are informed regarding the number of entrants prior to placing their bids. Revenue equivalence is predicted in all four environments. We find that regardless of whether or not bidders are informed first-price auctions generate more revenue than English clock auctions. Within a given auction format the effect of informing bidders differs. In first-price auctions revenue is higher when bidders are informed while the opposite is true in English clock auctions. The optimal choice for an auction designer who wishes to maximize revenue is a first-price auction with uninformed bidders.,lucas rentschler,Not available,2018.0,10.1007/s10683-017-9558-8,Experimental Economics,Diego2018,False,,Springer,Not available,Auctions with endogenous participation and an uncertain number of bidders: experimental evidence,bbd4e427f3ec811ef1f36002b05c2cbc,http://dx.doi.org/10.1007/s10683-017-9558-8 1419,This study analyzes the equilibrium of a core-selecting package auction under incomplete information. The ascending proxy auction of Ausubel and Milgrom (Front Theor Econ 1:1–42 ,ryuji sano,Not available,2018.0,10.1007/s10058-018-0212-5,Review of Economic Design,Ryuji2018,False,,Springer,Not available,An equilibrium analysis of a core-selecting package auction with reserve prices,f93647db5273d9ee24ad5aafe0089b7c,http://dx.doi.org/10.1007/s10058-018-0212-5 1420,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,andrea morone,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 1421,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,simone nuzzo,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 1422,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,rocco caferra,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 1423,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,sumit agarwal,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 1424,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders' reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,lawrence ausubel,Not available,2004.0,10.1007/s00199-003-0398-8,Economic Theory,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,7ebd6afc572d89bc7bf92c3f71998ca1,http://dx.doi.org/10.1007/s00199-003-0398-8 1425,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,jing li,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 1426,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,ernie teo,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 1427,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,alan cheong,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 1428,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,xiaojing xu,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 1429,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,jinpeng ma,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 1430,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,xiaoping xie,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 1431,When agents (bidders) have multi-demand preferences uniform price auctions are generally not immune to agents’ strategic manipulation and they may achieve an inefficient allocation. We consider economies in which a large number of identical objects have to be allocated. Agents have quasi-linear preferences with non-increasing incremental valuations. We explore the incentives of agents in uniform price auctions. An important assumption on preferences is proposed called “no monopoly.” It requires that preferences should be correlated in such a way that no agent’s incremental valuation for an additional object when he receives sufficiently many objects is higher than those of the other agents. We show that under no monopoly and other mild assumptions on preferences as the number of objects goes to infinity the payment in any uniform price auction converges to that in a Vickrey auction. We deduce that when there are sufficiently many objects truth-telling is an approximate Bayesian Nash equilibrium in each uniform price auction.,tomoya tajika,Not available,2018.0,10.1007/s00182-018-0641-y,International Journal of Game Theory,Tomoya2018,False,,Springer,Not available,Non-manipulability of uniform price auctions with a large number of objects,0684fbfbe745ba9c72f403fd1b5cc9b0,http://dx.doi.org/10.1007/s00182-018-0641-y 1432,When agents (bidders) have multi-demand preferences uniform price auctions are generally not immune to agents’ strategic manipulation and they may achieve an inefficient allocation. We consider economies in which a large number of identical objects have to be allocated. Agents have quasi-linear preferences with non-increasing incremental valuations. We explore the incentives of agents in uniform price auctions. An important assumption on preferences is proposed called “no monopoly.” It requires that preferences should be correlated in such a way that no agent’s incremental valuation for an additional object when he receives sufficiently many objects is higher than those of the other agents. We show that under no monopoly and other mild assumptions on preferences as the number of objects goes to infinity the payment in any uniform price auction converges to that in a Vickrey auction. We deduce that when there are sufficiently many objects truth-telling is an approximate Bayesian Nash equilibrium in each uniform price auction.,tomoya kazumura,Not available,2018.0,10.1007/s00182-018-0641-y,International Journal of Game Theory,Tomoya2018,False,,Springer,Not available,Non-manipulability of uniform price auctions with a large number of objects,0684fbfbe745ba9c72f403fd1b5cc9b0,http://dx.doi.org/10.1007/s00182-018-0641-y 1433,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids for each additional unit i.e. a submodular curve. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.1885. This resolves one of the open questions posed in previous works on multi-unit auctions. We also discuss implications of our bounds for an alternative more practical form of the auction employing a “,georgios birmpas,Not available,2018.0,10.1007/s00224-018-9889-7,Theory of Computing Systems,Georgios2018,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,d27f4068ca5946de9c034380783dad07,http://dx.doi.org/10.1007/s00224-018-9889-7 1434,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids for each additional unit i.e. a submodular curve. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.1885. This resolves one of the open questions posed in previous works on multi-unit auctions. We also discuss implications of our bounds for an alternative more practical form of the auction employing a “,evangelos markakis,Not available,2018.0,10.1007/s00224-018-9889-7,Theory of Computing Systems,Georgios2018,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,d27f4068ca5946de9c034380783dad07,http://dx.doi.org/10.1007/s00224-018-9889-7 1435,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders' reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,peter cramton,Not available,2004.0,10.1007/s00199-003-0398-8,Economic Theory,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,7ebd6afc572d89bc7bf92c3f71998ca1,http://dx.doi.org/10.1007/s00199-003-0398-8 1436,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids for each additional unit i.e. a submodular curve. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.1885. This resolves one of the open questions posed in previous works on multi-unit auctions. We also discuss implications of our bounds for an alternative more practical form of the auction employing a “,orestis telelis,Not available,2018.0,10.1007/s00224-018-9889-7,Theory of Computing Systems,Georgios2018,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,d27f4068ca5946de9c034380783dad07,http://dx.doi.org/10.1007/s00224-018-9889-7 1437,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids for each additional unit i.e. a submodular curve. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.1885. This resolves one of the open questions posed in previous works on multi-unit auctions. We also discuss implications of our bounds for an alternative more practical form of the auction employing a “,artem tsikiridis,Not available,2018.0,10.1007/s00224-018-9889-7,Theory of Computing Systems,Georgios2018,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,d27f4068ca5946de9c034380783dad07,http://dx.doi.org/10.1007/s00224-018-9889-7 1438,We start from the fact that individual behaviour is always mediated by social relations. A heuristic is not good or bad rational or irrational but only relative to an institutional environment. Thus for a given environment the Continuous Double Action (CDA) market we examine the performance of alternative ,marta posada,Not available,2006.0,10.1007/3-540-28547-4_4,Artificial Economics,Marta2006,False,,Springer,Not available,Learning in Continuous Double Auction Market,6249d03c27f6ec513f7a032893357d59,http://dx.doi.org/10.1007/3-540-28547-4_4 1439,We start from the fact that individual behaviour is always mediated by social relations. A heuristic is not good or bad rational or irrational but only relative to an institutional environment. Thus for a given environment the Continuous Double Action (CDA) market we examine the performance of alternative ,cesareo hernandez,Not available,2006.0,10.1007/3-540-28547-4_4,Artificial Economics,Marta2006,False,,Springer,Not available,Learning in Continuous Double Auction Market,6249d03c27f6ec513f7a032893357d59,http://dx.doi.org/10.1007/3-540-28547-4_4 1440,We start from the fact that individual behaviour is always mediated by social relations. A heuristic is not good or bad rational or irrational but only relative to an institutional environment. Thus for a given environment the Continuous Double Action (CDA) market we examine the performance of alternative ,adolfo lopez-paredes,Not available,2006.0,10.1007/3-540-28547-4_4,Artificial Economics,Marta2006,False,,Springer,Not available,Learning in Continuous Double Auction Market,6249d03c27f6ec513f7a032893357d59,http://dx.doi.org/10.1007/3-540-28547-4_4 1441,Willingness-to-pay (WTP) data elicited with the help of incentive compatible methods like the Vickrey auction and the BDM mechanism promise higher validity than stated preferences data and provide more information content than do revealed-preferences data. However research shows that subjects in a Vickrey auction do not always follow the dominant strategy of bidding their WTP but frequently bid too high or too low. Although this phenomenon is usually attributed to irrational behavior that need not be the only explanation. In marketing research applications subjects are typically asked their WTP for a new product and it appears that most subjects are uncertain about their exact WTP. We present a modified bidding model to explain that in this case it is optimal for risk-averse but rational bidders to underestimate rather than to overestimate their WTP. The model is supported by preliminary experimental data.,klaus kaas,Not available,2006.0,10.1007/BF03396723,Schmalenbach Business Review,Peter2006,False,,Springer,Not available,Are the Vickrey Auction and the BDM Mechanism Really Incentive Compatible? — Empirical Results and Optimal Bidding Strategies in Cases of Uncertain Willingness-to-pay,9280889a7b33a6ae65fee581e20ecfe2,http://dx.doi.org/10.1007/BF03396723 1442,Willingness-to-pay (WTP) data elicited with the help of incentive compatible methods like the Vickrey auction and the BDM mechanism promise higher validity than stated preferences data and provide more information content than do revealed-preferences data. However research shows that subjects in a Vickrey auction do not always follow the dominant strategy of bidding their WTP but frequently bid too high or too low. Although this phenomenon is usually attributed to irrational behavior that need not be the only explanation. In marketing research applications subjects are typically asked their WTP for a new product and it appears that most subjects are uncertain about their exact WTP. We present a modified bidding model to explain that in this case it is optimal for risk-averse but rational bidders to underestimate rather than to overestimate their WTP. The model is supported by preliminary experimental data.,heidrun ruprecht,Not available,2006.0,10.1007/BF03396723,Schmalenbach Business Review,Peter2006,False,,Springer,Not available,Are the Vickrey Auction and the BDM Mechanism Really Incentive Compatible? — Empirical Results and Optimal Bidding Strategies in Cases of Uncertain Willingness-to-pay,9280889a7b33a6ae65fee581e20ecfe2,http://dx.doi.org/10.1007/BF03396723 1443,Internet auctions in open dynamic environments have been attracting increasing attention. We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets. In almost all previous works agents have a fixed bidding strategy during the auction usually under static symmetric environments. In our simulations we allow the soft-agents to learn not only about how much they should bid or ask but also about possible switching between the alternative strategies. We examine the behaviour of strategic traders under dynamic asymmetric environments thus extending previous results. This analysis is important in the design and performance of auctions in the real world (stock exchanges commodity markets emission permits and B2B exchanges) and in the applications of auction theory to many problems in management and production far beyond market design (market oriented programming).,marta posada,Not available,2006.0,10.1007/11875581_145,Intelligent Data Engineering and Automated Learning – IDEAL 2006,Marta2006,False,,Springer,Not available,Strategic Software Agents in Continuous Double Auction Under Dynamic Environments,198ae67d14d4f158800cd3dd9d3a17bb,http://dx.doi.org/10.1007/11875581_145 1444,Sequential auctions are an important mechanism for buying/selling multiple objects. Now existing work in the area has studied sequential auctions for objects that are exclusively either common value or private value. However in many real-world cases an object has both features. Also in such cases the common value depends on how much each bidder values the object. Moreover a bidder generally does not know the true common value (since it may not know how much the other bidders value it). Given this our objective is to study settings that have both common and private value elements by treating each bidder’s information about the common value as ,shaheen fatima,Not available,2006.0,10.1007/11888727_3,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,S.2006,False,,Springer,Not available,An Analysis of Sequential Auctions for Common and Private Value Objects,56de6ca1816f32b6676ae3aa09a127b0,http://dx.doi.org/10.1007/11888727_3 1445,Sequential auctions are an important mechanism for buying/selling multiple objects. Now existing work in the area has studied sequential auctions for objects that are exclusively either common value or private value. However in many real-world cases an object has both features. Also in such cases the common value depends on how much each bidder values the object. Moreover a bidder generally does not know the true common value (since it may not know how much the other bidders value it). Given this our objective is to study settings that have both common and private value elements by treating each bidder’s information about the common value as ,michael wooldridge,Not available,2006.0,10.1007/11888727_3,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,S.2006,False,,Springer,Not available,An Analysis of Sequential Auctions for Common and Private Value Objects,56de6ca1816f32b6676ae3aa09a127b0,http://dx.doi.org/10.1007/11888727_3 1446, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ori haimanko,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1447,"Wie kommen die Preise für zeitgenössische Kunst zustande? Die Käufer dieser Kunst stehen vor einem Problem fundamentaler Ungewissheit da „Qualität“ nur schwer zu bestimmen und die Wertentwicklung als Investitionsobjekt kaum abzuschätzen ist. Da ein Markt für zeitgenössische Kunst die Möglichkeit zumindest begrenzt rationaler Kaufentscheidungen voraussetzt muss diese Ungewissheit abgebaut werden. Unsere These lautet dass der Wert eines Kunstwerks oder Künstlers in einem intersubjektiven Prozess der Bewertung und Reputationsverleihung durch Experten und Institutionen im Feld der Kunst entsteht. Dies geschieht vornehmlich durch die Institutionen des Kunstmarktes und der Künstlerausbildung also durch Galeristen Kuratoren Kritiker Kunsthändler Journalisten Sammler und Kunsthochschulen die gemeinsam an der Herstellung der künstlerischen Reputation eines Werks oder eines Künstlers beteiligt sind die dann wiederum die Grundlage für die Bestimmung des ökonomischen Wertes ist. Zur Überprüfung dieser Ausgangshypothese wurden zwei Datensätze mit Daten zu den Biografien von Künstlern erstellt und ausgewertet.,How are prices established in the market for contemporary art? Buyers in this market are confronted with fundamental uncertainty since “quality” is only difficult to determine and the development of prices is non-predictable. Since the emergence of a market for contemporary art presupposes at least the possibility for intentional rational decision-making this uncertainty must be reduced. We argue that the value of a piece of art or an artist is established in an intersubjective process of granting reputation by experts and institutions in the field of art. This is achieved primarily through the institutions of the art market and the training of artists i.e. through galleries curators critics art dealers journalists collectors and art schools. They participate jointly in the making of artistic reputation of the artist’s work that provides in turn the basis for the determination of its economic value. For testing this hypothesis we assembled and analyzed two datasets with data on the biographies of artists and prices for their works.",jens beckert,Not available,2004.0,10.1007/s11577-004-0002-7,KZfSS Kölner Zeitschrift für Soziologie und Sozialpsychologie,Jens2004,False,,Springer,Not available,Kunst und Preise,5c98fee95d402981d09cab78223d89c0,http://dx.doi.org/10.1007/s11577-004-0002-7 1448,Sequential auctions are an important mechanism for buying/selling multiple objects. Now existing work in the area has studied sequential auctions for objects that are exclusively either common value or private value. However in many real-world cases an object has both features. Also in such cases the common value depends on how much each bidder values the object. Moreover a bidder generally does not know the true common value (since it may not know how much the other bidders value it). Given this our objective is to study settings that have both common and private value elements by treating each bidder’s information about the common value as ,nicholas jennings,Not available,2006.0,10.1007/11888727_3,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,S.2006,False,,Springer,Not available,An Analysis of Sequential Auctions for Common and Private Value Objects,56de6ca1816f32b6676ae3aa09a127b0,http://dx.doi.org/10.1007/11888727_3 1449,There is an extensive body of literature concerning optimal bidding strategies for agents participating in single shot auctions for single individually valued goods. However it remains a largely open question how a bidder should formulate his bidding strategy when there is a sequence of auctions and furthermore there are complementarities in the valuation for the bundle of items acquired in the separate auctions. We investigate conditions for which adjusting the bidding horizon beyond the immediate auction is profitable for a bidder. We show how such a strategy in the limit reduces agents to zero marginal profits as predicted by the Bertrand economic theory. We support our experimental results by drawing a parallel to the nIPD.,p. hoen,Not available,2006.0,10.1007/11888727_2,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,’t2006,False,,Springer,Not available,Repeated Auctions with Complementarities,bf5e5a0d96a8a598638d59332fd51709,http://dx.doi.org/10.1007/11888727_2 1450,There is an extensive body of literature concerning optimal bidding strategies for agents participating in single shot auctions for single individually valued goods. However it remains a largely open question how a bidder should formulate his bidding strategy when there is a sequence of auctions and furthermore there are complementarities in the valuation for the bundle of items acquired in the separate auctions. We investigate conditions for which adjusting the bidding horizon beyond the immediate auction is profitable for a bidder. We show how such a strategy in the limit reduces agents to zero marginal profits as predicted by the Bertrand economic theory. We support our experimental results by drawing a parallel to the nIPD.,j. poutre,Not available,2006.0,10.1007/11888727_2,Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms,’t2006,False,,Springer,Not available,Repeated Auctions with Complementarities,bf5e5a0d96a8a598638d59332fd51709,http://dx.doi.org/10.1007/11888727_2 1451,,andrea consiglio,Not available,2006.0,10.1007/3-540-28547-4_18,Artificial Economics,Andrea2006,False,,Springer,Not available,Learning and the Price Dynamics of a Double-Auction Financial Market with Portfolio Traders,47c5d53ba6e3bab17684f544dbbf4a6f,http://dx.doi.org/10.1007/3-540-28547-4_18 1452,,valerio lacagnina,Not available,2006.0,10.1007/3-540-28547-4_18,Artificial Economics,Andrea2006,False,,Springer,Not available,Learning and the Price Dynamics of a Double-Auction Financial Market with Portfolio Traders,47c5d53ba6e3bab17684f544dbbf4a6f,http://dx.doi.org/10.1007/3-540-28547-4_18 1453,,annalisa russino,Not available,2006.0,10.1007/3-540-28547-4_18,Artificial Economics,Andrea2006,False,,Springer,Not available,Learning and the Price Dynamics of a Double-Auction Financial Market with Portfolio Traders,47c5d53ba6e3bab17684f544dbbf4a6f,http://dx.doi.org/10.1007/3-540-28547-4_18 1454,This paper presents a new bidding strategy for continuous double auctions (CDA) designed for Mertacor a successful trading agent which won the first price in the “travel game” of Trading Agent Competition (TAC) for 2005. TAC provides a realistic benchmarking environment in which various travel commodities are offered in simultaneous online auctions. Among these entertainment tickets are traded in CDA. The latter represent the most dynamic part of the TAC game in which agents are both sellers and buyers. In a CDA many uncertainty factors are introduced because prices are constantly changing during the game and price fluctuations are hard to be predicted. In order to deal with these factors of uncertainty we have designed a strategy based on achieving a pre-defined long-term profit. This preserves the bidding attitude of our agent and shows flexibility in changes of the environment. We finally present and discuss the results of TAC-05 as well as an analysis of agents performance in the entertainment auctions.,dionisis kehagias,Not available,2006.0,10.1007/11752912_14,Advances in Artificial Intelligence,Dionisis2006,False,,Springer,Not available,A Long-Term Profit Seeking Strategy for Continuous Double Auctions in a Trading Agent Competition,594bb29fe2382e1aa3a64b62cd268be0,http://dx.doi.org/10.1007/11752912_14 1455,This paper presents a new bidding strategy for continuous double auctions (CDA) designed for Mertacor a successful trading agent which won the first price in the “travel game” of Trading Agent Competition (TAC) for 2005. TAC provides a realistic benchmarking environment in which various travel commodities are offered in simultaneous online auctions. Among these entertainment tickets are traded in CDA. The latter represent the most dynamic part of the TAC game in which agents are both sellers and buyers. In a CDA many uncertainty factors are introduced because prices are constantly changing during the game and price fluctuations are hard to be predicted. In order to deal with these factors of uncertainty we have designed a strategy based on achieving a pre-defined long-term profit. This preserves the bidding attitude of our agent and shows flexibility in changes of the environment. We finally present and discuss the results of TAC-05 as well as an analysis of agents performance in the entertainment auctions.,panos toulis,Not available,2006.0,10.1007/11752912_14,Advances in Artificial Intelligence,Dionisis2006,False,,Springer,Not available,A Long-Term Profit Seeking Strategy for Continuous Double Auctions in a Trading Agent Competition,594bb29fe2382e1aa3a64b62cd268be0,http://dx.doi.org/10.1007/11752912_14 1456,This paper presents a new bidding strategy for continuous double auctions (CDA) designed for Mertacor a successful trading agent which won the first price in the “travel game” of Trading Agent Competition (TAC) for 2005. TAC provides a realistic benchmarking environment in which various travel commodities are offered in simultaneous online auctions. Among these entertainment tickets are traded in CDA. The latter represent the most dynamic part of the TAC game in which agents are both sellers and buyers. In a CDA many uncertainty factors are introduced because prices are constantly changing during the game and price fluctuations are hard to be predicted. In order to deal with these factors of uncertainty we have designed a strategy based on achieving a pre-defined long-term profit. This preserves the bidding attitude of our agent and shows flexibility in changes of the environment. We finally present and discuss the results of TAC-05 as well as an analysis of agents performance in the entertainment auctions.,pericles mitkas,Not available,2006.0,10.1007/11752912_14,Advances in Artificial Intelligence,Dionisis2006,False,,Springer,Not available,A Long-Term Profit Seeking Strategy for Continuous Double Auctions in a Trading Agent Competition,594bb29fe2382e1aa3a64b62cd268be0,http://dx.doi.org/10.1007/11752912_14 1457,We study the ,yunhong zhou,Not available,2006.0,10.1007/11940128_50,Algorithms and Computation,Yunhong2006,False,,Springer,Not available,Improved Multi-unit Auction Clearing Algorithms with Interval (Multiple-Choice) Knapsack Problems,f13d9ddacfed411a4d23344b8281d64d,http://dx.doi.org/10.1007/11940128_50 1458,"Wie kommen die Preise für zeitgenössische Kunst zustande? Die Käufer dieser Kunst stehen vor einem Problem fundamentaler Ungewissheit da „Qualität“ nur schwer zu bestimmen und die Wertentwicklung als Investitionsobjekt kaum abzuschätzen ist. Da ein Markt für zeitgenössische Kunst die Möglichkeit zumindest begrenzt rationaler Kaufentscheidungen voraussetzt muss diese Ungewissheit abgebaut werden. Unsere These lautet dass der Wert eines Kunstwerks oder Künstlers in einem intersubjektiven Prozess der Bewertung und Reputationsverleihung durch Experten und Institutionen im Feld der Kunst entsteht. Dies geschieht vornehmlich durch die Institutionen des Kunstmarktes und der Künstlerausbildung also durch Galeristen Kuratoren Kritiker Kunsthändler Journalisten Sammler und Kunsthochschulen die gemeinsam an der Herstellung der künstlerischen Reputation eines Werks oder eines Künstlers beteiligt sind die dann wiederum die Grundlage für die Bestimmung des ökonomischen Wertes ist. Zur Überprüfung dieser Ausgangshypothese wurden zwei Datensätze mit Daten zu den Biografien von Künstlern erstellt und ausgewertet.,How are prices established in the market for contemporary art? Buyers in this market are confronted with fundamental uncertainty since “quality” is only difficult to determine and the development of prices is non-predictable. Since the emergence of a market for contemporary art presupposes at least the possibility for intentional rational decision-making this uncertainty must be reduced. We argue that the value of a piece of art or an artist is established in an intersubjective process of granting reputation by experts and institutions in the field of art. This is achieved primarily through the institutions of the art market and the training of artists i.e. through galleries curators critics art dealers journalists collectors and art schools. They participate jointly in the making of artistic reputation of the artist’s work that provides in turn the basis for the determination of its economic value. For testing this hypothesis we assembled and analyzed two datasets with data on the biographies of artists and prices for their works.",jorg rossel,Not available,2004.0,10.1007/s11577-004-0002-7,KZfSS Kölner Zeitschrift für Soziologie und Sozialpsychologie,Jens2004,False,,Springer,Not available,Kunst und Preise,5c98fee95d402981d09cab78223d89c0,http://dx.doi.org/10.1007/s11577-004-0002-7 1459,This paper investigates a new auction model in which bidders have both copy and budget constraints. The new model has extensive and interesting applications in auctions of online ad-words software licenses etc. We consider the following problem: Suppose all the participators are rational how to allocate the objects at what price so as to guarantee auctioneer’s high revenue and how high it is.We introduce a new kind of mechanisms called ,tian-ming bu,Not available,2006.0,10.1007/11944874_3,Internet and Network Economics,Tian-Ming2006,False,,Springer,Not available,Unconditional Competitive Auctions with Copy and Budget Constraints,b0ebc156cbb1ed07caadde7f63ba620e,http://dx.doi.org/10.1007/11944874_3 1460,This paper investigates a new auction model in which bidders have both copy and budget constraints. The new model has extensive and interesting applications in auctions of online ad-words software licenses etc. We consider the following problem: Suppose all the participators are rational how to allocate the objects at what price so as to guarantee auctioneer’s high revenue and how high it is.We introduce a new kind of mechanisms called ,qi qi,Not available,2006.0,10.1007/11944874_3,Internet and Network Economics,Tian-Ming2006,False,,Springer,Not available,Unconditional Competitive Auctions with Copy and Budget Constraints,b0ebc156cbb1ed07caadde7f63ba620e,http://dx.doi.org/10.1007/11944874_3 1461,This paper investigates a new auction model in which bidders have both copy and budget constraints. The new model has extensive and interesting applications in auctions of online ad-words software licenses etc. We consider the following problem: Suppose all the participators are rational how to allocate the objects at what price so as to guarantee auctioneer’s high revenue and how high it is.We introduce a new kind of mechanisms called ,aries sun,Not available,2006.0,10.1007/11944874_3,Internet and Network Economics,Tian-Ming2006,False,,Springer,Not available,Unconditional Competitive Auctions with Copy and Budget Constraints,b0ebc156cbb1ed07caadde7f63ba620e,http://dx.doi.org/10.1007/11944874_3 1462,Current auction theory relies crucially on the assumption that all bidders bid homogeneously according to their Nash Equilibrium bidding strategies. However it remains silent on whether and how a priori heterogeneous bidders arrive at the NE. This paper investigates computationally whether evolutionary learning in repeated auctions could justify the assumption of NE bidding. Simulations show that Best Response learning of a priori heterogeneous bidders in first-price auctions does not converge to the NE. Instead bidders involve in permanent mutual adaptation that shows non trivial characteristics.,konrad richter,Not available,2006.0,10.1007/3-540-28727-2_14,The Complex Networks of Economic Interactions,Konrad2006,False,,Springer,Not available,Simulating Auctions,77032ea3e584fed22ce30b5edcfee1eb,http://dx.doi.org/10.1007/3-540-28727-2_14 1463,In the highly competitive shipping and transportation industry companies need to achieve a maximum level of efficiency in order to stay in business. To reach this goal they can for instance participate in collaborative networks and trade their transportation requests among each other. This is commonly done by using auction-based exchange systems. A critical part here is the formation of the request candidate set which is the bundle of requests that should be offered to other carriers. Therefore we develop and evaluate different request evaluation strategies for carriers participating in auction-based collaborations. For our investigations we use a framework that is based on an exchange mechanism presented in the literature. The goal is to maximize the total network profit while enabling the carriers to reveal as little as possible of their private information. We did several adaptions to the existing framework to improve the performance and to make it applicable to larger test cases. For instance the exact and thus costly tour building method is replaced by a heuristic approach. We achieve comparable results while the runtime is reduced by several orders of magnitude. Thus we are able to handle problems with an increased number of transportation requests. Different strategies for the evaluation of pickup and delivery requests are assessed based on their effect on the total profit of the collaborative carrier network.,margaretha gansterer,Not available,2016.0,10.1007/s00291-015-0411-1,OR Spectrum,Margaretha2016,False,,Springer,Not available,Request evaluation strategies for carriers in auction-based collaborations,553c20ba3379c889ddb44e14d80a1d7d,http://dx.doi.org/10.1007/s00291-015-0411-1 1464,In the highly competitive shipping and transportation industry companies need to achieve a maximum level of efficiency in order to stay in business. To reach this goal they can for instance participate in collaborative networks and trade their transportation requests among each other. This is commonly done by using auction-based exchange systems. A critical part here is the formation of the request candidate set which is the bundle of requests that should be offered to other carriers. Therefore we develop and evaluate different request evaluation strategies for carriers participating in auction-based collaborations. For our investigations we use a framework that is based on an exchange mechanism presented in the literature. The goal is to maximize the total network profit while enabling the carriers to reveal as little as possible of their private information. We did several adaptions to the existing framework to improve the performance and to make it applicable to larger test cases. For instance the exact and thus costly tour building method is replaced by a heuristic approach. We achieve comparable results while the runtime is reduced by several orders of magnitude. Thus we are able to handle problems with an increased number of transportation requests. Different strategies for the evaluation of pickup and delivery requests are assessed based on their effect on the total profit of the collaborative carrier network.,richard hartl,Not available,2016.0,10.1007/s00291-015-0411-1,OR Spectrum,Margaretha2016,False,,Springer,Not available,Request evaluation strategies for carriers in auction-based collaborations,553c20ba3379c889ddb44e14d80a1d7d,http://dx.doi.org/10.1007/s00291-015-0411-1 1465,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,christian kroemer,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 1466,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,martin bichler,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 1467,The combinatorial clock auction is a two-stage auction format which has been used to sell spectrum licenses worldwide in the recent years. It draws on a number of elegant ideas inspired by economic theory. A revealed preference activity rule should provide incentives to bid straightforward i.e. consistent with the bidders’ valuations on a payoff-maximizing package in each round of the clock phase. A second-price rule should set incentives to bid truthfully in both phases. If bidders respond to these incentives and bid straightforward in the clock phase and truthful in the second sealed-bid stage then the auction is fully efficient. Unfortunately bidders might neither bid straightforward in the clock phase nor truthful on all packages in the second sealed-bid stage due to strategic reasons or practical limitations. We introduce metrics based on Afriat’s Efficiency Index to analyze straightforward bidding and report on empirical data from the lab and from the field in the British 4G auction in 2013 and the Canadian 700 MHz auction in 2014 where the bids were made public. The data provides evidence that bidders deviate significantly from straightforward bidding in the clock phase which can restrict the bids they can submit in the supplementary phase. We show that such restrictions can have a significant negative impact on efficiency and revenue.,andor goetzendorff,Not available,2016.0,10.1007/s10726-015-9431-0,Group Decision and Negotiation,Christian2016,False,,Springer,Not available,(Un)expected Bidder Behavior in Spectrum Auctions: About Inconsistent Bidding and Its Impact on Efficiency in the Combinatorial Clock Auction,daaaf0a55cc6041c117c31f04e8ff2ec,http://dx.doi.org/10.1007/s10726-015-9431-0 1468,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,jun gao,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 1469,This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers i.e. the scheme is executed only by an auctioneer and bidders. Combinatorial auctions in which multiple goods are sold simultaneously have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentive compatibility and Pareto efficiency.Secure GVA schemes have been developed to prevent frauds by an auctioneer. However existing methods require third-party servers to execute the protocol. Having third-party servers that are operated by independent organizations is difficult in practice. Therefore it is desirable that a protocol be executed by the participants themselves. However if bidders take part in the execution of the auction procedure a bidder might have an incentive to be an active adversary so that he manipulates the declarations of other bidders to become a winner or to decrease his payment.In our proposed scheme we use a new protocol that can achieve the same outcome as the GVA. In this protocol the procedure executed by a bidder affects neither the prices nor the allocation of the bidder. Therefore a bidder does not have an incentive to be an active adversary.,makoto yokoo,Not available,2004.0,10.1007/978-3-540-27809-2_17,Financial Cryptography,Makoto2004,False,,Springer,Not available,Secure Generalized Vickrey Auction without Third-party Servers,c3c6fad6620e1730b58393a8265df022,http://dx.doi.org/10.1007/978-3-540-27809-2_17 1470,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,jiaqi wang,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 1471,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,ning lu,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 1472,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,fang zhu,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 1473,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,wenbo shi,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 1474,We survey some recent empirical work concerning the analysis of auctions. We begin by describing a two-step nonparametric approach for estimating bidding models that is commonly used in the applied literature. Two applications of this approach are considered: empirical work on bidding in Treasury markets and empirical tests for collusion in auctions.,patrick bajari,Not available,2016.0,10.1057/978-1-349-95121-5_2166-1,The New Palgrave Dictionary of Economics,Patrick2016,False,,Springer,Not available,Auctions (Applications),46785ac91e63d3d08badbb3101c9075e,http://dx.doi.org/10.1057/978-1-349-95121-5_2166-1 1475,,gagan goel,Not available,2016.0,10.1007/978-1-4939-2864-4_758,Encyclopedia of Algorithms,Gagan2016,False,,Springer,Not available,Revenue Monotone Auctions,5b9129f0f959c6b38ce27e97fb7753dc,http://dx.doi.org/10.1007/978-1-4939-2864-4_758 1476,,mohammad khani,Not available,2016.0,10.1007/978-1-4939-2864-4_758,Encyclopedia of Algorithms,Gagan2016,False,,Springer,Not available,Revenue Monotone Auctions,5b9129f0f959c6b38ce27e97fb7753dc,http://dx.doi.org/10.1007/978-1-4939-2864-4_758 1477,,makoto yokoo,Not available,2016.0,10.1007/978-1-4939-2864-4_141,Encyclopedia of Algorithms,Makoto2016,False,,Springer,Not available,False-Name-Proof Auction,66a91d6867cadc9be7b5aa5b11194edc,http://dx.doi.org/10.1007/978-1-4939-2864-4_141 1478,Most of the existing works in dynamic spectrum sharing commonly assumed that the auctioned spectrum resource would be exclusively occupied by the winning spectrum buyers. Such assumption poses a dilemma for the licensed spectrum owners: either auction off unused spectrum bands and get auction revenue at the risk of sudden increases in demand from PUs or reserve spectrum uneconomically. To address this issue the idea of ,changyan yi,Not available,2016.0,10.1007/978-3-319-29691-3_3,Market-Driven Spectrum Sharing in Cognitive Radio,Changyan2016,False,,Springer,Not available,Recall-Based Spectrum Auction Mechanism,3481b882ddd12951850a987559a83bf2,http://dx.doi.org/10.1007/978-3-319-29691-3_3 1479,Most of the existing works in dynamic spectrum sharing commonly assumed that the auctioned spectrum resource would be exclusively occupied by the winning spectrum buyers. Such assumption poses a dilemma for the licensed spectrum owners: either auction off unused spectrum bands and get auction revenue at the risk of sudden increases in demand from PUs or reserve spectrum uneconomically. To address this issue the idea of ,jun cai,Not available,2016.0,10.1007/978-3-319-29691-3_3,Market-Driven Spectrum Sharing in Cognitive Radio,Changyan2016,False,,Springer,Not available,Recall-Based Spectrum Auction Mechanism,3481b882ddd12951850a987559a83bf2,http://dx.doi.org/10.1007/978-3-319-29691-3_3 1480,This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers i.e. the scheme is executed only by an auctioneer and bidders. Combinatorial auctions in which multiple goods are sold simultaneously have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentive compatibility and Pareto efficiency.Secure GVA schemes have been developed to prevent frauds by an auctioneer. However existing methods require third-party servers to execute the protocol. Having third-party servers that are operated by independent organizations is difficult in practice. Therefore it is desirable that a protocol be executed by the participants themselves. However if bidders take part in the execution of the auction procedure a bidder might have an incentive to be an active adversary so that he manipulates the declarations of other bidders to become a winner or to decrease his payment.In our proposed scheme we use a new protocol that can achieve the same outcome as the GVA. In this protocol the procedure executed by a bidder affects neither the prices nor the allocation of the bidder. Therefore a bidder does not have an incentive to be an active adversary.,koutarou suzuki,Not available,2004.0,10.1007/978-3-540-27809-2_17,Financial Cryptography,Makoto2004,False,,Springer,Not available,Secure Generalized Vickrey Auction without Third-party Servers,c3c6fad6620e1730b58393a8265df022,http://dx.doi.org/10.1007/978-3-540-27809-2_17 1481,It’s widely recognized that auction is an efficient method to allocate spectrum resource. However due to exaggerated price asked in the primary market secondary users with limited budget cannot access to benefits in such auction. In our paper we consider the scenario that spectrum holder releases heterogeneous channels to secondary users. Therefore we propose an Efficient Auction Mechanism Toward Heterogenous Spectrum Allocation dubbed EATHER where channels are allocated as a greedy mode based on ‘bid density’. Our auction scheme gives sufficient consideration to heterogeneity of channel which is one of the challenges in spectrum auction. We show analytically that EATHER has polynomial time complexity. More precisely EATHER is efficient. Our analysis demonstrates EATHER achieves truthfulness individual rationality and budget balance. The simulation evaluates the performance of EATHER minutely in teams of buyer satisfaction ratio channel utilization ratio and social welfare.,haiyan qin,Not available,2016.0,10.1007/978-3-319-46257-8_39,Intelligent Data Engineering and Automated Learning – IDEAL 2016,Haiyan2016,False,,Springer,Not available,An Efficient Auction Mechanism Toward Heterogeneous Spectrum Allocation,a9e187f07cb2b3a73abbcec46194f1b3,http://dx.doi.org/10.1007/978-3-319-46257-8_39 1482,It’s widely recognized that auction is an efficient method to allocate spectrum resource. However due to exaggerated price asked in the primary market secondary users with limited budget cannot access to benefits in such auction. In our paper we consider the scenario that spectrum holder releases heterogeneous channels to secondary users. Therefore we propose an Efficient Auction Mechanism Toward Heterogenous Spectrum Allocation dubbed EATHER where channels are allocated as a greedy mode based on ‘bid density’. Our auction scheme gives sufficient consideration to heterogeneity of channel which is one of the challenges in spectrum auction. We show analytically that EATHER has polynomial time complexity. More precisely EATHER is efficient. Our analysis demonstrates EATHER achieves truthfulness individual rationality and budget balance. The simulation evaluates the performance of EATHER minutely in teams of buyer satisfaction ratio channel utilization ratio and social welfare.,xin li,Not available,2016.0,10.1007/978-3-319-46257-8_39,Intelligent Data Engineering and Automated Learning – IDEAL 2016,Haiyan2016,False,,Springer,Not available,An Efficient Auction Mechanism Toward Heterogeneous Spectrum Allocation,a9e187f07cb2b3a73abbcec46194f1b3,http://dx.doi.org/10.1007/978-3-319-46257-8_39 1483,It’s widely recognized that auction is an efficient method to allocate spectrum resource. However due to exaggerated price asked in the primary market secondary users with limited budget cannot access to benefits in such auction. In our paper we consider the scenario that spectrum holder releases heterogeneous channels to secondary users. Therefore we propose an Efficient Auction Mechanism Toward Heterogenous Spectrum Allocation dubbed EATHER where channels are allocated as a greedy mode based on ‘bid density’. Our auction scheme gives sufficient consideration to heterogeneity of channel which is one of the challenges in spectrum auction. We show analytically that EATHER has polynomial time complexity. More precisely EATHER is efficient. Our analysis demonstrates EATHER achieves truthfulness individual rationality and budget balance. The simulation evaluates the performance of EATHER minutely in teams of buyer satisfaction ratio channel utilization ratio and social welfare.,yonglong zhang,Not available,2016.0,10.1007/978-3-319-46257-8_39,Intelligent Data Engineering and Automated Learning – IDEAL 2016,Haiyan2016,False,,Springer,Not available,An Efficient Auction Mechanism Toward Heterogeneous Spectrum Allocation,a9e187f07cb2b3a73abbcec46194f1b3,http://dx.doi.org/10.1007/978-3-319-46257-8_39 1484,It’s widely recognized that auction is an efficient method to allocate spectrum resource. However due to exaggerated price asked in the primary market secondary users with limited budget cannot access to benefits in such auction. In our paper we consider the scenario that spectrum holder releases heterogeneous channels to secondary users. Therefore we propose an Efficient Auction Mechanism Toward Heterogenous Spectrum Allocation dubbed EATHER where channels are allocated as a greedy mode based on ‘bid density’. Our auction scheme gives sufficient consideration to heterogeneity of channel which is one of the challenges in spectrum auction. We show analytically that EATHER has polynomial time complexity. More precisely EATHER is efficient. Our analysis demonstrates EATHER achieves truthfulness individual rationality and budget balance. The simulation evaluates the performance of EATHER minutely in teams of buyer satisfaction ratio channel utilization ratio and social welfare.,bin li,Not available,2016.0,10.1007/978-3-319-46257-8_39,Intelligent Data Engineering and Automated Learning – IDEAL 2016,Haiyan2016,False,,Springer,Not available,An Efficient Auction Mechanism Toward Heterogeneous Spectrum Allocation,a9e187f07cb2b3a73abbcec46194f1b3,http://dx.doi.org/10.1007/978-3-319-46257-8_39 1485,In this paper we consider online auctions with buyback; a form of auctions where bidders arrive sequentially and the bidders have to be accepted or rejected immediately. Each bidder has a valuation for being allocated the good and a preemption price. Sold goods can be bought back from the bidders for a preemption price. We allow unbounded valuations and preemption prices independent from each other. We study the clairvoyant model a model sitting between the traditional offline and online models. In the clairvoyant model a sequence of all potential customers (their bids and compensations) is known in advance to the seller but the seller does not know when the sequence stops. In the case of a single good we present an algorithm for computing the difficulty ,philipp brandes,Not available,2016.0,10.1007/978-3-319-42634-1_1,Computing and Combinatorics,Philipp2016,False,,Springer,Not available,Clairvoyant Mechanisms for Online Auctions,a14f91fc54df2b0566578c2b7a4e2e07,http://dx.doi.org/10.1007/978-3-319-42634-1_1 1486,In this paper we consider online auctions with buyback; a form of auctions where bidders arrive sequentially and the bidders have to be accepted or rejected immediately. Each bidder has a valuation for being allocated the good and a preemption price. Sold goods can be bought back from the bidders for a preemption price. We allow unbounded valuations and preemption prices independent from each other. We study the clairvoyant model a model sitting between the traditional offline and online models. In the clairvoyant model a sequence of all potential customers (their bids and compensations) is known in advance to the seller but the seller does not know when the sequence stops. In the case of a single good we present an algorithm for computing the difficulty ,zengfeng huang,Not available,2016.0,10.1007/978-3-319-42634-1_1,Computing and Combinatorics,Philipp2016,False,,Springer,Not available,Clairvoyant Mechanisms for Online Auctions,a14f91fc54df2b0566578c2b7a4e2e07,http://dx.doi.org/10.1007/978-3-319-42634-1_1 1487,In this paper we consider online auctions with buyback; a form of auctions where bidders arrive sequentially and the bidders have to be accepted or rejected immediately. Each bidder has a valuation for being allocated the good and a preemption price. Sold goods can be bought back from the bidders for a preemption price. We allow unbounded valuations and preemption prices independent from each other. We study the clairvoyant model a model sitting between the traditional offline and online models. In the clairvoyant model a sequence of all potential customers (their bids and compensations) is known in advance to the seller but the seller does not know when the sequence stops. In the case of a single good we present an algorithm for computing the difficulty ,hsin-hao su,Not available,2016.0,10.1007/978-3-319-42634-1_1,Computing and Combinatorics,Philipp2016,False,,Springer,Not available,Clairvoyant Mechanisms for Online Auctions,a14f91fc54df2b0566578c2b7a4e2e07,http://dx.doi.org/10.1007/978-3-319-42634-1_1 1488,In this paper we consider online auctions with buyback; a form of auctions where bidders arrive sequentially and the bidders have to be accepted or rejected immediately. Each bidder has a valuation for being allocated the good and a preemption price. Sold goods can be bought back from the bidders for a preemption price. We allow unbounded valuations and preemption prices independent from each other. We study the clairvoyant model a model sitting between the traditional offline and online models. In the clairvoyant model a sequence of all potential customers (their bids and compensations) is known in advance to the seller but the seller does not know when the sequence stops. In the case of a single good we present an algorithm for computing the difficulty ,roger wattenhofer,Not available,2016.0,10.1007/978-3-319-42634-1_1,Computing and Combinatorics,Philipp2016,False,,Springer,Not available,Clairvoyant Mechanisms for Online Auctions,a14f91fc54df2b0566578c2b7a4e2e07,http://dx.doi.org/10.1007/978-3-319-42634-1_1 1489,,mohammad hajiaghayi,Not available,2016.0,10.1007/978-1-4939-2864-4_759,Encyclopedia of Algorithms,Taghi2016,False,,Springer,Not available,Prophet Inequality and Online Auctions,e0c08c68fe1f81bc8693cb3d3580ef22,http://dx.doi.org/10.1007/978-1-4939-2864-4_759 1490,,vahid liaghat,Not available,2016.0,10.1007/978-1-4939-2864-4_759,Encyclopedia of Algorithms,Taghi2016,False,,Springer,Not available,Prophet Inequality and Online Auctions,e0c08c68fe1f81bc8693cb3d3580ef22,http://dx.doi.org/10.1007/978-1-4939-2864-4_759 1491,This chapter explores the theory of supply chain intermediation. Using a bargaining theoretic framework we set out to examine why intermediaries exist different forms they operate and the way they influence supply chain efficiency. The notion of intermediary has its root in the economics literature referring to those economic agents who coordinate and arbitrate transactions in between a group of suppliers and customers. Distinctions are often drawn between a “market maker” and a “broker” intermediary Resnick et al. 1998. The former buys sells and holds inventory (e.g. retailers wholesales) while the latter provides services without owning the goods being transacted (e.g. insurance agents financial brokage). Sarkar et al. (1995) offer a list of various intermediation services. They distinguish the services that benefit the customers (e.g. assistance in search and evaluation needs assessment and product matching risk reduction and product distribution/delivery) and those that benefit the suppliers (e.g. creating and disseminating product information). Taking a step further Spulber (1996) views intermediary as the fundamental building block of economic activities. He proposes the ,s. wu,Not available,2004.0,10.1007/978-1-4020-7953-5_3,Handbook of Quantitative Supply Chain Analysis,David2004,False,,Springer,Not available,Supply Chain Intermediation: ,b582983301492c371822125dcb5ce691,http://dx.doi.org/10.1007/978-1-4020-7953-5_3 1492,Pricing is considered a relevant way to control congestion and differentiate services in communication networks. Among all pricing schemes auctioning for bandwidth has received a lot of attention. We aim in this paper at comparing a recently designed auction scheme called multi-bid auction with the often referenced progressive second price auction. We especially focus on the case of a stochastic environment with players/users entering and leaving the game. We illustrate the gain that can be obtained with multi-bids in terms of complexity revenue and social welfare in both transient and steady-state regime.,patrick maille,Not available,2004.0,10.1007/978-3-540-30193-6_32,Quality of Service in the Emerging Networking Panorama,Patrick2004,False,,Springer,Not available,Multi-bid Versus Progressive Second Price Auctions in a Stochastic Environment,728fdb233e7954a323b2372985860be5,http://dx.doi.org/10.1007/978-3-540-30193-6_32 1493,Pricing is considered a relevant way to control congestion and differentiate services in communication networks. Among all pricing schemes auctioning for bandwidth has received a lot of attention. We aim in this paper at comparing a recently designed auction scheme called multi-bid auction with the often referenced progressive second price auction. We especially focus on the case of a stochastic environment with players/users entering and leaving the game. We illustrate the gain that can be obtained with multi-bids in terms of complexity revenue and social welfare in both transient and steady-state regime.,bruno tuffin,Not available,2004.0,10.1007/978-3-540-30193-6_32,Quality of Service in the Emerging Networking Panorama,Patrick2004,False,,Springer,Not available,Multi-bid Versus Progressive Second Price Auctions in a Stochastic Environment,728fdb233e7954a323b2372985860be5,http://dx.doi.org/10.1007/978-3-540-30193-6_32 1494,In this paper we propose a Distributed Multi-link Auction mechanism(refereed by DiMA) that deals with request connection establishment in order to provide some End-to-end guarantee of services. The DiMA mechanism determines hop-by-hop the path to be taken by a request while reserving the required resource over it. It consists of consecutive local auctions that each request has to win in order to be satisfied. We consider the problem of determining requests global budgets and bidding strategies. We give some simulative analysis mapping the relation between prices network utilization and distribution of accepted requests.,dominique barth,Not available,2004.0,10.1007/978-3-540-30193-6_33,Quality of Service in the Emerging Networking Panorama,Dominique2004,False,,Springer,Not available,Distributed Multi-link Auctions for Network Resource Reservation and Pricing,fcb7f0d157ba5df6e55b93b0a819ce96,http://dx.doi.org/10.1007/978-3-540-30193-6_33 1495,In this paper we propose a Distributed Multi-link Auction mechanism(refereed by DiMA) that deals with request connection establishment in order to provide some End-to-end guarantee of services. The DiMA mechanism determines hop-by-hop the path to be taken by a request while reserving the required resource over it. It consists of consecutive local auctions that each request has to win in order to be satisfied. We consider the problem of determining requests global budgets and bidding strategies. We give some simulative analysis mapping the relation between prices network utilization and distribution of accepted requests.,loubna echabbi,Not available,2004.0,10.1007/978-3-540-30193-6_33,Quality of Service in the Emerging Networking Panorama,Dominique2004,False,,Springer,Not available,Distributed Multi-link Auctions for Network Resource Reservation and Pricing,fcb7f0d157ba5df6e55b93b0a819ce96,http://dx.doi.org/10.1007/978-3-540-30193-6_33 1496,We study auctioning multiple units of the same good to potential buyers with single unit demand (i.e. every buyer wants only one unit of the good). Depending on the objective of the seller different selling mechanisms are desirable. The Vickrey auction with a truthful reserve price is optimal when the objective is efficiency – allocating the units to the parties who values them the most. The Myerson auction is optimal when the objective is the seller’s expected utility. These two objectives are generally in conflict and cannot be maximized with one mechanism. In many real-world settings—such as privatization and competing electronic marketplaces—it is not clear that the objective should be either efficiency or seller’s expected utility. Typically one of these objectives should weigh more than the other but both are important. We account for both objectives by designing a new ,anton likhodedov,Not available,2004.0,10.1007/978-3-540-25947-3_6,Agent-Mediated Electronic Commerce V. Designing Mechanisms and Systems,Anton2004,False,,Springer,Not available,Mechanism for Optimally Trading Off Revenue and Efficiency in Multi-unit Auctions,b408cf7eff98ea599c86d8d28c5e6189,http://dx.doi.org/10.1007/978-3-540-25947-3_6 1497,We study auctioning multiple units of the same good to potential buyers with single unit demand (i.e. every buyer wants only one unit of the good). Depending on the objective of the seller different selling mechanisms are desirable. The Vickrey auction with a truthful reserve price is optimal when the objective is efficiency – allocating the units to the parties who values them the most. The Myerson auction is optimal when the objective is the seller’s expected utility. These two objectives are generally in conflict and cannot be maximized with one mechanism. In many real-world settings—such as privatization and competing electronic marketplaces—it is not clear that the objective should be either efficiency or seller’s expected utility. Typically one of these objectives should weigh more than the other but both are important. We account for both objectives by designing a new ,tuomas sandholm,Not available,2004.0,10.1007/978-3-540-25947-3_6,Agent-Mediated Electronic Commerce V. Designing Mechanisms and Systems,Anton2004,False,,Springer,Not available,Mechanism for Optimally Trading Off Revenue and Efficiency in Multi-unit Auctions,b408cf7eff98ea599c86d8d28c5e6189,http://dx.doi.org/10.1007/978-3-540-25947-3_6 1498,In combinatorial auctions a bidder may bid for arbitrary combinations of items so combinatorial auction can be applied to resource and task allocations in multiagent systems. But determining the winners of combinatorial auctions who maximize the profit of the auctioneer is known to be ,jin-woo song,Not available,2004.0,10.1007/978-3-540-24694-7_37,MICAI 2004: Advances in Artificial Intelligence,Jin-Woo2004,False,,Springer,Not available,A Faster Optimal Allocation Algorithm in Combinatorial Auctions,42650aa6325a4125fb4d01468b862694,http://dx.doi.org/10.1007/978-3-540-24694-7_37 1499,In combinatorial auctions a bidder may bid for arbitrary combinations of items so combinatorial auction can be applied to resource and task allocations in multiagent systems. But determining the winners of combinatorial auctions who maximize the profit of the auctioneer is known to be ,sung-bong yang,Not available,2004.0,10.1007/978-3-540-24694-7_37,MICAI 2004: Advances in Artificial Intelligence,Jin-Woo2004,False,,Springer,Not available,A Faster Optimal Allocation Algorithm in Combinatorial Auctions,42650aa6325a4125fb4d01468b862694,http://dx.doi.org/10.1007/978-3-540-24694-7_37 1500,Several auctions have been proposed and applied to perform contract negotiation and resource allocation in reservation-based networks. The methods proposed by these works perceive resources as single items with multiple units and place importance on a limited efficiency inside each node. However as a user evaluates resources not individually but rather as a whole set of required resources the economical efficiency of the overall network cannot be achieved by these methods. To solve this problem we propose a bandwidth allocation system using GVA (Generalised Vickrey Auction). Network resources which are composed of many links at various bandwidths are regarded by the proposed method as multiple items with multiple units. We describe how to apply GVA protocol to bandwidth allocations among multiple users. We investigate algorithmic and accounting problems inside multiple nodes using an end-to-end approach. We evaluate the proposed method's performance from various viewpoints: the utilisation of resources profits of the telecommunications carriers users' utility and users' satisfaction. We show that by adopting GVA the total utility of users can be maximised and the revenues of networks can also be improved.,eiji takahashi,Not available,2003.0,10.1023/A:1026131300453,Telecommunication Systems,Eiji2003,False,,Springer,Not available,Auction-Based Effective Bandwidth Allocation Mechanism,e9ed1e78d77924206c816eb027771050,http://dx.doi.org/10.1023/A:1026131300453 1501,Several auctions have been proposed and applied to perform contract negotiation and resource allocation in reservation-based networks. The methods proposed by these works perceive resources as single items with multiple units and place importance on a limited efficiency inside each node. However as a user evaluates resources not individually but rather as a whole set of required resources the economical efficiency of the overall network cannot be achieved by these methods. To solve this problem we propose a bandwidth allocation system using GVA (Generalised Vickrey Auction). Network resources which are composed of many links at various bandwidths are regarded by the proposed method as multiple items with multiple units. We describe how to apply GVA protocol to bandwidth allocations among multiple users. We investigate algorithmic and accounting problems inside multiple nodes using an end-to-end approach. We evaluate the proposed method's performance from various viewpoints: the utilisation of resources profits of the telecommunications carriers users' utility and users' satisfaction. We show that by adopting GVA the total utility of users can be maximised and the revenues of networks can also be improved.,yoshiaki tanaka,Not available,2003.0,10.1023/A:1026131300453,Telecommunication Systems,Eiji2003,False,,Springer,Not available,Auction-Based Effective Bandwidth Allocation Mechanism,e9ed1e78d77924206c816eb027771050,http://dx.doi.org/10.1023/A:1026131300453 1502,In sequential auctions the phenomenon of declining prices is often observed which in theory can be represented by a supermartingale. This paper employs the perspective that bidders’ values may change over stages and the common priors are sequentially adjusted by the remaining bidders. It is shown that the declining price sequence can be explained by the adjustment of common priors between auctions. The adjustment of common priors is characterized by stochastic orders. Sufficient and necessary conditions for a supermartingale price sequence are derived.,heng qiao,Not available,2016.0,10.1007/s11424-016-4295-1,Journal of Systems Science and Complexity,Heng2016,False,,Springer,Not available,The changing of common priors in sequential auctions,a24c9d056d2be6fc85c4ece25efaa50f,http://dx.doi.org/10.1007/s11424-016-4295-1 1503, I consider a single-object English auction with two asymmetric bidders and show that it has a continuum of inefficient undominated ex-post equilibria. The result extends for the generalized VCG mechanism Dasgupta-Maskin auction and generally for every auction that has an efficient ex-post equilibrium.,oleksii birulin,Not available,2003.0,10.1007/s00199-002-0317-4,Economic Theory,Oleksii2003,False,,Springer,Not available,Inefficient ex-post equilibria in efficient auctions,a844ef40279c4925b17b2ea21b767aa2,http://dx.doi.org/10.1007/s00199-002-0317-4 1504,In this paper we study the behavior of individuals when facing two different but incentive-wise identical institutions. We pair the first price auction with an equivalent lottery. Once a subject is assigned a value for the auctioned object the first price auction can be modeled as a lottery in which the individual faces a given probability of winning a certain payoff. This set up allows us to explore to what extent the misperception of the probability of winning in the auction is responsible for bidders in a first price auction to bidding above the risk neutral Nash equilibrium prediction. The first result we obtain is that individuals even though facing the same choice over probability/payoff pairs behave differently depending on the type of choice they are called to make. When facing an auction subjects with high values tend to bid significantly above the bid they choose in the corresponding lottery environment. We further find that in both the lottery and the auction environments subjects tend to bid in excess of the bid predicted by the risk neutral model at least for intermediate range values. Finally we find that the difference between the lottery behavior and the auction behavior is substantially but not totally eliminated by showing the subjects the probability of winning the auction.,robert dorsey,Not available,2003.0,10.1023/A:1025375803912,Experimental Economics,Robert2003,False,,Springer,Not available,Explaining Overbidding in First Price Auctions Using Controlled Lotteries,a336aa1a53c01dda45a226402e6f0674,http://dx.doi.org/10.1023/A:1025375803912 1505,In this paper we study the behavior of individuals when facing two different but incentive-wise identical institutions. We pair the first price auction with an equivalent lottery. Once a subject is assigned a value for the auctioned object the first price auction can be modeled as a lottery in which the individual faces a given probability of winning a certain payoff. This set up allows us to explore to what extent the misperception of the probability of winning in the auction is responsible for bidders in a first price auction to bidding above the risk neutral Nash equilibrium prediction. The first result we obtain is that individuals even though facing the same choice over probability/payoff pairs behave differently depending on the type of choice they are called to make. When facing an auction subjects with high values tend to bid significantly above the bid they choose in the corresponding lottery environment. We further find that in both the lottery and the auction environments subjects tend to bid in excess of the bid predicted by the risk neutral model at least for intermediate range values. Finally we find that the difference between the lottery behavior and the auction behavior is substantially but not totally eliminated by showing the subjects the probability of winning the auction.,laura razzolini,Not available,2003.0,10.1023/A:1025375803912,Experimental Economics,Robert2003,False,,Springer,Not available,Explaining Overbidding in First Price Auctions Using Controlled Lotteries,a336aa1a53c01dda45a226402e6f0674,http://dx.doi.org/10.1023/A:1025375803912 1506,We consider the problem of software agents being used as proxies for the procurement of computational and network resources. Mechanisms such as single-good auctions and combinatorial auctions are not applicable for the management of these services as assigning an entire resource to a single agent is often undesirable and appropriate bund sizes are difficult to determine. We investigate a divisible auction that is proportionally fair. By introducing the notion of price and demand functions that characterize optimal response functions of the bidders we are able to prove that this mechanism has a unique Nash equilibrium for an arbitrary number of agents with heterogeneous quasilinear utilities. We also describe decentralized negotiation strategies which with approrpate relaxation converge locally to the equilibrium point. Given an agent with a sequence of jobs we show how our analysis holds for a wide variety of objectives.,rajiv maheswaran,Not available,2003.0,10.1023/B:GRUP.0000003745.98183.8d,Group Decision and Negotiation,T.2003,False,,Springer,Not available,Nash Equilibrium and Decentralized Negotiation in Auctioning Divisible Resources,029e5471738ed0c760f44cd780e536f4,http://dx.doi.org/10.1023/B:GRUP.0000003745.98183.8d 1507,We consider the problem of software agents being used as proxies for the procurement of computational and network resources. Mechanisms such as single-good auctions and combinatorial auctions are not applicable for the management of these services as assigning an entire resource to a single agent is often undesirable and appropriate bund sizes are difficult to determine. We investigate a divisible auction that is proportionally fair. By introducing the notion of price and demand functions that characterize optimal response functions of the bidders we are able to prove that this mechanism has a unique Nash equilibrium for an arbitrary number of agents with heterogeneous quasilinear utilities. We also describe decentralized negotiation strategies which with approrpate relaxation converge locally to the equilibrium point. Given an agent with a sequence of jobs we show how our analysis holds for a wide variety of objectives.,tamer basar,Not available,2003.0,10.1023/B:GRUP.0000003745.98183.8d,Group Decision and Negotiation,T.2003,False,,Springer,Not available,Nash Equilibrium and Decentralized Negotiation in Auctioning Divisible Resources,029e5471738ed0c760f44cd780e536f4,http://dx.doi.org/10.1023/B:GRUP.0000003745.98183.8d 1508,In this paper we apply auction theory to the modelling of competition in a multi-unit wholesale electricity market. Bidding strategies of multi-plant producers are derived and examined assuming various degrees of market concentration. Unlike previous literature which mainly focuses on demand uncertainty we assume both demand and cost uncertainty as well as cost differentials among the two types of generating units considered in the model namely baseload units and peak units. Results indicate that the System Marginal Price (competitive pricing) rule provides incentives for bid shading on the part of all those generators-units who have a non-null probability of setting the market price. We also show that the extent of the bid shading is positively affected by the differential in the endowments of the baseload generation capacity of multi-plant firms. The inefficiency of the resulting allocation is also examined and some policy implications are briefly discussed.,lucia parisio,Not available,2003.0,10.1023/A:1024602609265,International Tax and Public Finance,Lucia2003,False,,Springer,Not available,Market Power and the Power Market: Multi-Unit Bidding and (In)Efficiency in Electricity Auctions,dae5dd1540b2b2f85f2bda0f1e43bd75,http://dx.doi.org/10.1023/A:1024602609265 1509,In this paper we apply auction theory to the modelling of competition in a multi-unit wholesale electricity market. Bidding strategies of multi-plant producers are derived and examined assuming various degrees of market concentration. Unlike previous literature which mainly focuses on demand uncertainty we assume both demand and cost uncertainty as well as cost differentials among the two types of generating units considered in the model namely baseload units and peak units. Results indicate that the System Marginal Price (competitive pricing) rule provides incentives for bid shading on the part of all those generators-units who have a non-null probability of setting the market price. We also show that the extent of the bid shading is positively affected by the differential in the endowments of the baseload generation capacity of multi-plant firms. The inefficiency of the resulting allocation is also examined and some policy implications are briefly discussed.,bruno bosco,Not available,2003.0,10.1023/A:1024602609265,International Tax and Public Finance,Lucia2003,False,,Springer,Not available,Market Power and the Power Market: Multi-Unit Bidding and (In)Efficiency in Electricity Auctions,dae5dd1540b2b2f85f2bda0f1e43bd75,http://dx.doi.org/10.1023/A:1024602609265 1510,There is very little work on the equilibrium of the all-payauction when the prize is awarded by two or more people. Iconsider an all-pay auction under committee administrationwith caps on the bids of the contestants. I show that for anynumber of committee members and contestants there exists apure-strategy equilibrium in which the contestants bid anamount equal to a suitably chosen cap. I argue that the cap isnot an artificial restriction on the game given that thereare caps on political lobbying in the real world. I find thatcommittee administration could result in higher aggregateexpenditures even if there is some probability that thecommittee will not award the prize. The intuition for thisresult is that the inclusion of additional administratorsrelaxes the effect of caps on lobbying. That is caps onlobbying tend to be more effective the smaller is the size ofthe committee. Caps may also be a solution to the problem ofmajoritarian cycles in all-pay auctions under committeeadministration.,j. amegashie,Not available,2003.0,10.1023/A:1024266902702,Public Choice,Atsu2003,False,,Springer,Not available,The All-Pay Auction When a Committee Awards the Prize,103e466b84736d807e02da7799d64e6b,http://dx.doi.org/10.1023/A:1024266902702 1511,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,chaoli zhang,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 1512,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,fan wu,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 1513,In sequential auctions the phenomenon of declining prices is often observed which in theory can be represented by a supermartingale. This paper employs the perspective that bidders’ values may change over stages and the common priors are sequentially adjusted by the remaining bidders. It is shown that the declining price sequence can be explained by the adjustment of common priors between auctions. The adjustment of common priors is characterized by stochastic orders. Sufficient and necessary conditions for a supermartingale price sequence are derived.,jun ma,Not available,2016.0,10.1007/s11424-016-4295-1,Journal of Systems Science and Complexity,Heng2016,False,,Springer,Not available,The changing of common priors in sequential auctions,a24c9d056d2be6fc85c4ece25efaa50f,http://dx.doi.org/10.1007/s11424-016-4295-1 1514,Ridesourcing refers to the service that matches passengers who need a car to personal drivers. In this work we study an auction model for ridesourcing that sells multiple items to unit-demand single-parameter agents with variable reserve price constraints. In this model there is an externally imposed reserve price set for every item and the price is both item- and bidder-dependent. Such auctions can also find applications in a number of other traditional and online markets such as ad auction or online laboring market.Our main result is a truthful individually rational and computationally efficient mechanism that respects the reserve price constraints and always achieves at least half of the optimal social benefit (,xiaohui bei,Not available,2018.0,10.1007/978-3-319-97304-3_28,PRICAI 2018: Trends in Artificial Intelligence,Chaoli2018,False,,Springer,Not available,An Efficient Auction with Variable Reserve Prices for Ridesourcing,32dc2827fa2e90281526787dae6f46b5,http://dx.doi.org/10.1007/978-3-319-97304-3_28 1515,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,lawrence ausubel,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 1516,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,justin burkett,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 1517,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,emel filiz-ozbay,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 1518,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,rui hu,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 1519,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,jinzhong guo,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 1520,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,qinghua chen,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 1521,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,tao zheng,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 1522,We employ weak dominance to analyze both first-price and second-price auctions under the discrete private-value setting. We provide a condition under which the expected revenue from second-price auction is higher than that of first-price auction. We also provide implications for large auctions including the “virtual” revenue equivalence.,makoto shimoji,Not available,2017.0,10.1007/s10058-017-0202-z,Review of Economic Design,Makoto2017,True,,Springer,Not available,Revenue comparison of discrete private-value auctions via weak dominance,8bd820d6c4d1ac23768ca98f5fc0a63c,http://dx.doi.org/10.1007/s10058-017-0202-z 1523,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,sotiris georganas,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 1524,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,dirk briskorn,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 1525,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,dan levin,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 1526,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,peter mcgee,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 1527,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,bruno wichmann,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 1528,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,peter boxall,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 1529,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,scott wilson,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 1530,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,orsolya pergery,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 1531,For successful integration of biological conservation into economic markets economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991–2012 related to species characteristics associated with scarcity aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices ungulate prices were related to characteristics associated with novelty and aesthetics which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.,fredrik dalerum,Not available,2017.0,10.1007/s13280-017-0937-3,Ambio,Fredrik2017,False,,Springer,Not available,Effects of scarcity aesthetics and ecology on wildlife auction prices of large African mammals,0c61c65f211f7446189c3ecb37f47993,http://dx.doi.org/10.1007/s13280-017-0937-3 1532,For successful integration of biological conservation into economic markets economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991–2012 related to species characteristics associated with scarcity aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices ungulate prices were related to characteristics associated with novelty and aesthetics which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.,maria miranda,Not available,2017.0,10.1007/s13280-017-0937-3,Ambio,Fredrik2017,False,,Springer,Not available,Effects of scarcity aesthetics and ecology on wildlife auction prices of large African mammals,0c61c65f211f7446189c3ecb37f47993,http://dx.doi.org/10.1007/s13280-017-0937-3 1533,For successful integration of biological conservation into economic markets economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991–2012 related to species characteristics associated with scarcity aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices ungulate prices were related to characteristics associated with novelty and aesthetics which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.,cristina muniz,Not available,2017.0,10.1007/s13280-017-0937-3,Ambio,Fredrik2017,False,,Springer,Not available,Effects of scarcity aesthetics and ecology on wildlife auction prices of large African mammals,0c61c65f211f7446189c3ecb37f47993,http://dx.doi.org/10.1007/s13280-017-0937-3 1534,For successful integration of biological conservation into economic markets economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991–2012 related to species characteristics associated with scarcity aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices ungulate prices were related to characteristics associated with novelty and aesthetics which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.,placido rodriguez,Not available,2017.0,10.1007/s13280-017-0937-3,Ambio,Fredrik2017,False,,Springer,Not available,Effects of scarcity aesthetics and ecology on wildlife auction prices of large African mammals,0c61c65f211f7446189c3ecb37f47993,http://dx.doi.org/10.1007/s13280-017-0937-3 1535,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,kurt jornsten,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 1536,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,zhen guo,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 1537,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,yu fu,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 1538,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,chunjie cao,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 1539,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,zhili chen,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 1540,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,ruihong che,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 1541,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,hong zhong,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 1542,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,miaomiao tian,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 1543,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,jie cui,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 1544,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,francisco alvarez,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 1545,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,cristina mazon,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 1546,In combinatorial auctions items are sold simultaneously. A substantial component of an auction mechanism is the pricing scheme. Prices determine the auctioneer’s revenue and ideally justify the outcome of the auction to the bidders. Each bidder should be able to see why he won or lost a certain bundle by comparing the determined price of a bundle and his bid’s value. In this paper we pick up a non-linear anonymous pricing scheme from the literature that consists of a set of linear price vectors. We investigate whether this scheme can guarantee to find prices that support the winner allocation. Furthermore we refine the pricing scheme by suggesting various objectives in order to evaluate different prices. We consider the computational complexity of the corresponding optimization problems and compare different objectives by means of a computational study using a well-established combinatorial auction test suite.,jenny nossack,Not available,2016.0,10.1007/s00291-016-0430-6,OR Spectrum,Dirk2016,False,,Springer,Not available,Pricing combinatorial auctions by a set of linear price vectors,5b7d4bb798888e843b24af59ea9dc1b2,http://dx.doi.org/10.1007/s00291-016-0430-6 1547,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,francisco andre,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 1548,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,christer andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 1549,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,ola andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 1550,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,tommy andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 1551,In a single item auction model that allows non-quasilinear preferences we show that an auction rule satisfies ,toyotaka sakai,Not available,2013.0,10.1007/s10058-012-0135-5,Review of Economic Design,Toyotaka2013,False,,Springer,Not available,An equity characterization of second price auctions when preferences may not be quasilinear,57d8a93d7e61a8dd90eeadeaf1c8cf6c,http://dx.doi.org/10.1007/s10058-012-0135-5 1552,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,jacob goeree,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 1553,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,theo offerman,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 1554,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,randolph sloof,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 1555,In this paper we study the real-time scheduling of time-sensitive full truckload pickup-and-delivery jobs. The problem involves the allocation of jobs to a fixed set of vehicles which might belong to different collaborating transportation agencies. A recently proposed solution methodology for this problem is the use of a multi-agent system where shipper agents offer jobs through sequential auctions and vehicle agents bid on these jobs. In this paper we consider such a system where ,martijn mes,Not available,2013.0,10.1007/s10100-011-0230-7,Central European Journal of Operations Research,Martijn2013,True,,Springer,Not available,Interaction between intelligent agent strategies for real-time transportation planning,a21a37f15a384a172c565d287b4f668f,http://dx.doi.org/10.1007/s10100-011-0230-7 1556,In this paper we study the real-time scheduling of time-sensitive full truckload pickup-and-delivery jobs. The problem involves the allocation of jobs to a fixed set of vehicles which might belong to different collaborating transportation agencies. A recently proposed solution methodology for this problem is the use of a multi-agent system where shipper agents offer jobs through sequential auctions and vehicle agents bid on these jobs. In this paper we consider such a system where ,matthieu heijden,Not available,2013.0,10.1007/s10100-011-0230-7,Central European Journal of Operations Research,Martijn2013,True,,Springer,Not available,Interaction between intelligent agent strategies for real-time transportation planning,a21a37f15a384a172c565d287b4f668f,http://dx.doi.org/10.1007/s10100-011-0230-7 1557, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,ram orzach,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1558,The advances in the technological infrastructure and in the Internet led electronic auctions to become popular. With online sites people buy/sell inexpensive products/services through auctions. In this paper we develop an interactive approach that provides aid to both the buyer and the bidders in a bi-attribute multi-item auction environment. Our approach is applicable for both reverse and forward auctions. We test our approach for underlying linear preference functions of the buyer. We also adapt it as a heuristic for the case the buyer has a nonlinear preference function. The test results show that our approach works well.,gulsah karakaya,Not available,2016.0,10.1007/s10479-014-1669-4,Annals of Operations Research,Gülşah2016,False,,Springer,Not available,An interactive approach for Bi-attribute multi-item auctions,ebabbbb205d49890993dafed4b9db9b8,http://dx.doi.org/10.1007/s10479-014-1669-4 1559,In this paper we study the real-time scheduling of time-sensitive full truckload pickup-and-delivery jobs. The problem involves the allocation of jobs to a fixed set of vehicles which might belong to different collaborating transportation agencies. A recently proposed solution methodology for this problem is the use of a multi-agent system where shipper agents offer jobs through sequential auctions and vehicle agents bid on these jobs. In this paper we consider such a system where ,peter schuur,Not available,2013.0,10.1007/s10100-011-0230-7,Central European Journal of Operations Research,Martijn2013,True,,Springer,Not available,Interaction between intelligent agent strategies for real-time transportation planning,a21a37f15a384a172c565d287b4f668f,http://dx.doi.org/10.1007/s10100-011-0230-7 1560,The literature on art auctions has overlooked the market for classical music manuscripts and this paper explores for the first time the determinants of ‘hammer’ prices for about 360 classical music manuscripts auctioned at Sotheby’s (London) during the 1998–2009 period. We use hedonic price regressions in order to explain the price of classical music manuscripts by several characteristics. The paper shows that the ‘trace’ of the composer (e.g. whether the manuscript is fully or partly in the hand of the composer or in a scribal hand) the artistic value of the composition the number of pages the period (Baroque Classical etc.) and of course the name of the composer and the relative scarcity of his manuscripts are all characteristics that contribute to explain the hammer price of these manuscripts. However parameter estimates for characteristics such as the type of music (symphony opera etc.) and whether the manuscript is the complete work or some fragment (say one movement) are not statistically significant. The paper also estimates a hedonic price index that provides a measure of the average returns and (high) risk of collecting and investing in music manuscripts.,patrick georges,Not available,2013.0,10.1007/s10824-012-9171-9,Journal of Cultural Economics,Patrick2013,False,,Springer,Not available,Black notes and white noise: a hedonic approach to auction prices of classical music manuscripts,d7f633e5806d364fbfa5fab9b64c76f3,http://dx.doi.org/10.1007/s10824-012-9171-9 1561,The literature on art auctions has overlooked the market for classical music manuscripts and this paper explores for the first time the determinants of ‘hammer’ prices for about 360 classical music manuscripts auctioned at Sotheby’s (London) during the 1998–2009 period. We use hedonic price regressions in order to explain the price of classical music manuscripts by several characteristics. The paper shows that the ‘trace’ of the composer (e.g. whether the manuscript is fully or partly in the hand of the composer or in a scribal hand) the artistic value of the composition the number of pages the period (Baroque Classical etc.) and of course the name of the composer and the relative scarcity of his manuscripts are all characteristics that contribute to explain the hammer price of these manuscripts. However parameter estimates for characteristics such as the type of music (symphony opera etc.) and whether the manuscript is the complete work or some fragment (say one movement) are not statistically significant. The paper also estimates a hedonic price index that provides a measure of the average returns and (high) risk of collecting and investing in music manuscripts.,aylin seckin,Not available,2013.0,10.1007/s10824-012-9171-9,Journal of Cultural Economics,Patrick2013,False,,Springer,Not available,Black notes and white noise: a hedonic approach to auction prices of classical music manuscripts,d7f633e5806d364fbfa5fab9b64c76f3,http://dx.doi.org/10.1007/s10824-012-9171-9 1562,Escalation is the fact that in a game (for instance an auction) the agents play forever. It is not necessary to consider complex examples to establish its rationality. In particular the 0 1-game is an extremely simple infinite game in which escalation arises naturally and rationally. In some sense it can be considered as the paradigm of escalation. Through an example of economic games we show the benefit economics can take of coinduction.,pierre lescanne,Not available,2013.0,10.1007/978-3-642-40206-7_15,Algebra and Coalgebra in Computer Science,Pierre2013,False,,Springer,Not available,A Simple Case of Rationality of Escalation,af1d01daeb17462c881131650c8fca51,http://dx.doi.org/10.1007/978-3-642-40206-7_15 1563,Auctions are procedures for selling one or more items to one or more bidders. Auctions induce games among the bidders so notions of equilibrium from game theory can be applied to auctions. Auction theory aims to characterize and compare the equilibrium outcomes for different types of auctions. Combinatorial auctions arise when multiple-related items are sold simultaneously.,bruce hajek,Not available,2013.0,10.1007/978-1-4471-5102-9_36-1,Encyclopedia of Systems and Control,Bruce2013,False,,Springer,Not available,Auctions,5a77e97e7fb4e39e0cd5f4301ed396eb,http://dx.doi.org/10.1007/978-1-4471-5102-9_36-1 1564,We consider the optimal pricing problem for a model of the rich media advertisement market as well as other related applications. In this market there are multiple buyers (advertisers) and items (slots) that are arranged in a line such as a banner on a website. Each buyer desires a particular number of ,xiaotie deng,Not available,2013.0,10.1007/978-3-642-41392-6_22,Algorithmic Game Theory,Xiaotie2013,False,,Springer,Not available,Pricing Ad Slots with Consecutive Multi-unit Demand,712a0aabf0d6289b09b820bdc14967b3,http://dx.doi.org/10.1007/978-3-642-41392-6_22 1565,We consider the optimal pricing problem for a model of the rich media advertisement market as well as other related applications. In this market there are multiple buyers (advertisers) and items (slots) that are arranged in a line such as a banner on a website. Each buyer desires a particular number of ,paul goldberg,Not available,2013.0,10.1007/978-3-642-41392-6_22,Algorithmic Game Theory,Xiaotie2013,False,,Springer,Not available,Pricing Ad Slots with Consecutive Multi-unit Demand,712a0aabf0d6289b09b820bdc14967b3,http://dx.doi.org/10.1007/978-3-642-41392-6_22 1566,We consider the optimal pricing problem for a model of the rich media advertisement market as well as other related applications. In this market there are multiple buyers (advertisers) and items (slots) that are arranged in a line such as a banner on a website. Each buyer desires a particular number of ,yang sun,Not available,2013.0,10.1007/978-3-642-41392-6_22,Algorithmic Game Theory,Xiaotie2013,False,,Springer,Not available,Pricing Ad Slots with Consecutive Multi-unit Demand,712a0aabf0d6289b09b820bdc14967b3,http://dx.doi.org/10.1007/978-3-642-41392-6_22 1567,We consider the optimal pricing problem for a model of the rich media advertisement market as well as other related applications. In this market there are multiple buyers (advertisers) and items (slots) that are arranged in a line such as a banner on a website. Each buyer desires a particular number of ,bo tang,Not available,2013.0,10.1007/978-3-642-41392-6_22,Algorithmic Game Theory,Xiaotie2013,False,,Springer,Not available,Pricing Ad Slots with Consecutive Multi-unit Demand,712a0aabf0d6289b09b820bdc14967b3,http://dx.doi.org/10.1007/978-3-642-41392-6_22 1568,We consider the optimal pricing problem for a model of the rich media advertisement market as well as other related applications. In this market there are multiple buyers (advertisers) and items (slots) that are arranged in a line such as a banner on a website. Each buyer desires a particular number of ,jinshan zhang,Not available,2013.0,10.1007/978-3-642-41392-6_22,Algorithmic Game Theory,Xiaotie2013,False,,Springer,Not available,Pricing Ad Slots with Consecutive Multi-unit Demand,712a0aabf0d6289b09b820bdc14967b3,http://dx.doi.org/10.1007/978-3-642-41392-6_22 1569,The advances in the technological infrastructure and in the Internet led electronic auctions to become popular. With online sites people buy/sell inexpensive products/services through auctions. In this paper we develop an interactive approach that provides aid to both the buyer and the bidders in a bi-attribute multi-item auction environment. Our approach is applicable for both reverse and forward auctions. We test our approach for underlying linear preference functions of the buyer. We also adapt it as a heuristic for the case the buyer has a nonlinear preference function. The test results show that our approach works well.,murat koksalan,Not available,2016.0,10.1007/s10479-014-1669-4,Annals of Operations Research,Gülşah2016,False,,Springer,Not available,An interactive approach for Bi-attribute multi-item auctions,ebabbbb205d49890993dafed4b9db9b8,http://dx.doi.org/10.1007/s10479-014-1669-4 1570,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,wenlin xu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1571,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,kun yue,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1572,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,jin li,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1573,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,liang duan,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1574,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,suiye liu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1575,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,weiyi liu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 1576,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,kyriakos chatzidimitriou,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 1577,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,lampros stavrogiannis,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 1578,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,andreas symeonidis,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 1579,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,pericles mitkas,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 1580,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,feng zhao,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 1581,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,nicolas bousquet,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 1582,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,yang cai,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 1583,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,adrian vetta,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 1584,This paper presents the design and simulation of direct exchange mechanisms for pricing European options. It extends McAfee’s single-unit double auction to multi-unit format and then applies it for pricing options through aggregating agent predictions of future asset prices. We will also propose the design of a combinatorial exchange for the simulation of agents using option trading strategies. We present several option trading strategies that are commonly used in real option markets to minimise the risk of future loss and assume that agents can submit them as a combinatorial bid to the market maker. We provide simulation results for proposed mechanisms and compare them with existing Black-Scholes model mostly used for option pricing. The simulation also tests the effect of supply and demand changes on option prices. It also takes into account agents with different implied volatility. We also observe how option prices are affected by the agents’ choices of option trading strategies.,sarvar abdullaev,Not available,2015.0,10.1007/978-3-319-17130-2_18,Multi-Agent Systems,Sarvar2015,False,,Springer,Not available,Direct Exchange Mechanisms for Option Pricing,7e0c032742f4c162da24bd9a39253312,http://dx.doi.org/10.1007/978-3-319-17130-2_18 1585,This paper presents the design and simulation of direct exchange mechanisms for pricing European options. It extends McAfee’s single-unit double auction to multi-unit format and then applies it for pricing options through aggregating agent predictions of future asset prices. We will also propose the design of a combinatorial exchange for the simulation of agents using option trading strategies. We present several option trading strategies that are commonly used in real option markets to minimise the risk of future loss and assume that agents can submit them as a combinatorial bid to the market maker. We provide simulation results for proposed mechanisms and compare them with existing Black-Scholes model mostly used for option pricing. The simulation also tests the effect of supply and demand changes on option prices. It also takes into account agents with different implied volatility. We also observe how option prices are affected by the agents’ choices of option trading strategies.,peter mcburney,Not available,2015.0,10.1007/978-3-319-17130-2_18,Multi-Agent Systems,Sarvar2015,False,,Springer,Not available,Direct Exchange Mechanisms for Option Pricing,7e0c032742f4c162da24bd9a39253312,http://dx.doi.org/10.1007/978-3-319-17130-2_18 1586,This paper presents the design and simulation of direct exchange mechanisms for pricing European options. It extends McAfee’s single-unit double auction to multi-unit format and then applies it for pricing options through aggregating agent predictions of future asset prices. We will also propose the design of a combinatorial exchange for the simulation of agents using option trading strategies. We present several option trading strategies that are commonly used in real option markets to minimise the risk of future loss and assume that agents can submit them as a combinatorial bid to the market maker. We provide simulation results for proposed mechanisms and compare them with existing Black-Scholes model mostly used for option pricing. The simulation also tests the effect of supply and demand changes on option prices. It also takes into account agents with different implied volatility. We also observe how option prices are affected by the agents’ choices of option trading strategies.,katarzyna musial,Not available,2015.0,10.1007/978-3-319-17130-2_18,Multi-Agent Systems,Sarvar2015,False,,Springer,Not available,Direct Exchange Mechanisms for Option Pricing,7e0c032742f4c162da24bd9a39253312,http://dx.doi.org/10.1007/978-3-319-17130-2_18 1587,This paper provides a technique for designing truthful mechanisms for a combinatorial optimization problem which requires composition algorithms. We show that the composition algorithm ,deshi ye,Not available,2015.0,10.1007/978-3-319-21398-9_31,Computing and Combinatorics,Deshi2015,False,,Springer,Not available,Approximate Truthful Mechanism Design for Two-Dimensional Orthogonal Knapsack Problem,ff4ad15d85e920de000eb4c6e116a46a,http://dx.doi.org/10.1007/978-3-319-21398-9_31 1588,This paper provides a technique for designing truthful mechanisms for a combinatorial optimization problem which requires composition algorithms. We show that the composition algorithm ,guochuan zhang,Not available,2015.0,10.1007/978-3-319-21398-9_31,Computing and Combinatorics,Deshi2015,False,,Springer,Not available,Approximate Truthful Mechanism Design for Two-Dimensional Orthogonal Knapsack Problem,ff4ad15d85e920de000eb4c6e116a46a,http://dx.doi.org/10.1007/978-3-319-21398-9_31 1589,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,wei zhou,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 1590,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,tao jing,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 1591,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,huazhi nie,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 1592,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,yan huo,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 1593,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,jin qian,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 1594,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,zhen li,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 1595,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,yu-e sun,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1596,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,he huang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1597,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,miaomiao tian,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1598,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,zehao sun,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1599,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,wei yang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1600,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,hansong guo,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1601,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,liusheng huang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 1602,Spectrum auction has been considered as a promising approach to effectively reallocate spectrum resources in the secondary spectrum market. In our previous work spectrum auction in a fractional frequency reuse (FFR) cognitive cellular system was studied. However the bidding and valuation model of secondary users (SUs) are not close to practical applications as they introduced a random value of a fixed scope. In this paper through an optimal interference price announced by the primary user (PU) a joint precoding and power allocation algorithm via Stackelberg game (OIPPS) is proposed to improve the spectrum auction problem subject to the interference constraint of PU the transmission power constraint of SUs and the signal-to-interference-plus-noise ratio (SINR) constraint of each SU in the FFR cognitive cellular system. Simulation results show the effectiveness of the proposed OIPPS algorithm in terms of the convergence of precoding and power allocation vectors and the maximized sum utility of SUs while taking full consideration of the PU’s revenue. Besides a comparison between the bidding improved spectrum auction scheme and a traditional method is proposed to show the effectiveness of our proposed algorithm.,hongbin chen,Not available,2016.0,10.1186/s13638-016-0712-3,EURASIP Journal on Wireless Communications and Networking,Feng2016,True,,Springer,Not available,Stackelberg game-based precoding and power allocation for spectrum auction in fractional frequency reuse cognitive cellular systems,e95b9dbba75f08f8e37a7ae3a07b5f4e,http://dx.doi.org/10.1186/s13638-016-0712-3 1603,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,takashi nishide,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 1604,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,mitsugu iwamoto,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 1605,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,atsushi iwasaki,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 1606,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,kazuo ohta,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 1607,Auctions have been used in the procurement of heterogeneous products produced and delivered after the auctions conclude as well as services. In these situations the quasi-linearity assumption of the buyer and the sellers is violated and the price and other attributes are interrelated. The relationship between price and other attributes is illustrated here with two exchanges in which the market participants are characterized by Cobb-Douglass production functions. It shown that even in the simplest case when the contract curve is linear the price and other attributes are interrelated. This relationship becomes more complex for non-linear contract curves. The paper shows that in these cases the auction does not maximize social welfare i.e. it is an inefficient mechanism. Furthermore even if the winning bid is an efficient solution a win-win solution which dominates this bid may be possible. The buyer needs to engage in multi-bilateral negotiations in order to seek joint-improvements. The purpose of the negotiation is to search for side-payments.,gregory kersten,Not available,2015.0,10.1007/978-3-319-19515-5_32,Outlooks and Insights on Group Decision and Negotiation,E.2015,False,,Springer,Not available,Procurement Auctions: Improving Efficient Winning Bids Through Multi-bilateral Negotiations,4ab508115086600416c957f397adc547,http://dx.doi.org/10.1007/978-3-319-19515-5_32 1608,Recently in this online business environment there are magnificent advancement and growth of online auction representatively in eBay. The cause of this advancement is a kind of consumer experience that the excitement of winning a product is happier rather than simply buying it. In relation to these situations there are many business models about online auction process. These studies were not based on actual data and focused mostly on individual cases and specific factors including the starting price of a transaction the bidder number bidder and seller behavior in the auction market and the online auction strategy. This fragmented approach made understanding the whole picture of online auctions difficult. Also there is no study addressing online auction from the perspective of the communication between bid-takers and bid-makers in which informational influence plays an important role. To fill this gap this study takes a holistic view by defining the online auction process as an integrated persuasion process. We are going to study Argument quality and Peripheral cues that make an Auction deal successful in eBay and we got the sold data from the web crawling in eBay so that we analyzed what factors make an Auction deal successful in eBay. As a result auction success is strong the affects of the central route than peripheral route. Our findings provide additional insights in design for internet auction system and offers findings based on actual auction data that can be compared with those of the modeling approach.,min ko,Not available,2015.0,10.1007/978-3-319-19857-6_32,Intelligent Decision Technologies,Jung2015,False,,Springer,Not available,Argument Quality or Peripheral Cues: What Makes an Auction Deal Successful in eBay?,0bf117838dc439d4316bea7db3a38285,http://dx.doi.org/10.1007/978-3-319-19857-6_32 1609,Recently in this online business environment there are magnificent advancement and growth of online auction representatively in eBay. The cause of this advancement is a kind of consumer experience that the excitement of winning a product is happier rather than simply buying it. In relation to these situations there are many business models about online auction process. These studies were not based on actual data and focused mostly on individual cases and specific factors including the starting price of a transaction the bidder number bidder and seller behavior in the auction market and the online auction strategy. This fragmented approach made understanding the whole picture of online auctions difficult. Also there is no study addressing online auction from the perspective of the communication between bid-takers and bid-makers in which informational influence plays an important role. To fill this gap this study takes a holistic view by defining the online auction process as an integrated persuasion process. We are going to study Argument quality and Peripheral cues that make an Auction deal successful in eBay and we got the sold data from the web crawling in eBay so that we analyzed what factors make an Auction deal successful in eBay. As a result auction success is strong the affects of the central route than peripheral route. Our findings provide additional insights in design for internet auction system and offers findings based on actual auction data that can be compared with those of the modeling approach.,yong kim,Not available,2015.0,10.1007/978-3-319-19857-6_32,Intelligent Decision Technologies,Jung2015,False,,Springer,Not available,Argument Quality or Peripheral Cues: What Makes an Auction Deal Successful in eBay?,0bf117838dc439d4316bea7db3a38285,http://dx.doi.org/10.1007/978-3-319-19857-6_32 1610,Negotiations allow parties to exchange offers in search for mutually agreeable solutions. The exchange process is usually flexible and ill-structured and it may involve a set of multiple issues which may change in the course of negotiation. Auctions on the other hand feature strict rules regarding bid submission and evaluation. Most of the existing auctions allow for single attribute bids. This paper proposes an approach by which a software agent solution could emulate a multi-attribute negotiation front-end while bidding in single-attribute auction marketplaces. The bidding model is based upon concession-making curve introduced in prior work on electronic negotiations. Using data collected from eBay the paper shows that bidding across several attributes would result in higher utility outcome and faster results than bidding within a single attribute set.,real carbonneau,Not available,2015.0,10.1007/978-3-319-19515-5_30,Outlooks and Insights on Group Decision and Negotiation,A.2015,False,,Springer,Not available,Back-End Bidding for Front-End Negotiation: A Model,5af7a9cfcdcb69e91c2b191a99d7df2f,http://dx.doi.org/10.1007/978-3-319-19515-5_30 1611,Negotiations allow parties to exchange offers in search for mutually agreeable solutions. The exchange process is usually flexible and ill-structured and it may involve a set of multiple issues which may change in the course of negotiation. Auctions on the other hand feature strict rules regarding bid submission and evaluation. Most of the existing auctions allow for single attribute bids. This paper proposes an approach by which a software agent solution could emulate a multi-attribute negotiation front-end while bidding in single-attribute auction marketplaces. The bidding model is based upon concession-making curve introduced in prior work on electronic negotiations. Using data collected from eBay the paper shows that bidding across several attributes would result in higher utility outcome and faster results than bidding within a single attribute set.,rustam vahidov,Not available,2015.0,10.1007/978-3-319-19515-5_30,Outlooks and Insights on Group Decision and Negotiation,A.2015,False,,Springer,Not available,Back-End Bidding for Front-End Negotiation: A Model,5af7a9cfcdcb69e91c2b191a99d7df2f,http://dx.doi.org/10.1007/978-3-319-19515-5_30 1612,In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However to further encourage participants to use the system one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.,tassos dimitriou,Not available,2015.0,10.1007/978-3-319-24018-3_2,Information Security Theory and Practice,Tassos2015,False,,Springer,Not available,Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing,db6be875531414d1275dc7f798269a07,http://dx.doi.org/10.1007/978-3-319-24018-3_2 1613,An auction framework is examined where each seller is uncertain about whether or not he will have a good available to sell. A timely example includes the auctioning off of radio spectrum by licensed primary users to unlicensed secondary users. A licensed primary user may not use the spectrum all of the time but may not know in advance whether or not he will need the spectrum himself and thus whether or not he will have spectrum bandwidth available to rent out. We consider two types of auctions: an ex-post auction which takes place after each seller learns about the availability of the good and an ex-ante auction which takes place before each seller learns about availability. The expected payoffs to buyers sellers and to society are then compared. The ex-ante auction can cause buyers to bid on multiple expected units to ensure that they end up with at least one actual unit. Such over purchasing can create a loss to society. Sellers will prefer the ex-post auction since if fewer units are actually available to sell then they can be sold at a higher price. Whereas in the ex-ante auction all sellers have one expected unit available to sell which results in a lower price. However if high value buyers are common then a buyer may prefer the ex-ante auction as it can be easier to win an expected unit than an ex-post actual unit. In contrast if a buyer has a high valuation and if high value buyers are uncommon then he may prefer the ex-post auction since he has a strong chance to win an actual unit.,alison watts,Not available,2016.0,10.1007/s00712-016-0483-7,Journal of Economics,Alison2016,False,,Springer,Not available,Two ways to auction off an uncertain good,87c4b63371b3d1ddc9c39377b734dbad,http://dx.doi.org/10.1007/s00712-016-0483-7 1614,In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However to further encourage participants to use the system one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.,ioannis krontiris,Not available,2015.0,10.1007/978-3-319-24018-3_2,Information Security Theory and Practice,Tassos2015,False,,Springer,Not available,Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing,db6be875531414d1275dc7f798269a07,http://dx.doi.org/10.1007/978-3-319-24018-3_2 1615,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,kan takeuchi,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 1616,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,john lin,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 1617,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,yan chen,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 1618,In scientific collaborations technologies have broadened access to scarce scientific and engineering resources. While broader access is often applauded little attention has been focused on the problem of efficient and equitable resource allocation. This paper presents laboratory experiments designed to compare different allocation mechanisms for access to joint research facilities. Specifically we study the Vickrey-Clarke-Groves (VCG) auction a simultaneous ascending auction (the Resource Allocation Design RAD) and a mechanism based on submitted rankings (Knapsack). Experimental results show that RAD and VCG are both more efficient than Knapsack while Knapsack achieves a more equal distribution of resources than RAD or VCG. The findings highlight the need for systematic exploration of allocation mechanisms within collaboratories.,thomas finholt,Not available,2010.0,10.1007/s10683-010-9252-6,Experimental Economics,Kan2010,False,,Springer,Not available,Scheduling with package auctions,a463f47dcdf8a36b2247e878488fa38e,http://dx.doi.org/10.1007/s10683-010-9252-6 1619,We investigate the algorithmic performance of Vickrey-Clarke-Groves mechanisms in the single item case. We provide a formal definition of a Vickrey algorithm for this framework and give a number of examples of Vickrey algorithms. We consider three performance criteria one corresponding to a Pareto criterion one to worst-case analysis and one related to first-order stochastic dominance. We show that Pareto best Vickrey algorithms do not exist and that worst-case analysis is of no use in discriminating between Vickrey algorithms. For the case of two bidders we show that the bisection auction stochastically dominates all Vickrey algorithms. We extend our analysis to the study of weak Vickrey algorithms and winner determination algorithms. For the case of two bidders we show that the One-Search algorithm stochastically dominates all column monotonic weak Vickrey algorithms and that a suitably adjusted version of the bisection algorithm the WD bisection algorithm stochastically dominates all winner determination algorithms. The WD bisection algorithm Pareto dominates all column monotonic winner determination algorithms in the ,elena grigorieva,Not available,2010.0,10.1007/s00453-009-9285-4,Algorithmica,Elena2010,True,,Springer,Not available,On the Fastest Vickrey Algorithm,e34a1f00fb57b0293d42bdca62cb6380,http://dx.doi.org/10.1007/s00453-009-9285-4 1620,We investigate the algorithmic performance of Vickrey-Clarke-Groves mechanisms in the single item case. We provide a formal definition of a Vickrey algorithm for this framework and give a number of examples of Vickrey algorithms. We consider three performance criteria one corresponding to a Pareto criterion one to worst-case analysis and one related to first-order stochastic dominance. We show that Pareto best Vickrey algorithms do not exist and that worst-case analysis is of no use in discriminating between Vickrey algorithms. For the case of two bidders we show that the bisection auction stochastically dominates all Vickrey algorithms. We extend our analysis to the study of weak Vickrey algorithms and winner determination algorithms. For the case of two bidders we show that the One-Search algorithm stochastically dominates all column monotonic weak Vickrey algorithms and that a suitably adjusted version of the bisection algorithm the WD bisection algorithm stochastically dominates all winner determination algorithms. The WD bisection algorithm Pareto dominates all column monotonic winner determination algorithms in the ,p. herings,Not available,2010.0,10.1007/s00453-009-9285-4,Algorithmica,Elena2010,True,,Springer,Not available,On the Fastest Vickrey Algorithm,e34a1f00fb57b0293d42bdca62cb6380,http://dx.doi.org/10.1007/s00453-009-9285-4 1621,We investigate the algorithmic performance of Vickrey-Clarke-Groves mechanisms in the single item case. We provide a formal definition of a Vickrey algorithm for this framework and give a number of examples of Vickrey algorithms. We consider three performance criteria one corresponding to a Pareto criterion one to worst-case analysis and one related to first-order stochastic dominance. We show that Pareto best Vickrey algorithms do not exist and that worst-case analysis is of no use in discriminating between Vickrey algorithms. For the case of two bidders we show that the bisection auction stochastically dominates all Vickrey algorithms. We extend our analysis to the study of weak Vickrey algorithms and winner determination algorithms. For the case of two bidders we show that the One-Search algorithm stochastically dominates all column monotonic weak Vickrey algorithms and that a suitably adjusted version of the bisection algorithm the WD bisection algorithm stochastically dominates all winner determination algorithms. The WD bisection algorithm Pareto dominates all column monotonic winner determination algorithms in the ,rudolf muller,Not available,2010.0,10.1007/s00453-009-9285-4,Algorithmica,Elena2010,True,,Springer,Not available,On the Fastest Vickrey Algorithm,e34a1f00fb57b0293d42bdca62cb6380,http://dx.doi.org/10.1007/s00453-009-9285-4 1622,We investigate the algorithmic performance of Vickrey-Clarke-Groves mechanisms in the single item case. We provide a formal definition of a Vickrey algorithm for this framework and give a number of examples of Vickrey algorithms. We consider three performance criteria one corresponding to a Pareto criterion one to worst-case analysis and one related to first-order stochastic dominance. We show that Pareto best Vickrey algorithms do not exist and that worst-case analysis is of no use in discriminating between Vickrey algorithms. For the case of two bidders we show that the bisection auction stochastically dominates all Vickrey algorithms. We extend our analysis to the study of weak Vickrey algorithms and winner determination algorithms. For the case of two bidders we show that the One-Search algorithm stochastically dominates all column monotonic weak Vickrey algorithms and that a suitably adjusted version of the bisection algorithm the WD bisection algorithm stochastically dominates all winner determination algorithms. The WD bisection algorithm Pareto dominates all column monotonic winner determination algorithms in the ,dries vermeulen,Not available,2010.0,10.1007/s00453-009-9285-4,Algorithmica,Elena2010,True,,Springer,Not available,On the Fastest Vickrey Algorithm,e34a1f00fb57b0293d42bdca62cb6380,http://dx.doi.org/10.1007/s00453-009-9285-4 1623,We define continuous-time dynamics for exchange economies with ,gael giraud,Not available,2010.0,10.1007/s00199-009-0507-4,Economic Theory,Gaël2010,False,,Springer,Not available,Nominal uniqueness and money non-neutrality in the limit-price exchange process,8fe7609ae9157d12324aad0bb293e6da,http://dx.doi.org/10.1007/s00199-009-0507-4 1624,This paper studies second-price auctions in which bidders make participation decisions sequentially in an exogenous order and participating bidders incur bidding costs. When bidders decide whether to participate or not they know their own valuations as well as earlier bidders’ participation decisions. To analyze bidders’ participation and bidding decisions we study equilibria in cutoff strategies with which a bidder participates and bids his valuation if his valuation exceeds a cutoff given his observation on earlier bidders’ participation. Focusing on the case of two bidders we present two main results on comparative statics and revenue comparison. In the comparative statics analysis we study the effects of a change in bidders’ characteristics on equilibrium cutoffs. In revenue comparison we show that the considered sequential entry format yields lower revenue than the simultaneous entry counterpart. Finally we discuss the difficulties in generalizing these two results for the case of more than two bidders.,jinhyuk lee,Not available,2016.0,10.1007/s00199-015-0915-6,Economic Theory,Jinhyuk2016,False,,Springer,Not available,Second-price auctions with sequential and costly participation,428c82346047d8e858938fdf2977743e,http://dx.doi.org/10.1007/s00199-015-0915-6 1625,We define continuous-time dynamics for exchange economies with ,dimitrios tsomocos,Not available,2010.0,10.1007/s00199-009-0507-4,Economic Theory,Gaël2010,False,,Springer,Not available,Nominal uniqueness and money non-neutrality in the limit-price exchange process,8fe7609ae9157d12324aad0bb293e6da,http://dx.doi.org/10.1007/s00199-009-0507-4 1626,We study a model of common-value auctions with two bidders in which bidders’ private information are independently and asymmetrically distributed. We present sufficient and necessary conditions respectively under which the expected revenues from first-price and second-price auctions can be ranked. Using these conditions and a bid-equivalence between common-value auctions and private-value auctions with resale we extend the revenue-ranking result of Hafalir and Krishna [Am Econ Rev 98 2008a] and provide necessary conditions for their ranking to hold. In addition we provide sufficient and necessary conditions for the opposite ranking of revenues respectively. Our analysis helps clarify the roles of two forms of regularity assumptions (buyer-regularity and seller-regularity) in ranking revenues and illustrates how revenue ranking is linked to submodularity and supermodularity of the common-value function and to a single-crossing property of a function derived from the monopoly or monopsony pricing function in the resale stage.,harrison cheng,Not available,2010.0,10.1007/s00199-009-0505-6,Economic Theory,H.2010,False,,Springer,Not available,Asymmetric common-value auctions with applications to private-value auctions with resale,dc399cb9eb0061d79dae9c331d66c71c,http://dx.doi.org/10.1007/s00199-009-0505-6 1627,We study a model of common-value auctions with two bidders in which bidders’ private information are independently and asymmetrically distributed. We present sufficient and necessary conditions respectively under which the expected revenues from first-price and second-price auctions can be ranked. Using these conditions and a bid-equivalence between common-value auctions and private-value auctions with resale we extend the revenue-ranking result of Hafalir and Krishna [Am Econ Rev 98 2008a] and provide necessary conditions for their ranking to hold. In addition we provide sufficient and necessary conditions for the opposite ranking of revenues respectively. Our analysis helps clarify the roles of two forms of regularity assumptions (buyer-regularity and seller-regularity) in ranking revenues and illustrates how revenue ranking is linked to submodularity and supermodularity of the common-value function and to a single-crossing property of a function derived from the monopoly or monopsony pricing function in the resale stage.,guofu tan,Not available,2010.0,10.1007/s00199-009-0505-6,Economic Theory,H.2010,False,,Springer,Not available,Asymmetric common-value auctions with applications to private-value auctions with resale,dc399cb9eb0061d79dae9c331d66c71c,http://dx.doi.org/10.1007/s00199-009-0505-6 1628,The effect of a contribution cap is analyzed in a political lobbying game where the politician has a policy preference. In contrast to the previous literature without politician policy preferences more restrictive binding caps always reduce expected aggregate contributions. However the initial imposition of a cap increases contributions if the politician mildly favors the low-valuation lobbyist’s policy. The introduction of policy preferences permits analysis of monied interests’ policy influence. A more restrictive cap makes it more likely that the politician enacts the policy he would have enacted in the absence of lobbying even in cases where expected aggregate contributions increase.,ivan pastine,Not available,2010.0,10.1007/s11127-009-9555-3,Public Choice,Ivan2010,False,,Springer,Not available,Politician preferences law-abiding lobbyists and caps on political contributions,83136784e81bc27ae85ba8c2c1792c25,http://dx.doi.org/10.1007/s11127-009-9555-3 1629,The effect of a contribution cap is analyzed in a political lobbying game where the politician has a policy preference. In contrast to the previous literature without politician policy preferences more restrictive binding caps always reduce expected aggregate contributions. However the initial imposition of a cap increases contributions if the politician mildly favors the low-valuation lobbyist’s policy. The introduction of policy preferences permits analysis of monied interests’ policy influence. A more restrictive cap makes it more likely that the politician enacts the policy he would have enacted in the absence of lobbying even in cases where expected aggregate contributions increase.,tuvana pastine,Not available,2010.0,10.1007/s11127-009-9555-3,Public Choice,Ivan2010,False,,Springer,Not available,Politician preferences law-abiding lobbyists and caps on political contributions,83136784e81bc27ae85ba8c2c1792c25,http://dx.doi.org/10.1007/s11127-009-9555-3 1630,The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of all of the components of the system in advance. Rather we attempt to design infrastructure such as network protocols in such a way that the overall system is robust despite the fact that numerous arbitrary non-certified third-party components can connect to our system. Economists have long understood this issue since it is analogous to the design of the rules governing auctions and other marketplaces in which we attempt to achieve socially-desirable outcomes despite the impossibility of prescribing the exact behaviour of the market participants who may attempt to subvert the market for their own personal gain. This field is known as “mechanism design”: the science of designing rules of a game to achieve a specific outcome even though each participant may be self-interested. Although it originated in economics mechanism design has become an important foundation of multi-agent systems (MAS) research. In a traditional mechanism design problem analytical methods are used to prove that agents’ game-theoretically optimal strategies lead to socially desirable outcomes. In many scenarios traditional mechanism design and auction theory yield clear-cut results; however there are many situations in which the underlying assumptions of the theory are violated due to the messiness of the real-world. In this paper we review alternative approaches to mechanism design which treat it as an ,steve phelps,Not available,2010.0,10.1007/s10458-009-9108-7,Autonomous Agents and Multi-Agent Systems,Steve2010,False,,Springer,Not available,Evolutionary mechanism design: a review,368dc275846038238c225220208dd850,http://dx.doi.org/10.1007/s10458-009-9108-7 1631,The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of all of the components of the system in advance. Rather we attempt to design infrastructure such as network protocols in such a way that the overall system is robust despite the fact that numerous arbitrary non-certified third-party components can connect to our system. Economists have long understood this issue since it is analogous to the design of the rules governing auctions and other marketplaces in which we attempt to achieve socially-desirable outcomes despite the impossibility of prescribing the exact behaviour of the market participants who may attempt to subvert the market for their own personal gain. This field is known as “mechanism design”: the science of designing rules of a game to achieve a specific outcome even though each participant may be self-interested. Although it originated in economics mechanism design has become an important foundation of multi-agent systems (MAS) research. In a traditional mechanism design problem analytical methods are used to prove that agents’ game-theoretically optimal strategies lead to socially desirable outcomes. In many scenarios traditional mechanism design and auction theory yield clear-cut results; however there are many situations in which the underlying assumptions of the theory are violated due to the messiness of the real-world. In this paper we review alternative approaches to mechanism design which treat it as an ,peter mcburney,Not available,2010.0,10.1007/s10458-009-9108-7,Autonomous Agents and Multi-Agent Systems,Steve2010,False,,Springer,Not available,Evolutionary mechanism design: a review,368dc275846038238c225220208dd850,http://dx.doi.org/10.1007/s10458-009-9108-7 1632,The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of all of the components of the system in advance. Rather we attempt to design infrastructure such as network protocols in such a way that the overall system is robust despite the fact that numerous arbitrary non-certified third-party components can connect to our system. Economists have long understood this issue since it is analogous to the design of the rules governing auctions and other marketplaces in which we attempt to achieve socially-desirable outcomes despite the impossibility of prescribing the exact behaviour of the market participants who may attempt to subvert the market for their own personal gain. This field is known as “mechanism design”: the science of designing rules of a game to achieve a specific outcome even though each participant may be self-interested. Although it originated in economics mechanism design has become an important foundation of multi-agent systems (MAS) research. In a traditional mechanism design problem analytical methods are used to prove that agents’ game-theoretically optimal strategies lead to socially desirable outcomes. In many scenarios traditional mechanism design and auction theory yield clear-cut results; however there are many situations in which the underlying assumptions of the theory are violated due to the messiness of the real-world. In this paper we review alternative approaches to mechanism design which treat it as an ,simon parsons,Not available,2010.0,10.1007/s10458-009-9108-7,Autonomous Agents and Multi-Agent Systems,Steve2010,False,,Springer,Not available,Evolutionary mechanism design: a review,368dc275846038238c225220208dd850,http://dx.doi.org/10.1007/s10458-009-9108-7 1633,This paper analyzes the entrants to the 2007 ,jinzhong niu,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 1634,This paper analyzes the entrants to the 2007 ,kai cai,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 1635,This paper studies second-price auctions in which bidders make participation decisions sequentially in an exogenous order and participating bidders incur bidding costs. When bidders decide whether to participate or not they know their own valuations as well as earlier bidders’ participation decisions. To analyze bidders’ participation and bidding decisions we study equilibria in cutoff strategies with which a bidder participates and bids his valuation if his valuation exceeds a cutoff given his observation on earlier bidders’ participation. Focusing on the case of two bidders we present two main results on comparative statics and revenue comparison. In the comparative statics analysis we study the effects of a change in bidders’ characteristics on equilibrium cutoffs. In revenue comparison we show that the considered sequential entry format yields lower revenue than the simultaneous entry counterpart. Finally we discuss the difficulties in generalizing these two results for the case of more than two bidders.,jaeok park,Not available,2016.0,10.1007/s00199-015-0915-6,Economic Theory,Jinhyuk2016,False,,Springer,Not available,Second-price auctions with sequential and costly participation,428c82346047d8e858938fdf2977743e,http://dx.doi.org/10.1007/s00199-015-0915-6 1636,This paper analyzes the entrants to the 2007 ,simon parsons,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 1637,This paper analyzes the entrants to the 2007 ,peter mcburney,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 1638,This paper analyzes the entrants to the 2007 ,enrico gerding,Not available,2010.0,10.1007/s10458-009-9110-0,Autonomous Agents and Multi-Agent Systems,Jinzhong2010,False,,Springer,Not available,What the 2007 TAC Market Design Game tells us about effective auction mechanisms,89c7ad401bbe62e5f87d89bb5a867bec,http://dx.doi.org/10.1007/s10458-009-9110-0 1639,I compare the value of information acquired secretly with information acquired openly prior to a first-price common-value auction. Novel information (information which is independent of the other bidder’s private information) is more valuable when learned openly but redundant information (information the other bidder already has) is more valuable when learned covertly. In a dynamic game where a bidder can credibly signal he is well-informed without disclosing the content of his information always signaling having novel information and never signaling having redundant information is consistent with (but not uniquely predicted by) equilibrium play. Full revelation of any information possessed by the seller increases expected revenue and is uniquely predicted in equilibrium.,daniel quint,Not available,2010.0,10.1007/s00199-009-0491-8,Economic Theory,Daniel2010,False,,Springer,Not available,Looking smart versus playing dumb in common-value auctions,f3b30b2ab714aaaf437a32bb44010ed0,http://dx.doi.org/10.1007/s00199-009-0491-8 1640,This paper introduces a bi-objective winner determination problem which arises in the procurement of transportation contracts via combinatorial auctions where bundle bidding is possible. The problem is modelled as a bi-objective extension to the set covering problem. We consider both the minimisation of the total procurement costs and the maximisation of the service-quality level at which the transportation contracts are executed. Taking into account the size of real-world transport auctions a solution method has to cope with problems of up to some hundred contracts and a few thousand bundle bids. To solve the problem we propose a bi-objective branch-and-bound algorithm and eight variants of a multiobjective genetic algorithm. Artificial benchmark instances that comply with important economic features of the transport domain are introduced to evaluate the methods. The branch-and-bound approach is able to find the optimal trade-off solutions in reasonable time for very small instances only. The eight variants of the genetic algorithm are compared among each other by means of large instances. The best variant is also evaluated using the small instances with known optimal solutions. The results indicate that the performance largely depends on the initialisation heuristic and suggest also that a well-balanced combination of genetic operators is crucial to obtain good solutions.,tobias buer,Not available,2010.0,10.1007/s12159-010-0031-8,Logistics Research,Tobias2010,False,,Springer,Not available,Solving a bi-objective winner determination problem in a transportation procurement auction,57e74b06b92902d364f4f78e67581d34,http://dx.doi.org/10.1007/s12159-010-0031-8 1641,This paper introduces a bi-objective winner determination problem which arises in the procurement of transportation contracts via combinatorial auctions where bundle bidding is possible. The problem is modelled as a bi-objective extension to the set covering problem. We consider both the minimisation of the total procurement costs and the maximisation of the service-quality level at which the transportation contracts are executed. Taking into account the size of real-world transport auctions a solution method has to cope with problems of up to some hundred contracts and a few thousand bundle bids. To solve the problem we propose a bi-objective branch-and-bound algorithm and eight variants of a multiobjective genetic algorithm. Artificial benchmark instances that comply with important economic features of the transport domain are introduced to evaluate the methods. The branch-and-bound approach is able to find the optimal trade-off solutions in reasonable time for very small instances only. The eight variants of the genetic algorithm are compared among each other by means of large instances. The best variant is also evaluated using the small instances with known optimal solutions. The results indicate that the performance largely depends on the initialisation heuristic and suggest also that a well-balanced combination of genetic operators is crucial to obtain good solutions.,giselher pankratz,Not available,2010.0,10.1007/s12159-010-0031-8,Logistics Research,Tobias2010,False,,Springer,Not available,Solving a bi-objective winner determination problem in a transportation procurement auction,57e74b06b92902d364f4f78e67581d34,http://dx.doi.org/10.1007/s12159-010-0031-8 1642,Experiments on second-price sealed-bid private value auctions have established that subjects typically bid more than their value despite the fact that value bidding is a dominant strategy in such auctions. Moreover the laboratory evidence shows that subjects do not learn to bid their values as they gain more experience. In the present paper we re-examine the second-price auction data from Kagel and Levin’s (Econ J 103:868–879 1993) classic paper. We find that auction efficiency increases over time even though the frequency of overbidding is unchanged. We argue that the rise in efficiency is due to a decline in the variability of overbidding. This is consistent with subjects’ learning to bid more like each other.,rodney garratt,Not available,2010.0,10.1007/s11151-010-9255-7,Review of Industrial Organization,J.2010,True,,Springer,Not available,Efficiency in Second-Price Auctions: A New Look at Old Data,bf6b7af43be7851f7ad9cb6338d33d13,http://dx.doi.org/10.1007/s11151-010-9255-7 1643,Experiments on second-price sealed-bid private value auctions have established that subjects typically bid more than their value despite the fact that value bidding is a dominant strategy in such auctions. Moreover the laboratory evidence shows that subjects do not learn to bid their values as they gain more experience. In the present paper we re-examine the second-price auction data from Kagel and Levin’s (Econ J 103:868–879 1993) classic paper. We find that auction efficiency increases over time even though the frequency of overbidding is unchanged. We argue that the rise in efficiency is due to a decline in the variability of overbidding. This is consistent with subjects’ learning to bid more like each other.,john wooders,Not available,2010.0,10.1007/s11151-010-9255-7,Review of Industrial Organization,J.2010,True,,Springer,Not available,Efficiency in Second-Price Auctions: A New Look at Old Data,bf6b7af43be7851f7ad9cb6338d33d13,http://dx.doi.org/10.1007/s11151-010-9255-7 1644, We study endogenous-participation auctions where bidders only know the number of potential participants. After seeing their values for the object potential participants decide whether or not to enter the auction. They may not want to enter the auction since they have to pay participation costs. We characterize equilibrium bidding strategies and entry decisions for both first- and second-price sealed-bid auctions when participation is endogenous. We show that there is a pure strategy entry equilibrium where only bidders with values greater than a certain cut-off point actually bid. In this context both types of auctions generate the same expected revenue. We also show that contrary to the predictions of the fixed number of bidders literature the seller's expected revenue may decrease when the number of potential participants increases. In addition we show that it is optimal for the seller to charge an entry fee which contrasts with results from the existing literature on auctions with entry. As in the fixed-,flavio menezes,Not available,2000.0,10.1007/s100580050048,Review of Economic Design,M.2000,False,,Springer,Not available,Auctions with endogenous participation,d55c2154d0708b441c25550987252cbe,http://dx.doi.org/10.1007/s100580050048 1645, We study endogenous-participation auctions where bidders only know the number of potential participants. After seeing their values for the object potential participants decide whether or not to enter the auction. They may not want to enter the auction since they have to pay participation costs. We characterize equilibrium bidding strategies and entry decisions for both first- and second-price sealed-bid auctions when participation is endogenous. We show that there is a pure strategy entry equilibrium where only bidders with values greater than a certain cut-off point actually bid. In this context both types of auctions generate the same expected revenue. We also show that contrary to the predictions of the fixed number of bidders literature the seller's expected revenue may decrease when the number of potential participants increases. In addition we show that it is optimal for the seller to charge an entry fee which contrasts with results from the existing literature on auctions with entry. As in the fixed-,paulo monteiro,Not available,2000.0,10.1007/s100580050048,Review of Economic Design,M.2000,False,,Springer,Not available,Auctions with endogenous participation,d55c2154d0708b441c25550987252cbe,http://dx.doi.org/10.1007/s100580050048 1646,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,gregory kersten,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 1647,In February 1998 the Dutch government auctioned licences to operate mobile telecommunications networks according to the DCS-1800 technology. Two “national” licences and sixteen “regional” ones were auctioned by using a variant of the simultaneous multiple round auction that was proposed by US-economists and that had been tested in the US. This paper describes how the decision to auction came about it details the auction rules and it analyzes the resulting outcomes.,eric damme,Not available,2000.0,10.1007/978-1-4615-4627-6_5,Game Practice: Contributions from Applied Game Theory,Eric2000,False,,Springer,Not available,The Dutch DCS-1800 Auction,55e1f47c6f73304ff52a354049f78545,http://dx.doi.org/10.1007/978-1-4615-4627-6_5 1648,This paper surveys the existing literature on and considers a general methodological approach for the structural estimation of empirical auction models in which the estimating equations are directly derived from the equilibrium bid functions posited in the theoretical literature. We describe the building blocks of an empirical structural auction model and illustrate using the first- second- and ascending-auction models as examples. Alternative estimation approaches for these models are discussed.,han hong,Not available,2000.0,10.1007/978-1-4615-4627-6_10,Game Practice: Contributions from Applied Game Theory,Han2000,False,,Springer,Not available,Structural Estimation of Auction Models,8677438de0f2087b555b611743c03392,http://dx.doi.org/10.1007/978-1-4615-4627-6_10 1649,This paper surveys the existing literature on and considers a general methodological approach for the structural estimation of empirical auction models in which the estimating equations are directly derived from the equilibrium bid functions posited in the theoretical literature. We describe the building blocks of an empirical structural auction model and illustrate using the first- second- and ascending-auction models as examples. Alternative estimation approaches for these models are discussed.,matthew shum,Not available,2000.0,10.1007/978-1-4615-4627-6_10,Game Practice: Contributions from Applied Game Theory,Han2000,False,,Springer,Not available,Structural Estimation of Auction Models,8677438de0f2087b555b611743c03392,http://dx.doi.org/10.1007/978-1-4615-4627-6_10 1650,Recent developments in the theory of auctions with random prizes played by non-EU bidders provide a series of behavioral prescriptions which can be investigated with experimental methods. In this paper we present results of an experiment involving a large number of participants held at the Centre for Experimental Economics (University of York UK). The test of the theory is conducted by means of auction (English and second price sealed bid) data coupled with some outside the auction evidence of bidders’ behavior towards risk. The latter evidence is obtained thanks to Neilson’s (1992) ”modified” version of the standard Becker et al. methodology. Experimental results indicate that bidders’ behaviour is sensitive to the environment which is used to solicit their certainty equivalent of lotteries. It is also found that individual violations of Expected Utility are smoothed down at the price level since our experimental data confirms revenue equivalence.,lucia parisio,Not available,2000.0,10.1007/978-1-4615-4627-6_12,Game Practice: Contributions from Applied Game Theory,Lucia2000,False,,Springer,Not available,Experiments on Auctions with Random Prizes and EU/Non-EU Bidders,0ed53b58f733d897a64c8b78c24aaa4d,http://dx.doi.org/10.1007/978-1-4615-4627-6_12 1651, The lobbying process has been described as an auction (see for instance Bernheim and Whinston [4]). While the auction rules picked are supposed to be descriptive they vary from author to author. Examples show that these different auction rules make different predictions of what policy is the outcome of the lobbying process. Further which proposed auction rule is the most preferred by the government official depends on the preferences of lobbies.¶ If off-the-equilibrium negative contributions (i.e. contributions from the government official to lobbies) are possible there is a best possible auction for the government official. Such an auction leads to the same policy as in [4] although contributions are higher. If negative contributions are not possible the government official is made worse off. It follows that since the auction rules used in the literature to describe lobbying do not allow negative contributions none of them are optimal from the government official's perspective.,richard boylan,Not available,2000.0,10.1007/PL00007175,Social Choice and Welfare,T.2000,False,,Springer,Not available,An optimal auction perspective on lobbying,1a477849ad12db10c3705e06a64976d6,http://dx.doi.org/10.1007/PL00007175 1652,Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and multiagent decision problems. When agents value resources in combination rather than in isolation one generally relies on ,craig boutilier,Not available,2000.0,10.1007/10720026_8,Agent Mediated Electronic Commerce II,Craig2000,False,,Springer,Not available,Resource Allocation Using Sequential Auctions,a6d1dbbf121f1df45985bde89feb0197,http://dx.doi.org/10.1007/10720026_8 1653,Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and multiagent decision problems. When agents value resources in combination rather than in isolation one generally relies on ,moises goldszmidt,Not available,2000.0,10.1007/10720026_8,Agent Mediated Electronic Commerce II,Craig2000,False,,Springer,Not available,Resource Allocation Using Sequential Auctions,a6d1dbbf121f1df45985bde89feb0197,http://dx.doi.org/10.1007/10720026_8 1654,Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and multiagent decision problems. When agents value resources in combination rather than in isolation one generally relies on ,claire monteleoni,Not available,2000.0,10.1007/10720026_8,Agent Mediated Electronic Commerce II,Craig2000,False,,Springer,Not available,Resource Allocation Using Sequential Auctions,a6d1dbbf121f1df45985bde89feb0197,http://dx.doi.org/10.1007/10720026_8 1655,Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and multiagent decision problems. When agents value resources in combination rather than in isolation one generally relies on ,bikash sabata,Not available,2000.0,10.1007/10720026_8,Agent Mediated Electronic Commerce II,Craig2000,False,,Springer,Not available,Resource Allocation Using Sequential Auctions,a6d1dbbf121f1df45985bde89feb0197,http://dx.doi.org/10.1007/10720026_8 1656,In this paper several firms compete for the right to obtain intellectual property protection for a basic idea which has subsequent potential applications. The modelling employs an auction analogy taking the context to be an ,michael waterson,Not available,2000.0,10.1007/978-1-4757-3194-1_9,The Economics and Econometrics of Innovation,Michael2000,False,,Springer,Not available,An Auction Model of Intellectual Property Protection: Patent Versus Copyright,94bf7b043063fd991f326911fd19de11,http://dx.doi.org/10.1007/978-1-4757-3194-1_9 1657,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,tomasz wachowicz,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 1658,In this paper several firms compete for the right to obtain intellectual property protection for a basic idea which has subsequent potential applications. The modelling employs an auction analogy taking the context to be an ,norman ireland,Not available,2000.0,10.1007/978-1-4757-3194-1_9,The Economics and Econometrics of Innovation,Michael2000,False,,Springer,Not available,An Auction Model of Intellectual Property Protection: Patent Versus Copyright,94bf7b043063fd991f326911fd19de11,http://dx.doi.org/10.1007/978-1-4757-3194-1_9 1659,In a multiple-object auction every bidder tries to win as many objects as possible with a bidding algorithm. This paper studies ,yuyu chen,Not available,2000.0,10.1007/3-540-40996-3_8,Algorithms and Computation,Yuyu2000,False,,Springer,Not available,Optimal Bid Sequences for Multiple-Object Auctions with Unequal Budgets,d51d37cbcc6c9731da0197c459da1b9b,http://dx.doi.org/10.1007/3-540-40996-3_8 1660,In a multiple-object auction every bidder tries to win as many objects as possible with a bidding algorithm. This paper studies ,ming-yang kao,Not available,2000.0,10.1007/3-540-40996-3_8,Algorithms and Computation,Yuyu2000,False,,Springer,Not available,Optimal Bid Sequences for Multiple-Object Auctions with Unequal Budgets,d51d37cbcc6c9731da0197c459da1b9b,http://dx.doi.org/10.1007/3-540-40996-3_8 1661,In a multiple-object auction every bidder tries to win as many objects as possible with a bidding algorithm. This paper studies ,hsueh-i. lu,Not available,2000.0,10.1007/3-540-40996-3_8,Algorithms and Computation,Yuyu2000,False,,Springer,Not available,Optimal Bid Sequences for Multiple-Object Auctions with Unequal Budgets,d51d37cbcc6c9731da0197c459da1b9b,http://dx.doi.org/10.1007/3-540-40996-3_8 1662,A key problem addressed in the area of multiagent systems is the automated assignment of multiple tasks to executing agents. The automation of multiagent task assignment requires that the individual agents ,felix brandt,Not available,2000.0,10.1007/978-3-540-45012-2_10,Cooperative Information Agents IV - The Future of Information Agents in Cyberspace,Felix2000,False,,Springer,Not available,Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting,7825dd6649e3b0d56d8d53f1679713d6,http://dx.doi.org/10.1007/978-3-540-45012-2_10 1663,A key problem addressed in the area of multiagent systems is the automated assignment of multiple tasks to executing agents. The automation of multiagent task assignment requires that the individual agents ,wilfried brauer,Not available,2000.0,10.1007/978-3-540-45012-2_10,Cooperative Information Agents IV - The Future of Information Agents in Cyberspace,Felix2000,False,,Springer,Not available,Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting,7825dd6649e3b0d56d8d53f1679713d6,http://dx.doi.org/10.1007/978-3-540-45012-2_10 1664,A key problem addressed in the area of multiagent systems is the automated assignment of multiple tasks to executing agents. The automation of multiagent task assignment requires that the individual agents ,gerhard weiss,Not available,2000.0,10.1007/978-3-540-45012-2_10,Cooperative Information Agents IV - The Future of Information Agents in Cyberspace,Felix2000,False,,Springer,Not available,Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting,7825dd6649e3b0d56d8d53f1679713d6,http://dx.doi.org/10.1007/978-3-540-45012-2_10 1665, The theory of multiple unit auctions traditionally assumes that the offered quantity is fixed. I argue that this assumption is not appropriate for many applications because the seller may be able and willing to adjust the supply as a function of the bidding. In this paper I address this shortcoming by analyzing a multi-unit auction game between a monopolistic seller who can produce arbitrary quantities at constant unit cost and oligopolistic bidders. I establish the existence of a subgame-perfect equilibrium for price discriminating and for uniform price auctions. I also show that bidders have an incentive to misreport their true demand in both auction formats but they do that in different ways and for different reasons. Furthermore both auction formats are inefficient but there is no unambiguous ordering among them. Finally the more competitive the bidders are the more likely the seller is to prefer uniform pricing over price discrimination yet increased competition among bidders may or may not enhance efficiency.,yvan lengwiler,Not available,1999.0,10.1007/s001990050299,Economic Theory,Yvan1999,False,,Springer,Not available, The multiple unit auction with variable supply ,b2b5fcf3057b40d70bd312ba3ea85770,http://dx.doi.org/10.1007/s001990050299 1666,Given its current development trajectory the complexity of cloud computing ecosystems are evolving to where traditional resource management strategies will struggle to remain fit for purpose. These strategies have to cope with ever-increasing numbers of heterogeneous resources a proliferation of new services and a growing user-base with diverse and specialized requirements. This growth not only significantly increases the number of parameters needed to make good decisions it increases the time needed to take these decisions. Consequently traditional resource management systems are increasingly prone to poor decisions making. Devolving resources management decisions to the local environment of that resource can dramatically increase the speed of decisions making; moreover the cost of gathering global information can thus be eliminated; saving communication costs. Experimental data provided in this paper illustrate that extant cloud deployments can be used as effective vehicles for devolved decision making. This finding strengthens the case for the proposed paradigm shift since it does not require a change to the architecture of existing cloud systems. This shift would result in systems in which resources decide for themselves how best they can be used. This paper takes this idea to its logical conclusion and proposes a system for supporting self-managing resources in cloud environments. It introduces the concept of coalitions consisting of collaborating resources formed for the purpose of service delivery. It suggests the utility of restricting the interactions between the end-user and the cloud service provider to a well-defined services interface. It shows how clouds can be considered functionally as engines for delivering an appropriate set of resources in response to service requests. And finally since modern applications are increasingly constructed from sophisticated workflows of complex components it shows how combinatorial auctions can be used to effectively deliver packages of resources to support those workflows.,dan marinescu,Not available,2017.0,10.1007/s10586-016-0700-8,Cluster Computing,C.2017,False,,Springer,Not available,An approach for scaling cloud resource management,26d6cc0a6db2fff7c39ce141439c51cc,http://dx.doi.org/10.1007/s10586-016-0700-8 1667,Given its current development trajectory the complexity of cloud computing ecosystems are evolving to where traditional resource management strategies will struggle to remain fit for purpose. These strategies have to cope with ever-increasing numbers of heterogeneous resources a proliferation of new services and a growing user-base with diverse and specialized requirements. This growth not only significantly increases the number of parameters needed to make good decisions it increases the time needed to take these decisions. Consequently traditional resource management systems are increasingly prone to poor decisions making. Devolving resources management decisions to the local environment of that resource can dramatically increase the speed of decisions making; moreover the cost of gathering global information can thus be eliminated; saving communication costs. Experimental data provided in this paper illustrate that extant cloud deployments can be used as effective vehicles for devolved decision making. This finding strengthens the case for the proposed paradigm shift since it does not require a change to the architecture of existing cloud systems. This shift would result in systems in which resources decide for themselves how best they can be used. This paper takes this idea to its logical conclusion and proposes a system for supporting self-managing resources in cloud environments. It introduces the concept of coalitions consisting of collaborating resources formed for the purpose of service delivery. It suggests the utility of restricting the interactions between the end-user and the cloud service provider to a well-defined services interface. It shows how clouds can be considered functionally as engines for delivering an appropriate set of resources in response to service requests. And finally since modern applications are increasingly constructed from sophisticated workflows of complex components it shows how combinatorial auctions can be used to effectively deliver packages of resources to support those workflows.,ashkan paya,Not available,2017.0,10.1007/s10586-016-0700-8,Cluster Computing,C.2017,False,,Springer,Not available,An approach for scaling cloud resource management,26d6cc0a6db2fff7c39ce141439c51cc,http://dx.doi.org/10.1007/s10586-016-0700-8 1668, In a general model of common-value second-price auctions with differential information we show equivalence between the following characteristics of a bidder: (i) having a dominant strategy; (ii) possessing superior information; (iii) being immune from winner's curse. When a dominant strategy exists it is given by the conditional expectation of the common value with respect to bidder's information field; if the dominant strategy is used other bidders cannot make a profit.,aner sela,Not available,2002.0,10.1007/s001820100087,International Journal of Game Theory,Ezra2002,False,,Springer,Not available,Dominant strategies superior information and winner's curse in second-price auctions,956481df957806d93b38469570f20b79,http://dx.doi.org/10.1007/s001820100087 1669,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,margaret kersten,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 1670,Given its current development trajectory the complexity of cloud computing ecosystems are evolving to where traditional resource management strategies will struggle to remain fit for purpose. These strategies have to cope with ever-increasing numbers of heterogeneous resources a proliferation of new services and a growing user-base with diverse and specialized requirements. This growth not only significantly increases the number of parameters needed to make good decisions it increases the time needed to take these decisions. Consequently traditional resource management systems are increasingly prone to poor decisions making. Devolving resources management decisions to the local environment of that resource can dramatically increase the speed of decisions making; moreover the cost of gathering global information can thus be eliminated; saving communication costs. Experimental data provided in this paper illustrate that extant cloud deployments can be used as effective vehicles for devolved decision making. This finding strengthens the case for the proposed paradigm shift since it does not require a change to the architecture of existing cloud systems. This shift would result in systems in which resources decide for themselves how best they can be used. This paper takes this idea to its logical conclusion and proposes a system for supporting self-managing resources in cloud environments. It introduces the concept of coalitions consisting of collaborating resources formed for the purpose of service delivery. It suggests the utility of restricting the interactions between the end-user and the cloud service provider to a well-defined services interface. It shows how clouds can be considered functionally as engines for delivering an appropriate set of resources in response to service requests. And finally since modern applications are increasingly constructed from sophisticated workflows of complex components it shows how combinatorial auctions can be used to effectively deliver packages of resources to support those workflows.,john morrison,Not available,2017.0,10.1007/s10586-016-0700-8,Cluster Computing,C.2017,False,,Springer,Not available,An approach for scaling cloud resource management,26d6cc0a6db2fff7c39ce141439c51cc,http://dx.doi.org/10.1007/s10586-016-0700-8 1671,Given its current development trajectory the complexity of cloud computing ecosystems are evolving to where traditional resource management strategies will struggle to remain fit for purpose. These strategies have to cope with ever-increasing numbers of heterogeneous resources a proliferation of new services and a growing user-base with diverse and specialized requirements. This growth not only significantly increases the number of parameters needed to make good decisions it increases the time needed to take these decisions. Consequently traditional resource management systems are increasingly prone to poor decisions making. Devolving resources management decisions to the local environment of that resource can dramatically increase the speed of decisions making; moreover the cost of gathering global information can thus be eliminated; saving communication costs. Experimental data provided in this paper illustrate that extant cloud deployments can be used as effective vehicles for devolved decision making. This finding strengthens the case for the proposed paradigm shift since it does not require a change to the architecture of existing cloud systems. This shift would result in systems in which resources decide for themselves how best they can be used. This paper takes this idea to its logical conclusion and proposes a system for supporting self-managing resources in cloud environments. It introduces the concept of coalitions consisting of collaborating resources formed for the purpose of service delivery. It suggests the utility of restricting the interactions between the end-user and the cloud service provider to a well-defined services interface. It shows how clouds can be considered functionally as engines for delivering an appropriate set of resources in response to service requests. And finally since modern applications are increasingly constructed from sophisticated workflows of complex components it shows how combinatorial auctions can be used to effectively deliver packages of resources to support those workflows.,stephen olariu,Not available,2017.0,10.1007/s10586-016-0700-8,Cluster Computing,C.2017,False,,Springer,Not available,An approach for scaling cloud resource management,26d6cc0a6db2fff7c39ce141439c51cc,http://dx.doi.org/10.1007/s10586-016-0700-8 1672,Auction is often applied in cognitive radio networks due to its efficiency and fairness properties. An important issue in designing an auction mechanism is how to utilize the limited spectrum resource in an efficient manner. In order to achieve this goal we propose a predictive double spectrum auction model in this paper. Our auction model first obtains the bidding range from statistical analysis and then separates the interval into independent states and employees a Markovian prediction based algorithm to generate guidelines for the bidding range of primary and secondary users respectively. Comparing with existing approaches our proposed auction model is more efficient in spectrum utilization and satisfies the economic properties. Extensive simulation results show that our work achieves an utilization ratio up to 91 %.,zhe liu,Not available,2017.0,10.1007/s11276-015-1152-4,Wireless Networks,Zhe2017,False,,Springer,Not available,On spectrum allocation in cognitive radio networks: a double auction-based methodology,fdfed789d07c6d1ffb34cb16890ae5ab,http://dx.doi.org/10.1007/s11276-015-1152-4 1673,Auction is often applied in cognitive radio networks due to its efficiency and fairness properties. An important issue in designing an auction mechanism is how to utilize the limited spectrum resource in an efficient manner. In order to achieve this goal we propose a predictive double spectrum auction model in this paper. Our auction model first obtains the bidding range from statistical analysis and then separates the interval into independent states and employees a Markovian prediction based algorithm to generate guidelines for the bidding range of primary and secondary users respectively. Comparing with existing approaches our proposed auction model is more efficient in spectrum utilization and satisfies the economic properties. Extensive simulation results show that our work achieves an utilization ratio up to 91 %.,changle li,Not available,2017.0,10.1007/s11276-015-1152-4,Wireless Networks,Zhe2017,False,,Springer,Not available,On spectrum allocation in cognitive radio networks: a double auction-based methodology,fdfed789d07c6d1ffb34cb16890ae5ab,http://dx.doi.org/10.1007/s11276-015-1152-4 1674,Online entertainment shopping has emerged as an innovative business model integrating features of electronic commerce auctions games and lotteries. Prior literature has rarely provided an understanding of the effects of electronic market factors on players’ bidding performance in entertainment shopping. We attempt to fill this research gap by analyzing how players’ bidding patterns and characteristics can affect bidding performance. An empirical study with 5650 players’ participation data collected from a leading entertainment shopping website is conducted. Results confirm that players’ bidding performance including profit earning and monetary loss bidding is strongly associated with bidding patterns and characteristics. Based on empirical findings players loyal to the website contribute more profit to the website. The website should pay more attention to loyal players and strategically limit players that are good at bidding in order to avoid losing and winning polarizations. Furthermore players with different product preferences have different weights for profit and entertainment and player preferences can be transformed into monetary value for the website.,jin li,Not available,2017.0,10.1007/s12525-016-0235-0,Electronic Markets,Jin2017,False,,Springer,Not available,Profit earning and monetary loss bidding in online entertainment shopping: the impacts of bidding patterns and characteristics,abd907a769cd2c91f7e26ee6a0a388f7,http://dx.doi.org/10.1007/s12525-016-0235-0 1675,Online entertainment shopping has emerged as an innovative business model integrating features of electronic commerce auctions games and lotteries. Prior literature has rarely provided an understanding of the effects of electronic market factors on players’ bidding performance in entertainment shopping. We attempt to fill this research gap by analyzing how players’ bidding patterns and characteristics can affect bidding performance. An empirical study with 5650 players’ participation data collected from a leading entertainment shopping website is conducted. Results confirm that players’ bidding performance including profit earning and monetary loss bidding is strongly associated with bidding patterns and characteristics. Based on empirical findings players loyal to the website contribute more profit to the website. The website should pay more attention to loyal players and strategically limit players that are good at bidding in order to avoid losing and winning polarizations. Furthermore players with different product preferences have different weights for profit and entertainment and player preferences can be transformed into monetary value for the website.,kwok tso,Not available,2017.0,10.1007/s12525-016-0235-0,Electronic Markets,Jin2017,False,,Springer,Not available,Profit earning and monetary loss bidding in online entertainment shopping: the impacts of bidding patterns and characteristics,abd907a769cd2c91f7e26ee6a0a388f7,http://dx.doi.org/10.1007/s12525-016-0235-0 1676,Online entertainment shopping has emerged as an innovative business model integrating features of electronic commerce auctions games and lotteries. Prior literature has rarely provided an understanding of the effects of electronic market factors on players’ bidding performance in entertainment shopping. We attempt to fill this research gap by analyzing how players’ bidding patterns and characteristics can affect bidding performance. An empirical study with 5650 players’ participation data collected from a leading entertainment shopping website is conducted. Results confirm that players’ bidding performance including profit earning and monetary loss bidding is strongly associated with bidding patterns and characteristics. Based on empirical findings players loyal to the website contribute more profit to the website. The website should pay more attention to loyal players and strategically limit players that are good at bidding in order to avoid losing and winning polarizations. Furthermore players with different product preferences have different weights for profit and entertainment and player preferences can be transformed into monetary value for the website.,fangtao liu,Not available,2017.0,10.1007/s12525-016-0235-0,Electronic Markets,Jin2017,False,,Springer,Not available,Profit earning and monetary loss bidding in online entertainment shopping: the impacts of bidding patterns and characteristics,abd907a769cd2c91f7e26ee6a0a388f7,http://dx.doi.org/10.1007/s12525-016-0235-0 1677," The performance gain of cooperative communications heavily depends on the selection of relay. Most of the existing relay selection methods for cooperative communications aim at maximizing cooperative gain by selecting appropriate relay without taking into account the adverse effect brought by cooperative communications: extra interference introduced by relay transmission (called ",bin cao,Not available,2017.0,10.1007/s11276-015-1177-8,Wireless Networks,Bin2017,False,,Springer,Not available,Revisiting relay assignment in cooperative communications,b0b2e4bd6387d32070f158d402524fb7,http://dx.doi.org/10.1007/s11276-015-1177-8 1678," The performance gain of cooperative communications heavily depends on the selection of relay. Most of the existing relay selection methods for cooperative communications aim at maximizing cooperative gain by selecting appropriate relay without taking into account the adverse effect brought by cooperative communications: extra interference introduced by relay transmission (called ",quan chen,Not available,2017.0,10.1007/s11276-015-1177-8,Wireless Networks,Bin2017,False,,Springer,Not available,Revisiting relay assignment in cooperative communications,b0b2e4bd6387d32070f158d402524fb7,http://dx.doi.org/10.1007/s11276-015-1177-8 1679," The performance gain of cooperative communications heavily depends on the selection of relay. Most of the existing relay selection methods for cooperative communications aim at maximizing cooperative gain by selecting appropriate relay without taking into account the adverse effect brought by cooperative communications: extra interference introduced by relay transmission (called ",gang feng,Not available,2017.0,10.1007/s11276-015-1177-8,Wireless Networks,Bin2017,False,,Springer,Not available,Revisiting relay assignment in cooperative communications,b0b2e4bd6387d32070f158d402524fb7,http://dx.doi.org/10.1007/s11276-015-1177-8 1680,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,josep diaz,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 1681," The performance gain of cooperative communications heavily depends on the selection of relay. Most of the existing relay selection methods for cooperative communications aim at maximizing cooperative gain by selecting appropriate relay without taking into account the adverse effect brought by cooperative communications: extra interference introduced by relay transmission (called ",yun li,Not available,2017.0,10.1007/s11276-015-1177-8,Wireless Networks,Bin2017,False,,Springer,Not available,Revisiting relay assignment in cooperative communications,b0b2e4bd6387d32070f158d402524fb7,http://dx.doi.org/10.1007/s11276-015-1177-8 1682," The performance gain of cooperative communications heavily depends on the selection of relay. Most of the existing relay selection methods for cooperative communications aim at maximizing cooperative gain by selecting appropriate relay without taking into account the adverse effect brought by cooperative communications: extra interference introduced by relay transmission (called ",chonggang wang,Not available,2017.0,10.1007/s11276-015-1177-8,Wireless Networks,Bin2017,False,,Springer,Not available,Revisiting relay assignment in cooperative communications,b0b2e4bd6387d32070f158d402524fb7,http://dx.doi.org/10.1007/s11276-015-1177-8 1683,There are many experiment results that seem to indicate the necessity of considering ,masao ogaki,Not available,2017.0,10.1007/978-981-10-6439-5_8,Behavioral Economics,Masao2017,False,,Springer,Not available,Social Preferences,8950c1131dadece5b03014b1fc5f6938,http://dx.doi.org/10.1007/978-981-10-6439-5_8 1684,There are many experiment results that seem to indicate the necessity of considering ,saori tanaka,Not available,2017.0,10.1007/978-981-10-6439-5_8,Behavioral Economics,Masao2017,False,,Springer,Not available,Social Preferences,8950c1131dadece5b03014b1fc5f6938,http://dx.doi.org/10.1007/978-981-10-6439-5_8 1685,Economic studies of exchange examine processes in which agents obtain gains from trade e.g. bilateral bargaining and contracting auctions and multilateral markets. Prominent descriptive theories include idealized versions that assume agents simply respond to prices that clear markets. Realistic versions recognize effects of procedural rules and strategic behavior and various impediments such as incomplete or unenforceable contracts insufficient markets imperfect information and incomplete observability. Normative versions design market procedures contract forms and settlement rules that strengthen incentives and promote efficient outcomes.,robert wilson,Not available,2017.0,10.1057/978-1-349-95121-5_136-2,The New Palgrave Dictionary of Economics,B.2017,False,,Springer,Not available,Exchange,e317a36160de5e177b762229c07619ff,http://dx.doi.org/10.1057/978-1-349-95121-5_136-2 1686,In this paper we present a genetic algorithmic approach to automated auction mechanism design in the context of ,jinzhong niu,Not available,2017.0,10.1007/978-3-319-54229-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2017,False,,Springer,Not available,A Genetic Algorithmic Approach to Automated Auction Mechanism Design,1f442c5d331b3692e45131672221692d,http://dx.doi.org/10.1007/978-3-319-54229-4_9 1687,In this paper we present a genetic algorithmic approach to automated auction mechanism design in the context of ,simon parsons,Not available,2017.0,10.1007/978-3-319-54229-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2017,False,,Springer,Not available,A Genetic Algorithmic Approach to Automated Auction Mechanism Design,1f442c5d331b3692e45131672221692d,http://dx.doi.org/10.1007/978-3-319-54229-4_9 1688,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,xuanheng li,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1689,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,haichuan ding,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1690,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,yuguang fang,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1691,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,ioannis giotis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 1692,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,miao pan,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1693,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,pan li,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1694,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,xiaoxia huang,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1695,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,savo glisic,Not available,2017.0,10.1007/978-981-10-1389-8_27-1,Handbook of Cognitive Radio,Xuanheng2017,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,b9e8eaecf6b4f569870f61f2cf93f386,http://dx.doi.org/10.1007/978-981-10-1389-8_27-1 1696,This chapter describes a number of agent-based market models. They can be seen as belonging to different trends in that different types of markets are presented (goods markets with or without stocks or financial markets with diverse price mechanisms or even markets with or without money) but they also represent different aims that can be achieved with the simulation tool. For example it is possible to develop precise interaction processes to include loyalty among actors; try to mimic as well as possible the behaviour of real humans which have been recorded in experiments; or try to integrate psychological data to show a diffusion process. All these market models share a deep interest in what is fundamental in agent-based simulation such as the role of interaction interindividual influence and learning which induces a change in the representation that agents have of their environment.,juliette rouchier,Not available,2017.0,10.1007/978-3-319-66948-9_25,Simulating Social Complexity,Juliette2017,False,,Springer,Not available,Agent-Based Simulation as a Useful Tool for the Study of Markets,406b55f090449e52a42f75dcf1589781,http://dx.doi.org/10.1007/978-3-319-66948-9_25 1697,In the mid-20th century economists became involved in the design and conduct of laboratory experiments to examine propositions implied by economic theory. This development brought new standards of rigour to the data gathering process. This article gives an account of the author’s experiment in 1956 to test the hypothesis that the competitive market process yields welfare improving (and under certain limiting ideal conditions welfare maximizing) outcomes provides an interpretive history of the development of experimental economics discusses the functions of market experiments in microeconomic analysis and classifies the application of experimental methods.,c.f. bastable,Not available,2017.0,10.1057/978-1-349-95121-5_228-2,The New Palgrave Dictionary of Economics,C.F.2017,False,,Springer,Not available,Experimental Methods in Economics,ea4ff04061f08bb1937a4cdabed58bb7,http://dx.doi.org/10.1057/978-1-349-95121-5_228-2 1698,This paper investigates algorithmic properties and overall performance of the exact auction algorithm in Demange Gale and Sotomayor (J. Polit. Economy 94: 863–872 1986) or DGS for short. This task is achieved by interpreting DGS as a graph and by conducting a large number of computer simulations. The crucial step in DGS is when the auctioneer selects a so-called minimal overdemanded set of items because the specific selection may affect a number of performance measures such as the number of iterations and the ratio of elicited preferences. The computational results show that (i) DGS graphs are typically large even for relatively small numbers of bidders and items (ii) DGS converges slowly and (iii) DGS performs well in terms of preference elicitation. The paper also demonstrates that the modification to DGS based on the Ford–Fulkerson algorithm outperforms all investigated rules for selecting a minimal overdemanded set of items in DGS both in terms of termination speed and preference elicitation.,tommy andersson,Not available,2012.0,10.1007/s10614-010-9237-8,Computational Economics,Tommy2012,False,,Springer,Not available,Properties of the DGS-Auction Algorithm,4aef4cb18c0c5490fb0df6296a8ae7b3,http://dx.doi.org/10.1007/s10614-010-9237-8 1699,This paper investigates algorithmic properties and overall performance of the exact auction algorithm in Demange Gale and Sotomayor (J. Polit. Economy 94: 863–872 1986) or DGS for short. This task is achieved by interpreting DGS as a graph and by conducting a large number of computer simulations. The crucial step in DGS is when the auctioneer selects a so-called minimal overdemanded set of items because the specific selection may affect a number of performance measures such as the number of iterations and the ratio of elicited preferences. The computational results show that (i) DGS graphs are typically large even for relatively small numbers of bidders and items (ii) DGS converges slowly and (iii) DGS performs well in terms of preference elicitation. The paper also demonstrates that the modification to DGS based on the Ford–Fulkerson algorithm outperforms all investigated rules for selecting a minimal overdemanded set of items in DGS both in terms of termination speed and preference elicitation.,christer andersson,Not available,2012.0,10.1007/s10614-010-9237-8,Computational Economics,Tommy2012,False,,Springer,Not available,Properties of the DGS-Auction Algorithm,4aef4cb18c0c5490fb0df6296a8ae7b3,http://dx.doi.org/10.1007/s10614-010-9237-8 1700,This paper studies sequential second price auctions with imperfect quantity commitment in environments involving single-unit demands independent private values and non-decreasing marginal costs. The paper characterizes the symmetric equilibrium strategy and demonstrates that the equilibrium price sequence is conditionally non-increasing showing a downwards drift in cases in which the marginal cost exceeds the reserve price with positive probability. The paper also argues that unlike a ,gustavo rodriguez,Not available,2012.0,10.1007/s00199-010-0545-y,Economic Theory,E.2012,False,,Springer,Not available,Sequential auctions with imperfect quantity commitment,ba5fa72bca65be7abada62c4ce38e451,http://dx.doi.org/10.1007/s00199-010-0545-y 1701,Motivated by allocation of cloud computing services bandwidth and wireless spectrum in secondary network markets we introduce a hierarchical auction model for network resource allocation. The Tier 1 provider owns all of the resource who holds an auction in which the Tier 2 providers participate. Each of the Tier 2 providers then holds an auction to allocate the acquired resource among the Tier 3 users. The Tier 2 providers play the role of middlemen since their utility for the resource depends entirely on the payment that they receive by selling it. We first consider the case of indivisible resource. We study a class of mechanisms where each sub-mechanism is either a first-price or a second-price auction and show that incentive compatibility and efficiency cannot be simultaneously achieved. We then consider the resource to be divisible and propose the hierarchical network second-price mechanism in which there exists an efficient Nash equilibrium with endogenous strong budget balance.,wenyuan tang,Not available,2012.0,10.1007/978-3-642-30373-9_2,Game Theory for Networks,Wenyuan2012,False,,Springer,Not available,Hierarchical Auctions for Network Resource Allocation,573997912f2496efcf00916727909b36,http://dx.doi.org/10.1007/978-3-642-30373-9_2 1702,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,lefteris kirousis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 1703,Motivated by allocation of cloud computing services bandwidth and wireless spectrum in secondary network markets we introduce a hierarchical auction model for network resource allocation. The Tier 1 provider owns all of the resource who holds an auction in which the Tier 2 providers participate. Each of the Tier 2 providers then holds an auction to allocate the acquired resource among the Tier 3 users. The Tier 2 providers play the role of middlemen since their utility for the resource depends entirely on the payment that they receive by selling it. We first consider the case of indivisible resource. We study a class of mechanisms where each sub-mechanism is either a first-price or a second-price auction and show that incentive compatibility and efficiency cannot be simultaneously achieved. We then consider the resource to be divisible and propose the hierarchical network second-price mechanism in which there exists an efficient Nash equilibrium with endogenous strong budget balance.,rahul jain,Not available,2012.0,10.1007/978-3-642-30373-9_2,Game Theory for Networks,Wenyuan2012,False,,Springer,Not available,Hierarchical Auctions for Network Resource Allocation,573997912f2496efcf00916727909b36,http://dx.doi.org/10.1007/978-3-642-30373-9_2 1704,With more and more people using the internet for a wide range of purposes internet use has become an absolute necessity for businesses to survive and grow. Online auction have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. The online auction is an important e-commerce application which enables the buying and selling of goods through a dynamic pricing strategy. Users can access the auction system through the Web WAP-enabled devices and agents. The paper assumes that the auction system supports only English auction. Predicting bidding strategy is not easy since it is dependent on many factors such as the behavior of each bidder the number of bidders participating in that auction as well as each bidder’s reservation price. Here simultaneous English auctions for the same item are considered. This paper uses the concept of Game Theory to predict the bidding strategy in an auction and helps the user to decide whether to proceed with the auction or to back off from the auction so as to maximize the bidder’s profit. This paper considers the user bidding for an item simultaneously in more than one auction site.,nirupama pavanje,Not available,2012.0,10.1007/978-81-322-0740-5_91,Proceedings of International Conference on Advances in Computing,Nirupama2012,False,,Springer,Not available,Bidding Strategy in Simultaneous English Auctions Using Game Theory,ceb0c195102149f56015aae7ab7ee4f7,http://dx.doi.org/10.1007/978-81-322-0740-5_91 1705,This paper introduces ,christopher leberknight,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 1706,This paper introduces ,ranjan pal,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 1707,This paper introduces ,mung chiang,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 1708,This paper introduces ,harold poor,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 1709,Many electronic markets are linked together into larger “network markets” where the links reflect constraints on traders. These constraints mean that a choice to trade in one market limits the trader’s choice of other markets to use. This kind of network market is important because so many basic products including gas water and electricity are traded in such markets and yet it has been little studied until now. This paper studies networks of double auction markets populated with automated traders concentrating on the effects of different network topologies. We find that the topology has a significant effect on the equilibrium behavior of the set of markets.,kai cai,Not available,2012.0,10.1007/978-3-642-34200-4_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Kai2012,False,,Springer,Not available,Network Effects in Double Auction Markets with Automated Traders,2179b99e91078f0b71b4d076d282d817,http://dx.doi.org/10.1007/978-3-642-34200-4_2 1710,Many electronic markets are linked together into larger “network markets” where the links reflect constraints on traders. These constraints mean that a choice to trade in one market limits the trader’s choice of other markets to use. This kind of network market is important because so many basic products including gas water and electricity are traded in such markets and yet it has been little studied until now. This paper studies networks of double auction markets populated with automated traders concentrating on the effects of different network topologies. We find that the topology has a significant effect on the equilibrium behavior of the set of markets.,jinzhong niu,Not available,2012.0,10.1007/978-3-642-34200-4_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Kai2012,False,,Springer,Not available,Network Effects in Double Auction Markets with Automated Traders,2179b99e91078f0b71b4d076d282d817,http://dx.doi.org/10.1007/978-3-642-34200-4_2 1711,Many electronic markets are linked together into larger “network markets” where the links reflect constraints on traders. These constraints mean that a choice to trade in one market limits the trader’s choice of other markets to use. This kind of network market is important because so many basic products including gas water and electricity are traded in such markets and yet it has been little studied until now. This paper studies networks of double auction markets populated with automated traders concentrating on the effects of different network topologies. We find that the topology has a significant effect on the equilibrium behavior of the set of markets.,simon parsons,Not available,2012.0,10.1007/978-3-642-34200-4_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Kai2012,False,,Springer,Not available,Network Effects in Double Auction Markets with Automated Traders,2179b99e91078f0b71b4d076d282d817,http://dx.doi.org/10.1007/978-3-642-34200-4_2 1712,We study set-system auctions whereby a single buyer wants to purchase ,paul goldberg,Not available,2012.0,10.1007/978-3-642-33996-7_16,Algorithmic Game Theory,W.2012,False,,Springer,Not available,Commodity Auctions and Frugality Ratios,7f1c3540cccb1dd86282f237dda40f0c,http://dx.doi.org/10.1007/978-3-642-33996-7_16 1713,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,evangelos markakis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 1714,We study set-system auctions whereby a single buyer wants to purchase ,antony mccabe,Not available,2012.0,10.1007/978-3-642-33996-7_16,Algorithmic Game Theory,W.2012,False,,Springer,Not available,Commodity Auctions and Frugality Ratios,7f1c3540cccb1dd86282f237dda40f0c,http://dx.doi.org/10.1007/978-3-642-33996-7_16 1715,We present our results on Uniform Price Auctions one of the standard sealed-bid multi-unit auction formats for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is socially inefficient in general partly due to a ”Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. Despite its inefficiency the uniform pricing rule is widely popular by its appeal to the natural anticipation that identical items should be identically priced. Application domains of its variants include sales of U.S. Treasury bonds to investors trade exchanges over the internet facilitated by popular online brokers allocation of radio spectrum licenses etc. In this work we study equilibria of the Uniform Price Auction in undominated strategies. We characterize a class of undominated pure Nash equilibria and quantify the social inefficiency of pure and (mixed) Bayes-Nash equilibria by means of bounds on the Price of Anarchy.,evangelos markakis,Not available,2012.0,10.1007/978-3-642-33996-7_20,Algorithmic Game Theory,Evangelos2012,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,b11d0a076e78797908baa3e9cbe37e67,http://dx.doi.org/10.1007/978-3-642-33996-7_20 1716,We present our results on Uniform Price Auctions one of the standard sealed-bid multi-unit auction formats for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is socially inefficient in general partly due to a ”Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. Despite its inefficiency the uniform pricing rule is widely popular by its appeal to the natural anticipation that identical items should be identically priced. Application domains of its variants include sales of U.S. Treasury bonds to investors trade exchanges over the internet facilitated by popular online brokers allocation of radio spectrum licenses etc. In this work we study equilibria of the Uniform Price Auction in undominated strategies. We characterize a class of undominated pure Nash equilibria and quantify the social inefficiency of pure and (mixed) Bayes-Nash equilibria by means of bounds on the Price of Anarchy.,orestis telelis,Not available,2012.0,10.1007/978-3-642-33996-7_20,Algorithmic Game Theory,Evangelos2012,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,b11d0a076e78797908baa3e9cbe37e67,http://dx.doi.org/10.1007/978-3-642-33996-7_20 1717,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,bing shi,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1718,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,enrico gerding,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1719,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,perukrishnen vytelingum,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1720,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,nicholas jennings,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1721,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,hu fu,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1722,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,patrick jordan,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1723,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,mohammad mahdian,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1724,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,maria serna,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 1725,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,uri nadav,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1726,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,inbal talgam-cohen,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1727,The holy grail of online advertising is to target users with ads matched to their needs with such precision that the users respond to the ads thereby increasing both advertisers’ and users’ value. The current approach to this challenge utilizes information about the users: their gender their location the websites they have visited before and so on. Incorporating this data in ad auctions poses an economic challenge: can this be done in a way that the auctioneer’s revenue does not decrease (at least on average)? This is the problem we study in this paper. Our main result is that in Myerson’s optimal mechanism for a general model of data in auctions additional data leads to additional expected revenue. In the context of ad auctions we show that for the simple and common mechanisms namely second price auction with reserve prices there are instances in which additional data decreases the expected revenue but this decrease is by at most a small constant factor under a standard regularity assumption.,sergei vassilvitskii,Not available,2012.0,10.1007/978-3-642-33996-7_15,Algorithmic Game Theory,Hu2012,False,,Springer,Not available,Ad Auctions with Data,abf98a3138189612a7ad991af54fce8c,http://dx.doi.org/10.1007/978-3-642-33996-7_15 1728,Economists are interested in eliciting values at the level of the individual because market values do not provide the information needed to measure consumer surplus value new products or value goods that have no market. Direct and indirect procedures have been developed to elicit values and each has some strengths and weaknesses. The evidence points to several recommendations for best practice in the reliable elicitation of values trading off transparency and rigour.,glenn harrison,Not available,2016.0,10.1057/978-1-349-95121-5_2635-1,The New Palgrave Dictionary of Economics,W.2016,False,,Springer,Not available,Value Elicitation,4be67eb3afe03168006bdd288881a006,http://dx.doi.org/10.1057/978-1-349-95121-5_2635-1 1729,This article reviews the recent development of search theory. We begin with a standard model of undirected (or random) search and illustrate that the equilibrium is generically inefficient. Then we show that the market can restore efficiency by allowing individuals on one side of the market to use prices to direct other individuals’ searches. Two mechanisms of directed search – price posting and auction – are analysed and a number of applications of the framework are discussed. In addition we briefly describe search theory as a microfoundation for monetary economics. Finally we conclude by speculating a few directions of future research.,shouyong shi,Not available,2016.0,10.1057/978-1-349-95121-5_2767-1,The New Palgrave Dictionary of Economics,Shouyong2016,False,,Springer,Not available,Search Theory (New Perspectives),f7706e89be71bb7283da6df76238f6b7,http://dx.doi.org/10.1057/978-1-349-95121-5_2767-1 1730,Experimental labour economics uses experimental techniques to improve our understanding of labour economics issues. We start by putting experimental data into perspective with the data-sets typically used by empirical labour economists. We then discuss several examples of how experiments can inform labour economics.,armin falk,Not available,2016.0,10.1057/978-1-349-95121-5_2005-1,The New Palgrave Dictionary of Economics,Armin2016,False,,Springer,Not available,Experimental Labour Economics,7daaab5cd3c3145b7f81cbd5e6ef20ac,http://dx.doi.org/10.1057/978-1-349-95121-5_2005-1 1731,Experimental labour economics uses experimental techniques to improve our understanding of labour economics issues. We start by putting experimental data into perspective with the data-sets typically used by empirical labour economists. We then discuss several examples of how experiments can inform labour economics.,simon gachter,Not available,2016.0,10.1057/978-1-349-95121-5_2005-1,The New Palgrave Dictionary of Economics,Armin2016,False,,Springer,Not available,Experimental Labour Economics,7daaab5cd3c3145b7f81cbd5e6ef20ac,http://dx.doi.org/10.1057/978-1-349-95121-5_2005-1 1732,Cournot’s 1838 model of strategic interaction between competing firms has become the primary workhorse for the analysis of imperfect competition and shows up in a variety of fields notably industrial organization and international trade. This article begins with a tour of the basic Cournot model and its properties touching on existence uniqueness stability and efficiency; this discussion especially emphasizes considerations involved in using the Cournot model in multi-stage applications. A discussion of recent applications is provided as well as a reference to an extended bibliography of approximately 125 selected publications from 2001 through 2005.,andrew daughety,Not available,2016.0,10.1057/978-1-349-95121-5_2345-1,The New Palgrave Dictionary of Economics,F.2016,False,,Springer,Not available,Cournot Competition,add1e69ea2afc69e2b6e8d8062bbc80e,http://dx.doi.org/10.1057/978-1-349-95121-5_2345-1 1733,,wei sun,Not available,2016.0,10.1007/978-1-4939-2864-4_297,Encyclopedia of Algorithms,Wei2016,False,,Springer,Not available,Position Auction,31cf6d05ce0faaedb1bd849c42d39a60,http://dx.doi.org/10.1007/978-1-4939-2864-4_297 1734,Vernon Lomax Smith shared the 2002 Nobel Prize in Economics for his contributions to the development of experimental economics. Among his insights is the idea that ‘institutions matter’: trading institutions affect the efficiency of a market and the optimal institution depends on the market context. He has made important contributions to market and institutional design public goods bargaining experimental methodology and the philosophy of science.,catherine eckel,Not available,2016.0,10.1057/978-1-349-95121-5_2358-1,The New Palgrave Dictionary of Economics,C.2016,False,,Springer,Not available,Smith Vernon (Born 1927),6be4a834fb54acfde2bd36537e74ff03,http://dx.doi.org/10.1057/978-1-349-95121-5_2358-1 1735,Auctions have become popular as means of allocating emissions permits in the emissions trading schemes developed around the world. Mostly only a subset of the regulated polluters participate in these auctions along with speculators creating a market with relatively few participants and thus incentive for strategic bidding. I characterize the bidding behavior of the polluters and the speculators examining the effect of the latter on the profits of the former and on the auction outcome. It turns out that in addition to bidding for compliance polluters also bid for speculation in the aftermarket. While the presence of the speculators forces the polluters to bid closer to their true valuations it also creates a trade-off between increasing the revenue accrued to the regulator and reducing the profits of the auction-participating polluters. Nevertheless the profits of the latter increase in the speculators’ risk aversion.,corina haita-falah,Not available,2016.0,10.1007/s11149-016-9299-1,Journal of Regulatory Economics,Corina2016,False,,Springer,Not available,Uncertainty and speculators in an auction for emissions permits,2726a8e56abcb4e7a24612c74133b4b1,http://dx.doi.org/10.1007/s11149-016-9299-1 1736,We survey some recent empirical work concerning the analysis of auctions. We begin by describing a two-step nonparametric approach for estimating bidding models that is commonly used in the applied literature. Two applications of this approach are considered: empirical work on bidding in Treasury markets and empirical tests for collusion in auctions.,patrick bajari,Not available,2016.0,10.1057/978-1-349-95121-5_2166-1,The New Palgrave Dictionary of Economics,Patrick2016,False,,Springer,Not available,Auctions (Applications),46785ac91e63d3d08badbb3101c9075e,http://dx.doi.org/10.1057/978-1-349-95121-5_2166-1 1737,Under second-price sealed bid auctions when bidders have independent private valuations of a risky object submitting one’s valuation is no longer dominant for non-expected utility bidders. This yields a breakdown in revenue equivalence between English auctions and second-price auctions for non-expected utility bidders. In an experimental auction market selling a single risky object we find that an English auction yields higher seller revenue than the corresponding second-price auction. Further the direction of revenue difference is supported by Nash equilibrium bidding behavior of betweenness-conforming non-expected utility bidders under the additional hypothesis of bidders displaying a weak form of Allais type behavior.,chew hong,Not available,2016.0,10.1007/978-4-431-55501-8_14,Behavioral Interactions Markets and Economic Dynamics,Soo2016,False,,Springer,Not available,Revenue Non-equivalence Between the English and the Second-Price Auctions: Experimental Evidence,0382738134d3bccc98693902ff30b21c,http://dx.doi.org/10.1007/978-4-431-55501-8_14 1738,Under second-price sealed bid auctions when bidders have independent private valuations of a risky object submitting one’s valuation is no longer dominant for non-expected utility bidders. This yields a breakdown in revenue equivalence between English auctions and second-price auctions for non-expected utility bidders. In an experimental auction market selling a single risky object we find that an English auction yields higher seller revenue than the corresponding second-price auction. Further the direction of revenue difference is supported by Nash equilibrium bidding behavior of betweenness-conforming non-expected utility bidders under the additional hypothesis of bidders displaying a weak form of Allais type behavior.,naoko nishimura,Not available,2016.0,10.1007/978-4-431-55501-8_14,Behavioral Interactions Markets and Economic Dynamics,Soo2016,False,,Springer,Not available,Revenue Non-equivalence Between the English and the Second-Price Auctions: Experimental Evidence,0382738134d3bccc98693902ff30b21c,http://dx.doi.org/10.1007/978-4-431-55501-8_14 1739,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,erel segal-halevi,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1740,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,avinatan hassidim,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1741,In a seminal paper McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However his mechanism may leave money on the table since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee’s mechanism which is strongly budget-balanced. There is a single price all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.,yonatan aumann,Not available,2016.0,10.1007/978-3-662-53354-3_21,Algorithmic Game Theory,Erel2016,False,,Springer,Not available,SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism,9cb1059ae8f31d9acc28f31773f2a61b,http://dx.doi.org/10.1007/978-3-662-53354-3_21 1742,Until recently and despite strong interest in market outcomes economists have paid relatively little attention to the institutional structure of markets. This article considers the historical evolution of markets and poses some dilemmas concerning their definition. Several alternative definitions are considered involving different degrees of historical specificity. It is argued that developments in economics and elsewhere since the 1980s point to a more nuanced view of markets involving a recognition of different types of market mechanisms and institutions. These developments include work in experimental economics and auction theory. A definition of markets is offered that is consistent with these developments.,geoffrey hodgson,Not available,2016.0,10.1057/978-1-349-95121-5_2113-1,The New Palgrave Dictionary of Economics,M.2016,False,,Springer,Not available,Markets,e8004886ea14a99adfa4d59feae75821,http://dx.doi.org/10.1057/978-1-349-95121-5_2113-1 1743,Zhan and Friedman (2007) study double auctions where buyers and sellers are constrained to using simple markdown and markup rules. In spite of the alleged symmetry in roles and assumptions buyers are shown to have the upper hand both in the call market and in the continuous double auction. We replicate the study and show that their formulation of the sellers’ markup strategies while seemingly natural exhibits a hidden asymmetry. We introduce a symmetric set of markup strategies for the sellers and show how it explains away the paradox of buyers’ advantage in three different double-sided market protocols.,roberto cervone,Not available,2009.0,10.1007/978-3-642-02956-1_7,Artificial Economics,Roberto2009,False,,Springer,Not available,Symmetric Equilibria in Double Auctions with Markdown Buyers and Markup Sellers,4e117b3e588be25e0311b9b9827d6a74,http://dx.doi.org/10.1007/978-3-642-02956-1_7 1744,Zhan and Friedman (2007) study double auctions where buyers and sellers are constrained to using simple markdown and markup rules. In spite of the alleged symmetry in roles and assumptions buyers are shown to have the upper hand both in the call market and in the continuous double auction. We replicate the study and show that their formulation of the sellers’ markup strategies while seemingly natural exhibits a hidden asymmetry. We introduce a symmetric set of markup strategies for the sellers and show how it explains away the paradox of buyers’ advantage in three different double-sided market protocols.,stefano galavotti,Not available,2009.0,10.1007/978-3-642-02956-1_7,Artificial Economics,Roberto2009,False,,Springer,Not available,Symmetric Equilibria in Double Auctions with Markdown Buyers and Markup Sellers,4e117b3e588be25e0311b9b9827d6a74,http://dx.doi.org/10.1007/978-3-642-02956-1_7 1745,Zhan and Friedman (2007) study double auctions where buyers and sellers are constrained to using simple markdown and markup rules. In spite of the alleged symmetry in roles and assumptions buyers are shown to have the upper hand both in the call market and in the continuous double auction. We replicate the study and show that their formulation of the sellers’ markup strategies while seemingly natural exhibits a hidden asymmetry. We introduce a symmetric set of markup strategies for the sellers and show how it explains away the paradox of buyers’ advantage in three different double-sided market protocols.,marco licalzi,Not available,2009.0,10.1007/978-3-642-02956-1_7,Artificial Economics,Roberto2009,False,,Springer,Not available,Symmetric Equilibria in Double Auctions with Markdown Buyers and Markup Sellers,4e117b3e588be25e0311b9b9827d6a74,http://dx.doi.org/10.1007/978-3-642-02956-1_7 1746,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,kemal guler,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 1747,We present a cryptographic protocol for conducting efficient provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids and prove for themselves that they meet activity rules and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase” all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids in the usual case the exponential complexity of previous cryptographically-secure combinatorial auctions.,david parkes,Not available,2009.0,10.1007/978-3-642-03549-4_19,Financial Cryptography and Data Security,C.2009,False,,Springer,Not available,Cryptographic Combinatorial Clock-Proxy Auctions,a277b74b4cc531f03b2adbb96a15cfd3,http://dx.doi.org/10.1007/978-3-642-03549-4_19 1748,We present a cryptographic protocol for conducting efficient provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids and prove for themselves that they meet activity rules and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase” all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids in the usual case the exponential complexity of previous cryptographically-secure combinatorial auctions.,michael rabin,Not available,2009.0,10.1007/978-3-642-03549-4_19,Financial Cryptography and Data Security,C.2009,False,,Springer,Not available,Cryptographic Combinatorial Clock-Proxy Auctions,a277b74b4cc531f03b2adbb96a15cfd3,http://dx.doi.org/10.1007/978-3-642-03549-4_19 1749,We present a cryptographic protocol for conducting efficient provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids and prove for themselves that they meet activity rules and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase” all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids in the usual case the exponential complexity of previous cryptographically-secure combinatorial auctions.,christopher thorpe,Not available,2009.0,10.1007/978-3-642-03549-4_19,Financial Cryptography and Data Security,C.2009,False,,Springer,Not available,Cryptographic Combinatorial Clock-Proxy Auctions,a277b74b4cc531f03b2adbb96a15cfd3,http://dx.doi.org/10.1007/978-3-642-03549-4_19 1750,Software agents can act flexibly in a variety of electronic marketplaces. Continuous Double Auction (CDA) is an efficient and common form of these marketplaces. There are several bidding strategies proposed in the literature for agents to adopt to compute their asks or bids in CDAs. For all of these bidding strategies starting price has not been taken into account. However in online auction marketplaces the starting price is an important parameter for sellers to set and has been discussed many a time in the literature. Given the importance of starting price the main objective of our work is to explore the effect of starting price on agents using various bidding strategies and how to adjust it adaptively within a dynamic CDA market. Experimental results confirm that when agents set their starting prices at varying values in different market situations their profit changes significantly no matter which strategy they adopt. In order to guide agents to adjust their starting prices in dynamic and unknown markets an adaptive mechanism is proposed. Experimental results show that agents adopting the adaptive mechanism generally outperform the corresponding agents without. Furthermore another set of experiments are carried out to let all the agents use the adaptive mechanism and compete together in one market. Not surprisingly the profit of agents is observed to drop down a lot in this situation.,huiye ma,Not available,2009.0,10.1007/978-3-642-11161-7_12,Principles of Practice in Multi-Agent Systems,Huiye2009,False,,Springer,Not available,Adaptive Adjustment of Starting Price for Agents in Continuous Double Auctions,74911c8efdbd6c27434ac41f0e18edaf,http://dx.doi.org/10.1007/978-3-642-11161-7_12 1751,Software agents can act flexibly in a variety of electronic marketplaces. Continuous Double Auction (CDA) is an efficient and common form of these marketplaces. There are several bidding strategies proposed in the literature for agents to adopt to compute their asks or bids in CDAs. For all of these bidding strategies starting price has not been taken into account. However in online auction marketplaces the starting price is an important parameter for sellers to set and has been discussed many a time in the literature. Given the importance of starting price the main objective of our work is to explore the effect of starting price on agents using various bidding strategies and how to adjust it adaptively within a dynamic CDA market. Experimental results confirm that when agents set their starting prices at varying values in different market situations their profit changes significantly no matter which strategy they adopt. In order to guide agents to adjust their starting prices in dynamic and unknown markets an adaptive mechanism is proposed. Experimental results show that agents adopting the adaptive mechanism generally outperform the corresponding agents without. Furthermore another set of experiments are carried out to let all the agents use the adaptive mechanism and compete together in one market. Not surprisingly the profit of agents is observed to drop down a lot in this situation.,harry timmermans,Not available,2009.0,10.1007/978-3-642-11161-7_12,Principles of Practice in Multi-Agent Systems,Huiye2009,False,,Springer,Not available,Adaptive Adjustment of Starting Price for Agents in Continuous Double Auctions,74911c8efdbd6c27434ac41f0e18edaf,http://dx.doi.org/10.1007/978-3-642-11161-7_12 1752,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,lubna rasheedi,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 1753,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,natasha chatterjee,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 1754,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,shrisha rao,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 1755,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,dimitris bertsimas,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 1756,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,jeffrey hawkins,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 1757,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,martin bichler,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 1758,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,georgia perakis,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 1759,This study uses a multiagent system to determine which payment rule provides the most revenue in treasury auctions. The agents learn how to bid using straightforward bid adjustment rules that are based on impulse balance learning. The market model encompasses the when-issued auction and secondary markets as well as bidding constraints for primary dealers. I find that when the number of primary bidders is less than 13 (Canada) the Discriminatory payment rule is revenue superior to the Uniform payment across most market price spreads. When the number of primary bidders is greater than 14 (United States) Uniform payment is revenue superior to Discriminatory payment for all market price spreads. In general revenue increases with the minimum bid constraint and with the number of primary dealers for Uniform Average and Vickrey payment rules.,alan mehlenbacher,Not available,2008.0,10.1007/s10614-008-9165-z,Computational Economics,Alan2008,False,,Springer,Not available,Multiagent System Simulations of Treasury Auctions,98100c020ef10278bbee4facd72c53e9,http://dx.doi.org/10.1007/s10614-008-9165-z 1760,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,juan aparicio,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 1761,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,mercedes landete,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 1762,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,juan monge,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 1763,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,inmaculada sirvent,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 1764," We study the role of timing in auctions under the premise that time is a valuable resource. When one object is for sale Dutch and first-price sealed bid auctions are strategically equivalent in standard models and therefore they should yield the same revenue for the auctioneer. We study Dutch and first-price sealed bid auctions in the laboratory with a specific emphasis on the speed of the clock in the Dutch auction. At fast clock speeds revenue in the Dutch auction is significantly lower than it is in the sealed bid auction. When the clock is sufficiently slow however revenue in the Dutch auction is higher than the revenue in the sealed bid auction. We develop and test a simple model of auctions with impatient bidders that is consistent with these laboratory findings. ",elena katok,Not available,2008.0,10.1007/s10683-007-9169-x,Experimental Economics,Elena2008,False,,Springer,Not available,Time is money: The effect of clock speed on seller’s revenue in Dutch auctions,82d0b38145e237e126df189d4046b89a,http://dx.doi.org/10.1007/s10683-007-9169-x 1765," We study the role of timing in auctions under the premise that time is a valuable resource. When one object is for sale Dutch and first-price sealed bid auctions are strategically equivalent in standard models and therefore they should yield the same revenue for the auctioneer. We study Dutch and first-price sealed bid auctions in the laboratory with a specific emphasis on the speed of the clock in the Dutch auction. At fast clock speeds revenue in the Dutch auction is significantly lower than it is in the sealed bid auction. When the clock is sufficiently slow however revenue in the Dutch auction is higher than the revenue in the sealed bid auction. We develop and test a simple model of auctions with impatient bidders that is consistent with these laboratory findings. ",anthony kwasnica,Not available,2008.0,10.1007/s10683-007-9169-x,Experimental Economics,Elena2008,False,,Springer,Not available,Time is money: The effect of clock speed on seller’s revenue in Dutch auctions,82d0b38145e237e126df189d4046b89a,http://dx.doi.org/10.1007/s10683-007-9169-x 1766,We consider several equilibrium formulations for the problem of managing spatially distributed auction markets of a homogeneous commodity which are joined by transmission lines in a network. At each market traders and buyers are determined by their price functions and choose their offer/bid values. We present equivalent variational inequality optimization and saddle point formulations of this problem. The corresponding models possess a special structure of constraint and cost functions and lead to different decomposition schemes. We propose proximal and splitting type methods and discuss their properties and preliminary computational results.,igor konnov,Not available,2008.0,10.1007/s11067-008-9083-6,Networks and Spatial Economics,V.2008,False,,Springer,Not available,Decomposition Approaches for Constrained Spatial Auction Market Problems,65aad9178cd8224bfe04e378452df208,http://dx.doi.org/10.1007/s11067-008-9083-6 1767,Auction theory usually assumes the quasi-linearity of individual preferences. We drop this assumption and define an extension of second price mechanisms that applies to general preferences. It turns out that the extended second price mechanisms are the only rules satisfying ,toyotaka sakai,Not available,2008.0,10.1007/s00199-007-0311-y,Economic Theory,Toyotaka2008,False,,Springer,Not available,Second price auctions on general preference domains: two characterizations,ad111c83f0b3c4e2bac7c8eb0e8343ea,http://dx.doi.org/10.1007/s00199-007-0311-y 1768,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,ioannis petrakis,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 1769,This paper studies combinatorial auctions with budget-constrained bidders from a mechanism design perspective. I search for mechanisms that are incentive compatible individually rational symmetric non-wasteful and non-bossy. First focusing on the greedy domain in which any increase in a bidder’s valuation always exceeds his budget I derive the unique mechanism called the Iterative Second Price Auction. For the general domain however no such mechanism exists.,phuong le,Not available,2017.0,10.1007/s10058-016-0188-y,Review of Economic Design,Phuong2017,False,,Springer,Not available,Mechanisms for combinatorial auctions with budget constraints,297895bf2a754bcc6621399b729d1061,http://dx.doi.org/10.1007/s10058-016-0188-y 1770,Auction is often applied in cognitive radio networks due to its efficiency and fairness properties. An important issue in designing an auction mechanism is how to utilize the limited spectrum resource in an efficient manner. In order to achieve this goal we propose a predictive double spectrum auction model in this paper. Our auction model first obtains the bidding range from statistical analysis and then separates the interval into independent states and employees a Markovian prediction based algorithm to generate guidelines for the bidding range of primary and secondary users respectively. Comparing with existing approaches our proposed auction model is more efficient in spectrum utilization and satisfies the economic properties. Extensive simulation results show that our work achieves an utilization ratio up to 91 %.,zhe liu,Not available,2017.0,10.1007/s11276-015-1152-4,Wireless Networks,Zhe2017,False,,Springer,Not available,On spectrum allocation in cognitive radio networks: a double auction-based methodology,fdfed789d07c6d1ffb34cb16890ae5ab,http://dx.doi.org/10.1007/s11276-015-1152-4 1771,Auction is often applied in cognitive radio networks due to its efficiency and fairness properties. An important issue in designing an auction mechanism is how to utilize the limited spectrum resource in an efficient manner. In order to achieve this goal we propose a predictive double spectrum auction model in this paper. Our auction model first obtains the bidding range from statistical analysis and then separates the interval into independent states and employees a Markovian prediction based algorithm to generate guidelines for the bidding range of primary and secondary users respectively. Comparing with existing approaches our proposed auction model is more efficient in spectrum utilization and satisfies the economic properties. Extensive simulation results show that our work achieves an utilization ratio up to 91 %.,changle li,Not available,2017.0,10.1007/s11276-015-1152-4,Wireless Networks,Zhe2017,False,,Springer,Not available,On spectrum allocation in cognitive radio networks: a double auction-based methodology,fdfed789d07c6d1ffb34cb16890ae5ab,http://dx.doi.org/10.1007/s11276-015-1152-4 1772,In this paper we present a genetic algorithmic approach to automated auction mechanism design in the context of ,jinzhong niu,Not available,2017.0,10.1007/978-3-319-54229-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2017,False,,Springer,Not available,A Genetic Algorithmic Approach to Automated Auction Mechanism Design,1f442c5d331b3692e45131672221692d,http://dx.doi.org/10.1007/978-3-319-54229-4_9 1773,In this paper we present a genetic algorithmic approach to automated auction mechanism design in the context of ,simon parsons,Not available,2017.0,10.1007/978-3-319-54229-4_9,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2017,False,,Springer,Not available,A Genetic Algorithmic Approach to Automated Auction Mechanism Design,1f442c5d331b3692e45131672221692d,http://dx.doi.org/10.1007/978-3-319-54229-4_9 1774,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,saburo saito,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1775,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,mamoru imanishi,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1776,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,kosuke yamashiro,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1777,Under the scheme of Japanese City Renewal Law (JCRL) the cost of urban redevelopment project has been financed by the revenue from selling the reserved floor secured beforehand in the redeveloped building. Since the outcome of whether or not the reserved floor can be sold is unforeseeable entities for redevelopment are faced with the risk for project financing. Traditional risk evaluation has just focused on the risk inherent in the project that is carried out by a single entity and whose future returns are uncertain. On the contrary we focus on the risk of urban redevelopment project in which plural decision-makers are involved and whose future outcome becomes uncertain since it depends on the decisions made by other decision-makers involved. Defining the risk for the entities as the probability that the entities suffer a loss and formalizing urban redevelopment procedure as a two-stage auction game we have demonstrated that we can evaluate numerically the actual amount of risk the entities are going to bear in the project by using hypothetical examples. To give more reality we also show an application of our model to the actual instance of urban redevelopment project that was broken down to produce a huge amount of loss and see whether our model can infer its amount of loss.,masakuni iwami,Not available,2017.0,10.1007/978-981-10-0099-7_30,Socioeconomic Environmental Policies and Evaluations in Regional Science,Saburo2017,False,,Springer,Not available,Risk Evaluation of Social Decision Process: A Two-Stage Auction Game Model for Japanese Urban Redevelopment Procedure,d6a37eee6e5235b1380fdddc3627bdd9,http://dx.doi.org/10.1007/978-981-10-0099-7_30 1778,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,kin-woon yeow,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1779, Most of the literature on auctions with endogenous entry assumes that in equilibrium the number of entrants is deterministic. We discuss a series of experiments designed to test the alternative hypothesis that even in equilibrium the number of entrants is stochastic. This distinction has strong implications for auction performance the design of optimal mechanisms and social welfare. Our results strongly reject the hypothesis of deterministic entry and tend to confirm the alternative hypothesis that entry is stochastic.,james smith,Not available,2002.0,10.1007/s001820100083,International Journal of Game Theory,L.2002,False,,Springer,Not available,Entry coordination in auctions and social welfare: An experimental investigation,d76cb9f0461ffcaec7782bd849806866,http://dx.doi.org/10.1007/s001820100083 1780,Most existing methods for scheduling are based on centralized or hierarchical decision making using monolithic models. In this study we investigate a new method based on a distributed and locally autonomous decision structure using the notion of combinatorial auction. In combinatorial auction the bidders demand a combination of dependent objects with a single bid. We show that not only can we use this auction mechanism to handle complex resource scheduling problems but there exist strong links between combinatorial auction and Lagrangean-based decomposition. Exploring some of these properties we characterize combinatorial auction using auction protocols and payment functions. This study is a first step toward developing a distributed scheduling framework that maintains system-wide performance while accommodating local preferences and objectives. We provide some insights to this framework by demonstrating four different versions of the auction mechanism using job shop scheduling problems.,erhan kutanoglu,Not available,1999.0,10.1023/A:1007666414678,IIE Transactions,Erhan1999,False,,Springer,Not available,On combinatorial auction and Lagrangean relaxation for distributed resource scheduling,2619158675c4d72ffa1c1b4070d2617b,http://dx.doi.org/10.1023/A:1007666414678 1781,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,swee-huay heng,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1782,In this paper we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs we notice that the scheme structure and fundamental security properties in both schemes are similar namely unforgeability anonymity and indistinguishability. As a proof of concept we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.,syh-yuan tan,Not available,2017.0,10.1007/978-981-10-4154-9_43,Information Science and Applications 2017,Kin-Woon2017,False,,Springer,Not available,From Sealed-Bid Electronic Auction to Electronic Cheque,7c4a3fe7476448ab13f1803e226e22d9,http://dx.doi.org/10.1007/978-981-10-4154-9_43 1783,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids one for each additional unit. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.188. This resolves one of the open questions posed in previous works on multi-unit auctions.,georgios birmpas,Not available,2017.0,10.1007/978-3-319-66700-3_2,Algorithmic Game Theory,Georgios2017,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,465373c9ad74b0f572f6c8930af08b4a,http://dx.doi.org/10.1007/978-3-319-66700-3_2 1784,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids one for each additional unit. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.188. This resolves one of the open questions posed in previous works on multi-unit auctions.,evangelos markakis,Not available,2017.0,10.1007/978-3-319-66700-3_2,Algorithmic Game Theory,Georgios2017,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,465373c9ad74b0f572f6c8930af08b4a,http://dx.doi.org/10.1007/978-3-319-66700-3_2 1785,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids one for each additional unit. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.188. This resolves one of the open questions posed in previous works on multi-unit auctions.,orestis telelis,Not available,2017.0,10.1007/978-3-319-66700-3_2,Algorithmic Game Theory,Georgios2017,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,465373c9ad74b0f572f6c8930af08b4a,http://dx.doi.org/10.1007/978-3-319-66700-3_2 1786,We revisit the inefficiency of the uniform price auction one of the standard multi-unit auction formats for allocating multiple units of a single good. In the uniform price auction each bidder submits a sequence of non-increasing marginal bids one for each additional unit. The per unit price is then set to be the highest losing bid. We focus on the pure Nash equilibria of such auctions for bidders with submodular valuation functions. Our result is a tight upper and lower bound on the inefficiency of equilibria showing that the Price of Anarchy is bounded by 2.188. This resolves one of the open questions posed in previous works on multi-unit auctions.,artem tsikiridis,Not available,2017.0,10.1007/978-3-319-66700-3_2,Algorithmic Game Theory,Georgios2017,False,,Springer,Not available,Tight Welfare Guarantees for Pure Nash Equilibria of the Uniform Price Auction,465373c9ad74b0f572f6c8930af08b4a,http://dx.doi.org/10.1007/978-3-319-66700-3_2 1787,In this chapter we present some key aspects of wholesale electricity markets modeling and more specifically focus our attention on auctions and mechanism design. Some of the results stemming from these models are the computation of an optimal allocation for the Independent System Operator the study of equilibria (existence and uniqueness in particular) and the design of mechanisms to increase the social surplus. More generally this field of research provides clues to discuss how wholesale electricity market should be regulated. We begin with a general introduction and then present some results we obtained recently. We also briefly discuss some ongoing related research. As an illustrative example a section is devoted to the computation of the Independent System Operator response function for a symmetric binodal setting with piece-wise linear production cost functions.,benjamin heymann,Not available,2017.0,10.1007/978-981-10-4774-9_4,Generalized Nash Equilibrium Problems Bilevel Programming and MPEC,Benjamin2017,False,,Springer,Not available,Mechanism Design and Auctions for Electricity Networks,cceed9b1bdf31f69b247da5059555f40,http://dx.doi.org/10.1007/978-981-10-4774-9_4 1788,In this chapter we present some key aspects of wholesale electricity markets modeling and more specifically focus our attention on auctions and mechanism design. Some of the results stemming from these models are the computation of an optimal allocation for the Independent System Operator the study of equilibria (existence and uniqueness in particular) and the design of mechanisms to increase the social surplus. More generally this field of research provides clues to discuss how wholesale electricity market should be regulated. We begin with a general introduction and then present some results we obtained recently. We also briefly discuss some ongoing related research. As an illustrative example a section is devoted to the computation of the Independent System Operator response function for a symmetric binodal setting with piece-wise linear production cost functions.,alejandro jofre,Not available,2017.0,10.1007/978-981-10-4774-9_4,Generalized Nash Equilibrium Problems Bilevel Programming and MPEC,Benjamin2017,False,,Springer,Not available,Mechanism Design and Auctions for Electricity Networks,cceed9b1bdf31f69b247da5059555f40,http://dx.doi.org/10.1007/978-981-10-4774-9_4 1789,Liquid welfare is an alternative efficiency measure for auctions with budget constrained agents. Previous studies focused on auctions of a single (type of) good. In this paper we initiate the study of general multi-item auctions obtaining a truthful budget feasible auction with constant approximation ratio of liquid welfare under the assumption of large market.Our main technique is random sampling. Previously random sampling was usually used in the setting of single-parameter auctions. When it comes to multi-dimensional settings this technique meets a number of obstacles and difficulties. In this work we develop a series of analysis tools and frameworks to overcome these. These tools and frameworks are quite general and they may find applications in other scenarios.,pinyan lu,Not available,2017.0,10.1007/978-3-319-66700-3_4,Algorithmic Game Theory,Pinyan2017,False,,Springer,Not available,Liquid Welfare Maximization in Auctions with Multiple Items,2098729b836e4e34d75a0b02c37f7ec7,http://dx.doi.org/10.1007/978-3-319-66700-3_4 1790,Liquid welfare is an alternative efficiency measure for auctions with budget constrained agents. Previous studies focused on auctions of a single (type of) good. In this paper we initiate the study of general multi-item auctions obtaining a truthful budget feasible auction with constant approximation ratio of liquid welfare under the assumption of large market.Our main technique is random sampling. Previously random sampling was usually used in the setting of single-parameter auctions. When it comes to multi-dimensional settings this technique meets a number of obstacles and difficulties. In this work we develop a series of analysis tools and frameworks to overcome these. These tools and frameworks are quite general and they may find applications in other scenarios.,tao xiao,Not available,2017.0,10.1007/978-3-319-66700-3_4,Algorithmic Game Theory,Pinyan2017,False,,Springer,Not available,Liquid Welfare Maximization in Auctions with Multiple Items,2098729b836e4e34d75a0b02c37f7ec7,http://dx.doi.org/10.1007/978-3-319-66700-3_4 1791,Most existing methods for scheduling are based on centralized or hierarchical decision making using monolithic models. In this study we investigate a new method based on a distributed and locally autonomous decision structure using the notion of combinatorial auction. In combinatorial auction the bidders demand a combination of dependent objects with a single bid. We show that not only can we use this auction mechanism to handle complex resource scheduling problems but there exist strong links between combinatorial auction and Lagrangean-based decomposition. Exploring some of these properties we characterize combinatorial auction using auction protocols and payment functions. This study is a first step toward developing a distributed scheduling framework that maintains system-wide performance while accommodating local preferences and objectives. We provide some insights to this framework by demonstrating four different versions of the auction mechanism using job shop scheduling problems.,s. wu,Not available,1999.0,10.1023/A:1007666414678,IIE Transactions,Erhan1999,False,,Springer,Not available,On combinatorial auction and Lagrangean relaxation for distributed resource scheduling,2619158675c4d72ffa1c1b4070d2617b,http://dx.doi.org/10.1023/A:1007666414678 1792,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,shuren liu,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 1793,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,licai lei,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 1794,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,pei tang,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 1795,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,ling li,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 1796,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,xing liu,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 1797,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,zhineng hu,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 1798,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,tao jing,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 1799,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,fan zhang,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 1800,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,wei cheng,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 1801,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,yan huo,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 1802,In this paper we present a dialogue between game theory and laboratory/field experiments using a number of examples from the economic systems design literature. We observe that neither game theory or laboratory experimentation is sufficient for economic design. Instead what seems to be critical is the ability of each to inform the other. We discuss the rapid emergence of ‘smart’ markets which are being engineered to extract the gains from exchange in increasingly complex resource allocation environments. We describe some of the desirable properties of these markets.,kevin mccabe,Not available,1999.0,10.1023/A:1007614430607,IIE Transactions,Kevin1999,False,,Springer,Not available,Designing auction institutions for exchange,70e050495012c60b626f75787567826f,http://dx.doi.org/10.1023/A:1007614430607 1803,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,xiuzhen cheng,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 1804,In almost common value auctions even a small private payoff advantage is usually supposed to have an explosive effect on the outcomes in a second-price sealed-bid common value auction. According to (Bikhchandani in J. Econ. Theory 46:97–119 ,gisele umbhauer,Not available,2015.0,10.1007/s10479-013-1377-5,Annals of Operations Research,Gisèle2015,False,,Springer,Not available,Almost common value auctions and discontinuous equilibria,57f21ed6694698d409679c7a74f719c0,http://dx.doi.org/10.1007/s10479-013-1377-5 1805,We study mechanism design for a single-server setting where jobs require compensation for waiting while waiting cost is private information to the jobs. With given priors on the private information of jobs we aim to find a Bayes–Nash incentive compatible mechanism that minimizes the total expected payments to the jobs. Following earlier work in the auction literature we show that this problem is solved in polynomial time by a version of Smith’s rule. When both waiting cost and processing times are private we show that optimal mechanisms generally do not satisfy an independence condition known as IIA and conclude that a closed form for optimal mechanisms is generally not conceivable.,jelle duives,Not available,2015.0,10.1007/s10951-014-0378-9,Journal of Scheduling,Jelle2015,False,,Springer,Not available,On optimal mechanism design for a sequencing problem,40f00cb0b92abf336cc7a06df082a63e,http://dx.doi.org/10.1007/s10951-014-0378-9 1806,We study mechanism design for a single-server setting where jobs require compensation for waiting while waiting cost is private information to the jobs. With given priors on the private information of jobs we aim to find a Bayes–Nash incentive compatible mechanism that minimizes the total expected payments to the jobs. Following earlier work in the auction literature we show that this problem is solved in polynomial time by a version of Smith’s rule. When both waiting cost and processing times are private we show that optimal mechanisms generally do not satisfy an independence condition known as IIA and conclude that a closed form for optimal mechanisms is generally not conceivable.,birgit heydenreich,Not available,2015.0,10.1007/s10951-014-0378-9,Journal of Scheduling,Jelle2015,False,,Springer,Not available,On optimal mechanism design for a sequencing problem,40f00cb0b92abf336cc7a06df082a63e,http://dx.doi.org/10.1007/s10951-014-0378-9 1807,We study mechanism design for a single-server setting where jobs require compensation for waiting while waiting cost is private information to the jobs. With given priors on the private information of jobs we aim to find a Bayes–Nash incentive compatible mechanism that minimizes the total expected payments to the jobs. Following earlier work in the auction literature we show that this problem is solved in polynomial time by a version of Smith’s rule. When both waiting cost and processing times are private we show that optimal mechanisms generally do not satisfy an independence condition known as IIA and conclude that a closed form for optimal mechanisms is generally not conceivable.,debasis mishra,Not available,2015.0,10.1007/s10951-014-0378-9,Journal of Scheduling,Jelle2015,False,,Springer,Not available,On optimal mechanism design for a sequencing problem,40f00cb0b92abf336cc7a06df082a63e,http://dx.doi.org/10.1007/s10951-014-0378-9 1808,We study mechanism design for a single-server setting where jobs require compensation for waiting while waiting cost is private information to the jobs. With given priors on the private information of jobs we aim to find a Bayes–Nash incentive compatible mechanism that minimizes the total expected payments to the jobs. Following earlier work in the auction literature we show that this problem is solved in polynomial time by a version of Smith’s rule. When both waiting cost and processing times are private we show that optimal mechanisms generally do not satisfy an independence condition known as IIA and conclude that a closed form for optimal mechanisms is generally not conceivable.,rudolf muller,Not available,2015.0,10.1007/s10951-014-0378-9,Journal of Scheduling,Jelle2015,False,,Springer,Not available,On optimal mechanism design for a sequencing problem,40f00cb0b92abf336cc7a06df082a63e,http://dx.doi.org/10.1007/s10951-014-0378-9 1809,We study mechanism design for a single-server setting where jobs require compensation for waiting while waiting cost is private information to the jobs. With given priors on the private information of jobs we aim to find a Bayes–Nash incentive compatible mechanism that minimizes the total expected payments to the jobs. Following earlier work in the auction literature we show that this problem is solved in polynomial time by a version of Smith’s rule. When both waiting cost and processing times are private we show that optimal mechanisms generally do not satisfy an independence condition known as IIA and conclude that a closed form for optimal mechanisms is generally not conceivable.,marc uetz,Not available,2015.0,10.1007/s10951-014-0378-9,Journal of Scheduling,Jelle2015,False,,Springer,Not available,On optimal mechanism design for a sequencing problem,40f00cb0b92abf336cc7a06df082a63e,http://dx.doi.org/10.1007/s10951-014-0378-9 1810,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,wei zhou,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 1811,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,tao jing,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 1812,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,yan huo,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 1813,In this paper we present a dialogue between game theory and laboratory/field experiments using a number of examples from the economic systems design literature. We observe that neither game theory or laboratory experimentation is sufficient for economic design. Instead what seems to be critical is the ability of each to inform the other. We discuss the rapid emergence of ‘smart’ markets which are being engineered to extract the gains from exchange in increasingly complex resource allocation environments. We describe some of the desirable properties of these markets.,stephen rassenti,Not available,1999.0,10.1023/A:1007614430607,IIE Transactions,Kevin1999,False,,Springer,Not available,Designing auction institutions for exchange,70e050495012c60b626f75787567826f,http://dx.doi.org/10.1023/A:1007614430607 1814,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,xiaoshuang xing,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 1815,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,jin qian,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 1816,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,estrella alonso,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 1817,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,joaquin sanchez-soriano,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 1818,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,juan tejada,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 1819,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,wenchuan liu,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 1820,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,yu zhang,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 1821,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,qi li,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 1822,We analyze the strategic allocation of resources across two contests as in the canonical Colonel Blotto game. In the games we study two players simultaneously allocate their forces across two fields of battle. The larger force on each battlefield wins that battle and the payoff to a player is the sum of the values of battlefields won. We completely characterize the set of Nash equilibria of all two-battlefield Blotto games and provide the unique equilibrium payoffs. We also show how to extend our characterization to cover previously unstudied games with nonlinear resource constraints.,scott macdonell,Not available,2015.0,10.1007/s00199-014-0807-1,Economic Theory,T.2015,False,,Springer,Not available,Waging simple wars: a complete characterization of two-battlefield Blotto equilibria,d00ab07f8aa27447d0bbd64a92e63a9a,http://dx.doi.org/10.1007/s00199-014-0807-1 1823,We analyze the strategic allocation of resources across two contests as in the canonical Colonel Blotto game. In the games we study two players simultaneously allocate their forces across two fields of battle. The larger force on each battlefield wins that battle and the payoff to a player is the sum of the values of battlefields won. We completely characterize the set of Nash equilibria of all two-battlefield Blotto games and provide the unique equilibrium payoffs. We also show how to extend our characterization to cover previously unstudied games with nonlinear resource constraints.,nick mastronardi,Not available,2015.0,10.1007/s00199-014-0807-1,Economic Theory,T.2015,False,,Springer,Not available,Waging simple wars: a complete characterization of two-battlefield Blotto equilibria,d00ab07f8aa27447d0bbd64a92e63a9a,http://dx.doi.org/10.1007/s00199-014-0807-1 1824,In this paper we present a dialogue between game theory and laboratory/field experiments using a number of examples from the economic systems design literature. We observe that neither game theory or laboratory experimentation is sufficient for economic design. Instead what seems to be critical is the ability of each to inform the other. We discuss the rapid emergence of ‘smart’ markets which are being engineered to extract the gains from exchange in increasingly complex resource allocation environments. We describe some of the desirable properties of these markets.,vernon smith,Not available,1999.0,10.1023/A:1007614430607,IIE Transactions,Kevin1999,False,,Springer,Not available,Designing auction institutions for exchange,70e050495012c60b626f75787567826f,http://dx.doi.org/10.1023/A:1007614430607 1825,Auctions are procedures for selling one or more items to one or more bidders. Auctions induce games among the bidders so notions of equilibrium from game theory can be applied to auctions. Auction theory aims to characterize and compare the equilibrium outcomes for different types of auctions. Combinatorial auctions arise when multiple-related items are sold simultaneously.,bruce hajek,Not available,2015.0,10.1007/978-1-4471-5058-9_36,Encyclopedia of Systems and Control,Bruce2015,False,,Springer,Not available,Auctions,66556758bdbf9ba2f725359ded547ce5,http://dx.doi.org/10.1007/978-1-4471-5058-9_36 1826,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,miguel mediavilla,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 1827,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,carolina bernardos,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 1828,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,sandra martinez,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 1829,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,qi tang,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 1830,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,xu-hua lv,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 1831,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,li-li chen,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 1832,Many factors affect the supply and demand characteristics of artists' output.This exploratory study focuses on a ``supply-induced'' demand effect –the death of the artist and the assurance that from the perspective of thedurable goods monopolist the output of the artist ends. While not purportingto be a formal test of that proposition we observe using U.S. auction data a clustered rise in artists' values immediately around the time of death andsuggest some possible demand-side explanations using a sample of LatinAmerican artists between 1977 and 1996.,r. ekelund,Not available,2000.0,10.1023/A:1007618221648,Journal of Cultural Economics,Jr.2000,False,,Springer,Not available,The ``Death-Effect'' in Art Prices: A Demand-Side Exploration,2886895418b0c747a27ca32ab1ef6f78,http://dx.doi.org/10.1023/A:1007618221648 1833,Many factors affect the supply and demand characteristics of artists' output.This exploratory study focuses on a ``supply-induced'' demand effect –the death of the artist and the assurance that from the perspective of thedurable goods monopolist the output of the artist ends. While not purportingto be a formal test of that proposition we observe using U.S. auction data a clustered rise in artists' values immediately around the time of death andsuggest some possible demand-side explanations using a sample of LatinAmerican artists between 1977 and 1996.,rand ressler,Not available,2000.0,10.1023/A:1007618221648,Journal of Cultural Economics,Jr.2000,False,,Springer,Not available,The ``Death-Effect'' in Art Prices: A Demand-Side Exploration,2886895418b0c747a27ca32ab1ef6f78,http://dx.doi.org/10.1023/A:1007618221648 1834,Many factors affect the supply and demand characteristics of artists' output.This exploratory study focuses on a ``supply-induced'' demand effect –the death of the artist and the assurance that from the perspective of thedurable goods monopolist the output of the artist ends. While not purportingto be a formal test of that proposition we observe using U.S. auction data a clustered rise in artists' values immediately around the time of death andsuggest some possible demand-side explanations using a sample of LatinAmerican artists between 1977 and 1996.,john watson,Not available,2000.0,10.1023/A:1007618221648,Journal of Cultural Economics,Jr.2000,False,,Springer,Not available,The ``Death-Effect'' in Art Prices: A Demand-Side Exploration,2886895418b0c747a27ca32ab1ef6f78,http://dx.doi.org/10.1023/A:1007618221648 1835,The study investigates collusion-nonfacilitating features of one-sided auctions. We report the results of oral nondescending bid auction experiments in which the strict bid improvement rule was absent and compare them with the results of sealed bid auction experiments. In the sealed bid experiments the outcomes converged to the competitive equilibrium. In the oral auctions collusive outcomes emerged and were sustained with bidders using bid matching strategies. We conclude that oral auctions provide opportunities for tacit coordination and collusion enforcement that do not exist under the sealed bid. Therefore the strict bid improvement rule becomes critical for breaking collusion.,katerina sherstyuk,Not available,1999.0,10.1023/A:1009929832148,Experimental Economics,Katerina1999,False,,Springer,Not available,Collusion Without Conspiracy: An Experimental Study of One-Sided Auctions,737a0282df62ad9239b69edf8032af1a,http://dx.doi.org/10.1023/A:1009929832148 1836,Goods are said to be combinatorial when the value of a bundle of goods is not equal to the sum of the values of the same goods unbundled. Investigations of combinatorial allocation problems should recognize that there are two separate aspects of such problems: an ,r. isaac,Not available,2000.0,10.1023/A:1009942024096,Experimental Economics,Mark2000,False,,Springer,Not available,Robustness of the Incentive Compatible Combinatorial Auction,b6bbfee5d9684571837473ffc0e5f682,http://dx.doi.org/10.1023/A:1009942024096 1837,Goods are said to be combinatorial when the value of a bundle of goods is not equal to the sum of the values of the same goods unbundled. Investigations of combinatorial allocation problems should recognize that there are two separate aspects of such problems: an ,duncan james,Not available,2000.0,10.1023/A:1009942024096,Experimental Economics,Mark2000,False,,Springer,Not available,Robustness of the Incentive Compatible Combinatorial Auction,b6bbfee5d9684571837473ffc0e5f682,http://dx.doi.org/10.1023/A:1009942024096 1838, A ,parimal bag,Not available,2000.0,10.1007/s001990050319,Economic Theory,Kanti2000,False,,Springer,Not available,More on phantom bidding,b2c829f997f0493b36b599785c5eebcb,http://dx.doi.org/10.1007/s001990050319 1839, A ,emin dinlersoz,Not available,2000.0,10.1007/s001990050319,Economic Theory,Kanti2000,False,,Springer,Not available,More on phantom bidding,b2c829f997f0493b36b599785c5eebcb,http://dx.doi.org/10.1007/s001990050319 1840, A ,ruqu wang,Not available,2000.0,10.1007/s001990050319,Economic Theory,Kanti2000,False,,Springer,Not available,More on phantom bidding,b2c829f997f0493b36b599785c5eebcb,http://dx.doi.org/10.1007/s001990050319 1841,Derivative instruments have become increasingly important to financial institutions institutional investors traders and private individuals throughout the world both as risk-management tools and as a source of revenue. The volume of over-the-counter (OTC) traded derivatives has increased enormously over the past decade because institutional investors have often had a need for special derivative products which are not traded on organized exchanges. An important feature of OTC trading is the bargaining on multiple attributes of a contract such as price strike price and contract maturity. Negotiation on multiple attributes of a deal is currently not supported by electronic trading floors. In this paper we describe an approach of how to automate the multi-attribute multilateral negotiations using a Web-based trading system. First we will give an overview of various approaches to supporting or automating negotiations on multiple attributes. Then we will introduce multi-attribute auctions an extension of single-sided auction theory and analyze preliminary game-theoretic results. Finally we will show a Web-based electronic trading system for OTC derivatives based on multi-attribute auctions.,martin bichler,Not available,2000.0,10.1023/A:1010070109801,Information Systems Frontiers,Martin2000,False,,Springer,Not available,Trading Financial Derivatives on the Web—An Approach Towards Automating Negotiations on OTC Markets,125a99cd53ec8bbeebb913aabf76b100,http://dx.doi.org/10.1023/A:1010070109801 1842, We study endogenous-participation auctions where bidders only know the number of potential participants. After seeing their values for the object potential participants decide whether or not to enter the auction. They may not want to enter the auction since they have to pay participation costs. We characterize equilibrium bidding strategies and entry decisions for both first- and second-price sealed-bid auctions when participation is endogenous. We show that there is a pure strategy entry equilibrium where only bidders with values greater than a certain cut-off point actually bid. In this context both types of auctions generate the same expected revenue. We also show that contrary to the predictions of the fixed number of bidders literature the seller's expected revenue may decrease when the number of potential participants increases. In addition we show that it is optimal for the seller to charge an entry fee which contrasts with results from the existing literature on auctions with entry. As in the fixed-,flavio menezes,Not available,2000.0,10.1007/s100580050048,Review of Economic Design,M.2000,False,,Springer,Not available,Auctions with endogenous participation,d55c2154d0708b441c25550987252cbe,http://dx.doi.org/10.1007/s100580050048 1843, We study endogenous-participation auctions where bidders only know the number of potential participants. After seeing their values for the object potential participants decide whether or not to enter the auction. They may not want to enter the auction since they have to pay participation costs. We characterize equilibrium bidding strategies and entry decisions for both first- and second-price sealed-bid auctions when participation is endogenous. We show that there is a pure strategy entry equilibrium where only bidders with values greater than a certain cut-off point actually bid. In this context both types of auctions generate the same expected revenue. We also show that contrary to the predictions of the fixed number of bidders literature the seller's expected revenue may decrease when the number of potential participants increases. In addition we show that it is optimal for the seller to charge an entry fee which contrasts with results from the existing literature on auctions with entry. As in the fixed-,paulo monteiro,Not available,2000.0,10.1007/s100580050048,Review of Economic Design,M.2000,False,,Springer,Not available,Auctions with endogenous participation,d55c2154d0708b441c25550987252cbe,http://dx.doi.org/10.1007/s100580050048 1844, Myerson and Satterthwaite (1983) prove that if one seller and one buyer have independent private valuations for an indivisible object then no individually rational and incentive compatible trading mechanism can guarantee ex post efficiency when gains from trade are uncertain. Makowski and Mezzetti (1993) show that this is not the case when there are at least two buyers. In the latter context if the highest possible seller's valuation is not too large we provide an ex post efficient mechanism in which the mechanism designer and the agents are not required to know the probability distribution for the seller's valuation.,domenico menicucci,Not available,2000.0,10.1007/s100580050047,Review of Economic Design,Domenico2000,False,,Springer,Not available,On efficient trading mechanisms between one seller and ,937475d3ed606e8e7828613b69632362,http://dx.doi.org/10.1007/s100580050047 1845,This is an investigation into the design of a market-based process to replace NASA's current committee process for allocating Shuttle secondary payload resources (lockers Watts and crew). The market-based process allocates budgets of tokens to NASA internal organizations that in turn use the budget to bid for priority for their middeck payloads. The scheduling algorithm selects payloads by priority class and maximizes the number of tokens bid to determine a manifest. The results of a number of controlled experiments show that such a system tends to allocate resources more efficiently by guiding participants to make resource and payload tradeoffs. Most participants were able to improve their position over NASA's current ranking system. Furthermore those that are better off make large improvements while the few that do worse have relatively small losses.,john ledyard,Not available,2000.0,10.1023/A:1009900310537,Experimental Economics,John2000,False,,Springer,Not available,A Market-Based Mechanism for Allocating Space Shuttle Secondary Payload Priority,7672fde493a92f1ad18a437fe88d7a72,http://dx.doi.org/10.1023/A:1009900310537 1846, The Federal Communications Commission currently utilizes a simultaneous multi-round ascending bid auction to allocate Personal Communication Services licenses. In the auction participants are allowed to withdraw standing bids at a penalty. The penalty is equal to the maximum of zero or the difference between the value of the withdrawn bid on a license and the highest bid after the withdrawal on that license. The withdrawal rule is designed to assist bidders wishing to assemble combinations of licenses who find themselves stranded with an assortment of licenses for which their bids sum to more than their value. This paper reports results of experiments that examine the effect of the withdrawal rule in environments in which losses can occur if packages of licenses must be assembled piecemeal. The experiments demonstrate that there is a tradeoff with using the rule: efficiency and revenue increase but individual losses are larger. Furthermore the increased efficiency does not outweigh the higher prices paid so that bidder surplus falls in the presence of the withdrawal rule.,david porter,Not available,1999.0,10.1007/s100580050027,Review of Economic Design,P.1999,False,,Springer,Not available,The effect of bid withdrawal in a multi-object auction,5928b7b8e4e29c4a1a43bb7342d8e537,http://dx.doi.org/10.1007/s100580050027 1847,This is an investigation into the design of a market-based process to replace NASA's current committee process for allocating Shuttle secondary payload resources (lockers Watts and crew). The market-based process allocates budgets of tokens to NASA internal organizations that in turn use the budget to bid for priority for their middeck payloads. The scheduling algorithm selects payloads by priority class and maximizes the number of tokens bid to determine a manifest. The results of a number of controlled experiments show that such a system tends to allocate resources more efficiently by guiding participants to make resource and payload tradeoffs. Most participants were able to improve their position over NASA's current ranking system. Furthermore those that are better off make large improvements while the few that do worse have relatively small losses.,david porter,Not available,2000.0,10.1023/A:1009900310537,Experimental Economics,John2000,False,,Springer,Not available,A Market-Based Mechanism for Allocating Space Shuttle Secondary Payload Priority,7672fde493a92f1ad18a437fe88d7a72,http://dx.doi.org/10.1023/A:1009900310537 1848,This is an investigation into the design of a market-based process to replace NASA's current committee process for allocating Shuttle secondary payload resources (lockers Watts and crew). The market-based process allocates budgets of tokens to NASA internal organizations that in turn use the budget to bid for priority for their middeck payloads. The scheduling algorithm selects payloads by priority class and maximizes the number of tokens bid to determine a manifest. The results of a number of controlled experiments show that such a system tends to allocate resources more efficiently by guiding participants to make resource and payload tradeoffs. Most participants were able to improve their position over NASA's current ranking system. Furthermore those that are better off make large improvements while the few that do worse have relatively small losses.,randii wessen,Not available,2000.0,10.1023/A:1009900310537,Experimental Economics,John2000,False,,Springer,Not available,A Market-Based Mechanism for Allocating Space Shuttle Secondary Payload Priority,7672fde493a92f1ad18a437fe88d7a72,http://dx.doi.org/10.1023/A:1009900310537 1849,We introduce a novel approach to general secure multiparty computation that avoids the intensive use of verifiable secret sharing characterizing nearly all previous protocols in the literature. Instead our scheme involves manipulation of ciphertexts for which the underlying private key is shared by participants in the computation. The benefits of this protocol include a high degree of conceptual and structural simplicity low message complexity and substantial flexibility with respect to input and output value formats. We refer to this new approach as ,markus jakobsson,Not available,2000.0,10.1007/3-540-44448-3_13,Advances in Cryptology — ASIACRYPT 2000,Markus2000,False,,Springer,Not available,Mix and Match: Secure Function Evaluation via Ciphertexts,1194607102256d23da458d25f48bd83b,http://dx.doi.org/10.1007/3-540-44448-3_13 1850,We introduce a novel approach to general secure multiparty computation that avoids the intensive use of verifiable secret sharing characterizing nearly all previous protocols in the literature. Instead our scheme involves manipulation of ciphertexts for which the underlying private key is shared by participants in the computation. The benefits of this protocol include a high degree of conceptual and structural simplicity low message complexity and substantial flexibility with respect to input and output value formats. We refer to this new approach as ,ari juels,Not available,2000.0,10.1007/3-540-44448-3_13,Advances in Cryptology — ASIACRYPT 2000,Markus2000,False,,Springer,Not available,Mix and Match: Secure Function Evaluation via Ciphertexts,1194607102256d23da458d25f48bd83b,http://dx.doi.org/10.1007/3-540-44448-3_13 1851, The theory of multiple unit auctions traditionally assumes that the offered quantity is fixed. I argue that this assumption is not appropriate for many applications because the seller may be able and willing to adjust the supply as a function of the bidding. In this paper I address this shortcoming by analyzing a multi-unit auction game between a monopolistic seller who can produce arbitrary quantities at constant unit cost and oligopolistic bidders. I establish the existence of a subgame-perfect equilibrium for price discriminating and for uniform price auctions. I also show that bidders have an incentive to misreport their true demand in both auction formats but they do that in different ways and for different reasons. Furthermore both auction formats are inefficient but there is no unambiguous ordering among them. Finally the more competitive the bidders are the more likely the seller is to prefer uniform pricing over price discrimination yet increased competition among bidders may or may not enhance efficiency.,yvan lengwiler,Not available,1999.0,10.1007/s001990050299,Economic Theory,Yvan1999,False,,Springer,Not available, The multiple unit auction with variable supply ,b2b5fcf3057b40d70bd312ba3ea85770,http://dx.doi.org/10.1007/s001990050299 1852, A competitive economy is studied in which sellers offer alternative direct mechanisms to buyers who have private information about their own private use value for the commodity being traded. In addition the commodity has a common value to all buyers perhaps represented by the future resale value of the commodity. A competitive equilibrium in mechanisms is described. In every such equilibrium it is shown that sellers must offer mechanisms that are allocationally equivalent to English ascending price auctions. The reservation prices that sellers set are shown to be below their ex post cost of trading the commodity.,michael peters,Not available,1999.0,10.1007/s100580050038,Review of Economic Design,Michael1999,False,,Springer,Not available, Competition among mechanism designers in a common value environment,481ddd33906dd8fc51c12984ca481ef8,http://dx.doi.org/10.1007/s100580050038 1853,In agent-based computational economics many different trading strategies have been proposed. Given the kinds of market that such trading strategies are employed in it is clear that the performance of the strategies depends heavily on the behavior of other traders. However most trading strategies are studied in homogeneous populations and those tests that have been carried out on heterogeneous populations are limited to a small number of strategies. In this paper we extend the range of strategies that have been exposed to a more extensive analysis measuring the performance of eight trading strategies using an approach based on evolutionary game theory.,kai cai,Not available,2008.0,10.1007/978-3-540-77949-0_4,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Kai2008,False,,Springer,Not available,Using Evolutionary Game-Theory to Analyse the Performance of Trading Strategies in a Continuous Double Auction Market,1f8b38b229cbceb9e5006c662fa8a570,http://dx.doi.org/10.1007/978-3-540-77949-0_4 1854,In agent-based computational economics many different trading strategies have been proposed. Given the kinds of market that such trading strategies are employed in it is clear that the performance of the strategies depends heavily on the behavior of other traders. However most trading strategies are studied in homogeneous populations and those tests that have been carried out on heterogeneous populations are limited to a small number of strategies. In this paper we extend the range of strategies that have been exposed to a more extensive analysis measuring the performance of eight trading strategies using an approach based on evolutionary game theory.,jinzhong niu,Not available,2008.0,10.1007/978-3-540-77949-0_4,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Kai2008,False,,Springer,Not available,Using Evolutionary Game-Theory to Analyse the Performance of Trading Strategies in a Continuous Double Auction Market,1f8b38b229cbceb9e5006c662fa8a570,http://dx.doi.org/10.1007/978-3-540-77949-0_4 1855,In agent-based computational economics many different trading strategies have been proposed. Given the kinds of market that such trading strategies are employed in it is clear that the performance of the strategies depends heavily on the behavior of other traders. However most trading strategies are studied in homogeneous populations and those tests that have been carried out on heterogeneous populations are limited to a small number of strategies. In this paper we extend the range of strategies that have been exposed to a more extensive analysis measuring the performance of eight trading strategies using an approach based on evolutionary game theory.,simon parsons,Not available,2008.0,10.1007/978-3-540-77949-0_4,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Kai2008,False,,Springer,Not available,Using Evolutionary Game-Theory to Analyse the Performance of Trading Strategies in a Continuous Double Auction Market,1f8b38b229cbceb9e5006c662fa8a570,http://dx.doi.org/10.1007/978-3-540-77949-0_4 1856,Second chance offers in online marketplaces involve a seller conducting an auction for a single object and then using information from the auction to offer a losing bidder a take-it-or-leave-it price for another unit. We theoretically and experimentally investigate this practice and compare it to two sequential auctions. We show that the equilibrium bidding strategy in the second chance offer mechanism only exists in mixed strategies and we observe that this mechanism generates more profit for the auctioneer than two sequential auctions. We also observe virtually no rejections of profitable offers in the ultimatum bargaining stage.,timothy salmon,Not available,2008.0,10.1007/s00199-006-0147-x,Economic Theory,C.2008,False,,Springer,Not available,Second chance offers versus sequential auctions: theory and behavior,aaee08047048800ea7062c11322bdb54,http://dx.doi.org/10.1007/s00199-006-0147-x 1857, This paper looks at the determination of ownership of capacity when there are two ex-ante symmetric agents bidding for many units of capacity which are sold sequentially. It is shown that convexity of payoffs in the final stage of the game is sufficient to ensure monopolization of capacity but that increasing returns to scale are not sufficient to ensure monopolization.,kala krishna,Not available,1999.0,10.1007/s001990050260,Economic Theory,Kala1999,False,,Springer,Not available,Auctions with endogenous valuations: the snowball effect revisited,14f81037029bcbf1dbf15b744ce94685,http://dx.doi.org/10.1007/s001990050260 1858,Second chance offers in online marketplaces involve a seller conducting an auction for a single object and then using information from the auction to offer a losing bidder a take-it-or-leave-it price for another unit. We theoretically and experimentally investigate this practice and compare it to two sequential auctions. We show that the equilibrium bidding strategy in the second chance offer mechanism only exists in mixed strategies and we observe that this mechanism generates more profit for the auctioneer than two sequential auctions. We also observe virtually no rejections of profitable offers in the ultimatum bargaining stage.,bart wilson,Not available,2008.0,10.1007/s00199-006-0147-x,Economic Theory,C.2008,False,,Springer,Not available,Second chance offers versus sequential auctions: theory and behavior,aaee08047048800ea7062c11322bdb54,http://dx.doi.org/10.1007/s00199-006-0147-x 1859,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,steve phelps,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1860,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,kai cai,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1861,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,peter mcburney,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1862,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,jinzhong niu,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1863,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,simon parsons,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1864,For a number of years we have been working towards the goal of automatically creating auction mechanisms using a range of techniques from evolutionary and multi-agent learning. This paper gives an overview of this work. The paper presents results from several experiments that we have carried out and tries to place these in the context of the overall task that we are engaged in.,elizabeth sklar,Not available,2008.0,10.1007/978-3-540-77949-0_14,Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning,Steve2008,False,,Springer,Not available,Auctions Evolution and Multi-agent Learning,83de4760eb6d2a39f9d4b459c6a2e1b8,http://dx.doi.org/10.1007/978-3-540-77949-0_14 1865,,aries sun,Not available,2008.0,10.1007/978-0-387-30162-4_297,Encyclopedia of Algorithms,Wei2008,False,,Springer,Not available,Position Auction,e256ecf15046a2ee7ec86adcc465cda3,http://dx.doi.org/10.1007/978-0-387-30162-4_297 1866,Auctions occupy a deservedly prominent place within microeconomics and game theory for at least three reasons.,lawrence ausubel,Not available,2008.0,10.1007/978-1-349-58802-2_73,The New Palgrave Dictionary of Economics,M.2008,False,,Springer,Not available,Auctions (Theory),452773f659f295cb45ef0837ceae590a,http://dx.doi.org/10.1007/978-1-349-58802-2_73 1867,We consider optimal procedures for bidders participating in multiple simultaneous second-price auctions. Previous research has shown that for such a setting it is optimal to bid strictly positive in all available auctions even if only a single item is required. In this paper we investigate how the bidding strategy changes when the bidder is financially constrained such that its exposure (i.e. the sum of its bids) is limited. We prove (in the case of two auctions) that when the financial constraint is equal or less than the buyer’s valuation it is typically optimal to participate in a single auction. We also find that the optimal strategy changes fundamentally if budget constraints are introduced. In particular whereas without budget contraints in many cases the problem of finding the optimal strategy reduces to two dimensions this is no longer the case if the bids are constrained. Finding the optimal policy thus becomes much more involved.,rajdeep dash,Not available,2008.0,10.1007/978-3-540-77554-6_14,Negotiation Auctions and Market Engineering,K.2008,False,,Springer,Not available,Optimal Financially Constrained Bidding in Multiple Simultaneous Auctions,38fcb56216c84fdbac64eb51d53efea8,http://dx.doi.org/10.1007/978-3-540-77554-6_14 1868, I study a multiple unit auction where symmetric risk-neutral bidders choose prices and quantities endogenously. In the model bidders (a) may place non-linear valuations on the auctioned units and (b) bid for several units at the same price (“lumpy” bids). I characterize quantity-symmetric and strictly monotone-increasing price equilibria for discriminatory and competitive auctions and show that (i) if quantity strategy profiles are equal across auctions revenue- equivalence holds (ii) expected revenue is higher if bidders bid for the entire supply rather than for shares of it and (iii) equilibrium allocations may fail to be Pareto-optimal.,rafael tenorio,Not available,1999.0,10.1007/s001990050253,Economic Theory,Rafael1999,False,,Springer,Not available,Multiple unit auctions with strategic price-quantity decisions,108a28054652bd61f34a6df2698ca108,http://dx.doi.org/10.1007/s001990050253 1869,We consider optimal procedures for bidders participating in multiple simultaneous second-price auctions. Previous research has shown that for such a setting it is optimal to bid strictly positive in all available auctions even if only a single item is required. In this paper we investigate how the bidding strategy changes when the bidder is financially constrained such that its exposure (i.e. the sum of its bids) is limited. We prove (in the case of two auctions) that when the financial constraint is equal or less than the buyer’s valuation it is typically optimal to participate in a single auction. We also find that the optimal strategy changes fundamentally if budget constraints are introduced. In particular whereas without budget contraints in many cases the problem of finding the optimal strategy reduces to two dimensions this is no longer the case if the bids are constrained. Finding the optimal policy thus becomes much more involved.,enrico gerding,Not available,2008.0,10.1007/978-3-540-77554-6_14,Negotiation Auctions and Market Engineering,K.2008,False,,Springer,Not available,Optimal Financially Constrained Bidding in Multiple Simultaneous Auctions,38fcb56216c84fdbac64eb51d53efea8,http://dx.doi.org/10.1007/978-3-540-77554-6_14 1870,We consider optimal procedures for bidders participating in multiple simultaneous second-price auctions. Previous research has shown that for such a setting it is optimal to bid strictly positive in all available auctions even if only a single item is required. In this paper we investigate how the bidding strategy changes when the bidder is financially constrained such that its exposure (i.e. the sum of its bids) is limited. We prove (in the case of two auctions) that when the financial constraint is equal or less than the buyer’s valuation it is typically optimal to participate in a single auction. We also find that the optimal strategy changes fundamentally if budget constraints are introduced. In particular whereas without budget contraints in many cases the problem of finding the optimal strategy reduces to two dimensions this is no longer the case if the bids are constrained. Finding the optimal policy thus becomes much more involved.,nicholas jennings,Not available,2008.0,10.1007/978-3-540-77554-6_14,Negotiation Auctions and Market Engineering,K.2008,False,,Springer,Not available,Optimal Financially Constrained Bidding in Multiple Simultaneous Auctions,38fcb56216c84fdbac64eb51d53efea8,http://dx.doi.org/10.1007/978-3-540-77554-6_14 1871,We study the following online problem: at each time unit one of ,richard cole,Not available,2008.0,10.1007/978-3-540-79309-0_16,Algorithmic Game Theory,Richard2008,False,,Springer,Not available,Prompt Mechanisms for Online Auctions,54c1a0987f5e6f3117ae3ec871c693f3,http://dx.doi.org/10.1007/978-3-540-79309-0_16 1872,We study the following online problem: at each time unit one of ,shahar dobzinski,Not available,2008.0,10.1007/978-3-540-79309-0_16,Algorithmic Game Theory,Richard2008,False,,Springer,Not available,Prompt Mechanisms for Online Auctions,54c1a0987f5e6f3117ae3ec871c693f3,http://dx.doi.org/10.1007/978-3-540-79309-0_16 1873,We study the following online problem: at each time unit one of ,lisa fleischer,Not available,2008.0,10.1007/978-3-540-79309-0_16,Algorithmic Game Theory,Richard2008,False,,Springer,Not available,Prompt Mechanisms for Online Auctions,54c1a0987f5e6f3117ae3ec871c693f3,http://dx.doi.org/10.1007/978-3-540-79309-0_16 1874,"The recent renaissance of internet and web based businesses for consumers raises the question whether there are similar prospects for b-2-b e-business solutions. At the end of the 1990s online reverse auctions were proposed as a powerful tool to improve the performance of corporate procurement. However as many of the promises of the e-Business world failed to materialize the issue received only little attention during the last years. Hence it is not known what kind of role reverse auctions play and what kind of auction designs are used in practice. For this reason the following article tries to answer three questions regarding the actual use of auctions in corporate procurement: ",tilman eichstadt,Not available,2008.0,10.1007/978-3-540-77554-6_4,Negotiation Auctions and Market Engineering,Tilman2008,False,,Springer,Not available,Applying Auction Theory to Procurement Auctions – An Empirical Study Among German Corporations,52564892d8b68a02515c829430fd4af1,http://dx.doi.org/10.1007/978-3-540-77554-6_4 1875,Sequential and simultaneous auctions are two important mechanisms for buying and selling multiple objects. The bidding behaviour for the former differs from the latter. Given this a key problem is to find the equilibrium bidding strategies for these two mechanisms. To this end we analyse the bidding behaviour for the following scenario. There are multiple objects for sale each object is sold in a separate auction and each bidder needs only one object. Furthermore each object has both common and private value components and bidders are ,shaheen fatima,Not available,2008.0,10.1007/978-3-540-77554-6_15,Negotiation Auctions and Market Engineering,S.2008,False,,Springer,Not available,Bidding Strategies for Multi-object Auctions,0aed1c4ae1fe1a2e4b2bb511cffe6c65,http://dx.doi.org/10.1007/978-3-540-77554-6_15 1876,The increased use of online market places (like eBay) by professional traders and small businesses goes along with an increase in demand for online multi-unit auction designs. A seller with many objects for sale might consider it inconvenient to initiate and monitor a single auction for each individual item and thus might favour the use of a multi-unit auction. However the design of online multi-unit auctions can be sub-stantially more difficult than that of single-unit auctions. In fact the theoretical as well as empirical literature on multi-unit auctions is much less developed. New difficulties such as market power and computational complexities arise when objects are heterogeneous or bidders demand multiple items. In addition there is a conflict between simplicity of auction rules and their efficiency (and revenue). If objects for sale are complements to obtain the optimal performance (at least from a theoretical point of view) the auction design usually requires that bidders specify their preferences on any possible package of the N objects. Thus each bidder has to submit 2,thomas kittsteiner,Not available,2008.0,10.1007/978-3-540-77554-6_5,Negotiation Auctions and Market Engineering,Thomas2008,False,,Springer,Not available,On the Design of Simple Multi-unit Online Auctions,d41ca47af945335f7edafb98c00ef8f1,http://dx.doi.org/10.1007/978-3-540-77554-6_5 1877,The increased use of online market places (like eBay) by professional traders and small businesses goes along with an increase in demand for online multi-unit auction designs. A seller with many objects for sale might consider it inconvenient to initiate and monitor a single auction for each individual item and thus might favour the use of a multi-unit auction. However the design of online multi-unit auctions can be sub-stantially more difficult than that of single-unit auctions. In fact the theoretical as well as empirical literature on multi-unit auctions is much less developed. New difficulties such as market power and computational complexities arise when objects are heterogeneous or bidders demand multiple items. In addition there is a conflict between simplicity of auction rules and their efficiency (and revenue). If objects for sale are complements to obtain the optimal performance (at least from a theoretical point of view) the auction design usually requires that bidders specify their preferences on any possible package of the N objects. Thus each bidder has to submit 2,axel ockenfels,Not available,2008.0,10.1007/978-3-540-77554-6_5,Negotiation Auctions and Market Engineering,Thomas2008,False,,Springer,Not available,On the Design of Simple Multi-unit Online Auctions,d41ca47af945335f7edafb98c00ef8f1,http://dx.doi.org/10.1007/978-3-540-77554-6_5 1878,When there are two bidders releasing independent information in an English auction with private values makes the seller worse off. However this is no longer true with more bidders: when there is enough competition revelation benefits the auctioneer. In three examples the dividing case is shown to be three bidders. This allocation effect applies to other standard auctions and parallels the bundling decision in a multi-unit auction.,simon board,Not available,2009.0,10.1007/s00199-006-0177-4,Economic Theory,Simon2009,False,,Springer,Not available,Revealing information in auctions: the allocation effect,973be16828555b7ba83e8e905530297f,http://dx.doi.org/10.1007/s00199-006-0177-4 1879,Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents capable of competing in multi-agent auction markets by introducing both a formal and a more pragmatical approach to the design of bidding strategies for buyer agents in auction-based tournaments. Our formal view relies on possibilistic-based decision theory as the means of handling possibilistic uncertainty on the consequences of actions (bids) due to the lack of knowledge about the other agents’ behaviour. For practical reasons we propose a two-fold method for decision making that does not require the evaluation of the whole set of alternative actions. This approach utilizes global (market-centered) information in a first step to come up with an initial set of potential bids. This set is subsequently refined in a second step by means of the possibilisitic decision model using individual (rival agent centered) information induced from a memory of cases composing the history of tournaments.,pere garcia,Not available,1999.0,10.1007/3-540-48835-9_9,Agent Mediated Electronic Commerce,Pere1999,False,,Springer,Not available,Bidding Strategies for Trading Agents in Auction-Based Tournaments,768328a71ae8d46bea3e0737a3b0371c,http://dx.doi.org/10.1007/3-540-48835-9_9 1880,Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first-price auction which does not realistically model the Generalized Second Price (GSP) auction used in practice. Towards the goal of more realistically modeling these auctions we introduce the ,yossi azar,Not available,2009.0,10.1007/978-3-642-04128-0_14,Algorithms - ESA 2009,Yossi2009,False,,Springer,Not available,On Revenue Maximization in Second-Price Ad Auctions,01be716509789260ce2d04da594f1686,http://dx.doi.org/10.1007/978-3-642-04128-0_14 1881,Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first-price auction which does not realistically model the Generalized Second Price (GSP) auction used in practice. Towards the goal of more realistically modeling these auctions we introduce the ,benjamin birnbaum,Not available,2009.0,10.1007/978-3-642-04128-0_14,Algorithms - ESA 2009,Yossi2009,False,,Springer,Not available,On Revenue Maximization in Second-Price Ad Auctions,01be716509789260ce2d04da594f1686,http://dx.doi.org/10.1007/978-3-642-04128-0_14 1882,Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first-price auction which does not realistically model the Generalized Second Price (GSP) auction used in practice. Towards the goal of more realistically modeling these auctions we introduce the ,anna karlin,Not available,2009.0,10.1007/978-3-642-04128-0_14,Algorithms - ESA 2009,Yossi2009,False,,Springer,Not available,On Revenue Maximization in Second-Price Ad Auctions,01be716509789260ce2d04da594f1686,http://dx.doi.org/10.1007/978-3-642-04128-0_14 1883,Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first-price auction which does not realistically model the Generalized Second Price (GSP) auction used in practice. Towards the goal of more realistically modeling these auctions we introduce the ,c. nguyen,Not available,2009.0,10.1007/978-3-642-04128-0_14,Algorithms - ESA 2009,Yossi2009,False,,Springer,Not available,On Revenue Maximization in Second-Price Ad Auctions,01be716509789260ce2d04da594f1686,http://dx.doi.org/10.1007/978-3-642-04128-0_14 1884,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,ivan mezei,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 1885,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,veljko malbasa,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 1886,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,ivan stojmenovic,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 1887,This paper presents a software bidding agent that inserts fake bids on the seller’s behalf to inflate an auction’s price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent’s ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.,jarrod trevathan,Not available,2009.0,10.1007/978-3-540-88653-2_4,E-business and Telecommunications,Jarrod2009,False,,Springer,Not available,Bidding Agents That Perpetrate Auction Fraud,e86deaf23a99bcfbab7dff49c7b066d1,http://dx.doi.org/10.1007/978-3-540-88653-2_4 1888,This paper presents a software bidding agent that inserts fake bids on the seller’s behalf to inflate an auction’s price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent’s ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.,alan mccabe,Not available,2009.0,10.1007/978-3-540-88653-2_4,E-business and Telecommunications,Jarrod2009,False,,Springer,Not available,Bidding Agents That Perpetrate Auction Fraud,e86deaf23a99bcfbab7dff49c7b066d1,http://dx.doi.org/10.1007/978-3-540-88653-2_4 1889,This paper presents a software bidding agent that inserts fake bids on the seller’s behalf to inflate an auction’s price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent’s ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.,wayne read,Not available,2009.0,10.1007/978-3-540-88653-2_4,E-business and Telecommunications,Jarrod2009,False,,Springer,Not available,Bidding Agents That Perpetrate Auction Fraud,e86deaf23a99bcfbab7dff49c7b066d1,http://dx.doi.org/10.1007/978-3-540-88653-2_4 1890, Most of the literature on auctions with endogenous entry assumes that in equilibrium the number of entrants is deterministic. We discuss a series of experiments designed to test the alternative hypothesis that even in equilibrium the number of entrants is stochastic. This distinction has strong implications for auction performance the design of optimal mechanisms and social welfare. Our results strongly reject the hypothesis of deterministic entry and tend to confirm the alternative hypothesis that entry is stochastic.,dan levin,Not available,2002.0,10.1007/s001820100083,International Journal of Game Theory,L.2002,False,,Springer,Not available,Entry coordination in auctions and social welfare: An experimental investigation,d76cb9f0461ffcaec7782bd849806866,http://dx.doi.org/10.1007/s001820100083 1891,Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents capable of competing in multi-agent auction markets by introducing both a formal and a more pragmatical approach to the design of bidding strategies for buyer agents in auction-based tournaments. Our formal view relies on possibilistic-based decision theory as the means of handling possibilistic uncertainty on the consequences of actions (bids) due to the lack of knowledge about the other agents’ behaviour. For practical reasons we propose a two-fold method for decision making that does not require the evaluation of the whole set of alternative actions. This approach utilizes global (market-centered) information in a first step to come up with an initial set of potential bids. This set is subsequently refined in a second step by means of the possibilisitic decision model using individual (rival agent centered) information induced from a memory of cases composing the history of tournaments.,eduard gimenez,Not available,1999.0,10.1007/3-540-48835-9_9,Agent Mediated Electronic Commerce,Pere1999,False,,Springer,Not available,Bidding Strategies for Trading Agents in Auction-Based Tournaments,768328a71ae8d46bea3e0737a3b0371c,http://dx.doi.org/10.1007/3-540-48835-9_9 1892,The goal of this paper is to compare results for discriminatory auctions to results for uniform-price auctions when suppliers have capacity constraints. We have a pretty good understanding of what equilibrium results look like for the uniform-price auctions. But an unresolved problem is what happens when a discriminative auction is run and suppliers have capacity constraints. We formulate a supply function equilibrium model in continuous offer schedules with inelastic time-varying demand and with single-step marginal cost function to compare two auction institutions in the presence of capacity constraints. We show that payments made to the suppliers in the unique equilibrium of the discriminatory auction can be less than the payments in the uniform-price auction depending on which uniform-price auction equilibrium is selected. For the high demand and/or low excess capacity cases we characterize also mixed strategy supply function equilibrium under the discriminatory auction.,t. genc,Not available,2009.0,10.1007/s10957-008-9437-8,Journal of Optimization Theory and Applications,S.2009,False,,Springer,Not available,Discriminatory Versus Uniform-Price Electricity Auctions with Supply Function Equilibrium,9bd8827f5082ace8888976afc10e3132,http://dx.doi.org/10.1007/s10957-008-9437-8 1893,We investigate tradeoffs among expressiveness operational cost and economic efficiency for a class of multiattribute double-auction markets. To enable polynomial-time clearing and information feedback operations we restrict the bidding language to a form of multiattribute OR-of-XOR expressions. We then consider implications of this restriction in environments where bidders’ preferences lie within a strictly larger class that of complement-free valuations. Using valuations derived from a supply chain scenario we show that an iterative bidding protocol can overcome the limitations of this language restriction. We further introduce a metric characterizing the degree to which valuations violate the substitutes condition theoretically known to guarantee efficiency and present experimental evidence that the actual efficiency loss is proportional to this metric.,kevin lochner,Not available,2009.0,10.1007/978-3-642-03821-1_6,Auctions Market Mechanisms and Their Applications,M.2009,False,,Springer,Not available,Information Feedback and Efficiency in Multiattribute Double Auctions,08b5d34deeedae9d368b66f9faf52aa6,http://dx.doi.org/10.1007/978-3-642-03821-1_6 1894,We investigate tradeoffs among expressiveness operational cost and economic efficiency for a class of multiattribute double-auction markets. To enable polynomial-time clearing and information feedback operations we restrict the bidding language to a form of multiattribute OR-of-XOR expressions. We then consider implications of this restriction in environments where bidders’ preferences lie within a strictly larger class that of complement-free valuations. Using valuations derived from a supply chain scenario we show that an iterative bidding protocol can overcome the limitations of this language restriction. We further introduce a metric characterizing the degree to which valuations violate the substitutes condition theoretically known to guarantee efficiency and present experimental evidence that the actual efficiency loss is proportional to this metric.,michael wellman,Not available,2009.0,10.1007/978-3-642-03821-1_6,Auctions Market Mechanisms and Their Applications,M.2009,False,,Springer,Not available,Information Feedback and Efficiency in Multiattribute Double Auctions,08b5d34deeedae9d368b66f9faf52aa6,http://dx.doi.org/10.1007/978-3-642-03821-1_6 1895,Most sponsored search auctions use the ,esteban feuerstein,Not available,2009.0,10.1007/978-3-642-02158-9_17,Algorithmic Aspects in Information and Management,Esteban2009,False,,Springer,Not available,Optimal Auctions Capturing Constraints in Sponsored Search,1b28fc728f33beae964330102924c796,http://dx.doi.org/10.1007/978-3-642-02158-9_17 1896,Most sponsored search auctions use the ,pablo heiber,Not available,2009.0,10.1007/978-3-642-02158-9_17,Algorithmic Aspects in Information and Management,Esteban2009,False,,Springer,Not available,Optimal Auctions Capturing Constraints in Sponsored Search,1b28fc728f33beae964330102924c796,http://dx.doi.org/10.1007/978-3-642-02158-9_17 1897,Most sponsored search auctions use the ,matias lopez-rosenfeld,Not available,2009.0,10.1007/978-3-642-02158-9_17,Algorithmic Aspects in Information and Management,Esteban2009,False,,Springer,Not available,Optimal Auctions Capturing Constraints in Sponsored Search,1b28fc728f33beae964330102924c796,http://dx.doi.org/10.1007/978-3-642-02158-9_17 1898,Most sponsored search auctions use the ,marcelo mydlarz,Not available,2009.0,10.1007/978-3-642-02158-9_17,Algorithmic Aspects in Information and Management,Esteban2009,False,,Springer,Not available,Optimal Auctions Capturing Constraints in Sponsored Search,1b28fc728f33beae964330102924c796,http://dx.doi.org/10.1007/978-3-642-02158-9_17 1899,We improve the best known competitive ratio (from 1/4 to 1/2) for the online multi-unit allocation problem where the objective is to maximize the single-price revenue. Moreover the competitive ratio of our algorithm tends to 1 as the bid-profile tends to “smoothen”. This algorithm is used as a subroutine in designing truthful auctions for the same setting: the allocation has to be done online while the payments can be decided at the end of the day. Earlier a reduction from the auction design problem to the allocation problem was known only for the unit-demand case. We give a reduction for the general case when the bidders have decreasing marginal utilities. The problem is inspired by sponsored search auctions.,sourav chakraborty,Not available,2009.0,10.1007/978-3-642-10841-9_9,Internet and Network Economics,Sourav2009,False,,Springer,Not available,An Online Multi-unit Auction with Improved Competitive Ratio,3d5d73e975dbf5928e2eff02bf746d25,http://dx.doi.org/10.1007/978-3-642-10841-9_9 1900,We improve the best known competitive ratio (from 1/4 to 1/2) for the online multi-unit allocation problem where the objective is to maximize the single-price revenue. Moreover the competitive ratio of our algorithm tends to 1 as the bid-profile tends to “smoothen”. This algorithm is used as a subroutine in designing truthful auctions for the same setting: the allocation has to be done online while the payments can be decided at the end of the day. Earlier a reduction from the auction design problem to the allocation problem was known only for the unit-demand case. We give a reduction for the general case when the bidders have decreasing marginal utilities. The problem is inspired by sponsored search auctions.,nikhil devanur,Not available,2009.0,10.1007/978-3-642-10841-9_9,Internet and Network Economics,Sourav2009,False,,Springer,Not available,An Online Multi-unit Auction with Improved Competitive Ratio,3d5d73e975dbf5928e2eff02bf746d25,http://dx.doi.org/10.1007/978-3-642-10841-9_9 1901,The value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) might depend on who else is shown in the other sponsored positions. To empirically evaluate this claim we develop a model of ordered search applied to keyword advertising in which users browse slots from the top to the bottom of the sponsored list and make their clicking decisions slot by slot. Our contribution is twofold: first we use impression and click data from Microsoft Live to estimate the ordered search model. With these estimates in hand we are able to assess how the click-through rate of an ad is affected by the user’s click history and by the other competing links. Our dataset suggests that externality effects are indeed economically and statistically significant. Second we study Nash equilibria of the Generalized Second Price Auction (GSP) and characterize the scoring rule that produces greatest profits in a complete information setting.,renato gomes,Not available,2009.0,10.1007/978-3-642-10841-9_17,Internet and Network Economics,Renato2009,False,,Springer,Not available,Externalities in Keyword Auctions: An Empirical and Theoretical Assessment,c9f063feb62b19fcfe711a2eea4def99,http://dx.doi.org/10.1007/978-3-642-10841-9_17 1902,Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents capable of competing in multi-agent auction markets by introducing both a formal and a more pragmatical approach to the design of bidding strategies for buyer agents in auction-based tournaments. Our formal view relies on possibilistic-based decision theory as the means of handling possibilistic uncertainty on the consequences of actions (bids) due to the lack of knowledge about the other agents’ behaviour. For practical reasons we propose a two-fold method for decision making that does not require the evaluation of the whole set of alternative actions. This approach utilizes global (market-centered) information in a first step to come up with an initial set of potential bids. This set is subsequently refined in a second step by means of the possibilisitic decision model using individual (rival agent centered) information induced from a memory of cases composing the history of tournaments.,lluis godo,Not available,1999.0,10.1007/3-540-48835-9_9,Agent Mediated Electronic Commerce,Pere1999,False,,Springer,Not available,Bidding Strategies for Trading Agents in Auction-Based Tournaments,768328a71ae8d46bea3e0737a3b0371c,http://dx.doi.org/10.1007/3-540-48835-9_9 1903,The value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) might depend on who else is shown in the other sponsored positions. To empirically evaluate this claim we develop a model of ordered search applied to keyword advertising in which users browse slots from the top to the bottom of the sponsored list and make their clicking decisions slot by slot. Our contribution is twofold: first we use impression and click data from Microsoft Live to estimate the ordered search model. With these estimates in hand we are able to assess how the click-through rate of an ad is affected by the user’s click history and by the other competing links. Our dataset suggests that externality effects are indeed economically and statistically significant. Second we study Nash equilibria of the Generalized Second Price Auction (GSP) and characterize the scoring rule that produces greatest profits in a complete information setting.,nicole immorlica,Not available,2009.0,10.1007/978-3-642-10841-9_17,Internet and Network Economics,Renato2009,False,,Springer,Not available,Externalities in Keyword Auctions: An Empirical and Theoretical Assessment,c9f063feb62b19fcfe711a2eea4def99,http://dx.doi.org/10.1007/978-3-642-10841-9_17 1904,The value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) might depend on who else is shown in the other sponsored positions. To empirically evaluate this claim we develop a model of ordered search applied to keyword advertising in which users browse slots from the top to the bottom of the sponsored list and make their clicking decisions slot by slot. Our contribution is twofold: first we use impression and click data from Microsoft Live to estimate the ordered search model. With these estimates in hand we are able to assess how the click-through rate of an ad is affected by the user’s click history and by the other competing links. Our dataset suggests that externality effects are indeed economically and statistically significant. Second we study Nash equilibria of the Generalized Second Price Auction (GSP) and characterize the scoring rule that produces greatest profits in a complete information setting.,evangelos markakis,Not available,2009.0,10.1007/978-3-642-10841-9_17,Internet and Network Economics,Renato2009,False,,Springer,Not available,Externalities in Keyword Auctions: An Empirical and Theoretical Assessment,c9f063feb62b19fcfe711a2eea4def99,http://dx.doi.org/10.1007/978-3-642-10841-9_17 1905,In sponsored search auctions advertisers typically pay a fixed amount per click that their advertisements receive. In particular the advertiser and the publisher enter into a contract (e.g. the publisher displays the ad; the advertiser pays the publisher 10 cents per click) and each party’s subjective value for such a contract depends on their estimated click-through rates (CTR) for the ad. Starting from this motivating example we define and analyze a class of contract auctions that generalize the classical second price auction. As an application we introduce impression-plus-click pricing for sponsored search in which advertisers pay a fixed amount per impression plus an additional amount if their ad is clicked. Of note when the advertiser’s estimated CTR is higher than the publisher’s estimated CTR both parties find negative click payments advantageous where the advertiser pays the publisher a premium for the impression but the publisher then pays the advertiser per click.,sharad goel,Not available,2009.0,10.1007/978-3-642-10841-9_19,Internet and Network Economics,Sharad2009,False,,Springer,Not available,Contract Auctions for Sponsored Search,e0abb4a80e6ecb267d5c5e9cfe84d75c,http://dx.doi.org/10.1007/978-3-642-10841-9_19 1906,In sponsored search auctions advertisers typically pay a fixed amount per click that their advertisements receive. In particular the advertiser and the publisher enter into a contract (e.g. the publisher displays the ad; the advertiser pays the publisher 10 cents per click) and each party’s subjective value for such a contract depends on their estimated click-through rates (CTR) for the ad. Starting from this motivating example we define and analyze a class of contract auctions that generalize the classical second price auction. As an application we introduce impression-plus-click pricing for sponsored search in which advertisers pay a fixed amount per impression plus an additional amount if their ad is clicked. Of note when the advertiser’s estimated CTR is higher than the publisher’s estimated CTR both parties find negative click payments advantageous where the advertiser pays the publisher a premium for the impression but the publisher then pays the advertiser per click.,sebastien lahaie,Not available,2009.0,10.1007/978-3-642-10841-9_19,Internet and Network Economics,Sharad2009,False,,Springer,Not available,Contract Auctions for Sponsored Search,e0abb4a80e6ecb267d5c5e9cfe84d75c,http://dx.doi.org/10.1007/978-3-642-10841-9_19 1907,In sponsored search auctions advertisers typically pay a fixed amount per click that their advertisements receive. In particular the advertiser and the publisher enter into a contract (e.g. the publisher displays the ad; the advertiser pays the publisher 10 cents per click) and each party’s subjective value for such a contract depends on their estimated click-through rates (CTR) for the ad. Starting from this motivating example we define and analyze a class of contract auctions that generalize the classical second price auction. As an application we introduce impression-plus-click pricing for sponsored search in which advertisers pay a fixed amount per impression plus an additional amount if their ad is clicked. Of note when the advertiser’s estimated CTR is higher than the publisher’s estimated CTR both parties find negative click payments advantageous where the advertiser pays the publisher a premium for the impression but the publisher then pays the advertiser per click.,sergei vassilvitskii,Not available,2009.0,10.1007/978-3-642-10841-9_19,Internet and Network Economics,Sharad2009,False,,Springer,Not available,Contract Auctions for Sponsored Search,e0abb4a80e6ecb267d5c5e9cfe84d75c,http://dx.doi.org/10.1007/978-3-642-10841-9_19 1908,Antitrust authorities have imposed firewalls between the previously separate divisions of newly vertically integrated firms in several industries to address concerns that access to horizontal rivals’ proprietary information may reduce competition. This paper evaluates a specific antitrust concern by modeling the price effect of one seller’s learning its rival’s production costs before bidding in a duopoly procurement contest. The results show that imposing a firewall as a condition for permitting a vertical merger actually can lead to higher prices than if the flow of information were unimpeded and they provide guidance as to when this unintended outcome occurs.,charles thomas,Not available,2011.0,10.1007/s11151-011-9282-z,Review of Industrial Organization,J.2011,False,,Springer,Not available,The Price Effects of Using Firewalls as an Antitrust Remedy,7c0720e8da6fe91abfc7e2fd09742e72,http://dx.doi.org/10.1007/s11151-011-9282-z 1909,We investigate the incentives for investments in capacity in a simple strategic dynamic model with random demand growth. We construct non-collusive Markovian equilibria where the firms’ decisions depend on the current capacity stock only. The firms maintain small reserve margins and high market prices and extract large rents. In some equilibria rationing occurs with positive probability so the market mechanism does not ensure ‘security of supply’. Usually the price cap reflects the value of lost energy or lost load (VOLL) that consumers place on severely reducing consumption on short notice. Our analysis identifies a minimum price cap unrelated to the VOLL that allows the firms to recoup their investment and production costs in equilibrium. However raising the price cap above this minimum increases market prices and reduces consumer surplus without affecting the level of investment.,alfredo garcia,Not available,2011.0,10.1007/s00199-009-0508-3,Economic Theory,Alfredo2011,False,,Springer,Not available,Investment dynamics in electricity markets,1f490ac501e8663cc4819921f2a2e6f3,http://dx.doi.org/10.1007/s00199-009-0508-3 1910,We investigate the incentives for investments in capacity in a simple strategic dynamic model with random demand growth. We construct non-collusive Markovian equilibria where the firms’ decisions depend on the current capacity stock only. The firms maintain small reserve margins and high market prices and extract large rents. In some equilibria rationing occurs with positive probability so the market mechanism does not ensure ‘security of supply’. Usually the price cap reflects the value of lost energy or lost load (VOLL) that consumers place on severely reducing consumption on short notice. Our analysis identifies a minimum price cap unrelated to the VOLL that allows the firms to recoup their investment and production costs in equilibrium. However raising the price cap above this minimum increases market prices and reduces consumer surplus without affecting the level of investment.,ennio stacchetti,Not available,2011.0,10.1007/s00199-009-0508-3,Economic Theory,Alfredo2011,False,,Springer,Not available,Investment dynamics in electricity markets,1f490ac501e8663cc4819921f2a2e6f3,http://dx.doi.org/10.1007/s00199-009-0508-3 1911,Online auctions for perishable products have tremendous potentials. However the current forms of online auctions do not take full advantages of information technology enabled online auctions and are ineffective for online auctions for perishable products. This study proposes a virtual competition auction model for perishable products. In virtual competition auctions the bidder is provided with auction historical data and the bidder’s decision is represented by a demand curve that is composed of a series of bids. A preliminary laboratory experiment based on a prototype of virtual competition auction system is reported. The preliminary laboratory experiment result shows that the virtual competition auction model for perishable products is more effective than the ordinary open-cry auction model.,shouhong wang,Not available,2011.0,10.1007/s12525-011-0049-z,Electronic Markets,Shouhong2011,False,,Springer,Not available,A virtual competition auction model for perishable products,caa856067dd46cfc21e753600f22cd32,http://dx.doi.org/10.1007/s12525-011-0049-z 1912,Online auctions for perishable products have tremendous potentials. However the current forms of online auctions do not take full advantages of information technology enabled online auctions and are ineffective for online auctions for perishable products. This study proposes a virtual competition auction model for perishable products. In virtual competition auctions the bidder is provided with auction historical data and the bidder’s decision is represented by a demand curve that is composed of a series of bids. A preliminary laboratory experiment based on a prototype of virtual competition auction system is reported. The preliminary laboratory experiment result shows that the virtual competition auction model for perishable products is more effective than the ordinary open-cry auction model.,hai wang,Not available,2011.0,10.1007/s12525-011-0049-z,Electronic Markets,Shouhong2011,False,,Springer,Not available,A virtual competition auction model for perishable products,caa856067dd46cfc21e753600f22cd32,http://dx.doi.org/10.1007/s12525-011-0049-z 1913,Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents capable of competing in multi-agent auction markets by introducing both a formal and a more pragmatical approach to the design of bidding strategies for buyer agents in auction-based tournaments. Our formal view relies on possibilistic-based decision theory as the means of handling possibilistic uncertainty on the consequences of actions (bids) due to the lack of knowledge about the other agents’ behaviour. For practical reasons we propose a two-fold method for decision making that does not require the evaluation of the whole set of alternative actions. This approach utilizes global (market-centered) information in a first step to come up with an initial set of potential bids. This set is subsequently refined in a second step by means of the possibilisitic decision model using individual (rival agent centered) information induced from a memory of cases composing the history of tournaments.,juan rodriguez-aguilar,Not available,1999.0,10.1007/3-540-48835-9_9,Agent Mediated Electronic Commerce,Pere1999,False,,Springer,Not available,Bidding Strategies for Trading Agents in Auction-Based Tournaments,768328a71ae8d46bea3e0737a3b0371c,http://dx.doi.org/10.1007/3-540-48835-9_9 1914,Recent deregulation of the banking sector in the US and in Europe allows commercial banks to hold equity in non-financial firms. We develop a model to investigate the effects of bank equity stakes in firms on credit market competition. The main result is that an equity stake confers a competitive advantage to the holding bank which in equilibrium results in decreased competition in credit markets and higher interest rates being charged to firms. However regulatory limits on the size of a bank’s stake may under certain conditions be counterproductive: they could actually strengthen the equity-owning bank’s competitive advantage. Our findings shed new light on the role of equity in lending relationships and highlight that in addition to the well-known prudential aspects there is an antitrust dimension in the separation of banking and commerce.,rabah amir,Not available,2011.0,10.1007/s10436-010-0169-z,Annals of Finance,Rabah2011,False,,Springer,Not available,On the effects of banks’ equity ownership on credit markets,72c09ba95d588035f3a141d822c4bd84,http://dx.doi.org/10.1007/s10436-010-0169-z 1915,Recent deregulation of the banking sector in the US and in Europe allows commercial banks to hold equity in non-financial firms. We develop a model to investigate the effects of bank equity stakes in firms on credit market competition. The main result is that an equity stake confers a competitive advantage to the holding bank which in equilibrium results in decreased competition in credit markets and higher interest rates being charged to firms. However regulatory limits on the size of a bank’s stake may under certain conditions be counterproductive: they could actually strengthen the equity-owning bank’s competitive advantage. Our findings shed new light on the role of equity in lending relationships and highlight that in addition to the well-known prudential aspects there is an antitrust dimension in the separation of banking and commerce.,michael troege,Not available,2011.0,10.1007/s10436-010-0169-z,Annals of Finance,Rabah2011,False,,Springer,Not available,On the effects of banks’ equity ownership on credit markets,72c09ba95d588035f3a141d822c4bd84,http://dx.doi.org/10.1007/s10436-010-0169-z 1916,The revenue between Dutch auction American auction and hybrid auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China’s treasury auction market to examine the revenue between Dutch auction American auction and hybrid auction. The paper has three important conclusions and the hybrid auction can prevent the winner’s course and collusion. It is the better treasury auction format for the seller.,yanping bai,Not available,2011.0,10.1007/978-3-642-23020-2_19,Advances in Applied Economics Business and Development,Yanping2011,False,,Springer,Not available,Empirical Study of Treasury Auction Formats,32c57361b22ce0a6a80692632817eac6,http://dx.doi.org/10.1007/978-3-642-23020-2_19 1917,The revenue between Dutch auction American auction and hybrid auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China’s treasury auction market to examine the revenue between Dutch auction American auction and hybrid auction. The paper has three important conclusions and the hybrid auction can prevent the winner’s course and collusion. It is the better treasury auction format for the seller.,yu zhang,Not available,2011.0,10.1007/978-3-642-23020-2_19,Advances in Applied Economics Business and Development,Yanping2011,False,,Springer,Not available,Empirical Study of Treasury Auction Formats,32c57361b22ce0a6a80692632817eac6,http://dx.doi.org/10.1007/978-3-642-23020-2_19 1918,A game theoretic method called the first price sealed auction game was introduced to control routing overhead in wireless sensor networks in this paper. The players of the game are the wireless nodes with set of strategies (forward or not). The game is played whenever an arbitrary node in the network forwards packets. In order for the game to function a multi-stage pricing game model is established this provides the probability that the wireless nodes forward the receiving packets and the payoff of all nodes can be optimize through choosing the best neighbour node. The simulations in NS2 showed that the pricing routing game model improves performance not only decreasing the energy consumption but also prolonging network life time. Finally the numerical analysis about nodes’ payoff is given through Matlab.,qun liu,Not available,2011.0,10.1007/978-3-642-21524-7_25,Advances in Swarm Intelligence,Qun2011,False,,Springer,Not available,Game Theoretic Approach in Routing Protocol for Cooperative Wireless Sensor Networks,3adc06fd37a2fe8281180ac72bcb05a9,http://dx.doi.org/10.1007/978-3-642-21524-7_25 1919,A game theoretic method called the first price sealed auction game was introduced to control routing overhead in wireless sensor networks in this paper. The players of the game are the wireless nodes with set of strategies (forward or not). The game is played whenever an arbitrary node in the network forwards packets. In order for the game to function a multi-stage pricing game model is established this provides the probability that the wireless nodes forward the receiving packets and the payoff of all nodes can be optimize through choosing the best neighbour node. The simulations in NS2 showed that the pricing routing game model improves performance not only decreasing the energy consumption but also prolonging network life time. Finally the numerical analysis about nodes’ payoff is given through Matlab.,xingping xian,Not available,2011.0,10.1007/978-3-642-21524-7_25,Advances in Swarm Intelligence,Qun2011,False,,Springer,Not available,Game Theoretic Approach in Routing Protocol for Cooperative Wireless Sensor Networks,3adc06fd37a2fe8281180ac72bcb05a9,http://dx.doi.org/10.1007/978-3-642-21524-7_25 1920,A game theoretic method called the first price sealed auction game was introduced to control routing overhead in wireless sensor networks in this paper. The players of the game are the wireless nodes with set of strategies (forward or not). The game is played whenever an arbitrary node in the network forwards packets. In order for the game to function a multi-stage pricing game model is established this provides the probability that the wireless nodes forward the receiving packets and the payoff of all nodes can be optimize through choosing the best neighbour node. The simulations in NS2 showed that the pricing routing game model improves performance not only decreasing the energy consumption but also prolonging network life time. Finally the numerical analysis about nodes’ payoff is given through Matlab.,tao wu,Not available,2011.0,10.1007/978-3-642-21524-7_25,Advances in Swarm Intelligence,Qun2011,False,,Springer,Not available,Game Theoretic Approach in Routing Protocol for Cooperative Wireless Sensor Networks,3adc06fd37a2fe8281180ac72bcb05a9,http://dx.doi.org/10.1007/978-3-642-21524-7_25 1921,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,atakelty hailu,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 1922,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,john rolfe,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 1923,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,jill windle,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 1924,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,david parkes,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 1925,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,romy greiner,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 1926,In recent years Internet auctions have become increasingly widespread. The Independent Private Values (IPV) model is widely used in the studying of auction behaviour and plays a fundamental role in many analyses of Internet auction performance. This model assumes privacy and independence meaning that the private values of buyers are drawn from a common distribution or in probabilistic terms the series of values are independent and identically distributed. Since a general stochastic analysis is intractable the IPV model has a significant impact on auction behaviour. In this paper we study auction performance using an auction process simulator considering both the hard close and soft close types of Internet auctions. From our experimental findings we are able to establish quantitative relationships between the different auction process parameters and also to deploy suitable IPV distributions in modelling the characteristics of different communities of bidders.,timothy leung,Not available,2011.0,10.1007/978-3-642-22603-8_21,Digital Enterprise and Information Systems,Timothy2011,False,,Springer,Not available,The Effect of Private Valuation on E-Auction Revenues,16d0609e423ba86d1556d77af0cd32e7,http://dx.doi.org/10.1007/978-3-642-22603-8_21 1927,In recent years Internet auctions have become increasingly widespread. The Independent Private Values (IPV) model is widely used in the studying of auction behaviour and plays a fundamental role in many analyses of Internet auction performance. This model assumes privacy and independence meaning that the private values of buyers are drawn from a common distribution or in probabilistic terms the series of values are independent and identically distributed. Since a general stochastic analysis is intractable the IPV model has a significant impact on auction behaviour. In this paper we study auction performance using an auction process simulator considering both the hard close and soft close types of Internet auctions. From our experimental findings we are able to establish quantitative relationships between the different auction process parameters and also to deploy suitable IPV distributions in modelling the characteristics of different communities of bidders.,william knottenbelt,Not available,2011.0,10.1007/978-3-642-22603-8_21,Digital Enterprise and Information Systems,Timothy2011,False,,Springer,Not available,The Effect of Private Valuation on E-Auction Revenues,16d0609e423ba86d1556d77af0cd32e7,http://dx.doi.org/10.1007/978-3-642-22603-8_21 1928,We consider a simple network model for economic agents where each can buy commodities in the neighborhood. Their prices may be initially distinct in any node. However by assuming some rules on new prices we show that the distinct prices will converge to unique by iterating buy and sell operations. First we present a protocol model in which each agent always bids an arbitrary price in the difference between his own price and the lowest price in the neighborhood called max price difference. Next we derive the condition that price stabilization occurs in our model. Furthermore we consider game (auction) theoretic price determination by assuming that each agent’s value is uniformly distributed over the max price difference. Finally we perform a simulation experiment. Our model is suitable for investigating the effects of network topologies on price stabilization.,jun kiniwa,Not available,2011.0,10.1007/978-3-642-24550-3_22,Stabilization Safety and Security of Distributed Systems,Jun2011,False,,Springer,Not available,Price Stabilization in Networks — What Is an Appropriate Model ?,4acdbfc4d1b85ff67f193760de6315fe,http://dx.doi.org/10.1007/978-3-642-24550-3_22 1929,We consider a simple network model for economic agents where each can buy commodities in the neighborhood. Their prices may be initially distinct in any node. However by assuming some rules on new prices we show that the distinct prices will converge to unique by iterating buy and sell operations. First we present a protocol model in which each agent always bids an arbitrary price in the difference between his own price and the lowest price in the neighborhood called max price difference. Next we derive the condition that price stabilization occurs in our model. Furthermore we consider game (auction) theoretic price determination by assuming that each agent’s value is uniformly distributed over the max price difference. Finally we perform a simulation experiment. Our model is suitable for investigating the effects of network topologies on price stabilization.,kensaku kikuta,Not available,2011.0,10.1007/978-3-642-24550-3_22,Stabilization Safety and Security of Distributed Systems,Jun2011,False,,Springer,Not available,Price Stabilization in Networks — What Is an Appropriate Model ?,4acdbfc4d1b85ff67f193760de6315fe,http://dx.doi.org/10.1007/978-3-642-24550-3_22 1930,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,huirong tang,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 1931,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,huimin wang,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 1932,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,lei qiu,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 1933,We provide a framework justifying the use of nonatomic limit model approximations to analyze the large market behavior of otherwise intractable game-theoretic models. We demonstrate continuity requirements on the economic primitives sufficient for the equilibrium strategies of the two models to converge as the number of participants in the large finite game approaches infinity. We apply our analysis framework to show that the equilibrium of a large interdependent values uniform price auction model where bidders have complementary preferences for multiple units can be approximated by a nonatomic exchange economy. We prove that the uniform price auction asymptotically aggregates idiosyncratic bidder information into market price and that the uniform price auction is approximately efficient with a large number of participants in the private values or single unit demand case.,aaron bodoh-creed,Not available,2012.0,10.1007/978-3-642-30913-7_13,Auctions Market Mechanisms and Their Applications,Aaron2012,False,,Springer,Not available,Approximation of Large Games with Applications to Uniform Price Auctions,3819489ec0e94c114106ceff5d48f40c,http://dx.doi.org/10.1007/978-3-642-30913-7_13 1934,Recently strategic behavior modeling has gained much attention in the area of service overlay networks. Since the users (peers) of these networks usually belong to different administrative domains they do not tend to cooperate with each other resulting in selfish behavior and hence degradation of the performance of the network. In this chapter we bring about a solution inspired from microeconomics. We propose a revenue-maximizing auction by considering the bandwidth of the service offered by the origin server as the commodity. In this mechanism the content providers play the role of auctioneer and the corresponding downstream peers play the role of buyers (bidders). Moreover we have calculated some interesting upper bounds for the number of overlay hops which can be used as a worst-case metric for performance evaluation of such networks.,mohammad rezvani,Not available,2012.0,10.1007/978-1-4419-8849-2_14,2011 International Conference in Electrics Communication and Automatic Control Proceedings,Hossein2012,False,,Springer,Not available,An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops,841b41cf93694e42bb8340f4aeae09cd,http://dx.doi.org/10.1007/978-1-4419-8849-2_14 1935,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,lyle ungar,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 1936,Recently strategic behavior modeling has gained much attention in the area of service overlay networks. Since the users (peers) of these networks usually belong to different administrative domains they do not tend to cooperate with each other resulting in selfish behavior and hence degradation of the performance of the network. In this chapter we bring about a solution inspired from microeconomics. We propose a revenue-maximizing auction by considering the bandwidth of the service offered by the origin server as the commodity. In this mechanism the content providers play the role of auctioneer and the corresponding downstream peers play the role of buyers (bidders). Moreover we have calculated some interesting upper bounds for the number of overlay hops which can be used as a worst-case metric for performance evaluation of such networks.,morteza analoui,Not available,2012.0,10.1007/978-1-4419-8849-2_14,2011 International Conference in Electrics Communication and Automatic Control Proceedings,Hossein2012,False,,Springer,Not available,An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops,841b41cf93694e42bb8340f4aeae09cd,http://dx.doi.org/10.1007/978-1-4419-8849-2_14 1937,This paper proposes an incentive-based bandwidth allocation for scalable streaming in P2P networks. It is modeled as decentralized dynamic auction games in which the peers sell and bid the upload bandwidth for the maximum individual benefit. With the unique characteristic of SVC the content-aware prioritization of SVC is imposed on the underlying bandwidth auction in order to avoid bandwidth wastage and improve the overall video quality at all peers. Also an incentive mechanism is employed to resolve ,lin chen,Not available,2012.0,10.1007/978-3-642-34595-1_50,Advances on Digital Television and Wireless Multimedia Communications,Lin2012,False,,Springer,Not available,Incentive-Based Bandwidth Auction for Scalable Streaming in Peer-to-Peer Networks,5d7c5d7ef82d44daf86c0ebc5464eba2,http://dx.doi.org/10.1007/978-3-642-34595-1_50 1938,This paper proposes an incentive-based bandwidth allocation for scalable streaming in P2P networks. It is modeled as decentralized dynamic auction games in which the peers sell and bid the upload bandwidth for the maximum individual benefit. With the unique characteristic of SVC the content-aware prioritization of SVC is imposed on the underlying bandwidth auction in order to avoid bandwidth wastage and improve the overall video quality at all peers. Also an incentive mechanism is employed to resolve ,junni zou,Not available,2012.0,10.1007/978-3-642-34595-1_50,Advances on Digital Television and Wireless Multimedia Communications,Lin2012,False,,Springer,Not available,Incentive-Based Bandwidth Auction for Scalable Streaming in Peer-to-Peer Networks,5d7c5d7ef82d44daf86c0ebc5464eba2,http://dx.doi.org/10.1007/978-3-642-34595-1_50 1939,We study an elimination tournament with heterogenous contestants whose ability is common-knowledge. Each pair-wise match is modeled as an all-pay auction. Equilibrium efforts are in mixed strategies yielding complex dynamics: endogenous win probabilities in each match depend on other matches’ outcome through the identity of the expected opponent in the next round. The designer seeds competitors according to their ranks. For tournaments with four players we find optimal seedings for three different criteria: (1) maximization of total tournament effort; (2) maximization of the probability of a final among the two top ranked teams; (3) maximization of the win probability for the top player. We also find the seedings ensuring that higher ranked players have a higher winning probability. We compare our predictions with data from NCAA basketball tournaments.,christian groh,Not available,2012.0,10.1007/s00199-008-0356-6,Economic Theory,Christian2012,False,,Springer,Not available,Optimal seedings in elimination tournaments,b21421daf94780eba77641ee55bf6de4,http://dx.doi.org/10.1007/s00199-008-0356-6 1940,We study an elimination tournament with heterogenous contestants whose ability is common-knowledge. Each pair-wise match is modeled as an all-pay auction. Equilibrium efforts are in mixed strategies yielding complex dynamics: endogenous win probabilities in each match depend on other matches’ outcome through the identity of the expected opponent in the next round. The designer seeds competitors according to their ranks. For tournaments with four players we find optimal seedings for three different criteria: (1) maximization of total tournament effort; (2) maximization of the probability of a final among the two top ranked teams; (3) maximization of the win probability for the top player. We also find the seedings ensuring that higher ranked players have a higher winning probability. We compare our predictions with data from NCAA basketball tournaments.,benny moldovanu,Not available,2012.0,10.1007/s00199-008-0356-6,Economic Theory,Christian2012,False,,Springer,Not available,Optimal seedings in elimination tournaments,b21421daf94780eba77641ee55bf6de4,http://dx.doi.org/10.1007/s00199-008-0356-6 1941,We study an elimination tournament with heterogenous contestants whose ability is common-knowledge. Each pair-wise match is modeled as an all-pay auction. Equilibrium efforts are in mixed strategies yielding complex dynamics: endogenous win probabilities in each match depend on other matches’ outcome through the identity of the expected opponent in the next round. The designer seeds competitors according to their ranks. For tournaments with four players we find optimal seedings for three different criteria: (1) maximization of total tournament effort; (2) maximization of the probability of a final among the two top ranked teams; (3) maximization of the win probability for the top player. We also find the seedings ensuring that higher ranked players have a higher winning probability. We compare our predictions with data from NCAA basketball tournaments.,aner sela,Not available,2012.0,10.1007/s00199-008-0356-6,Economic Theory,Christian2012,False,,Springer,Not available,Optimal seedings in elimination tournaments,b21421daf94780eba77641ee55bf6de4,http://dx.doi.org/10.1007/s00199-008-0356-6 1942,We study an elimination tournament with heterogenous contestants whose ability is common-knowledge. Each pair-wise match is modeled as an all-pay auction. Equilibrium efforts are in mixed strategies yielding complex dynamics: endogenous win probabilities in each match depend on other matches’ outcome through the identity of the expected opponent in the next round. The designer seeds competitors according to their ranks. For tournaments with four players we find optimal seedings for three different criteria: (1) maximization of total tournament effort; (2) maximization of the probability of a final among the two top ranked teams; (3) maximization of the win probability for the top player. We also find the seedings ensuring that higher ranked players have a higher winning probability. We compare our predictions with data from NCAA basketball tournaments.,uwe sunde,Not available,2012.0,10.1007/s00199-008-0356-6,Economic Theory,Christian2012,False,,Springer,Not available,Optimal seedings in elimination tournaments,b21421daf94780eba77641ee55bf6de4,http://dx.doi.org/10.1007/s00199-008-0356-6 1943,We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement (ii) the capacity of the access network is limited and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have.,xiaohan kang,Not available,2012.0,10.1007/978-3-642-29222-4_13,Quality Reliability Security and Robustness in Heterogeneous Networks,Xiaohan2012,False,,Springer,Not available,A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks,f6447af8de2a0718b0e2d0ae35b0c039,http://dx.doi.org/10.1007/978-3-642-29222-4_13 1944,We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement (ii) the capacity of the access network is limited and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have.,juan jaramillo,Not available,2012.0,10.1007/978-3-642-29222-4_13,Quality Reliability Security and Robustness in Heterogeneous Networks,Xiaohan2012,False,,Springer,Not available,A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks,f6447af8de2a0718b0e2d0ae35b0c039,http://dx.doi.org/10.1007/978-3-642-29222-4_13 1945,We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement (ii) the capacity of the access network is limited and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have.,lei ying,Not available,2012.0,10.1007/978-3-642-29222-4_13,Quality Reliability Security and Robustness in Heterogeneous Networks,Xiaohan2012,False,,Springer,Not available,A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks,f6447af8de2a0718b0e2d0ae35b0c039,http://dx.doi.org/10.1007/978-3-642-29222-4_13 1946,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,dean foster,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 1947,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,bing shi,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1948,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,enrico gerding,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1949,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,perukrishnen vytelingum,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1950,In this paper we analyse competing double auction marketplaces that vie for traders and need to set appropriate fees to make a profit. Specifically we show how competing marketplaces should set their fees by analysing the equilibrium behaviour of two competing marketplaces. In doing so we focus on two different types of market fees: registration fees charged to traders when they enter the marketplace and profit fees charged to traders when they make transactions. In more detail given the market fees we first derive equations to calculate the marketplaces’ expected profits. Then we analyse the equilibrium charging behaviour of marketplaces in two different cases: where competing marketplaces can only charge the same type of fees and where competing marketplaces can charge different types of fees. This analysis provides insights which can be used to guide the charging behaviour of competing marketplaces. We also analyse whether two marketplaces can co-exist in equilibrium. We find that when both marketplaces are limited to charging the same type of fees traders will eventually converge to one marketplace. However when different types of fees are allowed traders may converge to different marketplaces (i.e. multiple marketplaces can co-exist).,nicholas jennings,Not available,2012.0,10.1007/978-3-642-34200-4_7,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Bing2012,False,,Springer,Not available,Setting Fees in Competing Double Auction Marketplaces: An Equilibrium Analysis,8d98c198dad8365f2fb097125595758c,http://dx.doi.org/10.1007/978-3-642-34200-4_7 1951,We review some mathematical programming models that capture the optimal bidding problem that power producers face in day-ahead electricity auction markets. The models consider both price-taking and non-price taking assumptions. The models include linear and non-linear integer programming models mathematical programs with equilibrium constraints and stochastic programming models with recourse. Models are emphasized where the producer must self-schedule units and therefore must integrate optimal bidding with unit commitment decisions. We classify models according to whether competition from competing producers is directly incorporated in the model.,roy kwon,Not available,2012.0,10.1007/978-3-642-23193-3_2,Handbook of Networks in Power Systems I,H.2012,False,,Springer,Not available,Optimization-Based Bidding in Day-Ahead Electricity Auction Markets: A Review of Models for Power Producers,f8d6b73d7774650b46593df8109cd605,http://dx.doi.org/10.1007/978-3-642-23193-3_2 1952,We review some mathematical programming models that capture the optimal bidding problem that power producers face in day-ahead electricity auction markets. The models consider both price-taking and non-price taking assumptions. The models include linear and non-linear integer programming models mathematical programs with equilibrium constraints and stochastic programming models with recourse. Models are emphasized where the producer must self-schedule units and therefore must integrate optimal bidding with unit commitment decisions. We classify models according to whether competition from competing producers is directly incorporated in the model.,daniel frances,Not available,2012.0,10.1007/978-3-642-23193-3_2,Handbook of Networks in Power Systems I,H.2012,False,,Springer,Not available,Optimization-Based Bidding in Day-Ahead Electricity Auction Markets: A Review of Models for Power Producers,f8d6b73d7774650b46593df8109cd605,http://dx.doi.org/10.1007/978-3-642-23193-3_2 1953,Given a bipartite graph ,cristina fernandes,Not available,2012.0,10.1007/978-3-642-32147-4_39,Combinatorial Optimization,G.2012,False,,Springer,Not available,Second-Price Ad Auctions with Binary Bids and Markets with Good Competition,2c4250dd0ce973ffc115d0a52ad736cb,http://dx.doi.org/10.1007/978-3-642-32147-4_39 1954,Given a bipartite graph ,rafael schouery,Not available,2012.0,10.1007/978-3-642-32147-4_39,Combinatorial Optimization,G.2012,False,,Springer,Not available,Second-Price Ad Auctions with Binary Bids and Markets with Good Competition,2c4250dd0ce973ffc115d0a52ad736cb,http://dx.doi.org/10.1007/978-3-642-32147-4_39 1955,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,marcel neumann,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 1956,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,karl tuyls,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 1957,This paper performs empirical tests of alternative auction models based on the auctions of failed thrifts conducted by the Resolution Trust Corporation (RTC). RTC auctions are especially appealing because of the availability of a well-defined signal of underlying value as well as a measure of potential competition both missing in previous studies of auctions of failed financial institutions. The evidence suggests that these transactions are best described as individual private value auctions and that they are significantly different from the takeovers of failed financial institutions previously studied.,roy gardner,Not available,1998.0,10.1023/A:1008046330536,Journal of Financial Services Research,Roy1998,False,,Springer,Not available,The Role of Information in Resolution Trust Corporation Auctions of Failed Thrifts,8b5a14f8f50205b545f4fc021a3131a0,http://dx.doi.org/10.1023/A:1008046330536 1958,Numerous pricing strategies have been proposed and incorporated into software trading agents. Early simulation experiments have shown that markets are efficient even with only a few traders placing randomly priced offers at each time step using the ,michael kaisers,Not available,2012.0,10.1007/978-3-642-33690-4_11,Multiagent System Technologies,Marcel2012,False,,Springer,Not available,Using Time as a Strategic Element in Continuous Double Auctions,9189af8c07f93a77d639ea0dae1314e4,http://dx.doi.org/10.1007/978-3-642-33690-4_11 1959,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,albert pla,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 1960,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,beatriz lopez,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 1961,Multi-attribute auctions allow agents to sell and purchase goods and services taking into account more attributes besides the price (e.g. service time tolerances qualities etc.). The coexistence of different attributes in the auction mechanism increases the difficulty of determining the winner and its payment. multi-criteria functions can be used to deal with the problem of determining the auction winner. However in order to make the payment possible multi criteria functions must fulfill certain conditions. In this paper we discuss which properties must satisfy a multi-criteria function so it can be used to determine the winner of a multi-attribute auction and we experimentally show how the valuation function choice conditions the behavior of the auction mechanism.,javier murillo,Not available,2012.0,10.1007/978-3-642-34620-0_29,Modeling Decisions for Artificial Intelligence,Albert2012,False,,Springer,Not available,Multi Criteria Operators for Multi-attribute Auctions,983ec62f882a542b319e830bd9f87af8,http://dx.doi.org/10.1007/978-3-642-34620-0_29 1962,Naor Pinkas and Sumner introduced and implemented a sealed-bid two-server auction system that is perhaps the most efficient and practical to date. Based on a cryptographic primitive known as oblivious transfer their system aims to ensure privacy and correctness provided that at least one auction server behaves honestly. As observed in [,ari juels,Not available,2003.0,10.1007/3-540-36504-4_6,Financial Cryptography,Ari2003,False,,Springer,Not available,A Two-Server Sealed-Bid Auction Protocol,325857ed236064eb3a3394be067d5d58,http://dx.doi.org/10.1007/3-540-36504-4_6 1963,Naor Pinkas and Sumner introduced and implemented a sealed-bid two-server auction system that is perhaps the most efficient and practical to date. Based on a cryptographic primitive known as oblivious transfer their system aims to ensure privacy and correctness provided that at least one auction server behaves honestly. As observed in [,michael szydlo,Not available,2003.0,10.1007/3-540-36504-4_6,Financial Cryptography,Ari2003,False,,Springer,Not available,A Two-Server Sealed-Bid Auction Protocol,325857ed236064eb3a3394be067d5d58,http://dx.doi.org/10.1007/3-540-36504-4_6 1964,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,bart decker,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 1965,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,gregory neven,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 1966,Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants in such a way that each of the participants has only limited access to the information needed for doing the computation. Over the past two decades a number of solutions requiring no trusted third party have been developed using cryptographic techniques. The disadvantage of these cryptographic solutions is the excessive communication overhead they incur. In this paper we examine a case study: a Vickrey auction without a trusted third party. The design is explained and the communication overhead studied. Several techniques to reduce or alleviate this overhead are discussed.,frank piessens,Not available,2003.0,10.1007/978-0-387-35691-4_29,Security and Privacy in the Age of Uncertainty,Bart2003,False,,Springer,Not available,Secure Vickrey Auctions Without a Trusted Third Party,dd0780aaa90c43286707f56934e3022c,http://dx.doi.org/10.1007/978-0-387-35691-4_29 1967," ",till requate,Not available,2003.0,10.1007/978-3-642-57415-3_11,Empirical Modeling of the Economy and the Environment,Till2003,False,,Springer,Not available,Commitment and Time Consistency of Environmental Policy and Incentives for Adoption and R&D,be32336b056d475c34f93608ec947199,http://dx.doi.org/10.1007/978-3-642-57415-3_11 1968,This paper performs empirical tests of alternative auction models based on the auctions of failed thrifts conducted by the Resolution Trust Corporation (RTC). RTC auctions are especially appealing because of the availability of a well-defined signal of underlying value as well as a measure of potential competition both missing in previous studies of auctions of failed financial institutions. The evidence suggests that these transactions are best described as individual private value auctions and that they are significantly different from the takeovers of failed financial institutions previously studied.,roger stover,Not available,1998.0,10.1023/A:1008046330536,Journal of Financial Services Research,Roy1998,False,,Springer,Not available,The Role of Information in Resolution Trust Corporation Auctions of Failed Thrifts,8b5a14f8f50205b545f4fc021a3131a0,http://dx.doi.org/10.1023/A:1008046330536 1969,This paper examines a common value auction in which bidder default is explicitly allowed. The lack of contractual enforcement has implications for the formation of bids as well as the revenue properties of the auction. Using a common value procurement auction we explore these implications in an experimental setting. Our results show that bidders are more aggressive when default is allowed. A theoretical result shows that allowing default can actually be in the best interest of the auctioneer. Experimental evidence however indicates that this result does not hold true in practice. One possible reason for this discrepancy is that the data in our experiments is consistent with winner's curse behavior.,matthew roelofs,Not available,2002.0,10.1023/A:1020840420643,Experimental Economics,R.2002,False,,Springer,Not available,Common Value Auctions with Default: An Experimental Approach,539148a5fe1fff5255015fdcfb8d8ef6,http://dx.doi.org/10.1023/A:1020840420643 1970, This paper studies the allocation and rent distribution in multi-unit combinatorial-bid auctions under complete information. We focus on the natural multi-unit analogue of the first-price auction where buyers bid total payments pay their bids and where the seller allocates goods to maximize his revenue. While there are many equilibria in this auction only efficient equilibria remain when the truthful equilibrium restriction of the menu-auction literature is used. Focusing on these equilibria we first show that the first-price auction just described is revenue and outcome equivalent to a Vickrey auction which is the multi unit analogue of a second-price auction. Furthermore we characterize these equilibria when valuations take a number of different forms: diminishing marginal valuations increasing average valuations and marginal valuations with single turning points.,kala krishna,Not available,2002.0,10.1007/s00199-001-0251-x,Economic Theory,Kala2002,False,,Springer,Not available,Allocating multiple units,6a9934d1ea1d071746b5cbde0590e0c8,http://dx.doi.org/10.1007/s00199-001-0251-x 1971, This paper studies the allocation and rent distribution in multi-unit combinatorial-bid auctions under complete information. We focus on the natural multi-unit analogue of the first-price auction where buyers bid total payments pay their bids and where the seller allocates goods to maximize his revenue. While there are many equilibria in this auction only efficient equilibria remain when the truthful equilibrium restriction of the menu-auction literature is used. Focusing on these equilibria we first show that the first-price auction just described is revenue and outcome equivalent to a Vickrey auction which is the multi unit analogue of a second-price auction. Furthermore we characterize these equilibria when valuations take a number of different forms: diminishing marginal valuations increasing average valuations and marginal valuations with single turning points.,torben s,Not available,2002.0,10.1007/s00199-001-0251-x,Economic Theory,Kala2002,False,,Springer,Not available,Allocating multiple units,6a9934d1ea1d071746b5cbde0590e0c8,http://dx.doi.org/10.1007/s00199-001-0251-x 1972, We model credit contracting and bidding in a first-price sealed-bid auction when bidder valuation and wealth are private information. An efficient separating equilibrium exists only if the wealth levels of both bidder types are sufficiently different. If not high-valuation bidders signal by borrowing more and using less of their wealth – this is inefficient as wealth is a cheaper source of funds. An increase in the amount of borrowing required to signal does not necessarily decrease seller expected revenue. In contrast to separating equilibria high-valuation bidders adopt pure strategy bids in pooling equilibria. Conditions are identified under which the lower bound on winning bids is higher in pooling than separating equilibria.,charles hyde,Not available,2002.0,10.1007/s00199-001-0235-x,Economic Theory,E.2002,False,,Springer,Not available,Credit contracting and bidding under wealth constraints,cb636eecbe615be9c59afb2a78cc2717,http://dx.doi.org/10.1007/s00199-001-0235-x 1973, We model credit contracting and bidding in a first-price sealed-bid auction when bidder valuation and wealth are private information. An efficient separating equilibrium exists only if the wealth levels of both bidder types are sufficiently different. If not high-valuation bidders signal by borrowing more and using less of their wealth – this is inefficient as wealth is a cheaper source of funds. An increase in the amount of borrowing required to signal does not necessarily decrease seller expected revenue. In contrast to separating equilibria high-valuation bidders adopt pure strategy bids in pooling equilibria. Conditions are identified under which the lower bound on winning bids is higher in pooling than separating equilibria.,james vercammen,Not available,2002.0,10.1007/s00199-001-0235-x,Economic Theory,E.2002,False,,Springer,Not available,Credit contracting and bidding under wealth constraints,cb636eecbe615be9c59afb2a78cc2717,http://dx.doi.org/10.1007/s00199-001-0235-x 1974,It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this letter the faults of the most representative auction-based mechanisms are discussed. And then a new method called Uniform-Price Auction (UPA) which has the simplest auction rule is proposed and its incentive compatibility in the network environment is also proved. Finally the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market and a market mechanism for network resource allocation which is predictable riskless and simple for end-users is completed.,jiaolong wei,Not available,2002.0,10.1007/s11767-002-0074-3,Journal of Electronics (China),Jiaolong2002,False,,Springer,Not available,Uniform-price auction for bandwidth allocation in the internet,84386238278dd0c1413c47a5569a841c,http://dx.doi.org/10.1007/s11767-002-0074-3 1975,It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this letter the faults of the most representative auction-based mechanisms are discussed. And then a new method called Uniform-Price Auction (UPA) which has the simplest auction rule is proposed and its incentive compatibility in the network environment is also proved. Finally the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market and a market mechanism for network resource allocation which is predictable riskless and simple for end-users is completed.,chi zhang,Not available,2002.0,10.1007/s11767-002-0074-3,Journal of Electronics (China),Jiaolong2002,False,,Springer,Not available,Uniform-price auction for bandwidth allocation in the internet,84386238278dd0c1413c47a5569a841c,http://dx.doi.org/10.1007/s11767-002-0074-3 1976, Despite the complexity of the first price auction in the general asymmetric case analytical results have started to emerge in the literature. Authors have also searched to gain insights by computing numerical estimates of the equilibria for some probability distributions of the valuations. This paper proves that the Nash equilibrium of the first price auction depends continuously for the weak topology on the valuation distributions and thus brings robustness to the numerical results as well as some theoretical results. As an example of application we disprove a conjecture of comparative statics.,bernard lebrun,Not available,2002.0,10.1007/s001990100227,Economic Theory,Bernard2002,False,,Springer,Not available,Continuity of the first price auction Nash equilibrium correspondence,3df07adfd3a0a3bca4b508261d5c5d8d,http://dx.doi.org/10.1007/s001990100227 1977, The paper reports on a series of asymmetric auction experiments with private-independent values and two buyers. Maskin and Riley (2000) showed under some conditions that if one buyer has a greater probability than the other of not being able to bid first-price auctions could yield lower revenues to the seller than second-price auctions. The data rejected this prediction because of an important overbidding when subjects received low values in first-price auctions. In this asymmetric setting the observed overbidding cannot be explained by the usual risk aversion hypothesis and the detection of a learning pattern indicates that subjects used more an adaptive behaviour than a static one. An ad hoc bidding strategy for the buyers who are the most likely to bid explains the observed low bids better than the risk neutral equilibrium strategy. Finally as subjects appear to have bid in equilibrium ,paul pezanis-christou,Not available,2002.0,10.1007/s001820200108,International Journal of Game Theory,Paul2002,False,,Springer,Not available,On the impact of low-balling: Experimental results in asymmetric auctions,8ae35c2b42430ffc8a3b115e41e518a9,http://dx.doi.org/10.1007/s001820200108 1978, In this paper we consider the implementation of the optimal procurement auction outcome when there is a trade-off between price and quality for the buyer. The quality proposals of the competing firms are assumed to be exogenous and common knowledge. After defining the optimal auction we characterize the discriminatory first score auction and the modified second score auction implementing it when the buyer is assumed to have the same information as the firms. Then we consider an auction which requires no specific information from the buyer and show that a second score auction followed by a negotiation stage can implement the optimal auction outcome under this more realistic assumption.,florence naegelen,Not available,2002.0,10.1007/s100580200067,Review of Economic Design,Florence2002,False,,Springer,Not available,Implementing optimal procurement auctions with exogenous quality,959b0d6e5936c368cf2615c83251c470,http://dx.doi.org/10.1007/s100580200067 1979, It is widely believed that the English auction is solved after the dominated strategies are eliminated. This paper demonstrates that the dominance criterion is not very effective in many English auction models. To bid more than the true willingness to pay is dominated but a stronger solution concept is needed to deduce that the buyers increase the price in small steps up to their valuation. An iterated application of the dominance criterion does not solve the problem but if it is assumed that the buyers use their maximin strategies the usual argument holds.,ulrich kamecke,Not available,1998.0,10.1007/s001820050081,International Journal of Game Theory,Ulrich1998,False,,Springer,Not available,Dominance or maximin: How to solve an English auction,bf6f303d47a1759deb5fbeccbf693bde,http://dx.doi.org/10.1007/s001820050081 1980,We consider two simultaneous private value second-price auctions with identical objects for sale and two types of bidders strong and weak in the sense of hazard rate stochastic dominance. We show that if the strong bidders are not too strong with respect to the weak bidders then by setting an appropriate reserve price a separating equilibrium exists in which strong bidders will participate in the auction with only strong bidders and weak bidders will participate in the auction with only weak bidders.,arieh gavious,Not available,2018.0,10.1007/s11590-018-1248-8,Optimization Letters,Arieh2018,False,,Springer,Not available,Separating equilibria in auctions with two types of bidders,e95c8cf1738b35383ca02127166b8d41,http://dx.doi.org/10.1007/s11590-018-1248-8 1981,We consider two simultaneous private value second-price auctions with identical objects for sale and two types of bidders strong and weak in the sense of hazard rate stochastic dominance. We show that if the strong bidders are not too strong with respect to the weak bidders then by setting an appropriate reserve price a separating equilibrium exists in which strong bidders will participate in the auction with only strong bidders and weak bidders will participate in the auction with only weak bidders.,yizhaq minchuk,Not available,2018.0,10.1007/s11590-018-1248-8,Optimization Letters,Arieh2018,False,,Springer,Not available,Separating equilibria in auctions with two types of bidders,e95c8cf1738b35383ca02127166b8d41,http://dx.doi.org/10.1007/s11590-018-1248-8 1982,Using a controlled laboratory experiment we examine individuals’ bid timing decisions in complete information all-pay auctions and find that homogeneous bidders are more likely to enter the early bidding stage under a favor-early tie-breaking rule. Furthermore revenue in an endogenous-entry treatment in which both sequential and simultaneous all-pay auctions exist is either lower than or equal to that in an exogenous-entry treatment with only simultaneous all-pay auctions. Additionally in simultaneous all-pay auctions individuals do not always employ a mixed strategy as predicted by the risk-neutral model. Instead our data is better rationalized by a risk- and loss-aversion model.,tracy liu,Not available,2018.0,10.1007/s00182-017-0586-6,International Journal of Game Theory,Xiao2018,False,,Springer,Not available,All-pay auctions with endogenous bid timing: an experimental study,97a30cba79bf98532aac2ab519172cab,http://dx.doi.org/10.1007/s00182-017-0586-6 1983,I consider a model of repeated auctions in which the distribution of bidders’ values is only known to the bidders and the seller attempts to learn this distribution to inform her choice of reserve prices in the future. I find that in any equilibrium bidders will shade their bids to act as if their values are drawn from a lower distribution than they actually are. The bid shading may be so severe that the seller would prefer to simply commit to setting the reserve price that would be optimal if bidders’ values were drawn from the lowest possible distribution to eliminate the incentive for bidders to shade their bids.,patrick hummel,Not available,2018.0,10.1007/s00182-017-0587-5,International Journal of Game Theory,Patrick2018,False,,Springer,Not available,Reserve prices in repeated auctions,58d09cfeb86e4d41fa012411d8a2c124,http://dx.doi.org/10.1007/s00182-017-0587-5 1984,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,diego aycinena,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 1985,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,hernan bejarano,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 1986,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,lucas rentschler,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 1987,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,xiaoyong cao,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 1988,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,guofu tan,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 1989,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,guoqiang tian,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 1990, The behavioral properties of several auctions designed to elicit individual valuations for an object are studied using controlled laboratory experiments. Our experiments lead us to conclude that there ,e. rutstrom,Not available,1998.0,10.1007/s001820050082,International Journal of Game Theory,Elisabet1998,False,,Springer,Not available,Home-grown values and incentive compatible auction design,422c207c9cb51daa628b93aeca027196,http://dx.doi.org/10.1007/s001820050082 1991,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,okan yilankaya,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 1992,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,ge liu,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 1993,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,jian-zhong zhang,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 1994,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,shu-cui xie,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 1995,This study assesses the rapidly growing literature on scoring rule auctions (SRA) in which all participants submit a multidimensional bid comprising prices and levels of one or more qualities. These elements are weighted using a linear combination that is the scoring function. The result of this function is a score and the bid that obtains the highest score is awarded the contract. We provide a comprehensive overview of key theoretical and empirical results. In addition we discuss structural estimation techniques applied to SRA and we conclude with three main limitations of this awarding mechanism.,marchi camboni,Not available,2018.0,10.1007/s40812-017-0088-3,Economia e Politica Industriale,Riccardo2018,False,,Springer,Not available,Procuring price and quality using scoring auctions: where do we stand?,db891ea282deb7e1c90c5f412450eb44,http://dx.doi.org/10.1007/s40812-017-0088-3 1996,We experimentally analyze the role of speculators who have no use value for the objects on sale in auctions. The environment is a uniform-price sealed-bid auction for 2 identical objects followed by a free-form bargaining resale market with one positive-value bidder and either one or two speculators who may choose simultaneously whether to enter the auction. We show that the bidder accommodates speculators by reducing demand in the auction and subsequently purchasing in the resale market which encourages entry by speculators. The presence of multiple speculators induces each speculator to enter less often but increases competition in the auction and the auction price. Speculators earn positive profits on average except when multiple speculators enter the auction.,marco pagnozzi,Not available,2018.0,10.1007/s10683-018-9564-5,Experimental Economics,Marco2018,False,,Springer,Not available,Entry by successful speculators in auctions with resale,507ccafc3699c30666ec328bdf10f206,http://dx.doi.org/10.1007/s10683-018-9564-5 1997,We experimentally analyze the role of speculators who have no use value for the objects on sale in auctions. The environment is a uniform-price sealed-bid auction for 2 identical objects followed by a free-form bargaining resale market with one positive-value bidder and either one or two speculators who may choose simultaneously whether to enter the auction. We show that the bidder accommodates speculators by reducing demand in the auction and subsequently purchasing in the resale market which encourages entry by speculators. The presence of multiple speculators induces each speculator to enter less often but increases competition in the auction and the auction price. Speculators earn positive profits on average except when multiple speculators enter the auction.,krista saral,Not available,2018.0,10.1007/s10683-018-9564-5,Experimental Economics,Marco2018,False,,Springer,Not available,Entry by successful speculators in auctions with resale,507ccafc3699c30666ec328bdf10f206,http://dx.doi.org/10.1007/s10683-018-9564-5 1998,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,lu liu,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 1999,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,chun wang,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 2000,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,jianjun wang,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 2001,This paper tests the structure performance hypothesis by examining a highway construction industry in Florida. In the first-price sealed bid auction literature there is little evidence on how many bidders are required for these markets to be competitive. Two different indicators are used to capture the transition from collusion to competition—a discontinuous effect of the number of bidders on winning bid price and an associative effect of repeat bidding of a contractor with the same set of firms. The results suggest that winning bids decrease as the number of bidders rises until there are about six to eight firms. Since subsequent entry has no effect on the winning bid price it is concluded that the highway construction market becomes competitive with about eight bidders.,srabana gupta,Not available,2002.0,10.1007/BF02299143,Atlantic Economic Journal,Srabana2002,False,,Springer,Not available,Competition and collusion in a government procurement auction market,16babc924a73fc2a79728526f6aa01f8,http://dx.doi.org/10.1007/BF02299143 2002,Suppose a seller wants to sell k similar or identical objects and there are n > k potential buyers. Suppose that each buyer wants only one object. In this case we suggest the use of a simultaneous auction that would work as follows. Players are asked to submit sealed bids for one object. The individual with the highest bid chooses an object first; the individual with the second-highest bid chooses the next object; and this process continues until the individual with the kth highest bid receives the last object. Each individual pays the equivalent to his or her bid. When objects are identical we show that the proposed auction generates the same revenue as a first-price sealed-bid sequential auction. When objects are perfectly correlated there is no known solution for sequential auctions whereas we can characterize bidding strategies in the proposed auction. Moreover the proposed auction is optimal (given an appropriately chosen reserve price) and it may be easier and cheaper to run than a sequential auction.,flavio menezes,Not available,1998.0,10.1023/A:1026479506400,The Journal of Real Estate Finance and Economics,M.1998,False,,Springer,Not available,Simultaneous Pooled Auctions,d23c36bb0292403f9427fa00bc25c3f0,http://dx.doi.org/10.1023/A:1026479506400 2003,In economics the applications of auction theory are very broad. The present paper examines the applications of auction theory especially in a management accounting context. Auctions are widely used in different applications. Often auctions have been used as procurement auctions with a reverse auction design for instance to choose the best supplier. In addition auctions have been used in supply chain management. In particular the present paper will take a look at internal auctions which are used to allocate scarce resources within a firm. The main purpose of the present paper is to exposit the state of the art of the applications of auctions and auction theory. But also there is already a huge potential for auction theory as an instrument of management accounting. So the present paper will also take a look at auctions that are used to generate information or to coordinate firms for example auctions could be used to determine transfer prices or budgets.,max patzenhauer,Not available,2018.0,10.1007/978-3-319-61603-2_8,Game Theory in Management Accounting,Max2018,False,,Springer,Not available,Applications and Potentials of Auction Theory in Management Accounting,a55d79088ec96e35a528ea1c8bcc9b65,http://dx.doi.org/10.1007/978-3-319-61603-2_8 2004,Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. The most popular auction for sponsored search is the “Generalized Second Price” (GSP) auction where advertisers are assigned to slots in the decreasing order of their ,gagan aggarwal,Not available,2008.0,10.1007/978-3-540-92185-1_68,Internet and Network Economics,Gagan2008,False,,Springer,Not available,Sponsored Search Auctions with Markovian Users,cf47ffe744c9acab9bf7a645f68e1dec,http://dx.doi.org/10.1007/978-3-540-92185-1_68 2005,Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. The most popular auction for sponsored search is the “Generalized Second Price” (GSP) auction where advertisers are assigned to slots in the decreasing order of their ,jon feldman,Not available,2008.0,10.1007/978-3-540-92185-1_68,Internet and Network Economics,Gagan2008,False,,Springer,Not available,Sponsored Search Auctions with Markovian Users,cf47ffe744c9acab9bf7a645f68e1dec,http://dx.doi.org/10.1007/978-3-540-92185-1_68 2006,Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. The most popular auction for sponsored search is the “Generalized Second Price” (GSP) auction where advertisers are assigned to slots in the decreasing order of their ,s. muthukrishnan,Not available,2008.0,10.1007/978-3-540-92185-1_68,Internet and Network Economics,Gagan2008,False,,Springer,Not available,Sponsored Search Auctions with Markovian Users,cf47ffe744c9acab9bf7a645f68e1dec,http://dx.doi.org/10.1007/978-3-540-92185-1_68 2007,Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. The most popular auction for sponsored search is the “Generalized Second Price” (GSP) auction where advertisers are assigned to slots in the decreasing order of their ,martin pal,Not available,2008.0,10.1007/978-3-540-92185-1_68,Internet and Network Economics,Gagan2008,False,,Springer,Not available,Sponsored Search Auctions with Markovian Users,cf47ffe744c9acab9bf7a645f68e1dec,http://dx.doi.org/10.1007/978-3-540-92185-1_68 2008,,makoto yokoo,Not available,2008.0,10.1007/978-0-387-30162-4_141,Encyclopedia of Algorithms,Makoto2008,False,,Springer,Not available,False-Name-Proof Auction,08b22823b9c9086f2626b28993944504,http://dx.doi.org/10.1007/978-0-387-30162-4_141 2009,On the Internet there are advertisements (ads) of different kinds: image text video and other specially marked objects that are distinct from the underlying content of the page. There is an industry behind the management of such ads and they face a number of algorithmic challenges. This note will present a small selection of such problems some insights and open research directions.,s. muthukrishnan,Not available,2008.0,10.1007/978-3-540-70575-8_2,Automata Languages and Programming,S.2008,False,,Springer,Not available,Internet Ad Auctions: Insights and Directions,2d31a94789d695c8a06eb0a1735b5df5,http://dx.doi.org/10.1007/978-3-540-70575-8_2 2010,We introduce and study ,mahyar salek,Not available,2008.0,10.1007/978-3-540-92185-1_67,Internet and Network Economics,Mahyar2008,False,,Springer,Not available,Auctions for Share-Averse Bidders,5eb025f5489cb10f1e9f24b0dcdd5264,http://dx.doi.org/10.1007/978-3-540-92185-1_67 2011,We introduce and study ,david kempe,Not available,2008.0,10.1007/978-3-540-92185-1_67,Internet and Network Economics,Mahyar2008,False,,Springer,Not available,Auctions for Share-Averse Bidders,5eb025f5489cb10f1e9f24b0dcdd5264,http://dx.doi.org/10.1007/978-3-540-92185-1_67 2012,The projected rare resource spectrum generates high profits if utilized efficiently. The current static allocation lead the spectrum to underutilized with fixed income. Predicting the user requirement for spectrum and auctioning the spectrum helps to better serve the customers and at the same time increases the income. In this research we use the automated collaborative filtering model for predicting the customer requirement and then allocate the spectrum through auctions (bidding for spectrum in open market). Genetic algorithm is used for optimization of the spectrum bidding problem and concluded that the spectrum will be used efficiently while generating more revenue by bidding for spectrum in the market.,y. reddy,Not available,2008.0,10.1007/978-1-4020-8741-7_102,Advances in Computer and Information Sciences and Engineering,B.2008,False,,Springer,Not available,Predicting the Demand for Spectrum Allocation Through Auctions,fbf6d1fe99c20eac38d7ab9275a1fc90,http://dx.doi.org/10.1007/978-1-4020-8741-7_102 2013,Suppose a seller wants to sell k similar or identical objects and there are n > k potential buyers. Suppose that each buyer wants only one object. In this case we suggest the use of a simultaneous auction that would work as follows. Players are asked to submit sealed bids for one object. The individual with the highest bid chooses an object first; the individual with the second-highest bid chooses the next object; and this process continues until the individual with the kth highest bid receives the last object. Each individual pays the equivalent to his or her bid. When objects are identical we show that the proposed auction generates the same revenue as a first-price sealed-bid sequential auction. When objects are perfectly correlated there is no known solution for sequential auctions whereas we can characterize bidding strategies in the proposed auction. Moreover the proposed auction is optimal (given an appropriately chosen reserve price) and it may be easier and cheaper to run than a sequential auction.,paulo monteiro,Not available,1998.0,10.1023/A:1026479506400,The Journal of Real Estate Finance and Economics,M.1998,False,,Springer,Not available,Simultaneous Pooled Auctions,d23c36bb0292403f9427fa00bc25c3f0,http://dx.doi.org/10.1023/A:1026479506400 2014,,tian-ming bu,Not available,2008.0,10.1007/978-0-387-30162-4_251,Encyclopedia of Algorithms,Tian-Ming2008,False,,Springer,Not available,Multiple Unit Auctions with Budget Constraint,13b2cb29a004b723e920f0c9aefad20e,http://dx.doi.org/10.1007/978-0-387-30162-4_251 2015,In the increasingly important market of online search advertising a multitude of parameters affect the performance of advertising campaigns and their ability to attract users’ attention enough to produce clicks. Thus far the majority of the relevant literature assumed an advertisement’s probability of receiving a click to be dependent on the advertisement’s quality and its position in the sponsored search list but independent of the other advertisements shown on the same webpage.We examine a promising new model [1 16] that incorporates the ,ioannis giotis,Not available,2008.0,10.1007/978-3-540-92185-1_69,Internet and Network Economics,Ioannis2008,False,,Springer,Not available,On the Equilibria and Efficiency of the GSP Mechanism in Keyword Auctions with Externalities,a0461fc78ce2c5b07476c17fb81fc57a,http://dx.doi.org/10.1007/978-3-540-92185-1_69 2016,In the increasingly important market of online search advertising a multitude of parameters affect the performance of advertising campaigns and their ability to attract users’ attention enough to produce clicks. Thus far the majority of the relevant literature assumed an advertisement’s probability of receiving a click to be dependent on the advertisement’s quality and its position in the sponsored search list but independent of the other advertisements shown on the same webpage.We examine a promising new model [1 16] that incorporates the ,anna karlin,Not available,2008.0,10.1007/978-3-540-92185-1_69,Internet and Network Economics,Ioannis2008,False,,Springer,Not available,On the Equilibria and Efficiency of the GSP Mechanism in Keyword Auctions with Externalities,a0461fc78ce2c5b07476c17fb81fc57a,http://dx.doi.org/10.1007/978-3-540-92185-1_69 2017,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,michael hutter,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2018,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,christian knebel,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2019,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,gunnar pietzner,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2020,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,maren schafer,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2021,This note studies the allocation of heterogeneous commodities to agents whose private values for combinations of these commodities are monotonic by inclusion. This setting can accommodate the presence of complementarity and substitutability among the heterogeneous commodities. By using induction logic we provide an alternative proof of Holmstrom’s (Econometrica 47:1137–1144 1979) characterization of the Vickrey combinatorial auction as the unique efficient strategy-proof and individually rational allocation rule on a smoothly connected domain of value profiles. Our approach is elementary not involving smoothness and intuitive in the sense that familiar properties of the single-item second-price auction provide the first step in our induction on the number of auctioned items. Moreover our method of proof can be applied to domains which may not be smoothly connected including nonconvex ones.,soo chew,Not available,2007.0,10.1007/s00199-006-0130-6,Economic Theory,Hong2007,False,,Springer,Not available,Characterizing the Vickrey combinatorial auction by induction,1a3597b053e30b078ceeffaf5b5358cc,http://dx.doi.org/10.1007/s00199-006-0130-6 2022,This note studies the allocation of heterogeneous commodities to agents whose private values for combinations of these commodities are monotonic by inclusion. This setting can accommodate the presence of complementarity and substitutability among the heterogeneous commodities. By using induction logic we provide an alternative proof of Holmstrom’s (Econometrica 47:1137–1144 1979) characterization of the Vickrey combinatorial auction as the unique efficient strategy-proof and individually rational allocation rule on a smoothly connected domain of value profiles. Our approach is elementary not involving smoothness and intuitive in the sense that familiar properties of the single-item second-price auction provide the first step in our induction on the number of auctioned items. Moreover our method of proof can be applied to domains which may not be smoothly connected including nonconvex ones.,shigehiro serizawa,Not available,2007.0,10.1007/s00199-006-0130-6,Economic Theory,Hong2007,False,,Springer,Not available,Characterizing the Vickrey combinatorial auction by induction,1a3597b053e30b078ceeffaf5b5358cc,http://dx.doi.org/10.1007/s00199-006-0130-6 2023,,veronika grimm,Not available,2007.0,10.1007/s00712-006-0249-8,Journal of Economics,Veronika2007,False,,Springer,Not available,Paarsch H. J. and Hong H.: ,ae6b96eb54ae4a46c140dd1f49873b46,http://dx.doi.org/10.1007/s00712-006-0249-8 2024,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,boening van,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2025,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,michael hutter,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2026,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,christian knebel,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2027,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,gunnar pietzner,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2028,The article tests a couple of hypotheses relating to markets where demand is not taken as a given but subject to sophisticated and encompassing price-building strategies. The study uses a data set that provides quoted dealer prices for medium-sized works of 100 leading visual artists from 1970 to 2004. These data are compared with auction price results for works by the same artists. The study reports significant discrepancies with respect to the relationship between the age of artists and prices paid for their works in the two markets and with respect to general price developments in the two markets as measured by indices.,maren schafer,Not available,2007.0,10.1007/s10824-007-9044-9,Journal of Cultural Economics,Michael2007,False,,Springer,Not available,Two games in town: a comparison of dealer and auction prices in contemporary visual arts markets,8e974b0418918bd569a1d45f30497989,http://dx.doi.org/10.1007/s10824-007-9044-9 2029," In the everyday business world the sourcing process of multiple goods and services usually involves complex negotiations (via telephone fax etc.) that include discussion of product and service features. Nowadays this is a high-cost process due to the scarce use of tools that streamline this negotiation process and assist purchasing managers’ decision-making. With the advent of Internet-based technologies it has become feasible the idea of tools enabling low-cost assisted fluid on-line dialogs between buyer enterprises and their providers wherever they are located. Consequently several commercial systems to support on-line negotiations (e-sourcing tools) have been released. It is our view that there is still a need for these systems to incorporate effective decision support. This article presents the foundations of ",jesus cerquides,Not available,2007.0,10.1007/s10660-007-9007-4,Electronic Commerce Research,Jesús2007,False,,Springer,Not available,Enabling assisted strategic negotiations in actual-world procurement scenarios,79215d9630c2b514e01a588ad35a35e5,http://dx.doi.org/10.1007/s10660-007-9007-4 2030," In the everyday business world the sourcing process of multiple goods and services usually involves complex negotiations (via telephone fax etc.) that include discussion of product and service features. Nowadays this is a high-cost process due to the scarce use of tools that streamline this negotiation process and assist purchasing managers’ decision-making. With the advent of Internet-based technologies it has become feasible the idea of tools enabling low-cost assisted fluid on-line dialogs between buyer enterprises and their providers wherever they are located. Consequently several commercial systems to support on-line negotiations (e-sourcing tools) have been released. It is our view that there is still a need for these systems to incorporate effective decision support. This article presents the foundations of ",maite lopez-sanchez,Not available,2007.0,10.1007/s10660-007-9007-4,Electronic Commerce Research,Jesús2007,False,,Springer,Not available,Enabling assisted strategic negotiations in actual-world procurement scenarios,79215d9630c2b514e01a588ad35a35e5,http://dx.doi.org/10.1007/s10660-007-9007-4 2031," In the everyday business world the sourcing process of multiple goods and services usually involves complex negotiations (via telephone fax etc.) that include discussion of product and service features. Nowadays this is a high-cost process due to the scarce use of tools that streamline this negotiation process and assist purchasing managers’ decision-making. With the advent of Internet-based technologies it has become feasible the idea of tools enabling low-cost assisted fluid on-line dialogs between buyer enterprises and their providers wherever they are located. Consequently several commercial systems to support on-line negotiations (e-sourcing tools) have been released. It is our view that there is still a need for these systems to incorporate effective decision support. This article presents the foundations of ",antonio reyes-moro,Not available,2007.0,10.1007/s10660-007-9007-4,Electronic Commerce Research,Jesús2007,False,,Springer,Not available,Enabling assisted strategic negotiations in actual-world procurement scenarios,79215d9630c2b514e01a588ad35a35e5,http://dx.doi.org/10.1007/s10660-007-9007-4 2032," In the everyday business world the sourcing process of multiple goods and services usually involves complex negotiations (via telephone fax etc.) that include discussion of product and service features. Nowadays this is a high-cost process due to the scarce use of tools that streamline this negotiation process and assist purchasing managers’ decision-making. With the advent of Internet-based technologies it has become feasible the idea of tools enabling low-cost assisted fluid on-line dialogs between buyer enterprises and their providers wherever they are located. Consequently several commercial systems to support on-line negotiations (e-sourcing tools) have been released. It is our view that there is still a need for these systems to incorporate effective decision support. This article presents the foundations of ",juan rodriguez-aguilar,Not available,2007.0,10.1007/s10660-007-9007-4,Electronic Commerce Research,Jesús2007,False,,Springer,Not available,Enabling assisted strategic negotiations in actual-world procurement scenarios,79215d9630c2b514e01a588ad35a35e5,http://dx.doi.org/10.1007/s10660-007-9007-4 2033,This note studies the allocation of heterogeneous commodities to agents whose private values for combinations of these commodities are monotonic by inclusion. This setting can accommodate the presence of complementarity and substitutability among the heterogeneous commodities. By using induction logic we provide an alternative proof of Holmstrom’s (Econometrica 47:1137–1144 1979) characterization of the Vickrey combinatorial auction as the unique efficient strategy-proof and individually rational allocation rule on a smoothly connected domain of value profiles. Our approach is elementary not involving smoothness and intuitive in the sense that familiar properties of the single-item second-price auction provide the first step in our induction on the number of auctioned items. Moreover our method of proof can be applied to domains which may not be smoothly connected including nonconvex ones.,soo chew,Not available,2007.0,10.1007/s00199-006-0130-6,Economic Theory,Hong2007,False,,Springer,Not available,Characterizing the Vickrey combinatorial auction by induction,1a3597b053e30b078ceeffaf5b5358cc,http://dx.doi.org/10.1007/s00199-006-0130-6 2034,This note studies the allocation of heterogeneous commodities to agents whose private values for combinations of these commodities are monotonic by inclusion. This setting can accommodate the presence of complementarity and substitutability among the heterogeneous commodities. By using induction logic we provide an alternative proof of Holmstrom’s (Econometrica 47:1137–1144 1979) characterization of the Vickrey combinatorial auction as the unique efficient strategy-proof and individually rational allocation rule on a smoothly connected domain of value profiles. Our approach is elementary not involving smoothness and intuitive in the sense that familiar properties of the single-item second-price auction provide the first step in our induction on the number of auctioned items. Moreover our method of proof can be applied to domains which may not be smoothly connected including nonconvex ones.,shigehiro serizawa,Not available,2007.0,10.1007/s00199-006-0130-6,Economic Theory,Hong2007,False,,Springer,Not available,Characterizing the Vickrey combinatorial auction by induction,1a3597b053e30b078ceeffaf5b5358cc,http://dx.doi.org/10.1007/s00199-006-0130-6 2035,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,stephen rassenti,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2036,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,john kagel,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 2037,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,svetlana pevnitskaya,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 2038,Dynamic clock auctions with drop-out information typically yield outcomes closer to equilibrium predictions than do comparable sealed-bid auctions. However clock auctions require congregating bidders for a fixed time interval which has limited field applicability and introduces inefficiencies of its own given the time cost of congregating bidders. In this experiment we explore the effects of removing these inefficiencies through survival auctions—a multi-round sealed-bid auction which is theoretically isomorphic to the dynamic clock auction with drop-out information.,lixin ye,Not available,2007.0,10.1007/s00199-006-0156-9,Economic Theory,H.2007,False,,Springer,Not available,Survival auctions,e243f7e063b2d8d974b165b13513dcf6,http://dx.doi.org/10.1007/s00199-006-0156-9 2039,The sealed-bid first-price auction of a single object in the case of independent privately-known values is the simplest auction setting and understanding it is important for understanding more complex mechanisms. But bidders bid above the risk-neutral Nash equilibrium theory prediction. The reasons for this “over bidding” remain an unsolved puzzle. Several explanations have been offered including risk aversion social comparisons and learning. We present a new explanation based on regret and a model that explains not only the observed over bidding in sealed-bid first-price auctions but also behavior in several other settings that is inconsistent with risk aversion.,richard engelbrecht-wiggans,Not available,2007.0,10.1007/s00199-006-0180-9,Economic Theory,Richard2007,False,,Springer,Not available,Regret in auctions: theory and evidence,6900f94c6bc938b71faa47a1fc3e061f,http://dx.doi.org/10.1007/s00199-006-0180-9 2040,The sealed-bid first-price auction of a single object in the case of independent privately-known values is the simplest auction setting and understanding it is important for understanding more complex mechanisms. But bidders bid above the risk-neutral Nash equilibrium theory prediction. The reasons for this “over bidding” remain an unsolved puzzle. Several explanations have been offered including risk aversion social comparisons and learning. We present a new explanation based on regret and a model that explains not only the observed over bidding in sealed-bid first-price auctions but also behavior in several other settings that is inconsistent with risk aversion.,elena katok,Not available,2007.0,10.1007/s00199-006-0180-9,Economic Theory,Richard2007,False,,Springer,Not available,Regret in auctions: theory and evidence,6900f94c6bc938b71faa47a1fc3e061f,http://dx.doi.org/10.1007/s00199-006-0180-9 2041,We introduce the serial contest by building on the desirable properties of two prominent contest games. This family of contest games relies both on relative efforts (as Tullock’s proposal) and on absolute effort differences (as difference-form contests). An additional desirable feature is that the serial contest is homogeneous of degree zero in contestants’ efforts. The family is characterized by a parameter representing how sensitive the outcome is to contestants’ efforts. It encompasses as polar cases the (fair) lottery and the (deterministic) all-pay auction. Equilibria have a close relationship to those of the (deterministic) all-pay auction and important properties of the latter hold for the serial contest too.,jose alcalde,Not available,2007.0,10.1007/s10058-007-0031-6,Review of Economic Design,José2007,False,,Springer,Not available,Tullock and Hirshleifer: a meeting of the minds,26cb30b22301bc337987f24b853f29a8,http://dx.doi.org/10.1007/s10058-007-0031-6 2042,We introduce the serial contest by building on the desirable properties of two prominent contest games. This family of contest games relies both on relative efforts (as Tullock’s proposal) and on absolute effort differences (as difference-form contests). An additional desirable feature is that the serial contest is homogeneous of degree zero in contestants’ efforts. The family is characterized by a parameter representing how sensitive the outcome is to contestants’ efforts. It encompasses as polar cases the (fair) lottery and the (deterministic) all-pay auction. Equilibria have a close relationship to those of the (deterministic) all-pay auction and important properties of the latter hold for the serial contest too.,matthias dahm,Not available,2007.0,10.1007/s10058-007-0031-6,Review of Economic Design,José2007,False,,Springer,Not available,Tullock and Hirshleifer: a meeting of the minds,26cb30b22301bc337987f24b853f29a8,http://dx.doi.org/10.1007/s10058-007-0031-6 2043,We characterize the equilibrium of the all-pay auction with general convex cost of effort and sequential effort choices. We consider a set of ,kai konrad,Not available,2007.0,10.1007/s10058-007-0029-0,Review of Economic Design,A.2007,False,,Springer,Not available,The generalized Stackelberg equilibrium of the all-pay auction with complete information,0d30f59550a3dcad30a5026a0e30f423,http://dx.doi.org/10.1007/s10058-007-0029-0 2044,We characterize the equilibrium of the all-pay auction with general convex cost of effort and sequential effort choices. We consider a set of ,wolfgang leininger,Not available,2007.0,10.1007/s10058-007-0029-0,Review of Economic Design,A.2007,False,,Springer,Not available,The generalized Stackelberg equilibrium of the all-pay auction with complete information,0d30f59550a3dcad30a5026a0e30f423,http://dx.doi.org/10.1007/s10058-007-0029-0 2045," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",jawad abrache,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 2046,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,vernon smith,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2047," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",teodor crainic,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 2048," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",michel gendreau,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 2049," Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem the expression of combined bids the design of progressive combinatorial auctions that require less information revelation and the need for decision support tools to help participants make profitable bidding decisions. For each issue we survey the existing literature and propose avenues for further research. ",monia rekik,Not available,2007.0,10.1007/s10479-007-0179-z,Annals of Operations Research,Jawad2007,False,,Springer,Not available,Combinatorial auctions,ac4d812eb615498f929094e445cc2395,http://dx.doi.org/10.1007/s10479-007-0179-z 2050,We study auctions with financial externalities i.e. auctions in which losers care about how much the winner pays. In the first-price auction larger financial externalities result in a lower expected price; in the second-price auction the effect is ambiguous. Although the expected price in the second-price auction may increase if financial externalities increase the seller is not able to gain more revenue by guaranteeing the losers a fraction of the auction revenue. With a reserve price we find that both auctions may have pooling at the reserve price. This finding suggests that identical bids need not be a signal of collusion in contrast to what is sometimes argued in anti-trust cases.,emiel maasland,Not available,2007.0,10.1007/s00199-006-0119-1,Economic Theory,Emiel2007,False,,Springer,Not available,Auctions with Financial Externalities,5d0af669d3c7861374244be571a45004,http://dx.doi.org/10.1007/s00199-006-0119-1 2051,We study auctions with financial externalities i.e. auctions in which losers care about how much the winner pays. In the first-price auction larger financial externalities result in a lower expected price; in the second-price auction the effect is ambiguous. Although the expected price in the second-price auction may increase if financial externalities increase the seller is not able to gain more revenue by guaranteeing the losers a fraction of the auction revenue. With a reserve price we find that both auctions may have pooling at the reserve price. This finding suggests that identical bids need not be a signal of collusion in contrast to what is sometimes argued in anti-trust cases.,sander onderstal,Not available,2007.0,10.1007/s00199-006-0119-1,Economic Theory,Emiel2007,False,,Springer,Not available,Auctions with Financial Externalities,5d0af669d3c7861374244be571a45004,http://dx.doi.org/10.1007/s00199-006-0119-1 2052,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,hai wang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 2053,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,weidong zhang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 2054,In the SOE privatization auctions in China there are many conflicting factors the government has to concern about such as maximizing the auction revenue and minimizing the induced unemployment. This paper constructs the first price bidding with employment constraint to take both criteria into account. By adding that the winner is required to settle down a certain quantity of former SOE employees in the new enterprise this mechanism brings on the competition among prospective investors in both the price and the quantity of employment which can help the government to balance the different objectives efficiently. However the constraint will function properly only under the condition that the government has stressed sufficiently on the employees’ rearrangement and set the best employment threshold. Meanwhile if the government specifies an explicit compensation standard for the induced lay-offs to eliminate investors’ accommodating cost dispersion or introduces more strategic investors with considerable heterogeneity to participate in the bidding its dual-objective can be better equilibrated.,jingjing wang,Not available,2007.0,10.1007/s10644-007-9031-3,Economic Change and Restructuring,Hai2007,False,,Springer,Not available,Auctioning the state owned enterprise in China: the trade-off between maximizing revenue and minimizing unemployment,b834514d807dfa7ccfde56ac6861e997,http://dx.doi.org/10.1007/s10644-007-9031-3 2055,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,kemal guler,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 2056,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,charles plott,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 2057, The sequential equilibrium of an ascending-price auction of a single item is derived explicitly for the case of log-normal distributions and a multiplicative valuation model comprising both common and private factors and allowing asymmetries. If the prior distribution on the common factors is diffuse or of the form obtained by Bayesian updating from a diffuse prior distribution then the equilibrium strategies are log-linear with coefficients obtained by solving a set of linear equations. A similar construction applies to normal distributions and additive terms in the valuation model. An example illustrates the predictions derived from the model.,robert wilson,Not available,1998.0,10.1007/s001990050229,Economic Theory,Robert1998,False,,Springer,Not available,Sequential equilibria of asymmetric ascending auctions: The case of log-normal distributions,84936cc27130c4b988155a37c172a35d,http://dx.doi.org/10.1007/s001990050229 2058,This paper applies an experimental testbed methodology to the evaluation of a proposed mechanism for allocating the right to land at the New York airports. The mechanism is called a “zero-out auction” because it is supposed to allocate the rights efficiently like an auction while leaving all of the consumer's surplus with the buyers (as opposed to allocating some to the seller as would be the case with an ordinary auction). A new behavioral hypothesis is introduced to account for limited rationality of individuals and unusual behaviors of the process. The axiom called the,quang vuong,Not available,1994.0,10.1007/BF01211119,Economic Theory,Kemal1994,False,,Springer,Not available,A study of zero-out auctions: testbed experiments of a process of allocating private rights to the use of public property,e992f53f003a3c539259cdb222f19e2f,http://dx.doi.org/10.1007/BF01211119 2059,Risk-preference-inducing lottery procedures can serve as valuable tools for experimental economists. However questioning their effectiveness experimenters may avoid them even when predictions and conclusions depend crucially on risk preferences. Here I review risk-preference-induction attempts in sealed-bid auctions discussing factors that promote or hinder success. Making the procedure very transparent and having subjects learn about it in simple environments promote success. Hysteresis resulting from switching between monetary payoffs and lottery procedures in one environment hinders success. Thus lottery procedures appear sensitive to the implementation. However implemented carefully they can generate behavior consistent with the intended preferences.,thomas rietz,Not available,1993.0,10.1007/BF01065814,Journal of Risk and Uncertainty,A.1993,False,,Springer,Not available,Implementing and testing risk-preference-induction mechanisms in experimental sealed-bid auctions,fc50c8ac54727adec619d433cb5d8de9,http://dx.doi.org/10.1007/BF01065814 2060,In this paper we study a two-period common-value auction model in which the seller possesses some private information about the value of the object being sold. Assuming that buyers possess no private information in the first period we characterize a set of equilibria in which the strategy of the seller is equivalent to a decision of whether to sell the object in the first or the second period with no reserve price. The seller sells in the second period if and only if the information is favorable enough. We also show that revealing private information increases the seller's profit in some equilibria but not in others. One implication is that the seller's ability to sell on more occasions reduces his expected revenue under certain conditions.,ruqu wang,Not available,1993.0,10.1007/BF01209699,Economic Theory,Ruqu1993,False,,Springer,Not available,Strategic behavior in dynamic auctions,ed99d23f825fd2292c23c5da1a09582b,http://dx.doi.org/10.1007/BF01209699 2061,Much of the auction literature assumes both a fixed number of bidders and a fixed information setting. This sidesteps the important and often costly decisions a potential bidder must make prior to an auction: Should I enter and if I do what level of resources should I expend evaluating the good prior to bidding? We answer these questions for a stylized information model of a common value auction. The expected selling price is shown to be the expected value of the good minus the expected aggregate entry and information costs of the bidders. Thus the seller indirectly pays for these costs to the bidders. There are auctions where the seller seemingly restricts the bidders' information expenditures. While this restriction does influence the entry decision we demonstrate that the overall effect can be to improve the selling price. Finally the probability of entry and the chosen accuracy of the information are never more in the second-price auction than in the first-price auction and the seller prefers the second-price auction.,donald hausch,Not available,1993.0,10.1007/BF01212920,Economic Theory,B.1993,False,,Springer,Not available,A common value auction model with endogenous entry and information acquisition,f4364bada61177516dcd227a91407ff9,http://dx.doi.org/10.1007/BF01212920 2062,Much of the auction literature assumes both a fixed number of bidders and a fixed information setting. This sidesteps the important and often costly decisions a potential bidder must make prior to an auction: Should I enter and if I do what level of resources should I expend evaluating the good prior to bidding? We answer these questions for a stylized information model of a common value auction. The expected selling price is shown to be the expected value of the good minus the expected aggregate entry and information costs of the bidders. Thus the seller indirectly pays for these costs to the bidders. There are auctions where the seller seemingly restricts the bidders' information expenditures. While this restriction does influence the entry decision we demonstrate that the overall effect can be to improve the selling price. Finally the probability of entry and the chosen accuracy of the information are never more in the second-price auction than in the first-price auction and the seller prefers the second-price auction.,lode li,Not available,1993.0,10.1007/BF01212920,Economic Theory,B.1993,False,,Springer,Not available,A common value auction model with endogenous entry and information acquisition,f4364bada61177516dcd227a91407ff9,http://dx.doi.org/10.1007/BF01212920 2063,We consider a continuous sealed-bid auction model for an indivisible object with two bidders and incomplete information on both sides where the bidders' evaluations are assumed to be independently distributed on some real intervals. The price the winner (the highest bidder) has to pay is a given convex combination of the highest and the second highest (lowest) bid. It is shown that for all but the second highest bid-price auction all equilibrium-strategies are continuously differentiable and strictly monotonically increasing and moreover that the set of Nash-equilibria is completely characterized by a boundary value problem for a system of singular differential equations. In the case of symmetric data (independently and identically distributed true values) and for a particular class of asymmetric distributions (including uniform distributions) the boundary value problem is solved explicitly and uniquely.,m. plum,Not available,1992.0,10.1007/BF01271133,International Journal of Game Theory,M.1992,False,,Springer,Not available,Characterization and computation of nash-equilibria for auctions with incomplete information,82ee157b1e4ed3bbb8570481a2090eb5,http://dx.doi.org/10.1007/BF01271133 2064,One of the most unusual applications of game theory in recent years has been to model how animal behavior evolves from generation to generation. Maynard-Smith [1974] modelled conflicts among animals in their mating behavior for example in terms of game theory by introducing the concepts of “strategy” and “fitness” (,minoru sakaguchi,Not available,1992.0,10.1007/978-3-642-48417-9_122,Operations Research ’91,Minoru1992,False,,Springer,Not available,Auction Bidding and Evolutionary Stable Strategies,8b0f07c630eba519dc30a9840acb723d,http://dx.doi.org/10.1007/978-3-642-48417-9_122 2065,Three auctioning methods are considered for the Note Issuance Facility. They are (i) the discriminatory auction where each winning bidder is paid his own interest rate bid (ii) the stop-out-rate auction where all winners are paid the interest rate that clears the market and (iii) the lowest-rejected-bid auction in which all winners are paid the lowest rejected interest rate bid. For each auctioning method the bidder's optimal bidding strategy is derived and the note issuer's corresponding expected interest rate is obtained. The results under these three auctioning methods are then compared.,jennifer mao,Not available,1990.0,10.1007/BF01951480,Asia Pacific Journal of Management,Jennifer1990,False,,Springer,Not available,Auction design and bidding strategy for the note issuance facility,3587dd16f44b8a33f5f60b9fbf617fd3,http://dx.doi.org/10.1007/BF01951480 2066,Decision makers whose preferences do not satisfy the independence axiom of expected utility theory when faced with sequential decisions will act in a dynamically inconsistent manner. In order to avoid this inconsistency and maintain nonexpected utility we suggest the idea of behavioral consistency. We implement this notion by regarding the same decision maker at different decision nodes as different agents and then taking the Bayesian — Nash equilibrium of this game. This idea is applied to a finite ascending bid auction game. We show the condition for the existence of an equilibrium of this game and we also characterize the equilibrium in those cases when it exists. In particular when the utility functionals are both quasi-concave and quasi-convex then there is an equilibrium in dominant strategies where each bidder continues to bid if and only if the prevailing price is smaller than his value. In the case of quasi-concavity it is shown that in equilibrium each bidder has a value such that he continues with positive probability up to it and withdraws after that.,edi karni,Not available,1989.0,10.1007/BF02283533,Annals of Operations Research,Edi1989,False,,Springer,Not available,Ascending bid auctions with behaviorally consistent bidders,406e841815c76f0fbaeca6898d4da486,http://dx.doi.org/10.1007/BF02283533 2067,Decision makers whose preferences do not satisfy the independence axiom of expected utility theory when faced with sequential decisions will act in a dynamically inconsistent manner. In order to avoid this inconsistency and maintain nonexpected utility we suggest the idea of behavioral consistency. We implement this notion by regarding the same decision maker at different decision nodes as different agents and then taking the Bayesian — Nash equilibrium of this game. This idea is applied to a finite ascending bid auction game. We show the condition for the existence of an equilibrium of this game and we also characterize the equilibrium in those cases when it exists. In particular when the utility functionals are both quasi-concave and quasi-convex then there is an equilibrium in dominant strategies where each bidder continues to bid if and only if the prevailing price is smaller than his value. In the case of quasi-concavity it is shown that in equilibrium each bidder has a value such that he continues with positive probability up to it and withdraws after that.,zvi safra,Not available,1989.0,10.1007/BF02283533,Annals of Operations Research,Edi1989,False,,Springer,Not available,Ascending bid auctions with behaviorally consistent bidders,406e841815c76f0fbaeca6898d4da486,http://dx.doi.org/10.1007/BF02283533 2068, Auctions in which individuals can purchase more than one unit of the good being sold differ in striking ways from multi-unit auctions in which individuals may purchase only one unit. The uniform price auction in particular frequently yields Nash equilibria in which bidders underbid for their second unit and therefore pay very low prices for the good. This paper characterizes equilibria for the uniform price auction.,richard engelbrecht-wiggans,Not available,1998.0,10.1007/s001990050220,Economic Theory,Richard1998,False,,Springer,Not available,Multi-unit auctions with uniform prices,d96fab7d1a9692328239ca890b9d42a8,http://dx.doi.org/10.1007/s001990050220 2069,Herodotus reports the use of auctions as early as 500 BC in Babylon (see Cassady 1967 pp. 26–40 for references to this and the following historical notes). The Romans made extensive use of auctions in commerce and the Roman emperors Caligula and Aurelius auctioned royal furniture and heirlooms to pay debts. Roman military expeditions were accompanied by traders who bid for the spoils of war auctioned ,vernon smith,Not available,1989.0,10.1007/978-1-349-20215-7_4,Allocation Information and Markets,L.1989,False,,Springer,Not available,Auctions,0f3f4dc7169a6232d294078ac8508fbe,http://dx.doi.org/10.1007/978-1-349-20215-7_4 2070,We propose a massively parallelizable algorithm for the classical assignment problem. The algorithm operates like an auction whereby unassigned persons bid simultaneously for objects thereby raising their prices. Once all bids are in objects are awarded to the highest bidder. The algorithm can also be interpreted as a Jacobi — like relaxation method for solving a dual problem. Its (sequential) worst — case complexity for a particular implementation that uses scaling is O(NAlog(NC)) where N is the number of persons A is the number of pairs of persons and objects that can be assigned to each other and C is the maximum absolute object value. Computational results show that for large problems the algorithm is competitive with existing methods even without the benefit of parallelism. When executed on a parallel machine the algorithm exhibits substantial speedup.,d. bertsekas,Not available,1988.0,10.1007/BF02186476,Annals of Operations Research,P.1988,False,,Springer,Not available,The auction algorithm: A distributed relaxation method for the assignment problem,44939a228b043f20857c18cf422d6fbc,http://dx.doi.org/10.1007/BF02186476 2071,This paper analyzes a procurement setting with identical firms and stochastic innovations. In contrast to the previous literature I show that a procurer who cannot charge entry fees may prefer a fixed-prize tournament to a first-price auction. The reason is that holding an auction may leave higher rents to firms when the innovation technology is subject to large random factors.,anja schottner,Not available,2008.0,10.1007/s00199-007-0208-9,Economic Theory,Anja2008,False,,Springer,Not available,Fixed-prize tournaments versus first-price auctions in innovation contests,5e83a8f6a908621cb8d75196a537f2cb,http://dx.doi.org/10.1007/s00199-007-0208-9 2072,Real-world contests are often “unfair” in the sense that outperforming all rivals may not be enough to be the winner because some contestants are favored by the allocation rule while others are handicapped. This paper analyzes an unfair two-player discriminatory contest (all-pay auction) with private values. We characterize equilibrium strategies provide closed form solutions and illustrate additional strategic issues arising in such unfair contests.,e. feess,Not available,2008.0,10.1007/s00712-007-0308-9,Journal of Economics,E.2008,False,,Springer,Not available,Unfair contests,361cd3f6714b1e8fb8155a825f0f59b5,http://dx.doi.org/10.1007/s00712-007-0308-9 2073,Real-world contests are often “unfair” in the sense that outperforming all rivals may not be enough to be the winner because some contestants are favored by the allocation rule while others are handicapped. This paper analyzes an unfair two-player discriminatory contest (all-pay auction) with private values. We characterize equilibrium strategies provide closed form solutions and illustrate additional strategic issues arising in such unfair contests.,gerd muehlheusser,Not available,2008.0,10.1007/s00712-007-0308-9,Journal of Economics,E.2008,False,,Springer,Not available,Unfair contests,361cd3f6714b1e8fb8155a825f0f59b5,http://dx.doi.org/10.1007/s00712-007-0308-9 2074,Real-world contests are often “unfair” in the sense that outperforming all rivals may not be enough to be the winner because some contestants are favored by the allocation rule while others are handicapped. This paper analyzes an unfair two-player discriminatory contest (all-pay auction) with private values. We characterize equilibrium strategies provide closed form solutions and illustrate additional strategic issues arising in such unfair contests.,m. walzl,Not available,2008.0,10.1007/s00712-007-0308-9,Journal of Economics,E.2008,False,,Springer,Not available,Unfair contests,361cd3f6714b1e8fb8155a825f0f59b5,http://dx.doi.org/10.1007/s00712-007-0308-9 2075,We examine theoretically and experimentally two countervailing effects of industry concentration in common value auctions. Greater concentration of information among fewer bidders reduces competition but increases the precision of private estimates. We demonstrate that this generally leads to more aggressive bidding. However the reduction in competition dominates the informational effects resulting in lower prices. We examine these hypothesized effects experimentally by conducting a series of auctions with constant informational content but distributed among a varying number of bidders. The experimental results are consistent with our theoretical predictions.,vlad mares,Not available,2008.0,10.1007/s00199-007-0223-x,Economic Theory,Vlad2008,False,,Springer,Not available,Industry concentration in common value auctions: theory and evidence,e5aeeff3d97815b02b1586b99896b567,http://dx.doi.org/10.1007/s00199-007-0223-x 2076,We examine theoretically and experimentally two countervailing effects of industry concentration in common value auctions. Greater concentration of information among fewer bidders reduces competition but increases the precision of private estimates. We demonstrate that this generally leads to more aggressive bidding. However the reduction in competition dominates the informational effects resulting in lower prices. We examine these hypothesized effects experimentally by conducting a series of auctions with constant informational content but distributed among a varying number of bidders. The experimental results are consistent with our theoretical predictions.,mikhael shor,Not available,2008.0,10.1007/s00199-007-0223-x,Economic Theory,Vlad2008,False,,Springer,Not available,Industry concentration in common value auctions: theory and evidence,e5aeeff3d97815b02b1586b99896b567,http://dx.doi.org/10.1007/s00199-007-0223-x 2077,Auctions that select core allocations with respect to reported values generate competitive levels of sales revenues at equilibrium and limit bidder incentives to use shills. Among core-selecting auctions the ones that minimize seller revenues also maximize incentives for truthful reporting produce the Vickrey outcome when that lies in the core and in contrast to the Vickrey auction and create no incentive for a seller to exclude qualified bidders. Core-selecting auctions are related to and share properties with stable matching mechanisms.,robert day,Not available,2008.0,10.1007/s00182-007-0100-7,International Journal of Game Theory,Robert2008,False,,Springer,Not available,Core-selecting package auctions,7efc368fc03f6887af85bf8871292ff7,http://dx.doi.org/10.1007/s00182-007-0100-7 2078,Auctions that select core allocations with respect to reported values generate competitive levels of sales revenues at equilibrium and limit bidder incentives to use shills. Among core-selecting auctions the ones that minimize seller revenues also maximize incentives for truthful reporting produce the Vickrey outcome when that lies in the core and in contrast to the Vickrey auction and create no incentive for a seller to exclude qualified bidders. Core-selecting auctions are related to and share properties with stable matching mechanisms.,paul milgrom,Not available,2008.0,10.1007/s00182-007-0100-7,International Journal of Game Theory,Robert2008,False,,Springer,Not available,Core-selecting package auctions,7efc368fc03f6887af85bf8871292ff7,http://dx.doi.org/10.1007/s00182-007-0100-7 2079, Auctions in which individuals can purchase more than one unit of the good being sold differ in striking ways from multi-unit auctions in which individuals may purchase only one unit. The uniform price auction in particular frequently yields Nash equilibria in which bidders underbid for their second unit and therefore pay very low prices for the good. This paper characterizes equilibria for the uniform price auction.,charles kahn,Not available,1998.0,10.1007/s001990050220,Economic Theory,Richard1998,False,,Springer,Not available,Multi-unit auctions with uniform prices,d96fab7d1a9692328239ca890b9d42a8,http://dx.doi.org/10.1007/s001990050220 2080,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,wei lim,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 2081,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,joo lee-partridge,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 2082,In this paper we show that in a heterogeneous bidding community with predominantly risk-seeking bidders third-price sealed-bid auctions yield higher revenue for the seller than first-price sealed-bid auctions when the auction value is low. Conversely when the value of the auction is high first-price sealed-bid auctions yield higher revenue for the seller than third-price sealed-bid auctions. Existing theoretical findings for a homogeneous group of risk-seeking individuals imply that third-price sealed-bid auctions should generate higher revenues for the seller than first-price sealed-bid auctions. Our results for low-value auctions agree but our results for high-value auctions do not agree with the existing findings. We discuss the implications of this discrepancy as a function of the shift in goal orientation from a win-focus to a value-focus as the value of the auction increases.,soo tan,Not available,2008.0,10.1007/s11002-007-9024-z,Marketing Letters,Shi2008,False,,Springer,Not available,Revenue implication of auction value in ,59b74e08d2142403f95277e479b83949,http://dx.doi.org/10.1007/s11002-007-9024-z 2083,The article presents an Internet experiment where subjects sequentially bid for basic gifts and binary-lotteries on these gifts in incentive compatible Vickrey auctions. Subjects exhibit uniformly pessimistic prize-weighting in spite of precautions to reduce suspicion and prohibit collusion. The bids for lotteries are close to the minimal payable value even when the probability of obtaining a better prize is larger than 50%. Prize-weighting becomes even more conservative as the distance in value of payable prizes increases. The twofold aversive affect appears for three distinct groups of students; we demonstrate however that the same subjects overweight small win-probabilities in standard binary-choice.,doron sonsino,Not available,2008.0,10.1007/s11238-007-9055-1,Theory and Decision,Doron2008,False,,Springer,Not available,Disappointment Aversion in internet Bidding-Decisions,780bd1d8831bcc880dfa634349a422ae,http://dx.doi.org/10.1007/s11238-007-9055-1 2084,In order to support business negotiations with electronic tools effectively a deep understanding of real-life business negotiations is required. Comparing the settings usually applied in negotiation experiments with the every-day experiences of business negotiators it can be stated that the work of business negotiators is much more iterative and embedded. Renegotiations appear on a regular basis. This observation stresses the importance of flawless communication in business negotiations and raises questions regarding the reasons for renegotiations and the role of information technology in this context. This paper investigates data gathered in a 2005 survey study in order to identify the context factors that drive B2B renegotiations using a preliminary regression model. The rules of interaction task complexity and business relationship are found to be significant predictors of the renegotiation likelihood while media richness does not impact the likelihood of renegotiations in practice.,mareike schoop,Not available,2008.0,10.1007/s10726-007-9080-z,Group Decision and Negotiation,Mareike2008,False,,Springer,Not available,The antecedents of renegotiations in practice—an exploratory analysis,734286f33652ade6d0527ef72f111c4a,http://dx.doi.org/10.1007/s10726-007-9080-z 2085,In order to support business negotiations with electronic tools effectively a deep understanding of real-life business negotiations is required. Comparing the settings usually applied in negotiation experiments with the every-day experiences of business negotiators it can be stated that the work of business negotiators is much more iterative and embedded. Renegotiations appear on a regular basis. This observation stresses the importance of flawless communication in business negotiations and raises questions regarding the reasons for renegotiations and the role of information technology in this context. This paper investigates data gathered in a 2005 survey study in order to identify the context factors that drive B2B renegotiations using a preliminary regression model. The rules of interaction task complexity and business relationship are found to be significant predictors of the renegotiation likelihood while media richness does not impact the likelihood of renegotiations in practice.,frank kohne,Not available,2008.0,10.1007/s10726-007-9080-z,Group Decision and Negotiation,Mareike2008,False,,Springer,Not available,The antecedents of renegotiations in practice—an exploratory analysis,734286f33652ade6d0527ef72f111c4a,http://dx.doi.org/10.1007/s10726-007-9080-z 2086,In order to support business negotiations with electronic tools effectively a deep understanding of real-life business negotiations is required. Comparing the settings usually applied in negotiation experiments with the every-day experiences of business negotiators it can be stated that the work of business negotiators is much more iterative and embedded. Renegotiations appear on a regular basis. This observation stresses the importance of flawless communication in business negotiations and raises questions regarding the reasons for renegotiations and the role of information technology in this context. This paper investigates data gathered in a 2005 survey study in order to identify the context factors that drive B2B renegotiations using a preliminary regression model. The rules of interaction task complexity and business relationship are found to be significant predictors of the renegotiation likelihood while media richness does not impact the likelihood of renegotiations in practice.,dirk staskiewicz,Not available,2008.0,10.1007/s10726-007-9080-z,Group Decision and Negotiation,Mareike2008,False,,Springer,Not available,The antecedents of renegotiations in practice—an exploratory analysis,734286f33652ade6d0527ef72f111c4a,http://dx.doi.org/10.1007/s10726-007-9080-z 2087,In order to support business negotiations with electronic tools effectively a deep understanding of real-life business negotiations is required. Comparing the settings usually applied in negotiation experiments with the every-day experiences of business negotiators it can be stated that the work of business negotiators is much more iterative and embedded. Renegotiations appear on a regular basis. This observation stresses the importance of flawless communication in business negotiations and raises questions regarding the reasons for renegotiations and the role of information technology in this context. This paper investigates data gathered in a 2005 survey study in order to identify the context factors that drive B2B renegotiations using a preliminary regression model. The rules of interaction task complexity and business relationship are found to be significant predictors of the renegotiation likelihood while media richness does not impact the likelihood of renegotiations in practice.,markus voeth,Not available,2008.0,10.1007/s10726-007-9080-z,Group Decision and Negotiation,Mareike2008,False,,Springer,Not available,The antecedents of renegotiations in practice—an exploratory analysis,734286f33652ade6d0527ef72f111c4a,http://dx.doi.org/10.1007/s10726-007-9080-z 2088,In order to support business negotiations with electronic tools effectively a deep understanding of real-life business negotiations is required. Comparing the settings usually applied in negotiation experiments with the every-day experiences of business negotiators it can be stated that the work of business negotiators is much more iterative and embedded. Renegotiations appear on a regular basis. This observation stresses the importance of flawless communication in business negotiations and raises questions regarding the reasons for renegotiations and the role of information technology in this context. This paper investigates data gathered in a 2005 survey study in order to identify the context factors that drive B2B renegotiations using a preliminary regression model. The rules of interaction task complexity and business relationship are found to be significant predictors of the renegotiation likelihood while media richness does not impact the likelihood of renegotiations in practice.,uta herbst,Not available,2008.0,10.1007/s10726-007-9080-z,Group Decision and Negotiation,Mareike2008,False,,Springer,Not available,The antecedents of renegotiations in practice—an exploratory analysis,734286f33652ade6d0527ef72f111c4a,http://dx.doi.org/10.1007/s10726-007-9080-z 2089," We consider a game in which three committee members must divide up a benefit among themselves. In response to the large literature on sequential procedures in this type of game we propose an institution that is inspired by auction theory. The (sealed) bids of the players are proposals for a distribution of the benefit and are given simultaneously. If any of the bids is preferred to all others in a pairwise comparison (i.e. a Condorcet winner exists) then this proposal is implemented. If such a bid does not exist then an equal split of the benefit is assumed. An equilibrium of this game is for each player to suggest that one of the opponents should receive the lion’s share of the benefit even though each player cares only about his own share. We call this phenomenon “rational benevolence”. Although the end that is desired by the players is purely egoistic the means of achieving it may be perceived as benevolent. Several applications of the game are suggested. ",derek clark,Not available,2008.0,10.1007/s11127-007-9210-9,Public Choice,J.2008,False,,Springer,Not available,Rational benevolence in small committees,d750dc9015898a7cb5fe8a6a84e2ab54,http://dx.doi.org/10.1007/s11127-007-9210-9 2090,"The potential seller of an indivisible good faces two potential buyers whose valuations for the good are private information. We derive the optimal selling mechanism under the assumption that the buyers collude both when the valuations are independently distributed and when they are correlated. We find that when the valuations are independent the seller can obtain the same expected revenue as if the buyers behaved noncooperatively; if instend the valuations are correlated then collusion harms the seller. In this latter case moreover each buyer’s information at the collusion stage about the other buyer’s valuation turns out to be very relevant for the effectiveness of collusion.,In questo lavoro preudiamo in considerazione il problema di un venditore di un bene indivisibile che ha di fronte due potenziali compratori le cui valutazioni del bene sono informazione privata. Lo scopo del lavoro è ricavare il meccanismo di vendita ottimale nell’ipotesi che i compratori colludano sia nel caso in cui le loro valutazioni sono variabili casuali distribuite indipendentemente che nel caso in cui queste sono correlate. Dai risultati che otteniamo quando le valutazioni dei compratori sono indipendenti il venditore può ottenere lo stesso ricavo atteso raggiungibile nel caso in cui i compratori non colludano. Se invece le valutazioni sono correlate allora la collusione riduce il ricavo del venditore. In questo caso tuttavia le informazioni che al momento della collusione ogni compratore possiede circa la valutazione dell’altro compratore risultano essere fondamentali nel determinare l’efficacia della collnsione.",domenico menicucci,Not available,1998.0,10.1007/BF02735316,Rivista di matematica per le scienze economiche e sociali,Domenico1998,False,,Springer,Not available,Optimal auctions under collusion of buyers with discrete valuations,9537eea225750f2078bd44bf32d76eb7,http://dx.doi.org/10.1007/BF02735316 2091," We consider a game in which three committee members must divide up a benefit among themselves. In response to the large literature on sequential procedures in this type of game we propose an institution that is inspired by auction theory. The (sealed) bids of the players are proposals for a distribution of the benefit and are given simultaneously. If any of the bids is preferred to all others in a pairwise comparison (i.e. a Condorcet winner exists) then this proposal is implemented. If such a bid does not exist then an equal split of the benefit is assumed. An equilibrium of this game is for each player to suggest that one of the opponents should receive the lion’s share of the benefit even though each player cares only about his own share. We call this phenomenon “rational benevolence”. Although the end that is desired by the players is purely egoistic the means of achieving it may be perceived as benevolent. Several applications of the game are suggested. ",christian riis,Not available,2008.0,10.1007/s11127-007-9210-9,Public Choice,J.2008,False,,Springer,Not available,Rational benevolence in small committees,d750dc9015898a7cb5fe8a6a84e2ab54,http://dx.doi.org/10.1007/s11127-007-9210-9 2092," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",juan aparicio,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 2093," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",juan ferrando,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 2094," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",ana meca,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 2095," In this paper we introduce an asymmetric model of continuous electricity auctions with limited production capacity and bounded supply functions. The strategic bidding is studied with this model by means of an electricity market game. We prove that for every electricity market game with continuous cost functions a mixed-strategy Nash equilibrium always exists. In particular we focus on the behavior of producers in the Spanish electricity market. We consider a very simple form for the Spanish electricity market: an oligopoly consisting just of independent hydro-electric power production units in a single wet period. We show that a pure-strategy Nash equilibrium for the Spanish electricity market game always exists. ",julia sancho,Not available,2008.0,10.1007/s10479-007-0236-7,Annals of Operations Research,Juan2008,False,,Springer,Not available,Strategic bidding in continuous electricity auctions: an application to the Spanish electricity market,ad35d90add91f8308589267530e86b62,http://dx.doi.org/10.1007/s10479-007-0236-7 2096,Efficiency and optimality are the two primary and generally conflicting goals in any auction design: the former focuses on the social welfare of the whole seller–bidder system whereas the latter emphasizes revenue-maximizing on the seller side. In this chapter we review the auctions design problem based on these two aspects in various information structures and circumstances. The most recent results are collected and analyzed. This chapter tends to complement the survey ,roger zhan,Not available,2008.0,10.1007/978-0-387-77247-9_16,Pareto Optimality Game Theory And Equilibria,L.2008,False,,Springer,Not available,Optimality and Efficiency in Auctions Design: A Survey,cda2e75e7ddcb933ce7ae1e54a1929d8,http://dx.doi.org/10.1007/978-0-387-77247-9_16 2097,We study the inefficiency of mixed Nash equilibria expressed as the price of anarchy of all-pay auctions in three different environments: combinatorial multi-unit and single-item auctions. First we consider item-bidding combinatorial auctions where ,george christodoulou,Not available,2018.0,10.1007/s00453-017-0296-2,Algorithmica,George2018,True,,Springer,Not available,On the Efficiency of All-Pay Mechanisms,04c230dd92fae5c7277091b2deb0615b,http://dx.doi.org/10.1007/s00453-017-0296-2 2098,We study the inefficiency of mixed Nash equilibria expressed as the price of anarchy of all-pay auctions in three different environments: combinatorial multi-unit and single-item auctions. First we consider item-bidding combinatorial auctions where ,alkmini sgouritsa,Not available,2018.0,10.1007/s00453-017-0296-2,Algorithmica,George2018,True,,Springer,Not available,On the Efficiency of All-Pay Mechanisms,04c230dd92fae5c7277091b2deb0615b,http://dx.doi.org/10.1007/s00453-017-0296-2 2099,We study the inefficiency of mixed Nash equilibria expressed as the price of anarchy of all-pay auctions in three different environments: combinatorial multi-unit and single-item auctions. First we consider item-bidding combinatorial auctions where ,bo tang,Not available,2018.0,10.1007/s00453-017-0296-2,Algorithmica,George2018,True,,Springer,Not available,On the Efficiency of All-Pay Mechanisms,04c230dd92fae5c7277091b2deb0615b,http://dx.doi.org/10.1007/s00453-017-0296-2 2100,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,jianfu shen,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 2101, Traditional analysis of auctions assumes that each bidder's beliefs about opponents' valuations are represented by a probability measure. Motivated by experimental findings such as the Ellsberg Paradox this paper examines the consequences of relaxing this assumption in the first and second price sealed bid auctions with independent private values. The multiple priors model of Gilboa and Schmeidler [,kin lo,Not available,1998.0,10.1007/s001990050209,Economic Theory,Chung1998,False,,Springer,Not available,Sealed bid auctions with uncertainty averse bidders,5503513b43d6f4a119a200a187262c35,http://dx.doi.org/10.1007/s001990050209 2102,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,frederik pretorius,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 2103,This paper tests for the effects of financial constraints on open-bid English land auction prices and bids. It is argued that bidders’ ability to pay taken as capital resources and/or capital budget constraints influence bids and final auction prices. While high capital resource developers may elect to bid more than optimal to win auctions or bidders may elect to pool resources in joint bidding budget constraints imposed by firm-specific financial variables on the other hand are expected to restrict bids. Land auction data in Hong Kong are used to test systematically these predictions. It is found that a firm’s age the number of winners in a joint bid and firm status in the market are positively related to prices all factors which may be attributed to a firm’s ability to finance the auction price. Firm size internal funds financing cost debt capacity and existing capital expenditure are also shown to affect bids submitted in land auctions: firm size and internal funds are positively related to bid prices; while constrained debt capacity financing cost and existing capital expenditure lower bids. The results are consistent with predictions that a firm’s financial constraints and thus its effect on capital budgets are relevant factors in predicting land auction outcomes. More generally these findings confirm that similar financial factors that constrain corporate capital investment also influence directly acquisition of assets at auctions.,k. chau,Not available,2018.0,10.1007/s11146-017-9618-z,The Journal of Real Estate Finance and Economics,Jianfu2018,False,,Springer,Not available,Land Auctions with Budget Constraints,31aced1e566e2ab3c05a2da69c4cd473,http://dx.doi.org/10.1007/s11146-017-9618-z 2104,For the recent decade cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed spectrum channels are not being used efficiently. The most critical issue of the cognitive radio networks is how to distribute the idle spectrum channels to the secondary users opportunistically. The auction-based market is desirable for the trade of idle spectrum channels since the secondary users can purchase a channel in timely manner and the licensed primary users can earn the additional profit while not using the channels. Among the auction algorithms proposed for the spectrum market we focus on the TASG framework which consists of two nested auction algorithms because it enables the group-buying of spectrum channels for the secondary users with limited budgets and possesses many positive properties such as budget-balance individual rationality and truthfulness. However the TASG framework is not very attractive to the market participants since the seller earns the small revenue and the buyer has the low utility. In this paper we propose a new auction framework for the spectrum markets called aDaptive and Economically robust Auction-based Leasing (DEAL) that keeps all the benefits of TASG while improving the utility (or revenue) of the participants. To this end we develop an enhanced inner-auction algorithm called the Global Auction algorithm in our DEAL framework and adapt the involved parameters dynamically based on the previous bids from the potential buyers. Simulation results demonstrate that our framework significantly outperforms the previous TASG.,muhammad shafiq,Not available,2018.0,10.1007/s10922-017-9429-9,Journal of Network and Systems Management,Muhammad2018,False,,Springer,Not available,Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks,5f2d1bb317e3becf7d3d1e5d623c7008,http://dx.doi.org/10.1007/s10922-017-9429-9 2105,For the recent decade cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed spectrum channels are not being used efficiently. The most critical issue of the cognitive radio networks is how to distribute the idle spectrum channels to the secondary users opportunistically. The auction-based market is desirable for the trade of idle spectrum channels since the secondary users can purchase a channel in timely manner and the licensed primary users can earn the additional profit while not using the channels. Among the auction algorithms proposed for the spectrum market we focus on the TASG framework which consists of two nested auction algorithms because it enables the group-buying of spectrum channels for the secondary users with limited budgets and possesses many positive properties such as budget-balance individual rationality and truthfulness. However the TASG framework is not very attractive to the market participants since the seller earns the small revenue and the buyer has the low utility. In this paper we propose a new auction framework for the spectrum markets called aDaptive and Economically robust Auction-based Leasing (DEAL) that keeps all the benefits of TASG while improving the utility (or revenue) of the participants. To this end we develop an enhanced inner-auction algorithm called the Global Auction algorithm in our DEAL framework and adapt the involved parameters dynamically based on the previous bids from the potential buyers. Simulation results demonstrate that our framework significantly outperforms the previous TASG.,jin-ghoo choi,Not available,2018.0,10.1007/s10922-017-9429-9,Journal of Network and Systems Management,Muhammad2018,False,,Springer,Not available,Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks,5f2d1bb317e3becf7d3d1e5d623c7008,http://dx.doi.org/10.1007/s10922-017-9429-9 2106,This paper employs and extends the auction method for the re-allocation of emission permits (RAEP) at the China Beijing Environment Exchange (CBEE) to meet pollution reduction targets. An optimization method is first proposed to calculate the optimal production quantity and emission permit demand/supply volume for firms with high/low pollution abatement cost. Then the double auction method is adopted and extended to construct the RAEP double auction mechanism based on the principle of maximizing the total social welfare utility. To further explain this auction method three matching mechanisms are proposed. Each mechanism achieves a balance between supply and demand of emission permits. Finally a computational analysis of the real CBEE case is used to verify both the validity and practicability of the mechanism. The results show that the extended auction method presented in this paper could effectively increase the number of traded participants improve the auction transaction efficiency and increase the utilities of trading participants compared to the auction method currently used in the CBEE; the extended method is always applicable regardless of the size of the permit market; the method could effectively realize the incentive compatibility thus encouraging each firm to provide a real bid price.,jiasen sun,Not available,2018.0,10.1007/s10479-018-2826-y,Annals of Operations Research,Jiasen2018,False,,Springer,Not available,Designing a double auction mechanism for the re-allocation of emission permits,ccb44e53626912f81d9a395a3799bbd4,http://dx.doi.org/10.1007/s10479-018-2826-y 2107,This paper employs and extends the auction method for the re-allocation of emission permits (RAEP) at the China Beijing Environment Exchange (CBEE) to meet pollution reduction targets. An optimization method is first proposed to calculate the optimal production quantity and emission permit demand/supply volume for firms with high/low pollution abatement cost. Then the double auction method is adopted and extended to construct the RAEP double auction mechanism based on the principle of maximizing the total social welfare utility. To further explain this auction method three matching mechanisms are proposed. Each mechanism achieves a balance between supply and demand of emission permits. Finally a computational analysis of the real CBEE case is used to verify both the validity and practicability of the mechanism. The results show that the extended auction method presented in this paper could effectively increase the number of traded participants improve the auction transaction efficiency and increase the utilities of trading participants compared to the auction method currently used in the CBEE; the extended method is always applicable regardless of the size of the permit market; the method could effectively realize the incentive compatibility thus encouraging each firm to provide a real bid price.,guo li,Not available,2018.0,10.1007/s10479-018-2826-y,Annals of Operations Research,Jiasen2018,False,,Springer,Not available,Designing a double auction mechanism for the re-allocation of emission permits,ccb44e53626912f81d9a395a3799bbd4,http://dx.doi.org/10.1007/s10479-018-2826-y 2108,This paper studies a sales mechanism prevalent in housing markets where the seller does not reveal or commit to a reserve price but instead publicly announces an asking price. We show that the seller sets an asking price such that in equilibrium buyers of certain types would accept it with positive probability. We also show that this sales mechanism with an optimally chosen asking price set prior to the seller learning her value does better than any standard auction with a reserve price equal to the seller’s reservation value. We then extend the analysis to the case where the asking price reveals information about the seller’s reservation value. We show that in this case there is a separating equilibrium with fully-revealing asking prices which is revenue-equivalent to a standard auction with a reserve price set at the seller’s reservation value.,peyman khezr,Not available,2018.0,10.1007/s00182-018-0620-3,International Journal of Game Theory,Peyman2018,False,,Springer,Not available,Auctions with an asking price,6450799e0d946148048745fb2f49e1ed,http://dx.doi.org/10.1007/s00182-018-0620-3 2109,This paper studies a sales mechanism prevalent in housing markets where the seller does not reveal or commit to a reserve price but instead publicly announces an asking price. We show that the seller sets an asking price such that in equilibrium buyers of certain types would accept it with positive probability. We also show that this sales mechanism with an optimally chosen asking price set prior to the seller learning her value does better than any standard auction with a reserve price equal to the seller’s reservation value. We then extend the analysis to the case where the asking price reveals information about the seller’s reservation value. We show that in this case there is a separating equilibrium with fully-revealing asking prices which is revenue-equivalent to a standard auction with a reserve price set at the seller’s reservation value.,flavio menezes,Not available,2018.0,10.1007/s00182-018-0620-3,International Journal of Game Theory,Peyman2018,False,,Springer,Not available,Auctions with an asking price,6450799e0d946148048745fb2f49e1ed,http://dx.doi.org/10.1007/s00182-018-0620-3 2110,This paper is the first attempt to propose an efficient auction mechanism for the ,xianghua chu,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 2111,This paper is the first attempt to propose an efficient auction mechanism for the ,su xu,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 2112,We analyze a private and independent valuation first-price auction under the assumption that one of the bidders’ valuations is common knowledge. We show that no pure strategy equilibrium exists and we characterize a mixed strategy equilibrium in which the bidder whose valuation is common knowledge randomizes her bid while the other bidders play pure strategies. In an example with the uniform distribution we compare the expected profits of seller and buyers in this auction with those in a standard symmetric private valuation model.,irene martinez-pardina,Not available,2006.0,10.1007/s10058-006-0003-2,Review of Economic Design,Irene2006,False,,Springer,Not available,First-price auctions where one of the bidders’ valuations is common knowledge,5637083ae094ec38662868139051b208,http://dx.doi.org/10.1007/s10058-006-0003-2 2113,In a market of indivisible objects where a buyer consumes at most one object the buyer-optimal auction is a multi-item generalization of Vickrey's second-price auction. If the optimal auction is formulated as a strategic game it is well-known that it satisfies good incentive properties i.e. the honest strategy profile is a Nash equilibrium a unique perfect equilibrium and a dominant strategy equilibrium. For each of the three incentive properties it is shown that the optimal auction is a,mitsunobu miyake,Not available,1998.0,10.1007/BF01243191,International Journal of Game Theory,Mitsunobu1998,False,,Springer,Not available,On the incentive properties of multi-item auctions,1e348e22d0d89dd349601fc30a8c4866,http://dx.doi.org/10.1007/BF01243191 2114,This paper is the first attempt to propose an efficient auction mechanism for the ,fulin cai,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 2115,This paper is the first attempt to propose an efficient auction mechanism for the ,jiansheng chen,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 2116,This paper is the first attempt to propose an efficient auction mechanism for the ,quande qin,Not available,2018.0,10.1007/s10845-018-1410-2,Journal of Intelligent Manufacturing,Xianghua2018,False,,Springer,Not available,An efficient auction mechanism for regional logistics synchronization,c429c43afe8a73d2f6755dd35d1df3d0,http://dx.doi.org/10.1007/s10845-018-1410-2 2117,We consider two simultaneous private value second-price auctions with identical objects for sale and two types of bidders strong and weak in the sense of hazard rate stochastic dominance. We show that if the strong bidders are not too strong with respect to the weak bidders then by setting an appropriate reserve price a separating equilibrium exists in which strong bidders will participate in the auction with only strong bidders and weak bidders will participate in the auction with only weak bidders.,arieh gavious,Not available,2018.0,10.1007/s11590-018-1248-8,Optimization Letters,Arieh2018,False,,Springer,Not available,Separating equilibria in auctions with two types of bidders,e95c8cf1738b35383ca02127166b8d41,http://dx.doi.org/10.1007/s11590-018-1248-8 2118,We consider two simultaneous private value second-price auctions with identical objects for sale and two types of bidders strong and weak in the sense of hazard rate stochastic dominance. We show that if the strong bidders are not too strong with respect to the weak bidders then by setting an appropriate reserve price a separating equilibrium exists in which strong bidders will participate in the auction with only strong bidders and weak bidders will participate in the auction with only weak bidders.,yizhaq minchuk,Not available,2018.0,10.1007/s11590-018-1248-8,Optimization Letters,Arieh2018,False,,Springer,Not available,Separating equilibria in auctions with two types of bidders,e95c8cf1738b35383ca02127166b8d41,http://dx.doi.org/10.1007/s11590-018-1248-8 2119,An organization must decide which of two proposals to fund. In evaluating the proposals the organization relies on the agents applying for funding to produce evidence about the merits of their own proposals. When the organization can fund all proposals each agent engages in an independent game of Bayesian persuasion with the organization choosing information strategies that maximize the probability of producing evidence in favor of funding. When the organization has limited capacity to implement proposals the game becomes one of competitive Bayesian persuasion. Producing favorable evidence is not enough to secure funding; an agent must also produce more-favorable evidence than the other agent. We show that an organization’s limited capacity leads agents to produce more (Blackwell) informative evidence than they do when the organization is unconstrained. We fully characterize the unique equilibrium under unlimited and limited capacity and show that unless the prior strongly favors accepting both proposals the funding organization is better off when its capacity is limited. The analysis highlights similarities between competitive Bayesian persuasion games and all-pay auctions and generalized Colonel Blotto games.,raphael boleslavsky,Not available,2018.0,10.1007/s00199-016-1021-0,Economic Theory,Raphael2018,False,,Springer,Not available,Limited capacity in project selection: competition through evidence production,f6807f233148def8881e841644a161c0,http://dx.doi.org/10.1007/s00199-016-1021-0 2120,An organization must decide which of two proposals to fund. In evaluating the proposals the organization relies on the agents applying for funding to produce evidence about the merits of their own proposals. When the organization can fund all proposals each agent engages in an independent game of Bayesian persuasion with the organization choosing information strategies that maximize the probability of producing evidence in favor of funding. When the organization has limited capacity to implement proposals the game becomes one of competitive Bayesian persuasion. Producing favorable evidence is not enough to secure funding; an agent must also produce more-favorable evidence than the other agent. We show that an organization’s limited capacity leads agents to produce more (Blackwell) informative evidence than they do when the organization is unconstrained. We fully characterize the unique equilibrium under unlimited and limited capacity and show that unless the prior strongly favors accepting both proposals the funding organization is better off when its capacity is limited. The analysis highlights similarities between competitive Bayesian persuasion games and all-pay auctions and generalized Colonel Blotto games.,christopher cotton,Not available,2018.0,10.1007/s00199-016-1021-0,Economic Theory,Raphael2018,False,,Springer,Not available,Limited capacity in project selection: competition through evidence production,f6807f233148def8881e841644a161c0,http://dx.doi.org/10.1007/s00199-016-1021-0 2121,Using a controlled laboratory experiment we examine individuals’ bid timing decisions in complete information all-pay auctions and find that homogeneous bidders are more likely to enter the early bidding stage under a favor-early tie-breaking rule. Furthermore revenue in an endogenous-entry treatment in which both sequential and simultaneous all-pay auctions exist is either lower than or equal to that in an exogenous-entry treatment with only simultaneous all-pay auctions. Additionally in simultaneous all-pay auctions individuals do not always employ a mixed strategy as predicted by the risk-neutral model. Instead our data is better rationalized by a risk- and loss-aversion model.,tracy liu,Not available,2018.0,10.1007/s00182-017-0586-6,International Journal of Game Theory,Xiao2018,False,,Springer,Not available,All-pay auctions with endogenous bid timing: an experimental study,97a30cba79bf98532aac2ab519172cab,http://dx.doi.org/10.1007/s00182-017-0586-6 2122,I consider a model of repeated auctions in which the distribution of bidders’ values is only known to the bidders and the seller attempts to learn this distribution to inform her choice of reserve prices in the future. I find that in any equilibrium bidders will shade their bids to act as if their values are drawn from a lower distribution than they actually are. The bid shading may be so severe that the seller would prefer to simply commit to setting the reserve price that would be optimal if bidders’ values were drawn from the lowest possible distribution to eliminate the incentive for bidders to shade their bids.,patrick hummel,Not available,2018.0,10.1007/s00182-017-0587-5,International Journal of Game Theory,Patrick2018,False,,Springer,Not available,Reserve prices in repeated auctions,58d09cfeb86e4d41fa012411d8a2c124,http://dx.doi.org/10.1007/s00182-017-0587-5 2123," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",subhash khot,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 2124,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,robert ekelund,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2125," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",richard lipton,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 2126," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",evangelos markakis,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 2127," We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1−1/",aranyak mehta,Not available,2008.0,10.1007/s00453-007-9105-7,Algorithmica,Subhash2008,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,59cec34a07ea021c5e01ad937ce6c464,http://dx.doi.org/10.1007/s00453-007-9105-7 2128,Campbell (J Econ Theory 82:425–450 1998) develops a self-enforced collusion mechanism in simultaneous auctions based on complete comparative cheap talk and endogenous entry with two bidders. His result is difficult to generalize to an arbitrary number of bidders since the entry-decision stage of the game is characterized by strategic substitutes. This paper analyzes more-than-two-bidder symmetric-prior cases. Two results are proved: (1) as the number of objects grows large a full comparative cheap talk equilibrium exists and it yields asymptotically fully efficient collusion; and (2) there is always a partial comparative cheap talk equilibrium. All these results are supported by intuitive equilibria at the entry-decision stage (J Econ Theory 130:205–219 2006; Math Soc Sci 2008 forthcoming). Numerical examples suggest that full comparative cheap talk equilibria are not uncommon even with few objects.,antonio miralles,Not available,2008.0,10.1007/s00199-008-0403-3,Economic Theory,Antonio2008,False,,Springer,Not available,Self-enforced collusion through comparative cheap talk in simultaneous auctions with entry,a170cf03f0674d54c00197d4cbba829d,http://dx.doi.org/10.1007/s00199-008-0403-3 2129,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,xin wang,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 2130,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,alan montgomery,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 2131,Recently fixed pricing and auctions have been brought together in a new pricing format that offers bidders the option of prematurely ending an auction at a fixed price. The growing popularity of auctions presents an interesting pricing decision for managers: whether to sell at a fixed price in a regular auction or through a buy-it-now auction. This paper studies eBay’s buy-it-now auction and answers the following research questions: why is fixed price used at traditional auctions will buy-it-now increase the seller’s profit how is an optimal price determined and how is the buy-it-now decision influenced by key factors such as the customer’s cost of participating in the auction the seller’s reserve price and the number of potential customers. Our results show that when customers make endogenous participation decisions according to their participation costs buy-it-now auctions can increase both customers’ utility and sellers’ profit. Endogenous participation has important implications for seller’s pricing decisions such as price formats and levels. Depending on the level of the posted price the resulting price format could be either fixed price buy-it-now auction or pure auction. Therefore the seller needs to be careful and take into account market conditions when posting a price at auctions. We empirically test the model assumptions and predictions using data collected from eBay.,kannan srinivasan,Not available,2008.0,10.1007/s11129-008-9041-0,Quantitative Marketing and Economics,Xin2008,False,,Springer,Not available,When auction meets fixed price: a theoretical and empirical examination of buy-it-now auctions,89ac6102761438c329eea90d87eec7f4,http://dx.doi.org/10.1007/s11129-008-9041-0 2132,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,adriano pereira,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 2133,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,leonardo rocha,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 2134,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,fernando mourao,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 2135,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,rand ressler,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2136,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,paulo goes,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 2137,Online auctions have challenged many assumptions and results from the traditional economic auction theory. Observed bidder behavior in online auctions often deviates from equilibrium strategies postulated by economic theory. In this research we consider an online auction as an information system that provides a long-duration information-rich dynamic application environment in which users (bidders) interact with the system in a feedback loop in what we term reactivity. Bidders react to the observed conditions of the auction and events triggered by actions of other bidders. In this work we propose a new characterization model with the purpose of isolating the segments of the auction in which users react to the auction conditions and events. Through this model it is possible to enrich the auction characterization. Despite the existence of other bidding characterization models none of them is enough for understanding the factors that characterize and explain the auction dynamics. We present results which demonstrate the advantages of applying our methodology. The final objective is to gain an understanding of what drives the dynamics of online auctions the role of reactivity in the auction dynamics and how the outcome of the auction is affected by the particular dynamics of the system.,wagner meira,Not available,2008.0,10.1007/s10799-008-0044-z,Information Technology and Management,Adriano2008,False,,Springer,Not available,Reactivity based model to study online auctions dynamics,637bfa035c8d5bd981600e9197312432,http://dx.doi.org/10.1007/s10799-008-0044-z 2138,We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins or having no winner rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first-price auction which gives higher performance. Thus to provide benefits the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities.,kay-yut chen,Not available,2008.0,10.1007/s11128-008-0079-4,Quantum Information Processing,Kay-Yut2008,False,,Springer,Not available,Experiments with probabilistic quantum auctions,cf53ce0f0169dc74b111a69955304eba,http://dx.doi.org/10.1007/s11128-008-0079-4 2139,We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins or having no winner rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first-price auction which gives higher performance. Thus to provide benefits the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities.,tad hogg,Not available,2008.0,10.1007/s11128-008-0079-4,Quantum Information Processing,Kay-Yut2008,False,,Springer,Not available,Experiments with probabilistic quantum auctions,cf53ce0f0169dc74b111a69955304eba,http://dx.doi.org/10.1007/s11128-008-0079-4 2140,In this paper we examine which auction format first-price or second-price a seller will choose when he can profitably cheat in a second price auction by observing all bids by possible buyers and submitting a shill bid as pretending to be a buyer. We model this choice of auction format in seller cheating as a signaling game in which the buyers may regard the selection of a second price auction by the seller as a signal that he is a shill bidder. By introducing trembling-hand perfectness as a refinement of signaling equilibrium we find two possible strictly perfect signaling equilibria. One is a separating equilibrium in which a noncheating honest seller selects a first price auction and a cheating seller does a second price auction. In another pooling equilibrium however both cheating and non-cheating sellers select a second price auction. The conclusion that a seller chooses a second price auction even if he cannot cheat is in contrast to the previous literature which focused on the case of independent values.,takahiro watanabe,Not available,2008.0,10.1007/s00199-007-0262-3,Economic Theory,Takahiro2008,False,,Springer,Not available,A choice of auction format in seller cheating: a signaling game analysis,68271bd34a1266de0809677a1f3b5558,http://dx.doi.org/10.1007/s00199-007-0262-3 2141,In this paper we examine which auction format first-price or second-price a seller will choose when he can profitably cheat in a second price auction by observing all bids by possible buyers and submitting a shill bid as pretending to be a buyer. We model this choice of auction format in seller cheating as a signaling game in which the buyers may regard the selection of a second price auction by the seller as a signal that he is a shill bidder. By introducing trembling-hand perfectness as a refinement of signaling equilibrium we find two possible strictly perfect signaling equilibria. One is a separating equilibrium in which a noncheating honest seller selects a first price auction and a cheating seller does a second price auction. In another pooling equilibrium however both cheating and non-cheating sellers select a second price auction. The conclusion that a seller chooses a second price auction even if he cannot cheat is in contrast to the previous literature which focused on the case of independent values.,takehiko yamato,Not available,2008.0,10.1007/s00199-007-0262-3,Economic Theory,Takahiro2008,False,,Springer,Not available,A choice of auction format in seller cheating: a signaling game analysis,68271bd34a1266de0809677a1f3b5558,http://dx.doi.org/10.1007/s00199-007-0262-3 2142,Despite the prevalence of grandfathered permits we still observe that a hybrid policy in which a fraction of initial emission permits is distributed through auctions is adopted in some cases. We also observe that some polluting industries support auctioned permits and that most environmental groups support grandfathered permits. This paper attempts to explain these phenomena from the perspective of political economy and investigates the conditions under which grandfathering auctions or a hybrid instrument will be the equilibrium policy. By constructing a two-stage lobbying game in which the type of policy instrument (auction grandfathering or a hybrid instrument) is determined in the first stage and then the number of permits is decided in the second stage we highlight the strategic interaction of the lobbying activities between the two stages in explaining the behavior of the lobbying groups.,yu-bong lai,Not available,2008.0,10.1007/s11127-008-9290-1,Public Choice,Yu-Bong2008,False,,Springer,Not available,Auctions or grandfathering: the political economy of tradable emission permits,57523ee6c3b8e8cbe88ed066002aa28b,http://dx.doi.org/10.1007/s11127-008-9290-1 2143,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,aloisio araujo,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 2144,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,luciano castro,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 2145,Discontinuous games such as auctions may require special tie-breaking rules to guarantee equilibrium existence. The best results available ensure equilibrium existence only in mixed strategy with endogenously defined tie-breaking rules and communication of private information. We show that an all-pay auction tie-breaking rule is sufficient for the existence of pure strategy equilibrium in a class of auctions. The rule is explicitly defined and does not require communication of private information. We also characterize when special tie-breaking rules are really needed.,humberto moreira,Not available,2008.0,10.1007/s00199-007-0249-0,Economic Theory,Aloisio2008,False,,Springer,Not available,Non-monotoniticies and the all-pay auction tie-breaking rule,59cedb14025ee6a46d19385f629a40c8,http://dx.doi.org/10.1007/s00199-007-0249-0 2146,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,john watson,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2147," Experimental research on first price sealed bid auctions has usually involved repeated settings with information feedback on winning bids and payoffs after each auction round. Relative to the risk neutral Nash equilibrium significantly higher bidding has been reported. The present paper reports the results of experimental first price auctions with ",tibor neugebauer,Not available,2008.0,10.1007/s10683-007-9166-0,Experimental Economics,Tibor2008,False,,Springer,Not available,Bidding ‘as if’ risk neutral in experimental first price auctions without information feedback,7fb84863d02b1643d7b60efda0811187,http://dx.doi.org/10.1007/s10683-007-9166-0 2148," Experimental research on first price sealed bid auctions has usually involved repeated settings with information feedback on winning bids and payoffs after each auction round. Relative to the risk neutral Nash equilibrium significantly higher bidding has been reported. The present paper reports the results of experimental first price auctions with ",javier perote,Not available,2008.0,10.1007/s10683-007-9166-0,Experimental Economics,Tibor2008,False,,Springer,Not available,Bidding ‘as if’ risk neutral in experimental first price auctions without information feedback,7fb84863d02b1643d7b60efda0811187,http://dx.doi.org/10.1007/s10683-007-9166-0 2149," I analyze the committee assignment process as an all-pay auction and derive equilibrium lobbying strategies of legislators competing for vacant seats on a committee. The model illustrates the relationship between sincere and revealed preferences which earlier formal models of committee assignment do not explicitly consider. Incorporating seniority party loyalty effort constraints or committee transfers can discourage those who highly value the assignment from competitively lobbying for the seat. I also offer an alternative interpretation of the model’s parameters to consider the pure partisan assignment model where efforts are contributions to the party’s collective good. ",daniel lee,Not available,2008.0,10.1007/s11127-007-9256-8,Public Choice,J.2008,False,,Springer,Not available,Going once going twice sold! The committee assignment process as an all-pay auction,b9c3beaaa79a09162d3ccff0584ec2fd,http://dx.doi.org/10.1007/s11127-007-9256-8 2150,Increasing role of services in developed economies around the world combined with ubiquitous presence of computer networks and information technologies result in rapid growth of e-services. Markets for e-services often require flexible pricing to be efficient and therefore frequently use auctions to satisfy this requirement. However auctions in e-service markets are recurring since typically e-services are offered repeatedly each time for a specific time interval. Additionally all e-services offered in an auction round must be sold to avoid resource waste. Finally enough bidders must be willing to participate in future auction rounds to prevent a collapse of market prices. Because of these requirements previously designed auctions cannot work efficiently in e-service markets. In this chapter we introduce and evaluate a novel auction called ,juong-sik lee,Not available,2007.0,10.1007/978-0-387-46364-3_5,Service Enterprise Integration,Juong-Sik2007,False,,Springer,Not available,Auctions as a Dynamic Pricing Mechanism for E-Services,27c252fbea455a9516afca08e77a5e2a,http://dx.doi.org/10.1007/978-0-387-46364-3_5 2151,Increasing role of services in developed economies around the world combined with ubiquitous presence of computer networks and information technologies result in rapid growth of e-services. Markets for e-services often require flexible pricing to be efficient and therefore frequently use auctions to satisfy this requirement. However auctions in e-service markets are recurring since typically e-services are offered repeatedly each time for a specific time interval. Additionally all e-services offered in an auction round must be sold to avoid resource waste. Finally enough bidders must be willing to participate in future auction rounds to prevent a collapse of market prices. Because of these requirements previously designed auctions cannot work efficiently in e-service markets. In this chapter we introduce and evaluate a novel auction called ,boleslaw szymanski,Not available,2007.0,10.1007/978-0-387-46364-3_5,Service Enterprise Integration,Juong-Sik2007,False,,Springer,Not available,Auctions as a Dynamic Pricing Mechanism for E-Services,27c252fbea455a9516afca08e77a5e2a,http://dx.doi.org/10.1007/978-0-387-46364-3_5 2152,We analyze symmetric pure strategy equilibria in dynamic sponsored search auction games using simulations by restricting the strategies to several in a class introduced by Cary et al. [1]. We show that a particular convergent strategy also exhibits high stability to deviations. On the other hand a strategy which yields high payoffs to all players is not sustainable in equilibrium play. Additionally we analyze a repeated game in which each stage is a static complete-information sponsored search game. In this setting we demonstrate a collusion strategy which yields high payoffs to all players and empirically show it to be sustainable over a range of settings.,yevgeniy vorobeychik,Not available,2007.0,10.1007/978-3-540-77105-0_17,Internet and Network Economics,Yevgeniy2007,False,,Springer,Not available,Equilibrium Analysis of Dynamic Bidding in Sponsored Search Auctions,f41aa01a3e3690b75cbd59f4e5fc8569,http://dx.doi.org/10.1007/978-3-540-77105-0_17 2153,We analyze symmetric pure strategy equilibria in dynamic sponsored search auction games using simulations by restricting the strategies to several in a class introduced by Cary et al. [1]. We show that a particular convergent strategy also exhibits high stability to deviations. On the other hand a strategy which yields high payoffs to all players is not sustainable in equilibrium play. Additionally we analyze a repeated game in which each stage is a static complete-information sponsored search game. In this setting we demonstrate a collusion strategy which yields high payoffs to all players and empirically show it to be sustainable over a range of settings.,daniel reeves,Not available,2007.0,10.1007/978-3-540-77105-0_17,Internet and Network Economics,Yevgeniy2007,False,,Springer,Not available,Equilibrium Analysis of Dynamic Bidding in Sponsored Search Auctions,f41aa01a3e3690b75cbd59f4e5fc8569,http://dx.doi.org/10.1007/978-3-540-77105-0_17 2154,We attempt to address the challenge of suggesting a useful bidding strategy to an agent in the an ad auction setting. We explore the possibility of using competitive safety strategies in that context; a ,danny kuminov,Not available,2007.0,10.1007/978-3-540-77105-0_13,Internet and Network Economics,Danny2007,False,,Springer,Not available,Competitive Safety Strategies in Position Auctions,edaa73e9f8b92beb21d96109c545580f,http://dx.doi.org/10.1007/978-3-540-77105-0_13 2155,We attempt to address the challenge of suggesting a useful bidding strategy to an agent in the an ad auction setting. We explore the possibility of using competitive safety strategies in that context; a ,moshe tennenholtz,Not available,2007.0,10.1007/978-3-540-77105-0_13,Internet and Network Economics,Danny2007,False,,Springer,Not available,Competitive Safety Strategies in Position Auctions,edaa73e9f8b92beb21d96109c545580f,http://dx.doi.org/10.1007/978-3-540-77105-0_13 2156,Future agent mediated eCommerce will involve open systems of agents interoperating between different institutions where different auction protocols may be in use. We argue that in order to achieve this agents will need a method to automatically verify the properties of a previously unseen auction protocol; for example they may wish to verify that it is fair and robust to deception. We are therefore interested in the problem of automatically verifying the game-theoretic properties of a given auction mechanism especially the property of strategyproofness. In this paper we show how the ,emmanuel tadjouddine,Not available,2007.0,10.1007/978-3-540-75254-7_29,Multi-Agent Systems and Applications V,M.2007,False,,Springer,Not available,Verifying Dominant Strategy Equilibria in Auctions,d5ede5bf52e58f1c98613f6e742634a6,http://dx.doi.org/10.1007/978-3-540-75254-7_29 2157,In a game described by Martin Shubik a dollar bill is put up for sale. It is offered at auction with a minimum bid of one cent. Anybody who bids this much can take the dollar provided of course that no one else offers more. The game proceeds according to the usual rules of auctions but with one exception. The special rule is that the auctioneer must be paid not only by the highest bidder but also by the second-highest bidder. The highest bidder pays what he bid and takes the dollar while the second-highest bidder pays what,laszlo mero,Not available,1998.0,10.1007/978-1-4612-1654-4_1,Moral Calculations,László1998,False,,Springer,Not available,Auction and Posing,404f0e518e36e7c3661c03de89539a20,http://dx.doi.org/10.1007/978-1-4612-1654-4_1 2158,Future agent mediated eCommerce will involve open systems of agents interoperating between different institutions where different auction protocols may be in use. We argue that in order to achieve this agents will need a method to automatically verify the properties of a previously unseen auction protocol; for example they may wish to verify that it is fair and robust to deception. We are therefore interested in the problem of automatically verifying the game-theoretic properties of a given auction mechanism especially the property of strategyproofness. In this paper we show how the ,frank guerin,Not available,2007.0,10.1007/978-3-540-75254-7_29,Multi-Agent Systems and Applications V,M.2007,False,,Springer,Not available,Verifying Dominant Strategy Equilibria in Auctions,d5ede5bf52e58f1c98613f6e742634a6,http://dx.doi.org/10.1007/978-3-540-75254-7_29 2159,We study the interaction between internet service providers who lease bandwidth from owners of individual network links to form desired routes. Bandwidth markets were pioneered by Enron in the late 1990s by providing pooling points for switching and interconnecting. Williams Communications and RateExchange followed suit with their own markets [1]. Unfortunately market dynamics technical difficulties and the collapse of Enron have brought these markets to an end. Two main factors hampered the implementation of these markets [2]. The first one has to do with the excessive time needed to disseminate new routing information which is an artifact of the bilateral nature of contracting for routes. The second has to do with balance loading once carriers become multi-connected. These dynamic markets were setup to deal with the inefficient bilateral negotiations used in the industry. The inefficiency of bilateral contracting is due to the exposure effect from not being able to form attractive routes from individually leased links. This is a more general problem identified with markets of complementary goods/services. The combinatorial auction market mechanism has been proposed to alleviate the exposure effect [9]. Combinatorial auctions have been recently theoretically explored as a mechanism for bandwidth allocation [3 7 5]. Jain and Varaiya [5] propose a double-sided combinatorial auction mechanism for bandwidth trading whose implementation properties we explore using economic experiments in this paper.,charis kaskiris,Not available,2007.0,10.1007/978-3-540-68660-6_17,Developments on Experimental Economics,Charis2007,False,,Springer,Not available,Combinatorial Auction Bandwidth Trading: An Experimental Study,acdb2ffd471378f47f4e0171054fbfed,http://dx.doi.org/10.1007/978-3-540-68660-6_17 2160,We study the interaction between internet service providers who lease bandwidth from owners of individual network links to form desired routes. Bandwidth markets were pioneered by Enron in the late 1990s by providing pooling points for switching and interconnecting. Williams Communications and RateExchange followed suit with their own markets [1]. Unfortunately market dynamics technical difficulties and the collapse of Enron have brought these markets to an end. Two main factors hampered the implementation of these markets [2]. The first one has to do with the excessive time needed to disseminate new routing information which is an artifact of the bilateral nature of contracting for routes. The second has to do with balance loading once carriers become multi-connected. These dynamic markets were setup to deal with the inefficient bilateral negotiations used in the industry. The inefficiency of bilateral contracting is due to the exposure effect from not being able to form attractive routes from individually leased links. This is a more general problem identified with markets of complementary goods/services. The combinatorial auction market mechanism has been proposed to alleviate the exposure effect [9]. Combinatorial auctions have been recently theoretically explored as a mechanism for bandwidth allocation [3 7 5]. Jain and Varaiya [5] propose a double-sided combinatorial auction mechanism for bandwidth trading whose implementation properties we explore using economic experiments in this paper.,rajul jain,Not available,2007.0,10.1007/978-3-540-68660-6_17,Developments on Experimental Economics,Charis2007,False,,Springer,Not available,Combinatorial Auction Bandwidth Trading: An Experimental Study,acdb2ffd471378f47f4e0171054fbfed,http://dx.doi.org/10.1007/978-3-540-68660-6_17 2161,We study the interaction between internet service providers who lease bandwidth from owners of individual network links to form desired routes. Bandwidth markets were pioneered by Enron in the late 1990s by providing pooling points for switching and interconnecting. Williams Communications and RateExchange followed suit with their own markets [1]. Unfortunately market dynamics technical difficulties and the collapse of Enron have brought these markets to an end. Two main factors hampered the implementation of these markets [2]. The first one has to do with the excessive time needed to disseminate new routing information which is an artifact of the bilateral nature of contracting for routes. The second has to do with balance loading once carriers become multi-connected. These dynamic markets were setup to deal with the inefficient bilateral negotiations used in the industry. The inefficiency of bilateral contracting is due to the exposure effect from not being able to form attractive routes from individually leased links. This is a more general problem identified with markets of complementary goods/services. The combinatorial auction market mechanism has been proposed to alleviate the exposure effect [9]. Combinatorial auctions have been recently theoretically explored as a mechanism for bandwidth allocation [3 7 5]. Jain and Varaiya [5] propose a double-sided combinatorial auction mechanism for bandwidth trading whose implementation properties we explore using economic experiments in this paper.,ram rajagopal,Not available,2007.0,10.1007/978-3-540-68660-6_17,Developments on Experimental Economics,Charis2007,False,,Springer,Not available,Combinatorial Auction Bandwidth Trading: An Experimental Study,acdb2ffd471378f47f4e0171054fbfed,http://dx.doi.org/10.1007/978-3-540-68660-6_17 2162,We study the interaction between internet service providers who lease bandwidth from owners of individual network links to form desired routes. Bandwidth markets were pioneered by Enron in the late 1990s by providing pooling points for switching and interconnecting. Williams Communications and RateExchange followed suit with their own markets [1]. Unfortunately market dynamics technical difficulties and the collapse of Enron have brought these markets to an end. Two main factors hampered the implementation of these markets [2]. The first one has to do with the excessive time needed to disseminate new routing information which is an artifact of the bilateral nature of contracting for routes. The second has to do with balance loading once carriers become multi-connected. These dynamic markets were setup to deal with the inefficient bilateral negotiations used in the industry. The inefficiency of bilateral contracting is due to the exposure effect from not being able to form attractive routes from individually leased links. This is a more general problem identified with markets of complementary goods/services. The combinatorial auction market mechanism has been proposed to alleviate the exposure effect [9]. Combinatorial auctions have been recently theoretically explored as a mechanism for bandwidth allocation [3 7 5]. Jain and Varaiya [5] propose a double-sided combinatorial auction mechanism for bandwidth trading whose implementation properties we explore using economic experiments in this paper.,pravin varaiya,Not available,2007.0,10.1007/978-3-540-68660-6_17,Developments on Experimental Economics,Charis2007,False,,Springer,Not available,Combinatorial Auction Bandwidth Trading: An Experimental Study,acdb2ffd471378f47f4e0171054fbfed,http://dx.doi.org/10.1007/978-3-540-68660-6_17 2163,"In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one is interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. Based on garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: ",markus hinkelmann,Not available,2007.0,10.1007/978-3-540-72504-6_44,Theory and Applications of Models of Computation,Markus2007,False,,Springer,Not available,,c14517030397c0d1144951a7c5a71d09,http://dx.doi.org/10.1007/978-3-540-72504-6_44 2164,"In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one is interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. Based on garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: ",andreas jakoby,Not available,2007.0,10.1007/978-3-540-72504-6_44,Theory and Applications of Models of Computation,Markus2007,False,,Springer,Not available,,c14517030397c0d1144951a7c5a71d09,http://dx.doi.org/10.1007/978-3-540-72504-6_44 2165,"In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one is interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. Based on garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: ",peer stechert,Not available,2007.0,10.1007/978-3-540-72504-6_44,Theory and Applications of Models of Computation,Markus2007,False,,Springer,Not available,,c14517030397c0d1144951a7c5a71d09,http://dx.doi.org/10.1007/978-3-540-72504-6_44 2166,This paper discusses two advancements in the theory of designing truthful randomized mechanisms.Our first contribution is a new framework for developing truthful randomized mechanisms. The framework enables the construction of mechanisms with polynomially small failure probability. This is in contrast to previous mechanisms that fail with constant probability. Another appealing feature of the new framework is that bidding truthfully is a ,shahar dobzinski,Not available,2007.0,10.1007/978-3-540-74208-1_7,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Shahar2007,False,,Springer,Not available,Two Randomized Mechanisms for Combinatorial Auctions,a03ddf3acbd1873a9eb69094507f8f04,http://dx.doi.org/10.1007/978-3-540-74208-1_7 2167,We study sequential auctions for private value objects and unit-demand bidders using second-price sealed-bid rules. We analyze this scenario from the seller’s perspective and consider several approaches to increasing the total revenue. We derive the equilibrium bidding strategies for each individual auction. We then study the problem of selecting an optimal agenda i.e. a revenue-maximizing ordering of the auctions. We describe an efficient algorithm that finds an optimal agenda in the important special case when the revenue of each auction is guaranteed to be strictly positive. We also show that the seller can increase his revenue by canceling one or more auctions even if the number of bidders exceeds the number of objects for sale and analyze the bidders’ behavior and the seller’s profit for different cancellation rules.,edith elkind,Not available,2007.0,10.1007/978-3-540-77105-0_53,Internet and Network Economics,Edith2007,False,,Springer,Not available,Maximizing Revenue in Sequential Auctions,4ce506cb1018f4b095e0d7b10a16f073,http://dx.doi.org/10.1007/978-3-540-77105-0_53 2168,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,boening van,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2169,We study sequential auctions for private value objects and unit-demand bidders using second-price sealed-bid rules. We analyze this scenario from the seller’s perspective and consider several approaches to increasing the total revenue. We derive the equilibrium bidding strategies for each individual auction. We then study the problem of selecting an optimal agenda i.e. a revenue-maximizing ordering of the auctions. We describe an efficient algorithm that finds an optimal agenda in the important special case when the revenue of each auction is guaranteed to be strictly positive. We also show that the seller can increase his revenue by canceling one or more auctions even if the number of bidders exceeds the number of objects for sale and analyze the bidders’ behavior and the seller’s profit for different cancellation rules.,shaheen fatima,Not available,2007.0,10.1007/978-3-540-77105-0_53,Internet and Network Economics,Edith2007,False,,Springer,Not available,Maximizing Revenue in Sequential Auctions,4ce506cb1018f4b095e0d7b10a16f073,http://dx.doi.org/10.1007/978-3-540-77105-0_53 2170,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,jianjun zhang,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 2171,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,liwen chen,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 2172,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,jingmin zhang,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 2173,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,wen xue,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 2174,We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with a fixed number of items to sell and study some important properties of those with an indefinite number of sales.,xiaotie deng,Not available,2007.0,10.1007/978-3-540-73545-8_27,Computing and Combinatorics,Xiaotie2007,False,,Springer,Not available,Properties of Symmetric Incentive Compatible Auctions,9f62fadfa76427c0bd8c1f640a960575,http://dx.doi.org/10.1007/978-3-540-73545-8_27 2175,We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with a fixed number of items to sell and study some important properties of those with an indefinite number of sales.,kazuo iwama,Not available,2007.0,10.1007/978-3-540-73545-8_27,Computing and Combinatorics,Xiaotie2007,False,,Springer,Not available,Properties of Symmetric Incentive Compatible Auctions,9f62fadfa76427c0bd8c1f640a960575,http://dx.doi.org/10.1007/978-3-540-73545-8_27 2176,We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with a fixed number of items to sell and study some important properties of those with an indefinite number of sales.,qi qi,Not available,2007.0,10.1007/978-3-540-73545-8_27,Computing and Combinatorics,Xiaotie2007,False,,Springer,Not available,Properties of Symmetric Incentive Compatible Auctions,9f62fadfa76427c0bd8c1f640a960575,http://dx.doi.org/10.1007/978-3-540-73545-8_27 2177,We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with a fixed number of items to sell and study some important properties of those with an indefinite number of sales.,aries sun,Not available,2007.0,10.1007/978-3-540-73545-8_27,Computing and Combinatorics,Xiaotie2007,False,,Springer,Not available,Properties of Symmetric Incentive Compatible Auctions,9f62fadfa76427c0bd8c1f640a960575,http://dx.doi.org/10.1007/978-3-540-73545-8_27 2178,We formalize the definition of symmetric auctions to study fundamental properties of incentive compatible auction protocols. We characterize such auction protocols for those with a fixed number of items to sell and study some important properties of those with an indefinite number of sales.,toyotaka tasaka,Not available,2007.0,10.1007/978-3-540-73545-8_27,Computing and Combinatorics,Xiaotie2007,False,,Springer,Not available,Properties of Symmetric Incentive Compatible Auctions,9f62fadfa76427c0bd8c1f640a960575,http://dx.doi.org/10.1007/978-3-540-73545-8_27 2179,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,stephen rassenti,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2180,We study a sequential all-pay auction with two contestants who are privately informed about a parameter (ability) that affects their cost of effort. We characterize the unique perfect Bayesian equilibrium of this sequential all-pay auction and analyze if giving a head start i.e. an exogenously determined mechanism that increases the winning probability of the first mover for any level of effort she exerts improves the contestants’ performance. In particular we analyze the difference between a multiplicative head start and an additive head start with respect to the effect on the contestants’ performance.,ella segev,Not available,2014.0,10.1007/s00355-014-0816-9,Social Choice and Welfare,Ella2014,False,,Springer,Not available,Sequential all-pay auctions with head starts,e9907001a67e1cff75789ac4aa3336bb,http://dx.doi.org/10.1007/s00355-014-0816-9 2181,We study a sequential all-pay auction with two contestants who are privately informed about a parameter (ability) that affects their cost of effort. We characterize the unique perfect Bayesian equilibrium of this sequential all-pay auction and analyze if giving a head start i.e. an exogenously determined mechanism that increases the winning probability of the first mover for any level of effort she exerts improves the contestants’ performance. In particular we analyze the difference between a multiplicative head start and an additive head start with respect to the effect on the contestants’ performance.,aner sela,Not available,2014.0,10.1007/s00355-014-0816-9,Social Choice and Welfare,Ella2014,False,,Springer,Not available,Sequential all-pay auctions with head starts,e9907001a67e1cff75789ac4aa3336bb,http://dx.doi.org/10.1007/s00355-014-0816-9 2182,A principal uses security bid auctions to award an incentive contract to one among several agents in the presence of hidden action and hidden information. Securities range from cash to equity and call options. “Steeper” securities are better surplus extractors yet reduce effort incentives. In view of this trade-off a hybrid share auction that includes a cash reward to the winner a minimum share and an option to call a fixed wage contract tends to outperform all other auctions although it is not an optimal mechanism. However by adding output targets a hybrid share auction can (arbitrary closely) implement the optimal mechanism.,byoung jun,Not available,2014.0,10.1007/s10058-014-0165-2,Review of Economic Design,Heon2014,False,,Springer,Not available,Security bid auctions for agency contracts,fa9df8d512524b6597ba98bea74f18f7,http://dx.doi.org/10.1007/s10058-014-0165-2 2183,A principal uses security bid auctions to award an incentive contract to one among several agents in the presence of hidden action and hidden information. Securities range from cash to equity and call options. “Steeper” securities are better surplus extractors yet reduce effort incentives. In view of this trade-off a hybrid share auction that includes a cash reward to the winner a minimum share and an option to call a fixed wage contract tends to outperform all other auctions although it is not an optimal mechanism. However by adding output targets a hybrid share auction can (arbitrary closely) implement the optimal mechanism.,elmar wolfstetter,Not available,2014.0,10.1007/s10058-014-0165-2,Review of Economic Design,Heon2014,False,,Springer,Not available,Security bid auctions for agency contracts,fa9df8d512524b6597ba98bea74f18f7,http://dx.doi.org/10.1007/s10058-014-0165-2 2184,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,vaghefi sharif,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 2185,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,vaghefi sharif,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 2186,Group-buying auction is a new business model in e-commerce. This auction has its own characteristics that make it distinct from other types of auctions. Customers' waiting time is an inherent attribute for group-buying auction. However this attribute is rarely considered in the previous pricing models. Therefore finding an appropriate pricing model for it seems to be of great importance. In this paper with the help of game-theory concepts and according to each customer's waiting time in group-buying auction a pricing model for a duopolistic market is proposed which takes into account both customers' and sellers' satisfaction. The pricing model shows that customers' awareness of Internet group-buying auction is so important and if it is lower than a boundary value then the group-buying seller could not compete in the market. The model emphasizes on economies of scale as a significant factor in the success of the auction. The model also stresses the importance of gaining customers with lower product value in the group-buying auction.,neshat beheshti,Not available,2014.0,10.1007/s11002-013-9262-1,Marketing Letters,Mahyar2014,False,,Springer,Not available,A pricing model for group-buying auction based on customers' waiting-time,d1c17e4966487e4dfd732ff10baab9b9,http://dx.doi.org/10.1007/s11002-013-9262-1 2187,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,stefano barbieri,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 2188,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,david malueg,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 2189,We analyze an all-pay group contest in which individual members’ efforts are aggregated via the best-shot technology and the prize is a public good for the winning group. The interplay of within-group free-riding and across-group competition allows for a wide variety of equilibria according to how well groups overcome internal free-riding. In contrast with the existing literature we derive equilibria of a symmetric model in which multiple agents per group are active. Our findings differ qualitatively from those of the individualistic all-pay auction: rents are not necessarily dissipated in equilibrium total expected efforts vary across equilibria and participation is expected to be greater. Moreover equilibria with greater symmetry of behavior within a group are shown to have more “wasted” effort but also greater payoffs as overall efforts are lower. In contrast to standard economic intuition free-riding can be beneficial for players as it reduces competition among groups. Examples of asymmetric group contests are also studied.,iryna topolyan,Not available,2014.0,10.1007/s00199-014-0847-6,Economic Theory,Stefano2014,False,,Springer,Not available,The best-shot all-pay (group) auction with complete information,90d9f530f689e16c78565cd39afa98a8,http://dx.doi.org/10.1007/s00199-014-0847-6 2190,We use numerical methods to compute Nash equilibrium (NE) bid functions for four agents bidding in a first-price auction. Each bidder i is randomly assigned: ri ɛ [0 rmax] where 1 − ri is the Arrow-Pratt measure of constant relative risk aversion. Each ri is independently drawn from the cumulative distribution function Φ(ċ) a beta distribution on [0 rmax]. For various values of the maximum propensity to seek risk rmax the expected value of any bidder's risk characteristic E(ri) and the probability that any bidder is risk seeking P(ri > 1) we determine the nonlinear characteristics of the (NE) bid functions.,vernon smith,Not available,1998.0,10.1023/A:1009992209358,Experimental Economics,V.1998,False,,Springer,Not available,Numerical Computation of Equilibrium Bid Functions in a First-Price Auction with Heterogeneous Risk Attitudes,20b2616b16944a705971ee4c9fb586d8,http://dx.doi.org/10.1023/A:1009992209358 2191,In an environment with dynamic arrivals of players who wish to purchase only one of multiple identical objects for which they have a private value we analyze a sequential auction mechanism with an activity rule. If the players play undominated strategies then we are able to bound the efficiency loss compared to an optimal mechanism that maximizes the total welfare. We have no assumptions on the underlying distribution from which the players’ arrival times and valuations for the object are drawn. Moreover we have no assumption of a common prior on this distribution.,ron lavi,Not available,2014.0,10.1007/s00182-013-0405-7,International Journal of Game Theory,Ron2014,False,,Springer,Not available,Efficiency levels in sequential auctions with dynamic arrivals,6999e22c1741d44fc0fee82388644e19,http://dx.doi.org/10.1007/s00182-013-0405-7 2192,In an environment with dynamic arrivals of players who wish to purchase only one of multiple identical objects for which they have a private value we analyze a sequential auction mechanism with an activity rule. If the players play undominated strategies then we are able to bound the efficiency loss compared to an optimal mechanism that maximizes the total welfare. We have no assumptions on the underlying distribution from which the players’ arrival times and valuations for the object are drawn. Moreover we have no assumption of a common prior on this distribution.,ella segev,Not available,2014.0,10.1007/s00182-013-0405-7,International Journal of Game Theory,Ron2014,False,,Springer,Not available,Efficiency levels in sequential auctions with dynamic arrivals,6999e22c1741d44fc0fee82388644e19,http://dx.doi.org/10.1007/s00182-013-0405-7 2193,We study slow Dutch auctions where the clock does not fall instantaneously but instead falls over time. Buyers are assumed less patient than the seller. In a symmetric setting we investigate the properties of the optimal revenue-maximizing clock. We find that the clock is genuinely dynamic and the auction involves delays.,artyom shneyerov,Not available,2014.0,10.1007/s00199-014-0825-z,Economic Theory,Artyom2014,False,,Springer,Not available,An optimal slow Dutch auction,765df37a506527054edb313ed759514a,http://dx.doi.org/10.1007/s00199-014-0825-z 2194,We compare two procurement mechanisms bundling and unbundling in a two-stage auction model with risk-averse suppliers. The mechanisms differ in that the two tasks of investment and production are procured through a single auction or two sequential auctions. Suppliers’ production costs are affected by two risk factors aggregate risk and idiosyncratic risk as well as by the cost-reducing investment. We show that the bundling mechanism is optimal for a buyer and socially desirable if the aggregate risk is below certain thresholds. The result may not hold true for idiosyncratic risk.,takeshi nishimura,Not available,2014.0,10.1007/s00712-013-0381-1,Journal of Economics,Takeshi2014,False,,Springer,Not available,Sequential procurement auctions with risk-averse suppliers,9cfe5cf4163271d0d56a87a6c2e622b7,http://dx.doi.org/10.1007/s00712-013-0381-1 2195,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,bo dai,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 2196,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,haoxun chen,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 2197,A carrier collaboration problem with pickup and delivery requests is considered in which multiple carriers form an alliance to share their pickup and delivery requests and vehicle capacities in order to reduce their transportation costs and consequently increase their profits. A multi-round pricing-setting based combinatorial auction approach is proposed to solve the problem. In each round of the auction the auctioneer updates the price for serving each request based on Lagrangian relaxation and each carrier who is a bidder determines its requests to be outsourced and the requests to be acquired from other carriers by solving a request selection problem based on the prices. Different price adjustment methods are proposed and compared. Numerical experiments on randomly generated instances demonstrate the effectiveness of the approach.,genke yang,Not available,2014.0,10.1007/s12351-014-0141-1,Operational Research,Bo2014,False,,Springer,Not available,Price-setting based combinatorial auction approach for carrier collaboration with pickup and delivery requests,ad424f0e21f4b934a057f01e69276004,http://dx.doi.org/10.1007/s12351-014-0141-1 2198,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,olivier marce,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 2199,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,hoang-hai tran,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 2200,In the next generation Internet we have seen the convergence of multimedia services and Internet with the mobility of users. Vertical handover decision (VHD) algorithm are essential components of the mobility management architecture in mobile wireless networks. VHD algorithms help mobile users to choose the best mobile network to connect among available candidates. It also can help the network manager to optimize easily the limited resources shared among the network providers and the users. In this article we formulate VHD algorithm as a resource allocation problem for down-link transmission power in multiple W-CDMA networks and show how combinatorial double-sided auctions can be applied to this specific problem. The proposed pricing schemes make use of the signal interference to noise ratio achievable data rates power allocation at mobile networks and monetary cost as decision criteria and our model differentiate between new calls and on-going communications to take into account that the last category has somewhat more importance. Several combinatorial double-sided auction are proposed to maximize the social welfare and /or to provide incentives for mobile users and mobile operators to be truth-telling in terms of valuation or cost. Finally the economic properties of the different proposed pricing schemes are also studied by means of simulations.,bruno tuffin,Not available,2014.0,10.1007/s10922-013-9269-1,Journal of Network and Systems Management,Olivier2014,False,,Springer,Not available,Double-sided auctions applied to vertical handover for mobility management in wireless networks,6b7d2798524f0a7203ec3dc642ed4c75,http://dx.doi.org/10.1007/s10922-013-9269-1 2201,Countless experimental studies have shown that markets converge quickly and efficiently to the competitive outcome under many trading institutions particularly the double auction mechanism. This creates difficulties for Keynesian stories of unemployment creation—which suggest a noncompetitive outcome in an essentially competitive world. Such stories were popular in the late 1960s and 1970s. One of these stories—the dual decision hypothesis of Clower—was seen then as the beginning of a story of unemployment. This article reports the results of an experiment designed to test this hypothesis. Specifically we set up an experiment in which there are two sequential double-auction markets in the first of which one good (labour) is traded after which the second market (goods) is opened and the second good traded. We compare the outcome of our experiment with that of the competitive theory. One general finding is that not enough trade takes place in the two markets. In other words the usual finding that competitive equilibrium is achieved in double-auction markets is not replicated in this sequential setting.,john hey,Not available,1998.0,10.1023/A:1009909900914,Experimental Economics,D.1998,False,,Springer,Not available,Sequential Markets: An Experimental Investigation of Clower's Dual-Decision Hypothesis,14c0eed1e47ac9cdecc1dd1d3467c702,http://dx.doi.org/10.1023/A:1009909900914 2202,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,chen-kun tsung,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 2203,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,hann-jang ho,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 2204,In this study we aim to develop a pricing mechanism that reduces the effects resulted by vindictive advertisers who bid on sponsored search auctions run by search engine providers. In particular we aim to ensure payment fairness and price stability in these auctions. With the generalized second price principle advertisers pay the next-ranked bid value rather than the price that they bid. Vindictive bidders take advantage of this principle to manipulate the payment of a previously-ranked advertiser. Vindictive bidding results in unfair outcomes and eliminates equilibria. However it is difficult to compute rational payments for all advertisers as advertisers’ valuations are private. Our proposed mechanism decreases the payment to make up for the utility loss that is induced by vindictive bidding. The vindictive advertiser is simultaneously punished with an additional payment. According to our theoretical analyses and simulations the proposed mechanism efficiently decreases the effects that result from vindictive bidding and guarantees equilibrium outcomes.,sing-ling lee,Not available,2014.0,10.1007/s11227-013-1002-z,The Journal of Supercomputing,Chen-Kun2014,False,,Springer,Not available,Correcting vindictive bidding behaviors in sponsored search auctions,4dfa4979f1d94052d63177bb36402964,http://dx.doi.org/10.1007/s11227-013-1002-z 2205, This paper studies ‘knockout’ auctions typically organized by bidding rings in which the winning bidder makes side-payments to all losing bidders. These side-payments provide an incentive for the ring members to bid higher than they would have in an identical public auction. As a consequence neither the realized price nor the total payments of the winner are unbiased estimates of the item's price in the absence of collusion. This paper evaluates the extent of this overestimate in the independent private values case for first and second price post-auction knockouts. Bids are not independent of the sharing rule but transfers from the winning bidder are. Further bidder payoffs are independent of both the auction format and the sharing rule. The “overbidding” in the knockout is increasing with the dispersion of bidder valuations and of significant empirical relevance. This paper's results can be used to obtain an unbiased assessment of the damages inflicted on the seller.,george deltas,Not available,2002.0,10.1007/PL00004213,Economic Theory,George2002,False,,Springer,Not available,Determining damages from the operation of bidding rings: An analysis of the post-auction `knockout' sale,d5137b04ac3ced4258f73257ebf8c95c,http://dx.doi.org/10.1007/PL00004213 2206, This paper studies sequential auctions of licences to participate in a symmetric market game. Assuming that the rate at which industry profits decrease with repeated entry is ,gustavo rodriguez,Not available,2002.0,10.1007/PL00004211,Economic Theory,E.2002,False,,Springer,Not available,Auctions of licences and market structure,a0554a0da53d14cb60196df356217bcf,http://dx.doi.org/10.1007/PL00004211 2207,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,makoto yokoo,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 2208,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,yuko sakurai,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 2209,In this paper we develop a new combinatorial auction protocol to thwart the fraudulent practice called false-name bids. Auctions conducted over the Internet have become immensely popular and form a pillar of Electronic Commerce (EC) as we know it today. In particular the Internet offers promising opportunities for executing complicated types of auctions such as combinatorial auctions where multiple goods are sold at the same time. However this potential also opens the door to a new method of cheating called false-name bids where an agent attempts to profit from submitting several bids under fictitious names.When there is no possibility of false-name bids the Generalized Vickrey Auction protocol (GVA) is suitable because it satisfies three key conditions i.e. individual rationality Pareto efficiency and incentive compatibility. However if agents can submit false-name bids it is theoretically impossible for a combinatorial auction protocol to simultaneously satisfy all of the three conditions.Considering the above drawback we have modified the GVA to a new protocol called the Leveled Division Set protocol (LDS). The LDS adaptively decides whether to sell goods in a bundle or separately based on reservation prices of the auctioned goods. The LDS can guarantee individual rationality and incentive compatibility but cannot always guarantee to achieve a Pareto efficient social surplus. The results of simulations show that the LDS can achieve a superior social surplus compared with a a protocol that sells all goods in one bundle.,shigeo matsubara,Not available,2002.0,10.1007/978-1-4615-1107-6_17,Game Theory and Decision Theory in Agent-Based Systems,Makoto2002,False,,Springer,Not available,Robust Combinatorial Auction Protocol Against False-Name Bids,09d2773708fafcb7b164008cf2a7264e,http://dx.doi.org/10.1007/978-1-4615-1107-6_17 2210,This paper is an experimental study of a repeated first price sealed bid auction with private values. Values are drawn independently each round and are private information. In each round of the game players are allowed to send simultaneously messages about their current value. These messages are cheap talk and have no direct payoff consequences. Moreover communication is ,jana vyrastekova,Not available,2002.0,10.1007/978-1-4615-0917-2_15,Experimental Economics: Financial Markets Auctions and Decision Making,Jana2002,False,,Springer,Not available,Collusion in Auctions with Structured Communication: An Experimental Study,137edd25dbfa3ec297c86404d1f39a0a,http://dx.doi.org/10.1007/978-1-4615-0917-2_15 2211,This paper is an experimental study of a repeated first price sealed bid auction with private values. Values are drawn independently each round and are private information. In each round of the game players are allowed to send simultaneously messages about their current value. These messages are cheap talk and have no direct payoff consequences. Moreover communication is ,maria montero,Not available,2002.0,10.1007/978-1-4615-0917-2_15,Experimental Economics: Financial Markets Auctions and Decision Making,Jana2002,False,,Springer,Not available,Collusion in Auctions with Structured Communication: An Experimental Study,137edd25dbfa3ec297c86404d1f39a0a,http://dx.doi.org/10.1007/978-1-4615-0917-2_15 2212,Countless experimental studies have shown that markets converge quickly and efficiently to the competitive outcome under many trading institutions particularly the double auction mechanism. This creates difficulties for Keynesian stories of unemployment creation—which suggest a noncompetitive outcome in an essentially competitive world. Such stories were popular in the late 1960s and 1970s. One of these stories—the dual decision hypothesis of Clower—was seen then as the beginning of a story of unemployment. This article reports the results of an experiment designed to test this hypothesis. Specifically we set up an experiment in which there are two sequential double-auction markets in the first of which one good (labour) is traded after which the second market (goods) is opened and the second good traded. We compare the outcome of our experiment with that of the competitive theory. One general finding is that not enough trade takes place in the two markets. In other words the usual finding that competitive equilibrium is achieved in double-auction markets is not replicated in this sequential setting.,daniela cagno,Not available,1998.0,10.1023/A:1009909900914,Experimental Economics,D.1998,False,,Springer,Not available,Sequential Markets: An Experimental Investigation of Clower's Dual-Decision Hypothesis,14c0eed1e47ac9cdecc1dd1d3467c702,http://dx.doi.org/10.1023/A:1009909900914 2213,Auctions can be thought of as a method for resource allocation. The economic theory behind such systems is ,steve phelps,Not available,2002.0,10.1007/3-540-36378-5_8,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Steve2002,False,,Springer,Not available,Co-evolutionary Auction Mechanism Design: A Preliminary Report,bf4bb646991d171b1bf3758c271551f0,http://dx.doi.org/10.1007/3-540-36378-5_8 2214,Auctions can be thought of as a method for resource allocation. The economic theory behind such systems is ,peter mcburney,Not available,2002.0,10.1007/3-540-36378-5_8,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Steve2002,False,,Springer,Not available,Co-evolutionary Auction Mechanism Design: A Preliminary Report,bf4bb646991d171b1bf3758c271551f0,http://dx.doi.org/10.1007/3-540-36378-5_8 2215,Auctions can be thought of as a method for resource allocation. The economic theory behind such systems is ,simon parsons,Not available,2002.0,10.1007/3-540-36378-5_8,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Steve2002,False,,Springer,Not available,Co-evolutionary Auction Mechanism Design: A Preliminary Report,bf4bb646991d171b1bf3758c271551f0,http://dx.doi.org/10.1007/3-540-36378-5_8 2216,Auctions can be thought of as a method for resource allocation. The economic theory behind such systems is ,elizabeth sklar,Not available,2002.0,10.1007/3-540-36378-5_8,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Steve2002,False,,Springer,Not available,Co-evolutionary Auction Mechanism Design: A Preliminary Report,bf4bb646991d171b1bf3758c271551f0,http://dx.doi.org/10.1007/3-540-36378-5_8 2217,The goal of this paper is to investigate the convergence property in a double auction market and test the robustness of the results. We construct an artificial equity market where agents trade a risky asset that pays a stochastic dividend each period. Artificial Neural Networks take on the role of traders who form their expectations about the future return and place orders based on their expectations. Market prices are set endogenously by trading among agents in a double auction market. The efficiency of this artificial market is measured by the convergence of the price to the Rational Expectations Equilibrium (REE). We find that market dynamics under double auction converge to the REE in in some ex-periments. This convergence however is sensitive to the deviation from rationality among the agents. In the experiment where we introduce noise trading convergence becomes unattainable. Minimal rationality is not sufficient to generate convergence in a double auction market when the market price is endogenous.,jing yang,Not available,2002.0,10.1007/978-3-7908-1784-3_5,Evolutionary Computation in Economics and Finance,Jing2002,False,,Springer,Not available,The Efficiency of an Artificial Double Auction Stock Market with Neural Learning Agents,3b48816e5ea35ee40b3ef92896af75a3,http://dx.doi.org/10.1007/978-3-7908-1784-3_5 2218,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,karhan akcoglu,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2219,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,james aspnes,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2220,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,bhaskar dasgupta,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2221,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,ming-yang kao,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2222,Among economic theorists proving the existence of a competitive general equilibrium and then evaluating the equilibrium allocation of goods and services has been a major endeavor. The pile of papers on existence and attributes of the general equilibrium is Everest-like while comparatively the pile of papers on getting to equilibrium is like a ski-slope in Florida. Some of the papers in the smaller pile are motivated by the desire to avoid the problems of employing the mythical archetypal Walrasian auctioneer (see Hahn 1988). That desire while understood requires the difficult activity of speci-fying the price-setting process and determining if that process leads to equilibrium. We consider an alternative premise: that using electrocardiograms to infer brain function of players in an English Auction yields a more complete sketch of how a simple economy gets to equilibrium. We make this proposal fully aware that this attempt is a small first step in discovering the processes employed in getting to equilibrium in more complicated institutions.,john dickhaut,Not available,2002.0,10.1007/978-1-4757-5196-3_9,Experimental Business Research,John2002,False,,Springer,Not available,Physiological Anticipation and Endowment Effects: Inferred Brain Function in the Formation of Allocations in an English Auction,51c53779a64f52c04ede20b74da1c1ba,http://dx.doi.org/10.1007/978-1-4757-5196-3_9 2223,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,eric greenleaf,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 2224,We study a variation of Myerson’s (1981) model in which we allow for uncertainty about the number of bidders. In our set-up an appropriate reserve price in a standard auction maximizes the auctioneer’s expected revenue. However entry fees can be optimal only under some special conditions. Basically there must be some homogeneity in bidders’ beliefs about the number of bidders and the auctioneer must know to some extent these beliefs.,angel hernando-veciana,Not available,2006.0,10.1007/s10058-006-0001-4,Review of Economic Design,Ángel2006,False,,Springer,Not available,On the Sub-optimality of Entry Fees in Auctions With Entry,d4824805dc66cd35bbcd57dcd98facc5,http://dx.doi.org/10.1007/s10058-006-0001-4 2225,In a market of indivisible objects where a buyer consumes at most one object the buyer-optimal auction is a multi-item generalization of Vickrey's second-price auction. If the optimal auction is formulated as a strategic game it is well-known that it satisfies good incentive properties i.e. the honest strategy profile is a Nash equilibrium a unique perfect equilibrium and a dominant strategy equilibrium. For each of the three incentive properties it is shown that the optimal auction is a,mitsunobu miyake,Not available,1998.0,10.1007/BF01243191,International Journal of Game Theory,Mitsunobu1998,False,,Springer,Not available,On the incentive properties of multi-item auctions,1e348e22d0d89dd349601fc30a8c4866,http://dx.doi.org/10.1007/BF01243191 2226,Among economic theorists proving the existence of a competitive general equilibrium and then evaluating the equilibrium allocation of goods and services has been a major endeavor. The pile of papers on existence and attributes of the general equilibrium is Everest-like while comparatively the pile of papers on getting to equilibrium is like a ski-slope in Florida. Some of the papers in the smaller pile are motivated by the desire to avoid the problems of employing the mythical archetypal Walrasian auctioneer (see Hahn 1988). That desire while understood requires the difficult activity of speci-fying the price-setting process and determining if that process leads to equilibrium. We consider an alternative premise: that using electrocardiograms to infer brain function of players in an English Auction yields a more complete sketch of how a simple economy gets to equilibrium. We make this proposal fully aware that this attempt is a small first step in discovering the processes employed in getting to equilibrium in more complicated institutions.,kip smith,Not available,2002.0,10.1007/978-1-4757-5196-3_9,Experimental Business Research,John2002,False,,Springer,Not available,Physiological Anticipation and Endowment Effects: Inferred Brain Function in the Formation of Allocations in an English Auction,51c53779a64f52c04ede20b74da1c1ba,http://dx.doi.org/10.1007/978-1-4757-5196-3_9 2227,Among economic theorists proving the existence of a competitive general equilibrium and then evaluating the equilibrium allocation of goods and services has been a major endeavor. The pile of papers on existence and attributes of the general equilibrium is Everest-like while comparatively the pile of papers on getting to equilibrium is like a ski-slope in Florida. Some of the papers in the smaller pile are motivated by the desire to avoid the problems of employing the mythical archetypal Walrasian auctioneer (see Hahn 1988). That desire while understood requires the difficult activity of speci-fying the price-setting process and determining if that process leads to equilibrium. We consider an alternative premise: that using electrocardiograms to infer brain function of players in an English Auction yields a more complete sketch of how a simple economy gets to equilibrium. We make this proposal fully aware that this attempt is a small first step in discovering the processes employed in getting to equilibrium in more complicated institutions.,kevin mccabe,Not available,2002.0,10.1007/978-1-4757-5196-3_9,Experimental Business Research,John2002,False,,Springer,Not available,Physiological Anticipation and Endowment Effects: Inferred Brain Function in the Formation of Allocations in an English Auction,51c53779a64f52c04ede20b74da1c1ba,http://dx.doi.org/10.1007/978-1-4757-5196-3_9 2228,Among economic theorists proving the existence of a competitive general equilibrium and then evaluating the equilibrium allocation of goods and services has been a major endeavor. The pile of papers on existence and attributes of the general equilibrium is Everest-like while comparatively the pile of papers on getting to equilibrium is like a ski-slope in Florida. Some of the papers in the smaller pile are motivated by the desire to avoid the problems of employing the mythical archetypal Walrasian auctioneer (see Hahn 1988). That desire while understood requires the difficult activity of speci-fying the price-setting process and determining if that process leads to equilibrium. We consider an alternative premise: that using electrocardiograms to infer brain function of players in an English Auction yields a more complete sketch of how a simple economy gets to equilibrium. We make this proposal fully aware that this attempt is a small first step in discovering the processes employed in getting to equilibrium in more complicated institutions.,nicole peck,Not available,2002.0,10.1007/978-1-4757-5196-3_9,Experimental Business Research,John2002,False,,Springer,Not available,Physiological Anticipation and Endowment Effects: Inferred Brain Function in the Formation of Allocations in an English Auction,51c53779a64f52c04ede20b74da1c1ba,http://dx.doi.org/10.1007/978-1-4757-5196-3_9 2229,Among economic theorists proving the existence of a competitive general equilibrium and then evaluating the equilibrium allocation of goods and services has been a major endeavor. The pile of papers on existence and attributes of the general equilibrium is Everest-like while comparatively the pile of papers on getting to equilibrium is like a ski-slope in Florida. Some of the papers in the smaller pile are motivated by the desire to avoid the problems of employing the mythical archetypal Walrasian auctioneer (see Hahn 1988). That desire while understood requires the difficult activity of speci-fying the price-setting process and determining if that process leads to equilibrium. We consider an alternative premise: that using electrocardiograms to infer brain function of players in an English Auction yields a more complete sketch of how a simple economy gets to equilibrium. We make this proposal fully aware that this attempt is a small first step in discovering the processes employed in getting to equilibrium in more complicated institutions.,vijay rajan,Not available,2002.0,10.1007/978-1-4757-5196-3_9,Experimental Business Research,John2002,False,,Springer,Not available,Physiological Anticipation and Endowment Effects: Inferred Brain Function in the Formation of Allocations in an English Auction,51c53779a64f52c04ede20b74da1c1ba,http://dx.doi.org/10.1007/978-1-4757-5196-3_9 2230,One of the many emerging applications for software agents are their ability to serve as proxies for trade and bartering. This has led to the analysis and development of auction protocols for various goods. We consider agent-mediated allocation of computational and network resources through market mechanisms. Single-good and combinatorial auctions do not apply readily to these products thus we propose a divisible auction that is proportionally fair and has low signaling and computational costs. The structure of the auction enables us to represent optimal responses as price functions. From this we are able to characterize agent valuations and prove the existence of a unique Nash equilibrium. We further develop a decentralized algorithm that allows the agents to converge to the operating point without sharing private information.,rajiv maheswaran,Not available,2002.0,10.1007/3-540-36378-5_6,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,T.2002,False,,Springer,Not available,Auctions for Divisible Resources: Price Functions Nash Equilibrium and Decentralized Update Schemes,b1774123ec2e4524ba209bda150d900d,http://dx.doi.org/10.1007/3-540-36378-5_6 2231,One of the many emerging applications for software agents are their ability to serve as proxies for trade and bartering. This has led to the analysis and development of auction protocols for various goods. We consider agent-mediated allocation of computational and network resources through market mechanisms. Single-good and combinatorial auctions do not apply readily to these products thus we propose a divisible auction that is proportionally fair and has low signaling and computational costs. The structure of the auction enables us to represent optimal responses as price functions. From this we are able to characterize agent valuations and prove the existence of a unique Nash equilibrium. We further develop a decentralized algorithm that allows the agents to converge to the operating point without sharing private information.,tamer basar,Not available,2002.0,10.1007/3-540-36378-5_6,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,T.2002,False,,Springer,Not available,Auctions for Divisible Resources: Price Functions Nash Equilibrium and Decentralized Update Schemes,b1774123ec2e4524ba209bda150d900d,http://dx.doi.org/10.1007/3-540-36378-5_6 2232,In this paper we introduce a ,kaoru kurosawa,Not available,2002.0,10.1007/3-540-45853-0_2,Computer Security — ESORICS 2002,Kaoru2002,False,,Springer,Not available,Bit-Slice Auction Circuit,27453e5d3ab9ac2d3479ff2bebf238f7,http://dx.doi.org/10.1007/3-540-45853-0_2 2233,In this paper we introduce a ,wakaha ogata,Not available,2002.0,10.1007/3-540-45853-0_2,Computer Security — ESORICS 2002,Kaoru2002,False,,Springer,Not available,Bit-Slice Auction Circuit,27453e5d3ab9ac2d3479ff2bebf238f7,http://dx.doi.org/10.1007/3-540-45853-0_2 2234,In mass customization companies strive to enhance customer value by providing products and services that are approximate to customers’ needs. A company’s strategy of allocating its limited capacity to meeting diverse customer requirements directly impact customer perceived value in terms of available options cost and schedule. Proposed in this paper is an auction-based mass customization model for solving the problem of service customization under capacity constraints. The proposed model integrates customers’ customization decision making with the allocation of company’s capacity through multilateral negotiation between the company and its customers. The negotiation is conducted through a combinatorial iterative auction designed to maximize the overall customer value given limited capacity. The auction is incentive-compatible in the sense that customers will follow the prescribed myopic best-response bidding strategy. Experimental results indicate that customization solutions computed by the proposed model are very close to the optimal one. Revenue performance is also adequate when there is sufficient competition in the market.,chun wang,Not available,2013.0,10.1007/s10845-012-0689-7,Journal of Intelligent Manufacturing,Chun2013,False,,Springer,Not available,Service customization under capacity constraints: an auction-based model,519de286d72e2bbca845fcb60b54376e,http://dx.doi.org/10.1007/s10845-012-0689-7 2235,In mass customization companies strive to enhance customer value by providing products and services that are approximate to customers’ needs. A company’s strategy of allocating its limited capacity to meeting diverse customer requirements directly impact customer perceived value in terms of available options cost and schedule. Proposed in this paper is an auction-based mass customization model for solving the problem of service customization under capacity constraints. The proposed model integrates customers’ customization decision making with the allocation of company’s capacity through multilateral negotiation between the company and its customers. The negotiation is conducted through a combinatorial iterative auction designed to maximize the overall customer value given limited capacity. The auction is incentive-compatible in the sense that customers will follow the prescribed myopic best-response bidding strategy. Experimental results indicate that customization solutions computed by the proposed model are very close to the optimal one. Revenue performance is also adequate when there is sufficient competition in the market.,farnaz dargahi,Not available,2013.0,10.1007/s10845-012-0689-7,Journal of Intelligent Manufacturing,Chun2013,False,,Springer,Not available,Service customization under capacity constraints: an auction-based model,519de286d72e2bbca845fcb60b54376e,http://dx.doi.org/10.1007/s10845-012-0689-7 2236,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,robert ekelund,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2237,The paper reports experimental data on the behavior in the first-price sealed-bid auction for a varying number of bidders when values and bids are private information. This feedback-free design is proposed for the experimental test of the one-shot game situation. We consider both within-subjects and between-subjects variations. In line with the qualitative risk neutral Nash equilibrium prediction the data show that bids increase in the number of bidders. However in auctions involving a small number of bidders average bids are above and in auctions involving a larger number of bidders average bids are below the risk neutral equilibrium prediction. The quartile analysis reveals that bidding behavior is not constant across the full value range for a given number of bidders. On the high value quartiles however the average bid–value ratio is not different from the risk neutral prediction. The behavior is different when the winning bid is revealed after each repetition.,sascha fullbrunn,Not available,2013.0,10.1007/s11238-013-9378-z,Theory and Decision,Sascha2013,False,,Springer,Not available,Varying the number of bidders in the first-price sealed-bid auction: experimental evidence for the one-shot game,5610cebc44d629f370c28fae3561465c,http://dx.doi.org/10.1007/s11238-013-9378-z 2238,The paper reports experimental data on the behavior in the first-price sealed-bid auction for a varying number of bidders when values and bids are private information. This feedback-free design is proposed for the experimental test of the one-shot game situation. We consider both within-subjects and between-subjects variations. In line with the qualitative risk neutral Nash equilibrium prediction the data show that bids increase in the number of bidders. However in auctions involving a small number of bidders average bids are above and in auctions involving a larger number of bidders average bids are below the risk neutral equilibrium prediction. The quartile analysis reveals that bidding behavior is not constant across the full value range for a given number of bidders. On the high value quartiles however the average bid–value ratio is not different from the risk neutral prediction. The behavior is different when the winning bid is revealed after each repetition.,tibor neugebauer,Not available,2013.0,10.1007/s11238-013-9378-z,Theory and Decision,Sascha2013,False,,Springer,Not available,Varying the number of bidders in the first-price sealed-bid auction: experimental evidence for the one-shot game,5610cebc44d629f370c28fae3561465c,http://dx.doi.org/10.1007/s11238-013-9378-z 2239,The extreme volatility of electricity prices makes their financial derivatives important instruments for asset managers. Even if the volume of derivative contracts traded on Power Exchanges has been growing since the inception of the restructuring of the sector electricity remains considerably less liquid than other commodity markets. This paper assesses the effect of limited liquidity in power exchanges using an equilibrium model where agents cannot hedge up to their desired level. Mathematically the problem is formulated as a two stage stochastic Generalized Nash Equilibrium with possibly multiple equilibria. Computing a large panel of solutions we show how the risk premium and players profits are affected by illiquidity. We also show that the illiquidity in the FTR market affects the trades in the electricity futures market.,d'aertrycke maere,Not available,2013.0,10.1007/s10107-013-0694-4,Mathematical Programming,Gauthier2013,False,,Springer,Not available,Liquidity risks on power exchanges: a generalized Nash equilibrium model,54ed1c45ab3726d33a79fd50881b9055,http://dx.doi.org/10.1007/s10107-013-0694-4 2240,The extreme volatility of electricity prices makes their financial derivatives important instruments for asset managers. Even if the volume of derivative contracts traded on Power Exchanges has been growing since the inception of the restructuring of the sector electricity remains considerably less liquid than other commodity markets. This paper assesses the effect of limited liquidity in power exchanges using an equilibrium model where agents cannot hedge up to their desired level. Mathematically the problem is formulated as a two stage stochastic Generalized Nash Equilibrium with possibly multiple equilibria. Computing a large panel of solutions we show how the risk premium and players profits are affected by illiquidity. We also show that the illiquidity in the FTR market affects the trades in the electricity futures market.,yves smeers,Not available,2013.0,10.1007/s10107-013-0694-4,Mathematical Programming,Gauthier2013,False,,Springer,Not available,Liquidity risks on power exchanges: a generalized Nash equilibrium model,54ed1c45ab3726d33a79fd50881b9055,http://dx.doi.org/10.1007/s10107-013-0694-4 2241,This paper considers incentives for information acquisition ahead of conflicts. First we characterize the (unique) equilibrium of the all-pay auction between two players with one-sided asymmetric information where one player has private information about his valuation. Then we use our results to study information acquisition prior to an all-pay auction. If the decision to acquire information is observable but not the information received one-sided asymmetric information can occur endogenously in equilibrium. Moreover the cut-off values of the cost of information that determine equilibrium information acquisition are higher than those in the first best. Thus information acquisition is excessive. In contrast with open or covert information acquisition the equilibrium cut-off values are as in the first best.,florian morath,Not available,2013.0,10.1007/s00199-012-0710-6,Economic Theory,Florian2013,False,,Springer,Not available,Information acquisition in conflicts,f0869fb782c6e3b74c93d0f1a6752d52,http://dx.doi.org/10.1007/s00199-012-0710-6 2242,This paper considers incentives for information acquisition ahead of conflicts. First we characterize the (unique) equilibrium of the all-pay auction between two players with one-sided asymmetric information where one player has private information about his valuation. Then we use our results to study information acquisition prior to an all-pay auction. If the decision to acquire information is observable but not the information received one-sided asymmetric information can occur endogenously in equilibrium. Moreover the cut-off values of the cost of information that determine equilibrium information acquisition are higher than those in the first best. Thus information acquisition is excessive. In contrast with open or covert information acquisition the equilibrium cut-off values are as in the first best.,johannes munster,Not available,2013.0,10.1007/s00199-012-0710-6,Economic Theory,Florian2013,False,,Springer,Not available,Information acquisition in conflicts,f0869fb782c6e3b74c93d0f1a6752d52,http://dx.doi.org/10.1007/s00199-012-0710-6 2243,I analyze optimal auction design in the presence of linear type-dependent negative externalities. I characterize the properties of the optimal mechanism when externalities are “strongly decreasing” and “increasing” in the agent’s valuation and I discuss its implementation with sealed-bid auctions. Interestingly bidding strategies are not necessarily increasing in valuations and the optimal mechanism can be implemented by setting a price ceiling instead of a reserve price.,isabelle brocas,Not available,2013.0,10.1007/s11238-012-9345-0,Theory and Decision,Isabelle2013,False,,Springer,Not available,Optimal allocation mechanisms with type-dependent negative externalities,520e49a279fb115673a55d8ed889966e,http://dx.doi.org/10.1007/s11238-012-9345-0 2244,Currently there is a need to plan and analyze the electric power transmission system in greater detail and over larger geographic areas. Existing models approach the problem from different perspectives. Each model addresses different aspects of and has different approximations to the optimal planning process. In order to scope out the huge challenge of optimal transmission planning this paper presents a new modeling approach for inter-regional planning and investment in a competitive environment. This modeling approach incorporates the detailed generator topology and operational aspects found in production cost planning models into a larger framework that can find optimal sets of transmission expansion projects. The framework proposed here can be used in an auction to award investment contracts or as a part of a more general policy analysis. The solution yields the set of transmission projects that have the highest expected benefits while also representing generic generation expansions under the same objective. The model is a two-stage mixed-integer multi-period N-1-reliable model with investment unit commitment and transmission switching. The combination of combinatorial stochastic and operational elements means this model may be computationally intractable without judicious modelling aggregations or approximations to reduce its size and complexity. Nevertheless we show via a dual problem that analysing the economics and sensitivity of the solution is computationally more straightforward.,richard o'neill,Not available,2013.0,10.1007/s10107-013-0695-3,Mathematical Programming,P.2013,False,,Springer,Not available,A model and approach to the challenge posed by optimal power systems planning,af5d87faa9d842a973548b9b8623a921,http://dx.doi.org/10.1007/s10107-013-0695-3 2245,Currently there is a need to plan and analyze the electric power transmission system in greater detail and over larger geographic areas. Existing models approach the problem from different perspectives. Each model addresses different aspects of and has different approximations to the optimal planning process. In order to scope out the huge challenge of optimal transmission planning this paper presents a new modeling approach for inter-regional planning and investment in a competitive environment. This modeling approach incorporates the detailed generator topology and operational aspects found in production cost planning models into a larger framework that can find optimal sets of transmission expansion projects. The framework proposed here can be used in an auction to award investment contracts or as a part of a more general policy analysis. The solution yields the set of transmission projects that have the highest expected benefits while also representing generic generation expansions under the same objective. The model is a two-stage mixed-integer multi-period N-1-reliable model with investment unit commitment and transmission switching. The combination of combinatorial stochastic and operational elements means this model may be computationally intractable without judicious modelling aggregations or approximations to reduce its size and complexity. Nevertheless we show via a dual problem that analysing the economics and sensitivity of the solution is computationally more straightforward.,eric krall,Not available,2013.0,10.1007/s10107-013-0695-3,Mathematical Programming,P.2013,False,,Springer,Not available,A model and approach to the challenge posed by optimal power systems planning,af5d87faa9d842a973548b9b8623a921,http://dx.doi.org/10.1007/s10107-013-0695-3 2246,Currently there is a need to plan and analyze the electric power transmission system in greater detail and over larger geographic areas. Existing models approach the problem from different perspectives. Each model addresses different aspects of and has different approximations to the optimal planning process. In order to scope out the huge challenge of optimal transmission planning this paper presents a new modeling approach for inter-regional planning and investment in a competitive environment. This modeling approach incorporates the detailed generator topology and operational aspects found in production cost planning models into a larger framework that can find optimal sets of transmission expansion projects. The framework proposed here can be used in an auction to award investment contracts or as a part of a more general policy analysis. The solution yields the set of transmission projects that have the highest expected benefits while also representing generic generation expansions under the same objective. The model is a two-stage mixed-integer multi-period N-1-reliable model with investment unit commitment and transmission switching. The combination of combinatorial stochastic and operational elements means this model may be computationally intractable without judicious modelling aggregations or approximations to reduce its size and complexity. Nevertheless we show via a dual problem that analysing the economics and sensitivity of the solution is computationally more straightforward.,kory hedman,Not available,2013.0,10.1007/s10107-013-0695-3,Mathematical Programming,P.2013,False,,Springer,Not available,A model and approach to the challenge posed by optimal power systems planning,af5d87faa9d842a973548b9b8623a921,http://dx.doi.org/10.1007/s10107-013-0695-3 2247,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,rand ressler,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2248,Currently there is a need to plan and analyze the electric power transmission system in greater detail and over larger geographic areas. Existing models approach the problem from different perspectives. Each model addresses different aspects of and has different approximations to the optimal planning process. In order to scope out the huge challenge of optimal transmission planning this paper presents a new modeling approach for inter-regional planning and investment in a competitive environment. This modeling approach incorporates the detailed generator topology and operational aspects found in production cost planning models into a larger framework that can find optimal sets of transmission expansion projects. The framework proposed here can be used in an auction to award investment contracts or as a part of a more general policy analysis. The solution yields the set of transmission projects that have the highest expected benefits while also representing generic generation expansions under the same objective. The model is a two-stage mixed-integer multi-period N-1-reliable model with investment unit commitment and transmission switching. The combination of combinatorial stochastic and operational elements means this model may be computationally intractable without judicious modelling aggregations or approximations to reduce its size and complexity. Nevertheless we show via a dual problem that analysing the economics and sensitivity of the solution is computationally more straightforward.,shmuel oren,Not available,2013.0,10.1007/s10107-013-0695-3,Mathematical Programming,P.2013,False,,Springer,Not available,A model and approach to the challenge posed by optimal power systems planning,af5d87faa9d842a973548b9b8623a921,http://dx.doi.org/10.1007/s10107-013-0695-3 2249,The paper employs Operations Research methods for analysis of electricity and capacity markets. We provide two algorithms that determine the optimal capacity structure with account of fixed and variable costs. The first one relates to the case where there are several capacity types and for each type the capacity constraint is not binding. The second algorithm is applicable when electricity is produced by standard small generators with the same capacity and different costs. Then we study two typical architectures of the market and examine their Nash equilibria. We consider a uniform price supply function auction in the electricity market. For pay-as-bid and uniform price versions of the capacity market design we compare the equilibrium outcomes with the optimal capacity structure. The paper shows that the market equilibrium corresponds to the optimal capacity structure under conditions of pure competition full rationality and completely informed agents in the market. However under more realistic assumptions selection of the optimal structure is unlikely. Finally we provide the auction design that realizes such selection of capacities and does not require any additional information of each producer besides his own production costs. We establish sufficient conditions for perfect competition in the market.,alexander vasin,Not available,2013.0,10.1007/s10100-012-0259-2,Central European Journal of Operations Research,Alexander2013,False,,Springer,Not available,Models for capacity and electricity market design,5f6e19f684cc7a8e98a9f5ec9749862a,http://dx.doi.org/10.1007/s10100-012-0259-2 2250,The paper employs Operations Research methods for analysis of electricity and capacity markets. We provide two algorithms that determine the optimal capacity structure with account of fixed and variable costs. The first one relates to the case where there are several capacity types and for each type the capacity constraint is not binding. The second algorithm is applicable when electricity is produced by standard small generators with the same capacity and different costs. Then we study two typical architectures of the market and examine their Nash equilibria. We consider a uniform price supply function auction in the electricity market. For pay-as-bid and uniform price versions of the capacity market design we compare the equilibrium outcomes with the optimal capacity structure. The paper shows that the market equilibrium corresponds to the optimal capacity structure under conditions of pure competition full rationality and completely informed agents in the market. However under more realistic assumptions selection of the optimal structure is unlikely. Finally we provide the auction design that realizes such selection of capacities and does not require any additional information of each producer besides his own production costs. We establish sufficient conditions for perfect competition in the market.,polina kartunova,Not available,2013.0,10.1007/s10100-012-0259-2,Central European Journal of Operations Research,Alexander2013,False,,Springer,Not available,Models for capacity and electricity market design,5f6e19f684cc7a8e98a9f5ec9749862a,http://dx.doi.org/10.1007/s10100-012-0259-2 2251,The paper employs Operations Research methods for analysis of electricity and capacity markets. We provide two algorithms that determine the optimal capacity structure with account of fixed and variable costs. The first one relates to the case where there are several capacity types and for each type the capacity constraint is not binding. The second algorithm is applicable when electricity is produced by standard small generators with the same capacity and different costs. Then we study two typical architectures of the market and examine their Nash equilibria. We consider a uniform price supply function auction in the electricity market. For pay-as-bid and uniform price versions of the capacity market design we compare the equilibrium outcomes with the optimal capacity structure. The paper shows that the market equilibrium corresponds to the optimal capacity structure under conditions of pure competition full rationality and completely informed agents in the market. However under more realistic assumptions selection of the optimal structure is unlikely. Finally we provide the auction design that realizes such selection of capacities and does not require any additional information of each producer besides his own production costs. We establish sufficient conditions for perfect competition in the market.,gerhard-wilhelm weber,Not available,2013.0,10.1007/s10100-012-0259-2,Central European Journal of Operations Research,Alexander2013,False,,Springer,Not available,Models for capacity and electricity market design,5f6e19f684cc7a8e98a9f5ec9749862a,http://dx.doi.org/10.1007/s10100-012-0259-2 2252,We consider how information concentration affects a seller’s revenue in common value auctions. The common value is a function of ,vlad mares,Not available,2013.0,10.1007/s10058-013-0143-0,Review of Economic Design,Vlad2013,False,,Springer,Not available,Information concentration in common value environments,8e5d963ef21aa77b0900042c7ca7bd16,http://dx.doi.org/10.1007/s10058-013-0143-0 2253,We consider how information concentration affects a seller’s revenue in common value auctions. The common value is a function of ,mikhael shor,Not available,2013.0,10.1007/s10058-013-0143-0,Review of Economic Design,Vlad2013,False,,Springer,Not available,Information concentration in common value environments,8e5d963ef21aa77b0900042c7ca7bd16,http://dx.doi.org/10.1007/s10058-013-0143-0 2254,This paper addresses a problem that is typical of multi-period capacity expansion equilibrium models: plants or sectors have different risk exposures that may warrant different costs of capital. The paper examines modifications of a capacity expansion model interpreted in equilibrium terms to account for asset-specific costs of capital.,andreas ehrenmann,Not available,2013.0,10.1007/s10107-013-0692-6,Mathematical Programming,Andreas2013,False,,Springer,Not available,Risk adjusted discounted cash flows in capacity expansion models,6a106f15169c8187e3067c9da3751d3b,http://dx.doi.org/10.1007/s10107-013-0692-6 2255,This paper addresses a problem that is typical of multi-period capacity expansion equilibrium models: plants or sectors have different risk exposures that may warrant different costs of capital. The paper examines modifications of a capacity expansion model interpreted in equilibrium terms to account for asset-specific costs of capital.,yves smeers,Not available,2013.0,10.1007/s10107-013-0692-6,Mathematical Programming,Andreas2013,False,,Springer,Not available,Risk adjusted discounted cash flows in capacity expansion models,6a106f15169c8187e3067c9da3751d3b,http://dx.doi.org/10.1007/s10107-013-0692-6 2256,Supply function equilibria are used in the analysis of divisible good auctions with a large number of identical objects to be sold or bought. An important example occurs in wholesale electricity markets. Despite the substantial literature on supply function equilibria the existence of a pure strategy Nash equilibria for a uniform price auction in asymmetric cases has not been established in a general setting. In this paper we prove the existence of a supply function equilibrium for a duopoly with asymmetric firms having convex non-decreasing marginal costs with decreasing concave demand subject to an additive demand shock provided that the second derivative of the demand function is small enough and not increasing. The proof is constructive and also gives insight into the structure of the equilibrium solutions.,edward anderson,Not available,2013.0,10.1007/s10107-013-0691-7,Mathematical Programming,J.2013,False,,Springer,Not available,On the existence of supply function equilibria,17cf74cf51d6eeab5772e0cd5916aee3,http://dx.doi.org/10.1007/s10107-013-0691-7 2257,This paper proposes an iterative sealed-bid auction for selling multiple heterogeneous items to bidders interested in buying at most one item. It generalizes the single item ,albin erlanson,Not available,2014.0,10.1007/s10614-013-9380-0,Computational Economics,Albin2014,False,,Springer,Not available,The Duo-Item Bisection Auction,8d01c070d269e8ee24db227231cae16d,http://dx.doi.org/10.1007/s10614-013-9380-0 2258,Estimate bias and “no-sales” are investigated in the context of Latin American Art auctions conducted in New York between 1977 and 1996. We find that using a new method for calculating bias both Sotheby's and Christie's overestimated art (oil-on-canvas pieces) by 2.7 percent. The inclusion of “no-sales” raises that proportion to a full one-third of the art traded. Utilizing a binomial probit analysis moreover we find that the estimate “window” is negatively and significantly related to the likelihood of a “no sale” at auction.,john watson,Not available,1998.0,10.1023/A:1007471016277,Journal of Cultural Economics,Jr.1998,False,,Springer,Not available,Estimates Bias and “No Sales” in Latin-American Art Auctions 1977–1996,e02b65c1bc43642e79a2d323706e4b25,http://dx.doi.org/10.1023/A:1007471016277 2259,,mohammad hajiaghayi,Not available,2014.0,10.1007/978-3-642-27848-8_759-1,Encyclopedia of Algorithms,Taghi2014,False,,Springer,Not available,Prophet Inequality and Online Auctions,6cad37095935030f14cc4c853a29adc2,http://dx.doi.org/10.1007/978-3-642-27848-8_759-1 2260,,vahid liaghat,Not available,2014.0,10.1007/978-3-642-27848-8_759-1,Encyclopedia of Algorithms,Taghi2014,False,,Springer,Not available,Prophet Inequality and Online Auctions,6cad37095935030f14cc4c853a29adc2,http://dx.doi.org/10.1007/978-3-642-27848-8_759-1 2261,,tian-ming bu,Not available,2014.0,10.1007/978-3-642-27848-8_251-2,Encyclopedia of Algorithms,Tian-Ming2014,False,,Springer,Not available,Multiple Unit Auctions with Budget Constraint,2d4875b782474c0af63c12c7b7086ea2,http://dx.doi.org/10.1007/978-3-642-27848-8_251-2 2262,We consider the Max-Buying Problem with Limited Supply in which there are ,cristina fernandes,Not available,2014.0,10.1007/978-3-642-54423-1_61,LATIN 2014: Theoretical Informatics,G.2014,False,,Springer,Not available,Approximation Algorithms for the Max-Buying Problem with Limited Supply,0fe7be6cffce02926d7cef8c6fbd9dd4,http://dx.doi.org/10.1007/978-3-642-54423-1_61 2263,We consider the Max-Buying Problem with Limited Supply in which there are ,rafael schouery,Not available,2014.0,10.1007/978-3-642-54423-1_61,LATIN 2014: Theoretical Informatics,G.2014,False,,Springer,Not available,Approximation Algorithms for the Max-Buying Problem with Limited Supply,0fe7be6cffce02926d7cef8c6fbd9dd4,http://dx.doi.org/10.1007/978-3-642-54423-1_61 2264,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,ferran torrent-fontbona,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 2265,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,albert pla,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 2266,Social concerns about the environment and global warming suggest that industries must focus on reducing energy consumption due to its social impact and changing laws. Furthermore the smart grid will bring time-dependent tariffs that pose new challenges to the optimisation of resource allocation. In this paper we address the problem of optimising energy consumption in manufacturing processes by means of multi-attribute combinatorial auctions so that resource price delivery time and energy consumed (and therefore environmental impact) are minimised. The proposed mechanism is tested with simulated data based on real examples showing the impact of incorporating energy into task allocation problems. It is then compared with a sequential auction method.,beatriz lopez,Not available,2014.0,10.1007/978-3-319-11584-9_5,Multiagent System Technologies,Ferran2014,False,,Springer,Not available,Using Multi-attribute Combinatorial Auctions for Resource Allocation,5b5683174e21bc4d95e51fbecc8a9212,http://dx.doi.org/10.1007/978-3-319-11584-9_5 2267,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,kevin hasker,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 2268,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,bibo jiang,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 2269,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,yasushi toda,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 2270,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,robin sickles,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 2271,Some major financial markets are currently reporting that 50 % or more of all transactions are now executed by automated trading systems (ATS). To understand the impact of ATS proliferation on the global financial markets academic studies often use standard reference strategies such as “AA” and “ZIP” to model the behaviour of real trading systems. Disturbingly we show that the reference algorithms presented in the literature are ambiguous thus reducing the validity of strict comparative studies. As a remedy we suggest disambiguated standard implementations of AA and ZIP. Using Exchange Portal (ExPo) an open-source financial exchange simulation platform designed for real-time behavioural economic experiments involving human traders and/or trader-agents we study the effects of disambiguating AA and ZIP before introducing a novel method of assignment-adaptation (ASAD). Experiments show that introducing ASAD agents into a market with shocks can produce counter-intuitive market dynamics.,steve stotter,Not available,2014.0,10.1007/978-3-662-44994-3_2,Transactions on Computational Collective Intelligence XVII,Steve2014,False,,Springer,Not available,Behavioural Investigations of Financial Trading Agents Using Exchange Portal (ExPo),af09f6581d6e18df337684ef58cd4c8a,http://dx.doi.org/10.1007/978-3-662-44994-3_2 2272,Some major financial markets are currently reporting that 50 % or more of all transactions are now executed by automated trading systems (ATS). To understand the impact of ATS proliferation on the global financial markets academic studies often use standard reference strategies such as “AA” and “ZIP” to model the behaviour of real trading systems. Disturbingly we show that the reference algorithms presented in the literature are ambiguous thus reducing the validity of strict comparative studies. As a remedy we suggest disambiguated standard implementations of AA and ZIP. Using Exchange Portal (ExPo) an open-source financial exchange simulation platform designed for real-time behavioural economic experiments involving human traders and/or trader-agents we study the effects of disambiguating AA and ZIP before introducing a novel method of assignment-adaptation (ASAD). Experiments show that introducing ASAD agents into a market with shocks can produce counter-intuitive market dynamics.,john cartlidge,Not available,2014.0,10.1007/978-3-662-44994-3_2,Transactions on Computational Collective Intelligence XVII,Steve2014,False,,Springer,Not available,Behavioural Investigations of Financial Trading Agents Using Exchange Portal (ExPo),af09f6581d6e18df337684ef58cd4c8a,http://dx.doi.org/10.1007/978-3-662-44994-3_2 2273,Some major financial markets are currently reporting that 50 % or more of all transactions are now executed by automated trading systems (ATS). To understand the impact of ATS proliferation on the global financial markets academic studies often use standard reference strategies such as “AA” and “ZIP” to model the behaviour of real trading systems. Disturbingly we show that the reference algorithms presented in the literature are ambiguous thus reducing the validity of strict comparative studies. As a remedy we suggest disambiguated standard implementations of AA and ZIP. Using Exchange Portal (ExPo) an open-source financial exchange simulation platform designed for real-time behavioural economic experiments involving human traders and/or trader-agents we study the effects of disambiguating AA and ZIP before introducing a novel method of assignment-adaptation (ASAD). Experiments show that introducing ASAD agents into a market with shocks can produce counter-intuitive market dynamics.,dave cliff,Not available,2014.0,10.1007/978-3-662-44994-3_2,Transactions on Computational Collective Intelligence XVII,Steve2014,False,,Springer,Not available,Behavioural Investigations of Financial Trading Agents Using Exchange Portal (ExPo),af09f6581d6e18df337684ef58cd4c8a,http://dx.doi.org/10.1007/978-3-662-44994-3_2 2274,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,congfeng jiang,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 2275,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,liangcheng duan,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 2276,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,chunlei liu,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 2277,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,jian wan,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 2278,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,li zhou,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 2279,The focus of this paper is on Dutch auctions where the bidding prices are restricted to a finite set of values and the number of bidders follows a Poisson distribution. The goal is to determine what the discrete bid levels should be to maximize the auctioneer’s expected revenue which is the same as the average selling price of the object under consideration. We take a new approach to the problem by formulating the descending-price competitive bidding process as a nonlinear program. The optimal solution indicates that the interval between two successive bids should be wider as the Dutch auction progresses. Moreover the auctioneer’s maximum expected revenue increases with the number of bid levels to be set as well as the expected number of bidders. Numerical examples are provided to illustrate the key results from this study and their managerial implications are discussed.,zhen li,Not available,2013.0,10.1007/s10479-013-1331-6,Annals of Operations Research,Zhen2013,False,,Springer,Not available,Design of discrete Dutch auctions with an uncertain number of bidders,d1caa88be45671ca8775cd10018cc43e,http://dx.doi.org/10.1007/s10479-013-1331-6 2280,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,nadezhda nozdrina,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 2281,The focus of this paper is on Dutch auctions where the bidding prices are restricted to a finite set of values and the number of bidders follows a Poisson distribution. The goal is to determine what the discrete bid levels should be to maximize the auctioneer’s expected revenue which is the same as the average selling price of the object under consideration. We take a new approach to the problem by formulating the descending-price competitive bidding process as a nonlinear program. The optimal solution indicates that the interval between two successive bids should be wider as the Dutch auction progresses. Moreover the auctioneer’s maximum expected revenue increases with the number of bid levels to be set as well as the expected number of bidders. Numerical examples are provided to illustrate the key results from this study and their managerial implications are discussed.,ching-chung kuo,Not available,2013.0,10.1007/s10479-013-1331-6,Annals of Operations Research,Zhen2013,False,,Springer,Not available,Design of discrete Dutch auctions with an uncertain number of bidders,d1caa88be45671ca8775cd10018cc43e,http://dx.doi.org/10.1007/s10479-013-1331-6 2282,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,wei yang,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 2283,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,jun qiao,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 2284,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,youyi feng,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 2285,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,baichun xiao,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 2286,We give a simple analysis of the competitive ratio of the random sampling auction from [10]. The random sampling auction was first shown to be worst-case competitive in [9] (with a bound of 7600 on its competitive ratio); our analysis improves the bound to 15. In support of the conjecture that random sampling auction is in fact 4-competitive we show that on the equal revenue input where any sale price gives the same revenue random sampling is exactly a factor of four from optimal.,uriel feige,Not available,2005.0,10.1007/11600930_89,Internet and Network Economics,Uriel2005,False,,Springer,Not available,On the Competitive Ratio of the Random Sampling Auction,33c1ace4a1b6f435b78d55285ae8103b,http://dx.doi.org/10.1007/11600930_89 2287,We give a simple analysis of the competitive ratio of the random sampling auction from [10]. The random sampling auction was first shown to be worst-case competitive in [9] (with a bound of 7600 on its competitive ratio); our analysis improves the bound to 15. In support of the conjecture that random sampling auction is in fact 4-competitive we show that on the equal revenue input where any sale price gives the same revenue random sampling is exactly a factor of four from optimal.,abraham flaxman,Not available,2005.0,10.1007/11600930_89,Internet and Network Economics,Uriel2005,False,,Springer,Not available,On the Competitive Ratio of the Random Sampling Auction,33c1ace4a1b6f435b78d55285ae8103b,http://dx.doi.org/10.1007/11600930_89 2288,We give a simple analysis of the competitive ratio of the random sampling auction from [10]. The random sampling auction was first shown to be worst-case competitive in [9] (with a bound of 7600 on its competitive ratio); our analysis improves the bound to 15. In support of the conjecture that random sampling auction is in fact 4-competitive we show that on the equal revenue input where any sale price gives the same revenue random sampling is exactly a factor of four from optimal.,jason hartline,Not available,2005.0,10.1007/11600930_89,Internet and Network Economics,Uriel2005,False,,Springer,Not available,On the Competitive Ratio of the Random Sampling Auction,33c1ace4a1b6f435b78d55285ae8103b,http://dx.doi.org/10.1007/11600930_89 2289,We give a simple analysis of the competitive ratio of the random sampling auction from [10]. The random sampling auction was first shown to be worst-case competitive in [9] (with a bound of 7600 on its competitive ratio); our analysis improves the bound to 15. In support of the conjecture that random sampling auction is in fact 4-competitive we show that on the equal revenue input where any sale price gives the same revenue random sampling is exactly a factor of four from optimal.,robert kleinberg,Not available,2005.0,10.1007/11600930_89,Internet and Network Economics,Uriel2005,False,,Springer,Not available,On the Competitive Ratio of the Random Sampling Auction,33c1ace4a1b6f435b78d55285ae8103b,http://dx.doi.org/10.1007/11600930_89 2290,In many settings bidding agents for auctions do not know their preferences ,kate larson,Not available,2005.0,10.1007/11575726_7,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Kate2005,False,,Springer,Not available,Designing Auctions for Deliberative Agents,b23a650924c29ecc235c0bddfbcc7dd6,http://dx.doi.org/10.1007/11575726_7 2291,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,g.s. maddala,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 2292,In many settings bidding agents for auctions do not know their preferences ,tuomas sandholm,Not available,2005.0,10.1007/11575726_7,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Kate2005,False,,Springer,Not available,Designing Auctions for Deliberative Agents,b23a650924c29ecc235c0bddfbcc7dd6,http://dx.doi.org/10.1007/11575726_7 2293,,david salant,Not available,2005.0,10.1007/0-387-23196-X_3,Obtaining the Best from Regulation and Competition,David2005,False,,Springer,Not available,Multi-Lot Auctions,572d644399c21892a01ea649d6941645,http://dx.doi.org/10.1007/0-387-23196-X_3 2294,Current auctions often expose bidding agents to two difficult yet common problems. First bidding agents often have the opportunity to participate in successive auctions selling the same good with no dominant bidding strategy in any single auction. Second bidding agents often need to acquire a bundle of goods by bidding in multiple auctions again with no dominant bidding strategy in any single auction. This paper introduces an options-based infrastructure that respects the autonomy of individual sellers but still enables bidders to utilize a dominant truthful strategy across multiple auctions.,adam juda,Not available,2005.0,10.1007/11575726_4,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,I.2005,False,,Springer,Not available,An Options-Based Method to Solve the Composability Problem in Sequential Auctions,3d46ac15dfc0828c5d30d8afe5533cbb,http://dx.doi.org/10.1007/11575726_4 2295,Current auctions often expose bidding agents to two difficult yet common problems. First bidding agents often have the opportunity to participate in successive auctions selling the same good with no dominant bidding strategy in any single auction. Second bidding agents often need to acquire a bundle of goods by bidding in multiple auctions again with no dominant bidding strategy in any single auction. This paper introduces an options-based infrastructure that respects the autonomy of individual sellers but still enables bidders to utilize a dominant truthful strategy across multiple auctions.,david parkes,Not available,2005.0,10.1007/11575726_4,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,I.2005,False,,Springer,Not available,An Options-Based Method to Solve the Composability Problem in Sequential Auctions,3d46ac15dfc0828c5d30d8afe5533cbb,http://dx.doi.org/10.1007/11575726_4 2296,We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1–1/,subhash khot,Not available,2005.0,10.1007/11600930_10,Internet and Network Economics,Subhash2005,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,96724eb7f62c28530751a246811b3799,http://dx.doi.org/10.1007/11600930_10 2297,We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1–1/,richard lipton,Not available,2005.0,10.1007/11600930_10,Internet and Network Economics,Subhash2005,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,96724eb7f62c28530751a246811b3799,http://dx.doi.org/10.1007/11600930_10 2298,We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1–1/,evangelos markakis,Not available,2005.0,10.1007/11600930_10,Internet and Network Economics,Subhash2005,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,96724eb7f62c28530751a246811b3799,http://dx.doi.org/10.1007/11600930_10 2299,We consider the following allocation problem arising in the setting of combinatorial auctions: a set of goods is to be allocated to a set of players so as to maximize the sum of the utilities of the players (i.e. the social welfare). In the case when the utility of each player is a monotone submodular function we prove that there is no polynomial time approximation algorithm which approximates the maximum social welfare by a factor better than 1–1/,aranyak mehta,Not available,2005.0,10.1007/11600930_10,Internet and Network Economics,Subhash2005,False,,Springer,Not available,Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions,96724eb7f62c28530751a246811b3799,http://dx.doi.org/10.1007/11600930_10 2300,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,thomas kittsteiner,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 2301,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,jorg nikutta,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 2302,In this paper we suggest a model of sequential auctions with endogenous participation where each bidder conjectures about the number of participants at each round. Then after learning his value each bidder decides whether or not to participate in the auction. In the calculation of his expected value each bidder uses his conjectures about the number of participants for each possible subgroup. In equilibrium the conjectured probability is compatible with the probability of staying in the auction. In our model players face participation costs bidders may buy as many objects as they wish and they are allowed to drop out at any round. Bidders can drop out at any time but they cannot come back to the auction. In particular we can determine the number of participants and expected prices in equilibrium. We show that for any bidding strategy there exists such a probability of staying in the auction. For the case of stochastically independent objects we show that in equilibrium every bidder who decides to continue submits a bid that is equal to his value at each round. When objects are stochastically identical we are able to show that expected prices are decreasing.,flavio menezes,Not available,1997.0,10.1023/A:1004970725802,Theory and Decision,M.1997,False,,Springer,Not available,Sequential asymmetric auctions with endogenous participation,9420f105cc5e1351ffffb4dd9f1b969e,http://dx.doi.org/10.1023/A:1004970725802 2303,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,eyal winter,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 2304,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,manos dramitinos,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 2305,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,george stamoulis,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 2306,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,costas courcoubetis,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 2307,This paper illustrates both theoretically and empirically the determinants of seller bidding at auctions. Based on search theoretical considerations seller bids are explained as the seller’s rejection of submitted price offers that fall short of his reservation price. The search model allows to derive testable implications on the seller’s bidding behavior. Using a unique data set from German auction houses the estimation results provide evidence that supports the search theoretical implications. For example seller bidding is complementary to the presence of bidding rings at auction. Moreover art and antique auctions turn out to be particularly susceptible to seller bidding practices.,michael beckmann,Not available,2004.0,10.1007/BF03396698,Schmalenbach Business Review,Michael2004,False,,Springer,Not available,Why Do Sellers at Auctions Bid for Their Own Items? Theory and Evidence,79cb96f179e1ff5b81dd45dfdc671e6a,http://dx.doi.org/10.1007/BF03396698 2308,In February 2002 New Jersey completed a market process whereby the utilities were able to purchase one-year forward contracts to ensure energy needs for their default service customers for a one-year period. The auction was the first application of the simultaneous descending clock auction to power procurement. We chose this auction format to fit the specific needs of the New Jersey Electric Discount and Energy Competition Act and the New Jersey Board of Public Utilities mandate for a competitive bidding process to procure the electricity to meet the electric utilities’ default service obligations.,colin loxley,Not available,2004.0,10.1023/B:REGE.0000038932.72922.ef,Journal of Regulatory Economics,Colin2004,False,,Springer,Not available,Default Service Auctions,fd4e7a071beccee140392ebe37ae8e41,http://dx.doi.org/10.1023/B:REGE.0000038932.72922.ef 2309,In February 2002 New Jersey completed a market process whereby the utilities were able to purchase one-year forward contracts to ensure energy needs for their default service customers for a one-year period. The auction was the first application of the simultaneous descending clock auction to power procurement. We chose this auction format to fit the specific needs of the New Jersey Electric Discount and Energy Competition Act and the New Jersey Board of Public Utilities mandate for a competitive bidding process to procure the electricity to meet the electric utilities’ default service obligations.,david salant,Not available,2004.0,10.1023/B:REGE.0000038932.72922.ef,Journal of Regulatory Economics,Colin2004,False,,Springer,Not available,Default Service Auctions,fd4e7a071beccee140392ebe37ae8e41,http://dx.doi.org/10.1023/B:REGE.0000038932.72922.ef 2310,We propose a Bayesian approach to inference in repeated oral English auctions. The model allows for a dynamic behavior of the sequence of selling prices. We apply the technique to a sale of antiques and find a clear evidence of dynamic effects.,gian albano,Not available,2004.0,10.1007/BF02603006,Test,Luigi2004,False,,Springer,Not available,Bayesian inference in repeated English auctions,855d4e5954d7b921f6e94d78001889ab,http://dx.doi.org/10.1007/BF02603006 2311,We propose a Bayesian approach to inference in repeated oral English auctions. The model allows for a dynamic behavior of the sequence of selling prices. We apply the technique to a sale of antiques and find a clear evidence of dynamic effects.,frederic jouneau-sion,Not available,2004.0,10.1007/BF02603006,Test,Luigi2004,False,,Springer,Not available,Bayesian inference in repeated English auctions,855d4e5954d7b921f6e94d78001889ab,http://dx.doi.org/10.1007/BF02603006 2312,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,karhan akcoglu,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2313,In this paper we suggest a model of sequential auctions with endogenous participation where each bidder conjectures about the number of participants at each round. Then after learning his value each bidder decides whether or not to participate in the auction. In the calculation of his expected value each bidder uses his conjectures about the number of participants for each possible subgroup. In equilibrium the conjectured probability is compatible with the probability of staying in the auction. In our model players face participation costs bidders may buy as many objects as they wish and they are allowed to drop out at any round. Bidders can drop out at any time but they cannot come back to the auction. In particular we can determine the number of participants and expected prices in equilibrium. We show that for any bidding strategy there exists such a probability of staying in the auction. For the case of stochastically independent objects we show that in equilibrium every bidder who decides to continue submits a bid that is equal to his value at each round. When objects are stochastically identical we are able to show that expected prices are decreasing.,paulo monteiro,Not available,1997.0,10.1023/A:1004970725802,Theory and Decision,M.1997,False,,Springer,Not available,Sequential asymmetric auctions with endogenous participation,9420f105cc5e1351ffffb4dd9f1b969e,http://dx.doi.org/10.1023/A:1004970725802 2314,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,james aspnes,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2315,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,bhaskar dasgupta,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2316,Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept in a ,ming-yang kao,Not available,2002.0,10.1007/978-1-4757-3613-7_23,Computational Methods in Decision-Making Economics and Finance,Karhan2002,False,,Springer,Not available,Opportunity Cost Algorithms for Combinatorial Auctions,3c9246163cab93bba8fd2a6d1c0282ce,http://dx.doi.org/10.1007/978-1-4757-3613-7_23 2317,To raise money for his retirement Claus intends to auction the original handwritten version of one of his classic papers among his caring advisees. We describe Claus’ discovery that “standard” winner-pay auctions yield surprisingly low revenues in this context because of the positive externality bidders forgo if they top another’s high bid. By requiring losers to pay their bids Claus is able to raise much more money and secure the kind of retirement he deserves and desires.,jacob goeree,Not available,2002.0,10.1007/978-3-642-56131-3_14,Equilibrium Markets and Dynamics,K.2002,False,,Springer,Not available,Retiring Rich,b668eccba1df5b46f02e33d3cba4f49a,http://dx.doi.org/10.1007/978-3-642-56131-3_14 2318,Derivative instruments have become increasingly important to financial institutions institutional investors traders and private individuals throughout the world both as risk-management tools and as a source of revenue. The volume of over-the-counter (OTC) traded derivatives has increased enormously over the past decade because institutional investors have often had a need for special derivative products which are not traded on organized exchanges. An important feature of OTC trading is the bargaining on multiple attributes of a contract such as price strike price and contract maturity. Negotiation on multiple attributes of a deal is currently not supported by electronic trading floors. In this paper we describe an approach of how to automate the multi-attribute multilateral negotiations using a Web-based trading system. First we will give an overview of various approaches to supporting or automating negotiations on multiple attributes. Then we will introduce multi-attribute auctions an extension of single-sided auction theory and analyze preliminary game-theoretic results. Finally we will show a Web-based electronic trading system for OTC derivatives based on multi-attribute auctions.,martin bichler,Not available,2002.0,10.1007/0-306-47548-0_14,E-Business Management,Martin2002,False,,Springer,Not available,Trading Financial Derivatives on the Web - An Approach Towards Automating Negotiations on OTC Markets,353027512d89b34bb6763e8322e5a522,http://dx.doi.org/10.1007/0-306-47548-0_14 2319,This is an economic analysis on regulation of telecommunications markets in the form of dialogues between a fox and an owl. At first animals use oldfashioned technology. Later innovation comes along but new technology and markets conditions require careful regulation. Can the animals provide optimal regulatory responses or do they sell their souls to monopolistic rats?,marcel canoy,Not available,2002.0,10.1007/978-3-642-56131-3_11,Equilibrium Markets and Dynamics,Marcel2002,False,,Springer,Not available,Animal Communication,049652f6a14b87c48f6322cc327ce068,http://dx.doi.org/10.1007/978-3-642-56131-3_11 2320,This paper addresses the issue of pricing-based distributed resource allocation via scheduling in a communication network. Introducing the temporal aspect in the resource allocation problem presents new challenges e.g. in accounting for the durations and deadlines of the resource requests. Dynamic real-time pricing concepts are discussed for the decentralized sharing of network resources. A numerical example illustrates the benefit of congestion based pricing in a dynamic communication network. The quality of service that results from decentralized resource allocation is studied from the point of view of a power-controlled wireless network. The model is based on a dynamic noncooperative game and is related to recent work on centrally optimal (Pareto-optimal) distributed dynamic resource allocation.,tiina heikkinen,Not available,2002.0,10.1007/3-540-47906-6_69,NETWORKING 2002: Networking Technologies Services and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications,Tiina2002,False,,Springer,Not available,Distributed Scheduling via Pricing in a Communication Network,900100f25007358cce8f5ef3d8f3858f,http://dx.doi.org/10.1007/3-540-47906-6_69 2321,In this paper we introduce a ,kaoru kurosawa,Not available,2002.0,10.1007/3-540-45853-0_2,Computer Security — ESORICS 2002,Kaoru2002,False,,Springer,Not available,Bit-Slice Auction Circuit,27453e5d3ab9ac2d3479ff2bebf238f7,http://dx.doi.org/10.1007/3-540-45853-0_2 2322,In this paper we introduce a ,wakaha ogata,Not available,2002.0,10.1007/3-540-45853-0_2,Computer Security — ESORICS 2002,Kaoru2002,False,,Springer,Not available,Bit-Slice Auction Circuit,27453e5d3ab9ac2d3479ff2bebf238f7,http://dx.doi.org/10.1007/3-540-45853-0_2 2323,We describe a new auction protocol that enjoys the following properties: the biddings are submitted non-interactively and no information beyond the result is disclosed. The protocol is efficient for a logarithmic number of players. Our solution uses a semi-trusted third party ,olivier baudron,Not available,2002.0,10.1007/3-540-46088-8_28,Financial Cryptography,Olivier2002,False,,Springer,Not available,Non-interactive Private Auctions,c220e51ab1f1c7d103ba2d7e12b8d757,http://dx.doi.org/10.1007/3-540-46088-8_28 2324,In this article we focus on computational aspects of game strategies and mechanism design. Some games or mechanisms arise the problems with computational difficulties. We argue some complexity measure of game strategy to model agents whose rationality are bounded. We think that the model of bounded rational agent is more suitable for analyzing many economic situations than that of rational agents assumed in ordinary economics. In fact we can show that bounded rational agents can achieve Nash equilibrium in optimal auction mechanism. But human behaviors in real life have some mysterious aspects. Experiments with human-subjects showed that players could have some different expectations or actions in the game that could not be obserbed in Nash equilbrium analysis. Constructing more reasonable behavioral model of bounded rationality remains in future researches.,toshiji kawagoe,Not available,1997.0,10.1007/978-4-431-66862-6_38,Complexity and Diversity,Toshiji1997,False,,Springer,Not available,Complexity and Economics of Institutions,b9d6e196681b095ceb1378276ccb83a3,http://dx.doi.org/10.1007/978-4-431-66862-6_38 2325,We describe a new auction protocol that enjoys the following properties: the biddings are submitted non-interactively and no information beyond the result is disclosed. The protocol is efficient for a logarithmic number of players. Our solution uses a semi-trusted third party ,jacques stern,Not available,2002.0,10.1007/3-540-46088-8_28,Financial Cryptography,Olivier2002,False,,Springer,Not available,Non-interactive Private Auctions,c220e51ab1f1c7d103ba2d7e12b8d757,http://dx.doi.org/10.1007/3-540-46088-8_28 2326,This paper examines the effect of multimarket contact in afirst price sealed bid government procurement auction market. It investigates whether bidprices in the highway construction industry are related to conditions that favor the formation of a cartel.Repeated contacts among firms are found to have a significantly positive effect on the winning low bidwhich leads to higher profit. Further rivalry among few firms tends to exacerbate the multimarket effect.The results in this study additionally support the recent theoretical predictions that collusion isbetter sustainable during economic downturns.,srabana gupta,Not available,2001.0,10.1023/A:1012568509136,Review of Industrial Organization,Srabana2001,False,,Springer,Not available,The Effect of Bid Rigging on Prices: A Study of the Highway Construction Industry,067b254732a6b4309adf0787fbb176e2,http://dx.doi.org/10.1023/A:1012568509136 2327,Electronic Commerce (EC) is a promising field for applying agent and Artificial Intelligence technologies. In this article we give an overview of the trends of Internet auctions and agent-mediated Web commerce. We describe the theoretical backgrounds of auction protocols and introduce several Internet auction sites. Furthermore we describe various activities aimed toward utilizing agent technologies in EC and the trends in standardization efforts on agent technologies.,makoto yokoo,Not available,2001.0,10.1007/BF03037574,New Generation Computing,Makoto2001,False,,Springer,Not available,Trends of internet auctions and agent-mediated Web commerce,0d90d8ba713c5234f0f1642e491e13e4,http://dx.doi.org/10.1007/BF03037574 2328,Electronic Commerce (EC) is a promising field for applying agent and Artificial Intelligence technologies. In this article we give an overview of the trends of Internet auctions and agent-mediated Web commerce. We describe the theoretical backgrounds of auction protocols and introduce several Internet auction sites. Furthermore we describe various activities aimed toward utilizing agent technologies in EC and the trends in standardization efforts on agent technologies.,satoru fujita,Not available,2001.0,10.1007/BF03037574,New Generation Computing,Makoto2001,False,,Springer,Not available,Trends of internet auctions and agent-mediated Web commerce,0d90d8ba713c5234f0f1642e491e13e4,http://dx.doi.org/10.1007/BF03037574 2329, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,michael landsberger,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2330, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,jacob rubinstein,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2331, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,elmar wolfstetter,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2332, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,shmuel zamir,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2333,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders’ reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,lawrence ausubel,Not available,2004.0,10.1007/978-3-662-05858-9_17,Assets Beliefs and Equilibria in Economic Dynamics,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,df7b8f1ce06d3e344f22b31ed271bac5,http://dx.doi.org/10.1007/978-3-662-05858-9_17 2334,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders’ reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,peter cramton,Not available,2004.0,10.1007/978-3-662-05858-9_17,Assets Beliefs and Equilibria in Economic Dynamics,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,df7b8f1ce06d3e344f22b31ed271bac5,http://dx.doi.org/10.1007/978-3-662-05858-9_17 2335,In a classical result Milgrom (1981a) established that the Monotone Likelihood Ratio Property (MLRP) is a sufficient condition for the existence of an increasing symmetric equilibrium in (,ilia tsetlin,Not available,2006.0,10.1007/s10058-006-0005-0,Review of Economic Design,Ilia2006,False,,Springer,Not available,On the existence of an increasing symmetric equilibrium in (,2df89040ac9aa18f0cb3876119041d92,http://dx.doi.org/10.1007/s10058-006-0005-0 2336,A commodity auction market provides a trading intermediary whose role is to find optimal trade matching between buyers and sellers that satisfies their trading constraints. Some commodity auction markets utilize forms of electronic trading intermediary systems in order to improve the efficiency and effectiveness of trading of huge volumes of transactions during short periods of time. Previous research works on electronic trading intermediary systems focus on the maximization of the trade volume obtained by satisfying mainly price and quantity constraints. The principal restriction of these approaches is that the heterogeneity of the commodity is ignored or at least not significantly considered. The objective of the study in this paper is to propose a computable mechanism of trading inter-mediaries for commodity auction markets supporting not only ordinary trading constraints of prices and quantities but also other qualitative and quantitative constraints on the commodity properties and trading conditions.,young ryu,Not available,1997.0,10.1023/A:1018927700552,Annals of Operations Research,U.1997,False,,Springer,Not available,Hierarchical constraint satisfaction of multilateral trade matching in commodity auction markets,eb567e72fd244a6d91e2209eddd5144c,http://dx.doi.org/10.1023/A:1018927700552 2337,The notion of ,m. burmester,Not available,2004.0,10.1023/B:ELEC.0000009284.64158.0a,Electronic Commerce Research,M.2004,False,,Springer,Not available,Uncoercible e-Bidding Games,932890313d45a9df3568a04fa0b5c279,http://dx.doi.org/10.1023/B:ELEC.0000009284.64158.0a 2338,The notion of ,e. magkos,Not available,2004.0,10.1023/B:ELEC.0000009284.64158.0a,Electronic Commerce Research,M.2004,False,,Springer,Not available,Uncoercible e-Bidding Games,932890313d45a9df3568a04fa0b5c279,http://dx.doi.org/10.1023/B:ELEC.0000009284.64158.0a 2339,The notion of ,v. chrissikopoulos,Not available,2004.0,10.1023/B:ELEC.0000009284.64158.0a,Electronic Commerce Research,M.2004,False,,Springer,Not available,Uncoercible e-Bidding Games,932890313d45a9df3568a04fa0b5c279,http://dx.doi.org/10.1023/B:ELEC.0000009284.64158.0a 2340,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,toru nakanishi,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 2341,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,daisuke yamamoto,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 2342,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,yuji sugiyama,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 2343,We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security cognitive convenience and round-effectiveness. One can vary internal parameters of the mechanism to trade off bid privacy and cognitive costs or cognitive costs and the number of rounds. We are aware of no previous work that interleaves cryptography explicitly with the mechanism design.,edith elkind,Not available,2004.0,10.1007/978-3-540-27809-2_16,Financial Cryptography,Edith2004,False,,Springer,Not available,Interleaving Cryptography and Mechanism Design,104f891976093465346503fd0d5d6dea,http://dx.doi.org/10.1007/978-3-540-27809-2_16 2344,We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security cognitive convenience and round-effectiveness. One can vary internal parameters of the mechanism to trade off bid privacy and cognitive costs or cognitive costs and the number of rounds. We are aware of no previous work that interleaves cryptography explicitly with the mechanism design.,helger lipmaa,Not available,2004.0,10.1007/978-3-540-27809-2_16,Financial Cryptography,Edith2004,False,,Springer,Not available,Interleaving Cryptography and Mechanism Design,104f891976093465346503fd0d5d6dea,http://dx.doi.org/10.1007/978-3-540-27809-2_16 2345,In this paper we propose a Distributed Multi-link Auction mechanism(refereed by DiMA) that deals with request connection establishment in order to provide some End-to-end guarantee of services. The DiMA mechanism determines hop-by-hop the path to be taken by a request while reserving the required resource over it. It consists of consecutive local auctions that each request has to win in order to be satisfied. We consider the problem of determining requests global budgets and bidding strategies. We give some simulative analysis mapping the relation between prices network utilization and distribution of accepted requests.,dominique barth,Not available,2004.0,10.1007/978-3-540-30193-6_33,Quality of Service in the Emerging Networking Panorama,Dominique2004,False,,Springer,Not available,Distributed Multi-link Auctions for Network Resource Reservation and Pricing,fcb7f0d157ba5df6e55b93b0a819ce96,http://dx.doi.org/10.1007/978-3-540-30193-6_33 2346,In this paper we propose a Distributed Multi-link Auction mechanism(refereed by DiMA) that deals with request connection establishment in order to provide some End-to-end guarantee of services. The DiMA mechanism determines hop-by-hop the path to be taken by a request while reserving the required resource over it. It consists of consecutive local auctions that each request has to win in order to be satisfied. We consider the problem of determining requests global budgets and bidding strategies. We give some simulative analysis mapping the relation between prices network utilization and distribution of accepted requests.,loubna echabbi,Not available,2004.0,10.1007/978-3-540-30193-6_33,Quality of Service in the Emerging Networking Panorama,Dominique2004,False,,Springer,Not available,Distributed Multi-link Auctions for Network Resource Reservation and Pricing,fcb7f0d157ba5df6e55b93b0a819ce96,http://dx.doi.org/10.1007/978-3-540-30193-6_33 2347,This paper presents a hybrid approach for sealed bid auction that integrates linear programming and logic modeling techniques. A linear programming model for the sealed bid auction considers only prices for transaction arrangements and yields multiple market cores when goods from sellers are equally attractive to many buyers. The hybrid approach takes into account ordinal preferences of traders as well to find the best market core. On the one hand the hybrid approach uses a linear programming model to maximize total surplus of market participants based on the bid and ask prices. On the other hand it employs a logical inferencing approach to satisfy traders' ordinal preferences that are not included in a single combination of bid and ask prices. A constraint logic programming scheme which combines a mathematical program with a logical inferencing technique in an integrated formalism is introduced to implement the hybrid approach. The hybrid approach is validated through market simulations where a set of computer-generated trading data is applied to both the hybrid approach and the linear programming model for their market performance comparison.,lee geun,Not available,1997.0,10.1023/A:1018959529628,Annals of Operations Research,Ho1997,False,,Springer,Not available,A hybrid approach of linear programming and logic modeling for the market core of sealed bid auctions,f6d031a4f11b8acb02803d772de30b16,http://dx.doi.org/10.1023/A:1018959529628 2348,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,marina bitsaki,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 2349,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,george stamoulis,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 2350,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,costas courcoubetis,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 2351," ",christian at,Not available,2003.0,10.1007/s00199-002-0342-3,Economic Theory,Christian2003,False,,Springer,Not available,The sale of small firms: a multidimensional analysis,2f854a31f68fcb479309870e119e8ade,http://dx.doi.org/10.1007/s00199-002-0342-3 2352," ",pierre-henri morand,Not available,2003.0,10.1007/s00199-002-0342-3,Economic Theory,Christian2003,False,,Springer,Not available,The sale of small firms: a multidimensional analysis,2f854a31f68fcb479309870e119e8ade,http://dx.doi.org/10.1007/s00199-002-0342-3 2353, I consider a single-object English auction with two asymmetric bidders and show that it has a continuum of inefficient undominated ex-post equilibria. The result extends for the generalized VCG mechanism Dasgupta-Maskin auction and generally for every auction that has an efficient ex-post equilibrium.,oleksii birulin,Not available,2003.0,10.1007/s00199-002-0317-4,Economic Theory,Oleksii2003,False,,Springer,Not available,Inefficient ex-post equilibria in efficient auctions,a844ef40279c4925b17b2ea21b767aa2,http://dx.doi.org/10.1007/s00199-002-0317-4 2354,Several auctions have been proposed and applied to perform contract negotiation and resource allocation in reservation-based networks. The methods proposed by these works perceive resources as single items with multiple units and place importance on a limited efficiency inside each node. However as a user evaluates resources not individually but rather as a whole set of required resources the economical efficiency of the overall network cannot be achieved by these methods. To solve this problem we propose a bandwidth allocation system using GVA (Generalised Vickrey Auction). Network resources which are composed of many links at various bandwidths are regarded by the proposed method as multiple items with multiple units. We describe how to apply GVA protocol to bandwidth allocations among multiple users. We investigate algorithmic and accounting problems inside multiple nodes using an end-to-end approach. We evaluate the proposed method's performance from various viewpoints: the utilisation of resources profits of the telecommunications carriers users' utility and users' satisfaction. We show that by adopting GVA the total utility of users can be maximised and the revenues of networks can also be improved.,eiji takahashi,Not available,2003.0,10.1023/A:1026131300453,Telecommunication Systems,Eiji2003,False,,Springer,Not available,Auction-Based Effective Bandwidth Allocation Mechanism,e9ed1e78d77924206c816eb027771050,http://dx.doi.org/10.1023/A:1026131300453 2355,Several auctions have been proposed and applied to perform contract negotiation and resource allocation in reservation-based networks. The methods proposed by these works perceive resources as single items with multiple units and place importance on a limited efficiency inside each node. However as a user evaluates resources not individually but rather as a whole set of required resources the economical efficiency of the overall network cannot be achieved by these methods. To solve this problem we propose a bandwidth allocation system using GVA (Generalised Vickrey Auction). Network resources which are composed of many links at various bandwidths are regarded by the proposed method as multiple items with multiple units. We describe how to apply GVA protocol to bandwidth allocations among multiple users. We investigate algorithmic and accounting problems inside multiple nodes using an end-to-end approach. We evaluate the proposed method's performance from various viewpoints: the utilisation of resources profits of the telecommunications carriers users' utility and users' satisfaction. We show that by adopting GVA the total utility of users can be maximised and the revenues of networks can also be improved.,yoshiaki tanaka,Not available,2003.0,10.1023/A:1026131300453,Telecommunication Systems,Eiji2003,False,,Springer,Not available,Auction-Based Effective Bandwidth Allocation Mechanism,e9ed1e78d77924206c816eb027771050,http://dx.doi.org/10.1023/A:1026131300453 2356,In this paper we study the behavior of individuals when facing two different but incentive-wise identical institutions. We pair the first price auction with an equivalent lottery. Once a subject is assigned a value for the auctioned object the first price auction can be modeled as a lottery in which the individual faces a given probability of winning a certain payoff. This set up allows us to explore to what extent the misperception of the probability of winning in the auction is responsible for bidders in a first price auction to bidding above the risk neutral Nash equilibrium prediction. The first result we obtain is that individuals even though facing the same choice over probability/payoff pairs behave differently depending on the type of choice they are called to make. When facing an auction subjects with high values tend to bid significantly above the bid they choose in the corresponding lottery environment. We further find that in both the lottery and the auction environments subjects tend to bid in excess of the bid predicted by the risk neutral model at least for intermediate range values. Finally we find that the difference between the lottery behavior and the auction behavior is substantially but not totally eliminated by showing the subjects the probability of winning the auction.,robert dorsey,Not available,2003.0,10.1023/A:1025375803912,Experimental Economics,Robert2003,False,,Springer,Not available,Explaining Overbidding in First Price Auctions Using Controlled Lotteries,a336aa1a53c01dda45a226402e6f0674,http://dx.doi.org/10.1023/A:1025375803912 2357,In this paper we study the behavior of individuals when facing two different but incentive-wise identical institutions. We pair the first price auction with an equivalent lottery. Once a subject is assigned a value for the auctioned object the first price auction can be modeled as a lottery in which the individual faces a given probability of winning a certain payoff. This set up allows us to explore to what extent the misperception of the probability of winning in the auction is responsible for bidders in a first price auction to bidding above the risk neutral Nash equilibrium prediction. The first result we obtain is that individuals even though facing the same choice over probability/payoff pairs behave differently depending on the type of choice they are called to make. When facing an auction subjects with high values tend to bid significantly above the bid they choose in the corresponding lottery environment. We further find that in both the lottery and the auction environments subjects tend to bid in excess of the bid predicted by the risk neutral model at least for intermediate range values. Finally we find that the difference between the lottery behavior and the auction behavior is substantially but not totally eliminated by showing the subjects the probability of winning the auction.,laura razzolini,Not available,2003.0,10.1023/A:1025375803912,Experimental Economics,Robert2003,False,,Springer,Not available,Explaining Overbidding in First Price Auctions Using Controlled Lotteries,a336aa1a53c01dda45a226402e6f0674,http://dx.doi.org/10.1023/A:1025375803912 2358,This paper presents a hybrid approach for sealed bid auction that integrates linear programming and logic modeling techniques. A linear programming model for the sealed bid auction considers only prices for transaction arrangements and yields multiple market cores when goods from sellers are equally attractive to many buyers. The hybrid approach takes into account ordinal preferences of traders as well to find the best market core. On the one hand the hybrid approach uses a linear programming model to maximize total surplus of market participants based on the bid and ask prices. On the other hand it employs a logical inferencing approach to satisfy traders' ordinal preferences that are not included in a single combination of bid and ask prices. A constraint logic programming scheme which combines a mathematical program with a logical inferencing technique in an integrated formalism is introduced to implement the hybrid approach. The hybrid approach is validated through market simulations where a set of computer-generated trading data is applied to both the hybrid approach and the linear programming model for their market performance comparison.,ronald lee,Not available,1997.0,10.1023/A:1018959529628,Annals of Operations Research,Ho1997,False,,Springer,Not available,A hybrid approach of linear programming and logic modeling for the market core of sealed bid auctions,f6d031a4f11b8acb02803d772de30b16,http://dx.doi.org/10.1023/A:1018959529628 2359,Online privacy provides fresh motivations to generalized auctions where: (i) preferences over bids may be partial because of lack of knowledge and formalization difficulties; (ii) the preferences of auctioneers and bidders may be heterogeneous and unrelated. We tackle these generalized scenarios by introducing a few natural generalizations of second-price auctions and by investigating which of their classical properties are preserved under which conditions.,piero bonatti,Not available,2013.0,10.1007/978-3-642-40313-2_18,Mathematical Foundations of Computer Science 2013,A.2013,False,,Springer,Not available,Auctions for Partial Heterogeneous Preferences,f0d0d4666e2cc9ffe958291c974fd177,http://dx.doi.org/10.1007/978-3-642-40313-2_18 2360,Online privacy provides fresh motivations to generalized auctions where: (i) preferences over bids may be partial because of lack of knowledge and formalization difficulties; (ii) the preferences of auctioneers and bidders may be heterogeneous and unrelated. We tackle these generalized scenarios by introducing a few natural generalizations of second-price auctions and by investigating which of their classical properties are preserved under which conditions.,marco faella,Not available,2013.0,10.1007/978-3-642-40313-2_18,Mathematical Foundations of Computer Science 2013,A.2013,False,,Springer,Not available,Auctions for Partial Heterogeneous Preferences,f0d0d4666e2cc9ffe958291c974fd177,http://dx.doi.org/10.1007/978-3-642-40313-2_18 2361,Online privacy provides fresh motivations to generalized auctions where: (i) preferences over bids may be partial because of lack of knowledge and formalization difficulties; (ii) the preferences of auctioneers and bidders may be heterogeneous and unrelated. We tackle these generalized scenarios by introducing a few natural generalizations of second-price auctions and by investigating which of their classical properties are preserved under which conditions.,clemente galdi,Not available,2013.0,10.1007/978-3-642-40313-2_18,Mathematical Foundations of Computer Science 2013,A.2013,False,,Springer,Not available,Auctions for Partial Heterogeneous Preferences,f0d0d4666e2cc9ffe958291c974fd177,http://dx.doi.org/10.1007/978-3-642-40313-2_18 2362,Online privacy provides fresh motivations to generalized auctions where: (i) preferences over bids may be partial because of lack of knowledge and formalization difficulties; (ii) the preferences of auctioneers and bidders may be heterogeneous and unrelated. We tackle these generalized scenarios by introducing a few natural generalizations of second-price auctions and by investigating which of their classical properties are preserved under which conditions.,luigi sauro,Not available,2013.0,10.1007/978-3-642-40313-2_18,Mathematical Foundations of Computer Science 2013,A.2013,False,,Springer,Not available,Auctions for Partial Heterogeneous Preferences,f0d0d4666e2cc9ffe958291c974fd177,http://dx.doi.org/10.1007/978-3-642-40313-2_18 2363,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,diana dezsi,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 2364,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,iulia maries,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 2365,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,florentina-olivia balu,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 2366,We address the problem of computing a Walrasian equilibrium price in an ascending auction with gross substitutes valuations. In particular an auction market is considered where there are multiple differentiated items and each item may have multiple units. Although the ascending auction is known to find an equilibrium price vector in finite time little is known about its time complexity. The main aim of this paper is to analyze the time complexity of the ascending auction globally and locally by utilizing the theory of discrete convex analysis. An exact bound on the number of iterations is given in terms of the ℓ,kazuo murota,Not available,2013.0,10.1007/978-3-642-45030-3_44,Algorithms and Computation,Kazuo2013,False,,Springer,Not available,Computing a Walrasian Equilibrium in Iterative Auctions with Multiple Differentiated Items,f5accb12bf0f4a0c7529cdd49e7e3eac,http://dx.doi.org/10.1007/978-3-642-45030-3_44 2367,We address the problem of computing a Walrasian equilibrium price in an ascending auction with gross substitutes valuations. In particular an auction market is considered where there are multiple differentiated items and each item may have multiple units. Although the ascending auction is known to find an equilibrium price vector in finite time little is known about its time complexity. The main aim of this paper is to analyze the time complexity of the ascending auction globally and locally by utilizing the theory of discrete convex analysis. An exact bound on the number of iterations is given in terms of the ℓ,akiyoshi shioura,Not available,2013.0,10.1007/978-3-642-45030-3_44,Algorithms and Computation,Kazuo2013,False,,Springer,Not available,Computing a Walrasian Equilibrium in Iterative Auctions with Multiple Differentiated Items,f5accb12bf0f4a0c7529cdd49e7e3eac,http://dx.doi.org/10.1007/978-3-642-45030-3_44 2368,We address the problem of computing a Walrasian equilibrium price in an ascending auction with gross substitutes valuations. In particular an auction market is considered where there are multiple differentiated items and each item may have multiple units. Although the ascending auction is known to find an equilibrium price vector in finite time little is known about its time complexity. The main aim of this paper is to analyze the time complexity of the ascending auction globally and locally by utilizing the theory of discrete convex analysis. An exact bound on the number of iterations is given in terms of the ℓ,zaifu yang,Not available,2013.0,10.1007/978-3-642-45030-3_44,Algorithms and Computation,Kazuo2013,False,,Springer,Not available,Computing a Walrasian Equilibrium in Iterative Auctions with Multiple Differentiated Items,f5accb12bf0f4a0c7529cdd49e7e3eac,http://dx.doi.org/10.1007/978-3-642-45030-3_44 2369,In this paper I consider a common value model with independent types where the ex-post value of the good is influenced by the bidders' information at the auction stage. The seller cannot fully extract the surplus. In a symmetric model the optimal mechanism can be implemented through first price second price or English auctions; but not through a Dutch auction.Other properties of the optimal auctions are that the seller's reservation price is endogenous and that in sealed bid auctions the price may exceed the value of the object (winner's curse).,fernando branco,Not available,1996.0,10.1007/BF02499137,Economic design,Fernando1996,False,,Springer,Not available,Common value auctions with independent types,11e308f2c6cf231d66e9bea1d37c7f6a,http://dx.doi.org/10.1007/BF02499137 2370,We study the efficiency of sequential first-price item auctions at (subgame perfect) equilibrium. This auction format has recently attracted much attention with previous work establishing positive results for unit-demand valuations and negative results for submodular valuations. This leaves a large gap in our understanding between these valuation classes. In this work we resolve this gap on the negative side. In particular we show that even in the very restricted case in which each bidder has either an additive valuation or a unit-demand valuation there exist instances in which the inefficiency at equilibrium grows linearly with the minimum of the number of items and the number of bidders. Moreover these inefficient equilibria persist even under iterated elimination of weakly dominated strategies. Our main result implies linear inefficiency for many natural settings including auctions with gross substitute valuations capacitated valuations budget-additive valuations and additive valuations with hard budget constraints on the payments. For capacitated valuations our results imply a lower bound that equals the maximum capacity of any bidder which is tight following the upper-bound technique established by Paes Leme et al. [20].,michal feldman,Not available,2013.0,10.1007/978-3-642-45046-4_14,Web and Internet Economics,Michal2013,False,,Springer,Not available,Limits of Efficiency in Sequential Auctions,1bf96d69acb3d67cb9b970ba606ab59f,http://dx.doi.org/10.1007/978-3-642-45046-4_14 2371,We study the efficiency of sequential first-price item auctions at (subgame perfect) equilibrium. This auction format has recently attracted much attention with previous work establishing positive results for unit-demand valuations and negative results for submodular valuations. This leaves a large gap in our understanding between these valuation classes. In this work we resolve this gap on the negative side. In particular we show that even in the very restricted case in which each bidder has either an additive valuation or a unit-demand valuation there exist instances in which the inefficiency at equilibrium grows linearly with the minimum of the number of items and the number of bidders. Moreover these inefficient equilibria persist even under iterated elimination of weakly dominated strategies. Our main result implies linear inefficiency for many natural settings including auctions with gross substitute valuations capacitated valuations budget-additive valuations and additive valuations with hard budget constraints on the payments. For capacitated valuations our results imply a lower bound that equals the maximum capacity of any bidder which is tight following the upper-bound technique established by Paes Leme et al. [20].,brendan lucier,Not available,2013.0,10.1007/978-3-642-45046-4_14,Web and Internet Economics,Michal2013,False,,Springer,Not available,Limits of Efficiency in Sequential Auctions,1bf96d69acb3d67cb9b970ba606ab59f,http://dx.doi.org/10.1007/978-3-642-45046-4_14 2372,We study the efficiency of sequential first-price item auctions at (subgame perfect) equilibrium. This auction format has recently attracted much attention with previous work establishing positive results for unit-demand valuations and negative results for submodular valuations. This leaves a large gap in our understanding between these valuation classes. In this work we resolve this gap on the negative side. In particular we show that even in the very restricted case in which each bidder has either an additive valuation or a unit-demand valuation there exist instances in which the inefficiency at equilibrium grows linearly with the minimum of the number of items and the number of bidders. Moreover these inefficient equilibria persist even under iterated elimination of weakly dominated strategies. Our main result implies linear inefficiency for many natural settings including auctions with gross substitute valuations capacitated valuations budget-additive valuations and additive valuations with hard budget constraints on the payments. For capacitated valuations our results imply a lower bound that equals the maximum capacity of any bidder which is tight following the upper-bound technique established by Paes Leme et al. [20].,vasilis syrgkanis,Not available,2013.0,10.1007/978-3-642-45046-4_14,Web and Internet Economics,Michal2013,False,,Springer,Not available,Limits of Efficiency in Sequential Auctions,1bf96d69acb3d67cb9b970ba606ab59f,http://dx.doi.org/10.1007/978-3-642-45046-4_14 2373,We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction which charges every winner his winning bids. The second is the Uniform Price Auction which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors to online sales over the internet. For these formats we consider two bidding interfaces: (i) standard bidding which is most prevalent in the scientific literature and (ii) uniform bidding which is more popular in practice. In this work we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently for submodular valuation functions. Also for the first time we consider bidders with subadditive valuation functions under these auction formats. Our results signify near-efficiency of these auctions which provides further justification for their use in practice.,bart keijzer,Not available,2013.0,10.1007/978-3-642-40450-4_33,Algorithms – ESA 2013,Bart2013,False,,Springer,Not available,Inefficiency of Standard Multi-unit Auctions,1035471f5186df4c38eab42d8baaf867,http://dx.doi.org/10.1007/978-3-642-40450-4_33 2374,We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction which charges every winner his winning bids. The second is the Uniform Price Auction which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors to online sales over the internet. For these formats we consider two bidding interfaces: (i) standard bidding which is most prevalent in the scientific literature and (ii) uniform bidding which is more popular in practice. In this work we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently for submodular valuation functions. Also for the first time we consider bidders with subadditive valuation functions under these auction formats. Our results signify near-efficiency of these auctions which provides further justification for their use in practice.,evangelos markakis,Not available,2013.0,10.1007/978-3-642-40450-4_33,Algorithms – ESA 2013,Bart2013,False,,Springer,Not available,Inefficiency of Standard Multi-unit Auctions,1035471f5186df4c38eab42d8baaf867,http://dx.doi.org/10.1007/978-3-642-40450-4_33 2375,We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction which charges every winner his winning bids. The second is the Uniform Price Auction which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors to online sales over the internet. For these formats we consider two bidding interfaces: (i) standard bidding which is most prevalent in the scientific literature and (ii) uniform bidding which is more popular in practice. In this work we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently for submodular valuation functions. Also for the first time we consider bidders with subadditive valuation functions under these auction formats. Our results signify near-efficiency of these auctions which provides further justification for their use in practice.,guido schafer,Not available,2013.0,10.1007/978-3-642-40450-4_33,Algorithms – ESA 2013,Bart2013,False,,Springer,Not available,Inefficiency of Standard Multi-unit Auctions,1035471f5186df4c38eab42d8baaf867,http://dx.doi.org/10.1007/978-3-642-40450-4_33 2376,We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction which charges every winner his winning bids. The second is the Uniform Price Auction which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors to online sales over the internet. For these formats we consider two bidding interfaces: (i) standard bidding which is most prevalent in the scientific literature and (ii) uniform bidding which is more popular in practice. In this work we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently for submodular valuation functions. Also for the first time we consider bidders with subadditive valuation functions under these auction formats. Our results signify near-efficiency of these auctions which provides further justification for their use in practice.,orestis telelis,Not available,2013.0,10.1007/978-3-642-40450-4_33,Algorithms – ESA 2013,Bart2013,False,,Springer,Not available,Inefficiency of Standard Multi-unit Auctions,1035471f5186df4c38eab42d8baaf867,http://dx.doi.org/10.1007/978-3-642-40450-4_33 2377,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,kyriakos chatzidimitriou,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 2378,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,lampros stavrogiannis,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 2379,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,andreas symeonidis,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 2380,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,martin bichler,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 2381,Sponsored search auctions constitutes the most important source of revenue for search engine companies offering new opportunities for advertisers. The Trading Agent Competition (TAC) Ad Auctions tournament is one of the first attempts to study the competition among advertisers for their placement in sponsored positions along with organic search engine results. In this paper we describe agent Mertacor a simulation-based game theoretic agent coupled with on-line learning techniques to optimize its behavior that successfully competed in the 2010 tournament. In addition we evaluate different facets of our agent to draw conclusions about certain aspects of its strategy.,pericles mitkas,Not available,2013.0,10.1007/978-3-642-34889-1_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2013,False,,Springer,Not available,An Adaptive Proportional Value-per-Click Agent for Bidding in Ad Auctions,6d832c473a1f22b1da0ee05f066e87f9,http://dx.doi.org/10.1007/978-3-642-34889-1_2 2382,A realistic agent-based computational model of the day-ahead market session of the Italian wholesale electricity market is simulated to compare market performances between system-marginal-price and pay-as-bid clearing mechanisms. An empirical validation of computational results at a macro-level is performed to test for accuracy of simulated outcomes with historical ones. The level of prices are accurately reproduced except for few peak hours. As far as concerns pay-as-bid auction the computational experiments point out that it results in higher market prices than the system-marginal-price auction. In the pay-as-bid mechanism sellers’ endeavours to maximize their profits are more costly thus leading to higher price levels,eric guerci,Not available,2013.0,10.1007/978-3-642-31301-1_12,Managing Market Complexity,Eric2013,False,,Springer,Not available,Comparing system-marginal-price versus pay-as-bid auctions in a realistic electricity market scenario,e3c01a9f77d8faf7c9f711022930ad89,http://dx.doi.org/10.1007/978-3-642-31301-1_12 2383,A realistic agent-based computational model of the day-ahead market session of the Italian wholesale electricity market is simulated to compare market performances between system-marginal-price and pay-as-bid clearing mechanisms. An empirical validation of computational results at a macro-level is performed to test for accuracy of simulated outcomes with historical ones. The level of prices are accurately reproduced except for few peak hours. As far as concerns pay-as-bid auction the computational experiments point out that it results in higher market prices than the system-marginal-price auction. In the pay-as-bid mechanism sellers’ endeavours to maximize their profits are more costly thus leading to higher price levels,mohammad rastegar,Not available,2013.0,10.1007/978-3-642-31301-1_12,Managing Market Complexity,Eric2013,False,,Springer,Not available,Comparing system-marginal-price versus pay-as-bid auctions in a realistic electricity market scenario,e3c01a9f77d8faf7c9f711022930ad89,http://dx.doi.org/10.1007/978-3-642-31301-1_12 2384,In spot markets for trading fishes single-sided auctions are used for clearing the market by virtue of its promptness and simplicity which are important in dealing with perishable goods. However in those auctions sellers cannot participate in price-making process. A standard double auction market collects bids from traders and matches buyers’ higher bids and sellers’ lower bids to find the most efficient allocation assuming that values of unsold items remain unchanged. Nevertheless in the spot fish market sellers suffer loss when they fail to sell the fish whose salvage value is lost due to perishability. To solve the problem we investigate the suitable design of an online double auction for fishery markets where bids arrive dynamically with their time limits. Our market mechanism aims at improving traders’ profitability by reducing trade failures in the face of uncertainty of incoming/leaving bids. We developed a heuristic matching rule for the market to prioritize traders’ bids based on their time-criticality and evaluated its performance empirically.,kazuo miyashita,Not available,2013.0,10.1007/978-3-642-38577-3_1,Recent Trends in Applied Artificial Intelligence,Kazuo2013,False,,Springer,Not available,Developing Online Double Auction Mechanism for Fishery Markets,f633dbeb62f87752f22da2460bfaa434,http://dx.doi.org/10.1007/978-3-642-38577-3_1 2385,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,yang zhang,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 2386,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,dusit niyato,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 2387,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,ping wang,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 2388,First-come-first-serve (FCFS) scheme is used for selling the tickets in ticket market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design a sub field of game theory can provide better results against FCFS in terms of profit making and efficiency in allocation. However the solution proposed in the earlier literature can address the ticket selling environment where an agent can give demand for a single ticket in static environment. In many situations a single agent can give demand for multiple tickets in static environment. In this paper with the use of mechanism design framework some elegant solutions are proposed in static environment where an agent can give demand for multiple tickets.,sajal mukhopadhyay,Not available,2013.0,10.1007/978-94-007-6996-0_55,Information Technology Convergence,Sajal2013,False,,Springer,Not available,Auction Based Ticket Selling Schemes with Multiple Demand from the Agents in Static Environment,a1e2eba8f14a8b8856ec985232e7dc89,http://dx.doi.org/10.1007/978-94-007-6996-0_55 2389,First-come-first-serve (FCFS) scheme is used for selling the tickets in ticket market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design a sub field of game theory can provide better results against FCFS in terms of profit making and efficiency in allocation. However the solution proposed in the earlier literature can address the ticket selling environment where an agent can give demand for a single ticket in static environment. In many situations a single agent can give demand for multiple tickets in static environment. In this paper with the use of mechanism design framework some elegant solutions are proposed in static environment where an agent can give demand for multiple tickets.,d. ghosh,Not available,2013.0,10.1007/978-94-007-6996-0_55,Information Technology Convergence,Sajal2013,False,,Springer,Not available,Auction Based Ticket Selling Schemes with Multiple Demand from the Agents in Static Environment,a1e2eba8f14a8b8856ec985232e7dc89,http://dx.doi.org/10.1007/978-94-007-6996-0_55 2390,First-come-first-serve (FCFS) scheme is used for selling the tickets in ticket market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design a sub field of game theory can provide better results against FCFS in terms of profit making and efficiency in allocation. However the solution proposed in the earlier literature can address the ticket selling environment where an agent can give demand for a single ticket in static environment. In many situations a single agent can give demand for multiple tickets in static environment. In this paper with the use of mechanism design framework some elegant solutions are proposed in static environment where an agent can give demand for multiple tickets.,narayan debnath,Not available,2013.0,10.1007/978-94-007-6996-0_55,Information Technology Convergence,Sajal2013,False,,Springer,Not available,Auction Based Ticket Selling Schemes with Multiple Demand from the Agents in Static Environment,a1e2eba8f14a8b8856ec985232e7dc89,http://dx.doi.org/10.1007/978-94-007-6996-0_55 2391,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,pasha shabalin,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 2392,First-come-first-serve (FCFS) scheme is used for selling the tickets in ticket market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design a sub field of game theory can provide better results against FCFS in terms of profit making and efficiency in allocation. However the solution proposed in the earlier literature can address the ticket selling environment where an agent can give demand for a single ticket in static environment. In many situations a single agent can give demand for multiple tickets in static environment. In this paper with the use of mechanism design framework some elegant solutions are proposed in static environment where an agent can give demand for multiple tickets.,n. ramteja,Not available,2013.0,10.1007/978-94-007-6996-0_55,Information Technology Convergence,Sajal2013,False,,Springer,Not available,Auction Based Ticket Selling Schemes with Multiple Demand from the Agents in Static Environment,a1e2eba8f14a8b8856ec985232e7dc89,http://dx.doi.org/10.1007/978-94-007-6996-0_55 2393,This paper proposes a discrete bidding model for both quantities and pricing. It has a two-unit demand environment where subjects bid for contracts with an unknown redemption value common to all bidders. Prior to bidding the bidders receive private signals of information on the (common) value. The relevant task is to compare the equilibrium strategies and the seller’s revenue of the three most common auction formats with two players. The result is that the Vickrey auction always gives the most revenue to the seller the discriminatory auction follows closely and the uniform auction clearly is the worst due to demand reduction.,joakim ahlberg,Not available,2009.0,10.1007/s10258-009-0042-z,Portuguese Economic Journal,Joakim2009,False,,Springer,Not available,Revenues in discrete multi-unit common value auctions: a study of three sealed-bid mechanisms,1db18fa50aa2680252dfa75f88cba604,http://dx.doi.org/10.1007/s10258-009-0042-z 2394,This paper examines the problem of a seller with limited supply selling to a group of agents whose private information is two-dimensional. Each agent has a constant marginal value for the good up to some capacity thereafter it is zero. Both the marginal value and the capacity are private information. We describe the revenue maximizing Bayesian incentive compatible auction for this environment. A novel feature of the analysis is an interpretation of an optimal auction design problem in terms of a linear program that is an instance of a parametric shortest path problem on a lattice.,alexey malakhov,Not available,2009.0,10.1007/s00199-007-0312-x,Economic Theory,Alexey2009,False,,Springer,Not available,An optimal auction for capacity constrained bidders: a network perspective,0869c97dacdd2894dc5d7f0939bb8725,http://dx.doi.org/10.1007/s00199-007-0312-x 2395,This paper examines the problem of a seller with limited supply selling to a group of agents whose private information is two-dimensional. Each agent has a constant marginal value for the good up to some capacity thereafter it is zero. Both the marginal value and the capacity are private information. We describe the revenue maximizing Bayesian incentive compatible auction for this environment. A novel feature of the analysis is an interpretation of an optimal auction design problem in terms of a linear program that is an instance of a parametric shortest path problem on a lattice.,rakesh vohra,Not available,2009.0,10.1007/s00199-007-0312-x,Economic Theory,Alexey2009,False,,Springer,Not available,An optimal auction for capacity constrained bidders: a network perspective,0869c97dacdd2894dc5d7f0939bb8725,http://dx.doi.org/10.1007/s00199-007-0312-x 2396,Sellers and buyers on online auction sites like eBay have the option of setting and executing auction parameters such as auction length Buy-It-Now price starting price reserve price etc. Understanding why bidders choose to execute the Buy-It-Now price as opposed to submitting a bid at the last minute of an auction helps managers better choose auction parameters and generate more revenue. In this paper we first study online bidder behavior pertaining to the execution of the Buy-It-Now option as opposed to the last minute bidding strategy on eBay. Consequently we study the seller’s decision to set a Buy-It-Now option and the amount of it. Our main finding is that a dominant strategy for the seller is to offer a Buy-It-Now option at the beginning of the auction. An early bidder arriving at the auction site is indifferent in choosing threshold Buy-It-Now prices or moving onto the auction and under particular circumstances strategically waiting for the last minutes of the auction to submit a bid. We also provide conditions on the existence of a set of equilibria which predicts the outcome of the game of executing the Buy-It-Now option versus last-minute bidding on eBay.,ilke onur,Not available,2009.0,10.1007/s10799-009-0051-8,Information Technology and Management,Ilke2009,False,,Springer,Not available,Interplay between Buy-It-Now price and last minute bidding on online bidding strategies,6e67bb254e3d47402c8b9a42af0eb8c3,http://dx.doi.org/10.1007/s10799-009-0051-8 2397,Sellers and buyers on online auction sites like eBay have the option of setting and executing auction parameters such as auction length Buy-It-Now price starting price reserve price etc. Understanding why bidders choose to execute the Buy-It-Now price as opposed to submitting a bid at the last minute of an auction helps managers better choose auction parameters and generate more revenue. In this paper we first study online bidder behavior pertaining to the execution of the Buy-It-Now option as opposed to the last minute bidding strategy on eBay. Consequently we study the seller’s decision to set a Buy-It-Now option and the amount of it. Our main finding is that a dominant strategy for the seller is to offer a Buy-It-Now option at the beginning of the auction. An early bidder arriving at the auction site is indifferent in choosing threshold Buy-It-Now prices or moving onto the auction and under particular circumstances strategically waiting for the last minutes of the auction to submit a bid. We also provide conditions on the existence of a set of equilibria which predicts the outcome of the game of executing the Buy-It-Now option versus last-minute bidding on eBay.,kerem tomak,Not available,2009.0,10.1007/s10799-009-0051-8,Information Technology and Management,Ilke2009,False,,Springer,Not available,Interplay between Buy-It-Now price and last minute bidding on online bidding strategies,6e67bb254e3d47402c8b9a42af0eb8c3,http://dx.doi.org/10.1007/s10799-009-0051-8 2398," We compare simultaneous multi-object English-type ascending price auctions with first price sealed bid auctions in private values environments with multi-object demands. Special attention is paid to the effect of closing rules on ascending auctions’ outcomes. We find that simultaneous ascending auctions with the soft closing rule are the most efficient while the sealed bid auctions generate the highest revenue. Ascending auctions with the hard closing rule display a significant amount of late bidding resulting in the lowest among the three institutions revenue and efficiency. ",katerina sherstyuk,Not available,2009.0,10.1007/s10683-007-9189-6,Experimental Economics,Katerina2009,False,,Springer,Not available,A comparison of first price multi-object auctions,a01df14413cd3acfeb2a4cff2e2d0687,http://dx.doi.org/10.1007/s10683-007-9189-6 2399,Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term ,d laffey,Not available,2009.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,D2009,False,,Springer,Not available,Estimating advertisers' values for paid search clickthroughs,158591ba292c40c6ff296f0c29998e78,http://dx.doi.org/10.1057/palgrave.jors.2602570 2400,Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term ,c hunka,Not available,2009.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,D2009,False,,Springer,Not available,Estimating advertisers' values for paid search clickthroughs,158591ba292c40c6ff296f0c29998e78,http://dx.doi.org/10.1057/palgrave.jors.2602570 2401,Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term ,j sharp,Not available,2009.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,D2009,False,,Springer,Not available,Estimating advertisers' values for paid search clickthroughs,158591ba292c40c6ff296f0c29998e78,http://dx.doi.org/10.1057/palgrave.jors.2602570 2402,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,jurgen wolf,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 2403,Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term ,z zeng,Not available,2009.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,D2009,False,,Springer,Not available,Estimating advertisers' values for paid search clickthroughs,158591ba292c40c6ff296f0c29998e78,http://dx.doi.org/10.1057/palgrave.jors.2602570 2404,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,martin bichler,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 2405,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,alexander pikovsky,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 2406,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:,thomas setzer,Not available,2009.0,10.1007/s12599-008-0014-3,Business & Information Systems Engineering,Martin2009,False,,Springer,Not available,An Analysis of Design Problems in Combinatorial Procurement Auctions,f4eee6c2a0f3c5fdec807656d633b932,http://dx.doi.org/10.1007/s12599-008-0014-3 2407,This article further studies ex ante efficient auctions in the setting of Stegeman (1996 Participation costs and efficient auctions ,jingfeng lu,Not available,2009.0,10.1007/s11238-007-9092-9,Theory and Decision,Jingfeng2009,False,,Springer,Not available,Why a Simple Second-Price Auction Induces Efficient Endogenous Entry,4c6707570f01e553a7a562b0e02ae1cd,http://dx.doi.org/10.1007/s11238-007-9092-9 2408,"Traditionelle Auktionsverfahren sind auf reine Preisverhandlungen mit einfachen standardisierten Gütern beschränkt. Kombinatorische Auktionen ermöglichen die Abgabe von Bündelgeboten und dadurch die effiziente Durchführung von Verhandlungen über mehrere Güter. Der Einsatz in der betrieblichen Beschaffung ist durch eine Reihe von Besonderheiten gekennzeichnet:,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:",martin bichler,Not available,2009.0,10.1007/s11576-008-0119-9,WIRTSCHAFTSINFORMATIK,Martin2009,False,,Springer,Not available,Kombinatorische Auktionen in der betrieblichen BeschaffungEine Analyse grundlegender Entwurfsprobleme – An Analysis of Design Problems in Combinatorial Procurement Auctions,b9f8d88e18203cc14836c2021d81e66f,http://dx.doi.org/10.1007/s11576-008-0119-9 2409,"Traditionelle Auktionsverfahren sind auf reine Preisverhandlungen mit einfachen standardisierten Gütern beschränkt. Kombinatorische Auktionen ermöglichen die Abgabe von Bündelgeboten und dadurch die effiziente Durchführung von Verhandlungen über mehrere Güter. Der Einsatz in der betrieblichen Beschaffung ist durch eine Reihe von Besonderheiten gekennzeichnet:,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:",alexander pikovsky,Not available,2009.0,10.1007/s11576-008-0119-9,WIRTSCHAFTSINFORMATIK,Martin2009,False,,Springer,Not available,Kombinatorische Auktionen in der betrieblichen BeschaffungEine Analyse grundlegender Entwurfsprobleme – An Analysis of Design Problems in Combinatorial Procurement Auctions,b9f8d88e18203cc14836c2021d81e66f,http://dx.doi.org/10.1007/s11576-008-0119-9 2410,"Traditionelle Auktionsverfahren sind auf reine Preisverhandlungen mit einfachen standardisierten Gütern beschränkt. Kombinatorische Auktionen ermöglichen die Abgabe von Bündelgeboten und dadurch die effiziente Durchführung von Verhandlungen über mehrere Güter. Der Einsatz in der betrieblichen Beschaffung ist durch eine Reihe von Besonderheiten gekennzeichnet:,Traditional auction mechanisms support price negotiations on a single item. The Internet allows for the exchange of much more complex offers in real-time. This is one of the reasons for much research on multidimensional auction mechanisms allowing negotiations on multiple items multiple units or multiple attributes of an item as they can be regularly found in procurement. Combinatorial auctions for example enable suppliers to submit bids on bundles of items. A number of laboratory experiments has shown high allocative efficiency in markets with economies of scope. For suppliers it is easier to express cost savings due to bundling (e. g. decreased transportation or production costs). This can lead to significant savings in total cost of the procurement manager. Procurement negotiations exhibit a number of particularities:",thomas setzer,Not available,2009.0,10.1007/s11576-008-0119-9,WIRTSCHAFTSINFORMATIK,Martin2009,False,,Springer,Not available,Kombinatorische Auktionen in der betrieblichen BeschaffungEine Analyse grundlegender Entwurfsprobleme – An Analysis of Design Problems in Combinatorial Procurement Auctions,b9f8d88e18203cc14836c2021d81e66f,http://dx.doi.org/10.1007/s11576-008-0119-9 2411,This paper studies revenue-maximizing auctions in an independent private value setting where potential bidders have known positive opportunity cost of bidding. The main findings are as follows. Firstly there is no loss of generality in deriving the revenue-maximizing auctions within the class of threshold-entry mechanisms. Secondly for any given set of entry thresholds a second-price sealed-bid auction with properly set reserve prices and entry subsidy is revenue-maximizing. Thirdly a variety of auctions are revenue-maximizing within the symmetric threshold-entry class. Two of them involve no entry subsidy (fee). Fourthly we identify sufficient conditions under which it is in the seller’s interest to limit the number of potential bidders even if the revenue-maximizing symmetric threshold-entry auction is adopted. Lastly the revenue-maximizing auction implements asymmetric entry across symmetric bidders in many cases.,jingfeng lu,Not available,2009.0,10.1007/s00199-008-0331-2,Economic Theory,Jingfeng2009,False,,Springer,Not available,Auction design with opportunity cost,07ad73b1dab14b4d050c52c23605250f,http://dx.doi.org/10.1007/s00199-008-0331-2 2412,In a complex procurement a buyer may consider biasing the auction rules in order to account for differences in product characteristics offered by the sellers. This paper studies the gathering disclosure and use of information about this bias. While we also describe the optimal procurement auction in our setting the main focus of the paper is on the case where the buyer does not have commitment power. We find that without commitment full disclosure of the buyer’s preferences is optimal. Furthermore lack of commitment distorts the buyer’s incentives to learn about its preferences: unlike the commitment case without commitment the value of this information can be negative.,leonardo rezende,Not available,2009.0,10.1007/s00199-008-0346-8,Economic Theory,Leonardo2009,False,,Springer,Not available,Biased procurement auctions,055cea4106c154e5b7d26cf22569bff4,http://dx.doi.org/10.1007/s00199-008-0346-8 2413,In theory efficiency and compliance levels induced by an emission trading system should not depend on the initial allocation mechanism for permits in the absence of transaction costs. In a laboratory experiment we investigate this prediction by comparing frequent and infrequent auctioning as well as two different grandfathering schemes under market rules that closely resemble those of the European Union Emission Trading System. Our experimental results suggest that contrary to theoretical predictions the initial allocation procedure has the potential to affect efficiency of the final permit allocation. While we do not identify an effect of the initial allocation procedure itself (auction vs. grandfathering) we observe higher final efficiency after infrequent auctioning of permits than for frequent auctioning. Surprisingly for a grandfathering scheme that distributes permits proportional to expected needs the high initial efficiency is substantially reduced by secondary market trading. An analysis of behavioral patterns shows that permit prices and abatement levels are initially substantially higher if permits are allocated by auction and we also find more over-banking as compared to the grandfathering treatments. Treatment differences diminish in the course of the experiment.,veronika grimm,Not available,2013.0,10.1007/s11149-013-9222-y,Journal of Regulatory Economics,Veronika2013,False,,Springer,Not available,An experiment on emissions trading: the effect of different allocation mechanisms,b85f6569e0250049ba25cb0d20a81c90,http://dx.doi.org/10.1007/s11149-013-9222-y 2414,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,wei zhou,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 2415,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,tao jing,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 2416,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,yan huo,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 2417,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,jin qian,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 2418,Cognitive Radio (CR) has emerged as a promising technology to address the spectrum scarcity through encouraging the open access of licensed spectrum to unlicensed users. The incentives for licensed users and the resource allocation among unlicensed users are two main critical issues in practical implementation. Recently auction has been introduced as an efficient tool to solve both incentive and allocation issues in cognitive radio networks. However existing studies on auction are focusing on either channel allocation or power allocation. Few of them considers the channel and power allocation jointly. In addition various transmission demands of unlicensed users push the need for flexible user request on spectrum resource. In this paper we propose an auction scheme to study the joint resource allocation problem among unlicensed users and allow them to submit either range request or strict request according to their demands. To the best of our knowledge we are the first to focus on this kind of problem. In the final Theoretical analysis and numerical evaluations verify the truthfulness and efficiency of our scheme.,zhen li,Not available,2015.0,10.1007/978-3-319-24540-9_4,Cognitive Radio Oriented Wireless Networks,Wei2015,False,,Springer,Not available,Auction Based Joint Resource Allocation with Flexible User Request in Cognitive Radio Networks,f5e93bb2e70b0aec765e73ec428e267c,http://dx.doi.org/10.1007/978-3-319-24540-9_4 2419,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,yu-e sun,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2420,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,he huang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2421,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,miaomiao tian,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2422,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,zehao sun,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2423,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,wei yang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2424,In theory efficiency and compliance levels induced by an emission trading system should not depend on the initial allocation mechanism for permits in the absence of transaction costs. In a laboratory experiment we investigate this prediction by comparing frequent and infrequent auctioning as well as two different grandfathering schemes under market rules that closely resemble those of the European Union Emission Trading System. Our experimental results suggest that contrary to theoretical predictions the initial allocation procedure has the potential to affect efficiency of the final permit allocation. While we do not identify an effect of the initial allocation procedure itself (auction vs. grandfathering) we observe higher final efficiency after infrequent auctioning of permits than for frequent auctioning. Surprisingly for a grandfathering scheme that distributes permits proportional to expected needs the high initial efficiency is substantially reduced by secondary market trading. An analysis of behavioral patterns shows that permit prices and abatement levels are initially substantially higher if permits are allocated by auction and we also find more over-banking as compared to the grandfathering treatments. Treatment differences diminish in the course of the experiment.,lyuba ilieva,Not available,2013.0,10.1007/s11149-013-9222-y,Journal of Regulatory Economics,Veronika2013,False,,Springer,Not available,An experiment on emissions trading: the effect of different allocation mechanisms,b85f6569e0250049ba25cb0d20a81c90,http://dx.doi.org/10.1007/s11149-013-9222-y 2425,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,hansong guo,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2426,Auction has been regarded as one of the promising methods for the scarce resources allocation due to its fairness. Thus spectrum auction is an efficient way to allocate licensed spectrum to new demanders for mitigating the spectrum scarcity. Most of the existing studies assume that the spectrum resources are homogeneous. However spectrums with different frequencies are intrinsically heterogeneous due to their different licensed areas and interference ranges. In this paper we concentrate on the heterogeneity of spectrum resources and propose a strategyproof double auction mechanism STRUCTURE. The STRUCTURE assumes that all the buyers are selfish and rational and they will submit their bids for each interested spectrum. To achieve the strategyproofness many existing double spectrum auction mechanisms adopt the bid-independent methods to construct buyer groups which may cause unfairness for the buyers with high bid values. To tackle this we turn to choose a bid-related buyer group construction algorithm which is more suitable for the laws of market and can further avoid the collusion between buyers. After that we propose a collusion-free allocation mechanism and a bid-independent payment mechanism to ensure the strategyproofness for both buyers and sellers. Simulation results show that the proposed mechanism significantly improves the spectrum utilization with low running time. Furthermore we also find that the buyers with higher bid values have a higher winning ratio than the buyers with low bids in the STRUCTURE.,liusheng huang,Not available,2015.0,10.1007/978-3-319-27140-8_30,Algorithms and Architectures for Parallel Processing,Yu-E2015,False,,Springer,Not available,STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets,ac020f1ab4511f3a857c80ab89a32cad,http://dx.doi.org/10.1007/978-3-319-27140-8_30 2427,Syms a clothing retailer in New York adopted an automatic price reduction system to help customers make timely decisions when picking out a favorite piece of clothing and not to miss out on the opportunity to buy it.,guiping lin,Not available,2015.0,10.1007/978-3-662-44714-7_7,The Principle of Profit Models,Guiping2015,False,,Springer,Not available,Auctions,f8cb45e11e5bf31bda4afadb3482cddb,http://dx.doi.org/10.1007/978-3-662-44714-7_7 2428,Syms a clothing retailer in New York adopted an automatic price reduction system to help customers make timely decisions when picking out a favorite piece of clothing and not to miss out on the opportunity to buy it.,wei wei,Not available,2015.0,10.1007/978-3-662-44714-7_7,The Principle of Profit Models,Guiping2015,False,,Springer,Not available,Auctions,f8cb45e11e5bf31bda4afadb3482cddb,http://dx.doi.org/10.1007/978-3-662-44714-7_7 2429,Syms a clothing retailer in New York adopted an automatic price reduction system to help customers make timely decisions when picking out a favorite piece of clothing and not to miss out on the opportunity to buy it.,wuxiang zhu,Not available,2015.0,10.1007/978-3-662-44714-7_7,The Principle of Profit Models,Guiping2015,False,,Springer,Not available,Auctions,f8cb45e11e5bf31bda4afadb3482cddb,http://dx.doi.org/10.1007/978-3-662-44714-7_7 2430,In this chapter we introduce the concept of ,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_7,Understanding Auctions,Asunción2015,False,,Springer,Not available,Introduction to Combinatorial Auctions,b0d035985ab7b1eda6fd3b4e1186b74b,http://dx.doi.org/10.1007/978-3-319-08813-6_7 2431,In this chapter we introduce the concept of ,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_7,Understanding Auctions,Asunción2015,False,,Springer,Not available,Introduction to Combinatorial Auctions,b0d035985ab7b1eda6fd3b4e1186b74b,http://dx.doi.org/10.1007/978-3-319-08813-6_7 2432,In recent years Internet auctions have experienced strong growth increasing the volume of online trades. Driven by this fact as well as the possibility offered by certain platforms to obtain field data research of ,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_9,Understanding Auctions,Asunción2015,False,,Springer,Not available,Online Auctions,3b57c4273f0f6f38d4995f067f430a5a,http://dx.doi.org/10.1007/978-3-319-08813-6_9 2433,In recent years Internet auctions have experienced strong growth increasing the volume of online trades. Driven by this fact as well as the possibility offered by certain platforms to obtain field data research of ,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_9,Understanding Auctions,Asunción2015,False,,Springer,Not available,Online Auctions,3b57c4273f0f6f38d4995f067f430a5a,http://dx.doi.org/10.1007/978-3-319-08813-6_9 2434,Combinatorial auctions (CAs) are characterized by offering multiple related items and allowing the bidders to bid for the items or combinations of items in which they are interested. When a combinatorial auction is being designed the seller must set up all the details such as: dynamic or sealed-bid (single-round) pricing rule activity rule and starting price. Given the wide spectrum of possibilities in this chapter we will only focus on analyzing a few of these models in which the first-price rule will be applied.,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_8,Understanding Auctions,Asunción2015,False,,Springer,Not available,Combinatorial Auction Models,20efa91ef4fb2ad3fa6e4302ece5512a,http://dx.doi.org/10.1007/978-3-319-08813-6_8 2435,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,t. andersson,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 2436,Combinatorial auctions (CAs) are characterized by offering multiple related items and allowing the bidders to bid for the items or combinations of items in which they are interested. When a combinatorial auction is being designed the seller must set up all the details such as: dynamic or sealed-bid (single-round) pricing rule activity rule and starting price. Given the wide spectrum of possibilities in this chapter we will only focus on analyzing a few of these models in which the first-price rule will be applied.,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_8,Understanding Auctions,Asunción2015,False,,Springer,Not available,Combinatorial Auction Models,20efa91ef4fb2ad3fa6e4302ece5512a,http://dx.doi.org/10.1007/978-3-319-08813-6_8 2437,An auction is a market mechanism which by means of explicit rules transfers market players' bids into an allocation of resources. An auction yields an unequivocal result as to which market player gets a specific object at which price. In network sectors auctions have considerable potential as allocation mechanisms for network services (e.g. providing bus services) and for the provision of network infrastructure capacities (e.g. take-off and landing slots on airports). In this context auctions of public resources for instance radio frequencies on the basis of which network infrastructures can be built are the best known examples. This chapter analyses the network-specific particularities of auctions in network industries.,gunter knieps,Not available,2015.0,10.1007/978-3-319-11695-2_5,Network Economics,Günter2015,False,,Springer,Not available,Auctions,c4de24a9df95e1fd56123589fb110267,http://dx.doi.org/10.1007/978-3-319-11695-2_5 2438,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,takashi nishide,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 2439,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,mitsugu iwamoto,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 2440,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,atsushi iwasaki,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 2441,In auction theory little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile in secure auctions where private information should remain hidden the information of the tie can unnecessarily reveal something that should remain hidden. Nevertheless in most of existing secure auctions ties are handled outside the auctions and all the winning candidates or only the non-tied partial bidders are identified in the case of ties assuming that a subsequent additional selection (or auction) to finalize the winners is held publicly. However for instance in the case of the ,kazuo ohta,Not available,2015.0,10.1007/978-3-319-27998-5_27,Trusted Systems,Takashi2015,False,,Springer,Not available,Secure ,ed0cbbba93720c69c1604cd0e6e03da8,http://dx.doi.org/10.1007/978-3-319-27998-5_27 2442,In this paper we investigate the possibility of spontaneous segregation into groups of traders that have to choose among several markets. Even in the simplest case of two markets and Zero Intelligence traders we are able to observe segregation effects below a critical value ,aleksandra aloric,Not available,2015.0,10.1007/978-3-319-09578-3_7,Advances in Artificial Economics,Aleksandra2015,False,,Springer,Not available,Spontaneous Segregation of Agents Across Double Auction Markets,c90f2c3a4950bfa06c49563ed3ff9e84,http://dx.doi.org/10.1007/978-3-319-09578-3_7 2443,In this paper we investigate the possibility of spontaneous segregation into groups of traders that have to choose among several markets. Even in the simplest case of two markets and Zero Intelligence traders we are able to observe segregation effects below a critical value ,peter sollich,Not available,2015.0,10.1007/978-3-319-09578-3_7,Advances in Artificial Economics,Aleksandra2015,False,,Springer,Not available,Spontaneous Segregation of Agents Across Double Auction Markets,c90f2c3a4950bfa06c49563ed3ff9e84,http://dx.doi.org/10.1007/978-3-319-09578-3_7 2444,In this paper we investigate the possibility of spontaneous segregation into groups of traders that have to choose among several markets. Even in the simplest case of two markets and Zero Intelligence traders we are able to observe segregation effects below a critical value ,peter mcburney,Not available,2015.0,10.1007/978-3-319-09578-3_7,Advances in Artificial Economics,Aleksandra2015,False,,Springer,Not available,Spontaneous Segregation of Agents Across Double Auction Markets,c90f2c3a4950bfa06c49563ed3ff9e84,http://dx.doi.org/10.1007/978-3-319-09578-3_7 2445,Auctions have been used in the procurement of heterogeneous products produced and delivered after the auctions conclude as well as services. In these situations the quasi-linearity assumption of the buyer and the sellers is violated and the price and other attributes are interrelated. The relationship between price and other attributes is illustrated here with two exchanges in which the market participants are characterized by Cobb-Douglass production functions. It shown that even in the simplest case when the contract curve is linear the price and other attributes are interrelated. This relationship becomes more complex for non-linear contract curves. The paper shows that in these cases the auction does not maximize social welfare i.e. it is an inefficient mechanism. Furthermore even if the winning bid is an efficient solution a win-win solution which dominates this bid may be possible. The buyer needs to engage in multi-bilateral negotiations in order to seek joint-improvements. The purpose of the negotiation is to search for side-payments.,gregory kersten,Not available,2015.0,10.1007/978-3-319-19515-5_32,Outlooks and Insights on Group Decision and Negotiation,E.2015,False,,Springer,Not available,Procurement Auctions: Improving Efficient Winning Bids Through Multi-bilateral Negotiations,4ab508115086600416c957f397adc547,http://dx.doi.org/10.1007/978-3-319-19515-5_32 2446,In a classical result Milgrom (1981a) established that the Monotone Likelihood Ratio Property (MLRP) is a sufficient condition for the existence of an increasing symmetric equilibrium in (,aleksandar pekec,Not available,2006.0,10.1007/s10058-006-0005-0,Review of Economic Design,Ilia2006,False,,Springer,Not available,On the existence of an increasing symmetric equilibrium in (,2df89040ac9aa18f0cb3876119041d92,http://dx.doi.org/10.1007/s10058-006-0005-0 2447,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,c. andersson,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 2448,The Environmental risk management is an important component of governmental environmental policies. Alternative mechanisms for achieving cost-effective environmental risk reduction have been discussed in environmental economics. The paper presents a relatively new approach to environmental risk management – a model of negotiation between polluters and authorities under information asymmetry when also economic instruments are applied. A combinatory model that serves computing the first best solution was developed. The CRAB software (CombinatoRial Auction Body Software System) was used for this model. The computed first best solution was compared to the results of small economic laboratory experiments. Students played the role of the subjects in the experiments. The research concluded that under economic pressure in the form of known limitation of financial resources the experiment results are closer to minimal financial supports. Even in a one-round game a more cost-effective solution is achieved compared to experiments where such limitation was not introduced.,petr sauer,Not available,2013.0,10.1007/978-3-642-41151-9_37,Environmental Software Systems. Fostering Information Sharing,Petr2013,False,,Springer,Not available,Modelling of Environmental Risk Management under Information Asymmetry,978f935c455533655655a9811dbea39b,http://dx.doi.org/10.1007/978-3-642-41151-9_37 2449,The Environmental risk management is an important component of governmental environmental policies. Alternative mechanisms for achieving cost-effective environmental risk reduction have been discussed in environmental economics. The paper presents a relatively new approach to environmental risk management – a model of negotiation between polluters and authorities under information asymmetry when also economic instruments are applied. A combinatory model that serves computing the first best solution was developed. The CRAB software (CombinatoRial Auction Body Software System) was used for this model. The computed first best solution was compared to the results of small economic laboratory experiments. Students played the role of the subjects in the experiments. The research concluded that under economic pressure in the form of known limitation of financial resources the experiment results are closer to minimal financial supports. Even in a one-round game a more cost-effective solution is achieved compared to experiments where such limitation was not introduced.,petr fiala,Not available,2013.0,10.1007/978-3-642-41151-9_37,Environmental Software Systems. Fostering Information Sharing,Petr2013,False,,Springer,Not available,Modelling of Environmental Risk Management under Information Asymmetry,978f935c455533655655a9811dbea39b,http://dx.doi.org/10.1007/978-3-642-41151-9_37 2450,The Environmental risk management is an important component of governmental environmental policies. Alternative mechanisms for achieving cost-effective environmental risk reduction have been discussed in environmental economics. The paper presents a relatively new approach to environmental risk management – a model of negotiation between polluters and authorities under information asymmetry when also economic instruments are applied. A combinatory model that serves computing the first best solution was developed. The CRAB software (CombinatoRial Auction Body Software System) was used for this model. The computed first best solution was compared to the results of small economic laboratory experiments. Students played the role of the subjects in the experiments. The research concluded that under economic pressure in the form of known limitation of financial resources the experiment results are closer to minimal financial supports. Even in a one-round game a more cost-effective solution is achieved compared to experiments where such limitation was not introduced.,antonin dvorak,Not available,2013.0,10.1007/978-3-642-41151-9_37,Environmental Software Systems. Fostering Information Sharing,Petr2013,False,,Springer,Not available,Modelling of Environmental Risk Management under Information Asymmetry,978f935c455533655655a9811dbea39b,http://dx.doi.org/10.1007/978-3-642-41151-9_37 2451,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,preetinder kaur,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 2452,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,madhu goyal,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 2453,E-consumers face biggest challenge of opting for the best bidding strategies for competing in an environment of multiple and simultaneous online auctions for same or similar items. It becomes very complicated for the bidders to make decisions of selecting which auction to participate in place single or multiple bids early or late bidding and how much to bid. In this paper we present the design of an autonomous dynamic bidding agent (ADBA) that makes these decisions on behalf of the buyers according to their bidding behaviors. The agent develops a comprehensive method for initial price prediction and an integrated model for bid forecasting. The initial price prediction method selects an auction to participate in and then predicts its closing price (initial price). Then the bid forecasting model forecasts the bid amount by designing different bidding strategies followed by the late bidders. The experimental results demonstrated improved initial price prediction outcomes by proposing a clustering based approach. Also the results show the proficiency of the bidding strategies amongst the late bidders with desire for bargain.,jie lu,Not available,2013.0,10.1007/978-3-642-36288-0_16,Agents and Data Mining Interaction,Preetinder2013,False,,Springer,Not available,A Proficient and Dynamic Bidding Agent for Online Auctions,1eef61e99ef59f1c7b5a9512f934cdd5,http://dx.doi.org/10.1007/978-3-642-36288-0_16 2454,The entry reviews essential elements of market structure – the systems procedures and protocols that determine how orders are handled translated into trades and transaction prices determined. There are various contrasting alternatives such as order-driven and quote-driven markets; consolidated vs fragmented markets; human intervention vs electronic trading; and continuous markets vs periodic call auctions. A major objective of market design noted in the discussion is to enhance the accuracy with which prices are discovered in a dynamic uncertain environment. Lastly the entry points out that market structures are rapidly changing and that much remains to be learned about how best to structure a technologically sophisticated hybrid market that efficiently services the varied needs of diverse participants.,robert schwartz,Not available,2013.0,10.1007/978-1-4614-5360-4_39,Encyclopedia of Finance,A.2013,False,,Springer,Not available,Structure of Securities Markets,ec173356552979b86aad344ba1116f21,http://dx.doi.org/10.1007/978-1-4614-5360-4_39 2455,The entry reviews essential elements of market structure – the systems procedures and protocols that determine how orders are handled translated into trades and transaction prices determined. There are various contrasting alternatives such as order-driven and quote-driven markets; consolidated vs fragmented markets; human intervention vs electronic trading; and continuous markets vs periodic call auctions. A major objective of market design noted in the discussion is to enhance the accuracy with which prices are discovered in a dynamic uncertain environment. Lastly the entry points out that market structures are rapidly changing and that much remains to be learned about how best to structure a technologically sophisticated hybrid market that efficiently services the varied needs of diverse participants.,lin peng,Not available,2013.0,10.1007/978-1-4614-5360-4_39,Encyclopedia of Finance,A.2013,False,,Springer,Not available,Structure of Securities Markets,ec173356552979b86aad344ba1116f21,http://dx.doi.org/10.1007/978-1-4614-5360-4_39 2456,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,tobias scheffel,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 2457,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,georg ziegler,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 2458,This paper analyzes the problem of selecting a set of items whose prices are to be updated in the next iteration in so called simple ascending auctions with unit-demand bidders. A family of sets called “sets in excess demand” is introduced and the main result demonstrates that a simple ascending auction always terminates at the minimum Walrasian equilibrium prices if and only if the selection belongs to this family.,a. talman,Not available,2013.0,10.1007/s10479-013-1344-1,Annals of Operations Research,T.2013,False,,Springer,Not available,Sets in excess demand in simple ascending auctions with unit-demand bidders,59020ae386473238ed997399b979e1af,http://dx.doi.org/10.1007/s10479-013-1344-1 2459,Combinatorial auctions have been studied analytically for several years but only limited experimental results are available for auctions with more than 10 items. We investigate the Hierarchical Package Bidding auction (HPB) the Combinatorial Clock auction (CC) and one pseudo-dual price auction (PDP) experimentally as all these formats were used or suggested for high-stakes spectrum auctions. We want to understand the impact that different auction formats have on bidder behavior and allocative efficiency. Interestingly we find that the main source of inefficiency in all formats is the bidders’ preselection of packages rather than their strategies or auction rules; bidders mostly preselect a small number of packages of interest early in the auction. CC achieves high efficiency and revenue in all experiments but HPB yields similar results even in value models where hierarchical pre-packaging is difficult. Due to their influence on the decision of the US Federal Communications Commission we intentionally repeated a set of experiments conducted by Goeree and Holt (GH) [Games and Economic Behavior 70:146–169 ,martin bichler,Not available,2012.0,10.1007/s10683-012-9321-0,Experimental Economics,Tobias2012,False,,Springer,Not available,On the impact of package selection in combinatorial auctions: an experimental study in the context of spectrum auction design,d6c3428e17ea04d111a90be16863fcaf,http://dx.doi.org/10.1007/s10683-012-9321-0 2460,We determine the conditions under which the seller in a first-price sealed-bid auction has an incentive to reveal his private information about the mean of bidders’ valuations in order to increase his expected revenue. With risk-neutral bidders we show that the seller’s expected revenue is higher when information is revealed. However when bidders are risk-averse this result does not necessarily hold; it depends on the bidders’ risk-aversion level and on the number of bidders.,francois marechal,Not available,2012.0,10.1007/s10058-012-0115-9,Review of Economic Design,François2012,False,,Springer,Not available,The public release of information in first-price sealed-bid auctions,5c885b02c6d71e64e800db26683c1e0a,http://dx.doi.org/10.1007/s10058-012-0115-9 2461,We determine the conditions under which the seller in a first-price sealed-bid auction has an incentive to reveal his private information about the mean of bidders’ valuations in order to increase his expected revenue. With risk-neutral bidders we show that the seller’s expected revenue is higher when information is revealed. However when bidders are risk-averse this result does not necessarily hold; it depends on the bidders’ risk-aversion level and on the number of bidders.,pierre-henri morand,Not available,2012.0,10.1007/s10058-012-0115-9,Review of Economic Design,François2012,False,,Springer,Not available,The public release of information in first-price sealed-bid auctions,5c885b02c6d71e64e800db26683c1e0a,http://dx.doi.org/10.1007/s10058-012-0115-9 2462,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,alok gupta,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 2463,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,stephen parente,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 2464,Healthcare is an important social and economic component of modern society and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly government agencies. In this paper we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year i.e. 1999 they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge and data from the auctions we point out several shortcomings of the auction design that we believe led to the discontinuation of the market after three years. Based on our analysis we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.,pallab sanyal,Not available,2012.0,10.1007/s10754-012-9118-x,International Journal of Health Care Finance and Economics,Alok2012,False,,Springer,Not available,Competitive bidding for health insurance contracts: lessons from the online HMO auctions,6521a2b243df5d9eb512602f62f6245f,http://dx.doi.org/10.1007/s10754-012-9118-x 2465,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,evan kwerel,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 2466,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,paul lafontaine,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 2467,The past year in economics at the Federal Communications Commission covered a broad range of topics in telecommunications policy. This paper highlights the economic issues that are addressed in the following key areas: spectrum management universal service and intercarrier compensation reform and merger review. In spectrum management the FCC received congressional authority to implement an “incentive auction” to repurpose television broadcasting spectrum into flexible-use licenses that will be suitable for mobile wireless service providers. We discuss some important issues in designing the auction. We next address some aspects of the FCC’s comprehensive reforms of intercarrier compensation which mainly involves call termination rates and of universal service. Finally we discuss the economic analysis of two major mergers: AT&T-T-Mobile which the FCC staff recommended should be referred to an administrative hearing and Level 3/Global Crossing which was cleared with no conditions.,marius schwartz,Not available,2012.0,10.1007/s11151-012-9362-8,Review of Industrial Organization,Evan2012,False,,Springer,Not available,Economics at the FCC 2011–2012: Spectrum Incentive Auctions Universal Service and Intercarrier Compensation Reform and Mergers,c1b5ab40efdbd5faaa5c0e46cb0e61f5,http://dx.doi.org/10.1007/s11151-012-9362-8 2468,Cognitive networks are designed based on the concept of dynamic and intelligent network management characterizing the feature of self-sensing self-configuration self-learning self-consciousness etc. In this paper focusing on the spectrum sharing and competition we propose a novel OODA (Orient-Observe-Decide-Act) based behavior modeling methodology to illustrate spectrum access problem in the heterogenous cognitive network which consists of multiple primary networks (PN i.e. licensed networks) and multiple secondary networks (SN i.e. unlicensed networks). Two different utility functions are designed for primary users and secondary users respectively based on marketing mechanism to formulate the ,yinglei teng,Not available,2012.0,10.1007/s11276-012-0443-2,Wireless Networks,Yinglei2012,False,,Springer,Not available,Behavior modeling for spectrum sharing in wireless cognitive networks,91b77647eb9f7171133c93ad645f85f7,http://dx.doi.org/10.1007/s11276-012-0443-2 2469,We study a keyword auction model where bidders have constrained budgets. In the absence of budget constraints Edelman et al. (Am Econ Rev 97(1):242–259 ,youngwoo koh,Not available,2013.0,10.1007/s10058-013-0147-9,Review of Economic Design,Youngwoo2013,False,,Springer,Not available,Keyword auctions with budget-constrained bidders,88f99aa310a10b05c8d52ecf3057b1d2,http://dx.doi.org/10.1007/s10058-013-0147-9 2470,Cognitive networks are designed based on the concept of dynamic and intelligent network management characterizing the feature of self-sensing self-configuration self-learning self-consciousness etc. In this paper focusing on the spectrum sharing and competition we propose a novel OODA (Orient-Observe-Decide-Act) based behavior modeling methodology to illustrate spectrum access problem in the heterogenous cognitive network which consists of multiple primary networks (PN i.e. licensed networks) and multiple secondary networks (SN i.e. unlicensed networks). Two different utility functions are designed for primary users and secondary users respectively based on marketing mechanism to formulate the ,f. yu,Not available,2012.0,10.1007/s11276-012-0443-2,Wireless Networks,Yinglei2012,False,,Springer,Not available,Behavior modeling for spectrum sharing in wireless cognitive networks,91b77647eb9f7171133c93ad645f85f7,http://dx.doi.org/10.1007/s11276-012-0443-2 2471,Cognitive networks are designed based on the concept of dynamic and intelligent network management characterizing the feature of self-sensing self-configuration self-learning self-consciousness etc. In this paper focusing on the spectrum sharing and competition we propose a novel OODA (Orient-Observe-Decide-Act) based behavior modeling methodology to illustrate spectrum access problem in the heterogenous cognitive network which consists of multiple primary networks (PN i.e. licensed networks) and multiple secondary networks (SN i.e. unlicensed networks). Two different utility functions are designed for primary users and secondary users respectively based on marketing mechanism to formulate the ,yifei wei,Not available,2012.0,10.1007/s11276-012-0443-2,Wireless Networks,Yinglei2012,False,,Springer,Not available,Behavior modeling for spectrum sharing in wireless cognitive networks,91b77647eb9f7171133c93ad645f85f7,http://dx.doi.org/10.1007/s11276-012-0443-2 2472,Cognitive networks are designed based on the concept of dynamic and intelligent network management characterizing the feature of self-sensing self-configuration self-learning self-consciousness etc. In this paper focusing on the spectrum sharing and competition we propose a novel OODA (Orient-Observe-Decide-Act) based behavior modeling methodology to illustrate spectrum access problem in the heterogenous cognitive network which consists of multiple primary networks (PN i.e. licensed networks) and multiple secondary networks (SN i.e. unlicensed networks). Two different utility functions are designed for primary users and secondary users respectively based on marketing mechanism to formulate the ,li wang,Not available,2012.0,10.1007/s11276-012-0443-2,Wireless Networks,Yinglei2012,False,,Springer,Not available,Behavior modeling for spectrum sharing in wireless cognitive networks,91b77647eb9f7171133c93ad645f85f7,http://dx.doi.org/10.1007/s11276-012-0443-2 2473,Cognitive networks are designed based on the concept of dynamic and intelligent network management characterizing the feature of self-sensing self-configuration self-learning self-consciousness etc. In this paper focusing on the spectrum sharing and competition we propose a novel OODA (Orient-Observe-Decide-Act) based behavior modeling methodology to illustrate spectrum access problem in the heterogenous cognitive network which consists of multiple primary networks (PN i.e. licensed networks) and multiple secondary networks (SN i.e. unlicensed networks). Two different utility functions are designed for primary users and secondary users respectively based on marketing mechanism to formulate the ,yong zhang,Not available,2012.0,10.1007/s11276-012-0443-2,Wireless Networks,Yinglei2012,False,,Springer,Not available,Behavior modeling for spectrum sharing in wireless cognitive networks,91b77647eb9f7171133c93ad645f85f7,http://dx.doi.org/10.1007/s11276-012-0443-2 2474,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,tianyu wang,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2475,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,rongqing zhang,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2476,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,lingyang song,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2477,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,zhu han,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2478,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,haopeng li,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2479,In this paper we consider a multiuser multi-antenna two-way relay system in which multiple pairs of partners communicate via a single relay node. The total transmit power of the relay node is shared by all pairs of partners. In order to allocate the limited power with both efficiency and fairness we introduce a sequential second price auction as a mechanism to achieve such goals. First we provide the system model and formulate the channel capacity of each pair. Then we construct an algorithm which leads to the equilibrium of a sequential second price auction with full information assumption and sophisticated bidding strategy. The equilibrium result is used for allocating the relay power among pairs of partners. Finally we provide the simulation results considering both randomness of user locations and time-varying nature of wireless channels which show that the proposed algorithm has a good performance in total channel capacity system efficiency and fairness.,bingli jiao,Not available,2012.0,10.1007/s11277-012-0802-4,Wireless Personal Communications,Tianyu2012,False,,Springer,Not available,Power Allocation for Two-Way Relay System Based on Sequential Second Price Auction,d8578d197c99c6404da389610680c2d1,http://dx.doi.org/10.1007/s11277-012-0802-4 2480,The present paper proposes a theoretical model of the equilibrium bidding behavior in simultaneous competing private-value Internet auctions such as those on eBay. It shows that last-minute bidding and multiple bidding two commonly observed bidding strategies arise in equilibrium. It also suggests that last-minute bidding may lead to inefficient outcomes.,marta stryszowska,Not available,2013.0,10.1007/s10058-013-0142-1,Review of Economic Design,Marta2013,False,,Springer,Not available,Multiple and last-minute bidding in competing internet auctions,2c20844d1feb2d0db75e52fd96a43e14,http://dx.doi.org/10.1007/s10058-013-0142-1 2481,Budget optimization (selecting an optimal set of keywords to bid for given a limited amount of budget) and bid optimization (determining optimal bids for the selected keywords) in the face of an unpredictable keyword traffic is a challenging problem facing advertisers in sponsored search auctions. Another key requirement in sponsored search auctions is stability of the bid profile which is usually characterized through the notion of locally envy-free equilibrium. A variety of budget optimization and bid optimization ideas have been proposed in the literature; the bid profiles suggested by them have varying stability properties. In this paper our objective is to come up with a bidding strategy for advertisers that is optimal for the budget optimization as well as the bid optimization problems and also guarantees convergence to a locally envy-free equilibrium. Our approach works with a linear program for the budget optimization problem whose optimal solution is a greedy strategy which we call the OPT strategy. The OPT strategy yields a bid profile that maximizes the return on investment for the advertisers and ensures convergence of the bid profiles to a locally envy-free equilibrium in the asynchronous case as well as in a restricted synchronous case. We also suggest an improved strategy called the MAX strategy which produces equal or higher advertiser utilities compared to the OPT strategy while enjoying identical equilibrium convergence properties as OPT.,nittala chaitanya,Not available,2012.0,10.1007/s12351-010-0097-8,Operational Research,Nittala2012,False,,Springer,Not available,Optimal equilibrium bidding strategies for budget constrained bidders in sponsored search auctions,28aa9aff83533be72e1c341c200c6c06,http://dx.doi.org/10.1007/s12351-010-0097-8 2482,Budget optimization (selecting an optimal set of keywords to bid for given a limited amount of budget) and bid optimization (determining optimal bids for the selected keywords) in the face of an unpredictable keyword traffic is a challenging problem facing advertisers in sponsored search auctions. Another key requirement in sponsored search auctions is stability of the bid profile which is usually characterized through the notion of locally envy-free equilibrium. A variety of budget optimization and bid optimization ideas have been proposed in the literature; the bid profiles suggested by them have varying stability properties. In this paper our objective is to come up with a bidding strategy for advertisers that is optimal for the budget optimization as well as the bid optimization problems and also guarantees convergence to a locally envy-free equilibrium. Our approach works with a linear program for the budget optimization problem whose optimal solution is a greedy strategy which we call the OPT strategy. The OPT strategy yields a bid profile that maximizes the return on investment for the advertisers and ensures convergence of the bid profiles to a locally envy-free equilibrium in the asynchronous case as well as in a restricted synchronous case. We also suggest an improved strategy called the MAX strategy which produces equal or higher advertiser utilities compared to the OPT strategy while enjoying identical equilibrium convergence properties as OPT.,yadati narahari,Not available,2012.0,10.1007/s12351-010-0097-8,Operational Research,Nittala2012,False,,Springer,Not available,Optimal equilibrium bidding strategies for budget constrained bidders in sponsored search auctions,28aa9aff83533be72e1c341c200c6c06,http://dx.doi.org/10.1007/s12351-010-0097-8 2483,We analyse procurement auctions in which sellers are distinguished on the basis of the ratios of quality per unit of money that they offer. Sellers are privately informed on the offered quality of the technology or good. We assume that the procurer cannot perfectly identify the best offer. Thus with positive and decreasing probability the second third etc. best ratio offered is selected as the winner of the auction. We model this decision process as based on a general noisy ranking of offers. We show that although the problem seems to be analytically intractable in general there exists a simple symmetric pure-strategy equilibrium in which everyone follows the simple heuristic to match the same ‘focal’ price–quality ratio.,thomas giebe,Not available,2015.0,10.1007/s10058-014-0161-6,Review of Economic Design,Thomas2015,False,,Springer,Not available,Probabilistic procurement auctions,11fa9bb609cb432b35bf5740cd024510,http://dx.doi.org/10.1007/s10058-014-0161-6 2484,We analyse procurement auctions in which sellers are distinguished on the basis of the ratios of quality per unit of money that they offer. Sellers are privately informed on the offered quality of the technology or good. We assume that the procurer cannot perfectly identify the best offer. Thus with positive and decreasing probability the second third etc. best ratio offered is selected as the winner of the auction. We model this decision process as based on a general noisy ranking of offers. We show that although the problem seems to be analytically intractable in general there exists a simple symmetric pure-strategy equilibrium in which everyone follows the simple heuristic to match the same ‘focal’ price–quality ratio.,paul schweinzer,Not available,2015.0,10.1007/s10058-014-0161-6,Review of Economic Design,Thomas2015,False,,Springer,Not available,Probabilistic procurement auctions,11fa9bb609cb432b35bf5740cd024510,http://dx.doi.org/10.1007/s10058-014-0161-6 2485,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,tao jing,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 2486,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,fan zhang,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 2487,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,wei cheng,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 2488,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,yan huo,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 2489,Cognitive radio and cooperative communication are two new network technologies. So the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second there is not an effective relay selection policy. In this paper we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes.,xiuzhen cheng,Not available,2015.0,10.1186/s13638-015-0258-9,EURASIP Journal on Wireless Communications and Networking,Tao2015,True,,Springer,Not available,Online auction-based relay selection for cooperative communication in CR networks,c0fd6546a9177a547bdc97068b6cb829,http://dx.doi.org/10.1186/s13638-015-0258-9 2490,In almost common value auctions even a small private payoff advantage is usually supposed to have an explosive effect on the outcomes in a second-price sealed-bid common value auction. According to (Bikhchandani in J. Econ. Theory 46:97–119 ,gisele umbhauer,Not available,2015.0,10.1007/s10479-013-1377-5,Annals of Operations Research,Gisèle2015,False,,Springer,Not available,Almost common value auctions and discontinuous equilibria,57f21ed6694698d409679c7a74f719c0,http://dx.doi.org/10.1007/s10479-013-1377-5 2491,This paper reports findings of two field studies conducted on a local online auction website that compare bidding strategies in charity and non-charity auctions focusing on the extent of jump bidding at different stages of auctions. Results indicate that jump bidding is negatively correlated with bidder entry and positively associated with ending prices. These correlations are greatest during the beginning stage of auctions and are substantially larger for charity auctions than for non-charity auctions. Additionally early-stage jump bidding occurred more often in charity auctions (consistent with bidders trying to drive up prices in charity auctions) ending-stage jump bidding was more frequent in non-charity auctions (possibly used strategically to win the auction). Further frivolous products tended to sell at a higher proportion of retail value in charity auctions providing a replication of the results of previous researchers but in a field setting.,yongfu he,Not available,2013.0,10.1007/s11002-013-9228-3,Marketing Letters,Yongfu2013,False,,Springer,Not available,The impact of jump bidding in online auctions,1a0ea2db59c537a92d6cbee25c14123b,http://dx.doi.org/10.1007/s11002-013-9228-3 2492,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,wei zhou,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 2493,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,tao jing,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 2494,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,yan huo,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 2495,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,xiaoshuang xing,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 2496,With the rapid growth of wireless devices and applications limited spectrum resource has become the bottleneck of network development. Cognitive radio has emerged as a promising approach to address spectrum scarcity by opening the access of idle licensed spectrum owned by Primary Users (PUs) to unlicensed users i.e. Secondary Users (SUs). This process involves two significant challenges: how to encourage PUs to open the access of licensed spectrum and how to assign the bandwidth among SUs. Additionally the amount of residual bandwidth of a PU is always limited and an SU’s bandwidth demand is always lower-bounded according to Quality of Service (QoS) requirements. Therefore it is essential to assign the bandwidth on the basis of bandwidth limitation and QoS requirement. In this paper we propose an iterative auction scheme in which PUs and SUs form a market and trade the bandwidth to jointly address the problems above. We incorporate the price scheduling process into our auction design. The simulation results verifies the convergence and efficiency of our auction scheme.,jin qian,Not available,2015.0,10.1007/s11277-014-2108-1,Wireless Personal Communications,Wei2015,False,,Springer,Not available,Iterative Auction Based Bandwidth Assignment in CRNs with QoS Provisioning,9a0f854e1c82ced368b7269d607f20d4,http://dx.doi.org/10.1007/s11277-014-2108-1 2497,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,wenchuan liu,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 2498,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,yu zhang,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 2499,We propose an econometric model of the price processes of online auctions. Since auction bids monotonically increase within individual auctions but can differ considerably across auctions we construct a monotone series estimator with a common relative price growth curve and auction-specific slopes. Furthermore because the impacts of auction-specific attributes may evolve along the course of auctions we employ a varying coefficient approach to accommodate these possibly time-varying effects. We present an algorithm to solve the proposed partially linear panel model with a nonparametric monotone component. We apply the proposed model to eBay auctions of a Palm personal digital assistant. The estimates capture closely the overall pattern of online auction price processes in particular the bidding drought midway through auctions and the bid acceleration associated with bid sniping (last-minute bidding) at the end of auctions.,qi li,Not available,2015.0,10.1007/s00181-014-0857-z,Empirical Economics,Wenchuan2015,False,,Springer,Not available,A semiparametric varying coefficient model of monotone auction bidding processes,c3eaa0cb9ce78bc5bae5d0df6bacebc4,http://dx.doi.org/10.1007/s00181-014-0857-z 2500,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,estrella alonso,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 2501,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,joaquin sanchez-soriano,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 2502,This paper reports findings of two field studies conducted on a local online auction website that compare bidding strategies in charity and non-charity auctions focusing on the extent of jump bidding at different stages of auctions. Results indicate that jump bidding is negatively correlated with bidder entry and positively associated with ending prices. These correlations are greatest during the beginning stage of auctions and are substantially larger for charity auctions than for non-charity auctions. Additionally early-stage jump bidding occurred more often in charity auctions (consistent with bidders trying to drive up prices in charity auctions) ending-stage jump bidding was more frequent in non-charity auctions (possibly used strategically to win the auction). Further frivolous products tended to sell at a higher proportion of retail value in charity auctions providing a replication of the results of previous researchers but in a field setting.,leszczyc popkowski,Not available,2013.0,10.1007/s11002-013-9228-3,Marketing Letters,Yongfu2013,False,,Springer,Not available,The impact of jump bidding in online auctions,1a0ea2db59c537a92d6cbee25c14123b,http://dx.doi.org/10.1007/s11002-013-9228-3 2503,This paper deals with simultaneous auctions of two commonly ranked objects following the model studied in Menezes and Monteiro (J. Real Estate Finance Econ. 17(3):219–232 ,juan tejada,Not available,2015.0,10.1007/s10479-012-1297-9,Annals of Operations Research,Estrella2015,False,,Springer,Not available,A parametric family of two ranked objects auctions: equilibria and associated risk,3cbf067aa4a4618118a62c54c38ce6e4,http://dx.doi.org/10.1007/s10479-012-1297-9 2504,The classic example of common value is represented by oil fields which are auctioned to private oil companies. One of the famous cases is that of the Chinese oil company Natural Petroleum Corporation which had to pay an exorbitant price at the auction of oil drilling rights held by Venezuela in 1997. This is the background.,gregor berz,Not available,2015.0,10.1057/9781137475428_7,Game Theory Bargaining and Auction Strategies,Gregor2015,False,,Springer,Not available,Winner’s Curse in an Auction,7b79cdd0375840514a5a7342de5543cb,http://dx.doi.org/10.1057/9781137475428_7 2505,Why did the company for awarding the cafeteria construction project,gregor berz,Not available,2015.0,10.1057/9781137475428_8,Game Theory Bargaining and Auction Strategies,Gregor2015,False,,Springer,Not available,Selection of an Auction Form,426cf2c32c453ea3b583d31292df5e25,http://dx.doi.org/10.1057/9781137475428_8 2506,An ,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_1,Understanding Auctions,Asunción2015,False,,Springer,Not available,Auction Basics,eb190906b9e946ca670562b7473320d9,http://dx.doi.org/10.1007/978-3-319-08813-6_1 2507,An ,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_1,Understanding Auctions,Asunción2015,False,,Springer,Not available,Auction Basics,eb190906b9e946ca670562b7473320d9,http://dx.doi.org/10.1007/978-3-319-08813-6_1 2508,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,miguel mediavilla,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 2509,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,carolina bernardos,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 2510,The purchasing function is assuming an increasingly relevant role within companies in the last decades taking over the main responsibility for the costs of goods purchased as well as for supplier management. Its relevancy is due to the fact that purchasing can contribute to develop competitive advantages by aligning its strategy to the business strategy. Purchasing strategy is usually deployed per (purchasing) category and operationally executed in the so called tactical purchasing process. One key step is the negotiation/bidding where there is a lack of empirical research regarding the application of game theory. This paper contributes by discussing how game theory can be systematically utilised for designing negotiations (i.e. games) and getting more efficient results –by presenting an empirical study on automotive sector company specifically on a bidding process for constructing a new production facility in Mexico.,sandra martinez,Not available,2015.0,10.1007/978-3-319-22759-7_23,Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth,Miguel2015,False,,Springer,Not available,Game Theory and Purchasing Management: An Empirical Study of Auctioning in the Automotive Sector,3c8ef19b90712b1de7f4121f62146840,http://dx.doi.org/10.1007/978-3-319-22759-7_23 2511,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,isabelle perrigne,Not available,2018.0,10.1057/978-1-349-95189-5_2762,The New Palgrave Dictionary of Economics,Isabelle2018,False,,Springer,Not available,Auctions (Empirics),a328fab950e722ea95f1be53fd736b36,http://dx.doi.org/10.1057/978-1-349-95189-5_2762 2512,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,quang vuong,Not available,2018.0,10.1057/978-1-349-95189-5_2762,The New Palgrave Dictionary of Economics,Isabelle2018,False,,Springer,Not available,Auctions (Empirics),a328fab950e722ea95f1be53fd736b36,http://dx.doi.org/10.1057/978-1-349-95189-5_2762 2513,We study a non-symmetric variant of General Lotto games introduced in Hart (Int J Game Theory 36:441–460 ,marcin dziubinski,Not available,2013.0,10.1007/s00182-012-0324-z,International Journal of Game Theory,Marcin2013,True,,Springer,Not available,Non-symmetric discrete General Lotto games,3dfe63a70c5862c8ee54cbb0976891e8,http://dx.doi.org/10.1007/s00182-012-0324-z 2514,Herodotus reports the use of auctions as early as 500 BC in Babylon (see Cassady 1967 pp. 26–40 for references to this and the following historical notes). The Romans made extensive use of auctions in commerce and the Roman emperors Caligula and Aurelius auctioned royal furniture and heirlooms to pay debts. Roman military expeditions were accompanied by traders who bid for the spoils of war auctioned ,vernon smith,Not available,2018.0,10.1057/978-1-349-95189-5_616,The New Palgrave Dictionary of Economics,L.2018,False,,Springer,Not available,Auctions,6f8a40503b28281ba3bc552170f114ff,http://dx.doi.org/10.1057/978-1-349-95189-5_616 2515,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,junhuan zhang,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 2516,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,peter mcburney,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 2517,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,katarzyna musial,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 2518,We survey some recent empirical work concerning the analysis of auctions. We begin by describing a two-step nonparametric approach for estimating bidding models that is commonly used in the applied literature. Two applications of this approach are considered: empirical work on bidding in Treasury markets and empirical tests for collusion in auctions.,patrick bajari,Not available,2018.0,10.1057/978-1-349-95189-5_2166,The New Palgrave Dictionary of Economics,Patrick2018,False,,Springer,Not available,Auctions (Applications),d2cc2c4e7dcf9a280186099e4716b4b7,http://dx.doi.org/10.1057/978-1-349-95189-5_2166 2519,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,xinfeng zhu,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 2520,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,zhihao zhang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 2521,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,yanling wang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 2522,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,guohai wang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 2523,Do hard budget constraints work in favour or against truth telling in double auctions? McAfee (,nejat anbarci,Not available,2018.0,10.1007/s11238-017-9627-7,Theory and Decision,Nejat2018,False,,Springer,Not available,Double auctions with no-loss constrained traders,1deb9de511c38f3ba71257c140a40f07,http://dx.doi.org/10.1007/s11238-017-9627-7 2524,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,isabel amigo,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 2525,Do hard budget constraints work in favour or against truth telling in double auctions? McAfee (,jaideep roy,Not available,2018.0,10.1007/s11238-017-9627-7,Theory and Decision,Nejat2018,False,,Springer,Not available,Double auctions with no-loss constrained traders,1deb9de511c38f3ba71257c140a40f07,http://dx.doi.org/10.1007/s11238-017-9627-7 2526,,yanjiao chen,Not available,2018.0,10.1007/978-3-319-32903-1_27-1,Encyclopedia of Wireless Networks,Yanjiao2018,False,,Springer,Not available,Auction,fa1550b684ea5a8bd95a6028d7afa191,http://dx.doi.org/10.1007/978-3-319-32903-1_27-1 2527,,qian zhang,Not available,2018.0,10.1007/978-3-319-32903-1_27-1,Encyclopedia of Wireless Networks,Yanjiao2018,False,,Springer,Not available,Auction,fa1550b684ea5a8bd95a6028d7afa191,http://dx.doi.org/10.1007/978-3-319-32903-1_27-1 2528,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,cagil kocyigit,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 2529,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,halil bayrak,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 2530,It is commonly assumed in the optimal auction design literature that valuations of buyers are independently drawn from a unique distribution. In this paper we study auctions under ambiguity that is in an environment where valuation distribution is uncertain itself and present a linear programming approach to robust auction design problem with a discrete type space. We develop an algorithm that gives the optimal solution to the problem under certain assumptions when the seller is ambiguity averse with a finite prior set ,mustafa pinar,Not available,2018.0,10.1007/s10479-017-2416-4,Annals of Operations Research,Çağıl2018,False,,Springer,Not available,Robust auction design under multiple priors by linear and integer programming,3632f6be716f54980180499e3271342a,http://dx.doi.org/10.1007/s10479-017-2416-4 2531,,martin pesendorfer,Not available,2018.0,10.1007/978-3-642-27737-5_669-1,Encyclopedia of Complexity and Systems Science,Martin2018,False,,Springer,Not available,Auctions,30ce0bc40f6e1e784191970073c319cf,http://dx.doi.org/10.1007/978-3-642-27737-5_669-1 2532," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",jose arauzo,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 2533," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",felix villafanez,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 2534," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",david garcia,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 2535,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,pablo belzarena,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 2536," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",javier pajares,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 2537," Airport slot allocation is a combinatorial allocation problem involving different complex and autonomous systems. Nowadays airport slots are allocated in a two-stage process: primary allocation is performed according to a set of administrative rules and for each airport independently while secondary allocation is based on trading mechanisms. Several studies have raised inefficiencies in these processes. To enhance the airport slot allocation process we use an auction-based market. More specifically we present an airport slot allocation mechanism based on a price-setting auction that has been implemented and evaluated by means of Agent-Based Modelling (ABM) and simulation techniques. The solutions obtained using our approach are compared and assessed with the ones obtained using linear programing showing that market mechanisms can be an efficient alternative to the current administrative procedure. ",juan pavon,Not available,2018.0,10.1007/978-3-319-94779-2_39,Highlights of Practical Applications of Agents Multi-Agent Systems and Complexity: The PAAMS Collection,Alberto2018,False,,Springer,Not available,Agent Based Modelling and Simulation of an Auction Market for Airport Slots Allocation,d3eac106acb607389d93647a2ce3aadc,http://dx.doi.org/10.1007/978-3-319-94779-2_39 2538,This paper studies the evolutionary stability of the unique Nash equilibrium of a first price sealed bid auction. It is shown that the Nash equilibrium is not asymptotically stable under payoff monotonic dynamics for arbitrary initial populations. In contrast for some classes of bid functions when the initial population includes a continuum of strategies around the equilibrium the replicator dynamic does converge to the Nash equilibrium. Simulations are presented for the replicator and Brown–von Neumann–Nash (BNN) dynamics. They suggest that the convergence for the replicator dynamic is slow compared to that for the BNN dynamic.,fernando louge,Not available,2012.0,10.1007/s13235-011-0034-3,Dynamic Games and Applications,Fernando2012,False,,Springer,Not available,Evolutionary Stability in First Price Auctions,83ff02d34c967ac4b68dce195b53f3c8,http://dx.doi.org/10.1007/s13235-011-0034-3 2539,This paper studies the evolutionary stability of the unique Nash equilibrium of a first price sealed bid auction. It is shown that the Nash equilibrium is not asymptotically stable under payoff monotonic dynamics for arbitrary initial populations. In contrast for some classes of bid functions when the initial population includes a continuum of strategies around the equilibrium the replicator dynamic does converge to the Nash equilibrium. Simulations are presented for the replicator and Brown–von Neumann–Nash (BNN) dynamics. They suggest that the convergence for the replicator dynamic is slow compared to that for the BNN dynamic.,frank riedel,Not available,2012.0,10.1007/s13235-011-0034-3,Dynamic Games and Applications,Fernando2012,False,,Springer,Not available,Evolutionary Stability in First Price Auctions,83ff02d34c967ac4b68dce195b53f3c8,http://dx.doi.org/10.1007/s13235-011-0034-3 2540,Simulating a real world environment is of utmost importance for achieving accurate and meaningful results in experimental economics. Offering monetary incentives is a common method of creating this environment. In general experimenters provide the rewards at the time of experiment. In this paper we argue that receiving the reward at the time of the experiment may lead participants to make decisions as if the money they are using were not their own. To solve this problem we devised a “prepaid mechanism” that encourages participants to use the money as if it were their own.,mosi rosenboim,Not available,2012.0,10.1007/s10683-011-9294-4,Experimental Economics,Mosi2012,False,,Springer,Not available,Whose money is it anyway? Using prepaid incentives in experimental economics to create a natural environment,b6468ea435af88cfd181926e2fc0e2f3,http://dx.doi.org/10.1007/s10683-011-9294-4 2541,Simulating a real world environment is of utmost importance for achieving accurate and meaningful results in experimental economics. Offering monetary incentives is a common method of creating this environment. In general experimenters provide the rewards at the time of experiment. In this paper we argue that receiving the reward at the time of the experiment may lead participants to make decisions as if the money they are using were not their own. To solve this problem we devised a “prepaid mechanism” that encourages participants to use the money as if it were their own.,tal shavit,Not available,2012.0,10.1007/s10683-011-9294-4,Experimental Economics,Mosi2012,False,,Springer,Not available,Whose money is it anyway? Using prepaid incentives in experimental economics to create a natural environment,b6468ea435af88cfd181926e2fc0e2f3,http://dx.doi.org/10.1007/s10683-011-9294-4 2542,This study investigates whether market composition affects individual bidding and the aggregate market in first-price sealed-bid common-value auctions. It compares all-inexperienced markets with only inexperienced bidders all-experienced markets with only experienced bidders and mixed markets with both types. On average there is no market-composition effect for both experienced and inexperienced bidders. When controlling for gender a market-composition effect appears for inexperienced subjects: Men bid more aggressively in mixed than in all-inexperienced markets and women bid more aggressively in all-inexperienced markets. On the aggregate level the all-inexperienced market is the most aggressive with highest winning bids; the all-experienced market is the least aggressive. The mixed market is in between: Both experienced and inexperienced win auctions in this market but experienced bidders win less auctions than they should.,johanna goertz,Not available,2012.0,10.1007/s10683-011-9291-7,Experimental Economics,M.2012,False,,Springer,Not available,Market composition and experience in common-value auctions,be777d631e8a1a7eb09aed9bbe132fd0,http://dx.doi.org/10.1007/s10683-011-9291-7 2543,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,rodney garratt,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 2544,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,mark walker,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 2545,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,john wooders,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 2546,Providing Assured-Quality Services over data networks has been a key objective for the past few decades. Research and commercial activities have been focused on several aspects related to this main objective such as implementing services over heterogeneous networks providing scalable solutions and verifying network performance. However less attention has been devoted to the interaction of these technical aspects with the business plane. Although several quality-based pricing schemes have been proposed reimbursement proposals while quite common in other scenarios as health hotel reservation or airlines are still rare in the field of Internet Economics. In this work we propose a simple pricing scheme and study it in detail in order to use Quality of Service monitoring information as feedback to the business plane with the ultimate objective of improving the seller’s revenue. In our framework Assured-Quality Services are sold through first-price auctions and in case of failure a percentage of the price paid for the service is given back to the buyers. We derive the expression for the willingness to pay and we model the reimbursement problem through a zero-sum Stackelberg game. We show that the Nash equilibrium of such game implies reimbursing 100 % in case of failures.,sandrine vaton,Not available,2013.0,10.1007/s11066-013-9078-4,NETNOMICS: Economic Research and Electronic Networking,Isabel2013,False,,Springer,Not available,A pricing scheme for QoS in overlay networks based on first-price auctions and reimbursement,0e9d882602c0537ec1684f5b2a166cbe,http://dx.doi.org/10.1007/s11066-013-9078-4 2547,A major challenge in agent-based modelling is the management of the process to generate executable simulations from the initial conceptual models. This process is complex and usually involves several roles which may raise communication problems due to the diverse backgrounds and perspectives of participants and the use of non-explicit knowledge. This situation demands a clear separation and precise definition of the multiple aspects of the process in order to facilitate their understanding grasp their relationships and develop them. This paper addresses this goal with a fine-step refinement process for information based on the use of domain-specific languages. It considers analysis contexts that include a particular theoretical framework domain type of problem and target platform. For a given context the process formally defines modelling languages conceptually close to the different aspects relevant to it. It also defines mappings between concepts in those languages. Researchers develop simulations by specifying models with the languages and share and refine information by using mappings between these models. This infrastructure provides guidance throughout the process and makes the information involved explicit. A case study of continuous double auctions illustrates the approach.,ruben fuentes-fernandez,Not available,2012.0,10.1007/s10588-012-9110-5,Computational and Mathematical Organization Theory,Rubén2012,False,,Springer,Not available,Metamodels for role-driven agent-based modelling,55220b1d92ee0202297d61c84545320c,http://dx.doi.org/10.1007/s10588-012-9110-5 2548,A major challenge in agent-based modelling is the management of the process to generate executable simulations from the initial conceptual models. This process is complex and usually involves several roles which may raise communication problems due to the diverse backgrounds and perspectives of participants and the use of non-explicit knowledge. This situation demands a clear separation and precise definition of the multiple aspects of the process in order to facilitate their understanding grasp their relationships and develop them. This paper addresses this goal with a fine-step refinement process for information based on the use of domain-specific languages. It considers analysis contexts that include a particular theoretical framework domain type of problem and target platform. For a given context the process formally defines modelling languages conceptually close to the different aspects relevant to it. It also defines mappings between concepts in those languages. Researchers develop simulations by specifying models with the languages and share and refine information by using mappings between these models. This infrastructure provides guidance throughout the process and makes the information involved explicit. A case study of continuous double auctions illustrates the approach.,samer hassan,Not available,2012.0,10.1007/s10588-012-9110-5,Computational and Mathematical Organization Theory,Rubén2012,False,,Springer,Not available,Metamodels for role-driven agent-based modelling,55220b1d92ee0202297d61c84545320c,http://dx.doi.org/10.1007/s10588-012-9110-5 2549,A major challenge in agent-based modelling is the management of the process to generate executable simulations from the initial conceptual models. This process is complex and usually involves several roles which may raise communication problems due to the diverse backgrounds and perspectives of participants and the use of non-explicit knowledge. This situation demands a clear separation and precise definition of the multiple aspects of the process in order to facilitate their understanding grasp their relationships and develop them. This paper addresses this goal with a fine-step refinement process for information based on the use of domain-specific languages. It considers analysis contexts that include a particular theoretical framework domain type of problem and target platform. For a given context the process formally defines modelling languages conceptually close to the different aspects relevant to it. It also defines mappings between concepts in those languages. Researchers develop simulations by specifying models with the languages and share and refine information by using mappings between these models. This infrastructure provides guidance throughout the process and makes the information involved explicit. A case study of continuous double auctions illustrates the approach.,juan pavon,Not available,2012.0,10.1007/s10588-012-9110-5,Computational and Mathematical Organization Theory,Rubén2012,False,,Springer,Not available,Metamodels for role-driven agent-based modelling,55220b1d92ee0202297d61c84545320c,http://dx.doi.org/10.1007/s10588-012-9110-5 2550,A major challenge in agent-based modelling is the management of the process to generate executable simulations from the initial conceptual models. This process is complex and usually involves several roles which may raise communication problems due to the diverse backgrounds and perspectives of participants and the use of non-explicit knowledge. This situation demands a clear separation and precise definition of the multiple aspects of the process in order to facilitate their understanding grasp their relationships and develop them. This paper addresses this goal with a fine-step refinement process for information based on the use of domain-specific languages. It considers analysis contexts that include a particular theoretical framework domain type of problem and target platform. For a given context the process formally defines modelling languages conceptually close to the different aspects relevant to it. It also defines mappings between concepts in those languages. Researchers develop simulations by specifying models with the languages and share and refine information by using mappings between these models. This infrastructure provides guidance throughout the process and makes the information involved explicit. A case study of continuous double auctions illustrates the approach.,jose galan,Not available,2012.0,10.1007/s10588-012-9110-5,Computational and Mathematical Organization Theory,Rubén2012,False,,Springer,Not available,Metamodels for role-driven agent-based modelling,55220b1d92ee0202297d61c84545320c,http://dx.doi.org/10.1007/s10588-012-9110-5 2551,A major challenge in agent-based modelling is the management of the process to generate executable simulations from the initial conceptual models. This process is complex and usually involves several roles which may raise communication problems due to the diverse backgrounds and perspectives of participants and the use of non-explicit knowledge. This situation demands a clear separation and precise definition of the multiple aspects of the process in order to facilitate their understanding grasp their relationships and develop them. This paper addresses this goal with a fine-step refinement process for information based on the use of domain-specific languages. It considers analysis contexts that include a particular theoretical framework domain type of problem and target platform. For a given context the process formally defines modelling languages conceptually close to the different aspects relevant to it. It also defines mappings between concepts in those languages. Researchers develop simulations by specifying models with the languages and share and refine information by using mappings between these models. This infrastructure provides guidance throughout the process and makes the information involved explicit. A case study of continuous double auctions illustrates the approach.,adolfo lopez-paredes,Not available,2012.0,10.1007/s10588-012-9110-5,Computational and Mathematical Organization Theory,Rubén2012,False,,Springer,Not available,Metamodels for role-driven agent-based modelling,55220b1d92ee0202297d61c84545320c,http://dx.doi.org/10.1007/s10588-012-9110-5 2552,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,kenneth hendricks,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 2553,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,ilke onur,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 2554,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,thomas wiseman,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 2555,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,miao pan,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 2556,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,xiaoyan zhu,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 2557,We examine whether a simple agent-based model can generate asset price bubbles and crashes of the type observed in a series of laboratory asset market experiments beginning with the work of Smith Suchanek and Williams (1988). We follow the methodology of Gode and Sunder (1993 1997) and examine the outcomes that obtain when populations of zero-intelligence (ZI) budget constrained artificial agents are placed in the various laboratory market environments that have given rise to price bubbles. We have to put more structure on the behavior of the ZI-agents in order to address features of the laboratory asset bubble environment. We show that our model of “near-zero-intelligence” traders operating in the same double auction environments used in several different laboratory studies generates asset price bubbles and crashes comparable to those observed in laboratory experiments and can also match other more subtle features of the experimental data.,john duffy,Not available,2006.0,10.1007/s00199-004-0570-9,Economic Theory,John2006,False,,Springer,Not available,Asset price bubbles and crashes with near-zero-intelligence traders,58145b5b594735899beafaac2a7e2747,http://dx.doi.org/10.1007/s00199-004-0570-9 2558,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,m iftekhar,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 2559,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,yuguang fang,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 2560,The first Danish exchange for sugar beet contracts was established in January 2008. It was also the world’s first major application of a new technology secure multiparty computation (SMC) which ensures the security and cost-effectiveness of such exchanges. The technology can potentially be used in a number of other applications including voting negotiations and benchmarking. SMC makes it possible to combine private knowledge from a large number of parties without ever revealing their individual knowledge. This provides unique opportunities for individual agents to collaborate despite conflicting interests and decentralized knowledge which in many contexts constitute the primary obstacle to the creation of economic gains. The establishment of the Danish contract exchange was the culmination of a novel and successful collaboration between economists and cryptologists. It constitutes a successful operational research project using novel scientific methods to solve a real large-scale problem. This article describes the background for and the implementation of the exchange and discusses some other potential applications.,peter bogetoft,Not available,2012.0,10.1007/s11573-011-0535-y,Zeitschrift für Betriebswirtschaft,Peter2012,False,,Springer,Not available,Efficient and confidential reallocation of contracts,e5ca3869b3c636c9f1573d47a137e957,http://dx.doi.org/10.1007/s11573-011-0535-y 2561,The first Danish exchange for sugar beet contracts was established in January 2008. It was also the world’s first major application of a new technology secure multiparty computation (SMC) which ensures the security and cost-effectiveness of such exchanges. The technology can potentially be used in a number of other applications including voting negotiations and benchmarking. SMC makes it possible to combine private knowledge from a large number of parties without ever revealing their individual knowledge. This provides unique opportunities for individual agents to collaborate despite conflicting interests and decentralized knowledge which in many contexts constitute the primary obstacle to the creation of economic gains. The establishment of the Danish contract exchange was the culmination of a novel and successful collaboration between economists and cryptologists. It constitutes a successful operational research project using novel scientific methods to solve a real large-scale problem. This article describes the background for and the implementation of the exchange and discusses some other potential applications.,kurt nielsen,Not available,2012.0,10.1007/s11573-011-0535-y,Zeitschrift für Betriebswirtschaft,Peter2012,False,,Springer,Not available,Efficient and confidential reallocation of contracts,e5ca3869b3c636c9f1573d47a137e957,http://dx.doi.org/10.1007/s11573-011-0535-y 2562,This paper investigates algorithmic properties and overall performance of the exact auction algorithm in Demange Gale and Sotomayor (J. Polit. Economy 94: 863–872 1986) or DGS for short. This task is achieved by interpreting DGS as a graph and by conducting a large number of computer simulations. The crucial step in DGS is when the auctioneer selects a so-called minimal overdemanded set of items because the specific selection may affect a number of performance measures such as the number of iterations and the ratio of elicited preferences. The computational results show that (i) DGS graphs are typically large even for relatively small numbers of bidders and items (ii) DGS converges slowly and (iii) DGS performs well in terms of preference elicitation. The paper also demonstrates that the modification to DGS based on the Ford–Fulkerson algorithm outperforms all investigated rules for selecting a minimal overdemanded set of items in DGS both in terms of termination speed and preference elicitation.,tommy andersson,Not available,2012.0,10.1007/s10614-010-9237-8,Computational Economics,Tommy2012,False,,Springer,Not available,Properties of the DGS-Auction Algorithm,4aef4cb18c0c5490fb0df6296a8ae7b3,http://dx.doi.org/10.1007/s10614-010-9237-8 2563,This paper investigates algorithmic properties and overall performance of the exact auction algorithm in Demange Gale and Sotomayor (J. Polit. Economy 94: 863–872 1986) or DGS for short. This task is achieved by interpreting DGS as a graph and by conducting a large number of computer simulations. The crucial step in DGS is when the auctioneer selects a so-called minimal overdemanded set of items because the specific selection may affect a number of performance measures such as the number of iterations and the ratio of elicited preferences. The computational results show that (i) DGS graphs are typically large even for relatively small numbers of bidders and items (ii) DGS converges slowly and (iii) DGS performs well in terms of preference elicitation. The paper also demonstrates that the modification to DGS based on the Ford–Fulkerson algorithm outperforms all investigated rules for selecting a minimal overdemanded set of items in DGS both in terms of termination speed and preference elicitation.,christer andersson,Not available,2012.0,10.1007/s10614-010-9237-8,Computational Economics,Tommy2012,False,,Springer,Not available,Properties of the DGS-Auction Algorithm,4aef4cb18c0c5490fb0df6296a8ae7b3,http://dx.doi.org/10.1007/s10614-010-9237-8 2564,We consider software development as an economic activity where goods and services can be modeled as a resource constrained task allocation problem. This paper introduces a market based mechanism to overcome task allocation issues in a software development process. It proposes a mechanism with a prescribed set of rules where valuation is based on the behaviors of stakeholders such as biding for a task. A bid process ensures that a stakeholder who values the resource most will have it allocated for a limited number of times. To observe the bidders behaviors we initiate an approach incorporated with a process simulation model. Our preliminary results support the idea that our model is useful for optimizing the value based task allocations creating a market value for the project assets and for achieving proper allocation of project resources specifically on large scale software projects.,murat yilmaz,Not available,2012.0,10.1007/978-3-642-31199-4_3,Systems Software and Services Process Improvement,Murat2012,False,,Springer,Not available,A Market Based Approach for Resolving Resource Constrained Task Allocation Problems in a Software Development Process,0980c97ec7d502c869d4e4fad488911c,http://dx.doi.org/10.1007/978-3-642-31199-4_3 2565,We consider software development as an economic activity where goods and services can be modeled as a resource constrained task allocation problem. This paper introduces a market based mechanism to overcome task allocation issues in a software development process. It proposes a mechanism with a prescribed set of rules where valuation is based on the behaviors of stakeholders such as biding for a task. A bid process ensures that a stakeholder who values the resource most will have it allocated for a limited number of times. To observe the bidders behaviors we initiate an approach incorporated with a process simulation model. Our preliminary results support the idea that our model is useful for optimizing the value based task allocations creating a market value for the project assets and for achieving proper allocation of project resources specifically on large scale software projects.,rory o'connor,Not available,2012.0,10.1007/978-3-642-31199-4_3,Systems Software and Services Process Improvement,Murat2012,False,,Springer,Not available,A Market Based Approach for Resolving Resource Constrained Task Allocation Problems in a Software Development Process,0980c97ec7d502c869d4e4fad488911c,http://dx.doi.org/10.1007/978-3-642-31199-4_3 2566,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,onur koska,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 2567,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,ilke onur,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 2568,We scrutinize the scope of auctions for firm acquisitions in the presence of downstream interactions and information externalities. We show that no mechanism exists that allows an investor to acquire a low-cost firm under incomplete information: a ,frank stahler,Not available,2018.0,10.1007/s00712-017-0590-0,Journal of Economics,A.2018,False,,Springer,Not available,The scope of auctions in the presence of downstream interactions and information externalities,9139687615174018f8998ae2343bef72,http://dx.doi.org/10.1007/s00712-017-0590-0 2569,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,a hailu,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 2570,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,fu-shiung hsieh,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 2571,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,fu-min zhan,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 2572,Although carpooling provides a way to achieve higher efficiency and lower costs of a transport system by grouping people and sharing cars or vehicles in use it is still not widely accepted. Several studies indicate that cost savings and timeliness are the main incentives for acceptance of the carpooling business model. However existing studies are deficient in supporting operations of carpooling business model from specifying the requirements of drivers and passengers matching drivers with passengers to allocating cost savings among ridesharing participants. A pragmatic solution methodology to maximize cost savings while respecting timing constraints and allocate cost savings in carpooling systems is a critical factor for ensuring the success of carpooling business model. The problem to maximize cost savings subject to capacity constraints and timing constraints can be formulated as an integer programming problem. Although there are several works for solving carpooling problems based on metaheuristic approaches existing studies on application of metaheuristic approaches in carpooling problems are still limited. Motivated by deficiencies of existing studies discussed above this paper aims to (1) propose a carpooling model based on double auctions (2) formulate the carpooling problem and develop a discrete cooperative coevolving particle swarm optimization (DCCPSO) algorithm to solve the problem (3) propose a cost savings allocation scheme to benefit ridesharing participants (4) study the influence of detour distance constraints on performance and (5) study the effectiveness of the proposed algorithm by comparing with other metaheuristic algorithms through experiments. Simulation results indicate that the proposed DCCPSO algorithm significantly outperforms several existing algorithms in solving the carpooling problem.,yi-hong guo,Not available,2018.0,10.1007/s10489-018-1288-x,Applied Intelligence,Fu-Shiung2018,False,,Springer,Not available,A solution methodology for carpooling systems based on double auctions and cooperative coevolutionary particle swarms,d30c94187096f4a196edaf35e9ba725b,http://dx.doi.org/10.1007/s10489-018-1288-x 2573,Cognitive radio networks being a widespread disruptive technology where idle spectrum are being analysed and made available to the unlicensed secondary users (SU) from licensed primary users (PU). During this battle of allocation of spectrum to the SU the attackers can masquerade the network and disrupt the channels. The vulnerability attacks are more often happened based on the nature of usage of the spectrum in PU and they collect those information from secondary agent cluster one among them is the Spectrum Sensing data falsification attack. In heterogeneous network the vulnerabilities affect the utility of the channel and changes the information in fusion centre where the sensing reports are might be corrupted during transmission. The paper focus on assigning the idle spectrum to be allocated based on binary stage honest based winner determination using greedy approach and the broadcasted information is secured using two phase cryptography. Besides a rational player approach has been proposed to make the network to be susceptible to the idle environment using stochastic game modeling to prevent the attack where a optimal solution is being estimated with nash equilibrium to identify the best response for the user to exploit the attack. The proposed mechanism is much more significantly improved duly compared with traditional mechanism and it highly improves the network performance in monitoring the induced attack and allocating the spectrum with error free transmission.,p. subbulakshmi,Not available,2018.0,10.1007/s11277-017-5105-3,Wireless Personal Communications,P.2018,False,,Springer,Not available,Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network,8634966c3909a7b6e92d5dd1d0664a3b,http://dx.doi.org/10.1007/s11277-017-5105-3 2574,Cognitive radio networks being a widespread disruptive technology where idle spectrum are being analysed and made available to the unlicensed secondary users (SU) from licensed primary users (PU). During this battle of allocation of spectrum to the SU the attackers can masquerade the network and disrupt the channels. The vulnerability attacks are more often happened based on the nature of usage of the spectrum in PU and they collect those information from secondary agent cluster one among them is the Spectrum Sensing data falsification attack. In heterogeneous network the vulnerabilities affect the utility of the channel and changes the information in fusion centre where the sensing reports are might be corrupted during transmission. The paper focus on assigning the idle spectrum to be allocated based on binary stage honest based winner determination using greedy approach and the broadcasted information is secured using two phase cryptography. Besides a rational player approach has been proposed to make the network to be susceptible to the idle environment using stochastic game modeling to prevent the attack where a optimal solution is being estimated with nash equilibrium to identify the best response for the user to exploit the attack. The proposed mechanism is much more significantly improved duly compared with traditional mechanism and it highly improves the network performance in monitoring the induced attack and allocating the spectrum with error free transmission.,m. prakash,Not available,2018.0,10.1007/s11277-017-5105-3,Wireless Personal Communications,P.2018,False,,Springer,Not available,Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network,8634966c3909a7b6e92d5dd1d0664a3b,http://dx.doi.org/10.1007/s11277-017-5105-3 2575,Cognitive radio networks being a widespread disruptive technology where idle spectrum are being analysed and made available to the unlicensed secondary users (SU) from licensed primary users (PU). During this battle of allocation of spectrum to the SU the attackers can masquerade the network and disrupt the channels. The vulnerability attacks are more often happened based on the nature of usage of the spectrum in PU and they collect those information from secondary agent cluster one among them is the Spectrum Sensing data falsification attack. In heterogeneous network the vulnerabilities affect the utility of the channel and changes the information in fusion centre where the sensing reports are might be corrupted during transmission. The paper focus on assigning the idle spectrum to be allocated based on binary stage honest based winner determination using greedy approach and the broadcasted information is secured using two phase cryptography. Besides a rational player approach has been proposed to make the network to be susceptible to the idle environment using stochastic game modeling to prevent the attack where a optimal solution is being estimated with nash equilibrium to identify the best response for the user to exploit the attack. The proposed mechanism is much more significantly improved duly compared with traditional mechanism and it highly improves the network performance in monitoring the induced attack and allocating the spectrum with error free transmission.,v. ramalakshmi,Not available,2018.0,10.1007/s11277-017-5105-3,Wireless Personal Communications,P.2018,False,,Springer,Not available,Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network,8634966c3909a7b6e92d5dd1d0664a3b,http://dx.doi.org/10.1007/s11277-017-5105-3 2576,Resources in a computational grid system fall under the purview of different administrative domains of varying policies for their usages. Commercial grid offers their services (resources) on use-and-pay basis. Resource management in computational grid offers a market place for the two prominent grid market players i.e. resource provider and resource consumer. It has been observed that in the grid the request for the resources may not be uniform throughout. It fluctuates from very high demand at peak time to low or negligible at off-peak time. This information may be used to fetch the resource utilization and cost benefits out of the grid. The provider would prefer to charge extra for its resources at peak time whereas users may shift their resources usage preference to off-peak time. This work proposes a model in which the resource provider and consumer play a non-cooperative game at different time-zones and act independently to choose their actions. Some characteristic parameters such as cost execution time and reliability have been considered to facilitate the job execution. Based on the outcome of the game the grid cluster offering maximum reliability within the desired execution time and/or cost for the job execution. The model has been simulated for performance evaluation with quite encouraging results.,achal kaushik,Not available,2018.0,10.1007/s10586-017-1467-2,Cluster Computing,Achal2018,False,,Springer,Not available,A model for resource management in computational grid using sequential auction and bargaining procurement,0e3f74693c3a0b43843e34f8333e4d4c,http://dx.doi.org/10.1007/s10586-017-1467-2 2577,Resources in a computational grid system fall under the purview of different administrative domains of varying policies for their usages. Commercial grid offers their services (resources) on use-and-pay basis. Resource management in computational grid offers a market place for the two prominent grid market players i.e. resource provider and resource consumer. It has been observed that in the grid the request for the resources may not be uniform throughout. It fluctuates from very high demand at peak time to low or negligible at off-peak time. This information may be used to fetch the resource utilization and cost benefits out of the grid. The provider would prefer to charge extra for its resources at peak time whereas users may shift their resources usage preference to off-peak time. This work proposes a model in which the resource provider and consumer play a non-cooperative game at different time-zones and act independently to choose their actions. Some characteristic parameters such as cost execution time and reliability have been considered to facilitate the job execution. Based on the outcome of the game the grid cluster offering maximum reliability within the desired execution time and/or cost for the job execution. The model has been simulated for performance evaluation with quite encouraging results.,deo vidyarthi,Not available,2018.0,10.1007/s10586-017-1467-2,Cluster Computing,Achal2018,False,,Springer,Not available,A model for resource management in computational grid using sequential auction and bargaining procurement,0e3f74693c3a0b43843e34f8333e4d4c,http://dx.doi.org/10.1007/s10586-017-1467-2 2578,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,xiaohu qian,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 2579,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,shu-cherng fang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 2580,Recently interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally the performances of some algorithms are more sensitive to strategic bidding than others.,r lindner,Not available,2013.0,10.1057/jors.2012.121,Journal of the Operational Research Society,S2013,False,,Springer,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,fff71962a6988b355d175397061e27c6,http://dx.doi.org/10.1057/jors.2012.121 2581,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,min huang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 2582,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,qi an,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 2583,Suppliers may experience emotional/behavioral consequences of anticipated regrets that consist of winner and loser regrets in first- and second-price sealed-bid reverse auctions. Constructing mathematical models that incorporate regret theory to derive closed-form solutions of regret-anticipated suppliers’ bid decisions this paper theoretically examines the effects of anticipated regrets on suppliers’ bid prices buyer’s expected procurement cost and auction format decision. Comparing with the no regret scenario we find that winner regret has adverse effects on the buyer’s expected procurement cost in first-price sealed-bid reverse auctions with regret-anticipated suppliers. To mitigate the adverse effects we propose using the reserve price strategy for the buyer with theoretical analysis and numerical supports. An interesting analysis reveals that as the number of suppliers increases the optimal reserve price increases or decreases depending on the degree of winner regret is lower or higher than that of loser regret. Also the classical revenue equivalence theorem no longer holds when the degree of winner regret differs from that of loser regret.,xingwei wang,Not available,2018.0,10.1007/s10479-017-2475-6,Annals of Operations Research,Xiaohu2018,False,,Springer,Not available,Reverse auctions with regret-anticipated bidders,87c4c437f19a74ea1ddcdb884ffb7fc7,http://dx.doi.org/10.1007/s10479-017-2475-6 2584,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg (Ann Math Stat 30(1):165–168 ,yurii nesterov,Not available,2018.0,10.1007/s40305-018-0195-5,Journal of the Operations Research Society of China,Yurii2018,True,,Springer,Not available,Computation of Fisher–Gale Equilibrium by Auction,c552f510b3d648e026169d7b7ddb1d2b,http://dx.doi.org/10.1007/s40305-018-0195-5 2585,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg (Ann Math Stat 30(1):165–168 ,vladimir shikhman,Not available,2018.0,10.1007/s40305-018-0195-5,Journal of the Operations Research Society of China,Yurii2018,True,,Springer,Not available,Computation of Fisher–Gale Equilibrium by Auction,c552f510b3d648e026169d7b7ddb1d2b,http://dx.doi.org/10.1007/s40305-018-0195-5 2586,Advertisement in dedicated webpage spaces or in search engines sponsored slots is usually sold using auctions with a payment rule that is either per impression or per click. But advertisers can be both sensitive to being viewed (brand awareness effect) and being clicked (conversion into sales). In this paper we generalize the auction mechanism by including both pricing components: the advertisers are charged when their ad is displayed and pay an additional price if the ad is clicked. Applying the results for Vickrey–Clarke–Groves auctions we show how to compute payments to ensure incentive compatibility from advertisers as well as maximize the total value extracted from the advertisement slot(s). We provide tight upper bounds for the loss of efficiency due to applying only pay-per-click (or pay-per-view) pricing instead of our scheme. Those bounds depend on the joint distribution of advertisement visibility and population likelihood to click on ads and can help identify situations where our mechanism yields significant improvements. We also describe how the commonly used generalized second price auction can be extended to this context.,patrick maille,Not available,2018.0,10.1007/s10660-017-9267-6,Electronic Commerce Research,Patrick2018,False,,Springer,Not available,Auctions for online ad space among advertisers sensitive to both views and clicks,d881d227095ab687b2248ed5a805954f,http://dx.doi.org/10.1007/s10660-017-9267-6 2587,Advertisement in dedicated webpage spaces or in search engines sponsored slots is usually sold using auctions with a payment rule that is either per impression or per click. But advertisers can be both sensitive to being viewed (brand awareness effect) and being clicked (conversion into sales). In this paper we generalize the auction mechanism by including both pricing components: the advertisers are charged when their ad is displayed and pay an additional price if the ad is clicked. Applying the results for Vickrey–Clarke–Groves auctions we show how to compute payments to ensure incentive compatibility from advertisers as well as maximize the total value extracted from the advertisement slot(s). We provide tight upper bounds for the loss of efficiency due to applying only pay-per-click (or pay-per-view) pricing instead of our scheme. Those bounds depend on the joint distribution of advertisement visibility and population likelihood to click on ads and can help identify situations where our mechanism yields significant improvements. We also describe how the commonly used generalized second price auction can be extended to this context.,bruno tuffin,Not available,2018.0,10.1007/s10660-017-9267-6,Electronic Commerce Research,Patrick2018,False,,Springer,Not available,Auctions for online ad space among advertisers sensitive to both views and clicks,d881d227095ab687b2248ed5a805954f,http://dx.doi.org/10.1007/s10660-017-9267-6 2588,,uday sinha,Not available,2018.0,10.1007/s41775-018-0022-2,Indian Economic Review,Bhanu2018,False,,Springer,Not available,Krishnendu Ghosh Dastidar: Oligopoly auctions and market quality (Economics Law and Institutions in Asia Pacific series Series Editor: Makoto Yano),9d42df4897fa4d612aa9c12b95fbcc1c,http://dx.doi.org/10.1007/s41775-018-0022-2 2589,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,koji kotani,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 2590,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,kenta tanaka,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 2591,A “low-balling strategy” by bidding contractors has increasingly been recognized as an important issue in public infrastructure procurement. Public works contracts are often imperfect and renegotiated after the contract award. Given the expectation for ex post adjustments bidders seem motivated to take advantage of the low-balling strategy. This paper analyzes the endogeneity between the bid strategy and ex post adjustments. Using procurement data on rural road projects in Nepal it shows that the bid strategy and adjustments are determined endogenously in the system. Anticipating cost and time overruns firms would likely undercut normal bid prices. Then ex post contract adjustments actually happen because of their too aggressive bids.,atsushi iimi,Not available,2013.0,10.1007/s11151-013-9388-6,Review of Industrial Organization,Atsushi2013,False,,Springer,Not available,Testing Low-Balling Strategy in Rural Road Procurement,14891215122acb761b3d1c64d10246ac,http://dx.doi.org/10.1007/s11151-013-9388-6 2592,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,shunsuke managi,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 2593,We study a variation of the single-item sealed-bid first-price auction wherein one bidder (the leader) publicly commits to a (possibly mixed) strategy before the others submit their bids. For the case wherein all bidders’ valuations are commonly known we fully characterize the committed mixed strategy that is optimal for the leader and find that both the leader and the follower with the highest valuation strictly benefit from the commitment so long as the leader’s valuation is strictly higher than the second highest valuation of the followers. We further show that compared with the simultaneous first-price auction the leader’s optimal commitment yields the same net utility benefit to both of these bidders. As a result the two highest valued bidders’ incentives are aligned facilitating coordination and implementation of the commitment. Finally we provide characterization of the leader’s optimal commitment in a Bayesian setting with two bidders leveraging the methodology developed for the complete-information setting.,yunjian xu,Not available,2018.0,10.1007/s00199-017-1069-5,Economic Theory,Yunjian2018,False,,Springer,Not available,Commitment in first-price auctions,d23791bea9014a928cff33f3ae39b0c3,http://dx.doi.org/10.1007/s00199-017-1069-5 2594,We study a variation of the single-item sealed-bid first-price auction wherein one bidder (the leader) publicly commits to a (possibly mixed) strategy before the others submit their bids. For the case wherein all bidders’ valuations are commonly known we fully characterize the committed mixed strategy that is optimal for the leader and find that both the leader and the follower with the highest valuation strictly benefit from the commitment so long as the leader’s valuation is strictly higher than the second highest valuation of the followers. We further show that compared with the simultaneous first-price auction the leader’s optimal commitment yields the same net utility benefit to both of these bidders. As a result the two highest valued bidders’ incentives are aligned facilitating coordination and implementation of the commitment. Finally we provide characterization of the leader’s optimal commitment in a Bayesian setting with two bidders leveraging the methodology developed for the complete-information setting.,katrina ligett,Not available,2018.0,10.1007/s00199-017-1069-5,Economic Theory,Yunjian2018,False,,Springer,Not available,Commitment in first-price auctions,d23791bea9014a928cff33f3ae39b0c3,http://dx.doi.org/10.1007/s00199-017-1069-5 2595,We study the following Bayesian setting: ,george christodoulou,Not available,2008.0,10.1007/978-3-540-70575-8_67,Automata Languages and Programming,George2008,False,,Springer,Not available,Bayesian Combinatorial Auctions,b04d553aae1aa9e3a454b332f8236aac,http://dx.doi.org/10.1007/978-3-540-70575-8_67 2596,We study the following Bayesian setting: ,annamaria kovacs,Not available,2008.0,10.1007/978-3-540-70575-8_67,Automata Languages and Programming,George2008,False,,Springer,Not available,Bayesian Combinatorial Auctions,b04d553aae1aa9e3a454b332f8236aac,http://dx.doi.org/10.1007/978-3-540-70575-8_67 2597,We study the following Bayesian setting: ,michael schapira,Not available,2008.0,10.1007/978-3-540-70575-8_67,Automata Languages and Programming,George2008,False,,Springer,Not available,Bayesian Combinatorial Auctions,b04d553aae1aa9e3a454b332f8236aac,http://dx.doi.org/10.1007/978-3-540-70575-8_67 2598,Position auctions such as the Generalized Second Price (GSP) auction are in wide use for sponsored search e.g. by Yahoo! and Google. We now have an understanding of the equilibria of these auctions via game-theoretic concepts like Generalized English Auctions and the “locally envy-free” property as well as through a relationship to the well-known truthful Vickrey-Clarke-Groves (VCG) mechanism. In practice however position auctions are implemented with additional constraints in particular bidder-specific minimum prices are enforced by all major search engines. The minimum prices are used to control the quality of the ads that appear on the page.We study the effect of bidder-specific minimum prices in position auctions with an emphasis on GSP. Some properties proved for standard GSP no longer hold in this setting. For example we show that the GSP allocation is now not always efficient (in terms of advertiser value). Also the property of “envy-locality” enjoyed by GSP—which is essential in the prior analysis of strategies and equilibria—no longer holds. Our main result is to show that despite losing envy locality GSP with bidder-specific minimum prices still has an envy-free equilibrium. We conclude by studying the effect of bidder-specific minimum prices on VCG auctions.,eyal even-dar,Not available,2008.0,10.1007/978-3-540-92185-1_64,Internet and Network Economics,Eyal2008,False,,Springer,Not available,Position Auctions with Bidder-Specific Minimum Prices,1773c28528b32ab88e55416b50df1059,http://dx.doi.org/10.1007/978-3-540-92185-1_64 2599,Position auctions such as the Generalized Second Price (GSP) auction are in wide use for sponsored search e.g. by Yahoo! and Google. We now have an understanding of the equilibria of these auctions via game-theoretic concepts like Generalized English Auctions and the “locally envy-free” property as well as through a relationship to the well-known truthful Vickrey-Clarke-Groves (VCG) mechanism. In practice however position auctions are implemented with additional constraints in particular bidder-specific minimum prices are enforced by all major search engines. The minimum prices are used to control the quality of the ads that appear on the page.We study the effect of bidder-specific minimum prices in position auctions with an emphasis on GSP. Some properties proved for standard GSP no longer hold in this setting. For example we show that the GSP allocation is now not always efficient (in terms of advertiser value). Also the property of “envy-locality” enjoyed by GSP—which is essential in the prior analysis of strategies and equilibria—no longer holds. Our main result is to show that despite losing envy locality GSP with bidder-specific minimum prices still has an envy-free equilibrium. We conclude by studying the effect of bidder-specific minimum prices on VCG auctions.,jon feldman,Not available,2008.0,10.1007/978-3-540-92185-1_64,Internet and Network Economics,Eyal2008,False,,Springer,Not available,Position Auctions with Bidder-Specific Minimum Prices,1773c28528b32ab88e55416b50df1059,http://dx.doi.org/10.1007/978-3-540-92185-1_64 2600,Position auctions such as the Generalized Second Price (GSP) auction are in wide use for sponsored search e.g. by Yahoo! and Google. We now have an understanding of the equilibria of these auctions via game-theoretic concepts like Generalized English Auctions and the “locally envy-free” property as well as through a relationship to the well-known truthful Vickrey-Clarke-Groves (VCG) mechanism. In practice however position auctions are implemented with additional constraints in particular bidder-specific minimum prices are enforced by all major search engines. The minimum prices are used to control the quality of the ads that appear on the page.We study the effect of bidder-specific minimum prices in position auctions with an emphasis on GSP. Some properties proved for standard GSP no longer hold in this setting. For example we show that the GSP allocation is now not always efficient (in terms of advertiser value). Also the property of “envy-locality” enjoyed by GSP—which is essential in the prior analysis of strategies and equilibria—no longer holds. Our main result is to show that despite losing envy locality GSP with bidder-specific minimum prices still has an envy-free equilibrium. We conclude by studying the effect of bidder-specific minimum prices on VCG auctions.,yishay mansour,Not available,2008.0,10.1007/978-3-540-92185-1_64,Internet and Network Economics,Eyal2008,False,,Springer,Not available,Position Auctions with Bidder-Specific Minimum Prices,1773c28528b32ab88e55416b50df1059,http://dx.doi.org/10.1007/978-3-540-92185-1_64 2601,Position auctions such as the Generalized Second Price (GSP) auction are in wide use for sponsored search e.g. by Yahoo! and Google. We now have an understanding of the equilibria of these auctions via game-theoretic concepts like Generalized English Auctions and the “locally envy-free” property as well as through a relationship to the well-known truthful Vickrey-Clarke-Groves (VCG) mechanism. In practice however position auctions are implemented with additional constraints in particular bidder-specific minimum prices are enforced by all major search engines. The minimum prices are used to control the quality of the ads that appear on the page.We study the effect of bidder-specific minimum prices in position auctions with an emphasis on GSP. Some properties proved for standard GSP no longer hold in this setting. For example we show that the GSP allocation is now not always efficient (in terms of advertiser value). Also the property of “envy-locality” enjoyed by GSP—which is essential in the prior analysis of strategies and equilibria—no longer holds. Our main result is to show that despite losing envy locality GSP with bidder-specific minimum prices still has an envy-free equilibrium. We conclude by studying the effect of bidder-specific minimum prices on VCG auctions.,s. muthukrishnan,Not available,2008.0,10.1007/978-3-540-92185-1_64,Internet and Network Economics,Eyal2008,False,,Springer,Not available,Position Auctions with Bidder-Specific Minimum Prices,1773c28528b32ab88e55416b50df1059,http://dx.doi.org/10.1007/978-3-540-92185-1_64 2602,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,rishi sharma,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 2603,Experimental work in auctions interacts with theory providing a basis for testing and modifying theoretical developments. It has advantages and disadvantages relative to empirical work with field data so that we view the two as complimentary. Experimental work is used increasingly as a test bed for new auction formats such as the Federal Communication Commission’s (FCC) sale of spectrum (air-wave) rights.,john kagel,Not available,2008.0,10.1007/978-1-349-58802-2_72,The New Palgrave Dictionary of Economics,H.2008,False,,Springer,Not available,Auctions (Experiments),d0b7f24e581516100fc940f031590f39,http://dx.doi.org/10.1007/978-1-349-58802-2_72 2604,Experimental work in auctions interacts with theory providing a basis for testing and modifying theoretical developments. It has advantages and disadvantages relative to empirical work with field data so that we view the two as complimentary. Experimental work is used increasingly as a test bed for new auction formats such as the Federal Communication Commission’s (FCC) sale of spectrum (air-wave) rights.,dan levin,Not available,2008.0,10.1007/978-1-349-58802-2_72,The New Palgrave Dictionary of Economics,H.2008,False,,Springer,Not available,Auctions (Experiments),d0b7f24e581516100fc940f031590f39,http://dx.doi.org/10.1007/978-1-349-58802-2_72 2605,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,ze-su cai,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2606,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,li-ning sun,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2607,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,hai-bo gao,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2608,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,pu-cheng zhou,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2609,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,song-hao piao,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2610,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,qing-cheng huang,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 2611,This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale the number of objects for sale and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the ,shaheen fatima,Not available,2008.0,10.1007/978-3-540-88713-3_2,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Shaheen2008,False,,Springer,Not available,Sequential Auctions in Uncertain Information Settings,b57e55887ff9adde4df9c8f850328319,http://dx.doi.org/10.1007/978-3-540-88713-3_2 2612,This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale the number of objects for sale and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the ,michael wooldridge,Not available,2008.0,10.1007/978-3-540-88713-3_2,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Shaheen2008,False,,Springer,Not available,Sequential Auctions in Uncertain Information Settings,b57e55887ff9adde4df9c8f850328319,http://dx.doi.org/10.1007/978-3-540-88713-3_2 2613,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,kishore thapliyal,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 2614,This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale the number of objects for sale and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the ,nicholas jennings,Not available,2008.0,10.1007/978-3-540-88713-3_2,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Shaheen2008,False,,Springer,Not available,Sequential Auctions in Uncertain Information Settings,b57e55887ff9adde4df9c8f850328319,http://dx.doi.org/10.1007/978-3-540-88713-3_2 2615,In this article we survey some recently developed methods for the econometric analysis of action data and related applications. Since the mid -1990s auctions have been an active area of research in empirical industrial organization. Auctions are an attractive setting for empirically testing game theory for three reasons. First real-world auctions have well-defined rules which often correspond closely to game forms in economic theory. The mapping between the data and economic theory is typically less ambiguous in auctions than in other applications in empirical industrial organization. Second the theoretical literature on auctions is well developed and offers many testable implications. Third there are many high quality easily accessible data sets. For example detailed data sets from public sector procurements or online auctions can easily be collected from the Internet.,patrick bajari,Not available,2008.0,10.1007/978-1-349-58802-2_70,The New Palgrave Dictionary of Economics,Patrick2008,False,,Springer,Not available,Auctions (Applications),7826e4a1deaf08c652888e81ec319055,http://dx.doi.org/10.1007/978-1-349-58802-2_70 2616,This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent ,i. toft,Not available,2008.0,10.1007/978-3-540-88713-3_9,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,E.2008,False,,Springer,Not available,Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets,0e8a95b559b8858c680de98419d7a4f8,http://dx.doi.org/10.1007/978-3-540-88713-3_9 2617,This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent ,a. bagnall,Not available,2008.0,10.1007/978-3-540-88713-3_9,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,E.2008,False,,Springer,Not available,Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets,0e8a95b559b8858c680de98419d7a4f8,http://dx.doi.org/10.1007/978-3-540-88713-3_9 2618,In a dynamic market being able to update one’s value based on information available to ,florin constantin,Not available,2008.0,10.1007/978-3-540-88713-3_1,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Florin2008,False,,Springer,Not available,On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values,db89c7d67407807b2be50f7d342e5330,http://dx.doi.org/10.1007/978-3-540-88713-3_1 2619,In a dynamic market being able to update one’s value based on information available to ,david parkes,Not available,2008.0,10.1007/978-3-540-88713-3_1,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Florin2008,False,,Springer,Not available,On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values,db89c7d67407807b2be50f7d342e5330,http://dx.doi.org/10.1007/978-3-540-88713-3_1 2620,Auctions and procurements are widely used market mechanisms for allocating public contracts financial securities agricultural products natural resources artwork and electricity to name a few commodities. Recent years have also witnessed the developments of auction websites and business-to-business auctions. In general auctions have well-defined rules that can be captured by an economic model. Relying on the concept of the Bayesian Nash equilibrium game theory has greatly contributed to the modelling of auctions where a seller or buyer faces a limited number of bidders who behave strategically. The auction is typically an incomplete information game where the asymmetry of information between the seller/buyer and the bidders and among the bidders themselves plays a crucial role.,isabelle perrigne,Not available,2008.0,10.1007/978-1-349-58802-2_71,The New Palgrave Dictionary of Economics,Isabelle2008,False,,Springer,Not available,Auctions (Empirics),9ceff049c7ec304f1dda0b679fb5ab39,http://dx.doi.org/10.1007/978-1-349-58802-2_71 2621,Auctions and procurements are widely used market mechanisms for allocating public contracts financial securities agricultural products natural resources artwork and electricity to name a few commodities. Recent years have also witnessed the developments of auction websites and business-to-business auctions. In general auctions have well-defined rules that can be captured by an economic model. Relying on the concept of the Bayesian Nash equilibrium game theory has greatly contributed to the modelling of auctions where a seller or buyer faces a limited number of bidders who behave strategically. The auction is typically an incomplete information game where the asymmetry of information between the seller/buyer and the bidders and among the bidders themselves plays a crucial role.,quang vuong,Not available,2008.0,10.1007/978-1-349-58802-2_71,The New Palgrave Dictionary of Economics,Isabelle2008,False,,Springer,Not available,Auctions (Empirics),9ceff049c7ec304f1dda0b679fb5ab39,http://dx.doi.org/10.1007/978-1-349-58802-2_71 2622,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,gregory kersten,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 2623,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,ryszard kowalczyk,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 2624,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,anirban pathak,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 2625,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,hsiangchu lai,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 2626,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,dirk neumann,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 2627,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,mohan chhetri,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 2628,Costly competitions between economic agents are modelled as contests. Researchers use laboratory experiments to study contests and test comparative static predictions of contest theory. Commonly researchers find that participants’ efforts are significantly higher than predicted by the standard Nash equilibrium. Despite overbidding most comparative static predictions such as the incentive effect the size effect the discouragement effect and others are supported in the laboratory. In addition experimental studies examine various contest structures including dynamic contests (such as multistage races wars of attrition tug-of-wars) multidimensional contests (such as Colonel Blotto games) and contests between groups. This article provides a short review of such studies.,roman sheremeta,Not available,2018.0,10.1057/978-1-349-95121-5_3077-1,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Experimental Research on Contests,89c4d2136b45facd226eae7d5a56075a,http://dx.doi.org/10.1057/978-1-349-95121-5_3077-1 2629,Contemporary experimental economics was born in the 1950s from the combination of the experimental method used in psychology and new developments in economic theory. Early experimental studies of bargaining behaviour social dilemmas individual decision making and market institutions were followed by a long period of underground growth until the booming of the field in the 1980s and 1990s.,francesco guala,Not available,2018.0,10.1057/978-1-349-95189-5_2184,The New Palgrave Dictionary of Economics,Francesco2018,False,,Springer,Not available,Experimental Economics History of,9837d05e42af76268213c94f798373d9,http://dx.doi.org/10.1057/978-1-349-95189-5_2184 2630,Robert W. Rosenthal (1944–2002) was an economic theorist whose thoughtful papers inspired a wide range of new ideas. As Radner and Ray (2003) point out Rosenthal (1978) gives one of the first formal statements of the revelation principle a result noted in Myerson’s first paper (1979) on the subject. Rosenthal (1979) initiated the study of repeated games with varying opponents a modelling device used by Milgrom et al. (1990) Kandori (1992) and others to study social norms and other issues. He also wrote influential papers on pricing (Rosenthal 1980 1982) multi-unit auctions (Krishna and Rosenthal 1996) purification of mixed strategy equilibria (Radner and Rosenthal 1982; Aumann et al. 1983) sovereign debt (Fernandez and Rosenthal 1990) analysis of experimental data (Brown and Rosenthal 1990) and many other topics.,barton lipman,Not available,2018.0,10.1057/978-1-349-95189-5_2548,The New Palgrave Dictionary of Economics,L.2018,False,,Springer,Not available,Rosenthal Robert W. (1944–2002),c25556f559590d774ac8945eb3e52002,http://dx.doi.org/10.1057/978-1-349-95189-5_2548 2631,This article provides a brief overview of equilibrium existence results for continuous and discontinuous non-cooperative games.,philip reny,Not available,2018.0,10.1057/978-1-349-95189-5_2572,The New Palgrave Dictionary of Economics,J.2018,False,,Springer,Not available,Non-cooperative Games (Equilibrium Existence),aeb163d47e5c568f06e36a7ed98cd492,http://dx.doi.org/10.1057/978-1-349-95189-5_2572 2632,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,xuanheng li,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2633,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,haichuan ding,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2634,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,yuguang fang,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2635,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,munawwar sohul,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2636,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,miao pan,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2637,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,pan li,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2638,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,xiaoxia huang,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2639,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,yi sun,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2640,Spectrum trading is one of the most promising approaches to enabling dynamic spectrum access (DSA) in cognitive radio networks (CRNs). With this approach unlicensed users (a.k.a. secondary users) offer licensed users (a.k.a. primary users) with monetary rewards or improved quality of services (QoSs) in exchange for spectrum access rights. In this chapter we present a comprehensive introduction to spectrum trading. First we provide a brief introduction to DSA and CRNs as the background and motivation for the spectrum trading. Then we present various state-of-the-art spectrum trading mechanisms for spectrum sharing. Finally by analyzing various design issues in these mechanisms we introduce the concept of service-oriented spectrum trading and offer a novel collaborative network architecture called a cognitive mesh assisted network to effectively utilize unused licensed/unlicensed spectrums with high spectral efficiency. We expect that this chapter provides readers with basic understanding on spectrum trading technology and foster future research initiatives.,savo glisic,Not available,2018.0,10.1007/978-981-10-1389-8_27-2,Handbook of Cognitive Radio,Xuanheng2018,False,,Springer,Not available,Collaborative Spectrum Trading and Sharing for Cognitive Radio Networks,acc85b867bfd94ede7acf97ec94a927a,http://dx.doi.org/10.1007/978-981-10-1389-8_27-2 2641,Hospitals are confronted with many challenges. On the one hand demographic changes demand additional services. On the other hand hospitals have to profitably manage the supply of services. That requires the efficient use of resources. These resources include the nurses who perform the services. Nurses as human beings cannot be managed in the same way as any other resource. They have in terms of balancing between their work and life certain ideas about their working schedule. The creation of a solid roster known as the problem of nurse rostering is a challenging task in operations research. In particular considering nurses’ ,benno woskowski,Not available,2018.0,10.1007/978-3-319-61603-2_9,Game Theory in Management Accounting,Benno2018,False,,Springer,Not available,The Use of Auction in Nurse Rostering,10f47028582170fb215d043d66bb26fc,http://dx.doi.org/10.1007/978-3-319-61603-2_9 2642,Computational issues are important in mechanism design but have received insufficient research interest. This article briefly reviews some of the key ideas. I discuss computing by the ,tuomas sandholm,Not available,2018.0,10.1057/978-1-349-95189-5_2327,The New Palgrave Dictionary of Economics,Tuomas2018,False,,Springer,Not available,Computing in Mechanism Design,a4599f0f070bf717a26797b0b5303073,http://dx.doi.org/10.1057/978-1-349-95189-5_2327 2643,In the mid-20th century economists became involved in the design and conduct of laboratory experiments to examine propositions implied by economic theory. This development brought new standards of rigour to the data gathering process. This article gives an account of the author’s experiment in 1956 to test the hypothesis that the competitive market process yields welfare improving (and under certain limiting ideal conditions welfare maximizing) outcomes provides an interpretive history of the development of experimental economics discusses the functions of market experiments in microeconomic analysis and classifies the application of experimental methods.,c. bastable,Not available,2018.0,10.1057/978-1-349-95189-5_228,The New Palgrave Dictionary of Economics,F.2018,False,,Springer,Not available,Experimental Methods in Economics,266d8d57e3d3392c8d6712954cbdfeb8,http://dx.doi.org/10.1057/978-1-349-95189-5_228 2644,Encouraging passengers to take public transportation reduces cost and enhances sustainability of urban ecosystems. However the passengers incur some inconvenience cost due to potential delays and discomfort when switching from private to public transit service. In this paper we propose a reverse auction-based mechanism so that the government can incentivize the passengers to take public transit system instead of private transit services. The proposed mechanism achieves individual rationality truthfulness and near optimal social welfare. However revealing passengers’ truthful inconvenience cost raises privacy concerns. Hence a truthful and privacy preserving auction mechanism is investigated in this paper. The mechanism design is formulated as a mixed integer program which makes the VCG-like payment scheme computationally intractable. To mitigate the computation complexity a heuristic algorithm is proposed as an approximation. We show that truthfulness near optimal social welfare individual rationality and differential privacy are preserved by the heuristic algorithm. The proposed approach is demonstrated using numerical case study.,luyao niu,Not available,2018.0,10.1007/978-3-030-01554-1_21,Decision and Game Theory for Security,Luyao2018,False,,Springer,Not available,A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation,5b107df48a1c17c75b4e7253f1358fae,http://dx.doi.org/10.1007/978-3-030-01554-1_21 2645,Encouraging passengers to take public transportation reduces cost and enhances sustainability of urban ecosystems. However the passengers incur some inconvenience cost due to potential delays and discomfort when switching from private to public transit service. In this paper we propose a reverse auction-based mechanism so that the government can incentivize the passengers to take public transit system instead of private transit services. The proposed mechanism achieves individual rationality truthfulness and near optimal social welfare. However revealing passengers’ truthful inconvenience cost raises privacy concerns. Hence a truthful and privacy preserving auction mechanism is investigated in this paper. The mechanism design is formulated as a mixed integer program which makes the VCG-like payment scheme computationally intractable. To mitigate the computation complexity a heuristic algorithm is proposed as an approximation. We show that truthfulness near optimal social welfare individual rationality and differential privacy are preserved by the heuristic algorithm. The proposed approach is demonstrated using numerical case study.,andrew clark,Not available,2018.0,10.1007/978-3-030-01554-1_21,Decision and Game Theory for Security,Luyao2018,False,,Springer,Not available,A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation,5b107df48a1c17c75b4e7253f1358fae,http://dx.doi.org/10.1007/978-3-030-01554-1_21 2646,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,miao yao,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2647,Mechanism design concerns the question: given some desirable outcome can we design a game which produces it? This theory provides a foundation for many important fields such as auction theory and contract theory. We survey the recent literature dealing with topics such as robustness of mechanisms renegotiation and collusion. An important issue is whether simple and intuitively appealing mechanisms can be optimal. Finally we discuss what can be learned from recent experiments.,sandeep baliga,Not available,2018.0,10.1057/978-1-349-95189-5_2134,The New Palgrave Dictionary of Economics,Sandeep2018,False,,Springer,Not available,Mechanism Design (New Developments),e855d63272452f7a818b11a0056cad34,http://dx.doi.org/10.1057/978-1-349-95189-5_2134 2648,Mechanism design concerns the question: given some desirable outcome can we design a game which produces it? This theory provides a foundation for many important fields such as auction theory and contract theory. We survey the recent literature dealing with topics such as robustness of mechanisms renegotiation and collusion. An important issue is whether simple and intuitively appealing mechanisms can be optimal. Finally we discuss what can be learned from recent experiments.,tomas sjostrom,Not available,2018.0,10.1057/978-1-349-95189-5_2134,The New Palgrave Dictionary of Economics,Sandeep2018,False,,Springer,Not available,Mechanism Design (New Developments),e855d63272452f7a818b11a0056cad34,http://dx.doi.org/10.1057/978-1-349-95189-5_2134 2649,We show that in simple environments a bidding ring operating at a first-price sealed-bid auction cannot achieve any gains relative to non-cooperative bidding if the ring is unable to control the bids that its members submit at the auction. This contrasts with results for the case in which the ring can control its members’ bids or prevent all but one of the ring members from participating in the auction. Numerical examples suggest that this result extends to some more complex environments. The analytic results use linear programming techniques that have potential applications to a number of other economic problems.,giuseppe lopomo,Not available,2011.0,10.1007/s10058-010-0104-9,Review of Economic Design,Giuseppe2011,False,,Springer,Not available,Bidder collusion at first-price auctions,8c6320161bd50c277cd24313074bb816,http://dx.doi.org/10.1007/s10058-010-0104-9 2650,We show that in simple environments a bidding ring operating at a first-price sealed-bid auction cannot achieve any gains relative to non-cooperative bidding if the ring is unable to control the bids that its members submit at the auction. This contrasts with results for the case in which the ring can control its members’ bids or prevent all but one of the ring members from participating in the auction. Numerical examples suggest that this result extends to some more complex environments. The analytic results use linear programming techniques that have potential applications to a number of other economic problems.,leslie marx,Not available,2011.0,10.1007/s10058-010-0104-9,Review of Economic Design,Giuseppe2011,False,,Springer,Not available,Bidder collusion at first-price auctions,8c6320161bd50c277cd24313074bb816,http://dx.doi.org/10.1007/s10058-010-0104-9 2651,We show that in simple environments a bidding ring operating at a first-price sealed-bid auction cannot achieve any gains relative to non-cooperative bidding if the ring is unable to control the bids that its members submit at the auction. This contrasts with results for the case in which the ring can control its members’ bids or prevent all but one of the ring members from participating in the auction. Numerical examples suggest that this result extends to some more complex environments. The analytic results use linear programming techniques that have potential applications to a number of other economic problems.,peng sun,Not available,2011.0,10.1007/s10058-010-0104-9,Review of Economic Design,Giuseppe2011,False,,Springer,Not available,Bidder collusion at first-price auctions,8c6320161bd50c277cd24313074bb816,http://dx.doi.org/10.1007/s10058-010-0104-9 2652,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,harold houba,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 2653,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,dinard laan,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 2654,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,dirk veldhuizen,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 2655,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,marc adam,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 2656,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,jan kramer,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 2657,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,abdallah abdallah,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2658,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,caroline jahnig,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 2659,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,stefan seifert,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 2660,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,christof weinhardt,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 2661,Statistical properties of order-driven double-auction markets with Bid–Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called ,takero ibuki,Not available,2011.0,10.1007/s11403-011-0078-x,Journal of Economic Interaction and Coordination,Takero2011,False,,Springer,Not available,Response of double-auction markets to instantaneous Selling–Buying signals with stochastic Bid–Ask spread,d41dbc4d1879cf1f11d206451c3ba72d,http://dx.doi.org/10.1007/s11403-011-0078-x 2662,Statistical properties of order-driven double-auction markets with Bid–Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called ,jun-ichi inoue,Not available,2011.0,10.1007/s11403-011-0078-x,Journal of Economic Interaction and Coordination,Takero2011,False,,Springer,Not available,Response of double-auction markets to instantaneous Selling–Buying signals with stochastic Bid–Ask spread,d41dbc4d1879cf1f11d206451c3ba72d,http://dx.doi.org/10.1007/s11403-011-0078-x 2663,We consider an environment where the sale can take place so early that both the seller and potential buyers have the same uncertainty about the quality of the good. We present a simple model that allows the seller to offer the good for sale before or after this uncertainty is resolved namely via forward auction or spot auction respectively. We solve for the equilibrium of these two auctions and then compare the resulting expected revenues. We also consider the revenue implications of insurance in forward auctions.,isa hafalir,Not available,2011.0,10.1007/s10058-011-0110-6,Review of Economic Design,E.2011,False,,Springer,Not available,Selling goods of unknown quality: forward versus spot auctions,ea85946bd81bef3ddb89a84ffd4fbd6d,http://dx.doi.org/10.1007/s10058-011-0110-6 2664,We consider an environment where the sale can take place so early that both the seller and potential buyers have the same uncertainty about the quality of the good. We present a simple model that allows the seller to offer the good for sale before or after this uncertainty is resolved namely via forward auction or spot auction respectively. We solve for the equilibrium of these two auctions and then compare the resulting expected revenues. We also consider the revenue implications of insurance in forward auctions.,hadi yektas,Not available,2011.0,10.1007/s10058-011-0110-6,Review of Economic Design,E.2011,False,,Springer,Not available,Selling goods of unknown quality: forward versus spot auctions,ea85946bd81bef3ddb89a84ffd4fbd6d,http://dx.doi.org/10.1007/s10058-011-0110-6 2665,Extensive research in recent years has shown the benefits of ,lin chen,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 2666,Extensive research in recent years has shown the benefits of ,stefano iellamo,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 2667,Extensive research in recent years has shown the benefits of ,marceau coupechoux,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 2668,We examine whether a simple agent-based model can generate asset price bubbles and crashes of the type observed in a series of laboratory asset market experiments beginning with the work of Smith Suchanek and Williams (1988). We follow the methodology of Gode and Sunder (1993 1997) and examine the outcomes that obtain when populations of zero-intelligence (ZI) budget constrained artificial agents are placed in the various laboratory market environments that have given rise to price bubbles. We have to put more structure on the behavior of the ZI-agents in order to address features of the laboratory asset bubble environment. We show that our model of “near-zero-intelligence” traders operating in the same double auction environments used in several different laboratory studies generates asset price bubbles and crashes comparable to those observed in laboratory experiments and can also match other more subtle features of the experimental data.,m. unver,Not available,2006.0,10.1007/s00199-004-0570-9,Economic Theory,John2006,False,,Springer,Not available,Asset price bubbles and crashes with near-zero-intelligence traders,58145b5b594735899beafaac2a7e2747,http://dx.doi.org/10.1007/s00199-004-0570-9 2669,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,matt carrick,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2670,Extensive research in recent years has shown the benefits of ,philippe godlewski,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 2671,Carrier collaboration in transportation means multiple carriers form an alliance to optimize their transportation operations through sharing transportation requests and vehicle capacities. In this paper we propose a multi-agent and auction-based framework and approach for carrier collaboration in less than truckload transportation. In this framework the carriers outsource/acquire requests through multiple auctions one for outsourcing each request; a carrier acts as an auctioneer when it wants to outsource a request to other carriers whereas the carrier acts as a bidder when it wants to acquire a request from other carriers; for each carrier which requests it should outsource and acquire are determined by solving its outsourcing requests selection problem and requests bidding problem respectively. These two decision problems are formulated as mixed integer programming problems. The auction of each request is multiround; in each round the auctioneer determines the outsourcing price of the request and each bidder determines whether it acquires the request at the given price; the auctioneer lowers the outsourcing price if multiple carriers bid for the request or raises the price if no carrier bids for it. The auction process continues until only one carrier bids for the request or a given number of rounds are achieved. In the second case if no agent bids for the request then it is returned to the outsourcing agent; if multiple bidding agents compete for the request a conflict resolution procedure is used to determine which carrier wins it. The approach is decentralized asynchronous and dynamic where multiple auctions may occur simultaneously and interact with each other. The performance of the approach is evaluated by randomly generated instances and compared with an individual planning approach and a centralized planning approach.,bo dai,Not available,2011.0,10.1007/s12159-011-0046-9,Logistics Research,Bo2011,False,,Springer,Not available,A multi-agent and auction-based framework and approach for carrier collaboration,7c6728d80d2bb9270511b7697e42502c,http://dx.doi.org/10.1007/s12159-011-0046-9 2672,Carrier collaboration in transportation means multiple carriers form an alliance to optimize their transportation operations through sharing transportation requests and vehicle capacities. In this paper we propose a multi-agent and auction-based framework and approach for carrier collaboration in less than truckload transportation. In this framework the carriers outsource/acquire requests through multiple auctions one for outsourcing each request; a carrier acts as an auctioneer when it wants to outsource a request to other carriers whereas the carrier acts as a bidder when it wants to acquire a request from other carriers; for each carrier which requests it should outsource and acquire are determined by solving its outsourcing requests selection problem and requests bidding problem respectively. These two decision problems are formulated as mixed integer programming problems. The auction of each request is multiround; in each round the auctioneer determines the outsourcing price of the request and each bidder determines whether it acquires the request at the given price; the auctioneer lowers the outsourcing price if multiple carriers bid for the request or raises the price if no carrier bids for it. The auction process continues until only one carrier bids for the request or a given number of rounds are achieved. In the second case if no agent bids for the request then it is returned to the outsourcing agent; if multiple bidding agents compete for the request a conflict resolution procedure is used to determine which carrier wins it. The approach is decentralized asynchronous and dynamic where multiple auctions may occur simultaneously and interact with each other. The performance of the approach is evaluated by randomly generated instances and compared with an individual planning approach and a centralized planning approach.,haoxun chen,Not available,2011.0,10.1007/s12159-011-0046-9,Logistics Research,Bo2011,False,,Springer,Not available,A multi-agent and auction-based framework and approach for carrier collaboration,7c6728d80d2bb9270511b7697e42502c,http://dx.doi.org/10.1007/s12159-011-0046-9 2673,This paper considers the external validity of the growing corpus of literature that reports the use of laboratory auctions to reveal consumers’ willingness to pay for consumer goods when the concerned goods are sold in retail stores through posted price procedures. The quality of the parallel between the field and the lab crucially depends on whether being informed of the actual field price influences a consumer’s willingness to pay for a good or not. We show that the elasticity of the ,laurent muller,Not available,2011.0,10.1007/s10683-010-9262-4,Experimental Economics,Laurent2011,False,,Springer,Not available,Do price-tags influence consumers’ willingness to pay? On the external validity of using auctions for measuring value,cbaa22a6128371d00489bc0d1bc26106,http://dx.doi.org/10.1007/s10683-010-9262-4 2674,This paper considers the external validity of the growing corpus of literature that reports the use of laboratory auctions to reveal consumers’ willingness to pay for consumer goods when the concerned goods are sold in retail stores through posted price procedures. The quality of the parallel between the field and the lab crucially depends on whether being informed of the actual field price influences a consumer’s willingness to pay for a good or not. We show that the elasticity of the ,bernard ruffieux,Not available,2011.0,10.1007/s10683-010-9262-4,Experimental Economics,Laurent2011,False,,Springer,Not available,Do price-tags influence consumers’ willingness to pay? On the external validity of using auctions for measuring value,cbaa22a6128371d00489bc0d1bc26106,http://dx.doi.org/10.1007/s10683-010-9262-4 2675,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,a. mochon,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 2676,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,y. saez,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 2677,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,j. gomez-barroso,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 2678,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,p. isasi,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 2679,We develop an infinite horizon alternative-move model of the unique second-price sponsored search auction. We use this model to explain two distinguishable bidding patterns observed in our bidding data: bidding war cycle and stable bid. With examples we show that only a small portion of the value generated may be extracted by search engines if advertisers are engaged in bidding war cycles. Finally we show the impact of auction design on advertiser bids and search engine revenue.,kursad asdemir,Not available,2011.0,10.1007/s10799-010-0077-y,Information Technology and Management,Kursad2011,False,,Springer,Not available,A dynamic model of bidding patterns in sponsored search auctions,7e3a06cf753d5bffcb339d0530f358ef,http://dx.doi.org/10.1007/s10799-010-0077-y 2680,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,vuk marojevic,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2681,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,zuying wei,Not available,2012.0,10.1007/978-3-642-31869-6_6,Wireless Algorithms Systems and Applications,Zuying2012,False,,Springer,Not available,SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks,e611fc051869ec430c86a8250c1fed72,http://dx.doi.org/10.1007/978-3-642-31869-6_6 2682,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,tianrong zhang,Not available,2012.0,10.1007/978-3-642-31869-6_6,Wireless Algorithms Systems and Applications,Zuying2012,False,,Springer,Not available,SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks,e611fc051869ec430c86a8250c1fed72,http://dx.doi.org/10.1007/978-3-642-31869-6_6 2683,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,fan wu,Not available,2012.0,10.1007/978-3-642-31869-6_6,Wireless Algorithms Systems and Applications,Zuying2012,False,,Springer,Not available,SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks,e611fc051869ec430c86a8250c1fed72,http://dx.doi.org/10.1007/978-3-642-31869-6_6 2684,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,guihai chen,Not available,2012.0,10.1007/978-3-642-31869-6_6,Wireless Algorithms Systems and Applications,Zuying2012,False,,Springer,Not available,SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks,e611fc051869ec430c86a8250c1fed72,http://dx.doi.org/10.1007/978-3-642-31869-6_6 2685,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,xiaofeng gao,Not available,2012.0,10.1007/978-3-642-31869-6_6,Wireless Algorithms Systems and Applications,Zuying2012,False,,Springer,Not available,SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks,e611fc051869ec430c86a8250c1fed72,http://dx.doi.org/10.1007/978-3-642-31869-6_6 2686,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,he huang,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2687,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,yu-e sun,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2688,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,kai xing,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2689,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,hongli xu,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2690,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,xueyong xu,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2691,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,jeffrey reed,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 2692,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,liusheng huang,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 2693,We study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market.For the simplest setting where each seller has one kind of item that can be sold in whole to a buyer and each buyer’s value can be represented by a single parameter i.e. single-parameter setting we develop a maximum mechanism for the market maker to maximize its own revenue.For the more general case where the product may be different we consider various models in terms of supplies and demands constraints. For each of them we develop a polynomial time computable truthful mechanism for the market maker to achieve a revenue at least a constant ,xiaotie deng,Not available,2012.0,10.1007/978-3-642-35261-4_71,Algorithms and Computation,Xiaotie2012,False,,Springer,Not available,Revenue Maximization in a Bayesian Double Auction Market,2dabd2b070933fdfcdf1ceb2caa2e75d,http://dx.doi.org/10.1007/978-3-642-35261-4_71 2694,We study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market.For the simplest setting where each seller has one kind of item that can be sold in whole to a buyer and each buyer’s value can be represented by a single parameter i.e. single-parameter setting we develop a maximum mechanism for the market maker to maximize its own revenue.For the more general case where the product may be different we consider various models in terms of supplies and demands constraints. For each of them we develop a polynomial time computable truthful mechanism for the market maker to achieve a revenue at least a constant ,paul goldberg,Not available,2012.0,10.1007/978-3-642-35261-4_71,Algorithms and Computation,Xiaotie2012,False,,Springer,Not available,Revenue Maximization in a Bayesian Double Auction Market,2dabd2b070933fdfcdf1ceb2caa2e75d,http://dx.doi.org/10.1007/978-3-642-35261-4_71 2695,We study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market.For the simplest setting where each seller has one kind of item that can be sold in whole to a buyer and each buyer’s value can be represented by a single parameter i.e. single-parameter setting we develop a maximum mechanism for the market maker to maximize its own revenue.For the more general case where the product may be different we consider various models in terms of supplies and demands constraints. For each of them we develop a polynomial time computable truthful mechanism for the market maker to achieve a revenue at least a constant ,bo tang,Not available,2012.0,10.1007/978-3-642-35261-4_71,Algorithms and Computation,Xiaotie2012,False,,Springer,Not available,Revenue Maximization in a Bayesian Double Auction Market,2dabd2b070933fdfcdf1ceb2caa2e75d,http://dx.doi.org/10.1007/978-3-642-35261-4_71 2696,We study double auction market design where the market maker wants to maximize its total revenue by buying low from the sellers and selling high to the buyers. We consider a Bayesian setting where buyers and sellers have independent probability distributions on the values of products on the market.For the simplest setting where each seller has one kind of item that can be sold in whole to a buyer and each buyer’s value can be represented by a single parameter i.e. single-parameter setting we develop a maximum mechanism for the market maker to maximize its own revenue.For the more general case where the product may be different we consider various models in terms of supplies and demands constraints. For each of them we develop a polynomial time computable truthful mechanism for the market maker to achieve a revenue at least a constant ,jinshan zhang,Not available,2012.0,10.1007/978-3-642-35261-4_71,Algorithms and Computation,Xiaotie2012,False,,Springer,Not available,Revenue Maximization in a Bayesian Double Auction Market,2dabd2b070933fdfcdf1ceb2caa2e75d,http://dx.doi.org/10.1007/978-3-642-35261-4_71 2697,Recently strategic behavior modeling has gained much attention in the area of service overlay networks. Since the users (peers) of these networks usually belong to different administrative domains they do not tend to cooperate with each other resulting in selfish behavior and hence degradation of the performance of the network. In this chapter we bring about a solution inspired from microeconomics. We propose a revenue-maximizing auction by considering the bandwidth of the service offered by the origin server as the commodity. In this mechanism the content providers play the role of auctioneer and the corresponding downstream peers play the role of buyers (bidders). Moreover we have calculated some interesting upper bounds for the number of overlay hops which can be used as a worst-case metric for performance evaluation of such networks.,mohammad rezvani,Not available,2012.0,10.1007/978-1-4419-8849-2_14,2011 International Conference in Electrics Communication and Automatic Control Proceedings,Hossein2012,False,,Springer,Not available,An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops,841b41cf93694e42bb8340f4aeae09cd,http://dx.doi.org/10.1007/978-1-4419-8849-2_14 2698,Recently strategic behavior modeling has gained much attention in the area of service overlay networks. Since the users (peers) of these networks usually belong to different administrative domains they do not tend to cooperate with each other resulting in selfish behavior and hence degradation of the performance of the network. In this chapter we bring about a solution inspired from microeconomics. We propose a revenue-maximizing auction by considering the bandwidth of the service offered by the origin server as the commodity. In this mechanism the content providers play the role of auctioneer and the corresponding downstream peers play the role of buyers (bidders). Moreover we have calculated some interesting upper bounds for the number of overlay hops which can be used as a worst-case metric for performance evaluation of such networks.,morteza analoui,Not available,2012.0,10.1007/978-1-4419-8849-2_14,2011 International Conference in Electrics Communication and Automatic Control Proceedings,Hossein2012,False,,Springer,Not available,An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops,841b41cf93694e42bb8340f4aeae09cd,http://dx.doi.org/10.1007/978-1-4419-8849-2_14 2699,In a combinatorial auction (CA) with item bidding several goods are sold simultaneously via single-item auctions. We study how the equilibrium performance of such an auction depends on the choice of the underlying single-item auction. We provide a thorough understanding of the price of anarchy as a function of the single-item auction payment rule.When the payment rule depends on the winner’s bid as in a first-price auction we characterize the worst-case price of anarchy in the corresponding CAs with item bidding in terms of a sensitivity measure of the payment rule. As a corollary we show that equilibrium existence guarantees broader than that of the first-price rule can only be achieved by sacrificing its property of having only fully efficient (pure) Nash equilibria.For payment rules that are independent of the winner’s bid we prove a strong optimality result for the canonical second-price auction. First its set of pure Nash equilibria is always a superset of that of every other payment rule. Despite this its worst-case POA is no worse than that of any other payment rule that is independent of the winner’s bid.,kshipra bhawalkar,Not available,2012.0,10.1007/978-3-642-35311-6_25,Internet and Network Economics,Kshipra2012,False,,Springer,Not available,Simultaneous Single-Item Auctions,579e64725586edcb010e3832e0161bc8,http://dx.doi.org/10.1007/978-3-642-35311-6_25 2700,In a combinatorial auction (CA) with item bidding several goods are sold simultaneously via single-item auctions. We study how the equilibrium performance of such an auction depends on the choice of the underlying single-item auction. We provide a thorough understanding of the price of anarchy as a function of the single-item auction payment rule.When the payment rule depends on the winner’s bid as in a first-price auction we characterize the worst-case price of anarchy in the corresponding CAs with item bidding in terms of a sensitivity measure of the payment rule. As a corollary we show that equilibrium existence guarantees broader than that of the first-price rule can only be achieved by sacrificing its property of having only fully efficient (pure) Nash equilibria.For payment rules that are independent of the winner’s bid we prove a strong optimality result for the canonical second-price auction. First its set of pure Nash equilibria is always a superset of that of every other payment rule. Despite this its worst-case POA is no worse than that of any other payment rule that is independent of the winner’s bid.,tim roughgarden,Not available,2012.0,10.1007/978-3-642-35311-6_25,Internet and Network Economics,Kshipra2012,False,,Springer,Not available,Simultaneous Single-Item Auctions,579e64725586edcb010e3832e0161bc8,http://dx.doi.org/10.1007/978-3-642-35311-6_25 2701,This paper proposes an incentive-based bandwidth allocation for scalable streaming in P2P networks. It is modeled as decentralized dynamic auction games in which the peers sell and bid the upload bandwidth for the maximum individual benefit. With the unique characteristic of SVC the content-aware prioritization of SVC is imposed on the underlying bandwidth auction in order to avoid bandwidth wastage and improve the overall video quality at all peers. Also an incentive mechanism is employed to resolve ,lin chen,Not available,2012.0,10.1007/978-3-642-34595-1_50,Advances on Digital Television and Wireless Multimedia Communications,Lin2012,False,,Springer,Not available,Incentive-Based Bandwidth Auction for Scalable Streaming in Peer-to-Peer Networks,5d7c5d7ef82d44daf86c0ebc5464eba2,http://dx.doi.org/10.1007/978-3-642-34595-1_50 2702,This paper constructs a novel equilibrium in the chopstick auction of Szentes and Rosenthal (Games Econ Behav 44(1):114–133 ,christian ewerhart,Not available,2017.0,10.1007/s00199-017-1052-1,Economic Theory,Christian2017,True,,Springer,Not available,A “fractal” solution to the chopstick auction,d9e947300ceb02518dbb8d3e8b307c1c,http://dx.doi.org/10.1007/s00199-017-1052-1 2703,This paper proposes an incentive-based bandwidth allocation for scalable streaming in P2P networks. It is modeled as decentralized dynamic auction games in which the peers sell and bid the upload bandwidth for the maximum individual benefit. With the unique characteristic of SVC the content-aware prioritization of SVC is imposed on the underlying bandwidth auction in order to avoid bandwidth wastage and improve the overall video quality at all peers. Also an incentive mechanism is employed to resolve ,junni zou,Not available,2012.0,10.1007/978-3-642-34595-1_50,Advances on Digital Television and Wireless Multimedia Communications,Lin2012,False,,Springer,Not available,Incentive-Based Bandwidth Auction for Scalable Streaming in Peer-to-Peer Networks,5d7c5d7ef82d44daf86c0ebc5464eba2,http://dx.doi.org/10.1007/978-3-642-34595-1_50 2704,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,yeon-koo che,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 2705,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,syngjoo choi,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 2706,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,jinwoo kim,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 2707,We review some mathematical programming models that capture the optimal bidding problem that power producers face in day-ahead electricity auction markets. The models consider both price-taking and non-price taking assumptions. The models include linear and non-linear integer programming models mathematical programs with equilibrium constraints and stochastic programming models with recourse. Models are emphasized where the producer must self-schedule units and therefore must integrate optimal bidding with unit commitment decisions. We classify models according to whether competition from competing producers is directly incorporated in the model.,roy kwon,Not available,2012.0,10.1007/978-3-642-23193-3_2,Handbook of Networks in Power Systems I,H.2012,False,,Springer,Not available,Optimization-Based Bidding in Day-Ahead Electricity Auction Markets: A Review of Models for Power Producers,f8d6b73d7774650b46593df8109cd605,http://dx.doi.org/10.1007/978-3-642-23193-3_2 2708,We review some mathematical programming models that capture the optimal bidding problem that power producers face in day-ahead electricity auction markets. The models consider both price-taking and non-price taking assumptions. The models include linear and non-linear integer programming models mathematical programs with equilibrium constraints and stochastic programming models with recourse. Models are emphasized where the producer must self-schedule units and therefore must integrate optimal bidding with unit commitment decisions. We classify models according to whether competition from competing producers is directly incorporated in the model.,daniel frances,Not available,2012.0,10.1007/978-3-642-23193-3_2,Handbook of Networks in Power Systems I,H.2012,False,,Springer,Not available,Optimization-Based Bidding in Day-Ahead Electricity Auction Markets: A Review of Models for Power Producers,f8d6b73d7774650b46593df8109cd605,http://dx.doi.org/10.1007/978-3-642-23193-3_2 2709,Sponsored search auctions are the main source of revenue for search engines. In such an auction a set of utility-maximizing advertisers compete for a set of ad slots. The assignment of advertisers to slots depends on bids they submit; these bids may be different than the true valuations of the advertisers for the slots. Variants of the celebrated VCG auction mechanism guarantee that advertisers act truthfully and under mild assumptions lead to revenue or social welfare maximization. Still the sponsored search industry mostly uses generalized second price (GSP) auctions; these auctions are known to be non-truthful and suboptimal in terms of social welfare and revenue. In an attempt to explain this tradition we study a Bayesian setting where the valuations of advertisers are drawn independently from a regular probability distribution. In this setting it is well known by the work of Myerson (1981) that the optimal revenue is obtained by the VCG mechanism with a particular reserve price that depends on the probability distribution. We show that by appropriately setting the reserve price the revenue over any Bayes-Nash equilibrium of the game induced by the GSP auction is at most a small constant fraction of the optimal revenue improving recent results of Lucier Paes Leme and Tardos (2012). Our analysis is based on the Bayes-Nash equilibrium conditions and on the properties of regular probability distributions .,ioannis caragiannis,Not available,2012.0,10.1007/978-3-642-33090-2_23,Algorithms – ESA 2012,Ioannis2012,False,,Springer,Not available,Revenue Guarantees in Sponsored Search Auctions,43ecd2f24beff4974593dbaef1187fa7,http://dx.doi.org/10.1007/978-3-642-33090-2_23 2710,Sponsored search auctions are the main source of revenue for search engines. In such an auction a set of utility-maximizing advertisers compete for a set of ad slots. The assignment of advertisers to slots depends on bids they submit; these bids may be different than the true valuations of the advertisers for the slots. Variants of the celebrated VCG auction mechanism guarantee that advertisers act truthfully and under mild assumptions lead to revenue or social welfare maximization. Still the sponsored search industry mostly uses generalized second price (GSP) auctions; these auctions are known to be non-truthful and suboptimal in terms of social welfare and revenue. In an attempt to explain this tradition we study a Bayesian setting where the valuations of advertisers are drawn independently from a regular probability distribution. In this setting it is well known by the work of Myerson (1981) that the optimal revenue is obtained by the VCG mechanism with a particular reserve price that depends on the probability distribution. We show that by appropriately setting the reserve price the revenue over any Bayes-Nash equilibrium of the game induced by the GSP auction is at most a small constant fraction of the optimal revenue improving recent results of Lucier Paes Leme and Tardos (2012). Our analysis is based on the Bayes-Nash equilibrium conditions and on the properties of regular probability distributions .,christos kaklamanis,Not available,2012.0,10.1007/978-3-642-33090-2_23,Algorithms – ESA 2012,Ioannis2012,False,,Springer,Not available,Revenue Guarantees in Sponsored Search Auctions,43ecd2f24beff4974593dbaef1187fa7,http://dx.doi.org/10.1007/978-3-642-33090-2_23 2711,Sponsored search auctions are the main source of revenue for search engines. In such an auction a set of utility-maximizing advertisers compete for a set of ad slots. The assignment of advertisers to slots depends on bids they submit; these bids may be different than the true valuations of the advertisers for the slots. Variants of the celebrated VCG auction mechanism guarantee that advertisers act truthfully and under mild assumptions lead to revenue or social welfare maximization. Still the sponsored search industry mostly uses generalized second price (GSP) auctions; these auctions are known to be non-truthful and suboptimal in terms of social welfare and revenue. In an attempt to explain this tradition we study a Bayesian setting where the valuations of advertisers are drawn independently from a regular probability distribution. In this setting it is well known by the work of Myerson (1981) that the optimal revenue is obtained by the VCG mechanism with a particular reserve price that depends on the probability distribution. We show that by appropriately setting the reserve price the revenue over any Bayes-Nash equilibrium of the game induced by the GSP auction is at most a small constant fraction of the optimal revenue improving recent results of Lucier Paes Leme and Tardos (2012). Our analysis is based on the Bayes-Nash equilibrium conditions and on the properties of regular probability distributions .,panagiotis kanellopoulos,Not available,2012.0,10.1007/978-3-642-33090-2_23,Algorithms – ESA 2012,Ioannis2012,False,,Springer,Not available,Revenue Guarantees in Sponsored Search Auctions,43ecd2f24beff4974593dbaef1187fa7,http://dx.doi.org/10.1007/978-3-642-33090-2_23 2712,Sponsored search auctions are the main source of revenue for search engines. In such an auction a set of utility-maximizing advertisers compete for a set of ad slots. The assignment of advertisers to slots depends on bids they submit; these bids may be different than the true valuations of the advertisers for the slots. Variants of the celebrated VCG auction mechanism guarantee that advertisers act truthfully and under mild assumptions lead to revenue or social welfare maximization. Still the sponsored search industry mostly uses generalized second price (GSP) auctions; these auctions are known to be non-truthful and suboptimal in terms of social welfare and revenue. In an attempt to explain this tradition we study a Bayesian setting where the valuations of advertisers are drawn independently from a regular probability distribution. In this setting it is well known by the work of Myerson (1981) that the optimal revenue is obtained by the VCG mechanism with a particular reserve price that depends on the probability distribution. We show that by appropriately setting the reserve price the revenue over any Bayes-Nash equilibrium of the game induced by the GSP auction is at most a small constant fraction of the optimal revenue improving recent results of Lucier Paes Leme and Tardos (2012). Our analysis is based on the Bayes-Nash equilibrium conditions and on the properties of regular probability distributions .,maria kyropoulou,Not available,2012.0,10.1007/978-3-642-33090-2_23,Algorithms – ESA 2012,Ioannis2012,False,,Springer,Not available,Revenue Guarantees in Sponsored Search Auctions,43ecd2f24beff4974593dbaef1187fa7,http://dx.doi.org/10.1007/978-3-642-33090-2_23 2713,We focus on the optimal strategy for an agent aiming to purchase a maximum number of items with a limited budget and in an algorithmic way when participating in a large number of Vickrey auctions. The auctions arise on a set of auction-servers with the algorithm choosing its bid-level on each server. We propose a statistical approach rather than a game-theoretical one such that under reasonable hypothesis we can obtain closed formulas for the optimal bidding strategy. We show how this applies to real-time bidding auctions in advertising we highlight some operational benefits of the model and also discuss how our results apply to different types of auction mechanism.,joaquin fernandez-tapia,Not available,2017.0,10.1007/s11590-016-1045-1,Optimization Letters,Joaquin2017,False,,Springer,Not available,Statistical modeling of Vickrey auctions and applications to automated bidding strategies,72102503d735d66085ae34e606751522,http://dx.doi.org/10.1007/s11590-016-1045-1 2714,We provide a framework justifying the use of nonatomic limit model approximations to analyze the large market behavior of otherwise intractable game-theoretic models. We demonstrate continuity requirements on the economic primitives sufficient for the equilibrium strategies of the two models to converge as the number of participants in the large finite game approaches infinity. We apply our analysis framework to show that the equilibrium of a large interdependent values uniform price auction model where bidders have complementary preferences for multiple units can be approximated by a nonatomic exchange economy. We prove that the uniform price auction asymptotically aggregates idiosyncratic bidder information into market price and that the uniform price auction is approximately efficient with a large number of participants in the private values or single unit demand case.,aaron bodoh-creed,Not available,2012.0,10.1007/978-3-642-30913-7_13,Auctions Market Mechanisms and Their Applications,Aaron2012,False,,Springer,Not available,Approximation of Large Games with Applications to Uniform Price Auctions,3819489ec0e94c114106ceff5d48f40c,http://dx.doi.org/10.1007/978-3-642-30913-7_13 2715,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,john kagel,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 2716,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,dan levin,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 2717,Comparative static tests of Nash bidding theory in second-price common value auctions show that bidders fail to respond in the right direction to more rivals and to public information concerning the value of the item. The former provides a clear indication that bidders fail to appreciate the adverse selection forces inherent in common value auctions while the latter shows that policy prescriptions can fail given out-of-equilibrium behavior. These tests of Nash bidding theory apply to a far wider variety of circumstances than in first-price auctions so there is less scope to rationalize the failure of the theory.,ronald harstad,Not available,1995.0,10.1007/BF01243157,International Journal of Game Theory,H.1995,False,,Springer,Not available,Comparative static effects of number of bidders and public information on behavior in second-price common value auctions,856e279e5407921bbc8d76f01c4a852f,http://dx.doi.org/10.1007/BF01243157 2718,Experiments on first-price sealed-bid auctions with independent private values have shown that submitted bids typically exceed Nash-equilibrium predictions for risk-neutral bidders. Existing bidding models explain this phenomenon by assuming that the bidders are risk-averse and capable of drawing complete and correct inferences about their winning probabilities. In this article we use the Choquet expected utility (CEU) theory to demonstrate that the observed bidding behavior can also be attributed to ambiguity aversion which causes the bidders to underestimate their chances of winning the auction. Empirical support for CEU bidding models is given through an analysis of recent bidding data.,ahtia salo,Not available,1995.0,10.1007/BF01067681,Journal of Risk and Uncertainty,Ahtia1995,False,,Springer,Not available,Ambiguity aversion in first-price sealed-bid auctions,2c9e3e51c36450295bdfc428d9be46be,http://dx.doi.org/10.1007/BF01067681 2719,Experiments on first-price sealed-bid auctions with independent private values have shown that submitted bids typically exceed Nash-equilibrium predictions for risk-neutral bidders. Existing bidding models explain this phenomenon by assuming that the bidders are risk-averse and capable of drawing complete and correct inferences about their winning probabilities. In this article we use the Choquet expected utility (CEU) theory to demonstrate that the observed bidding behavior can also be attributed to ambiguity aversion which causes the bidders to underestimate their chances of winning the auction. Empirical support for CEU bidding models is given through an analysis of recent bidding data.,martin weber,Not available,1995.0,10.1007/BF01067681,Journal of Risk and Uncertainty,Ahtia1995,False,,Springer,Not available,Ambiguity aversion in first-price sealed-bid auctions,2c9e3e51c36450295bdfc428d9be46be,http://dx.doi.org/10.1007/BF01067681 2720,In many existing markets demanders wish to buy more than one unit from a group of identical units of a commodity. Often the units are sold simultaneously by auction. The vast majority of literature pertaining to the economics of auctions however considers environments in which demanders buy at most one object. In this paper we derive necessary and sufficient conditions for a set of bidding strategies to be a symmetric monotone Bayes-Nash equilibrium to a uniform price sealed bid auction using the “first rejected bid pricing rule” in an independent private values environment with two-unit demands. In any symmetric monotone Bayes-Nash equilibrium all bidders submit one bid equal to their higher valuation and one bid lower than their lower valuation. We characterize the equilibrium and derive the exact amount of underrevelation in the lower bid.,charles noussair,Not available,1995.0,10.1007/BF01215207,Economic Theory,Charles1995,False,,Springer,Not available,Equilibria in a multi-object uniform price sealed bid auction with multi-unit demands,e7c2a3f3800c63c08608e47973199117,http://dx.doi.org/10.1007/BF01215207 2721,We report an exploratory study of the process of price formation in a speculative market in the absence of liquidity traders. Traders exchange a futures contract because they interpret information differently. We formulate trading as a sequence of anonymous double auctions and introduce a notion of bounded rationality in which traders use approximate models of market response in forming their bids. We prove existence of a perfect equilibrium in the sequential anonymous auctions game and show that the equilibrium has a “no-regret” property. After learning the market price a trader regrets neither the bid that he made nor the position that he holds. We show that trading volume is related to changes in the distribution of information in the economy. We also show that volume and expected change in price are related to two different attributes of the pattern of private information flow. Fundamentally no particular relationship between the time series of these variables is always valid for all futures contracts. This point is emphasized by an example.,ayman hindy,Not available,1994.0,10.1007/BF01213623,Economic Theory,Ayman1994,False,,Springer,Not available,Dynamic price formation in a futures market via double auctions,5bb256056676112d04d19e52b6423634,http://dx.doi.org/10.1007/BF01213623 2722,Recent downturns in real estate markets combined with a general acceptance of auctions have resulted in an unprecedented number of auction sales. A need therefore exists for the further development of real estate auction models that can provide insights into this emerging market institution. To facilitate this task a survey of auction theory as pertaining to its application in real estate markets is provided in this paper. Topics addressed includes bidding equilibria the role of reserve prices information disclosure the decision to use auctions bidder participation and multiple-object sales. An overview of empirical studies in this area is also provided.,daniel quan,Not available,1994.0,10.1007/BF01153587,The Journal of Real Estate Finance and Economics,C.1994,False,,Springer,Not available,Real estate auctions: A survey of theory and practice,5015f690b2502fd09359a6a77fd05363,http://dx.doi.org/10.1007/BF01153587 2723,A sequential auction of commercial properties produced evidence that bid timing matters. Prices declined as the auction proceeded an outcome consistent with expectations when bidders are either risk averse or quantity constrained.,kenneth lusht,Not available,1994.0,10.1007/BF01096996,The Journal of Real Estate Finance and Economics,M.1994,False,,Springer,Not available,Order and price in a sequential auction,740e397813c18e25e1a05084e3bea7cc,http://dx.doi.org/10.1007/BF01096996 2724,Stock market is a complex system composed from heterogeneous traders with highly non-linear interactions from which emerge a phenomenon of speculative bubble. To understand the role of heterogeneous behaviors of traders and interactions between them in the emergence of bubbles we propose an agent-based model of double auction market with asynchronous time management where traders act asynchronously and take different times to make decisions. The market is populated by heterogeneous traders. In addition to fundamentalist noise and technical (chartist) traders we propose a hybrid trader which can switch between technical (chartist) and fundamentalist strategies integrating panicking behavior. We find that when market is populated by a majority of hybrid traders we observe quite realistic bubble formation characterized by a boom phase when hybrid traders switch to technical behavior followed by a relatively shorter burst phase when hybrid traders return to fundamentalist strategy and change to panicked state. The aim is to design agents which act asynchronously with simple behaviors but complex enough to produce realistic price dynamics which provide a basis for developing agents with sophisticated decision-making processes.,sadek benhammada,Not available,2017.0,10.1007/s00354-017-0010-6,New Generation Computing,Sadek2017,False,,Springer,Not available,An Asynchronous Double Auction Market to Study the Formation of Financial Bubbles and Crashes,2b591c83c66ce37c2abb784c2fb4a53e,http://dx.doi.org/10.1007/s00354-017-0010-6 2725,Within the class dominant strategy incentive compatible mechanisms we show that there exists an optimal contracting mechanism for the principal for a version of the incomplete information principal-agent problem in which several agents compete for a contract and the principal selects an agent via a contract auction. In our auction model we assume that the principal and the agents are risk averse and we allow for uncountably many agent types. We also assume that the principal's probability measure over type profiles in such that correlation between agent's types is possible. Thus we do not require that agents' types be independently distributed. Finally we impose limited liability constraints upon the set of contracts. Due to the nature of the individual rationality and incentive compatibility constraints the existence problem is nonstandard and novel existence arguments are required. We prove existence using a measurable selection result and a new notion of compactness called K-compactness.,frank page,Not available,1994.0,10.1007/BF01242844,International Journal of Game Theory,Jr.1994,False,,Springer,Not available,Dominant strategy mechanisms for contract auctions with risk aversion and moral hazard,165dfddec2c7878bb55883cea20ccec9,http://dx.doi.org/10.1007/BF01242844 2726,A unique feature of land auctions is that the same land is auctioned twice; first the land is broken into tracts and each tract is auctioned individually. Then the tracts are reassembled and auctioned as a whole parcel. After the two auctions are completed the seller chooses the one that generates a higher revenue. The main purpose of this paper is to provide an explanation of why such an auction design is employed to sell farmland. We also show that this feature of land auctions leads to interesting interaction among the bidding strategies of the players in each of the two auction stages.,peter colwell,Not available,1994.0,10.1007/BF01097034,The Journal of Real Estate Finance and Economics,F.1994,False,,Springer,Not available,The demand for agricultural land and strategic bidding in auctions,c4a3df4b098d6eb53a68300307cc0e03,http://dx.doi.org/10.1007/BF01097034 2727,A unique feature of land auctions is that the same land is auctioned twice; first the land is broken into tracts and each tract is auctioned individually. Then the tracts are reassembled and auctioned as a whole parcel. After the two auctions are completed the seller chooses the one that generates a higher revenue. The main purpose of this paper is to provide an explanation of why such an auction design is employed to sell farmland. We also show that this feature of land auctions leads to interesting interaction among the bidding strategies of the players in each of the two auction stages.,abdullah yavas,Not available,1994.0,10.1007/BF01097034,The Journal of Real Estate Finance and Economics,F.1994,False,,Springer,Not available,The demand for agricultural land and strategic bidding in auctions,c4a3df4b098d6eb53a68300307cc0e03,http://dx.doi.org/10.1007/BF01097034 2728,In this paper a surveyis given of some recent results concerning the solutions and applications of sealed bid auctions whichare also called market games by economists. A historical discussion of the problemis given followed by the formulation of the problem as a maximizing linear program. Economic interpretations of the solutionto the linear program are made with the interpretations of the dual variables being seller prices and buyer surpluses. The ,gerald thompson,Not available,1994.0,10.1007/978-94-011-0770-9_1,New Directions in Computational Economics,L.1994,False,,Springer,Not available,Sealed Bid Auctions and Economic Market Games,057a9a5efee467edbe2b5d8e8fb14e53,http://dx.doi.org/10.1007/978-94-011-0770-9_1 2729,,stephen rassenti,Not available,1994.0,10.1007/BF01211118,Economic Theory,J.1994,False,,Springer,Not available,Cotenancy and competition in an experimental auction market for natural gas pipeline networks,3dc2354bf0ab6ce29a03908b1741e487,http://dx.doi.org/10.1007/BF01211118 2730,,stanley reynolds,Not available,1994.0,10.1007/BF01211118,Economic Theory,J.1994,False,,Springer,Not available,Cotenancy and competition in an experimental auction market for natural gas pipeline networks,3dc2354bf0ab6ce29a03908b1741e487,http://dx.doi.org/10.1007/BF01211118 2731,,vernon smit,Not available,1994.0,10.1007/BF01211118,Economic Theory,J.1994,False,,Springer,Not available,Cotenancy and competition in an experimental auction market for natural gas pipeline networks,3dc2354bf0ab6ce29a03908b1741e487,http://dx.doi.org/10.1007/BF01211118 2732,We propose a simple adaptive learning model to study behavior in the call market. The laboratory environment features buyers and sellers who receive a new random value or cost in each period so they must learn a strategy that maps these random draws into bids or asks. We focus on buyers' adjustment of the “mark-down” ratio of bids relative to private value and sellers' adjustment of the corresponding “mark-up” ratio of asks relative to private cost. The learning model involves partial adjustment of these ratios towards the ex post optimum each period. The model explains a substantial proportion of the variation in traders' strategies. Parameter estimates indicate strong recency effects and negligible autonomous trend but strongly asymmetric response to different kinds of ex post error. The asymmetry is only slightly attenuated in “observational learning” from other traders' ex post errors. Simulations show that the model can account for the main systematic deviations from equilibrium predictions observed in this market institution and environment.,timothy cason,Not available,1999.0,10.1023/A:1009981800289,Experimental Economics,N.1999,False,,Springer,Not available,Learning in a Laboratory Market with Random Supply and Demand,da6830c3d309de30d7734ded707ca493,http://dx.doi.org/10.1023/A:1009981800289 2733,We propose a simple adaptive learning model to study behavior in the call market. The laboratory environment features buyers and sellers who receive a new random value or cost in each period so they must learn a strategy that maps these random draws into bids or asks. We focus on buyers' adjustment of the “mark-down” ratio of bids relative to private value and sellers' adjustment of the corresponding “mark-up” ratio of asks relative to private cost. The learning model involves partial adjustment of these ratios towards the ex post optimum each period. The model explains a substantial proportion of the variation in traders' strategies. Parameter estimates indicate strong recency effects and negligible autonomous trend but strongly asymmetric response to different kinds of ex post error. The asymmetry is only slightly attenuated in “observational learning” from other traders' ex post errors. Simulations show that the model can account for the main systematic deviations from equilibrium predictions observed in this market institution and environment.,daniel friedman,Not available,1999.0,10.1023/A:1009981800289,Experimental Economics,N.1999,False,,Springer,Not available,Learning in a Laboratory Market with Random Supply and Demand,da6830c3d309de30d7734ded707ca493,http://dx.doi.org/10.1023/A:1009981800289 2734,The study investigates collusion-nonfacilitating features of one-sided auctions. We report the results of oral nondescending bid auction experiments in which the strict bid improvement rule was absent and compare them with the results of sealed bid auction experiments. In the sealed bid experiments the outcomes converged to the competitive equilibrium. In the oral auctions collusive outcomes emerged and were sustained with bidders using bid matching strategies. We conclude that oral auctions provide opportunities for tacit coordination and collusion enforcement that do not exist under the sealed bid. Therefore the strict bid improvement rule becomes critical for breaking collusion.,katerina sherstyuk,Not available,1999.0,10.1023/A:1009929832148,Experimental Economics,Katerina1999,False,,Springer,Not available,Collusion Without Conspiracy: An Experimental Study of One-Sided Auctions,737a0282df62ad9239b69edf8032af1a,http://dx.doi.org/10.1023/A:1009929832148 2735,Stock market is a complex system composed from heterogeneous traders with highly non-linear interactions from which emerge a phenomenon of speculative bubble. To understand the role of heterogeneous behaviors of traders and interactions between them in the emergence of bubbles we propose an agent-based model of double auction market with asynchronous time management where traders act asynchronously and take different times to make decisions. The market is populated by heterogeneous traders. In addition to fundamentalist noise and technical (chartist) traders we propose a hybrid trader which can switch between technical (chartist) and fundamentalist strategies integrating panicking behavior. We find that when market is populated by a majority of hybrid traders we observe quite realistic bubble formation characterized by a boom phase when hybrid traders switch to technical behavior followed by a relatively shorter burst phase when hybrid traders return to fundamentalist strategy and change to panicked state. The aim is to design agents which act asynchronously with simple behaviors but complex enough to produce realistic price dynamics which provide a basis for developing agents with sophisticated decision-making processes.,frederic amblard,Not available,2017.0,10.1007/s00354-017-0010-6,New Generation Computing,Sadek2017,False,,Springer,Not available,An Asynchronous Double Auction Market to Study the Formation of Financial Bubbles and Crashes,2b591c83c66ce37c2abb784c2fb4a53e,http://dx.doi.org/10.1007/s00354-017-0010-6 2736, Auctioneers often face the decision of whether to bundle two or more different objects before selling them. Under a Vickrey auction (or any other revenue equivalent auction form) there is a unique critical number for each pair of objects such that when the number of bidders is fewer than that critical number the seller strictly prefers a bundled sale and when there are more bidders the seller prefers unbundled sales. This property holds even when the valuations for the objects are correlated for a given bidder. The results have been proved using a mathematical technique of quantiles that can be extremely useful for similar analysis.,indranil chakraborty,Not available,1999.0,10.1007/s001990050278,Economic Theory,Indranil1999,False,,Springer,Not available,Bundling decisions for selling multiple objects,66bbc713de23aa77fc4f9901394c3a3e,http://dx.doi.org/10.1007/s001990050278 2737, This paper looks at the determination of ownership of capacity when there are two ex-ante symmetric agents bidding for many units of capacity which are sold sequentially. It is shown that convexity of payoffs in the final stage of the game is sufficient to ensure monopolization of capacity but that increasing returns to scale are not sufficient to ensure monopolization.,kala krishna,Not available,1999.0,10.1007/s001990050260,Economic Theory,Kala1999,False,,Springer,Not available,Auctions with endogenous valuations: the snowball effect revisited,14f81037029bcbf1dbf15b744ce94685,http://dx.doi.org/10.1007/s001990050260 2738, The Federal Communications Commission currently utilizes a simultaneous multi-round ascending bid auction to allocate Personal Communication Services licenses. In the auction participants are allowed to withdraw standing bids at a penalty. The penalty is equal to the maximum of zero or the difference between the value of the withdrawn bid on a license and the highest bid after the withdrawal on that license. The withdrawal rule is designed to assist bidders wishing to assemble combinations of licenses who find themselves stranded with an assortment of licenses for which their bids sum to more than their value. This paper reports results of experiments that examine the effect of the withdrawal rule in environments in which losses can occur if packages of licenses must be assembled piecemeal. The experiments demonstrate that there is a tradeoff with using the rule: efficiency and revenue increase but individual losses are larger. Furthermore the increased efficiency does not outweigh the higher prices paid so that bidder surplus falls in the presence of the withdrawal rule.,david porter,Not available,1999.0,10.1007/s100580050027,Review of Economic Design,P.1999,False,,Springer,Not available,The effect of bid withdrawal in a multi-object auction,5928b7b8e4e29c4a1a43bb7342d8e537,http://dx.doi.org/10.1007/s100580050027 2739,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,david parkes,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 2740,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,lyle ungar,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 2741,Many auction mechanisms includingfirst and second price ascendingand sealed bid auctions have been proposed and analyzed in the economics literature. We compare the usefulness of different mechanisms for on-line auctions focusingon the cognitive costs placed on users (e.g. the cost of determining the value of a good) the possibilities for agent mediation and the trust properties of the auction. Different auction formats prove to be attractive for agent mediated on-line auctions than for traditional off-line auctions. For example second price sealed bid auctions are attractive in traditional auctions because they avoid the communication cost of multiple bids in first price ascendingauctions and the “gaming” required to estimate the second highest bid in first price sealed bid auctions. However when biddingag ents are cheap communication costs cease to be important and a progressive auction mechanism is preferred over a closed bid auction mechanism since users with semi-autonomous agents can avoid the cognitive cost of placing an accurate value on a good. As another example when an on-line auction is beingconducted by an untrusted auctioneer (e.g. the auctioneer is sellingits own items) rational participants will build biddingag ents that transform second price auctions into first price auctions.,dean foster,Not available,1999.0,10.1007/3-540-48835-9_2,Agent Mediated Electronic Commerce,C.1999,False,,Springer,Not available,Accounting for Cognitive Costs in On-line Auction Design,869d4858183f7c9d03422ef9d6f3d505,http://dx.doi.org/10.1007/3-540-48835-9_2 2742, It is widely believed that the English auction is solved after the dominated strategies are eliminated. This paper demonstrates that the dominance criterion is not very effective in many English auction models. To bid more than the true willingness to pay is dominated but a stronger solution concept is needed to deduce that the buyers increase the price in small steps up to their valuation. An iterated application of the dominance criterion does not solve the problem but if it is assumed that the buyers use their maximin strategies the usual argument holds.,ulrich kamecke,Not available,1998.0,10.1007/s001820050081,International Journal of Game Theory,Ulrich1998,False,,Springer,Not available,Dominance or maximin: How to solve an English auction,bf6f303d47a1759deb5fbeccbf693bde,http://dx.doi.org/10.1007/s001820050081 2743, The behavioral properties of several auctions designed to elicit individual valuations for an object are studied using controlled laboratory experiments. Our experiments lead us to conclude that there ,e. rutstrom,Not available,1998.0,10.1007/s001820050082,International Journal of Game Theory,Elisabet1998,False,,Springer,Not available,Home-grown values and incentive compatible auction design,422c207c9cb51daa628b93aeca027196,http://dx.doi.org/10.1007/s001820050082 2744,Suppose a seller wants to sell k similar or identical objects and there are n > k potential buyers. Suppose that each buyer wants only one object. In this case we suggest the use of a simultaneous auction that would work as follows. Players are asked to submit sealed bids for one object. The individual with the highest bid chooses an object first; the individual with the second-highest bid chooses the next object; and this process continues until the individual with the kth highest bid receives the last object. Each individual pays the equivalent to his or her bid. When objects are identical we show that the proposed auction generates the same revenue as a first-price sealed-bid sequential auction. When objects are perfectly correlated there is no known solution for sequential auctions whereas we can characterize bidding strategies in the proposed auction. Moreover the proposed auction is optimal (given an appropriately chosen reserve price) and it may be easier and cheaper to run than a sequential auction.,flavio menezes,Not available,1998.0,10.1023/A:1026479506400,The Journal of Real Estate Finance and Economics,M.1998,False,,Springer,Not available,Simultaneous Pooled Auctions,d23c36bb0292403f9427fa00bc25c3f0,http://dx.doi.org/10.1023/A:1026479506400 2745,Suppose a seller wants to sell k similar or identical objects and there are n > k potential buyers. Suppose that each buyer wants only one object. In this case we suggest the use of a simultaneous auction that would work as follows. Players are asked to submit sealed bids for one object. The individual with the highest bid chooses an object first; the individual with the second-highest bid chooses the next object; and this process continues until the individual with the kth highest bid receives the last object. Each individual pays the equivalent to his or her bid. When objects are identical we show that the proposed auction generates the same revenue as a first-price sealed-bid sequential auction. When objects are perfectly correlated there is no known solution for sequential auctions whereas we can characterize bidding strategies in the proposed auction. Moreover the proposed auction is optimal (given an appropriately chosen reserve price) and it may be easier and cheaper to run than a sequential auction.,paulo monteiro,Not available,1998.0,10.1023/A:1026479506400,The Journal of Real Estate Finance and Economics,M.1998,False,,Springer,Not available,Simultaneous Pooled Auctions,d23c36bb0292403f9427fa00bc25c3f0,http://dx.doi.org/10.1023/A:1026479506400 2746,Stock market is a complex system composed from heterogeneous traders with highly non-linear interactions from which emerge a phenomenon of speculative bubble. To understand the role of heterogeneous behaviors of traders and interactions between them in the emergence of bubbles we propose an agent-based model of double auction market with asynchronous time management where traders act asynchronously and take different times to make decisions. The market is populated by heterogeneous traders. In addition to fundamentalist noise and technical (chartist) traders we propose a hybrid trader which can switch between technical (chartist) and fundamentalist strategies integrating panicking behavior. We find that when market is populated by a majority of hybrid traders we observe quite realistic bubble formation characterized by a boom phase when hybrid traders switch to technical behavior followed by a relatively shorter burst phase when hybrid traders return to fundamentalist strategy and change to panicked state. The aim is to design agents which act asynchronously with simple behaviors but complex enough to produce realistic price dynamics which provide a basis for developing agents with sophisticated decision-making processes.,salim chikhi,Not available,2017.0,10.1007/s00354-017-0010-6,New Generation Computing,Sadek2017,False,,Springer,Not available,An Asynchronous Double Auction Market to Study the Formation of Financial Bubbles and Crashes,2b591c83c66ce37c2abb784c2fb4a53e,http://dx.doi.org/10.1007/s00354-017-0010-6 2747, The issue of the persistence of monopoly when at least one labour-managed firm takes part in an auction for a cost-reducing innovation is tackled in this paper. It is shown that (i) when the incumbent is a profit-maximizing firm while the entrant is a labour-managed firm monopoly persists; (ii) when both firms are labour-managed monopoly persists only if the technology initially employed by the incumbent is highly inefficient as compared to the new one; and finally (iii) when the incumbent is labour-managed while the outsider is a profit seeking agent then entry always occurs and monopoly changes hands.,luca lambertini,Not available,1998.0,10.1007/s100580050021,Review of Economic Design,Luca1998,False,,Springer,Not available, Process innovation and the persistence of monopoly with labour-managed firms,e9128462fe447931e668573c5e997530,http://dx.doi.org/10.1007/s100580050021 2757,Cooperation in the ocean liner shipping industry has always been important to improve liner shipping networks (LSN’s). As tight cooperations like alliances are challenged by antitrust laws looser forms of cooperation among liner carriers might become a reasonable way to increase efficiency of LSN’s. Our goal is to facilitate a loose form of cooperation among liner carriers. Therefore we introduce a coordination mechanism for designing a collaborative LSN based on a multi round combinatorial auction. Via the auction carriers exchange ,tobias buer,Not available,2017.0,10.1007/s10696-017-9284-8,Flexible Services and Manufacturing Journal,Tobias2017,False,,Springer,Not available,Cooperative liner shipping network design by means of a combinatorial auction,78c71ca03faf0e60f7e6b350afe2c35f,http://dx.doi.org/10.1007/s10696-017-9284-8 2762,This study analyzes the equilibrium of a core-selecting package auction under incomplete information. The ascending proxy auction of Ausubel and Milgrom (Front Theor Econ 1:1–42 ,ryuji sano,Not available,2018.0,10.1007/s10058-018-0212-5,Review of Economic Design,Ryuji2018,False,,Springer,Not available,An equilibrium analysis of a core-selecting package auction with reserve prices,f93647db5273d9ee24ad5aafe0089b7c,http://dx.doi.org/10.1007/s10058-018-0212-5 2763,Attracting bidders to an auction is a key factor in determining revenue. We experimentally investigate entry and bidding behavior in first-price and English clock auctions to determine the revenue implications of entry. Potential bidders observe their value and then decide whether or not to incur a cost to enter. We also vary whether or not bidders are informed regarding the number of entrants prior to placing their bids. Revenue equivalence is predicted in all four environments. We find that regardless of whether or not bidders are informed first-price auctions generate more revenue than English clock auctions. Within a given auction format the effect of informing bidders differs. In first-price auctions revenue is higher when bidders are informed while the opposite is true in English clock auctions. The optimal choice for an auction designer who wishes to maximize revenue is a first-price auction with uninformed bidders.,diego aycinena,Not available,2018.0,10.1007/s10683-017-9558-8,Experimental Economics,Diego2018,False,,Springer,Not available,Auctions with endogenous participation and an uncertain number of bidders: experimental evidence,bbd4e427f3ec811ef1f36002b05c2cbc,http://dx.doi.org/10.1007/s10683-017-9558-8 2764,Attracting bidders to an auction is a key factor in determining revenue. We experimentally investigate entry and bidding behavior in first-price and English clock auctions to determine the revenue implications of entry. Potential bidders observe their value and then decide whether or not to incur a cost to enter. We also vary whether or not bidders are informed regarding the number of entrants prior to placing their bids. Revenue equivalence is predicted in all four environments. We find that regardless of whether or not bidders are informed first-price auctions generate more revenue than English clock auctions. Within a given auction format the effect of informing bidders differs. In first-price auctions revenue is higher when bidders are informed while the opposite is true in English clock auctions. The optimal choice for an auction designer who wishes to maximize revenue is a first-price auction with uninformed bidders.,lucas rentschler,Not available,2018.0,10.1007/s10683-017-9558-8,Experimental Economics,Diego2018,False,,Springer,Not available,Auctions with endogenous participation and an uncertain number of bidders: experimental evidence,bbd4e427f3ec811ef1f36002b05c2cbc,http://dx.doi.org/10.1007/s10683-017-9558-8 2765,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,andrea morone,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 2766,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,simone nuzzo,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 2767,The aim of this paper is to analyze bidders’ behavior comparing individuals and groups’ decisions within the dollar auction framework. This game induces subjects to fall prey into the paradigm of escalation which is driven by agents’ commitment to higher and higher bids. Whenever each participant commits himself to a bid the lower bidder motivated by the wish to win as well as to defend his prior investment finds it in his best interest to place a higher bid to overcome his opponent. The latter mechanism may lead subjects to overbid. We find that the Nash equilibrium of the game is only rarely attained. Second we detect clean evidence that groups’ decisions are on average superior to individuals’ decisions. Learning over time is clearly evident leading individuals to perform nearly as good as groups in the final rounds of the game.,rocco caferra,Not available,2018.0,10.1007/s10726-018-9595-5,Group Decision and Negotiation,Andrea2018,False,,Springer,Not available,The Dollar Auction Game: A Laboratory Comparison Between Individuals and Groups,0944342b92cf86cc6513107770ee1ef8,http://dx.doi.org/10.1007/s10726-018-9595-5 2768,Cooperation in the ocean liner shipping industry has always been important to improve liner shipping networks (LSN’s). As tight cooperations like alliances are challenged by antitrust laws looser forms of cooperation among liner carriers might become a reasonable way to increase efficiency of LSN’s. Our goal is to facilitate a loose form of cooperation among liner carriers. Therefore we introduce a coordination mechanism for designing a collaborative LSN based on a multi round combinatorial auction. Via the auction carriers exchange ,rasmus haass,Not available,2017.0,10.1007/s10696-017-9284-8,Flexible Services and Manufacturing Journal,Tobias2017,False,,Springer,Not available,Cooperative liner shipping network design by means of a combinatorial auction,78c71ca03faf0e60f7e6b350afe2c35f,http://dx.doi.org/10.1007/s10696-017-9284-8 2769,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,sumit agarwal,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 2770,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,jing li,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 2771,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,ernie teo,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 2772,This paper studies the extent to which equilibrium land auction prices are pushed up sequentially due to strategic bidding behaviors in government land auction sales. Using a unique dataset that covers the universe of tendering prices submitted by all developers for all residential land auction sales in Singapore we find that a tenderer’s bids are significantly higher where there was a previous land parcel sold within two years and located within four kilometers. The identified price margin decreases with time and geographic distance. Tracking sequential bids submitted by the same developer over time we find that the incumbent winner of a previous auction is more likely to participate in subsequent nearby land sales as compared to the second-highest bidder of the same auction. However it does not necessarily win the subsequent sites. We argue that the incumbent deliberately bids up the subsequent land prices to gain pricing advantages to their own parcels.,alan cheong,Not available,2018.0,10.1007/s11146-017-9625-0,The Journal of Real Estate Finance and Economics,Sumit2018,False,,Springer,Not available,Strategic Sequential Bidding for Government Land Auction Sales – Evidence from Singapore,de5dcd0340c32eea2609b8ed772d75f7,http://dx.doi.org/10.1007/s11146-017-9625-0 2773,Virtualization technology plays an important role in cloud computing. Virtual machine (VM) migration not only enables load balancing of hosts in data center to avoid overload anomalies but also reduces the cost of cloud computing data centers. Our work mainly focused on the communication costs of VMs migration in data center. In this paper a double auction-based VM migration algorithm is proposed which takes the cost of communication between VMs into account under normal operation situation. The algorithm of VM migration is divided into two parts: (i) selecting the VMs to be migrated according to the communication and occupied resources factors of VMs and (ii) determining the destination host for VMs which to be migrated. In the first process of VM migration we proposed VMs greedy selection algorithm (VMs-GSA) to select VMs. A VM Migration Double Auction Mechanism was applied to the second process of VM migration to obtain the mappings between VMs and underutilized hosts. The simulation result shows that the proposed VM migration algorithm-based heuristic is efficient. The traffic generated by VMs-GSA is 35% less than the random algorithm and the success rate of VM migration is very high.,junwu zhu,Not available,2018.0,10.1007/s00500-018-3599-6,Soft Computing,Junwu2018,False,,Springer,Not available,Virtual machine migration method based on load cognition,f01340d20e367819da2739405b9b5b3b,http://dx.doi.org/10.1007/s00500-018-3599-6 2774,Virtualization technology plays an important role in cloud computing. Virtual machine (VM) migration not only enables load balancing of hosts in data center to avoid overload anomalies but also reduces the cost of cloud computing data centers. Our work mainly focused on the communication costs of VMs migration in data center. In this paper a double auction-based VM migration algorithm is proposed which takes the cost of communication between VMs into account under normal operation situation. The algorithm of VM migration is divided into two parts: (i) selecting the VMs to be migrated according to the communication and occupied resources factors of VMs and (ii) determining the destination host for VMs which to be migrated. In the first process of VM migration we proposed VMs greedy selection algorithm (VMs-GSA) to select VMs. A VM Migration Double Auction Mechanism was applied to the second process of VM migration to obtain the mappings between VMs and underutilized hosts. The simulation result shows that the proposed VM migration algorithm-based heuristic is efficient. The traffic generated by VMs-GSA is 35% less than the random algorithm and the success rate of VM migration is very high.,jinjin wang,Not available,2018.0,10.1007/s00500-018-3599-6,Soft Computing,Junwu2018,False,,Springer,Not available,Virtual machine migration method based on load cognition,f01340d20e367819da2739405b9b5b3b,http://dx.doi.org/10.1007/s00500-018-3599-6 2775,Virtualization technology plays an important role in cloud computing. Virtual machine (VM) migration not only enables load balancing of hosts in data center to avoid overload anomalies but also reduces the cost of cloud computing data centers. Our work mainly focused on the communication costs of VMs migration in data center. In this paper a double auction-based VM migration algorithm is proposed which takes the cost of communication between VMs into account under normal operation situation. The algorithm of VM migration is divided into two parts: (i) selecting the VMs to be migrated according to the communication and occupied resources factors of VMs and (ii) determining the destination host for VMs which to be migrated. In the first process of VM migration we proposed VMs greedy selection algorithm (VMs-GSA) to select VMs. A VM Migration Double Auction Mechanism was applied to the second process of VM migration to obtain the mappings between VMs and underutilized hosts. The simulation result shows that the proposed VM migration algorithm-based heuristic is efficient. The traffic generated by VMs-GSA is 35% less than the random algorithm and the success rate of VM migration is very high.,yonglong zhang,Not available,2018.0,10.1007/s00500-018-3599-6,Soft Computing,Junwu2018,False,,Springer,Not available,Virtual machine migration method based on load cognition,f01340d20e367819da2739405b9b5b3b,http://dx.doi.org/10.1007/s00500-018-3599-6 2776,Virtualization technology plays an important role in cloud computing. Virtual machine (VM) migration not only enables load balancing of hosts in data center to avoid overload anomalies but also reduces the cost of cloud computing data centers. Our work mainly focused on the communication costs of VMs migration in data center. In this paper a double auction-based VM migration algorithm is proposed which takes the cost of communication between VMs into account under normal operation situation. The algorithm of VM migration is divided into two parts: (i) selecting the VMs to be migrated according to the communication and occupied resources factors of VMs and (ii) determining the destination host for VMs which to be migrated. In the first process of VM migration we proposed VMs greedy selection algorithm (VMs-GSA) to select VMs. A VM Migration Double Auction Mechanism was applied to the second process of VM migration to obtain the mappings between VMs and underutilized hosts. The simulation result shows that the proposed VM migration algorithm-based heuristic is efficient. The traffic generated by VMs-GSA is 35% less than the random algorithm and the success rate of VM migration is very high.,yi jiang,Not available,2018.0,10.1007/s00500-018-3599-6,Soft Computing,Junwu2018,False,,Springer,Not available,Virtual machine migration method based on load cognition,f01340d20e367819da2739405b9b5b3b,http://dx.doi.org/10.1007/s00500-018-3599-6 2777,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,xiaojing xu,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 2778,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,jinpeng ma,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 2779,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,gian albano,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 2780,The winner’s curse in auctions might emerge from asymmetric information and/or from some willingness to pay for winning. This article is based on a sealed-bid common value first price auction with a net loss for the subject with the second highest bid. The results show the existence of a trade-off between the magnitude of the potential loss and the willingness to pay for the victory. In the context of public procurement these results suggest that companies are willing to overpay small contracts to gain a sort of ‘free advertising’ whereas this is not the case when the contracts are large.,matteo migheli,Not available,2017.0,10.1007/s11299-017-0197-8,Mind & Society,Matteo2017,False,,Springer,Not available,The winner’s curse in auctions with losses,23dd7fb7face41f098c73770b1c324f6,http://dx.doi.org/10.1007/s11299-017-0197-8 2781,This paper uses a dual approach to study a class of quasi-linear exchange economies with indivisible or divisible goods in search for an equilibrium. Our model aims at an economy with a large scale and an agent’s individual demand or supply is contaminated with stochastic errors (noises). We study a probabilistic ,xiaoping xie,Not available,2018.0,10.1007/s10614-018-9866-x,Computational Economics,Xiaojing2018,False,,Springer,Not available,Price Convergence under a Probabilistic Double Auction,b9a3716e30fecf59806de0635d02cab5,http://dx.doi.org/10.1007/s10614-018-9866-x 2782,In this paper we apply auction theory to the modelling of competition in a multi-unit wholesale electricity market. Bidding strategies of multi-plant producers are derived and examined assuming various degrees of market concentration. Unlike previous literature which mainly focuses on demand uncertainty we assume both demand and cost uncertainty as well as cost differentials among the two types of generating units considered in the model namely baseload units and peak units. Results indicate that the System Marginal Price (competitive pricing) rule provides incentives for bid shading on the part of all those generators-units who have a non-null probability of setting the market price. We also show that the extent of the bid shading is positively affected by the differential in the endowments of the baseload generation capacity of multi-plant firms. The inefficiency of the resulting allocation is also examined and some policy implications are briefly discussed.,lucia parisio,Not available,2003.0,10.1023/A:1024602609265,International Tax and Public Finance,Lucia2003,False,,Springer,Not available,Market Power and the Power Market: Multi-Unit Bidding and (In)Efficiency in Electricity Auctions,dae5dd1540b2b2f85f2bda0f1e43bd75,http://dx.doi.org/10.1023/A:1024602609265 2783,In this paper we apply auction theory to the modelling of competition in a multi-unit wholesale electricity market. Bidding strategies of multi-plant producers are derived and examined assuming various degrees of market concentration. Unlike previous literature which mainly focuses on demand uncertainty we assume both demand and cost uncertainty as well as cost differentials among the two types of generating units considered in the model namely baseload units and peak units. Results indicate that the System Marginal Price (competitive pricing) rule provides incentives for bid shading on the part of all those generators-units who have a non-null probability of setting the market price. We also show that the extent of the bid shading is positively affected by the differential in the endowments of the baseload generation capacity of multi-plant firms. The inefficiency of the resulting allocation is also examined and some policy implications are briefly discussed.,bruno bosco,Not available,2003.0,10.1023/A:1024602609265,International Tax and Public Finance,Lucia2003,False,,Springer,Not available,Market Power and the Power Market: Multi-Unit Bidding and (In)Efficiency in Electricity Auctions,dae5dd1540b2b2f85f2bda0f1e43bd75,http://dx.doi.org/10.1023/A:1024602609265 2784,Global communication networks and advances in information technology enable the design of information systems facilitating effective formulation and efficient resolution of negotiation problems. Increasingly these systems guide negotiators in clarifying the relevant issues provide media for offer formulation and exchange and help in achieving an agreement. In practice the task of analysing modelling designing and implementing electronic negotiation media demands a systematic traceable and reproducible approach. An engineering approach to media specification and construction has these characteristics. In this paper we provide a rationale for the engineering approach that allows pragmatic adoption of economic and social sciences perspectives on negotiated decisions for the purpose of supporting and undertaking electronic negotiations. Similarities and differences of different theories that underlie on-going studies of electronic negotiations are identified. This provides a basis for integration of different theories and approaches for the specific purpose of the design of effective electronic negotiations. Drawing on diverse streams of literature in different fields such as economics management computer and behavioural sciences we present an example of an integration of three significant streams of theoretical and applied research involving negotiations traditional auctions and on-line auctions.,martin bichler,Not available,2003.0,10.1023/A:1024867820235,Group Decision and Negotiation,Martin2003,False,,Springer,Not available,Towards a Structured Design of Electronic Negotiations,9a07c4ca9a4e45941796b9dfe258db79,http://dx.doi.org/10.1023/A:1024867820235 2785,Global communication networks and advances in information technology enable the design of information systems facilitating effective formulation and efficient resolution of negotiation problems. Increasingly these systems guide negotiators in clarifying the relevant issues provide media for offer formulation and exchange and help in achieving an agreement. In practice the task of analysing modelling designing and implementing electronic negotiation media demands a systematic traceable and reproducible approach. An engineering approach to media specification and construction has these characteristics. In this paper we provide a rationale for the engineering approach that allows pragmatic adoption of economic and social sciences perspectives on negotiated decisions for the purpose of supporting and undertaking electronic negotiations. Similarities and differences of different theories that underlie on-going studies of electronic negotiations are identified. This provides a basis for integration of different theories and approaches for the specific purpose of the design of effective electronic negotiations. Drawing on diverse streams of literature in different fields such as economics management computer and behavioural sciences we present an example of an integration of three significant streams of theoretical and applied research involving negotiations traditional auctions and on-line auctions.,gregory kersten,Not available,2003.0,10.1023/A:1024867820235,Group Decision and Negotiation,Martin2003,False,,Springer,Not available,Towards a Structured Design of Electronic Negotiations,9a07c4ca9a4e45941796b9dfe258db79,http://dx.doi.org/10.1023/A:1024867820235 2786,Global communication networks and advances in information technology enable the design of information systems facilitating effective formulation and efficient resolution of negotiation problems. Increasingly these systems guide negotiators in clarifying the relevant issues provide media for offer formulation and exchange and help in achieving an agreement. In practice the task of analysing modelling designing and implementing electronic negotiation media demands a systematic traceable and reproducible approach. An engineering approach to media specification and construction has these characteristics. In this paper we provide a rationale for the engineering approach that allows pragmatic adoption of economic and social sciences perspectives on negotiated decisions for the purpose of supporting and undertaking electronic negotiations. Similarities and differences of different theories that underlie on-going studies of electronic negotiations are identified. This provides a basis for integration of different theories and approaches for the specific purpose of the design of effective electronic negotiations. Drawing on diverse streams of literature in different fields such as economics management computer and behavioural sciences we present an example of an integration of three significant streams of theoretical and applied research involving negotiations traditional auctions and on-line auctions.,stefan strecker,Not available,2003.0,10.1023/A:1024867820235,Group Decision and Negotiation,Martin2003,False,,Springer,Not available,Towards a Structured Design of Electronic Negotiations,9a07c4ca9a4e45941796b9dfe258db79,http://dx.doi.org/10.1023/A:1024867820235 2787,Using dynamic panel data econometric techniques we analyzethe price structure of sequential auctions of modern and contemporary art that took place inItaly during the period 1983–1996. Contrary to previous empirical studies we do not find any“afternoon effect” or decline of auction prices relative to estimated values. Taking intoconsideration the structure of the auctions and the dynamic nature of price determination we proposean interpretation of the empirical results that encompasses previous contributions.,lucio picci,Not available,2003.0,10.1023/A:1024117331138,Empirica,Lucio2003,False,,Springer,Not available,Bidders' and Sellers' Strategies in Sequential Auctions. New Evidence about the Afternoon Effect,0c5287c30f226424a4068cd59df624a3,http://dx.doi.org/10.1023/A:1024117331138 2788,Using dynamic panel data econometric techniques we analyzethe price structure of sequential auctions of modern and contemporary art that took place inItaly during the period 1983–1996. Contrary to previous empirical studies we do not find any“afternoon effect” or decline of auction prices relative to estimated values. Taking intoconsideration the structure of the auctions and the dynamic nature of price determination we proposean interpretation of the empirical results that encompasses previous contributions.,antonello scorcu,Not available,2003.0,10.1023/A:1024117331138,Empirica,Lucio2003,False,,Springer,Not available,Bidders' and Sellers' Strategies in Sequential Auctions. New Evidence about the Afternoon Effect,0c5287c30f226424a4068cd59df624a3,http://dx.doi.org/10.1023/A:1024117331138 2789,In this paper we study the auction to allocate an indivisible good when each potential buyer has a private and independent valuation for the item and suffers a negative externality if a competitor acquires it. In that case the outside option of each buyer is mechanism-dependent which implies that participation is endogenous. As several works in the literature have shown the optimal auction entails strong threats to induce full entry and maximal expected revenue. This results from the full commitment assumption which ensures that threats are credible. We show that absent credible threats the entry process does not lead to full participation: the equilibrium entails screening of agents in the entry stage and a trade-off between reserve prices and entry fees. Besides we discuss the conditions under which the impossibility to use threats does not prevent the seller from ensuring a minimal screening and reaching a high expected revenue.,isabelle brocas,Not available,2003.0,10.1023/A:1026212810214,Theory and Decision,Isabelle2003,False,,Springer,Not available,Endogenous entry in auctions with negative externalities,bbc66f0f84232a43dece77d4b282534d,http://dx.doi.org/10.1023/A:1026212810214 2790,Research in the domain of electronic negotiations is a rather new and very interdisciplinary field which gains more and more attention due to the industry hype and momentum regarding electronic commerce and electronic markets. Negotiations in a narrow sense (not taking into account simple forms such as “hit and take”) have been identified as an advantageous coordination mechanism for the interaction of buyers and sellers in electronic markets that transcend the selling of commodities or uniform goods. Hence support for negotiations may become a critical success factor for electronic markets especially regarding the recent failures of many industrial ventures. This paper presents the Montreal Taxonomy which allows not only for the exact characterisation and comparison of a broad variety of electronic negotiation designs and systems ranging from auctions to bilateral bargaining tables but could also lead towards a more structured approach for the design of electronic negotiations.,michael strobel,Not available,2003.0,10.1023/A:1023072922126,Group Decision and Negotiation,Michael2003,False,,Springer,Not available,The Montreal Taxonomy for Electronic Negotiations,7e4c1296bafa41de9b06239f4509550f,http://dx.doi.org/10.1023/A:1023072922126 2791,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,luca corazzini,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 2792,Research in the domain of electronic negotiations is a rather new and very interdisciplinary field which gains more and more attention due to the industry hype and momentum regarding electronic commerce and electronic markets. Negotiations in a narrow sense (not taking into account simple forms such as “hit and take”) have been identified as an advantageous coordination mechanism for the interaction of buyers and sellers in electronic markets that transcend the selling of commodities or uniform goods. Hence support for negotiations may become a critical success factor for electronic markets especially regarding the recent failures of many industrial ventures. This paper presents the Montreal Taxonomy which allows not only for the exact characterisation and comparison of a broad variety of electronic negotiation designs and systems ranging from auctions to bilateral bargaining tables but could also lead towards a more structured approach for the design of electronic negotiations.,christof weinhardt,Not available,2003.0,10.1023/A:1023072922126,Group Decision and Negotiation,Michael2003,False,,Springer,Not available,The Montreal Taxonomy for Electronic Negotiations,7e4c1296bafa41de9b06239f4509550f,http://dx.doi.org/10.1023/A:1023072922126 2793," ",veronika grimm,Not available,2003.0,10.1007/s100580300087,Review of Economic Design,Veronika2003,False,,Springer,Not available,Implementing efficient market structure,a999d8ec9527dcd44838d32b1a4565da,http://dx.doi.org/10.1007/s100580300087 2794," ",frank riedel,Not available,2003.0,10.1007/s100580300087,Review of Economic Design,Veronika2003,False,,Springer,Not available,Implementing efficient market structure,a999d8ec9527dcd44838d32b1a4565da,http://dx.doi.org/10.1007/s100580300087 2795," ",elmar wolfstetter,Not available,2003.0,10.1007/s100580300087,Review of Economic Design,Veronika2003,False,,Springer,Not available,Implementing efficient market structure,a999d8ec9527dcd44838d32b1a4565da,http://dx.doi.org/10.1007/s100580300087 2796, We present a new approach to endogenizing technological spillovers. Firms choose levels of a cost-reducing innovation from a continuum before they engage in competition for each other's R&D-employees. Successful bids for the competitor's employee then result in higher levels of cost reduction. Finally firms enter product market competition. We apply the approach to the long-standing debate on the effects of the mode of competition on innovation incentives. We show that incentives to acquire spillovers are stronger and incentives to prevent spillovers are weaker under quantity competition than under price competition. As a result for a wide range of parameters price competition gives stronger innovation incentives than quantity competition.,hans gersbach,Not available,2003.0,10.1007/s00199-001-0245-8,Economic Theory,Hans2003,False,,Springer,Not available,Endogenous spillovers and incentives to innovate,5e5c1b92b747910893eed0f9438deadb,http://dx.doi.org/10.1007/s00199-001-0245-8 2797, We present a new approach to endogenizing technological spillovers. Firms choose levels of a cost-reducing innovation from a continuum before they engage in competition for each other's R&D-employees. Successful bids for the competitor's employee then result in higher levels of cost reduction. Finally firms enter product market competition. We apply the approach to the long-standing debate on the effects of the mode of competition on innovation incentives. We show that incentives to acquire spillovers are stronger and incentives to prevent spillovers are weaker under quantity competition than under price competition. As a result for a wide range of parameters price competition gives stronger innovation incentives than quantity competition.,armin schmutzler,Not available,2003.0,10.1007/s00199-001-0245-8,Economic Theory,Hans2003,False,,Springer,Not available,Endogenous spillovers and incentives to innovate,5e5c1b92b747910893eed0f9438deadb,http://dx.doi.org/10.1007/s00199-001-0245-8 2798,Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers. In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret.,koutarou suzuki,Not available,2003.0,10.1007/978-3-540-45126-6_17,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,eec584f9908e3241b7e13516ba237d93,http://dx.doi.org/10.1007/978-3-540-45126-6_17 2799,Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers. In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret.,makoto yokoo,Not available,2003.0,10.1007/978-3-540-45126-6_17,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,eec584f9908e3241b7e13516ba237d93,http://dx.doi.org/10.1007/978-3-540-45126-6_17 2800,Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. This paper presents a method for implementing several secure combinatorial auction protocols based on our newly developed secure dynamic programming protocol. Dynamic programming is a very effective widely used technique for tackling various combinatorial optimization problems including several types of combinatorial auctions. Our secure dynamic programming protocol utilizes secret sharing techniques and can obtain the optimal solution of a combinatorial optimization problem i.e. result of a combinatorial auction without revealing the inputs of the problem i.e. bidding prices. We discuss the application of the method to several combinatorial auctions i.e. multiple-unit single-item auctions linear-goods auctions and general combinatorial auctions.,koutarou suzuki,Not available,2003.0,10.1007/3-540-36504-4_4,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing,84e9ca7199e4d316e10777796d64430a,http://dx.doi.org/10.1007/3-540-36504-4_4 2801,Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. This paper presents a method for implementing several secure combinatorial auction protocols based on our newly developed secure dynamic programming protocol. Dynamic programming is a very effective widely used technique for tackling various combinatorial optimization problems including several types of combinatorial auctions. Our secure dynamic programming protocol utilizes secret sharing techniques and can obtain the optimal solution of a combinatorial optimization problem i.e. result of a combinatorial auction without revealing the inputs of the problem i.e. bidding prices. We discuss the application of the method to several combinatorial auctions i.e. multiple-unit single-item auctions linear-goods auctions and general combinatorial auctions.,makoto yokoo,Not available,2003.0,10.1007/3-540-36504-4_4,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing,84e9ca7199e4d316e10777796d64430a,http://dx.doi.org/10.1007/3-540-36504-4_4 2802,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,stefano galavotti,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 2803,This paper investigates a case study in designing auctions with optimal reserve prices when an analytical solution for the equilibrium bid functions does not exist. The Runge-Kutta integration method nested in a backward-shooting algorithm is used to solve the equilibrium bid functions for a first-price auction with bidders whose value ranking is common knowledge. The optimal reserve price is determined after a numerical search for the seller’s maximum average revenue using simulated auction markets at equilibrium. We observe that setting the optimal reserve price can continue to raise on average more revenue for the seller in the first-price auction than in the second-price auction.,a. elbittar,Not available,2003.0,10.1007/978-3-662-05611-0_5,Advances in Economic Design,Alexander2003,False,,Springer,Not available,On Determination of Optimal Reserve Price in Auctions with Common Knowledge about Ranking of Valuations,153cb1f0e73c03c3ab01d616de3a7948,http://dx.doi.org/10.1007/978-3-662-05611-0_5 2804,This paper investigates a case study in designing auctions with optimal reserve prices when an analytical solution for the equilibrium bid functions does not exist. The Runge-Kutta integration method nested in a backward-shooting algorithm is used to solve the equilibrium bid functions for a first-price auction with bidders whose value ranking is common knowledge. The optimal reserve price is determined after a numerical search for the seller’s maximum average revenue using simulated auction markets at equilibrium. We observe that setting the optimal reserve price can continue to raise on average more revenue for the seller in the first-price auction than in the second-price auction.,m. unver,Not available,2003.0,10.1007/978-3-662-05611-0_5,Advances in Economic Design,Alexander2003,False,,Springer,Not available,On Determination of Optimal Reserve Price in Auctions with Common Knowledge about Ranking of Valuations,153cb1f0e73c03c3ab01d616de3a7948,http://dx.doi.org/10.1007/978-3-662-05611-0_5 2805,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,ricardo fernandez-blanco,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 2806,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,jose arroyo,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 2807,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,natalia alguacil,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 2808,An auctioneer wishes to sell several heterogeneous indivisible items to a group of potential bidders. Each bidder has valuations over the items but may face a budget constraint and therefore be unable to pay up to his values. In such markets a Walrasian equilibrium may fail to exist. We develop a novel dynamic auction and prove that the auction always finds a core allocation. In the auction prices that have been increased can be later decreased if they have become too high. The core allocation consists of an assignment of the items and its associated supporting price vector achieves Pareto efficiency and is robust against the threat of deviation by any coalition of market participants.,a. talman,Not available,2015.0,10.1007/s00182-014-0454-6,International Journal of Game Theory,J.2015,False,,Springer,Not available,An efficient multi-item dynamic auction with budget constrained bidders,b05f76ce0d0cad825d04d56f3f9aa143,http://dx.doi.org/10.1007/s00182-014-0454-6 2809,An auctioneer wishes to sell several heterogeneous indivisible items to a group of potential bidders. Each bidder has valuations over the items but may face a budget constraint and therefore be unable to pay up to his values. In such markets a Walrasian equilibrium may fail to exist. We develop a novel dynamic auction and prove that the auction always finds a core allocation. In the auction prices that have been increased can be later decreased if they have become too high. The core allocation consists of an assignment of the items and its associated supporting price vector achieves Pareto efficiency and is robust against the threat of deviation by any coalition of market participants.,zaifu yang,Not available,2015.0,10.1007/s00182-014-0454-6,International Journal of Game Theory,J.2015,False,,Springer,Not available,An efficient multi-item dynamic auction with budget constrained bidders,b05f76ce0d0cad825d04d56f3f9aa143,http://dx.doi.org/10.1007/s00182-014-0454-6 2810,We examine a modified 2 ,dan kovenock,Not available,2015.0,10.1007/s00182-014-0445-7,International Journal of Game Theory,Dan2015,False,,Springer,Not available,All-pay 2 ,2263b603c684280c0f8fd8ee68953932,http://dx.doi.org/10.1007/s00182-014-0445-7 2811,We examine a modified 2 ,sudipta sarangi,Not available,2015.0,10.1007/s00182-014-0445-7,International Journal of Game Theory,Dan2015,False,,Springer,Not available,All-pay 2 ,2263b603c684280c0f8fd8ee68953932,http://dx.doi.org/10.1007/s00182-014-0445-7 2812,We examine a modified 2 ,matt wiser,Not available,2015.0,10.1007/s00182-014-0445-7,International Journal of Game Theory,Dan2015,False,,Springer,Not available,All-pay 2 ,2263b603c684280c0f8fd8ee68953932,http://dx.doi.org/10.1007/s00182-014-0445-7 2813,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,rupert sausgruber,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 2814,We consider a general auction market model with divisible commodities and price functions of participants and show that it can be suitable for proper description of complex systems with active elements. Using its equivalent variational inequality reformulation we obtain a general existence result under mild additional conditions on price functions. We show that the basic network flow equilibrium problems are particular cases of this auction market model. Besides we describe a new auction based model for resource allocation problems in wireless communication networks. This enables us to obtain new existence results for these models as simple adjustments of that for the general auction model.,i. konnov,Not available,2015.0,10.1007/s11066-015-9095-6,NETNOMICS: Economic Research and Electronic Networking,V.2015,False,,Springer,Not available,On auction equilibrium models with network applications,ad5b977e9e75d7154184513b71fbb739,http://dx.doi.org/10.1007/s11066-015-9095-6 2815,This paper studies markets for heterogeneous goods using mechanism-design theory. For each combination of desirable properties we derive an assignment process with these properties in the form of a corresponding direct-revelation game or we show that it does not exist. Each participant’s utility is quasi-linear in money and depends upon the allocation that he gets and his privately known multidimensional ‘type.’ The key properties are incentive compatibility individual rationality efficiency and budget balance. The main results characterize mechanisms that are ex post incentive compatible in combination with other properties.,m. yenmez,Not available,2015.0,10.1007/s00182-014-0444-8,International Journal of Game Theory,Bumin2015,False,,Springer,Not available,Incentive compatible market design with applications,97b9435c63519c2d2ba6abc7bcf63754,http://dx.doi.org/10.1007/s00182-014-0444-8 2816,We study the following TV ad placement problem: ,xiangzhong xiang,Not available,2015.0,10.1007/s10878-014-9754-9,Journal of Combinatorial Optimization,Xiangzhong2015,False,,Springer,Not available,Prompt mechanism for online auctions with multi-unit demands,77892d27173825ec57e87088653ca485,http://dx.doi.org/10.1007/s10878-014-9754-9 2817,Government intervention often gives rise to contests and the government can influence their outcome by choosing their type. We consider a contest with two interest groups: one that is governed by a central planner and one that is not. Rent dissipation is compared under two well-known contest success functions: the generalized logit and the all-pay auction. We also consider the case in which the government can limit the size of the non-governed interest group in order to determine the scope of rent dissipation with the goal of either increasing the rent obtained by the government or reducing the wasted resources invested in the contest.,gil epstein,Not available,2015.0,10.1007/s11238-014-9454-z,Theory and Decision,S.2015,False,,Springer,Not available,Politicians governed versus non-governed interest groups and rent dissipation,9bd6182b5e482901bcc709d4fcc42843,http://dx.doi.org/10.1007/s11238-014-9454-z 2818,Government intervention often gives rise to contests and the government can influence their outcome by choosing their type. We consider a contest with two interest groups: one that is governed by a central planner and one that is not. Rent dissipation is compared under two well-known contest success functions: the generalized logit and the all-pay auction. We also consider the case in which the government can limit the size of the non-governed interest group in order to determine the scope of rent dissipation with the goal of either increasing the rent obtained by the government or reducing the wasted resources invested in the contest.,yosef mealem,Not available,2015.0,10.1007/s11238-014-9454-z,Theory and Decision,S.2015,False,,Springer,Not available,Politicians governed versus non-governed interest groups and rent dissipation,9bd6182b5e482901bcc709d4fcc42843,http://dx.doi.org/10.1007/s11238-014-9454-z 2819,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",ayoub alsarhan,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 2820,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",ahmad quttoum,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 2821,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",mohammad bsoul,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 2822,Bidder asymmetries are common in certain auctions where heterogeneous bidders coexist. In this paper we employ the tool of majorization to study the effect of bidder asymmetry on revenue in second-price auctions. As a preorder on vectors of real components the majorization is used to rank the asymmetry of bid distributions from different auctions. Our analysis indicates that bidders’ asymmetries may raise revenue under certain classes of value distributions (e.g. proportional reversed hazard rate models) and may not in others (e.g. proportional hazard rate models). These results are further validated through supportive evidence that is based on simulated three-bidder auctions. The use of majorization allows us to extend and strengthen the results obtained in the existing literature under more general conditions. This study adds to the literature a useful analytical technique for future research on asymmetric auctions.,jihui chen,Not available,2015.0,10.1007/s12197-014-9286-2,Journal of Economics and Finance,Jihui2015,False,,Springer,Not available,Asymmetry and revenue in second-price auctions: a majorization approach,3446a089229675abdd88835751f98b73,http://dx.doi.org/10.1007/s12197-014-9286-2 2823,Bidder asymmetries are common in certain auctions where heterogeneous bidders coexist. In this paper we employ the tool of majorization to study the effect of bidder asymmetry on revenue in second-price auctions. As a preorder on vectors of real components the majorization is used to rank the asymmetry of bid distributions from different auctions. Our analysis indicates that bidders’ asymmetries may raise revenue under certain classes of value distributions (e.g. proportional reversed hazard rate models) and may not in others (e.g. proportional hazard rate models). These results are further validated through supportive evidence that is based on simulated three-bidder auctions. The use of majorization allows us to extend and strengthen the results obtained in the existing literature under more general conditions. This study adds to the literature a useful analytical technique for future research on asymmetric auctions.,maochao xu,Not available,2015.0,10.1007/s12197-014-9286-2,Journal of Economics and Finance,Jihui2015,False,,Springer,Not available,Asymmetry and revenue in second-price auctions: a majorization approach,3446a089229675abdd88835751f98b73,http://dx.doi.org/10.1007/s12197-014-9286-2 2824,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,paola valbonesi,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 2825,With two bidders one strong and one weak the introduction of at least some degree of anonymous “pay-your-bid” in the payment rule of the second-price auction behoves any risk-neutral seller who while possibly efficiency minded cares about revenues. This can be achieved by adding to the winner’s payment a uniform proportion of his own bid as in Güth and van Damme’s auction or by having bidders receive a uniform proportion of the losing bid as in Goeree and Offerman’s Amsterdam auction or even by selling uniform toeholds to the bidders prior to the auction. We demonstrate one-to-one relations between the equilibria of these auctions and of first-price auctions. By assuming a power relation between the bidders’ value cumulative or decumulative functions we obtain explicit expressions for the first-order effects of the pay-your-bid rule.,bernard lebrun,Not available,2015.0,10.1007/s00199-014-0853-8,Economic Theory,Bernard2015,False,,Springer,Not available,Revenue-superior variants of the second-price auction,7c2ee3239046ad3bfc68fcff07e14ee6,http://dx.doi.org/10.1007/s00199-014-0853-8 2826,Risk-preference-inducing lottery procedures can serve as valuable tools for experimental economists. However questioning their effectiveness experimenters may avoid them even when predictions and conclusions depend crucially on risk preferences. Here I review risk-preference-induction attempts in sealed-bid auctions discussing factors that promote or hinder success. Making the procedure very transparent and having subjects learn about it in simple environments promote success. Hysteresis resulting from switching between monetary payoffs and lottery procedures in one environment hinders success. Thus lottery procedures appear sensitive to the implementation. However implemented carefully they can generate behavior consistent with the intended preferences.,thomas rietz,Not available,1993.0,10.1007/BF01065814,Journal of Risk and Uncertainty,A.1993,False,,Springer,Not available,Implementing and testing risk-preference-induction mechanisms in experimental sealed-bid auctions,fc50c8ac54727adec619d433cb5d8de9,http://dx.doi.org/10.1007/BF01065814 2827,This article reports 15 first-price auction experiments each with four bidders designed to test Cedric Smith' (1961) hypothesis that risk-neutral behavior can be induced in subjects' decisions by paying them in lotteries on money that are linear in the outcome probabilities. We choose the first-price auction environment because of its relatively high success in surviving a large number of tests which contrasts with the widely documented tendency of subjects to violate the expected utility axioms in making choices among gambles. In the first five experiments subjects were experienced in first-price auctions with monetary rewards. We prescreened these subjects for exceptionally high bidding consistency with the constant relative risk-averse model. The results unyielded only weak support for the risk-neutralizing procedure (3 of 10 risk-averse cases became risk-neutral but only 1 in 8 that were retested continued to exhibit risk-neutral behavior). We recruited 16 new subjects with no previous experience for four lottery-only auctions. Eight of the 16 subjects bid as if risk-neutral but in a retest of 12 subjects only 2 remained consistently risk-neutralized. Finally we recruited 12 inexperienced subjects and each subject bid against 3 robot bidders whose bidding strategies were known to the human bidder. We use this procedure to control for Nash expectations. These 12 subjects were run under both monetary and lottery reward conditions. Two of the 12 subjects bid as if risk-neutral in the lottery auction but both of these subjects had shown risk-neutral behavior with monetary rewards. In conclusion we find very weak support for the risk-neutralizing procedure. We caution other researchers to run calibration tests of the procedure in the particular context they are studying to assess its reliability.,james walker,Not available,1990.0,10.1007/BF00213258,Journal of Risk and Uncertainty,M.1990,False,,Springer,Not available,Inducing risk-neutral preferences: An examination in a controlled market environment,cec1bdae7f1160274a5f0eae5041b7ca,http://dx.doi.org/10.1007/BF00213258 2828,This article reports 15 first-price auction experiments each with four bidders designed to test Cedric Smith' (1961) hypothesis that risk-neutral behavior can be induced in subjects' decisions by paying them in lotteries on money that are linear in the outcome probabilities. We choose the first-price auction environment because of its relatively high success in surviving a large number of tests which contrasts with the widely documented tendency of subjects to violate the expected utility axioms in making choices among gambles. In the first five experiments subjects were experienced in first-price auctions with monetary rewards. We prescreened these subjects for exceptionally high bidding consistency with the constant relative risk-averse model. The results unyielded only weak support for the risk-neutralizing procedure (3 of 10 risk-averse cases became risk-neutral but only 1 in 8 that were retested continued to exhibit risk-neutral behavior). We recruited 16 new subjects with no previous experience for four lottery-only auctions. Eight of the 16 subjects bid as if risk-neutral but in a retest of 12 subjects only 2 remained consistently risk-neutralized. Finally we recruited 12 inexperienced subjects and each subject bid against 3 robot bidders whose bidding strategies were known to the human bidder. We use this procedure to control for Nash expectations. These 12 subjects were run under both monetary and lottery reward conditions. Two of the 12 subjects bid as if risk-neutral in the lottery auction but both of these subjects had shown risk-neutral behavior with monetary rewards. In conclusion we find very weak support for the risk-neutralizing procedure. We caution other researchers to run calibration tests of the procedure in the particular context they are studying to assess its reliability.,vernon smith,Not available,1990.0,10.1007/BF00213258,Journal of Risk and Uncertainty,M.1990,False,,Springer,Not available,Inducing risk-neutral preferences: An examination in a controlled market environment,cec1bdae7f1160274a5f0eae5041b7ca,http://dx.doi.org/10.1007/BF00213258 2829,This article reports 15 first-price auction experiments each with four bidders designed to test Cedric Smith' (1961) hypothesis that risk-neutral behavior can be induced in subjects' decisions by paying them in lotteries on money that are linear in the outcome probabilities. We choose the first-price auction environment because of its relatively high success in surviving a large number of tests which contrasts with the widely documented tendency of subjects to violate the expected utility axioms in making choices among gambles. In the first five experiments subjects were experienced in first-price auctions with monetary rewards. We prescreened these subjects for exceptionally high bidding consistency with the constant relative risk-averse model. The results unyielded only weak support for the risk-neutralizing procedure (3 of 10 risk-averse cases became risk-neutral but only 1 in 8 that were retested continued to exhibit risk-neutral behavior). We recruited 16 new subjects with no previous experience for four lottery-only auctions. Eight of the 16 subjects bid as if risk-neutral but in a retest of 12 subjects only 2 remained consistently risk-neutralized. Finally we recruited 12 inexperienced subjects and each subject bid against 3 robot bidders whose bidding strategies were known to the human bidder. We use this procedure to control for Nash expectations. These 12 subjects were run under both monetary and lottery reward conditions. Two of the 12 subjects bid as if risk-neutral in the lottery auction but both of these subjects had shown risk-neutral behavior with monetary rewards. In conclusion we find very weak support for the risk-neutralizing procedure. We caution other researchers to run calibration tests of the procedure in the particular context they are studying to assess its reliability.,james cox,Not available,1990.0,10.1007/BF00213258,Journal of Risk and Uncertainty,M.1990,False,,Springer,Not available,Inducing risk-neutral preferences: An examination in a controlled market environment,cec1bdae7f1160274a5f0eae5041b7ca,http://dx.doi.org/10.1007/BF00213258 2830,Bidding the same price in descending bid auctions and in first price sealed bid auctions is equivalent to expected utility maximizing behavior and this is equivalent to dynamically consistent bidding. The claim that in strategic form descending bid and first price sealed bid auctions are the same game is thus shown to be false since the mapping from strategies to payoffs is not the same for the two auction forms.,edi karni,Not available,1988.0,10.1007/BF00133162,Theory and Decision,Edi1988,False,,Springer,Not available,On the equivalence between descending bid auctions and first price sealed bid auctions,82bcd58e880d706767d9f829a2aa4425,http://dx.doi.org/10.1007/BF00133162 2831, We study the allocation of heterogeneous indivisible objects to agents whose valuations of the objects depend on what other objects they are obtained with. We apply the envyfree criterion to Groves sealed bid auctions which are value maximizing and dominant strategy incentive compatible for this multi-object allocation problem. First we show that if valuations are unrestricted then there is no Groves auction which ensures that the allocation is always envyfree. We obtain a positive result however if the valuations of the objects are superadditive and give a complete characterization of Groves prices that guarantee envyfreeness for superadditive valuations.,szilvia papai,Not available,2003.0,10.1007/s003550200185,Social Choice and Welfare,Szilvia2003,False,,Springer,Not available,Groves sealed bid auctions of heterogeneous objects with fair prices,291a6d0509e6930e76a69bebbe07bc2f,http://dx.doi.org/10.1007/s003550200185 2832,Using dynamic panel data econometric techniques we analyzethe price structure of sequential auctions of modern and contemporary art that took place inItaly during the period 1983–1996. Contrary to previous empirical studies we do not find any“afternoon effect” or decline of auction prices relative to estimated values. Taking intoconsideration the structure of the auctions and the dynamic nature of price determination we proposean interpretation of the empirical results that encompasses previous contributions.,lucio picci,Not available,2003.0,10.1023/A:1024117331138,Empirica,Lucio2003,False,,Springer,Not available,Bidders' and Sellers' Strategies in Sequential Auctions. New Evidence about the Afternoon Effect,0c5287c30f226424a4068cd59df624a3,http://dx.doi.org/10.1023/A:1024117331138 2833,Using dynamic panel data econometric techniques we analyzethe price structure of sequential auctions of modern and contemporary art that took place inItaly during the period 1983–1996. Contrary to previous empirical studies we do not find any“afternoon effect” or decline of auction prices relative to estimated values. Taking intoconsideration the structure of the auctions and the dynamic nature of price determination we proposean interpretation of the empirical results that encompasses previous contributions.,antonello scorcu,Not available,2003.0,10.1023/A:1024117331138,Empirica,Lucio2003,False,,Springer,Not available,Bidders' and Sellers' Strategies in Sequential Auctions. New Evidence about the Afternoon Effect,0c5287c30f226424a4068cd59df624a3,http://dx.doi.org/10.1023/A:1024117331138 2834,In this paper we study the auction to allocate an indivisible good when each potential buyer has a private and independent valuation for the item and suffers a negative externality if a competitor acquires it. In that case the outside option of each buyer is mechanism-dependent which implies that participation is endogenous. As several works in the literature have shown the optimal auction entails strong threats to induce full entry and maximal expected revenue. This results from the full commitment assumption which ensures that threats are credible. We show that absent credible threats the entry process does not lead to full participation: the equilibrium entails screening of agents in the entry stage and a trade-off between reserve prices and entry fees. Besides we discuss the conditions under which the impossibility to use threats does not prevent the seller from ensuring a minimal screening and reaching a high expected revenue.,isabelle brocas,Not available,2003.0,10.1023/A:1026212810214,Theory and Decision,Isabelle2003,False,,Springer,Not available,Endogenous entry in auctions with negative externalities,bbc66f0f84232a43dece77d4b282534d,http://dx.doi.org/10.1023/A:1026212810214 2835,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ezra einy,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 2836,Previous research in reverse auction B2B exchanges found that in an environment where sellers collectively can cater to the total demand with the final (i.e. the highest-priced bidding) seller catering to a residual the sellers resort to a mixed strategy equilibrium [2]. While price randomization in industrial bids is an accepted norm it may be argued that managers in reality do not resort to advanced game theoretic calculations to bid for an order. What is more likely is that managers learn that strategy and over time finally converge towards the theoretic equilibrium. To test this assertion we model the two-player game in a synthetic environment where the agents use a simple reinforcement learning algorithm to put progressively more weights on selecting price bands where they make higher profits. We find that after a sufficient number of iterations the agents do indeed converge towards the theoretic equilibrium.,subhajyoti bandyopadhyay,Not available,2003.0,10.1007/3-540-44864-0_38,Computational Science — ICCS 2003,Subhajyoti2003,False,,Springer,Not available,Simulating Sellers’ Behavior in a Reverse Auction B2B Exchange,fa315acc3ef4205d5d59bfdc09b681f3,http://dx.doi.org/10.1007/3-540-44864-0_38 2837,Previous research in reverse auction B2B exchanges found that in an environment where sellers collectively can cater to the total demand with the final (i.e. the highest-priced bidding) seller catering to a residual the sellers resort to a mixed strategy equilibrium [2]. While price randomization in industrial bids is an accepted norm it may be argued that managers in reality do not resort to advanced game theoretic calculations to bid for an order. What is more likely is that managers learn that strategy and over time finally converge towards the theoretic equilibrium. To test this assertion we model the two-player game in a synthetic environment where the agents use a simple reinforcement learning algorithm to put progressively more weights on selecting price bands where they make higher profits. We find that after a sufficient number of iterations the agents do indeed converge towards the theoretic equilibrium.,alok chaturvedi,Not available,2003.0,10.1007/3-540-44864-0_38,Computational Science — ICCS 2003,Subhajyoti2003,False,,Springer,Not available,Simulating Sellers’ Behavior in a Reverse Auction B2B Exchange,fa315acc3ef4205d5d59bfdc09b681f3,http://dx.doi.org/10.1007/3-540-44864-0_38 2838,Previous research in reverse auction B2B exchanges found that in an environment where sellers collectively can cater to the total demand with the final (i.e. the highest-priced bidding) seller catering to a residual the sellers resort to a mixed strategy equilibrium [2]. While price randomization in industrial bids is an accepted norm it may be argued that managers in reality do not resort to advanced game theoretic calculations to bid for an order. What is more likely is that managers learn that strategy and over time finally converge towards the theoretic equilibrium. To test this assertion we model the two-player game in a synthetic environment where the agents use a simple reinforcement learning algorithm to put progressively more weights on selecting price bands where they make higher profits. We find that after a sufficient number of iterations the agents do indeed converge towards the theoretic equilibrium.,john barron,Not available,2003.0,10.1007/3-540-44864-0_38,Computational Science — ICCS 2003,Subhajyoti2003,False,,Springer,Not available,Simulating Sellers’ Behavior in a Reverse Auction B2B Exchange,fa315acc3ef4205d5d59bfdc09b681f3,http://dx.doi.org/10.1007/3-540-44864-0_38 2839,Previous research in reverse auction B2B exchanges found that in an environment where sellers collectively can cater to the total demand with the final (i.e. the highest-priced bidding) seller catering to a residual the sellers resort to a mixed strategy equilibrium [2]. While price randomization in industrial bids is an accepted norm it may be argued that managers in reality do not resort to advanced game theoretic calculations to bid for an order. What is more likely is that managers learn that strategy and over time finally converge towards the theoretic equilibrium. To test this assertion we model the two-player game in a synthetic environment where the agents use a simple reinforcement learning algorithm to put progressively more weights on selecting price bands where they make higher profits. We find that after a sufficient number of iterations the agents do indeed converge towards the theoretic equilibrium.,jackie rees,Not available,2003.0,10.1007/3-540-44864-0_38,Computational Science — ICCS 2003,Subhajyoti2003,False,,Springer,Not available,Simulating Sellers’ Behavior in a Reverse Auction B2B Exchange,fa315acc3ef4205d5d59bfdc09b681f3,http://dx.doi.org/10.1007/3-540-44864-0_38 2840,Previous research in reverse auction B2B exchanges found that in an environment where sellers collectively can cater to the total demand with the final (i.e. the highest-priced bidding) seller catering to a residual the sellers resort to a mixed strategy equilibrium [2]. While price randomization in industrial bids is an accepted norm it may be argued that managers in reality do not resort to advanced game theoretic calculations to bid for an order. What is more likely is that managers learn that strategy and over time finally converge towards the theoretic equilibrium. To test this assertion we model the two-player game in a synthetic environment where the agents use a simple reinforcement learning algorithm to put progressively more weights on selecting price bands where they make higher profits. We find that after a sufficient number of iterations the agents do indeed converge towards the theoretic equilibrium.,shailendra mehta,Not available,2003.0,10.1007/3-540-44864-0_38,Computational Science — ICCS 2003,Subhajyoti2003,False,,Springer,Not available,Simulating Sellers’ Behavior in a Reverse Auction B2B Exchange,fa315acc3ef4205d5d59bfdc09b681f3,http://dx.doi.org/10.1007/3-540-44864-0_38 2841, I examine a situation where a firm chooses to locate a new factory in one of several jurisdictions. The value of the factory may differ among jurisdictions and it depends on the private information held by each jurisdiction. Jurisdictions compete for the location of the new factory. This competition may take the form of expenditures already incurred on infrastructure commitments to spend on infrastructure tax incentives or even cash payments. The model combines two elements that are usually considered separately; competition is desirable because we want the factory to be located in the jurisdiction that values it the most but competition in itself is wasteful. I show that the expected total amount paid to the firm under a large family of arrangements is the same. Moreover I show that the ex-ante optimal mechanism – that is the mechanism that guarantees that the firm chooses the jurisdiction with the highest value for the factory minimizes the total expected payment to the firm and balances the budget in an ex-ante sense – can be implemented by running a standard auction and subsidizing participation.,flavio menezes,Not available,2003.0,10.1007/s003550200173,Social Choice and Welfare,M.2003,False,,Springer,Not available,An auction theoretical approach to fiscal wars,0f9417a2f6f6f847b071700b5fad2270,http://dx.doi.org/10.1007/s003550200173 2842,In this paper we study incentive compatible mechanism based on linear pricing scheme for single-minded auction a restricted case of combinatorial auction in which each buyer desires a unique fixed bundle of various commodities improving the previous works [1 11 13] on pricing bundles (,ning chen,Not available,2003.0,10.1007/978-3-540-40965-6_11,Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation,Ning2003,False,,Springer,Not available,Incentive Compatible Mechanism Based on Linear Pricing Scheme for Single-Minded Auction,7fa014f232f101b369a7f76aa26d664f,http://dx.doi.org/10.1007/978-3-540-40965-6_11 2843,In this paper we study incentive compatible mechanism based on linear pricing scheme for single-minded auction a restricted case of combinatorial auction in which each buyer desires a unique fixed bundle of various commodities improving the previous works [1 11 13] on pricing bundles (,hong zhu,Not available,2003.0,10.1007/978-3-540-40965-6_11,Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation,Ning2003,False,,Springer,Not available,Incentive Compatible Mechanism Based on Linear Pricing Scheme for Single-Minded Auction,7fa014f232f101b369a7f76aa26d664f,http://dx.doi.org/10.1007/978-3-540-40965-6_11 2844,In the general discussion of double auction three properties are mainly considered: incentive compatibility budget balance and economic efficiency. In this paper we introduce another property of double auction: semi-independence from which we are trying to reveal the essential relation between incentive compatibility and economic efficiency.Babaioff and Nisan [[,ning chen,Not available,2003.0,10.1007/3-540-44862-4_5,Computational Science — ICCS 2003,Ning2003,False,,Springer,Not available,Double Auction in Two-Level Markets,6b60cb6f66950ad327b49b23cc25adfd,http://dx.doi.org/10.1007/3-540-44862-4_5 2845,In the general discussion of double auction three properties are mainly considered: incentive compatibility budget balance and economic efficiency. In this paper we introduce another property of double auction: semi-independence from which we are trying to reveal the essential relation between incentive compatibility and economic efficiency.Babaioff and Nisan [[,xiaotie deng,Not available,2003.0,10.1007/3-540-44862-4_5,Computational Science — ICCS 2003,Ning2003,False,,Springer,Not available,Double Auction in Two-Level Markets,6b60cb6f66950ad327b49b23cc25adfd,http://dx.doi.org/10.1007/3-540-44862-4_5 2846,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,mridu goswami,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 2847,In the general discussion of double auction three properties are mainly considered: incentive compatibility budget balance and economic efficiency. In this paper we introduce another property of double auction: semi-independence from which we are trying to reveal the essential relation between incentive compatibility and economic efficiency.Babaioff and Nisan [[,hong zhu,Not available,2003.0,10.1007/3-540-44862-4_5,Computational Science — ICCS 2003,Ning2003,False,,Springer,Not available,Double Auction in Two-Level Markets,6b60cb6f66950ad327b49b23cc25adfd,http://dx.doi.org/10.1007/3-540-44862-4_5 2848,Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers. In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret.,koutarou suzuki,Not available,2003.0,10.1007/978-3-540-45126-6_17,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,eec584f9908e3241b7e13516ba237d93,http://dx.doi.org/10.1007/978-3-540-45126-6_17 2849,Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers. In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret.,makoto yokoo,Not available,2003.0,10.1007/978-3-540-45126-6_17,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,eec584f9908e3241b7e13516ba237d93,http://dx.doi.org/10.1007/978-3-540-45126-6_17 2850,"Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers.In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret. ",koutarou suzuki,Not available,2003.0,DOItmp_0558_002276,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,1b4040349bf6ee04c36badf07fd90205,http://dx.doi.org/DOItmp_0558_002276 2851,"Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. The Generalized Vickrey Auction (GVA) can handle combinatorial auctions and has several good theoretical characteristics. However GVA has not yet widely used in practice due to its vulnerability to fraud by the auctioneers.In this paper to prevent such fraud we propose a secure Generalized Vickrey Auction scheme where the result of the auction can be computed while the actual evaluation values of each bidder are kept secret. ",makoto yokoo,Not available,2003.0,DOItmp_0558_002276,Financial Cryptography,Koutarou2003,False,,Springer,Not available,Secure Generalized Vickrey Auction Using Homomorphic Encryption,1b4040349bf6ee04c36badf07fd90205,http://dx.doi.org/DOItmp_0558_002276 2852,This paper investigates a case study in designing auctions with optimal reserve prices when an analytical solution for the equilibrium bid functions does not exist. The Runge-Kutta integration method nested in a backward-shooting algorithm is used to solve the equilibrium bid functions for a first-price auction with bidders whose value ranking is common knowledge. The optimal reserve price is determined after a numerical search for the seller’s maximum average revenue using simulated auction markets at equilibrium. We observe that setting the optimal reserve price can continue to raise on average more revenue for the seller in the first-price auction than in the second-price auction.,a. elbittar,Not available,2003.0,10.1007/978-3-662-05611-0_5,Advances in Economic Design,Alexander2003,False,,Springer,Not available,On Determination of Optimal Reserve Price in Auctions with Common Knowledge about Ranking of Valuations,153cb1f0e73c03c3ab01d616de3a7948,http://dx.doi.org/10.1007/978-3-662-05611-0_5 2853,This paper investigates a case study in designing auctions with optimal reserve prices when an analytical solution for the equilibrium bid functions does not exist. The Runge-Kutta integration method nested in a backward-shooting algorithm is used to solve the equilibrium bid functions for a first-price auction with bidders whose value ranking is common knowledge. The optimal reserve price is determined after a numerical search for the seller’s maximum average revenue using simulated auction markets at equilibrium. We observe that setting the optimal reserve price can continue to raise on average more revenue for the seller in the first-price auction than in the second-price auction.,m. unver,Not available,2003.0,10.1007/978-3-662-05611-0_5,Advances in Economic Design,Alexander2003,False,,Springer,Not available,On Determination of Optimal Reserve Price in Auctions with Common Knowledge about Ranking of Valuations,153cb1f0e73c03c3ab01d616de3a7948,http://dx.doi.org/10.1007/978-3-662-05611-0_5 2854,This article examines the impact of the distribution of preferences on equilibrium behavior in conflicts modeled as all-pay auctions with identity-dependent externalities. Centrists and radicals are defined using a willingness-to-pay criterion that admits preferences more general than a simple ordering on the line. Extremism characterized by a higher per capita expenditure by radicals than centrists may persist and generate higher aggregate expenditure by radicals even when they are relatively small in number. Our results demonstrate the importance of the institutions of conflict in determining the role of extremism and moderation in economic political and social environments.,bettina klose,Not available,2015.0,10.1007/s00355-014-0864-1,Social Choice and Welfare,Bettina2015,False,,Springer,Not available,Extremism drives out moderation,8eb016f3f8e7180aa60644199c549a39,http://dx.doi.org/10.1007/s00355-014-0864-1 2855,This article examines the impact of the distribution of preferences on equilibrium behavior in conflicts modeled as all-pay auctions with identity-dependent externalities. Centrists and radicals are defined using a willingness-to-pay criterion that admits preferences more general than a simple ordering on the line. Extremism characterized by a higher per capita expenditure by radicals than centrists may persist and generate higher aggregate expenditure by radicals even when they are relatively small in number. Our results demonstrate the importance of the institutions of conflict in determining the role of extremism and moderation in economic political and social environments.,dan kovenock,Not available,2015.0,10.1007/s00355-014-0864-1,Social Choice and Welfare,Bettina2015,False,,Springer,Not available,Extremism drives out moderation,8eb016f3f8e7180aa60644199c549a39,http://dx.doi.org/10.1007/s00355-014-0864-1 2856,Maskin and Riley (Games Econ Behav 45:395–409 ,todd kaplan,Not available,2015.0,10.1007/s40505-014-0049-1,Economic Theory Bulletin,R.2015,False,,Springer,Not available,Multiple equilibria in asymmetric first-price auctions,29a2c0da0f9913079f9369383f660451,http://dx.doi.org/10.1007/s40505-014-0049-1 2857,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ori haimanko,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 2858,Maskin and Riley (Games Econ Behav 45:395–409 ,shmuel zamir,Not available,2015.0,10.1007/s40505-014-0049-1,Economic Theory Bulletin,R.2015,False,,Springer,Not available,Multiple equilibria in asymmetric first-price auctions,29a2c0da0f9913079f9369383f660451,http://dx.doi.org/10.1007/s40505-014-0049-1 2859,This paper establishes existence and uniqueness of Quantal Response Equilibrium (QRE) in a double auction. The concept of QRE has the intuitive property that a deviation from best response is less likely the higher the cost associated with the deviation itself. Thanks to such property the QRE accommodates stochastic elements in the analysis of the strategic decision-making that arises in the double auction. By providing a theoretical alternative to the Bayesian Nash Equilibrium model the QRE model offers an appealing tool for analyzing data of double auction experiments.,claudia neri,Not available,2015.0,10.1007/s40505-014-0038-4,Economic Theory Bulletin,Claudia2015,False,,Springer,Not available,Quantal response equilibrium in a double auction,49e5a66bfcebbd52dc5081bd056276c8,http://dx.doi.org/10.1007/s40505-014-0038-4 2860,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,jian jiang,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 2861,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,jiandong li,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 2862,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,xinyi liu,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 2863,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,domenico colucci,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 2864,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,nicola doni,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 2865,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,vincenzo valori,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 2866,We provide a new characterization of implementability of reduced form mechanisms in terms of straightforward second-order stochastic dominance. In addition we present a simple proof of Matthews (,sergiu hart,Not available,2015.0,10.1007/s40505-014-0055-3,Economic Theory Bulletin,Sergiu2015,False,,Springer,Not available,Implementation of reduced form mechanisms: a simple approach and a new characterization,91d67bedbe240bd196d15bf12d603a2d,http://dx.doi.org/10.1007/s40505-014-0055-3 2867,We provide a new characterization of implementability of reduced form mechanisms in terms of straightforward second-order stochastic dominance. In addition we present a simple proof of Matthews (,philip reny,Not available,2015.0,10.1007/s40505-014-0055-3,Economic Theory Bulletin,Sergiu2015,False,,Springer,Not available,Implementation of reduced form mechanisms: a simple approach and a new characterization,91d67bedbe240bd196d15bf12d603a2d,http://dx.doi.org/10.1007/s40505-014-0055-3 2868,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ram orzach,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 2869,We study ,mangesh gupte,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 2870,We study ,darja krushevskaja,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 2871,We study ,s. muthukrishnan,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 2872,We study a dynamic auction mechanism in the context of private provision of a discrete public good under incomplete information. The bidders have private valuations and the cost of the public good is common knowledge. No bidder is willing to provide the good on her own. We show that a natural application of open ascending auctions in such environments fails dramatically: The probability of provision is zero in any equilibrium. The mechanism effectively auctions off the ‘right’ to be the last one to contribute but intuition suggests that neither player wishes to be the last one to contribute. Since the player who contributes first has the advantage of being able to free ride on the contributions of the other players no player wants to ‘win’ the auction.,murat yilmaz,Not available,2015.0,10.1007/s11238-014-9433-4,Theory and Decision,Murat2015,False,,Springer,Not available,Auctioning a discrete public good under incomplete information,28806d485d604dd95aaf73bcbeb6a373,http://dx.doi.org/10.1007/s11238-014-9433-4 2873,We analyse procurement auctions in which sellers are distinguished on the basis of the ratios of quality per unit of money that they offer. Sellers are privately informed on the offered quality of the technology or good. We assume that the procurer cannot perfectly identify the best offer. Thus with positive and decreasing probability the second third etc. best ratio offered is selected as the winner of the auction. We model this decision process as based on a general noisy ranking of offers. We show that although the problem seems to be analytically intractable in general there exists a simple symmetric pure-strategy equilibrium in which everyone follows the simple heuristic to match the same ‘focal’ price–quality ratio.,thomas giebe,Not available,2015.0,10.1007/s10058-014-0161-6,Review of Economic Design,Thomas2015,False,,Springer,Not available,Probabilistic procurement auctions,11fa9bb609cb432b35bf5740cd024510,http://dx.doi.org/10.1007/s10058-014-0161-6 2874,We analyse procurement auctions in which sellers are distinguished on the basis of the ratios of quality per unit of money that they offer. Sellers are privately informed on the offered quality of the technology or good. We assume that the procurer cannot perfectly identify the best offer. Thus with positive and decreasing probability the second third etc. best ratio offered is selected as the winner of the auction. We model this decision process as based on a general noisy ranking of offers. We show that although the problem seems to be analytically intractable in general there exists a simple symmetric pure-strategy equilibrium in which everyone follows the simple heuristic to match the same ‘focal’ price–quality ratio.,paul schweinzer,Not available,2015.0,10.1007/s10058-014-0161-6,Review of Economic Design,Thomas2015,False,,Springer,Not available,Probabilistic procurement auctions,11fa9bb609cb432b35bf5740cd024510,http://dx.doi.org/10.1007/s10058-014-0161-6 2875,This paper applies a simple sequential bargaining (SB) as a proxy for the continuous double auction (CDA) to study how the shape of supply and demand curves makes similar outcomes between the two markets populated by zero-intelligence (ZI) agents. At first we derive analytical expressions for transaction probabilities of ZI pairs in the SB as well as the three expected outcomes. Those are the allocative efficiency (AE) the average trading price and the trading volume. Then we conduct simulations by transferring the identical supply and demand functions from the SB to the CDA because of the complexity of its period. They produce similar statistical results as in the SB although the AE in the CDA is a little higher than that in the SB while the trading volume is a little smaller than that in the SB. Statistical properties still hold for special shapes that make the long-run outcomes of CDA and the expected outcomes of SB deviate a lot from their corresponding competitive equilibriums. It is concluded that transaction probabilities or frequencies of ZI pairs help to explain how the principle of statistics determines both expected outcomes of a SB and long-run outcomes of a CDA populated by ZI agents.,jie yang,Not available,2015.0,10.1007/s10614-014-9433-z,Computational Economics,Jie2015,False,,Springer,Not available,Supply Demand and Zero-Intelligence: Shape Matters,df411bbb45f28cc27c5e9aa04396ddf2,http://dx.doi.org/10.1007/s10614-014-9433-z 2876,This paper applies a simple sequential bargaining (SB) as a proxy for the continuous double auction (CDA) to study how the shape of supply and demand curves makes similar outcomes between the two markets populated by zero-intelligence (ZI) agents. At first we derive analytical expressions for transaction probabilities of ZI pairs in the SB as well as the three expected outcomes. Those are the allocative efficiency (AE) the average trading price and the trading volume. Then we conduct simulations by transferring the identical supply and demand functions from the SB to the CDA because of the complexity of its period. They produce similar statistical results as in the SB although the AE in the CDA is a little higher than that in the SB while the trading volume is a little smaller than that in the SB. Statistical properties still hold for special shapes that make the long-run outcomes of CDA and the expected outcomes of SB deviate a lot from their corresponding competitive equilibriums. It is concluded that transaction probabilities or frequencies of ZI pairs help to explain how the principle of statistics determines both expected outcomes of a SB and long-run outcomes of a CDA populated by ZI agents.,wenjie zhan,Not available,2015.0,10.1007/s10614-014-9433-z,Computational Economics,Jie2015,False,,Springer,Not available,Supply Demand and Zero-Intelligence: Shape Matters,df411bbb45f28cc27c5e9aa04396ddf2,http://dx.doi.org/10.1007/s10614-014-9433-z 2877, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,michael landsberger,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2878, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,jacob rubinstein,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2879,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,aner sela,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 2880, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,elmar wolfstetter,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2881, We consider a first–price auction when the ranking of bidders' private valuations is common knowledge among bidders. This new informational framework is motivated by several applications from procurement to privatization. It induces a particular asymmetric auction model with affiliated private values that has several interesting properties but raises serious technical complications. We prove existence and uniqueness of equilibrium in pure strategies and show that the seller's reven generally higher in a first–price than in second–price and English auctions in contrast to the ranking in the affiliated values model by Milgrom and Weber. This also implies that in first–price auctions providing information concerning the ranking of valuations among bidders tends to increase the seller's expected revenue.,shmuel zamir,Not available,2001.0,10.1007/s100580100039,Review of Economic Design,Michael2001,False,,Springer,Not available,First–price auctions when the ranking of valuations is common knowledge,07a7dc047e26a33840e9e1ab266280c2,http://dx.doi.org/10.1007/s100580100039 2882,Electronic Commerce (EC) is a promising field for applying agent and Artificial Intelligence technologies. In this article we give an overview of the trends of Internet auctions and agent-mediated Web commerce. We describe the theoretical backgrounds of auction protocols and introduce several Internet auction sites. Furthermore we describe various activities aimed toward utilizing agent technologies in EC and the trends in standardization efforts on agent technologies.,makoto yokoo,Not available,2001.0,10.1007/BF03037574,New Generation Computing,Makoto2001,False,,Springer,Not available,Trends of internet auctions and agent-mediated Web commerce,0d90d8ba713c5234f0f1642e491e13e4,http://dx.doi.org/10.1007/BF03037574 2883,Electronic Commerce (EC) is a promising field for applying agent and Artificial Intelligence technologies. In this article we give an overview of the trends of Internet auctions and agent-mediated Web commerce. We describe the theoretical backgrounds of auction protocols and introduce several Internet auction sites. Furthermore we describe various activities aimed toward utilizing agent technologies in EC and the trends in standardization efforts on agent technologies.,satoru fujita,Not available,2001.0,10.1007/BF03037574,New Generation Computing,Makoto2001,False,,Springer,Not available,Trends of internet auctions and agent-mediated Web commerce,0d90d8ba713c5234f0f1642e491e13e4,http://dx.doi.org/10.1007/BF03037574 2884,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,james cox,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 2885,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,sam dinkin,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 2886,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,james swarthout,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 2887,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,jayant kalagnanam,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 2888,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,andrew davenport,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 2889,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,ho lee,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 2890,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,fabrizio germano,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 2891,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,dimitris fotakis,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 2892,Combinatorial auctions provide an important tool for mechanism design in multi-agent systems. When implemented they require to solve combinatorial optimization problems such as set packing and partitioning problems. We present in this paper an analysis of the complexity of the problem to assign bids to bidders in combinatorial auctions. We show that the case of identical assets can be solved in polynomial time. The case of non-identical assets is in its general version NP-hard. Extra structure like a complete ordering of assets or mild side conditions make the problem solvable. Finally we present an algorithm to solve small and medium sized instances in a limited time using standard software.,hoesel van,Not available,2001.0,10.1023/A:1009940607600,Netnomics,Stan2001,False,,Springer,Not available,Optimization in electronic markets: examples in combinatorial auctions,f2dae9724b4ae35364cc28d606ef1ee4,http://dx.doi.org/10.1023/A:1009940607600 2893,Combinatorial auctions provide an important tool for mechanism design in multi-agent systems. When implemented they require to solve combinatorial optimization problems such as set packing and partitioning problems. We present in this paper an analysis of the complexity of the problem to assign bids to bidders in combinatorial auctions. We show that the case of identical assets can be solved in polynomial time. The case of non-identical assets is in its general version NP-hard. Extra structure like a complete ordering of assets or mild side conditions make the problem solvable. Finally we present an algorithm to solve small and medium sized instances in a limited time using standard software.,rudolf muller,Not available,2001.0,10.1023/A:1009940607600,Netnomics,Stan2001,False,,Springer,Not available,Optimization in electronic markets: examples in combinatorial auctions,f2dae9724b4ae35364cc28d606ef1ee4,http://dx.doi.org/10.1023/A:1009940607600 2894,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,arie segev,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 2895,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,carrie beam,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 2896,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,j. shanthikumar,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 2897,The purpose of activity rules is to encourage convergence to an efficient outcome by suppressing gaming. The rules proposed here are based on the principle of “revealed preference.” Essentially a supplier’s refusal to improve a previous clearing price is taken as evidence that such a lower price would not recover its cost and that therefore it can be prohibited from offering this price later. The resulting process forces suppliers at the margin to compete: each extra-marginal bidder improving the previous clearing price ejects some infra-marginal bidder who is thereby forced to reduce its offered price or forego any profit it might obtain. Each refusal freezes a step of the tender until possibly the clearing price rises that high again later.These rules are complemented by procedures for opening and closing the auction and allowance for withdrawals. All tenders must be submitted at the opening to preclude a strategy of waiting until the final iteration that would impair price discovery. Withdrawals must be irrevocable and in any case withdrawals after the final iteration must be excluded.The small-scale experimental tests conducted by Charles Plott (1997) indicate that absent market power these activity rules suppress gaming and drive the iterative process to nearly efficient prices and quantities in a moderate number of iterations.,robert wilson,Not available,2001.0,10.1007/0-306-47568-5_12,Game Theory and Business Applications,Robert2001,False,,Springer,Not available,Activity Rules for an Iterated Double Auction,58515d428c2b546e6e2b2a55e42869a6,http://dx.doi.org/10.1007/0-306-47568-5_12 2898,Competitive auctions encourage consumers to bid their utility values while achieving revenue close to that of fixed pricing with perfect market analysis. These auctions were introduced in [,andrew goldberg,Not available,2001.0,10.1007/3-540-44676-1_35,Algorithms — ESA 2001,V.2001,False,,Springer,Not available,Competitive Auctions for Multiple Digital Goods,70d6e9bb94e2aeb48dac1043858ff50d,http://dx.doi.org/10.1007/3-540-44676-1_35 2899,Competitive auctions encourage consumers to bid their utility values while achieving revenue close to that of fixed pricing with perfect market analysis. These auctions were introduced in [,jason hartline,Not available,2001.0,10.1007/3-540-44676-1_35,Algorithms — ESA 2001,V.2001,False,,Springer,Not available,Competitive Auctions for Multiple Digital Goods,70d6e9bb94e2aeb48dac1043858ff50d,http://dx.doi.org/10.1007/3-540-44676-1_35 2900,In this paper we consider multi-object auctions in which each bidder has a positive reservation value for only one special subset of objects called a necessary bundle. In the auction each bidder reports its necessary bundle and its reservation value. The seller solves the assignment problem of objects which maximizes its revenue and decides the winning bidders who can purchase their necessary bundles for their reporting prices. We show that this auction leads to an efficient allocation through Nash equilibria under complete information when the bid-grid size is sufficiently small. We apply our results to spectrum auctions satisfying the conditions that necessary bundles are intervals of discretized radio spectrum. We show that the revenue maximization problem for the seller can be solved in polynomial time for the above auctions. The algorithm also indicates a method to choose an accepted bidder randomly when the revenue maximization problem has multiple optimal solutions. Lastly we introduce a linear inequality system which characterizes the set of Nash equilibria.,tomomi matsui,Not available,2001.0,10.1007/3-540-44637-0_6,Intelligent Agents: Specification Modeling and Applications,Tomomi2001,False,,Springer,Not available,Sealed Bid Multi-object Auctions with Necessary Bundles and its Application to Spectrum Auctions,e2335c3b4191ff3784e2e657c7939ac8,http://dx.doi.org/10.1007/3-540-44637-0_6 2901,In this paper we consider multi-object auctions in which each bidder has a positive reservation value for only one special subset of objects called a necessary bundle. In the auction each bidder reports its necessary bundle and its reservation value. The seller solves the assignment problem of objects which maximizes its revenue and decides the winning bidders who can purchase their necessary bundles for their reporting prices. We show that this auction leads to an efficient allocation through Nash equilibria under complete information when the bid-grid size is sufficiently small. We apply our results to spectrum auctions satisfying the conditions that necessary bundles are intervals of discretized radio spectrum. We show that the revenue maximization problem for the seller can be solved in polynomial time for the above auctions. The algorithm also indicates a method to choose an accepted bidder randomly when the revenue maximization problem has multiple optimal solutions. Lastly we introduce a linear inequality system which characterizes the set of Nash equilibria.,takahiro watanabe,Not available,2001.0,10.1007/3-540-44637-0_6,Intelligent Agents: Specification Modeling and Applications,Tomomi2001,False,,Springer,Not available,Sealed Bid Multi-object Auctions with Necessary Bundles and its Application to Spectrum Auctions,e2335c3b4191ff3784e2e657c7939ac8,http://dx.doi.org/10.1007/3-540-44637-0_6 2902,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,piotr krysta,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 2903,,william samuelson,Not available,2001.0,10.1007/0-306-47568-5_10,Game Theory and Business Applications,William2001,False,,Springer,Not available,Auctions in Theory and Practice,b9073bfd2d537a9bfc471d8cc2707451,http://dx.doi.org/10.1007/0-306-47568-5_10 2904,When there are two bidders releasing independent information in an English auction with private values makes the seller worse off. However this is no longer true with more bidders: when there is enough competition revelation benefits the auctioneer. In three examples the dividing case is shown to be three bidders. This allocation effect applies to other standard auctions and parallels the bundling decision in a multi-unit auction.,simon board,Not available,2009.0,10.1007/s00199-006-0177-4,Economic Theory,Simon2009,False,,Springer,Not available,Revealing information in auctions: the allocation effect,973be16828555b7ba83e8e905530297f,http://dx.doi.org/10.1007/s00199-006-0177-4 2905,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,ivan mezei,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 2906,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,veljko malbasa,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 2907,Robots coordinate among themselves to select one of them to respond to an event reported to one of robots. The goal is to minimize the communication cost of selecting best robot response time and cost of performing the task. Existing solutions are either centralized neglecting communication cost assuming complete graph or based on flooding with individual responses to robot decision maker (,ivan stojmenovic,Not available,2009.0,10.1007/978-3-642-04383-3_14,Ad-Hoc Mobile and Wireless Networks,Ivan2009,False,,Springer,Not available,Auction Aggregation Protocols for Wireless Robot-Robot Coordination,35f194cfed893abd5b4b48ecd05f2504,http://dx.doi.org/10.1007/978-3-642-04383-3_14 2908,We explore the average-case “Vickrey” cost of structures in three random settings: the Vickrey cost of a shortest path in a complete graph or digraph with random edge weights; the Vickrey cost of a minimum spanning tree (MST) in a complete graph with random edge weights; and the Vickrey cost of a perfect matching in a complete bipartite graph with random edge weights. In each case in the large-size limit the Vickrey cost is precisely 2 times the (non-Vickrey) minimum cost but this is the result of case-specific calculations with no general reason found for it to be true.Separately we consider the problem of sparsifying a complete graph with random edge weights so that all-pairs shortest paths are preserved approximately. The problem of sparsifying a given graph so that for every pair of vertices the length of the shortest path in the sparsified graph is within some multiplicative factor and/or additive constant of the original distance has received substantial study in theoretical computer science. For the complete digraph ,prasad chebolu,Not available,2009.0,10.1007/978-3-642-03685-9_33,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Prasad2009,False,,Springer,Not available,Average-Case Analyses of Vickrey Costs,aab4b32a5ce31053cd35fc11e135a783,http://dx.doi.org/10.1007/978-3-642-03685-9_33 2909,We explore the average-case “Vickrey” cost of structures in three random settings: the Vickrey cost of a shortest path in a complete graph or digraph with random edge weights; the Vickrey cost of a minimum spanning tree (MST) in a complete graph with random edge weights; and the Vickrey cost of a perfect matching in a complete bipartite graph with random edge weights. In each case in the large-size limit the Vickrey cost is precisely 2 times the (non-Vickrey) minimum cost but this is the result of case-specific calculations with no general reason found for it to be true.Separately we consider the problem of sparsifying a complete graph with random edge weights so that all-pairs shortest paths are preserved approximately. The problem of sparsifying a given graph so that for every pair of vertices the length of the shortest path in the sparsified graph is within some multiplicative factor and/or additive constant of the original distance has received substantial study in theoretical computer science. For the complete digraph ,alan frieze,Not available,2009.0,10.1007/978-3-642-03685-9_33,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Prasad2009,False,,Springer,Not available,Average-Case Analyses of Vickrey Costs,aab4b32a5ce31053cd35fc11e135a783,http://dx.doi.org/10.1007/978-3-642-03685-9_33 2910,We explore the average-case “Vickrey” cost of structures in three random settings: the Vickrey cost of a shortest path in a complete graph or digraph with random edge weights; the Vickrey cost of a minimum spanning tree (MST) in a complete graph with random edge weights; and the Vickrey cost of a perfect matching in a complete bipartite graph with random edge weights. In each case in the large-size limit the Vickrey cost is precisely 2 times the (non-Vickrey) minimum cost but this is the result of case-specific calculations with no general reason found for it to be true.Separately we consider the problem of sparsifying a complete graph with random edge weights so that all-pairs shortest paths are preserved approximately. The problem of sparsifying a given graph so that for every pair of vertices the length of the shortest path in the sparsified graph is within some multiplicative factor and/or additive constant of the original distance has received substantial study in theoretical computer science. For the complete digraph ,pall melsted,Not available,2009.0,10.1007/978-3-642-03685-9_33,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Prasad2009,False,,Springer,Not available,Average-Case Analyses of Vickrey Costs,aab4b32a5ce31053cd35fc11e135a783,http://dx.doi.org/10.1007/978-3-642-03685-9_33 2911,We explore the average-case “Vickrey” cost of structures in three random settings: the Vickrey cost of a shortest path in a complete graph or digraph with random edge weights; the Vickrey cost of a minimum spanning tree (MST) in a complete graph with random edge weights; and the Vickrey cost of a perfect matching in a complete bipartite graph with random edge weights. In each case in the large-size limit the Vickrey cost is precisely 2 times the (non-Vickrey) minimum cost but this is the result of case-specific calculations with no general reason found for it to be true.Separately we consider the problem of sparsifying a complete graph with random edge weights so that all-pairs shortest paths are preserved approximately. The problem of sparsifying a given graph so that for every pair of vertices the length of the shortest path in the sparsified graph is within some multiplicative factor and/or additive constant of the original distance has received substantial study in theoretical computer science. For the complete digraph ,gregory sorkin,Not available,2009.0,10.1007/978-3-642-03685-9_33,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Prasad2009,False,,Springer,Not available,Average-Case Analyses of Vickrey Costs,aab4b32a5ce31053cd35fc11e135a783,http://dx.doi.org/10.1007/978-3-642-03685-9_33 2912,Software agents are increasingly being used to represent humans in online auctions. Such agents have the advantages of being able to systematically monitor a wide variety of auctions and then make rapid decisions about what bids to place in what auctions. They can do this continuously and repetitively without losing concentration. To provide a means of evaluating and comparing (benchmarking) research methods in this area the trading agent competition (TAC) was established. This paper describes the design of TACtic. Our agent uses multi behavioral techniques at the heart of its decision making to make bidding decisions in the face of uncertainty to make predictions about the likely outcomes of auctions and to alter the agent’s bidding strategy in response to the prevailing market conditions.,hassan khosravi,Not available,2009.0,10.1007/978-3-540-89985-3_109,Advances in Computer Science and Engineering,Hassan2009,False,,Springer,Not available,TACtic- A Multi Behavioral Agent for Trading Agent Competition,87cdd297fca2dcfb24d2d5bcd66aeca4,http://dx.doi.org/10.1007/978-3-540-89985-3_109 2913,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,carmine ventre,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 2914,Software agents are increasingly being used to represent humans in online auctions. Such agents have the advantages of being able to systematically monitor a wide variety of auctions and then make rapid decisions about what bids to place in what auctions. They can do this continuously and repetitively without losing concentration. To provide a means of evaluating and comparing (benchmarking) research methods in this area the trading agent competition (TAC) was established. This paper describes the design of TACtic. Our agent uses multi behavioral techniques at the heart of its decision making to make bidding decisions in the face of uncertainty to make predictions about the likely outcomes of auctions and to alter the agent’s bidding strategy in response to the prevailing market conditions.,mohammad shiri,Not available,2009.0,10.1007/978-3-540-89985-3_109,Advances in Computer Science and Engineering,Hassan2009,False,,Springer,Not available,TACtic- A Multi Behavioral Agent for Trading Agent Competition,87cdd297fca2dcfb24d2d5bcd66aeca4,http://dx.doi.org/10.1007/978-3-540-89985-3_109 2915,Software agents are increasingly being used to represent humans in online auctions. Such agents have the advantages of being able to systematically monitor a wide variety of auctions and then make rapid decisions about what bids to place in what auctions. They can do this continuously and repetitively without losing concentration. To provide a means of evaluating and comparing (benchmarking) research methods in this area the trading agent competition (TAC) was established. This paper describes the design of TACtic. Our agent uses multi behavioral techniques at the heart of its decision making to make bidding decisions in the face of uncertainty to make predictions about the likely outcomes of auctions and to alter the agent’s bidding strategy in response to the prevailing market conditions.,hamid khosravi,Not available,2009.0,10.1007/978-3-540-89985-3_109,Advances in Computer Science and Engineering,Hassan2009,False,,Springer,Not available,TACtic- A Multi Behavioral Agent for Trading Agent Competition,87cdd297fca2dcfb24d2d5bcd66aeca4,http://dx.doi.org/10.1007/978-3-540-89985-3_109 2916,Software agents are increasingly being used to represent humans in online auctions. Such agents have the advantages of being able to systematically monitor a wide variety of auctions and then make rapid decisions about what bids to place in what auctions. They can do this continuously and repetitively without losing concentration. To provide a means of evaluating and comparing (benchmarking) research methods in this area the trading agent competition (TAC) was established. This paper describes the design of TACtic. Our agent uses multi behavioral techniques at the heart of its decision making to make bidding decisions in the face of uncertainty to make predictions about the likely outcomes of auctions and to alter the agent’s bidding strategy in response to the prevailing market conditions.,ehsan iranmanesh,Not available,2009.0,10.1007/978-3-540-89985-3_109,Advances in Computer Science and Engineering,Hassan2009,False,,Springer,Not available,TACtic- A Multi Behavioral Agent for Trading Agent Competition,87cdd297fca2dcfb24d2d5bcd66aeca4,http://dx.doi.org/10.1007/978-3-540-89985-3_109 2917,Software agents are increasingly being used to represent humans in online auctions. Such agents have the advantages of being able to systematically monitor a wide variety of auctions and then make rapid decisions about what bids to place in what auctions. They can do this continuously and repetitively without losing concentration. To provide a means of evaluating and comparing (benchmarking) research methods in this area the trading agent competition (TAC) was established. This paper describes the design of TACtic. Our agent uses multi behavioral techniques at the heart of its decision making to make bidding decisions in the face of uncertainty to make predictions about the likely outcomes of auctions and to alter the agent’s bidding strategy in response to the prevailing market conditions.,alireza davoodi,Not available,2009.0,10.1007/978-3-540-89985-3_109,Advances in Computer Science and Engineering,Hassan2009,False,,Springer,Not available,TACtic- A Multi Behavioral Agent for Trading Agent Competition,87cdd297fca2dcfb24d2d5bcd66aeca4,http://dx.doi.org/10.1007/978-3-540-89985-3_109 2918,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,lubna rasheedi,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 2919,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,natasha chatterjee,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 2920,Combinatorial Auctions are auctions where bidders can place bids on combinations of items called packages or bundles rather than just on individual items. In this paper we extend this concept to distributed system by proposing a Distributed Combinatorial Auctioning System consisting of auctioneers and bidders who communicate by message-passing. We also propose a fair division algorithm that is based on our DCAS concept and model. Our model consist of auctioneers that are distributed in the system each having local bidders. Auctioneers collect local bids for the bundles. One of the auctioneers acts obtains all the bids from other auctioneers and performs the computations necessary for the combinatorial auction. We also briefly discuss how basic and extended fairness are implemented in resource allocation by our algorithm.,shrisha rao,Not available,2009.0,10.1007/978-3-540-92295-7_27,Distributed Computing and Networking,Lubna2009,False,,Springer,Not available,Fair Resource Allocation in Distributed Combinatorial Auctioning Systems,40ca97d26c735f07d2f91bbc9f487a5c,http://dx.doi.org/10.1007/978-3-540-92295-7_27 2921,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,dimitris bertsimas,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 2922,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,jeffrey hawkins,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 2923,Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions eBay has over 42 million users and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming we design algorithms for optimally bidding for a single item in an online auction and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.,georgia perakis,Not available,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Dimitris2009,False,,Springer,Not available,Optimal bidding in online auctions,7322572c5706c0f9ee191fcb6c3077c9,http://dx.doi.org/10.1057/rpm.2008.49 2924,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders’ reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,lawrence ausubel,Not available,2004.0,10.1007/978-3-662-05858-9_17,Assets Beliefs and Equilibria in Economic Dynamics,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,df7b8f1ce06d3e344f22b31ed271bac5,http://dx.doi.org/10.1007/978-3-662-05858-9_17 2925,This study uses a multiagent system to determine which payment rule provides the most revenue in treasury auctions. The agents learn how to bid using straightforward bid adjustment rules that are based on impulse balance learning. The market model encompasses the when-issued auction and secondary markets as well as bidding constraints for primary dealers. I find that when the number of primary bidders is less than 13 (Canada) the Discriminatory payment rule is revenue superior to the Uniform payment across most market price spreads. When the number of primary bidders is greater than 14 (United States) Uniform payment is revenue superior to Discriminatory payment for all market price spreads. In general revenue increases with the minimum bid constraint and with the number of primary dealers for Uniform Average and Vickrey payment rules.,alan mehlenbacher,Not available,2008.0,10.1007/s10614-008-9165-z,Computational Economics,Alan2008,False,,Springer,Not available,Multiagent System Simulations of Treasury Auctions,98100c020ef10278bbee4facd72c53e9,http://dx.doi.org/10.1007/s10614-008-9165-z 2926,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,juan aparicio,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 2927,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,mercedes landete,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 2928,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,juan monge,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 2929,Iterative Multi-unit Combinatorial Auctions are auctions in which: bidders can express bids in successive rounds until a stopping rule is held; there are multiple units of each item; and bids are bundles of items. Data Envelopment Analysis (DEA) is a nonparametric method for measuring the relative efficiency of a set of homogeneous units. In this work we present an algorithm for solving an iterative multi-unit combinatorial auction in which the auctioneer computes at each round a linear anonymous price for each item by using a DEA model and pushes bidders to express bids according to them. A computational study is carried out in order to check the performance of the proposed design.,inmaculada sirvent,Not available,2008.0,10.1007/s11750-008-0053-4,TOP,Juan2008,False,,Springer,Not available,A new pricing scheme based on DEA for iterative multi-unit combinatorial auctions,d801766e0206c9c79194b127a1058bd0,http://dx.doi.org/10.1007/s11750-008-0053-4 2930," We study the role of timing in auctions under the premise that time is a valuable resource. When one object is for sale Dutch and first-price sealed bid auctions are strategically equivalent in standard models and therefore they should yield the same revenue for the auctioneer. We study Dutch and first-price sealed bid auctions in the laboratory with a specific emphasis on the speed of the clock in the Dutch auction. At fast clock speeds revenue in the Dutch auction is significantly lower than it is in the sealed bid auction. When the clock is sufficiently slow however revenue in the Dutch auction is higher than the revenue in the sealed bid auction. We develop and test a simple model of auctions with impatient bidders that is consistent with these laboratory findings. ",elena katok,Not available,2008.0,10.1007/s10683-007-9169-x,Experimental Economics,Elena2008,False,,Springer,Not available,Time is money: The effect of clock speed on seller’s revenue in Dutch auctions,82d0b38145e237e126df189d4046b89a,http://dx.doi.org/10.1007/s10683-007-9169-x 2931," We study the role of timing in auctions under the premise that time is a valuable resource. When one object is for sale Dutch and first-price sealed bid auctions are strategically equivalent in standard models and therefore they should yield the same revenue for the auctioneer. We study Dutch and first-price sealed bid auctions in the laboratory with a specific emphasis on the speed of the clock in the Dutch auction. At fast clock speeds revenue in the Dutch auction is significantly lower than it is in the sealed bid auction. When the clock is sufficiently slow however revenue in the Dutch auction is higher than the revenue in the sealed bid auction. We develop and test a simple model of auctions with impatient bidders that is consistent with these laboratory findings. ",anthony kwasnica,Not available,2008.0,10.1007/s10683-007-9169-x,Experimental Economics,Elena2008,False,,Springer,Not available,Time is money: The effect of clock speed on seller’s revenue in Dutch auctions,82d0b38145e237e126df189d4046b89a,http://dx.doi.org/10.1007/s10683-007-9169-x 2932,This article presents an empirical study of paintings that have failed to meet their reserve price at auction. In the art trade it is often claimed that when an advertised item goes unsold at auction it will sell for less in the future. We have constructed a new dataset specifically for the purpose of testing this proposition. To preview our results we find that paintings which come to auction and failed return significantly less when they are eventually sold than those paintings that have not been advertised at auction between sales. These lower returns may occur because of common value effects idiosyncratic downward trends in tastes or changes in the seller’s reserve price.,alan beggs,Not available,2008.0,10.1007/s10824-008-9077-8,Journal of Cultural Economics,Alan2008,False,,Springer,Not available,Failure to meet the reserve price: the impact on returns to art,a1f3e1a41b0b8ae0a9801cbc6b248943,http://dx.doi.org/10.1007/s10824-008-9077-8 2933,This article presents an empirical study of paintings that have failed to meet their reserve price at auction. In the art trade it is often claimed that when an advertised item goes unsold at auction it will sell for less in the future. We have constructed a new dataset specifically for the purpose of testing this proposition. To preview our results we find that paintings which come to auction and failed return significantly less when they are eventually sold than those paintings that have not been advertised at auction between sales. These lower returns may occur because of common value effects idiosyncratic downward trends in tastes or changes in the seller’s reserve price.,kathryn graddy,Not available,2008.0,10.1007/s10824-008-9077-8,Journal of Cultural Economics,Alan2008,False,,Springer,Not available,Failure to meet the reserve price: the impact on returns to art,a1f3e1a41b0b8ae0a9801cbc6b248943,http://dx.doi.org/10.1007/s10824-008-9077-8 2934,We show why the failure of the affiliation assumption prevents the double auction from achieving efficient outcomes when values are interdependent. This motivates the study of an ascending price version of the double auction. It is shown that when there is a sufficiently large but still finite number of sellers this mechanism has an ,michael peters,Not available,2008.0,10.1007/s00199-007-0297-5,Economic Theory,Michael2008,False,,Springer,Not available,An ascending double auction,2a0ddc4d0c290363d7e77421600200aa,http://dx.doi.org/10.1007/s00199-007-0297-5 2935,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders’ reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,peter cramton,Not available,2004.0,10.1007/978-3-662-05858-9_17,Assets Beliefs and Equilibria in Economic Dynamics,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,df7b8f1ce06d3e344f22b31ed271bac5,http://dx.doi.org/10.1007/978-3-662-05858-9_17 2936,We show why the failure of the affiliation assumption prevents the double auction from achieving efficient outcomes when values are interdependent. This motivates the study of an ascending price version of the double auction. It is shown that when there is a sufficiently large but still finite number of sellers this mechanism has an ,sergei severinov,Not available,2008.0,10.1007/s00199-007-0297-5,Economic Theory,Michael2008,False,,Springer,Not available,An ascending double auction,2a0ddc4d0c290363d7e77421600200aa,http://dx.doi.org/10.1007/s00199-007-0297-5 2937,We consider an environment with a single divisible good and two bidders. The valuations of the bidders are private information but one bidder has a commonly known budget constraint. For this environment we derive the revenue maximizing subsidy free dominant strategy incentive compatible auction.,alexey malakhov,Not available,2008.0,10.1007/s10058-008-0051-x,Review of Economic Design,Alexey2008,False,,Springer,Not available,Optimal auctions for asymmetrically budget constrained bidders,0bc15366c6b1d5d9dadda5f5d6ed806c,http://dx.doi.org/10.1007/s10058-008-0051-x 2938,We consider an environment with a single divisible good and two bidders. The valuations of the bidders are private information but one bidder has a commonly known budget constraint. For this environment we derive the revenue maximizing subsidy free dominant strategy incentive compatible auction.,rakesh vohra,Not available,2008.0,10.1007/s10058-008-0051-x,Review of Economic Design,Alexey2008,False,,Springer,Not available,Optimal auctions for asymmetrically budget constrained bidders,0bc15366c6b1d5d9dadda5f5d6ed806c,http://dx.doi.org/10.1007/s10058-008-0051-x 2939,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,grano de,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 2940,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,d. medeiros,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 2941,This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage nurses bid for their preferred working shifts and rest days using “points”. An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.,david eitel,Not available,2008.0,10.1007/s10729-008-9087-2,Health Care Management Science,Melanie2008,False,,Springer,Not available,Accommodating individual preferences in nurse scheduling via auctions and optimization,37439edaa5102c3b337e2b6557a84fc8,http://dx.doi.org/10.1007/s10729-008-9087-2 2942,We propose a powerful fully automated and numerically robust algorithm to compute (inverse) equilibrium bid functions for asymmetric Independent Private Values First-Price auctions. The algorithm relies upon a built-in algebra of local Taylor-series expansions in order to compute highly accurate solutions to the set of differential equations characterizing first order conditions. It offers an extensive user friendly menu whereby one can assign commonly-used distributions to bidders and can also create arbitrary (non-inclusive) coalitions. In addition to (inverse) bid functions the algorithm also computes a full range of auxiliary statistics of interest (expected revenues probabilities of winning probability of retention under reserve pricing and on request optimal reserve price). The algorithm also includes a built-in numerical procedure designed to automatically produce local Taylor-series expansions for any user-supplied distribution whether analytical or tabulated (empirical parametric semi- or non-parametric). It provides a tool of unparalleled flexibility for the numerical investigation of theoretical conjectures of interest and/or for easy implementation within any numerical empirical inference procedure relying upon inverse bid functions.,wayne-roy gayle,Not available,2008.0,10.1007/s10614-008-9125-7,Computational Economics,Wayne-Roy2008,False,,Springer,Not available,Numerical Solutions of Asymmetric First-Price Independent Private Values Auctions,9c429d9ac97f38833b1d7b2beedc8e7a,http://dx.doi.org/10.1007/s10614-008-9125-7 2943,We propose a powerful fully automated and numerically robust algorithm to compute (inverse) equilibrium bid functions for asymmetric Independent Private Values First-Price auctions. The algorithm relies upon a built-in algebra of local Taylor-series expansions in order to compute highly accurate solutions to the set of differential equations characterizing first order conditions. It offers an extensive user friendly menu whereby one can assign commonly-used distributions to bidders and can also create arbitrary (non-inclusive) coalitions. In addition to (inverse) bid functions the algorithm also computes a full range of auxiliary statistics of interest (expected revenues probabilities of winning probability of retention under reserve pricing and on request optimal reserve price). The algorithm also includes a built-in numerical procedure designed to automatically produce local Taylor-series expansions for any user-supplied distribution whether analytical or tabulated (empirical parametric semi- or non-parametric). It provides a tool of unparalleled flexibility for the numerical investigation of theoretical conjectures of interest and/or for easy implementation within any numerical empirical inference procedure relying upon inverse bid functions.,jean richard,Not available,2008.0,10.1007/s10614-008-9125-7,Computational Economics,Wayne-Roy2008,False,,Springer,Not available,Numerical Solutions of Asymmetric First-Price Independent Private Values Auctions,9c429d9ac97f38833b1d7b2beedc8e7a,http://dx.doi.org/10.1007/s10614-008-9125-7 2944,With the increasing demands for radio spectrum techniques are being explored that would allow dynamic access of spectrum bands that are under-utilized. In this regard a new paradigm called dynamic spectrum access is being investigated where wireless service providers (WSPs) would dynamically seek more spectrum from the under-utilized licensed bands when and where they need without interfering with the primary users. Currently there is little understanding on how such a dynamic allocation will operate so as to make the system feasible under economic terms. In this paper we consider the dynamic spectrum allocation process where multiple WSPs (bidders) compete to acquire necessary spectrum band from a common pool of spectrum. We use auction theory to analyze the allocation process when the demand from WSPs exceeds the available spectrum. We investigate various auction mechanisms under different spectrum allocation constraints to find WSPs’ bidding strategies and revenue generated by spectrum owner. We show that sequential bidding of bands provides better result than the concurrent bidding when WSPs are constrained to at most single unit allocation. On the other hand when the bidders request for multiple units (i.e. they are not restricted by allocation constraints) synchronous auction mechanism proves to be beneficial than asynchronous auctions.,shamik sengupta,Not available,2008.0,10.1007/s11036-008-0081-1,Mobile Networks and Applications,Shamik2008,False,,Springer,Not available,Designing Auction Mechanisms for Dynamic Spectrum Access,56efd06772c98a7f8ea133634437f7c6,http://dx.doi.org/10.1007/s11036-008-0081-1 2945,With the increasing demands for radio spectrum techniques are being explored that would allow dynamic access of spectrum bands that are under-utilized. In this regard a new paradigm called dynamic spectrum access is being investigated where wireless service providers (WSPs) would dynamically seek more spectrum from the under-utilized licensed bands when and where they need without interfering with the primary users. Currently there is little understanding on how such a dynamic allocation will operate so as to make the system feasible under economic terms. In this paper we consider the dynamic spectrum allocation process where multiple WSPs (bidders) compete to acquire necessary spectrum band from a common pool of spectrum. We use auction theory to analyze the allocation process when the demand from WSPs exceeds the available spectrum. We investigate various auction mechanisms under different spectrum allocation constraints to find WSPs’ bidding strategies and revenue generated by spectrum owner. We show that sequential bidding of bands provides better result than the concurrent bidding when WSPs are constrained to at most single unit allocation. On the other hand when the bidders request for multiple units (i.e. they are not restricted by allocation constraints) synchronous auction mechanism proves to be beneficial than asynchronous auctions.,mainak chatterjee,Not available,2008.0,10.1007/s11036-008-0081-1,Mobile Networks and Applications,Shamik2008,False,,Springer,Not available,Designing Auction Mechanisms for Dynamic Spectrum Access,56efd06772c98a7f8ea133634437f7c6,http://dx.doi.org/10.1007/s11036-008-0081-1 2946,We introduce ,tuomas sandholm,Not available,2004.0,10.1007/978-3-540-25947-3_5,Agent-Mediated Electronic Commerce V. Designing Mechanisms and Systems,Tuomas2004,False,,Springer,Not available,Sequences of Take-It-or-Leave-It Offers: Near-Optimal Auctions Without Full Valuation Revelation,676134debe84dccd130ca5f0c5b24f4b,http://dx.doi.org/10.1007/978-3-540-25947-3_5 2947,An auction house runs a second-price auction with a possibility of resale through re-auctions. It collects listing and closing fees from the seller. We find the fees which maximize the revenue of the auction house. In particular we show that the optimal listing fee is zero. Our findings are consistent with the policies of eBay Amazon Yahoo and other Internet auctions.,alexander matros,Not available,2008.0,10.1007/s10058-008-0044-9,Review of Economic Design,Alexander2008,False,,Springer,Not available,Optimal fees in internet auctions,e1ed97265aeaa67f52b96fde539f8e31,http://dx.doi.org/10.1007/s10058-008-0044-9 2948,An auction house runs a second-price auction with a possibility of resale through re-auctions. It collects listing and closing fees from the seller. We find the fees which maximize the revenue of the auction house. In particular we show that the optimal listing fee is zero. Our findings are consistent with the policies of eBay Amazon Yahoo and other Internet auctions.,andriy zapechelnyuk,Not available,2008.0,10.1007/s10058-008-0044-9,Review of Economic Design,Alexander2008,False,,Springer,Not available,Optimal fees in internet auctions,e1ed97265aeaa67f52b96fde539f8e31,http://dx.doi.org/10.1007/s10058-008-0044-9 2949,This paper investigates the relative efficiency of two double-auction mechanisms for power exchanges using agent-based modeling. Two standard pricing rules are considered and compared (i.e. “discriminatory” and “uniform”) and computational experiments characterized by different inelastic demand level explore oligopolistic competitions on both quantity and price between learning sellers/producers. Two reinforcement learning algorithms are considered as well—“Marimon and McGrattan” and “Q-learning”—in an attempt to simulate different behavioral types. In particular greedy sellers (optimizing their instantaneous rewards on a tick-by-tick basis) and inter-temporal optimizing sellers are simulated. Results are interpreted relative to game-theoretical solutions and performance metrics. Nash equilibria in pure strategies and sellers’ joint profit maximization are employed to analyze the convergence behavior of the learning algorithms. Furthermore the difference between payments to suppliers and total generation costs are estimated so as to measure the degree of market inefficiency. Results point out that collusive behaviors are penalized by the discriminatory auction mechanism in low demand scenarios whereas in a high demand scenario the difference appears to be negligible.,eric guerci,Not available,2008.0,10.1007/s10614-008-9127-5,Computational Economics,Eric2008,False,,Springer,Not available,Learning Agents in an Artificial Power Exchange: Tacit Collusion Market Power and Efficiency of Two Double-auction Mechanisms,2af2f7f3cee5d0f1a9a184deda5555d6,http://dx.doi.org/10.1007/s10614-008-9127-5 2950,This paper investigates the relative efficiency of two double-auction mechanisms for power exchanges using agent-based modeling. Two standard pricing rules are considered and compared (i.e. “discriminatory” and “uniform”) and computational experiments characterized by different inelastic demand level explore oligopolistic competitions on both quantity and price between learning sellers/producers. Two reinforcement learning algorithms are considered as well—“Marimon and McGrattan” and “Q-learning”—in an attempt to simulate different behavioral types. In particular greedy sellers (optimizing their instantaneous rewards on a tick-by-tick basis) and inter-temporal optimizing sellers are simulated. Results are interpreted relative to game-theoretical solutions and performance metrics. Nash equilibria in pure strategies and sellers’ joint profit maximization are employed to analyze the convergence behavior of the learning algorithms. Furthermore the difference between payments to suppliers and total generation costs are estimated so as to measure the degree of market inefficiency. Results point out that collusive behaviors are penalized by the discriminatory auction mechanism in low demand scenarios whereas in a high demand scenario the difference appears to be negligible.,stefano ivaldi,Not available,2008.0,10.1007/s10614-008-9127-5,Computational Economics,Eric2008,False,,Springer,Not available,Learning Agents in an Artificial Power Exchange: Tacit Collusion Market Power and Efficiency of Two Double-auction Mechanisms,2af2f7f3cee5d0f1a9a184deda5555d6,http://dx.doi.org/10.1007/s10614-008-9127-5 2951,This paper investigates the relative efficiency of two double-auction mechanisms for power exchanges using agent-based modeling. Two standard pricing rules are considered and compared (i.e. “discriminatory” and “uniform”) and computational experiments characterized by different inelastic demand level explore oligopolistic competitions on both quantity and price between learning sellers/producers. Two reinforcement learning algorithms are considered as well—“Marimon and McGrattan” and “Q-learning”—in an attempt to simulate different behavioral types. In particular greedy sellers (optimizing their instantaneous rewards on a tick-by-tick basis) and inter-temporal optimizing sellers are simulated. Results are interpreted relative to game-theoretical solutions and performance metrics. Nash equilibria in pure strategies and sellers’ joint profit maximization are employed to analyze the convergence behavior of the learning algorithms. Furthermore the difference between payments to suppliers and total generation costs are estimated so as to measure the degree of market inefficiency. Results point out that collusive behaviors are penalized by the discriminatory auction mechanism in low demand scenarios whereas in a high demand scenario the difference appears to be negligible.,silvano cincotti,Not available,2008.0,10.1007/s10614-008-9127-5,Computational Economics,Eric2008,False,,Springer,Not available,Learning Agents in an Artificial Power Exchange: Tacit Collusion Market Power and Efficiency of Two Double-auction Mechanisms,2af2f7f3cee5d0f1a9a184deda5555d6,http://dx.doi.org/10.1007/s10614-008-9127-5 2952,Vertical electronic marketplace (EM) is a new inter-organizational intermediary within a single industry that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior research on EM design has given a heavy weight on auction mechanism design. However the feasibility of e-procurement auction to auction providers has long been ignored in academic. With an analysis on 157 vertical EMs from six different industries this paper empirically demonstrates that industry contingencies exist in vertical EMs’ adoption of e-procurement auction service.,weijun zheng,Not available,2008.0,10.1007/s10257-007-0073-x,Information Systems and e-Business Management,Weijun2008,False,,Springer,Not available,An explorative study of industry influences: on vertical e-marketplaces’ adoption of e-procurement auction,ab9e5162db6a278eec9f1f3cf561bcac,http://dx.doi.org/10.1007/s10257-007-0073-x 2953,Vertical electronic marketplace (EM) is a new inter-organizational intermediary within a single industry that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior research on EM design has given a heavy weight on auction mechanism design. However the feasibility of e-procurement auction to auction providers has long been ignored in academic. With an analysis on 157 vertical EMs from six different industries this paper empirically demonstrates that industry contingencies exist in vertical EMs’ adoption of e-procurement auction service.,xiaoqing wang,Not available,2008.0,10.1007/s10257-007-0073-x,Information Systems and e-Business Management,Weijun2008,False,,Springer,Not available,An explorative study of industry influences: on vertical e-marketplaces’ adoption of e-procurement auction,ab9e5162db6a278eec9f1f3cf561bcac,http://dx.doi.org/10.1007/s10257-007-0073-x 2954,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",wei'an li,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 2955,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",desheng wu,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 2956,"Using data on prepaid cards for an online game listed on Taobao.com this paper examines the impact of sellers’ reputation on their sales in China’s online market. It is found that sellers’ good reputation has a positive impact on their sales volume but the marginal effect of this impact decreases severely. We also find that sellers’ affiliation with seller coalitions can increase their sales in a given period. Results show that individual and collective reputation can function well in the absence of mature law and social credit system related to online trade and that private order can substitute public order in a market with immature laws as in China.,借助淘宝网上的在线游戏预付卡等数据 研究中国网上销售中卖方信誉的作用 发现卖方的声誉对其销售量有正面的影响 但这种影响是非线性的。 属于商盟的卖家在给定时间内的销售量高于不属于任何商盟的卖家 从而验证了在有关法律不健全和社会信用不完善的前提下 网上交易中卖家个人声誉和卖家所属商盟集体声誉在销售中的作用。",hao xu,Not available,2008.0,10.1007/s11782-008-0019-2,Frontiers of Business Research in China,Wei’an2008,False,,Springer,Not available,Reputation in China’s online auction market: Evidence from Taobao.com,9c9fdf8f5d31980cafcb62636c076df7,http://dx.doi.org/10.1007/s11782-008-0019-2 2957,We introduce ,andrew gilpin,Not available,2004.0,10.1007/978-3-540-25947-3_5,Agent-Mediated Electronic Commerce V. Designing Mechanisms and Systems,Tuomas2004,False,,Springer,Not available,Sequences of Take-It-or-Leave-It Offers: Near-Optimal Auctions Without Full Valuation Revelation,676134debe84dccd130ca5f0c5b24f4b,http://dx.doi.org/10.1007/978-3-540-25947-3_5 2958,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,markus hinkelmann,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 2959,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,andreas jakoby,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 2960,In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits i.e. encrypted circuits we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically ,peer stechert,Not available,2008.0,10.1007/s11390-008-9174-3,Journal of Computer Science and Technology,Markus2008,False,,Springer,Not available," ",b2beb934054c34c3468c3163a0f8ebc7,http://dx.doi.org/10.1007/s11390-008-9174-3 2961,Auction sellers can use a reserve price to require a minimum bid before items are sold. Theoretical and experimental research has tested the influence of a reserve price in an independent private values auction but little focus has been given to the influence of a reserve price in a first-price common-value auction. We establish an agent-based first-price common-value auction to determine the impact of the reserve price with two buyers and with three buyers. An agent-based approach to this problem is both a unique contribution to the literature and appropriate since finding analytical solutions with common-value auctions is difficult. The agent-based model approach also allows us to consider buyers that have non-symmetric bid functions. Furthermore we introduce a combination of numerical integration techniques with a new particle swarm learning algorithm. The buyers in the model choose their expected-net-revenue-maximizing bid price and sellers choose their expected-revenue-maximizing reserve price. In the two-buyer and three-buyer auction a reserve price increases the equilibrium winning bid price decreases the probability that the item is sold and increases the seller’s expected revenue. A reserve price in a two-buyer auction increases the winning bid price more than including an additional buyer in the auction with no reserve price. However due to only receiving a salvage value when the item does not sell in the auction the seller’s expected revenue is higher in the three-buyer first-price common-value auction without a reserve price than in the two-buyer auction with a reserve price.,christopher boyer,Not available,2014.0,10.1007/s10614-013-9413-8,Computational Economics,N.2014,False,,Springer,Not available,Implications of a Reserve Price in an Agent-Based Common-Value Auction,56d8b54a4a8e0dd5f61d4b678688b3fe,http://dx.doi.org/10.1007/s10614-013-9413-8 2962,Auction sellers can use a reserve price to require a minimum bid before items are sold. Theoretical and experimental research has tested the influence of a reserve price in an independent private values auction but little focus has been given to the influence of a reserve price in a first-price common-value auction. We establish an agent-based first-price common-value auction to determine the impact of the reserve price with two buyers and with three buyers. An agent-based approach to this problem is both a unique contribution to the literature and appropriate since finding analytical solutions with common-value auctions is difficult. The agent-based model approach also allows us to consider buyers that have non-symmetric bid functions. Furthermore we introduce a combination of numerical integration techniques with a new particle swarm learning algorithm. The buyers in the model choose their expected-net-revenue-maximizing bid price and sellers choose their expected-revenue-maximizing reserve price. In the two-buyer and three-buyer auction a reserve price increases the equilibrium winning bid price decreases the probability that the item is sold and increases the seller’s expected revenue. A reserve price in a two-buyer auction increases the winning bid price more than including an additional buyer in the auction with no reserve price. However due to only receiving a salvage value when the item does not sell in the auction the seller’s expected revenue is higher in the three-buyer first-price common-value auction without a reserve price than in the two-buyer auction with a reserve price.,b. brorsen,Not available,2014.0,10.1007/s10614-013-9413-8,Computational Economics,N.2014,False,,Springer,Not available,Implications of a Reserve Price in an Agent-Based Common-Value Auction,56d8b54a4a8e0dd5f61d4b678688b3fe,http://dx.doi.org/10.1007/s10614-013-9413-8 2963,The double auction marketplace usually charges fees to traders to make profits. Although the bidding strategies in double auctions have been widely studied little work has been done on analysing how market fees can affect bidding strategies and how the marketplace selects appropriate fees to make profits. In this paper we will investigate these two problems. Specifically we choose four typical types of fees and use a computational learning approach to analyse the Nash equilibrium bidding strategies of traders when different types of fees are charged. In doing so we draw insights about how different types of market fees can affect the Nash equilibrium bidding strategies. Furthermore we investigate which type of market fees is the most effective in terms of maximising market profits while keeping traders staying in the marketplace.,bing shi,Not available,2014.0,10.1007/978-3-319-13560-1_51,PRICAI 2014: Trends in Artificial Intelligence,Bing2014,False,,Springer,Not available,Bidding with Fees and Setting Effective Fees in a Double Auction Marketplace,3b0cc26eefb23fe25ab0aad9ae70c3b7,http://dx.doi.org/10.1007/978-3-319-13560-1_51 2964,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,hsiangchu lai,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 2965,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,jack hsu,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 2966,Penny auction an emerging popular auction mode requires bidders to pay for each bid. Since its mechanism is different from traditional ones the results of past studies may not be applied to this auction model. The goal of this study is to explore the drivers of engaging in penny auction. Perceived fairness and perceived value are the major cognitions we investigated. We inferred that certain mechanisms adopted by penny auctions may enhance perceived value and fairness of penny auction. An online experiment was implemented to examine the proposed hypotheses. The results confirmed most of our hypotheses – (1) intention to bid is a function of perceived hedonic value transaction utility and perceived price fairness and (2) bidding mechanisms have effects on bidders’ perceptions. Implications for researchers and practitioners are also provided.,hao-min tu,Not available,2014.0,10.1007/978-3-319-07179-4_5,Group Decision and Negotiation. A Process-Oriented View,Hsiangchu2014,False,,Springer,Not available,Exploring the Effect of Bidding Mechanisms in Online Penny Auction,a2776fbef40c01cb1fa486c88c222e16,http://dx.doi.org/10.1007/978-3-319-07179-4_5 2967,Whilst it can be highly desirable for software agents to engage in auctions they are normally restricted to trading within known auctions due to the complexity and heterogeneity of the auction rules within an e-commerce system. To allow for agents to deal with previously unseen protocols we present a proof-carrying code approach using ,w. bai,Not available,2014.0,10.1007/978-3-319-07602-7_4,Formal Aspects of Component Software,W.2014,False,,Springer,Not available,A Proof-Carrying Code Approach to Certificate Auction Mechanisms,97e1a30c168eaa0b73adbf71a0378d28,http://dx.doi.org/10.1007/978-3-319-07602-7_4 2968,Suppose you must auction off a dining room set consisting of four chairs and a table. Should you auction off the entire set or run five separate auctions for each piece? It depends of course on what bidders care about. If every bidder is interested in the dining room set and nothing less the first option is preferable. If some bidders are interested in the set but others are interested only in a chair or two it is not obvious what to do. If you believe that you can raise more by selling off the chairs separately than the set the second option is preferable. Notice deciding requires a knowledge of just how much bidders value different parts of the ensemble. For this reason economic efficiency is enhanced if bidders are allowed to bid directly on ,sven vries,Not available,2004.0,10.1007/978-1-4020-7953-5_7,Handbook of Quantitative Supply Chain Analysis,Sven2004,False,,Springer,Not available,Design of Combinatorial Auctions,d5a5ae7eaec423cf1b32d6decc3b6968,http://dx.doi.org/10.1007/978-1-4020-7953-5_7 2969,Whilst it can be highly desirable for software agents to engage in auctions they are normally restricted to trading within known auctions due to the complexity and heterogeneity of the auction rules within an e-commerce system. To allow for agents to deal with previously unseen protocols we present a proof-carrying code approach using ,e. tadjouddine,Not available,2014.0,10.1007/978-3-319-07602-7_4,Formal Aspects of Component Software,W.2014,False,,Springer,Not available,A Proof-Carrying Code Approach to Certificate Auction Mechanisms,97e1a30c168eaa0b73adbf71a0378d28,http://dx.doi.org/10.1007/978-3-319-07602-7_4 2970,Whilst it can be highly desirable for software agents to engage in auctions they are normally restricted to trading within known auctions due to the complexity and heterogeneity of the auction rules within an e-commerce system. To allow for agents to deal with previously unseen protocols we present a proof-carrying code approach using ,t. payne,Not available,2014.0,10.1007/978-3-319-07602-7_4,Formal Aspects of Component Software,W.2014,False,,Springer,Not available,A Proof-Carrying Code Approach to Certificate Auction Mechanisms,97e1a30c168eaa0b73adbf71a0378d28,http://dx.doi.org/10.1007/978-3-319-07602-7_4 2971,Whilst it can be highly desirable for software agents to engage in auctions they are normally restricted to trading within known auctions due to the complexity and heterogeneity of the auction rules within an e-commerce system. To allow for agents to deal with previously unseen protocols we present a proof-carrying code approach using ,s. guan,Not available,2014.0,10.1007/978-3-319-07602-7_4,Formal Aspects of Component Software,W.2014,False,,Springer,Not available,A Proof-Carrying Code Approach to Certificate Auction Mechanisms,97e1a30c168eaa0b73adbf71a0378d28,http://dx.doi.org/10.1007/978-3-319-07602-7_4 2972,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,josep diaz,Not available,2014.0,10.1007/978-3-642-54423-1_60,LATIN 2014: Theoretical Informatics,Josep2014,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,920c818b0d09fcf5fc9ad7da6394c23e,http://dx.doi.org/10.1007/978-3-642-54423-1_60 2973,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,ioannis giotis,Not available,2014.0,10.1007/978-3-642-54423-1_60,LATIN 2014: Theoretical Informatics,Josep2014,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,920c818b0d09fcf5fc9ad7da6394c23e,http://dx.doi.org/10.1007/978-3-642-54423-1_60 2974,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,lefteris kirousis,Not available,2014.0,10.1007/978-3-642-54423-1_60,LATIN 2014: Theoretical Informatics,Josep2014,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,920c818b0d09fcf5fc9ad7da6394c23e,http://dx.doi.org/10.1007/978-3-642-54423-1_60 2975,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,evangelos markakis,Not available,2014.0,10.1007/978-3-642-54423-1_60,LATIN 2014: Theoretical Informatics,Josep2014,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,920c818b0d09fcf5fc9ad7da6394c23e,http://dx.doi.org/10.1007/978-3-642-54423-1_60 2976,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,maria serna,Not available,2014.0,10.1007/978-3-642-54423-1_60,LATIN 2014: Theoretical Informatics,Josep2014,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,920c818b0d09fcf5fc9ad7da6394c23e,http://dx.doi.org/10.1007/978-3-642-54423-1_60 2977,According to Wikipedia [1] “An auction is a process of buying and selling goods or services by offering them up for bid taking bids and then selling the item to the highest bidder. In economic theory an auction may refer to any mechanism or set of trading rules for exchange.”,peng lin,Not available,2014.0,10.1007/978-3-319-06799-5_2,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Auction Mechanisms,6cdf060a4e295880dda76469ce3bbc94,http://dx.doi.org/10.1007/978-3-319-06799-5_2 2978,According to Wikipedia [1] “An auction is a process of buying and selling goods or services by offering them up for bid taking bids and then selling the item to the highest bidder. In economic theory an auction may refer to any mechanism or set of trading rules for exchange.”,xiaojun feng,Not available,2014.0,10.1007/978-3-319-06799-5_2,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Auction Mechanisms,6cdf060a4e295880dda76469ce3bbc94,http://dx.doi.org/10.1007/978-3-319-06799-5_2 2979,Suppose you must auction off a dining room set consisting of four chairs and a table. Should you auction off the entire set or run five separate auctions for each piece? It depends of course on what bidders care about. If every bidder is interested in the dining room set and nothing less the first option is preferable. If some bidders are interested in the set but others are interested only in a chair or two it is not obvious what to do. If you believe that you can raise more by selling off the chairs separately than the set the second option is preferable. Notice deciding requires a knowledge of just how much bidders value different parts of the ensemble. For this reason economic efficiency is enhanced if bidders are allowed to bid directly on ,rakesh vohra,Not available,2004.0,10.1007/978-1-4020-7953-5_7,Handbook of Quantitative Supply Chain Analysis,Sven2004,False,,Springer,Not available,Design of Combinatorial Auctions,d5a5ae7eaec423cf1b32d6decc3b6968,http://dx.doi.org/10.1007/978-1-4020-7953-5_7 2980,According to Wikipedia [1] “An auction is a process of buying and selling goods or services by offering them up for bid taking bids and then selling the item to the highest bidder. In economic theory an auction may refer to any mechanism or set of trading rules for exchange.”,qian zhang,Not available,2014.0,10.1007/978-3-319-06799-5_2,Auction Design for the Wireless Spectrum Market,Peng2014,False,,Springer,Not available,Auction Mechanisms,6cdf060a4e295880dda76469ce3bbc94,http://dx.doi.org/10.1007/978-3-319-06799-5_2 2981,Winning bids in reverse auctions are efficient solutions (providing that fairly weak assumptions about the bidders are met). The auctions are efficient under the assumption that the utilities of all participants are quasi-linear. Typically this assumption is unrealistic. If that is the case auctions are inefficient mechanisms. This paper outlines the limitations and impracticability of the quasi-linearity assumption and proposes augmenting reverse auctions with negotiations. It shows that when the efficient frontier is concave then it is possible to improve the winning bid through negotiations that follow auctions.,gregory kersten,Not available,2014.0,10.1007/978-3-319-07179-4_4,Group Decision and Negotiation. A Process-Oriented View,E.2014,False,,Springer,Not available,Are Procurement Auctions Good for Society and for Buyers?,e0c9f4b85c3c1dad812a75b72fc2523d,http://dx.doi.org/10.1007/978-3-319-07179-4_4 2982,This paper proposes an iterative sealed-bid auction for selling multiple heterogeneous items to bidders interested in buying at most one item. It generalizes the single item ,albin erlanson,Not available,2014.0,10.1007/s10614-013-9380-0,Computational Economics,Albin2014,False,,Springer,Not available,The Duo-Item Bisection Auction,8d01c070d269e8ee24db227231cae16d,http://dx.doi.org/10.1007/s10614-013-9380-0 2983,,gagan goel,Not available,2014.0,10.1007/978-3-642-27848-8_758-1,Encyclopedia of Algorithms,Gagan2014,False,,Springer,Not available,Revenue Monotone Auctions,46dd1edf501c82bd64fab348622aba0d,http://dx.doi.org/10.1007/978-3-642-27848-8_758-1 2984,,mohammad khani,Not available,2014.0,10.1007/978-3-642-27848-8_758-1,Encyclopedia of Algorithms,Gagan2014,False,,Springer,Not available,Revenue Monotone Auctions,46dd1edf501c82bd64fab348622aba0d,http://dx.doi.org/10.1007/978-3-642-27848-8_758-1 2985,This paper introduces an approach that allows Web services to handle user requests where the price that the users are willing to pay is fixed. In such cases a user search for the highest quality of service based on the submitted fixed price. Instead of searching for individual Web services the user finds it more convenient to send requests to middlemen (or brokers) who act on behalf of a group of Web services. These middlemen then select a Web service within the group to handle the request. In this paper we demonstrate how fixed price requests can be included into the operation of a community of Web services. Our approach introduces auction theory into the selection process. Experiments using real world values are conducted to demonstrate the effectiveness of the approach.,erbin lim,Not available,2014.0,10.1007/978-3-319-14139-8_21,Advances in Conceptual Modeling,Erbin2014,False,,Springer,Not available,Using Fixed-Price Auctions for Selection in Communities of Web Services,838b37fb832cbfb6a2ec1082dd5038cd,http://dx.doi.org/10.1007/978-3-319-14139-8_21 2986,This paper introduces an approach that allows Web services to handle user requests where the price that the users are willing to pay is fixed. In such cases a user search for the highest quality of service based on the submitted fixed price. Instead of searching for individual Web services the user finds it more convenient to send requests to middlemen (or brokers) who act on behalf of a group of Web services. These middlemen then select a Web service within the group to handle the request. In this paper we demonstrate how fixed price requests can be included into the operation of a community of Web services. Our approach introduces auction theory into the selection process. Experiments using real world values are conducted to demonstrate the effectiveness of the approach.,zakaria maamar,Not available,2014.0,10.1007/978-3-319-14139-8_21,Advances in Conceptual Modeling,Erbin2014,False,,Springer,Not available,Using Fixed-Price Auctions for Selection in Communities of Web Services,838b37fb832cbfb6a2ec1082dd5038cd,http://dx.doi.org/10.1007/978-3-319-14139-8_21 2987,We study first-price auctions with resale when there are many bidders and derive existence and characterization results under the assumption that the winner of the initial auction runs a second-price auction with an optimal reserve price. The fact that symmetrization fails when there are more than two bidders has been observed before but we also provide the ,gabor virag,Not available,2013.0,10.1007/s00199-011-0666-y,Economic Theory,Gábor2013,False,,Springer,Not available,First-price auctions with resale: the case of many bidders,d2de9af9cf989bea87e8cad79753aa53,http://dx.doi.org/10.1007/s00199-011-0666-y 2988,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,chenkun tsung,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 2989,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,hannjang ho,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 2990,Utility functions satisfying gross substitutability have been studied extensively in the economics literature [1 11 12] and recently the importance of this property has been recognized in the design of combinatorial polynomial time market equilibrium algorithms [8]. This naturally raises the following question: is it possible to design a combinatorial polynomial time algorithm for this general class of utility functions? We partially answer this question by giving an algorithm for separable differentiable concave utility functions satisfying gross substitutes. Our algorithm uses the auction based approach of [10].We also outline an extension of our method to the Walrasian model.,rahul garg,Not available,2004.0,10.1007/978-3-540-27821-4_12,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Rahul2004,False,,Springer,Not available,An Auction-Based Market Equilibrium Algorithm for the Separable Gross Substitutability Case,b075d7c99e608dca048d5f21f857cd80,http://dx.doi.org/10.1007/978-3-540-27821-4_12 2991,Most critical challenge of applying generalized second price (GSP) idea in multi-round sponsored search auction (SSA) is to prevent revenue loss for search engine provider (SEP). In this paper we propose non-decreasing Sponsored Search Auction (NDSSA) to guarantee SEP’s revenue. Each advertiser’s bid increment is restricted by minimum increase price (MIP) in NDSSA. The MIP determination strategy influences bid convergence speed and SEP’s revenue. Fixed MIP strategy and Additive-Increase/Multiplicative-Decrease (AIMD) principle are applied to determine MIP values and they are evaluated in this paper. For the convergence speed analysis fixed MIP strategy converges faster than AIME in most instances. For SEP’s revenue AIMD assists SEP to gain more revenue than fixed MIP strategy by experiments. Simultaneously SEP’s revenue in Vickrey-Clarke-Groves auction (VCG) is the lower bound of that in AIMD.,singling lee,Not available,2013.0,10.1007/978-3-642-34889-1_8,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,ChenKun2013,False,,Springer,Not available,Analysis of Stable Prices in Non-Decreasing Sponsored Search Auction,0a246653869b2a93fc83b9e8ef019d6d,http://dx.doi.org/10.1007/978-3-642-34889-1_8 2992,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,thomas goff,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2993,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,amy greenwald,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2994,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,elizabeth hilliard,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2995,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,wolfgang ketter,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2996,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,andrew loomis,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2997,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,eric sodomka,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 2998,Classical models of private value auctions assume that bidders know their own private value for the item being auctioned. We explore games where players have a private value but can only learn this value through experimentation a scenario that is typical in AdAuctions. We consider this question in a repeated game context where early participation in the auction can help the bidders learn their own value. We consider what is a good bidding strategy for a player in this game and show that with low enough competition new bidders will enter and experiment but with a bit higher level of competition initial credit offered by the platform can encourage experimentation and hence ultimately can increase revenue.,nishanth dikkala,Not available,2013.0,10.1007/978-3-642-45046-4_11,Web and Internet Economics,Nishanth2013,False,,Springer,Not available,Can Credit Increase Revenue?,119be8c44673a5aba37408b924b2e505,http://dx.doi.org/10.1007/978-3-642-45046-4_11 2999,Classical models of private value auctions assume that bidders know their own private value for the item being auctioned. We explore games where players have a private value but can only learn this value through experimentation a scenario that is typical in AdAuctions. We consider this question in a repeated game context where early participation in the auction can help the bidders learn their own value. We consider what is a good bidding strategy for a player in this game and show that with low enough competition new bidders will enter and experiment but with a bit higher level of competition initial credit offered by the platform can encourage experimentation and hence ultimately can increase revenue.,eva tardos,Not available,2013.0,10.1007/978-3-642-45046-4_11,Web and Internet Economics,Nishanth2013,False,,Springer,Not available,Can Credit Increase Revenue?,119be8c44673a5aba37408b924b2e505,http://dx.doi.org/10.1007/978-3-642-45046-4_11 3000,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,diana dezsi,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 3001,We construct a family of retaliatory equilibria for the Japanese ascending auction for multiple objects and show that while it is immune to many of the tacitly collusive equilibria studied in the literature it is not entirely immune when some bidders are commonly known to be interested in a specific object.,stefano lovo,Not available,2006.0,10.1007/s10058-006-0006-z,Review of Economic Design,Luigi2006,False,,Springer,Not available,Retaliatory Equilibria in a Japanese Ascending Auction for Multiple Objects,d63463343832e16da1da5ae204de8c19,http://dx.doi.org/10.1007/s10058-006-0006-z 3002,Utility functions satisfying gross substitutability have been studied extensively in the economics literature [1 11 12] and recently the importance of this property has been recognized in the design of combinatorial polynomial time market equilibrium algorithms [8]. This naturally raises the following question: is it possible to design a combinatorial polynomial time algorithm for this general class of utility functions? We partially answer this question by giving an algorithm for separable differentiable concave utility functions satisfying gross substitutes. Our algorithm uses the auction based approach of [10].We also outline an extension of our method to the Walrasian model.,sanjiv kapoor,Not available,2004.0,10.1007/978-3-540-27821-4_12,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Rahul2004,False,,Springer,Not available,An Auction-Based Market Equilibrium Algorithm for the Separable Gross Substitutability Case,b075d7c99e608dca048d5f21f857cd80,http://dx.doi.org/10.1007/978-3-540-27821-4_12 3003,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,iulia maries,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 3004,The hereto paper analyses the impact of the number of heterogeneous agents in an evolutionary agent-based model of the stock market when simulated through Adaptive Modeler simulation software application. The paper compares the returns total wealth and distributions of wealth obtained from simulating the evolutionary agent-based model with 500 1 000 1 500 and 2 000 agents which create a virtual stock market using a double auction trading mechanism. Within the agent-based model the population of agents is continuously adapting and evolving by using genetic programming in order to generate new agents by using the trading strategies of the best performing agents and replacing the worst performing agents in a process called breeding.,florentina-olivia balu,Not available,2013.0,10.1007/978-3-642-40495-5_21,Computational Collective Intelligence. Technologies and Applications,Diana2013,False,,Springer,Not available,Heterogeneous Agents’ Interactions in a Double Auction Virtual Stock Market,9af87fe73965f9ee5d4b8d927cad4695,http://dx.doi.org/10.1007/978-3-642-40495-5_21 3005,In spot markets for trading fishes single-sided auctions are used for clearing the market by virtue of its promptness and simplicity which are important in dealing with perishable goods. However in those auctions sellers cannot participate in price-making process. A standard double auction market collects bids from traders and matches buyers’ higher bids and sellers’ lower bids to find the most efficient allocation assuming that values of unsold items remain unchanged. Nevertheless in the spot fish market sellers suffer loss when they fail to sell the fish whose salvage value is lost due to perishability. To solve the problem we investigate the suitable design of an online double auction for fishery markets where bids arrive dynamically with their time limits. Our market mechanism aims at improving traders’ profitability by reducing trade failures in the face of uncertainty of incoming/leaving bids. We developed a heuristic matching rule for the market to prioritize traders’ bids based on their time-criticality and evaluated its performance empirically.,kazuo miyashita,Not available,2013.0,10.1007/978-3-642-38577-3_1,Recent Trends in Applied Artificial Intelligence,Kazuo2013,False,,Springer,Not available,Developing Online Double Auction Mechanism for Fishery Markets,f633dbeb62f87752f22da2460bfaa434,http://dx.doi.org/10.1007/978-3-642-38577-3_1 3006,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,yang zhang,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 3007,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,dusit niyato,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 3008,A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand some of these resources are substitutable (e.g. users can use storage from different places) that they have similar functions to the users. On the other hand some resources are complementary that the user will need them as a bundle (e.g. users need both wireless connection and storage for online photo posting). In this paper we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards.,ping wang,Not available,2013.0,10.1007/978-3-642-39701-1_7,Wireless Algorithms Systems and Applications,Yang2013,False,,Springer,Not available,An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems,ecf5847922ee985fffa56bccad7b494f,http://dx.doi.org/10.1007/978-3-642-39701-1_7 3009,This paper quantitatively studies the endowment effect and the strategy effect in a computerized continuous double auction (CDA) market with ,yuan shao,Not available,2013.0,10.1007/978-3-642-40063-6_63,Proceedings of 20th International Conference on Industrial Engineering and Engineering Management,Yuan2013,False,,Springer,Not available,Decision Making in CDA with Arbitrary Supply-Demand Curves,261b855a011d51365d47e2d8d502ddd4,http://dx.doi.org/10.1007/978-3-642-40063-6_63 3010,This paper quantitatively studies the endowment effect and the strategy effect in a computerized continuous double auction (CDA) market with ,wen-jie zhan,Not available,2013.0,10.1007/978-3-642-40063-6_63,Proceedings of 20th International Conference on Industrial Engineering and Engineering Management,Yuan2013,False,,Springer,Not available,Decision Making in CDA with Arbitrary Supply-Demand Curves,261b855a011d51365d47e2d8d502ddd4,http://dx.doi.org/10.1007/978-3-642-40063-6_63 3011,In contemporary energy markets participants interact with each other via brokers that are responsible for the proper energy flow to and from their clients (usually in the form of long-term or short-term contracts). Power TAC is a realistic simulation of a real-life energy market aiming towards providing a better understanding and modeling of modern energy markets while boosting research on innovative trading strategies. Power TAC models brokers as software agents competing against each other in Double Auction environments in order to increase their client base and market share. Current work discusses such a broker agent architecture striving to maximize his own profit. Within the context of our analysis Double Auction markets are treated as microeconomic systems and based on state-of-the-art price formation strategies the following policies are designed: an adaptive price formation policy a policy for forecasting energy consumption that employs Time Series Analysis primitives and two shout update policies a rule-based policy that acts rather hastily and one based on Fuzzy Logic. The results are quite encouraging and will certainly call for future research.,themistoklis diamantopoulos,Not available,2013.0,10.1007/978-3-642-40864-9_3,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,G.2013,False,,Springer,Not available,Designing Robust Strategies for Continuous Trading in Contemporary Power Markets,20499265a719ae3799fa04ff6e328edb,http://dx.doi.org/10.1007/978-3-642-40864-9_3 3012,In contemporary energy markets participants interact with each other via brokers that are responsible for the proper energy flow to and from their clients (usually in the form of long-term or short-term contracts). Power TAC is a realistic simulation of a real-life energy market aiming towards providing a better understanding and modeling of modern energy markets while boosting research on innovative trading strategies. Power TAC models brokers as software agents competing against each other in Double Auction environments in order to increase their client base and market share. Current work discusses such a broker agent architecture striving to maximize his own profit. Within the context of our analysis Double Auction markets are treated as microeconomic systems and based on state-of-the-art price formation strategies the following policies are designed: an adaptive price formation policy a policy for forecasting energy consumption that employs Time Series Analysis primitives and two shout update policies a rule-based policy that acts rather hastily and one based on Fuzzy Logic. The results are quite encouraging and will certainly call for future research.,andreas symeonidis,Not available,2013.0,10.1007/978-3-642-40864-9_3,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,G.2013,False,,Springer,Not available,Designing Robust Strategies for Continuous Trading in Contemporary Power Markets,20499265a719ae3799fa04ff6e328edb,http://dx.doi.org/10.1007/978-3-642-40864-9_3 3013,Utility functions satisfying gross substitutability have been studied extensively in the economics literature [1 11 12] and recently the importance of this property has been recognized in the design of combinatorial polynomial time market equilibrium algorithms [8]. This naturally raises the following question: is it possible to design a combinatorial polynomial time algorithm for this general class of utility functions? We partially answer this question by giving an algorithm for separable differentiable concave utility functions satisfying gross substitutes. Our algorithm uses the auction based approach of [10].We also outline an extension of our method to the Walrasian model.,vijay vazirani,Not available,2004.0,10.1007/978-3-540-27821-4_12,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Rahul2004,False,,Springer,Not available,An Auction-Based Market Equilibrium Algorithm for the Separable Gross Substitutability Case,b075d7c99e608dca048d5f21f857cd80,http://dx.doi.org/10.1007/978-3-540-27821-4_12 3014,In contemporary energy markets participants interact with each other via brokers that are responsible for the proper energy flow to and from their clients (usually in the form of long-term or short-term contracts). Power TAC is a realistic simulation of a real-life energy market aiming towards providing a better understanding and modeling of modern energy markets while boosting research on innovative trading strategies. Power TAC models brokers as software agents competing against each other in Double Auction environments in order to increase their client base and market share. Current work discusses such a broker agent architecture striving to maximize his own profit. Within the context of our analysis Double Auction markets are treated as microeconomic systems and based on state-of-the-art price formation strategies the following policies are designed: an adaptive price formation policy a policy for forecasting energy consumption that employs Time Series Analysis primitives and two shout update policies a rule-based policy that acts rather hastily and one based on Fuzzy Logic. The results are quite encouraging and will certainly call for future research.,anthony chrysopoulos,Not available,2013.0,10.1007/978-3-642-40864-9_3,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,G.2013,False,,Springer,Not available,Designing Robust Strategies for Continuous Trading in Contemporary Power Markets,20499265a719ae3799fa04ff6e328edb,http://dx.doi.org/10.1007/978-3-642-40864-9_3 3015,Web service composition (WSC) offers a range of solutions for rapid creation of complex applications by facilitating the composition of already existing concrete web services. One critical challenge in WSC is the dynamic selection of concrete services to be bound to the abstract composite service. In our research we identify and elaborate on the challenges involved on developing a market-based mechanism for composite service selection. We propose ,mahboobeh moghaddam,Not available,2013.0,10.1007/978-3-642-37804-1_41,Service-Oriented Computing - ICSOC 2012 Workshops,Mahboobeh2013,False,,Springer,Not available,An Auction-Based Approach for Composite Web Service Selection,002847e94e7d7e0614bb8f09ce7060da,http://dx.doi.org/10.1007/978-3-642-37804-1_41 3016,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,christopher boyer,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3017,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,b. brorsen,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3018,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,tong zhang,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3019,Agent-based simulations are performed to study adaptive learning in the context of asymmetric first-price auctions. Non-linearity of the Nash equilibrium strategies is used to investigate the effect of task complexity on adaptive learning by varying the degree of approximation the agents can handle. In addition learning in different information environments is explored. Social learning allows agents to imitate each other’s bidding strategies based on their relative success. Under individual learning agents are limited to their own experience. We observe convergence to steady states near the predicted equilibrium in all cases. The ability to learn non-linear functions helps the agents with a non-linear equilibrium strategy but hurts the agents with an almost linear one. Better information about the opponent population has a relatively modest impact. A larger number of strategies to experiment with and an ability to systematically compare strategies by holding a number of factors constant have a comparatively stronger beneficial effect.,kirill chernomaz,Not available,2014.0,10.1007/s11403-013-0111-3,Journal of Economic Interaction and Coordination,Kirill2014,False,,Springer,Not available,Adaptive learning in an asymmetric auction: genetic algorithm approach,e800aaf9f37efc422f8562d1ce085344,http://dx.doi.org/10.1007/s11403-013-0111-3 3020,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which incorporate budgets and study their equilibrium and dynamics. Our abstraction has multiple agents bidding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value per item. We abstract this repeated interaction as a one-shot game which we call ,asaph arnon,Not available,2014.0,10.1007/s00224-013-9472-1,Theory of Computing Systems,Asaph2014,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,0ed98b5128a774a891e40933e89c5eed,http://dx.doi.org/10.1007/s00224-013-9472-1 3021,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which incorporate budgets and study their equilibrium and dynamics. Our abstraction has multiple agents bidding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value per item. We abstract this repeated interaction as a one-shot game which we call ,yishay mansour,Not available,2014.0,10.1007/s00224-013-9472-1,Theory of Computing Systems,Asaph2014,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,0ed98b5128a774a891e40933e89c5eed,http://dx.doi.org/10.1007/s00224-013-9472-1 3022,We compare the effects of information acquisition during a descending auction with its static counterpart the first-price sealed-bid auction. In a framework with heterogeneous prior information we show that an equilibrium with information acquisition exists in both auction formats. We show that everything else equal information acquisition is more desirable in the dynamic auction. Moreover we characterize a set of parameter values where more information is acquired in the dynamic auction in equilibrium. If the costs of information acquisition are sufficiently low the sealed-bid auction generates more revenue although the descending auction is more efficient.,vitali gretschko,Not available,2014.0,10.1007/s00199-013-0766-y,Economic Theory,Vitali2014,False,,Springer,Not available,Information acquisition during a descending auction,104ae760528a2f92d8ee0c6f6df2de15,http://dx.doi.org/10.1007/s00199-013-0766-y 3023,We compare the effects of information acquisition during a descending auction with its static counterpart the first-price sealed-bid auction. In a framework with heterogeneous prior information we show that an equilibrium with information acquisition exists in both auction formats. We show that everything else equal information acquisition is more desirable in the dynamic auction. Moreover we characterize a set of parameter values where more information is acquired in the dynamic auction in equilibrium. If the costs of information acquisition are sufficiently low the sealed-bid auction generates more revenue although the descending auction is more efficient.,achim wambach,Not available,2014.0,10.1007/s00199-013-0766-y,Economic Theory,Vitali2014,False,,Springer,Not available,Information acquisition during a descending auction,104ae760528a2f92d8ee0c6f6df2de15,http://dx.doi.org/10.1007/s00199-013-0766-y 3024,In many economic settings convex figures on the plane are for sale. For example one might want to sell advertising space on a newspaper page. Selfish agents must be motivated to report their true values for the figures as well as to report the true figures. Moreover an approximation algorithm should be used for guaranteeing a reasonable solution for the underlying NP-complete problem. We present truthful mechanisms that guarantee a certain fraction of the social welfare as a function of a measure on the geometric diversity of the shapes. We give the first approximation algorithm for packing arbitrary weighted compact convex figures. We use this algorithm and variants of existing algorithms to create polynomial-time truthful mechanisms that approximate the social welfare. We show that each mechanism achieves the best approximation over all the mechanisms of its kind. We also study different models of information and a discrete model where players bid for sets of predefined building blocks.,moshe babaioff,Not available,2004.0,10.1007/978-3-540-27821-4_3,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Moshe2004,False,,Springer,Not available,Computationally-Feasible Truthful Auctions for Convex Bundles,3c65480442fbdc7ca8fbca0ffd2949c8,http://dx.doi.org/10.1007/978-3-540-27821-4_3 3025,We study deterministic single object auctions in the private values environment. We show that an allocation rule is implementable (in dominant strategies) and non-bossy if and only if it is a strongly rationalizable allocation rule. With a mild continuity condition we show that an allocation rule is implementable and non-bossy if and only if it is a simple utility maximizer (with appropriate tie-breaking). All our characterizations extend the seminal result of Roberts (“Aggregation and Revelation of Preferences” pp. 321–348 ,debasis mishra,Not available,2014.0,10.1007/s40505-014-0031-y,Economic Theory Bulletin,Debasis2014,False,,Springer,Not available,Non-bossy single object auctions,06f2927b9477e8cac3884f17c72e5c9b,http://dx.doi.org/10.1007/s40505-014-0031-y 3026,We study deterministic single object auctions in the private values environment. We show that an allocation rule is implementable (in dominant strategies) and non-bossy if and only if it is a strongly rationalizable allocation rule. With a mild continuity condition we show that an allocation rule is implementable and non-bossy if and only if it is a simple utility maximizer (with appropriate tie-breaking). All our characterizations extend the seminal result of Roberts (“Aggregation and Revelation of Preferences” pp. 321–348 ,abdul quadir,Not available,2014.0,10.1007/s40505-014-0031-y,Economic Theory Bulletin,Debasis2014,False,,Springer,Not available,Non-bossy single object auctions,06f2927b9477e8cac3884f17c72e5c9b,http://dx.doi.org/10.1007/s40505-014-0031-y 3027," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",yu-e sun,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3028," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",he huang,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3029," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",kai xing,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3030," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",zhili chen,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3031," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",jianying zheng,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3032," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",hongli xu,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3033," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",liusheng huang,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3034,This paper studies the auction-driven dynamic spectrum access in cognitive radio networks with heterogeneous secondary users who have different risk attitudes. First a game theoretic framework is established for auction-driven dynamic spectrum access in cognitive radio networks. The utility functions and bidding strategies of heterogeneous secondary users are defined and the parameterized auction mechanisms of primary user are also introduced. Then we formulate the auction-driven dynamic spectrum access problem as a finite discrete game with a mixed- or pure-strategy Nash equilibrium solution. We study the existence and uniqueness properties of the pure-strategy Nash equilibrium in the defined game. Next we propose a distributed learning automata algorithm (DLA) to attain the Nash equilibrium of the defined game with limited feedback. The adaptive mechanism design is realized in the updating procedure of our DLA algorithm. We further prove that our DLA algorithm converges to a Nash equilibrium of the defined game. Finally simulation results show that our DLA algorithm is efficient and outperforms the dynamic spectrum access schemes with fixed auction mechanism.,wei zhong,Not available,2014.0,10.1186/1687-1499-2014-44,EURASIP Journal on Wireless Communications and Networking,Wei2014,True,,Springer,Not available,Adaptive mechanism design and game theoretic analysis of auction-driven dynamic spectrum access in cognitive radio networks,d45651b249fb8590977ca5b3127fe565,http://dx.doi.org/10.1186/1687-1499-2014-44 3035,In many economic settings convex figures on the plane are for sale. For example one might want to sell advertising space on a newspaper page. Selfish agents must be motivated to report their true values for the figures as well as to report the true figures. Moreover an approximation algorithm should be used for guaranteeing a reasonable solution for the underlying NP-complete problem. We present truthful mechanisms that guarantee a certain fraction of the social welfare as a function of a measure on the geometric diversity of the shapes. We give the first approximation algorithm for packing arbitrary weighted compact convex figures. We use this algorithm and variants of existing algorithms to create polynomial-time truthful mechanisms that approximate the social welfare. We show that each mechanism achieves the best approximation over all the mechanisms of its kind. We also study different models of information and a discrete model where players bid for sets of predefined building blocks.,liad blumrosen,Not available,2004.0,10.1007/978-3-540-27821-4_3,Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques,Moshe2004,False,,Springer,Not available,Computationally-Feasible Truthful Auctions for Convex Bundles,3c65480442fbdc7ca8fbca0ffd2949c8,http://dx.doi.org/10.1007/978-3-540-27821-4_3 3036,This paper studies the auction-driven dynamic spectrum access in cognitive radio networks with heterogeneous secondary users who have different risk attitudes. First a game theoretic framework is established for auction-driven dynamic spectrum access in cognitive radio networks. The utility functions and bidding strategies of heterogeneous secondary users are defined and the parameterized auction mechanisms of primary user are also introduced. Then we formulate the auction-driven dynamic spectrum access problem as a finite discrete game with a mixed- or pure-strategy Nash equilibrium solution. We study the existence and uniqueness properties of the pure-strategy Nash equilibrium in the defined game. Next we propose a distributed learning automata algorithm (DLA) to attain the Nash equilibrium of the defined game with limited feedback. The adaptive mechanism design is realized in the updating procedure of our DLA algorithm. We further prove that our DLA algorithm converges to a Nash equilibrium of the defined game. Finally simulation results show that our DLA algorithm is efficient and outperforms the dynamic spectrum access schemes with fixed auction mechanism.,youyun xu,Not available,2014.0,10.1186/1687-1499-2014-44,EURASIP Journal on Wireless Communications and Networking,Wei2014,True,,Springer,Not available,Adaptive mechanism design and game theoretic analysis of auction-driven dynamic spectrum access in cognitive radio networks,d45651b249fb8590977ca5b3127fe565,http://dx.doi.org/10.1186/1687-1499-2014-44 3037,This paper studies the auction-driven dynamic spectrum access in cognitive radio networks with heterogeneous secondary users who have different risk attitudes. First a game theoretic framework is established for auction-driven dynamic spectrum access in cognitive radio networks. The utility functions and bidding strategies of heterogeneous secondary users are defined and the parameterized auction mechanisms of primary user are also introduced. Then we formulate the auction-driven dynamic spectrum access problem as a finite discrete game with a mixed- or pure-strategy Nash equilibrium solution. We study the existence and uniqueness properties of the pure-strategy Nash equilibrium in the defined game. Next we propose a distributed learning automata algorithm (DLA) to attain the Nash equilibrium of the defined game with limited feedback. The adaptive mechanism design is realized in the updating procedure of our DLA algorithm. We further prove that our DLA algorithm converges to a Nash equilibrium of the defined game. Finally simulation results show that our DLA algorithm is efficient and outperforms the dynamic spectrum access schemes with fixed auction mechanism.,jiaheng wang,Not available,2014.0,10.1186/1687-1499-2014-44,EURASIP Journal on Wireless Communications and Networking,Wei2014,True,,Springer,Not available,Adaptive mechanism design and game theoretic analysis of auction-driven dynamic spectrum access in cognitive radio networks,d45651b249fb8590977ca5b3127fe565,http://dx.doi.org/10.1186/1687-1499-2014-44 3038,This paper studies the auction-driven dynamic spectrum access in cognitive radio networks with heterogeneous secondary users who have different risk attitudes. First a game theoretic framework is established for auction-driven dynamic spectrum access in cognitive radio networks. The utility functions and bidding strategies of heterogeneous secondary users are defined and the parameterized auction mechanisms of primary user are also introduced. Then we formulate the auction-driven dynamic spectrum access problem as a finite discrete game with a mixed- or pure-strategy Nash equilibrium solution. We study the existence and uniqueness properties of the pure-strategy Nash equilibrium in the defined game. Next we propose a distributed learning automata algorithm (DLA) to attain the Nash equilibrium of the defined game with limited feedback. The adaptive mechanism design is realized in the updating procedure of our DLA algorithm. We further prove that our DLA algorithm converges to a Nash equilibrium of the defined game. Finally simulation results show that our DLA algorithm is efficient and outperforms the dynamic spectrum access schemes with fixed auction mechanism.,dapeng li,Not available,2014.0,10.1186/1687-1499-2014-44,EURASIP Journal on Wireless Communications and Networking,Wei2014,True,,Springer,Not available,Adaptive mechanism design and game theoretic analysis of auction-driven dynamic spectrum access in cognitive radio networks,d45651b249fb8590977ca5b3127fe565,http://dx.doi.org/10.1186/1687-1499-2014-44 3039,This paper studies the auction-driven dynamic spectrum access in cognitive radio networks with heterogeneous secondary users who have different risk attitudes. First a game theoretic framework is established for auction-driven dynamic spectrum access in cognitive radio networks. The utility functions and bidding strategies of heterogeneous secondary users are defined and the parameterized auction mechanisms of primary user are also introduced. Then we formulate the auction-driven dynamic spectrum access problem as a finite discrete game with a mixed- or pure-strategy Nash equilibrium solution. We study the existence and uniqueness properties of the pure-strategy Nash equilibrium in the defined game. Next we propose a distributed learning automata algorithm (DLA) to attain the Nash equilibrium of the defined game with limited feedback. The adaptive mechanism design is realized in the updating procedure of our DLA algorithm. We further prove that our DLA algorithm converges to a Nash equilibrium of the defined game. Finally simulation results show that our DLA algorithm is efficient and outperforms the dynamic spectrum access schemes with fixed auction mechanism.,huaglory tianfield,Not available,2014.0,10.1186/1687-1499-2014-44,EURASIP Journal on Wireless Communications and Networking,Wei2014,True,,Springer,Not available,Adaptive mechanism design and game theoretic analysis of auction-driven dynamic spectrum access in cognitive radio networks,d45651b249fb8590977ca5b3127fe565,http://dx.doi.org/10.1186/1687-1499-2014-44 3040,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,diego aycinena,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3041,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,rimvydas baltaduonis,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3042,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,lucas rentschler,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3043,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,qiang gong,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3044,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,xu tan,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3045,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,yiqing xing,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3046,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,marina bitsaki,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 3047,The means of contest design may include differential taxation of the prize. This paper considers all-pay auctions under complete information and establishes that given a revenue-maximizing contest designer who faces a balanced-budget constraint the optimal taxation scheme corresponding to an all-pay auction is appealing in two senses. First it ensures extreme equitable final prize valuations. Second it is effective; it yields total contestants’ efforts that are larger than those obtained under almost any pure-strategy equilibrium of a Tullock-type lottery contest.,yosef mealem,Not available,2014.0,10.1007/s00355-013-0727-1,Social Choice and Welfare,Yosef2014,False,,Springer,Not available,Equity and effectiveness of optimal taxation in contests under an all-pay auction,5c647d9b9615a71e8a14160fb4245ff2,http://dx.doi.org/10.1007/s00355-013-0727-1 3048,The means of contest design may include differential taxation of the prize. This paper considers all-pay auctions under complete information and establishes that given a revenue-maximizing contest designer who faces a balanced-budget constraint the optimal taxation scheme corresponding to an all-pay auction is appealing in two senses. First it ensures extreme equitable final prize valuations. Second it is effective; it yields total contestants’ efforts that are larger than those obtained under almost any pure-strategy equilibrium of a Tullock-type lottery contest.,shmuel nitzan,Not available,2014.0,10.1007/s00355-013-0727-1,Social Choice and Welfare,Yosef2014,False,,Springer,Not available,Equity and effectiveness of optimal taxation in contests under an all-pay auction,5c647d9b9615a71e8a14160fb4245ff2,http://dx.doi.org/10.1007/s00355-013-0727-1 3049,Auctions are increasingly being considered as a mechanism for allocating conservation contracts to private landowners. This interest is based on the widely held belief that competitive bidding helps minimize information rents. This study constructs an agent-based model to evaluate the long term performance of conservation auctions under settings where bidders are allowed to learn from previous outcomes. The results clearly indicate that the efficiency benefits of one-shot auctions are quickly eroded under dynamic settings. Furthermore the auction mechanism is not found to be superior to fixed payment schemes except when the latter involve the use of high prices.,atakelty hailu,Not available,2005.0,10.1007/3-540-27296-8_3,Nonlinear Dynamics and Heterogeneous Interacting Agents,Atakelty2005,False,,Springer,Not available,Learning in a “Basket of Crabs”: An Agent-Based Computational Model of Repeated Conservation Auctions,05a499515721731b24d301ffeeb39b49,http://dx.doi.org/10.1007/3-540-27296-8_3 3050,Auctions are increasingly being considered as a mechanism for allocating conservation contracts to private landowners. This interest is based on the widely held belief that competitive bidding helps minimize information rents. This study constructs an agent-based model to evaluate the long term performance of conservation auctions under settings where bidders are allowed to learn from previous outcomes. The results clearly indicate that the efficiency benefits of one-shot auctions are quickly eroded under dynamic settings. Furthermore the auction mechanism is not found to be superior to fixed payment schemes except when the latter involve the use of high prices.,steven schilizzi,Not available,2005.0,10.1007/3-540-27296-8_3,Nonlinear Dynamics and Heterogeneous Interacting Agents,Atakelty2005,False,,Springer,Not available,Learning in a “Basket of Crabs”: An Agent-Based Computational Model of Repeated Conservation Auctions,05a499515721731b24d301ffeeb39b49,http://dx.doi.org/10.1007/3-540-27296-8_3 3051,This paper tests the empirical predictions of recent theories of the endogenous entry of bidders in auctions. Data come from a field experiment involving sealed-bid auctions for collectible trading cards over the Internet. Manipulating the reserve prices in the auctions as an experimental treatment variable generates several results. First observed participation behavior indicates that bidders consider their bid submission to be costly and that bidder participation is indeed an endogenous decision. Second the participation is more consistent with a mixed-strategy entry equilibrium than with a deterministic equilibrium. Third the data reject the prediction that the profit-maximizing reserve price is greater than or equal to the auctioneer’s salvage value for the good showing instead that a zero reserve price provides higher expected profits in this case.,david reiley,Not available,2005.0,10.1007/0-387-24243-0_5,Experimental Business Research,H.2005,False,,Springer,Not available,Experimental Evidence on the Endogenous Entry of Bidders in Internet Auctions,187e6528ac52b9f4f2a686757735a9a4,http://dx.doi.org/10.1007/0-387-24243-0_5 3052,Auctions are the most widely used strategic game-theoretic mechanisms in the Internet. Auctions have been mostly studied from a game-theoretic and economic perspective although recent work in AI and OR has been concerned with computational aspects of auctions as well. When faced from a computational perspective combinatorial auctions are perhaps the most challenging type of auctions. Combinatorial auctions are auctions where buyers may submit bids for bundles of goods. Another interesting direction is that of constrained auctions where some restrictions are imposed upon the set of feasible solutions. Given that finding an optimal allocation of the goods in a combinatorial and/or constrained auction is in general intractable researchers have been concerned with exposing tractable instances of combinatorial and constrained auctions problems. In this chapter we discuss the use of b-matching techniques in the context of combinatorial and constrained auctions.,michal penn,Not available,2005.0,10.1007/0-387-25036-0_7,Graph Theory Combinatorics and Algorithms,Michal2005,False,,Springer,Not available,On Multi-Object Auctions and Matching Theory: Algorithmic Aspects,5755023b3b568f14bba1ea62cece22aa,http://dx.doi.org/10.1007/0-387-25036-0_7 3053,Auctions are the most widely used strategic game-theoretic mechanisms in the Internet. Auctions have been mostly studied from a game-theoretic and economic perspective although recent work in AI and OR has been concerned with computational aspects of auctions as well. When faced from a computational perspective combinatorial auctions are perhaps the most challenging type of auctions. Combinatorial auctions are auctions where buyers may submit bids for bundles of goods. Another interesting direction is that of constrained auctions where some restrictions are imposed upon the set of feasible solutions. Given that finding an optimal allocation of the goods in a combinatorial and/or constrained auction is in general intractable researchers have been concerned with exposing tractable instances of combinatorial and constrained auctions problems. In this chapter we discuss the use of b-matching techniques in the context of combinatorial and constrained auctions.,moshe tennenholtz,Not available,2005.0,10.1007/0-387-25036-0_7,Graph Theory Combinatorics and Algorithms,Michal2005,False,,Springer,Not available,On Multi-Object Auctions and Matching Theory: Algorithmic Aspects,5755023b3b568f14bba1ea62cece22aa,http://dx.doi.org/10.1007/0-387-25036-0_7 3054,,veronika grimm,Not available,2005.0,10.1007/0-387-25706-3_14,Advances in Public Economics: Utility Choice and Welfare,Veronika2005,False,,Springer,Not available,Overbidding in First Price Private Value Auctions Revisited: Implications of a Multi-Unit Auctions Experiment,a66da038de0cb7cb824cdc7c39698313,http://dx.doi.org/10.1007/0-387-25706-3_14 3055,,dirk engelmann,Not available,2005.0,10.1007/0-387-25706-3_14,Advances in Public Economics: Utility Choice and Welfare,Veronika2005,False,,Springer,Not available,Overbidding in First Price Private Value Auctions Revisited: Implications of a Multi-Unit Auctions Experiment,a66da038de0cb7cb824cdc7c39698313,http://dx.doi.org/10.1007/0-387-25706-3_14 3056,Agent-mediated electronic commerce has recently commanded much attention. Bidding support agents have been studied very extensively. We envision a future in which many people can trade their goods by using a bidding support agent on Internet auctions. In this paper we formalize a situation in which people are trading their goods on Internet auctions and employing bidding support agents. Then we prove that people who use a bidding support agent can successively win trades. Also we prove that the situation in which every people use a bidding support agent can satisfied strategy proofness and Pareto optimality. Further we present in the situation unsupported bidders do not make a positive benefit.,takayuki ito,Not available,2005.0,10.1007/11504894_25,Innovations in Applied Artificial Intelligence,Takayuki2005,False,,Springer,Not available,A Strategy-Proof Mechanism Based on Multiple Auction Support Agents,19307efeb7dde215f4c6ac7352137558,http://dx.doi.org/10.1007/11504894_25 3057,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,george stamoulis,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 3058,Agent-mediated electronic commerce has recently commanded much attention. Bidding support agents have been studied very extensively. We envision a future in which many people can trade their goods by using a bidding support agent on Internet auctions. In this paper we formalize a situation in which people are trading their goods on Internet auctions and employing bidding support agents. Then we prove that people who use a bidding support agent can successively win trades. Also we prove that the situation in which every people use a bidding support agent can satisfied strategy proofness and Pareto optimality. Further we present in the situation unsupported bidders do not make a positive benefit.,tokuro matsuo,Not available,2005.0,10.1007/11504894_25,Innovations in Applied Artificial Intelligence,Takayuki2005,False,,Springer,Not available,A Strategy-Proof Mechanism Based on Multiple Auction Support Agents,19307efeb7dde215f4c6ac7352137558,http://dx.doi.org/10.1007/11504894_25 3059,Agent-mediated electronic commerce has recently commanded much attention. Bidding support agents have been studied very extensively. We envision a future in which many people can trade their goods by using a bidding support agent on Internet auctions. In this paper we formalize a situation in which people are trading their goods on Internet auctions and employing bidding support agents. Then we prove that people who use a bidding support agent can successively win trades. Also we prove that the situation in which every people use a bidding support agent can satisfied strategy proofness and Pareto optimality. Further we present in the situation unsupported bidders do not make a positive benefit.,tadachika ozono,Not available,2005.0,10.1007/11504894_25,Innovations in Applied Artificial Intelligence,Takayuki2005,False,,Springer,Not available,A Strategy-Proof Mechanism Based on Multiple Auction Support Agents,19307efeb7dde215f4c6ac7352137558,http://dx.doi.org/10.1007/11504894_25 3060,Agent-mediated electronic commerce has recently commanded much attention. Bidding support agents have been studied very extensively. We envision a future in which many people can trade their goods by using a bidding support agent on Internet auctions. In this paper we formalize a situation in which people are trading their goods on Internet auctions and employing bidding support agents. Then we prove that people who use a bidding support agent can successively win trades. Also we prove that the situation in which every people use a bidding support agent can satisfied strategy proofness and Pareto optimality. Further we present in the situation unsupported bidders do not make a positive benefit.,toramatsu shintani,Not available,2005.0,10.1007/11504894_25,Innovations in Applied Artificial Intelligence,Takayuki2005,False,,Springer,Not available,A Strategy-Proof Mechanism Based on Multiple Auction Support Agents,19307efeb7dde215f4c6ac7352137558,http://dx.doi.org/10.1007/11504894_25 3061,Auctions have been getting increasing attention in computer science and economics as they provide an efficient solution to resource allocation problems with self-interested agents. E-Commerce and finance have emerged as some of their largest application fields. The need for new auction mechanisms that allow complex bids such as bundle or multi-attribute bids has been raised in many situations. Beyond strategic problems the design of these advanced auction formats exhibits hard computational problems. Pricing is one of the major challenges in designing iterative combinatorial auctions. The presence of bundle bids implies the existence of cases with no linear prices that support competitive equilibrium. This paper introduces a framework of pricing concepts and discusses recent implementations.,alcxandcr pikovsky,Not available,2005.0,10.1007/3-7908-1624-8_18,Wirtschaftsinformatik 2005,Alcxandcr2005,False,,Springer,Not available,Information Feedback in Iterative Combinatorial Auctions,22ed4f6d297f90226caf0cd8f3773e99,http://dx.doi.org/10.1007/3-7908-1624-8_18 3062,Auctions have been getting increasing attention in computer science and economics as they provide an efficient solution to resource allocation problems with self-interested agents. E-Commerce and finance have emerged as some of their largest application fields. The need for new auction mechanisms that allow complex bids such as bundle or multi-attribute bids has been raised in many situations. Beyond strategic problems the design of these advanced auction formats exhibits hard computational problems. Pricing is one of the major challenges in designing iterative combinatorial auctions. The presence of bundle bids implies the existence of cases with no linear prices that support competitive equilibrium. This paper introduces a framework of pricing concepts and discusses recent implementations.,martin bichlcr,Not available,2005.0,10.1007/3-7908-1624-8_18,Wirtschaftsinformatik 2005,Alcxandcr2005,False,,Springer,Not available,Information Feedback in Iterative Combinatorial Auctions,22ed4f6d297f90226caf0cd8f3773e99,http://dx.doi.org/10.1007/3-7908-1624-8_18 3063,The problem of allocating discrete computational resources motivates interest in general multi-unit combinatorial exchanges. This paper considers the problem of computing optimal (surplus-maximizing) allocations assuming unrestricted quasi-linear preferences. We present a solver whose pseudo-polynomial time and memory requirements are linear in three of four natural measures of problem size: number of agents length of bids and units of each resource. In applications where the number of resource ,terence kelly,Not available,2005.0,10.1007/11575726_6,Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems,Terence2005,False,,Springer,Not available,Generalized Knapsack Solvers for Multi-unit Combinatorial Auctions: Analysis and Application to Computational Resource Allocation,9eaeb77488e16900f9fdfb30efec7e1a,http://dx.doi.org/10.1007/11575726_6 3064,Based on the work of Krishna and Rosenthal (1996) about combinatorial auctions bidding equilibrium analysis and Che’s (1993) research about one-unit multi-attributes auctions we construct a multi-attributes procurement combinatorial auction (MAPCA) for 2 objects through a first-score sealed-bid format. There are two kinds of bidders: ,jian chen,Not available,2005.0,10.1007/11428862_79,Computational Science – ICCS 2005,Jian2005,False,,Springer,Not available,On-line Multi-attributes Procurement Combinatorial Auctions Bidding Strategies,a9c7af9b2ff9dceabe1a1889593a878d,http://dx.doi.org/10.1007/11428862_79 3065,Based on the work of Krishna and Rosenthal (1996) about combinatorial auctions bidding equilibrium analysis and Che’s (1993) research about one-unit multi-attributes auctions we construct a multi-attributes procurement combinatorial auction (MAPCA) for 2 objects through a first-score sealed-bid format. There are two kinds of bidders: ,he huang,Not available,2005.0,10.1007/11428862_79,Computational Science – ICCS 2005,Jian2005,False,,Springer,Not available,On-line Multi-attributes Procurement Combinatorial Auctions Bidding Strategies,a9c7af9b2ff9dceabe1a1889593a878d,http://dx.doi.org/10.1007/11428862_79 3066,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,asuncion mochon,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3067,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,david quintana,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3068,In this paper we formulate a new problem namely allocation of bandwidth in a two-level hierarchically structured market. In the top level a unique seller allocates bandwidth to intermediate providers [e.g. Internet Service Providers (ISPs)] who in turn allocate their assigned shares of bandwidth to their own customers in the lower level. We present an efficient mechanism comprising auctions in both levels. We prove that due to the structure of the mechanism and certain rules imposed by the top-level seller the following dominant strategies apply: a) each of the lower-level customers reveals truthfully his demand in the auction he participates; b) each intermediary reveals truthfully to the top-level seller the aggregate demand in his respective market. Both the mechanism and the results extend to the case of more than two market levels.,costas courcoubetis,Not available,2004.0,10.1007/978-3-540-30193-6_31,Quality of Service in the Emerging Networking Panorama,Marina2004,False,,Springer,Not available,An Efficient Auction Mechanism for Hierarchically Structured Bandwidth Markets,9a41fa81d5c102285ce1b656bd7c6bd7,http://dx.doi.org/10.1007/978-3-540-30193-6_31 3069,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,pedro isasi,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3070,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,yago saez,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3071,Advance Reservation for global grids becomes an important research area as it allows users to gain concurrent access for their applications to be executed in parallel and guarantees the availability of resources at specified future times. In this paper we propose a market-based framework for advance resource reservation through iterative combinatorial auction and we also introduce three variant price updating methods and compare the revenue of the service providers the duration of the auction and the satisfaction of the users when all users use best-response bidding strategy.,zhixing huang,Not available,2005.0,10.1007/11590354_79,Grid and Cooperative Computing - GCC 2005,Zhixing2005,False,,Springer,Not available," ",fb4f7088dab21b261c4b7df008ad6e8b,http://dx.doi.org/10.1007/11590354_79 3072,Advance Reservation for global grids becomes an important research area as it allows users to gain concurrent access for their applications to be executed in parallel and guarantees the availability of resources at specified future times. In this paper we propose a market-based framework for advance resource reservation through iterative combinatorial auction and we also introduce three variant price updating methods and compare the revenue of the service providers the duration of the auction and the satisfaction of the users when all users use best-response bidding strategy.,yuhui qiu,Not available,2005.0,10.1007/11590354_79,Grid and Cooperative Computing - GCC 2005,Zhixing2005,False,,Springer,Not available," ",fb4f7088dab21b261c4b7df008ad6e8b,http://dx.doi.org/10.1007/11590354_79 3073,We consider the problem of designing truthful auctions when the bidders’ valuations have a public and a private component. In particular we consider combinatorial auctions where the valuation of an agent ,gagan goel,Not available,2010.0,10.1007/978-3-642-16170-4_21,Algorithmic Game Theory,Gagan2010,False,,Springer,Not available,Single-Parameter Combinatorial Auctions with Partially Public Valuations,6f51cdd0eddfdc71035218ad9f70d93a,http://dx.doi.org/10.1007/978-3-642-16170-4_21 3074,We consider the problem of designing truthful auctions when the bidders’ valuations have a public and a private component. In particular we consider combinatorial auctions where the valuation of an agent ,chinmay karande,Not available,2010.0,10.1007/978-3-642-16170-4_21,Algorithmic Game Theory,Gagan2010,False,,Springer,Not available,Single-Parameter Combinatorial Auctions with Partially Public Valuations,6f51cdd0eddfdc71035218ad9f70d93a,http://dx.doi.org/10.1007/978-3-642-16170-4_21 3075,We consider the problem of designing truthful auctions when the bidders’ valuations have a public and a private component. In particular we consider combinatorial auctions where the valuation of an agent ,lei wang,Not available,2010.0,10.1007/978-3-642-16170-4_21,Algorithmic Game Theory,Gagan2010,False,,Springer,Not available,Single-Parameter Combinatorial Auctions with Partially Public Valuations,6f51cdd0eddfdc71035218ad9f70d93a,http://dx.doi.org/10.1007/978-3-642-16170-4_21 3076,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,shifeng shang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3077,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,jinlei jiang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3078,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,yongwei wu,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3079,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,paolo santi,Not available,2004.0,10.1007/978-3-540-27819-1_1,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/10.1007/978-3-540-27819-1_1 3080,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,zhenchun huang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3081,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,guangwen yang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3082,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,weimin zheng,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 3083,Multiagent resource allocation defines the issue of having to distribute a set of resources among a set of agents aiming at a ,claudia lindner,Not available,2010.0,10.1007/978-3-642-12842-4_23,Artificial Intelligence: Theories Models and Applications,Claudia2010,False,,Springer,Not available,A Market-Affected Sealed-Bid Auction Protocol,e3d976d48f289fd73029da7cce8b79c4,http://dx.doi.org/10.1007/978-3-642-12842-4_23 3084,Novelties discovering as a source of constant change is the essence of economics. However most economic models do not have the kind of novelties-discovering agents required for constant changes. This silence was broken by Andrews and Prager 15 years ago when they placed GP (genetic programming)-driven agents in the double auction market. The work was however neither economically well interpreted nor complete; hence the silence remains in economics. In this article we revisit their model and systematically conduct a series of simulations to better document the results. Our simulations show that human-written programs including some reputable ones are eventually outperformed by GP. The significance of this finding is not that GP is alchemy. Instead it shows that novelties-discovering agents can be introduced into economic models and their appearance inevitably presents threats to other agents who then have to react accordingly. Hence a potentially indefinite cycle of change is triggered.,shu-heng chen,Not available,2010.0,10.1007/978-4-431-99781-8_9,Simulating Interacting Agents and Social Phenomena,Shu-Heng2010,False,,Springer,Not available,The Agent-Based Double Auction Markets: 15 Years On,d75d5c2d04df080c2a2edff8b842424b,http://dx.doi.org/10.1007/978-4-431-99781-8_9 3085,Novelties discovering as a source of constant change is the essence of economics. However most economic models do not have the kind of novelties-discovering agents required for constant changes. This silence was broken by Andrews and Prager 15 years ago when they placed GP (genetic programming)-driven agents in the double auction market. The work was however neither economically well interpreted nor complete; hence the silence remains in economics. In this article we revisit their model and systematically conduct a series of simulations to better document the results. Our simulations show that human-written programs including some reputable ones are eventually outperformed by GP. The significance of this finding is not that GP is alchemy. Instead it shows that novelties-discovering agents can be introduced into economic models and their appearance inevitably presents threats to other agents who then have to react accordingly. Hence a potentially indefinite cycle of change is triggered.,chung-ching tai,Not available,2010.0,10.1007/978-4-431-99781-8_9,Simulating Interacting Agents and Social Phenomena,Shu-Heng2010,False,,Springer,Not available,The Agent-Based Double Auction Markets: 15 Years On,d75d5c2d04df080c2a2edff8b842424b,http://dx.doi.org/10.1007/978-4-431-99781-8_9 3086,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,xiaotie deng,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 3087,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,yang sun,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 3088,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,ming yin,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 3089,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,yunhong zhou,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 3090,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,vincent conitzer,Not available,2004.0,10.1007/978-3-540-27819-1_1,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/10.1007/978-3-540-27819-1_1 3091,Real market institutions stock and commodity exchanges for example do not occur in isolation. The same stocks and commodities may be listed on multiple exchanges and traders who want to deal in those goods have a choice of markets in which to trade. While there has been extensive research into agent-based trading in individual markets there is little work on this kind of multiple market scenario. Our work seeks to address this imbalance. In particular this paper examines how allocative efficiency the standard measure of a market’s ability to extract surplus is affected by the presence of multiple markets for the same good. We find that while dividing traders between several small markets typically leads to lower efficiency than grouping them into one large market the movement of traders between markets and price incentives for changing markets can reduce this loss of efficiency.,kai cai,Not available,2010.0,10.1007/978-3-642-15237-5_7,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Kai2010,False,,Springer,Not available,On the Economic Effects of Competition between Double Auction Markets,63c2929e97208010610ae1aa9847989c,http://dx.doi.org/10.1007/978-3-642-15237-5_7 3092,Real market institutions stock and commodity exchanges for example do not occur in isolation. The same stocks and commodities may be listed on multiple exchanges and traders who want to deal in those goods have a choice of markets in which to trade. While there has been extensive research into agent-based trading in individual markets there is little work on this kind of multiple market scenario. Our work seeks to address this imbalance. In particular this paper examines how allocative efficiency the standard measure of a market’s ability to extract surplus is affected by the presence of multiple markets for the same good. We find that while dividing traders between several small markets typically leads to lower efficiency than grouping them into one large market the movement of traders between markets and price incentives for changing markets can reduce this loss of efficiency.,jinzhong niu,Not available,2010.0,10.1007/978-3-642-15237-5_7,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Kai2010,False,,Springer,Not available,On the Economic Effects of Competition between Double Auction Markets,63c2929e97208010610ae1aa9847989c,http://dx.doi.org/10.1007/978-3-642-15237-5_7 3093,Real market institutions stock and commodity exchanges for example do not occur in isolation. The same stocks and commodities may be listed on multiple exchanges and traders who want to deal in those goods have a choice of markets in which to trade. While there has been extensive research into agent-based trading in individual markets there is little work on this kind of multiple market scenario. Our work seeks to address this imbalance. In particular this paper examines how allocative efficiency the standard measure of a market’s ability to extract surplus is affected by the presence of multiple markets for the same good. We find that while dividing traders between several small markets typically leads to lower efficiency than grouping them into one large market the movement of traders between markets and price incentives for changing markets can reduce this loss of efficiency.,simon parsons,Not available,2010.0,10.1007/978-3-642-15237-5_7,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Kai2010,False,,Springer,Not available,On the Economic Effects of Competition between Double Auction Markets,63c2929e97208010610ae1aa9847989c,http://dx.doi.org/10.1007/978-3-642-15237-5_7 3094,We undertake an experimental study of heuristics designed for the Travel division of the Trading Agent Competition. Our primary goal is to analyze the performance of the sample average approximation (SAA) heuristic which is approximately optimal in the decision-theoretic (DT) setting in this game-theoretic (GT) setting. To this end we conduct experiments in four settings three DT and one GT. The relevant distinction between the DT and the GT settings is: in the DT settings agents’ strategies do not affect the distribution of prices. Because of this distinction the DT experiments are easier to analyze than the GT experiments. Moreover settings with normally distributed prices and controlled noise are easier to analyze than those with competitive equilibrium prices. In the studied domain analysis of the DT settings with possibly noisy normally distributed prices informs our analysis of the richer DT and GT settings with competitive equilibrium prices. In future work we plan to investigate whether this experimental methodology—namely transferring knowledge gained in a DT setting with noisy signals to a GT setting—can be applied to analyze heuristics for playing other complex games.,amy greenwald,Not available,2010.0,10.1007/978-3-642-15237-5_10,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Amy2010,False,,Springer,Not available,Bidding Heuristics for Simultaneous Auctions: Lessons from TAC Travel,b2d7f34f9a2dd5a4ef596ffe0688822c,http://dx.doi.org/10.1007/978-3-642-15237-5_10 3095,We undertake an experimental study of heuristics designed for the Travel division of the Trading Agent Competition. Our primary goal is to analyze the performance of the sample average approximation (SAA) heuristic which is approximately optimal in the decision-theoretic (DT) setting in this game-theoretic (GT) setting. To this end we conduct experiments in four settings three DT and one GT. The relevant distinction between the DT and the GT settings is: in the DT settings agents’ strategies do not affect the distribution of prices. Because of this distinction the DT experiments are easier to analyze than the GT experiments. Moreover settings with normally distributed prices and controlled noise are easier to analyze than those with competitive equilibrium prices. In the studied domain analysis of the DT settings with possibly noisy normally distributed prices informs our analysis of the richer DT and GT settings with competitive equilibrium prices. In future work we plan to investigate whether this experimental methodology—namely transferring knowledge gained in a DT setting with noisy signals to a GT setting—can be applied to analyze heuristics for playing other complex games.,victor naroditskiy,Not available,2010.0,10.1007/978-3-642-15237-5_10,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Amy2010,False,,Springer,Not available,Bidding Heuristics for Simultaneous Auctions: Lessons from TAC Travel,b2d7f34f9a2dd5a4ef596ffe0688822c,http://dx.doi.org/10.1007/978-3-642-15237-5_10 3096,We undertake an experimental study of heuristics designed for the Travel division of the Trading Agent Competition. Our primary goal is to analyze the performance of the sample average approximation (SAA) heuristic which is approximately optimal in the decision-theoretic (DT) setting in this game-theoretic (GT) setting. To this end we conduct experiments in four settings three DT and one GT. The relevant distinction between the DT and the GT settings is: in the DT settings agents’ strategies do not affect the distribution of prices. Because of this distinction the DT experiments are easier to analyze than the GT experiments. Moreover settings with normally distributed prices and controlled noise are easier to analyze than those with competitive equilibrium prices. In the studied domain analysis of the DT settings with possibly noisy normally distributed prices informs our analysis of the richer DT and GT settings with competitive equilibrium prices. In future work we plan to investigate whether this experimental methodology—namely transferring knowledge gained in a DT setting with noisy signals to a GT setting—can be applied to analyze heuristics for playing other complex games.,seong lee,Not available,2010.0,10.1007/978-3-642-15237-5_10,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Amy2010,False,,Springer,Not available,Bidding Heuristics for Simultaneous Auctions: Lessons from TAC Travel,b2d7f34f9a2dd5a4ef596ffe0688822c,http://dx.doi.org/10.1007/978-3-642-15237-5_10 3097,Fast price convergence and high allocative market efficiency (close to 100%) are two of the most robust results in Experimental Economics. When human-subjects are replaced by artificial-agents high allocative market efficiency is also attained even if the artificial agents have zero intelligence but price convergence depends on the agents’ learning. In this paper we study the sensitivity of Continuous Double Auction performance to the imposition of monetary costs in the market. We find that transactions costs reduce market efficiency. Price convergence results are very different when the monetary cost is imposed on the transaction or on the submissions to buy or to sell. Our agent-based market model confirms and extends previous Experimental Economics market results and provides new behavioral explanations of the price dynamics.,marta posada,Not available,2010.0,10.1007/978-3-642-13947-5_6,Progress in Artificial Economics,Marta2010,False,,Springer,Not available,The Effect of Transaction Costs on Artificial Continuous Double Auction Markets,3052b75c5d07c8a05c13bfe1c6b9cc6f,http://dx.doi.org/10.1007/978-3-642-13947-5_6 3098,Fast price convergence and high allocative market efficiency (close to 100%) are two of the most robust results in Experimental Economics. When human-subjects are replaced by artificial-agents high allocative market efficiency is also attained even if the artificial agents have zero intelligence but price convergence depends on the agents’ learning. In this paper we study the sensitivity of Continuous Double Auction performance to the imposition of monetary costs in the market. We find that transactions costs reduce market efficiency. Price convergence results are very different when the monetary cost is imposed on the transaction or on the submissions to buy or to sell. Our agent-based market model confirms and extends previous Experimental Economics market results and provides new behavioral explanations of the price dynamics.,cesareo hernandez,Not available,2010.0,10.1007/978-3-642-13947-5_6,Progress in Artificial Economics,Marta2010,False,,Springer,Not available,The Effect of Transaction Costs on Artificial Continuous Double Auction Markets,3052b75c5d07c8a05c13bfe1c6b9cc6f,http://dx.doi.org/10.1007/978-3-642-13947-5_6 3099,Auction theory has always recognised that in many settings bidders’ strategies can be influenced by the revelation of some information that is privately held by the auctioneer. Usually it is assumed that the auctioneer holds some information regarding the item put up for auction. As a consequence its revelation can allow bidders to have a more accurate estimate of their valuation for the object and to make less uncertain their utility in case their bid is accepted.,domenico colucci,Not available,2010.0,10.1007/978-3-642-04023-8_10,Nonlinear Dynamics in Economics Finance and Social Sciences,Domenico2010,False,,Springer,Not available,Dynamics in Non-Binding Procurement Auctions with Boundedly Rational Bidders,8b807e6aa203e5229e7552936659b929,http://dx.doi.org/10.1007/978-3-642-04023-8_10 3100,Auction theory has always recognised that in many settings bidders’ strategies can be influenced by the revelation of some information that is privately held by the auctioneer. Usually it is assumed that the auctioneer holds some information regarding the item put up for auction. As a consequence its revelation can allow bidders to have a more accurate estimate of their valuation for the object and to make less uncertain their utility in case their bid is accepted.,nicola doni,Not available,2010.0,10.1007/978-3-642-04023-8_10,Nonlinear Dynamics in Economics Finance and Social Sciences,Domenico2010,False,,Springer,Not available,Dynamics in Non-Binding Procurement Auctions with Boundedly Rational Bidders,8b807e6aa203e5229e7552936659b929,http://dx.doi.org/10.1007/978-3-642-04023-8_10 3101,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,tuomas sandholm,Not available,2004.0,10.1007/978-3-540-27819-1_1,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/10.1007/978-3-540-27819-1_1 3102,Auction theory has always recognised that in many settings bidders’ strategies can be influenced by the revelation of some information that is privately held by the auctioneer. Usually it is assumed that the auctioneer holds some information regarding the item put up for auction. As a consequence its revelation can allow bidders to have a more accurate estimate of their valuation for the object and to make less uncertain their utility in case their bid is accepted.,vincenzo valori,Not available,2010.0,10.1007/978-3-642-04023-8_10,Nonlinear Dynamics in Economics Finance and Social Sciences,Domenico2010,False,,Springer,Not available,Dynamics in Non-Binding Procurement Auctions with Boundedly Rational Bidders,8b807e6aa203e5229e7552936659b929,http://dx.doi.org/10.1007/978-3-642-04023-8_10 3103,This paper investigates auction settings where bidders private values depend on a common value element which encapsulates some inherent uncertainty concerning its value. In particular we are interested in scenarios where the auctioneer may have access to accurate information that eliminates the uncertainty concerning the common value. The auctioneer in this case should reason about whether or not to disclose that information or part of it to the bidders. In particular we distinguish between the case where the bidders are aware of the existence of such information on the auctioneer’s side and when they are unaware of its existence. We show that the auctioneer’s decision of whether to disclose information to the bidders is environment-dependent and affected by various factors such as the number of bidders the bidders’ valuation functions and the a-priori level of uncertainty associated with the common value. Furthermore we show that the awareness of the bidders to the option to obtain more accurate information plays a significant role in the decision of whether or not to disclose such information.,esther david,Not available,2010.0,10.1007/978-3-642-15117-0_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Esther2010,False,,Springer,Not available,The Choice of Eliminating the Uncertainty Cloud in Auctions,55bf408842bbda7af56a1e17a01c9ae0,http://dx.doi.org/10.1007/978-3-642-15117-0_2 3104,This paper investigates auction settings where bidders private values depend on a common value element which encapsulates some inherent uncertainty concerning its value. In particular we are interested in scenarios where the auctioneer may have access to accurate information that eliminates the uncertainty concerning the common value. The auctioneer in this case should reason about whether or not to disclose that information or part of it to the bidders. In particular we distinguish between the case where the bidders are aware of the existence of such information on the auctioneer’s side and when they are unaware of its existence. We show that the auctioneer’s decision of whether to disclose information to the bidders is environment-dependent and affected by various factors such as the number of bidders the bidders’ valuation functions and the a-priori level of uncertainty associated with the common value. Furthermore we show that the awareness of the bidders to the option to obtain more accurate information plays a significant role in the decision of whether or not to disclose such information.,david sarne,Not available,2010.0,10.1007/978-3-642-15117-0_2,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Esther2010,False,,Springer,Not available,The Choice of Eliminating the Uncertainty Cloud in Auctions,55bf408842bbda7af56a1e17a01c9ae0,http://dx.doi.org/10.1007/978-3-642-15117-0_2 3105,Assume the demand and supply curves in an alternating double auction market are ,abdolkarim sadrieh,Not available,1998.0,10.1007/978-3-642-58953-9_3,The Alternating Double Auction Market,Abdolkarim1998,False,,Springer,Not available,The Simplified Alternating Double Auction Market - A Game Theoretic Analysis,c50de5215d2a9132c2b78874eaef6d48,http://dx.doi.org/10.1007/978-3-642-58953-9_3 3106,The structure of the alternating double auction market is basically the same as in most experimental double auction markets. The market is an institution used for trading units of a hypothetical homogenous and indivisible good. It contains a set of players T with n members divided distinctly into two subsets: buyers,abdolkarim sadrieh,Not available,1998.0,10.1007/978-3-642-58953-9_2,The Alternating Double Auction Market,Abdolkarim1998,False,,Springer,Not available,The Alternating Double Auction Market Game,74ba945a7fa47f490136133e167ecb06,http://dx.doi.org/10.1007/978-3-642-58953-9_2 3107,Double auction markets have fascinated experimental economics researchers ever since Vernon SMITH reported his experiments in 1962. The fascination lies in the fact that these markets exhibit an extremely high efficiency and a remarkable convergence to the market clearing price although the underlying games are exceptionally complex. However neither the abundant experimental nor the scarce game theoretic research on double auction markets existing to date has yet entirely clarified the process of price formation in these markets. The main goal of the investigation presented here is to find regularities in the behavior of traders in experimental discriminatory price double auction markets which might help explain the process of price formation.,abdolkarim sadrieh,Not available,1998.0,10.1007/978-3-642-58953-9_4,The Alternating Double Auction Market,Abdolkarim1998,False,,Springer,Not available,An Experimental Investigation of the Alternating Double Auction Market,58899db19b4fba3103e9ee1b63393b11,http://dx.doi.org/10.1007/978-3-642-58953-9_4 3108,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,yasushi toda,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 3109,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,nadezhda nozdrina,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 3110,The purpose of this paper is to see how economic factors determine prices in the previously communist countries undergoing privatization. This does not concern the auctions of big state enterprises where the prices are found to be rigged. In this paper we estimate hedonic price functions based on a unique data set on auction prices of apartments in Moscow. We collected the data ourselves by attending the auctions and gathered data on the characteristics. We estimated the hedonic equations using a disequilibrium approach because no equilibrium prices were observed for large number of apartments that were withdrawn from the auction. We found that as the privatization of residential housing was carried out the hedonic price equations fit the data remarkably well.,g.s. maddala,Not available,1998.0,10.1023/A:1003158231050,Economics of Planning,Yasushi1998,False,,Springer,Not available,The Auction Price of Apartments in Moscow: Hedonic Estimation in Disequilibrium,963b5afdd19938d0f60779d52a3ea8dc,http://dx.doi.org/10.1023/A:1003158231050 3111,In this paper we suggest a model of sequential auctions with endogenous participation where each bidder conjectures about the number of participants at each round. Then after learning his value each bidder decides whether or not to participate in the auction. In the calculation of his expected value each bidder uses his conjectures about the number of participants for each possible subgroup. In equilibrium the conjectured probability is compatible with the probability of staying in the auction. In our model players face participation costs bidders may buy as many objects as they wish and they are allowed to drop out at any round. Bidders can drop out at any time but they cannot come back to the auction. In particular we can determine the number of participants and expected prices in equilibrium. We show that for any bidding strategy there exists such a probability of staying in the auction. For the case of stochastically independent objects we show that in equilibrium every bidder who decides to continue submits a bid that is equal to his value at each round. When objects are stochastically identical we are able to show that expected prices are decreasing.,flavio menezes,Not available,1997.0,10.1023/A:1004970725802,Theory and Decision,M.1997,False,,Springer,Not available,Sequential asymmetric auctions with endogenous participation,9420f105cc5e1351ffffb4dd9f1b969e,http://dx.doi.org/10.1023/A:1004970725802 3112,An auction with a buyout option is modelled. Such an option allows a bidder to purchase the item being auctioned at a pre-specified buyout price instead of attempting to obtain the item through the traditional auction procedure. This analysis is motivated by internet auctions where such options are present. If all auction participants are risk neutral the seller will choose a buyout price high enough so that the option is never exercised. However a risk averse seller facing risk neutral bidders will choose a price low enough so that the option is exercised with positive probability. Further if bidders are risk neutral and the seller is risk averse this option may result in a Pareto improvement compared to a sealed bid second price auction.,timothy mathews,Not available,2006.0,10.1007/s00199-004-0571-8,Economic Theory,Timothy2006,False,,Springer,Not available,The role of varying risk attitudes in an auction with a buyout option,d250db95ae0113de8b9f892d26186868,http://dx.doi.org/10.1007/s00199-004-0571-8 3113,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,toru nakanishi,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 3114,In this paper we suggest a model of sequential auctions with endogenous participation where each bidder conjectures about the number of participants at each round. Then after learning his value each bidder decides whether or not to participate in the auction. In the calculation of his expected value each bidder uses his conjectures about the number of participants for each possible subgroup. In equilibrium the conjectured probability is compatible with the probability of staying in the auction. In our model players face participation costs bidders may buy as many objects as they wish and they are allowed to drop out at any round. Bidders can drop out at any time but they cannot come back to the auction. In particular we can determine the number of participants and expected prices in equilibrium. We show that for any bidding strategy there exists such a probability of staying in the auction. For the case of stochastically independent objects we show that in equilibrium every bidder who decides to continue submits a bid that is equal to his value at each round. When objects are stochastically identical we are able to show that expected prices are decreasing.,paulo monteiro,Not available,1997.0,10.1023/A:1004970725802,Theory and Decision,M.1997,False,,Springer,Not available,Sequential asymmetric auctions with endogenous participation,9420f105cc5e1351ffffb4dd9f1b969e,http://dx.doi.org/10.1023/A:1004970725802 3115,This paper proposes a price index for modern andcontemporary paintings based on estimates and auctionprices. We use this index for the evaluation of theItalian art market and for comparisons with returns onother assets. During the period 1983–1994 art pricesincreased in line with inflation but returns onpaintings were lower than returns on financial assets.In the long run art prices are unrelated to financialassets prices but a positive correlation with realestate prices emerges.,g. candela,Not available,1997.0,10.1023/A:1007442014954,Journal of Cultural Economics,G.1997,False,,Springer,Not available,A Price Index for Art Market Auctions,8284aede5d0421837e164f92d8362a43,http://dx.doi.org/10.1023/A:1007442014954 3116,This paper proposes a price index for modern andcontemporary paintings based on estimates and auctionprices. We use this index for the evaluation of theItalian art market and for comparisons with returns onother assets. During the period 1983–1994 art pricesincreased in line with inflation but returns onpaintings were lower than returns on financial assets.In the long run art prices are unrelated to financialassets prices but a positive correlation with realestate prices emerges.,a. scorcu,Not available,1997.0,10.1023/A:1007442014954,Journal of Cultural Economics,G.1997,False,,Springer,Not available,A Price Index for Art Market Auctions,8284aede5d0421837e164f92d8362a43,http://dx.doi.org/10.1023/A:1007442014954 3117,A commodity auction market provides a trading intermediary whose role is to find optimal trade matching between buyers and sellers that satisfies their trading constraints. Some commodity auction markets utilize forms of electronic trading intermediary systems in order to improve the efficiency and effectiveness of trading of huge volumes of transactions during short periods of time. Previous research works on electronic trading intermediary systems focus on the maximization of the trade volume obtained by satisfying mainly price and quantity constraints. The principal restriction of these approaches is that the heterogeneity of the commodity is ignored or at least not significantly considered. The objective of the study in this paper is to propose a computable mechanism of trading inter-mediaries for commodity auction markets supporting not only ordinary trading constraints of prices and quantities but also other qualitative and quantitative constraints on the commodity properties and trading conditions.,young ryu,Not available,1997.0,10.1023/A:1018927700552,Annals of Operations Research,U.1997,False,,Springer,Not available,Hierarchical constraint satisfaction of multilateral trade matching in commodity auction markets,eb567e72fd244a6d91e2209eddd5144c,http://dx.doi.org/10.1023/A:1018927700552 3118,Consider a government that wants to privatize a state-owned enterprise. What method of privatization should it use if it wants to achieve an efficient allocation of ownership rights and generate as much revenue as possible? Most Western countries have employed various kinds of auctions to sell state-owned enterprises to the highest bidder. Some transition countries in Eastern Europe have given away a substantial fraction of the shares of all firms to the general population. In eastern Germany the Treuhandanstalt bargained on the terms of trade with predetermined buyers and negotiated detailed employment and investment guarantees. Most privatization programs combined several elements of these basic methods.,klaus schmidt,Not available,1997.0,10.1007/978-3-642-60825-4_5,Privatization at the End of the Century,M.1997,False,,Springer,Not available,Methods of Privatization: Auctions Bargaining and Giveaways,6e6541e367d86034affd2df7e383abd6,http://dx.doi.org/10.1007/978-3-642-60825-4_5 3119,Consider a government that wants to privatize a state-owned enterprise. What method of privatization should it use if it wants to achieve an efficient allocation of ownership rights and generate as much revenue as possible? Most Western countries have employed various kinds of auctions to sell state-owned enterprises to the highest bidder. Some transition countries in Eastern Europe have given away a substantial fraction of the shares of all firms to the general population. In eastern Germany the Treuhandanstalt bargained on the terms of trade with predetermined buyers and negotiated detailed employment and investment guarantees. Most privatization programs combined several elements of these basic methods.,monika schnitzer,Not available,1997.0,10.1007/978-3-642-60825-4_5,Privatization at the End of the Century,M.1997,False,,Springer,Not available,Methods of Privatization: Auctions Bargaining and Giveaways,6e6541e367d86034affd2df7e383abd6,http://dx.doi.org/10.1007/978-3-642-60825-4_5 3120,m identical objects are to be sold in a multiple-bid auction where the m highest bids are accepted. An efficient private value auction must induce an identical transformation of all values of the bidders into bids. (In a common value auction the problem of allocative efficiency disappears.) The pricing rule has to be an additively separable function of the bids.Under the condition that a pricing rule is efficient monotone and reciprocitive (a bidder has to pay only for the units received) it has to obey certain restrictions. These restrictions are not met by the pricing rules found in large-scale auctions as the British electricity auction and the auctions organized by the American Treasury Department and by the German Bundesbank. If the pricing rule is “simple” the Vickrey rule and trivial transformations of the Vickrey rule are the only efficient pricing rules.,friedel bolle,Not available,1997.0,10.1007/978-94-017-1360-3_9,Economic and Environmental Risk and Uncertainty,Friedel1997,False,,Springer,Not available,Necessary Conditions for Efficient Multiple-Bid Auctions,070cc37d034f0981d929e49c1ecebdaf,http://dx.doi.org/10.1007/978-94-017-1360-3_9 3121,This paper offers a model of sealed bid auctions with resale. The policy question whether the seller would fare better under the multiprice rule(where winners pat their actual bids) or the uniprice rule (where winners pay the highest losing bid) has been on the agenda since the 60’s and seen a recent revival. While theory has mostly recommended the uniprice rule mainly on the argument that it would generate higher revenue practice has predominantly stay with the multiprice rule. The results here recommend the multiprice rule. They say that while expected revenue (equivalently the price level) is an invariant throughout the range of bids is narrower (hence the price level less volatile) under the multiprice then under the uniprice rule the more so the greater the resale component of participation. For auctions of treasury depth shares of public firms to be privatized or other items where significant proportions of the issues flow to secondary markets these results thus support the multiprice rule on grounds of price stability next to revenue equivalence.,ahmet alkan,Not available,1997.0,10.1007/978-1-4757-2640-4_21,Game Theoretical Applications to Economics and Operations Research,Ahmet1997,False,,Springer,Not available,Price Rule and Volatility in Auctions with Resale Markets,9a4facfd81f3a603f756a2aac78ce9c0,http://dx.doi.org/10.1007/978-1-4757-2640-4_21 3122,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,bing shi,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 3123,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,yalong huang,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 3124,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,daisuke yamamoto,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 3125,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,shengwu xiong,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 3126,In this paper we analyse how double auction marketplaces set an effective pricing policy to determine the transaction prices for matched buyers and sellers. We analyse this problem by considering continuous privately known trader types. Furthermore we consider two typical pricing policies: ,enrico gerding,Not available,2016.0,10.1007/978-3-319-42911-3_38,PRICAI 2016: Trends in Artificial Intelligence,Bing2016,False,,Springer,Not available,Setting an Effective Pricing Policy for Double Auction Marketplaces,550b2295c3451a7e0eb8c26a588f8473,http://dx.doi.org/10.1007/978-3-319-42911-3_38 3127,Experimental macroeconomics is a sub-field of experimental economics that makes use of controlled laboratory methods to understand aggregate economic phenomena and to test the specific assumptions and predictions of macroeconomic models. This article reviews important contributions of experimental macroeconomics research which include an understanding of when equilibration works when it fails and the means by which macro-coordination problems are resolved. It also discusses important methodological issues including the choice of market institution the implementation of representative agent and overlapping generations models discounting and infinite horizons and the external validity of experimental macroeconomic findings.,john duffy,Not available,2016.0,10.1057/978-1-349-95121-5_2224-1,The New Palgrave Dictionary of Economics,John2016,False,,Springer,Not available,Experimental Macroeconomics,b418c128c259288e3fb26971bdf6073b,http://dx.doi.org/10.1057/978-1-349-95121-5_2224-1 3128,Resale markets are necessary to correct misallocations of assets but do they always ensure that goods end up in the hands of those who value them most? This article reviews theoretical arguments as to why this need not necessarily be so and when inefficiencies might be expected despite the presence of resale markets. Policy implications are also suggested.,philippe jehiel,Not available,2016.0,10.1057/978-1-349-95121-5_1980-1,The New Palgrave Dictionary of Economics,Philippe2016,False,,Springer,Not available,Resale Markets,9b69e32daf1db2ffb2a85508788aed11,http://dx.doi.org/10.1057/978-1-349-95121-5_1980-1 3129,Multiagent (MA) organizations can be regarded as a functional part in business information systems in which software agents negotiate conditions for participation in the organization. How the strategic behavior of self-interested agents and MA-Organizations affects the formation process however is still not known. This research is concerned with the specification of MA-Organizations in business information systems and the design of negotiation protocols for determining the agents participation conditions. We draw on mechanism design to model the participation decision of the agent and the organization as a bilateral trading game. In a simulation experiment we find that a rather simple manipulation scheme provides a suitable approximation for the equilibrium strategies employed by the agents.,tobias widmer,Not available,2016.0,10.1007/978-3-319-39426-8_21,Business Information Systems,Tobias2016,False,,Springer,Not available,A Formalization of Multiagent Organizations in Business Information Systems,16ba3858d9b70bcdecc2371d5bdfa964,http://dx.doi.org/10.1007/978-3-319-39426-8_21 3130,Multiagent (MA) organizations can be regarded as a functional part in business information systems in which software agents negotiate conditions for participation in the organization. How the strategic behavior of self-interested agents and MA-Organizations affects the formation process however is still not known. This research is concerned with the specification of MA-Organizations in business information systems and the design of negotiation protocols for determining the agents participation conditions. We draw on mechanism design to model the participation decision of the agent and the organization as a bilateral trading game. In a simulation experiment we find that a rather simple manipulation scheme provides a suitable approximation for the equilibrium strategies employed by the agents.,marc premm,Not available,2016.0,10.1007/978-3-319-39426-8_21,Business Information Systems,Tobias2016,False,,Springer,Not available,A Formalization of Multiagent Organizations in Business Information Systems,16ba3858d9b70bcdecc2371d5bdfa964,http://dx.doi.org/10.1007/978-3-319-39426-8_21 3131,Multiagent (MA) organizations can be regarded as a functional part in business information systems in which software agents negotiate conditions for participation in the organization. How the strategic behavior of self-interested agents and MA-Organizations affects the formation process however is still not known. This research is concerned with the specification of MA-Organizations in business information systems and the design of negotiation protocols for determining the agents participation conditions. We draw on mechanism design to model the participation decision of the agent and the organization as a bilateral trading game. In a simulation experiment we find that a rather simple manipulation scheme provides a suitable approximation for the equilibrium strategies employed by the agents.,stefan kirn,Not available,2016.0,10.1007/978-3-319-39426-8_21,Business Information Systems,Tobias2016,False,,Springer,Not available,A Formalization of Multiagent Organizations in Business Information Systems,16ba3858d9b70bcdecc2371d5bdfa964,http://dx.doi.org/10.1007/978-3-319-39426-8_21 3132,Following the Internet’s widespread adoption much economic work has studied ‘online platforms’: firms that mainly interact with consumers in cyberspace. This article surveys such work focusing on the ways in which traditional economic models have been adapted to incorporate novel aspects made relevant by the Internet. This literature can be divided roughly into two categories: broad-brush study of the competition between platforms and more fine-grained study of the ways in which users and platforms interact with one another. The former focuses on extending oligopoly theory to include ‘consumption externalities’; the latter extends auction and search theory to a world of precisely measureable actions.,alexander white,Not available,2016.0,10.1057/978-1-349-95121-5_2948-1,The New Palgrave Dictionary of Economics,Alexander2016,False,,Springer,Not available,Online Platforms Economics of,b48be20bdb55cb0abe1768ed2a935bd5,http://dx.doi.org/10.1057/978-1-349-95121-5_2948-1 3133,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,isabelle perrigne,Not available,2016.0,10.1057/978-1-349-95121-5_2762-1,The New Palgrave Dictionary of Economics,Isabelle2016,False,,Springer,Not available,Auctions (Empirics),3eec13e51755afd919b616886763f8c5,http://dx.doi.org/10.1057/978-1-349-95121-5_2762-1 3134,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,quang vuong,Not available,2016.0,10.1057/978-1-349-95121-5_2762-1,The New Palgrave Dictionary of Economics,Isabelle2016,False,,Springer,Not available,Auctions (Empirics),3eec13e51755afd919b616886763f8c5,http://dx.doi.org/10.1057/978-1-349-95121-5_2762-1 3135,Efficient general secure multiparty computation (MPC) protocols were previously proposed and the combination with the efficient auction circuits achieves the efficient sealed-bid auctions with the full privacy and correctness. However the combination requires that each bidder submits ciphertexts of bits representing his bid and their zero-knowledge proofs. This cost amounts to about 80 multi-exponentiations in usual case that the bid size is 20 bits (i.e. about 1 000 000 bid prices). This paper proposes the sealed-bid auction protocols based on the efficient MPC protocols where a bidder can submit only a single ciphertext. The bidder’s cost is a few multi-exponentiations and thus the proposed protocols are suitable for mobile bidders.,yuji sugiyama,Not available,2004.0,10.1007/978-3-540-24691-6_18,Information Security and Cryptology - ICISC 2003,Toru2004,False,,Springer,Not available,Sealed-Bid Auctions with Efficient Bids,b89aac1dae59fd146db0388fcd5cb5ae,http://dx.doi.org/10.1007/978-3-540-24691-6_18 3136,Field experiments have grown significantly in prominence since the 1990s. In this article we provide a summary of the major types of field experiments explore their uses and describe a few examples. We show how field experiments can be used for both positive and normative purposes within economics. We also discuss more generally why data collection is useful in science and more narrowly discuss the question of generalizability. In this regard we envision field experiments playing a classic role in helping investigators learn about the behavioural principles that are shared across different domains.,john list,Not available,2016.0,10.1057/978-1-349-95121-5_2000-1,The New Palgrave Dictionary of Economics,A.2016,False,,Springer,Not available,Field Experiments,090fdc5a0ee2fc5be1ada0019f3b5ef5,http://dx.doi.org/10.1057/978-1-349-95121-5_2000-1 3137,Field experiments have grown significantly in prominence since the 1990s. In this article we provide a summary of the major types of field experiments explore their uses and describe a few examples. We show how field experiments can be used for both positive and normative purposes within economics. We also discuss more generally why data collection is useful in science and more narrowly discuss the question of generalizability. In this regard we envision field experiments playing a classic role in helping investigators learn about the behavioural principles that are shared across different domains.,david reiley,Not available,2016.0,10.1057/978-1-349-95121-5_2000-1,The New Palgrave Dictionary of Economics,A.2016,False,,Springer,Not available,Field Experiments,090fdc5a0ee2fc5be1ada0019f3b5ef5,http://dx.doi.org/10.1057/978-1-349-95121-5_2000-1 3138,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,jun gao,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 3139,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,jiaqi wang,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 3140,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,ning lu,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 3141,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,fang zhu,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 3142,One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information in this paper we design a secure reverse multi-attribute first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result auctioneer servers can determine the winner without knowing the real value of bids which let bidder’s privacy would not be revealed. At last an analysis on the privacy of bids is conducted.,wenbo shi,Not available,2016.0,10.1007/978-3-319-47422-9_23,Provable Security,Jun2016,False,,Springer,Not available,A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress),bd34467185ee913bc338aa49c92c9577,http://dx.doi.org/10.1007/978-3-319-47422-9_23 3143,,mohammad hajiaghayi,Not available,2016.0,10.1007/978-1-4939-2864-4_759,Encyclopedia of Algorithms,Taghi2016,False,,Springer,Not available,Prophet Inequality and Online Auctions,e0c08c68fe1f81bc8693cb3d3580ef22,http://dx.doi.org/10.1007/978-1-4939-2864-4_759 3144,,vahid liaghat,Not available,2016.0,10.1007/978-1-4939-2864-4_759,Encyclopedia of Algorithms,Taghi2016,False,,Springer,Not available,Prophet Inequality and Online Auctions,e0c08c68fe1f81bc8693cb3d3580ef22,http://dx.doi.org/10.1007/978-1-4939-2864-4_759 3145,,tian-ming bu,Not available,2016.0,10.1007/978-1-4939-2864-4_251,Encyclopedia of Algorithms,Tian-Ming2016,False,,Springer,Not available,Multiple Unit Auctions with Budget Constraint,c048f468e9ad6723eaaf77b7059be21e,http://dx.doi.org/10.1007/978-1-4939-2864-4_251 3146,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,paolo santi,Not available,2004.0,DOItmp_0558_016764,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/DOItmp_0558_016764 3147,This paper studies sequential second price auctions with imperfect quantity commitment in environments involving single-unit demands independent private values and non-decreasing marginal costs. The paper characterizes the symmetric equilibrium strategy and demonstrates that the equilibrium price sequence is conditionally non-increasing showing a downwards drift in cases in which the marginal cost exceeds the reserve price with positive probability. The paper also argues that unlike a ,gustavo rodriguez,Not available,2012.0,10.1007/s00199-010-0545-y,Economic Theory,E.2012,False,,Springer,Not available,Sequential auctions with imperfect quantity commitment,ba5fa72bca65be7abada62c4ce38e451,http://dx.doi.org/10.1007/s00199-010-0545-y 3148,This paper presents an approach to automated mechanism design in the domain of double auctions. We describe a novel parameterized space of double auctions and then introduce an evolutionary search method that searches this space of parameters. The approach evaluates auction mechanisms using the framework of the TAC Market Design Game and relates the performance of the markets in that game to their constituent parts using reinforcement learning. Experiments show that the strongest mechanisms we found using this approach not only win the Market Design Game against known strong opponents but also exhibit desirable economic properties when they run in isolation.,jinzhong niu,Not available,2012.0,10.1007/978-3-642-34200-4_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2012,False,,Springer,Not available,A Grey-Box Approach to Automated Mechanism Design,cacaaadcc7ad9f1d8b0deb48a7874e75,http://dx.doi.org/10.1007/978-3-642-34200-4_4 3149,This paper presents an approach to automated mechanism design in the domain of double auctions. We describe a novel parameterized space of double auctions and then introduce an evolutionary search method that searches this space of parameters. The approach evaluates auction mechanisms using the framework of the TAC Market Design Game and relates the performance of the markets in that game to their constituent parts using reinforcement learning. Experiments show that the strongest mechanisms we found using this approach not only win the Market Design Game against known strong opponents but also exhibit desirable economic properties when they run in isolation.,kai cai,Not available,2012.0,10.1007/978-3-642-34200-4_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2012,False,,Springer,Not available,A Grey-Box Approach to Automated Mechanism Design,cacaaadcc7ad9f1d8b0deb48a7874e75,http://dx.doi.org/10.1007/978-3-642-34200-4_4 3150,This paper presents an approach to automated mechanism design in the domain of double auctions. We describe a novel parameterized space of double auctions and then introduce an evolutionary search method that searches this space of parameters. The approach evaluates auction mechanisms using the framework of the TAC Market Design Game and relates the performance of the markets in that game to their constituent parts using reinforcement learning. Experiments show that the strongest mechanisms we found using this approach not only win the Market Design Game against known strong opponents but also exhibit desirable economic properties when they run in isolation.,simon parsons,Not available,2012.0,10.1007/978-3-642-34200-4_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Jinzhong2012,False,,Springer,Not available,A Grey-Box Approach to Automated Mechanism Design,cacaaadcc7ad9f1d8b0deb48a7874e75,http://dx.doi.org/10.1007/978-3-642-34200-4_4 3151,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,yeon-koo che,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 3152,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,syngjoo choi,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 3153,We study the Generalized Second Price auctions—a standard method for allocating online search advertising—experimentally considering both the static environment assumed by the prevailing theory and a dynamic game capturing the salient aspects of real-world search advertising auctions. We find that subjects tend to overbid in both treatments relative to the Vickrey-Clarke-Groves outcome suggested as most plausible by the theory but that their behavior in the dynamic game resembles the behavior in the static game. Our analysis thus lends support to the use of a static game as modeling proxy but calls into question the prevailing equilibrium predictions.,jinwoo kim,Not available,2012.0,10.1007/978-3-642-30913-7_7,Auctions Market Mechanisms and Their Applications,Yeon-Koo2012,False,,Springer,Not available,An Experimental Study of Sponsored-Search Auctions,eb6ab969e22e37173bbf376bfecbe9f2,http://dx.doi.org/10.1007/978-3-642-30913-7_7 3154,In paid crowdsourcing environment an organization post a task/problem atvarious platform like ,shalini gupta,Not available,2012.0,10.1007/978-81-322-0740-5_72,Proceedings of International Conference on Advances in Computing,Shalini2012,False,,Springer,Not available,An Efficient Incentive Compatible Mechanism for Paid Crowdsourcing,0589b44961a94eaaa76d2e5f032d35cb,http://dx.doi.org/10.1007/978-81-322-0740-5_72 3155,In paid crowdsourcing environment an organization post a task/problem atvarious platform like ,sajal mukhopadhyay,Not available,2012.0,10.1007/978-81-322-0740-5_72,Proceedings of International Conference on Advances in Computing,Shalini2012,False,,Springer,Not available,An Efficient Incentive Compatible Mechanism for Paid Crowdsourcing,0589b44961a94eaaa76d2e5f032d35cb,http://dx.doi.org/10.1007/978-81-322-0740-5_72 3156,In paid crowdsourcing environment an organization post a task/problem atvarious platform like ,d. gosh,Not available,2012.0,10.1007/978-81-322-0740-5_72,Proceedings of International Conference on Advances in Computing,Shalini2012,False,,Springer,Not available,An Efficient Incentive Compatible Mechanism for Paid Crowdsourcing,0589b44961a94eaaa76d2e5f032d35cb,http://dx.doi.org/10.1007/978-81-322-0740-5_72 3157,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,vincent conitzer,Not available,2004.0,DOItmp_0558_016764,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/DOItmp_0558_016764 3158,Motivated by allocation of cloud computing services bandwidth and wireless spectrum in secondary network markets we introduce a hierarchical auction model for network resource allocation. The Tier 1 provider owns all of the resource who holds an auction in which the Tier 2 providers participate. Each of the Tier 2 providers then holds an auction to allocate the acquired resource among the Tier 3 users. The Tier 2 providers play the role of middlemen since their utility for the resource depends entirely on the payment that they receive by selling it. We first consider the case of indivisible resource. We study a class of mechanisms where each sub-mechanism is either a first-price or a second-price auction and show that incentive compatibility and efficiency cannot be simultaneously achieved. We then consider the resource to be divisible and propose the hierarchical network second-price mechanism in which there exists an efficient Nash equilibrium with endogenous strong budget balance.,wenyuan tang,Not available,2012.0,10.1007/978-3-642-30373-9_2,Game Theory for Networks,Wenyuan2012,False,,Springer,Not available,Hierarchical Auctions for Network Resource Allocation,573997912f2496efcf00916727909b36,http://dx.doi.org/10.1007/978-3-642-30373-9_2 3159,Motivated by allocation of cloud computing services bandwidth and wireless spectrum in secondary network markets we introduce a hierarchical auction model for network resource allocation. The Tier 1 provider owns all of the resource who holds an auction in which the Tier 2 providers participate. Each of the Tier 2 providers then holds an auction to allocate the acquired resource among the Tier 3 users. The Tier 2 providers play the role of middlemen since their utility for the resource depends entirely on the payment that they receive by selling it. We first consider the case of indivisible resource. We study a class of mechanisms where each sub-mechanism is either a first-price or a second-price auction and show that incentive compatibility and efficiency cannot be simultaneously achieved. We then consider the resource to be divisible and propose the hierarchical network second-price mechanism in which there exists an efficient Nash equilibrium with endogenous strong budget balance.,rahul jain,Not available,2012.0,10.1007/978-3-642-30373-9_2,Game Theory for Networks,Wenyuan2012,False,,Springer,Not available,Hierarchical Auctions for Network Resource Allocation,573997912f2496efcf00916727909b36,http://dx.doi.org/10.1007/978-3-642-30373-9_2 3160,When there is one buyer interested in obtaining a service from one of a set of sellers multi-attribute or multi-issue auctions can ensure an allocation that is efficient. Even when there is no transferable utility (e.g. money) a recent qualitative version of the Vickrey auction may be used the QVA to obtain a Pareto-efficient outcome where the best seller wins. However auctions generally require that the preferences of at least one party participating in the auction are publicly known while often making this information public is costly undesirable or even impossible. It would therefore be useful to have a method that does not impose such a requirement but is still able to approximate the outcome of such an auction. The main question addressed here is whether the Pareto-efficient best-seller outcome in multi-issue settings without transferable utility (such as determined by the QVA) can be reasonably approximated by multi-bilateral closed negotiation between a buyer and multiple sellers. In these closed negotiations parties do not reveal their preferences explicitly but make alternating offers. The main idea is to have multiple rounds of such negotiations. We study three different variants of such a protocol: one that restricts the set of allowed offers for both the buyer and the seller one where the winning offer is announced after every round and one where the sellers are only told whether they have won or not after every round. It is shown experimentally that this protocol enables agents that can learn preferences to obtain agreements that approximate the Pareto-efficient best-seller outcome as defined by the auction mechanism. We also show that the strategy that exploits such a learning capability in negotiation is robust against and dominates a Zero Intelligence strategy. It thus follows that the requirement to publicly announce preferences can be removed when negotiating parties are equipped with the proper learning capabilities and negotiate using the proposed multi-round multi-bilateral negotiation protocol.,koen hindriks,Not available,2012.0,10.1007/s10726-009-9186-6,Group Decision and Negotiation,V.2012,False,,Springer,Not available,Qualitative One-to-Many Multi-Issue Negotiation: Approximating the QVA,5ef721fde5f436ebb5ac921f5a8e33c1,http://dx.doi.org/10.1007/s10726-009-9186-6 3161,When there is one buyer interested in obtaining a service from one of a set of sellers multi-attribute or multi-issue auctions can ensure an allocation that is efficient. Even when there is no transferable utility (e.g. money) a recent qualitative version of the Vickrey auction may be used the QVA to obtain a Pareto-efficient outcome where the best seller wins. However auctions generally require that the preferences of at least one party participating in the auction are publicly known while often making this information public is costly undesirable or even impossible. It would therefore be useful to have a method that does not impose such a requirement but is still able to approximate the outcome of such an auction. The main question addressed here is whether the Pareto-efficient best-seller outcome in multi-issue settings without transferable utility (such as determined by the QVA) can be reasonably approximated by multi-bilateral closed negotiation between a buyer and multiple sellers. In these closed negotiations parties do not reveal their preferences explicitly but make alternating offers. The main idea is to have multiple rounds of such negotiations. We study three different variants of such a protocol: one that restricts the set of allowed offers for both the buyer and the seller one where the winning offer is announced after every round and one where the sellers are only told whether they have won or not after every round. It is shown experimentally that this protocol enables agents that can learn preferences to obtain agreements that approximate the Pareto-efficient best-seller outcome as defined by the auction mechanism. We also show that the strategy that exploits such a learning capability in negotiation is robust against and dominates a Zero Intelligence strategy. It thus follows that the requirement to publicly announce preferences can be removed when negotiating parties are equipped with the proper learning capabilities and negotiate using the proposed multi-round multi-bilateral negotiation protocol.,dmytro tykhonov,Not available,2012.0,10.1007/s10726-009-9186-6,Group Decision and Negotiation,V.2012,False,,Springer,Not available,Qualitative One-to-Many Multi-Issue Negotiation: Approximating the QVA,5ef721fde5f436ebb5ac921f5a8e33c1,http://dx.doi.org/10.1007/s10726-009-9186-6 3162,When there is one buyer interested in obtaining a service from one of a set of sellers multi-attribute or multi-issue auctions can ensure an allocation that is efficient. Even when there is no transferable utility (e.g. money) a recent qualitative version of the Vickrey auction may be used the QVA to obtain a Pareto-efficient outcome where the best seller wins. However auctions generally require that the preferences of at least one party participating in the auction are publicly known while often making this information public is costly undesirable or even impossible. It would therefore be useful to have a method that does not impose such a requirement but is still able to approximate the outcome of such an auction. The main question addressed here is whether the Pareto-efficient best-seller outcome in multi-issue settings without transferable utility (such as determined by the QVA) can be reasonably approximated by multi-bilateral closed negotiation between a buyer and multiple sellers. In these closed negotiations parties do not reveal their preferences explicitly but make alternating offers. The main idea is to have multiple rounds of such negotiations. We study three different variants of such a protocol: one that restricts the set of allowed offers for both the buyer and the seller one where the winning offer is announced after every round and one where the sellers are only told whether they have won or not after every round. It is shown experimentally that this protocol enables agents that can learn preferences to obtain agreements that approximate the Pareto-efficient best-seller outcome as defined by the auction mechanism. We also show that the strategy that exploits such a learning capability in negotiation is robust against and dominates a Zero Intelligence strategy. It thus follows that the requirement to publicly announce preferences can be removed when negotiating parties are equipped with the proper learning capabilities and negotiate using the proposed multi-round multi-bilateral negotiation protocol.,mathijs weerdt,Not available,2012.0,10.1007/s10726-009-9186-6,Group Decision and Negotiation,V.2012,False,,Springer,Not available,Qualitative One-to-Many Multi-Issue Negotiation: Approximating the QVA,5ef721fde5f436ebb5ac921f5a8e33c1,http://dx.doi.org/10.1007/s10726-009-9186-6 3163,With more and more people using the internet for a wide range of purposes internet use has become an absolute necessity for businesses to survive and grow. Online auction have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. The online auction is an important e-commerce application which enables the buying and selling of goods through a dynamic pricing strategy. Users can access the auction system through the Web WAP-enabled devices and agents. The paper assumes that the auction system supports only English auction. Predicting bidding strategy is not easy since it is dependent on many factors such as the behavior of each bidder the number of bidders participating in that auction as well as each bidder’s reservation price. Here simultaneous English auctions for the same item are considered. This paper uses the concept of Game Theory to predict the bidding strategy in an auction and helps the user to decide whether to proceed with the auction or to back off from the auction so as to maximize the bidder’s profit. This paper considers the user bidding for an item simultaneously in more than one auction site.,nirupama pavanje,Not available,2012.0,10.1007/978-81-322-0740-5_91,Proceedings of International Conference on Advances in Computing,Nirupama2012,False,,Springer,Not available,Bidding Strategy in Simultaneous English Auctions Using Game Theory,ceb0c195102149f56015aae7ab7ee4f7,http://dx.doi.org/10.1007/978-81-322-0740-5_91 3164,We review supply function equilibrium models and their predictions on market outcomes in the wholesale electricity auctions. We discuss how observable market characteristics such as capacity constraints number of power suppliers load distribution and auction format affect the behavior of suppliers and performance of the market. We specifically focus on the possible market power exerted by pivotal suppliers and the comparison between discriminatory and uniform-price auctions. We also describe capacity investment behavior of electricity producers in the restructured industry.,talat genc,Not available,2012.0,10.1007/978-3-642-23193-3_10,Handbook of Networks in Power Systems I,S.2012,False,,Springer,Not available,Equilibrium Predictions in Wholesale Electricity Markets,3edac09dbf3079e3c54e35a1a9810cb6,http://dx.doi.org/10.1007/978-3-642-23193-3_10 3165,This paper introduces ,christopher leberknight,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 3166,This paper introduces ,ranjan pal,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 3167,This paper introduces ,mung chiang,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 3168,Communication complexity has recently been recognized as a major obstacle in the implementation of combinatorial auctions. In this paper we consider a setting in which the auctioneer (elicitor) instead of passively waiting for the bids presented by the bidders elicits the bidders’ preferences (or valuations) by asking value queries. It is known that in the more general case (no restrictions on the bidders’ preferences) this approach requires the exchange of an exponential amount of information. However in practical economic scenarios we might expect that bidders’ valuations are somewhat structured. In this paper we consider several such scenarios and we show that polynomial elicitation in these cases is often sufficient. We also prove that the family of “easy to elicit” classes of valuations is closed under union. This suggests that efficient preference elicitation is possible in a scenario in which the elicitor contrary to what it is commonly assumed in the literature on preference elicitation does not exactly know the class to which the function to elicit belongs. Finally we discuss what renders a certain class of valuations “easy to elicit with value queries”.,tuomas sandholm,Not available,2004.0,DOItmp_0558_016764,Learning Theory,Paolo2004,False,,Springer,Not available,Towards a Characterization of Polynomial Preference Elicitation with Value Queries in Combinatorial Auctions ,40b21322799d6433b6e0bd117d0f2d80,http://dx.doi.org/DOItmp_0558_016764 3169,This paper introduces ,harold poor,Not available,2012.0,10.1007/978-3-642-30373-9_11,Game Theory for Networks,Christopher2012,False,,Springer,Not available," ",3ead40bdd624705bd863666267eea083,http://dx.doi.org/10.1007/978-3-642-30373-9_11 3170,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,he huang,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3171,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,yu-e sun,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3172,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,kai xing,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3173,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,hongli xu,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3174,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,xueyong xu,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3175,In this paper we propose a truthful multi-unit double auction scheme for the scenarios that multiple buyers/sellers have different demands to buy/sell which involves a series of bid-related buyer group construction and winner determination strategies. In the analysis we show the correctness and effectiveness of the proposed scheme and prove that it improves the spectrum reusability and is truthful. To the best of our knowledge it is the first multi-unit double auction approach for wireless spectrum allocation.,liusheng huang,Not available,2012.0,10.1007/978-3-642-31869-6_21,Wireless Algorithms Systems and Applications,He2012,False,,Springer,Not available,Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications,64fae2178eaecb22e150b542486e3019,http://dx.doi.org/10.1007/978-3-642-31869-6_21 3176,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,christopher boyer,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3177,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,b. brorsen,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3178,Previous theoretical work has compared a private-value auction and posted-price market and an affiliated-value auction and a posted-price market to determine the selling method preferred by sellers. Much less however is known about the seller’s preferred selling method when the buyers have a common value of the item. Our objective is to determine if a first-price auction or a posted-price market provides a seller with the larger expected revenue when buyers have a common value of the item being sold. An agent-based posted-price market and an agent-based first-price common-value auction with a reserve price are developed to compare these selling methods. Holding the buyers’ uncertainty about the value of the item constant the seller prefers the posted-price market when the seller has no uncertainty about the item’s value. When the seller has an equal level of uncertainty as the buyers the seller’s expected revenue for each market is similar. As the seller’s uncertainty increases beyond the level of the buyers’ uncertainty the auction with a reserve price eventually becomes the preferred choice.,tong zhang,Not available,2014.0,10.1007/s11403-013-0115-z,Journal of Economic Interaction and Coordination,N.2014,False,,Springer,Not available,Common-value auction versus posted-price selling: an agent-based model approach,96aed5b5c3738117bdd2b111e771b7a3,http://dx.doi.org/10.1007/s11403-013-0115-z 3179,We study a class of single-round sealed-bid auctions for a set of identical items. We adopt the worst case competitive framework defined by [6 3] that compares the profit of an auction to that of an optimal single price sale to at least two bidders. In this framework we give a lower bound of 2.42 (an improvement from the bound of 2 given in [3]) on the competitive ratio of any truthful auction one where each bidders best strategy is to declare the true maximum value an item is worth to them. This result contrasts with the 3.39 competitive ratio of the best known truthful auction [4].,andrew goldberg,Not available,2004.0,10.1007/978-3-540-24749-4_56,STACS 2004,V.2004,False,,Springer,Not available,A Lower Bound on the Competitive Ratio of Truthful Auctions,36ac12d762d77b8b68511022fefe0940,http://dx.doi.org/10.1007/978-3-540-24749-4_56 3180,We show that both the outside and inside innovators license a new product (or drastic process innovation) to all potential licensees in the presence of convex costs which occur under decreasing returns to scale technologies. An implication of our analysis is that a monopolist producer may prefer technology licensing in a homogeneous goods industry. We also show that an inside innovator’s incentive for innovation may be higher than that of an outside innovator.,arijit mukherjee,Not available,2014.0,10.1007/s00712-013-0333-9,Journal of Economics,Arijit2014,False,,Springer,Not available,Licensing under convex costs,0e48904c38711427ca721d0fce7b5df9,http://dx.doi.org/10.1007/s00712-013-0333-9 3181,We study deterministic single object auctions in the private values environment. We show that an allocation rule is implementable (in dominant strategies) and non-bossy if and only if it is a strongly rationalizable allocation rule. With a mild continuity condition we show that an allocation rule is implementable and non-bossy if and only if it is a simple utility maximizer (with appropriate tie-breaking). All our characterizations extend the seminal result of Roberts (“Aggregation and Revelation of Preferences” pp. 321–348 ,debasis mishra,Not available,2014.0,10.1007/s40505-014-0031-y,Economic Theory Bulletin,Debasis2014,False,,Springer,Not available,Non-bossy single object auctions,06f2927b9477e8cac3884f17c72e5c9b,http://dx.doi.org/10.1007/s40505-014-0031-y 3182,We study deterministic single object auctions in the private values environment. We show that an allocation rule is implementable (in dominant strategies) and non-bossy if and only if it is a strongly rationalizable allocation rule. With a mild continuity condition we show that an allocation rule is implementable and non-bossy if and only if it is a simple utility maximizer (with appropriate tie-breaking). All our characterizations extend the seminal result of Roberts (“Aggregation and Revelation of Preferences” pp. 321–348 ,abdul quadir,Not available,2014.0,10.1007/s40505-014-0031-y,Economic Theory Bulletin,Debasis2014,False,,Springer,Not available,Non-bossy single object auctions,06f2927b9477e8cac3884f17c72e5c9b,http://dx.doi.org/10.1007/s40505-014-0031-y 3183,Agent-based simulations are performed to study adaptive learning in the context of asymmetric first-price auctions. Non-linearity of the Nash equilibrium strategies is used to investigate the effect of task complexity on adaptive learning by varying the degree of approximation the agents can handle. In addition learning in different information environments is explored. Social learning allows agents to imitate each other’s bidding strategies based on their relative success. Under individual learning agents are limited to their own experience. We observe convergence to steady states near the predicted equilibrium in all cases. The ability to learn non-linear functions helps the agents with a non-linear equilibrium strategy but hurts the agents with an almost linear one. Better information about the opponent population has a relatively modest impact. A larger number of strategies to experiment with and an ability to systematically compare strategies by holding a number of factors constant have a comparatively stronger beneficial effect.,kirill chernomaz,Not available,2014.0,10.1007/s11403-013-0111-3,Journal of Economic Interaction and Coordination,Kirill2014,False,,Springer,Not available,Adaptive learning in an asymmetric auction: genetic algorithm approach,e800aaf9f37efc422f8562d1ce085344,http://dx.doi.org/10.1007/s11403-013-0111-3 3184,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which incorporate budgets and study their equilibrium and dynamics. Our abstraction has multiple agents bidding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value per item. We abstract this repeated interaction as a one-shot game which we call ,asaph arnon,Not available,2014.0,10.1007/s00224-013-9472-1,Theory of Computing Systems,Asaph2014,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,0ed98b5128a774a891e40933e89c5eed,http://dx.doi.org/10.1007/s00224-013-9472-1 3185,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which incorporate budgets and study their equilibrium and dynamics. Our abstraction has multiple agents bidding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value per item. We abstract this repeated interaction as a one-shot game which we call ,yishay mansour,Not available,2014.0,10.1007/s00224-013-9472-1,Theory of Computing Systems,Asaph2014,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,0ed98b5128a774a891e40933e89c5eed,http://dx.doi.org/10.1007/s00224-013-9472-1 3186," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",yu-e sun,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3187," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",he huang,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3188," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",kai xing,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3189," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",zhili chen,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3190,We study a class of single-round sealed-bid auctions for a set of identical items. We adopt the worst case competitive framework defined by [6 3] that compares the profit of an auction to that of an optimal single price sale to at least two bidders. In this framework we give a lower bound of 2.42 (an improvement from the bound of 2 given in [3]) on the competitive ratio of any truthful auction one where each bidders best strategy is to declare the true maximum value an item is worth to them. This result contrasts with the 3.39 competitive ratio of the best known truthful auction [4].,jason hartline,Not available,2004.0,10.1007/978-3-540-24749-4_56,STACS 2004,V.2004,False,,Springer,Not available,A Lower Bound on the Competitive Ratio of Truthful Auctions,36ac12d762d77b8b68511022fefe0940,http://dx.doi.org/10.1007/978-3-540-24749-4_56 3191," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",jianying zheng,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3192," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",hongli xu,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3193," With the increasing number of handheld and mobile devices the demand for available spectrum resource is experiencing a rapid growth. Auction has been widely used for spectrum resource allocation in ubiquitous communications due to its fairness. However many existing spectrum auction schemes inherently limit users’ ability to fully utilize the spectrum due to the assumption that the spectrum resource is single unit and indivisible. Besides most of them fail to take into account of buyer/seller’s distinctive demands in auction and consider spectrum allocation as single-sided auction. In this paper we consider the multi-unit double auction problem under the context that multiple buyers/sellers have different demands to buy/sell. Particularly we present a novel strategy-proof multi-unit double auction scheme (SPRITE). SPRITE establishes a series of bid-related buyer group construction and winner determination strategies. It improves the spectrum reusability and achieves sound spectrum utilization fairness and essential economic properties. In the theoretical analysis we have shown the correctness effectiveness and economic properties of SPRITE and prove that SPRITE is strategy-proof. In the evaluation study we further show that SPRITE can achieve multi-unit spectrum auction with better auction efficiency compared with existing double auction mechanisms. To the best of our knowledge SPRITE is the first multi-unit double auction approach that guarantees the competitive fairness among buyers while remaining strategy-proof for spectrum allocation. Furthermore the multi-unit double auction mechanism proposed in this work helps increasing flexibility of the ubiquitous devices for spectrum usage.",liusheng huang,Not available,2014.0,10.1007/s00779-013-0709-4,Personal and Ubiquitous Computing,Yu-e2014,False,,Springer,Not available,SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications,08ca9c7f4ced5d735d72e661a6457156,http://dx.doi.org/10.1007/s00779-013-0709-4 3194,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,diego aycinena,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3195,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,rimvydas baltaduonis,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3196,In many auctions the valuation structure involves both private and common value elements. Existing experimental evidence (e.g. Goeree and Offerman in Am. Econ. Rev. 92(3):625–643 ,lucas rentschler,Not available,2014.0,10.1007/s10683-013-9359-7,Experimental Economics,Diego2014,False,,Springer,Not available,Valuation structure in first-price and least-revenue auctions: an experimental investigation,6d6912da54700309b8ca9d25abf5cf54,http://dx.doi.org/10.1007/s10683-013-9359-7 3197,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,qiang gong,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3198,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,xu tan,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3199,We examine how buyers’ behaviors sellers’ profits and the social welfare (the total surplus of all sellers and buyers) vary with the order of sellers in sequential auctions where sellers have different reservation values. First when reserve prices are exogenously set to be sellers’ reservation values a social planner would order sellers from low to high based on their reservation values which yields a uniquely efficient order that maximizes the social welfare. However an auctioneer charged with maximizing the total profit of all sellers would want to reverse the increasing order in certain situations. Second when reserve prices can be endogenously selected in addition to the order of sellers the auctioneer would always want to adopt the increasing order for the optimally chosen reserve prices. Sequential auctions with optimally chosen reserve prices and an increasing order are shown optimal among the class of voluntary and incentive-compatible mechanisms.,yiqing xing,Not available,2014.0,10.1007/s10058-013-0152-z,Review of Economic Design,Qiang2014,False,,Springer,Not available,Ordering sellers in sequential auctions,7535516b01f9d28851fba21ced95b7aa,http://dx.doi.org/10.1007/s10058-013-0152-z 3200,This paper reconsiders the licensing of a common value innovation to a downstream duopoly assuming firms observe imperfect signals of the cost reduction induced by the innovation. The innovator adopts a direct revelation mechanism and awards an unrestricted license to the firm that reports the highest signal and a royalty contract to the other. Firms may signal strength to their rivals through exaggerated messages which may however backfire and give rise to higher royalty payments. We provide sufficient conditions for truthful implementation and for the profitability of adding royalty contracts to what is otherwise a first-price license auction.,cuihong fan,Not available,2014.0,10.1007/s00182-013-0391-9,International Journal of Game Theory,Cuihong2014,False,,Springer,Not available,Licensing a common value innovation when signaling strength may backfire,6aadf196bf6593caa153d58ab4f34fa8,http://dx.doi.org/10.1007/s00182-013-0391-9 3201,We study a class of single-round sealed-bid auctions for a set of identical items. We adopt the worst case competitive framework defined by [6 3] that compares the profit of an auction to that of an optimal single price sale to at least two bidders. In this framework we give a lower bound of 2.42 (an improvement from the bound of 2 given in [3]) on the competitive ratio of any truthful auction one where each bidders best strategy is to declare the true maximum value an item is worth to them. This result contrasts with the 3.39 competitive ratio of the best known truthful auction [4].,anna karlin,Not available,2004.0,10.1007/978-3-540-24749-4_56,STACS 2004,V.2004,False,,Springer,Not available,A Lower Bound on the Competitive Ratio of Truthful Auctions,36ac12d762d77b8b68511022fefe0940,http://dx.doi.org/10.1007/978-3-540-24749-4_56 3202,This paper reconsiders the licensing of a common value innovation to a downstream duopoly assuming firms observe imperfect signals of the cost reduction induced by the innovation. The innovator adopts a direct revelation mechanism and awards an unrestricted license to the firm that reports the highest signal and a royalty contract to the other. Firms may signal strength to their rivals through exaggerated messages which may however backfire and give rise to higher royalty payments. We provide sufficient conditions for truthful implementation and for the profitability of adding royalty contracts to what is otherwise a first-price license auction.,byoung jun,Not available,2014.0,10.1007/s00182-013-0391-9,International Journal of Game Theory,Cuihong2014,False,,Springer,Not available,Licensing a common value innovation when signaling strength may backfire,6aadf196bf6593caa153d58ab4f34fa8,http://dx.doi.org/10.1007/s00182-013-0391-9 3203,This paper reconsiders the licensing of a common value innovation to a downstream duopoly assuming firms observe imperfect signals of the cost reduction induced by the innovation. The innovator adopts a direct revelation mechanism and awards an unrestricted license to the firm that reports the highest signal and a royalty contract to the other. Firms may signal strength to their rivals through exaggerated messages which may however backfire and give rise to higher royalty payments. We provide sufficient conditions for truthful implementation and for the profitability of adding royalty contracts to what is otherwise a first-price license auction.,elmar wolfstetter,Not available,2014.0,10.1007/s00182-013-0391-9,International Journal of Game Theory,Cuihong2014,False,,Springer,Not available,Licensing a common value innovation when signaling strength may backfire,6aadf196bf6593caa153d58ab4f34fa8,http://dx.doi.org/10.1007/s00182-013-0391-9 3204,Auction sellers can use a reserve price to require a minimum bid before items are sold. Theoretical and experimental research has tested the influence of a reserve price in an independent private values auction but little focus has been given to the influence of a reserve price in a first-price common-value auction. We establish an agent-based first-price common-value auction to determine the impact of the reserve price with two buyers and with three buyers. An agent-based approach to this problem is both a unique contribution to the literature and appropriate since finding analytical solutions with common-value auctions is difficult. The agent-based model approach also allows us to consider buyers that have non-symmetric bid functions. Furthermore we introduce a combination of numerical integration techniques with a new particle swarm learning algorithm. The buyers in the model choose their expected-net-revenue-maximizing bid price and sellers choose their expected-revenue-maximizing reserve price. In the two-buyer and three-buyer auction a reserve price increases the equilibrium winning bid price decreases the probability that the item is sold and increases the seller’s expected revenue. A reserve price in a two-buyer auction increases the winning bid price more than including an additional buyer in the auction with no reserve price. However due to only receiving a salvage value when the item does not sell in the auction the seller’s expected revenue is higher in the three-buyer first-price common-value auction without a reserve price than in the two-buyer auction with a reserve price.,christopher boyer,Not available,2014.0,10.1007/s10614-013-9413-8,Computational Economics,N.2014,False,,Springer,Not available,Implications of a Reserve Price in an Agent-Based Common-Value Auction,56d8b54a4a8e0dd5f61d4b678688b3fe,http://dx.doi.org/10.1007/s10614-013-9413-8 3205,Auction sellers can use a reserve price to require a minimum bid before items are sold. Theoretical and experimental research has tested the influence of a reserve price in an independent private values auction but little focus has been given to the influence of a reserve price in a first-price common-value auction. We establish an agent-based first-price common-value auction to determine the impact of the reserve price with two buyers and with three buyers. An agent-based approach to this problem is both a unique contribution to the literature and appropriate since finding analytical solutions with common-value auctions is difficult. The agent-based model approach also allows us to consider buyers that have non-symmetric bid functions. Furthermore we introduce a combination of numerical integration techniques with a new particle swarm learning algorithm. The buyers in the model choose their expected-net-revenue-maximizing bid price and sellers choose their expected-revenue-maximizing reserve price. In the two-buyer and three-buyer auction a reserve price increases the equilibrium winning bid price decreases the probability that the item is sold and increases the seller’s expected revenue. A reserve price in a two-buyer auction increases the winning bid price more than including an additional buyer in the auction with no reserve price. However due to only receiving a salvage value when the item does not sell in the auction the seller’s expected revenue is higher in the three-buyer first-price common-value auction without a reserve price than in the two-buyer auction with a reserve price.,b. brorsen,Not available,2014.0,10.1007/s10614-013-9413-8,Computational Economics,N.2014,False,,Springer,Not available,Implications of a Reserve Price in an Agent-Based Common-Value Auction,56d8b54a4a8e0dd5f61d4b678688b3fe,http://dx.doi.org/10.1007/s10614-013-9413-8 3206,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,yaqiong wu,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 3207,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,yong zhao,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 3208,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,chaoyuan yue,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 3209,A homogenous multi-unit auction model is studied in two conditions: One is that the bidders face budget constraints and another is that the bidders do not face budget constraints. Two equilibrium bidding strategies of each bidder are presented in these two conditions. By comparing them the authors show that the equilibrium unit price bid in the presence of budget constraints will be less than that in the absence of budget constraints. The difference between the two equilibrium bids leads to the reduced revenue of the seller. And this difference will decrease as the number of the bidders increases.,xianglin wu,Not available,2012.0,10.1007/s11424-012-9301-7,Journal of Systems Science and Complexity,Yaqiong2012,False,,Springer,Not available,Budget constraints in homogenous multi-unit auctions,66a4a189419e3987e1adadc64a5f4a0e,http://dx.doi.org/10.1007/s11424-012-9301-7 3210,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,peter cramton,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 3211,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,emel filiz-ozbay,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 3212,We study a class of single-round sealed-bid auctions for a set of identical items. We adopt the worst case competitive framework defined by [6 3] that compares the profit of an auction to that of an optimal single price sale to at least two bidders. In this framework we give a lower bound of 2.42 (an improvement from the bound of 2 given in [3]) on the competitive ratio of any truthful auction one where each bidders best strategy is to declare the true maximum value an item is worth to them. This result contrasts with the 3.39 competitive ratio of the best known truthful auction [4].,michael saks,Not available,2004.0,10.1007/978-3-540-24749-4_56,STACS 2004,V.2004,False,,Springer,Not available,A Lower Bound on the Competitive Ratio of Truthful Auctions,36ac12d762d77b8b68511022fefe0940,http://dx.doi.org/10.1007/978-3-540-24749-4_56 3213,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,erkut ozbay,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 3214,We analyze the implications of different pricing rules in discrete clock auctions. The two most common pricing rules are highest-rejected bid (HRB) and lowest-accepted bid (LAB). Under HRB the winners pay the ,pacharasut sujarittanonta,Not available,2012.0,10.1007/s10683-011-9301-9,Experimental Economics,Peter2012,False,,Springer,Not available,Discrete clock auctions: an experimental study,325a690958fb004d77689ad7f2d242d3,http://dx.doi.org/10.1007/s10683-011-9301-9 3215,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,kentaro kawasaki,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 3216,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,takeshi fujie,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 3217,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,kentaro koito,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 3218,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,norikazu inoue,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 3219,Many agri-environmental conservation programs are faced with the problem of imperfect monitoring. This provides farmers with an incentive for noncompliance because they can receive subsidies without implementing the conservation scheme. In this paper bidding behavior and auction performance are compared for discriminatory-price and uniform-price auctions in an imperfect monitoring environment. Our theoretical analysis suggests that auction performances are equalized between the discriminatory-price and uniform-price auctions. However laboratory experiments reveal that although the discriminatory-price auction has an advantage in terms of reducing policy costs it is more likely to cause adverse selection. As a result the uniform-price auction tends to have higher efficiency and cost-effectiveness when compliance behavior is taken into account.,hiroki sasaki,Not available,2012.0,10.1007/s10640-012-9551-9,Environmental and Resource Economics,Kentaro2012,False,,Springer,Not available,Conservation Auctions and Compliance: Theory and Evidence from Laboratory Experiments,91058b09cd983122c326336fc333ae37,http://dx.doi.org/10.1007/s10640-012-9551-9 3220,We study a discrete common-value auction environment with two asymmetrically informed bidders. Equilibrium of the first-price auction is in mixed strategies which we characterize using a doubly recursive solution method. The distribution of bids for the ex post strong player stochastically dominates that for the ex post weak player. This result complements Maskin and Riley’s (Rev Econ Stud 67:413–438 ,david malueg,Not available,2012.0,10.1007/s00182-011-0282-x,International Journal of Game Theory,A.2012,False,,Springer,Not available,Equilibrium and revenue in a family of common-value first-price auctions with differential information,74cee7b8134b0472281cb2bbf5f23266,http://dx.doi.org/10.1007/s00182-011-0282-x 3221,We study a discrete common-value auction environment with two asymmetrically informed bidders. Equilibrium of the first-price auction is in mixed strategies which we characterize using a doubly recursive solution method. The distribution of bids for the ex post strong player stochastically dominates that for the ex post weak player. This result complements Maskin and Riley’s (Rev Econ Stud 67:413–438 ,ram orzach,Not available,2012.0,10.1007/s00182-011-0282-x,International Journal of Game Theory,A.2012,False,,Springer,Not available,Equilibrium and revenue in a family of common-value first-price auctions with differential information,74cee7b8134b0472281cb2bbf5f23266,http://dx.doi.org/10.1007/s00182-011-0282-x 3222,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,xiaoshu xu,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3223,An auction with a buyout option is modelled. Such an option allows a bidder to purchase the item being auctioned at a pre-specified buyout price instead of attempting to obtain the item through the traditional auction procedure. This analysis is motivated by internet auctions where such options are present. If all auction participants are risk neutral the seller will choose a buyout price high enough so that the option is never exercised. However a risk averse seller facing risk neutral bidders will choose a price low enough so that the option is exercised with positive probability. Further if bidders are risk neutral and the seller is risk averse this option may result in a Pareto improvement compared to a sealed bid second price auction.,brett katzman,Not available,2006.0,10.1007/s00199-004-0571-8,Economic Theory,Timothy2006,False,,Springer,Not available,The role of varying risk attitudes in an auction with a buyout option,d250db95ae0113de8b9f892d26186868,http://dx.doi.org/10.1007/s00199-004-0571-8 3224,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,alexander vasin,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 3225,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,dan levin,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3226,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,lixin ye,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3227,We provide a characterization of interim efficient auctions and examine their properties in the presence of informational interdependent valuations. We show that buyers can be awarded the auctioned item less often than the efficient level. We also show that buyers obtain the item more often as the degree of heterogeneity in preferences increases even though profitability of trade does not depend on the heterogeneity in preferences.,serkan kucuksenel,Not available,2012.0,10.1007/s00712-011-0226-8,Journal of Economics,Serkan2012,False,,Springer,Not available,Interim efficient auctions with interdependent valuations,92704ac4bf99c8279092de7469bd4875,http://dx.doi.org/10.1007/s00712-011-0226-8 3228,This paper aims to estimate the effect of imposing a reserve price in repeated auctions of homogeneous items. I model the behavior of impatient bidders who search for the best auction outcome over time. The model is used to develop estimating equations for the bidders’ valuations and to evaluate the effect of reserve prices on bids and revenue. Using data collected from surplus auctions of personal computer processors I find economically significant gains from imposing a reserve price. The revenue-maximizing reserve price improves revenue by about 23% for a large subsample of the auctions in the data.,octavian carare,Not available,2012.0,10.1007/s11151-011-9321-9,Review of Industrial Organization,Octavian2012,False,,Springer,Not available,Reserve Prices in Repeated Auctions,64572555bfaed1799a31cbfa98b9feba,http://dx.doi.org/10.1007/s11151-011-9321-9 3229,Despite their theoretical efficiency in selling shares to the public auctions are not the preferred mechanisms in Initial Public Offerings (IPOs). Chemmanur and Liu (2006) and Sherman (2005) provide a rational explanation for this puzzle based on the notion that issuers are not only interested in the offering proceeds but also the secondary market price and thus try to induce investors to produce information about the IPO. In this paper we report the results of an experimental study set up to test the basic mechanisms underlying this reasoning. Our findings strongly support the theoretical argument. If the issuer has some discretion in setting the offering price (as with bookbuilding or fixed-price offerings) he can maintain investors’ propensity to produce information by appropriately adjusting the offering price even if information costs are high. In auctions however high information costs inevitably result in a low propensity to produce information as investors bid too competitively to recover the costs of information production. Our results provide experimental support for the theoretical argument that an auction is not the preferable offering mechanism for young and risky IPO firms because while there is strong demand for information about such firms the costs of producing this information are high.,andreas trauten,Not available,2012.0,10.1007/s11573-012-0554-3,Zeitschrift für Betriebswirtschaft,Andreas2012,False,,Springer,Not available,Information production and bidding in IPOs,651b504ce6a593189b9038a08efa5121,http://dx.doi.org/10.1007/s11573-012-0554-3 3230,Despite their theoretical efficiency in selling shares to the public auctions are not the preferred mechanisms in Initial Public Offerings (IPOs). Chemmanur and Liu (2006) and Sherman (2005) provide a rational explanation for this puzzle based on the notion that issuers are not only interested in the offering proceeds but also the secondary market price and thus try to induce investors to produce information about the IPO. In this paper we report the results of an experimental study set up to test the basic mechanisms underlying this reasoning. Our findings strongly support the theoretical argument. If the issuer has some discretion in setting the offering price (as with bookbuilding or fixed-price offerings) he can maintain investors’ propensity to produce information by appropriately adjusting the offering price even if information costs are high. In auctions however high information costs inevitably result in a low propensity to produce information as investors bid too competitively to recover the costs of information production. Our results provide experimental support for the theoretical argument that an auction is not the preferable offering mechanism for young and risky IPO firms because while there is strong demand for information about such firms the costs of producing this information are high.,thomas langer,Not available,2012.0,10.1007/s11573-012-0554-3,Zeitschrift für Betriebswirtschaft,Andreas2012,False,,Springer,Not available,Information production and bidding in IPOs,651b504ce6a593189b9038a08efa5121,http://dx.doi.org/10.1007/s11573-012-0554-3 3231,We present a simple model of a debate between two interested parties which takes into account the complexity of their policy positions. The two debaters engage in all-pay-auctions to win slots of time/attention to present their positions to a decision-maker. Complexity of a policy is modelled through the number of slots of attention needed to get the policy across. We show that when the number of attention slots is scarce but still large enough to allow for both sides to fully present their policies simple policies have an advantage over more complex ones. We show that this advantage of simple policies is diminished only when the number of attention slots is fairly large and when the decision-maker is strongly persuaded by more complex policies.,gilat levy,Not available,2012.0,10.1007/s00199-011-0620-z,Economic Theory,Gilat2012,False,,Springer,Not available,When do simple policies win?,209b96acfb2724697a5b13acd911ffb3,http://dx.doi.org/10.1007/s00199-011-0620-z 3232,We present a simple model of a debate between two interested parties which takes into account the complexity of their policy positions. The two debaters engage in all-pay-auctions to win slots of time/attention to present their positions to a decision-maker. Complexity of a policy is modelled through the number of slots of attention needed to get the policy across. We show that when the number of attention slots is scarce but still large enough to allow for both sides to fully present their policies simple policies have an advantage over more complex ones. We show that this advantage of simple policies is diminished only when the number of attention slots is fairly large and when the decision-maker is strongly persuaded by more complex policies.,ronny razin,Not available,2012.0,10.1007/s00199-011-0620-z,Economic Theory,Gilat2012,False,,Springer,Not available,When do simple policies win?,209b96acfb2724697a5b13acd911ffb3,http://dx.doi.org/10.1007/s00199-011-0620-z 3233,This paper investigates the time dynamics of user strategic patterns and resulting welfares in a series of overlapping multiple online auctions. An auction mechanism is a dynamic game where the valuation and strategic space of bidders determine the outcomes. When those mechanisms exist concurrently or in a series in a market environment multiple sources are visible and accessible such that there is likely to be a form of interdependency across the auctions. While heterogeneous bidder behavior has been studied in some literature the focus is mainly on an individual auction level and the underlying dynamics regarding the interdependency across the auctions in the market has not been explained. We use a two-phased approach to address this discrepancy. First we classify user strategy using ,seokjoo chang,Not available,2012.0,10.1007/s10796-010-9249-x,Information Systems Frontiers,Andrew2012,False,,Springer,Not available,Time dynamics of overlapping e-auction mechanisms: Information transfer strategic user behavior and auction revenue,1641c10ebb03b8f58d5c8d4a9b14ee1a,http://dx.doi.org/10.1007/s10796-010-9249-x 3234,State agencies in infant-formula procurement auctions receive lower bids when they are in buyer alliances than when they are unallied. The Special Supplemental Nutrition Program for Women Infants and Children (WIC) uses an auction to procure infant formula. Manufacturers bid on the right to be an agency’s sole supplier by offering a rebate on formula sold through WIC. Agencies frequently join together in buyer alliances. An empirical estimation shows that bids are lower to alliances and that lower prices result because alliances are heterogeneous. Results suggest that when heterogeneity is not controlled bids decline with alliance size which has policy implications because Congress recently limited alliance size.,david davis,Not available,2014.0,10.1007/s11151-014-9433-0,Review of Industrial Organization,E.2014,False,,Springer,Not available,Buyer Alliances as Countervailing Power in WIC Infant-Formula Auctions,25f207996553a143b9143b01953fbbb9,http://dx.doi.org/10.1007/s11151-014-9433-0 3235,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,marina dolmatova,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 3236,We study procurement auctions in which as is common in practice a group of sellers (incumbents qualified bidders) is given an advantage based for example on better reliability quality or incumbency status. We show conditions under which for any given first price handicap auction there is a simple second-price design which dominates it. This generalizes a previous result for the case of an auction with one insider and one outsider (Mares and Swinkels in J Econ Theory ,vlad mares,Not available,2014.0,10.1007/s00182-013-0392-8,International Journal of Game Theory,Vlad2014,False,,Springer,Not available,Comparing first and second price auctions with asymmetric bidders,18853e75c4d7011cbc427a29d782bf94,http://dx.doi.org/10.1007/s00182-013-0392-8 3237,We study procurement auctions in which as is common in practice a group of sellers (incumbents qualified bidders) is given an advantage based for example on better reliability quality or incumbency status. We show conditions under which for any given first price handicap auction there is a simple second-price design which dominates it. This generalizes a previous result for the case of an auction with one insider and one outsider (Mares and Swinkels in J Econ Theory ,jeroen swinkels,Not available,2014.0,10.1007/s00182-013-0392-8,International Journal of Game Theory,Vlad2014,False,,Springer,Not available,Comparing first and second price auctions with asymmetric bidders,18853e75c4d7011cbc427a29d782bf94,http://dx.doi.org/10.1007/s00182-013-0392-8 3238,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,jian chen,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 3239,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,ya-mei gao,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 3240,Cognitive radio (CR) is applied to solve spectrum scarcity. Although the auction theory and learning algorithm have been discussed in previous works their combination is not yet researched in the distributed CR networks where secondary users (SUs) can occupy several channels simultaneously by assuming that one channel can be accessed by at most one SU. A parallel repeated auction scheme is proposed to solve resource allocation in multi-user multi-channel distributed spectrum-overlay CR networks. A novel bid scheme in the light of the first-price sealed auction is designed to balance the system utility and allocation fairness. The proposed auction scheme can be developed based on a learning algorithm and be applied to the scenarios where the cooperation among SUs is unavailable. Under the assumption of limited entry budget SUs can directly decide whether or not to participate in spectrum auction by comparing the possible bid with access threshold which can be applied into situations that SUs have different transmit power. Theoretical analysis and simulation results show that compared with original myopic scheme and original genie-aided scheme the proposed auction scheme can obtain a considerable improvement in efficiency and fairness especially with adequate available resources.,yong-hong kuo,Not available,2014.0,10.1007/s11277-014-1671-9,Wireless Personal Communications,Jian2014,False,,Springer,Not available,A Parallel Repeated Auction for Spectrum Allocation in Distributed Cognitive Radio Networks,8974b8db42ecbbe14db921df04eb7e3f,http://dx.doi.org/10.1007/s11277-014-1671-9 3241,Auction has been widely used to spectrum allocation. Most of the previous works supposed that all the spectrum are identical. However in reality spectrums are quite different in different locations and frequencies. Recently some works studied the double auction mechanism for heterogeneous spectrums. But their schemes are based on the assumption of “single-channel request”. To be more realistic each seller and buyer will bid at least one channel. The previous schemes will not work under multi-channel assumption. In this paper we propose a truthful multi-channel double auction mechanism for heterogeneous spectrums. Our scheme allows sellers and buyers to sell or buy multi-channels for heterogeneous spectrums. We introduce a novel virtual grouping method to split sellers and buyers. We prove that the proposed scheme satisfies the economic properties: truthfulness individual rationality and budget balance. The simulation results confirm that our method achieves high auction efficiency and auction revenue.,shu wang,Not available,2014.0,10.1007/s11277-014-1602-9,Wireless Personal Communications,Shu2014,False,,Springer,Not available,A Truthful Multi-Channel Double Auction Mechanism for Heterogeneous Spectrums,d807acfa12c3b79df974fa305864fcc1,http://dx.doi.org/10.1007/s11277-014-1602-9 3242,Auction has been widely used to spectrum allocation. Most of the previous works supposed that all the spectrum are identical. However in reality spectrums are quite different in different locations and frequencies. Recently some works studied the double auction mechanism for heterogeneous spectrums. But their schemes are based on the assumption of “single-channel request”. To be more realistic each seller and buyer will bid at least one channel. The previous schemes will not work under multi-channel assumption. In this paper we propose a truthful multi-channel double auction mechanism for heterogeneous spectrums. Our scheme allows sellers and buyers to sell or buy multi-channels for heterogeneous spectrums. We introduce a novel virtual grouping method to split sellers and buyers. We prove that the proposed scheme satisfies the economic properties: truthfulness individual rationality and budget balance. The simulation results confirm that our method achieves high auction efficiency and auction revenue.,derong liu,Not available,2014.0,10.1007/s11277-014-1602-9,Wireless Personal Communications,Shu2014,False,,Springer,Not available,A Truthful Multi-Channel Double Auction Mechanism for Heterogeneous Spectrums,d807acfa12c3b79df974fa305864fcc1,http://dx.doi.org/10.1007/s11277-014-1602-9 3243,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,ludwig ensthaler,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 3244,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,thomas giebe,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 3245,The literature on partnership dissolution generally takes the dissolution decision as given and examines whether the outcome is efficient. A well-known result is that ,jianpei li,Not available,2014.0,10.1007/s10058-013-0154-x,Review of Economic Design,Ludwig2014,False,,Springer,Not available,Speculative partnership dissolution with auctions,00e1b07adcb27fd7e0bf713b15533acb,http://dx.doi.org/10.1007/s10058-013-0154-x 3246,We consider game-theoretic models related to the supply function auction for electricity markets. We determine the set of supply function equilibria (SFE) introduced by Klemperer and Mayer (Econometrica 57:1243–1277 ,gerhard-wilhelm weber,Not available,2016.0,10.1007/s10100-015-0390-y,Central European Journal of Operations Research,Alexander2016,False,,Springer,Not available,Supply function equilibria for uniform price auction in oligopolistic markets,672013cfcfc8a909437cd4b834285047,http://dx.doi.org/10.1007/s10100-015-0390-y 3247,In order to employ and exhibit our Simon-inspired approach to computational economics and specifically defend our version of the view that even logically untrained humans are rational albeit no more than “boundedly” so we provide two models both rooted in computational logic of how it is that logically untrained humans perform in a seemingly irrational fashion in a particular “deviant” auction (the bi-pay auction).,joe johnson,Not available,2014.0,10.1007/s11299-014-0141-0,Mind & Society,Joe2014,False,,Springer,Not available,A three-pronged simonesque approach to modeling and simulation in deviant “bi-pay” auctions and beyond,78d441b46d15e43d49db0c15e64ce180,http://dx.doi.org/10.1007/s11299-014-0141-0 3248,In order to employ and exhibit our Simon-inspired approach to computational economics and specifically defend our version of the view that even logically untrained humans are rational albeit no more than “boundedly” so we provide two models both rooted in computational logic of how it is that logically untrained humans perform in a seemingly irrational fashion in a particular “deviant” auction (the bi-pay auction).,naveen govindarajulu,Not available,2014.0,10.1007/s11299-014-0141-0,Mind & Society,Joe2014,False,,Springer,Not available,A three-pronged simonesque approach to modeling and simulation in deviant “bi-pay” auctions and beyond,78d441b46d15e43d49db0c15e64ce180,http://dx.doi.org/10.1007/s11299-014-0141-0 3249,In order to employ and exhibit our Simon-inspired approach to computational economics and specifically defend our version of the view that even logically untrained humans are rational albeit no more than “boundedly” so we provide two models both rooted in computational logic of how it is that logically untrained humans perform in a seemingly irrational fashion in a particular “deviant” auction (the bi-pay auction).,selmer bringsjord,Not available,2014.0,10.1007/s11299-014-0141-0,Mind & Society,Joe2014,False,,Springer,Not available,A three-pronged simonesque approach to modeling and simulation in deviant “bi-pay” auctions and beyond,78d441b46d15e43d49db0c15e64ce180,http://dx.doi.org/10.1007/s11299-014-0141-0 3250,We compare the expected revenue in first- and second-price auctions with asymmetric bidders. We consider “close to uniform” distributions with identical supports and show that in the case of identical supports the expected revenue in second-price auctions may exceed that in first-price auctions. We also show that asymmetry over lower valuations has a stronger negative impact on the expected revenue in first-price auctions than in second-price auctions. However asymmetry over high valuations always increases the revenue in first-price auctions.,arieh gavious,Not available,2014.0,10.1007/s00182-013-0383-9,International Journal of Game Theory,Arieh2014,False,,Springer,Not available,Ranking asymmetric auctions,8a03887ed60357a0814d878e7bbb54c3,http://dx.doi.org/10.1007/s00182-013-0383-9 3251,We compare the expected revenue in first- and second-price auctions with asymmetric bidders. We consider “close to uniform” distributions with identical supports and show that in the case of identical supports the expected revenue in second-price auctions may exceed that in first-price auctions. We also show that asymmetry over lower valuations has a stronger negative impact on the expected revenue in first-price auctions than in second-price auctions. However asymmetry over high valuations always increases the revenue in first-price auctions.,yizhaq minchuk,Not available,2014.0,10.1007/s00182-013-0383-9,International Journal of Game Theory,Arieh2014,False,,Springer,Not available,Ranking asymmetric auctions,8a03887ed60357a0814d878e7bbb54c3,http://dx.doi.org/10.1007/s00182-013-0383-9 3252,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,aniruddha bagchi,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 3253,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,brett katzman,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 3254,This paper examines situations in which a seller might make a second chance (take-it-or-leave-it) offer to a non-winning bidder at a price equal to their bid at auction. This study is motivated by the take-it-or-leave-it second chance offer rules used by eBay and a number of state procurement agencies. Equilibrium bidder behavior is determined for IPV sealed bid first price second price English and Vickrey auctions when a second chance offer will be made with an exogenous probability ,timothy mathews,Not available,2014.0,10.1007/s00712-012-0330-4,Journal of Economics,Aniruddha2014,False,,Springer,Not available,Second chance offers in auctions,aa93097246660d19676b0c6f42710316,http://dx.doi.org/10.1007/s00712-012-0330-4 3255,The problem of resource allocation in a spectrum leasing scenario in cooperative cognitive radio networks is addressed. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. The SU pair allocates the whole its transmission power in a portion of transmission frame to relay the primary signals. In return the PU pairs lease their unused portion of transmission frame to the SU pair. In this way the PU pairs take advantage of their unused portion of time to gain savings in their transmission power. However a few important questions must be answered: When to lease and how much to be leased. We determine when is beneficial for PUs to lease their unused spectrum portion to the SU and how much of PUs’ resources is optimum to be leased. An efficient auction mechanism is proposed and the existence and uniqueness of the Nash Equilibrium (NE) for the proposed auction game is proved. Since the NE is the solution of a set of fixed point problems two iterative algorithms synchronous and asynchronous schemes are proposed to reach the NE in an iterative manner and their convergence to the fixed point is also proved. Finally the proposed auction is extended to a network with multiple secondary user pairs. Simulation results acknowledge the more efficient utilization of resources as a result of implementing the proposed auction based resource allocation.,mehdi adian,Not available,2014.0,10.1007/s11276-013-0612-y,Wireless Networks,Ghamari2014,False,,Springer,Not available,An auction-based approach for spectrum leasing in cooperative cognitive radio networks: when to lease and how much to be leased,a284f1d0bb0e3720f07bc2d41988a3e1,http://dx.doi.org/10.1007/s11276-013-0612-y 3256,The problem of resource allocation in a spectrum leasing scenario in cooperative cognitive radio networks is addressed. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. The SU pair allocates the whole its transmission power in a portion of transmission frame to relay the primary signals. In return the PU pairs lease their unused portion of transmission frame to the SU pair. In this way the PU pairs take advantage of their unused portion of time to gain savings in their transmission power. However a few important questions must be answered: When to lease and how much to be leased. We determine when is beneficial for PUs to lease their unused spectrum portion to the SU and how much of PUs’ resources is optimum to be leased. An efficient auction mechanism is proposed and the existence and uniqueness of the Nash Equilibrium (NE) for the proposed auction game is proved. Since the NE is the solution of a set of fixed point problems two iterative algorithms synchronous and asynchronous schemes are proposed to reach the NE in an iterative manner and their convergence to the fixed point is also proved. Finally the proposed auction is extended to a network with multiple secondary user pairs. Simulation results acknowledge the more efficient utilization of resources as a result of implementing the proposed auction based resource allocation.,hassan aghaeinia,Not available,2014.0,10.1007/s11276-013-0612-y,Wireless Networks,Ghamari2014,False,,Springer,Not available,An auction-based approach for spectrum leasing in cooperative cognitive radio networks: when to lease and how much to be leased,a284f1d0bb0e3720f07bc2d41988a3e1,http://dx.doi.org/10.1007/s11276-013-0612-y 3257,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,philippe gillen,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 3258,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,zuying wei,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3259,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,tianrong zhang,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3260,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,fan wu,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3261,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,xiaofeng gao,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3262,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,guihai chen,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3263,Due to users’ fast-growing demands wireless spectrum is becoming a more and more scarce resource. However the state of spectrum usage shows that while large chunks of spectrum are left idle at many places many emerging wireless applications cannot get enough spectra to provide their services. In contrast to existing truthful mechanisms for channel redistribution which achieve strategy-proofness at the price of lowered system performance we propose SHIELD which not only guarantees strategy-proofness in the process of channel redistribution but also achieves high system performance. Our evaluation results show that SHIELD outperforms the existing mechanisms in terms of spectrum utilization and user satisfaction ratio. Here channel utilization represents the average number of radios allocated to channels and buyer satisfaction ratio shows the percentage of buyers who get at least one channel in the auction.,ping yi,Not available,2014.0,10.1007/s00779-013-0708-5,Personal and Ubiquitous Computing,Zuying2014,False,,Springer,Not available,A truthful auction mechanism for channel allocation in multi-radio multi-channel non-cooperative wireless networks,8007cc64e22574d5a1d5fb5041f9fbc1,http://dx.doi.org/10.1007/s00779-013-0708-5 3264,We study Bayesian mechanism design in the context of the siting of noxious facilities. Under incomplete information we characterize optimal mechanisms facilitating the siting and cost sharing of the facility. These mechanisms are allocatively and Pareto efficient. However it appears that transfers occur when the good is not provided. This result is due to the weakening of the incentive notion to Bayesian–Nash equilibrium and to the balanced budget condition. This phenomenon disappears if the setting is perfectly symmetric.,denis lescop,Not available,2007.0,10.1007/s10058-006-0018-8,Review of Economic Design,Denis2007,False,,Springer,Not available,Optimal mechanisms for siting noxious facilities,9a42b4db596d0e78dc340c15b05c3a05,http://dx.doi.org/10.1007/s10058-006-0018-8 3265,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,theodore turocy,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 3266,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,elizabeth watson,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 3267,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,raymond battalio,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 3268,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,alexander rasch,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 3269,A critical issue in designing a system of tradable emission permits concerns the distribution of the initial pollution rights. The purpose of this paper is to investigate how the initial rights should be optimally set when the determination of the number of tradable permits is subject to the influence of interest groups. According to the Coase theorem in the case where there are low transaction costs the assignment of the initial rights does not affect the efficiency of the final resource allocation. In the presence of political pressure we show that the distribution of the initial rights has a significant effect on social welfare. In contrast to the conventional results we find that grandfathered permits may be more efficient than auctioned permits even after taking into consideration the revenue-recycling effect.,yu-bong lai,Not available,2007.0,10.1007/s10640-006-9020-4,Environmental and Resource Economics,Yu-Bong2007,False,,Springer,Not available,The Optimal Distribution of Pollution Rights in the Presence of Political Distortions,e775ba3ffb5f53f894e4429335558fd6,http://dx.doi.org/10.1007/s10640-006-9020-4 3270,I study monotonicity of equilibrium strategies in first-price auctions with asymmetric bidders risk aversion affiliated types and interdependent values. Every mixed-strategy equilibrium is shown to be outcome-equivalent to a monotone pure-strategy equilibrium under the “priority rule” for breaking ties. This provides a missing link to establish uniqueness in the “general symmetric model” of Milgrom and Weber (Econometrica 50:1089–1122 1982). Non-monotone equilibria can exist under the “coin-flip rule” but they are distinguishable: all non-monotone equilibria have positive probability of ties whereas all monotone equilibria have zero probability of ties. This provides a justification for the standard empirical practice of restricting attention to monotone strategies.,david mcadams,Not available,2007.0,10.1007/s00182-006-0038-1,International Journal of Game Theory,David2007,False,,Springer,Not available,Monotonicity in asymmetric first-price auctions with affiliation,836a11156b9eacfdaee8228e7045d65c,http://dx.doi.org/10.1007/s00182-006-0038-1 3271,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,elena grigorieva,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 3272,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,p. herings,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 3273,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,rudolf muller,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 3274,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,dries vermeulen,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 3275,The paper presents a model for the collaboration among independent freight forwarding entities. In the modern highly competitive transportation branch freight forwarders reduce their fulfillment costs by exploiting different execution modes (self-fulfillment and subcontraction). For self-fulfillment they use their own vehicles to execute the requests and for subcontracting they forward the orders to external freight carriers. Further enhancement of competitiveness can be achieved if the freight forwarders cooperate in coalitions in order to balance their request portfolios. Participation in such a coalition gains additional profit for the entire coalition and for each participant therefore reinforcing the market position of the partners. The integrated operational transport problem as well as existing collaboration approaches are introduced. The presented model for collaboration is based on theoretical foundations in the field of combinatorial auctions and operational research game theory. It is applicable for coalitions of freight forwarders especially for the collaboration of Profit Centres within large freight forwarding companies. The proposed theoretical approach and the presented collaboration model are suitable for a coalition of freight forwarding companies with nearly similar potential on the market.,m. krajewska,Not available,2007.0,10.1007/978-3-540-49550-5_18,Container Terminals and Cargo Systems,A.2007,False,,Springer,Not available,Collaborating freight forwarding enterprises,2cfb6bc381751eaae2239e6817155251,http://dx.doi.org/10.1007/978-3-540-49550-5_18 3276,The paper presents a model for the collaboration among independent freight forwarding entities. In the modern highly competitive transportation branch freight forwarders reduce their fulfillment costs by exploiting different execution modes (self-fulfillment and subcontraction). For self-fulfillment they use their own vehicles to execute the requests and for subcontracting they forward the orders to external freight carriers. Further enhancement of competitiveness can be achieved if the freight forwarders cooperate in coalitions in order to balance their request portfolios. Participation in such a coalition gains additional profit for the entire coalition and for each participant therefore reinforcing the market position of the partners. The integrated operational transport problem as well as existing collaboration approaches are introduced. The presented model for collaboration is based on theoretical foundations in the field of combinatorial auctions and operational research game theory. It is applicable for coalitions of freight forwarders especially for the collaboration of Profit Centres within large freight forwarding companies. The proposed theoretical approach and the presented collaboration model are suitable for a coalition of freight forwarding companies with nearly similar potential on the market.,h. kopfer,Not available,2007.0,10.1007/978-3-540-49550-5_18,Container Terminals and Cargo Systems,A.2007,False,,Springer,Not available,Collaborating freight forwarding enterprises,2cfb6bc381751eaae2239e6817155251,http://dx.doi.org/10.1007/978-3-540-49550-5_18 3277,We compare sequential and bundle procurement auctions in a framework of successive procurement situations where current success positively or negatively affects future market opportunities. We find that in bundle auctions procurement cost is lower and less risky than in sequential standard auctions but still higher than in the optimal sequential auction. Only a sequential second price auction leads to the efficient outcome.,veronika grimm,Not available,2007.0,10.1007/s00712-006-0225-3,Journal of Economics,Veronika2007,False,,Springer,Not available,Sequential versus Bundle Auctions for Recurring Procurement,a3efe65386d1fc5c9bdac4ab1d7d8a91,http://dx.doi.org/10.1007/s00712-006-0225-3 3278,Increasing role of services in developed economies around the world combined with ubiquitous presence of computer networks and information technologies result in rapid growth of e-services. Markets for e-services often require flexible pricing to be efficient and therefore frequently use auctions to satisfy this requirement. However auctions in e-service markets are recurring since typically e-services are offered repeatedly each time for a specific time interval. Additionally all e-services offered in an auction round must be sold to avoid resource waste. Finally enough bidders must be willing to participate in future auction rounds to prevent a collapse of market prices. Because of these requirements previously designed auctions cannot work efficiently in e-service markets. In this chapter we introduce and evaluate a novel auction called ,juong-sik lee,Not available,2007.0,10.1007/978-0-387-46364-3_5,Service Enterprise Integration,Juong-Sik2007,False,,Springer,Not available,Auctions as a Dynamic Pricing Mechanism for E-Services,27c252fbea455a9516afca08e77a5e2a,http://dx.doi.org/10.1007/978-0-387-46364-3_5 3279,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,achim wambach,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 3280,Increasing role of services in developed economies around the world combined with ubiquitous presence of computer networks and information technologies result in rapid growth of e-services. Markets for e-services often require flexible pricing to be efficient and therefore frequently use auctions to satisfy this requirement. However auctions in e-service markets are recurring since typically e-services are offered repeatedly each time for a specific time interval. Additionally all e-services offered in an auction round must be sold to avoid resource waste. Finally enough bidders must be willing to participate in future auction rounds to prevent a collapse of market prices. Because of these requirements previously designed auctions cannot work efficiently in e-service markets. In this chapter we introduce and evaluate a novel auction called ,boleslaw szymanski,Not available,2007.0,10.1007/978-0-387-46364-3_5,Service Enterprise Integration,Juong-Sik2007,False,,Springer,Not available,Auctions as a Dynamic Pricing Mechanism for E-Services,27c252fbea455a9516afca08e77a5e2a,http://dx.doi.org/10.1007/978-0-387-46364-3_5 3281,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,daniel zeng,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 3282,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,james cox,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 3283,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,moshe dror,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 3284,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,jianjun zhang,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 3285,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,liwen chen,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 3286,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,jingmin zhang,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 3287,The recent rush towards electronic commerce over the Internet raises many challenges this paper present a simple model of supply chains. First a model of supply chains is discussed highlighting two characteristic features: hierarchical subtask decomposition and resource contention. Then a market protocol based on distributed but concurrent auctions is proposed. The protocol allow each of these markets to function separately while the information exchanged between a sequence of markets along a single supply chain to ensure efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction where the bids on one side of the double auction come from bidders in the corresponding segment of the industry and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain.,wen xue,Not available,2007.0,10.1007/978-3-540-74171-8_12,Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,Jianjun2007,False,,Springer,Not available,Concurrent Double Auctions Based on Multi-agent Across the Supply Chain,7eb966c37859ae837b95bdcd29739cb7,http://dx.doi.org/10.1007/978-3-540-74171-8_12 3288,We consider an environment where the sale can take place so early that both the seller and potential buyers have the same uncertainty about the quality of the good. We present a simple model that allows the seller to offer the good for sale before or after this uncertainty is resolved namely via forward auction or spot auction respectively. We solve for the equilibrium of these two auctions and then compare the resulting expected revenues. We also consider the revenue implications of insurance in forward auctions.,isa hafalir,Not available,2011.0,10.1007/s10058-011-0110-6,Review of Economic Design,E.2011,False,,Springer,Not available,Selling goods of unknown quality: forward versus spot auctions,ea85946bd81bef3ddb89a84ffd4fbd6d,http://dx.doi.org/10.1007/s10058-011-0110-6 3289,We consider an environment where the sale can take place so early that both the seller and potential buyers have the same uncertainty about the quality of the good. We present a simple model that allows the seller to offer the good for sale before or after this uncertainty is resolved namely via forward auction or spot auction respectively. We solve for the equilibrium of these two auctions and then compare the resulting expected revenues. We also consider the revenue implications of insurance in forward auctions.,hadi yektas,Not available,2011.0,10.1007/s10058-011-0110-6,Review of Economic Design,E.2011,False,,Springer,Not available,Selling goods of unknown quality: forward versus spot auctions,ea85946bd81bef3ddb89a84ffd4fbd6d,http://dx.doi.org/10.1007/s10058-011-0110-6 3290,In this article we experimentally investigate reverse multi-unit Dutch auctions in which bidders compete to sell their single unit to a buyer who wants to purchase several objects. Our study yields three insights: (i) bids are substantially higher than Nash equilibrium bids predicted by standard economic theory; (ii) these higher-than-predicted prices gradually decline in later periods; and (iii) bid pooling (or simultaneous bidding) is frequently observed—the majority of bidders submit their bids immediately after the first bidder has sold his unit. A model that distinguishes between myopic and sophisticated bidding strategies helps to organize these patterns both on the aggregate and on the individual level.,peter werner,Not available,2016.0,10.1007/s11238-016-9546-z,Theory and Decision,Philippe2016,False,,Springer,Not available,Bid pooling in reverse multi-unit Dutch auctions: an experimental investigation,7fc0c24e51c29304120afd2bd05e1398,http://dx.doi.org/10.1007/s11238-016-9546-z 3291,Extensive research in recent years has shown the benefits of ,lin chen,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 3292,Extensive research in recent years has shown the benefits of ,stefano iellamo,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 3293,Extensive research in recent years has shown the benefits of ,marceau coupechoux,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 3294,Extensive research in recent years has shown the benefits of ,philippe godlewski,Not available,2011.0,10.1007/s11276-011-0353-8,Wireless Networks,Lin2011,False,,Springer,Not available,Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users,612508e1883e64590955e32f237c0f99,http://dx.doi.org/10.1007/s11276-011-0353-8 3295,We consider the balloon popping problem introduced by Immorlica et al. (Proceedings of FOCS’07 pp. 104–112 ,hyunwoo jung,Not available,2011.0,10.1007/s00224-011-9314-y,Theory of Computing Systems,Hyunwoo2011,False,,Springer,Not available,The Balloon Popping Problem Revisited: Lower and Upper Bounds,a31af41f0af5ec8d9adfdd5580b4509e,http://dx.doi.org/10.1007/s00224-011-9314-y 3296,We consider the balloon popping problem introduced by Immorlica et al. (Proceedings of FOCS’07 pp. 104–112 ,kyung-yong chwa,Not available,2011.0,10.1007/s00224-011-9314-y,Theory of Computing Systems,Hyunwoo2011,False,,Springer,Not available,The Balloon Popping Problem Revisited: Lower and Upper Bounds,a31af41f0af5ec8d9adfdd5580b4509e,http://dx.doi.org/10.1007/s00224-011-9314-y 3297,Given a finite ground set ,shabbir ahmed,Not available,2011.0,10.1007/s10107-009-0298-1,Mathematical Programming,Shabbir2011,True,,Springer,Not available,Maximizing a class of submodular utility functions,d6ab5d05c0ab4867014827426b021e25,http://dx.doi.org/10.1007/s10107-009-0298-1 3298,Given a finite ground set ,alper atamturk,Not available,2011.0,10.1007/s10107-009-0298-1,Mathematical Programming,Shabbir2011,True,,Springer,Not available,Maximizing a class of submodular utility functions,d6ab5d05c0ab4867014827426b021e25,http://dx.doi.org/10.1007/s10107-009-0298-1 3299,This paper empirically tests whether there are asymmetric information problems in the market for used Chevrolet Corvettes sold on eBay. The first test is based on a result from Akerlof (Quarterly Journal of Economics ,christopher adams,Not available,2011.0,10.1007/s11129-011-9095-2,Quantitative Marketing and Economics,P.2011,False,,Springer,Not available,Vettes and lemons on eBay,53ac166aa9f0b017200d5426a59b9686,http://dx.doi.org/10.1007/s11129-011-9095-2 3300,This paper empirically tests whether there are asymmetric information problems in the market for used Chevrolet Corvettes sold on eBay. The first test is based on a result from Akerlof (Quarterly Journal of Economics ,laura hosken,Not available,2011.0,10.1007/s11129-011-9095-2,Quantitative Marketing and Economics,P.2011,False,,Springer,Not available,Vettes and lemons on eBay,53ac166aa9f0b017200d5426a59b9686,http://dx.doi.org/10.1007/s11129-011-9095-2 3301,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,niall flynn,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 3302,This paper empirically tests whether there are asymmetric information problems in the market for used Chevrolet Corvettes sold on eBay. The first test is based on a result from Akerlof (Quarterly Journal of Economics ,peter newberry,Not available,2011.0,10.1007/s11129-011-9095-2,Quantitative Marketing and Economics,P.2011,False,,Springer,Not available,Vettes and lemons on eBay,53ac166aa9f0b017200d5426a59b9686,http://dx.doi.org/10.1007/s11129-011-9095-2 3303,This paper considers the external validity of the growing corpus of literature that reports the use of laboratory auctions to reveal consumers’ willingness to pay for consumer goods when the concerned goods are sold in retail stores through posted price procedures. The quality of the parallel between the field and the lab crucially depends on whether being informed of the actual field price influences a consumer’s willingness to pay for a good or not. We show that the elasticity of the ,laurent muller,Not available,2011.0,10.1007/s10683-010-9262-4,Experimental Economics,Laurent2011,False,,Springer,Not available,Do price-tags influence consumers’ willingness to pay? On the external validity of using auctions for measuring value,cbaa22a6128371d00489bc0d1bc26106,http://dx.doi.org/10.1007/s10683-010-9262-4 3304,This paper considers the external validity of the growing corpus of literature that reports the use of laboratory auctions to reveal consumers’ willingness to pay for consumer goods when the concerned goods are sold in retail stores through posted price procedures. The quality of the parallel between the field and the lab crucially depends on whether being informed of the actual field price influences a consumer’s willingness to pay for a good or not. We show that the elasticity of the ,bernard ruffieux,Not available,2011.0,10.1007/s10683-010-9262-4,Experimental Economics,Laurent2011,False,,Springer,Not available,Do price-tags influence consumers’ willingness to pay? On the external validity of using auctions for measuring value,cbaa22a6128371d00489bc0d1bc26106,http://dx.doi.org/10.1007/s10683-010-9262-4 3305,Carrier collaboration in transportation means multiple carriers form an alliance to optimize their transportation operations through sharing transportation requests and vehicle capacities. In this paper we propose a multi-agent and auction-based framework and approach for carrier collaboration in less than truckload transportation. In this framework the carriers outsource/acquire requests through multiple auctions one for outsourcing each request; a carrier acts as an auctioneer when it wants to outsource a request to other carriers whereas the carrier acts as a bidder when it wants to acquire a request from other carriers; for each carrier which requests it should outsource and acquire are determined by solving its outsourcing requests selection problem and requests bidding problem respectively. These two decision problems are formulated as mixed integer programming problems. The auction of each request is multiround; in each round the auctioneer determines the outsourcing price of the request and each bidder determines whether it acquires the request at the given price; the auctioneer lowers the outsourcing price if multiple carriers bid for the request or raises the price if no carrier bids for it. The auction process continues until only one carrier bids for the request or a given number of rounds are achieved. In the second case if no agent bids for the request then it is returned to the outsourcing agent; if multiple bidding agents compete for the request a conflict resolution procedure is used to determine which carrier wins it. The approach is decentralized asynchronous and dynamic where multiple auctions may occur simultaneously and interact with each other. The performance of the approach is evaluated by randomly generated instances and compared with an individual planning approach and a centralized planning approach.,bo dai,Not available,2011.0,10.1007/s12159-011-0046-9,Logistics Research,Bo2011,False,,Springer,Not available,A multi-agent and auction-based framework and approach for carrier collaboration,7c6728d80d2bb9270511b7697e42502c,http://dx.doi.org/10.1007/s12159-011-0046-9 3306,Carrier collaboration in transportation means multiple carriers form an alliance to optimize their transportation operations through sharing transportation requests and vehicle capacities. In this paper we propose a multi-agent and auction-based framework and approach for carrier collaboration in less than truckload transportation. In this framework the carriers outsource/acquire requests through multiple auctions one for outsourcing each request; a carrier acts as an auctioneer when it wants to outsource a request to other carriers whereas the carrier acts as a bidder when it wants to acquire a request from other carriers; for each carrier which requests it should outsource and acquire are determined by solving its outsourcing requests selection problem and requests bidding problem respectively. These two decision problems are formulated as mixed integer programming problems. The auction of each request is multiround; in each round the auctioneer determines the outsourcing price of the request and each bidder determines whether it acquires the request at the given price; the auctioneer lowers the outsourcing price if multiple carriers bid for the request or raises the price if no carrier bids for it. The auction process continues until only one carrier bids for the request or a given number of rounds are achieved. In the second case if no agent bids for the request then it is returned to the outsourcing agent; if multiple bidding agents compete for the request a conflict resolution procedure is used to determine which carrier wins it. The approach is decentralized asynchronous and dynamic where multiple auctions may occur simultaneously and interact with each other. The performance of the approach is evaluated by randomly generated instances and compared with an individual planning approach and a centralized planning approach.,haoxun chen,Not available,2011.0,10.1007/s12159-011-0046-9,Logistics Research,Bo2011,False,,Springer,Not available,A multi-agent and auction-based framework and approach for carrier collaboration,7c6728d80d2bb9270511b7697e42502c,http://dx.doi.org/10.1007/s12159-011-0046-9 3307,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,a. mochon,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 3308,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,y. saez,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 3309,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,j. gomez-barroso,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 3310,The combinatorial clock-proxy auction is analyzed as a selling mechanism of a portion of the “digital dividend” in an European country. We assumed bidders with bounded rationality making their bidding decisions based on a system of recommendation that learns from the environment. The auction outcome when all bidders follow the proposed strategies was compared with the efficient outcome of the auction. Although significant differences were found in the seller’s income no significant variations were found in the distribution of spectrum licenses among bidders.,p. isasi,Not available,2011.0,10.1007/s10614-010-9245-8,Computational Economics,A.2011,False,,Springer,Not available,The Clock Proxy Auction for Allocating Radio Spectrum Licenses,c12c484b1755f468f4c5fb5cbe8d06ba,http://dx.doi.org/10.1007/s10614-010-9245-8 3311,We develop an infinite horizon alternative-move model of the unique second-price sponsored search auction. We use this model to explain two distinguishable bidding patterns observed in our bidding data: bidding war cycle and stable bid. With examples we show that only a small portion of the value generated may be extracted by search engines if advertisers are engaged in bidding war cycles. Finally we show the impact of auction design on advertiser bids and search engine revenue.,kursad asdemir,Not available,2011.0,10.1007/s10799-010-0077-y,Information Technology and Management,Kursad2011,False,,Springer,Not available,A dynamic model of bidding patterns in sponsored search auctions,7e3a06cf753d5bffcb339d0530f358ef,http://dx.doi.org/10.1007/s10799-010-0077-y 3312,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,christopher kah,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 3313,We consider a revenue-maximizing seller who before proposing a mechanism to sell her object(s) observes a vector of signals correlated with buyers’ valuations. Each buyer knows only the signal that the seller observes about him but not the signals she observes about other buyers. The seller first chooses how to disclose her information and then chooses a revenue-maximizing mechanism. We allow for very general disclosure policies that can be random public private or any mixture of these possibilities. Through the disclosure of information privately the seller can create correlation in buyers’ private information which then consist of valuations plus beliefs. For the standard independent private values model we show that information revelation is irrelevant: irrespective of the disclosure policy an optimal mechanism for this informed seller generates expected revenue that is equal to her maximal revenue under full information disclosure. For more general allocation environments that allow also for interdependent for common values and for multiple items disclosure policies may matter and the best the seller can do is to disclose no information at all.,vasiliki skreta,Not available,2011.0,10.1007/s10058-009-0099-2,Review of Economic Design,Vasiliki2011,False,,Springer,Not available,On the informed seller problem: optimal information disclosure,e7e2369ec92c421ccdf1bcc834f71939,http://dx.doi.org/10.1007/s10058-009-0099-2 3314,Based on an industrial case study we present a stochastic model of a supply chain consisting of a set of buyers and suppliers and a group purchasing organization (GPO). The GPO combines orders from buyers in a two-period model. Demand and price in the second period are random. An advance selling opportunity is available to all suppliers and buyers in the first-period market. Buyers decide how much to buy through the GPO in the first period and how much to procure from the market at a lower or higher price in the second period. Suppliers determine the amount of capacity to sell through the GPO in the first period and to hold in reserve in order to meet demand in the second period. The GPO conducts a uniform-price reverse auction to select suppliers and decides on the price that will be offered to buyers to maximize its profit. By determining the optimal decisions of buyers suppliers and the GPO we answer the following questions: Do suppliers and buyers benefit from working with a GPO? How do the uncertainty in demand the share of GPO orders in the advance sales market and the uncertainty in price influence the players’ decisions and profits? What are the characteristics of an environment that would encourage suppliers and buyers to work with a GPO? We show that a GPO helps buyers and suppliers to mitigate demand and price risks effectively while collecting a premium by serving as an intermediary between them.,oktay karabag,Not available,2017.0,10.1007/s10696-017-9300-z,Flexible Services and Manufacturing Journal,Oktay2017,False,,Springer,Not available,Analysis of a group purchasing organization under demand and price uncertainty,a5d82c4bc5bc2edc9507adb13530ab8f,http://dx.doi.org/10.1007/s10696-017-9300-z 3315,Based on an industrial case study we present a stochastic model of a supply chain consisting of a set of buyers and suppliers and a group purchasing organization (GPO). The GPO combines orders from buyers in a two-period model. Demand and price in the second period are random. An advance selling opportunity is available to all suppliers and buyers in the first-period market. Buyers decide how much to buy through the GPO in the first period and how much to procure from the market at a lower or higher price in the second period. Suppliers determine the amount of capacity to sell through the GPO in the first period and to hold in reserve in order to meet demand in the second period. The GPO conducts a uniform-price reverse auction to select suppliers and decides on the price that will be offered to buyers to maximize its profit. By determining the optimal decisions of buyers suppliers and the GPO we answer the following questions: Do suppliers and buyers benefit from working with a GPO? How do the uncertainty in demand the share of GPO orders in the advance sales market and the uncertainty in price influence the players’ decisions and profits? What are the characteristics of an environment that would encourage suppliers and buyers to work with a GPO? We show that a GPO helps buyers and suppliers to mitigate demand and price risks effectively while collecting a premium by serving as an intermediary between them.,baris tan,Not available,2017.0,10.1007/s10696-017-9300-z,Flexible Services and Manufacturing Journal,Oktay2017,False,,Springer,Not available,Analysis of a group purchasing organization under demand and price uncertainty,a5d82c4bc5bc2edc9507adb13530ab8f,http://dx.doi.org/10.1007/s10696-017-9300-z 3316,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,alireza salehan,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3317,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,hossein deldari,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3318,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,saeid abrishami,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3319,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,yan-jiao chen,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3320,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,xiao-yan yin,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3321,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,jin zhang,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3322,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,xingwang wang,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3323,In an experiment we first elicit the distributional preferences of subjects and then let them bid for a lottery either in a Becker–DeGroot–Marschak (BDM) mechanism or a Vickrey auction (VA). The standard theory predicts that altruistic subjects underbid in the VA—compared to the BDM—while spiteful subjects overbid in the VA. The data do not confirm those predictions. While we observe aggregate underbidding in the VA the result is not driven by the choices of altruistic subjects.,rudolf kerschbamer,Not available,2016.0,10.1007/s40881-016-0027-5,Journal of the Economic Science Association,Niall2016,True,,Springer,Not available,Vickrey auction vs BDM: difference in bidding behaviour and the impact of other-regarding motives,d7f5d3d391c685d86a90bf6652acbb76,http://dx.doi.org/10.1007/s40881-016-0027-5 3324,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,xiaohui wei,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3325,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,shang gao,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3326,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,yuanyuan liu,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3327,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,zongpeng li,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3328,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,wen song,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3329,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,donghun kang,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3330,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,jie zhang,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3331,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,hui xi,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3332,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,f. bonomo,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3333,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,j. catalan,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3334,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,atanu sinha,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 3335,Standard auctions are known to be a revenue-maximizing way to sell an object under broad conditions when buyers are symmetric and have independent private valuations. We show that when buyers have interdependent valuations auctions may lose their advantage even if symmetry and independence of information are maintained. In particular simple alternative selling mechanisms that sometimes allow a buyer who does not have the highest valuation to win the object will in general increase all buyers’ willingness to pay possibly enough to offset the loss to the seller of not always selling to the buyer with the greatest willingness to pay.,colin campbell,Not available,2006.0,10.1007/s00199-004-0558-5,Economic Theory,M.2006,False,,Springer,Not available,When and why not to auction,b7f6974e7f020a4dfdf7e877a84a8a0a,http://dx.doi.org/10.1007/s00199-004-0558-5 3336,The total revenue from an “all-pay contest” is the sum of expenditures from all individual players so it is important to ask whether it increases with the number of actual players—which is our definition of competition. This is the first paper to use field data to study this question empirically. Using novel instrumental variables we document strong empirical evidence that the revenue of a penny auction—which is a form of all-pay contest that recently emerged on the Internet—increases with the number of bidders. Our findings cast doubt on the standard model of all-pay contests that presumes that all bidders are fully informed.,zhongmin wang,Not available,2016.0,10.1007/s11151-016-9511-6,Review of Industrial Organization,Zhongmin2016,False,,Springer,Not available,Empirical Evidence on Competition and Revenue in an All-Pay Contest,4d22075ca83166174e7185c1087ba023,http://dx.doi.org/10.1007/s11151-016-9511-6 3337,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,g. duran,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3338,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,r. epstein,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3339,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,m. guajardo,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3340,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,a. jawtuschenko,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3341,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,j. marenco,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3342,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,philippe gillen,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3343,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,vitali gretschko,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3344,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,alexander rasch,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3345,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,lian jian,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3346,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,zheng li,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3347,The total revenue from an “all-pay contest” is the sum of expenditures from all individual players so it is important to ask whether it increases with the number of actual players—which is our definition of competition. This is the first paper to use field data to study this question empirically. Using novel instrumental variables we document strong empirical evidence that the revenue of a penny auction—which is a form of all-pay contest that recently emerged on the Internet—increases with the number of bidders. Our findings cast doubt on the standard model of all-pay contests that presumes that all bidders are fully informed.,minbo xu,Not available,2016.0,10.1007/s11151-016-9511-6,Review of Industrial Organization,Zhongmin2016,False,,Springer,Not available,Empirical Evidence on Competition and Revenue in an All-Pay Contest,4d22075ca83166174e7185c1087ba023,http://dx.doi.org/10.1007/s11151-016-9511-6 3348,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,tracy liu,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3349,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,bo ma,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3350,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,jianhua ge,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3351,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,weiliang han,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3352,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,jing li,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3353,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,ilan kremer,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 3354,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,zvi wiener,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 3355,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,eyal winter,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 3356,Unidirectional search is an evolutionarily stable outcome in an economy where homogenous buyers and sellers can either move or stay. It is more efficient than bidirectional search. In unidirectional search it is more efficient if the more numerous agents move and the less numerous agents stay than vice versa.,klaus kultti,Not available,2006.0,10.1007/s00712-006-0208-4,Journal of Economics,Klaus2006,False,,Springer,Not available,Physical Search,39254ed30b84e6040eb50ea4339eb5e4,http://dx.doi.org/10.1007/s00712-006-0208-4 3357,Unidirectional search is an evolutionarily stable outcome in an economy where homogenous buyers and sellers can either move or stay. It is more efficient than bidirectional search. In unidirectional search it is more efficient if the more numerous agents move and the less numerous agents stay than vice versa.,antti miettunen,Not available,2006.0,10.1007/s00712-006-0208-4,Journal of Economics,Klaus2006,False,,Springer,Not available,Physical Search,39254ed30b84e6040eb50ea4339eb5e4,http://dx.doi.org/10.1007/s00712-006-0208-4 3358,This paper illustrates a method for making side payments to advertiser networks that creates an incentive for the advertiser networks to submit the second-highest bids they received to an ad exchange and simultaneously ensures that the publishers will make more money on average in the short run as a result of adopting this scheme. We also illustrate how this payment scheme affects publisher payoffs in the long run after advertisers have a chance to modify their strategies in response to the changed incentives of the mechanism.,patrick hummel,Not available,2016.0,10.1007/s00182-015-0501-y,International Journal of Game Theory,Patrick2016,False,,Springer,Not available,Incentivizing advertiser networks to submit multiple bids,cd5a52a5452027c923e2d4bc03b30dd3,http://dx.doi.org/10.1007/s00182-015-0501-y 3359,Unidirectional search is an evolutionarily stable outcome in an economy where homogenous buyers and sellers can either move or stay. It is more efficient than bidirectional search. In unidirectional search it is more efficient if the more numerous agents move and the less numerous agents stay than vice versa.,juha virrankoski,Not available,2006.0,10.1007/s00712-006-0208-4,Journal of Economics,Klaus2006,False,,Springer,Not available,Physical Search,39254ed30b84e6040eb50ea4339eb5e4,http://dx.doi.org/10.1007/s00712-006-0208-4 3360,We run an experiment where 97 subjects could retrieve records of completed past auctions before placing their bids in current one-bid two-bid and auction-selection games. Each subject was asked to participate in 3 current auctions; but could retrieve up to 60 records of completed (past) auctions. The results reveal a positive relation between the payoffs earned by the subjects and their history-inspection effort. Subjects act as if responding to the average bidding-ratios of the winners in the samples that they have retrieved. They apply intuitive signal-dependent stopping rules like “,doron sonsino,Not available,2006.0,10.1007/s10683-006-7050-y,Experimental Economics,Doron2006,False,,Springer,Not available,Experimental internet auctions with random information retrieval,791cc5b54eeba774f09b042cb447e270,http://dx.doi.org/10.1007/s10683-006-7050-y 3361,We run an experiment where 97 subjects could retrieve records of completed past auctions before placing their bids in current one-bid two-bid and auction-selection games. Each subject was asked to participate in 3 current auctions; but could retrieve up to 60 records of completed (past) auctions. The results reveal a positive relation between the payoffs earned by the subjects and their history-inspection effort. Subjects act as if responding to the average bidding-ratios of the winners in the samples that they have retrieved. They apply intuitive signal-dependent stopping rules like “,radosveta ivanova-stenzel,Not available,2006.0,10.1007/s10683-006-7050-y,Experimental Economics,Doron2006,False,,Springer,Not available,Experimental internet auctions with random information retrieval,791cc5b54eeba774f09b042cb447e270,http://dx.doi.org/10.1007/s10683-006-7050-y 3362,Multi-unit auctions are powerful mechanisms for the allocation of numerous resources and production contracts. However there is uncertainty about the best auction formats when multi-unit auctions are used because there are multiple equilibria and analytical descriptions of optimum strategies are intractable. Empirical studies are scarce and most experimental studies are restricted to two bidders and two units. This paper constructs an agent-based model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The results provide some confirmation of analytical predictions but also indicate that the range of bidding strategies employed is richer than what the theory expects. Bidder coordination for higher prices is possible under both the Vickrey and uniform auctions especially when the population is heterogeneous and competition low. Judged by budgetary measures the discriminatory auction is the most expensive when rationing is tight but this outcome is reversed when rationing is less stringent. Budgetary outcomes can be improved if the auction is organized among more homogeneous bidders.,atakelty hailu,Not available,2006.0,10.1007/s11403-006-0012-9,Journal of Economic Interaction and Coordination,Atakelty2006,False,,Springer,Not available,Multi-unit auction format design,502e0a67096a46782f97d33e5b643acd,http://dx.doi.org/10.1007/s11403-006-0012-9 3363,Multi-unit auctions are powerful mechanisms for the allocation of numerous resources and production contracts. However there is uncertainty about the best auction formats when multi-unit auctions are used because there are multiple equilibria and analytical descriptions of optimum strategies are intractable. Empirical studies are scarce and most experimental studies are restricted to two bidders and two units. This paper constructs an agent-based model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The results provide some confirmation of analytical predictions but also indicate that the range of bidding strategies employed is richer than what the theory expects. Bidder coordination for higher prices is possible under both the Vickrey and uniform auctions especially when the population is heterogeneous and competition low. Judged by budgetary measures the discriminatory auction is the most expensive when rationing is tight but this outcome is reversed when rationing is less stringent. Budgetary outcomes can be improved if the auction is organized among more homogeneous bidders.,sophie thoyer,Not available,2006.0,10.1007/s11403-006-0012-9,Journal of Economic Interaction and Coordination,Atakelty2006,False,,Springer,Not available,Multi-unit auction format design,502e0a67096a46782f97d33e5b643acd,http://dx.doi.org/10.1007/s11403-006-0012-9 3364,The present note analyzes the simultaneous ascending-bid auction with arbitrarily many asymmetric bidders with decreasing marginal valuations under complete information. We show that the game is solvable by iterated elimination of weakly dominated strategies if the efficient allocation assigns at least one unit to every player and if bid increments are sufficiently small. In that unique equilibrium bidders immediately reduce their demand to the efficient allocation and the auction ends in the first round of bidding.,frank riedel,Not available,2006.0,10.1007/s00199-005-0039-5,Economic Theory,Frank2006,False,,Springer,Not available,Immediate demand reduction in simultaneous ascending-bid auctions: a uniqueness result,f99a5e7cdb40cb64667e099a6a1d4598,http://dx.doi.org/10.1007/s00199-005-0039-5 3365,The present note analyzes the simultaneous ascending-bid auction with arbitrarily many asymmetric bidders with decreasing marginal valuations under complete information. We show that the game is solvable by iterated elimination of weakly dominated strategies if the efficient allocation assigns at least one unit to every player and if bid increments are sufficiently small. In that unique equilibrium bidders immediately reduce their demand to the efficient allocation and the auction ends in the first round of bidding.,elmar wolfstetter,Not available,2006.0,10.1007/s00199-005-0039-5,Economic Theory,Frank2006,False,,Springer,Not available,Immediate demand reduction in simultaneous ascending-bid auctions: a uniqueness result,f99a5e7cdb40cb64667e099a6a1d4598,http://dx.doi.org/10.1007/s00199-005-0039-5 3366,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,gadi fibich,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 3367,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,arieh gavious,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 3368,We study independent private-value all-pay auctions with risk-averse players. We show that: (1) Players with low values bid lower and players with high values bid higher than they would bid in the risk neutral case. (2) Players with low values bid lower and players with high values bid higher than they would bid in a first-price auction. (3) Players’ expected utilities in an all-pay auction are lower than in a first-price auction. We also use perturbation analysis to calculate explicit approximations of the equilibrium strategies of risk-averse players and the seller’s expected revenue. In particular we show that in all-pay auctions the seller’s expected payoff in the risk-averse case may be either higher or lower than in the risk neutral case.,aner sela,Not available,2006.0,10.1007/s00182-006-0034-5,International Journal of Game Theory,Gadi2006,False,,Springer,Not available,All-pay auctions with risk-averse players,57acf7cb8b88c7ebb156f3e6219f71f2,http://dx.doi.org/10.1007/s00182-006-0034-5 3369,This paper illustrates a method for making side payments to advertiser networks that creates an incentive for the advertiser networks to submit the second-highest bids they received to an ad exchange and simultaneously ensures that the publishers will make more money on average in the short run as a result of adopting this scheme. We also illustrate how this payment scheme affects publisher payoffs in the long run after advertisers have a chance to modify their strategies in response to the changed incentives of the mechanism.,r. mcafee,Not available,2016.0,10.1007/s00182-015-0501-y,International Journal of Game Theory,Patrick2016,False,,Springer,Not available,Incentivizing advertiser networks to submit multiple bids,cd5a52a5452027c923e2d4bc03b30dd3,http://dx.doi.org/10.1007/s00182-015-0501-y 3370,Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M+1)st-price auction protocols that only yield the winners' identities and the selling price. Moreover if desired losing bidders learn no information at all except that they lost. Our security model is merely based on computational intractability. In particular our approach does not rely on trusted third parties e.g. auctioneers. We present an efficient implementation of the proposed techniques based on El Gamal encryption whose security only relies on the intractability of the decisional Diffie—Hellman problem. The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids.,felix brandt,Not available,2006.0,10.1007/s10207-006-0001-y,International Journal of Information Security,Felix2006,False,,Springer,Not available,How to obtain full privacy in auctions,3f26c24726caf683a1b15edf1dbebc12,http://dx.doi.org/10.1007/s10207-006-0001-y 3371,In the Colonel Blotto game two players simultaneously distribute forces across ,brian roberson,Not available,2006.0,10.1007/s00199-005-0071-5,Economic Theory,Brian2006,False,,Springer,Not available,The Colonel Blotto game,ceeb286694b3dd270baafe236da4cd39,http://dx.doi.org/10.1007/s00199-005-0071-5 3372,We consider an all-pay auction with complete information among the bidders; the seller does not observe the bidders’ values. We show that for some information structures in which the seller has a small uncertainty about the valuations it is profitable for him to exclude from the auction all but two (randomly selected) bidders even though the latter are ex ante identical from his point of view.,domenico menicucci,Not available,2006.0,10.1007/s00199-005-0010-5,Economic Theory,Domenico2006,False,,Springer,Not available,Banning Bidders from All-pay Auctions,296ea3cb8eae4e692b53b0546a032682,http://dx.doi.org/10.1007/s00199-005-0010-5 3373,Both mainstream economics and its critics have focused on models of individual rational agents even though most important decisions are made by small groups. Little systematic work has been done to study the behavior of small groups as decision-making agents in markets and other strategic games. This may limit the relevance of both economics and its critics to the objective of developing an understanding of how most important decisions are made. In order to gain some insight into this issue this paper compares group and individual economic behavior. The objective of the research is to learn whether there are systematic differences between decisions made by groups and individual agents in market environments characterized by risky outcomes. A quantitative measure of deviation from minimally-rational decisions is used to compare group and individual behavior in common value auctions.,james cox,Not available,2006.0,10.1007/s10683-006-9123-3,Experimental Economics,C.2006,False,,Springer,Not available,Barking up the right tree: Are small groups rational agents?,4271ab63d8cfc4f3bb020d52e6a20d35,http://dx.doi.org/10.1007/s10683-006-9123-3 3374,Both mainstream economics and its critics have focused on models of individual rational agents even though most important decisions are made by small groups. Little systematic work has been done to study the behavior of small groups as decision-making agents in markets and other strategic games. This may limit the relevance of both economics and its critics to the objective of developing an understanding of how most important decisions are made. In order to gain some insight into this issue this paper compares group and individual economic behavior. The objective of the research is to learn whether there are systematic differences between decisions made by groups and individual agents in market environments characterized by risky outcomes. A quantitative measure of deviation from minimally-rational decisions is used to compare group and individual behavior in common value auctions.,stephen hayne,Not available,2006.0,10.1007/s10683-006-9123-3,Experimental Economics,C.2006,False,,Springer,Not available,Barking up the right tree: Are small groups rational agents?,4271ab63d8cfc4f3bb020d52e6a20d35,http://dx.doi.org/10.1007/s10683-006-9123-3 3375,Equilibrium bidding strategies under most multi-unit auction rules cannot be obtained as closed form expressions. Research in multi-unit auctions has therefore depended on implicit characterization of equilibrium strategies using the first-order conditions of the bidders’ expected payoff maximization problem. In this paper we consider the ,indranil chakraborty,Not available,2006.0,10.1007/s00199-005-0009-y,Economic Theory,Indranil2006,False,,Springer,Not available,Characterization of equilibrium in pay-as-bid auctions for multiple units,3c86af9c2453299c6772b6125e7994fb,http://dx.doi.org/10.1007/s00199-005-0009-y 3376,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,r. isaac,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 3377,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,timothy salmon,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 3378,The theory and behavior of the clock version of the ascending auction has been well understood for at least 20 years. The more widely used oral outcry version of the ascending auction that allows bidders to submit their own bids has been the subject of some recent controversy mostly in regard to whether or not jump bidding i.e. bidders submitting bids higher than required by the auctioneer should be allowed. Isaac Salmon & Zillante (2005) shows that the standard equilibrium for the clock auction does not apply to the non-clock format and constructs an equilibrium bid function intended to match with field data on ascending auctions. In this study we will use economic experiments to provide a direct empirical test of that model while simultaneously providing empirical evidence to resolve the policy disputes centered around the place of jump bidding in ascending auctions.,arthur zillante,Not available,2005.0,10.1007/s00182-005-0203-y,International Journal of Game Theory,Mark2005,False,,Springer,Not available,An experimental test of alternative models of bidding in ascending auctions,b2e4e196d1b2ef14629d299a09a5d286,http://dx.doi.org/10.1007/s00182-005-0203-y 3379,The paper evaluates the performance of two multi-object auction models: ,debasis mishra,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 3380,This paper illustrates a method for making side payments to advertiser networks that creates an incentive for the advertiser networks to submit the second-highest bids they received to an ad exchange and simultaneously ensures that the publishers will make more money on average in the short run as a result of adopting this scheme. We also illustrate how this payment scheme affects publisher payoffs in the long run after advertisers have a chance to modify their strategies in response to the changed incentives of the mechanism.,sergei vassilvitskii,Not available,2016.0,10.1007/s00182-015-0501-y,International Journal of Game Theory,Patrick2016,False,,Springer,Not available,Incentivizing advertiser networks to submit multiple bids,cd5a52a5452027c923e2d4bc03b30dd3,http://dx.doi.org/10.1007/s00182-015-0501-y 3381,The paper evaluates the performance of two multi-object auction models: ,sunil reddy,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 3382,The paper evaluates the performance of two multi-object auction models: ,dharmaraj veeramani,Not available,2005.0,10.1007/s10660-005-6160-5,Electronic Commerce Research,Debasis2005,False,,Springer,Not available,Performance Evaluation of Multi-Object Auctions,af5ff5736add278049657cd7857250aa,http://dx.doi.org/10.1007/s10660-005-6160-5 3383,Decentralized multi-item auctions offer great opportunities for integrating fragmented online auction markets into larger markets with more efficient outcomes. This paper extends the theory of multi-item ascending auctions of substitutes by considering any finite positive bid increment and allowing the bidders to bid asyn-chronously instead of bidding in a round-robin fashion. We consider a setup where the bidders’ utilities over multiple items are additive and bound the maximum inefficiency in the allocation when the bidders follow a simple greedy strategy. We also obtain the limits within which the prices of individual items can vary from one outcome to another. For the special case of single unit bidder demand we also bound the maximum surplus which a bidder can extract by unilaterally switching to some other strategy. The paper suggests an upper bound for the minimum required bid increment which would be necessary for competitive price discovery and truthful bidding in a practical online implementation.,vipul bansal,Not available,2005.0,10.1007/s10660-005-6156-1,Electronic Commerce Research,Vipul2005,False,,Springer,Not available,Simultaneous Independent Online Auctions with Discrete Bid Increments,a040b972123a6b4bf5f92ddc133cb296,http://dx.doi.org/10.1007/s10660-005-6156-1 3384,Decentralized multi-item auctions offer great opportunities for integrating fragmented online auction markets into larger markets with more efficient outcomes. This paper extends the theory of multi-item ascending auctions of substitutes by considering any finite positive bid increment and allowing the bidders to bid asyn-chronously instead of bidding in a round-robin fashion. We consider a setup where the bidders’ utilities over multiple items are additive and bound the maximum inefficiency in the allocation when the bidders follow a simple greedy strategy. We also obtain the limits within which the prices of individual items can vary from one outcome to another. For the special case of single unit bidder demand we also bound the maximum surplus which a bidder can extract by unilaterally switching to some other strategy. The paper suggests an upper bound for the minimum required bid increment which would be necessary for competitive price discovery and truthful bidding in a practical online implementation.,rahul garg,Not available,2005.0,10.1007/s10660-005-6156-1,Electronic Commerce Research,Vipul2005,False,,Springer,Not available,Simultaneous Independent Online Auctions with Discrete Bid Increments,a040b972123a6b4bf5f92ddc133cb296,http://dx.doi.org/10.1007/s10660-005-6156-1 3385,Combinatorial auctions (CAs) have recently generated significant interest as an automated mechanism for buying and selling bundles of goods. They are proving to be extremely useful in numerous e-business applications such as e-selling e-procurement e-logistics and B2B exchanges. In this article we introduce combinatorial auctions and bring out important issues in the design of combinatorial auctions. We also highlight important contributions in current research in this area. This survey emphasizes combinatorial auctions as applied to electronic business situations.,y. narahari,Not available,2005.0,10.1007/BF02706244,Sadhana,Y.2005,False,,Springer,Not available,Combinatorial auctions for electronic business,a36e05cd55e9713be92c06e208f0f7ce,http://dx.doi.org/10.1007/BF02706244 3386,Combinatorial auctions (CAs) have recently generated significant interest as an automated mechanism for buying and selling bundles of goods. They are proving to be extremely useful in numerous e-business applications such as e-selling e-procurement e-logistics and B2B exchanges. In this article we introduce combinatorial auctions and bring out important issues in the design of combinatorial auctions. We also highlight important contributions in current research in this area. This survey emphasizes combinatorial auctions as applied to electronic business situations.,pankaj dayama,Not available,2005.0,10.1007/BF02706244,Sadhana,Y.2005,False,,Springer,Not available,Combinatorial auctions for electronic business,a36e05cd55e9713be92c06e208f0f7ce,http://dx.doi.org/10.1007/BF02706244 3387,This paper considers the problem of designing selling procedures for substitutes (like condominium units). Oral ascending auctions for the right to choose are efficient. This is a common type of auction used for the sale of real estate. Efficiency is not optimal from the seller’s viewpoint. An optimal procedure distorts the right-to-choose auction to favor in late rounds bidders whose preferred object has already been sold. This optimal auction is complex. A revenue improving departure from efficiency can be achieved by simply auctioning all the rights to choose before any of them is exerted.,roberto burguet,Not available,2005.0,10.1007/s10058-005-0121-2,Review of Economic Design,Roberto2005,False,,Springer,Not available,The condominium problem; auctions for substitutes,d49dd7a33bf0eb8298db3451ef6977e6,http://dx.doi.org/10.1007/s10058-005-0121-2 3388,Auctions have been getting increasing attention in computer science and economics as they provide an efficient solution to resource allocation problems with self-interested agents. E-Commerce and finance have emerged as some of their largest application fields. The need for new auction mechanisms that allow complex bids such as bundle or multi-attribute bids has been raised in many situations. Beyond strategic problems the design of these advanced auction formats exhibits hard computational problems. Pricing is one of the major challenges in designing iterative combinatorial auctions. The presence of bundle bids implies the existence of cases with no linear prices that support competitive equilibrium. This paper introduces a framework of pricing concepts and discusses recent implementations.,alcxandcr pikovsky,Not available,2005.0,10.1007/3-7908-1624-8_18,Wirtschaftsinformatik 2005,Alcxandcr2005,False,,Springer,Not available,Information Feedback in Iterative Combinatorial Auctions,22ed4f6d297f90226caf0cd8f3773e99,http://dx.doi.org/10.1007/3-7908-1624-8_18 3389,Auctions have been getting increasing attention in computer science and economics as they provide an efficient solution to resource allocation problems with self-interested agents. E-Commerce and finance have emerged as some of their largest application fields. The need for new auction mechanisms that allow complex bids such as bundle or multi-attribute bids has been raised in many situations. Beyond strategic problems the design of these advanced auction formats exhibits hard computational problems. Pricing is one of the major challenges in designing iterative combinatorial auctions. The presence of bundle bids implies the existence of cases with no linear prices that support competitive equilibrium. This paper introduces a framework of pricing concepts and discusses recent implementations.,martin bichlcr,Not available,2005.0,10.1007/3-7908-1624-8_18,Wirtschaftsinformatik 2005,Alcxandcr2005,False,,Springer,Not available,Information Feedback in Iterative Combinatorial Auctions,22ed4f6d297f90226caf0cd8f3773e99,http://dx.doi.org/10.1007/3-7908-1624-8_18 3390,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,asuncion mochon,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3391,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of economic efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve economic efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-optimal ranking) moving it either towards or away from their ranking by ,mukund sundararajan,Not available,2016.0,10.1007/s00224-016-9679-z,Theory of Computing Systems,Mukund2016,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,f3fb6390468e94ba1d8135b5c5bcd620,http://dx.doi.org/10.1007/s00224-016-9679-z 3392,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,david quintana,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3393,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,pedro isasi,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3394,The increasing use of auctions has led to a growing interest in the subject. The objective of this paper is to develop a genetic algorithm to find optimum bidding strategies for Ausubel auctions. The algorithm provides the strategy (defined as the action to be taken under different market conditions) that maximizes pay off to the bidder. The algorithm is tested under a series of scenarios that differ in their composition of utility functions number of bidders and quantity of lots auctioned. The results suggest that the approach leads to strategies that outperform sincere bidding systems.,yago saez,Not available,2005.0,10.1007/3-540-32391-0_67,Soft Computing as Transdisciplinary Science and Technology,Asunción2005,False,,Springer,Not available,Genetic Algorithms versus Human Bidding Strategies for Auctions,43cc8f44d9fd16b740f08ebd22ea2684,http://dx.doi.org/10.1007/3-540-32391-0_67 3395,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,thomas kittsteiner,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 3396,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,jorg nikutta,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 3397,We analyze an independent private values model where a number of objects are sold in sequential first- and second-price auctions. Bidders have unit demand and their valuation for an object is decreasing in the rank number of the auction in which it is sold. We derive efficient equilibria if prices are announced after each auction or if no information is given to bidders. We show that the sequence of prices constitutes a supermartingale. Even if we correct for the decrease in valuations for objects sold in later auctions we find that average prices are declining.,eyal winter,Not available,2004.0,10.1007/s001820400186,International Journal of Game Theory,Thomas2004,False,,Springer,Not available,Declining valuations in sequential auctions,16bab8ce3d21f8486214cb5dc6c57fdc,http://dx.doi.org/10.1007/s001820400186 3398,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,manos dramitinos,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 3399,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,george stamoulis,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 3400,We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g. video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.,costas courcoubetis,Not available,2004.0,10.1023/B:MONE.0000042495.27538.af,Mobile Networks and Applications,Manos2004,False,,Springer,Not available,Auction-Based Resource Reservation in 2.5/3G Networks,753d68a0719641a6c6c89142b3f499d8,http://dx.doi.org/10.1023/B:MONE.0000042495.27538.af 3401,The sealed-bid ,james parco,Not available,2004.0,10.1007/s10726-005-3824-4,Group Decision and Negotiation,E.2004,False,,Springer,Not available,Enhancing Honesty in Bargaining Under Incomplete Information: An Experimental Study of the Bonus Procedure,e599289799c88c7c07ea959da8a0c7f7,http://dx.doi.org/10.1007/s10726-005-3824-4 3402,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of economic efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve economic efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-optimal ranking) moving it either towards or away from their ranking by ,inbal talgam-cohen,Not available,2016.0,10.1007/s00224-016-9679-z,Theory of Computing Systems,Mukund2016,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,f3fb6390468e94ba1d8135b5c5bcd620,http://dx.doi.org/10.1007/s00224-016-9679-z 3403,The sealed-bid ,amnon rapoport,Not available,2004.0,10.1007/s10726-005-3824-4,Group Decision and Negotiation,E.2004,False,,Springer,Not available,Enhancing Honesty in Bargaining Under Incomplete Information: An Experimental Study of the Bonus Procedure,e599289799c88c7c07ea959da8a0c7f7,http://dx.doi.org/10.1007/s10726-005-3824-4 3404,Internet auctions are seen as an effective form of electronic commerce. An internet auction consists of multiple buyers and a single seller. We propose an alternative the REV auction in which a buyer can select sellers before conducting the auction. There are several advantages to our mechanism. First the seller selection mechanism enabled us to reflect the buyers’ preference. Second the seller’s evaluation mechanism effectively maintains seller quality. Third our mechanism can avoid consulting before bidding. We implemented an experimental e-commerce support system based on the REV auction. Experiments demonstrated that the REV auction increased the number of successful trades.,tokuro matsuo,Not available,2002.0,10.1007/3-540-48035-8_45,Developments in Applied Artificial Intelligence,Tokuro2002,False,,Springer,Not available,A Designated Bid Reverse Auction for Agent-Based Electronic Commerce,57435d7a8cb7bf46358d08691b7d7d7d,http://dx.doi.org/10.1007/3-540-48035-8_45 3405,Internet auctions are seen as an effective form of electronic commerce. An internet auction consists of multiple buyers and a single seller. We propose an alternative the REV auction in which a buyer can select sellers before conducting the auction. There are several advantages to our mechanism. First the seller selection mechanism enabled us to reflect the buyers’ preference. Second the seller’s evaluation mechanism effectively maintains seller quality. Third our mechanism can avoid consulting before bidding. We implemented an experimental e-commerce support system based on the REV auction. Experiments demonstrated that the REV auction increased the number of successful trades.,takayuki ito,Not available,2002.0,10.1007/3-540-48035-8_45,Developments in Applied Artificial Intelligence,Tokuro2002,False,,Springer,Not available,A Designated Bid Reverse Auction for Agent-Based Electronic Commerce,57435d7a8cb7bf46358d08691b7d7d7d,http://dx.doi.org/10.1007/3-540-48035-8_45 3406,The equilibrium of the direct-revelation Vickrey-Clarke- Groves (VCG) mechanism for combinatorial auctions requires every agent to provide complete information about its preferences. Not only is this unreasonable in settings with costly preference evaluation but moreover it is often possible to implement the same outcome with ,david parkes,Not available,2002.0,10.1007/3-540-36378-5_7,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,C.2002,False,,Springer,Not available,Price-Based Information Certificates for Minimal-Revelation Combinatorial Auctions,eb09d126e158bc95b84d7bb49c1fd88d,http://dx.doi.org/10.1007/3-540-36378-5_7 3407,In this paper we consider the problem of designing a mechanism for double auctions where bidders each bid to buy or sell one unit of a single commodity. We assume that each bidder’s utility value for the item is private to them and we focus on truthful mechanisms ones were the bidders’ optimal strategy is to bid their true utility. The profit of the auctioneer is the difference between the total payments from buyers and to tal to the sellers. We aim to maximize this profit. We extend the competitive analysis framework of basic auctions [,kaustubh deshmukh,Not available,2002.0,10.1007/3-540-45749-6_34,Algorithms — ESA 2002,Kaustubh2002,False,,Springer,Not available,Truthful and Competitive Double Auctions,f8552546b86516759a6d9d3c9cb14a20,http://dx.doi.org/10.1007/3-540-45749-6_34 3408,In this paper we consider the problem of designing a mechanism for double auctions where bidders each bid to buy or sell one unit of a single commodity. We assume that each bidder’s utility value for the item is private to them and we focus on truthful mechanisms ones were the bidders’ optimal strategy is to bid their true utility. The profit of the auctioneer is the difference between the total payments from buyers and to tal to the sellers. We aim to maximize this profit. We extend the competitive analysis framework of basic auctions [,andrew goldberg,Not available,2002.0,10.1007/3-540-45749-6_34,Algorithms — ESA 2002,Kaustubh2002,False,,Springer,Not available,Truthful and Competitive Double Auctions,f8552546b86516759a6d9d3c9cb14a20,http://dx.doi.org/10.1007/3-540-45749-6_34 3409,In this paper we consider the problem of designing a mechanism for double auctions where bidders each bid to buy or sell one unit of a single commodity. We assume that each bidder’s utility value for the item is private to them and we focus on truthful mechanisms ones were the bidders’ optimal strategy is to bid their true utility. The profit of the auctioneer is the difference between the total payments from buyers and to tal to the sellers. We aim to maximize this profit. We extend the competitive analysis framework of basic auctions [,jason hartline,Not available,2002.0,10.1007/3-540-45749-6_34,Algorithms — ESA 2002,Kaustubh2002,False,,Springer,Not available,Truthful and Competitive Double Auctions,f8552546b86516759a6d9d3c9cb14a20,http://dx.doi.org/10.1007/3-540-45749-6_34 3410,In this paper we consider the problem of designing a mechanism for double auctions where bidders each bid to buy or sell one unit of a single commodity. We assume that each bidder’s utility value for the item is private to them and we focus on truthful mechanisms ones were the bidders’ optimal strategy is to bid their true utility. The profit of the auctioneer is the difference between the total payments from buyers and to tal to the sellers. We aim to maximize this profit. We extend the competitive analysis framework of basic auctions [,anna karlin,Not available,2002.0,10.1007/3-540-45749-6_34,Algorithms — ESA 2002,Kaustubh2002,False,,Springer,Not available,Truthful and Competitive Double Auctions,f8552546b86516759a6d9d3c9cb14a20,http://dx.doi.org/10.1007/3-540-45749-6_34 3411,This paper presents a new false-name-proof multi-unit auction protocol called Greedy ALlocation (GAL) protocol. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called Iterative Reducing (IR) protocol has been developed for multi-unit auctions and has proven to be false-name-proof i.e. using false-name bids is useless. For Internet auction protocols being false-name-proof is important since identifying each participant on the Internet is virtually impossible.One shortcoming of the IR protocol is that it requires the auctioneer to carefully pre-determine the reservation price for one unit. Our newly developed GAL protocol is easier to use than the IR since the auctioneer does not need to set the reservation price nor any other parameters. The evaluation results show that the GAL protocol can obtain a social surplus that is very close to Pareto efficient. Furthermore the obtained social surplus and seller’s revenue are much better than those of the IR protocol even if the reservation price is set optimally.,kenji terada,Not available,2002.0,10.1007/3-540-45680-5_4,Intelligent Agents and Multi-Agent Systems,Kenji2002,False,,Springer,Not available,False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values,e51b27af2c81e5b7224082d7915788aa,http://dx.doi.org/10.1007/3-540-45680-5_4 3412,This paper presents a new false-name-proof multi-unit auction protocol called Greedy ALlocation (GAL) protocol. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called Iterative Reducing (IR) protocol has been developed for multi-unit auctions and has proven to be false-name-proof i.e. using false-name bids is useless. For Internet auction protocols being false-name-proof is important since identifying each participant on the Internet is virtually impossible.One shortcoming of the IR protocol is that it requires the auctioneer to carefully pre-determine the reservation price for one unit. Our newly developed GAL protocol is easier to use than the IR since the auctioneer does not need to set the reservation price nor any other parameters. The evaluation results show that the GAL protocol can obtain a social surplus that is very close to Pareto efficient. Furthermore the obtained social surplus and seller’s revenue are much better than those of the IR protocol even if the reservation price is set optimally.,makoto yokoo,Not available,2002.0,10.1007/3-540-45680-5_4,Intelligent Agents and Multi-Agent Systems,Kenji2002,False,,Springer,Not available,False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values,e51b27af2c81e5b7224082d7915788aa,http://dx.doi.org/10.1007/3-540-45680-5_4 3413,In sequential auctions the phenomenon of declining prices is often observed which in theory can be represented by a supermartingale. This paper employs the perspective that bidders’ values may change over stages and the common priors are sequentially adjusted by the remaining bidders. It is shown that the declining price sequence can be explained by the adjustment of common priors between auctions. The adjustment of common priors is characterized by stochastic orders. Sufficient and necessary conditions for a supermartingale price sequence are derived.,heng qiao,Not available,2016.0,10.1007/s11424-016-4295-1,Journal of Systems Science and Complexity,Heng2016,False,,Springer,Not available,The changing of common priors in sequential auctions,a24c9d056d2be6fc85c4ece25efaa50f,http://dx.doi.org/10.1007/s11424-016-4295-1 3414,Combinatorial auctions where bidders can submit bids on ,wolfram conen,Not available,2002.0,10.1007/3-540-36378-5_3,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Wolfram2002,False,,Springer,Not available,,76d7ef9e138d5f7c8089fe0857fccf9a,http://dx.doi.org/10.1007/3-540-36378-5_3 3415,Combinatorial auctions where bidders can submit bids on ,tuomas sandholm,Not available,2002.0,10.1007/3-540-36378-5_3,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Wolfram2002,False,,Springer,Not available,,76d7ef9e138d5f7c8089fe0857fccf9a,http://dx.doi.org/10.1007/3-540-36378-5_3 3416,We describe a new auction protocol that enjoys the following properties: the biddings are submitted non-interactively and no information beyond the result is disclosed. The protocol is efficient for a logarithmic number of players. Our solution uses a semi-trusted third party ,olivier baudron,Not available,2002.0,10.1007/3-540-46088-8_28,Financial Cryptography,Olivier2002,False,,Springer,Not available,Non-interactive Private Auctions,c220e51ab1f1c7d103ba2d7e12b8d757,http://dx.doi.org/10.1007/3-540-46088-8_28 3417,We describe a new auction protocol that enjoys the following properties: the biddings are submitted non-interactively and no information beyond the result is disclosed. The protocol is efficient for a logarithmic number of players. Our solution uses a semi-trusted third party ,jacques stern,Not available,2002.0,10.1007/3-540-46088-8_28,Financial Cryptography,Olivier2002,False,,Springer,Not available,Non-interactive Private Auctions,c220e51ab1f1c7d103ba2d7e12b8d757,http://dx.doi.org/10.1007/3-540-46088-8_28 3418,In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation and task assignment. In many cases the Vickrey (second-price sealed-bid) auction is used as a protocol that prescribes how the individual agents have to interact in order to come to an agreement. We show that the Vickrey auction despite its theoretical benefits is inappropriate if “antisocial” agents participate in the auction process. More specifically an antisocial attitude for economic agents that makes ,felix brandt,Not available,2002.0,10.1007/3-540-45448-9_25,Intelligent Agents VIII,Felix2002,False,,Springer,Not available,Antisocial Agents and Vickrey Auctions,f73a94e648fff4a0608dde3360860900,http://dx.doi.org/10.1007/3-540-45448-9_25 3419,In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation and task assignment. In many cases the Vickrey (second-price sealed-bid) auction is used as a protocol that prescribes how the individual agents have to interact in order to come to an agreement. We show that the Vickrey auction despite its theoretical benefits is inappropriate if “antisocial” agents participate in the auction process. More specifically an antisocial attitude for economic agents that makes ,gerhard weiss,Not available,2002.0,10.1007/3-540-45448-9_25,Intelligent Agents VIII,Felix2002,False,,Springer,Not available,Antisocial Agents and Vickrey Auctions,f73a94e648fff4a0608dde3360860900,http://dx.doi.org/10.1007/3-540-45448-9_25 3420,Combinatorial auctions where agents can bid on bundles of items are desirable because they allow the agents to express complementarity and substitutability between the items. However expressing one’s preferences can require bidding on all bundles. Selective incremental preference elicitation by the auctioneer was recently proposed to address this problem [,benoit hudson,Not available,2002.0,10.1007/3-540-36378-5_5,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Benoît2002,False,,Springer,Not available,Effectiveness of Preference Elicitation in Combinatorial Auctions,5b7b5a0fcf7898840cec4d0c723a4f1f,http://dx.doi.org/10.1007/3-540-36378-5_5 3421,Combinatorial auctions where agents can bid on bundles of items are desirable because they allow the agents to express complementarity and substitutability between the items. However expressing one’s preferences can require bidding on all bundles. Selective incremental preference elicitation by the auctioneer was recently proposed to address this problem [,tuomas sandholm,Not available,2002.0,10.1007/3-540-36378-5_5,Agent-Mediated Electronic Commerce IV. Designing Mechanisms and Systems,Benoît2002,False,,Springer,Not available,Effectiveness of Preference Elicitation in Combinatorial Auctions,5b7b5a0fcf7898840cec4d0c723a4f1f,http://dx.doi.org/10.1007/3-540-36378-5_5 3422,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,jack knetsch,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3423,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,fang-fang tang,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3424,In sequential auctions the phenomenon of declining prices is often observed which in theory can be represented by a supermartingale. This paper employs the perspective that bidders’ values may change over stages and the common priors are sequentially adjusted by the remaining bidders. It is shown that the declining price sequence can be explained by the adjustment of common priors between auctions. The adjustment of common priors is characterized by stochastic orders. Sufficient and necessary conditions for a supermartingale price sequence are derived.,jun ma,Not available,2016.0,10.1007/s11424-016-4295-1,Journal of Systems Science and Complexity,Heng2016,False,,Springer,Not available,The changing of common priors in sequential auctions,a24c9d056d2be6fc85c4ece25efaa50f,http://dx.doi.org/10.1007/s11424-016-4295-1 3425,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,richard thaler,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3426,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,owen phillips,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3427,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,dale menkhaus,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3428,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,joseph krogmeier,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3429,The decision-theoretic approach to statistics and econometrics explicitly specifies a set of models under consideration a set of actions that can be taken and a loss function that quantifies the value to the decision-maker of applying a particular action when a particular model holds. Decision rules or procedures map data into actions and can be ordered according to their Bayes minmax or minmax regret risks. Large sample approximations can be used to approximate complicated decision problems with simpler ones that are easier to solve. Some examples of applications of decision theory in econometrics are discussed.,keisuke hirano,Not available,2018.0,10.1057/978-1-349-95189-5_2297,The New Palgrave Dictionary of Economics,Keisuke2018,False,,Springer,Not available,Decision Theory in Econometrics,e33d2b5b237ed89a9e679f3058da12fc,http://dx.doi.org/10.1057/978-1-349-95189-5_2297 3430,We consider a supply chain management problem where a business alliance of small capacity retailers needs to collectively select a unique supplier considering the assignment’s efficiency at both the alliance and retailers’ level. We model the alliance as a multi-agent system. For this model we present a modified Vickrey auction algorithm with regret minimization and compare it experimentally with aggregation of preferences by voting and standard Vickrey auction. Through simulation we show that the proposed method on average reaches globally efficient and individually acceptable solutions. The solutions are evaluated in terms of different social welfare values.,marin lujak,Not available,2018.0,10.1007/978-3-319-66379-1_6,Intelligent Distributed Computing XI,Marin2018,False,,Springer,Not available,A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions,6ea43ad30fbcaa16afd4ea845d37bf7b,http://dx.doi.org/10.1007/978-3-319-66379-1_6 3431,We consider a supply chain management problem where a business alliance of small capacity retailers needs to collectively select a unique supplier considering the assignment’s efficiency at both the alliance and retailers’ level. We model the alliance as a multi-agent system. For this model we present a modified Vickrey auction algorithm with regret minimization and compare it experimentally with aggregation of preferences by voting and standard Vickrey auction. Through simulation we show that the proposed method on average reaches globally efficient and individually acceptable solutions. The solutions are evaluated in terms of different social welfare values.,marija slavkovik,Not available,2018.0,10.1007/978-3-319-66379-1_6,Intelligent Distributed Computing XI,Marin2018,False,,Springer,Not available,A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions,6ea43ad30fbcaa16afd4ea845d37bf7b,http://dx.doi.org/10.1007/978-3-319-66379-1_6 3432,We investigate revenue-maximizing mechanisms in settings where bidders’ utility functions are characterized by convex costs. Such costs arise for instance in procurement auctions for energy and when bidders borrow money at non-linear interest rates. We provide a 1 / 16,amy greenwald,Not available,2018.0,10.1007/978-3-319-99660-8_11,Algorithmic Game Theory,Amy2018,False,,Springer,Not available,On Revenue-Maximizing Mechanisms Assuming Convex Costs,c9fe4af2be6a70e23eb0120d140178ef,http://dx.doi.org/10.1007/978-3-319-99660-8_11 3433,We investigate revenue-maximizing mechanisms in settings where bidders’ utility functions are characterized by convex costs. Such costs arise for instance in procurement auctions for energy and when bidders borrow money at non-linear interest rates. We provide a 1 / 16,takehiro oyakawa,Not available,2018.0,10.1007/978-3-319-99660-8_11,Algorithmic Game Theory,Amy2018,False,,Springer,Not available,On Revenue-Maximizing Mechanisms Assuming Convex Costs,c9fe4af2be6a70e23eb0120d140178ef,http://dx.doi.org/10.1007/978-3-319-99660-8_11 3434,We investigate revenue-maximizing mechanisms in settings where bidders’ utility functions are characterized by convex costs. Such costs arise for instance in procurement auctions for energy and when bidders borrow money at non-linear interest rates. We provide a 1 / 16,vasilis syrgkanis,Not available,2018.0,10.1007/978-3-319-99660-8_11,Algorithmic Game Theory,Amy2018,False,,Springer,Not available,On Revenue-Maximizing Mechanisms Assuming Convex Costs,c9fe4af2be6a70e23eb0120d140178ef,http://dx.doi.org/10.1007/978-3-319-99660-8_11 3435,Taking advantage of peer-to-peer transmission underlying cellular networks device-to-device (D2D) communications offer various benefits such as coverage extension traffic offloading and improved energy efficiency. In this paper we focus on a promising scenario where a D2D local area network is formed to relay packets for an out-of-coverage source device. A one-sided auction model is formulated from a unique perspective in which the source device decides the allocation of its packets among the helpers and charges reserve payments to the helpers according to their bids. The winning helpers only collect rewards from the source’s deposit at the base station when the assigned packets are successfully relayed. In this model we further take into account the budget constraints of the helpers to capture the helpers’ resource limits and the risks that the helpers are willing to take. Based on this model we propose three auction mechanisms targeting economic properties such as individual rationality efficiency and truthfulness. An enhanced Martello & Toth algorithm is first developed for the VCG-based auction to determine packet allocation that optimizes the source’s quality of service. The probabilistic entrance auction mechanism uses sequential second price auction to achieve a low computational cost. The randomized mechanism involves a randomization over the above two mechanisms to satisfy certain requirement for social welfare while minimizing the computational time. We also conduct extensive simulations to examine the performance of the proposed mechanisms.,peijian ju,Not available,2016.0,10.1007/s11276-015-1099-5,Wireless Networks,Peijian2016,False,,Springer,Not available,Truthful budget constrained auction for device-to-device relaying packet allocation,f2dbae7cb8569db9d50d92729c0e472e,http://dx.doi.org/10.1007/s11276-015-1099-5 3436,Bayesian Epistemology bases its analysis of the objects under study on a prior a probability distribution which is in turn the subject matter in statistical learning and that of machine learning at least implicitly. We are interested in a game setting where the agents to be learned may shift in accordance with the data collector’s strategies. We focus on this issue of learning and exploiting for Myerson auction where a seller wants to gain information on bidders’ value distributions to achieve the maximum revenue. We show that a world of the power-law distribution would enable the auctioneer to achieve both but the bidders can consistently lie about their probability distribution to improve utility under the other distributions.,xiaotie deng,Not available,2018.0,10.1007/978-3-319-78455-7_14,Frontiers in Algorithmics,Xiaotie2018,False,,Springer,Not available,On Bayesian Epistemology of Myerson Auction,54c4bfbbdeae6f4dea8ce4876f08b3d0,http://dx.doi.org/10.1007/978-3-319-78455-7_14 3437,Bayesian Epistemology bases its analysis of the objects under study on a prior a probability distribution which is in turn the subject matter in statistical learning and that of machine learning at least implicitly. We are interested in a game setting where the agents to be learned may shift in accordance with the data collector’s strategies. We focus on this issue of learning and exploiting for Myerson auction where a seller wants to gain information on bidders’ value distributions to achieve the maximum revenue. We show that a world of the power-law distribution would enable the auctioneer to achieve both but the bidders can consistently lie about their probability distribution to improve utility under the other distributions.,keyu zhu,Not available,2018.0,10.1007/978-3-319-78455-7_14,Frontiers in Algorithmics,Xiaotie2018,False,,Springer,Not available,On Bayesian Epistemology of Myerson Auction,54c4bfbbdeae6f4dea8ce4876f08b3d0,http://dx.doi.org/10.1007/978-3-319-78455-7_14 3438,Experimental macroeconomics is a sub-field of experimental economics that makes use of controlled laboratory methods to understand aggregate economic phenomena and to test the specific assumptions and predictions of macroeconomic models. This article reviews important contributions of experimental macroeconomics research which include an understanding of when equilibration works when it fails and the means by which macro-coordination problems are resolved. It also discusses important methodological issues including the choice of market institution the implementation of representative agent and overlapping generations models discounting and infinite horizons and the external validity of experimental macroeconomic findings.,john duffy,Not available,2018.0,10.1057/978-1-349-95189-5_2224,The New Palgrave Dictionary of Economics,John2018,False,,Springer,Not available,Experimental Macroeconomics,f2ab1c1353761b7b4222de49a5b91c70,http://dx.doi.org/10.1057/978-1-349-95189-5_2224 3439,Resale markets are necessary to correct misallocations of assets but do they always ensure that goods end up in the hands of those who value them most? This article reviews theoretical arguments as to why this need not necessarily be so and when inefficiencies might be expected despite the presence of resale markets. Policy implications are also suggested.,philippe jehiel,Not available,2018.0,10.1057/978-1-349-95189-5_1980,The New Palgrave Dictionary of Economics,Philippe2018,False,,Springer,Not available,Resale Markets,5391e666096c6016829ccc57b54c4e0d,http://dx.doi.org/10.1057/978-1-349-95189-5_1980 3440,Incentive compatibility – a characteristic of mechanisms whereby each agent knows that his best strategy is to follow the rules no matter what the other agents will do – is desirable because it promotes the achievement of group goals. But it is elusive because pervasive opportunities exist for misbehaviour such as by misrepresenting preferences. This article reviews attempts to solve or at least to manage the incentive compatibility problem. Incentive compatibility provides a basic constraint on the possibilities for normative analysis and so serves as the fundamental interface between what is desirable and what is possible in a theory of organizations.,john ledyard,Not available,2018.0,10.1057/978-1-349-95189-5_1042,The New Palgrave Dictionary of Economics,O.2018,False,,Springer,Not available,Incentive Compatibility,becac9cc44b042eaaa76ca6c4c458a8a,http://dx.doi.org/10.1057/978-1-349-95189-5_1042 3441,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,thant oo,Not available,2018.0,10.1007/978-3-319-66062-2_10,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Summary,878aa7de8cdd28c9bc0798d9245e0031,http://dx.doi.org/10.1007/978-3-319-66062-2_10 3442,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,nguyen tran,Not available,2018.0,10.1007/978-3-319-66062-2_10,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Summary,878aa7de8cdd28c9bc0798d9245e0031,http://dx.doi.org/10.1007/978-3-319-66062-2_10 3443,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,shaolei ren,Not available,2018.0,10.1007/978-3-319-66062-2_10,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Summary,878aa7de8cdd28c9bc0798d9245e0031,http://dx.doi.org/10.1007/978-3-319-66062-2_10 3444,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,choong hong,Not available,2018.0,10.1007/978-3-319-66062-2_10,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Summary,878aa7de8cdd28c9bc0798d9245e0031,http://dx.doi.org/10.1007/978-3-319-66062-2_10 3445,Following the Internet’s widespread adoption much economic work has studied ‘online platforms’: firms that mainly interact with consumers in cyberspace. This article surveys such work focusing on the ways in which traditional economic models have been adapted to incorporate novel aspects made relevant by the Internet. This literature can be divided roughly into two categories: broad-brush study of the competition between platforms and more fine-grained study of the ways in which users and platforms interact with one another. The former focuses on extending oligopoly theory to include ‘consumption externalities’; the latter extends auction and search theory to a world of precisely measureable actions.,alexander white,Not available,2018.0,10.1057/978-1-349-95189-5_2948,The New Palgrave Dictionary of Economics,Alexander2018,False,,Springer,Not available,Online Platforms Economics of,cd725fcfcdd71d2690e710fdb324d6d8,http://dx.doi.org/10.1057/978-1-349-95189-5_2948 3446,Standard auctions are known to be a revenue-maximizing way to sell an object under broad conditions when buyers are symmetric and have independent private valuations. We show that when buyers have interdependent valuations auctions may lose their advantage even if symmetry and independence of information are maintained. In particular simple alternative selling mechanisms that sometimes allow a buyer who does not have the highest valuation to win the object will in general increase all buyers’ willingness to pay possibly enough to offset the loss to the seller of not always selling to the buyer with the greatest willingness to pay.,dan levin,Not available,2006.0,10.1007/s00199-004-0558-5,Economic Theory,M.2006,False,,Springer,Not available,When and why not to auction,b7f6974e7f020a4dfdf7e877a84a8a0a,http://dx.doi.org/10.1007/s00199-004-0558-5 3447,Taking advantage of peer-to-peer transmission underlying cellular networks device-to-device (D2D) communications offer various benefits such as coverage extension traffic offloading and improved energy efficiency. In this paper we focus on a promising scenario where a D2D local area network is formed to relay packets for an out-of-coverage source device. A one-sided auction model is formulated from a unique perspective in which the source device decides the allocation of its packets among the helpers and charges reserve payments to the helpers according to their bids. The winning helpers only collect rewards from the source’s deposit at the base station when the assigned packets are successfully relayed. In this model we further take into account the budget constraints of the helpers to capture the helpers’ resource limits and the risks that the helpers are willing to take. Based on this model we propose three auction mechanisms targeting economic properties such as individual rationality efficiency and truthfulness. An enhanced Martello & Toth algorithm is first developed for the VCG-based auction to determine packet allocation that optimizes the source’s quality of service. The probabilistic entrance auction mechanism uses sequential second price auction to achieve a low computational cost. The randomized mechanism involves a randomization over the above two mechanisms to satisfy certain requirement for social welfare while minimizing the computational time. We also conduct extensive simulations to examine the performance of the proposed mechanisms.,wei song,Not available,2016.0,10.1007/s11276-015-1099-5,Wireless Networks,Peijian2016,False,,Springer,Not available,Truthful budget constrained auction for device-to-device relaying packet allocation,f2dbae7cb8569db9d50d92729c0e472e,http://dx.doi.org/10.1007/s11276-015-1099-5 3448,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,isabelle perrigne,Not available,2018.0,10.1057/978-1-349-95189-5_2762,The New Palgrave Dictionary of Economics,Isabelle2018,False,,Springer,Not available,Auctions (Empirics),a328fab950e722ea95f1be53fd736b36,http://dx.doi.org/10.1057/978-1-349-95189-5_2762 3449,The structural analysis of auction data relying on game theoretic models has undergone a tremendous development since the mid-1990s. This article reviews some important contributions for first-price and ascending auctions. It stresses identification of the structure and the development of tractable econometric methods while addressing bidders’ asymmetry common value bidders’ risk aversion endogenous entry dynamic and multi-unit auctions as well as the choice of the reserve price and the auction mechanism. Various domains are studied such as auctions of timber gas lease treasury bills agricultural products electricity and construction procurements.,quang vuong,Not available,2018.0,10.1057/978-1-349-95189-5_2762,The New Palgrave Dictionary of Economics,Isabelle2018,False,,Springer,Not available,Auctions (Empirics),a328fab950e722ea95f1be53fd736b36,http://dx.doi.org/10.1057/978-1-349-95189-5_2762 3450,Willingness-to-pay (WTP) data elicited with the help of incentive compatible methods like the Vickrey auction and the BDM mechanism promise higher validity than stated preferences data and provide more information content than do revealed-preferences data. However research shows that subjects in a Vickrey auction do not always follow the dominant strategy of bidding their WTP but frequently bid too high or too low. Although this phenomenon is usually attributed to irrational behavior that need not be the only explanation. In marketing research applications subjects are typically asked their WTP for a new product and it appears that most subjects are uncertain about their exact WTP. We present a modified bidding model to explain that in this case it is optimal for risk-averse but rational bidders to underestimate rather than to overestimate their WTP. The model is supported by preliminary experimental data.,klaus kaas,Not available,2006.0,10.1007/BF03396723,Schmalenbach Business Review,Peter2006,False,,Springer,Not available,Are the Vickrey Auction and the BDM Mechanism Really Incentive Compatible? — Empirical Results and Optimal Bidding Strategies in Cases of Uncertain Willingness-to-pay,9280889a7b33a6ae65fee581e20ecfe2,http://dx.doi.org/10.1007/BF03396723 3451,Willingness-to-pay (WTP) data elicited with the help of incentive compatible methods like the Vickrey auction and the BDM mechanism promise higher validity than stated preferences data and provide more information content than do revealed-preferences data. However research shows that subjects in a Vickrey auction do not always follow the dominant strategy of bidding their WTP but frequently bid too high or too low. Although this phenomenon is usually attributed to irrational behavior that need not be the only explanation. In marketing research applications subjects are typically asked their WTP for a new product and it appears that most subjects are uncertain about their exact WTP. We present a modified bidding model to explain that in this case it is optimal for risk-averse but rational bidders to underestimate rather than to overestimate their WTP. The model is supported by preliminary experimental data.,heidrun ruprecht,Not available,2006.0,10.1007/BF03396723,Schmalenbach Business Review,Peter2006,False,,Springer,Not available,Are the Vickrey Auction and the BDM Mechanism Really Incentive Compatible? — Empirical Results and Optimal Bidding Strategies in Cases of Uncertain Willingness-to-pay,9280889a7b33a6ae65fee581e20ecfe2,http://dx.doi.org/10.1007/BF03396723 3452,This chapter explores the relative literature of and provides a reference tool for optimization and game theory in e-commerce. Moreover in order to satisfy a broad range of readers a brief overview is given in several e-business issues. Beside its horizontal character this chapter presents some of the most up to date applications of operations research game theory and mathematical programming modeling techniques to four basic issues in e-business: e-supply chain e-auctions data mining and the “cost and pricing” problem in the Internet. Several opportunities for future research are also presented.,markos kourgiantakis,Not available,2006.0,10.1007/978-0-387-30165-5_35,Handbook of Optimization in Telecommunications,Markos2006,False,,Springer,Not available,Optimization in E-Commerce,e83828cf10774fa7fee139b187bc52ee,http://dx.doi.org/10.1007/978-0-387-30165-5_35 3453,This chapter explores the relative literature of and provides a reference tool for optimization and game theory in e-commerce. Moreover in order to satisfy a broad range of readers a brief overview is given in several e-business issues. Beside its horizontal character this chapter presents some of the most up to date applications of operations research game theory and mathematical programming modeling techniques to four basic issues in e-business: e-supply chain e-auctions data mining and the “cost and pricing” problem in the Internet. Several opportunities for future research are also presented.,iraklis mandalianos,Not available,2006.0,10.1007/978-0-387-30165-5_35,Handbook of Optimization in Telecommunications,Markos2006,False,,Springer,Not available,Optimization in E-Commerce,e83828cf10774fa7fee139b187bc52ee,http://dx.doi.org/10.1007/978-0-387-30165-5_35 3454,This chapter explores the relative literature of and provides a reference tool for optimization and game theory in e-commerce. Moreover in order to satisfy a broad range of readers a brief overview is given in several e-business issues. Beside its horizontal character this chapter presents some of the most up to date applications of operations research game theory and mathematical programming modeling techniques to four basic issues in e-business: e-supply chain e-auctions data mining and the “cost and pricing” problem in the Internet. Several opportunities for future research are also presented.,athanasios migdalas,Not available,2006.0,10.1007/978-0-387-30165-5_35,Handbook of Optimization in Telecommunications,Markos2006,False,,Springer,Not available,Optimization in E-Commerce,e83828cf10774fa7fee139b187bc52ee,http://dx.doi.org/10.1007/978-0-387-30165-5_35 3455,This chapter explores the relative literature of and provides a reference tool for optimization and game theory in e-commerce. Moreover in order to satisfy a broad range of readers a brief overview is given in several e-business issues. Beside its horizontal character this chapter presents some of the most up to date applications of operations research game theory and mathematical programming modeling techniques to four basic issues in e-business: e-supply chain e-auctions data mining and the “cost and pricing” problem in the Internet. Several opportunities for future research are also presented.,panos pardalos,Not available,2006.0,10.1007/978-0-387-30165-5_35,Handbook of Optimization in Telecommunications,Markos2006,False,,Springer,Not available,Optimization in E-Commerce,e83828cf10774fa7fee139b187bc52ee,http://dx.doi.org/10.1007/978-0-387-30165-5_35 3456,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,jiujun cheng,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 3457,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,yuhong li,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 3458,Hybrid CDN–P2P networks (HCDNs) combine Peer to Peer (P2P) networks and Content Delivery Networks (CDN) to benefit from their complementary advantages. In order to enable a traditional CDN to offer hybrid content delivery service we introduce a resource scheduling mechanism to perform the request routing process and determine the desired level of contribution for users. The proposed mechanism relies on a truthful profit maximizing envy-free auction to optimize contributions of the end-users in P2P content delivery. Based on the proposed solution economics of content delivery in the HCDN are studied and it is shown that through our resource scheduling mechanism it is possible to serve a big fraction of end-users with higher quality content increase the net profit of the HCDN provider and decrease expenditures of the content provider simultaneously.,mehran garmehi,Not available,2016.0,10.1007/s10922-015-9359-3,Journal of Network and Systems Management,Mehran2016,False,,Springer,Not available,Envy-Free Resource Allocation and Request Routing in Hybrid CDN–P2P Networks,c35ba2b32c142ce49653308f1c4e4747,http://dx.doi.org/10.1007/s10922-015-9359-3 3459,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,weiwei jiao,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 3460,In P2P network there are a considerable proportion of free riders which contribute nothing or little to the P2P system but obtain resources from the system. In order to address this problem we present a utility-based auction cooperation incentive mechanism in the P2P network. Our approach is that before communicating with destination peer the source peer first demands peers to auction their utilities and then select the maximum utility as its destination peer and gives some benefit to it at the same time gives some punishment to the liars. By using this mechanism the more the peers contribute to the system the more utility the peers can obtain and therefore the more benefits the peers can gain from the system. The experiment results show that the incentive mechanism assures the justice of gaining benefits for different kinds of peers in the system and hence controls the free riders effectively and improves the whole performance of the P2P network.,jian ma,Not available,2006.0,10.1007/11807964_2,Emerging Directions in Embedded and Ubiquitous Computing,Jiujun2006,False,,Springer,Not available,A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks,cc3f8403e149a86e4ecf50bc83b7e369,http://dx.doi.org/10.1007/11807964_2 3461,This paper studies how to relax the restrictions on bidders in two sequential English auctions. Existing work has showed that it is optimal for the auctioneer to auction objects in the decreasing order of the dispersion of the order statistics of the surpluses. But they assume each bidder can win at most one object. However in many cases each bidder needs more than one object and the objects almost affect each other. Given this the settings that have both common and private value elements by allowing each bidder winning more than one object are studied here. Firstly the single object model is extended to two objects without the limitation that a bidder can win at most one object. Secondly the equilibrium bidding strategies for each auction in a sequence are described the selling prices and winner’s total expected profits of different agendas are analyzed. Thirdly the optimal agendas are determined. Finally we make two experiments one validates that it may be the optimal agenda either by increasing order or decreasing order of the dispersion of the order statistics of the surpluses the other display the changing trend of the optimal agenda.,yu-mei chai,Not available,2006.0,10.1007/11802372_41,Agent Computing and Multi-Agent Systems,Yu-mei2006,False,,Springer,Not available,Optimal Agendas for Sequential English Auctions with Private and Common Values,831076291e6d139f5a8af6fed317583c,http://dx.doi.org/10.1007/11802372_41 3462,This paper studies how to relax the restrictions on bidders in two sequential English auctions. Existing work has showed that it is optimal for the auctioneer to auction objects in the decreasing order of the dispersion of the order statistics of the surpluses. But they assume each bidder can win at most one object. However in many cases each bidder needs more than one object and the objects almost affect each other. Given this the settings that have both common and private value elements by allowing each bidder winning more than one object are studied here. Firstly the single object model is extended to two objects without the limitation that a bidder can win at most one object. Secondly the equilibrium bidding strategies for each auction in a sequence are described the selling prices and winner’s total expected profits of different agendas are analyzed. Thirdly the optimal agendas are determined. Finally we make two experiments one validates that it may be the optimal agenda either by increasing order or decreasing order of the dispersion of the order statistics of the surpluses the other display the changing trend of the optimal agenda.,zhong-feng wang,Not available,2006.0,10.1007/11802372_41,Agent Computing and Multi-Agent Systems,Yu-mei2006,False,,Springer,Not available,Optimal Agendas for Sequential English Auctions with Private and Common Values,831076291e6d139f5a8af6fed317583c,http://dx.doi.org/10.1007/11802372_41 3463,The entry reviews essential elements of market structure — the systems procedures and protocols that determine how orders are handled translated into trades and transaction prices determined. There are various contrasting alternatives such as order-driven and quote-driven markets; consolidated vs fragmented markets; human intervention vs electronic trading; and continuous markets vs periodic call auctions. A major objective of market design noted in the discussion is to enhance the accuracy with which prices are discovered in a dynamic uncertain environment. Lastly the entry points out that market structures are rapidly changing and that much remains to be learned about how best to structure a technologically sophisticated hybrid market that efficiently services the varied needs of diverse participants.,robert schwartz,Not available,2006.0,10.1007/978-0-387-26336-6_64,Encyclopedia of Finance,A.2006,False,,Springer,Not available,Structure of securities markets,35e8734f9c8435cf51b512ac19e0a8b8,http://dx.doi.org/10.1007/978-0-387-26336-6_64 3464,The entry reviews essential elements of market structure — the systems procedures and protocols that determine how orders are handled translated into trades and transaction prices determined. There are various contrasting alternatives such as order-driven and quote-driven markets; consolidated vs fragmented markets; human intervention vs electronic trading; and continuous markets vs periodic call auctions. A major objective of market design noted in the discussion is to enhance the accuracy with which prices are discovered in a dynamic uncertain environment. Lastly the entry points out that market structures are rapidly changing and that much remains to be learned about how best to structure a technologically sophisticated hybrid market that efficiently services the varied needs of diverse participants.,lin peng,Not available,2006.0,10.1007/978-0-387-26336-6_64,Encyclopedia of Finance,A.2006,False,,Springer,Not available,Structure of securities markets,35e8734f9c8435cf51b512ac19e0a8b8,http://dx.doi.org/10.1007/978-0-387-26336-6_64 3465,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,amar cheema,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3466,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,peter leszczyc,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3467,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,rajesh bagchi,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3468,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,richard bagozzi,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3469,Hybrid CDN–P2P networks (HCDNs) combine Peer to Peer (P2P) networks and Content Delivery Networks (CDN) to benefit from their complementary advantages. In order to enable a traditional CDN to offer hybrid content delivery service we introduce a resource scheduling mechanism to perform the request routing process and determine the desired level of contribution for users. The proposed mechanism relies on a truthful profit maximizing envy-free auction to optimize contributions of the end-users in P2P content delivery. Based on the proposed solution economics of content delivery in the HCDN are studied and it is shown that through our resource scheduling mechanism it is possible to serve a big fraction of end-users with higher quality content increase the net profit of the HCDN provider and decrease expenditures of the content provider simultaneously.,morteza analoui,Not available,2016.0,10.1007/s10922-015-9359-3,Journal of Network and Systems Management,Mehran2016,False,,Springer,Not available,Envy-Free Resource Allocation and Request Routing in Hybrid CDN–P2P Networks,c35ba2b32c142ce49653308f1c4e4747,http://dx.doi.org/10.1007/s10922-015-9359-3 3470,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,james cox,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3471,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,utpal dholakia,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3472,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,eric greenleaf,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3473,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,amit pazgal,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3474,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,michael rothkopf,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3475,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,michael shen,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3476,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,shyam sunder,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3477,With increasing numbers of consumers in auction marketplaces we highlight some recent approaches that bring additional economic social and psychological factors to bear on existing economic theory to better understand and explain consumers' behavior in auctions. We also highlight specific research streams that could contribute towards enriching existing economic models of bidding behavior in emerging market mechanisms.,robert zeithammer,Not available,2005.0,10.1007/s11002-005-5901-5,Marketing Letters,Amar2005,False,,Springer,Not available,Economics Psychology and Social Dynamics of Consumer Bidding in Auctions,e254b233a9e1282f21f2424827701c67,http://dx.doi.org/10.1007/s11002-005-5901-5 3478,This paper offers interpretations and applications of the “fear of ruin” coefficient (Aumann and Kurz 1977 ,jerome foncel,Not available,2005.0,10.1007/s11166-005-5104-8,Journal of Risk and Uncertainty,Jérôme2005,False,,Springer,Not available,Fear of Ruin,eb57879636c84e5f82be1ade7534e775,http://dx.doi.org/10.1007/s11166-005-5104-8 3479,This paper offers interpretations and applications of the “fear of ruin” coefficient (Aumann and Kurz 1977 ,nicolas treich,Not available,2005.0,10.1007/s11166-005-5104-8,Journal of Risk and Uncertainty,Jérôme2005,False,,Springer,Not available,Fear of Ruin,eb57879636c84e5f82be1ade7534e775,http://dx.doi.org/10.1007/s11166-005-5104-8 3480,Different types of position auctions are considered. A position auction is a mechanism for the allocation of advertising space in search engine results to a user-defined query. Advertisers make bids they are willing to pay the search engine for a click to their website. The search engine determines whose advertisements will get to the page and in what position based on the bids of all the advertisers. Different types of such auctions are discussed using the example of the Yandex search engine based on the Vickrey–Clarke–Grovesmechanism. The main result is a formalization of the concept of an auction with two-stage ranking and its balance test.,n. blinov,Not available,2016.0,10.3103/S0278641916040026,Moscow University Computational Mathematics and Cybernetics,G.2016,False,,Springer,Not available,Theoretical game analysis of position auctions according to the Vickrey–Clarke–Groves mechanism with two-stage ranking,de043351d02df3bde11106e50d712416,http://dx.doi.org/10.3103/S0278641916040026 3481,This paper considers a uniform-price auction in which each of ,indranil chakraborty,Not available,2005.0,10.1007/s00199-004-0549-6,Economic Theory,Indranil2005,False,,Springer,Not available,Asymptotic prices in uniform-price multi-unit auctions,c52e281884c622e50a7007d90e8f2e8d,http://dx.doi.org/10.1007/s00199-004-0549-6 3482,This paper considers a uniform-price auction in which each of ,richard engelbrecht-wiggans,Not available,2005.0,10.1007/s00199-004-0549-6,Economic Theory,Indranil2005,False,,Springer,Not available,Asymptotic prices in uniform-price multi-unit auctions,c52e281884c622e50a7007d90e8f2e8d,http://dx.doi.org/10.1007/s00199-004-0549-6 3483,The combinatorial auction problem can be modeled as a weighted set packing problem. Similarly the reverse combinatorial auction can be modeled as a weighted set covering problem. We use the set packing and set covering formulations to suggest novel iterative Dutch auction algorithms for combinatorial auction problems. We use generalized Vickrey auctions (GVA) with reserve prices in each iteration. We prove the convergence of the algorithms and show that the solutions obtained using the algorithms lie within provable worst case bounds. We conduct numerical experiments to show that in general the solutions obtained using these algorithms are much better than the theoretical bounds.,shantanu biswas,Not available,2005.0,10.1007/s10472-005-4687-8,Annals of Mathematics and Artificial Intelligence,Shantanu2005,False,,Springer,Not available,Iterative Dutch combinatorial auctions,2b8edbb709ea63e60de5a33d2d211884,http://dx.doi.org/10.1007/s10472-005-4687-8 3484,The combinatorial auction problem can be modeled as a weighted set packing problem. Similarly the reverse combinatorial auction can be modeled as a weighted set covering problem. We use the set packing and set covering formulations to suggest novel iterative Dutch auction algorithms for combinatorial auction problems. We use generalized Vickrey auctions (GVA) with reserve prices in each iteration. We prove the convergence of the algorithms and show that the solutions obtained using the algorithms lie within provable worst case bounds. We conduct numerical experiments to show that in general the solutions obtained using these algorithms are much better than the theoretical bounds.,y. narahari,Not available,2005.0,10.1007/s10472-005-4687-8,Annals of Mathematics and Artificial Intelligence,Shantanu2005,False,,Springer,Not available,Iterative Dutch combinatorial auctions,2b8edbb709ea63e60de5a33d2d211884,http://dx.doi.org/10.1007/s10472-005-4687-8 3485,In this paper we investigate a model of a combinatorial procurement multi-attribute auction in which each sales item is defined by several attributes called quality the buyer is the auctioneer (e.g. a government) and the sellers are the bidders. Furthermore there exist multiple items and both buyer and sellers can have arbitrary (e.g. substitutable/complementary) preferences on a bundle of items. Our goal is to develop a protocol that is strategy-proof for sellers. We first present a VickreyClarkeGroves (VCG)-type protocol. As in a standard combinatorial auction a VCG-type protocol is not false-name-proof i.e. it is vulnerable against manipulations using multiple identifiers. Next we show that any strategy-proof protocol in this model can be represented as a framework called Price-Oriented Rationing-Free (PORF) protocol in which for each bidder for each bundle of items and for each quality the payment for the bidder is determined independently of his own declaration and the bidder can obtain a bundle that maximizes his utility independently of the allocations of other bidders. We develop a false-name-proof protocol in this model.,takayuki suyama,Not available,2005.0,10.1007/s10458-005-0983-2,Autonomous Agents and Multi-Agent Systems,Takayuki2005,False,,Springer,Not available,Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction,b651e545eae030311097a54cc4334111,http://dx.doi.org/10.1007/s10458-005-0983-2 3486,In this paper we investigate a model of a combinatorial procurement multi-attribute auction in which each sales item is defined by several attributes called quality the buyer is the auctioneer (e.g. a government) and the sellers are the bidders. Furthermore there exist multiple items and both buyer and sellers can have arbitrary (e.g. substitutable/complementary) preferences on a bundle of items. Our goal is to develop a protocol that is strategy-proof for sellers. We first present a VickreyClarkeGroves (VCG)-type protocol. As in a standard combinatorial auction a VCG-type protocol is not false-name-proof i.e. it is vulnerable against manipulations using multiple identifiers. Next we show that any strategy-proof protocol in this model can be represented as a framework called Price-Oriented Rationing-Free (PORF) protocol in which for each bidder for each bundle of items and for each quality the payment for the bidder is determined independently of his own declaration and the bidder can obtain a bundle that maximizes his utility independently of the allocations of other bidders. We develop a false-name-proof protocol in this model.,makoto yokoo,Not available,2005.0,10.1007/s10458-005-0983-2,Autonomous Agents and Multi-Agent Systems,Takayuki2005,False,,Springer,Not available,Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction,b651e545eae030311097a54cc4334111,http://dx.doi.org/10.1007/s10458-005-0983-2 3487,In the auctions analyzed to this point we have assumed that there is only one seller and many bidders in which the seller acts as a monopolist (,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_6,Understanding Auctions,Asunción2015,False,,Springer,Not available,Double Auctions,cc30c42b28b9154ecd5abd2ed1f238b8,http://dx.doi.org/10.1007/978-3-319-08813-6_6 3488,In the auctions analyzed to this point we have assumed that there is only one seller and many bidders in which the seller acts as a monopolist (,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_6,Understanding Auctions,Asunción2015,False,,Springer,Not available,Double Auctions,cc30c42b28b9154ecd5abd2ed1f238b8,http://dx.doi.org/10.1007/978-3-319-08813-6_6 3489,Recently in this online business environment there are magnificent advancement and growth of online auction representatively in eBay. The cause of this advancement is a kind of consumer experience that the excitement of winning a product is happier rather than simply buying it. In relation to these situations there are many business models about online auction process. These studies were not based on actual data and focused mostly on individual cases and specific factors including the starting price of a transaction the bidder number bidder and seller behavior in the auction market and the online auction strategy. This fragmented approach made understanding the whole picture of online auctions difficult. Also there is no study addressing online auction from the perspective of the communication between bid-takers and bid-makers in which informational influence plays an important role. To fill this gap this study takes a holistic view by defining the online auction process as an integrated persuasion process. We are going to study Argument quality and Peripheral cues that make an Auction deal successful in eBay and we got the sold data from the web crawling in eBay so that we analyzed what factors make an Auction deal successful in eBay. As a result auction success is strong the affects of the central route than peripheral route. Our findings provide additional insights in design for internet auction system and offers findings based on actual auction data that can be compared with those of the modeling approach.,min ko,Not available,2015.0,10.1007/978-3-319-19857-6_32,Intelligent Decision Technologies,Jung2015,False,,Springer,Not available,Argument Quality or Peripheral Cues: What Makes an Auction Deal Successful in eBay?,0bf117838dc439d4316bea7db3a38285,http://dx.doi.org/10.1007/978-3-319-19857-6_32 3490,Recently in this online business environment there are magnificent advancement and growth of online auction representatively in eBay. The cause of this advancement is a kind of consumer experience that the excitement of winning a product is happier rather than simply buying it. In relation to these situations there are many business models about online auction process. These studies were not based on actual data and focused mostly on individual cases and specific factors including the starting price of a transaction the bidder number bidder and seller behavior in the auction market and the online auction strategy. This fragmented approach made understanding the whole picture of online auctions difficult. Also there is no study addressing online auction from the perspective of the communication between bid-takers and bid-makers in which informational influence plays an important role. To fill this gap this study takes a holistic view by defining the online auction process as an integrated persuasion process. We are going to study Argument quality and Peripheral cues that make an Auction deal successful in eBay and we got the sold data from the web crawling in eBay so that we analyzed what factors make an Auction deal successful in eBay. As a result auction success is strong the affects of the central route than peripheral route. Our findings provide additional insights in design for internet auction system and offers findings based on actual auction data that can be compared with those of the modeling approach.,yong kim,Not available,2015.0,10.1007/978-3-319-19857-6_32,Intelligent Decision Technologies,Jung2015,False,,Springer,Not available,Argument Quality or Peripheral Cues: What Makes an Auction Deal Successful in eBay?,0bf117838dc439d4316bea7db3a38285,http://dx.doi.org/10.1007/978-3-319-19857-6_32 3491,During the last years all-pay auctions have been established as a new type of online auctions. They differ from common auctions like eBay as making a fee-based tender will increase the remaining auction time slightly and the item’s price by only a single cent. These so called penny auctions end when the auction time expires resulting in the majority of the bidders losing their stake.However various countries considered this trend to be dangerous due to its uncertain outcome hence providing penny auctions has been prohibited. Furthermore the question whether all-pay auctions must be assumed being gambling games has been discussed by scientists as well. For matching different argumentations concerning empirical evidence and statistics we propose an approach of using multi-agent systems for evaluating penny auctions. By using software agents for the representation of competing bidders pursuing different strategies the simulation of distinct scenarios for identifying potentially dominant strategies is provided.,fabian lorig,Not available,2014.0,10.1007/978-3-319-11584-9_3,Multiagent System Technologies,Fabian2014,False,,Springer,Not available,Evaluating Strategies for Penny Auctions Using Multi-Agent Systems,38dae1a9bd7410b90edddcee222537bf,http://dx.doi.org/10.1007/978-3-319-11584-9_3 3492,In Chap. ,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_5,Understanding Auctions,Asunción2015,False,,Springer,Not available,Sequential and Simultaneous Auctions,b813fd963ab7dec2c8e07d7cd2b10105,http://dx.doi.org/10.1007/978-3-319-08813-6_5 3493,In Chap. ,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_5,Understanding Auctions,Asunción2015,False,,Springer,Not available,Sequential and Simultaneous Auctions,b813fd963ab7dec2c8e07d7cd2b10105,http://dx.doi.org/10.1007/978-3-319-08813-6_5 3494,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,maya larson,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3495,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,wei li,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3496,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,chunqiang hu,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3497,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,ruinian li,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3498,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,xiuzhen cheng,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3499,Due to the popularity of auction mechanisms in real-world applications and the increase in the awareness of securing private information auctions are in dire need of bid-privacy protection. In this paper we deliberately design a secure multi-unit sealed-bid first-price auction scheme in which the auction is processed on the bidders’ encrypted bids by the server and the final output is only known by the auctioneer. As a result neither the auctioneer nor the server can obtain the full information of the bidders. What’s more the auctioneer can verify whether a winner pays its full payment in the auction. Finally a comprehensive analysis on the performance of our auction mechanism is conducted.,rongfang bie,Not available,2015.0,10.1007/978-3-319-21837-3_29,Wireless Algorithms Systems and Applications,Maya2015,False,,Springer,Not available,A Secure Multi-unit Sealed First-Price Auction Mechanism,ad1440a2512f8bd9913dd9a80d5b527e,http://dx.doi.org/10.1007/978-3-319-21837-3_29 3500,Credit spreads provide information about implied default probabilities and recovery rates. Trying to extract both parameters simultaneously from market data is challenging due to identifiability issues. We review existing default models with stochastic recovery rates and try calibrating them to observed credit spreads. We discuss the mechanisms of credit auctions and compare implied recoveries with realized auction results in the example of Allied Irish Banks (AIB).,stephan hocht,Not available,2015.0,10.1007/978-3-319-09114-3_9,Innovations in Quantitative Risk Management,Stephan2015,True,,Springer,Not available,Implied Recovery Rates—Auctions and Models,af9d5a537bb07a822af7e543e0e68db3,http://dx.doi.org/10.1007/978-3-319-09114-3_9 3501,Credit spreads provide information about implied default probabilities and recovery rates. Trying to extract both parameters simultaneously from market data is challenging due to identifiability issues. We review existing default models with stochastic recovery rates and try calibrating them to observed credit spreads. We discuss the mechanisms of credit auctions and compare implied recoveries with realized auction results in the example of Allied Irish Banks (AIB).,matthias kunze,Not available,2015.0,10.1007/978-3-319-09114-3_9,Innovations in Quantitative Risk Management,Stephan2015,True,,Springer,Not available,Implied Recovery Rates—Auctions and Models,af9d5a537bb07a822af7e543e0e68db3,http://dx.doi.org/10.1007/978-3-319-09114-3_9 3502,During the last years all-pay auctions have been established as a new type of online auctions. They differ from common auctions like eBay as making a fee-based tender will increase the remaining auction time slightly and the item’s price by only a single cent. These so called penny auctions end when the auction time expires resulting in the majority of the bidders losing their stake.However various countries considered this trend to be dangerous due to its uncertain outcome hence providing penny auctions has been prohibited. Furthermore the question whether all-pay auctions must be assumed being gambling games has been discussed by scientists as well. For matching different argumentations concerning empirical evidence and statistics we propose an approach of using multi-agent systems for evaluating penny auctions. By using software agents for the representation of competing bidders pursuing different strategies the simulation of distinct scenarios for identifying potentially dominant strategies is provided.,matthias graf,Not available,2014.0,10.1007/978-3-319-11584-9_3,Multiagent System Technologies,Fabian2014,False,,Springer,Not available,Evaluating Strategies for Penny Auctions Using Multi-Agent Systems,38dae1a9bd7410b90edddcee222537bf,http://dx.doi.org/10.1007/978-3-319-11584-9_3 3503,Credit spreads provide information about implied default probabilities and recovery rates. Trying to extract both parameters simultaneously from market data is challenging due to identifiability issues. We review existing default models with stochastic recovery rates and try calibrating them to observed credit spreads. We discuss the mechanisms of credit auctions and compare implied recoveries with realized auction results in the example of Allied Irish Banks (AIB).,matthias scherer,Not available,2015.0,10.1007/978-3-319-09114-3_9,Innovations in Quantitative Risk Management,Stephan2015,True,,Springer,Not available,Implied Recovery Rates—Auctions and Models,af9d5a537bb07a822af7e543e0e68db3,http://dx.doi.org/10.1007/978-3-319-09114-3_9 3504,In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However to further encourage participants to use the system one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.,tassos dimitriou,Not available,2015.0,10.1007/978-3-319-24018-3_2,Information Security Theory and Practice,Tassos2015,False,,Springer,Not available,Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing,db6be875531414d1275dc7f798269a07,http://dx.doi.org/10.1007/978-3-319-24018-3_2 3505,In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However to further encourage participants to use the system one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.,ioannis krontiris,Not available,2015.0,10.1007/978-3-319-24018-3_2,Information Security Theory and Practice,Tassos2015,False,,Springer,Not available,Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing,db6be875531414d1275dc7f798269a07,http://dx.doi.org/10.1007/978-3-319-24018-3_2 3506,Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values ,richard cole,Not available,2015.0,10.1007/978-3-662-48995-6_18,Web and Internet Economics,Richard2015,False,,Springer,Not available,Applications of ,35bf6b877addb95d520f7a9cf5718683,http://dx.doi.org/10.1007/978-3-662-48995-6_18 3507,Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values ,shravas rao,Not available,2015.0,10.1007/978-3-662-48995-6_18,Web and Internet Economics,Richard2015,False,,Springer,Not available,Applications of ,35bf6b877addb95d520f7a9cf5718683,http://dx.doi.org/10.1007/978-3-662-48995-6_18 3508,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,atilla bektas,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 3509,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,mehmet kiraz,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 3510,Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use many countries perform those auctions manually. Since all the bids are transferred to the system in clear form confidentiality and privacy are not guaranteed. Therefore the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system it is possible to determine the winner or the winners without revealing any private information. In this work we propose a new secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation secret sharing and threshold homomorphic cryptosystem.,osmanbey uzunkol,Not available,2015.0,10.1007/978-3-319-21356-9_9,Cryptography and Information Security in the Balkans,Atilla2015,False,,Springer,Not available,A Secure and Efficient Protocol for Electronic Treasury Auctions,6e7783100c9bce41cb8c4740b37ff742,http://dx.doi.org/10.1007/978-3-319-21356-9_9 3511,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,xuejun li,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 3512,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,xiangjun liu,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 3513,During the last years all-pay auctions have been established as a new type of online auctions. They differ from common auctions like eBay as making a fee-based tender will increase the remaining auction time slightly and the item’s price by only a single cent. These so called penny auctions end when the auction time expires resulting in the majority of the bidders losing their stake.However various countries considered this trend to be dangerous due to its uncertain outcome hence providing penny auctions has been prohibited. Furthermore the question whether all-pay auctions must be assumed being gambling games has been discussed by scientists as well. For matching different argumentations concerning empirical evidence and statistics we propose an approach of using multi-agent systems for evaluating penny auctions. By using software agents for the representation of competing bidders pursuing different strategies the simulation of distinct scenarios for identifying potentially dominant strategies is provided.,steffen walter,Not available,2014.0,10.1007/978-3-319-11584-9_3,Multiagent System Technologies,Fabian2014,False,,Springer,Not available,Evaluating Strategies for Penny Auctions Using Multi-Agent Systems,38dae1a9bd7410b90edddcee222537bf,http://dx.doi.org/10.1007/978-3-319-11584-9_3 3514,The reverse auction method is widely applied to resource allocation for cloud workflow systems and it dynamically allocates resources depending on the supply and demand of market. However during the auction the price of cloud resource is usually fixed and the resource allocation mechanism cannot adapt to the changeful market. This results in low efficiency of resource utility. In this paper we first propose a dynamic pricing strategy in reverse auction and then present an efficient resource allocation mechanism based on dynamic pricing reverse auction. During the auction providers change resource price according to the trade situation so that the novel mechanism can increase chances of making a deal and improve efficiency of resource utility. In addition providers improve their competitiveness by lowering price. Simultaneously users are timelier to get resources with the increasing of trade rate. Therefore users can obtain cheaper resources in shorter time which decrease monetary cost and completion time for workflow execution. The experiments show that our mechanism can achieve better results in resource utility monetary cost and completion time compared to BOSS algorithm.,erzhou zhu,Not available,2015.0,10.1007/978-3-319-19509-4_5,Asia Pacific Business Process Management,Xuejun2015,False,,Springer,Not available,An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems,47d6f4dbea5aa03485c54c1d92a282f8,http://dx.doi.org/10.1007/978-3-319-19509-4_5 3515,A generalised bidding model is developed to calculate a bidder’s expected profit and auctioners expected revenue/payment for both a General Independent Value and Independent Private Value (IPV) ,martin skitmore,Not available,2014.0,10.1057/jors.2013.163,Journal of the Operational Research Society,Martin2014,False,,Springer,Not available," ",2171f0a63fcd7a6d67a7fbde2d8892d8,http://dx.doi.org/10.1057/jors.2013.163 3516,We analyze minimization algorithms called the two-phase algorithms for L,kazuo murota,Not available,2017.0,10.1007/s13160-017-0246-z,Japan Journal of Industrial and Applied Mathematics,Kazuo2017,False,,Springer,Not available,Note on time bounds of two-phase algorithms for L-convex function minimization,7e0397faf893026eb52e6cbd58e9baa6,http://dx.doi.org/10.1007/s13160-017-0246-z 3517,We analyze minimization algorithms called the two-phase algorithms for L,akiyoshi shioura,Not available,2017.0,10.1007/s13160-017-0246-z,Japan Journal of Industrial and Applied Mathematics,Kazuo2017,False,,Springer,Not available,Note on time bounds of two-phase algorithms for L-convex function minimization,7e0397faf893026eb52e6cbd58e9baa6,http://dx.doi.org/10.1007/s13160-017-0246-z 3518,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,bjorn bartling,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 3519,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,tobias gesche,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 3520,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,nick netzer,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 3521,Mobile crowd sensing has become an effective approach to meet the demand in large scale sensing applications. In mobile crowd sensing applications incentive mechanisms are necessary to compensate the resource consumptions and manual efforts of smartphone users. In this paper we focus on exploring budget feasible frameworks for a novel and practical mobile crowd sensing scenario where the platform expects to maximize the continuous time interval coverage under budget constraint. We present the system model and formulate the budget feasible maximum continuous time duration problem for this scenario. We design two budget feasible frameworks: BFF-STI and BFF-BTI and integrate MST as the truthful mechanism to maximize the social efficiency. Then we extend the budget feasible frameworks to the general case in which each user can bid multiple time intervals simultaneously. We show the proposed budget feasible frameworks are computationally efficient individually rational truthful and budget feasible. Through extensive simulations we demonstrate that our budget feasible frameworks are efficient with different parameter settings. The simulation results also show that BFF-STI has superiority in large scale mobile crowd sensing applications while BFF-STI is more suitable for long-term sensing applications.,jia xu,Not available,2017.0,10.1007/s11276-016-1244-9,Wireless Networks,Jia2017,False,,Springer,Not available,Incentivize maximum continuous time interval coverage under budget constraint in mobile crowd sensing,c9887883fdd61a6f66bbb21bb8bfc4f0,http://dx.doi.org/10.1007/s11276-016-1244-9 3522,Mobile crowd sensing has become an effective approach to meet the demand in large scale sensing applications. In mobile crowd sensing applications incentive mechanisms are necessary to compensate the resource consumptions and manual efforts of smartphone users. In this paper we focus on exploring budget feasible frameworks for a novel and practical mobile crowd sensing scenario where the platform expects to maximize the continuous time interval coverage under budget constraint. We present the system model and formulate the budget feasible maximum continuous time duration problem for this scenario. We design two budget feasible frameworks: BFF-STI and BFF-BTI and integrate MST as the truthful mechanism to maximize the social efficiency. Then we extend the budget feasible frameworks to the general case in which each user can bid multiple time intervals simultaneously. We show the proposed budget feasible frameworks are computationally efficient individually rational truthful and budget feasible. Through extensive simulations we demonstrate that our budget feasible frameworks are efficient with different parameter settings. The simulation results also show that BFF-STI has superiority in large scale mobile crowd sensing applications while BFF-STI is more suitable for long-term sensing applications.,jinxin xiang,Not available,2017.0,10.1007/s11276-016-1244-9,Wireless Networks,Jia2017,False,,Springer,Not available,Incentivize maximum continuous time interval coverage under budget constraint in mobile crowd sensing,c9887883fdd61a6f66bbb21bb8bfc4f0,http://dx.doi.org/10.1007/s11276-016-1244-9 3523,Mobile crowd sensing has become an effective approach to meet the demand in large scale sensing applications. In mobile crowd sensing applications incentive mechanisms are necessary to compensate the resource consumptions and manual efforts of smartphone users. In this paper we focus on exploring budget feasible frameworks for a novel and practical mobile crowd sensing scenario where the platform expects to maximize the continuous time interval coverage under budget constraint. We present the system model and formulate the budget feasible maximum continuous time duration problem for this scenario. We design two budget feasible frameworks: BFF-STI and BFF-BTI and integrate MST as the truthful mechanism to maximize the social efficiency. Then we extend the budget feasible frameworks to the general case in which each user can bid multiple time intervals simultaneously. We show the proposed budget feasible frameworks are computationally efficient individually rational truthful and budget feasible. Through extensive simulations we demonstrate that our budget feasible frameworks are efficient with different parameter settings. The simulation results also show that BFF-STI has superiority in large scale mobile crowd sensing applications while BFF-STI is more suitable for long-term sensing applications.,yanxu li,Not available,2017.0,10.1007/s11276-016-1244-9,Wireless Networks,Jia2017,False,,Springer,Not available,Incentivize maximum continuous time interval coverage under budget constraint in mobile crowd sensing,c9887883fdd61a6f66bbb21bb8bfc4f0,http://dx.doi.org/10.1007/s11276-016-1244-9 3524,During the last years all-pay auctions have been established as a new type of online auctions. They differ from common auctions like eBay as making a fee-based tender will increase the remaining auction time slightly and the item’s price by only a single cent. These so called penny auctions end when the auction time expires resulting in the majority of the bidders losing their stake.However various countries considered this trend to be dangerous due to its uncertain outcome hence providing penny auctions has been prohibited. Furthermore the question whether all-pay auctions must be assumed being gambling games has been discussed by scientists as well. For matching different argumentations concerning empirical evidence and statistics we propose an approach of using multi-agent systems for evaluating penny auctions. By using software agents for the representation of competing bidders pursuing different strategies the simulation of distinct scenarios for identifying potentially dominant strategies is provided.,ingo timm,Not available,2014.0,10.1007/978-3-319-11584-9_3,Multiagent System Technologies,Fabian2014,False,,Springer,Not available,Evaluating Strategies for Penny Auctions Using Multi-Agent Systems,38dae1a9bd7410b90edddcee222537bf,http://dx.doi.org/10.1007/978-3-319-11584-9_3 3525,This comment revisits Chung and Ely (Rev Econ Stud 74:447–476 ,tilman borgers,Not available,2017.0,10.1007/s10058-017-0201-0,Review of Economic Design,Tilman2017,False,,Springer,Not available,(No) Foundations of dominant-strategy mechanisms: a comment on Chung and Ely (2007),84e95da465554eaf973785117e70210f,http://dx.doi.org/10.1007/s10058-017-0201-0 3526,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,rishi sharma,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 3527,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,kishore thapliyal,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 3528,A feasible secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol the set of all (,anirban pathak,Not available,2017.0,10.1007/s11128-017-1620-0,Quantum Information Processing,Dutt2017,False,,Springer,Not available,Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement,bda6f6aeccc73107fd195f7a3b72a6d5,http://dx.doi.org/10.1007/s11128-017-1620-0 3529,We consider the optimal pricing problem for a model of the rich media advertisement market that has other related applications. Our model differs from traditional position auctions in that we consider buyers whose demand might be multiple ,xiaotie deng,Not available,2017.0,10.1007/s10458-016-9335-7,Autonomous Agents and Multi-Agent Systems,Xiaotie2017,False,,Springer,Not available,Pricing ad slots with consecutive multi-unit demand,44d4997d253ed9c521dbd27568075ac9,http://dx.doi.org/10.1007/s10458-016-9335-7 3530,We consider the optimal pricing problem for a model of the rich media advertisement market that has other related applications. Our model differs from traditional position auctions in that we consider buyers whose demand might be multiple ,paul goldberg,Not available,2017.0,10.1007/s10458-016-9335-7,Autonomous Agents and Multi-Agent Systems,Xiaotie2017,False,,Springer,Not available,Pricing ad slots with consecutive multi-unit demand,44d4997d253ed9c521dbd27568075ac9,http://dx.doi.org/10.1007/s10458-016-9335-7 3531,We consider the optimal pricing problem for a model of the rich media advertisement market that has other related applications. Our model differs from traditional position auctions in that we consider buyers whose demand might be multiple ,yang sun,Not available,2017.0,10.1007/s10458-016-9335-7,Autonomous Agents and Multi-Agent Systems,Xiaotie2017,False,,Springer,Not available,Pricing ad slots with consecutive multi-unit demand,44d4997d253ed9c521dbd27568075ac9,http://dx.doi.org/10.1007/s10458-016-9335-7 3532,We consider the optimal pricing problem for a model of the rich media advertisement market that has other related applications. Our model differs from traditional position auctions in that we consider buyers whose demand might be multiple ,bo tang,Not available,2017.0,10.1007/s10458-016-9335-7,Autonomous Agents and Multi-Agent Systems,Xiaotie2017,False,,Springer,Not available,Pricing ad slots with consecutive multi-unit demand,44d4997d253ed9c521dbd27568075ac9,http://dx.doi.org/10.1007/s10458-016-9335-7 3533,We consider the optimal pricing problem for a model of the rich media advertisement market that has other related applications. Our model differs from traditional position auctions in that we consider buyers whose demand might be multiple ,jinshan zhang,Not available,2017.0,10.1007/s10458-016-9335-7,Autonomous Agents and Multi-Agent Systems,Xiaotie2017,False,,Springer,Not available,Pricing ad slots with consecutive multi-unit demand,44d4997d253ed9c521dbd27568075ac9,http://dx.doi.org/10.1007/s10458-016-9335-7 3534,This paper explores the market structures of natural gas and electricity as well as the interdependence of natural gas prices and bids with increasing reliance on natural gas as the penetration of renewable energy resources increases in order to complement their intermittencies. In particular the paper will attempt to answer the following two questions: What could the generation mix look like in 2030 with a renewable-rich generation landscape and how could this impact gas prices? How do gas-fired generator (GFG) generation volatility their prices and their bids for gas change between 2015 and 2030 with increased penetration of renewables? In order to answer these questions computational models are derived using forecasting and regression analysis tools and an auction model.,neha nandakumar,Not available,2017.0,10.1007/s40565-017-0292-1,Journal of Modern Power Systems and Clean Energy,Neha2017,True,,Springer,Not available,Impact of increased renewables on natural gas markets in eastern United States,93391c43e9b1c116a700f05d633acc28,http://dx.doi.org/10.1007/s40565-017-0292-1 3535,"This chapter examines the role of business-to-business electronic reverse auctions (eRAs) one tool in the armoury of e-purchasing used by businesses including retailers. It tracks the development of this particular technology through the hype cycle and presents some propositions to maximise the use of eRAs as an effective e-purchasing tool. It also explains the damaging effect of the early negative perceptions and underlines the difficulty in overcoming them. ",rana tassabehji,Not available,2014.0,10.1007/978-3-319-06121-4_4,E-commerce Platform Acceptance,Rana2014,False,,Springer,Not available,Electronic Reverse Auctions: Emerging from the Shadows?,376d03258652905263ce00852e304e9e,http://dx.doi.org/10.1007/978-3-319-06121-4_4 3536,This paper explores the market structures of natural gas and electricity as well as the interdependence of natural gas prices and bids with increasing reliance on natural gas as the penetration of renewable energy resources increases in order to complement their intermittencies. In particular the paper will attempt to answer the following two questions: What could the generation mix look like in 2030 with a renewable-rich generation landscape and how could this impact gas prices? How do gas-fired generator (GFG) generation volatility their prices and their bids for gas change between 2015 and 2030 with increased penetration of renewables? In order to answer these questions computational models are derived using forecasting and regression analysis tools and an auction model.,anuradha annaswamy,Not available,2017.0,10.1007/s40565-017-0292-1,Journal of Modern Power Systems and Clean Energy,Neha2017,True,,Springer,Not available,Impact of increased renewables on natural gas markets in eastern United States,93391c43e9b1c116a700f05d633acc28,http://dx.doi.org/10.1007/s40565-017-0292-1 3537,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,munawwar sohul,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3538,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,miao yao,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3539,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,abdallah abdallah,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3540,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,matt carrick,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3541,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,vuk marojevic,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3542,Spectrum sharing has emerged as a promising solution to address the radio frequency spectrum bottleneck. The FCC has recently proposed a spectrum sharing framework that introduces a spectrum access system as the governing entity that manages access to spectrum for primary and secondary users to coexist. An important aspect of dynamic spectrum management is the pricing of spectrum from the perspective of both the primary and secondary users. Existing auction-based spectrum sharing models do not take into consideration an important aspect of successful secondary user operation: the duration of the available spectrum opportunity. In this paper we propose an auction-based spectrum sharing framework that statistically accounts for the accuracy of the estimates of spectrum availability duration. The proposed auctioning process allows both the PU and the SU to iteratively adjust their evaluation about the available spectrum opportunities over time and to achieve a price combination that maximizes their objectives. A method is proposed to statistically assure spectrum availability supplementing the reporting method. Hidden Markov models and non-stationary hidden Markov models are used to estimate the activity of the spectrum with simulation results showing high prediction accuracy.,jeffrey reed,Not available,2017.0,10.1007/s10470-017-0932-4,Analog Integrated Circuits and Signal Processing,M.2017,False,,Springer,Not available,Quality of service assurance-based auction for spectrum sharing systems,bdd06b6c7b27f5226ee9a40bcd47a2cc,http://dx.doi.org/10.1007/s10470-017-0932-4 3543,A powerful algorithmic technique for truthful mechanism design is the maximal-in-distributional-range (MIDR) paradigm. Unfortunately many such algorithms use heavy algorithmic machinery e.g. the ellipsoid method and (approximate) solution of convex programs. In this paper we present a correlated rounding technique for designing mechanisms that are truthful in expectation. It is elementary and can be implemented quickly. The main property we rely on is that the domain offers fractional optimum solutions with a tree structure. In auctions based on the generalized assignment problem each bidder has a publicly known knapsack constraint that captures the subsets of items that are of value to him. He has a private valuation for each item and strives to maximize the value of assigned items minus payment. For this domain we design a truthful 2-approximate MIDR mechanism for social welfare maximization. It avoids using the ellipsoid method or convex programming. In contrast to some previous work our mechanism achieves exact truthfulness. In restricted-related scheduling with selfish machines each job comes with a public weight and it must be assigned to a machine from a public job-specific subset. Each machine has a private speed and strives to maximize payments minus workload of jobs assigned to it. Here we design a mechanism for makespan minimization. This is a single-parameter domain but the approximation status of the optimization problem is similar to unrelated machine scheduling: The best known algorithm obtains a (non-truthful) 2-approximation for unrelated machines and there is 1.5-hardness. Our mechanism matches this bound with a truthful 2-approximation.,yossi azar,Not available,2017.0,10.1007/s10107-016-1068-5,Mathematical Programming,Yossi2017,False,,Springer,Not available,Truthful mechanism design via correlated tree rounding,a74f0c92b99412db3b0841518ee58114,http://dx.doi.org/10.1007/s10107-016-1068-5 3544,A powerful algorithmic technique for truthful mechanism design is the maximal-in-distributional-range (MIDR) paradigm. Unfortunately many such algorithms use heavy algorithmic machinery e.g. the ellipsoid method and (approximate) solution of convex programs. In this paper we present a correlated rounding technique for designing mechanisms that are truthful in expectation. It is elementary and can be implemented quickly. The main property we rely on is that the domain offers fractional optimum solutions with a tree structure. In auctions based on the generalized assignment problem each bidder has a publicly known knapsack constraint that captures the subsets of items that are of value to him. He has a private valuation for each item and strives to maximize the value of assigned items minus payment. For this domain we design a truthful 2-approximate MIDR mechanism for social welfare maximization. It avoids using the ellipsoid method or convex programming. In contrast to some previous work our mechanism achieves exact truthfulness. In restricted-related scheduling with selfish machines each job comes with a public weight and it must be assigned to a machine from a public job-specific subset. Each machine has a private speed and strives to maximize payments minus workload of jobs assigned to it. Here we design a mechanism for makespan minimization. This is a single-parameter domain but the approximation status of the optimization problem is similar to unrelated machine scheduling: The best known algorithm obtains a (non-truthful) 2-approximation for unrelated machines and there is 1.5-hardness. Our mechanism matches this bound with a truthful 2-approximation.,martin hoefer,Not available,2017.0,10.1007/s10107-016-1068-5,Mathematical Programming,Yossi2017,False,,Springer,Not available,Truthful mechanism design via correlated tree rounding,a74f0c92b99412db3b0841518ee58114,http://dx.doi.org/10.1007/s10107-016-1068-5 3545,A powerful algorithmic technique for truthful mechanism design is the maximal-in-distributional-range (MIDR) paradigm. Unfortunately many such algorithms use heavy algorithmic machinery e.g. the ellipsoid method and (approximate) solution of convex programs. In this paper we present a correlated rounding technique for designing mechanisms that are truthful in expectation. It is elementary and can be implemented quickly. The main property we rely on is that the domain offers fractional optimum solutions with a tree structure. In auctions based on the generalized assignment problem each bidder has a publicly known knapsack constraint that captures the subsets of items that are of value to him. He has a private valuation for each item and strives to maximize the value of assigned items minus payment. For this domain we design a truthful 2-approximate MIDR mechanism for social welfare maximization. It avoids using the ellipsoid method or convex programming. In contrast to some previous work our mechanism achieves exact truthfulness. In restricted-related scheduling with selfish machines each job comes with a public weight and it must be assigned to a machine from a public job-specific subset. Each machine has a private speed and strives to maximize payments minus workload of jobs assigned to it. Here we design a mechanism for makespan minimization. This is a single-parameter domain but the approximation status of the optimization problem is similar to unrelated machine scheduling: The best known algorithm obtains a (non-truthful) 2-approximation for unrelated machines and there is 1.5-hardness. Our mechanism matches this bound with a truthful 2-approximation.,idan maor,Not available,2017.0,10.1007/s10107-016-1068-5,Mathematical Programming,Yossi2017,False,,Springer,Not available,Truthful mechanism design via correlated tree rounding,a74f0c92b99412db3b0841518ee58114,http://dx.doi.org/10.1007/s10107-016-1068-5 3546,An auction is a simple way of selling and buying goods. Modern auction protocols often rely on complex cryptographic operations to ensure manifold security properties such as bidder-anonymity or bid-privacy non-repudiation fairness or public verifiability of the result. This makes them difficult to understand for users who are not experts in cryptography. We propose two physical auction protocols inspired by Sako’s cryptographic auction protocol. In contrast to Sako’s protocol they do not rely on cryptographic operations but on physical properties of the manipulated mechanical objects to ensure the desired security properties. The first protocol only uses standard office material whereas the second uses a special wooden box. We validate the security of our solutions using ProVerif.,jannik dreier,Not available,2014.0,10.1007/978-3-319-07890-8_14,Fun with Algorithms,Jannik2014,False,,Springer,Not available,Secure Auctions without Cryptography,43de61343109d349780f51c0a1b919d9,http://dx.doi.org/10.1007/978-3-319-07890-8_14 3547,A powerful algorithmic technique for truthful mechanism design is the maximal-in-distributional-range (MIDR) paradigm. Unfortunately many such algorithms use heavy algorithmic machinery e.g. the ellipsoid method and (approximate) solution of convex programs. In this paper we present a correlated rounding technique for designing mechanisms that are truthful in expectation. It is elementary and can be implemented quickly. The main property we rely on is that the domain offers fractional optimum solutions with a tree structure. In auctions based on the generalized assignment problem each bidder has a publicly known knapsack constraint that captures the subsets of items that are of value to him. He has a private valuation for each item and strives to maximize the value of assigned items minus payment. For this domain we design a truthful 2-approximate MIDR mechanism for social welfare maximization. It avoids using the ellipsoid method or convex programming. In contrast to some previous work our mechanism achieves exact truthfulness. In restricted-related scheduling with selfish machines each job comes with a public weight and it must be assigned to a machine from a public job-specific subset. Each machine has a private speed and strives to maximize payments minus workload of jobs assigned to it. Here we design a mechanism for makespan minimization. This is a single-parameter domain but the approximation status of the optimization problem is similar to unrelated machine scheduling: The best known algorithm obtains a (non-truthful) 2-approximation for unrelated machines and there is 1.5-hardness. Our mechanism matches this bound with a truthful 2-approximation.,rebecca reiffenhauser,Not available,2017.0,10.1007/s10107-016-1068-5,Mathematical Programming,Yossi2017,False,,Springer,Not available,Truthful mechanism design via correlated tree rounding,a74f0c92b99412db3b0841518ee58114,http://dx.doi.org/10.1007/s10107-016-1068-5 3548,A powerful algorithmic technique for truthful mechanism design is the maximal-in-distributional-range (MIDR) paradigm. Unfortunately many such algorithms use heavy algorithmic machinery e.g. the ellipsoid method and (approximate) solution of convex programs. In this paper we present a correlated rounding technique for designing mechanisms that are truthful in expectation. It is elementary and can be implemented quickly. The main property we rely on is that the domain offers fractional optimum solutions with a tree structure. In auctions based on the generalized assignment problem each bidder has a publicly known knapsack constraint that captures the subsets of items that are of value to him. He has a private valuation for each item and strives to maximize the value of assigned items minus payment. For this domain we design a truthful 2-approximate MIDR mechanism for social welfare maximization. It avoids using the ellipsoid method or convex programming. In contrast to some previous work our mechanism achieves exact truthfulness. In restricted-related scheduling with selfish machines each job comes with a public weight and it must be assigned to a machine from a public job-specific subset. Each machine has a private speed and strives to maximize payments minus workload of jobs assigned to it. Here we design a mechanism for makespan minimization. This is a single-parameter domain but the approximation status of the optimization problem is similar to unrelated machine scheduling: The best known algorithm obtains a (non-truthful) 2-approximation for unrelated machines and there is 1.5-hardness. Our mechanism matches this bound with a truthful 2-approximation.,berthold vocking,Not available,2017.0,10.1007/s10107-016-1068-5,Mathematical Programming,Yossi2017,False,,Springer,Not available,Truthful mechanism design via correlated tree rounding,a74f0c92b99412db3b0841518ee58114,http://dx.doi.org/10.1007/s10107-016-1068-5 3549,This paper constructs a novel equilibrium in the chopstick auction of Szentes and Rosenthal (Games Econ Behav 44(1):114–133 ,christian ewerhart,Not available,2017.0,10.1007/s00199-017-1052-1,Economic Theory,Christian2017,True,,Springer,Not available,A “fractal” solution to the chopstick auction,d9e947300ceb02518dbb8d3e8b307c1c,http://dx.doi.org/10.1007/s00199-017-1052-1 3550,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,qi tang,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 3551,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,xu-hua lv,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 3552,In this paper a shill bidding regulatory game model is designed which considers the cost factor and detection accuracy at the same time and quantifies these two factors base on literature [1]. It analyzed the possible decision behaviors of regulator and seller’s decision under the interdependence case and the mixed Nash equilibrium problem. It obtained the optimal penalty factor analytic by building the game and researching the strategies between regulatory authorities and sellers according to which the regulatory authorities punish the sellers using the shill bidding.,li-li chen,Not available,2015.0,10.2991/978-94-6239-100-0_23,Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014),Qi2015,False,,Springer,Not available,Study of Fraud Behaviors in Online Auction Based on Game Theory,41c93f5b549c91ca3c3cb8bb57beeeea,http://dx.doi.org/10.2991/978-94-6239-100-0_23 3553,In this paper we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO,mireille bossy,Not available,2015.0,10.1007/978-1-4939-2733-3_13,Commodities Energy and Environmental Finance,Mireille2015,False,,Springer,Not available,Game Theory Analysis for Carbon Auction Market Through Electricity Market Coupling,aa989ed20593cd51f72a5a05451ec864,http://dx.doi.org/10.1007/978-1-4939-2733-3_13 3554,In this paper we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO,nadia maizi,Not available,2015.0,10.1007/978-1-4939-2733-3_13,Commodities Energy and Environmental Finance,Mireille2015,False,,Springer,Not available,Game Theory Analysis for Carbon Auction Market Through Electricity Market Coupling,aa989ed20593cd51f72a5a05451ec864,http://dx.doi.org/10.1007/978-1-4939-2733-3_13 3555,In this paper we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO,odile pourtallier,Not available,2015.0,10.1007/978-1-4939-2733-3_13,Commodities Energy and Environmental Finance,Mireille2015,False,,Springer,Not available,Game Theory Analysis for Carbon Auction Market Through Electricity Market Coupling,aa989ed20593cd51f72a5a05451ec864,http://dx.doi.org/10.1007/978-1-4939-2733-3_13 3556,The joint problems of channel and power allocation in multi-cell MIMO-OFDM based cognitive radio networks is addressed in this work. More specifically a repeated auction is proposed for the resource allocation problem in which secondary users (SUs) share the primary spectrum under the interference constraints of primary users (PUs). With the inter-cell interference and mutual interference between PUs and SUs the resource allocation problem is formulated as a non-convex optimization problem. Auction performs well in solving non-convex problems therefore the interference auction is proposed. Moreover with the theoretical analysis of equilibrium an implementation algorithm for the auction is developed and the convergence is proved. Simulation results show that the interference auction obtains a good spectrum efficiency improvement and a rapid convergence rate.,mehdi adian,Not available,2015.0,10.1007/s11277-014-2007-5,Wireless Personal Communications,Ghamari2015,False,,Springer,Not available,An Auction Based Approach for Resource Allocation in Multi-Cell MIMO-OFDM Based Cognitive Radio Networks,c22ae01dc2264254149056417a146b6c,http://dx.doi.org/10.1007/s11277-014-2007-5 3557,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,hai yu,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 3558,An auction is a simple way of selling and buying goods. Modern auction protocols often rely on complex cryptographic operations to ensure manifold security properties such as bidder-anonymity or bid-privacy non-repudiation fairness or public verifiability of the result. This makes them difficult to understand for users who are not experts in cryptography. We propose two physical auction protocols inspired by Sako’s cryptographic auction protocol. In contrast to Sako’s protocol they do not rely on cryptographic operations but on physical properties of the manipulated mechanical objects to ensure the desired security properties. The first protocol only uses standard office material whereas the second uses a special wooden box. We validate the security of our solutions using ProVerif.,hugo jonker,Not available,2014.0,10.1007/978-3-319-07890-8_14,Fun with Algorithms,Jannik2014,False,,Springer,Not available,Secure Auctions without Cryptography,43de61343109d349780f51c0a1b919d9,http://dx.doi.org/10.1007/978-3-319-07890-8_14 3559,The joint problems of channel and power allocation in multi-cell MIMO-OFDM based cognitive radio networks is addressed in this work. More specifically a repeated auction is proposed for the resource allocation problem in which secondary users (SUs) share the primary spectrum under the interference constraints of primary users (PUs). With the inter-cell interference and mutual interference between PUs and SUs the resource allocation problem is formulated as a non-convex optimization problem. Auction performs well in solving non-convex problems therefore the interference auction is proposed. Moreover with the theoretical analysis of equilibrium an implementation algorithm for the auction is developed and the convergence is proved. Simulation results show that the interference auction obtains a good spectrum efficiency improvement and a rapid convergence rate.,hassan aghaeinia,Not available,2015.0,10.1007/s11277-014-2007-5,Wireless Personal Communications,Ghamari2015,False,,Springer,Not available,An Auction Based Approach for Resource Allocation in Multi-Cell MIMO-OFDM Based Cognitive Radio Networks,c22ae01dc2264254149056417a146b6c,http://dx.doi.org/10.1007/s11277-014-2007-5 3560,We study optimal bidder collusion in an independent private value first-price auction with two bidders and two possible valuations. There is a benevolent center that knows the bidders’ valuations and sends private signals to the bidders in order to maximize their expected payoffs. After receiving their signals bidders compete in a standard first-price auction that is without side payments or bid restrictions. We find that to improve on the bidders’ payoffs the signals must depend upon the valuations. If the bidders’ signals are restricted to be non-correlated (depend only on the opponent’s valuation) then the bidders’ payoffs are strictly higher than the larger possible set of signals. If the signals are restricted to be perfectly correlated (public) only two possible signals are needed to achieve the highest bidder payoffs. However these payoffs can be improved upon if the two signals are allowed to be imperfectly correlated.,helmuts azacis,Not available,2015.0,10.1007/s00199-013-0778-7,Economic Theory,Helmuts2015,False,,Springer,Not available,Collusive communication schemes in a first-price auction,082fc5d2b735474a87122cc7743ff6b0,http://dx.doi.org/10.1007/s00199-013-0778-7 3561,We study optimal bidder collusion in an independent private value first-price auction with two bidders and two possible valuations. There is a benevolent center that knows the bidders’ valuations and sends private signals to the bidders in order to maximize their expected payoffs. After receiving their signals bidders compete in a standard first-price auction that is without side payments or bid restrictions. We find that to improve on the bidders’ payoffs the signals must depend upon the valuations. If the bidders’ signals are restricted to be non-correlated (depend only on the opponent’s valuation) then the bidders’ payoffs are strictly higher than the larger possible set of signals. If the signals are restricted to be perfectly correlated (public) only two possible signals are needed to achieve the highest bidder payoffs. However these payoffs can be improved upon if the two signals are allowed to be imperfectly correlated.,peter vida,Not available,2015.0,10.1007/s00199-013-0778-7,Economic Theory,Helmuts2015,False,,Springer,Not available,Collusive communication schemes in a first-price auction,082fc5d2b735474a87122cc7743ff6b0,http://dx.doi.org/10.1007/s00199-013-0778-7 3562,This chapter discusses the standard single-unit auctions: ascending (English) descending (Dutch) first-price sealed-bid and second-price sealed-bid. Advantages disadvantages and distinguishing features of each format are described. Furthermore equivalences among them are mentioned. The final section is devoted to the Revenue Equivalence Theorem which states that under certain assumptions the four auction formats yield the same expected revenue to the seller. The implications of relaxing each assumption are also shown.,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_2,Understanding Auctions,Asunción2015,False,,Springer,Not available,Standard Single-Unit Auctions,ab8a80a62d6bc531d81c211bcd8cfc15,http://dx.doi.org/10.1007/978-3-319-08813-6_2 3563,This chapter discusses the standard single-unit auctions: ascending (English) descending (Dutch) first-price sealed-bid and second-price sealed-bid. Advantages disadvantages and distinguishing features of each format are described. Furthermore equivalences among them are mentioned. The final section is devoted to the Revenue Equivalence Theorem which states that under certain assumptions the four auction formats yield the same expected revenue to the seller. The implications of relaxing each assumption are also shown.,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_2,Understanding Auctions,Asunción2015,False,,Springer,Not available,Standard Single-Unit Auctions,ab8a80a62d6bc531d81c211bcd8cfc15,http://dx.doi.org/10.1007/978-3-319-08813-6_2 3564,In the previous chapter we studied the four standard single-unit auctions. However the seller has multiple options when designing an auction. In this chapter we examine other single-unit models such as hybrid auctions (Anglo-Dutch and Dutch–English auctions) auctions with different pricing rules (third-price or average price) auctions with different closing rules and all-pay auctions. The chapter ends with the definition of optimal and efficient auctions.,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_3,Understanding Auctions,Asunción2015,False,,Springer,Not available,Other Single-Unit Auctions,57168bf0aa0a2c9872500bd61ea43bda,http://dx.doi.org/10.1007/978-3-319-08813-6_3 3565,In the previous chapter we studied the four standard single-unit auctions. However the seller has multiple options when designing an auction. In this chapter we examine other single-unit models such as hybrid auctions (Anglo-Dutch and Dutch–English auctions) auctions with different pricing rules (third-price or average price) auctions with different closing rules and all-pay auctions. The chapter ends with the definition of optimal and efficient auctions.,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_3,Understanding Auctions,Asunción2015,False,,Springer,Not available,Other Single-Unit Auctions,57168bf0aa0a2c9872500bd61ea43bda,http://dx.doi.org/10.1007/978-3-319-08813-6_3 3566,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg [,yurii nesterov,Not available,2015.0,10.1007/978-3-662-48433-3_29,Algorithmic Game Theory,Yurii2015,False,,Springer,Not available,Brief Announcement: Computation of Fisher-Gale Equilibrium by Auction,2bcaae25b1f2026c02b6ce2d397154e5,http://dx.doi.org/10.1007/978-3-662-48433-3_29 3567,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg [,vladimir shikhman,Not available,2015.0,10.1007/978-3-662-48433-3_29,Algorithmic Game Theory,Yurii2015,False,,Springer,Not available,Brief Announcement: Computation of Fisher-Gale Equilibrium by Auction,2bcaae25b1f2026c02b6ce2d397154e5,http://dx.doi.org/10.1007/978-3-662-48433-3_29 3568,No doubt you are familiar with eBay. But are you also aware of quotatis. de or my-hammer.de? Individuals or even companies can announce their need for services there. Exactly as in eBay those interested bid in an auction. However this is a ,gregor berz,Not available,2015.0,10.1057/9781137475428_3,Game Theory Bargaining and Auction Strategies,Gregor2015,False,,Springer,Not available,Auctions,d57f5420c6905ceaa5531488552448f4,http://dx.doi.org/10.1057/9781137475428_3 3569,An auction is a simple way of selling and buying goods. Modern auction protocols often rely on complex cryptographic operations to ensure manifold security properties such as bidder-anonymity or bid-privacy non-repudiation fairness or public verifiability of the result. This makes them difficult to understand for users who are not experts in cryptography. We propose two physical auction protocols inspired by Sako’s cryptographic auction protocol. In contrast to Sako’s protocol they do not rely on cryptographic operations but on physical properties of the manipulated mechanical objects to ensure the desired security properties. The first protocol only uses standard office material whereas the second uses a special wooden box. We validate the security of our solutions using ProVerif.,pascal lafourcade,Not available,2014.0,10.1007/978-3-319-07890-8_14,Fun with Algorithms,Jannik2014,False,,Springer,Not available,Secure Auctions without Cryptography,43de61343109d349780f51c0a1b919d9,http://dx.doi.org/10.1007/978-3-319-07890-8_14 3570,A company got the idea of purchasing janitorial services for all of its 22 locations across Germany by calling for bids. Until then each location had normally signed contracts with local providers of janitorial services. But there are a few large service providers who promise very professional service throughout Germany. The idea was to negotiate a much better price for janitorial services at all locations by calling for bids for a one-year contract. The order was worth several million euros.,gregor berz,Not available,2015.0,10.1057/9781137475428_9,Game Theory Bargaining and Auction Strategies,Gregor2015,False,,Springer,Not available,Disruptive Factors in Auctions,b0bce9071304055c84069e4d6f1b3f13,http://dx.doi.org/10.1057/9781137475428_9 3571,Auctions are procedures for selling one or more items to one or more bidders. Auctions induce games among the bidders so notions of equilibrium from game theory can be applied to auctions. Auction theory aims to characterize and compare the equilibrium outcomes for different types of auctions. Combinatorial auctions arise when multiple-related items are sold simultaneously.,bruce hajek,Not available,2015.0,10.1007/978-1-4471-5058-9_36,Encyclopedia of Systems and Control,Bruce2015,False,,Springer,Not available,Auctions,66556758bdbf9ba2f725359ded547ce5,http://dx.doi.org/10.1007/978-1-4471-5058-9_36 3572,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,ricardo fernandez-blanco,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 3573,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,jose arroyo,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 3574,This paper describes the application of bilevel programming to a class of real-life problems in the field of electric power systems. Within the context of electricity markets market-clearing procedures i.e. auction models are used by an independent entity to schedule generation offers and consumption bids as well as to determine market-clearing prices. This paper addresses a mathematically challenging type of auction denoted as price-based market clearing wherein as a distinctive feature market-clearing prices are explicitly incorporated in the formulation of the optimization process. This paper shows that bilevel programming provides a suitable modeling framework for price-based market clearing. Furthermore based on practical modeling aspects an equivalent single-level primal-dual transformation into a mixed-integer program can be implemented. Such transformation relies on the application of duality theory of linear programming. The bilevel programming framework for price-based market clearing is applied to a revenue-constrained auction model similar to those used in several European electricity markets. As a major contribution bilinear terms associated with both generation revenue constraints and the duality-based transformation are equivalently converted into linear forms with no additional binary variables. Simulation results show the effective performance of the proposed approach and its superiority over current industry practice.,natalia alguacil,Not available,2015.0,10.1007/s13675-015-0037-8,EURO Journal on Computational Optimization,Ricardo2015,False,,Springer,Not available,Bilevel programming for price-based electricity auctions: a revenue-constrained case,c52170f205b080760bfc564874fc4acb,http://dx.doi.org/10.1007/s13675-015-0037-8 3575,We consider a general auction market model with divisible commodities and price functions of participants and show that it can be suitable for proper description of complex systems with active elements. Using its equivalent variational inequality reformulation we obtain a general existence result under mild additional conditions on price functions. We show that the basic network flow equilibrium problems are particular cases of this auction market model. Besides we describe a new auction based model for resource allocation problems in wireless communication networks. This enables us to obtain new existence results for these models as simple adjustments of that for the general auction model.,i. konnov,Not available,2015.0,10.1007/s11066-015-9095-6,NETNOMICS: Economic Research and Electronic Networking,V.2015,False,,Springer,Not available,On auction equilibrium models with network applications,ad5b977e9e75d7154184513b71fbb739,http://dx.doi.org/10.1007/s11066-015-9095-6 3576,An auctioneer wishes to sell several heterogeneous indivisible items to a group of potential bidders. Each bidder has valuations over the items but may face a budget constraint and therefore be unable to pay up to his values. In such markets a Walrasian equilibrium may fail to exist. We develop a novel dynamic auction and prove that the auction always finds a core allocation. In the auction prices that have been increased can be later decreased if they have become too high. The core allocation consists of an assignment of the items and its associated supporting price vector achieves Pareto efficiency and is robust against the threat of deviation by any coalition of market participants.,a. talman,Not available,2015.0,10.1007/s00182-014-0454-6,International Journal of Game Theory,J.2015,False,,Springer,Not available,An efficient multi-item dynamic auction with budget constrained bidders,b05f76ce0d0cad825d04d56f3f9aa143,http://dx.doi.org/10.1007/s00182-014-0454-6 3577,An auctioneer wishes to sell several heterogeneous indivisible items to a group of potential bidders. Each bidder has valuations over the items but may face a budget constraint and therefore be unable to pay up to his values. In such markets a Walrasian equilibrium may fail to exist. We develop a novel dynamic auction and prove that the auction always finds a core allocation. In the auction prices that have been increased can be later decreased if they have become too high. The core allocation consists of an assignment of the items and its associated supporting price vector achieves Pareto efficiency and is robust against the threat of deviation by any coalition of market participants.,zaifu yang,Not available,2015.0,10.1007/s00182-014-0454-6,International Journal of Game Theory,J.2015,False,,Springer,Not available,An efficient multi-item dynamic auction with budget constrained bidders,b05f76ce0d0cad825d04d56f3f9aa143,http://dx.doi.org/10.1007/s00182-014-0454-6 3578,We study the following TV ad placement problem: ,xiangzhong xiang,Not available,2015.0,10.1007/s10878-014-9754-9,Journal of Combinatorial Optimization,Xiangzhong2015,False,,Springer,Not available,Prompt mechanism for online auctions with multi-unit demands,77892d27173825ec57e87088653ca485,http://dx.doi.org/10.1007/s10878-014-9754-9 3579,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",ayoub alsarhan,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 3580,This paper presents models for predicted click-through rates in position auctions that take into account the externalities ads shown in other positions may impose on the probability that an ad in a particular position receives a click. We present a general axiomatic methodology for how click probabilities are affected by the qualities of the ads in the other positions and illustrate that using these axioms will increase revenue as long as higher quality ads tend to be ranked ahead of lower quality ads. We also present appropriate algorithms for selecting the optimal allocation of ads when predicted click-through rates are governed by a natural special case of this axiomatic model of externalities.,patrick hummel,Not available,2014.0,10.1007/978-3-319-13129-0_33,Web and Internet Economics,Patrick2014,False,,Springer,Not available,Position Auctions with Externalities,9424ae2a5f18aeea8acaac6c5cf1b4ec,http://dx.doi.org/10.1007/978-3-319-13129-0_33 3581,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",ahmad quttoum,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 3582,"The paradigm of spectrum trading has spontaneously prompted a wide interest in spectrum market where licensed users (primary users PUs) aim at efficiently share spectrum with unlicensed users (secondary users SUs). SUs pay PUs for radio resource usage. Spectrum pricing plays a pivotal role towards the success of spectrum trading. Most of the existing pricing schemes neglect service guarantees. Furthermore they use static pricing scheme where the price cannot respond quickly to the changes in the spectrum market. To overcome these problems we design dynamic auction where spectrum is periodically auctioned off to meet SUs demands over time. Our scheme determines the size of spectrum to be auctioned for each session. Performance evaluation of the proposed scheme shows the ability of our scheme to maximize the reported revenue for the PU under different spectrum market conditions.",mohammad bsoul,Not available,2015.0,10.1007/s11277-015-2458-3,Wireless Personal Communications,Ayoub2015,False,,Springer,Not available,Dynamic Auction for Revenue Maximization in Spectrum Market,216b77c5b453474d73c7c335023a395e,http://dx.doi.org/10.1007/s11277-015-2458-3 3583,Bidder asymmetries are common in certain auctions where heterogeneous bidders coexist. In this paper we employ the tool of majorization to study the effect of bidder asymmetry on revenue in second-price auctions. As a preorder on vectors of real components the majorization is used to rank the asymmetry of bid distributions from different auctions. Our analysis indicates that bidders’ asymmetries may raise revenue under certain classes of value distributions (e.g. proportional reversed hazard rate models) and may not in others (e.g. proportional hazard rate models). These results are further validated through supportive evidence that is based on simulated three-bidder auctions. The use of majorization allows us to extend and strengthen the results obtained in the existing literature under more general conditions. This study adds to the literature a useful analytical technique for future research on asymmetric auctions.,jihui chen,Not available,2015.0,10.1007/s12197-014-9286-2,Journal of Economics and Finance,Jihui2015,False,,Springer,Not available,Asymmetry and revenue in second-price auctions: a majorization approach,3446a089229675abdd88835751f98b73,http://dx.doi.org/10.1007/s12197-014-9286-2 3584,Bidder asymmetries are common in certain auctions where heterogeneous bidders coexist. In this paper we employ the tool of majorization to study the effect of bidder asymmetry on revenue in second-price auctions. As a preorder on vectors of real components the majorization is used to rank the asymmetry of bid distributions from different auctions. Our analysis indicates that bidders’ asymmetries may raise revenue under certain classes of value distributions (e.g. proportional reversed hazard rate models) and may not in others (e.g. proportional hazard rate models). These results are further validated through supportive evidence that is based on simulated three-bidder auctions. The use of majorization allows us to extend and strengthen the results obtained in the existing literature under more general conditions. This study adds to the literature a useful analytical technique for future research on asymmetric auctions.,maochao xu,Not available,2015.0,10.1007/s12197-014-9286-2,Journal of Economics and Finance,Jihui2015,False,,Springer,Not available,Asymmetry and revenue in second-price auctions: a majorization approach,3446a089229675abdd88835751f98b73,http://dx.doi.org/10.1007/s12197-014-9286-2 3585,With two bidders one strong and one weak the introduction of at least some degree of anonymous “pay-your-bid” in the payment rule of the second-price auction behoves any risk-neutral seller who while possibly efficiency minded cares about revenues. This can be achieved by adding to the winner’s payment a uniform proportion of his own bid as in Güth and van Damme’s auction or by having bidders receive a uniform proportion of the losing bid as in Goeree and Offerman’s Amsterdam auction or even by selling uniform toeholds to the bidders prior to the auction. We demonstrate one-to-one relations between the equilibria of these auctions and of first-price auctions. By assuming a power relation between the bidders’ value cumulative or decumulative functions we obtain explicit expressions for the first-order effects of the pay-your-bid rule.,bernard lebrun,Not available,2015.0,10.1007/s00199-014-0853-8,Economic Theory,Bernard2015,False,,Springer,Not available,Revenue-superior variants of the second-price auction,7c2ee3239046ad3bfc68fcff07e14ee6,http://dx.doi.org/10.1007/s00199-014-0853-8 3586,This paper examines an efficient market organization for awarding monopoly franchises to assure investment efficiency and revenue sufficiency under conditions of increasing returns. A two-stage auction design achieves ex ante and ex post efficiency by ensuring that the firm with the best technology will be selected and after winning the firm will operate at the least cost and price at the marginal cost. Priority-differentiated subscription service fosters self-revelation of demand functions and facilitates fixed cost recovery. With known demand functions a linear subscription price schedule based on the beneficiary-pay principle achieves efficient fixed cost recovery. With unknown demand functions a two-part subscription price menu based on nonlinear Ramsey pricing attains an incentive-compatible second-best result.,hung-po chao,Not available,2015.0,10.1007/s11149-015-9273-3,Journal of Regulatory Economics,Hung-po2015,False,,Springer,Not available,Two-stage auction and subscription pricing for awarding monopoly franchises,2cab60e9288b4d4b80bbe271d30b7b0a,http://dx.doi.org/10.1007/s11149-015-9273-3 3587,This article studies the optimal design of scoring auctions used in public and private procurement. In this auction each supplier’s offer consists of both price and quality and a supplier whose offer achieves the highest score wins. The environment we consider has the feature that quality is multidimensional and the cost complementarity or cost substitutability among quality attributes significantly affects the form of a scoring rule which implements the buyer’s optimal mechanism. Our results show that the optimal scoring rule can be additively separable in the quality attributes if the degree of cost substitutability between the attributes is nonpositive and it cannot be additively separable if the degree is sufficiently high. An example shows how to compute the buyer’s loss from using an additively separable scoring rule. We also investigate how the optimal scoring rule depends on the buyer’s weight parameter on suppliers’ profits and the number of suppliers.,takeshi nishimura,Not available,2015.0,10.1007/s10058-015-0169-6,Review of Economic Design,Takeshi2015,False,,Springer,Not available,Optimal design of scoring auctions with multidimensional quality,f735fc3f9fdfabcfa0795a1198385fe0,http://dx.doi.org/10.1007/s10058-015-0169-6 3588,I analyze an auction environment where two units of an object are sold at two simultaneous sealed-bid first-price auctions to bidders who have a one-dimensional type space where a type represents the value a bidder places on each of the two units. All bidders have an identical budget constraint that binds their ability to spend in the auctions. I show that if the valuation distribution is atom-less then there does not exist any equilibrium in behavioral strategies in this auction game.,gagan ghosh,Not available,2015.0,10.1007/s00182-014-0428-8,International Journal of Game Theory,Gagan2015,False,,Springer,Not available,Non-existence of equilibria in simultaneous auctions with a common budget-constraint,59afeaaaeb57bc441f532da72d56e5f1,http://dx.doi.org/10.1007/s00182-014-0428-8 3589,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,jack knetsch,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3590,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,fang-fang tang,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3591,This paper presents models for predicted click-through rates in position auctions that take into account the externalities ads shown in other positions may impose on the probability that an ad in a particular position receives a click. We present a general axiomatic methodology for how click probabilities are affected by the qualities of the ads in the other positions and illustrate that using these axioms will increase revenue as long as higher quality ads tend to be ranked ahead of lower quality ads. We also present appropriate algorithms for selecting the optimal allocation of ads when predicted click-through rates are governed by a natural special case of this axiomatic model of externalities.,r. mcafee,Not available,2014.0,10.1007/978-3-319-13129-0_33,Web and Internet Economics,Patrick2014,False,,Springer,Not available,Position Auctions with Externalities,9424ae2a5f18aeea8acaac6c5cf1b4ec,http://dx.doi.org/10.1007/978-3-319-13129-0_33 3592,The difference between people's valuations of gains and losses has been widely observed in both single trial and repeated trial experiments as well as in survey responses and in commonplace behavior. However the results of some Vickrey auction experiments indicate that the disparity may decrease or even disappear over repeated trials. This paper reports the results of two further repeated Vickrey auction experiments that test the impact of both a second price and a ninth price auction rule on valuations. Although valuations should be independent of this variation in the exchange price rule the manipulation had a dramatic impact on subjects' stated values of a common market good. The results suggest that the endowment effect remains robust over repeated trials and that contrary to common understanding the Vickrey auction may elicit differing demands dependent on the context of the valuation.,richard thaler,Not available,2001.0,10.1023/A:1013221421382,Experimental Economics,L.2001,False,,Springer,Not available,The Endowment Effect and Repeated Market Trials: Is the Vickrey Auction Demand Revealing?,966213c5ccc9ad659e47f5f83b432fb5,http://dx.doi.org/10.1023/A:1013221421382 3593,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,owen phillips,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3594,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,dale menkhaus,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3595,Auctions that require advance production increase seller costs because inventories must be held. This cost does not exist in production-to-demand markets for which production follows trading and sales exactly match quantities produced. Data from laboratory computerized double auction markets show that advance-production prices are significantly higher and quantities traded are significantly lower than they are in production-to-demand auctions. Price convergence patterns show advance-production sellers moving toward 9% higher prices and 22% greater earnings.,joseph krogmeier,Not available,2001.0,10.1023/A:1013269304544,Experimental Economics,R.2001,False,,Springer,Not available,Laboratory Behavior in Spot and Forward Auction Markets,49f611631d0e19965e3eb6661deb06e3,http://dx.doi.org/10.1023/A:1013269304544 3596,Individuals who use the World Wide Web (WWW) to purchase goods and obtain information face a high level of uncertainty as to the quality of those goods and information. Reputation management systems are one way in which information about past transactions can be used to form judgments regarding the quality of goods and information obtained via the WWW. This paper examines current approaches used in reputation management systems and outlines six main problems with them. The paper suggests how these problems can be solved and develops an equation that can handle many of the problems. Implications for practitioners and researchers are discussed.,ross malaga,Not available,2001.0,10.1023/A:1011557319152,Electronic Commerce Research,A.2001,False,,Springer,Not available,Web-Based Reputation Management Systems: Problems and Suggested Solutions,d51eec6d8c268d9e33008068ed77f0cd,http://dx.doi.org/10.1023/A:1011557319152 3597,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,james cox,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 3598,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,sam dinkin,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 3599,We develop and experimentally test a model of endogenous entry exit and bidding in common value auctions. The model and experimental design include an alternative profitable activity (a “safe haven”) that provides agent-specific opportunity costs of bidding in the auction. Each agent chooses whether to accept the safe haven income or forgo it in order to bid in the auction. Agents that enter the auction receive independently-drawn private signals that provide unbiased estimates of the common value. The auctioned item is allocated to the high bidder at a price that is equal to the high bid. Thus the market is a first-price sealed-bid common value auction with endogenous determination of market size.,james swarthout,Not available,2001.0,10.1023/A:1011432705173,Experimental Economics,C.2001,False,,Springer,Not available,Endogenous Entry and Exit in Common Value Auctions,f9684f92e735f6290d04a01519815ddd,http://dx.doi.org/10.1023/A:1011432705173 3600, Collusion is a serious problem in many procurement auctions. In this research I study a model of first price sealed bid procurement auctions with asymmetric bidders. I demonstrate that the equilibrium to the model is unique and describe three algorithms that can be used to compute the inverse equilibrium bid functions. I then use the computational algorithms to compare competitive and collusive bidding. The algorithms are useful for structural estimation of auction models and for assessing the damages from bid-rigging.,patrick bajari,Not available,2001.0,10.1007/PL00004128,Economic Theory,Patrick2001,False,,Springer,Not available,Comparing competition and collusion: a numerical approach,771240580dac70f6988e2e68e7fff103,http://dx.doi.org/10.1007/PL00004128 3601,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,jayant kalagnanam,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 3602,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,kevin hasker,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 3603,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,andrew davenport,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 3604,We investigate the computational complexity of clearing markets in a continuous call double auction. In the simplest case when any part of any bid can be matched with any part of any ask the market can be cleared optimally in log-linear time. We present two generalizations motivated by electronic marketplaces for the process industry where: (a) there exist assignment constraints on which bids can be matched with which asks and (b) where demand is indivisible. We show that clearing markets with assignment constraints can be solved efficiently using network flow algorithms. However clearing markets with indivisible demand with or without assignment constraints requires solving NP-hard optimization problems such as the generalized assignment problem the multiple knapsack problem and the bin packing problem.,ho lee,Not available,2001.0,10.1023/A:1011589804040,Electronic Commerce Research,R.2001,False,,Springer,Not available,Computational Aspects of Clearing Continuous Call Double Auctions with Assignment Constraints and Indivisible Demand,e7e09a66677524c097dd591b38a03962,http://dx.doi.org/10.1023/A:1011589804040 3605,Combinatorial auctions provide an important tool for mechanism design in multi-agent systems. When implemented they require to solve combinatorial optimization problems such as set packing and partitioning problems. We present in this paper an analysis of the complexity of the problem to assign bids to bidders in combinatorial auctions. We show that the case of identical assets can be solved in polynomial time. The case of non-identical assets is in its general version NP-hard. Extra structure like a complete ordering of assets or mild side conditions make the problem solvable. Finally we present an algorithm to solve small and medium sized instances in a limited time using standard software.,hoesel van,Not available,2001.0,10.1023/A:1009940607600,Netnomics,Stan2001,False,,Springer,Not available,Optimization in electronic markets: examples in combinatorial auctions,f2dae9724b4ae35364cc28d606ef1ee4,http://dx.doi.org/10.1023/A:1009940607600 3606,Combinatorial auctions provide an important tool for mechanism design in multi-agent systems. When implemented they require to solve combinatorial optimization problems such as set packing and partitioning problems. We present in this paper an analysis of the complexity of the problem to assign bids to bidders in combinatorial auctions. We show that the case of identical assets can be solved in polynomial time. The case of non-identical assets is in its general version NP-hard. Extra structure like a complete ordering of assets or mild side conditions make the problem solvable. Finally we present an algorithm to solve small and medium sized instances in a limited time using standard software.,rudolf muller,Not available,2001.0,10.1023/A:1009940607600,Netnomics,Stan2001,False,,Springer,Not available,Optimization in electronic markets: examples in combinatorial auctions,f2dae9724b4ae35364cc28d606ef1ee4,http://dx.doi.org/10.1023/A:1009940607600 3607, This paper characterizes the optimal and efficient mechanisms to allocate simultaneously two substitute tasks to two suppliers. Two main results emerge from this analysis. First even under some regularity conditions efficiency and optimality do not systematically coincide. Efficiency can always be achieved using some second price auctions which are optimal when both suppliers compete for the same task. When there is competition for different tasks the optimal production is distorted from efficiency over a nondegenerate interval of types so as to extract the full surplus over that interval. Second full extraction of the surplus may still guarantee incentive compatibility.,sarah parlane,Not available,2001.0,10.1007/PL00004120,Economic Theory,Sarah2001,False,,Springer,Not available,Contracting with capacity constrained suppliers,eeef01c82c5ddd77b60e2e8b1f29a297,http://dx.doi.org/10.1007/PL00004120 3608,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,arie segev,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 3609,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,carrie beam,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 3610,Online auctions are a profitable exciting and dynamic part of electronic commerce and behave in ways which do not match classical auction theory. This paper models an online auction in terms of a Markov chain on a state space defined by the current price of the item and the number of bidders who have been previously “bumped”. It provides a mathematical model some approximations which were necessary to convert it into a tractable problem and solutions to a small and a medium-sized theoretical auction. The model results were validated through a comparison with real-world online auction data showing promise as a predictor of final auction prices. The results of the auction model are also useful in solving an optimization problem that incorporates inventory management considerations in determining optimal auction size.,j. shanthikumar,Not available,2001.0,10.1023/A:1011411801246,Information Technology and Management,Arie2001,False,,Springer,Not available,Optimal Design of Internet-Based Auctions,1cbff07e9ccadb8869be04e99d3c61e0,http://dx.doi.org/10.1023/A:1011411801246 3611,In this paper we investigate the relationship betweencosts and number of bidders for U.K. local authorities'refuse collection contracts. We find that a highernumber of bids is associated with a lower cost ofservice. This finding as well as being an importantempirical verification of standard proposition inauction theory has important policy implications. TheU.K. Labour government elected in 1997 has abolishedCompulsory Competitive Tendering (CCT). Our findingsindicate that this would increase local authorities'expenditure in refuse collection.,andres gomez-lobo,Not available,2001.0,10.1023/A:1026545306923,Review of Industrial Organization,AndréS2001,False,,Springer,Not available,A Law of Large Numbers: Bidding and Compulsory Competitive Tendering for Refuse Collection Contracts,5a47674e5c57b1583679d8dac799c4c1,http://dx.doi.org/10.1023/A:1026545306923 3612,In this paper we investigate the relationship betweencosts and number of bidders for U.K. local authorities'refuse collection contracts. We find that a highernumber of bids is associated with a lower cost ofservice. This finding as well as being an importantempirical verification of standard proposition inauction theory has important policy implications. TheU.K. Labour government elected in 1997 has abolishedCompulsory Competitive Tendering (CCT). Our findingsindicate that this would increase local authorities'expenditure in refuse collection.,stefan szymanski,Not available,2001.0,10.1023/A:1026545306923,Review of Industrial Organization,AndréS2001,False,,Springer,Not available,A Law of Large Numbers: Bidding and Compulsory Competitive Tendering for Refuse Collection Contracts,5a47674e5c57b1583679d8dac799c4c1,http://dx.doi.org/10.1023/A:1026545306923 3613,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,bibo jiang,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 3614,Second chance offers in online marketplaces involve a seller conducting an auction for a single object and then using information from the auction to offer a losing bidder a take-it-or-leave-it price for another unit. We theoretically and experimentally investigate this practice and compare it to two sequential auctions. We show that the equilibrium bidding strategy in the second chance offer mechanism only exists in mixed strategies and we observe that this mechanism generates more profit for the auctioneer than two sequential auctions. We also observe virtually no rejections of profitable offers in the ultimatum bargaining stage.,timothy salmon,Not available,2008.0,10.1007/s00199-006-0147-x,Economic Theory,C.2008,False,,Springer,Not available,Second chance offers versus sequential auctions: theory and behavior,aaee08047048800ea7062c11322bdb54,http://dx.doi.org/10.1007/s00199-006-0147-x 3615,Second chance offers in online marketplaces involve a seller conducting an auction for a single object and then using information from the auction to offer a losing bidder a take-it-or-leave-it price for another unit. We theoretically and experimentally investigate this practice and compare it to two sequential auctions. We show that the equilibrium bidding strategy in the second chance offer mechanism only exists in mixed strategies and we observe that this mechanism generates more profit for the auctioneer than two sequential auctions. We also observe virtually no rejections of profitable offers in the ultimatum bargaining stage.,bart wilson,Not available,2008.0,10.1007/s00199-006-0147-x,Economic Theory,C.2008,False,,Springer,Not available,Second chance offers versus sequential auctions: theory and behavior,aaee08047048800ea7062c11322bdb54,http://dx.doi.org/10.1007/s00199-006-0147-x 3616,Real market institutions stock and commodity exchanges for example do not occur in isolation. Company stock is frequently listed on several stock exchanges allowing traders to potentially trade such stock in different markets. While there has been extensive research into agent-based trading in individual markets there is little work on agents that trade in such multiple market scenarios. Our work seeks to address this imbalance. Here we provide an initial analysis of the behavior of trading agents that are free to move between a number of parallel markets where markets are able to charge traders in a variety of ways. We show the movement of traders between markets sketch some adaptive strategies that markets may use to adjust charges evaluate the effectiveness of these strategies and give some results which show the effect of trader movement on properties of the markets.,jinzhong niu,Not available,2008.0,10.1007/978-3-540-88713-3_14,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Jinzhong2008,False,,Springer,Not available,On the Behavior of Competing Markets Populated by Automated Traders,e22280b7cd5b820534f02821dbc8f850,http://dx.doi.org/10.1007/978-3-540-88713-3_14 3617,Real market institutions stock and commodity exchanges for example do not occur in isolation. Company stock is frequently listed on several stock exchanges allowing traders to potentially trade such stock in different markets. While there has been extensive research into agent-based trading in individual markets there is little work on agents that trade in such multiple market scenarios. Our work seeks to address this imbalance. Here we provide an initial analysis of the behavior of trading agents that are free to move between a number of parallel markets where markets are able to charge traders in a variety of ways. We show the movement of traders between markets sketch some adaptive strategies that markets may use to adjust charges evaluate the effectiveness of these strategies and give some results which show the effect of trader movement on properties of the markets.,kai cai,Not available,2008.0,10.1007/978-3-540-88713-3_14,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Jinzhong2008,False,,Springer,Not available,On the Behavior of Competing Markets Populated by Automated Traders,e22280b7cd5b820534f02821dbc8f850,http://dx.doi.org/10.1007/978-3-540-88713-3_14 3618,Real market institutions stock and commodity exchanges for example do not occur in isolation. Company stock is frequently listed on several stock exchanges allowing traders to potentially trade such stock in different markets. While there has been extensive research into agent-based trading in individual markets there is little work on agents that trade in such multiple market scenarios. Our work seeks to address this imbalance. Here we provide an initial analysis of the behavior of trading agents that are free to move between a number of parallel markets where markets are able to charge traders in a variety of ways. We show the movement of traders between markets sketch some adaptive strategies that markets may use to adjust charges evaluate the effectiveness of these strategies and give some results which show the effect of trader movement on properties of the markets.,simon parsons,Not available,2008.0,10.1007/978-3-540-88713-3_14,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Jinzhong2008,False,,Springer,Not available,On the Behavior of Competing Markets Populated by Automated Traders,e22280b7cd5b820534f02821dbc8f850,http://dx.doi.org/10.1007/978-3-540-88713-3_14 3619,Real market institutions stock and commodity exchanges for example do not occur in isolation. Company stock is frequently listed on several stock exchanges allowing traders to potentially trade such stock in different markets. While there has been extensive research into agent-based trading in individual markets there is little work on agents that trade in such multiple market scenarios. Our work seeks to address this imbalance. Here we provide an initial analysis of the behavior of trading agents that are free to move between a number of parallel markets where markets are able to charge traders in a variety of ways. We show the movement of traders between markets sketch some adaptive strategies that markets may use to adjust charges evaluate the effectiveness of these strategies and give some results which show the effect of trader movement on properties of the markets.,elizabeth sklar,Not available,2008.0,10.1007/978-3-540-88713-3_14,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Jinzhong2008,False,,Springer,Not available,On the Behavior of Competing Markets Populated by Automated Traders,e22280b7cd5b820534f02821dbc8f850,http://dx.doi.org/10.1007/978-3-540-88713-3_14 3620,Sequential and simultaneous auctions are two important mechanisms for buying and selling multiple objects. The bidding behaviour for the former differs from the latter. Given this a key problem is to find the equilibrium bidding strategies for these two mechanisms. To this end we analyse the bidding behaviour for the following scenario. There are multiple objects for sale each object is sold in a separate auction and each bidder needs only one object. Furthermore each object has both common and private value components and bidders are ,shaheen fatima,Not available,2008.0,10.1007/978-3-540-77554-6_15,Negotiation Auctions and Market Engineering,S.2008,False,,Springer,Not available,Bidding Strategies for Multi-object Auctions,0aed1c4ae1fe1a2e4b2bb511cffe6c65,http://dx.doi.org/10.1007/978-3-540-77554-6_15 3621,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,ze-su cai,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3622,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,li-ning sun,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3623,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,hai-bo gao,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3624,Our paper utilizes semi-nonparametric and nonparametric methods to directly estimate consumer surplus in eBay computer monitor sales. We compare these with parametric estimates. We also develop a new measure of how competitive an auction is—the consumer share of surplus—and a new method to calculate these statistics. This distribution free methodology requires the assumption that the pool of potential bidders is constant across auctions but it is not sensitive to the upper tail and does not require estimating the underlying distribution of values.,robin sickles,Not available,2014.0,10.1007/978-1-4899-8008-3_4,Festschrift in Honor of Peter Schmidt,Kevin2014,False,,Springer,Not available,Estimating Consumer Surplus in eBay Computer Monitor Auctions,6feac3018c264e2a70b9332a362d97e7,http://dx.doi.org/10.1007/978-1-4899-8008-3_4 3625,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,pu-cheng zhou,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3626,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,song-hao piao,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3627,This paper mainly discusses the pursuit-evasion games in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process the auction mechanism in Economics was introduced and an improved task negotiation process based on Task Bundle Auction was proposed. It allocated task dynamically through Dynamic coalition formation of multiple robots. In this paper we propose the three possible coalition objectives and three different matrics of a multi-robot exploration and pursuit-evader. Based on these extensions a kind of multi-robot cooperative pursuit algorithm that allows fault injection dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.,qing-cheng huang,Not available,2008.0,10.1007/978-3-540-88513-9_26,Intelligent Robotics and Applications,Ze-Su2008,False,,Springer,Not available,Multi-robot Cooperative Pursuit Based on Task Bundle Auctions,d494aac92a226c4860e2ae0e1f9c90eb,http://dx.doi.org/10.1007/978-3-540-88513-9_26 3628,An e-market system is a concrete implementation of a market institution; it embeds one or more exchange mechanisms. E-market systems are also information systems which are information and communication technologies artifacts. This work puts forward an argument that the study of e-markets must incorporate both the behavioral economics as well as the information systems perspectives. To this end the paper proposes a conceptual framework that integrates the two. This framework is used to formulate a model which incorporates the essential features of exchange mechanisms as well as their implementations as is artefacts. The focus of attention is on two classes of mechanisms namely auctions and negotiations. They both may serve the same purpose and their various types have been embedded in many e-market systems.,gregory kersten,Not available,2008.0,10.1007/978-3-540-77554-6_2,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,On Comparison of Mechanisms of Economic and Social Exchanges: The Times Model,27eaf33b0120408c2feddec00e1e68fb,http://dx.doi.org/10.1007/978-3-540-77554-6_2 3629,An e-market system is a concrete implementation of a market institution; it embeds one or more exchange mechanisms. E-market systems are also information systems which are information and communication technologies artifacts. This work puts forward an argument that the study of e-markets must incorporate both the behavioral economics as well as the information systems perspectives. To this end the paper proposes a conceptual framework that integrates the two. This framework is used to formulate a model which incorporates the essential features of exchange mechanisms as well as their implementations as is artefacts. The focus of attention is on two classes of mechanisms namely auctions and negotiations. They both may serve the same purpose and their various types have been embedded in many e-market systems.,eva chen,Not available,2008.0,10.1007/978-3-540-77554-6_2,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,On Comparison of Mechanisms of Economic and Social Exchanges: The Times Model,27eaf33b0120408c2feddec00e1e68fb,http://dx.doi.org/10.1007/978-3-540-77554-6_2 3630,An e-market system is a concrete implementation of a market institution; it embeds one or more exchange mechanisms. E-market systems are also information systems which are information and communication technologies artifacts. This work puts forward an argument that the study of e-markets must incorporate both the behavioral economics as well as the information systems perspectives. To this end the paper proposes a conceptual framework that integrates the two. This framework is used to formulate a model which incorporates the essential features of exchange mechanisms as well as their implementations as is artefacts. The focus of attention is on two classes of mechanisms namely auctions and negotiations. They both may serve the same purpose and their various types have been embedded in many e-market systems.,dirk neumann,Not available,2008.0,10.1007/978-3-540-77554-6_2,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,On Comparison of Mechanisms of Economic and Social Exchanges: The Times Model,27eaf33b0120408c2feddec00e1e68fb,http://dx.doi.org/10.1007/978-3-540-77554-6_2 3631,An e-market system is a concrete implementation of a market institution; it embeds one or more exchange mechanisms. E-market systems are also information systems which are information and communication technologies artifacts. This work puts forward an argument that the study of e-markets must incorporate both the behavioral economics as well as the information systems perspectives. To this end the paper proposes a conceptual framework that integrates the two. This framework is used to formulate a model which incorporates the essential features of exchange mechanisms as well as their implementations as is artefacts. The focus of attention is on two classes of mechanisms namely auctions and negotiations. They both may serve the same purpose and their various types have been embedded in many e-market systems.,rustam vahidov,Not available,2008.0,10.1007/978-3-540-77554-6_2,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,On Comparison of Mechanisms of Economic and Social Exchanges: The Times Model,27eaf33b0120408c2feddec00e1e68fb,http://dx.doi.org/10.1007/978-3-540-77554-6_2 3632,An e-market system is a concrete implementation of a market institution; it embeds one or more exchange mechanisms. E-market systems are also information systems which are information and communication technologies artifacts. This work puts forward an argument that the study of e-markets must incorporate both the behavioral economics as well as the information systems perspectives. To this end the paper proposes a conceptual framework that integrates the two. This framework is used to formulate a model which incorporates the essential features of exchange mechanisms as well as their implementations as is artefacts. The focus of attention is on two classes of mechanisms namely auctions and negotiations. They both may serve the same purpose and their various types have been embedded in many e-market systems.,christof weinhardt,Not available,2008.0,10.1007/978-3-540-77554-6_2,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,On Comparison of Mechanisms of Economic and Social Exchanges: The Times Model,27eaf33b0120408c2feddec00e1e68fb,http://dx.doi.org/10.1007/978-3-540-77554-6_2 3633,Market engineering is the discipline of making markets work. It encompasses the use of legal frameworks economic mechanisms management science models and information and communication technologies for the purposes of: (i) designing and constructing forums where goods and services can be bought and sold and (ii) providing services associated with buying and selling. Against this background this paper sets out the need for a coherent and encompassing agenda in this area and highlights the key constituent building blocks.,henner gimpel,Not available,2008.0,10.1007/978-3-540-77554-6_1,Negotiation Auctions and Market Engineering,Henner2008,False,,Springer,Not available,Market Engineering: A Research Agenda,1e31f679df09c8a563331a1572225ac8,http://dx.doi.org/10.1007/978-3-540-77554-6_1 3634,Market engineering is the discipline of making markets work. It encompasses the use of legal frameworks economic mechanisms management science models and information and communication technologies for the purposes of: (i) designing and constructing forums where goods and services can be bought and sold and (ii) providing services associated with buying and selling. Against this background this paper sets out the need for a coherent and encompassing agenda in this area and highlights the key constituent building blocks.,nicholas jennings,Not available,2008.0,10.1007/978-3-540-77554-6_1,Negotiation Auctions and Market Engineering,Henner2008,False,,Springer,Not available,Market Engineering: A Research Agenda,1e31f679df09c8a563331a1572225ac8,http://dx.doi.org/10.1007/978-3-540-77554-6_1 3635,Given the string of bankruptcies of penny auction websites over the past two years we use empirical data to investigate whether QuiBids remains profitable. Although profitable on an auction-by-auction basis penny auction sites have problems retaining users. In order to alleviate this problem QuiBids has implemented a Buy-Now system in which losing bidders can contribute money they already lost in the auction towards the purchase of the item at a slightly inflated price. We find that QuiBids makes only limited profit after accounting for Buy-Now but is able to remain profitable due voucher bid pack auctions. We also show that a large proportion of QuiBids’ revenues come from experienced bidders suggesting that rules designed to promote consumer retention may be working as intended.,amy greenwald,Not available,2014.0,10.1007/978-3-319-13218-1_5,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Amy2014,False,,Springer,Not available,An Empirical Analysis of QuiBids’ Penny Auctions,52df170b6b4935bf86d1be9e7c4d2cd6,http://dx.doi.org/10.1007/978-3-319-13218-1_5 3636,Market engineering is the discipline of making markets work. It encompasses the use of legal frameworks economic mechanisms management science models and information and communication technologies for the purposes of: (i) designing and constructing forums where goods and services can be bought and sold and (ii) providing services associated with buying and selling. Against this background this paper sets out the need for a coherent and encompassing agenda in this area and highlights the key constituent building blocks.,gregory kersten,Not available,2008.0,10.1007/978-3-540-77554-6_1,Negotiation Auctions and Market Engineering,Henner2008,False,,Springer,Not available,Market Engineering: A Research Agenda,1e31f679df09c8a563331a1572225ac8,http://dx.doi.org/10.1007/978-3-540-77554-6_1 3637,Market engineering is the discipline of making markets work. It encompasses the use of legal frameworks economic mechanisms management science models and information and communication technologies for the purposes of: (i) designing and constructing forums where goods and services can be bought and sold and (ii) providing services associated with buying and selling. Against this background this paper sets out the need for a coherent and encompassing agenda in this area and highlights the key constituent building blocks.,axel ockenfels,Not available,2008.0,10.1007/978-3-540-77554-6_1,Negotiation Auctions and Market Engineering,Henner2008,False,,Springer,Not available,Market Engineering: A Research Agenda,1e31f679df09c8a563331a1572225ac8,http://dx.doi.org/10.1007/978-3-540-77554-6_1 3638,Market engineering is the discipline of making markets work. It encompasses the use of legal frameworks economic mechanisms management science models and information and communication technologies for the purposes of: (i) designing and constructing forums where goods and services can be bought and sold and (ii) providing services associated with buying and selling. Against this background this paper sets out the need for a coherent and encompassing agenda in this area and highlights the key constituent building blocks.,christof weinhardt,Not available,2008.0,10.1007/978-3-540-77554-6_1,Negotiation Auctions and Market Engineering,Henner2008,False,,Springer,Not available,Market Engineering: A Research Agenda,1e31f679df09c8a563331a1572225ac8,http://dx.doi.org/10.1007/978-3-540-77554-6_1 3639,In a dynamic market being able to update one’s value based on information available to ,florin constantin,Not available,2008.0,10.1007/978-3-540-88713-3_1,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Florin2008,False,,Springer,Not available,On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values,db89c7d67407807b2be50f7d342e5330,http://dx.doi.org/10.1007/978-3-540-88713-3_1 3640,In a dynamic market being able to update one’s value based on information available to ,david parkes,Not available,2008.0,10.1007/978-3-540-88713-3_1,Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis,Florin2008,False,,Springer,Not available,On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values,db89c7d67407807b2be50f7d342e5330,http://dx.doi.org/10.1007/978-3-540-88713-3_1 3641,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,gregory kersten,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 3642,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,ryszard kowalczyk,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 3643,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,hsiangchu lai,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 3644,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,dirk neumann,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 3645,Three distinct and interacting types of entities: people software agents and e-markets are considered in this paper. These entities operate within Shaman a proposed framework for the construction and operation of heterogeneous systems enabling business interactions such as auctions and negotiations between software and human agents across those systems. Shaman is a ,mohan chhetri,Not available,2008.0,10.1007/978-3-540-77554-6_9,Negotiation Auctions and Market Engineering,E.2008,False,,Springer,Not available,Shaman: Software and Human Agents in Multiattribute Auctions and Negotiations,3275a12212dda7f9f86dff19cafd7f5e,http://dx.doi.org/10.1007/978-3-540-77554-6_9 3646,Given the string of bankruptcies of penny auction websites over the past two years we use empirical data to investigate whether QuiBids remains profitable. Although profitable on an auction-by-auction basis penny auction sites have problems retaining users. In order to alleviate this problem QuiBids has implemented a Buy-Now system in which losing bidders can contribute money they already lost in the auction towards the purchase of the item at a slightly inflated price. We find that QuiBids makes only limited profit after accounting for Buy-Now but is able to remain profitable due voucher bid pack auctions. We also show that a large proportion of QuiBids’ revenues come from experienced bidders suggesting that rules designed to promote consumer retention may be working as intended.,eric sodomka,Not available,2014.0,10.1007/978-3-319-13218-1_5,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Amy2014,False,,Springer,Not available,An Empirical Analysis of QuiBids’ Penny Auctions,52df170b6b4935bf86d1be9e7c4d2cd6,http://dx.doi.org/10.1007/978-3-319-13218-1_5 3647,The projected rare resource spectrum generates high profits if utilized efficiently. The current static allocation lead the spectrum to underutilized with fixed income. Predicting the user requirement for spectrum and auctioning the spectrum helps to better serve the customers and at the same time increases the income. In this research we use the automated collaborative filtering model for predicting the customer requirement and then allocate the spectrum through auctions (bidding for spectrum in open market). Genetic algorithm is used for optimization of the spectrum bidding problem and concluded that the spectrum will be used efficiently while generating more revenue by bidding for spectrum in the market.,y. reddy,Not available,2008.0,10.1007/978-1-4020-8741-7_102,Advances in Computer and Information Sciences and Engineering,B.2008,False,,Springer,Not available,Predicting the Demand for Spectrum Allocation Through Auctions,fbf6d1fe99c20eac38d7ab9275a1fc90,http://dx.doi.org/10.1007/978-1-4020-8741-7_102 3648,Market clearing is the process of matching buy and sell bids in securities markets. The allocative efficiency of such algorithms is important as the Auctioneer is typically paid a commission on the number of bids matched and the volume of quantity traded. Previous algorithms have concentrated on price issues. This paper presents several market clearing algorithms that focus solely on allocating quantity among matching buy and sell bids. The goal is to maximise the number of bids matched while at the same time minimise the amount of unmatched quantity. The algorithms attempt to avoid situations resulting in unmarketable quantities (i.e. quantities too small to sell). Algorithmic performance is tested using simulated data designed to emulate the Australian Stock Exchange (ASX) and other world stock markets. Our results show that it is difficult to avoid partial matchings as the complexity of doing so is NP-complete. The optimal offline algorithm for partial quantity matching is used as a benchmark to compare online matching strategies. We present three algorithms that outperform the ASX’s strategy by increasing the number of bids matched the amount of quantity matched and the number of bids fully matched.,jarrod trevathan,Not available,2008.0,10.1007/978-3-540-70760-8_3,E-Business and Telecommunication Networks,Jarrod2008,False,,Springer,Not available,Variable Quantity Market Clearing Algorithms,8ebe6f33e606705ac7dc231857d7645a,http://dx.doi.org/10.1007/978-3-540-70760-8_3 3649,Market clearing is the process of matching buy and sell bids in securities markets. The allocative efficiency of such algorithms is important as the Auctioneer is typically paid a commission on the number of bids matched and the volume of quantity traded. Previous algorithms have concentrated on price issues. This paper presents several market clearing algorithms that focus solely on allocating quantity among matching buy and sell bids. The goal is to maximise the number of bids matched while at the same time minimise the amount of unmatched quantity. The algorithms attempt to avoid situations resulting in unmarketable quantities (i.e. quantities too small to sell). Algorithmic performance is tested using simulated data designed to emulate the Australian Stock Exchange (ASX) and other world stock markets. Our results show that it is difficult to avoid partial matchings as the complexity of doing so is NP-complete. The optimal offline algorithm for partial quantity matching is used as a benchmark to compare online matching strategies. We present three algorithms that outperform the ASX’s strategy by increasing the number of bids matched the amount of quantity matched and the number of bids fully matched.,wayne read,Not available,2008.0,10.1007/978-3-540-70760-8_3,E-Business and Telecommunication Networks,Jarrod2008,False,,Springer,Not available,Variable Quantity Market Clearing Algorithms,8ebe6f33e606705ac7dc231857d7645a,http://dx.doi.org/10.1007/978-3-540-70760-8_3 3650,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg (Ann Math Stat 30(1):165–168 ,yurii nesterov,Not available,2018.0,10.1007/s40305-018-0195-5,Journal of the Operations Research Society of China,Yurii2018,True,,Springer,Not available,Computation of Fisher–Gale Equilibrium by Auction,c552f510b3d648e026169d7b7ddb1d2b,http://dx.doi.org/10.1007/s40305-018-0195-5 3651,We study the Fisher model of a competitive market from the algorithmic perspective. For that the related convex optimization problem due to Gale and Eisenberg (Ann Math Stat 30(1):165–168 ,vladimir shikhman,Not available,2018.0,10.1007/s40305-018-0195-5,Journal of the Operations Research Society of China,Yurii2018,True,,Springer,Not available,Computation of Fisher–Gale Equilibrium by Auction,c552f510b3d648e026169d7b7ddb1d2b,http://dx.doi.org/10.1007/s40305-018-0195-5 3652,Advertisement in dedicated webpage spaces or in search engines sponsored slots is usually sold using auctions with a payment rule that is either per impression or per click. But advertisers can be both sensitive to being viewed (brand awareness effect) and being clicked (conversion into sales). In this paper we generalize the auction mechanism by including both pricing components: the advertisers are charged when their ad is displayed and pay an additional price if the ad is clicked. Applying the results for Vickrey–Clarke–Groves auctions we show how to compute payments to ensure incentive compatibility from advertisers as well as maximize the total value extracted from the advertisement slot(s). We provide tight upper bounds for the loss of efficiency due to applying only pay-per-click (or pay-per-view) pricing instead of our scheme. Those bounds depend on the joint distribution of advertisement visibility and population likelihood to click on ads and can help identify situations where our mechanism yields significant improvements. We also describe how the commonly used generalized second price auction can be extended to this context.,patrick maille,Not available,2018.0,10.1007/s10660-017-9267-6,Electronic Commerce Research,Patrick2018,False,,Springer,Not available,Auctions for online ad space among advertisers sensitive to both views and clicks,d881d227095ab687b2248ed5a805954f,http://dx.doi.org/10.1007/s10660-017-9267-6 3653,Advertisement in dedicated webpage spaces or in search engines sponsored slots is usually sold using auctions with a payment rule that is either per impression or per click. But advertisers can be both sensitive to being viewed (brand awareness effect) and being clicked (conversion into sales). In this paper we generalize the auction mechanism by including both pricing components: the advertisers are charged when their ad is displayed and pay an additional price if the ad is clicked. Applying the results for Vickrey–Clarke–Groves auctions we show how to compute payments to ensure incentive compatibility from advertisers as well as maximize the total value extracted from the advertisement slot(s). We provide tight upper bounds for the loss of efficiency due to applying only pay-per-click (or pay-per-view) pricing instead of our scheme. Those bounds depend on the joint distribution of advertisement visibility and population likelihood to click on ads and can help identify situations where our mechanism yields significant improvements. We also describe how the commonly used generalized second price auction can be extended to this context.,bruno tuffin,Not available,2018.0,10.1007/s10660-017-9267-6,Electronic Commerce Research,Patrick2018,False,,Springer,Not available,Auctions for online ad space among advertisers sensitive to both views and clicks,d881d227095ab687b2248ed5a805954f,http://dx.doi.org/10.1007/s10660-017-9267-6 3654,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,koji kotani,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 3655,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,kenta tanaka,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 3656,A marketable permit system (MPS) has been suggested as a solution to environmental problems. Although the properties of MPSs under non-trader settings in which each player is exclusively either a seller or a buyer are well documented little research has explored how MPSs perform under trader settings in which each player can be both a seller and a buyer. We institute two auctions of trader settings in MPS experiments: a double auction (DA) and a uniform price auction (UPA). We then evaluate and compare their performances both with each other and with those under non-trader settings. The main results are as follows: DAs under trader settings perform much worse than do DAs under non-trader settings whereas UPAs perform well regardless of the trader and non-trader settings. UPAs are more efficient and generate more stable prices than do DAs under trader settings and a considerable proportion of trades in DAs under trader settings consist of “flips” that could be considered speculation or errors. Thus UPAs are likely to work better than DAs under trader settings.,shunsuke managi,Not available,2018.0,10.1007/s10683-018-9585-0,Experimental Economics,Koji2018,False,,Springer,Not available,Which performs better under trader settings double auction or uniform price auction?,6acd8c03627470917f13e66551c591de,http://dx.doi.org/10.1007/s10683-018-9585-0 3657,Given the string of bankruptcies of penny auction websites over the past two years we use empirical data to investigate whether QuiBids remains profitable. Although profitable on an auction-by-auction basis penny auction sites have problems retaining users. In order to alleviate this problem QuiBids has implemented a Buy-Now system in which losing bidders can contribute money they already lost in the auction towards the purchase of the item at a slightly inflated price. We find that QuiBids makes only limited profit after accounting for Buy-Now but is able to remain profitable due voucher bid pack auctions. We also show that a large proportion of QuiBids’ revenues come from experienced bidders suggesting that rules designed to promote consumer retention may be working as intended.,eric stix,Not available,2014.0,10.1007/978-3-319-13218-1_5,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Amy2014,False,,Springer,Not available,An Empirical Analysis of QuiBids’ Penny Auctions,52df170b6b4935bf86d1be9e7c4d2cd6,http://dx.doi.org/10.1007/978-3-319-13218-1_5 3658,We study a variation of the single-item sealed-bid first-price auction wherein one bidder (the leader) publicly commits to a (possibly mixed) strategy before the others submit their bids. For the case wherein all bidders’ valuations are commonly known we fully characterize the committed mixed strategy that is optimal for the leader and find that both the leader and the follower with the highest valuation strictly benefit from the commitment so long as the leader’s valuation is strictly higher than the second highest valuation of the followers. We further show that compared with the simultaneous first-price auction the leader’s optimal commitment yields the same net utility benefit to both of these bidders. As a result the two highest valued bidders’ incentives are aligned facilitating coordination and implementation of the commitment. Finally we provide characterization of the leader’s optimal commitment in a Bayesian setting with two bidders leveraging the methodology developed for the complete-information setting.,yunjian xu,Not available,2018.0,10.1007/s00199-017-1069-5,Economic Theory,Yunjian2018,False,,Springer,Not available,Commitment in first-price auctions,d23791bea9014a928cff33f3ae39b0c3,http://dx.doi.org/10.1007/s00199-017-1069-5 3659,We study a variation of the single-item sealed-bid first-price auction wherein one bidder (the leader) publicly commits to a (possibly mixed) strategy before the others submit their bids. For the case wherein all bidders’ valuations are commonly known we fully characterize the committed mixed strategy that is optimal for the leader and find that both the leader and the follower with the highest valuation strictly benefit from the commitment so long as the leader’s valuation is strictly higher than the second highest valuation of the followers. We further show that compared with the simultaneous first-price auction the leader’s optimal commitment yields the same net utility benefit to both of these bidders. As a result the two highest valued bidders’ incentives are aligned facilitating coordination and implementation of the commitment. Finally we provide characterization of the leader’s optimal commitment in a Bayesian setting with two bidders leveraging the methodology developed for the complete-information setting.,katrina ligett,Not available,2018.0,10.1007/s00199-017-1069-5,Economic Theory,Yunjian2018,False,,Springer,Not available,Commitment in first-price auctions,d23791bea9014a928cff33f3ae39b0c3,http://dx.doi.org/10.1007/s00199-017-1069-5 3660,Regulatory intervention is necessary to overcome market failures. However this kind of intervention may also create Protection for Sale conditions in the market—which might in turn lead to an inefficient resource allocation. This paper examines the effect of an indirect intervention on regulated market welfare under Optimal Regulation and Protection for Sale conditions. Although under Optimal Regulation conditions there is zero welfare-loss as it derives from Differential Price Policy (DPP) it seems that under substantial Protection for Sale conditions this price policy increases the welfare-loss and therefore a Uniform Price Policy (UPP) might achieve a smaller welfare-loss—due to the “free-riding” effect. Furthermore this paper suggests that in between these two price policies lays a third option a Combined Price Policy that can balance between the accurate resource allocation (DPP) and the political pressure reduction (UPP) in order to reduce the welfare-loss and to increase the market efficiency.,doron nisani,Not available,2018.0,10.1007/s11149-018-9360-3,Journal of Regulatory Economics,Doron2018,False,,Springer,Not available,Efficient indirect regulation under Protection for Sale,54431e5b364adba06b10b32581478086,http://dx.doi.org/10.1007/s11149-018-9360-3 3661,In a sealed-bid auction bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others’ bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the opening stage. Although existing bidding solutions focus on ensuring certain characteristics of the auction including correctness fairness privacy protection and confidentiality it is difficult for losing bidders to verify whether the winner is a genuine bidder or just a fake bidder that is manipulated by a malicious party (e.g. a malicious auctioneer). In this paper we introduce a fair indictment mechanism for an online sealed-bid auction that includes self-enforcing privacy. Our solution allows for an honest bidder to detect malicious activity and provides the bidder with verifiable evidence to indict a dishonest party. A successful indictment will give an incentive to the honest bidder and will result in a withdrawal of the result of the auction whereas a failed indictment will require the involved complainer to pay a penalty. We achieve this goal using a scheme designed with an oblivious polynomial evaluation and homomorphic cryptosystem. We also involve a semi-honest verification agent in the indictment process to help the honest party verify the winning bid. This prevents the auctioneer from controlling the entire auction process. We also provide an analysis of the indictment requirements security and efficiency of the proposed mechanism and demonstrate the use of our solution in a multiple-item sealed-bid auction (i.e. combinatorial auction).,kok-seng wong,Not available,2018.0,10.1007/s11227-017-2045-3,The Journal of Supercomputing,Kok-Seng2018,False,,Springer,Not available,Toward a fair indictment for sealed-bid auction with self-enforcing privacy,6328a8169b8ed65b8499db04fa790219,http://dx.doi.org/10.1007/s11227-017-2045-3 3662,In a sealed-bid auction bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others’ bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the opening stage. Although existing bidding solutions focus on ensuring certain characteristics of the auction including correctness fairness privacy protection and confidentiality it is difficult for losing bidders to verify whether the winner is a genuine bidder or just a fake bidder that is manipulated by a malicious party (e.g. a malicious auctioneer). In this paper we introduce a fair indictment mechanism for an online sealed-bid auction that includes self-enforcing privacy. Our solution allows for an honest bidder to detect malicious activity and provides the bidder with verifiable evidence to indict a dishonest party. A successful indictment will give an incentive to the honest bidder and will result in a withdrawal of the result of the auction whereas a failed indictment will require the involved complainer to pay a penalty. We achieve this goal using a scheme designed with an oblivious polynomial evaluation and homomorphic cryptosystem. We also involve a semi-honest verification agent in the indictment process to help the honest party verify the winning bid. This prevents the auctioneer from controlling the entire auction process. We also provide an analysis of the indictment requirements security and efficiency of the proposed mechanism and demonstrate the use of our solution in a multiple-item sealed-bid auction (i.e. combinatorial auction).,myung kim,Not available,2018.0,10.1007/s11227-017-2045-3,The Journal of Supercomputing,Kok-Seng2018,False,,Springer,Not available,Toward a fair indictment for sealed-bid auction with self-enforcing privacy,6328a8169b8ed65b8499db04fa790219,http://dx.doi.org/10.1007/s11227-017-2045-3 3663,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,sanshan sun,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 3664,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,gang feng,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 3665,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,shuang qin,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 3666,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,yao sun,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 3667,With the explosive growth of indoor data traffic in forthcoming fifth generation cellular networks it is imperative for mobile network operators to improve network coverage and capacity. Femtocells are widely recognized as a promising technology to address these demands. As femtocells are sold or loaned by a mobile network operator (MNO) to its residential or enterprise customers MNOs usually employ refunding scheme to compensate the femtocell holders (FHs) providing indoor access to other subscribers by configuring the femtocell to operate in open or hybrid access mode. Due to the selfishness nature competition between network operators as well as femtocell holders makes it challenging for operators to select appropriate FHs for trading access resources. This inspires us to develop an effective refunding framework with aim to improve overall network resource utilization through promoting FHs to make reasonable access permission for well-matched macro users. In this paper we develop a two-stage auction–Stackelberg game (ASGF) framework for access permission in femtocell networks where MNO and mobile virtual network operator lease access resources from multiple FHs. We first design an auction mechanism to determine the winner femtocell that fulfils the access request of macro users. We next formulate the access permission problem between the winner femtocell and operators as a Stackelberg game and theoretically prove the existence of unique equilibrium. As a higher system payoff can be gained by improving individual players’ payoff in the game each player can choose the best response to others’ action by implementing access permission while avoiding solving a complicated optimization problem. Numerical results validate the effectiveness of our proposed ASGF based refunding framework and the overall network efficiency can be improved significantly.,zhaorong zhou,Not available,2018.0,10.1007/s11276-016-1406-9,Wireless Networks,Sanshan2018,False,,Springer,Not available,Auction–Stackelberg game framework for access permission in femtocell networks with multiple network operators,eba4404eb087d89e0aea63011b950396,http://dx.doi.org/10.1007/s11276-016-1406-9 3668,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,shouyang wang,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 3669,Given the string of bankruptcies of penny auction websites over the past two years we use empirical data to investigate whether QuiBids remains profitable. Although profitable on an auction-by-auction basis penny auction sites have problems retaining users. In order to alleviate this problem QuiBids has implemented a Buy-Now system in which losing bidders can contribute money they already lost in the auction towards the purchase of the item at a slightly inflated price. We find that QuiBids makes only limited profit after accounting for Buy-Now but is able to remain profitable due voucher bid pack auctions. We also show that a large proportion of QuiBids’ revenues come from experienced bidders suggesting that rules designed to promote consumer retention may be working as intended.,jeffrey stix,Not available,2014.0,10.1007/978-3-319-13218-1_5,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Amy2014,False,,Springer,Not available,An Empirical Analysis of QuiBids’ Penny Auctions,52df170b6b4935bf86d1be9e7c4d2cd6,http://dx.doi.org/10.1007/978-3-319-13218-1_5 3670,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,jiaze wang,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 3671,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,anfeng liu,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 3672,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,tong yan,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 3673,Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth there is no research on the communication bandwidth boundary or resource allocation which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First under the quality of experiments (QoE) ensured the utility function of clients and transparent computing providers (TCPs) is constructed. After that the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward the results scheduled in different experimental scenarios are given which verifies the effectiveness of the proposed strategy. Overall this work provides an effective resource allocation model for optimizing the performance of TC.,zhiwen zeng,Not available,2018.0,10.1007/s12083-017-0556-6,Peer-to-Peer Networking and Applications,Jiaze2018,False,,Springer,Not available,A resource allocation model based on double-sided combinational auctions for transparent computing,8ee578b68f38922cd5b763c1b402363a,http://dx.doi.org/10.1007/s12083-017-0556-6 3674,In horizontal collaborations carriers form coalitions in order to perform parts of their logistics operations jointly. By exchanging transportation requests among each other they can operate more efficiently and in a more sustainable way. This exchange of requests can be organized through combinatorial auctions where collaborators submit requests for exchange to a common pool. The requests in the pool are grouped into bundles and these are offered to participating carriers. From a practical point of view offering all possible bundles is not manageable since the number of bundles grows exponentially with the number of traded requests. We show how the complete set of bundles can be efficiently reduced to a subset of attractive ones. For this we define the Bundle Generation Problem (BuGP). The aim is to provide a reduced set of offered bundles that maximizes the total coalition profit while a feasible assignment of bundles to carriers is guaranteed. The objective function however could only be evaluated whether carriers reveal sensitive information which would be unrealistic. Thus we develop a proxy for the objective function for assessing the attractiveness of bundles under incomplete information. This is used in a genetic algorithms-based framework that aims at producing attractive and feasible bundles such that all requirements of the BuGP are met. We achieve very good solution quality while reducing the computational time for the auction procedure significantly. This is an important step towards running combinatorial auctions of real-world size which were previously intractable due to their computational complexity. The strengths but also the limitations of the proposed approach are discussed.,margaretha gansterer,Not available,2018.0,10.1007/s00291-018-0516-4,OR Spectrum,Margaretha2018,True,,Springer,Not available,Centralized bundle generation in auction-based collaborative transportation,76e19c19877524fc7b25d203c489fd16,http://dx.doi.org/10.1007/s00291-018-0516-4 3675,In horizontal collaborations carriers form coalitions in order to perform parts of their logistics operations jointly. By exchanging transportation requests among each other they can operate more efficiently and in a more sustainable way. This exchange of requests can be organized through combinatorial auctions where collaborators submit requests for exchange to a common pool. The requests in the pool are grouped into bundles and these are offered to participating carriers. From a practical point of view offering all possible bundles is not manageable since the number of bundles grows exponentially with the number of traded requests. We show how the complete set of bundles can be efficiently reduced to a subset of attractive ones. For this we define the Bundle Generation Problem (BuGP). The aim is to provide a reduced set of offered bundles that maximizes the total coalition profit while a feasible assignment of bundles to carriers is guaranteed. The objective function however could only be evaluated whether carriers reveal sensitive information which would be unrealistic. Thus we develop a proxy for the objective function for assessing the attractiveness of bundles under incomplete information. This is used in a genetic algorithms-based framework that aims at producing attractive and feasible bundles such that all requirements of the BuGP are met. We achieve very good solution quality while reducing the computational time for the auction procedure significantly. This is an important step towards running combinatorial auctions of real-world size which were previously intractable due to their computational complexity. The strengths but also the limitations of the proposed approach are discussed.,richard hartl,Not available,2018.0,10.1007/s00291-018-0516-4,OR Spectrum,Margaretha2018,True,,Springer,Not available,Centralized bundle generation in auction-based collaborative transportation,76e19c19877524fc7b25d203c489fd16,http://dx.doi.org/10.1007/s00291-018-0516-4 3676,We consider multi-unit discriminatory auctions where ex ante symmetric bidders have single-unit demands and resale is allowed after the bidding stage. When bidders use the optimal auction to sell items in the resale stage the equilibrium in the auction without resale is no longer an equilibrium in an auction with resale. We find a symmetric and monotone equilibrium when there are two units for sale and interestingly we show that there may not be a symmetric and monotone equilibrium if there are more than two units.,isa hafalir,Not available,2018.0,10.1007/s40505-018-0152-9,Economic Theory Bulletin,Isa2018,False,,Springer,Not available,Discriminatory auctions with resale,a0c7f38e2ad05faf35a9c743dc481387,http://dx.doi.org/10.1007/s40505-018-0152-9 3677,We consider multi-unit discriminatory auctions where ex ante symmetric bidders have single-unit demands and resale is allowed after the bidding stage. When bidders use the optimal auction to sell items in the resale stage the equilibrium in the auction without resale is no longer an equilibrium in an auction with resale. We find a symmetric and monotone equilibrium when there are two units for sale and interestingly we show that there may not be a symmetric and monotone equilibrium if there are more than two units.,musab kurnaz,Not available,2018.0,10.1007/s40505-018-0152-9,Economic Theory Bulletin,Isa2018,False,,Springer,Not available,Discriminatory auctions with resale,a0c7f38e2ad05faf35a9c743dc481387,http://dx.doi.org/10.1007/s40505-018-0152-9 3678,We analyze an ascending auction with anonymous item- prices when there are two items that are substitutes. This popular auction format entails increased opportunities for bidders to coordinate bids as the bidding process is longer and since bidders see the other bids and can respond to various signaling. This has happened in many real auctions e.g.  in the Netherlands 3G Telecom Auction and in the FCC auctions in the US.While on the face of it such bidding behavior seems to harm economic efficiency we show that side-communication may actually improve the social efficiency of the auction: We describe an ex-post sub-game perfect equilibrium that uses limited side-communication and is ex-post efficient. In contrast without side-communication we show that there is no ex-post equilibrium which is ex-post efficient in the ascending auction.In the equilibrium strategy we suggest bidders start by reporting their true demands at the first stages of the auction and then perform a single demand reduction at a certain concrete point determined using a single message exchanged between the bidders. We show that this limited signaling opportunity resolves the strategic problems of myopic bidding and quite surprisingly improves social welfare instead of harming it.,ron lavi,Not available,2012.0,10.1007/978-3-642-30913-7_14,Auctions Market Mechanisms and Their Applications,Ron2012,False,,Springer,Not available,Side-Communication Yields Efficiency of Ascending Auctions: The Two-Items Case,3c395362835b038a3e2f51094cb5df78,http://dx.doi.org/10.1007/978-3-642-30913-7_14 3679,We analyze an ascending auction with anonymous item- prices when there are two items that are substitutes. This popular auction format entails increased opportunities for bidders to coordinate bids as the bidding process is longer and since bidders see the other bids and can respond to various signaling. This has happened in many real auctions e.g.  in the Netherlands 3G Telecom Auction and in the FCC auctions in the US.While on the face of it such bidding behavior seems to harm economic efficiency we show that side-communication may actually improve the social efficiency of the auction: We describe an ex-post sub-game perfect equilibrium that uses limited side-communication and is ex-post efficient. In contrast without side-communication we show that there is no ex-post equilibrium which is ex-post efficient in the ascending auction.In the equilibrium strategy we suggest bidders start by reporting their true demands at the first stages of the auction and then perform a single demand reduction at a certain concrete point determined using a single message exchanged between the bidders. We show that this limited signaling opportunity resolves the strategic problems of myopic bidding and quite surprisingly improves social welfare instead of harming it.,sigal oren,Not available,2012.0,10.1007/978-3-642-30913-7_14,Auctions Market Mechanisms and Their Applications,Ron2012,False,,Springer,Not available,Side-Communication Yields Efficiency of Ascending Auctions: The Two-Items Case,3c395362835b038a3e2f51094cb5df78,http://dx.doi.org/10.1007/978-3-642-30913-7_14 3680,Given the string of bankruptcies of penny auction websites over the past two years we use empirical data to investigate whether QuiBids remains profitable. Although profitable on an auction-by-auction basis penny auction sites have problems retaining users. In order to alleviate this problem QuiBids has implemented a Buy-Now system in which losing bidders can contribute money they already lost in the auction towards the purchase of the item at a slightly inflated price. We find that QuiBids makes only limited profit after accounting for Buy-Now but is able to remain profitable due voucher bid pack auctions. We also show that a large proportion of QuiBids’ revenues come from experienced bidders suggesting that rules designed to promote consumer retention may be working as intended.,david storch,Not available,2014.0,10.1007/978-3-319-13218-1_5,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Amy2014,False,,Springer,Not available,An Empirical Analysis of QuiBids’ Penny Auctions,52df170b6b4935bf86d1be9e7c4d2cd6,http://dx.doi.org/10.1007/978-3-319-13218-1_5 3681,Position auction is a well-studied model for analyzing online auctions for internet advertisement in which a set of advertisers bid for a set of slots in a search result page to display their advertisement links. In particular it was proved in [10 11] that the Generalized Second Price (GSP) mechanism for position auction has many interesting properties. In this paper we extend these results to range auction in which a bidder may specify a range of slots he is interested in. We prove GSP for range auction has an envy free equilibrium which is bidder optimal and has the minimum pay property. Further this equilibrium is equal to the outcome of the Vickrey-Clarke-Groves mechanism. We also show that the social welfare of any equilibrium of GSP for range auctions is not far from the optimal; it is at least 1/2 of the optimal.,h. ting,Not available,2012.0,10.1007/978-3-642-32241-9_49,Computing and Combinatorics,F.2012,False,,Springer,Not available,Equilibria of GSP for Range Auction,ea712c82282fa51fa95bc226cd017673,http://dx.doi.org/10.1007/978-3-642-32241-9_49 3682,Position auction is a well-studied model for analyzing online auctions for internet advertisement in which a set of advertisers bid for a set of slots in a search result page to display their advertisement links. In particular it was proved in [10 11] that the Generalized Second Price (GSP) mechanism for position auction has many interesting properties. In this paper we extend these results to range auction in which a bidder may specify a range of slots he is interested in. We prove GSP for range auction has an envy free equilibrium which is bidder optimal and has the minimum pay property. Further this equilibrium is equal to the outcome of the Vickrey-Clarke-Groves mechanism. We also show that the social welfare of any equilibrium of GSP for range auctions is not far from the optimal; it is at least 1/2 of the optimal.,xiangzhong xiang,Not available,2012.0,10.1007/978-3-642-32241-9_49,Computing and Combinatorics,F.2012,False,,Springer,Not available,Equilibria of GSP for Range Auction,ea712c82282fa51fa95bc226cd017673,http://dx.doi.org/10.1007/978-3-642-32241-9_49 3683,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has been focusing on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies in particular those that can be used in open and dynamic markets in which market situation is generally constantly changing. Obviously a good bidding strategy to be used in such realistic markets cannot be obtained by analytical methods which require all market information be known before a solution can possibly be found. Machine learning based approaches are not completely appropriate either as an optimal strategy learned from one market generally no longer perform well when the market situation changes. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in such dynamic markets. A bidder adopting this strategy constantly perceives the market situation and adaptively reviews and adjusts his bid determination thus responding to the dynamic market in a timely manner. Experiment results show that agents adopting this adaptive bidding strategy perform very well even without any prior knowledge about the market.,xin sui,Not available,2011.0,10.1007/s12530-011-9035-0,Evolving Systems,Xin2011,False,,Springer,Not available,Adaptive bidding in combinatorial auctions in dynamic markets,5f227aade28b55ba3a4598e666f01f79,http://dx.doi.org/10.1007/s12530-011-9035-0 3684,Combinatorial auction where bidders can bid on bundles of items has been the subject of increasing interest in recent years. Although much research work has been conducted on combinatorial auctions most has been focusing on the winner determination problem. A largely unexplored area of research in combinatorial auctions is the design of bidding strategies in particular those that can be used in open and dynamic markets in which market situation is generally constantly changing. Obviously a good bidding strategy to be used in such realistic markets cannot be obtained by analytical methods which require all market information be known before a solution can possibly be found. Machine learning based approaches are not completely appropriate either as an optimal strategy learned from one market generally no longer perform well when the market situation changes. In this paper we propose a new adaptive bidding strategy for combinatorial auction-based resource allocation problem in such dynamic markets. A bidder adopting this strategy constantly perceives the market situation and adaptively reviews and adjusts his bid determination thus responding to the dynamic market in a timely manner. Experiment results show that agents adopting this adaptive bidding strategy perform very well even without any prior knowledge about the market.,ho-fung leung,Not available,2011.0,10.1007/s12530-011-9035-0,Evolving Systems,Xin2011,False,,Springer,Not available,Adaptive bidding in combinatorial auctions in dynamic markets,5f227aade28b55ba3a4598e666f01f79,http://dx.doi.org/10.1007/s12530-011-9035-0 3685,This study explores the relationship between buyer experience and final price in Internet auctions for a homogenous product. We find that more experienced buyers are able to purchase a homogenous product at lower prices on average compared to relatively less experienced buyers. The findings are robust to how we account for instances when auctions fail to result in a sale or when they end via the “Buy it Now” option. This result supports findings from the experimental auction literature on auction performance and experience using real auction data.,genti kostandini,Not available,2011.0,10.1007/s11151-011-9304-x,Review of Industrial Organization,Genti2011,False,,Springer,Not available,Does Buyer Experience Pay Off? Evidence from eBay,f464164a42a4069d3d28a362a5a065f9,http://dx.doi.org/10.1007/s11151-011-9304-x 3686,This study explores the relationship between buyer experience and final price in Internet auctions for a homogenous product. We find that more experienced buyers are able to purchase a homogenous product at lower prices on average compared to relatively less experienced buyers. The findings are robust to how we account for instances when auctions fail to result in a sale or when they end via the “Buy it Now” option. This result supports findings from the experimental auction literature on auction performance and experience using real auction data.,elton mykerezi,Not available,2011.0,10.1007/s11151-011-9304-x,Review of Industrial Organization,Genti2011,False,,Springer,Not available,Does Buyer Experience Pay Off? Evidence from eBay,f464164a42a4069d3d28a362a5a065f9,http://dx.doi.org/10.1007/s11151-011-9304-x 3687,This study explores the relationship between buyer experience and final price in Internet auctions for a homogenous product. We find that more experienced buyers are able to purchase a homogenous product at lower prices on average compared to relatively less experienced buyers. The findings are robust to how we account for instances when auctions fail to result in a sale or when they end via the “Buy it Now” option. This result supports findings from the experimental auction literature on auction performance and experience using real auction data.,eftila tanellari,Not available,2011.0,10.1007/s11151-011-9304-x,Review of Industrial Organization,Genti2011,False,,Springer,Not available,Does Buyer Experience Pay Off? Evidence from eBay,f464164a42a4069d3d28a362a5a065f9,http://dx.doi.org/10.1007/s11151-011-9304-x 3688,This study explores the relationship between buyer experience and final price in Internet auctions for a homogenous product. We find that more experienced buyers are able to purchase a homogenous product at lower prices on average compared to relatively less experienced buyers. The findings are robust to how we account for instances when auctions fail to result in a sale or when they end via the “Buy it Now” option. This result supports findings from the experimental auction literature on auction performance and experience using real auction data.,nour dib,Not available,2011.0,10.1007/s11151-011-9304-x,Review of Industrial Organization,Genti2011,False,,Springer,Not available,Does Buyer Experience Pay Off? Evidence from eBay,f464164a42a4069d3d28a362a5a065f9,http://dx.doi.org/10.1007/s11151-011-9304-x 3689,This paper studies trade in a first-price sealed-bid auction where agents know only a range of possible payoffs. The setting is one in which a lemons problem arises so that if agents have common risk preferences and common priors then expected utility theory leads to a prediction of no trade. In contrast we develop a model of rational non-probabilistic decision making under which trade can occur because not bidding is a weakly dominated strategy. We use a laboratory experiment to test the predictions of both models and also of models of expected utility with heterogeneous priors and risk preferences. We find strong support for the rational non-probabilistic model.,john dickhaut,Not available,2011.0,10.1007/s00199-011-0644-4,Economic Theory,John2011,False,,Springer,Not available,Decision making and trade without probabilities,2ee727eb59a4e6c1004620aeb32a09e0,http://dx.doi.org/10.1007/s00199-011-0644-4 3690,This paper studies trade in a first-price sealed-bid auction where agents know only a range of possible payoffs. The setting is one in which a lemons problem arises so that if agents have common risk preferences and common priors then expected utility theory leads to a prediction of no trade. In contrast we develop a model of rational non-probabilistic decision making under which trade can occur because not bidding is a weakly dominated strategy. We use a laboratory experiment to test the predictions of both models and also of models of expected utility with heterogeneous priors and risk preferences. We find strong support for the rational non-probabilistic model.,radhika lunawat,Not available,2011.0,10.1007/s00199-011-0644-4,Economic Theory,John2011,False,,Springer,Not available,Decision making and trade without probabilities,2ee727eb59a4e6c1004620aeb32a09e0,http://dx.doi.org/10.1007/s00199-011-0644-4 3691,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,congfeng jiang,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 3692,This paper studies trade in a first-price sealed-bid auction where agents know only a range of possible payoffs. The setting is one in which a lemons problem arises so that if agents have common risk preferences and common priors then expected utility theory leads to a prediction of no trade. In contrast we develop a model of rational non-probabilistic decision making under which trade can occur because not bidding is a weakly dominated strategy. We use a laboratory experiment to test the predictions of both models and also of models of expected utility with heterogeneous priors and risk preferences. We find strong support for the rational non-probabilistic model.,kira pronin,Not available,2011.0,10.1007/s00199-011-0644-4,Economic Theory,John2011,False,,Springer,Not available,Decision making and trade without probabilities,2ee727eb59a4e6c1004620aeb32a09e0,http://dx.doi.org/10.1007/s00199-011-0644-4 3693,This paper studies trade in a first-price sealed-bid auction where agents know only a range of possible payoffs. The setting is one in which a lemons problem arises so that if agents have common risk preferences and common priors then expected utility theory leads to a prediction of no trade. In contrast we develop a model of rational non-probabilistic decision making under which trade can occur because not bidding is a weakly dominated strategy. We use a laboratory experiment to test the predictions of both models and also of models of expected utility with heterogeneous priors and risk preferences. We find strong support for the rational non-probabilistic model.,jack stecher,Not available,2011.0,10.1007/s00199-011-0644-4,Economic Theory,John2011,False,,Springer,Not available,Decision making and trade without probabilities,2ee727eb59a4e6c1004620aeb32a09e0,http://dx.doi.org/10.1007/s00199-011-0644-4 3694,Several experimental studies have reported that an otherwise robust regularity—the disparity between Willingness-To-Accept and Willingness-To-Pay—tends to be greatly reduced in repeated markets posing a serious challenge to existing reference-,andrea isoni,Not available,2011.0,10.1007/s11238-010-9207-6,Theory and Decision,Andrea2011,False,,Springer,Not available,The willingness-to-accept/willingness-to-pay disparity in repeated markets: loss aversion or ‘bad-deal’ aversion?,e263c31b728824f26f2070361981cc5b,http://dx.doi.org/10.1007/s11238-010-9207-6 3695,We study revenue-maximizing allocation mechanisms for multiple heterogeneous objects when buyers care about the entire allocation and not just about the ones they obtain. Buyers’ payoff depends on their cost parameter and possibly on their competitors’ costs. Costs are independently distributed across buyers and both the buyers and the seller are risk-neutral. The formulation allows for complements substitutes and externalities. We identify a number of novel characteristics of revenue-maximizing mechanisms: First we find that revenue-maximizing reserve prices depend on the bids of other buyers. Second we find that when non-participation payoffs are type-dependent revenue-maximizing auctions may sell too often or they may even be ex-post efficient.,nicolas figueroa,Not available,2011.0,10.1007/s10058-010-0107-6,Review of Economic Design,Nicolás2011,False,,Springer,Not available,Optimal allocation mechanisms with single-dimensional private information,2b384152053ec9abb85a7aca8fa3e4ec,http://dx.doi.org/10.1007/s10058-010-0107-6 3696,We study revenue-maximizing allocation mechanisms for multiple heterogeneous objects when buyers care about the entire allocation and not just about the ones they obtain. Buyers’ payoff depends on their cost parameter and possibly on their competitors’ costs. Costs are independently distributed across buyers and both the buyers and the seller are risk-neutral. The formulation allows for complements substitutes and externalities. We identify a number of novel characteristics of revenue-maximizing mechanisms: First we find that revenue-maximizing reserve prices depend on the bids of other buyers. Second we find that when non-participation payoffs are type-dependent revenue-maximizing auctions may sell too often or they may even be ex-post efficient.,vasiliki skreta,Not available,2011.0,10.1007/s10058-010-0107-6,Review of Economic Design,Nicolás2011,False,,Springer,Not available,Optimal allocation mechanisms with single-dimensional private information,2b384152053ec9abb85a7aca8fa3e4ec,http://dx.doi.org/10.1007/s10058-010-0107-6 3697,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,harold houba,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 3698,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,dinard laan,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 3699,Lowest-unique sealed-bid auctions are auctions with endogenous participation costly bids and the lowest bid among all unique bids wins. Properties of symmetric NEs are studied. The symmetric NE with the lowest expected gains is the ,dirk veldhuizen,Not available,2011.0,10.1007/s11238-010-9196-5,Theory and Decision,Harold2011,True,,Springer,Not available,Endogenous entry in lowest-unique sealed-bid auctions,a70c0f72a4c227661d96b7c58f73feed,http://dx.doi.org/10.1007/s11238-010-9196-5 3700,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,marc adam,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 3701,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,jan kramer,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 3702,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,liangcheng duan,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 3703,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,caroline jahnig,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 3704,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,stefan seifert,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 3705,Auction fever is a multifaceted phenomenon that is frequently observed in both traditional and Internet auctions. In order to gain a better understanding of its causes we develop a conceptual framework to analyze emotions in auctions which is based on an exhaustive literature review. The framework integrates rational calculus with emotional aspects and suggests that emotional processing is triggered at three different stages of an auction: First the ,christof weinhardt,Not available,2011.0,10.1007/s12525-011-0068-9,Electronic Markets,P.2011,False,,Springer,Not available,Understanding auction fever: a framework for emotional bidding,b49931d4d81a0368ba90f7abe27d7998,http://dx.doi.org/10.1007/s12525-011-0068-9 3706,Statistical properties of order-driven double-auction markets with Bid–Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called ,takero ibuki,Not available,2011.0,10.1007/s11403-011-0078-x,Journal of Economic Interaction and Coordination,Takero2011,False,,Springer,Not available,Response of double-auction markets to instantaneous Selling–Buying signals with stochastic Bid–Ask spread,d41dbc4d1879cf1f11d206451c3ba72d,http://dx.doi.org/10.1007/s11403-011-0078-x 3707,Statistical properties of order-driven double-auction markets with Bid–Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called ,jun-ichi inoue,Not available,2011.0,10.1007/s11403-011-0078-x,Journal of Economic Interaction and Coordination,Takero2011,False,,Springer,Not available,Response of double-auction markets to instantaneous Selling–Buying signals with stochastic Bid–Ask spread,d41dbc4d1879cf1f11d206451c3ba72d,http://dx.doi.org/10.1007/s11403-011-0078-x 3708,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,gregory kersten,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 3709,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,tomasz wachowicz,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 3710,The paper discusses experiments aimed at comparing multi-attribute reverse auctions and multi-bilateral negotiations for procuring goods with multiple attributes. Both exchange mechanisms involve a buyer purchasing from one of several sellers. Two types of negotiations are considered: verifiable and non-verifiable. They differ in the sellers’ knowledge of the current best offer on the table; in verifiable negotiations the best offer is automatically shown to every participant which makes it similar to auctions. Online auctions and negotiation systems were used to study auction and negotiation processes and the mechanisms’ efficiency. The results show that buyers did best using auctions followed by non-verifiable and verifiable negotiations. We also looked into the differences between auctions and negotiations in terms of their duration sellers’ and buyers’ involvement and efficiency and conclude that the behavior of buyers and sellers cannot be explained solely on the grounds of traditional economics. It can however be explained on the grounds of social exchange theory and behavioral economics. In multi-bilateral negotiations competition and social behavior coexist. When transparency is introduced the social effect becomes stronger weakening the impact of competition.,margaret kersten,Not available,2016.0,10.1007/s10726-016-9471-0,Group Decision and Negotiation,E.2016,False,,Springer,Not available,Competition Transparency and Reciprocity: A Comparative Study of Auctions and Negotiations,33d00205f743b16584e55256f28c7193,http://dx.doi.org/10.1007/s10726-016-9471-0 3711,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,josep diaz,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 3712,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,ioannis giotis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 3713,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,chunlei liu,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 3714,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,lefteris kirousis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 3715,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,evangelos markakis,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 3716,The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints which is present in practice. Motivated by this we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence of Nash equilibria and envy-free assignments. We highlight the differences between these mechanisms and find that only some of them exhibit both notions of stability. This shows the importance of carefully picking the right mechanism to ensure stable outcomes in the presence of budgets.,maria serna,Not available,2016.0,10.1007/s00224-015-9634-4,Theory of Computing Systems,Josep2016,False,,Springer,Not available,On the Stability of Generalized Second Price Auctions with Budgets,a44e816a23f03bce55812dfcdfe4d704,http://dx.doi.org/10.1007/s00224-015-9634-4 3717,In the traditional lot sentencing rule a buyer arrives to one of two decisions regarding lot disposition; either accept or reject a lot. However it is more appropriate to consider choices between those two extreme decisions. A clear case where the traditional lot sentencing rule is not flexible is when a buyer purchases a lot from an English auction. In this paper we propose a model that helps a buyer in estimating the value of a production lot. This model can be used by a bidder before the bidding process starts to estimate the value of an auctioned lot. The model provides an action plan that includes the estimated acquisition cost as a function of the number of defective items found in a random sample. Unlike the traditional lot sentencing rule the proposed rule is more flexible and provides buyers with wider range of possible actions.,mohammed darwish,Not available,2016.0,10.1057/jors.2015.112,Journal of the Operational Research Society,A2016,False,,Springer,Not available,Generalized lot sentencing rule for estimating the value of production lot for sale,48f4b61ab2d8b3d27564bac5a5d906b8,http://dx.doi.org/10.1057/jors.2015.112 3718,In the traditional lot sentencing rule a buyer arrives to one of two decisions regarding lot disposition; either accept or reject a lot. However it is more appropriate to consider choices between those two extreme decisions. A clear case where the traditional lot sentencing rule is not flexible is when a buyer purchases a lot from an English auction. In this paper we propose a model that helps a buyer in estimating the value of a production lot. This model can be used by a bidder before the bidding process starts to estimate the value of an auctioned lot. The model provides an action plan that includes the estimated acquisition cost as a function of the number of defective items found in a random sample. Unlike the traditional lot sentencing rule the proposed rule is more flexible and provides buyers with wider range of possible actions.,fawaz abdulmalek,Not available,2016.0,10.1057/jors.2015.112,Journal of the Operational Research Society,A2016,False,,Springer,Not available,Generalized lot sentencing rule for estimating the value of production lot for sale,48f4b61ab2d8b3d27564bac5a5d906b8,http://dx.doi.org/10.1057/jors.2015.112 3719,The objective of this paper is to provide a comprehensive answer to some fundamental questions related to discrimination within the context of contests. For example what forms of discrimination are possible? Can discrimination be justified? What mode of discrimination is expected? Does discrimination necessarily result in the elimination of polarization? How effective are the different modes of discrimination in inducing efforts (revenue)? How do the most widely studied contests based on an all-pay-auction and on a lottery compare under different modes of discrimination? Applying a contest-design approach we examine four alternative types of discrimination that can be selected by a contest designer who maximizes the contestants’ efforts (his revenue). Our survey focuses on the leading principles of the separate and joint effective application of the alternative modes of direct overt covert and head starts-discrimination that are assumed to be exercised under the widely studied family of (logit) contest success functions (CSFs). Whereas direct discrimination refers to differential taxation of the contested prize subject to a balanced-budget constraint overt covert and head starts-discrimination relate to structural discrimination that involves the parameters of the CSF. While the direct mode of discrimination is legally feasible the structural modes of discrimination are more subtle and more difficult to implement and sometimes may even involve legal barriers.,yosef mealem,Not available,2016.0,10.1007/s10058-016-0186-0,Review of Economic Design,Yosef2016,False,,Springer,Not available,Discrimination in contests: a survey,b1cdae272c4f3195e899095fb25b8af4,http://dx.doi.org/10.1007/s10058-016-0186-0 3720,The objective of this paper is to provide a comprehensive answer to some fundamental questions related to discrimination within the context of contests. For example what forms of discrimination are possible? Can discrimination be justified? What mode of discrimination is expected? Does discrimination necessarily result in the elimination of polarization? How effective are the different modes of discrimination in inducing efforts (revenue)? How do the most widely studied contests based on an all-pay-auction and on a lottery compare under different modes of discrimination? Applying a contest-design approach we examine four alternative types of discrimination that can be selected by a contest designer who maximizes the contestants’ efforts (his revenue). Our survey focuses on the leading principles of the separate and joint effective application of the alternative modes of direct overt covert and head starts-discrimination that are assumed to be exercised under the widely studied family of (logit) contest success functions (CSFs). Whereas direct discrimination refers to differential taxation of the contested prize subject to a balanced-budget constraint overt covert and head starts-discrimination relate to structural discrimination that involves the parameters of the CSF. While the direct mode of discrimination is legally feasible the structural modes of discrimination are more subtle and more difficult to implement and sometimes may even involve legal barriers.,shmuel nitzan,Not available,2016.0,10.1007/s10058-016-0186-0,Review of Economic Design,Yosef2016,False,,Springer,Not available,Discrimination in contests: a survey,b1cdae272c4f3195e899095fb25b8af4,http://dx.doi.org/10.1007/s10058-016-0186-0 3721,Auctions have become popular as means of allocating emissions permits in the emissions trading schemes developed around the world. Mostly only a subset of the regulated polluters participate in these auctions along with speculators creating a market with relatively few participants and thus incentive for strategic bidding. I characterize the bidding behavior of the polluters and the speculators examining the effect of the latter on the profits of the former and on the auction outcome. It turns out that in addition to bidding for compliance polluters also bid for speculation in the aftermarket. While the presence of the speculators forces the polluters to bid closer to their true valuations it also creates a trade-off between increasing the revenue accrued to the regulator and reducing the profits of the auction-participating polluters. Nevertheless the profits of the latter increase in the speculators’ risk aversion.,corina haita-falah,Not available,2016.0,10.1007/s11149-016-9299-1,Journal of Regulatory Economics,Corina2016,False,,Springer,Not available,Uncertainty and speculators in an auction for emissions permits,2726a8e56abcb4e7a24612c74133b4b1,http://dx.doi.org/10.1007/s11149-016-9299-1 3722,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,kemal guler,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 3723,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,martin bichler,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 3724,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,jian wan,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 3725,Ascending combinatorial auctions are being used in an increasing number of spectrum sales worldwide as well as in other multi-item markets in procurement and logistics. Much research has focused on pricing and payment rules in such ascending auctions. However recent game-theoretical research has shown that such auctions can even lead to inefficient perfect Bayesian equilibria with risk-neutral bidders. There is a fundamental free-rider problem without a simple solution raising the question whether ascending combinatorial auctions can be expected to be efficient in the field. Risk aversion is arguably a significant driver of bidding behavior in high-stakes auctions. We analyze the impact of risk aversion on equilibrium bidding strategies and efficiency in a threshold problem with one global and several local bidders. Due to the underlying free-rider problem the impact of risk-aversion on equilibrium bidding strategies of local bidders is not obvious. We characterize the necessary and sufficient conditions for the perfect Bayesian equilibria of the ascending auction mechanism to have the local bidders to drop at the reserve price. Interestingly in spite of the free-riding opportunities of local bidders risk-aversion reduces the scope of the non-bidding equilibrium. The results help explain the high efficiency of ascending combinatorial auctions observed in the lab.,ioannis petrakis,Not available,2016.0,10.1007/s10726-015-9454-6,Group Decision and Negotiation,Kemal2016,False,,Springer,Not available,Ascending Combinatorial Auctions with Risk Averse Bidders,cf85d44acd51adcc080e2413addac33f,http://dx.doi.org/10.1007/s10726-015-9454-6 3726,We develop a model of implicit collusion in repeated procurement auctions in which suppliers can only observe past auction prices but not all bids and the identities of winners. We focus on symmetric perfect public equilibria (SPPE) and use the dynamic programming techniques to characterize the optimal SPPE. We allow for a public randomization device and find that the implementation of the optimal collusive equilibrium can be simply obtained by using the bang-bang property because suppliers just need to adopt the collusive bidding schedule and depending on the past winning bids with a certain probability they stick to that strategy or move to Nash reversion. The optimal implicit collusion is characterized by a rigid-bidding scheme with punishments occurring on the equilibrium path. As a result the optimal collusion can not achieve full efficiency.,hong wang,Not available,2016.0,10.1007/s00712-015-0457-1,Journal of Economics,Hong2016,False,,Springer,Not available,Optimal implicit collusion in repeated procurement auctions,cbd354c0e0cd7c85abf0b49a86c83ca4,http://dx.doi.org/10.1007/s00712-015-0457-1 3727,We consider markets consisting of a set of indivisible items and buyers that have ,ning chen,Not available,2016.0,10.1007/s10878-014-9817-y,Journal of Combinatorial Optimization,Ning2016,False,,Springer,Not available,On revenue maximization with sharp multi-unit demands,b94bbfcd02513e785092ce75384c4ec3,http://dx.doi.org/10.1007/s10878-014-9817-y 3728,We consider markets consisting of a set of indivisible items and buyers that have ,xiaotie deng,Not available,2016.0,10.1007/s10878-014-9817-y,Journal of Combinatorial Optimization,Ning2016,False,,Springer,Not available,On revenue maximization with sharp multi-unit demands,b94bbfcd02513e785092ce75384c4ec3,http://dx.doi.org/10.1007/s10878-014-9817-y 3729,We consider markets consisting of a set of indivisible items and buyers that have ,paul goldberg,Not available,2016.0,10.1007/s10878-014-9817-y,Journal of Combinatorial Optimization,Ning2016,False,,Springer,Not available,On revenue maximization with sharp multi-unit demands,b94bbfcd02513e785092ce75384c4ec3,http://dx.doi.org/10.1007/s10878-014-9817-y 3730,We consider markets consisting of a set of indivisible items and buyers that have ,jinshan zhang,Not available,2016.0,10.1007/s10878-014-9817-y,Journal of Combinatorial Optimization,Ning2016,False,,Springer,Not available,On revenue maximization with sharp multi-unit demands,b94bbfcd02513e785092ce75384c4ec3,http://dx.doi.org/10.1007/s10878-014-9817-y 3731,Public–private partnerships have seen the daylight in response to the adagio that project responsibilities and risks should be efficiently allocated between the public and the private sector. Nevertheless the considerable bidding costs inhibit the competition in the market. A trustworthy project agenda also called a project pipeline could substantiate the PPP market’s attractiveness in the belief that a current success results in a knowledge and cost advantage in future tenders. This paper builds a sequential PPP procurement model and heuristically approximates the Markov perfect equilibrium in which contractors determine how much money they are willing to invest in the bid preparation and which mark-up is appropriate for each project in the pipeline. A pipeline of projects pushes down the mark-ups and the government procurement cost. Nonetheless according to the experiments only players with an initial experiential advantage tend to make higher investment efforts so that additional governmental policies like a fractional reimbursement of the bid preparation efforts might be required to level the playing field.,dennis clerck,Not available,2016.0,10.1007/s00291-015-0421-z,OR Spectrum,Dennis2016,False,,Springer,Not available,A sequential procurement model for a PPP project pipeline,d2b8b4385c90c6d4bd69d419951de16c,http://dx.doi.org/10.1007/s00291-015-0421-z 3732,Public–private partnerships have seen the daylight in response to the adagio that project responsibilities and risks should be efficiently allocated between the public and the private sector. Nevertheless the considerable bidding costs inhibit the competition in the market. A trustworthy project agenda also called a project pipeline could substantiate the PPP market’s attractiveness in the belief that a current success results in a knowledge and cost advantage in future tenders. This paper builds a sequential PPP procurement model and heuristically approximates the Markov perfect equilibrium in which contractors determine how much money they are willing to invest in the bid preparation and which mark-up is appropriate for each project in the pipeline. A pipeline of projects pushes down the mark-ups and the government procurement cost. Nonetheless according to the experiments only players with an initial experiential advantage tend to make higher investment efforts so that additional governmental policies like a fractional reimbursement of the bid preparation efforts might be required to level the playing field.,erik demeulemeester,Not available,2016.0,10.1007/s00291-015-0421-z,OR Spectrum,Dennis2016,False,,Springer,Not available,A sequential procurement model for a PPP project pipeline,d2b8b4385c90c6d4bd69d419951de16c,http://dx.doi.org/10.1007/s00291-015-0421-z 3733,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ezra einy,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 3734,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ori haimanko,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 3735,Virtualization is widely used in cloud computing environments to efficiently manage resources but it also raises several challenges. One of them is the fairness issue of resource allocation among virtual machines. Traditional virtualized resource allocation approaches distribute physical resources equally without taking into account the actual workload of each virtual machine and thus often leads to wasting. In this paper we propose a virtualized resource auction and allocation model (VRAA) based on incentive and penalty to correct this wasting problem. In our approach we use Nash equilibrium of cooperative games to fairly allocate resources among multiple virtual machines to maximize revenue of the system. To illustrate the effectiveness of the proposed approach we then apply the basic laws of auction gaming to investigate how CPU allocation and contention can affect applications’ performance (i.e. response time) and its effect on CPU utilization. We find that in our VRAA model the fairness index is high and the resource allocation is closely proportional to the actual workloads of the virtual machines so the wasting of resources is reduced. Experiment results show that our model is general and can be applied to other virtualized non-CPU resources.,li zhou,Not available,2013.0,10.1007/s10586-012-0235-6,Cluster Computing,Congfeng2013,False,,Springer,Not available,VRAA: virtualized resource auction and allocation based on incentive and penalty,48d85c3b1cb8078a48236819352371db,http://dx.doi.org/10.1007/s10586-012-0235-6 3736,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,ram orzach,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 3737,We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over his opponent and both players are budget-constrained. We extend the results for all-pay auctions with complete information and show that in our class of all-pay auctions with asymmetric information sufficiently high (but still binding) bid caps do not change the players’ expected total effort compared to the benchmark auction without any bid cap. Furthermore we show that there are bid caps that increase the players’ expected total effort compared to the benchmark. Finally we demonstrate that there are bid caps which may have an unanticipated effect on the players’ expected payoffs—one player’s information advantage may turn into a disadvantage as far as his equilibrium payoff is concerned.,aner sela,Not available,2016.0,10.1007/s00182-015-0492-8,International Journal of Game Theory,Ezra2016,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information and bid caps,b5361a9c1603f3a60d1c870973e41bbc,http://dx.doi.org/10.1007/s00182-015-0492-8 3738,Online auctions for perishable products have tremendous potentials. However the current forms of online auctions do not take full advantages of information technology enabled online auctions and are ineffective for online auctions for perishable products. This study proposes a virtual competition auction model for perishable products. In virtual competition auctions the bidder is provided with auction historical data and the bidder’s decision is represented by a demand curve that is composed of a series of bids. A preliminary laboratory experiment based on a prototype of virtual competition auction system is reported. The preliminary laboratory experiment result shows that the virtual competition auction model for perishable products is more effective than the ordinary open-cry auction model.,shouhong wang,Not available,2011.0,10.1007/s12525-011-0049-z,Electronic Markets,Shouhong2011,False,,Springer,Not available,A virtual competition auction model for perishable products,caa856067dd46cfc21e753600f22cd32,http://dx.doi.org/10.1007/s12525-011-0049-z 3739,Online auctions for perishable products have tremendous potentials. However the current forms of online auctions do not take full advantages of information technology enabled online auctions and are ineffective for online auctions for perishable products. This study proposes a virtual competition auction model for perishable products. In virtual competition auctions the bidder is provided with auction historical data and the bidder’s decision is represented by a demand curve that is composed of a series of bids. A preliminary laboratory experiment based on a prototype of virtual competition auction system is reported. The preliminary laboratory experiment result shows that the virtual competition auction model for perishable products is more effective than the ordinary open-cry auction model.,hai wang,Not available,2011.0,10.1007/s12525-011-0049-z,Electronic Markets,Shouhong2011,False,,Springer,Not available,A virtual competition auction model for perishable products,caa856067dd46cfc21e753600f22cd32,http://dx.doi.org/10.1007/s12525-011-0049-z 3740,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which includes budgets and study their equilibrium and dynamics. Our abstraction has multiple agents biding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value for per item. We abstract the repeated interaction as a one-shot game which we call ,asaph arnon,Not available,2011.0,10.1007/978-3-642-24829-0_3,Algorithmic Game Theory,Asaph2011,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,223fe9d91518d4841d1763e57d6c8416,http://dx.doi.org/10.1007/978-3-642-24829-0_3 3741,Our main goal is to abstract existing repeated sponsored search ad auction mechanisms which includes budgets and study their equilibrium and dynamics. Our abstraction has multiple agents biding repeatedly for multiple identical items (such as impressions in an ad auction). The agents are budget limited and have a value for per item. We abstract the repeated interaction as a one-shot game which we call ,yishay mansour,Not available,2011.0,10.1007/978-3-642-24829-0_3,Algorithmic Game Theory,Asaph2011,False,,Springer,Not available,Repeated Budgeted Second Price Ad Auction,223fe9d91518d4841d1763e57d6c8416,http://dx.doi.org/10.1007/978-3-642-24829-0_3 3742,With the recent rapid growth of communication networking and video compression technology the real-time video streaming applications have evolved from traditional single-stream along simple transmitter-to-receiver path to complex multiple streams through advanced full-fledged cooperative networks. In this chapter three major emerging advanced concepts are introduced: cooperative transmission distributed source coding (DSC) and share auction based resource allocation. Cooperative transmission has been demonstrated as an effective transmission scheme to form virtual multiple-input and multiple-output (MIMO) system and provide diversity gains. Distributed source coding brings a new coding paradigm by letting the receiver jointly exploit the statistical dependencies among multiple streams sent from different sources without coding rate penalty. Share auction brings efficient way to allocate system resources in a distributed and collaborated manner to alleviate computation complexity. Based on these advanced concepts along with the advanced video processing ability for side information generation a wireless multi-stream video transmission framework over full-fledged cooperative networks is presented.,guan-ming su,Not available,2011.0,10.1007/978-3-642-19551-8_21,Multimedia Analysis Processing and Communications,Guan-Ming2011,False,,Springer,Not available,Auction Based Resource Allocation for Cooperative Wireless Video Transmission with Distributed Source Coding,22548afc88fc0bb63f042f264ce191db,http://dx.doi.org/10.1007/978-3-642-19551-8_21 3743,With the recent rapid growth of communication networking and video compression technology the real-time video streaming applications have evolved from traditional single-stream along simple transmitter-to-receiver path to complex multiple streams through advanced full-fledged cooperative networks. In this chapter three major emerging advanced concepts are introduced: cooperative transmission distributed source coding (DSC) and share auction based resource allocation. Cooperative transmission has been demonstrated as an effective transmission scheme to form virtual multiple-input and multiple-output (MIMO) system and provide diversity gains. Distributed source coding brings a new coding paradigm by letting the receiver jointly exploit the statistical dependencies among multiple streams sent from different sources without coding rate penalty. Share auction brings efficient way to allocate system resources in a distributed and collaborated manner to alleviate computation complexity. Based on these advanced concepts along with the advanced video processing ability for side information generation a wireless multi-stream video transmission framework over full-fledged cooperative networks is presented.,zhu han,Not available,2011.0,10.1007/978-3-642-19551-8_21,Multimedia Analysis Processing and Communications,Guan-Ming2011,False,,Springer,Not available,Auction Based Resource Allocation for Cooperative Wireless Video Transmission with Distributed Source Coding,22548afc88fc0bb63f042f264ce191db,http://dx.doi.org/10.1007/978-3-642-19551-8_21 3744,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,huirong tang,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 3745,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,huimin wang,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 3746,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,martin bichler,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 3747,This paper briefly introduces the market structure and operating mechanism of the water pollutant emissions trading in order to increase efficiency and proposes the double auction model which consists of water pollutant emissions trading transaction costs and trading volume and the auction price and the exchange price trading mechanism rules. Then a numerical example is given to illustrate the application of this model and it is significant in water pollutant emissions trading.,lei qiu,Not available,2011.0,10.1007/978-3-642-18387-4_41,Modeling Risk Management for Resources and Environment in China,Huirong2011,False,,Springer,Not available,Study on Double Auction Model for Discharge Quota Trading of Water Pollutants,5fe6f369a747e954fb0d7c263e30ef05,http://dx.doi.org/10.1007/978-3-642-18387-4_41 3748,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,atakelty hailu,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 3749,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,john rolfe,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 3750,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,jill windle,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 3751,This paper presents results from computational experiments evaluating the impact on performance of different auction design features. The focus of the study is a conservation auction for water quality where auctions are used to allocate contracts for improved land management practices among landholders bidding to provide conservation services. An agent-based model of bidder agents that learn using a combination of direction and reinforcement learning algorithms is used to simulate performance. The auction design features studied include: mix of conservation activities in tendered projects (auction scope effects); auction budget levels relative to bidder population size (auction scale effects); auction pricing rules (uniform versus discriminatory pricing); and endogeneity of bidder participation. Both weak and strong bidder responses to tender failure are explored for the case of endogeneity in participation. The results highlight the importance of a careful consideration of scale and scope issues and that policymakers need to consider alternatives to currently used pay-as-bid or discriminatory pricing fromats. Averaging over scope variations the uniform auction can deliver substantially higher budgetary efficiency compared to the discriminatory auction. This advantage is especially higher when bidder participation decisions are more sensitive to auction outcomes.,romy greiner,Not available,2011.0,10.1007/978-3-642-19890-8_16,Agents and Artificial Intelligence,Atakelty2011,False,,Springer,Not available,Auction Design and Performance: An Agent-Based Simulation with Endogenous Participation,2bba0eec6a5842e554954e77323a7076,http://dx.doi.org/10.1007/978-3-642-19890-8_16 3752,In this paper we investigate resource allocation issue in a multiuser OFDM cellular network. Each user in the network intends to obtain a higher rate from the BS for its own data transmission (e.g. pictures or videos downloading) but the total transmission resource is limited at the BS. Thus we formulated this resource allocation problem as an auction game where the BS acts as the auctioneer and the users are the bidders. We then propose a novel joint subcarrier and power allocation algorithm using distributed auction game in order to allocate the limited subcarriers and power effectively and maximize the total transmission rate subject to an overall power constraint with low-complexity and fairness. Finally simulation results are presented to demonstrate the efficiency of the proposed auction-based algorithm.,rongqing zhang,Not available,2011.0,10.1007/978-3-642-23490-3_39,Wireless Algorithms Systems and Applications,Rongqing2011,False,,Springer,Not available,Joint Subcarrier and Power Allocation for Multiuser OFDM Systems Using Distributed Auction Game,4d6dd13fe9a1de24d29ee4e151897490,http://dx.doi.org/10.1007/978-3-642-23490-3_39 3753,In this paper we investigate resource allocation issue in a multiuser OFDM cellular network. Each user in the network intends to obtain a higher rate from the BS for its own data transmission (e.g. pictures or videos downloading) but the total transmission resource is limited at the BS. Thus we formulated this resource allocation problem as an auction game where the BS acts as the auctioneer and the users are the bidders. We then propose a novel joint subcarrier and power allocation algorithm using distributed auction game in order to allocate the limited subcarriers and power effectively and maximize the total transmission rate subject to an overall power constraint with low-complexity and fairness. Finally simulation results are presented to demonstrate the efficiency of the proposed auction-based algorithm.,lingyang song,Not available,2011.0,10.1007/978-3-642-23490-3_39,Wireless Algorithms Systems and Applications,Rongqing2011,False,,Springer,Not available,Joint Subcarrier and Power Allocation for Multiuser OFDM Systems Using Distributed Auction Game,4d6dd13fe9a1de24d29ee4e151897490,http://dx.doi.org/10.1007/978-3-642-23490-3_39 3754,In this paper we investigate resource allocation issue in a multiuser OFDM cellular network. Each user in the network intends to obtain a higher rate from the BS for its own data transmission (e.g. pictures or videos downloading) but the total transmission resource is limited at the BS. Thus we formulated this resource allocation problem as an auction game where the BS acts as the auctioneer and the users are the bidders. We then propose a novel joint subcarrier and power allocation algorithm using distributed auction game in order to allocate the limited subcarriers and power effectively and maximize the total transmission rate subject to an overall power constraint with low-complexity and fairness. Finally simulation results are presented to demonstrate the efficiency of the proposed auction-based algorithm.,zhu han,Not available,2011.0,10.1007/978-3-642-23490-3_39,Wireless Algorithms Systems and Applications,Rongqing2011,False,,Springer,Not available,Joint Subcarrier and Power Allocation for Multiuser OFDM Systems Using Distributed Auction Game,4d6dd13fe9a1de24d29ee4e151897490,http://dx.doi.org/10.1007/978-3-642-23490-3_39 3755,In this paper we investigate resource allocation issue in a multiuser OFDM cellular network. Each user in the network intends to obtain a higher rate from the BS for its own data transmission (e.g. pictures or videos downloading) but the total transmission resource is limited at the BS. Thus we formulated this resource allocation problem as an auction game where the BS acts as the auctioneer and the users are the bidders. We then propose a novel joint subcarrier and power allocation algorithm using distributed auction game in order to allocate the limited subcarriers and power effectively and maximize the total transmission rate subject to an overall power constraint with low-complexity and fairness. Finally simulation results are presented to demonstrate the efficiency of the proposed auction-based algorithm.,zhongshan zhang,Not available,2011.0,10.1007/978-3-642-23490-3_39,Wireless Algorithms Systems and Applications,Rongqing2011,False,,Springer,Not available,Joint Subcarrier and Power Allocation for Multiuser OFDM Systems Using Distributed Auction Game,4d6dd13fe9a1de24d29ee4e151897490,http://dx.doi.org/10.1007/978-3-642-23490-3_39 3756,In this paper we investigate resource allocation issue in a multiuser OFDM cellular network. Each user in the network intends to obtain a higher rate from the BS for its own data transmission (e.g. pictures or videos downloading) but the total transmission resource is limited at the BS. Thus we formulated this resource allocation problem as an auction game where the BS acts as the auctioneer and the users are the bidders. We then propose a novel joint subcarrier and power allocation algorithm using distributed auction game in order to allocate the limited subcarriers and power effectively and maximize the total transmission rate subject to an overall power constraint with low-complexity and fairness. Finally simulation results are presented to demonstrate the efficiency of the proposed auction-based algorithm.,bingli jiao,Not available,2011.0,10.1007/978-3-642-23490-3_39,Wireless Algorithms Systems and Applications,Rongqing2011,False,,Springer,Not available,Joint Subcarrier and Power Allocation for Multiuser OFDM Systems Using Distributed Auction Game,4d6dd13fe9a1de24d29ee4e151897490,http://dx.doi.org/10.1007/978-3-642-23490-3_39 3757,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,pasha shabalin,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 3758,We discuss the optimal allocation problem in combinatorial auction where the items are allocated to bidders so that the sum of the bidders’ utilities is maximized. In this paper we consider the case where utility functions are given by quadratic functions; the class of quadratic utility functions has a succinct representation but is sufficiently general. The main aim of this paper is to show the computational complexity of the optimal allocation problem with quadratic utility functions. We consider the cases where utility functions are submodular and supermodular and show NP-hardness and/or polynomial-time exact/approximation algorithm. These results are given by using the relationship with graph cut problems such as the min/max cut problem and the multiway cut problem.,akiyoshi shioura,Not available,2011.0,10.1007/978-3-642-20877-5_15,Theory and Applications of Models of Computation,Akiyoshi2011,False,,Springer,Not available,Optimal Allocation in Combinatorial Auctions with Quadratic Utility Functions,99b41283adb1a2151afc0599defc0a3d,http://dx.doi.org/10.1007/978-3-642-20877-5_15 3759,We discuss the optimal allocation problem in combinatorial auction where the items are allocated to bidders so that the sum of the bidders’ utilities is maximized. In this paper we consider the case where utility functions are given by quadratic functions; the class of quadratic utility functions has a succinct representation but is sufficiently general. The main aim of this paper is to show the computational complexity of the optimal allocation problem with quadratic utility functions. We consider the cases where utility functions are submodular and supermodular and show NP-hardness and/or polynomial-time exact/approximation algorithm. These results are given by using the relationship with graph cut problems such as the min/max cut problem and the multiway cut problem.,shunya suzuki,Not available,2011.0,10.1007/978-3-642-20877-5_15,Theory and Applications of Models of Computation,Akiyoshi2011,False,,Springer,Not available,Optimal Allocation in Combinatorial Auctions with Quadratic Utility Functions,99b41283adb1a2151afc0599defc0a3d,http://dx.doi.org/10.1007/978-3-642-20877-5_15 3760,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,clemens dinther,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 3761,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,benjamin blau,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 3762,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,tobias conte,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 3763,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,christof weinhardt,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 3764,It is expected that in future user-centric wireless network scenario the concept of dynamic spectrum trade will provide operators with opportunities to utilize the spectrum more efficiently. Wireless market players (both incumbent and new entrants) trade the spectrum chunks on the ,manzoor khan,Not available,2011.0,10.1007/978-3-642-21560-5_4,Wired/Wireless Internet Communications,Ahmed2011,False,,Springer,Not available,Dynamic Spectrum Trade and Game-Theory Based Network Selection in LTE Virtualization Using Uniform Auctioning,64b4e37d8fa60d989423c62b68a8669d,http://dx.doi.org/10.1007/978-3-642-21560-5_4 3765,It is expected that in future user-centric wireless network scenario the concept of dynamic spectrum trade will provide operators with opportunities to utilize the spectrum more efficiently. Wireless market players (both incumbent and new entrants) trade the spectrum chunks on the ,yasir zaki,Not available,2011.0,10.1007/978-3-642-21560-5_4,Wired/Wireless Internet Communications,Ahmed2011,False,,Springer,Not available,Dynamic Spectrum Trade and Game-Theory Based Network Selection in LTE Virtualization Using Uniform Auctioning,64b4e37d8fa60d989423c62b68a8669d,http://dx.doi.org/10.1007/978-3-642-21560-5_4 3766,We formally study two privacy-type properties for online auction protocols: bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied ,naipeng dong,Not available,2011.0,10.1007/978-3-642-19751-2_15,Formal Aspects of Security and Trust,Naipeng2011,False,,Springer,Not available,Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus,93d5002d99f6e6fbbbf53b437189e637,http://dx.doi.org/10.1007/978-3-642-19751-2_15 3767,We formally study two privacy-type properties for online auction protocols: bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied ,hugo jonker,Not available,2011.0,10.1007/978-3-642-19751-2_15,Formal Aspects of Security and Trust,Naipeng2011,False,,Springer,Not available,Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus,93d5002d99f6e6fbbbf53b437189e637,http://dx.doi.org/10.1007/978-3-642-19751-2_15 3768,For many years the Simultaneous Multi-Round Auction (SMRA) has been the primary auction design for spectrum sales worldwide. Recently the core-selecting Combinatorial Clock Auction (CCA) has been used as an alternative to the SMRA in a number of countries promising strong incentives for truthful bidding and high efficiency as a result. We analyze the efficiency and auctioneer revenue of the CCA in comparison to SMRA and examine bidding behavior in both formats. The experiments are based on two value models which resemble single- and multiband spectrum sales in the field. Such applications often allow for thousands of possible bundles. Bidders in the CCA submitted bids for only a fraction of all bundles with a positive valuation. Bundles were selected based on synergies and payoff after the primary bid rounds. As a consequence we found efficiency of the CCA to be significantly lower than that of SMRA in the multi-band value model and auctioneer revenue of the CCA to be lower in both value models. In addition we characterize several properties of the auction format which result from the two-stage design and the payment and activity rules.,jurgen wolf,Not available,2013.0,10.1007/s10683-013-9350-3,Experimental Economics,Martin2013,False,,Springer,Not available,Do core-selecting Combinatorial Clock Auctions always lead to high efficiency? An experimental analysis of spectrum auction designs,826bd416a6efa269f68819edff4592a8,http://dx.doi.org/10.1007/s10683-013-9350-3 3769,We formally study two privacy-type properties for online auction protocols: bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied ,jun pang,Not available,2011.0,10.1007/978-3-642-19751-2_15,Formal Aspects of Security and Trust,Naipeng2011,False,,Springer,Not available,Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus,93d5002d99f6e6fbbbf53b437189e637,http://dx.doi.org/10.1007/978-3-642-19751-2_15 3770,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,ahmad quttoum,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 3771,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,abdallah jarray,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 3772,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,hadi otrok,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 3773,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,zbigniew dziong,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 3774,We study a first-price auction preceded by a negotiation stage with complete information during which bidders may form a bidding ring. We prove that in the absence of externalities the grand cartel forms in equilibrium allowing ring members to gain the auctioned object for a minimal price. However identity-dependent externalities may lead to the formation of small rings as often observed in practice. Potential ring members may condition their participation on high transfer payments as a compensation for their expected (negative) externalities if the ring forms. The cartel may therefore profitably exclude these bidders although risking tougher competition in the auction. We also analyze ring (in)efficiency in the presence of externalities showing that a ring may prefer sending an inefficient member to the auction if the efficient member exerts threatening externalities on bidders outside the ring which in turn leads to a higher winning price.,omer biran,Not available,2013.0,10.1007/s11238-012-9330-7,Theory and Decision,Omer2013,False,,Springer,Not available,Strategic collusion in auctions with externalities,e17c32032b658ebcef1555b6c1526d49,http://dx.doi.org/10.1007/s11238-012-9330-7 3775,We study the emergence of strategic behavior in double auctions with an equal number of buyers and sellers under the distinct assumptions that orders are cleared simultaneously or asynchronously. The evolution of strategic behavior is modeled as a learning process driven by a genetic algorithm. We find that as the size of the market grows allocative inefficiency tends to zero and performance converges to the competitive outcome regardless of the order-clearing rule. The main result concerns the evolution of strategic behavior as the size of the market gets larger. Under simultaneous order-clearing only marginal traders learn to be ,shira fano,Not available,2013.0,10.1007/s00191-011-0226-4,Journal of Evolutionary Economics,Shira2013,False,,Springer,Not available,Convergence of outcomes and evolution of strategic behavior in double auctions,cc789040cc539ef52ae688d8f3049682,http://dx.doi.org/10.1007/s00191-011-0226-4 3776,We study the emergence of strategic behavior in double auctions with an equal number of buyers and sellers under the distinct assumptions that orders are cleared simultaneously or asynchronously. The evolution of strategic behavior is modeled as a learning process driven by a genetic algorithm. We find that as the size of the market grows allocative inefficiency tends to zero and performance converges to the competitive outcome regardless of the order-clearing rule. The main result concerns the evolution of strategic behavior as the size of the market gets larger. Under simultaneous order-clearing only marginal traders learn to be ,marco licalzi,Not available,2013.0,10.1007/s00191-011-0226-4,Journal of Evolutionary Economics,Shira2013,False,,Springer,Not available,Convergence of outcomes and evolution of strategic behavior in double auctions,cc789040cc539ef52ae688d8f3049682,http://dx.doi.org/10.1007/s00191-011-0226-4 3777,We study the emergence of strategic behavior in double auctions with an equal number of buyers and sellers under the distinct assumptions that orders are cleared simultaneously or asynchronously. The evolution of strategic behavior is modeled as a learning process driven by a genetic algorithm. We find that as the size of the market grows allocative inefficiency tends to zero and performance converges to the competitive outcome regardless of the order-clearing rule. The main result concerns the evolution of strategic behavior as the size of the market gets larger. Under simultaneous order-clearing only marginal traders learn to be ,paolo pellizzari,Not available,2013.0,10.1007/s00191-011-0226-4,Journal of Evolutionary Economics,Shira2013,False,,Springer,Not available,Convergence of outcomes and evolution of strategic behavior in double auctions,cc789040cc539ef52ae688d8f3049682,http://dx.doi.org/10.1007/s00191-011-0226-4 3778,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,bo-ruei kao,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 3779,Reserve price auctions are one of hot research issues in traditional auction theory. Here we study the starting price in an online auction the counterpart of the public reserve price in a traditional auction. By considering three features of eBay-like online auctions: stochastic entry of bidders (subject to Poisson process) insertion fee proportional to the starting price and time discount we have analyzed the properties of extremum points of the starting price for maximizing the seller's expected revenue and found that under certain conditions the optimal starting price should be at the lowest allowable level which is contrary to the results from the classic auction theory and finds its optimality in reality. We have also developed a general extended model of multistage auctions and carried out analysis on its properties. At last some directions for further research are also put forward.,chuangyin dang,Not available,2006.0,10.1007/s11424-006-0009-4,Journal of Systems Science and Complexity,Hai2006,False,,Springer,Not available,Optimal Starting Price for Ebay-Like Online Auctions,f6a190400982d77cb7aa60992fd0d669,http://dx.doi.org/10.1007/s11424-006-0009-4 3780,The focus of this paper is on Dutch auctions where the bidding prices are restricted to a finite set of values and the number of bidders follows a Poisson distribution. The goal is to determine what the discrete bid levels should be to maximize the auctioneer’s expected revenue which is the same as the average selling price of the object under consideration. We take a new approach to the problem by formulating the descending-price competitive bidding process as a nonlinear program. The optimal solution indicates that the interval between two successive bids should be wider as the Dutch auction progresses. Moreover the auctioneer’s maximum expected revenue increases with the number of bid levels to be set as well as the expected number of bidders. Numerical examples are provided to illustrate the key results from this study and their managerial implications are discussed.,zhen li,Not available,2013.0,10.1007/s10479-013-1331-6,Annals of Operations Research,Zhen2013,False,,Springer,Not available,Design of discrete Dutch auctions with an uncertain number of bidders,d1caa88be45671ca8775cd10018cc43e,http://dx.doi.org/10.1007/s10479-013-1331-6 3781,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,nguyen tu,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 3782,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,i.-shyan hwang,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 3783,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,k. lai,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 3784,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,mikhail anufriev,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 3785,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,jasmina arifovic,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 3786,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,john ledyard,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 3787,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,valentyn panchenko,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 3788,A durable asset is sold in a sealed-bid first price auction. The seller sets an undisclosed reservation price. The seller has no prior information respecting the private valuations of the bidders. If no bid exceeds the reservation price the asset is sequentially auctioned until it is sold. A rational seller will design an intertemporal series of reservation prices that maximize the discounted value of the transaction price. To accomplish this the seller uses the history of unsuccessful bids to estimate the probability density functions governing the maximum bids at each hypothetical future auction date.,edmund mantell,Not available,2013.0,10.1007/s11293-012-9345-z,Atlantic Economic Journal,H.2013,False,,Springer,Not available,Rational Reserve Pricing in Sequential Auctions,5b570a662507047e057149dc93f15de8,http://dx.doi.org/10.1007/s11293-012-9345-z 3789,In this paper we investigate the role that the competition among knowledge sources plays in the problem solving behavior of a population as the complexity of the optimization problem solving landscapes increases. We employ a type of game theoretic mechanism auctions in our study. Our main goal is to determine whether it matters if knowledge sources competed for individuals using auction mechanisms or weighted majority win mechanisms as the landscape complexity increased. The weighted majority win situation allows the Knowledge Sources to make predictions about future success whereas the Auction mechanism allows them to invest in their future by using tokens earned from recent performance. This latter approach allows contextual Knowledge Sources such as Situational Knowledge to play a larger role. Although the results are preliminary it appears that the auction mechanism is more efficient when solving a problem in situations where contextual information is available. In that case it is easier for the knowledge sources to make judicial bids or investments. However once the landscapes become chaotic there is less contextual information available and correspondingly little advantage to the auction mechanism over the weighted majority win situation in terms of the number of generations needed to achieve a solution.,robert reynolds,Not available,2013.0,10.1007/s12293-013-0112-8,Memetic Computing,G.2013,False,,Springer,Not available,Optimization problem solving with auctions in Cultural Algorithms,36ec40f774b9397bdc2ff60f9dbfd49c,http://dx.doi.org/10.1007/s12293-013-0112-8 3790,In this paper we investigate the role that the competition among knowledge sources plays in the problem solving behavior of a population as the complexity of the optimization problem solving landscapes increases. We employ a type of game theoretic mechanism auctions in our study. Our main goal is to determine whether it matters if knowledge sources competed for individuals using auction mechanisms or weighted majority win mechanisms as the landscape complexity increased. The weighted majority win situation allows the Knowledge Sources to make predictions about future success whereas the Auction mechanism allows them to invest in their future by using tokens earned from recent performance. This latter approach allows contextual Knowledge Sources such as Situational Knowledge to play a larger role. Although the results are preliminary it appears that the auction mechanism is more efficient when solving a problem in situations where contextual information is available. In that case it is easier for the knowledge sources to make judicial bids or investments. However once the landscapes become chaotic there is less contextual information available and correspondingly little advantage to the auction mechanism over the weighted majority win situation in terms of the number of generations needed to achieve a solution.,leonard kinnaird-heether,Not available,2013.0,10.1007/s12293-013-0112-8,Memetic Computing,G.2013,False,,Springer,Not available,Optimization problem solving with auctions in Cultural Algorithms,36ec40f774b9397bdc2ff60f9dbfd49c,http://dx.doi.org/10.1007/s12293-013-0112-8 3791,The focus of this paper is on Dutch auctions where the bidding prices are restricted to a finite set of values and the number of bidders follows a Poisson distribution. The goal is to determine what the discrete bid levels should be to maximize the auctioneer’s expected revenue which is the same as the average selling price of the object under consideration. We take a new approach to the problem by formulating the descending-price competitive bidding process as a nonlinear program. The optimal solution indicates that the interval between two successive bids should be wider as the Dutch auction progresses. Moreover the auctioneer’s maximum expected revenue increases with the number of bid levels to be set as well as the expected number of bidders. Numerical examples are provided to illustrate the key results from this study and their managerial implications are discussed.,ching-chung kuo,Not available,2013.0,10.1007/s10479-013-1331-6,Annals of Operations Research,Zhen2013,False,,Springer,Not available,Design of discrete Dutch auctions with an uncertain number of bidders,d1caa88be45671ca8775cd10018cc43e,http://dx.doi.org/10.1007/s10479-013-1331-6 3792,We provide the generalization of Ausubel’s 2004 ascending bid auction to public good environments. Like its private good counterpart the public good Ausubel auction encourages truthful revelation of preferences is privacy preserving and yields an equilibrium allocation that is outcome equivalent to the public good Vickrey auction. Other properties are not ideal in a public good setting. We discuss two such issues and propose an alternative dynamic auction which solves these problems.,matt essen,Not available,2013.0,10.1007/s40505-013-0007-3,Economic Theory Bulletin,Van2013,False,,Springer,Not available,Making efficient public good decisions using an augmented Ausubel auction,593ae2f9af528505a73f2891fb5e453f,http://dx.doi.org/10.1007/s40505-013-0007-3 3793,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,silva de,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 3794,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,georgia kosmopoulou,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 3795,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,beatrice pagel,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 3796,We provide a comparison of bidding behavior between multi-round and single-round auctions considering bid lettings for asphalt construction contracts that are known to have primarily private costs. Using a reduced-form difference-in-difference approach as well as the nonparametric estimation technique that was proposed by Racine and Li (J Econom 119(1):99–130 ,ronald peeters,Not available,2013.0,10.1007/s11151-012-9354-8,Review of Industrial Organization,G.2013,False,,Springer,Not available,The Impact of Timing on Bidding Behavior in Procurement Auctions of Contracts with Private Costs,df17dfd4502856740b6be045b0d25bb1,http://dx.doi.org/10.1007/s11151-012-9354-8 3797,In a single-item auction with agents having general preferences first-price auctions are axiomatically characterized. In this study we characterize first-price auctions by Pareto efficiency individual rationality anonymity in welfare and non-bossiness in welfare. The first three properties are satisfied by second-price auctions. Considering the well-known fact that second-price auctions are strategy-proof a clear distinction between first- and second-price auctions is reducible to the difference between non-bossiness and strategy-proofness both of which are important properties with respect to agents’ strategic behavior. In the characterization anonymity in welfare can be replaced by envy-freeness which is also a basic property related to equity among agents. Furthermore in our characterization each of the properties Pareto efficiency individual rationality and non-bossiness in welfare is independent and domains on which first-price auctions are characterized without equity properties are specified. By strengthening non-bossiness we characterize first-price auctions by a weaker equity property called equal welfare to equals.,tsuyoshi adachi,Not available,2013.0,10.1007/s40505-013-0001-9,Economic Theory Bulletin,Tsuyoshi2013,False,,Springer,Not available,First-price auctions on general preference domains: axiomatic characterizations,fa08b3f50c3c160301772b698a4c1da2,http://dx.doi.org/10.1007/s40505-013-0001-9 3798,In a single-item auction with agents having general preferences first-price auctions are axiomatically characterized. In this study we characterize first-price auctions by Pareto efficiency individual rationality anonymity in welfare and non-bossiness in welfare. The first three properties are satisfied by second-price auctions. Considering the well-known fact that second-price auctions are strategy-proof a clear distinction between first- and second-price auctions is reducible to the difference between non-bossiness and strategy-proofness both of which are important properties with respect to agents’ strategic behavior. In the characterization anonymity in welfare can be replaced by envy-freeness which is also a basic property related to equity among agents. Furthermore in our characterization each of the properties Pareto efficiency individual rationality and non-bossiness in welfare is independent and domains on which first-price auctions are characterized without equity properties are specified. By strengthening non-bossiness we characterize first-price auctions by a weaker equity property called equal welfare to equals.,takumi kongo,Not available,2013.0,10.1007/s40505-013-0001-9,Economic Theory Bulletin,Tsuyoshi2013,False,,Springer,Not available,First-price auctions on general preference domains: axiomatic characterizations,fa08b3f50c3c160301772b698a4c1da2,http://dx.doi.org/10.1007/s40505-013-0001-9 3799,A stylized phenomenological model for the continuous double auction is introduced. This model is equivalent to two uncoupled ,tijana radivojevic,Not available,2013.0,10.1007/978-3-642-31301-1_10,Managing Market Complexity,Tijana2013,False,,Springer,Not available,A stylized model for the continuous double auction,06c11c590d8b5fe410749d4ea57c431d,http://dx.doi.org/10.1007/978-3-642-31301-1_10 3800,A stylized phenomenological model for the continuous double auction is introduced. This model is equivalent to two uncoupled ,jonatha anselmi,Not available,2013.0,10.1007/978-3-642-31301-1_10,Managing Market Complexity,Tijana2013,False,,Springer,Not available,A stylized model for the continuous double auction,06c11c590d8b5fe410749d4ea57c431d,http://dx.doi.org/10.1007/978-3-642-31301-1_10 3801,A stylized phenomenological model for the continuous double auction is introduced. This model is equivalent to two uncoupled ,enrico scalas,Not available,2013.0,10.1007/978-3-642-31301-1_10,Managing Market Complexity,Tijana2013,False,,Springer,Not available,A stylized model for the continuous double auction,06c11c590d8b5fe410749d4ea57c431d,http://dx.doi.org/10.1007/978-3-642-31301-1_10 3802,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,wei yang,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 3803,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,thomas goff,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3804,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,amy greenwald,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3805,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,elizabeth hilliard,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3806,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,wolfgang ketter,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3807,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,andrew loomis,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3808,A key step in the evaluation of an intelligent agent (either autonomous or human) is determining the agent’s success as compared to other agents designed to participate in the same environment. Such comparisons are the basis for the Trading Agent Competition (TAC) in which autonomous trading agents compete in simulated market scenarios. TAC servers and agents alike are highly specialized and typically require teams of developers as TAC simulations tend to be rather complex. In this work we present a client-server infrastructure that is capable of simulating not just one complex market and its corresponding set of agents but a wide space of markets and potentially more robust agents. Supported market mechanisms include both user-designed auctions and a configurable set of auctions whose basic building blocks are commonly-studied (e.g. first-price second-price simultaneous sequential auctions). Our so-called Java Auction Configuration Kit (,eric sodomka,Not available,2013.0,10.1007/978-3-642-40864-9_4,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Thomas2013,False,,Springer,Not available," ",b90eb15f895968cd0406c3735a43d1b9,http://dx.doi.org/10.1007/978-3-642-40864-9_4 3809,The seminal work of Myerson (Mathematics of OR 81) characterizes incentive-compatible single-item auctions among bidders with independent valuations. In this setting relatively simple deterministic auction mechanisms achieve revenue optimality. When bidders have correlated valuations designing the revenue-optimal deterministic auction is a computationally demanding problem; indeed Papadimitriou and Pierrakos (STOC 11) proved that it is APX-hard obtaining an explicit inapproximability factor of 99.95%. In the current paper we strengthen this inapproximability factor to 57/58 ≈ 98.3%. Our proof is based on a gap-preserving reduction from the problem of maximizing the number of satisfied linear equations in an over-determined system of linear equations modulo 2 and uses the classical inapproximability result of Håstad (J. ACM 01). We furthermore show that the gap between the revenue of deterministic and randomized auctions can be as low as 13/14 ≈ 92.9% improving an explicit gap of 947/948 ≈ 99.9% by Dobzinski Fu and Kleinberg (STOC 11).,ioannis caragiannis,Not available,2013.0,10.1007/978-3-642-40450-4_24,Algorithms – ESA 2013,Ioannis2013,False,,Springer,Not available,Limitations of Deterministic Auction Design for Correlated Bidders,998b609d24a34b0296b23b53157c9d9d,http://dx.doi.org/10.1007/978-3-642-40450-4_24 3810,The seminal work of Myerson (Mathematics of OR 81) characterizes incentive-compatible single-item auctions among bidders with independent valuations. In this setting relatively simple deterministic auction mechanisms achieve revenue optimality. When bidders have correlated valuations designing the revenue-optimal deterministic auction is a computationally demanding problem; indeed Papadimitriou and Pierrakos (STOC 11) proved that it is APX-hard obtaining an explicit inapproximability factor of 99.95%. In the current paper we strengthen this inapproximability factor to 57/58 ≈ 98.3%. Our proof is based on a gap-preserving reduction from the problem of maximizing the number of satisfied linear equations in an over-determined system of linear equations modulo 2 and uses the classical inapproximability result of Håstad (J. ACM 01). We furthermore show that the gap between the revenue of deterministic and randomized auctions can be as low as 13/14 ≈ 92.9% improving an explicit gap of 947/948 ≈ 99.9% by Dobzinski Fu and Kleinberg (STOC 11).,christos kaklamanis,Not available,2013.0,10.1007/978-3-642-40450-4_24,Algorithms – ESA 2013,Ioannis2013,False,,Springer,Not available,Limitations of Deterministic Auction Design for Correlated Bidders,998b609d24a34b0296b23b53157c9d9d,http://dx.doi.org/10.1007/978-3-642-40450-4_24 3811,The seminal work of Myerson (Mathematics of OR 81) characterizes incentive-compatible single-item auctions among bidders with independent valuations. In this setting relatively simple deterministic auction mechanisms achieve revenue optimality. When bidders have correlated valuations designing the revenue-optimal deterministic auction is a computationally demanding problem; indeed Papadimitriou and Pierrakos (STOC 11) proved that it is APX-hard obtaining an explicit inapproximability factor of 99.95%. In the current paper we strengthen this inapproximability factor to 57/58 ≈ 98.3%. Our proof is based on a gap-preserving reduction from the problem of maximizing the number of satisfied linear equations in an over-determined system of linear equations modulo 2 and uses the classical inapproximability result of Håstad (J. ACM 01). We furthermore show that the gap between the revenue of deterministic and randomized auctions can be as low as 13/14 ≈ 92.9% improving an explicit gap of 947/948 ≈ 99.9% by Dobzinski Fu and Kleinberg (STOC 11).,maria kyropoulou,Not available,2013.0,10.1007/978-3-642-40450-4_24,Algorithms – ESA 2013,Ioannis2013,False,,Springer,Not available,Limitations of Deterministic Auction Design for Correlated Bidders,998b609d24a34b0296b23b53157c9d9d,http://dx.doi.org/10.1007/978-3-642-40450-4_24 3812,Auctions are procedures for selling one or more items to one or more bidders. Auctions induce games among the bidders so notions of equilibrium from game theory can be applied to auctions. Auction theory aims to characterize and compare the equilibrium outcomes for different types of auctions. Combinatorial auctions arise when multiple-related items are sold simultaneously.,bruce hajek,Not available,2013.0,10.1007/978-1-4471-5102-9_36-1,Encyclopedia of Systems and Control,Bruce2013,False,,Springer,Not available,Auctions,5a77e97e7fb4e39e0cd5f4301ed396eb,http://dx.doi.org/10.1007/978-1-4471-5102-9_36-1 3813,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,jun qiao,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 3814,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,wenlin xu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3815,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,kun yue,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3816,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,jin li,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3817,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,liang duan,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3818,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,suiye liu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3819,Sponsored search auctions play a crucial role in the Internet advertising. By considering the mutual interactions among advertisers in sponsored search auctions we propose a game-theory based method for advertisers cooperating with each other in a sponsored search auction. First we propose a cooperation bid strategy for advertisers’ coalition which could make the utility of the coalition increased and be obtained in linear time. Then we prove the coalitional game of advertisers has a non-empty core containing the Shapley value. Following we use an approximate Shapley value to distribute the coalition’s utility among advertisers in the coalition. Experiments results verify the efficiency and effectiveness of our method.,weiyi liu,Not available,2013.0,10.1007/978-3-642-41154-0_34,Web Information Systems Engineering – WISE 2013,Wenlin2013,False,,Springer,Not available,An Approach for Sponsored Search Auctions Based on the Coalitional Game Theory,401e5f36480a4acc55959cc52102691a,http://dx.doi.org/10.1007/978-3-642-41154-0_34 3820,The rapid growth of wireless technology has led to increasing demand for spectrum. In the past spectrum is statically allocated. As a result many wireless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper we model the problem of spectrum reallocation as a sealed-bid reserve auction and propose SAFE which is a ,ruihao zhu,Not available,2013.0,10.1007/978-3-642-39701-1_11,Wireless Algorithms Systems and Applications,Ruihao2013,False,,Springer,Not available,SAFE: A Strategy-Proof Auction Mechanism for Multi-radio Multi-channel Spectrum Allocation,62bbdef85e7a14235ac458fd15fd597f,http://dx.doi.org/10.1007/978-3-642-39701-1_11 3821,The rapid growth of wireless technology has led to increasing demand for spectrum. In the past spectrum is statically allocated. As a result many wireless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper we model the problem of spectrum reallocation as a sealed-bid reserve auction and propose SAFE which is a ,fan wu,Not available,2013.0,10.1007/978-3-642-39701-1_11,Wireless Algorithms Systems and Applications,Ruihao2013,False,,Springer,Not available,SAFE: A Strategy-Proof Auction Mechanism for Multi-radio Multi-channel Spectrum Allocation,62bbdef85e7a14235ac458fd15fd597f,http://dx.doi.org/10.1007/978-3-642-39701-1_11 3822,The rapid growth of wireless technology has led to increasing demand for spectrum. In the past spectrum is statically allocated. As a result many wireless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper we model the problem of spectrum reallocation as a sealed-bid reserve auction and propose SAFE which is a ,guihai chen,Not available,2013.0,10.1007/978-3-642-39701-1_11,Wireless Algorithms Systems and Applications,Ruihao2013,False,,Springer,Not available,SAFE: A Strategy-Proof Auction Mechanism for Multi-radio Multi-channel Spectrum Allocation,62bbdef85e7a14235ac458fd15fd597f,http://dx.doi.org/10.1007/978-3-642-39701-1_11 3823,,karla hoffman,Not available,2013.0,10.1007/978-1-4419-1153-7_1139,Encyclopedia of Operations Research and Management Science,L.2013,False,,Springer,Not available,Combinatorial Auctions,fe19010426bbc7cc62017ffddc1fcca0,http://dx.doi.org/10.1007/978-1-4419-1153-7_1139 3824,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,youyi feng,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 3825,We study first-price auctions with resale when there are many bidders and derive existence and characterization results under the assumption that the winner of the initial auction runs a second-price auction with an optimal reserve price. The fact that symmetrization fails when there are more than two bidders has been observed before but we also provide the ,gabor virag,Not available,2013.0,10.1007/s00199-011-0666-y,Economic Theory,Gábor2013,False,,Springer,Not available,First-price auctions with resale: the case of many bidders,d2de9af9cf989bea87e8cad79753aa53,http://dx.doi.org/10.1007/s00199-011-0666-y 3826,The focus of classic mechanism design has been on truthful direct-revelation mechanisms. In the context of combinatorial auctions the truthful direct-revelation mechanism that maximizes social welfare is the VCG mechanism. For many valuation spaces computing the allocation and payments of the VCG mechanism however is a computationally hard problem. We thus study the performance of the VCG mechanism when bidders are forced to choose bids from a subspace of the valuation space for which the VCG outcome can be computed efficiently. We prove improved upper bounds on the welfare loss for restrictions to additive bids and upper and lower bounds for restrictions to non-additive bids. These bounds show that the welfare loss increases in expressiveness. All our bounds apply to equilibrium concepts that can be computed in polynomial time as well as to learning outcomes.,paul dutting,Not available,2013.0,10.1007/978-3-642-45046-4_13,Web and Internet Economics,Paul2013,False,,Springer,Not available,Valuation Compressions in VCG-Based Combinatorial Auctions,855666eaca263f78a184867036064131,http://dx.doi.org/10.1007/978-3-642-45046-4_13 3827,The focus of classic mechanism design has been on truthful direct-revelation mechanisms. In the context of combinatorial auctions the truthful direct-revelation mechanism that maximizes social welfare is the VCG mechanism. For many valuation spaces computing the allocation and payments of the VCG mechanism however is a computationally hard problem. We thus study the performance of the VCG mechanism when bidders are forced to choose bids from a subspace of the valuation space for which the VCG outcome can be computed efficiently. We prove improved upper bounds on the welfare loss for restrictions to additive bids and upper and lower bounds for restrictions to non-additive bids. These bounds show that the welfare loss increases in expressiveness. All our bounds apply to equilibrium concepts that can be computed in polynomial time as well as to learning outcomes.,monika henzinger,Not available,2013.0,10.1007/978-3-642-45046-4_13,Web and Internet Economics,Paul2013,False,,Springer,Not available,Valuation Compressions in VCG-Based Combinatorial Auctions,855666eaca263f78a184867036064131,http://dx.doi.org/10.1007/978-3-642-45046-4_13 3828,The focus of classic mechanism design has been on truthful direct-revelation mechanisms. In the context of combinatorial auctions the truthful direct-revelation mechanism that maximizes social welfare is the VCG mechanism. For many valuation spaces computing the allocation and payments of the VCG mechanism however is a computationally hard problem. We thus study the performance of the VCG mechanism when bidders are forced to choose bids from a subspace of the valuation space for which the VCG outcome can be computed efficiently. We prove improved upper bounds on the welfare loss for restrictions to additive bids and upper and lower bounds for restrictions to non-additive bids. These bounds show that the welfare loss increases in expressiveness. All our bounds apply to equilibrium concepts that can be computed in polynomial time as well as to learning outcomes.,martin starnberger,Not available,2013.0,10.1007/978-3-642-45046-4_13,Web and Internet Economics,Paul2013,False,,Springer,Not available,Valuation Compressions in VCG-Based Combinatorial Auctions,855666eaca263f78a184867036064131,http://dx.doi.org/10.1007/978-3-642-45046-4_13 3829,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,christoph lange,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3830,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,marco caminati,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3831,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,manfred kerber,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3832,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,till mossakowski,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3833,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,colin rowat,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3834,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,makarius wenzel,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3835,Sponsored search advertising is a significant revenue source for search engines. To ameliorate revenues search engines often set fixed or variable reserve price to in influence advertisers’ bidding. This paper studies the optimal reserve price for a generalized second-price auction (GSP) under both static and dynamic settings. We show that if advertisers’ per-click value has an increasing generalized failure rate the search engine’s revenue rate is quasi-concave and hence there exists an optimal reserve price under both settings. Different from a static GSP auction where the optimal reserve price is proved to be constant in a dynamic setting the optimal reserve price is dependent on not only advertisers’ per-click values but also the number of ad links sold. A search engine should gradually raise reserve price as more qualified advertisers arrive and maintain the same threshold after all first-page positions are occupied.,baichun xiao,Not available,2013.0,10.1007/s11518-013-5229-2,Journal of Systems Science and Systems Engineering,Wei2013,False,,Springer,Not available,Optimal reserve price in static and dynamic sponsored search auctions,ce9e7e68b02c32993802e99acc7f1363,http://dx.doi.org/10.1007/s11518-013-5229-2 3836,Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties such as efficiency i.e. allocating goods to those bidders who value them most? We say: by formal machine-checked proofs. We investigated the suitability of the Isabelle Theorema Mizar and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey’s 1961 theorem on the properties of second-price auctions. Based on our formalisation experience taking an auction designer’s perspective we give recommendations on what system to use for formalising auctions and outline further steps towards a complete auction theory toolbox.,wolfgang windsteiger,Not available,2013.0,10.1007/978-3-642-39320-4_13,Intelligent Computer Mathematics,Christoph2013,False,,Springer,Not available,A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory,28a609da638e5a143754ef4e58d8b5dc,http://dx.doi.org/10.1007/978-3-642-39320-4_13 3837,Within a hedonic pricing model the preferences of Australian art purchasers are investigated. Emphasis is placed on the impact of an artwork’s dimensions upon its auction price. A salient aspect of this is the first test of the ‘golden ratio’ hypothesis in a market situation. It is concluded that purchasers prefer paintings that deviate from the golden rule. The ‘orientation’ of works (portrait landscape or square) as well as size also helps determine price. The impact of winning the Archibald portraiture prize (Australia’s foremost art prize) is found to have significant and positive impacts on winning artists’ prices. This suggests that purchasers are not fully informed. In addition a previously unsuspected relationship between artwork dimensions and Archibald prize winners was found. As well as purchasers’ preferences the artists’ choices of the dimensions of their artworks are considered.,helen higgs,Not available,2014.0,10.1007/s10824-012-9197-z,Journal of Cultural Economics,Helen2014,False,,Springer,Not available,The auction market for artworks and their physical dimensions: Australia—1986 to 2009,438bd06518591f9eeb85cd1108e983eb,http://dx.doi.org/10.1007/s10824-012-9197-z 3838,Within a hedonic pricing model the preferences of Australian art purchasers are investigated. Emphasis is placed on the impact of an artwork’s dimensions upon its auction price. A salient aspect of this is the first test of the ‘golden ratio’ hypothesis in a market situation. It is concluded that purchasers prefer paintings that deviate from the golden rule. The ‘orientation’ of works (portrait landscape or square) as well as size also helps determine price. The impact of winning the Archibald portraiture prize (Australia’s foremost art prize) is found to have significant and positive impacts on winning artists’ prices. This suggests that purchasers are not fully informed. In addition a previously unsuspected relationship between artwork dimensions and Archibald prize winners was found. As well as purchasers’ preferences the artists’ choices of the dimensions of their artworks are considered.,john forster,Not available,2014.0,10.1007/s10824-012-9197-z,Journal of Cultural Economics,Helen2014,False,,Springer,Not available,The auction market for artworks and their physical dimensions: Australia—1986 to 2009,438bd06518591f9eeb85cd1108e983eb,http://dx.doi.org/10.1007/s10824-012-9197-z 3839,Auctions and competitive bidding institutions are important both for empirical and theoretical reasons. The aim of this chapter is to examine the use of auctions paying equal attention to theory and practice. While theory suggests equilibrium bidding as a benchmark there is considerable empirical evidence (from controlled experiments and field data) that actual bidding behavior only loosely follows this normative prescription. Thus it is important to consider the design of auction institutions anticipating actual bidding behavior. The analysis provides normative guidelines concerning “market” performance. What types of auction institutions are likely to promote efficiency? Alternatively what auction procedures maximize the seller’s expected revenue? In combination auction theory and the corresponding empirical evidence can provide direct answers to these questions.,william samuelson,Not available,2014.0,10.1007/978-1-4614-7095-3_13,Game Theory and Business Applications,William2014,False,,Springer,Not available,Auctions: Advances in Theory and Practice,53e6111b30bd3e048024f72fba420e0e,http://dx.doi.org/10.1007/978-1-4614-7095-3_13 3840,,zhiyi huang,Not available,2014.0,10.1007/978-3-642-27848-8_791-1,Encyclopedia of Algorithms,Zhiyi2014,False,,Springer,Not available,Privacy Preserving Auction,18de60a5404b08e952830e028649a95f,http://dx.doi.org/10.1007/978-3-642-27848-8_791-1 3841,Auctions which are applicable to aid-related procurement systems have been recently recognized as an important tool for improving economic efficiency. Using data on procurement auctions for Japanese official development assistance projects the equilibrium bid function is estimated. The data reveals that a 1% increase in the number of bidders decreases the equilibrium bid by about 0.2%. This implies that strengthening competition at procurement auctions lowers contract prices and mitigates the heavy indebtedness of developing countries. Auctions are also instrumental in fostering local business environment and governance. For intensifying bidding competition it is useful to introduce an electronic bidding system encourage local firms to jointly bid and relax excessive qualification requirements.,atsushi iimi,Not available,2006.0,10.1007/s11151-006-0012-x,Review of Industrial Organization,Atsushi2006,False,,Springer,Not available,Auction Reforms for Effective Official Development Assistance,8611753d72fa376d9b3876be8fdc3378,http://dx.doi.org/10.1007/s11151-006-0012-x 3842,In this paper we propose an online auction based relay selection scheme for cooperative communication in CR networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput comparing with the conventional schemes.,tao jing,Not available,2014.0,10.1007/978-3-319-07782-6_44,Wireless Algorithms Systems and Applications,Tao2014,False,,Springer,Not available,Online Auction Based Relay Selection for Cooperative Communications in CR Networks,59354e442c20c86bee9653d35cecd6f2,http://dx.doi.org/10.1007/978-3-319-07782-6_44 3843,In this paper we propose an online auction based relay selection scheme for cooperative communication in CR networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput comparing with the conventional schemes.,fan zhang,Not available,2014.0,10.1007/978-3-319-07782-6_44,Wireless Algorithms Systems and Applications,Tao2014,False,,Springer,Not available,Online Auction Based Relay Selection for Cooperative Communications in CR Networks,59354e442c20c86bee9653d35cecd6f2,http://dx.doi.org/10.1007/978-3-319-07782-6_44 3844,In this paper we propose an online auction based relay selection scheme for cooperative communication in CR networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput comparing with the conventional schemes.,wei cheng,Not available,2014.0,10.1007/978-3-319-07782-6_44,Wireless Algorithms Systems and Applications,Tao2014,False,,Springer,Not available,Online Auction Based Relay Selection for Cooperative Communications in CR Networks,59354e442c20c86bee9653d35cecd6f2,http://dx.doi.org/10.1007/978-3-319-07782-6_44 3845,In this paper we propose an online auction based relay selection scheme for cooperative communication in CR networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput comparing with the conventional schemes.,yan huo,Not available,2014.0,10.1007/978-3-319-07782-6_44,Wireless Algorithms Systems and Applications,Tao2014,False,,Springer,Not available,Online Auction Based Relay Selection for Cooperative Communications in CR Networks,59354e442c20c86bee9653d35cecd6f2,http://dx.doi.org/10.1007/978-3-319-07782-6_44 3846,In this paper we propose an online auction based relay selection scheme for cooperative communication in CR networks. Specifically we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput comparing with the conventional schemes.,xiuzhen cheng,Not available,2014.0,10.1007/978-3-319-07782-6_44,Wireless Algorithms Systems and Applications,Tao2014,False,,Springer,Not available,Online Auction Based Relay Selection for Cooperative Communications in CR Networks,59354e442c20c86bee9653d35cecd6f2,http://dx.doi.org/10.1007/978-3-319-07782-6_44 3847,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-ranking) moving it either towards or away from their ranking by ,mukund sundararajan,Not available,2014.0,10.1007/978-3-662-44803-8_23,Algorithmic Game Theory,Mukund2014,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,b18e66a8aaff0df84655059f4037fa71,http://dx.doi.org/10.1007/978-3-662-44803-8_23 3848,We study how standard auction objectives in sponsored search markets are affected by refinement in the prediction of ad relevance (click-through rates). As the prediction algorithm takes more features into account its predictions become more refined; a natural question is whether this is desirable from the perspective of auction objectives. Our focus is on mechanisms that optimize for a convex combination of efficiency and revenue and our starting point is the observation that the objective of such a mechanism can only improve with refined prediction making refinement in the best interest of the search engine. We demonstrate that the impact of refinement on market efficiency is not always positive; nevertheless we are able to identify natural – and to some extent necessary – conditions under which refinement is guaranteed to also improve efficiency. Our main technical contribution is in explaining how refinement changes the ranking of advertisers by value (efficiency-ranking) moving it either towards or away from their ranking by ,inbal talgam-cohen,Not available,2014.0,10.1007/978-3-662-44803-8_23,Algorithmic Game Theory,Mukund2014,False,,Springer,Not available,Prediction and Welfare in Ad Auctions,b18e66a8aaff0df84655059f4037fa71,http://dx.doi.org/10.1007/978-3-662-44803-8_23 3849,Can search engines increase revenues by changing their position auctions? In this paper I analyze position auctions with general pricing rules to answer this question. In these auctions there are several items that are commonly ranked by bidders with unit demand. I show that revenues remain the same for position auctions with regular pricing rules where the price for an item depends on the bids of agents who win lower-ranked items. In addition all of the bidders have the same ex post payoffs. I also show that regularity is a necessary condition to get ex post payoff equivalence.,m. yenmez,Not available,2014.0,10.1007/s00199-013-0748-0,Economic Theory,Bumin2014,False,,Springer,Not available,Pricing in position auctions and online advertising,76d3420cf5c1afb70b1aa1f861edc8ac,http://dx.doi.org/10.1007/s00199-013-0748-0 3850,In this paper we mainly study the multi-attribute reverse auction mechanism with multiple winners. By the multi-attribute utility theory and the probability theory we build a multi-attribute procurement model which is more in line with reality procurement environment and then prove the supplier’s optimal bidding strategies. Moreover we compare it with the first scoring model and conclude that the optimal quality bidding strategies remain constant while the optimal price bidding strategy increases with the number of the successful bidders.,xiang-lin pan,Not available,2014.0,10.1007/978-3-642-40060-5_21,Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013),Xiang-lin2014,False,,Springer,Not available,The Optimal Bidding Strategies Research on Multi-attribute Reverse Auction Mechanism,bd6ab3b659635526fa8b867006c93100,http://dx.doi.org/10.1007/978-3-642-40060-5_21 3851,In this paper we mainly study the multi-attribute reverse auction mechanism with multiple winners. By the multi-attribute utility theory and the probability theory we build a multi-attribute procurement model which is more in line with reality procurement environment and then prove the supplier’s optimal bidding strategies. Moreover we compare it with the first scoring model and conclude that the optimal quality bidding strategies remain constant while the optimal price bidding strategy increases with the number of the successful bidders.,xu-hua lv,Not available,2014.0,10.1007/978-3-642-40060-5_21,Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013),Xiang-lin2014,False,,Springer,Not available,The Optimal Bidding Strategies Research on Multi-attribute Reverse Auction Mechanism,bd6ab3b659635526fa8b867006c93100,http://dx.doi.org/10.1007/978-3-642-40060-5_21 3852,We formulate an evolutionary learning process with trembles for static games of incomplete information. For many games if the amount of trembling is small play will be in accordance with the games’ (strict) Bayesian equilibria most of the time supporting the notion of Bayesian equilibrium. Often the process will select a specific equilibrium. For two specific games of economic interest we characterize this selection. The first is an extension to incomplete information of the prototype strategic conflict known as “Chicken”. The second is an incomplete information bilateral monopoly which is also an extension to incomplete information of Nash’s demand game or a simple version of the so-called sealed bid double auction. The examples reveal that equilibrium selection by evolutionary learning may well be in favor of Bayesian equilibria where some types of players fail to coordinate so that the equilibrium outcomes are inefficient.,mogens jensen,Not available,2006.0,10.1007/3-540-28161-4_15,Institutions Equilibria and Efficiency,Mogens2006,False,,Springer,Not available,The Evolution of Conventions under Incomplete Information,93a5c44bea96f6349df8d3fd079db272,http://dx.doi.org/10.1007/3-540-28161-4_15 3853,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,d. verma,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 3854,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,n. hemachandra,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 3855,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,y. narahari,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 3856,In this chapter we consider the problem of determining an optimal set of winning suppliers in a procurement auction where the buyer wishes to procure high volumes of a homogeneous item in a staggered way in accordance with a predefined schedule and the suppliers respond with bids that specify volume discounts and also delivery lead times. We show that the winner determination problem which turns out to be a multi-objective optimization problem cannot be satisfactorily solved by traditional methods of multi-objective optimization. We formulate the problem first as an integer program with constraints capturing lead time requirements and show that the integer program is an extended version of the multiple knapsack problems. We discover certain properties of this integer program and exploit the properties to simplify it to a 0–1 mixed integer program (MIP) which can be solved more efficiently. We next explore a more efficient approach to solving the problem using a linear relaxation of the 0–1 MIP in conjunction with a greedy heuristic. Using extensive numerical experimentation we show the efficacy of the 0–1 MIP and the proposed heuristic.,j. tew,Not available,2014.0,10.1007/978-1-4471-5295-8_13,Applications of Multi-Criteria and Game Theory Approaches,K.2014,False,,Springer,Not available,Winner Determination in Multi-unit Procurement Auctions with Volume Discount Bids and Lead Time Constraints,a901013fb99ecd643adff611d8482cc0,http://dx.doi.org/10.1007/978-1-4471-5295-8_13 3857,We consider a game corresponding to the uniform price supply function auction for a homogenous good. We present best response dynamics analysis for a repeated auction game and show that under a linear marginal cost function it converges to the SFE with a geometric rate. However for a fixed marginal cost and limited production capacity the best reply may not exist at some step so the dynamics does not converge to SFE in general.,alexander vasin,Not available,2014.0,10.1007/978-3-319-00795-3_34,Operations Research Proceedings 2012,Alexander2014,False,,Springer,Not available,Does SFE Correspond to Expected Behavior in the Uniform Price Auction?,955665ecee1d2971c1973f41d6e2d34c,http://dx.doi.org/10.1007/978-3-319-00795-3_34 3858,We consider a game corresponding to the uniform price supply function auction for a homogenous good. We present best response dynamics analysis for a repeated auction game and show that under a linear marginal cost function it converges to the SFE with a geometric rate. However for a fixed marginal cost and limited production capacity the best reply may not exist at some step so the dynamics does not converge to SFE in general.,marina dolmatova,Not available,2014.0,10.1007/978-3-319-00795-3_34,Operations Research Proceedings 2012,Alexander2014,False,,Springer,Not available,Does SFE Correspond to Expected Behavior in the Uniform Price Auction?,955665ecee1d2971c1973f41d6e2d34c,http://dx.doi.org/10.1007/978-3-319-00795-3_34 3859,In loosely coupled distributed computing systems one of the major duties performed by the scheduler is to efficiently manage the allocation of computational tasks to computing resources. Such matchmaking services become difficult to implement when resources belong to different administrative domains each of which has unique and diverse valuation for task bundles. In order to cope with the heterogeneity we introduce a novel combinatorial auction approach that solves the task-resource matchmaking problem in a utility computing environment. This auction based approach is characterized as “self-adaptive” in two senses. First efficient allocation is achieved through adaptive adjustment of task pricing towards the market equilibrium point. Second payment accounting is adaptive to the changing auction states at various stages that discourages strategic bidding from egocentric bidders. The objective of the research presented in this chapter is to examine the applicability of the combinatorial auction based approaches in utility computing and to develop efficient task allocation schemes using the self-adaptive auction. Through simulations we show that the proposed combinatorial auction approach optimizes allocative efficiency for task-resource matchmaking when valuation functions are concave and achieves incentive compatibility once the auction process finalizes.,han zhao,Not available,2014.0,10.1007/978-1-4939-1905-5_8,Cloud Computing for Data-Intensive Applications,Han2014,False,,Springer,Not available,Efficient Task-Resource Matchmaking Using Self-adaptive Combinatorial Auction,e072ee69d6237fad0d7106ce27fe6780,http://dx.doi.org/10.1007/978-1-4939-1905-5_8 3860,In loosely coupled distributed computing systems one of the major duties performed by the scheduler is to efficiently manage the allocation of computational tasks to computing resources. Such matchmaking services become difficult to implement when resources belong to different administrative domains each of which has unique and diverse valuation for task bundles. In order to cope with the heterogeneity we introduce a novel combinatorial auction approach that solves the task-resource matchmaking problem in a utility computing environment. This auction based approach is characterized as “self-adaptive” in two senses. First efficient allocation is achieved through adaptive adjustment of task pricing towards the market equilibrium point. Second payment accounting is adaptive to the changing auction states at various stages that discourages strategic bidding from egocentric bidders. The objective of the research presented in this chapter is to examine the applicability of the combinatorial auction based approaches in utility computing and to develop efficient task allocation schemes using the self-adaptive auction. Through simulations we show that the proposed combinatorial auction approach optimizes allocative efficiency for task-resource matchmaking when valuation functions are concave and achieves incentive compatibility once the auction process finalizes.,xiaolin li,Not available,2014.0,10.1007/978-1-4939-1905-5_8,Cloud Computing for Data-Intensive Applications,Han2014,False,,Springer,Not available,Efficient Task-Resource Matchmaking Using Self-adaptive Combinatorial Auction,e072ee69d6237fad0d7106ce27fe6780,http://dx.doi.org/10.1007/978-1-4939-1905-5_8 3861,In this paper we focus upon a specific process of knowledge sharing the ,elisa burato,Not available,2009.0,10.1007/978-3-642-01665-3_7,Agent and Multi-Agent Systems: Technologies and Applications,Elisa2009,False,,Springer,Not available,Learning as Meaning Negotiation: A Model Based on English Auction,4d9db4f1d762037677981f2f018b7a4a,http://dx.doi.org/10.1007/978-3-642-01665-3_7 3862,In this paper we focus upon a specific process of knowledge sharing the ,matteo cristani,Not available,2009.0,10.1007/978-3-642-01665-3_7,Agent and Multi-Agent Systems: Technologies and Applications,Elisa2009,False,,Springer,Not available,Learning as Meaning Negotiation: A Model Based on English Auction,4d9db4f1d762037677981f2f018b7a4a,http://dx.doi.org/10.1007/978-3-642-01665-3_7 3863,We formulate an evolutionary learning process with trembles for static games of incomplete information. For many games if the amount of trembling is small play will be in accordance with the games’ (strict) Bayesian equilibria most of the time supporting the notion of Bayesian equilibrium. Often the process will select a specific equilibrium. For two specific games of economic interest we characterize this selection. The first is an extension to incomplete information of the prototype strategic conflict known as “Chicken”. The second is an incomplete information bilateral monopoly which is also an extension to incomplete information of Nash’s demand game or a simple version of the so-called sealed bid double auction. The examples reveal that equilibrium selection by evolutionary learning may well be in favor of Bayesian equilibria where some types of players fail to coordinate so that the equilibrium outcomes are inefficient.,birgitte sloth,Not available,2006.0,10.1007/3-540-28161-4_15,Institutions Equilibria and Efficiency,Mogens2006,False,,Springer,Not available,The Evolution of Conventions under Incomplete Information,93a5c44bea96f6349df8d3fd079db272,http://dx.doi.org/10.1007/3-540-28161-4_15 3864,We study simultaneous ascending auctions of two identical objects when bidders are financially constrained and their valuations exhibit complementarities. We assume the budget constraints are known but the values for individual objects are private information and characterize noncollusive equilibria. Equilibrium behavior is affected by the exposure problem. Bidders with higher budgets are more reluctant to bid because opponents with lower budgets may end up pursuing a single object thus preventing the realization of complementarities. Therefore poor bidders may win both objects when they do not have the highest valuation.,sandro brusco,Not available,2009.0,10.1007/s00199-007-0217-8,Economic Theory,Sandro2009,False,,Springer,Not available,Simultaneous ascending auctions with complementarities and known budget constraints,fb0fc60cba515a4e9997c70a88d46d68,http://dx.doi.org/10.1007/s00199-007-0217-8 3865,We study simultaneous ascending auctions of two identical objects when bidders are financially constrained and their valuations exhibit complementarities. We assume the budget constraints are known but the values for individual objects are private information and characterize noncollusive equilibria. Equilibrium behavior is affected by the exposure problem. Bidders with higher budgets are more reluctant to bid because opponents with lower budgets may end up pursuing a single object thus preventing the realization of complementarities. Therefore poor bidders may win both objects when they do not have the highest valuation.,giuseppe lopomo,Not available,2009.0,10.1007/s00199-007-0217-8,Economic Theory,Sandro2009,False,,Springer,Not available,Simultaneous ascending auctions with complementarities and known budget constraints,fb0fc60cba515a4e9997c70a88d46d68,http://dx.doi.org/10.1007/s00199-007-0217-8 3866,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,jacques cremer,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 3867,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,yossi spiegel,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 3868,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,charles zheng,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 3869,This paper models sequential auctioning of two perfect substitutes by a strategic seller who learns about demand from the first-auction price. The seller holds the second auction only when the remaining demand is strong enough to cover her opportunity cost. Bidding in anticipation of such a contingent future auction is characterized including a sufficient condition for existence of an invertible (increasing symmetric pure-strategy) bidding equilibrium that facilitates the seller’s learning. A unique invertible bidding equilibrium exists for the Dutch auction format but only when the second auction is sufficiently discounted by the bidders. In the equilibrium high-valuation bidders shade their bids down as if the second auction were guaranteed. To counter such strategic bidding the seller would value ex-ante commitment to hold the second auction less often. Three forms of such commitment are analyzed: commitment to list future auctions in advance commitment to not hold the second auction unless the first price exceeds a publicly announced threshold and commitment to a reserve-price in the second auction.,robert zeithammer,Not available,2009.0,10.1007/s00199-008-0348-6,Economic Theory,Robert2009,False,,Springer,Not available,Commitment in sequential auctioning: advance listings and threshold prices,6ab7ca6566bfe07a92fcaad473300ab7,http://dx.doi.org/10.1007/s00199-008-0348-6 3870,We study auctions whose bidders are embedded in a social or economic network. As a result even bidders who do not win the auction themselves might derive utility from the auction namely when a friend wins. On the other hand when an enemy or competitor wins a bidder might derive negative utility. Such spite and altruism will alter the bidding strategies. A simple and natural model for bidders’ utilities in these settings posits that the utility of a losing bidder ,po-an chen,Not available,2009.0,10.1007/978-3-642-04645-2_30,Algorithmic Game Theory,Po-An2009,False,,Springer,Not available,Bayesian Auctions with Friends and Foes,6344f01bc487a742f29a92a6dbc097d3,http://dx.doi.org/10.1007/978-3-642-04645-2_30 3871,We study auctions whose bidders are embedded in a social or economic network. As a result even bidders who do not win the auction themselves might derive utility from the auction namely when a friend wins. On the other hand when an enemy or competitor wins a bidder might derive negative utility. Such spite and altruism will alter the bidding strategies. A simple and natural model for bidders’ utilities in these settings posits that the utility of a losing bidder ,david kempe,Not available,2009.0,10.1007/978-3-642-04645-2_30,Algorithmic Game Theory,Po-An2009,False,,Springer,Not available,Bayesian Auctions with Friends and Foes,6344f01bc487a742f29a92a6dbc097d3,http://dx.doi.org/10.1007/978-3-642-04645-2_30 3872,In a complex procurement a buyer may consider biasing the auction rules in order to account for differences in product characteristics offered by the sellers. This paper studies the gathering disclosure and use of information about this bias. While we also describe the optimal procurement auction in our setting the main focus of the paper is on the case where the buyer does not have commitment power. We find that without commitment full disclosure of the buyer’s preferences is optimal. Furthermore lack of commitment distorts the buyer’s incentives to learn about its preferences: unlike the commitment case without commitment the value of this information can be negative.,leonardo rezende,Not available,2009.0,10.1007/s00199-008-0346-8,Economic Theory,Leonardo2009,False,,Springer,Not available,Biased procurement auctions,055cea4106c154e5b7d26cf22569bff4,http://dx.doi.org/10.1007/s00199-008-0346-8 3873,This paper presents a truthful sponsored search auction based on an incentive-compatible multi-armed bandit mechanism. The mechanism described combines several desirable traits. The mechanism gives advertisers the incentive to report their true bid learns the click-through rate for advertisements allows for slots with different quality and loses the minimum welfare during the sampling process.The underlying generalization of the multi-armed bandit mechanism addresses the interplay between exploration and exploitation in an online setting that is truthful in high probability while allowing for slots of different quality. As the mechanism progresses the algorithm more closely approximates the hidden variables (click-though rates) in order to allocate advertising slots to the best advertisements. The resulting mechanism obtains the optimal welfare apart from a tightly bounded loss of welfare caused by the bandit sampling process.Of independent interest in the field of economics it has long been recognized that preference elicitation is difficult to achieve mainly as people are unaware of how much happiness a particular good will bring to them. In this paper we alleviate this problem somewhat by introducing a valuation-discovery process to the mechanism which results in a preference-elicitation mechanism for advertisers and search engines.,rica gonen,Not available,2009.0,10.1007/978-3-540-95891-8_29,SOFSEM 2009: Theory and Practice of Computer Science,Rica2009,False,,Springer,Not available,Adaptive Incentive-Compatible Sponsored Search Auction,347cf18289d7c256fed524495d0ca048,http://dx.doi.org/10.1007/978-3-540-95891-8_29 3874,We formulate an evolutionary learning process with trembles for static games of incomplete information. For many games if the amount of trembling is small play will be in accordance with the games’ (strict) Bayesian equilibria most of the time supporting the notion of Bayesian equilibrium. Often the process will select a specific equilibrium. For two specific games of economic interest we characterize this selection. The first is an extension to incomplete information of the prototype strategic conflict known as “Chicken”. The second is an incomplete information bilateral monopoly which is also an extension to incomplete information of Nash’s demand game or a simple version of the so-called sealed bid double auction. The examples reveal that equilibrium selection by evolutionary learning may well be in favor of Bayesian equilibria where some types of players fail to coordinate so that the equilibrium outcomes are inefficient.,hans whitta-jacobsen,Not available,2006.0,10.1007/3-540-28161-4_15,Institutions Equilibria and Efficiency,Mogens2006,False,,Springer,Not available,The Evolution of Conventions under Incomplete Information,93a5c44bea96f6349df8d3fd079db272,http://dx.doi.org/10.1007/3-540-28161-4_15 3875,This paper presents a truthful sponsored search auction based on an incentive-compatible multi-armed bandit mechanism. The mechanism described combines several desirable traits. The mechanism gives advertisers the incentive to report their true bid learns the click-through rate for advertisements allows for slots with different quality and loses the minimum welfare during the sampling process.The underlying generalization of the multi-armed bandit mechanism addresses the interplay between exploration and exploitation in an online setting that is truthful in high probability while allowing for slots of different quality. As the mechanism progresses the algorithm more closely approximates the hidden variables (click-though rates) in order to allocate advertising slots to the best advertisements. The resulting mechanism obtains the optimal welfare apart from a tightly bounded loss of welfare caused by the bandit sampling process.Of independent interest in the field of economics it has long been recognized that preference elicitation is difficult to achieve mainly as people are unaware of how much happiness a particular good will bring to them. In this paper we alleviate this problem somewhat by introducing a valuation-discovery process to the mechanism which results in a preference-elicitation mechanism for advertisers and search engines.,elan pavlov,Not available,2009.0,10.1007/978-3-540-95891-8_29,SOFSEM 2009: Theory and Practice of Computer Science,Rica2009,False,,Springer,Not available,Adaptive Incentive-Compatible Sponsored Search Auction,347cf18289d7c256fed524495d0ca048,http://dx.doi.org/10.1007/978-3-540-95891-8_29 3876,In this paper we study the Nash-equilibrium and equilibrium bidding strategies of the Pooled Reverse Auction for troubled assets. The auction was described in (Ausubel & Cramton 2008[1]). We further extend our analysis to a more general class of games which we call ,saeed alaei,Not available,2009.0,10.1007/978-3-642-10841-9_36,Internet and Network Economics,Saeed2009,False,,Springer,Not available,An Analysis of Troubled Assets Reverse Auction,69d4fa83c34b3b8398aed35b07a20e2b,http://dx.doi.org/10.1007/978-3-642-10841-9_36 3877,In this paper we study the Nash-equilibrium and equilibrium bidding strategies of the Pooled Reverse Auction for troubled assets. The auction was described in (Ausubel & Cramton 2008[1]). We further extend our analysis to a more general class of games which we call ,azarakhsh malekian,Not available,2009.0,10.1007/978-3-642-10841-9_36,Internet and Network Economics,Saeed2009,False,,Springer,Not available,An Analysis of Troubled Assets Reverse Auction,69d4fa83c34b3b8398aed35b07a20e2b,http://dx.doi.org/10.1007/978-3-642-10841-9_36 3878,In this paper an agent-based computational economics (ACE) model has been developed in order to test the bidding behavior in a multi-unit auction the Ausubel auction. The model has been studied in two scenarios. In the first one bidders have weakly decreasing marginal values and the theory predicts that bidding sincerely is a weakly dominant strategy. The ACE model corroborates this finding. In the second scenario agents present synergies among their valuations. This scenario has been tested for two environments. In the first one bidders have the same synergy value but it differs from one experiment to another. In the second one bidders within the same experiment exhibit different synergy values. The ACE model finds that underbidding is the most frequent strategy to avoid the exposure problem and maximize bidders’ payoff in the presence of synergies.,asuncion mochon,Not available,2009.0,10.1007/978-3-642-02956-1_8,Artificial Economics,Asuncion2009,False,,Springer,Not available,Multi-Unit Auction Analysis by Means of Agent-Based Computational Economics,7724ecdf6218cfb6b6ea0427756bf5dc,http://dx.doi.org/10.1007/978-3-642-02956-1_8 3879,In this paper an agent-based computational economics (ACE) model has been developed in order to test the bidding behavior in a multi-unit auction the Ausubel auction. The model has been studied in two scenarios. In the first one bidders have weakly decreasing marginal values and the theory predicts that bidding sincerely is a weakly dominant strategy. The ACE model corroborates this finding. In the second scenario agents present synergies among their valuations. This scenario has been tested for two environments. In the first one bidders have the same synergy value but it differs from one experiment to another. In the second one bidders within the same experiment exhibit different synergy values. The ACE model finds that underbidding is the most frequent strategy to avoid the exposure problem and maximize bidders’ payoff in the presence of synergies.,yago saez,Not available,2009.0,10.1007/978-3-642-02956-1_8,Artificial Economics,Asuncion2009,False,,Springer,Not available,Multi-Unit Auction Analysis by Means of Agent-Based Computational Economics,7724ecdf6218cfb6b6ea0427756bf5dc,http://dx.doi.org/10.1007/978-3-642-02956-1_8 3880,In this paper an agent-based computational economics (ACE) model has been developed in order to test the bidding behavior in a multi-unit auction the Ausubel auction. The model has been studied in two scenarios. In the first one bidders have weakly decreasing marginal values and the theory predicts that bidding sincerely is a weakly dominant strategy. The ACE model corroborates this finding. In the second scenario agents present synergies among their valuations. This scenario has been tested for two environments. In the first one bidders have the same synergy value but it differs from one experiment to another. In the second one bidders within the same experiment exhibit different synergy values. The ACE model finds that underbidding is the most frequent strategy to avoid the exposure problem and maximize bidders’ payoff in the presence of synergies.,david quintana,Not available,2009.0,10.1007/978-3-642-02956-1_8,Artificial Economics,Asuncion2009,False,,Springer,Not available,Multi-Unit Auction Analysis by Means of Agent-Based Computational Economics,7724ecdf6218cfb6b6ea0427756bf5dc,http://dx.doi.org/10.1007/978-3-642-02956-1_8 3881,In this paper an agent-based computational economics (ACE) model has been developed in order to test the bidding behavior in a multi-unit auction the Ausubel auction. The model has been studied in two scenarios. In the first one bidders have weakly decreasing marginal values and the theory predicts that bidding sincerely is a weakly dominant strategy. The ACE model corroborates this finding. In the second scenario agents present synergies among their valuations. This scenario has been tested for two environments. In the first one bidders have the same synergy value but it differs from one experiment to another. In the second one bidders within the same experiment exhibit different synergy values. The ACE model finds that underbidding is the most frequent strategy to avoid the exposure problem and maximize bidders’ payoff in the presence of synergies.,pedro isasi,Not available,2009.0,10.1007/978-3-642-02956-1_8,Artificial Economics,Asuncion2009,False,,Springer,Not available,Multi-Unit Auction Analysis by Means of Agent-Based Computational Economics,7724ecdf6218cfb6b6ea0427756bf5dc,http://dx.doi.org/10.1007/978-3-642-02956-1_8 3882,This paper analyzes sequential auctions for budget constrained bidders for multiple heterogeneous common value objects. In such auctions the bidders’ problem is to determine how much to bid in each auction. To this end this paper analyzes the strategic behavior of bidders and determines the equilibrium bidding strategies for the individual auctions that constitute a series. We do this using both first- and second-price rules in an incomplete information setting where the bidders are uncertain about their budget constraints.,shaheen fatima,Not available,2009.0,10.1007/978-3-642-03190-8_2,Advances in Agent-Based Complex Automated Negotiations,Shaheen2009,False,,Springer,Not available,Sequential Auctions for Common Value Objects with Budget Constrained Bidders,123824cf654cf435f16ad0c635c2aa86,http://dx.doi.org/10.1007/978-3-642-03190-8_2 3883,In this paper we consider a dynamic full truckload pickup and delivery problem with time-windows. Jobs arrive over time and are offered in a second-price auction. Individual vehicles bid on these jobs and maintain a schedule of the jobs they have won. We propose a pricing and scheduling strategy based on dynamic programming where not only the direct costs of a job insertion are taken into account but also the impact on future opportunities. Simulation is used to evaluate the benefits of pricing opportunities compared to simple pricing strategies in various market settings. Numerical results show that the proposed approach provides high quality solutions in terms of profits capacity utilization and delivery reliability.,martijn mes,Not available,2010.0,10.1007/s00291-008-0146-3,OR Spectrum,Martijn2010,True,,Springer,Not available,Look-ahead strategies for dynamic pickup and delivery problems,56cb6191dd492680e2eea84a80fc1b4c,http://dx.doi.org/10.1007/s00291-008-0146-3 3884,In this paper we consider a dynamic full truckload pickup and delivery problem with time-windows. Jobs arrive over time and are offered in a second-price auction. Individual vehicles bid on these jobs and maintain a schedule of the jobs they have won. We propose a pricing and scheduling strategy based on dynamic programming where not only the direct costs of a job insertion are taken into account but also the impact on future opportunities. Simulation is used to evaluate the benefits of pricing opportunities compared to simple pricing strategies in various market settings. Numerical results show that the proposed approach provides high quality solutions in terms of profits capacity utilization and delivery reliability.,matthieu heijden,Not available,2010.0,10.1007/s00291-008-0146-3,OR Spectrum,Martijn2010,True,,Springer,Not available,Look-ahead strategies for dynamic pickup and delivery problems,56cb6191dd492680e2eea84a80fc1b4c,http://dx.doi.org/10.1007/s00291-008-0146-3 3885,We study a discrete common-value auction environment with two asymmetrically informed bidders. Equilibrium of the first-price auction is in mixed strategies which we characterize using a doubly recursive solution method. The distribution of bids for the ex post strong player stochastically dominates that for the ex post weak player. This result complements Maskin and Riley’s (Rev Econ Stud 67:413–438 ,david malueg,Not available,2012.0,10.1007/s00182-011-0282-x,International Journal of Game Theory,A.2012,False,,Springer,Not available,Equilibrium and revenue in a family of common-value first-price auctions with differential information,74cee7b8134b0472281cb2bbf5f23266,http://dx.doi.org/10.1007/s00182-011-0282-x 3886,In this paper we consider a dynamic full truckload pickup and delivery problem with time-windows. Jobs arrive over time and are offered in a second-price auction. Individual vehicles bid on these jobs and maintain a schedule of the jobs they have won. We propose a pricing and scheduling strategy based on dynamic programming where not only the direct costs of a job insertion are taken into account but also the impact on future opportunities. Simulation is used to evaluate the benefits of pricing opportunities compared to simple pricing strategies in various market settings. Numerical results show that the proposed approach provides high quality solutions in terms of profits capacity utilization and delivery reliability.,peter schuur,Not available,2010.0,10.1007/s00291-008-0146-3,OR Spectrum,Martijn2010,True,,Springer,Not available,Look-ahead strategies for dynamic pickup and delivery problems,56cb6191dd492680e2eea84a80fc1b4c,http://dx.doi.org/10.1007/s00291-008-0146-3 3887,This paper uses computational experiments where bidders learn over nonlinear bidding strategies to compare outcomes for alternative pricing format for multi-unit multiple-bid auctions. Multi-unit multiple-bid auctions in which bidders are allowed to submit multiple price-quantity bids are promising mechanisms for the allocation of a range of resources. The main advantage of such auctions is to avoid the lumpy bid problem which arises when bidders can only compete on the basis of one bid. However there is great uncertainty about the best auction formats when multi-unit auctions are used. The theory can only supply the expected structural properties of equilibrium strategies and the multiplicity of potential equilibria makes comparisons across auction formats difficult. Empirical studies and experiments have improved our knowledge of multi-unit auctions but they remain scarce and most experiments are restricted to two bidders and two units. Moreover they demonstrate that bidders have limited rationality and learn through experience. This paper constructs an agent-based computational model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The setting is for independent private values. We show that bidding behaviour displays more interesting patterns than is depicted in the theoretical literature and that bidding patterns depend on the interplay between heterogeneity in the bidder population and the degree of rationing in the auction. Results indicate that the three auction formats have similar performance for most levels of competition but that their performances differ when competition is weak. This ranking is dependent on whether the population of bidders is homogenous or heterogeneous.,atakelty hailu,Not available,2010.0,10.1007/s10614-010-9199-x,Computational Economics,Atakelty2010,False,,Springer,Not available,What Format for Multi-Unit Multiple-Bid Auctions?,afa1e6714d34b59029d73918714e22e3,http://dx.doi.org/10.1007/s10614-010-9199-x 3888,This paper uses computational experiments where bidders learn over nonlinear bidding strategies to compare outcomes for alternative pricing format for multi-unit multiple-bid auctions. Multi-unit multiple-bid auctions in which bidders are allowed to submit multiple price-quantity bids are promising mechanisms for the allocation of a range of resources. The main advantage of such auctions is to avoid the lumpy bid problem which arises when bidders can only compete on the basis of one bid. However there is great uncertainty about the best auction formats when multi-unit auctions are used. The theory can only supply the expected structural properties of equilibrium strategies and the multiplicity of potential equilibria makes comparisons across auction formats difficult. Empirical studies and experiments have improved our knowledge of multi-unit auctions but they remain scarce and most experiments are restricted to two bidders and two units. Moreover they demonstrate that bidders have limited rationality and learn through experience. This paper constructs an agent-based computational model of bidders to compare the performance of alternative procurement auction formats under circumstances where bidders submit continuous bid supply functions and learn over time to adjust their bids in order to improve their net incomes. The setting is for independent private values. We show that bidding behaviour displays more interesting patterns than is depicted in the theoretical literature and that bidding patterns depend on the interplay between heterogeneity in the bidder population and the degree of rationing in the auction. Results indicate that the three auction formats have similar performance for most levels of competition but that their performances differ when competition is weak. This ranking is dependent on whether the population of bidders is homogenous or heterogeneous.,sophie thoyer,Not available,2010.0,10.1007/s10614-010-9199-x,Computational Economics,Atakelty2010,False,,Springer,Not available,What Format for Multi-Unit Multiple-Bid Auctions?,afa1e6714d34b59029d73918714e22e3,http://dx.doi.org/10.1007/s10614-010-9199-x 3889,In the digital economy electronic auction systems are becoming more prevalent in facilitating the transactions between buyers and sellers. Auction websites such as eBay and Amazon as well as more sophisticated platforms such as Moai and FrictionlessCommerce have increased transaction volume by offering tailored auction protocols to specific customer groups. meet2trade is a generic electronic market platform that supports various auction mechanisms. This study examines the impact of a discount in a second-price sealed-bid mechanism on bidding behavior and market outcomes. Emphasis is thereby placed on bidders’ system-based perceptions beliefs about usage and institutional-based trust and intention to use such an auction. Ninety students were recruited to participate in an experiment held at a Western European university. The experiment observed user behavior in second-price auctions with and without a discount. The results demonstrate that although discounts do affect bidding behavior and economic outcomes they do not influence bidder’s intentions to use such auction mechanisms. Instead we found that intention to use is influenced by institutional and usage beliefs that are shaped by system-based perceptions which in turn provide specific advice to market engineers on the technical aspects influencing system adoption.,eva chen,Not available,2010.0,10.1007/s10726-008-9117-y,Group Decision and Negotiation,Eva2010,False,,Springer,Not available,To Discount or Not to Discount: An Assessment of Perceptions Beliefs and Intentions to Use Electronic Auctions with Discounts,58a4fa58009456b2fb9111bdc23b624e,http://dx.doi.org/10.1007/s10726-008-9117-y 3890,In the digital economy electronic auction systems are becoming more prevalent in facilitating the transactions between buyers and sellers. Auction websites such as eBay and Amazon as well as more sophisticated platforms such as Moai and FrictionlessCommerce have increased transaction volume by offering tailored auction protocols to specific customer groups. meet2trade is a generic electronic market platform that supports various auction mechanisms. This study examines the impact of a discount in a second-price sealed-bid mechanism on bidding behavior and market outcomes. Emphasis is thereby placed on bidders’ system-based perceptions beliefs about usage and institutional-based trust and intention to use such an auction. Ninety students were recruited to participate in an experiment held at a Western European university. The experiment observed user behavior in second-price auctions with and without a discount. The results demonstrate that although discounts do affect bidding behavior and economic outcomes they do not influence bidder’s intentions to use such auction mechanisms. Instead we found that intention to use is influenced by institutional and usage beliefs that are shaped by system-based perceptions which in turn provide specific advice to market engineers on the technical aspects influencing system adoption.,ilka weber,Not available,2010.0,10.1007/s10726-008-9117-y,Group Decision and Negotiation,Eva2010,False,,Springer,Not available,To Discount or Not to Discount: An Assessment of Perceptions Beliefs and Intentions to Use Electronic Auctions with Discounts,58a4fa58009456b2fb9111bdc23b624e,http://dx.doi.org/10.1007/s10726-008-9117-y 3891,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,chuan-hoo tan,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 3892,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,hock-hai teo,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 3893,This study seeks to the answer the question of how an individual would trade off between listing fee (i.e. cost of listing an auction item) and transaction probability (i.e. the chance that a product will be sold). Applying the trade-off decision-making paradigm into the auction context we examine a seller’s choice of online auction outlet and subsequent starting price strategies when facing the trade-off between transaction probability and listing fee. Results from a set of laboratory experiments suggest that a seller would be willing to incur a high cost in exchange for a higher transaction prospect. Furthermore if the expected transaction probability is high a seller is more likely to set a high starting price despite incurring a high listing fee. The implications for theory and practice are discussed.,heng xu,Not available,2010.0,10.1007/s12525-010-0029-8,Electronic Markets,Chuan-Hoo2010,False,,Springer,Not available,Online auction: the effects of transaction probability and listing price on a seller’s decision-making behavior,69fb6eb0e216211a3b97ca478372ea5d,http://dx.doi.org/10.1007/s12525-010-0029-8 3894,Asymmetric auctions are among the most rapidly growing areas in the auction literature. The potential benefits from intensified auction competition could be enormous in the public procurement context. Entrant bidders are considered a key to enhance competition and break potential collusive arrangements among incumbent bidders. Asymmetric auction theory predicts that weak (fringe) bidders would bid more aggressively when they are faced with a strong (incumbent) opponent. Using data from official development projects this paper shows that entrants actually submitted aggressive bids in the presence of incumbent(s) in the road sector and to a certain extent in the water sector. For electricity projects the general competition effect is found to be particularly significant but the entrant effect remains unclear. The results suggest that auctioneers should foster competition in public procurement including fringe bidders to contain public infrastructure investment costs.,antonio estache,Not available,2010.0,10.1007/s11151-010-9242-z,Review of Industrial Organization,Antonio2010,False,,Springer,Not available,Bidder Asymmetry in Infrastructure Procurement: Are There any Fringe Bidders?,1cff28540f45b0c1d21bdc7271bf79d0,http://dx.doi.org/10.1007/s11151-010-9242-z 3895,Asymmetric auctions are among the most rapidly growing areas in the auction literature. The potential benefits from intensified auction competition could be enormous in the public procurement context. Entrant bidders are considered a key to enhance competition and break potential collusive arrangements among incumbent bidders. Asymmetric auction theory predicts that weak (fringe) bidders would bid more aggressively when they are faced with a strong (incumbent) opponent. Using data from official development projects this paper shows that entrants actually submitted aggressive bids in the presence of incumbent(s) in the road sector and to a certain extent in the water sector. For electricity projects the general competition effect is found to be particularly significant but the entrant effect remains unclear. The results suggest that auctioneers should foster competition in public procurement including fringe bidders to contain public infrastructure investment costs.,atsushi iimi,Not available,2010.0,10.1007/s11151-010-9242-z,Review of Industrial Organization,Antonio2010,False,,Springer,Not available,Bidder Asymmetry in Infrastructure Procurement: Are There any Fringe Bidders?,1cff28540f45b0c1d21bdc7271bf79d0,http://dx.doi.org/10.1007/s11151-010-9242-z 3896,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,amar cheema,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 3897,We study a discrete common-value auction environment with two asymmetrically informed bidders. Equilibrium of the first-price auction is in mixed strategies which we characterize using a doubly recursive solution method. The distribution of bids for the ex post strong player stochastically dominates that for the ex post weak player. This result complements Maskin and Riley’s (Rev Econ Stud 67:413–438 ,ram orzach,Not available,2012.0,10.1007/s00182-011-0282-x,International Journal of Game Theory,A.2012,False,,Springer,Not available,Equilibrium and revenue in a family of common-value first-price auctions with differential information,74cee7b8134b0472281cb2bbf5f23266,http://dx.doi.org/10.1007/s00182-011-0282-x 3898,Preferences for charitable giving in auctions can be modeled by assuming that bidders receive additional utility proportional to the revenue raised by an auctioneer. The theory of bidding in the presence of such preferences results in a very counterintuitive prediction which is that in many cases bidders having preferences for charitable giving does not lead to a substantial revenue advantage for an auctioneer. We test this theory and this prediction with a series of experiments. In one experiment we induce charitable preferences exactly as specified in the model to see if bidders respond to them as predicted. We find that they do. We then conduct a second experiment in which the revenue from the auctions is donated to actual charities to verify the robustness of the prediction when charitable preferences are generated by a more natural source and find again that the theoretical prediction holds: even strong charitable preferences do not result in substantial revenue increases to the auctioneer.,r. isaac,Not available,2010.0,10.1007/s10683-009-9227-7,Experimental Economics,Mark2010,False,,Springer,Not available,Do preferences for charitable giving help auctioneers?,b6bd78ece98b7c537d48386d7653fac7,http://dx.doi.org/10.1007/s10683-009-9227-7 3899,Preferences for charitable giving in auctions can be modeled by assuming that bidders receive additional utility proportional to the revenue raised by an auctioneer. The theory of bidding in the presence of such preferences results in a very counterintuitive prediction which is that in many cases bidders having preferences for charitable giving does not lead to a substantial revenue advantage for an auctioneer. We test this theory and this prediction with a series of experiments. In one experiment we induce charitable preferences exactly as specified in the model to see if bidders respond to them as predicted. We find that they do. We then conduct a second experiment in which the revenue from the auctions is donated to actual charities to verify the robustness of the prediction when charitable preferences are generated by a more natural source and find again that the theoretical prediction holds: even strong charitable preferences do not result in substantial revenue increases to the auctioneer.,svetlana pevnitskaya,Not available,2010.0,10.1007/s10683-009-9227-7,Experimental Economics,Mark2010,False,,Springer,Not available,Do preferences for charitable giving help auctioneers?,b6bd78ece98b7c537d48386d7653fac7,http://dx.doi.org/10.1007/s10683-009-9227-7 3900,Preferences for charitable giving in auctions can be modeled by assuming that bidders receive additional utility proportional to the revenue raised by an auctioneer. The theory of bidding in the presence of such preferences results in a very counterintuitive prediction which is that in many cases bidders having preferences for charitable giving does not lead to a substantial revenue advantage for an auctioneer. We test this theory and this prediction with a series of experiments. In one experiment we induce charitable preferences exactly as specified in the model to see if bidders respond to them as predicted. We find that they do. We then conduct a second experiment in which the revenue from the auctions is donated to actual charities to verify the robustness of the prediction when charitable preferences are generated by a more natural source and find again that the theoretical prediction holds: even strong charitable preferences do not result in substantial revenue increases to the auctioneer.,timothy salmon,Not available,2010.0,10.1007/s10683-009-9227-7,Experimental Economics,Mark2010,False,,Springer,Not available,Do preferences for charitable giving help auctioneers?,b6bd78ece98b7c537d48386d7653fac7,http://dx.doi.org/10.1007/s10683-009-9227-7 3901,This paper reports a new and significant experimental demonstration that market participants adjust their bids towards the price observed in previous market periods when—by design—individuals’ values should not be affiliated with the market price. This demonstration implies that market prices may not adjust as standard comparative statics predicts and emphasizes the significance of social aspects even in market contexts. Hence the present study shows that market behaviour is not anomaly-free. Indeed market behaviour does not reveal the underlying ,fabio tufano,Not available,2010.0,10.1007/s10683-009-9226-8,Experimental Economics,Fabio2010,False,,Springer,Not available,Are ‘true’ preferences revealed in repeated markets? An experimental demonstration of context-dependent valuations,da71ba3f0aadcef0bb04def6e024d6e2,http://dx.doi.org/10.1007/s10683-009-9226-8 3902,Starting with two models fifty years ago the discrete ,paul dutting,Not available,2010.0,10.1007/978-3-642-13073-1_2,Algorithms and Complexity,Paul2010,False,,Springer,Not available,Mechanisms for the Marriage and the Assignment Game,2efd632f8d63fbdb9811b0562004578d,http://dx.doi.org/10.1007/978-3-642-13073-1_2 3903,Starting with two models fifty years ago the discrete ,monika henzinger,Not available,2010.0,10.1007/978-3-642-13073-1_2,Algorithms and Complexity,Paul2010,False,,Springer,Not available,Mechanisms for the Marriage and the Assignment Game,2efd632f8d63fbdb9811b0562004578d,http://dx.doi.org/10.1007/978-3-642-13073-1_2 3904,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,sajal mukhopadhyay,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 3905,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,roshan singh,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 3906,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,d. ghosh,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 3907,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,jaya bhattacharjee,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 3908,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,xiaoshu xu,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3909,Indian film industry is one of the biggest in the world. A considerable number of movies out of the all movies released in a year are considered as hit movies. In a cinema hall k tickets are available and for a hit movie more than k people give demand for a ticket to watch the movie. To earn more profit in that environment in this paper an auction based truthful mechanism is proposed for selling all the tickets of the cinema hall and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per annum. Our scheme could be applied on any film industry.,nivedita mukherjee,Not available,2010.0,10.1007/978-3-642-12214-9_60,Information Processing and Management,Sajal2010,False,,Springer,Not available,An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas,551bd114068f39314341c9c6414922a4,http://dx.doi.org/10.1007/978-3-642-12214-9_60 3910,For almost five years we continually operated a simulation testbed exploring strategies for the TAC Travel game. Building on techniques developed in our recent study of continuous double auctions we performed an equilibrium analysis of our testbed data and employed reinforcement learning in the equilibrium environment to derive a new entertainment strategy for this domain. A second iteration of this process led to further improvements. We thus demonstrate that interleaving empirical game-theoretic analysis with reinforcement learning in an effective method for generating stronger trading strategies in this domain.,l. schvartzman,Not available,2010.0,10.1007/978-3-642-15117-0_14,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Julian2010,False,,Springer,Not available,Learning Improved Entertainment Trading Strategies for the TAC Travel Game,521e25626ec0dfe1f2b4f1d7345e3ae5,http://dx.doi.org/10.1007/978-3-642-15117-0_14 3911,For almost five years we continually operated a simulation testbed exploring strategies for the TAC Travel game. Building on techniques developed in our recent study of continuous double auctions we performed an equilibrium analysis of our testbed data and employed reinforcement learning in the equilibrium environment to derive a new entertainment strategy for this domain. A second iteration of this process led to further improvements. We thus demonstrate that interleaving empirical game-theoretic analysis with reinforcement learning in an effective method for generating stronger trading strategies in this domain.,michael wellman,Not available,2010.0,10.1007/978-3-642-15117-0_14,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,Julian2010,False,,Springer,Not available,Learning Improved Entertainment Trading Strategies for the TAC Travel Game,521e25626ec0dfe1f2b4f1d7345e3ae5,http://dx.doi.org/10.1007/978-3-642-15117-0_14 3912,,tian-ming bu,Not available,2016.0,10.1007/978-1-4939-2864-4_251,Encyclopedia of Algorithms,Tian-Ming2016,False,,Springer,Not available,Multiple Unit Auctions with Budget Constraint,c048f468e9ad6723eaaf77b7059be21e,http://dx.doi.org/10.1007/978-1-4939-2864-4_251 3913,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,emmanuel dechenaux,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 3914,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,dan kovenock,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 3915,Many economic political and social environments can be described as contests in which agents exert costly effort while competing over the distribution of a scarce resource. These environments have been studied using Tullock contests all-pay auctions and rank-order tournaments. This survey provides a comprehensive review of experimental research on these three canonical contests. First we review studies investigating the basic structure of contests including the number of players and prizes spillovers and externalities heterogeneity risk and incomplete information. Second we discuss dynamic contests and multi-battle contests. Then we review studies examining sabotage feedback bias collusion alliances group contests and gender as well as field experiments. Finally we discuss applications of contests and suggest directions for future research.,roman sheremeta,Not available,2015.0,10.1007/s10683-014-9421-0,Experimental Economics,Emmanuel2015,False,,Springer,Not available,A survey of experimental research on contests all-pay auctions and tournaments,262b99d76dd7b361074601754b2ad769,http://dx.doi.org/10.1007/s10683-014-9421-0 3916,This paper proposes a methodology to implement probabilistic belief elicitation in continuous-choice games. Representing subjective probabilistic beliefs about a continuous variable as a continuous subjective probability distribution the methodology involves eliciting partial information about the subjective distribution and fitting a parametric distribution on the elicited data. As an illustration the methodology is applied to a double auction experiment where traders’ beliefs about the bidding choices of other market participants are elicited. Elicited subjective beliefs are found to differ from proxies such as Bayesian Nash equilibrium beliefs and empirical beliefs both in terms of the forecasts of other traders’ bidding choices and in terms of the best-response bidding choices prescribed by beliefs. Elicited subjective beliefs help explain observed bidding choices better than BNE beliefs and empirical beliefs. By extending probabilistic belief elicitation beyond discrete-choice games to continuous-choice games the proposed methodology enables to investigate the role of beliefs in a wider range of applications.,claudia neri,Not available,2015.0,10.1007/s10683-014-9420-1,Experimental Economics,Claudia2015,False,,Springer,Not available,Eliciting beliefs in continuous-choice games: a double auction experiment,702d5021999b459e341220415d21e8ad,http://dx.doi.org/10.1007/s10683-014-9420-1 3917," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",andreas drichoutis,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 3918," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",jayson lusk,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 3919,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,dan levin,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3920," Economic experiments often entail subjects making decisions with payoffs in experimental currency units (ECUs). Earnings in ECUs are converted to cash at the end of the experiment. Such a procedural choice seems to be driven more by habit or tradition than by empirical evidence that this is more appropriate to use. We report results of a private induced value second price auction (SPA) experiment in which we manipulate the exchange rate between ECUs and cash. We find virtually no relationship between a stronger/weaker experimental currency and the ability of theory to predict observed outcomes. The only significant effect relates to the comparison of the cash-only condition to the one-to-one exchange condition. The latter produced greater behavioral deviations from theoretical predictions. However we find that this effect is largely driven by a handful of subjects. The results suggest that the use of ECUs is not a hindrance for experimental practice at least not in the context of an induced value SPA.",rodolfo nayga,Not available,2015.0,10.1007/s40881-015-0014-2,Journal of the Economic Science Association,C.2015,False,,Springer,Not available,The veil of experimental currency units in second price auctions,44bb3c5287f1aefa4ee8ee54cd657afc,http://dx.doi.org/10.1007/s40881-015-0014-2 3921,This study focuses on how hedonic versus utilitarian bidding values affect bidding behavior in e-auctions. The bidding behavioral data was collected through a quasi-experimental design on an authentic e-auction website. The results derived from 121 participants showed that bidders with high utilitarian bidding values were more likely to win bids than those with high hedonic bidding values. In addition bidders with high utilitarian bidding values were more likely to offer a higher final bid than those with high hedonic bidding values because they estimated a higher reasonable price for the item. Finally bidders with high hedonic bidding values were more likely to use a manual bidding approach whereas those with high utilitarian bidding values were more likely to use an automatic bidding approach.,lien-ti bei,Not available,2015.0,10.1007/s10660-015-9197-0,Electronic Commerce Research,Lien-Ti2015,False,,Springer,Not available,The effects of hedonic and utilitarian bidding values on e-auction behavior,99c2562f8cd499749d6af8daaf3b4347,http://dx.doi.org/10.1007/s10660-015-9197-0 3922,This study focuses on how hedonic versus utilitarian bidding values affect bidding behavior in e-auctions. The bidding behavioral data was collected through a quasi-experimental design on an authentic e-auction website. The results derived from 121 participants showed that bidders with high utilitarian bidding values were more likely to win bids than those with high hedonic bidding values. In addition bidders with high utilitarian bidding values were more likely to offer a higher final bid than those with high hedonic bidding values because they estimated a higher reasonable price for the item. Finally bidders with high hedonic bidding values were more likely to use a manual bidding approach whereas those with high utilitarian bidding values were more likely to use an automatic bidding approach.,ming-yi chen,Not available,2015.0,10.1007/s10660-015-9197-0,Electronic Commerce Research,Lien-Ti2015,False,,Springer,Not available,The effects of hedonic and utilitarian bidding values on e-auction behavior,99c2562f8cd499749d6af8daaf3b4347,http://dx.doi.org/10.1007/s10660-015-9197-0 3923,We compare auctioning and grandfathering as allocation mechanisms of emission permits when there is a secondary market with market power and firms have private information on their own abatement technologies. Based on real-life cases such as the EU ETS we consider a multi-unit multi-bid uniform auction. At the auction each firm anticipates its role in the secondary market either as a leader or a follower. This role affects each firms’ valuation of the permits (which are not common across firms) as well as their bidding strategies and it precludes the auction from generating a cost-effective allocation of permits as it occurs in simpler auction models. Auctioning tends to be more cost-effective than grandfathering when the firms’ abatement cost functions are sufficiently different from one another especially if the follower has lower abatement costs than the leader and the dispersion of the marginal costs is large enough.,francisco alvarez,Not available,2015.0,10.1007/s10640-014-9839-z,Environmental and Resource Economics,Francisco2015,False,,Springer,Not available,Auctioning Versus Grandfathering in Cap-and-Trade Systems with Market Power and Incomplete Information,bde045ca175396713b3a2969d5c27436,http://dx.doi.org/10.1007/s10640-014-9839-z 3924,We compare auctioning and grandfathering as allocation mechanisms of emission permits when there is a secondary market with market power and firms have private information on their own abatement technologies. Based on real-life cases such as the EU ETS we consider a multi-unit multi-bid uniform auction. At the auction each firm anticipates its role in the secondary market either as a leader or a follower. This role affects each firms’ valuation of the permits (which are not common across firms) as well as their bidding strategies and it precludes the auction from generating a cost-effective allocation of permits as it occurs in simpler auction models. Auctioning tends to be more cost-effective than grandfathering when the firms’ abatement cost functions are sufficiently different from one another especially if the follower has lower abatement costs than the leader and the dispersion of the marginal costs is large enough.,francisco andre,Not available,2015.0,10.1007/s10640-014-9839-z,Environmental and Resource Economics,Francisco2015,False,,Springer,Not available,Auctioning Versus Grandfathering in Cap-and-Trade Systems with Market Power and Incomplete Information,bde045ca175396713b3a2969d5c27436,http://dx.doi.org/10.1007/s10640-014-9839-z 3925,We study the Uniform Price Auction one of the standard sealed-bid multi-unit auction formats in Auction Theory for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is generally inefficient due to a “Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. All the same the uniform pricing rule is popular by its appeal to the anticipation that identical items should be identically priced. Its applications include among others sales of U.S. Treasury notes to investors and trade exchanges over the Internet facilitated by popular online brokers. In this work we characterize pure undominated bidding strategies and give an algorithm for computing pure Nash equilibria in such strategies. Subsequently we show that their Price of Anarchy is ,evangelos markakis,Not available,2015.0,10.1007/s00224-014-9537-9,Theory of Computing Systems,Evangelos2015,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,eb3c05f68d391d2253a037224d3141d4,http://dx.doi.org/10.1007/s00224-014-9537-9 3926,We study the Uniform Price Auction one of the standard sealed-bid multi-unit auction formats in Auction Theory for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and efficient multi-unit Vickrey auction the Uniform Price Auction encourages strategic bidding and is generally inefficient due to a “Demand Reduction” effect; bidders tend to bid for fewer (identical) units so as to receive them at a lower uniform price. All the same the uniform pricing rule is popular by its appeal to the anticipation that identical items should be identically priced. Its applications include among others sales of U.S. Treasury notes to investors and trade exchanges over the Internet facilitated by popular online brokers. In this work we characterize pure undominated bidding strategies and give an algorithm for computing pure Nash equilibria in such strategies. Subsequently we show that their Price of Anarchy is ,orestis telelis,Not available,2015.0,10.1007/s00224-014-9537-9,Theory of Computing Systems,Evangelos2015,False,,Springer,Not available,Uniform Price Auctions: Equilibria and Efficiency,eb3c05f68d391d2253a037224d3141d4,http://dx.doi.org/10.1007/s00224-014-9537-9 3927,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,teresa briz,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 3928,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,andreas drichoutis,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 3929,The relevance of projection bias in decision making processes has been widely studied but not specifically in experimental auctions. We study the role of projection bias in experimental auctions by examining the bidding behavior of hungry and non-hungry subjects on food products delivered either immediately after the auction or in 1 week’s time. Results indicate that the difference in bids between a hot state (hunger) and a cold state (satiation) almost doubles when subjects have to predict their future tastes versus when they bid for a product intended for immediate consumption. More specifically when subjects have to predict their future willingness to pay from their current tastes they tend to over-predict their hunger and under-predict satiation.,lisa house,Not available,2015.0,10.1186/s40100-015-0040-7,Agricultural and Food Economics,Teresa2015,True,,Springer,Not available,Examining projection bias in experimental auctions: the role of hunger and immediate gratification,6f294eeca0f816977a856872249b2d21,http://dx.doi.org/10.1186/s40100-015-0040-7 3930,We study a sequential auction of two objects with two bidders where the winner of the package obtains a synergy from the second object. If reselling after the two auctions occurs it proceeds as either monopoly or monopsony take-it-or-leave-it offer. We find that a post-auction resale has a significant impact on bidding strategies in the auctions: Under the monopoly offer there does not exist an equilibrium (symmetric or asymmetric) where bidders reveal their types with positive probability. Under the monopsony offer however we can identify symmetric increasing equilibrium strategies in auctions for both items. While allowing resale always improves efficiency we demonstrate that the effect of resale on expected revenue and the probability of exposure are both ambiguous.,lixin ye,Not available,2012.0,10.1007/s00182-011-0292-8,International Journal of Game Theory,Xiaoshu2012,False,,Springer,Not available,Auctions with synergy and resale,2ade3692a83a957744d8fb89ee439e33,http://dx.doi.org/10.1007/s00182-011-0292-8 3931,Many complex decision problems in the real world are very difficult to solve due to computational complexity. The winner determination problem (WDP) in combinatorial double auctions is one example of such complex problems. Although it allows buyers and sellers to submit bids and trade goods conveniently the WDP in combinatorial double auctions is notoriously difficult to solve from computation point of view. It relies on the development of an effective mechanism to determine the winners. Multi-agent systems (MAS) provide an approach in which several agents attempt through their interactions to jointly solve a problem. An important issue in MAS is the design of multi-agent learning algorithms. In this paper we will study the development of scalable multi-agent learning algorithms for solving the WDP in combinatorial double auctions. Instead of finding the exact solution we will set up a fictitious market based on MAS architecture and develop multi-agent learning algorithms to reduce the computational complexity in solving the WDP of combinatorial double auctions. In the fictitious market each buyer each seller and the mediator is modeled by an agent. The issue is to develop learning algorithms for all the agents in the system to collectively solve the WDP in combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach and a subgradient method to develop efficient multi-agent learning algorithms for solving the WDP in combinatorial double auctions. The effectiveness of the proposed multi-agent learning algorithms is also demonstrated by numerical examples.,fu-shiung hsieh,Not available,2015.0,10.1007/s10489-014-0643-9,Applied Intelligence,Fu-Shiung2015,False,,Springer,Not available,Scalable multi-agent learning algorithms to determine winners in combinatorial double auctions,616531ca4e7a237f970d799ce6fb08f4,http://dx.doi.org/10.1007/s10489-014-0643-9 3932,Many complex decision problems in the real world are very difficult to solve due to computational complexity. The winner determination problem (WDP) in combinatorial double auctions is one example of such complex problems. Although it allows buyers and sellers to submit bids and trade goods conveniently the WDP in combinatorial double auctions is notoriously difficult to solve from computation point of view. It relies on the development of an effective mechanism to determine the winners. Multi-agent systems (MAS) provide an approach in which several agents attempt through their interactions to jointly solve a problem. An important issue in MAS is the design of multi-agent learning algorithms. In this paper we will study the development of scalable multi-agent learning algorithms for solving the WDP in combinatorial double auctions. Instead of finding the exact solution we will set up a fictitious market based on MAS architecture and develop multi-agent learning algorithms to reduce the computational complexity in solving the WDP of combinatorial double auctions. In the fictitious market each buyer each seller and the mediator is modeled by an agent. The issue is to develop learning algorithms for all the agents in the system to collectively solve the WDP in combinatorial double auctions. In this paper we adopt a Lagrangian relaxation approach and a subgradient method to develop efficient multi-agent learning algorithms for solving the WDP in combinatorial double auctions. The effectiveness of the proposed multi-agent learning algorithms is also demonstrated by numerical examples.,chi-shiang liao,Not available,2015.0,10.1007/s10489-014-0643-9,Applied Intelligence,Fu-Shiung2015,False,,Springer,Not available,Scalable multi-agent learning algorithms to determine winners in combinatorial double auctions,616531ca4e7a237f970d799ce6fb08f4,http://dx.doi.org/10.1007/s10489-014-0643-9 3933,The acquisition of information is an important feature in most auctions where one’s exact private valuation is unknown ex-ante. We conducted the first experiment in testing a risk-neutral expected surplus maximization model with this feature. Varying the auction format and the cost of information acquisition we found bidders in most cases acquired too much information. Moreover bidders who remained uninformed placed bids significantly below the optimal bid. The general prediction concerning revenue and efficiency remains valid as a higher information cost was associated with lower revenues and efficiency rates. We explore different ex-post explanations for the observed behavior and show that regret avoidance can explain the data while risk aversion and ambiguity aversion cannot.,vitali gretschko,Not available,2015.0,10.1007/s10683-014-9406-z,Experimental Economics,Vitali2015,False,,Springer,Not available,Excess information acquisition in auctions,e0ca1eaddf156bb06e58fc5c7794498d,http://dx.doi.org/10.1007/s10683-014-9406-z 3934,The acquisition of information is an important feature in most auctions where one’s exact private valuation is unknown ex-ante. We conducted the first experiment in testing a risk-neutral expected surplus maximization model with this feature. Varying the auction format and the cost of information acquisition we found bidders in most cases acquired too much information. Moreover bidders who remained uninformed placed bids significantly below the optimal bid. The general prediction concerning revenue and efficiency remains valid as a higher information cost was associated with lower revenues and efficiency rates. We explore different ex-post explanations for the observed behavior and show that regret avoidance can explain the data while risk aversion and ambiguity aversion cannot.,alexander rajko,Not available,2015.0,10.1007/s10683-014-9406-z,Experimental Economics,Vitali2015,False,,Springer,Not available,Excess information acquisition in auctions,e0ca1eaddf156bb06e58fc5c7794498d,http://dx.doi.org/10.1007/s10683-014-9406-z 3935,The current art in optimal combinatorial auctions is limited to handling the case of a single unit each of multiple items with each agent bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for buying multiple units of multiple items when the bidders are single minded. We develop a procurement auction that minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions this optimal auction also satisfies dominant strategy incentive compatibility. The results presented here hold true for equivalent forward auction settings as well. For the two item multi-unit procurement auction we design an optimal auction in the presence of the single minded bidders offering volume discounts.,sujit gujar,Not available,2013.0,10.1007/s12351-011-0116-4,Operational Research,Sujit2013,False,,Springer,Not available,Optimal multi-unit combinatorial auctions,007689fc79a0e498ed24fa42adb03260,http://dx.doi.org/10.1007/s12351-011-0116-4 3936,The current art in optimal combinatorial auctions is limited to handling the case of a single unit each of multiple items with each agent bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for buying multiple units of multiple items when the bidders are single minded. We develop a procurement auction that minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions this optimal auction also satisfies dominant strategy incentive compatibility. The results presented here hold true for equivalent forward auction settings as well. For the two item multi-unit procurement auction we design an optimal auction in the presence of the single minded bidders offering volume discounts.,y. narahari,Not available,2013.0,10.1007/s12351-011-0116-4,Operational Research,Sujit2013,False,,Springer,Not available,Optimal multi-unit combinatorial auctions,007689fc79a0e498ed24fa42adb03260,http://dx.doi.org/10.1007/s12351-011-0116-4 3937,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,bing shi,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 3938,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,enrico gerding,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 3939,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,perukrishnen vytelingum,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 3940,In this paper we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. ,nicholas jennings,Not available,2013.0,10.1007/s10458-011-9190-5,Autonomous Agents and Multi-Agent Systems,Bing2013,False,,Springer,Not available,An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces,2d06565b460854833fd6914bad05ecb0,http://dx.doi.org/10.1007/s10458-011-9190-5 3941,We provide a characterization of interim efficient auctions and examine their properties in the presence of informational interdependent valuations. We show that buyers can be awarded the auctioned item less often than the efficient level. We also show that buyers obtain the item more often as the degree of heterogeneity in preferences increases even though profitability of trade does not depend on the heterogeneity in preferences.,serkan kucuksenel,Not available,2012.0,10.1007/s00712-011-0226-8,Journal of Economics,Serkan2012,False,,Springer,Not available,Interim efficient auctions with interdependent valuations,92704ac4bf99c8279092de7469bd4875,http://dx.doi.org/10.1007/s00712-011-0226-8 3942,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yinglei teng,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 3943,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,f. yu,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 3944,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,ke han,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 3945,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yifei wei,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 3946,In cognitive radio networks an important issue is to share the detected available spectrum among different secondary users to improve the network performance. Although some work has been done for dynamic spectrum access the learning capability of cognitive radio networks is largely ignored in the previous work. In this paper we propose a reinforcement-learning-based double auction algorithm aiming to improve the performance of dynamic spectrum access in cognitive radio networks. The dynamic spectrum access process is modeled as a double auction game. Based on the spectrum access history information both primary users and secondary users can estimate the impact on their future rewards and then adapt their spectrum access or release strategies effectively to compete for channel opportunities. Simulation results show that the proposed reinforcement-learning-based double auction algorithm can significantly improve secondary users’ performance in terms of packet loss bidding efficiency and transmission rate or opportunity access.,yong zhang,Not available,2013.0,10.1007/s11277-012-0611-9,Wireless Personal Communications,Yinglei2013,False,,Springer,Not available,Reinforcement-Learning-Based Double Auction Design for Dynamic Spectrum Access in Cognitive Radio Networks,21ef7edfd794c186098c316c05e194c6,http://dx.doi.org/10.1007/s11277-012-0611-9 3947,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,christer andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 3948,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,ola andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 3949,This paper considers two multi-item auction formats (ascending and sealed bid) which both identify the minimum Walrasian equilibrium prices and where truthful preference revelation constitutes an equilibrium. Even though these auction formats share many theoretical properties there are behavioral aspects that are not easily captured. To explore this issue in more detail this paper experimentally investigates what role the design of the auction format has for its outcome. The results suggest that the sealed bid mechanism performs weakly better in all of the investigated measures (consistent reporting efficiency etc.). In addition we find that the performance of the ascending auction is increasing over time whereas the sealed bid auction shows no such tendency.,tommy andersson,Not available,2013.0,10.1007/s10058-012-0129-3,Review of Economic Design,Christer2013,False,,Springer,Not available,Sealed bid auctions versus ascending bid auctions: an experimental study,39418956a7aecf65879629e2c604e69f,http://dx.doi.org/10.1007/s10058-012-0129-3 3950,Spectrum auctions are used by governments to assign and price licenses for wireless communications. The standard approach is the simultaneous ascending auction in which many related lots are auctioned simultaneously in a sequence of rounds. I analyze the strengths and weaknesses of the approach with examples from US spectrum auctions. I then present a variation-the combinatorial clock auction-which has been adopted by the UK and many other countries which addresses many of the problems of the simultaneous ascending auction while building on its strengths. The combinatorial clock auction is a simple dynamic auction in which bidders bid on packages of lots. Most importantly the auction allows alternative technologies that require the spectrum to be organized in different ways to compete in a technology-neutral auction. In addition the pricing rule and information policy are carefully tailored to mitigate gaming behavior. An activity rule based on revealed preference promotes price and assignment discovery throughout the clock stage of the auction. Truthful bidding is encouraged which simplifies bidding and improves efficiency. Experimental tests and early auctions confirm the advantages of the approach.,peter cramton,Not available,2013.0,10.1007/s11151-013-9376-x,Review of Industrial Organization,Peter2013,False,,Springer,Not available,Spectrum Auction Design,87fff65e409c1668363e4a769ebec760,http://dx.doi.org/10.1007/s11151-013-9376-x 3951,In a single item auction model that allows non-quasilinear preferences we show that an auction rule satisfies ,toyotaka sakai,Not available,2013.0,10.1007/s10058-012-0135-5,Review of Economic Design,Toyotaka2013,False,,Springer,Not available,An equity characterization of second price auctions when preferences may not be quasilinear,57d8a93d7e61a8dd90eeadeaf1c8cf6c,http://dx.doi.org/10.1007/s10058-012-0135-5 3952,This paper aims to estimate the effect of imposing a reserve price in repeated auctions of homogeneous items. I model the behavior of impatient bidders who search for the best auction outcome over time. The model is used to develop estimating equations for the bidders’ valuations and to evaluate the effect of reserve prices on bids and revenue. Using data collected from surplus auctions of personal computer processors I find economically significant gains from imposing a reserve price. The revenue-maximizing reserve price improves revenue by about 23% for a large subsample of the auctions in the data.,octavian carare,Not available,2012.0,10.1007/s11151-011-9321-9,Review of Industrial Organization,Octavian2012,False,,Springer,Not available,Reserve Prices in Repeated Auctions,64572555bfaed1799a31cbfa98b9feba,http://dx.doi.org/10.1007/s11151-011-9321-9 3953,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,jacob goeree,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 3954,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,theo offerman,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 3955,Multi-unit ascending auctions allow for equilibria in which bidders strategically reduce their demand and split the market at low prices. At the same time they allow for preemptive bidding by incumbent bidders in a coordinated attempt to exclude entrants from the market. We consider an environment where both demand reduction and preemptive bidding are supported as equilibrium phenomena of the ascending auction. In a series of experiments we compare its performance to that of the discriminatory auction. Strategic demand reduction is quite prevalent in the ascending auction even when entry imposes a (large) negative externality on incumbents. As a result the ascending auction performs worse than the discriminatory auction both in terms of revenue and efficiency while entrants’ chances are similar across the two formats.,randolph sloof,Not available,2013.0,10.1007/s10683-012-9338-4,Experimental Economics,K.2013,False,,Springer,Not available,Demand reduction and preemptive bidding in multi-unit license auctions,4afc6120f6e49289a9daa966c3d8e4c4,http://dx.doi.org/10.1007/s10683-012-9338-4 3956,The literature on art auctions has overlooked the market for classical music manuscripts and this paper explores for the first time the determinants of ‘hammer’ prices for about 360 classical music manuscripts auctioned at Sotheby’s (London) during the 1998–2009 period. We use hedonic price regressions in order to explain the price of classical music manuscripts by several characteristics. The paper shows that the ‘trace’ of the composer (e.g. whether the manuscript is fully or partly in the hand of the composer or in a scribal hand) the artistic value of the composition the number of pages the period (Baroque Classical etc.) and of course the name of the composer and the relative scarcity of his manuscripts are all characteristics that contribute to explain the hammer price of these manuscripts. However parameter estimates for characteristics such as the type of music (symphony opera etc.) and whether the manuscript is the complete work or some fragment (say one movement) are not statistically significant. The paper also estimates a hedonic price index that provides a measure of the average returns and (high) risk of collecting and investing in music manuscripts.,patrick georges,Not available,2013.0,10.1007/s10824-012-9171-9,Journal of Cultural Economics,Patrick2013,False,,Springer,Not available,Black notes and white noise: a hedonic approach to auction prices of classical music manuscripts,d7f633e5806d364fbfa5fab9b64c76f3,http://dx.doi.org/10.1007/s10824-012-9171-9 3957,The literature on art auctions has overlooked the market for classical music manuscripts and this paper explores for the first time the determinants of ‘hammer’ prices for about 360 classical music manuscripts auctioned at Sotheby’s (London) during the 1998–2009 period. We use hedonic price regressions in order to explain the price of classical music manuscripts by several characteristics. The paper shows that the ‘trace’ of the composer (e.g. whether the manuscript is fully or partly in the hand of the composer or in a scribal hand) the artistic value of the composition the number of pages the period (Baroque Classical etc.) and of course the name of the composer and the relative scarcity of his manuscripts are all characteristics that contribute to explain the hammer price of these manuscripts. However parameter estimates for characteristics such as the type of music (symphony opera etc.) and whether the manuscript is the complete work or some fragment (say one movement) are not statistically significant. The paper also estimates a hedonic price index that provides a measure of the average returns and (high) risk of collecting and investing in music manuscripts.,aylin seckin,Not available,2013.0,10.1007/s10824-012-9171-9,Journal of Cultural Economics,Patrick2013,False,,Springer,Not available,Black notes and white noise: a hedonic approach to auction prices of classical music manuscripts,d7f633e5806d364fbfa5fab9b64c76f3,http://dx.doi.org/10.1007/s10824-012-9171-9 3958,Economics is one of the diverse aspects of our life in which algorithms play a – perhaps subtle – role. Whether we are buying an item through an eBay auction or choosing a pricing scheme from our telephone company we are participants in distributed decision-making processes having consequences that may affect our personal “welfare”. And with the advent of the Internet and the Web there is an increasing demand for algorithms that run manage or analyze such economic transactions. In this chapter we discuss some of the basic notions that underlie an algorithmic view of economic and strategic interactions.,vincenzo bonifaci,Not available,2013.0,10.1007/978-3-642-39652-6_9,The Power of Algorithms,Vincenzo2013,False,,Springer,Not available,Algorithms for Auctions and Games,0f856d0d2374a9f7e0c407d78c9b2961,http://dx.doi.org/10.1007/978-3-642-39652-6_9 3959,Economics is one of the diverse aspects of our life in which algorithms play a – perhaps subtle – role. Whether we are buying an item through an eBay auction or choosing a pricing scheme from our telephone company we are participants in distributed decision-making processes having consequences that may affect our personal “welfare”. And with the advent of the Internet and the Web there is an increasing demand for algorithms that run manage or analyze such economic transactions. In this chapter we discuss some of the basic notions that underlie an algorithmic view of economic and strategic interactions.,stefano leonardi,Not available,2013.0,10.1007/978-3-642-39652-6_9,The Power of Algorithms,Vincenzo2013,False,,Springer,Not available,Algorithms for Auctions and Games,0f856d0d2374a9f7e0c407d78c9b2961,http://dx.doi.org/10.1007/978-3-642-39652-6_9 3960,,ronald harstad,Not available,2013.0,10.1007/978-1-4419-1153-7_1258,Encyclopedia of Operations Research and Management Science,M.2013,False,,Springer,Not available,Auction and Bidding Models,9bdc67aa58f72373e6c95c521cf66e47,http://dx.doi.org/10.1007/978-1-4419-1153-7_1258 3961,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,alireza salehan,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3962,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,hossein deldari,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3963,This paper investigates the time dynamics of user strategic patterns and resulting welfares in a series of overlapping multiple online auctions. An auction mechanism is a dynamic game where the valuation and strategic space of bidders determine the outcomes. When those mechanisms exist concurrently or in a series in a market environment multiple sources are visible and accessible such that there is likely to be a form of interdependency across the auctions. While heterogeneous bidder behavior has been studied in some literature the focus is mainly on an individual auction level and the underlying dynamics regarding the interdependency across the auctions in the market has not been explained. We use a two-phased approach to address this discrepancy. First we classify user strategy using ,seokjoo chang,Not available,2012.0,10.1007/s10796-010-9249-x,Information Systems Frontiers,Andrew2012,False,,Springer,Not available,Time dynamics of overlapping e-auction mechanisms: Information transfer strategic user behavior and auction revenue,1641c10ebb03b8f58d5c8d4a9b14ee1a,http://dx.doi.org/10.1007/s10796-010-9249-x 3964,Cloud computing is able to allocate different resources as virtual machines (VMs) to users who need only pay for the amount of resources used. Two of the challenges in clouds are resource allocation and pricing in such a way to satisfy both cloud providers and users. Existing allocation and pricing mechanisms cannot guarantee increased profits due to various reasons. A better solution to increase the satisfaction of both parties which is supported by economic theory is the employment of auction-based allocation and pricing mechanisms. In these mechanisms cloud resources and services are awarded based on the highest bids while winners receive the quality of services expected. However most existing auction-based mechanisms are inefficient and cannot be used in real clouds due to high computational or communication overhead the bid function’s time complexity and/or its inaccurate estimates. In the present paper a lightweight mechanism is introduced which can be utilized in the real-world application of clouds. The currently proposed mechanism is a winner-bid auction game that seals users’ bids by a multi-criteria valuation-based bid function and sends them to the auctioneer. During scheduling the auctioneer awards VMs exclusively to users with the highest bids. The presented approach is an online auction whose main aim is to increase the profits of the provider and user from different criteria. While determining the Nash equilibrium the current study specifies the prices to be paid by users in various cases and proves the truthfulness of the proposed method. Finally the effectiveness of the presented mechanism is examined through extensive experiments on different simulation scenarios and actual workload data.,saeid abrishami,Not available,2017.0,10.1007/s11227-017-2059-x,The Journal of Supercomputing,Alireza2017,False,,Springer,Not available,An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds,2d6403bf40e175277ce23ceb73771fa3,http://dx.doi.org/10.1007/s11227-017-2059-x 3965,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,yan-jiao chen,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3966,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,xiao-yan yin,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3967,In the two-tier macro-femto heterogeneous network hybrid access is regarded as the most ideal access control approach to mitigating macro-femto cross-tier interference and enhancing overall network performance. However the implementation of hybrid access is hindered by a lack of incentive market mechanism to motivate private femtocell owners to offer access permissions to macro users. In this paper we propose a reverse auction framework for access permission transaction between a macrocell operator and multiple femtocell owners to promote hybrid access. Our goal is to maximize social welfare while guaranteeing the truthfulness of the auction. Since the coverage of multiple femtocells may overlap we partition each cell to adjust the granularity of access permission availability. We first propose a Vickery-Clarke-Grove (VCG)-based mechanism which costs the least among all auction mechanisms that produce maximum social welfare. As the VCG mechanism is too time-consuming we propose two alternative truthful mechanisms namely generalized second-price and suboptimal mechanism. We further extend the auction framework to the scenario where femtocell owners have heterogeneous valuations for access permissions in different locations.,jin zhang,Not available,2017.0,10.1007/s11390-017-1798-8,Journal of Computer Science and Technology,Yan-Jiao2017,False,,Springer,Not available,A Reverse Auction Framework for Hybrid Access in Femtocell Network,4c445efeac6583d9e13419c90f7a4fe4,http://dx.doi.org/10.1007/s11390-017-1798-8 3968,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,xingwang wang,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3969,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,xiaohui wei,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3970,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,shang gao,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3971,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,yuanyuan liu,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3972,As a common processing method query is widely used in many areas such as graph processing machine learning statistics. However queries are usually priced according to vendor-specified fixed views (API) or number of transactions which ignores query heterogeneity(computing resource consumption for query and information that the answer brings) and violates the microeconomic principles. In this work we study the relational query pricing problem and design efficient auctions by taking into account both information (i.e. data) value and query resource consumption. Different from the existing query pricing schemes query auction determines data prices that reflect the demand–supply of shared computing resources and information value (i.e. price discovery). We target query auction that runs in polynomial time and achieves near-optimal social welfare with a good approximation ratio while elicits truthful bids from consumers. Towards these goals we adapt the posted pricing framework in game-theoretic perspective by casting the query auction design into an Integer Linear Programming problem and design a primal-dual algorithm to approximate the NP-hard optimization problem. Theoretical analysis and empirical studies driven by a real-world data market benchmark verify the efficiency of our query auction schema.,zongpeng li,Not available,2017.0,10.1007/s10766-017-0534-x,International Journal of Parallel Programming,Xingwang2017,False,,Springer,Not available,A Novel Auction-Based Query Pricing Schema,834608a56e7f8283298b0e21eba099f5,http://dx.doi.org/10.1007/s10766-017-0534-x 3973,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,wen song,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3974,This paper studies the evolutionary stability of the unique Nash equilibrium of a first price sealed bid auction. It is shown that the Nash equilibrium is not asymptotically stable under payoff monotonic dynamics for arbitrary initial populations. In contrast for some classes of bid functions when the initial population includes a continuum of strategies around the equilibrium the replicator dynamic does converge to the Nash equilibrium. Simulations are presented for the replicator and Brown–von Neumann–Nash (BNN) dynamics. They suggest that the convergence for the replicator dynamic is slow compared to that for the BNN dynamic.,fernando louge,Not available,2012.0,10.1007/s13235-011-0034-3,Dynamic Games and Applications,Fernando2012,False,,Springer,Not available,Evolutionary Stability in First Price Auctions,83ff02d34c967ac4b68dce195b53f3c8,http://dx.doi.org/10.1007/s13235-011-0034-3 3975,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,donghun kang,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3976,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,jie zhang,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3977,In industry many problems are considered as the decentralized resource-constrained multi-project scheduling problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. In this paper we tackle DRCMPSP by formulating it as a multi-unit combinatorial auction (Wellman et al. in Games Econ Behav 35(1):271–303 ,hui xi,Not available,2017.0,10.1007/s10458-017-9370-z,Autonomous Agents and Multi-Agent Systems,Wen2017,False,,Springer,Not available,A multi-unit combinatorial auction based approach for decentralized multi-project scheduling,3ccc0f1382cb881ed0ef0bdac8c4ec59,http://dx.doi.org/10.1007/s10458-017-9370-z 3978,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,f. bonomo,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3979,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,j. catalan,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3980,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,g. duran,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3981,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,r. epstein,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3982,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,m. guajardo,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3983,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,a. jawtuschenko,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3984,This article studies a multi-item auction characterized by asymmetric bidders and quantity discounts. We report a practical application of this type of auction in the procurement of Internet services to the 709 public schools of Buenos Aires. The asymmetry in this application is due to firms’ existing technology infrastructures which affect their ability to provide the service in certain areas of the city. A single round first-price sealed-bid auction it required each participating firm to bid a supply curve specifying a price on predetermined graduated quantity intervals and to identify the individual schools it would supply. The maximal intersections of the sets of schools each participant has bid on define regions we call competition units. A single unit price must be quoted for all schools supplied within the same quantity interval so that firms cannot bid a high price where competition is weak and a lower one where it is strong. Quantity discounts are allowed so that the bids can reflect returns-to-scale of the suppliers and the auctioneer may benefit of awarding bundles of units instead of separate units. The winner determination problem in this auction poses a challenge to the auctioneer. We present an exponential formulation and a polynomial formulation for this problem both based on integer linear programming. The polynomial formulation proves to find the optimal set of bids in a matter of seconds. Results of the real-world implementation are reported.,j. marenco,Not available,2017.0,10.1007/s10479-016-2164-x,Annals of Operations Research,F.2017,False,,Springer,Not available,An asymmetric multi-item auction with quantity discounts applied to Internet service procurement in Buenos Aires public schools,8c3a28a8dcec04bf7d6cb91e6117c154,http://dx.doi.org/10.1007/s10479-016-2164-x 3985,This paper studies the evolutionary stability of the unique Nash equilibrium of a first price sealed bid auction. It is shown that the Nash equilibrium is not asymptotically stable under payoff monotonic dynamics for arbitrary initial populations. In contrast for some classes of bid functions when the initial population includes a continuum of strategies around the equilibrium the replicator dynamic does converge to the Nash equilibrium. Simulations are presented for the replicator and Brown–von Neumann–Nash (BNN) dynamics. They suggest that the convergence for the replicator dynamic is slow compared to that for the BNN dynamic.,frank riedel,Not available,2012.0,10.1007/s13235-011-0034-3,Dynamic Games and Applications,Fernando2012,False,,Springer,Not available,Evolutionary Stability in First Price Auctions,83ff02d34c967ac4b68dce195b53f3c8,http://dx.doi.org/10.1007/s13235-011-0034-3 3986,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,philippe gillen,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3987,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,vitali gretschko,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3988,We compare auctions with bidder qualification before or after the bidding process. We show that although post-auction qualification is more efficient the auctioneer prefers pre-auction qualification when bidders’ qualification costs are high.,alexander rasch,Not available,2017.0,10.1007/s40505-016-0108-x,Economic Theory Bulletin,Philippe2017,False,,Springer,Not available,Pre-auction or post-auction qualification?,a0d79e35ee028663d98938ffb1c778a5,http://dx.doi.org/10.1007/s40505-016-0108-x 3989,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,lian jian,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3990,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,zheng li,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3991,While both simultaneous and sequential contests are mechanisms used in practice such as crowdsourcing job interviews and sports contests few studies have directly compared their performance. By modeling contests as incomplete information all-pay auctions with linear costs we analytically and experimentally show that the expected maximum effort is higher in simultaneous contests in which contestants choose their effort levels independently and simultaneously than in sequential contests in which late entrants make their effort choices after observing all prior participants’ choices. Our experimental results also show that efficiency is higher in simultaneous contests than in sequential ones. Sequential contests’ efficiency drops significantly as the number of contestants increases. We also discover that when participants’ ability follows a power distribution high ability players facing multiple opponents in simultaneous contests tend to under-exert effort compared to theoretical predictions. We explain this observation using a simple model of overconfidence.,tracy liu,Not available,2017.0,10.1007/s10683-016-9504-1,Experimental Economics,Lian2017,False,,Springer,Not available,Simultaneous versus sequential all-pay auctions: an experimental study,2c4d76e6fe731b810a1962da499b0783,http://dx.doi.org/10.1007/s10683-016-9504-1 3992,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,bo ma,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3993,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,jianhua ge,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3994,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,weiliang han,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3995,In autonomous wireless networks distributed and efficient partner selection is critical for fully realizing the benefits of cooperative communications. However the selfish nodes in the networks bring catastrophe for partner selection when implementing cooperative transmissions. In order to stimulate cooperation and achieve distributed partner selection for such systems an auction-based pricing scheme that considering efficiency and fairness is proposed in this paper. Two most prevalent auction forms i.e. the second-price auction and the first-price auction are both considered and analyzed in the single- and multiple-relay networks. In the single-relay scenario the Nash equilibrium strategy for each auction is characterized based on which the expected payoff and revenue for the source and relay are derived respectively. Conclusions show that the same expected payoff is charged for the source with different auction schemes and so is the expected revenue for the relay. Nonetheless things are different in the multi-relay networks. With the linear 0–1 integer programming models it is concluded that the first-price auction is more efficient than the second-price auction. Numerical results and analysis present that the proposed auction scheme efficiently solve the noncooperation issues of selfish nodes in autonomous wireless networks.,jing li,Not available,2017.0,10.1007/s11277-017-4166-7,Wireless Personal Communications,Bo2017,False,,Springer,Not available,Auction-Based Pricing Schemes for Distributed Partner Selection in Cooperative Wireless Networks,89a71ed67ef6d1884398a8593640cdaf,http://dx.doi.org/10.1007/s11277-017-4166-7 3996,This study investigates whether market composition affects individual bidding and the aggregate market in first-price sealed-bid common-value auctions. It compares all-inexperienced markets with only inexperienced bidders all-experienced markets with only experienced bidders and mixed markets with both types. On average there is no market-composition effect for both experienced and inexperienced bidders. When controlling for gender a market-composition effect appears for inexperienced subjects: Men bid more aggressively in mixed than in all-inexperienced markets and women bid more aggressively in all-inexperienced markets. On the aggregate level the all-inexperienced market is the most aggressive with highest winning bids; the all-experienced market is the least aggressive. The mixed market is in between: Both experienced and inexperienced win auctions in this market but experienced bidders win less auctions than they should.,johanna goertz,Not available,2012.0,10.1007/s10683-011-9291-7,Experimental Economics,M.2012,False,,Springer,Not available,Market composition and experience in common-value auctions,be777d631e8a1a7eb09aed9bbe132fd0,http://dx.doi.org/10.1007/s10683-011-9291-7 3997,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,ilan kremer,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 3998,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,zvi wiener,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 3999,Flow goods (like electricity) are sold through auctions in a dynamic framework. An important design question is the frequency of such auctions. We use a simple dynamic auction model in continuous time to answer this question. We focus on the relationship between the persistency of bidders’ valuations and the optimal choice of frequency. If the seller focuses on the equilibrium in which bidders follow a repeated static Nash strategy then the frequency of auctions should typically increase when persistency declines. However accounting for the fact that bidders can follow different equilibria that are collusive in nature the comparative statics are reversed forcing the seller to reduce the frequency when bidders’ valuations are less persistent. The argument builds on the fact that high frequency auctions are more conducive to collusion among bidders.,eyal winter,Not available,2017.0,10.1007/s00182-016-0549-3,International Journal of Game Theory,Ilan2017,False,,Springer,Not available,Flow auctions,215cc9567eb8ba1c1b8f30720c3edba9,http://dx.doi.org/10.1007/s00182-016-0549-3 4000,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,bjorn bartling,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 4001,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,tobias gesche,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 4002,This paper studies the impact of human subjects in the role of a seller on bidding in experimental second-price auctions. Overbidding is a robust finding in second-price auctions and spite among bidders has been advanced as an explanation. If spite extends to the seller then the absence of human sellers who receive the auction revenue may bias upwards the bidding behavior in existing experimental auctions. We derive the equilibrium bidding function in a model where bidders have preferences regarding both the payoffs of other bidders and the seller’s revenue. Overbidding is optimal when buyers are spiteful only towards other buyers. However optimal bids are lower and potentially even truthful when spite extends to the seller. We experimentally test the model predictions by exogenously varying the presence of human subjects in the roles of the seller and competing bidders. We do not detect a systematic effect of the presence of a human seller on overbidding. We conclude that overbidding is not an artefact of the standard experimental implementation of second-price auctions in which human sellers are absent.,nick netzer,Not available,2017.0,10.1007/s40881-017-0037-y,Journal of the Economic Science Association,Björn2017,False,,Springer,Not available,Does the absence of human sellers bias bidding behavior in auction experiments?,ed637a757f28671ddba1106687840a82,http://dx.doi.org/10.1007/s40881-017-0037-y 4003,The goal of this paper is to compare results for discriminatory auctions to results for uniform-price auctions when suppliers have capacity constraints. We have a pretty good understanding of what equilibrium results look like for the uniform-price auctions. But an unresolved problem is what happens when a discriminative auction is run and suppliers have capacity constraints. We formulate a supply function equilibrium model in continuous offer schedules with inelastic time-varying demand and with single-step marginal cost function to compare two auction institutions in the presence of capacity constraints. We show that payments made to the suppliers in the unique equilibrium of the discriminatory auction can be less than the payments in the uniform-price auction depending on which uniform-price auction equilibrium is selected. For the high demand and/or low excess capacity cases we characterize also mixed strategy supply function equilibrium under the discriminatory auction.,t. genc,Not available,2009.0,10.1007/s10957-008-9437-8,Journal of Optimization Theory and Applications,S.2009,False,,Springer,Not available,Discriminatory Versus Uniform-Price Electricity Auctions with Supply Function Equilibrium,9bd8827f5082ace8888976afc10e3132,http://dx.doi.org/10.1007/s10957-008-9437-8 4004,We characterize the optimal selling mechanism for a seller who faces demand demarcated by a high and a low end and who can access an (online) auction site (by paying an access cost) in addition to using his own store that can be used as a posted price selling venue. We first solve for the optimal mechanism of a direct revelation game in which there is no venue-restriction constraint. We find that the direct optimal mechanism must necessarily incorporate a certain kind of pooling. We then show that even with the venue constraint the seller can use a two stage indirect mechanism that implements the allocation rule from the optimal direct mechanism and uses the venues in an optimal fashion. The first stage of the indirect mechanism is a posted price at the store. If the object is not sold we move to stage two which involves an auction at the auction site. A feature of this auction is a buy-now option which is essential for implementing the pooling feature of the optimal direct mechanism. We also show that the buy-now option in the optimal mechanism is of a “temporary” variety and that a “permanent” buy-now option in contrast cannot implement the optimal mechanism. Auctions with a temporary buy-now option are in widespread use on eBay.,subir bose,Not available,2009.0,10.1007/s00199-008-0345-9,Economic Theory,Subir2009,False,,Springer,Not available,Optimal sale across venues and auctions with a buy-now option,2f524502365bbb61e321f1908d8f71aa,http://dx.doi.org/10.1007/s00199-008-0345-9 4005,We characterize the optimal selling mechanism for a seller who faces demand demarcated by a high and a low end and who can access an (online) auction site (by paying an access cost) in addition to using his own store that can be used as a posted price selling venue. We first solve for the optimal mechanism of a direct revelation game in which there is no venue-restriction constraint. We find that the direct optimal mechanism must necessarily incorporate a certain kind of pooling. We then show that even with the venue constraint the seller can use a two stage indirect mechanism that implements the allocation rule from the optimal direct mechanism and uses the venues in an optimal fashion. The first stage of the indirect mechanism is a posted price at the store. If the object is not sold we move to stage two which involves an auction at the auction site. A feature of this auction is a buy-now option which is essential for implementing the pooling feature of the optimal direct mechanism. We also show that the buy-now option in the optimal mechanism is of a “temporary” variety and that a “permanent” buy-now option in contrast cannot implement the optimal mechanism. Auctions with a temporary buy-now option are in widespread use on eBay.,arup daripa,Not available,2009.0,10.1007/s00199-008-0345-9,Economic Theory,Subir2009,False,,Springer,Not available,Optimal sale across venues and auctions with a buy-now option,2f524502365bbb61e321f1908d8f71aa,http://dx.doi.org/10.1007/s00199-008-0345-9 4006,We consider the balloon popping problem introduced by Immorlica et al. in 2007 [13]. This problem is directly related to the problem of profit maximization in online auctions where an auctioneer is selling a collection of identical items to anonymous unit-demand bidders. The auctioneer has the full knowledge of bidders’ private valuations for the items and tries to maximize his profit. Compared with the profit of fixed price schemes the competitive ratio of Immorlica et al.’s algorithm was in the range [1.64 4.33]. In this paper we narrow the gap to [1.659 2].,hyunwoo jung,Not available,2009.0,10.1007/978-3-642-04645-2_14,Algorithmic Game Theory,Hyunwoo2009,False,,Springer,Not available,The Balloon Popping Problem Revisited: Lower and Upper Bounds,8107d976ec69f43d9ab2cffc0fb5c7dc,http://dx.doi.org/10.1007/978-3-642-04645-2_14 4007,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,james cox,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 4008,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,rodney garratt,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 4009,We consider the balloon popping problem introduced by Immorlica et al. in 2007 [13]. This problem is directly related to the problem of profit maximization in online auctions where an auctioneer is selling a collection of identical items to anonymous unit-demand bidders. The auctioneer has the full knowledge of bidders’ private valuations for the items and tries to maximize his profit. Compared with the profit of fixed price schemes the competitive ratio of Immorlica et al.’s algorithm was in the range [1.64 4.33]. In this paper we narrow the gap to [1.659 2].,kyung-yong chwa,Not available,2009.0,10.1007/978-3-642-04645-2_14,Algorithmic Game Theory,Hyunwoo2009,False,,Springer,Not available,The Balloon Popping Problem Revisited: Lower and Upper Bounds,8107d976ec69f43d9ab2cffc0fb5c7dc,http://dx.doi.org/10.1007/978-3-642-04645-2_14 4010,We study simultaneous ascending auctions of two identical objects when bidders are financially constrained and their valuations exhibit complementarities. We assume the budget constraints are known but the values for individual objects are private information and characterize noncollusive equilibria. Equilibrium behavior is affected by the exposure problem. Bidders with higher budgets are more reluctant to bid because opponents with lower budgets may end up pursuing a single object thus preventing the realization of complementarities. Therefore poor bidders may win both objects when they do not have the highest valuation.,sandro brusco,Not available,2009.0,10.1007/s00199-007-0217-8,Economic Theory,Sandro2009,False,,Springer,Not available,Simultaneous ascending auctions with complementarities and known budget constraints,fb0fc60cba515a4e9997c70a88d46d68,http://dx.doi.org/10.1007/s00199-007-0217-8 4011,We study simultaneous ascending auctions of two identical objects when bidders are financially constrained and their valuations exhibit complementarities. We assume the budget constraints are known but the values for individual objects are private information and characterize noncollusive equilibria. Equilibrium behavior is affected by the exposure problem. Bidders with higher budgets are more reluctant to bid because opponents with lower budgets may end up pursuing a single object thus preventing the realization of complementarities. Therefore poor bidders may win both objects when they do not have the highest valuation.,giuseppe lopomo,Not available,2009.0,10.1007/s00199-007-0217-8,Economic Theory,Sandro2009,False,,Springer,Not available,Simultaneous ascending auctions with complementarities and known budget constraints,fb0fc60cba515a4e9997c70a88d46d68,http://dx.doi.org/10.1007/s00199-007-0217-8 4012,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,jacques cremer,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 4013,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,yossi spiegel,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 4014,We characterize optimal selling mechanisms in auction environments where bidders must incur a cost to learn their valuations. These mechanisms specify for each period as a function of the bids in previous periods which new potential buyers should be asked to bid. In addition these mechanisms must induce the bidders to acquire information about their valuations and to reveal this information truthfully. Using a generalized Groves principle we prove a very general “full extraction of the surplus” result: the seller can obtain the same profit as if he had full control over the bidders’ acquisition of information and could have observed directly their valuations once they are informed. We also present appealing implementations of the optimal mechanism in special cases.,charles zheng,Not available,2009.0,10.1007/s00199-007-0301-0,Economic Theory,Jacques2009,False,,Springer,Not available,Auctions with costly information acquisition,3301da2f0bb0b5cf12095a9ed39d7aff,http://dx.doi.org/10.1007/s00199-007-0301-0 4015,This paper models sequential auctioning of two perfect substitutes by a strategic seller who learns about demand from the first-auction price. The seller holds the second auction only when the remaining demand is strong enough to cover her opportunity cost. Bidding in anticipation of such a contingent future auction is characterized including a sufficient condition for existence of an invertible (increasing symmetric pure-strategy) bidding equilibrium that facilitates the seller’s learning. A unique invertible bidding equilibrium exists for the Dutch auction format but only when the second auction is sufficiently discounted by the bidders. In the equilibrium high-valuation bidders shade their bids down as if the second auction were guaranteed. To counter such strategic bidding the seller would value ex-ante commitment to hold the second auction less often. Three forms of such commitment are analyzed: commitment to list future auctions in advance commitment to not hold the second auction unless the first price exceeds a publicly announced threshold and commitment to a reserve-price in the second auction.,robert zeithammer,Not available,2009.0,10.1007/s00199-008-0348-6,Economic Theory,Robert2009,False,,Springer,Not available,Commitment in sequential auctioning: advance listings and threshold prices,6ab7ca6566bfe07a92fcaad473300ab7,http://dx.doi.org/10.1007/s00199-008-0348-6 4016,eBay and Yahoo allow sellers to list their auctions with a buy price at which a bidder may purchase the item immediately. On eBay the buy-now option disappears once a bid is placed while on Yahoo the buy-now option remains in effect throughout the auction. We show that when bidders are risk averse both types of auctions raise seller revenue for a wide range of buy prices. The Yahoo format raises more revenue than the eBay format when bidders have either CARA or DARA. Bidders with DARA prefer the eBay auction while bidders with CARA are indifferent between the two.,stanley reynolds,Not available,2009.0,10.1007/s00199-006-0182-7,Economic Theory,S.2009,False,,Springer,Not available,Auctions with a buy price,151a3944425d8cb9017e86c5a7d3f9c9,http://dx.doi.org/10.1007/s00199-006-0182-7 4017,eBay and Yahoo allow sellers to list their auctions with a buy price at which a bidder may purchase the item immediately. On eBay the buy-now option disappears once a bid is placed while on Yahoo the buy-now option remains in effect throughout the auction. We show that when bidders are risk averse both types of auctions raise seller revenue for a wide range of buy prices. The Yahoo format raises more revenue than the eBay format when bidders have either CARA or DARA. Bidders with DARA prefer the eBay auction while bidders with CARA are indifferent between the two.,john wooders,Not available,2009.0,10.1007/s00199-006-0182-7,Economic Theory,S.2009,False,,Springer,Not available,Auctions with a buy price,151a3944425d8cb9017e86c5a7d3f9c9,http://dx.doi.org/10.1007/s00199-006-0182-7 4018,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,congjun rao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 4019,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,mark walker,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 4020,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,yong zhao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 4021,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,huiling bao,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 4022,In this paper an optimal auction model that maximizes the seller’s expected utility is proposed for a kind of indivisible goods. Firstly the correlation of bidders’ valuations and the asymmetry of the private information are analyzed. Then the properties of the optimal auction are given. Thirdly the feasibility of optimal auction is discussed. Finally an example of the optimal auction is given to show how to apply the discriminatory auction to realize the optimal auction mechanism. Therefore this paper effectively generalizes the auction models with single-unit.,qing wang,Not available,2009.0,10.1007/978-3-642-01507-6_131,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Optimal Auction Model Analysis and Mechanism Design of Indivisible Goods,1e09c9669c36df2ef4238040c4b4d0c0,http://dx.doi.org/10.1007/978-3-642-01507-6_131 4023,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,congjun rao,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 4024,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,zhongcheng zhang,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 4025,To study the allocating problem of total permitted pollution discharge capacity(TPPDC) an allocation method with variable supply based on the uniform price auction of divisible goods is proposed in this paper firstly. Then a linear equilibrium bidding strategy of this new method is given. Lastly the incentive compatibility and validity of this method are proved. Therefore this method will provide valuable theoretical basis and guidance for building the pollution emission permits trade system.,june liu,Not available,2009.0,10.1007/978-3-642-01507-6_121,Advances in Neural Networks – ISNN 2009,Congjun2009,False,,Springer,Not available,Allocation Method of Total Permitted Pollution Discharge Capacity Based on Uniform Price Auction,1bc16c9724f7657156e08965e048185c,http://dx.doi.org/10.1007/978-3-642-01507-6_121 4026,This paper uses a two-person linear voluntary contribution mechanism with stochastic marginal benefits from a public good to examine the effect of imperfect information on contributions. Estimates of individual risk preferences are obtained using data from second-price auctions over lotteries. The results show that limited information about the value of the public good significantly lowers average contributions in all periods but the last. Moreover the results support the interpretation that subjects bid “as if” they were risk averse and suggest that “as if” risk-averse behavior is negatively correlated with willingness to contribute.,m. levati,Not available,2009.0,10.1007/s11127-008-9346-2,Public Choice,Vittoria2009,True,,Springer,Not available,Voluntary contributions with imperfect information: An experimental study,45295fb49aa8dcb76e871bc5ad7d6053,http://dx.doi.org/10.1007/s11127-008-9346-2 4027,This paper uses a two-person linear voluntary contribution mechanism with stochastic marginal benefits from a public good to examine the effect of imperfect information on contributions. Estimates of individual risk preferences are obtained using data from second-price auctions over lotteries. The results show that limited information about the value of the public good significantly lowers average contributions in all periods but the last. Moreover the results support the interpretation that subjects bid “as if” they were risk averse and suggest that “as if” risk-averse behavior is negatively correlated with willingness to contribute.,andrea morone,Not available,2009.0,10.1007/s11127-008-9346-2,Public Choice,Vittoria2009,True,,Springer,Not available,Voluntary contributions with imperfect information: An experimental study,45295fb49aa8dcb76e871bc5ad7d6053,http://dx.doi.org/10.1007/s11127-008-9346-2 4028,This paper uses a two-person linear voluntary contribution mechanism with stochastic marginal benefits from a public good to examine the effect of imperfect information on contributions. Estimates of individual risk preferences are obtained using data from second-price auctions over lotteries. The results show that limited information about the value of the public good significantly lowers average contributions in all periods but the last. Moreover the results support the interpretation that subjects bid “as if” they were risk averse and suggest that “as if” risk-averse behavior is negatively correlated with willingness to contribute.,annamaria fiore,Not available,2009.0,10.1007/s11127-008-9346-2,Public Choice,Vittoria2009,True,,Springer,Not available,Voluntary contributions with imperfect information: An experimental study,45295fb49aa8dcb76e871bc5ad7d6053,http://dx.doi.org/10.1007/s11127-008-9346-2 4029,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,diego aycinena,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 4030,We report on sealed-bid second-price auctions that we conducted on the Internet using subjects with substantial prior experience: they were highly experienced participants in eBay auctions. Unlike the novice bidders in previous (laboratory) experiments the experienced bidders exhibited no greater tendency to overbid than to underbid. However even subjects with substantial prior experience tended not to bid their values suggesting that the non-optimal bidding of novice subjects is robust to substantial experience in non-experimental auctions. We found that auction revenue was not significantly different from the expected revenue the auction would generate if bidders bid their values. Auction efficiency as measured by the percentage of surplus captured was substantially lower in our SPAs than in previous laboratory experiments.,john wooders,Not available,2012.0,10.1007/s10683-011-9287-3,Experimental Economics,J.2012,False,,Springer,Not available,Behavior in second-price auctions by highly experienced eBay buyers and sellers,bd963cb9e9673e96449af051da8082b7,http://dx.doi.org/10.1007/s10683-011-9287-3 4031,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,hernan bejarano,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 4032,We examine entry decisions in first-price and English clock auctions with participation costs. Potential bidders observe their value and report maximum willingness to pay (WTP) to participate. Entry occurs if revealed WTP (weakly) exceeds the randomly drawn participation cost. We find no difference in WTP between auction formats although males have a higher WTP for first-price auctions. WTP is decreasing in the number of potential bidders but this reduction is less than predicted and small in magnitude.,lucas rentschler,Not available,2018.0,10.1007/s00182-017-0583-9,International Journal of Game Theory,Diego2018,False,,Springer,Not available,Informed entry in auctions,e951e4f8ece43682566bea7e50147e72,http://dx.doi.org/10.1007/s00182-017-0583-9 4033,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,martin spann,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4034,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,robert zeithammer,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4035,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,marco bertini,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4036,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,ernan haruvy,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4037,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,sandy jap,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4038,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,oded koenigsberg,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4039,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,vincent mak,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4040,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,leszczyc popkowski,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4041,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,kenneth hendricks,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 4042,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,bernd skiera,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4043,Driven by the low transaction costs and interactive nature of the internet customer participation in the price-setting process has increased. Today platforms such as eBay have popularized online auctions on a global scale Priceline has made headlines with its name-your-own-price (NYOP) business model and Humble Bundle has enabled independent musicians and game developers to market their works through pay-what-you-want (PWYW) pricing. Advertising exchanges conduct several hundred million individual auctions per day to sell online advertising slots. The present paper contributes to the literature on participative pricing in three ways. First we propose a definition of participative pricing mechanisms as well as a useful taxonomy. Second we discuss the current understanding by synthesizing conceptual and empirical academic literature. Third we outline promising research questions with a key focus on the related behavioral aspects of buyers and sellers.,manoj thomas,Not available,2018.0,10.1007/s40547-017-0082-y,Customer Needs and Solutions,Martin2018,False,,Springer,Not available,Beyond Posted Prices: the Past Present and Future of Participative Pricing Mechanisms,ea308633b625fdf3ce271e22d8479663,http://dx.doi.org/10.1007/s40547-017-0082-y 4044,This paper analyzes mechanisms for selling advertising opportunities for several different positions on a page that would enable some advertisers to bid using Vickrey–Clarke–Groves (VCG) pricing while other advertisers bid using generalized second-price (GSP) pricing. I focus on a setting in which the number of ads displayed may vary with the advertisers’ bids and showing fewer ads enables the remaining ads to obtain more clicks. I illustrate the types of mechanisms one can construct that would ensure that VCG bidders have an incentive to bid truthfully GSP bidders cannot obtain the same number of clicks at a lower price by varying their bid and if all bidders bid using VCG (GSP) pricing then the outcome is the same as it would be under the VCG (GSP) mechanism.,patrick hummel,Not available,2018.0,10.1007/s00182-017-0591-9,International Journal of Game Theory,Patrick2018,False,,Springer,Not available,Hybrid mechanisms for Vickrey–Clarke–Groves and generalized second-price bids,a945982c682f580ad78eb2fbdcc0c952,http://dx.doi.org/10.1007/s00182-017-0591-9 4045,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,xiaoyong cao,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 4046,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,guofu tan,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 4047,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,guoqiang tian,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 4048,We study equilibria in second-price auctions where bidders are independently and privately informed about both their values and participation costs and where the joint distributions of these values and costs across bidders are not necessarily identical. We show that there always exists an equilibrium in this general setting with two-dimensional types of ex ante heterogeneous bidders. When bidders are ex ante homogeneous there is a unique symmetric equilibrium but asymmetric equilibria may also exist. We provide conditions under which the equilibrium is unique (not only among symmetric ones). We find that the marginal density of participation costs and the concentration of values matter for the uniqueness. The presence of private information on participation costs tends to reduce multiplicity of participation equilibria although multiplicity still persists.,okan yilankaya,Not available,2018.0,10.1007/s00199-016-1028-6,Economic Theory,Xiaoyong2018,False,,Springer,Not available,Equilibria in second-price auctions with private participation costs,684ec515a3340a36a90c31794717b402,http://dx.doi.org/10.1007/s00199-016-1028-6 4049,This study assesses the rapidly growing literature on scoring rule auctions (SRA) in which all participants submit a multidimensional bid comprising prices and levels of one or more qualities. These elements are weighted using a linear combination that is the scoring function. The result of this function is a score and the bid that obtains the highest score is awarded the contract. We provide a comprehensive overview of key theoretical and empirical results. In addition we discuss structural estimation techniques applied to SRA and we conclude with three main limitations of this awarding mechanism.,marchi camboni,Not available,2018.0,10.1007/s40812-017-0088-3,Economia e Politica Industriale,Riccardo2018,False,,Springer,Not available,Procuring price and quality using scoring auctions: where do we stand?,db891ea282deb7e1c90c5f412450eb44,http://dx.doi.org/10.1007/s40812-017-0088-3 4050,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,ge liu,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 4051,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,jian-zhong zhang,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 4052,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,ilke onur,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 4053,In this paper a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security fairness undeniability and so on we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction meanwhile it can resist malicious attacks.,shu-cui xie,Not available,2018.0,10.1007/s10773-017-3609-y,International Journal of Theoretical Physics,Ge2018,False,,Springer,Not available,Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier,803d33068b14565b222cf94efd30c345,http://dx.doi.org/10.1007/s10773-017-3609-y 4054,We experimentally analyze the role of speculators who have no use value for the objects on sale in auctions. The environment is a uniform-price sealed-bid auction for 2 identical objects followed by a free-form bargaining resale market with one positive-value bidder and either one or two speculators who may choose simultaneously whether to enter the auction. We show that the bidder accommodates speculators by reducing demand in the auction and subsequently purchasing in the resale market which encourages entry by speculators. The presence of multiple speculators induces each speculator to enter less often but increases competition in the auction and the auction price. Speculators earn positive profits on average except when multiple speculators enter the auction.,marco pagnozzi,Not available,2018.0,10.1007/s10683-018-9564-5,Experimental Economics,Marco2018,False,,Springer,Not available,Entry by successful speculators in auctions with resale,507ccafc3699c30666ec328bdf10f206,http://dx.doi.org/10.1007/s10683-018-9564-5 4055,We experimentally analyze the role of speculators who have no use value for the objects on sale in auctions. The environment is a uniform-price sealed-bid auction for 2 identical objects followed by a free-form bargaining resale market with one positive-value bidder and either one or two speculators who may choose simultaneously whether to enter the auction. We show that the bidder accommodates speculators by reducing demand in the auction and subsequently purchasing in the resale market which encourages entry by speculators. The presence of multiple speculators induces each speculator to enter less often but increases competition in the auction and the auction price. Speculators earn positive profits on average except when multiple speculators enter the auction.,krista saral,Not available,2018.0,10.1007/s10683-018-9564-5,Experimental Economics,Marco2018,False,,Springer,Not available,Entry by successful speculators in auctions with resale,507ccafc3699c30666ec328bdf10f206,http://dx.doi.org/10.1007/s10683-018-9564-5 4056,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,lu liu,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 4057,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,chun wang,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 4058,This paper addresses surgical scheduling problem in a decentralized environment where the availability of surgeons is considered as their private information. In addition to combinatorial complexities inherited from centralized surgical scheduling models strategic behaviors of surgeons derived from decentralized game theoretic environments have to be addressed. We propose an iterative auction mechanism a form of decentralized combinatorial optimization for solving the surgical scheduling problem. The eligibility restriction of operation rooms is also considered. The objective is to maximize the overall social welfare of patients which is represented by the overall weights of surgeries scheduled. Under the proposed mechanism we prescribe strategies for surgeons on submitting their availability information to maximize their preference values and at the same time minimize the revelation of their private information. We prove that myopic bidding strategy is a weakly dominant strategy for surgeons under the proposed scheduling mechanism and the solution quality is an non-decreasing function of the number of bidding rounds along the bidding process. We also present a nontrivial worked example to illustrate the application of the proposed approach in surgical scheduling setting.,jianjun wang,Not available,2018.0,10.1007/s10878-017-0247-5,Journal of Combinatorial Optimization,Lu2018,False,,Springer,Not available,A combinatorial auction mechanism for surgical scheduling considering surgeon’s private availability information,f1103b868d3767f79688b6d3414d65a6,http://dx.doi.org/10.1007/s10878-017-0247-5 4059,Auction theory has undergone two waves of innovation. The first which originated with Vickrey (,lawrence ausubel,Not available,2018.0,10.1057/978-1-349-95189-5_2746,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Auctions (Theory),9dd1f22da0823dc35d380d81bd58b1fc,http://dx.doi.org/10.1057/978-1-349-95189-5_2746 4060,How should a coalition of cooperating players allocate payoffs to its members? This question arises in a broad range of situations and evokes an equally broad range of issues. For example it raises technical issues in accounting if the players are divisions of a corporation but involves issues of social justice when the context is how people behave in society.Despite the breadth of possible applications coalitional game theory offers a unified framework and solutions for addressing such qsts. This article presents some of its major models and proposed solutions.,ehud kalai,Not available,2018.0,10.1057/978-1-349-95189-5_2615,The New Palgrave Dictionary of Economics,Ehud2018,False,,Springer,Not available,Games in Coalitional Form,18e6bcaa2c36f24fbf7717d9fe581936,http://dx.doi.org/10.1057/978-1-349-95189-5_2615 4061,Field experiments have grown significantly in prominence since the 1990s. In this article we provide a summary of the major types of field experiments explore their uses and describe a few examples. We show how field experiments can be used for both positive and normative purposes within economics. We also discuss more generally why data collection is useful in science and more narrowly discuss the question of generalizability. In this regard we envision field experiments playing a classic role in helping investigators learn about the behavioural principles that are shared across different domains.,john list,Not available,2018.0,10.1057/978-1-349-95189-5_2000,The New Palgrave Dictionary of Economics,A.2018,False,,Springer,Not available,Field Experiments,947a25a13cc531a2b9286c9eded5f19c,http://dx.doi.org/10.1057/978-1-349-95189-5_2000 4062,Field experiments have grown significantly in prominence since the 1990s. In this article we provide a summary of the major types of field experiments explore their uses and describe a few examples. We show how field experiments can be used for both positive and normative purposes within economics. We also discuss more generally why data collection is useful in science and more narrowly discuss the question of generalizability. In this regard we envision field experiments playing a classic role in helping investigators learn about the behavioural principles that are shared across different domains.,david reiley,Not available,2018.0,10.1057/978-1-349-95189-5_2000,The New Palgrave Dictionary of Economics,A.2018,False,,Springer,Not available,Field Experiments,947a25a13cc531a2b9286c9eded5f19c,http://dx.doi.org/10.1057/978-1-349-95189-5_2000 4063,Using a dataset of calculator auctions on eBay we first show that last-minute bidding is not merely the result of bidders’ going to the next-to-close auction. Instead bidding is concentrated at the end of the period in which the auction is the next to close suggesting the existence of strategic last-minute bidding. Then we model repeated ascending price auctions for homogeneous goods with unobserved stochastic entry. We show that the dynamic game has a pure-strategy symmetric equilibrium in which entrants always reveal themselves by bidding in the auction in which they arrive and bidding occurs at the last minute.,thomas wiseman,Not available,2012.0,10.1007/s11151-011-9328-2,Review of Industrial Organization,Kenneth2012,False,,Springer,Not available,Last-Minute Bidding in Sequential Auctions with Unobserved Stochastic Entry,d3fb03b49c1b9a9a2abf06bc18aff3ae,http://dx.doi.org/10.1007/s11151-011-9328-2 4064,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,john geweke,Not available,2018.0,10.1057/978-1-349-95189-5_188,The New Palgrave Dictionary of Economics,John2018,False,,Springer,Not available,Econometrics,7345aa8d7810db8076de2bc6bc3caec9,http://dx.doi.org/10.1057/978-1-349-95189-5_188 4065,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,joel horowitz,Not available,2018.0,10.1057/978-1-349-95189-5_188,The New Palgrave Dictionary of Economics,John2018,False,,Springer,Not available,Econometrics,7345aa8d7810db8076de2bc6bc3caec9,http://dx.doi.org/10.1057/978-1-349-95189-5_188 4066,As a unified discipline econometrics is still relatively young and has been transforming and expanding very rapidly. Major advances have taken place in the analysis of cross-sectional data by means of semiparametric and nonparametric techniques. Heterogeneity of economic relations across individuals firms and industries is increasingly acknowledged and attempts have been made to take it into account either by integrating out its effects or by modelling the sources of heterogeneity when suitable panel data exist. The counterfactual considerations that underlie policy analysis and treatment valuation have been given a more satisfactory foundation. New time-series econometric techniques have been developed and employed extensively in the areas of macroeconometrics and finance. Nonlinear econometric techniques are used increasingly in the analysis of cross-section and time-series observations. Applications of Bayesian techniques to econometric problems have been promoted largely by advances in computer power and computational techniques. The use of Bayesian techniques has in turn provided the investigators with a unifying framework where the tasks of forecasting decision making model evaluation and learning can be considered as parts of the same interactive and iterative process thus providing a basis for ‘real time econometrics’.,hashem pesaran,Not available,2018.0,10.1057/978-1-349-95189-5_188,The New Palgrave Dictionary of Economics,John2018,False,,Springer,Not available,Econometrics,7345aa8d7810db8076de2bc6bc3caec9,http://dx.doi.org/10.1057/978-1-349-95189-5_188 4067,George Stigler combined technical competence erudition and wit. Stigler asked Frank Knight’s question of how we know the goals of those we study. Early on he offered a Knightian challenge to welfare economics defending classical economic policy against the new orthodoxy. Later he became an exponent of the orthodoxy. If goals are fixed information is useful as a means to achieving them. Characterizing information as a commodity Stigler described competitive equilibrium as a distribution of prices in a market. Policy advice is endogenous and we return to Adam Smith’s analysis in which the philosopher is no better than those he studies.,david levy,Not available,2018.0,10.1057/978-1-349-95189-5_1717,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Stigler George Joseph (1911–1991),c8bade17b99bc4d77659cc58398910a3,http://dx.doi.org/10.1057/978-1-349-95189-5_1717 4068,George Stigler combined technical competence erudition and wit. Stigler asked Frank Knight’s question of how we know the goals of those we study. Early on he offered a Knightian challenge to welfare economics defending classical economic policy against the new orthodoxy. Later he became an exponent of the orthodoxy. If goals are fixed information is useful as a means to achieving them. Characterizing information as a commodity Stigler described competitive equilibrium as a distribution of prices in a market. Policy advice is endogenous and we return to Adam Smith’s analysis in which the philosopher is no better than those he studies.,sandra peart,Not available,2018.0,10.1057/978-1-349-95189-5_1717,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Stigler George Joseph (1911–1991),c8bade17b99bc4d77659cc58398910a3,http://dx.doi.org/10.1057/978-1-349-95189-5_1717 4069,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,xinfeng zhu,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 4070,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,zhihao zhang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 4071,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,yanling wang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 4072,With the exploding growth in the number of devices and data traffic cloud networks face challenges such as high speeds and low latency. The traditional edge calculation is to send data that can’t be processed by the local edge server to the remote cloud for processing. This will put great pressure on the remote cloud server and the data will have relatively large transmission delay through the intermediate device. For this problem this paper proposes an edge calculation method based on reverse auction algorithm to process the data nearby and adopts the idea of reverse auction to distribute the overloaded data to the edge server with less load reduce the transmission delay improve the user experience and balance the server load. The final simulation results show that allocating overloaded data to adjacent edge server for processing can make server load balance and significantly reduce transmission delay compared to sending to remote cloud.,guohai wang,Not available,2018.0,10.1007/978-3-030-00012-7_23,Cloud Computing and Security,Xinfeng2018,False,,Springer,Not available,Resource Allocation Based on Reverse Auction Algorithm in Edge Computing Environment,45f61bb6d7510b13c6d550508c5c7947,http://dx.doi.org/10.1007/978-3-030-00012-7_23 4073," Composite service selection refers to the process of selecting an optimal set of web services out of a pool of available candidates based on their quality of service and price. The goal is to logically compose these atomic web services and create value-added composite services which in turn can be used to develop service-based systems. Existing approaches to composite service selection are mostly based on optimization and negotiation techniques. In this paper we study an emerging trend of composite service selection approaches based on auction models. These techniques benefit from the dynamic pricing of auction models compared to a fixed pricing approach and have the potential to incorporate the dependencies that exist between services constituting a composition. We propose a design framework that introduces two components which need to be addressed when developing an auction-based model for composite service selection: the elements in an auction-based model and a set of design decisions associated with those elements.",mahboobeh moghaddam,Not available,2018.0,10.1007/978-3-319-76587-7_7,Service Research and Innovation,Mahboobeh2018,False,,Springer,Not available,Auction-Based Models for Composite Service Selection: A Design Framework,d3815dc9449361c79455c9ec148c075d,http://dx.doi.org/10.1007/978-3-319-76587-7_7 4074,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,miao pan,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 4075," Composite service selection refers to the process of selecting an optimal set of web services out of a pool of available candidates based on their quality of service and price. The goal is to logically compose these atomic web services and create value-added composite services which in turn can be used to develop service-based systems. Existing approaches to composite service selection are mostly based on optimization and negotiation techniques. In this paper we study an emerging trend of composite service selection approaches based on auction models. These techniques benefit from the dynamic pricing of auction models compared to a fixed pricing approach and have the potential to incorporate the dependencies that exist between services constituting a composition. We propose a design framework that introduces two components which need to be addressed when developing an auction-based model for composite service selection: the elements in an auction-based model and a set of design decisions associated with those elements.",joseph davis,Not available,2018.0,10.1007/978-3-319-76587-7_7,Service Research and Innovation,Mahboobeh2018,False,,Springer,Not available,Auction-Based Models for Composite Service Selection: A Design Framework,d3815dc9449361c79455c9ec148c075d,http://dx.doi.org/10.1007/978-3-319-76587-7_7 4076,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,thant oo,Not available,2018.0,10.1007/978-3-319-66062-2_8,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,System Model,4e431db382024baf9d74c492236e7fe2,http://dx.doi.org/10.1007/978-3-319-66062-2_8 4077,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,nguyen tran,Not available,2018.0,10.1007/978-3-319-66062-2_8,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,System Model,4e431db382024baf9d74c492236e7fe2,http://dx.doi.org/10.1007/978-3-319-66062-2_8 4078,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,shaolei ren,Not available,2018.0,10.1007/978-3-319-66062-2_8,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,System Model,4e431db382024baf9d74c492236e7fe2,http://dx.doi.org/10.1007/978-3-319-66062-2_8 4079,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,choong hong,Not available,2018.0,10.1007/978-3-319-66062-2_8,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,System Model,4e431db382024baf9d74c492236e7fe2,http://dx.doi.org/10.1007/978-3-319-66062-2_8 4080,Jean-Jacques Laffont was one of the great economists of the last quarter of the 20th century with an encyclopedic mind in a time of intense specialization. He won widespread respect and recognition for his breakthroughs in both theory (including public goods contract theory and the regulation of natural monopoly) and econometrics. In addition he was energetically engaged in institution-building not only in Europe but also in Africa Asia and Latin America.,jean tirole,Not available,2018.0,10.1057/978-1-349-95189-5_1981,The New Palgrave Dictionary of Economics,Jean2018,False,,Springer,Not available,Laffont Jean-Jacques (1947–2004),2a6aabd2af247265662b7c0bfd05e1b4,http://dx.doi.org/10.1057/978-1-349-95189-5_1981 4081,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,junhuan zhang,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 4082,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,peter mcburney,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 4083,This paper considers the convergence of trading strategies among artificial traders connected to one another in a social network and trading in a continuous double auction financial marketplace. Convergence is studied by means of an agent-based simulation model called the Social Network Artificial stoCk marKet model. Six different canonical network topologies (including no-network) are used to represent the possible connections between artificial traders. Traders learn from the trading experiences of their connected neighbours by means of reinforcement learning. The results show that the proportions of traders using particular trading strategies are eventually stable. Which strategies dominate in these stable states depends to some extent on the particular network topology of trader connections and the types of traders.,katarzyna musial,Not available,2018.0,10.1007/s11156-017-0631-3,Review of Quantitative Finance and Accounting,Junhuan2018,False,,Springer,Not available,Convergence of trading strategies in continuous double auction markets with boundedly-rational networked traders,2acf26032ef48e7d267278b275d253f9,http://dx.doi.org/10.1007/s11156-017-0631-3 4084,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,thant oo,Not available,2018.0,10.1007/978-3-319-66062-2_7,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Background,3ef42f09ad1dcf70099b247f2c66acc4,http://dx.doi.org/10.1007/978-3-319-66062-2_7 4085,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,xiaoyan zhu,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 4086,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,nguyen tran,Not available,2018.0,10.1007/978-3-319-66062-2_7,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Background,3ef42f09ad1dcf70099b247f2c66acc4,http://dx.doi.org/10.1007/978-3-319-66062-2_7 4087,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,shaolei ren,Not available,2018.0,10.1007/978-3-319-66062-2_7,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Background,3ef42f09ad1dcf70099b247f2c66acc4,http://dx.doi.org/10.1007/978-3-319-66062-2_7 4088,For smart grid multi-tenant data centers play a major part in the demand response program due to their large energy demand. Emergency demand response is critical in preserving the electrical infrastructure (i.e. the grid) in emergency situations such as extreme weather events. Further economic demand response programs can stabilize the energy market by shifting the electricity demand to off-peak durations. This part of the book examines the motivations issues and challenges involved in multi-tenant data center demand response. Further it summarizes the formulated problems and the possible solutions.,choong hong,Not available,2018.0,10.1007/978-3-319-66062-2_7,A Survey on Coordinated Power Management in Multi-Tenant Data Centers,Zin2018,False,,Springer,Not available,Background,3ef42f09ad1dcf70099b247f2c66acc4,http://dx.doi.org/10.1007/978-3-319-66062-2_7 4089,Do hard budget constraints work in favour or against truth telling in double auctions? McAfee (,nejat anbarci,Not available,2018.0,10.1007/s11238-017-9627-7,Theory and Decision,Nejat2018,False,,Springer,Not available,Double auctions with no-loss constrained traders,1deb9de511c38f3ba71257c140a40f07,http://dx.doi.org/10.1007/s11238-017-9627-7 4090,Do hard budget constraints work in favour or against truth telling in double auctions? McAfee (,jaideep roy,Not available,2018.0,10.1007/s11238-017-9627-7,Theory and Decision,Nejat2018,False,,Springer,Not available,Double auctions with no-loss constrained traders,1deb9de511c38f3ba71257c140a40f07,http://dx.doi.org/10.1007/s11238-017-9627-7 4091,We consider bidders who are simultaneously participating in private value second-price sealed bid auctions in multiple markets. While active in each market each bidder is associated with a unique home market in which it can potentially serve as a ring center. Pairs of bidders can establish bilateral agreements to be members of bidding rings in each others’ home markets. Rings can be weak or strong depending respectively on whether side payments are permitted or not. Weak multimarket rings have been shown to take the form of exclusive groups of completely connected bidders. We consider strong multimarket bidding rings and show that they assume a radically different architecture of dominant groups stars and interlinked stars. Since bidding rings are tacit and therefore unobservable we develop observable implications of multimarket rings that can detect the existence of collusion as well as its form (i.e. weak or strong).,sumit joshi,Not available,2013.0,10.1007/s00199-012-0709-z,Economic Theory,Sumit2013,False,,Springer,Not available,Weak and strong multimarket bidding rings,21acb824e22647930bc010f9532cbf47,http://dx.doi.org/10.1007/s00199-012-0709-z 4092,We consider bidders who are simultaneously participating in private value second-price sealed bid auctions in multiple markets. While active in each market each bidder is associated with a unique home market in which it can potentially serve as a ring center. Pairs of bidders can establish bilateral agreements to be members of bidding rings in each others’ home markets. Rings can be weak or strong depending respectively on whether side payments are permitted or not. Weak multimarket rings have been shown to take the form of exclusive groups of completely connected bidders. We consider strong multimarket bidding rings and show that they assume a radically different architecture of dominant groups stars and interlinked stars. Since bidding rings are tacit and therefore unobservable we develop observable implications of multimarket rings that can detect the existence of collusion as well as its form (i.e. weak or strong).,poorvi vora,Not available,2013.0,10.1007/s00199-012-0709-z,Economic Theory,Sumit2013,False,,Springer,Not available,Weak and strong multimarket bidding rings,21acb824e22647930bc010f9532cbf47,http://dx.doi.org/10.1007/s00199-012-0709-z 4093,In models of first-price auctions when bidders are ,timothy hubbard,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 4094,In models of first-price auctions when bidders are ,rene kirkegaard,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 4095,In models of first-price auctions when bidders are ,harry paarsch,Not available,2013.0,10.1007/s10614-012-9333-z,Computational Economics,P.2013,False,,Springer,Not available,Using Economic Theory to Guide Numerical Analysis: Solving for Equilibria in Models of Asymmetric First-Price Auctions,b5ed1f0f29cb82caa9f82f0688ce723f,http://dx.doi.org/10.1007/s10614-012-9333-z 4096,Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However the back-room dealing (i.e. the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper we propose a secure combinatorial spectrum auction (,yuguang fang,Not available,2012.0,10.1007/s11276-011-0390-3,Wireless Networks,Miao2012,False,,Springer,Not available,Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer,a15c4ac3d5b7fbda8bbffe8d6ffdaf17,http://dx.doi.org/10.1007/s11276-011-0390-3 4097,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,ahmad quttoum,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 4098,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,abdallah jarray,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 4099,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,hadi otrok,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 4100,In this paper we consider the problem of optimizing the Internet Service Provider (ISP) profit by providing a periodic Dynamic Partitioning (DP) model for utilizing network resources in the context of Virtual Private Networks (VPN). In literature Complete Sharing (CS) Complete Partitioning (CP) and Bandwidth Borrowing (BR) techniques have been proposed for resource allocation where the following limitations can be noticed: VPN operators can exaggerate about their required resources resources might be underutilized and optimal bandwidth utilization is not guaranteed. To overcome the above limitations we propose to dynamically partition the resources over different QoS classes through periodic auctions that can reduce the reasoning of exaggeration and maximize the ISP profit. Thus we formulate our problem based on the Integer Linear Programming (ILP) that allows us to maximize the ISP profit and provides the optimal: (1) set of profitable VPN connections (2) bandwidth division of each network link among QoS classes and (3) routing scheme for the accepted demand. Furthermore the proposed ILP model allows us to study the sensitivity of the ISP profit to a targeted revenue objective.,zbigniew dziong,Not available,2013.0,10.1007/s11235-013-9710-5,Telecommunication Systems,Nahar2013,False,,Springer,Not available,An optimal dynamic resources partitioning auction model for virtual private networks,d01e7e5f563d03adbeb2f6700ee4b628,http://dx.doi.org/10.1007/s11235-013-9710-5 4101,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,an wang,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4102,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,jin chen,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4103,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,yueming cai,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4104,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,chunxiao cai,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4105,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,wendong yang,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4106,In this paper a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity we divide the optimization problem into two simpler subproblems. Firstly the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and thus can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate and the convergence performance is also desirable.,yunpeng cheng,Not available,2013.0,10.1186/1687-1499-2013-193,EURASIP Journal on Wireless Communications and Networking,An2013,True,,Springer,Not available,Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks,5ad848bcfa95ed95822ca3d405d63640,http://dx.doi.org/10.1186/1687-1499-2013-193 4107,Bidding the same price in descending bid auctions and in first price sealed bid auctions is equivalent to expected utility maximizing behavior and this is equivalent to dynamically consistent bidding. The claim that in strategic form descending bid and first price sealed bid auctions are the same game is thus shown to be false since the mapping from strategies to payoffs is not the same for the two auction forms.,edi karni,Not available,1988.0,10.1007/BF00133162,Theory and Decision,Edi1988,False,,Springer,Not available,On the equivalence between descending bid auctions and first price sealed bid auctions,82bcd58e880d706767d9f829a2aa4425,http://dx.doi.org/10.1007/BF00133162 4108,We study a first-price auction preceded by a negotiation stage with complete information during which bidders may form a bidding ring. We prove that in the absence of externalities the grand cartel forms in equilibrium allowing ring members to gain the auctioned object for a minimal price. However identity-dependent externalities may lead to the formation of small rings as often observed in practice. Potential ring members may condition their participation on high transfer payments as a compensation for their expected (negative) externalities if the ring forms. The cartel may therefore profitably exclude these bidders although risking tougher competition in the auction. We also analyze ring (in)efficiency in the presence of externalities showing that a ring may prefer sending an inefficient member to the auction if the efficient member exerts threatening externalities on bidders outside the ring which in turn leads to a higher winning price.,omer biran,Not available,2013.0,10.1007/s11238-012-9330-7,Theory and Decision,Omer2013,False,,Springer,Not available,Strategic collusion in auctions with externalities,e17c32032b658ebcef1555b6c1526d49,http://dx.doi.org/10.1007/s11238-012-9330-7 4109,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,bo-ruei kao,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 4110,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,nguyen tu,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 4111,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,i.-shyan hwang,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 4112,In this paper we propose a multi-hop auction-based bandwidth allocation mechanism to address the flow contention problem in wireless ad hoc networks. By modeling the problem as an iterative auction-based structure it enables us to derive fair and efficient bandwidth allocation to each node on the basis of only local information. Further a multi-hop flow coordination mechanism is then developed to optimize the network performance. Simulation results suggest that the proposed mechanism outperforms other approaches in terms of network throughput bandwidth utilization fairness end-to-end delay packet loss rate and robustness.,k. lai,Not available,2013.0,10.1007/s11277-012-0852-7,Wireless Personal Communications,Bo-Ruei2013,False,,Springer,Not available,Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks,f639abc426d8c3ff4318a6237371ff9c,http://dx.doi.org/10.1007/s11277-012-0852-7 4113,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,mikhail anufriev,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 4114,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,jasmina arifovic,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 4115,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,john ledyard,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 4116,In this paper we explore how specific aspects of market transparency and agents’ behavior affect the efficiency of the market outcome. In particular we are interested whether learning behavior with and without information about actions of other participants improves market efficiency. We consider a simple market for a homogeneous good populated by buyers and sellers. The valuations of the buyers and the costs of the sellers are given exogenously. Agents are involved in consecutive trading sessions which are organized as a continuous double auction with order book. Using Individual Evolutionary Learning agents submit price bids and offers trying to learn the most profitable strategy by looking at their realized and counterfactual or “foregone” payoffs. We find that learning outcomes heavily depend on information treatments. Under full information about actions of others agents’ orders tend to be similar while under limited information agents tend to submit their valuations/costs. This behavioral outcome results in higher price volatility for the latter treatment. We also find that learning improves allocative efficiency when compared to outcomes with Zero-Intelligent traders.,valentyn panchenko,Not available,2013.0,10.1007/s00191-011-0230-8,Journal of Evolutionary Economics,Mikhail2013,True,,Springer,Not available,Efficiency of continuous double auctions under individual evolutionary learning with full or limited information,c5d4ae1665955a55aad3b04fd822ceea,http://dx.doi.org/10.1007/s00191-011-0230-8 4117,In this paper we investigate the role that the competition among knowledge sources plays in the problem solving behavior of a population as the complexity of the optimization problem solving landscapes increases. We employ a type of game theoretic mechanism auctions in our study. Our main goal is to determine whether it matters if knowledge sources competed for individuals using auction mechanisms or weighted majority win mechanisms as the landscape complexity increased. The weighted majority win situation allows the Knowledge Sources to make predictions about future success whereas the Auction mechanism allows them to invest in their future by using tokens earned from recent performance. This latter approach allows contextual Knowledge Sources such as Situational Knowledge to play a larger role. Although the results are preliminary it appears that the auction mechanism is more efficient when solving a problem in situations where contextual information is available. In that case it is easier for the knowledge sources to make judicial bids or investments. However once the landscapes become chaotic there is less contextual information available and correspondingly little advantage to the auction mechanism over the weighted majority win situation in terms of the number of generations needed to achieve a solution.,robert reynolds,Not available,2013.0,10.1007/s12293-013-0112-8,Memetic Computing,G.2013,False,,Springer,Not available,Optimization problem solving with auctions in Cultural Algorithms,36ec40f774b9397bdc2ff60f9dbfd49c,http://dx.doi.org/10.1007/s12293-013-0112-8 4118,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,daniel friedman,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 4119,A technique is illustrated for isolation of equilibrium forces reputedly present in individual agents’ economic behavior. An example setting arises in a theory of affiliated auctions (MILGROM/ WEBER 1982) which predicts expected revenue to be increased by seller’s announcement of public information correlated with the item’s unknown common value.Within-subject ceteris paribus comparisons are obtained by a dual market technique. These within-subject comparisons are duplicated across experiments employing alternative institutional forms.Two equilibrium forces a strategic force and an evaluative force are responsible for the predicted revenue increases due to public information. A series of first-price common-value auction experiments incorporates both forces. A series of second-price common-value auction experiments eliminates the strategic force. Finally a series of first-price affiliated-private-value auction experiments eliminate the evaluative force.A tentative conclusion: subjects’ errors in Bayesian assessments before public information is announced create overbids relative to theory overwhelming the evaluative force and reducing strength and reliability of the strategic force. With extensive experience within a particular parameter setting some evaluative force emerges.,ronald harstad,Not available,1988.0,10.1007/978-3-642-48356-1_13,Bounded Rational Behavior in Experimental Games and Markets,M.1988,False,,Springer,Not available,Dual Ceteris Paribus Comparisons: Some Initial Thoughts on Laboratory Isolation of Equilibrium Forces in Auction Markets,9a215f5d34f6352a6c163a55069da301,http://dx.doi.org/10.1007/978-3-642-48356-1_13 4120,In this paper we investigate the role that the competition among knowledge sources plays in the problem solving behavior of a population as the complexity of the optimization problem solving landscapes increases. We employ a type of game theoretic mechanism auctions in our study. Our main goal is to determine whether it matters if knowledge sources competed for individuals using auction mechanisms or weighted majority win mechanisms as the landscape complexity increased. The weighted majority win situation allows the Knowledge Sources to make predictions about future success whereas the Auction mechanism allows them to invest in their future by using tokens earned from recent performance. This latter approach allows contextual Knowledge Sources such as Situational Knowledge to play a larger role. Although the results are preliminary it appears that the auction mechanism is more efficient when solving a problem in situations where contextual information is available. In that case it is easier for the knowledge sources to make judicial bids or investments. However once the landscapes become chaotic there is less contextual information available and correspondingly little advantage to the auction mechanism over the weighted majority win situation in terms of the number of generations needed to achieve a solution.,leonard kinnaird-heether,Not available,2013.0,10.1007/s12293-013-0112-8,Memetic Computing,G.2013,False,,Springer,Not available,Optimization problem solving with auctions in Cultural Algorithms,36ec40f774b9397bdc2ff60f9dbfd49c,http://dx.doi.org/10.1007/s12293-013-0112-8 4121,A durable asset is sold in a sealed-bid first price auction. The seller sets an undisclosed reservation price. The seller has no prior information respecting the private valuations of the bidders. If no bid exceeds the reservation price the asset is sequentially auctioned until it is sold. A rational seller will design an intertemporal series of reservation prices that maximize the discounted value of the transaction price. To accomplish this the seller uses the history of unsuccessful bids to estimate the probability density functions governing the maximum bids at each hypothetical future auction date.,edmund mantell,Not available,2013.0,10.1007/s11293-012-9345-z,Atlantic Economic Journal,H.2013,False,,Springer,Not available,Rational Reserve Pricing in Sequential Auctions,5b570a662507047e057149dc93f15de8,http://dx.doi.org/10.1007/s11293-012-9345-z 4122,We provide the generalization of Ausubel’s 2004 ascending bid auction to public good environments. Like its private good counterpart the public good Ausubel auction encourages truthful revelation of preferences is privacy preserving and yields an equilibrium allocation that is outcome equivalent to the public good Vickrey auction. Other properties are not ideal in a public good setting. We discuss two such issues and propose an alternative dynamic auction which solves these problems.,matt essen,Not available,2013.0,10.1007/s40505-013-0007-3,Economic Theory Bulletin,Van2013,False,,Springer,Not available,Making efficient public good decisions using an augmented Ausubel auction,593ae2f9af528505a73f2891fb5e453f,http://dx.doi.org/10.1007/s40505-013-0007-3 4123,In many fund-raising situations a revenue target is specified. This suggests that the fund-raiser is interested in maximizing the probability to achieve this revenue target rather than in maximizing the expected revenue. We study this topic from the perspective of Bayesian mechanism design in a setting where a seller has a certain good that he can supply at no cost and there are buyers whose joint valuation for the good comes from some given prior distribution. We present an algorithm to find the optimal truthful auction for two buyers with independent valuations via a direct characterization of the optimal auction. In contrast we show the problem is NP-hard when the number of buyers is arbitrary or the distributions are correlated. Both negative results can be modified to show NP-hardness of designing auctions for risk-averse sellers.Our main results address the design of ,paul goldberg,Not available,2015.0,10.1007/978-3-662-48433-3_11,Algorithmic Game Theory,W.2015,False,,Springer,Not available,Auction Design with a Revenue Target,65689ee8db98163fe135883a06fde748,http://dx.doi.org/10.1007/978-3-662-48433-3_11 4124,In many fund-raising situations a revenue target is specified. This suggests that the fund-raiser is interested in maximizing the probability to achieve this revenue target rather than in maximizing the expected revenue. We study this topic from the perspective of Bayesian mechanism design in a setting where a seller has a certain good that he can supply at no cost and there are buyers whose joint valuation for the good comes from some given prior distribution. We present an algorithm to find the optimal truthful auction for two buyers with independent valuations via a direct characterization of the optimal auction. In contrast we show the problem is NP-hard when the number of buyers is arbitrary or the distributions are correlated. Both negative results can be modified to show NP-hardness of designing auctions for risk-averse sellers.Our main results address the design of ,bo tang,Not available,2015.0,10.1007/978-3-662-48433-3_11,Algorithmic Game Theory,W.2015,False,,Springer,Not available,Auction Design with a Revenue Target,65689ee8db98163fe135883a06fde748,http://dx.doi.org/10.1007/978-3-662-48433-3_11 4125,We study a variation of the single-item sealed-bid first-price auction where one bidder (the leader) is given the option to publicly pre-commit to a distribution from which her bid will be drawn.,yunjian xu,Not available,2015.0,10.1007/978-3-662-48433-3_23,Algorithmic Game Theory,Yunjian2015,False,,Springer,Not available,Commitment in First-Price Auctions,4f6dd2704a49652414de8433f3736eee,http://dx.doi.org/10.1007/978-3-662-48433-3_23 4126,We study a variation of the single-item sealed-bid first-price auction where one bidder (the leader) is given the option to publicly pre-commit to a distribution from which her bid will be drawn.,katrina ligett,Not available,2015.0,10.1007/978-3-662-48433-3_23,Algorithmic Game Theory,Yunjian2015,False,,Springer,Not available,Commitment in First-Price Auctions,4f6dd2704a49652414de8433f3736eee,http://dx.doi.org/10.1007/978-3-662-48433-3_23 4127,In many markets products are highly complex with an extremely large set of features. In advertising auctions for example an impression i.e. a viewer on a web page has numerous features describing the viewer’s demographics browsing history temporal aspects etc. In these markets an auctioneer must select a few key features to signal to bidders. These features should be selected such that the bidder with the highest value for the product can construct a bid so as to win the auction. We present an efficient algorithmic solution for this problem in a setting where the product’s features are drawn independently from a known distribution the bidders’ values for a product are additive over their known values for the features of the product and the number of features is exponentially larger than the number of bidders and the number of signals. Our approach involves solving a novel optimization problem regarding the expectation of a sum of independent random vectors that may be of independent interest. We complement our positive result with a hardness result for the problem when features are arbitrarily correlated. This result is based on the conjectured hardness of learning ,shaddin dughmi,Not available,2015.0,10.1007/978-3-662-48433-3_12,Algorithmic Game Theory,Shaddin2015,False,,Springer,Not available,Algorithmic Signaling of Features in Auction Design,07aae1efa64f7f8e0596bba379bf0224,http://dx.doi.org/10.1007/978-3-662-48433-3_12 4128,In many markets products are highly complex with an extremely large set of features. In advertising auctions for example an impression i.e. a viewer on a web page has numerous features describing the viewer’s demographics browsing history temporal aspects etc. In these markets an auctioneer must select a few key features to signal to bidders. These features should be selected such that the bidder with the highest value for the product can construct a bid so as to win the auction. We present an efficient algorithmic solution for this problem in a setting where the product’s features are drawn independently from a known distribution the bidders’ values for a product are additive over their known values for the features of the product and the number of features is exponentially larger than the number of bidders and the number of signals. Our approach involves solving a novel optimization problem regarding the expectation of a sum of independent random vectors that may be of independent interest. We complement our positive result with a hardness result for the problem when features are arbitrarily correlated. This result is based on the conjectured hardness of learning ,nicole immorlica,Not available,2015.0,10.1007/978-3-662-48433-3_12,Algorithmic Game Theory,Shaddin2015,False,,Springer,Not available,Algorithmic Signaling of Features in Auction Design,07aae1efa64f7f8e0596bba379bf0224,http://dx.doi.org/10.1007/978-3-662-48433-3_12 4129,In many markets products are highly complex with an extremely large set of features. In advertising auctions for example an impression i.e. a viewer on a web page has numerous features describing the viewer’s demographics browsing history temporal aspects etc. In these markets an auctioneer must select a few key features to signal to bidders. These features should be selected such that the bidder with the highest value for the product can construct a bid so as to win the auction. We present an efficient algorithmic solution for this problem in a setting where the product’s features are drawn independently from a known distribution the bidders’ values for a product are additive over their known values for the features of the product and the number of features is exponentially larger than the number of bidders and the number of signals. Our approach involves solving a novel optimization problem regarding the expectation of a sum of independent random vectors that may be of independent interest. We complement our positive result with a hardness result for the problem when features are arbitrarily correlated. This result is based on the conjectured hardness of learning ,ryan o'donnell,Not available,2015.0,10.1007/978-3-662-48433-3_12,Algorithmic Game Theory,Shaddin2015,False,,Springer,Not available,Algorithmic Signaling of Features in Auction Design,07aae1efa64f7f8e0596bba379bf0224,http://dx.doi.org/10.1007/978-3-662-48433-3_12 4130,We distinguish between two types of learning processes on the part of decision makers: (1) Those in which competitive selection forces drive from the market all but the efficient profit maximizers and in which agents act as efficient profit maximizers in response to displacements from equilibrium and (2) trial and error learning processes that may result in stable response functions that are not “best replies” and in which agents fail to “understand” the underlying economic process so that changes in economic conditions result in sharp disruptions to the market and the learning process must repeat itself. Data from a series of common value auction market experiments indicates that the second of these two learning processes characterizes behavior in these markets as bidders adjust to the “winner’s curse”.,john kagel,Not available,1988.0,10.1007/978-3-642-48356-1_14,Bounded Rational Behavior in Experimental Games and Markets,H.1988,False,,Springer,Not available,Learning in Common Value Auctions,80dbf0c012a2440234863682b10f53e9,http://dx.doi.org/10.1007/978-3-642-48356-1_14 4131,In many markets products are highly complex with an extremely large set of features. In advertising auctions for example an impression i.e. a viewer on a web page has numerous features describing the viewer’s demographics browsing history temporal aspects etc. In these markets an auctioneer must select a few key features to signal to bidders. These features should be selected such that the bidder with the highest value for the product can construct a bid so as to win the auction. We present an efficient algorithmic solution for this problem in a setting where the product’s features are drawn independently from a known distribution the bidders’ values for a product are additive over their known values for the features of the product and the number of features is exponentially larger than the number of bidders and the number of signals. Our approach involves solving a novel optimization problem regarding the expectation of a sum of independent random vectors that may be of independent interest. We complement our positive result with a hardness result for the problem when features are arbitrarily correlated. This result is based on the conjectured hardness of learning ,li-yang tan,Not available,2015.0,10.1007/978-3-662-48433-3_12,Algorithmic Game Theory,Shaddin2015,False,,Springer,Not available,Algorithmic Signaling of Features in Auction Design,07aae1efa64f7f8e0596bba379bf0224,http://dx.doi.org/10.1007/978-3-662-48433-3_12 4132,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,nicolas bousquet,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 4133,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,yang cai,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 4134,The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Recently it was shown that the CCA provides good welfare guarantees for general classes of valuation functions [,adrian vetta,Not available,2015.0,10.1007/978-3-662-48995-6_16,Web and Internet Economics,Nicolas2015,False,,Springer,Not available,Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction,15b8c39e7a476b4c8ed9e5781db69269,http://dx.doi.org/10.1007/978-3-662-48995-6_16 4135,Revealed preference techniques are used to test whether a data set is compatible with rational behaviour. They are also incorporated as constraints in mechanism design to encourage truthful behaviour in applications such as combinatorial auctions. In the auction setting we present an efficient combinatorial algorithm to find a virtual valuation function with the optimal (additive) rationality guarantee. Moreover we show that there exists such a valuation function that both is individually rational and is minimum (that is it is component-wise dominated by any other individually rational virtual valuation function that approximately fits the data). Similarly given upper bound constraints on the valuation function we show how to fit the maximum virtual valuation function with the optimal additive rationality guarantee. In practice revealed preference bidding constraints are very demanding. We explain how approximate rationality can be used to create relaxed revealed preference constraints in an auction. We then show how combinatorial methods can be used to implement these relaxed constraints. Worst/best-case welfare guarantees that result from the use of such mechanisms can be quantified via the minimum/maximum virtual valuation function.,shant boodaghians,Not available,2015.0,10.1007/978-3-662-48433-3_10,Algorithmic Game Theory,Shant2015,False,,Springer,Not available,The Combinatorial World (of Auctions) According to GARP,89d3c7658c72dc2a55f1914992434ae9,http://dx.doi.org/10.1007/978-3-662-48433-3_10 4136,Revealed preference techniques are used to test whether a data set is compatible with rational behaviour. They are also incorporated as constraints in mechanism design to encourage truthful behaviour in applications such as combinatorial auctions. In the auction setting we present an efficient combinatorial algorithm to find a virtual valuation function with the optimal (additive) rationality guarantee. Moreover we show that there exists such a valuation function that both is individually rational and is minimum (that is it is component-wise dominated by any other individually rational virtual valuation function that approximately fits the data). Similarly given upper bound constraints on the valuation function we show how to fit the maximum virtual valuation function with the optimal additive rationality guarantee. In practice revealed preference bidding constraints are very demanding. We explain how approximate rationality can be used to create relaxed revealed preference constraints in an auction. We then show how combinatorial methods can be used to implement these relaxed constraints. Worst/best-case welfare guarantees that result from the use of such mechanisms can be quantified via the minimum/maximum virtual valuation function.,adrian vetta,Not available,2015.0,10.1007/978-3-662-48433-3_10,Algorithmic Game Theory,Shant2015,False,,Springer,Not available,The Combinatorial World (of Auctions) According to GARP,89d3c7658c72dc2a55f1914992434ae9,http://dx.doi.org/10.1007/978-3-662-48433-3_10 4137,A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent’s value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting from accepted bids and offers are recorded. This continues until there are no more acceptable bids or offers. Remarkably the experiment consistently terminates in a Walrasian price. The main result of this paper is a mechanism in the spirit of the DOA that converges to a Walrasian equilibrium in a polynomial number of steps thus providing a theoretical basis for the above-described empirical phenomenon. It is well-known that computation of a Walrasian equilibrium for this market corresponds to solving a maximum weight bipartite matching problem. The uncoordinated but rational responses of agents thus solve in a distributed fashion a maximum weight bipartite matching problem that is encoded by their private valuations. We show furthermore that every Walrasian equilibrium is reachable by some sequence of responses. This is in contrast to the well known auction algorithms for this problem which only allow one side to make offers and thus essentially choose an equilibrium that maximizes the surplus for the side making offers. Our results extend to the setting where not every agent pair is allowed to trade with each other.,sepehr assadi,Not available,2015.0,10.1007/978-3-662-48995-6_5,Web and Internet Economics,Sepehr2015,False,,Springer,Not available,Fast Convergence in the Double Oral Auction,c60f67e363588e77138fbb45ec6c030f,http://dx.doi.org/10.1007/978-3-662-48995-6_5 4138,A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent’s value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting from accepted bids and offers are recorded. This continues until there are no more acceptable bids or offers. Remarkably the experiment consistently terminates in a Walrasian price. The main result of this paper is a mechanism in the spirit of the DOA that converges to a Walrasian equilibrium in a polynomial number of steps thus providing a theoretical basis for the above-described empirical phenomenon. It is well-known that computation of a Walrasian equilibrium for this market corresponds to solving a maximum weight bipartite matching problem. The uncoordinated but rational responses of agents thus solve in a distributed fashion a maximum weight bipartite matching problem that is encoded by their private valuations. We show furthermore that every Walrasian equilibrium is reachable by some sequence of responses. This is in contrast to the well known auction algorithms for this problem which only allow one side to make offers and thus essentially choose an equilibrium that maximizes the surplus for the side making offers. Our results extend to the setting where not every agent pair is allowed to trade with each other.,sanjeev khanna,Not available,2015.0,10.1007/978-3-662-48995-6_5,Web and Internet Economics,Sepehr2015,False,,Springer,Not available,Fast Convergence in the Double Oral Auction,c60f67e363588e77138fbb45ec6c030f,http://dx.doi.org/10.1007/978-3-662-48995-6_5 4139,A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent’s value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting from accepted bids and offers are recorded. This continues until there are no more acceptable bids or offers. Remarkably the experiment consistently terminates in a Walrasian price. The main result of this paper is a mechanism in the spirit of the DOA that converges to a Walrasian equilibrium in a polynomial number of steps thus providing a theoretical basis for the above-described empirical phenomenon. It is well-known that computation of a Walrasian equilibrium for this market corresponds to solving a maximum weight bipartite matching problem. The uncoordinated but rational responses of agents thus solve in a distributed fashion a maximum weight bipartite matching problem that is encoded by their private valuations. We show furthermore that every Walrasian equilibrium is reachable by some sequence of responses. This is in contrast to the well known auction algorithms for this problem which only allow one side to make offers and thus essentially choose an equilibrium that maximizes the surplus for the side making offers. Our results extend to the setting where not every agent pair is allowed to trade with each other.,yang li,Not available,2015.0,10.1007/978-3-662-48995-6_5,Web and Internet Economics,Sepehr2015,False,,Springer,Not available,Fast Convergence in the Double Oral Auction,c60f67e363588e77138fbb45ec6c030f,http://dx.doi.org/10.1007/978-3-662-48995-6_5 4140,A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent’s value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting from accepted bids and offers are recorded. This continues until there are no more acceptable bids or offers. Remarkably the experiment consistently terminates in a Walrasian price. The main result of this paper is a mechanism in the spirit of the DOA that converges to a Walrasian equilibrium in a polynomial number of steps thus providing a theoretical basis for the above-described empirical phenomenon. It is well-known that computation of a Walrasian equilibrium for this market corresponds to solving a maximum weight bipartite matching problem. The uncoordinated but rational responses of agents thus solve in a distributed fashion a maximum weight bipartite matching problem that is encoded by their private valuations. We show furthermore that every Walrasian equilibrium is reachable by some sequence of responses. This is in contrast to the well known auction algorithms for this problem which only allow one side to make offers and thus essentially choose an equilibrium that maximizes the surplus for the side making offers. Our results extend to the setting where not every agent pair is allowed to trade with each other.,rakesh vohra,Not available,2015.0,10.1007/978-3-662-48995-6_5,Web and Internet Economics,Sepehr2015,False,,Springer,Not available,Fast Convergence in the Double Oral Auction,c60f67e363588e77138fbb45ec6c030f,http://dx.doi.org/10.1007/978-3-662-48995-6_5 4141,We distinguish between two types of learning processes on the part of decision makers: (1) Those in which competitive selection forces drive from the market all but the efficient profit maximizers and in which agents act as efficient profit maximizers in response to displacements from equilibrium and (2) trial and error learning processes that may result in stable response functions that are not “best replies” and in which agents fail to “understand” the underlying economic process so that changes in economic conditions result in sharp disruptions to the market and the learning process must repeat itself. Data from a series of common value auction market experiments indicates that the second of these two learning processes characterizes behavior in these markets as bidders adjust to the “winner’s curse”.,douglas dyer,Not available,1988.0,10.1007/978-3-642-48356-1_14,Bounded Rational Behavior in Experimental Games and Markets,H.1988,False,,Springer,Not available,Learning in Common Value Auctions,80dbf0c012a2440234863682b10f53e9,http://dx.doi.org/10.1007/978-3-642-48356-1_14 4142,In this paper we consider the auction framework of cognitive radio network consisting of a set of primary users and a set of secondary users (SUs). The spectrum has been divided into channels with the help of frequency division multiple access (FDMA). The primary users (PUs) are licensed users who lease the vacant channels to secondary user (SUs) temporarily by auction mechanism. In this paper we try to form an algorithm to determine the secondary user who wins the auction. We also discuss the effect of change of number of users on bandwidth utilization channel utility and revenue generation by using the algorithm.,subhasree bhattacharjee,Not available,2015.0,10.1007/978-81-322-2274-3_13,Computational Advancement in Communication Circuits and Systems,Subhasree2015,False,,Springer,Not available,Winner Determination Algorithm in Auction Framework of Cognitive Radio Network,cc46045665795e5555c9f1734aed000b,http://dx.doi.org/10.1007/978-81-322-2274-3_13 4143,In this paper we consider the auction framework of cognitive radio network consisting of a set of primary users and a set of secondary users (SUs). The spectrum has been divided into channels with the help of frequency division multiple access (FDMA). The primary users (PUs) are licensed users who lease the vacant channels to secondary user (SUs) temporarily by auction mechanism. In this paper we try to form an algorithm to determine the secondary user who wins the auction. We also discuss the effect of change of number of users on bandwidth utilization channel utility and revenue generation by using the algorithm.,arunava bhattacharya,Not available,2015.0,10.1007/978-81-322-2274-3_13,Computational Advancement in Communication Circuits and Systems,Subhasree2015,False,,Springer,Not available,Winner Determination Algorithm in Auction Framework of Cognitive Radio Network,cc46045665795e5555c9f1734aed000b,http://dx.doi.org/10.1007/978-81-322-2274-3_13 4144,In the secondary spectrum market more and more primary users (,feng tian,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4145,In the secondary spectrum market more and more primary users (,di li,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4146,In the secondary spectrum market more and more primary users (,shuyu li,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4147,In the secondary spectrum market more and more primary users (,lei wang,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4148,In the secondary spectrum market more and more primary users (,naigao jin,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4149,In the secondary spectrum market more and more primary users (,liang sun,Not available,2015.0,10.1007/978-3-319-22047-5_2,Big Data Computing and Communications,Feng2015,False,,Springer,Not available,RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management,9b9f6c7116489c71a698d3c70633072e,http://dx.doi.org/10.1007/978-3-319-22047-5_2 4150,In previous chapters the main single-unit auction models were discussed. However in many instances auctions are used to award multiple related units. For example if an olive oil factory wants to sell part of its stock it can choose to conduct an auction. The items to be auctioned may be homogeneous (oil bottles of the same size and acidity) or heterogeneous (different sizes and acidities) and may be awarded in a single auction or in different auctions.,asuncion mochon,Not available,2015.0,10.1007/978-3-319-08813-6_4,Understanding Auctions,Asunción2015,False,,Springer,Not available,Assigning Multiple Homogeneous Items in a Single Auction,2b4577bffe6846bf09e82a32719bfa21,http://dx.doi.org/10.1007/978-3-319-08813-6_4 4151,In previous chapters the main single-unit auction models were discussed. However in many instances auctions are used to award multiple related units. For example if an olive oil factory wants to sell part of its stock it can choose to conduct an auction. The items to be auctioned may be homogeneous (oil bottles of the same size and acidity) or heterogeneous (different sizes and acidities) and may be awarded in a single auction or in different auctions.,yago saez,Not available,2015.0,10.1007/978-3-319-08813-6_4,Understanding Auctions,Asunción2015,False,,Springer,Not available,Assigning Multiple Homogeneous Items in a Single Auction,2b4577bffe6846bf09e82a32719bfa21,http://dx.doi.org/10.1007/978-3-319-08813-6_4 4152,Consider an auction or fair division game where every bidder knows his true value of the single object but is only incompletely informed about the true values of his competitors. By imposing the axiom of envy freeness with respect to stated preferences the set of pricing rules is restricted to the prices between the highest and second highest bid. Whereas for auctions one also can satisfy incentive compatibility the same is not true for fair division games. We analyse and compare the different pricing rules partly incentive compatible and partly not by deriving the optimal bidding strategies. By comparing the payoff expectations induced by the various pricing rules we can prove directly a special equivalence statement saying that expected payoffs do not depend on the pricing rule. It is interesting that in fair division games equivalence of pricing rules is only valid if information is sufficiently incomplete.,w. guth,Not available,1986.0,10.1007/BF00433534,Social Choice and Welfare,W.1986,False,,Springer,Not available,A comparison of pricing rules for auctions and fair division games,2a082534d2399de21defeba3e8a65b17,http://dx.doi.org/10.1007/BF00433534 4153,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,oren ben-zwi,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 4154,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,monika henzinger,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 4155,Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic ad networks typically act as mediators for individual advertisers at ad exchanges. If multiple advertisers in an ad network are interested in the ad slots of the same auction the ad network might use a “local” auction to resell the obtained ad slots among its advertisers.In this work we want to deepen the theoretical understanding of these new markets by analyzing them from the viewpoint of combinatorial auctions. Prior work studied mostly single-item auctions while we allow the advertisers to express richer preferences over multiple items. We develop a game-theoretic model for the entanglement of the ,veronika loitzenbauer,Not available,2015.0,10.1007/978-3-662-48995-6_8,Web and Internet Economics,Oren2015,False,,Springer,Not available,Ad Exchange: Envy-Free Auctions with Mediators,a692f969c89ab14ff7a2b3cab0c36a22,http://dx.doi.org/10.1007/978-3-662-48995-6_8 4156,This survey brings together theoretical and empirical questions that have been addressed in the economic literature on eBay focusing on understanding the behavior of buyers and sellers. We discuss several puzzles of bidder behavior and the explanations that have been put forward by the literature for each. We then discuss structural estimates of bidder behavior and measuring the consumer surplus derived from eBay. We then try to understand why there are so many selling formats being used simultaneously and then focus on the critical decision variables for a seller in an eBay English auction. Finally we analyze how trustworthy eBay sellers are on average and whether the feedback system provides strong incentives for good behavior.,kevin hasker,Not available,2010.0,10.1007/s11151-010-9257-5,Review of Industrial Organization,Kevin2010,False,,Springer,Not available,eBay in the Economic Literature: Analysis of an Auction Marketplace,18b142675bf0b5c7ed517046a8eb3367,http://dx.doi.org/10.1007/s11151-010-9257-5 4157,This survey brings together theoretical and empirical questions that have been addressed in the economic literature on eBay focusing on understanding the behavior of buyers and sellers. We discuss several puzzles of bidder behavior and the explanations that have been put forward by the literature for each. We then discuss structural estimates of bidder behavior and measuring the consumer surplus derived from eBay. We then try to understand why there are so many selling formats being used simultaneously and then focus on the critical decision variables for a seller in an eBay English auction. Finally we analyze how trustworthy eBay sellers are on average and whether the feedback system provides strong incentives for good behavior.,robin sickles,Not available,2010.0,10.1007/s11151-010-9257-5,Review of Industrial Organization,Kevin2010,False,,Springer,Not available,eBay in the Economic Literature: Analysis of an Auction Marketplace,18b142675bf0b5c7ed517046a8eb3367,http://dx.doi.org/10.1007/s11151-010-9257-5 4158,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",r malaga,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 4159,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",d porter,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 4160,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",k ord,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 4161,"The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as ",b montano,Not available,2010.0,10.1057/jors.2009.79,Journal of the Operational Research Society,R2010,False,,Springer,Not available,A new end-of-auction model for curbing sniping,067930b3a622ceeb8d5fe5f3735e8d05,http://dx.doi.org/10.1057/jors.2009.79 4162,Day and Milgrom (Int J Game Theory 36:393–407 2008) argue that package auctions that select the seller’s minimum revenue in the Core are revenue-monotone. We show that no bidder-optimal Core-selecting auction can satisfy revenue-monotonicity for general preferences when there are at least three goods for sale while the property holds for any bidder-optimal Core-selecting auction in environments with only two goods or if the characteristic function is submodular.,laurent lamy,Not available,2010.0,10.1007/s00182-009-0188-z,International Journal of Game Theory,Laurent2010,False,,Springer,Not available,Core-selecting package auctions: a comment on revenue-monotonicity,e48df02163be0dc3d321ec9b5531bcf1,http://dx.doi.org/10.1007/s00182-009-0188-z 4163,Consider an auction or fair division game where every bidder knows his true value of the single object but is only incompletely informed about the true values of his competitors. By imposing the axiom of envy freeness with respect to stated preferences the set of pricing rules is restricted to the prices between the highest and second highest bid. Whereas for auctions one also can satisfy incentive compatibility the same is not true for fair division games. We analyse and compare the different pricing rules partly incentive compatible and partly not by deriving the optimal bidding strategies. By comparing the payoff expectations induced by the various pricing rules we can prove directly a special equivalence statement saying that expected payoffs do not depend on the pricing rule. It is interesting that in fair division games equivalence of pricing rules is only valid if information is sufficiently incomplete.,e. damme,Not available,1986.0,10.1007/BF00433534,Social Choice and Welfare,W.1986,False,,Springer,Not available,A comparison of pricing rules for auctions and fair division games,2a082534d2399de21defeba3e8a65b17,http://dx.doi.org/10.1007/BF00433534 4164,While all-pay auctions are well researched experimentally we do not have much laboratory evidence on wars of attrition. This paper tries to fill this gap. Technically there are only a few differences between wars of attrition and all-pay auctions. Behaviorally however we find striking differences: As many studies our experiment finds overbidding in all-pay auctions. In contrast in wars of attrition we observe systematic underbidding.We study bids and expenditures in different experimental frames and matching procedures and tie in with the literature on stepwise linear bidding functions.,hannah horisch,Not available,2010.0,10.1007/s11127-009-9523-y,Public Choice,Hannah2010,False,,Springer,Not available,Less fighting than expected,716b47a9f9fc87aa062b2bef94a75a0f,http://dx.doi.org/10.1007/s11127-009-9523-y 4165,While all-pay auctions are well researched experimentally we do not have much laboratory evidence on wars of attrition. This paper tries to fill this gap. Technically there are only a few differences between wars of attrition and all-pay auctions. Behaviorally however we find striking differences: As many studies our experiment finds overbidding in all-pay auctions. In contrast in wars of attrition we observe systematic underbidding.We study bids and expenditures in different experimental frames and matching procedures and tie in with the literature on stepwise linear bidding functions.,oliver kirchkamp,Not available,2010.0,10.1007/s11127-009-9523-y,Public Choice,Hannah2010,False,,Springer,Not available,Less fighting than expected,716b47a9f9fc87aa062b2bef94a75a0f,http://dx.doi.org/10.1007/s11127-009-9523-y 4166,We study private-value auctions with ,gadi fibich,Not available,2010.0,10.1007/s00182-009-0181-6,International Journal of Game Theory,Gadi2010,False,,Springer,Not available,Large auctions with risk-averse bidders,354108c0c5f89811e895a1bfb0234b55,http://dx.doi.org/10.1007/s00182-009-0181-6 4167,We study private-value auctions with ,arieh gavious,Not available,2010.0,10.1007/s00182-009-0181-6,International Journal of Game Theory,Gadi2010,False,,Springer,Not available,Large auctions with risk-averse bidders,354108c0c5f89811e895a1bfb0234b55,http://dx.doi.org/10.1007/s00182-009-0181-6 4168,This study examines the Name-Your-Own-Price (NYOP) retailer’s information revelation strategy when competing with list-price channel. We propose an integrated economic framework focusing on the comparison of ,tuo wang,Not available,2010.0,10.1007/s12525-010-0033-z,Electronic Markets,Tuo2010,False,,Springer,Not available,Name-Your-Own-Price seller’s information revelation strategy with the presence of list-price channel,240d7795fcd0ccb3a151955b7c6fbae3,http://dx.doi.org/10.1007/s12525-010-0033-z 4169,This study examines the Name-Your-Own-Price (NYOP) retailer’s information revelation strategy when competing with list-price channel. We propose an integrated economic framework focusing on the comparison of ,michael hu,Not available,2010.0,10.1007/s12525-010-0033-z,Electronic Markets,Tuo2010,False,,Springer,Not available,Name-Your-Own-Price seller’s information revelation strategy with the presence of list-price channel,240d7795fcd0ccb3a151955b7c6fbae3,http://dx.doi.org/10.1007/s12525-010-0033-z 4170,This study examines the Name-Your-Own-Price (NYOP) retailer’s information revelation strategy when competing with list-price channel. We propose an integrated economic framework focusing on the comparison of ,andy hao,Not available,2010.0,10.1007/s12525-010-0033-z,Electronic Markets,Tuo2010,False,,Springer,Not available,Name-Your-Own-Price seller’s information revelation strategy with the presence of list-price channel,240d7795fcd0ccb3a151955b7c6fbae3,http://dx.doi.org/10.1007/s12525-010-0033-z 4171,We develop a model of macroeconomic heterogeneity inspired by the Kiyotaki–Wright (J Polit Econ 97:924–954 1989) formulation of commodity money with the addition of linear utility and idiosyncratic shocks to savings. We consider two environments. In the ,cavalcanti o.,Not available,2010.0,10.1007/s00199-009-0459-8,Economic Theory,R.2010,False,,Springer,Not available,Stationarity without degeneracy in a model of commodity money,0b2f6feb33887ad724e8969bdecaf8ba,http://dx.doi.org/10.1007/s00199-009-0459-8 4172,We develop a model of macroeconomic heterogeneity inspired by the Kiyotaki–Wright (J Polit Econ 97:924–954 1989) formulation of commodity money with the addition of linear utility and idiosyncratic shocks to savings. We consider two environments. In the ,daniela puzzello,Not available,2010.0,10.1007/s00199-009-0459-8,Economic Theory,R.2010,False,,Springer,Not available,Stationarity without degeneracy in a model of commodity money,0b2f6feb33887ad724e8969bdecaf8ba,http://dx.doi.org/10.1007/s00199-009-0459-8 4173,This paper explores how seller reputation affects auction prices using detailed Taiwanese data. Our empirical results show that returns to reputation are nonlinear and differ considerably across different reputation scores. Marginal returns to scores drop sharply after the first reputation quartile indicating that building up sellers’ reputation is extremely important especially in the early stage. Our study reveals that the mechanism of seller reputations is effective in mitigating asymmetric information in online auctions.,chia-hung sun,Not available,2010.0,10.1007/s11187-008-9160-8,Small Business Economics,Chia-Hung2010,False,,Springer,Not available,Information asymmetry and small business in online auction market,65a8437113cdd12a94d75dc4e349c1f4,http://dx.doi.org/10.1007/s11187-008-9160-8 4174,An example is given of a sequential auction in which at equilibrium the expected profit of an informed bidder may be strictly less than the expected profit of an uninformed bidder. This phenomenon is interpreted in terms of the internal game between a player's “types” which arises in a setting of incomplete information.,r. engelbrecht-wiggans,Not available,1983.0,10.1007/BF01774302,International Journal of Game Theory,R.1983,False,,Springer,Not available,A sequential auction involving asymmetrically-informed bidders,2fabe5fff45d140f37787e8435bda44c,http://dx.doi.org/10.1007/BF01774302 4175,This paper explores how seller reputation affects auction prices using detailed Taiwanese data. Our empirical results show that returns to reputation are nonlinear and differ considerably across different reputation scores. Marginal returns to scores drop sharply after the first reputation quartile indicating that building up sellers’ reputation is extremely important especially in the early stage. Our study reveals that the mechanism of seller reputations is effective in mitigating asymmetric information in online auctions.,kang liu,Not available,2010.0,10.1007/s11187-008-9160-8,Small Business Economics,Chia-Hung2010,False,,Springer,Not available,Information asymmetry and small business in online auction market,65a8437113cdd12a94d75dc4e349c1f4,http://dx.doi.org/10.1007/s11187-008-9160-8 4176,We analyze first-price equilibrium bidding behavior of capacity-constrained firms in a sequence of two procurement auctions. In the model firms with a cost advantage in completing the project auctioned off at the end of the sequence may enter the unfavored first auction hoping to lose it. Equilibrium bidding in both auctions deviates from the standard Symmetric Independent Private Value auction model due to opportunity costs of bidding created by possibly employed capacity. For this sequential auction model with non-identical objects we show that revenue equivalence applies.,j. reiss,Not available,2010.0,10.1007/s00199-008-0428-7,Economic Theory,Philipp2010,True,,Springer,Not available,First-price equilibrium and revenue equivalence in a sequential procurement auction model,00de31d0a72ba9f891bd73e35f36332c,http://dx.doi.org/10.1007/s00199-008-0428-7 4177,We analyze first-price equilibrium bidding behavior of capacity-constrained firms in a sequence of two procurement auctions. In the model firms with a cost advantage in completing the project auctioned off at the end of the sequence may enter the unfavored first auction hoping to lose it. Equilibrium bidding in both auctions deviates from the standard Symmetric Independent Private Value auction model due to opportunity costs of bidding created by possibly employed capacity. For this sequential auction model with non-identical objects we show that revenue equivalence applies.,jens schondube,Not available,2010.0,10.1007/s00199-008-0428-7,Economic Theory,Philipp2010,True,,Springer,Not available,First-price equilibrium and revenue equivalence in a sequential procurement auction model,00de31d0a72ba9f891bd73e35f36332c,http://dx.doi.org/10.1007/s00199-008-0428-7 4178,In a combinatorial auction a set of items is for sale and agents can bid on subsets of these items. In a voting setting the agents decide among a set of alternatives by having each agent rank all the alternatives. Many of the key research issues in these two domains are similar. The aim of this paper is to give a convenient side-by-side comparison that will clarify the relation between the domains and serve as a guide to future research.,vincent conitzer,Not available,2010.0,10.1007/s10472-010-9205-y,Annals of Mathematics and Artificial Intelligence,Vincent2010,False,,Springer,Not available,Comparing multiagent systems research in combinatorial auctions and voting,d2ea60966bd4c7a4b5b2a1297c8460b3,http://dx.doi.org/10.1007/s10472-010-9205-y 4179,The creation of adequate investment incentives has been of great concern in the restructuring of the electricity sector. However to achieve this regulators have applied different market designs across countries and regions. In this paper we employ laboratory methods to explore the relationship between market design capacity provision and pricing in electricity markets. Subjects act as firms choosing their generation capacity and competing in uniform price auction markets. We compare three regulatory designs: (1) a baseline price cap system that restricts scarcity rents (2) a price spike regime that effectively lifts these restrictions and (3) a capacity market that directly rewards the provision of capacity. Restricting price spikes leads to underinvestment. In line with the regulatory intention both alternative designs lead to sufficient investment albeit at the cost of higher energy prices during peak periods and substantial capacity payments in the capacity market regime. To some extent these results confirm theoretical expectations. However we also find lower than predicted spot market prices as sellers compete relatively intensely in capacities and prices and the capacity markets are less competitive than predicted.,chloe coq,Not available,2017.0,10.1007/s11149-017-9324-z,Journal of Regulatory Economics,Chloé2017,False,,Springer,Not available,Pricing and capacity provision in electricity markets: an experimental study,0672a1b0257fe8b45779b06980d67c91,http://dx.doi.org/10.1007/s11149-017-9324-z 4180,The creation of adequate investment incentives has been of great concern in the restructuring of the electricity sector. However to achieve this regulators have applied different market designs across countries and regions. In this paper we employ laboratory methods to explore the relationship between market design capacity provision and pricing in electricity markets. Subjects act as firms choosing their generation capacity and competing in uniform price auction markets. We compare three regulatory designs: (1) a baseline price cap system that restricts scarcity rents (2) a price spike regime that effectively lifts these restrictions and (3) a capacity market that directly rewards the provision of capacity. Restricting price spikes leads to underinvestment. In line with the regulatory intention both alternative designs lead to sufficient investment albeit at the cost of higher energy prices during peak periods and substantial capacity payments in the capacity market regime. To some extent these results confirm theoretical expectations. However we also find lower than predicted spot market prices as sellers compete relatively intensely in capacities and prices and the capacity markets are less competitive than predicted.,henrik orzen,Not available,2017.0,10.1007/s11149-017-9324-z,Journal of Regulatory Economics,Chloé2017,False,,Springer,Not available,Pricing and capacity provision in electricity markets: an experimental study,0672a1b0257fe8b45779b06980d67c91,http://dx.doi.org/10.1007/s11149-017-9324-z 4181,The creation of adequate investment incentives has been of great concern in the restructuring of the electricity sector. However to achieve this regulators have applied different market designs across countries and regions. In this paper we employ laboratory methods to explore the relationship between market design capacity provision and pricing in electricity markets. Subjects act as firms choosing their generation capacity and competing in uniform price auction markets. We compare three regulatory designs: (1) a baseline price cap system that restricts scarcity rents (2) a price spike regime that effectively lifts these restrictions and (3) a capacity market that directly rewards the provision of capacity. Restricting price spikes leads to underinvestment. In line with the regulatory intention both alternative designs lead to sufficient investment albeit at the cost of higher energy prices during peak periods and substantial capacity payments in the capacity market regime. To some extent these results confirm theoretical expectations. However we also find lower than predicted spot market prices as sellers compete relatively intensely in capacities and prices and the capacity markets are less competitive than predicted.,sebastian schwenen,Not available,2017.0,10.1007/s11149-017-9324-z,Journal of Regulatory Economics,Chloé2017,False,,Springer,Not available,Pricing and capacity provision in electricity markets: an experimental study,0672a1b0257fe8b45779b06980d67c91,http://dx.doi.org/10.1007/s11149-017-9324-z 4182,We focus on the optimal strategy for an agent aiming to purchase a maximum number of items with a limited budget and in an algorithmic way when participating in a large number of Vickrey auctions. The auctions arise on a set of auction-servers with the algorithm choosing its bid-level on each server. We propose a statistical approach rather than a game-theoretical one such that under reasonable hypothesis we can obtain closed formulas for the optimal bidding strategy. We show how this applies to real-time bidding auctions in advertising we highlight some operational benefits of the model and also discuss how our results apply to different types of auction mechanism.,joaquin fernandez-tapia,Not available,2017.0,10.1007/s11590-016-1045-1,Optimization Letters,Joaquin2017,False,,Springer,Not available,Statistical modeling of Vickrey auctions and applications to automated bidding strategies,72102503d735d66085ae34e606751522,http://dx.doi.org/10.1007/s11590-016-1045-1 4183,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,johannes muller,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4184,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,sebastian pokutta,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4185,An example is given of a sequential auction in which at equilibrium the expected profit of an informed bidder may be strictly less than the expected profit of an uninformed bidder. This phenomenon is interpreted in terms of the internal game between a player's “types” which arises in a setting of incomplete information.,r. weber,Not available,1983.0,10.1007/BF01774302,International Journal of Game Theory,R.1983,False,,Springer,Not available,A sequential auction involving asymmetrically-informed bidders,2fabe5fff45d140f37787e8435bda44c,http://dx.doi.org/10.1007/BF01774302 4186,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,alexander martin,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4187,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,susanne pape,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4188,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,andrea peter,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4189,In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date however this strategy comes with significant operational risk. To address this risk exchanges started to offer so-called ,thomas winter,Not available,2017.0,10.1007/s00186-016-0555-z,Mathematical Methods of Operations Research,C.2017,False,,Springer,Not available,Pricing and clearing combinatorial markets with singleton and swap orders,604147afcb2ec90979dfef8bc05fafc8,http://dx.doi.org/10.1007/s00186-016-0555-z 4190," This paper studies a financial market transaction model and convergence of Markovian price processes generated by an ",xiaojing xu,Not available,2017.0,10.1007/s12351-015-0224-7,Operational Research,Xiaojing2017,False,,Springer,Not available,Convergence of Markovian price processes in a financial market transaction model,2a251c870ece321f2ec164869b695dcf,http://dx.doi.org/10.1007/s12351-015-0224-7 4191," This paper studies a financial market transaction model and convergence of Markovian price processes generated by an ",jinpeng ma,Not available,2017.0,10.1007/s12351-015-0224-7,Operational Research,Xiaojing2017,False,,Springer,Not available,Convergence of Markovian price processes in a financial market transaction model,2a251c870ece321f2ec164869b695dcf,http://dx.doi.org/10.1007/s12351-015-0224-7 4192," This paper studies a financial market transaction model and convergence of Markovian price processes generated by an ",xiaoping xie,Not available,2017.0,10.1007/s12351-015-0224-7,Operational Research,Xiaojing2017,False,,Springer,Not available,Convergence of Markovian price processes in a financial market transaction model,2a251c870ece321f2ec164869b695dcf,http://dx.doi.org/10.1007/s12351-015-0224-7 4193,Cooperation in the ocean liner shipping industry has always been important to improve liner shipping networks (LSN’s). As tight cooperations like alliances are challenged by antitrust laws looser forms of cooperation among liner carriers might become a reasonable way to increase efficiency of LSN’s. Our goal is to facilitate a loose form of cooperation among liner carriers. Therefore we introduce a coordination mechanism for designing a collaborative LSN based on a multi round combinatorial auction. Via the auction carriers exchange ,tobias buer,Not available,2017.0,10.1007/s10696-017-9284-8,Flexible Services and Manufacturing Journal,Tobias2017,False,,Springer,Not available,Cooperative liner shipping network design by means of a combinatorial auction,78c71ca03faf0e60f7e6b350afe2c35f,http://dx.doi.org/10.1007/s10696-017-9284-8 4194,Cooperation in the ocean liner shipping industry has always been important to improve liner shipping networks (LSN’s). As tight cooperations like alliances are challenged by antitrust laws looser forms of cooperation among liner carriers might become a reasonable way to increase efficiency of LSN’s. Our goal is to facilitate a loose form of cooperation among liner carriers. Therefore we introduce a coordination mechanism for designing a collaborative LSN based on a multi round combinatorial auction. Via the auction carriers exchange ,rasmus haass,Not available,2017.0,10.1007/s10696-017-9284-8,Flexible Services and Manufacturing Journal,Tobias2017,False,,Springer,Not available,Cooperative liner shipping network design by means of a combinatorial auction,78c71ca03faf0e60f7e6b350afe2c35f,http://dx.doi.org/10.1007/s10696-017-9284-8 4195,The winner’s curse in auctions might emerge from asymmetric information and/or from some willingness to pay for winning. This article is based on a sealed-bid common value first price auction with a net loss for the subject with the second highest bid. The results show the existence of a trade-off between the magnitude of the potential loss and the willingness to pay for the victory. In the context of public procurement these results suggest that companies are willing to overpay small contracts to gain a sort of ‘free advertising’ whereas this is not the case when the contracts are large.,matteo migheli,Not available,2017.0,10.1007/s11299-017-0197-8,Mind & Society,Matteo2017,False,,Springer,Not available,The winner’s curse in auctions with losses,23dd7fb7face41f098c73770b1c324f6,http://dx.doi.org/10.1007/s11299-017-0197-8 4196,A wide variety of goods is sold by ,urs schweizer,Not available,1982.0,10.1007/978-3-662-41575-7_19,Economic Theory of Natural Resources,Urs1982,False,,Springer,Not available,Information and Payoffs in Auction Games,9bc22bc52068804881a8d57fa11eea29,http://dx.doi.org/10.1007/978-3-662-41575-7_19 4197,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,luca corazzini,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 4198,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,stefano galavotti,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 4199,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,rupert sausgruber,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 4200,We experimentally study the effects of allotment—the division of an item into homogeneous units—in independent private value auctions. We compare a bundling first-price auction with two equivalent treatments where allotment is implemented: a two-unit discriminatory auction and two simultaneous single-unit first-price auctions. We find that allotment in the form of a discriminatory auction generates a loss of efficiency with respect to bundling. In the allotment treatments we observe large and persistent bid spread and the discriminatory auction is less efficient than simultaneous auctions. We provide a unified interpretation of our results that is based on both a non-equilibrium response to the coordination problem characterizing the simultaneous auction format and a general class of behavioral preferences that includes risk aversion joy of winning and loser’s regret as specific cases.,paola valbonesi,Not available,2017.0,10.1007/s10683-016-9476-1,Experimental Economics,Luca2017,False,,Springer,Not available,Allotment in first-price auctions: an experimental investigation,039d4b25f32e6d3ba1cbbda650fd1764,http://dx.doi.org/10.1007/s10683-016-9476-1 4201,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ezra einy,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 4202,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,mridu goswami,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 4203,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ori haimanko,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 4204,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,ram orzach,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 4205,We study two-player common-value all-pay auctions in which the players have ex-ante asymmetric information represented by finite connected partitions of the set of states of nature. Our focus is on a family of such auctions in which no player has an information advantage over his opponent. We find sufficient conditions for the existence of equilibrium with monotone strategies and show that such an equilibrium is unique. We further show that the ex-ante distribution of equilibrium effort is the same for every player (and hence the players’ expected efforts are equal) although their expected payoffs are different and they do not have the same ex-ante probability of winning.,aner sela,Not available,2017.0,10.1007/s00182-015-0524-4,International Journal of Game Theory,Ezra2017,False,,Springer,Not available,Common-value all-pay auctions with asymmetric information,4d950ea5c78d5ad54ed1f684960785fd,http://dx.doi.org/10.1007/s00182-015-0524-4 4206,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,dimitris fotakis,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 4207,A wide variety of goods is sold by ,thomas ungern-sternberg,Not available,1982.0,10.1007/978-3-662-41575-7_19,Economic Theory of Natural Resources,Urs1982,False,,Springer,Not available,Information and Payoffs in Auction Games,9bc22bc52068804881a8d57fa11eea29,http://dx.doi.org/10.1007/978-3-662-41575-7_19 4208,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,piotr krysta,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 4209,Algorithmic Mechanism Design attempts to marry computation and incentives mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money very little can be done to enforce truthfulness. However in certain applications money is unavailable morally unacceptable or might simply be at odds with the objective of the mechanism. For example in combinatorial auctions (CAs) the paradigmatic problem of the area we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of ,carmine ventre,Not available,2017.0,10.1007/s00453-015-0105-8,Algorithmica,Dimitris2017,False,,Springer,Not available,Combinatorial Auctions Without Money,93f578cdd1503f5cb485c44fb0d63e09,http://dx.doi.org/10.1007/s00453-015-0105-8 4210,This paper studies combinatorial auctions with budget-constrained bidders from a mechanism design perspective. I search for mechanisms that are incentive compatible individually rational symmetric non-wasteful and non-bossy. First focusing on the greedy domain in which any increase in a bidder’s valuation always exceeds his budget I derive the unique mechanism called the Iterative Second Price Auction. For the general domain however no such mechanism exists.,phuong le,Not available,2017.0,10.1007/s10058-016-0188-y,Review of Economic Design,Phuong2017,False,,Springer,Not available,Mechanisms for combinatorial auctions with budget constraints,297895bf2a754bcc6621399b729d1061,http://dx.doi.org/10.1007/s10058-016-0188-y 4211,We derive a necessary and sufficient condition for the existence of equilibria with only two active players in the all-pay auction with complete information and identity-dependent externalities. This condition shows that the generic equilibrium of the standard all-pay auction is robust to the introduction of “small” identity-dependent externalities. In general however the presence of identity-dependent externalities invalidates well-established qualitative results concerning the set of equilibria of the first-price all-pay auction with complete information. With identity-dependent externalities equilibria are generally not payoff equivalent and identical players may earn different payoffs in equilibrium. These observations show that Siegel’s (Econometrica 77(1) 71–92 ,bettina klose,Not available,2015.0,10.1007/s00199-014-0848-5,Economic Theory,Bettina2015,False,,Springer,Not available,The all-pay auction with complete information and identity-dependent externalities,25fa25fd3a6f9f4e02400e6a6c1f27b8,http://dx.doi.org/10.1007/s00199-014-0848-5 4212,We derive a necessary and sufficient condition for the existence of equilibria with only two active players in the all-pay auction with complete information and identity-dependent externalities. This condition shows that the generic equilibrium of the standard all-pay auction is robust to the introduction of “small” identity-dependent externalities. In general however the presence of identity-dependent externalities invalidates well-established qualitative results concerning the set of equilibria of the first-price all-pay auction with complete information. With identity-dependent externalities equilibria are generally not payoff equivalent and identical players may earn different payoffs in equilibrium. These observations show that Siegel’s (Econometrica 77(1) 71–92 ,dan kovenock,Not available,2015.0,10.1007/s00199-014-0848-5,Economic Theory,Bettina2015,False,,Springer,Not available,The all-pay auction with complete information and identity-dependent externalities,25fa25fd3a6f9f4e02400e6a6c1f27b8,http://dx.doi.org/10.1007/s00199-014-0848-5 4213,In a stylized environment with complementary products we study a class of dominant strategy implementable direct mechanisms and focus on the objective of minimizing the expected surplus from core deviations. For this class of mechanisms we formulate the core deviation minimization problem as a calculus of variations problem and numerically solve it for some interesting special cases. We then compare the core deviation surplus in the optimal auction (CDMA) to that in Vickrey-Clark-Groves mechanism (VCG) and core-selecting auctions (CSAs). We find that the expected surplus from core deviations can be significantly smaller in CDMA than that in both VCG and CSAs.,isa hafalir,Not available,2015.0,10.1007/s00182-014-0433-y,International Journal of Game Theory,E.2015,False,,Springer,Not available,Core deviation minimizing auctions,6de2e534f33e7c9e8f10382e8b49b1fd,http://dx.doi.org/10.1007/s00182-014-0433-y 4214,In a stylized environment with complementary products we study a class of dominant strategy implementable direct mechanisms and focus on the objective of minimizing the expected surplus from core deviations. For this class of mechanisms we formulate the core deviation minimization problem as a calculus of variations problem and numerically solve it for some interesting special cases. We then compare the core deviation surplus in the optimal auction (CDMA) to that in Vickrey-Clark-Groves mechanism (VCG) and core-selecting auctions (CSAs). We find that the expected surplus from core deviations can be significantly smaller in CDMA than that in both VCG and CSAs.,hadi yektas,Not available,2015.0,10.1007/s00182-014-0433-y,International Journal of Game Theory,E.2015,False,,Springer,Not available,Core deviation minimizing auctions,6de2e534f33e7c9e8f10382e8b49b1fd,http://dx.doi.org/10.1007/s00182-014-0433-y 4215,We study multi-unit combinatorial auctions with ,niv buchbinder,Not available,2015.0,10.1007/s00453-013-9854-4,Algorithmica,Niv2015,False,,Springer,Not available,Incentive Compatible Mulit-Unit Combinatorial Auctions: A Primal Dual Approach,134d5e0d2e16759ee66ce144b83f7217,http://dx.doi.org/10.1007/s00453-013-9854-4 4216,We study multi-unit combinatorial auctions with ,rica gonen,Not available,2015.0,10.1007/s00453-013-9854-4,Algorithmica,Niv2015,False,,Springer,Not available,Incentive Compatible Mulit-Unit Combinatorial Auctions: A Primal Dual Approach,134d5e0d2e16759ee66ce144b83f7217,http://dx.doi.org/10.1007/s00453-013-9854-4 4217,This paper establishes existence and uniqueness of Quantal Response Equilibrium (QRE) in a double auction. The concept of QRE has the intuitive property that a deviation from best response is less likely the higher the cost associated with the deviation itself. Thanks to such property the QRE accommodates stochastic elements in the analysis of the strategic decision-making that arises in the double auction. By providing a theoretical alternative to the Bayesian Nash Equilibrium model the QRE model offers an appealing tool for analyzing data of double auction experiments.,claudia neri,Not available,2015.0,10.1007/s40505-014-0038-4,Economic Theory Bulletin,Claudia2015,False,,Springer,Not available,Quantal response equilibrium in a double auction,49e5a66bfcebbd52dc5081bd056276c8,http://dx.doi.org/10.1007/s40505-014-0038-4 4218,Auctions are a unique allocating device of great practical importance. They present situations that cannot easily be fit into the neat taxonomy of Neoclassical Economic Analysis. For instance textbook theory tells us that a market with one seller and many buyers is a monopolistic market structure. But what if the seller is passive as he is in the Auction? Does this situation still qualify as a monopolistic situation with all of the typical connotations that that term implies? Obviously not. In addition our textbooks tell us that price discrimination is the result of the profit maximizing behavior of monopolies. However we have seen that buyers in a competitive bidding process can very naturally discriminate the price of the good they are bidding for on their own. Is a single price for a homogeneous good then still evidence of a “competitive” process?These questions and several others were raised in this paper and I hope dealt with in a satisfactory manner. The point that must be stressed however is that the auctioning process is an extremeley complex subject and in light of its empirical significance must be met with far more analysis than economists have offered in the past.,a. schotter,Not available,1974.0,10.1007/BF01766875,International Journal of Game Theory,A.1974,False,,Springer,Not available,Auctioning Böhm-Bawerk's horses,a80190a246acfb6ea37e6bcc5b56e966,http://dx.doi.org/10.1007/BF01766875 4219,Maskin and Riley (Games Econ Behav 45:395–409 ,todd kaplan,Not available,2015.0,10.1007/s40505-014-0049-1,Economic Theory Bulletin,R.2015,False,,Springer,Not available,Multiple equilibria in asymmetric first-price auctions,29a2c0da0f9913079f9369383f660451,http://dx.doi.org/10.1007/s40505-014-0049-1 4220,Maskin and Riley (Games Econ Behav 45:395–409 ,shmuel zamir,Not available,2015.0,10.1007/s40505-014-0049-1,Economic Theory Bulletin,R.2015,False,,Springer,Not available,Multiple equilibria in asymmetric first-price auctions,29a2c0da0f9913079f9369383f660451,http://dx.doi.org/10.1007/s40505-014-0049-1 4221,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,karine brisset,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 4222,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,francois cochard,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 4223,In this paper we run a laboratory experiment to compare two mechanisms in a procurement setting: Right-of-First-Refusal (ROFR) where the incumbent supplier is granted a privileged position versus standard First-Price-Auction (FPA). To this end we have subjects compete against a computerized agent programmed to behave in a risk-neutral way (i) in a FPA and (ii) in a ROFR auction where the “incumbent” bidder is the computer. In contrast with theory we observe that on average bidders are slightly but significantly more aggressive under the ROFR when their costs are such that they are predicted to behave identically under both auction procedures. For the sub-sample of subjects for whom we can estimate a CRRA parameter we confirm the theoretical prediction that the buyer’s expected cost is larger in the ROFR if the newcomer is not sufficiently risk-averse.,francois marechal,Not available,2015.0,10.1007/s11238-014-9438-z,Theory and Decision,Karine2015,False,,Springer,Not available,Is the newcomer more aggressive when the incumbent is granted a Right-of-First-Refusal in a procurement auction? Experimental Evidence,18a72cb77d5512983df3ba69271d68c1,http://dx.doi.org/10.1007/s11238-014-9438-z 4224,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,jian jiang,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 4225,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,jiandong li,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 4226,A new network selection strategy based on auction theory is proposed to resolve the problem caused by the selectivity of the users. In switched network selection policy each user selects only a single network. An optimal bid is obtained according to both quality function and interference quality function. Then the network allocates the resource to the user who gives the highest bid. In parallel network selection scheme each user can access multiple networks; however the user who gives the higher bid will obtain more resources. Both the mathematical analysis and simulations show that the network selection strategy based on auction theory can achieve higher network throughput and lower outage probability.,xinyi liu,Not available,2015.0,10.1007/s11432-014-5195-4,Science China Information Sciences,Jian2015,False,,Springer,Not available,Network selection policy based on auction theory in heterogeneous wireless communication systems,b6f75960de9002189c60d2381953640a,http://dx.doi.org/10.1007/s11432-014-5195-4 4227,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,domenico colucci,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 4228,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,nicola doni,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 4229,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,teck ho,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 4230,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,theodore turocy,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 4231,This work studies a reverse auction in which a buyer needs to acquire a given good or service from suppliers having different costs. The sellers are characterized by qualities that are the buyer’s private information. Comparing the outcomes of different policies regarding the revelation of such information prior to the auction we find that maximizing the procurer’s expected utility requires either concealing or privately revealing the suppliers’ quality depending on the degree of heterogeneity in costs and qualities. Asymmetric revelation if allowed increases the buyer’s expected utility when costs differences are large. Conversely social efficiency calls for public disclosure of qualities. Hence there is a trade-off between efficiency and rent extraction by which the buyer has incentive to withhold information that would benefit social welfare.,vincenzo valori,Not available,2015.0,10.1007/s00712-014-0405-5,Journal of Economics,Domenico2015,False,,Springer,Not available,Information policies in procurement auctions with heterogeneous suppliers,670cbc5206f26c52f35e2d3a4fc898be,http://dx.doi.org/10.1007/s00712-014-0405-5 4232,We study ,mangesh gupte,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 4233,We study ,darja krushevskaja,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 4234,We study ,s. muthukrishnan,Not available,2015.0,10.1007/s00453-013-9832-x,Algorithmica,Mangesh2015,False,,Springer,Not available,Analyses of Cardinal Auctions,ce3d5b6aafccc14e585e9016bf1f268b,http://dx.doi.org/10.1007/s00453-013-9832-x 4235,We study a dynamic auction mechanism in the context of private provision of a discrete public good under incomplete information. The bidders have private valuations and the cost of the public good is common knowledge. No bidder is willing to provide the good on her own. We show that a natural application of open ascending auctions in such environments fails dramatically: The probability of provision is zero in any equilibrium. The mechanism effectively auctions off the ‘right’ to be the last one to contribute but intuition suggests that neither player wishes to be the last one to contribute. Since the player who contributes first has the advantage of being able to free ride on the contributions of the other players no player wants to ‘win’ the auction.,murat yilmaz,Not available,2015.0,10.1007/s11238-014-9433-4,Theory and Decision,Murat2015,False,,Springer,Not available,Auctioning a discrete public good under incomplete information,28806d485d604dd95aaf73bcbeb6a373,http://dx.doi.org/10.1007/s11238-014-9433-4 4236,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,lawrence ausubel,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 4237,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,justin burkett,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 4238,We perform laboratory experiments comparing auctions with endogenous budget constraints. A principal imposes a budget limit on a bidder (an agent) in response to a principal-agent problem. In contrast to the existing literature where budget constraints are exogenous this theory predicts that tighter constraints will be imposed in first-price auctions than in second-price auctions tending to offset any advantages attributable to the lower bidding strategy of the first-price auction. Our experimental findings support this theory: principals are found to set significantly lower budgets in first-price auctions. The result holds robustly whether the principal chooses a budget for human bidders or computerized bidders. We further show that the empirical revenue difference between first- and second-price formats persists with and without budget constraints.,emel filiz-ozbay,Not available,2017.0,10.1007/s10683-017-9520-9,Experimental Economics,M.2017,False,,Springer,Not available,An experiment on auctions with endogenous budget constraints,5d97450481d0f721d02e83b0443bb760,http://dx.doi.org/10.1007/s10683-017-9520-9 4239,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,rui hu,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 4240,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,jinzhong guo,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 4241,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,elizabeth watson,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 4242,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,qinghua chen,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 4243,We study a type of complex system arising from economics the lowest unique bid auction (LUBA) system which is a new generation of online markets. Different from the traditional auction in which the winner is who bids the highest price in LUBA the winner is whoever places the lowest of all unique bids. In this paper we propose a multi-agent model to factually describes the human psychologies of the decision-making process in LUBA. The model produces bid-price distributions that are in excellent agreement with those from the real data including the whole inverted-J shape which is a general feature of the real bid price distribution and the exponential decreasing shape in the higher price range. This implies that it is possible for us to capture the essential features of human psychologies in the competitive environment as exemplified by LUBA and that we may provide significant quantitative insights into complex socio-economic phenomena.,tao zheng,Not available,2017.0,10.1007/s10614-016-9614-z,Computational Economics,Rui2017,False,,Springer,Not available,The Psychological Force Model for Lowest Unique Bid Auction,3e1db4bd6e0e45e237b56d014406a7dd,http://dx.doi.org/10.1007/s10614-016-9614-z 4244,We employ weak dominance to analyze both first-price and second-price auctions under the discrete private-value setting. We provide a condition under which the expected revenue from second-price auction is higher than that of first-price auction. We also provide implications for large auctions including the “virtual” revenue equivalence.,makoto shimoji,Not available,2017.0,10.1007/s10058-017-0202-z,Review of Economic Design,Makoto2017,True,,Springer,Not available,Revenue comparison of discrete private-value auctions via weak dominance,8bd820d6c4d1ac23768ca98f5fc0a63c,http://dx.doi.org/10.1007/s10058-017-0202-z 4245,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,sotiris georganas,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 4246,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,dan levin,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 4247,Bidding one’s value in a second-price private-value auction is a weakly dominant solution (Vickrey in J Finance 16(1):8–37 ,peter mcgee,Not available,2017.0,10.1007/s10683-017-9510-y,Experimental Economics,Sotiris2017,False,,Springer,Not available,Optimistic irrationality and overbidding in private value auctions,ff09c5a993161c8a70ba5d8beb018876,http://dx.doi.org/10.1007/s10683-017-9510-y 4248,Reported literature in sponsored search advertising markets asserts that at equilibrium an advertiser has no incentive to swap her position with another advertiser and her bid on a keyword would be bound with the click value acting as an upper bound. We investigate a closer-to-practice case where advertisers do not have an ex-ante known value per click and her bid on a keyword is an outcome of simple cost-cap heuristics on a portfolio of keywords. Using simulations and an experimental setup containing advertisers that have the same upper-cap on cost we show that the distribution of advertisers’ cost per click and bids are emergent in nature. Keywords exhibit ex post heterogeneity in observed valuation even when all advertisers bid under the same cost-cap constraint. We explore the dynamics of the market such as temporal stability of advertiser’s bids and advertiser’s rank based on the click-share along with the distribution of ex post valuation of keywords associated with this closer to practice setup. The results call for a richer understanding of these markets that can incorporate temporal interdependence between auctions of a keyword as well as boundedly rational behavior of advertisers working under imperfect information.,agam gupta,Not available,2017.0,10.1007/s10614-016-9637-5,Computational Economics,Agam2017,False,,Springer,Not available,Emergent Heterogeneity in Keyword Valuation in Sponsored Search Markets: A Closer-to-Practice Perspective,187bdf538fac2731065d7a1460161f1b,http://dx.doi.org/10.1007/s10614-016-9637-5 4249,Reported literature in sponsored search advertising markets asserts that at equilibrium an advertiser has no incentive to swap her position with another advertiser and her bid on a keyword would be bound with the click value acting as an upper bound. We investigate a closer-to-practice case where advertisers do not have an ex-ante known value per click and her bid on a keyword is an outcome of simple cost-cap heuristics on a portfolio of keywords. Using simulations and an experimental setup containing advertisers that have the same upper-cap on cost we show that the distribution of advertisers’ cost per click and bids are emergent in nature. Keywords exhibit ex post heterogeneity in observed valuation even when all advertisers bid under the same cost-cap constraint. We explore the dynamics of the market such as temporal stability of advertiser’s bids and advertiser’s rank based on the click-share along with the distribution of ex post valuation of keywords associated with this closer to practice setup. The results call for a richer understanding of these markets that can incorporate temporal interdependence between auctions of a keyword as well as boundedly rational behavior of advertisers working under imperfect information.,biswatosh saha,Not available,2017.0,10.1007/s10614-016-9637-5,Computational Economics,Agam2017,False,,Springer,Not available,Emergent Heterogeneity in Keyword Valuation in Sponsored Search Markets: A Closer-to-Practice Perspective,187bdf538fac2731065d7a1460161f1b,http://dx.doi.org/10.1007/s10614-016-9637-5 4250,Reported literature in sponsored search advertising markets asserts that at equilibrium an advertiser has no incentive to swap her position with another advertiser and her bid on a keyword would be bound with the click value acting as an upper bound. We investigate a closer-to-practice case where advertisers do not have an ex-ante known value per click and her bid on a keyword is an outcome of simple cost-cap heuristics on a portfolio of keywords. Using simulations and an experimental setup containing advertisers that have the same upper-cap on cost we show that the distribution of advertisers’ cost per click and bids are emergent in nature. Keywords exhibit ex post heterogeneity in observed valuation even when all advertisers bid under the same cost-cap constraint. We explore the dynamics of the market such as temporal stability of advertiser’s bids and advertiser’s rank based on the click-share along with the distribution of ex post valuation of keywords associated with this closer to practice setup. The results call for a richer understanding of these markets that can incorporate temporal interdependence between auctions of a keyword as well as boundedly rational behavior of advertisers working under imperfect information.,uttam sarkar,Not available,2017.0,10.1007/s10614-016-9637-5,Computational Economics,Agam2017,False,,Springer,Not available,Emergent Heterogeneity in Keyword Valuation in Sponsored Search Markets: A Closer-to-Practice Perspective,187bdf538fac2731065d7a1460161f1b,http://dx.doi.org/10.1007/s10614-016-9637-5 4251,A Secondary Market (SM) mechanism is used to allow the exchange of unused resources between Origin Servers (content-generating entities) that claim and reserve resources from Content Delivery Networks (CDNs). Using a Predictive Reservation Scheme network and disk resources are being monitored through well-established techniques (Kernel Regression Estimators) in a given time frame. We show that the SM mechanism significantly improves the efficiency and robustness of our Predictive Reservation Scheme by allowing fast exchange of unused resources between the Origin Servers (CDN Clients) either by implementing socially optimal practices or by allowing automatic electronic auctions at the end of day (EOD) or at shorter time intervals. Therefore all the involved players (including the CDN itself) benefit from the rationalized use of CDN resources.,elias vathias,Not available,2017.0,10.1007/s11066-017-9120-z,NETNOMICS: Economic Research and Electronic Networking,Elias2017,False,,Springer,Not available,A secondary market metaphor for content delivery networks,b962d0055ba6bb5c404199b142d37319,http://dx.doi.org/10.1007/s11066-017-9120-z 4252,We revisit the result that in laboratory independent private values auction the first-price sealed bid and descending clock (or Dutch) implementations are not isomorphic. We investigate the hypothesis that this arises from framing and presentation effects. Our design focuses on a careful construction of subject interfaces that present the two environments as similarly as possible. Our sessions also consist of more auction periods to test whether any initial framing effects subsequently decrease over time. We find the difference between the implementations persists. To further investigate the difference we report on an intermediate implementation which operates like the Dutch auction but in which the clock continues to tick to the lowest price without informing bidders when others have bid on the object.,raymond battalio,Not available,2007.0,10.1007/s10683-006-9130-4,Experimental Economics,L.2007,False,,Springer,Not available,Framing the first-price auction,be43eeb156510b78f4a8b31e889a7b8c,http://dx.doi.org/10.1007/s10683-006-9130-4 4253,A Secondary Market (SM) mechanism is used to allow the exchange of unused resources between Origin Servers (content-generating entities) that claim and reserve resources from Content Delivery Networks (CDNs). Using a Predictive Reservation Scheme network and disk resources are being monitored through well-established techniques (Kernel Regression Estimators) in a given time frame. We show that the SM mechanism significantly improves the efficiency and robustness of our Predictive Reservation Scheme by allowing fast exchange of unused resources between the Origin Servers (CDN Clients) either by implementing socially optimal practices or by allowing automatic electronic auctions at the end of day (EOD) or at shorter time intervals. Therefore all the involved players (including the CDN itself) benefit from the rationalized use of CDN resources.,eleftheria katsarou,Not available,2017.0,10.1007/s11066-017-9120-z,NETNOMICS: Economic Research and Electronic Networking,Elias2017,False,,Springer,Not available,A secondary market metaphor for content delivery networks,b962d0055ba6bb5c404199b142d37319,http://dx.doi.org/10.1007/s11066-017-9120-z 4254,A Secondary Market (SM) mechanism is used to allow the exchange of unused resources between Origin Servers (content-generating entities) that claim and reserve resources from Content Delivery Networks (CDNs). Using a Predictive Reservation Scheme network and disk resources are being monitored through well-established techniques (Kernel Regression Estimators) in a given time frame. We show that the SM mechanism significantly improves the efficiency and robustness of our Predictive Reservation Scheme by allowing fast exchange of unused resources between the Origin Servers (CDN Clients) either by implementing socially optimal practices or by allowing automatic electronic auctions at the end of day (EOD) or at shorter time intervals. Therefore all the involved players (including the CDN itself) benefit from the rationalized use of CDN resources.,stathes hadjiefthymiades,Not available,2017.0,10.1007/s11066-017-9120-z,NETNOMICS: Economic Research and Electronic Networking,Elias2017,False,,Springer,Not available,A secondary market metaphor for content delivery networks,b962d0055ba6bb5c404199b142d37319,http://dx.doi.org/10.1007/s11066-017-9120-z 4255,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,bruno wichmann,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 4256,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,peter boxall,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 4257,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,scott wilson,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 4258,Conservation auctions have the potential to increase the efficiency of payments to farmers to adopt conservation-friendly management practices by fostering competition among them. The literature considers bidders that have complete information about the costs of adoption and optimal bidding behavior reflects this information advantage. Farmers seek information rents and bids decrease when risk aversion increases because farmers are more averse to losing the auction. We contribute to the literature by allowing for cost risk. Our paper shows that farmers must balance the risk of losing the auction (thus foregoing information rent) with the risk of submitting a bid that is not high enough to pay the costs of adopting conservation practices (thus incurring losses). We design an experiment to trade off these two risks and examine how risk aversion affects bidding behavior when participants face different sources and levels of risk. Our experiment contributes to a small literature on experimental auctions with risky product valuations. We find that participants decrease their bids as risk aversion increases even in auctions with cost risk suggesting that the risk of losing the auction dominates. These findings uncover new challenges for the practical implementation of conservation auctions as an efficient policy instrument.,orsolya pergery,Not available,2017.0,10.1007/s10640-016-0063-x,Environmental and Resource Economics,Bruno2017,False,,Springer,Not available,Auctioning Risky Conservation Contracts,97dafed8277c05931ee9048e3bae9fed,http://dx.doi.org/10.1007/s10640-016-0063-x 4259,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,zhen guo,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 4260,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,yu fu,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 4261,In modern times people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper we proposed a secure auction system in which the bids will not be revealed and no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.,chunjie cao,Not available,2017.0,10.1186/s13635-017-0068-1,EURASIP Journal on Information Security,Zhen2017,True,,Springer,Not available,Secure first-price sealed-bid auction scheme,3d2f61a0389666157890f6d82f164b3c,http://dx.doi.org/10.1186/s13635-017-0068-1 4262,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,zhili chen,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 4263,I study monotonicity of equilibrium strategies in first-price auctions with asymmetric bidders risk aversion affiliated types and interdependent values. Every mixed-strategy equilibrium is shown to be outcome-equivalent to a monotone pure-strategy equilibrium under the “priority rule” for breaking ties. This provides a missing link to establish uniqueness in the “general symmetric model” of Milgrom and Weber (Econometrica 50:1089–1122 1982). Non-monotone equilibria can exist under the “coin-flip rule” but they are distinguishable: all non-monotone equilibria have positive probability of ties whereas all monotone equilibria have zero probability of ties. This provides a justification for the standard empirical practice of restricting attention to monotone strategies.,david mcadams,Not available,2007.0,10.1007/s00182-006-0038-1,International Journal of Game Theory,David2007,False,,Springer,Not available,Monotonicity in asymmetric first-price auctions with affiliation,836a11156b9eacfdaee8228e7045d65c,http://dx.doi.org/10.1007/s00182-006-0038-1 4264,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,ruihong che,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 4265,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,hong zhong,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 4266,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,miaomiao tian,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 4267,Recently truthful spectrum auctions have been extensively studied to improve spectrum utilization. Furthermore privacy preservation in truthful spectrum auctions has also been taken into account. However existing work mainly focuses on privacy-preserving homogenous spectrum auctions while the case of heterogeneous spectrum auctions is ignored. In this paper we propose PATH a privacy-preserving auction for single-sided heterogeneous spectrum allocations. Through organically combining three security techniques: homomorphic encryption secret sharing and garbled circuit PATH reveals nothing about buyers’ bids and identities beyond the auction outcome to any participant party. Specifically PATH not only maintains the properties of truthfulness and spectrum reuse of the underlining auction mechanism TAMES but also implements the first provably secure solution for single-sided heterogeneous spectrum auctions. Finally experimental results demonstrate that PATH incurs only limited computation and communication overhead and it is feasible for large-scale applications.,jie cui,Not available,2017.0,10.1007/s11276-017-1628-5,Wireless Networks,Zhili2017,False,,Springer,Not available,PATH: privacy-preserving auction for heterogeneous spectrum allocations,3ff79b954666fb639163e36a62af3366,http://dx.doi.org/10.1007/s11276-017-1628-5 4268,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,francisco alvarez,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 4269,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,cristina mazon,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 4270,We study the efficiency of the uniform auction as an allocation mechanism for emission permits among polluting firms. In our model firms have private information about their abatement costs which differ across firms and across units and bidders’ demands are linear. We show that there is a continuum of interior Bayesian Nash equilibria and only one is efficient minimizing abatement costs. We find that the existence of many bidders is not a sufficient condition to guarantee an efficient equilibrium in the uniform auction. Additionally bidders’ types have to be uncorrelated.,francisco andre,Not available,2017.0,10.1007/s00199-017-1089-1,Economic Theory,Francisco2017,False,,Springer,Not available,Assigning pollution permits: are uniform auctions efficient?,1283dd5fad87ba5e45d227762b57ca76,http://dx.doi.org/10.1007/s00199-017-1089-1 4271,Auction theory has undergone two waves of innovation. The first which originated with Vickrey (,lawrence ausubel,Not available,2018.0,10.1057/978-1-349-95189-5_2746,The New Palgrave Dictionary of Economics,M.2018,False,,Springer,Not available,Auctions (Theory),9dd1f22da0823dc35d380d81bd58b1fc,http://dx.doi.org/10.1057/978-1-349-95189-5_2746 4272,Auctioning has a long history and is reported to have been used in Babylon as early as 500 B.C. The entire Roman Empire was sold off using auction in 193 A.D. [83]. With time auction theory has evolved with more sophisticated and mature auction procedures. Auction is considered as an efficient and fair mechanism as it provides equal opportunity to both the seller and the buyer. The price of the resources is decided on the basis of the value of the resources for the bidders that makes higher revenue. In early auction days and even during its evolution only antiques and art matters were sold using auction but now various commodities e.g. fish bond spectrum computing resources are sold using auction because of its multifaceted benefits. After the introduction of mechanism design auction has become a great success in economics for the resource allocation. Mechanism design and information and communication technologies (ICTs) are the two major responsible factors that made game theory and optimization an effective tool for auction design to achieve specific goals. In economics the rich literature and practical implementation on auction are available. Because of involvement of pricing in resource allocation in Cloud computing good possibilities can be explored for applying auction in Cloud computing. Academicians have proposed various types of auction models that can be applied in different scenarios in Cloud computing. Spot market has been become a milestone for both academicians and professionals to explore auction in greater depth. Amazon a giant in the Cloud computing market practically gave a push to implement dynamic pricing using auction. Plenty of works on auction theory variants of auction as well as its applications for suitable scenario are available in the form of books survey papers etc. The aim of this chapter is to provide a detailed description of most important findings of the auction so that academicians and researchers can work their way through these findings in Cloud computing.,gaurav baranwal,Not available,2018.0,10.1007/978-981-10-8737-0_2,Auction Based Resource Provisioning in Cloud Computing,Gaurav2018,False,,Springer,Not available,Auction Theory,c1aca8358c5fb0fece4c572c7acdff18,http://dx.doi.org/10.1007/978-981-10-8737-0_2 4273,Auctioning has a long history and is reported to have been used in Babylon as early as 500 B.C. The entire Roman Empire was sold off using auction in 193 A.D. [83]. With time auction theory has evolved with more sophisticated and mature auction procedures. Auction is considered as an efficient and fair mechanism as it provides equal opportunity to both the seller and the buyer. The price of the resources is decided on the basis of the value of the resources for the bidders that makes higher revenue. In early auction days and even during its evolution only antiques and art matters were sold using auction but now various commodities e.g. fish bond spectrum computing resources are sold using auction because of its multifaceted benefits. After the introduction of mechanism design auction has become a great success in economics for the resource allocation. Mechanism design and information and communication technologies (ICTs) are the two major responsible factors that made game theory and optimization an effective tool for auction design to achieve specific goals. In economics the rich literature and practical implementation on auction are available. Because of involvement of pricing in resource allocation in Cloud computing good possibilities can be explored for applying auction in Cloud computing. Academicians have proposed various types of auction models that can be applied in different scenarios in Cloud computing. Spot market has been become a milestone for both academicians and professionals to explore auction in greater depth. Amazon a giant in the Cloud computing market practically gave a push to implement dynamic pricing using auction. Plenty of works on auction theory variants of auction as well as its applications for suitable scenario are available in the form of books survey papers etc. The aim of this chapter is to provide a detailed description of most important findings of the auction so that academicians and researchers can work their way through these findings in Cloud computing.,dinesh kumar,Not available,2018.0,10.1007/978-981-10-8737-0_2,Auction Based Resource Provisioning in Cloud Computing,Gaurav2018,False,,Springer,Not available,Auction Theory,c1aca8358c5fb0fece4c572c7acdff18,http://dx.doi.org/10.1007/978-981-10-8737-0_2 4274,In this paper we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically we consider behavioural types that are ,perukrishnen vytelingum,Not available,2007.0,10.1007/978-3-540-72502-2_8,Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets,Perukrishnen2007,False,,Springer,Not available,Evolutionary Stability of Behavioural Types in the Continuous Double Auction,ae4788137e5e6e537d8db1a4a512e66d,http://dx.doi.org/10.1007/978-3-540-72502-2_8 4275,Auctioning has a long history and is reported to have been used in Babylon as early as 500 B.C. The entire Roman Empire was sold off using auction in 193 A.D. [83]. With time auction theory has evolved with more sophisticated and mature auction procedures. Auction is considered as an efficient and fair mechanism as it provides equal opportunity to both the seller and the buyer. The price of the resources is decided on the basis of the value of the resources for the bidders that makes higher revenue. In early auction days and even during its evolution only antiques and art matters were sold using auction but now various commodities e.g. fish bond spectrum computing resources are sold using auction because of its multifaceted benefits. After the introduction of mechanism design auction has become a great success in economics for the resource allocation. Mechanism design and information and communication technologies (ICTs) are the two major responsible factors that made game theory and optimization an effective tool for auction design to achieve specific goals. In economics the rich literature and practical implementation on auction are available. Because of involvement of pricing in resource allocation in Cloud computing good possibilities can be explored for applying auction in Cloud computing. Academicians have proposed various types of auction models that can be applied in different scenarios in Cloud computing. Spot market has been become a milestone for both academicians and professionals to explore auction in greater depth. Amazon a giant in the Cloud computing market practically gave a push to implement dynamic pricing using auction. Plenty of works on auction theory variants of auction as well as its applications for suitable scenario are available in the form of books survey papers etc. The aim of this chapter is to provide a detailed description of most important findings of the auction so that academicians and researchers can work their way through these findings in Cloud computing.,zahid raza,Not available,2018.0,10.1007/978-981-10-8737-0_2,Auction Based Resource Provisioning in Cloud Computing,Gaurav2018,False,,Springer,Not available,Auction Theory,c1aca8358c5fb0fece4c572c7acdff18,http://dx.doi.org/10.1007/978-981-10-8737-0_2 4276,Auctioning has a long history and is reported to have been used in Babylon as early as 500 B.C. The entire Roman Empire was sold off using auction in 193 A.D. [83]. With time auction theory has evolved with more sophisticated and mature auction procedures. Auction is considered as an efficient and fair mechanism as it provides equal opportunity to both the seller and the buyer. The price of the resources is decided on the basis of the value of the resources for the bidders that makes higher revenue. In early auction days and even during its evolution only antiques and art matters were sold using auction but now various commodities e.g. fish bond spectrum computing resources are sold using auction because of its multifaceted benefits. After the introduction of mechanism design auction has become a great success in economics for the resource allocation. Mechanism design and information and communication technologies (ICTs) are the two major responsible factors that made game theory and optimization an effective tool for auction design to achieve specific goals. In economics the rich literature and practical implementation on auction are available. Because of involvement of pricing in resource allocation in Cloud computing good possibilities can be explored for applying auction in Cloud computing. Academicians have proposed various types of auction models that can be applied in different scenarios in Cloud computing. Spot market has been become a milestone for both academicians and professionals to explore auction in greater depth. Amazon a giant in the Cloud computing market practically gave a push to implement dynamic pricing using auction. Plenty of works on auction theory variants of auction as well as its applications for suitable scenario are available in the form of books survey papers etc. The aim of this chapter is to provide a detailed description of most important findings of the auction so that academicians and researchers can work their way through these findings in Cloud computing.,deo vidyarthi,Not available,2018.0,10.1007/978-981-10-8737-0_2,Auction Based Resource Provisioning in Cloud Computing,Gaurav2018,False,,Springer,Not available,Auction Theory,c1aca8358c5fb0fece4c572c7acdff18,http://dx.doi.org/10.1007/978-981-10-8737-0_2 4277,Hospitals are confronted with many challenges. On the one hand demographic changes demand additional services. On the other hand hospitals have to profitably manage the supply of services. That requires the efficient use of resources. These resources include the nurses who perform the services. Nurses as human beings cannot be managed in the same way as any other resource. They have in terms of balancing between their work and life certain ideas about their working schedule. The creation of a solid roster known as the problem of nurse rostering is a challenging task in operations research. In particular considering nurses’ ,benno woskowski,Not available,2018.0,10.1007/978-3-319-61603-2_9,Game Theory in Management Accounting,Benno2018,False,,Springer,Not available,The Use of Auction in Nurse Rostering,10f47028582170fb215d043d66bb26fc,http://dx.doi.org/10.1007/978-3-319-61603-2_9 4278,Data as a Service (DaaS) is the next emerging technology in cloud computing research. Small clouds operating as a group may exploit the DaaS efficiently to perform substantial amount of work. In this paper an auction framework is studied when the small clouds are strategic in nature. We present the system model and formal definition of the problem. Several auction DaaS-based mechanisms are proposed and their correctness and computational complexity analysed. To the best of our knowledge this is the first and realistic attempt to study the DaaS in strategic setting.,anjan bandyopadhyay,Not available,2018.0,10.1007/978-3-319-75928-9_65,Advances in Internet Data & Web Technologies,Anjan2018,False,,Springer,Not available,An Auction Framework for DaaS in Cloud Computing,384532d778157ed0fd9d012196125d78,http://dx.doi.org/10.1007/978-3-319-75928-9_65 4279,Data as a Service (DaaS) is the next emerging technology in cloud computing research. Small clouds operating as a group may exploit the DaaS efficiently to perform substantial amount of work. In this paper an auction framework is studied when the small clouds are strategic in nature. We present the system model and formal definition of the problem. Several auction DaaS-based mechanisms are proposed and their correctness and computational complexity analysed. To the best of our knowledge this is the first and realistic attempt to study the DaaS in strategic setting.,fatos xhafa,Not available,2018.0,10.1007/978-3-319-75928-9_65,Advances in Internet Data & Web Technologies,Anjan2018,False,,Springer,Not available,An Auction Framework for DaaS in Cloud Computing,384532d778157ed0fd9d012196125d78,http://dx.doi.org/10.1007/978-3-319-75928-9_65 4280,Data as a Service (DaaS) is the next emerging technology in cloud computing research. Small clouds operating as a group may exploit the DaaS efficiently to perform substantial amount of work. In this paper an auction framework is studied when the small clouds are strategic in nature. We present the system model and formal definition of the problem. Several auction DaaS-based mechanisms are proposed and their correctness and computational complexity analysed. To the best of our knowledge this is the first and realistic attempt to study the DaaS in strategic setting.,sajal mukhopadhyay,Not available,2018.0,10.1007/978-3-319-75928-9_65,Advances in Internet Data & Web Technologies,Anjan2018,False,,Springer,Not available,An Auction Framework for DaaS in Cloud Computing,384532d778157ed0fd9d012196125d78,http://dx.doi.org/10.1007/978-3-319-75928-9_65 4281,In this paper we design information elicitation mechanisms for Bayesian auctions. While in Bayesian mechanism design the distributions of the players’ private types are often assumed to be common knowledge information elicitation considers the situation where the players know the distributions better than the decision maker. To weaken the information assumption in Bayesian auctions we consider an information structure where the knowledge about the distributions is ,jing chen,Not available,2018.0,10.1007/978-3-319-99660-8_5,Algorithmic Game Theory,Jing2018,False,,Springer,Not available,Information Elicitation for Bayesian Auctions,91d65469c678dd42494b47dce05f5d37,http://dx.doi.org/10.1007/978-3-319-99660-8_5 4282,In this paper we design information elicitation mechanisms for Bayesian auctions. While in Bayesian mechanism design the distributions of the players’ private types are often assumed to be common knowledge information elicitation considers the situation where the players know the distributions better than the decision maker. To weaken the information assumption in Bayesian auctions we consider an information structure where the knowledge about the distributions is ,bo li,Not available,2018.0,10.1007/978-3-319-99660-8_5,Algorithmic Game Theory,Jing2018,False,,Springer,Not available,Information Elicitation for Bayesian Auctions,91d65469c678dd42494b47dce05f5d37,http://dx.doi.org/10.1007/978-3-319-99660-8_5 4283,In this paper we design information elicitation mechanisms for Bayesian auctions. While in Bayesian mechanism design the distributions of the players’ private types are often assumed to be common knowledge information elicitation considers the situation where the players know the distributions better than the decision maker. To weaken the information assumption in Bayesian auctions we consider an information structure where the knowledge about the distributions is ,yingkai li,Not available,2018.0,10.1007/978-3-319-99660-8_5,Algorithmic Game Theory,Jing2018,False,,Springer,Not available,Information Elicitation for Bayesian Auctions,91d65469c678dd42494b47dce05f5d37,http://dx.doi.org/10.1007/978-3-319-99660-8_5 4284,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,john kagel,Not available,2018.0,10.1057/978-1-349-95189-5_2671,The New Palgrave Dictionary of Economics,H.2018,False,,Springer,Not available,Auctions (Experiments),20d043104cc8fc13cb9378e5edd1cd26,http://dx.doi.org/10.1057/978-1-349-95189-5_2671 4285,In this paper we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically we consider behavioural types that are ,dave cliff,Not available,2007.0,10.1007/978-3-540-72502-2_8,Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets,Perukrishnen2007,False,,Springer,Not available,Evolutionary Stability of Behavioural Types in the Continuous Double Auction,ae4788137e5e6e537d8db1a4a512e66d,http://dx.doi.org/10.1007/978-3-540-72502-2_8 4286,Experiments permit rigorous investigations of auction theory generating a dialogue with theorists and policymakers. In single-unit private value auctions the revenue equivalence theorem fails but the comparative static predictions of Nash bidding theory hold indicating that bidders are responsive to the primary economic forces present in the theory. In single-unit common value auctions inexperienced bidders invariably suffer from a ‘winner’s curse’ and the comparative static predictions of the theory fail but more experienced bidders do substantially better. Recent research dealing with Internet auctions mixed private and common value auctions and multiunit demand auctions are surveyed as well.,dan levin,Not available,2018.0,10.1057/978-1-349-95189-5_2671,The New Palgrave Dictionary of Economics,H.2018,False,,Springer,Not available,Auctions (Experiments),20d043104cc8fc13cb9378e5edd1cd26,http://dx.doi.org/10.1057/978-1-349-95189-5_2671 4287,We consider a supply chain management problem where a business alliance of small capacity retailers needs to collectively select a unique supplier considering the assignment’s efficiency at both the alliance and retailers’ level. We model the alliance as a multi-agent system. For this model we present a modified Vickrey auction algorithm with regret minimization and compare it experimentally with aggregation of preferences by voting and standard Vickrey auction. Through simulation we show that the proposed method on average reaches globally efficient and individually acceptable solutions. The solutions are evaluated in terms of different social welfare values.,marin lujak,Not available,2018.0,10.1007/978-3-319-66379-1_6,Intelligent Distributed Computing XI,Marin2018,False,,Springer,Not available,A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions,6ea43ad30fbcaa16afd4ea845d37bf7b,http://dx.doi.org/10.1007/978-3-319-66379-1_6 4288,We consider a supply chain management problem where a business alliance of small capacity retailers needs to collectively select a unique supplier considering the assignment’s efficiency at both the alliance and retailers’ level. We model the alliance as a multi-agent system. For this model we present a modified Vickrey auction algorithm with regret minimization and compare it experimentally with aggregation of preferences by voting and standard Vickrey auction. Through simulation we show that the proposed method on average reaches globally efficient and individually acceptable solutions. The solutions are evaluated in terms of different social welfare values.,marija slavkovik,Not available,2018.0,10.1007/978-3-319-66379-1_6,Intelligent Distributed Computing XI,Marin2018,False,,Springer,Not available,A Modified Vickrey Auction with Regret Minimization for Uniform Alliance Decisions,6ea43ad30fbcaa16afd4ea845d37bf7b,http://dx.doi.org/10.1007/978-3-319-66379-1_6 4289,Along with substantial progress made recently in designing near-optimal mechanisms for multi-item auctions interesting structural questions have also been raised and studied. In particular is it true that the seller can always extract more revenue from a market where the buyers value the items higher than another market? In this paper we obtain such a revenue monotonicity result in a general setting. Precisely consider the revenue-maximizing combinatorial auction for ,andrew yao,Not available,2018.0,10.1007/978-3-319-99660-8_1,Algorithmic Game Theory,Chi-chih2018,False,,Springer,Not available,On Revenue Monotonicity in Combinatorial Auctions,bb34f49f893450b4270d926272b9479f,http://dx.doi.org/10.1007/978-3-319-99660-8_1 4290,Bayesian Epistemology bases its analysis of the objects under study on a prior a probability distribution which is in turn the subject matter in statistical learning and that of machine learning at least implicitly. We are interested in a game setting where the agents to be learned may shift in accordance with the data collector’s strategies. We focus on this issue of learning and exploiting for Myerson auction where a seller wants to gain information on bidders’ value distributions to achieve the maximum revenue. We show that a world of the power-law distribution would enable the auctioneer to achieve both but the bidders can consistently lie about their probability distribution to improve utility under the other distributions.,xiaotie deng,Not available,2018.0,10.1007/978-3-319-78455-7_14,Frontiers in Algorithmics,Xiaotie2018,False,,Springer,Not available,On Bayesian Epistemology of Myerson Auction,54c4bfbbdeae6f4dea8ce4876f08b3d0,http://dx.doi.org/10.1007/978-3-319-78455-7_14 4291,Bayesian Epistemology bases its analysis of the objects under study on a prior a probability distribution which is in turn the subject matter in statistical learning and that of machine learning at least implicitly. We are interested in a game setting where the agents to be learned may shift in accordance with the data collector’s strategies. We focus on this issue of learning and exploiting for Myerson auction where a seller wants to gain information on bidders’ value distributions to achieve the maximum revenue. We show that a world of the power-law distribution would enable the auctioneer to achieve both but the bidders can consistently lie about their probability distribution to improve utility under the other distributions.,keyu zhu,Not available,2018.0,10.1007/978-3-319-78455-7_14,Frontiers in Algorithmics,Xiaotie2018,False,,Springer,Not available,On Bayesian Epistemology of Myerson Auction,54c4bfbbdeae6f4dea8ce4876f08b3d0,http://dx.doi.org/10.1007/978-3-319-78455-7_14 4292," Composite service selection refers to the process of selecting an optimal set of web services out of a pool of available candidates based on their quality of service and price. The goal is to logically compose these atomic web services and create value-added composite services which in turn can be used to develop service-based systems. Existing approaches to composite service selection are mostly based on optimization and negotiation techniques. In this paper we study an emerging trend of composite service selection approaches based on auction models. These techniques benefit from the dynamic pricing of auction models compared to a fixed pricing approach and have the potential to incorporate the dependencies that exist between services constituting a composition. We propose a design framework that introduces two components which need to be addressed when developing an auction-based model for composite service selection: the elements in an auction-based model and a set of design decisions associated with those elements.",mahboobeh moghaddam,Not available,2018.0,10.1007/978-3-319-76587-7_7,Service Research and Innovation,Mahboobeh2018,False,,Springer,Not available,Auction-Based Models for Composite Service Selection: A Design Framework,d3815dc9449361c79455c9ec148c075d,http://dx.doi.org/10.1007/978-3-319-76587-7_7 4293," Composite service selection refers to the process of selecting an optimal set of web services out of a pool of available candidates based on their quality of service and price. The goal is to logically compose these atomic web services and create value-added composite services which in turn can be used to develop service-based systems. Existing approaches to composite service selection are mostly based on optimization and negotiation techniques. In this paper we study an emerging trend of composite service selection approaches based on auction models. These techniques benefit from the dynamic pricing of auction models compared to a fixed pricing approach and have the potential to incorporate the dependencies that exist between services constituting a composition. We propose a design framework that introduces two components which need to be addressed when developing an auction-based model for composite service selection: the elements in an auction-based model and a set of design decisions associated with those elements.",joseph davis,Not available,2018.0,10.1007/978-3-319-76587-7_7,Service Research and Innovation,Mahboobeh2018,False,,Springer,Not available,Auction-Based Models for Composite Service Selection: A Design Framework,d3815dc9449361c79455c9ec148c075d,http://dx.doi.org/10.1007/978-3-319-76587-7_7 4294,George Stigler combined technical competence erudition and wit. Stigler asked Frank Knight’s question of how we know the goals of those we study. Early on he offered a Knightian challenge to welfare economics defending classical economic policy against the new orthodoxy. Later he became an exponent of the orthodoxy. If goals are fixed information is useful as a means to achieving them. Characterizing information as a commodity Stigler described competitive equilibrium as a distribution of prices in a market. Policy advice is endogenous and we return to Adam Smith’s analysis in which the philosopher is no better than those he studies.,david levy,Not available,2017.0,10.1057/978-1-349-95121-5_1717-2,The New Palgrave Dictionary of Economics,M.2017,False,,Springer,Not available,Stigler George Joseph (1911–1991),57d13cee48aa817919ea0b96f0be57b0,http://dx.doi.org/10.1057/978-1-349-95121-5_1717-2 4295,George Stigler combined technical competence erudition and wit. Stigler asked Frank Knight’s question of how we know the goals of those we study. Early on he offered a Knightian challenge to welfare economics defending classical economic policy against the new orthodoxy. Later he became an exponent of the orthodoxy. If goals are fixed information is useful as a means to achieving them. Characterizing information as a commodity Stigler described competitive equilibrium as a distribution of prices in a market. Policy advice is endogenous and we return to Adam Smith’s analysis in which the philosopher is no better than those he studies.,sandra peart,Not available,2017.0,10.1057/978-1-349-95121-5_1717-2,The New Palgrave Dictionary of Economics,M.2017,False,,Springer,Not available,Stigler George Joseph (1911–1991),57d13cee48aa817919ea0b96f0be57b0,http://dx.doi.org/10.1057/978-1-349-95121-5_1717-2 4296,In this paper we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically we consider behavioural types that are ,nicholas jennings,Not available,2007.0,10.1007/978-3-540-72502-2_8,Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets,Perukrishnen2007,False,,Springer,Not available,Evolutionary Stability of Behavioural Types in the Continuous Double Auction,ae4788137e5e6e537d8db1a4a512e66d,http://dx.doi.org/10.1007/978-3-540-72502-2_8 4297,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,shuren liu,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 4298,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,licai lei,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 4299,We study an optimal inventory scrapping and allocation problem for a retailer who uses sequential online auctions with reserve price. It is assumed that the buyers arrive according to a Poisson process or constant case with uniform bid distributions and multi-unit Vickrey auction mechanism is employed in each auction. We build a Markov decision process model for the retailer’s lot-size decision in these auctions with reserve price. It is shown that the single-auction expected revenue function satisfies a second order condition leading to the retailer’s optimal lot-size policy. That is the optimal inventory-scraping policy is a threshold policy and the optimal lot-size policy is a monotone staircase with unit jumps policy when we introduce the reserve price in sequential online auction systems. We also show these results for the case where the reserve price is a decision variable.,pei tang,Not available,2017.0,10.1007/978-3-319-68520-5_12,Queueing Theory and Network Applications,Shuren2017,False,,Springer,Not available,Dynamic Lot-Sizing in Sequential Online Auction Systems with Reserve Price,2a885995f0211dd91e9102c3f96631a1,http://dx.doi.org/10.1007/978-3-319-68520-5_12 4300,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,ling li,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 4301,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,xing liu,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 4302,With rapid development of economy and society online reverse auctions play an important role in procurement. In traditional reverse auctions. Buyers and sellers just compete on the price of the subject regardless of other attributes like quality performance reliability and so on. However this can not meet the real needs of the tender. Multi-attribute reverse auctions become more rational way. This paper study on the single item multi-attribute reverse auction. Aiming at address the issues how to determine ,zhineng hu,Not available,2017.0,10.1007/978-981-10-1837-4_102,Proceedings of the Tenth International Conference on Management Science and Engineering Management,Ling2017,False,,Springer,Not available,A Bid Evaluation Method for Multi-attribute Online Reverse Auction,93ef7bde1e5ae496401f58e4061bdcdc,http://dx.doi.org/10.1007/978-981-10-1837-4_102 4303,The auctioneer is a fictitious agent introduced by Leon Walras who matches supply and demand in a market with perfect competition. The process is called ‘tâtonnement’ finding the market clearing price for all commodities resulting in general equilibrium. No actual trading occurs during this process. The concept of the auctioneer sidesteps the important question of the coordinating power of the price mechanism. There are in fact only a few special cases for which the auctioneer process leads the economy to an equilibrium.,f. hahn,Not available,2017.0,10.1057/978-1-349-95121-5_399-2,The New Palgrave Dictionary of Economics,H.2017,False,,Springer,Not available,Auctioneer,24de2ffb3564da28eae13e3e9114906b,http://dx.doi.org/10.1057/978-1-349-95121-5_399-2 4304,When mobile multimedia applications are considered in a femtocell and macrocell coexisted heterogeneous network a fast handoff mechanism to select a target femtocell base station (FBS) for macrocell user equipment (MUE) to maintain the QoS turns out to be a major design issue. To address this problem a fast Stochastic Election Process (SEP) is proposed to assign the initial counter value of each candidate FBS based on the load of the candidate FBS. Simulation results confirm that the proposed load-based handoff mechanism reduces the handoff time greatly.,chih-cheng tseng,Not available,2017.0,10.1007/978-3-319-60717-7_30,Quality Reliability Security and Robustness in Heterogeneous Networks,Chih-Cheng2017,False,,Springer,Not available,Load-Based Fast Handoff Mechanism for Macro-femto Heterogeneous Networks,4632db6087dedaf64c8fcdd03292bc0d,http://dx.doi.org/10.1007/978-3-319-60717-7_30 4305,When mobile multimedia applications are considered in a femtocell and macrocell coexisted heterogeneous network a fast handoff mechanism to select a target femtocell base station (FBS) for macrocell user equipment (MUE) to maintain the QoS turns out to be a major design issue. To address this problem a fast Stochastic Election Process (SEP) is proposed to assign the initial counter value of each candidate FBS based on the load of the candidate FBS. Simulation results confirm that the proposed load-based handoff mechanism reduces the handoff time greatly.,fang-chang kuo,Not available,2017.0,10.1007/978-3-319-60717-7_30,Quality Reliability Security and Robustness in Heterogeneous Networks,Chih-Cheng2017,False,,Springer,Not available,Load-Based Fast Handoff Mechanism for Macro-femto Heterogeneous Networks,4632db6087dedaf64c8fcdd03292bc0d,http://dx.doi.org/10.1007/978-3-319-60717-7_30 4306,When mobile multimedia applications are considered in a femtocell and macrocell coexisted heterogeneous network a fast handoff mechanism to select a target femtocell base station (FBS) for macrocell user equipment (MUE) to maintain the QoS turns out to be a major design issue. To address this problem a fast Stochastic Election Process (SEP) is proposed to assign the initial counter value of each candidate FBS based on the load of the candidate FBS. Simulation results confirm that the proposed load-based handoff mechanism reduces the handoff time greatly.,hwang-cheng wang,Not available,2017.0,10.1007/978-3-319-60717-7_30,Quality Reliability Security and Robustness in Heterogeneous Networks,Chih-Cheng2017,False,,Springer,Not available,Load-Based Fast Handoff Mechanism for Macro-femto Heterogeneous Networks,4632db6087dedaf64c8fcdd03292bc0d,http://dx.doi.org/10.1007/978-3-319-60717-7_30 4307,In this paper we shall show the design of a multi-unit double auction (MDA) market. It should be enough robust flexible and sufficiently efficient in facilitating exchanges. In a MDA market sellers and buyers submit respectively asks and bids. A trade is made if a buyers bid exceeds a sellers ask. A sellers ask may match several buyers bids and a buyers bid may satisfy several sellers asks. The trading rule of a market defines the organization information exchange process trading procedure and clearance rules of the market. The mechanism is announced before the opening of the market so that every agent knows how the market will operate in advance. These autonomous agents pursue their own interests maximizing their own utilities. Therefore we can view our market as a multi-agent system where the market mechanism defines the structure and rules of the environment in which agents will play the market game. An efficient market maximizes the total profit obtained by all participating agents (Fudenberg and Tirole 1991). However voluminous game theory literature focuses on auction markets. Satterthwaite and Williams (1989) were among the early researchers studying double auction markets. They designed a single-unit double auction (SDA) market where they eliminated the strategic behavior on the sellers side. McAfee (1992) allowed strategic behavior on both sides of a SDA market and required a market maker to balance the budget.,calogero vetro,Not available,2007.0,10.1007/978-3-540-73135-1_18,Artificial Markets Modeling,Calogero2007,False,,Springer,Not available,A Binary Particle Swarm Optimization Algorithm for a Double Auction Market,6809773b4b7a8156870f7e8d55b6452b,http://dx.doi.org/10.1007/978-3-540-73135-1_18 4308,When mobile multimedia applications are considered in a femtocell and macrocell coexisted heterogeneous network a fast handoff mechanism to select a target femtocell base station (FBS) for macrocell user equipment (MUE) to maintain the QoS turns out to be a major design issue. To address this problem a fast Stochastic Election Process (SEP) is proposed to assign the initial counter value of each candidate FBS based on the load of the candidate FBS. Simulation results confirm that the proposed load-based handoff mechanism reduces the handoff time greatly.,kuo-chang ting,Not available,2017.0,10.1007/978-3-319-60717-7_30,Quality Reliability Security and Robustness in Heterogeneous Networks,Chih-Cheng2017,False,,Springer,Not available,Load-Based Fast Handoff Mechanism for Macro-femto Heterogeneous Networks,4632db6087dedaf64c8fcdd03292bc0d,http://dx.doi.org/10.1007/978-3-319-60717-7_30 4309,When mobile multimedia applications are considered in a femtocell and macrocell coexisted heterogeneous network a fast handoff mechanism to select a target femtocell base station (FBS) for macrocell user equipment (MUE) to maintain the QoS turns out to be a major design issue. To address this problem a fast Stochastic Election Process (SEP) is proposed to assign the initial counter value of each candidate FBS based on the load of the candidate FBS. Simulation results confirm that the proposed load-based handoff mechanism reduces the handoff time greatly.,chih-chieh wang,Not available,2017.0,10.1007/978-3-319-60717-7_30,Quality Reliability Security and Robustness in Heterogeneous Networks,Chih-Cheng2017,False,,Springer,Not available,Load-Based Fast Handoff Mechanism for Macro-femto Heterogeneous Networks,4632db6087dedaf64c8fcdd03292bc0d,http://dx.doi.org/10.1007/978-3-319-60717-7_30 4310,This chapter describes the measures taken in Georgia after the 2004 to fight corruption eradicate the shadow economy and promote economic growth. Examples of such measures include better pay for public officials performance rewards deregulation simplification of regulation and investments in checks and balances. Based on his experience leading successful anti-corruption reforms the author challenges the widespread belief that corruption is innate in societies and provides both concrete examples of creative corruption-prevention approaches such as mystery shopping and evidence of the impact of his reforms in Georgia such as the country’s performance in Transparency International’s Corruption Perception Index and the Global Corruption Barometer.,nika gilauri,Not available,2017.0,10.1007/978-3-319-45769-7_2,Practical Economics,Nika2017,True,,Springer,Not available,Fighting Corruption,629718c1350305ba1937b4149ca6ef7a,http://dx.doi.org/10.1007/978-3-319-45769-7_2 4311,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,bing hu,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 4312,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,lin yao,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 4313,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,yong chen,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 4314,In this paper on the basis of the analysis of common market model and some economic theories in the cloud computing resource management process we propose a cloud resource management model based on combinatorial double auction. In order to solve the winner determination problem (WDP) in the combinatorial double auction a cloud resource combinatorial double auction algorithm based on genetic algorithm and simulated annealing algorithm is proposed. Simulation results reveal that the algorithm combines genetic algorithm with simulated annealing algorithm (SAGA) outperforms genetic algorithm on fitness value and stability and as the number of bidders increase the solution have higher fitness value can be obtained.,zinxin sun,Not available,2017.0,10.1007/978-3-319-60717-7_43,Quality Reliability Security and Robustness in Heterogeneous Networks,Bing2017,False,,Springer,Not available,Cloud Resource Combinatorial Double Auction Algorithm Based on Genetic Algorithm and Simulated Annealing,75dff23891cb49dd567039fa26326001,http://dx.doi.org/10.1007/978-3-319-60717-7_43 4315,One significant challenge for the resource allocation in cloud environments is the pricing issue and selection of applicants of cloud resources on the basis of cloud economic parameters. Taking into account the fact that the resource allocation in cloud environments is an economic supply- and demand-based problem economics-based methods result in better solutions in a shorter period of time. In this paper using Bayesian method where each user estimates other rivals’ actions in the next step of the auction a game model for winner determination is proposed. a non-cooperative game theory mechanism based on combinatorial auction in an environment with incomplete information has been proposed to reach Nash equilibrium point and select the winners. Using the proposed method an improvement of 17 % profit was obtained for the cloud provider and a 12 % boost was seen in the sold resources. The objective function suggested for bidding converged to the solution in all cases and was stable. In the following it was proved that the proposed model has the possibility of attaining the best local bid.,amin nezarat,Not available,2016.0,10.1007/s11227-016-1782-z,The Journal of Supercomputing,Amin2016,False,,Springer,Not available,A game theoretical model for profit maximization resource allocation in cloud environment with budget and deadline constraints,f71fcdc3d20ab5ed8046436a04ed76aa,http://dx.doi.org/10.1007/s11227-016-1782-z 4316,One significant challenge for the resource allocation in cloud environments is the pricing issue and selection of applicants of cloud resources on the basis of cloud economic parameters. Taking into account the fact that the resource allocation in cloud environments is an economic supply- and demand-based problem economics-based methods result in better solutions in a shorter period of time. In this paper using Bayesian method where each user estimates other rivals’ actions in the next step of the auction a game model for winner determination is proposed. a non-cooperative game theory mechanism based on combinatorial auction in an environment with incomplete information has been proposed to reach Nash equilibrium point and select the winners. Using the proposed method an improvement of 17 % profit was obtained for the cloud provider and a 12 % boost was seen in the sold resources. The objective function suggested for bidding converged to the solution in all cases and was stable. In the following it was proved that the proposed model has the possibility of attaining the best local bid.,gh. dastghaibyfard,Not available,2016.0,10.1007/s11227-016-1782-z,The Journal of Supercomputing,Amin2016,False,,Springer,Not available,A game theoretical model for profit maximization resource allocation in cloud environment with budget and deadline constraints,f71fcdc3d20ab5ed8046436a04ed76aa,http://dx.doi.org/10.1007/s11227-016-1782-z 4317,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,jeannette brosig-koch,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 4318,In this paper we shall show the design of a multi-unit double auction (MDA) market. It should be enough robust flexible and sufficiently efficient in facilitating exchanges. In a MDA market sellers and buyers submit respectively asks and bids. A trade is made if a buyers bid exceeds a sellers ask. A sellers ask may match several buyers bids and a buyers bid may satisfy several sellers asks. The trading rule of a market defines the organization information exchange process trading procedure and clearance rules of the market. The mechanism is announced before the opening of the market so that every agent knows how the market will operate in advance. These autonomous agents pursue their own interests maximizing their own utilities. Therefore we can view our market as a multi-agent system where the market mechanism defines the structure and rules of the environment in which agents will play the market game. An efficient market maximizes the total profit obtained by all participating agents (Fudenberg and Tirole 1991). However voluminous game theory literature focuses on auction markets. Satterthwaite and Williams (1989) were among the early researchers studying double auction markets. They designed a single-unit double auction (SDA) market where they eliminated the strategic behavior on the sellers side. McAfee (1992) allowed strategic behavior on both sides of a SDA market and required a market maker to balance the budget.,domenico tegolo,Not available,2007.0,10.1007/978-3-540-73135-1_18,Artificial Markets Modeling,Calogero2007,False,,Springer,Not available,A Binary Particle Swarm Optimization Algorithm for a Double Auction Market,6809773b4b7a8156870f7e8d55b6452b,http://dx.doi.org/10.1007/978-3-540-73135-1_18 4319,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,werner guth,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 4320,Collusion in procurement auctions is illegal but often observed. We compare experimentally three coordination mechanisms in how effectively they promote collusion in first-price procurement auctions. One mechanism aims at excluding competitive bids via bidding restrictions. The second one allows for promises on sharing the gains from collusion as in mutual shareholding. The third mechanism relies on unrestricted pre-play communication. Agreements made under the three mechanisms are non-binding. In the experiment bidders interact with the same group of competitors only once as it is quite common in globalized (online) markets. We find that first-price procurement is quite collusion-proof regarding the first two mechanisms whereas pre-play communication on average increases profits. The communication protocols provide valuable insights about how to coordinate and implement non-binding collusion agreements in competitive one-shot interactions with private information.,torsten weiland,Not available,2016.0,10.1007/s40844-016-0046-1,Evolutionary and Institutional Economics Review,Jeannette2016,False,,Springer,Not available,Comparing the effectiveness of collusion devices in first-price procurement: an auction experiment,950714c0f6913bddbca1f291fcd3cacf,http://dx.doi.org/10.1007/s40844-016-0046-1 4321,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,erqin hu,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 4322,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,yong zhao,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 4323,In many auctions buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper two objects are sold sequentially and each buyer’s valuation for the second object is ,congjun rao,Not available,2016.0,10.1007/s11424-016-4315-1,Journal of Systems Science and Complexity,Erqin2016,False,,Springer,Not available,Information revelation in sequential auctions with uncertainties about future objects,238f911ddd61acb6a3421e7b84b32502,http://dx.doi.org/10.1007/s11424-016-4315-1 4324,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,shifeng shang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4325,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,jinlei jiang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4326,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,yongwei wu,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4327,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,zhenchun huang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4328,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,guangwen yang,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4329,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,elena grigorieva,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 4330,Recently IT giants such as Google Amazon Microsoft and IBM are gearing up to be a part of the Cloud and begin to sell their cloud services. However the current market trading mechanism is inflexible and the price is not reasonable enough in some situation. Therefore we first propose a cloud market framework for people to build a uniform and fully competitive cloud market where users can buy resources from different companies and exchange their idle resources in a more flexible way. Then we define a double auction Bayesian Game-based pricing model (DABGPM) for the suggested cloud market and discuss how to develop an optimal pricing strategy for this model. Our work we think makes a good example of more flexible and more reasonable cloud resources trading.,weimin zheng,Not available,2010.0,10.1007/978-3-642-15672-4_14,Network and Parallel Computing,Shifeng2010,False,,Springer,Not available,DABGPM: A Double Auction Bayesian Game-Based Pricing Model in Cloud Market,67fb8487f1ac845ef8340095b5138c07,http://dx.doi.org/10.1007/978-3-642-15672-4_14 4331,The annual Trading Agent Competition for Market Design ,lampros stavrogiannis,Not available,2010.0,10.1007/978-3-642-15117-0_15,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2010,False,,Springer,Not available,Evaluation of Market Design Agents: The Mertacor Perspective,b7f2ed42fcb0f6997efdc42a88466677,http://dx.doi.org/10.1007/978-3-642-15117-0_15 4332,The annual Trading Agent Competition for Market Design ,pericles mitkas,Not available,2010.0,10.1007/978-3-642-15117-0_15,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,C.2010,False,,Springer,Not available,Evaluation of Market Design Agents: The Mertacor Perspective,b7f2ed42fcb0f6997efdc42a88466677,http://dx.doi.org/10.1007/978-3-642-15117-0_15 4333,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,xiaotie deng,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 4334,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,yang sun,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 4335,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,ming yin,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 4336,In this paper we study pricing models for multi-slot advertisements where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage called the multi-slot AD auction problem. We develop and analyze several important mechanisms including the VCG mechanism for multi-slot ads auction the optimal social welfare solution as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.We prove properties and compare revenue of those different pricing models via analysis and simulation.,yunhong zhou,Not available,2010.0,10.1007/978-3-642-14553-7_4,Frontiers in Algorithmics,Xiaotie2010,False,,Springer,Not available,Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets,1cde44f967f717eaf227910c6d51b990,http://dx.doi.org/10.1007/978-3-642-14553-7_4 4337,A common approach to analyzing repeated auctions such as sponsored search auctions is to treat them as complete information games because it is assumed that over time players learn each other’s types. This overlooks the possibility that players may impersonate another type. Many standard auctions (including generalized second price auctions and core-selecting auctions) as well as the Kelly mechanism have profitable impersonations. We define a notion of impersonation-proofness for the auction mechanism coupled with a process by which players learn about each other’s type and show an equivalence to a problem of dominant-strategy mechanism design.,ian kash,Not available,2010.0,10.1007/978-3-642-17572-5_42,Internet and Network Economics,A.2010,False,,Springer,Not available,Impersonation Strategies in Auctions,84cbb5e5d91c478eef2002f6ce259afe,http://dx.doi.org/10.1007/978-3-642-17572-5_42 4338,A common approach to analyzing repeated auctions such as sponsored search auctions is to treat them as complete information games because it is assumed that over time players learn each other’s types. This overlooks the possibility that players may impersonate another type. Many standard auctions (including generalized second price auctions and core-selecting auctions) as well as the Kelly mechanism have profitable impersonations. We define a notion of impersonation-proofness for the auction mechanism coupled with a process by which players learn about each other’s type and show an equivalence to a problem of dominant-strategy mechanism design.,david parkes,Not available,2010.0,10.1007/978-3-642-17572-5_42,Internet and Network Economics,A.2010,False,,Springer,Not available,Impersonation Strategies in Auctions,84cbb5e5d91c478eef2002f6ce259afe,http://dx.doi.org/10.1007/978-3-642-17572-5_42 4339,Free riding the behavior of attempting to benefit resources contributed by others while sharing their own values as minimum as possible is one of the key problems in many P2P systems. Incentive mechanisms are proposed to solve the problem. In this paper we introduce an all-pay auction model to study the resource distribution process in BitTorrent-like P2P system. Based on this model the advantages and disadvantages of original BitTorrent incentives are presented. To improve the BitTorrent system-wide performance we propose a price differentiation all-pay auction based incentive mechanism considering the long-term share ratio and the short-term predicted upload bandwidth comprehensively. Our simulation results verify the effectiveness of the new incentive mechanism to prevent free-riders and strategic peers.,yan pang,Not available,2010.0,10.1007/978-3-642-13067-0_71,Advances in Grid and Pervasive Computing,Yan2010,False,,Springer,Not available,Price Differentiation All-Pay Auction-Based Incentives in BitTorrent,234bacdc47d222e680e531221d0c4586,http://dx.doi.org/10.1007/978-3-642-13067-0_71 4340,Despite growing interest in traditional and Internet auctions the marketing literature on auctions is sparse. This paper outlines selected aspects of the research opportunity. We provide a brief description of the major auction mechanisms outline key concepts and results from the economic analysis of auctions and summarize the key findings in empirical tests of auction theory. We then identify areas for future research on auction markets particularly those of interest to marketers in the new contexts created by the Internet.,r. isaac,Not available,2002.0,10.1023/A:1020399513113,Marketing Letters,Dipankar2002,False,,Springer,Not available,Auctions: Research Opportunities in Marketing,78e6e08a457dc9f54b5f8bd8bd172071,http://dx.doi.org/10.1023/A:1020399513113 4341,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,p. herings,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 4342,Free riding the behavior of attempting to benefit resources contributed by others while sharing their own values as minimum as possible is one of the key problems in many P2P systems. Incentive mechanisms are proposed to solve the problem. In this paper we introduce an all-pay auction model to study the resource distribution process in BitTorrent-like P2P system. Based on this model the advantages and disadvantages of original BitTorrent incentives are presented. To improve the BitTorrent system-wide performance we propose a price differentiation all-pay auction based incentive mechanism considering the long-term share ratio and the short-term predicted upload bandwidth comprehensively. Our simulation results verify the effectiveness of the new incentive mechanism to prevent free-riders and strategic peers.,zongming guo,Not available,2010.0,10.1007/978-3-642-13067-0_71,Advances in Grid and Pervasive Computing,Yan2010,False,,Springer,Not available,Price Differentiation All-Pay Auction-Based Incentives in BitTorrent,234bacdc47d222e680e531221d0c4586,http://dx.doi.org/10.1007/978-3-642-13067-0_71 4343,Multiagent resource allocation defines the issue of having to distribute a set of resources among a set of agents aiming at a ,claudia lindner,Not available,2010.0,10.1007/978-3-642-12842-4_23,Artificial Intelligence: Theories Models and Applications,Claudia2010,False,,Springer,Not available,A Market-Affected Sealed-Bid Auction Protocol,e3d976d48f289fd73029da7cce8b79c4,http://dx.doi.org/10.1007/978-3-642-12842-4_23 4344,Novelties discovering as a source of constant change is the essence of economics. However most economic models do not have the kind of novelties-discovering agents required for constant changes. This silence was broken by Andrews and Prager 15 years ago when they placed GP (genetic programming)-driven agents in the double auction market. The work was however neither economically well interpreted nor complete; hence the silence remains in economics. In this article we revisit their model and systematically conduct a series of simulations to better document the results. Our simulations show that human-written programs including some reputable ones are eventually outperformed by GP. The significance of this finding is not that GP is alchemy. Instead it shows that novelties-discovering agents can be introduced into economic models and their appearance inevitably presents threats to other agents who then have to react accordingly. Hence a potentially indefinite cycle of change is triggered.,shu-heng chen,Not available,2010.0,10.1007/978-4-431-99781-8_9,Simulating Interacting Agents and Social Phenomena,Shu-Heng2010,False,,Springer,Not available,The Agent-Based Double Auction Markets: 15 Years On,d75d5c2d04df080c2a2edff8b842424b,http://dx.doi.org/10.1007/978-4-431-99781-8_9 4345,Novelties discovering as a source of constant change is the essence of economics. However most economic models do not have the kind of novelties-discovering agents required for constant changes. This silence was broken by Andrews and Prager 15 years ago when they placed GP (genetic programming)-driven agents in the double auction market. The work was however neither economically well interpreted nor complete; hence the silence remains in economics. In this article we revisit their model and systematically conduct a series of simulations to better document the results. Our simulations show that human-written programs including some reputable ones are eventually outperformed by GP. The significance of this finding is not that GP is alchemy. Instead it shows that novelties-discovering agents can be introduced into economic models and their appearance inevitably presents threats to other agents who then have to react accordingly. Hence a potentially indefinite cycle of change is triggered.,chung-ching tai,Not available,2010.0,10.1007/978-4-431-99781-8_9,Simulating Interacting Agents and Social Phenomena,Shu-Heng2010,False,,Springer,Not available,The Agent-Based Double Auction Markets: 15 Years On,d75d5c2d04df080c2a2edff8b842424b,http://dx.doi.org/10.1007/978-4-431-99781-8_9 4346,We introduce the ,patrick jordan,Not available,2010.0,10.1007/978-3-642-15117-0_11,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,R.2010,False,,Springer,Not available,Designing an Ad Auctions Game for the Trading Agent Competition,50c88709f3fe221118c318b7754beeeb,http://dx.doi.org/10.1007/978-3-642-15117-0_11 4347,We introduce the ,michael wellman,Not available,2010.0,10.1007/978-3-642-15117-0_11,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,R.2010,False,,Springer,Not available,Designing an Ad Auctions Game for the Trading Agent Competition,50c88709f3fe221118c318b7754beeeb,http://dx.doi.org/10.1007/978-3-642-15117-0_11 4348,This paper focus on biding and pricing strategies in a scenario twoheterogeneous products manufacturers selling through on-line channel. The firms competes customers in quality to price ratio. The value of prominent AdWords advertising position and the resulting price dispersion patterns are studied. We found that prominent position of an Ad words is not always favorite to all firms according to the analysis based on game theory. For the firm which produced high-quality products the revenue gained from listed on the prominent place is always higher than in the second place; However for the low-quality product firm the revenue gained from its advertisement listed on the prominent place might less than on the second place. Meanwhile the attractiveness of the prominent Ad place depends on the market structure in terms of consumer preference and consumer search behavior. The more consumers purchase from the firm listed in the prominent Ad places or the more consumers prefer high-quality product the more strict area in which the low-quality product manufacture has positive profit.,e. zhang,Not available,2010.0,10.1007/978-3-642-13498-2_16,Advances in Swarm Intelligence,E.2010,False,,Springer,Not available,Pricing and Bidding Strategy in AdWords Auction under Heterogeneous Products Scenario,8e96af1cab15d0ce5fa49d016958f606,http://dx.doi.org/10.1007/978-3-642-13498-2_16 4349,This paper focus on biding and pricing strategies in a scenario twoheterogeneous products manufacturers selling through on-line channel. The firms competes customers in quality to price ratio. The value of prominent AdWords advertising position and the resulting price dispersion patterns are studied. We found that prominent position of an Ad words is not always favorite to all firms according to the analysis based on game theory. For the firm which produced high-quality products the revenue gained from listed on the prominent place is always higher than in the second place; However for the low-quality product firm the revenue gained from its advertisement listed on the prominent place might less than on the second place. Meanwhile the attractiveness of the prominent Ad place depends on the market structure in terms of consumer preference and consumer search behavior. The more consumers purchase from the firm listed in the prominent Ad places or the more consumers prefer high-quality product the more strict area in which the low-quality product manufacture has positive profit.,yiqin zhuo,Not available,2010.0,10.1007/978-3-642-13498-2_16,Advances in Swarm Intelligence,E.2010,False,,Springer,Not available,Pricing and Bidding Strategy in AdWords Auction under Heterogeneous Products Scenario,8e96af1cab15d0ce5fa49d016958f606,http://dx.doi.org/10.1007/978-3-642-13498-2_16 4350,The rule with which automated computerised auctions are closed play an important role in determining bidder strategies and auction outcomes. In this paper we examine two such rules: auctions with randomised closing times and fixed deadlines. To this end stochastic models of auctions with discrete state-space representing the prices attained are developed and analysed. The models allow us to determine the stationary probabilistic outcomes of the auctions which are used to examine the bidder performance measured as the savings it makes with respect to the maximum payable or its payoff. For this purpose one bidder is singled out as the “special bidder” (SB) and its performance is studied as a function of the speed with which it raises the price or its bid rate. The results show that with random closures the SB has incentives to place bids promptly to obtain high savings; on the other hand with fixed deadline auctions the SB should choose its bid rate with respect to the other system parameters in order to maximise payoffs.,kumaara velan,Not available,2010.0,10.1007/978-3-642-13541-5_5,Agent and Multi-Agent Systems: Technologies and Applications,Kumaara2010,False,,Springer,Not available,Analysing Bidder Performance in Randomised and Fixed-Deadline Automated Auctions,2b44ab5ecf6cfcd898a16ccab020bd5b,http://dx.doi.org/10.1007/978-3-642-13541-5_5 4351,The rule with which automated computerised auctions are closed play an important role in determining bidder strategies and auction outcomes. In this paper we examine two such rules: auctions with randomised closing times and fixed deadlines. To this end stochastic models of auctions with discrete state-space representing the prices attained are developed and analysed. The models allow us to determine the stationary probabilistic outcomes of the auctions which are used to examine the bidder performance measured as the savings it makes with respect to the maximum payable or its payoff. For this purpose one bidder is singled out as the “special bidder” (SB) and its performance is studied as a function of the speed with which it raises the price or its bid rate. The results show that with random closures the SB has incentives to place bids promptly to obtain high savings; on the other hand with fixed deadline auctions the SB should choose its bid rate with respect to the other system parameters in order to maximise payoffs.,erol gelenbe,Not available,2010.0,10.1007/978-3-642-13541-5_5,Agent and Multi-Agent Systems: Technologies and Applications,Kumaara2010,False,,Springer,Not available,Analysing Bidder Performance in Randomised and Fixed-Deadline Automated Auctions,2b44ab5ecf6cfcd898a16ccab020bd5b,http://dx.doi.org/10.1007/978-3-642-13541-5_5 4352,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,rudolf muller,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 4353,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,clemens dinther,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 4354,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,benjamin blau,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 4355,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,tobias conte,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 4356,The evolving service ecologies show new ways of value co-creation through combinations of multiple service components which are described in service offerings. An open issue in such a large service ecology is how to efficiently coordinate and price service offerings. Service offerings provide different functionality and quality. Customers need to distinguish their preferences on different combinations of service attributes. In this chapter we address this issue of service offerings allocation and introduce a structure design approach Market Engineering as an appropriate method to design such mechanism. In order to apply this approach to service systems we introduce a formal model and a definition of service value networks. Examples exemplify our approach and we show one possible step towards implementing such a mechanism.,christof weinhardt,Not available,2011.0,10.1007/978-1-4419-8270-4_7,The Science of Service Systems,Clemens2011,False,,Springer,Not available,Designing Auctions for Coordination in Service Networks,6133fb1e17712c791bb39c40a4c724d3,http://dx.doi.org/10.1007/978-1-4419-8270-4_7 4357,Multi-attribute auctions (also called multidimensional auctions) facilitate negotiations based on multiple attributes thus escape from the standard price-only domain into a rich multidimensional domain that can comprise additional attributes like e.g. guarantee conditions or quality. Most multi-attribute preference models used in auction mechanisms are based on a ranking derived from weighted sum. Recently the Reference Point Method (RPM) approach has been applied to express the multi-attribute preference models within the auction mechanisms allowing to overcome the weighted sum drawbacks. The Ordered Weighted RPM model enables us to introduce importance weights to affect achievements importance by rescaling their measures accordingly within the distribution of all achievements. The concept presented and discussed in this paper in the context of procurement auctions takes advantage of the so-called Weighted Ordered Weighted Average (WOWA) aggregations of the partial achievements.,bartosz kozlowski,Not available,2011.0,10.1007/978-3-642-23935-9_29,Computational Collective Intelligence. Technologies and Applications,Bartosz2011,False,,Springer,Not available,On Ordered Weighted Reference Point Model for Multi-attribute Procurement Auctions,6f6e62e027a981e485e5c0cb988ab801,http://dx.doi.org/10.1007/978-3-642-23935-9_29 4358,Multi-attribute auctions (also called multidimensional auctions) facilitate negotiations based on multiple attributes thus escape from the standard price-only domain into a rich multidimensional domain that can comprise additional attributes like e.g. guarantee conditions or quality. Most multi-attribute preference models used in auction mechanisms are based on a ranking derived from weighted sum. Recently the Reference Point Method (RPM) approach has been applied to express the multi-attribute preference models within the auction mechanisms allowing to overcome the weighted sum drawbacks. The Ordered Weighted RPM model enables us to introduce importance weights to affect achievements importance by rescaling their measures accordingly within the distribution of all achievements. The concept presented and discussed in this paper in the context of procurement auctions takes advantage of the so-called Weighted Ordered Weighted Average (WOWA) aggregations of the partial achievements.,wlodzimierz ogryczak,Not available,2011.0,10.1007/978-3-642-23935-9_29,Computational Collective Intelligence. Technologies and Applications,Bartosz2011,False,,Springer,Not available,On Ordered Weighted Reference Point Model for Multi-attribute Procurement Auctions,6f6e62e027a981e485e5c0cb988ab801,http://dx.doi.org/10.1007/978-3-642-23935-9_29 4359,A traditionally desired goal when designing auction mechanisms is ,marco comi,Not available,2011.0,10.1007/978-3-642-24829-0_6,Algorithmic Game Theory,Marco2011,False,,Springer,Not available,On Communication Protocols That Compute Almost Privately,1bc38979848e5e499a38ae667493febc,http://dx.doi.org/10.1007/978-3-642-24829-0_6 4360,A traditionally desired goal when designing auction mechanisms is ,bhaskar dasgupta,Not available,2011.0,10.1007/978-3-642-24829-0_6,Algorithmic Game Theory,Marco2011,False,,Springer,Not available,On Communication Protocols That Compute Almost Privately,1bc38979848e5e499a38ae667493febc,http://dx.doi.org/10.1007/978-3-642-24829-0_6 4361,A traditionally desired goal when designing auction mechanisms is ,michael schapira,Not available,2011.0,10.1007/978-3-642-24829-0_6,Algorithmic Game Theory,Marco2011,False,,Springer,Not available,On Communication Protocols That Compute Almost Privately,1bc38979848e5e499a38ae667493febc,http://dx.doi.org/10.1007/978-3-642-24829-0_6 4362,A traditionally desired goal when designing auction mechanisms is ,venkatakumar srinivasan,Not available,2011.0,10.1007/978-3-642-24829-0_6,Algorithmic Game Theory,Marco2011,False,,Springer,Not available,On Communication Protocols That Compute Almost Privately,1bc38979848e5e499a38ae667493febc,http://dx.doi.org/10.1007/978-3-642-24829-0_6 4363,In this paper we present a new iterative auction the bisection auction that can be used for the sale of a single indivisible object. The bisection auction has fewer rounds than the classical English auction and causes less information to be revealed than the Vickrey auction. Still it preserves all characteristics the English auction shares with the Vickrey auction: there exists an equilibrium in weakly dominant strategies in which everyone behaves truthfully the object is allocated in accordance with efficiency requirements to the buyer who has the highest valuation and the price paid by the winner of the object equals the second-highest valuation,dries vermeulen,Not available,2007.0,10.1007/s00199-005-0032-z,Economic Theory,Elena2007,False,,Springer,Not available,The private value single item bisection auction,df18181b5dbbf090e416019db4641615,http://dx.doi.org/10.1007/s00199-005-0032-z 4364,This paper proposes an approach to design behaviour-based double auction mechanisms that are adaptive to market changes under the Trading Agent Competition Market Design platform. Because of the dynamics of the market environment it is not feasible to test a mechanism in all kinds of environments. Since the strategies adopted by traders are well classified and studied we will analyse and utilise the behaviour of traders with each kind of strategy design specific (trader-dependent) mechanisms for attracting them and finally integrate these trader-dependent mechanisms to achieve adaptive mechanisms.,dengji zhao,Not available,2011.0,10.1007/978-3-642-23014-1_11,E-Commerce and Web Technologies,Dengji2011,False,,Springer,Not available,How to Make Specialists NOT Specialised in TAC Market Design Competition? Behaviour-Based Mechanism Design,4f4bd683fcafddea0b57a7b946f4e9bf,http://dx.doi.org/10.1007/978-3-642-23014-1_11 4365,This paper proposes an approach to design behaviour-based double auction mechanisms that are adaptive to market changes under the Trading Agent Competition Market Design platform. Because of the dynamics of the market environment it is not feasible to test a mechanism in all kinds of environments. Since the strategies adopted by traders are well classified and studied we will analyse and utilise the behaviour of traders with each kind of strategy design specific (trader-dependent) mechanisms for attracting them and finally integrate these trader-dependent mechanisms to achieve adaptive mechanisms.,dongmo zhang,Not available,2011.0,10.1007/978-3-642-23014-1_11,E-Commerce and Web Technologies,Dengji2011,False,,Springer,Not available,How to Make Specialists NOT Specialised in TAC Market Design Competition? Behaviour-Based Mechanism Design,4f4bd683fcafddea0b57a7b946f4e9bf,http://dx.doi.org/10.1007/978-3-642-23014-1_11 4366,This paper proposes an approach to design behaviour-based double auction mechanisms that are adaptive to market changes under the Trading Agent Competition Market Design platform. Because of the dynamics of the market environment it is not feasible to test a mechanism in all kinds of environments. Since the strategies adopted by traders are well classified and studied we will analyse and utilise the behaviour of traders with each kind of strategy design specific (trader-dependent) mechanisms for attracting them and finally integrate these trader-dependent mechanisms to achieve adaptive mechanisms.,laurent perrussel,Not available,2011.0,10.1007/978-3-642-23014-1_11,E-Commerce and Web Technologies,Dengji2011,False,,Springer,Not available,How to Make Specialists NOT Specialised in TAC Market Design Competition? Behaviour-Based Mechanism Design,4f4bd683fcafddea0b57a7b946f4e9bf,http://dx.doi.org/10.1007/978-3-642-23014-1_11 4367,It is expected that in future user-centric wireless network scenario the concept of dynamic spectrum trade will provide operators with opportunities to utilize the spectrum more efficiently. Wireless market players (both incumbent and new entrants) trade the spectrum chunks on the ,manzoor khan,Not available,2011.0,10.1007/978-3-642-21560-5_4,Wired/Wireless Internet Communications,Ahmed2011,False,,Springer,Not available,Dynamic Spectrum Trade and Game-Theory Based Network Selection in LTE Virtualization Using Uniform Auctioning,64b4e37d8fa60d989423c62b68a8669d,http://dx.doi.org/10.1007/978-3-642-21560-5_4 4368,It is expected that in future user-centric wireless network scenario the concept of dynamic spectrum trade will provide operators with opportunities to utilize the spectrum more efficiently. Wireless market players (both incumbent and new entrants) trade the spectrum chunks on the ,yasir zaki,Not available,2011.0,10.1007/978-3-642-21560-5_4,Wired/Wireless Internet Communications,Ahmed2011,False,,Springer,Not available,Dynamic Spectrum Trade and Game-Theory Based Network Selection in LTE Virtualization Using Uniform Auctioning,64b4e37d8fa60d989423c62b68a8669d,http://dx.doi.org/10.1007/978-3-642-21560-5_4 4369,Internet is evolving traffic continues to grow new revenue sources are sought by Network and Service Providers. Value added services with real time characteristics are likely to be common currency in the near future. Quality of Service (QoS) could allow Application/Service Providers (APs) to offer better services to the end users. At the same time all actors claim for a fair distribution of revenues. Inspired by this scenario we propose a complete framework for selling interdomain quality assured services and subsequently distributing revenues in an Autonomous System (AS) association context. We state the problem as a network utility maximization problem with QoS constraints and show that a distributed solution can be carried out. In order to fairly share the resulting revenue we study concepts from coalitional game theory and propose a solution based on the Shapley value and statistics on the revenues. Simulations of the whole proposal are shown.,isabel amigo,Not available,2011.0,10.1007/978-3-642-24547-3_6,Economics of Converged Internet-Based Networks,Isabel2011,False,,Springer,Not available,Network Bandwidth Allocation with End-to-End QoS Constraints and Revenue Sharing in Multi-domain Federations,e89a3caf819fa11ad44d96003185da05,http://dx.doi.org/10.1007/978-3-642-24547-3_6 4370,Internet is evolving traffic continues to grow new revenue sources are sought by Network and Service Providers. Value added services with real time characteristics are likely to be common currency in the near future. Quality of Service (QoS) could allow Application/Service Providers (APs) to offer better services to the end users. At the same time all actors claim for a fair distribution of revenues. Inspired by this scenario we propose a complete framework for selling interdomain quality assured services and subsequently distributing revenues in an Autonomous System (AS) association context. We state the problem as a network utility maximization problem with QoS constraints and show that a distributed solution can be carried out. In order to fairly share the resulting revenue we study concepts from coalitional game theory and propose a solution based on the Shapley value and statistics on the revenues. Simulations of the whole proposal are shown.,pablo belzarena,Not available,2011.0,10.1007/978-3-642-24547-3_6,Economics of Converged Internet-Based Networks,Isabel2011,False,,Springer,Not available,Network Bandwidth Allocation with End-to-End QoS Constraints and Revenue Sharing in Multi-domain Federations,e89a3caf819fa11ad44d96003185da05,http://dx.doi.org/10.1007/978-3-642-24547-3_6 4371,Internet is evolving traffic continues to grow new revenue sources are sought by Network and Service Providers. Value added services with real time characteristics are likely to be common currency in the near future. Quality of Service (QoS) could allow Application/Service Providers (APs) to offer better services to the end users. At the same time all actors claim for a fair distribution of revenues. Inspired by this scenario we propose a complete framework for selling interdomain quality assured services and subsequently distributing revenues in an Autonomous System (AS) association context. We state the problem as a network utility maximization problem with QoS constraints and show that a distributed solution can be carried out. In order to fairly share the resulting revenue we study concepts from coalitional game theory and propose a solution based on the Shapley value and statistics on the revenues. Simulations of the whole proposal are shown.,federico larroca,Not available,2011.0,10.1007/978-3-642-24547-3_6,Economics of Converged Internet-Based Networks,Isabel2011,False,,Springer,Not available,Network Bandwidth Allocation with End-to-End QoS Constraints and Revenue Sharing in Multi-domain Federations,e89a3caf819fa11ad44d96003185da05,http://dx.doi.org/10.1007/978-3-642-24547-3_6 4372,Internet is evolving traffic continues to grow new revenue sources are sought by Network and Service Providers. Value added services with real time characteristics are likely to be common currency in the near future. Quality of Service (QoS) could allow Application/Service Providers (APs) to offer better services to the end users. At the same time all actors claim for a fair distribution of revenues. Inspired by this scenario we propose a complete framework for selling interdomain quality assured services and subsequently distributing revenues in an Autonomous System (AS) association context. We state the problem as a network utility maximization problem with QoS constraints and show that a distributed solution can be carried out. In order to fairly share the resulting revenue we study concepts from coalitional game theory and propose a solution based on the Shapley value and statistics on the revenues. Simulations of the whole proposal are shown.,sandrine vaton,Not available,2011.0,10.1007/978-3-642-24547-3_6,Economics of Converged Internet-Based Networks,Isabel2011,False,,Springer,Not available,Network Bandwidth Allocation with End-to-End QoS Constraints and Revenue Sharing in Multi-domain Federations,e89a3caf819fa11ad44d96003185da05,http://dx.doi.org/10.1007/978-3-642-24547-3_6 4373,Recently strategic behavior modeling has attracted much attention of the researchers focusing on designing protocols in the area of social networks. The motivation lies in the fact that the overlay peers of the social networks are selfish in nature and they typically belong to different administrative domains. In this paper we model the strategic behavior of the selfish peers by leveraging the rich theory of mechanism design using the concept of economic auctions. By considering the bandwidth of the service offered by the origin server as the commodity we design dynamic auctions in which downstream peers submit their value of bids for each commodity at the upstream peers.,mohammad rezvani,Not available,2011.0,10.1007/978-3-642-20573-6_83,Information Technology and Mobile Communication,Hossein2011,False,,Springer,Not available,An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks,0020bacd40c0be4101e05a3fa70cc5fc,http://dx.doi.org/10.1007/978-3-642-20573-6_83 4374,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,daniel zeng,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 4375,Recently strategic behavior modeling has attracted much attention of the researchers focusing on designing protocols in the area of social networks. The motivation lies in the fact that the overlay peers of the social networks are selfish in nature and they typically belong to different administrative domains. In this paper we model the strategic behavior of the selfish peers by leveraging the rich theory of mechanism design using the concept of economic auctions. By considering the bandwidth of the service offered by the origin server as the commodity we design dynamic auctions in which downstream peers submit their value of bids for each commodity at the upstream peers.,morteza analoui,Not available,2011.0,10.1007/978-3-642-20573-6_83,Information Technology and Mobile Communication,Hossein2011,False,,Springer,Not available,An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks,0020bacd40c0be4101e05a3fa70cc5fc,http://dx.doi.org/10.1007/978-3-642-20573-6_83 4376,In this paper innovative web admission auction-based algorithms are presented combined with load-balancing and QoS characteristics. Performance indexes as income of the web service or client satisfaction is discussed. Simulation experiments have been performed to validate the proposed mechanisms. They showed benefits of our developments.,jolanta wrzuszczak-noga,Not available,2011.0,10.1007/978-3-642-21332-8_15,Developing Concepts in Applied Intelligence,Jolanta2011,False,,Springer,Not available,An Approach to Auction-Based Web Server Admission Control,cc016d1f0f9fceb2f9ae4e3f23785e27,http://dx.doi.org/10.1007/978-3-642-21332-8_15 4377,In this paper innovative web admission auction-based algorithms are presented combined with load-balancing and QoS characteristics. Performance indexes as income of the web service or client satisfaction is discussed. Simulation experiments have been performed to validate the proposed mechanisms. They showed benefits of our developments.,leszek borzemski,Not available,2011.0,10.1007/978-3-642-21332-8_15,Developing Concepts in Applied Intelligence,Jolanta2011,False,,Springer,Not available,An Approach to Auction-Based Web Server Admission Control,cc016d1f0f9fceb2f9ae4e3f23785e27,http://dx.doi.org/10.1007/978-3-642-21332-8_15 4378,Sponsored Search Auctions (SSA) are gaining widespread attention in web commerce community because of their highly targeted customers and billion dollars revenue generating online market. Unlike other form of auctions this class possesses fairly complex interaction among its key players Users Advertisers and Search Engines. Therefore research issues pertaining to SSA are being explored with large momentum in eclectic domains e.g. game theory algorithmic theory and machine learning etc. Though problems related to different pricing schemes in SSA need more focus from researchers especially in analyzing adaptive pricing measures .This work is an effort towards making diligent use of information available in terms of different auctions’ situations by ingraining best of major popular pricing schemes in which switching among pricing is made by hierarchical fuzzy classification. Effectiveness of the proposed scheme is illustrated through experimental results.,madhu kumari,Not available,2011.0,10.1007/978-3-642-22555-0_7,Advances in Computing and Information Technology,Madhu2011,False,,Springer,Not available,An Adaptive Pricing Scheme in Sponsored Search Auction: A Hierarchical Fuzzy Classification Approach,746b3ef47c92feb81b8304e9b2ad5b76,http://dx.doi.org/10.1007/978-3-642-22555-0_7 4379,Sponsored Search Auctions (SSA) are gaining widespread attention in web commerce community because of their highly targeted customers and billion dollars revenue generating online market. Unlike other form of auctions this class possesses fairly complex interaction among its key players Users Advertisers and Search Engines. Therefore research issues pertaining to SSA are being explored with large momentum in eclectic domains e.g. game theory algorithmic theory and machine learning etc. Though problems related to different pricing schemes in SSA need more focus from researchers especially in analyzing adaptive pricing measures .This work is an effort towards making diligent use of information available in terms of different auctions’ situations by ingraining best of major popular pricing schemes in which switching among pricing is made by hierarchical fuzzy classification. Effectiveness of the proposed scheme is illustrated through experimental results.,kamal bharadwaj,Not available,2011.0,10.1007/978-3-642-22555-0_7,Advances in Computing and Information Technology,Madhu2011,False,,Springer,Not available,An Adaptive Pricing Scheme in Sponsored Search Auction: A Hierarchical Fuzzy Classification Approach,746b3ef47c92feb81b8304e9b2ad5b76,http://dx.doi.org/10.1007/978-3-642-22555-0_7 4380,A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and consequently suggest avenues for further research.,chris anderson,Not available,2011.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,K2011,False,,Springer,Not available,Name-your-own price auction mechanisms – Modeling and future implications,4f1922bcc2054f3bdd3fc547847f1667,http://dx.doi.org/10.1057/rpm.2010.46 4381,A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and consequently suggest avenues for further research.,john wilson,Not available,2011.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,K2011,False,,Springer,Not available,Name-your-own price auction mechanisms – Modeling and future implications,4f1922bcc2054f3bdd3fc547847f1667,http://dx.doi.org/10.1057/rpm.2010.46 4382,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,cong feng,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 4383,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,scott fay,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 4384,This research investigates the buyer and seller characteristics that impact overbidding in electronic auctions. Specifically the empirical analysis shows that customers with more total experience are less likely to overbid and that overbidding is less frequent for auction items with higher face values. When bidder experience pertains to the same product category the frequency and magnitude of overbids are further reduced. This research also finds that consumers are more likely to overbid as the bidding environment becomes more competitive. Furthermore auction item attributes such as starting price day/time of the auction and shipping fees are shown to impact the propensity to overbid and the magnitude of overbidding. The empirical results have important implications for understanding bidder behavior and for assisting online sellers in formulating more profitable selling strategies.,k. sivakumar,Not available,2016.0,10.1007/s11747-015-0450-9,Journal of the Academy of Marketing Science,Cong2016,False,,Springer,Not available,Overbidding in electronic auctions: factors influencing the propensity to overbid and the magnitude of overbidding,ff5b8f52c0ecf23387af32c9362918b4,http://dx.doi.org/10.1007/s11747-015-0450-9 4385,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,james cox,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 4386,It is often observed in first-price sealed-bid auction experiments that subjects tend to bid above the risk neutral Nash equilibrium predictions. One possible explanation for this overbidding phenomenon is that bidders subjectively weight their winning probabilities. In the relevant literature the probability weighting functions (PWFs) suggested to explain overbidding imply the underweighting of all probabilities. However such functions are not in accordance with the PWFs commonly used in the literature (i.e. inverse S-shaped functions). In this paper we introduce inverse S-shaped PWFs into first-price sealed-bid auctions and investigate the extent to which such weighting functions explain overbidding. Our results indicate that bidders with low valuations underbid whereas those with high valuations overbid. We accordingly conclude that inverse S-shaped PWFs provide a partial explanation for overbidding.,kerim keskin,Not available,2016.0,10.1007/s10058-015-0183-8,Review of Economic Design,Kerim2016,False,,Springer,Not available,Inverse S-shaped probability weighting functions in first-price sealed-bid auctions,8b237605120a799b1a49fde4e9b0ab26,http://dx.doi.org/10.1007/s10058-015-0183-8 4387,The market for modern Indian art is an emerging art market having come into a proper existence only in the late 1990s. This market saw tremendous growth in its initial years then a downturn that started around 2007–2008. Using data from auctions conducted by a major Indian art auctioneer we estimate via hedonic regression a price index for paintings and drawings by Indian artists sold during 2000–2013. We are able to thus estimate a rate of return on Indian art as an investment and also shed light on what drives the price of a painting in the Indian market.,jenny hawkins,Not available,2016.0,10.1057/eej.2015.39,Eastern Economic Journal,R2016,False,,Springer,Not available,Returns on Indian Art during 2000–2013,24ed3dde3d1c814ed57d417d257d2ba4,http://dx.doi.org/10.1057/eej.2015.39 4388,The market for modern Indian art is an emerging art market having come into a proper existence only in the late 1990s. This market saw tremendous growth in its initial years then a downturn that started around 2007–2008. Using data from auctions conducted by a major Indian art auctioneer we estimate via hedonic regression a price index for paintings and drawings by Indian artists sold during 2000–2013. We are able to thus estimate a rate of return on Indian art as an investment and also shed light on what drives the price of a painting in the Indian market.,viplav saini,Not available,2016.0,10.1057/eej.2015.39,Eastern Economic Journal,R2016,False,,Springer,Not available,Returns on Indian Art during 2000–2013,24ed3dde3d1c814ed57d417d257d2ba4,http://dx.doi.org/10.1057/eej.2015.39 4389,In this paper we model wholesale electricity markets as infinitely repeated games that are played under demand uncertainty. We examine the uniform-price auction and show that symmetric bidding at the price cap constitutes the optimal collusive equilibrium under perfectly inelastic demand in the duopoly and oligopoly models. We further extend our analysis to study the impact of price-responsive demand and cost-asymmetry on the collusive equilibrium. The main implication of our analysis is the importance of a vigilant energy regulatory authority to the success of liberalized electricity markets.,richard benjamin,Not available,2016.0,10.1007/s11151-015-9481-0,Review of Industrial Organization,Richard2016,False,,Springer,Not available,Tacit Collusion in Electricity Markets with Uncertain Demand,c24b5a1b616f08f7209bd2b3315e946e,http://dx.doi.org/10.1007/s11151-015-9481-0 4390,Auction theory has undergone two waves of innovation. The first which originated with Vickrey (,lawrence ausubel,Not available,2016.0,10.1057/978-1-349-95121-5_2746-1,The New Palgrave Dictionary of Economics,M.2016,False,,Springer,Not available,Auctions (Theory),7e0a9d66a7accf721637ec47402794a6,http://dx.doi.org/10.1057/978-1-349-95121-5_2746-1 4391,How should a coalition of cooperating players allocate payoffs to its members? This question arises in a broad range of situations and evokes an equally broad range of issues. For example it raises technical issues in accounting if the players are divisions of a corporation but involves issues of social justice when the context is how people behave in society.Despite the breadth of possible applications coalitional game theory offers a unified framework and solutions for addressing such qsts. This article presents some of its major models and proposed solutions.,ehud kalai,Not available,2016.0,10.1057/978-1-349-95121-5_2615-1,The New Palgrave Dictionary of Economics,Ehud2016,False,,Springer,Not available,Games in Coalitional Form,fab969c1b68d1d669e387745d42960a4,http://dx.doi.org/10.1057/978-1-349-95121-5_2615-1 4392,Work at the intersection of computer science and game theory is briefly surveyed with a focus on the work in computer science. In particular the following topics are considered: various roles of computational complexity in game theory including modelling bounded rationality its role in mechanism design and the problem of computing Nash equilibria; the ,joseph halpern,Not available,2016.0,10.1057/978-1-349-95121-5_2133-1,The New Palgrave Dictionary of Economics,Y.2016,False,,Springer,Not available,Computer Science and Game Theory,f24f1666c7eaa6d0033f8c99c65ed523,http://dx.doi.org/10.1057/978-1-349-95121-5_2133-1 4393,The basic theory of strategic and extensive games is described. Strategic games Bayesian games extensive games with perfect information and extensive games with imperfect information are defined and explained. Among the solution concepts discussed are Nash equilibrium correlated equilibrium rationalizability subgame perfect equilibrium and weak sequential equilibrium.,martin osborne,Not available,2016.0,10.1057/978-1-349-95121-5_2694-1,The New Palgrave Dictionary of Economics,J.2016,False,,Springer,Not available,Strategic and Extensive Form Games,af68bb5e1d75c52ee6b46399eecf04fb,http://dx.doi.org/10.1057/978-1-349-95121-5_2694-1 4394,Experimental methods have features in common across all the sciences. All tend to use the framework of falsification but there is inherent ambiguity in knowing which of the many hypotheses necessary to construct a test are negated by observations contrary to predictions. This ambiguity tends to engender much discussion contestability and the design of new experiments that attempt to resolve the open qsts. This social process is not part of the logic of scientific testing but it explains what scientists do and how new results become established.,vernon smith,Not available,2016.0,10.1057/978-1-349-95121-5_2122-1,The New Palgrave Dictionary of Economics,L.2016,False,,Springer,Not available,Experimental Economics,db9ce7332ee3b722ef4a82e9978b694f,http://dx.doi.org/10.1057/978-1-349-95121-5_2122-1 4395,Mechanism design experiments bridge the gap between a theoretical mechanism and an actual economic process. In the domain of public goods matching and combinatorial auctions and laboratory experiments identify features of mechanisms that lead to good performance when implemented among boundedly rational agents. These features include dynamic stability and security in public goods mechanisms transparency in matching mechanisms package bidding simultaneity and iteration in combinatorial auctions.,yan chen,Not available,2016.0,10.1057/978-1-349-95121-5_2071-1,The New Palgrave Dictionary of Economics,Yan2016,False,,Springer,Not available,Mechanism Design Experiments,92864b44571a528542facb39770fc9ce,http://dx.doi.org/10.1057/978-1-349-95121-5_2071-1 4396,In both consumer purchasing and industrial procurement combinatorial interdependencies among the items to be purchased are commonplace. E-commerce compounds the problem by providing more opportunities for switching suppliers at low costs but also potentially eases the problem by enabling automated market decision-making systems commonly referred to as trading agents to make purchasing decisions in an integrated manner across markets. We are investigating a new approach to deal with the combinatorial interdependency challenges for online markets. This approach relies on existing commercial online market institutions such as posted-offer markets and various online auctions that sell single items. It uses trading agents to coordinate a buyer’s purchasing and bidding activities across multiple online markets simultaneously to achieve the best overall procurement effectiveness. This paper presents two sets of models related to this approach. The first set of models formalizes optimal purchasing decisions across posted-offer markets with fixed transaction costs. The second set of models is concerned with the coordination of bidding activities across multiple online auctions.,moshe dror,Not available,2007.0,10.1007/s10257-006-0037-6,Information Systems and e-Business Management,D.2007,False,,Springer,Not available,Coordination of purchasing and bidding activities across posted offer and auction markets,c9c2ceb5914c58d24edda13433c77e2b,http://dx.doi.org/10.1007/s10257-006-0037-6 4397,Mechanism design experiments bridge the gap between a theoretical mechanism and an actual economic process. In the domain of public goods matching and combinatorial auctions and laboratory experiments identify features of mechanisms that lead to good performance when implemented among boundedly rational agents. These features include dynamic stability and security in public goods mechanisms transparency in matching mechanisms package bidding simultaneity and iteration in combinatorial auctions.,john ledyard,Not available,2016.0,10.1057/978-1-349-95121-5_2071-1,The New Palgrave Dictionary of Economics,Yan2016,False,,Springer,Not available,Mechanism Design Experiments,92864b44571a528542facb39770fc9ce,http://dx.doi.org/10.1057/978-1-349-95121-5_2071-1 4398,Free riding the behavior of attempting to benefit resources contributed by others while sharing their own values as minimum as possible is one of the key problems in many P2P systems. Incentive mechanisms are proposed to solve the problem. In this paper we introduce an all-pay auction model to study the resource distribution process in BitTorrent-like P2P system. Based on this model the advantages and disadvantages of original BitTorrent incentives are presented. To improve the BitTorrent system-wide performance we propose a price differentiation all-pay auction based incentive mechanism considering the long-term share ratio and the short-term predicted upload bandwidth comprehensively. Our simulation results verify the effectiveness of the new incentive mechanism to prevent free-riders and strategic peers.,yan pang,Not available,2010.0,10.1007/978-3-642-13067-0_71,Advances in Grid and Pervasive Computing,Yan2010,False,,Springer,Not available,Price Differentiation All-Pay Auction-Based Incentives in BitTorrent,234bacdc47d222e680e531221d0c4586,http://dx.doi.org/10.1007/978-3-642-13067-0_71 4399,Free riding the behavior of attempting to benefit resources contributed by others while sharing their own values as minimum as possible is one of the key problems in many P2P systems. Incentive mechanisms are proposed to solve the problem. In this paper we introduce an all-pay auction model to study the resource distribution process in BitTorrent-like P2P system. Based on this model the advantages and disadvantages of original BitTorrent incentives are presented. To improve the BitTorrent system-wide performance we propose a price differentiation all-pay auction based incentive mechanism considering the long-term share ratio and the short-term predicted upload bandwidth comprehensively. Our simulation results verify the effectiveness of the new incentive mechanism to prevent free-riders and strategic peers.,zongming guo,Not available,2010.0,10.1007/978-3-642-13067-0_71,Advances in Grid and Pervasive Computing,Yan2010,False,,Springer,Not available,Price Differentiation All-Pay Auction-Based Incentives in BitTorrent,234bacdc47d222e680e531221d0c4586,http://dx.doi.org/10.1007/978-3-642-13067-0_71 4400,Experimental work in auctions interacts with theory providing a basis for testing and modifying theoretical developments. It has advantages and disadvantages relative to empirical work with field data so that we view the two as complimentary. Experimental work is used increasingly as a test bed for new auction formats such as the Federal Communication Commission’s (FCC) sale of spectrum (air-wave) rights.,john kagel,Not available,2010.0,10.1057/9780230280786_3,Behavioural and Experimental Economics,H.2010,False,,Springer,Not available,auctions (experiments),428b72bad786988334156971a6c672b9,http://dx.doi.org/10.1057/9780230280786_3 4401,Experimental work in auctions interacts with theory providing a basis for testing and modifying theoretical developments. It has advantages and disadvantages relative to empirical work with field data so that we view the two as complimentary. Experimental work is used increasingly as a test bed for new auction formats such as the Federal Communication Commission’s (FCC) sale of spectrum (air-wave) rights.,dan levin,Not available,2010.0,10.1057/9780230280786_3,Behavioural and Experimental Economics,H.2010,False,,Springer,Not available,auctions (experiments),428b72bad786988334156971a6c672b9,http://dx.doi.org/10.1057/9780230280786_3 4402,A common approach to analyzing repeated auctions such as sponsored search auctions is to treat them as complete information games because it is assumed that over time players learn each other’s types. This overlooks the possibility that players may impersonate another type. Many standard auctions (including generalized second price auctions and core-selecting auctions) as well as the Kelly mechanism have profitable impersonations. We define a notion of impersonation-proofness for the auction mechanism coupled with a process by which players learn about each other’s type and show an equivalence to a problem of dominant-strategy mechanism design.,ian kash,Not available,2010.0,10.1007/978-3-642-17572-5_42,Internet and Network Economics,A.2010,False,,Springer,Not available,Impersonation Strategies in Auctions,84cbb5e5d91c478eef2002f6ce259afe,http://dx.doi.org/10.1007/978-3-642-17572-5_42 4403,A common approach to analyzing repeated auctions such as sponsored search auctions is to treat them as complete information games because it is assumed that over time players learn each other’s types. This overlooks the possibility that players may impersonate another type. Many standard auctions (including generalized second price auctions and core-selecting auctions) as well as the Kelly mechanism have profitable impersonations. We define a notion of impersonation-proofness for the auction mechanism coupled with a process by which players learn about each other’s type and show an equivalence to a problem of dominant-strategy mechanism design.,david parkes,Not available,2010.0,10.1007/978-3-642-17572-5_42,Internet and Network Economics,A.2010,False,,Springer,Not available,Impersonation Strategies in Auctions,84cbb5e5d91c478eef2002f6ce259afe,http://dx.doi.org/10.1007/978-3-642-17572-5_42 4404,In this chapter the description of a new version of the MUSSA model is presented. The supply side of the model leading to new equilibrium problems and a solution algorithm that enhances the model performance has been significantly improved. The model is designed to forecast the expected location of agents residents and firms in an urban area. The model stands upon the paradigm of static market equilibrium.,francisco martinez,Not available,2010.0,10.1007/978-3-642-12788-5_5,Residential Location Choice,Francisco2010,False,,Springer,Not available,The MUSSA II Land Use Auction Equilibrium Model,0e9513b1938ac43160c2976f71311b0d,http://dx.doi.org/10.1007/978-3-642-12788-5_5 4405,In this chapter the description of a new version of the MUSSA model is presented. The supply side of the model leading to new equilibrium problems and a solution algorithm that enhances the model performance has been significantly improved. The model is designed to forecast the expected location of agents residents and firms in an urban area. The model stands upon the paradigm of static market equilibrium.,pedro donoso,Not available,2010.0,10.1007/978-3-642-12788-5_5,Residential Location Choice,Francisco2010,False,,Springer,Not available,The MUSSA II Land Use Auction Equilibrium Model,0e9513b1938ac43160c2976f71311b0d,http://dx.doi.org/10.1007/978-3-642-12788-5_5 4406,Online auctions have become a popular method for business transactions. The variety of different auction rules restrictions in supply or demand and the agents’ combinatorial preferences for sets of goods mean that realistic scenarios are very complex. Using game theory we design trading strategies for participating in a single auction or group of similar auctions. A number of concerns need to be considered in order to account for all the relevant features of real-world auctions; these include: budget constraints uncertainty in the value of the desired goods the auction reserve prices the bidders’ attitudes towards risk purchasing multiple units competition and spitefulness between bidders the existence of multiple sources for each good. To design a realistic agent it is necessary to analyze the multi-unit auctions in which a combination of these issues are present together and we have made significant progress towards this goal. Furthermore we use a principled methodology utilizing empirical evaluation to combine these results into the design of agents capable of bidding in the general real-world scenarios.,ioannis vetsikas,Not available,2010.0,10.1007/978-3-642-12842-4_31,Artificial Intelligence: Theories Models and Applications,A.2010,False,,Springer,Not available,Designing Trading Agents for Real-World Auctions,f414112a6515a4fb7f3b647cc5a1d29d,http://dx.doi.org/10.1007/978-3-642-12842-4_31 4407,We study the use of auction algorithm in allocating a wireless fading channel among a set of non-cooperating users in both downlink and uplink communication scenarios. For the downlink case we develop a novel auction-based algorithm to allow users to fairly compete for a wireless fading channel. We use the all-pay auction mechanism whereby user bid for the channel during each time-slot based on the fade state of the channel and the user that makes the higher bid wins use of the channel. Under the assumption that each user has a limited budget for bidding we show the existence of a unique Nash equilibrium strategy. We show that the strategy achieves a throughput allocation for each user that is proportional to the user’s budget and establish that the aggregate throughput received by the users using the Nash equilibrium strategy is at least 3/4 of what can be obtained using an optimal centralized allocation scheme that does not take fairness into account.For the uplink case we present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a limited amount of energy available a user opportunistically adjusts its transmission power based on its own channel state to maximize the user’s own individual throughput. We derive an explicit form of the Nash equilibrium power allocation strategy. Furthermore this Nash equilibrium power allocation strategy is unique under certain capture rule. We also quantify the loss of efficiency in throughput due to user’s selfish behavior. Moreover as the number of users in the system increases the total system throughput obtained by using a Nash equilibrium strategy approaches the maximum attainable throughput.,jun sun,Not available,2007.0,10.1007/978-0-387-48945-2_13,Wireless Communications,Jun2007,False,,Springer,Not available,Fair Allocation of A Wireless Fading Channel: An Auction Approach,7779c974ed5247c04fececaeca3ffb92,http://dx.doi.org/10.1007/978-0-387-48945-2_13 4408,Online auctions have become a popular method for business transactions. The variety of different auction rules restrictions in supply or demand and the agents’ combinatorial preferences for sets of goods mean that realistic scenarios are very complex. Using game theory we design trading strategies for participating in a single auction or group of similar auctions. A number of concerns need to be considered in order to account for all the relevant features of real-world auctions; these include: budget constraints uncertainty in the value of the desired goods the auction reserve prices the bidders’ attitudes towards risk purchasing multiple units competition and spitefulness between bidders the existence of multiple sources for each good. To design a realistic agent it is necessary to analyze the multi-unit auctions in which a combination of these issues are present together and we have made significant progress towards this goal. Furthermore we use a principled methodology utilizing empirical evaluation to combine these results into the design of agents capable of bidding in the general real-world scenarios.,nicholas jennings,Not available,2010.0,10.1007/978-3-642-12842-4_31,Artificial Intelligence: Theories Models and Applications,A.2010,False,,Springer,Not available,Designing Trading Agents for Real-World Auctions,f414112a6515a4fb7f3b647cc5a1d29d,http://dx.doi.org/10.1007/978-3-642-12842-4_31 4409,We introduce the ,patrick jordan,Not available,2010.0,10.1007/978-3-642-15117-0_11,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,R.2010,False,,Springer,Not available,Designing an Ad Auctions Game for the Trading Agent Competition,50c88709f3fe221118c318b7754beeeb,http://dx.doi.org/10.1007/978-3-642-15117-0_11 4410,We introduce the ,michael wellman,Not available,2010.0,10.1007/978-3-642-15117-0_11,Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,R.2010,False,,Springer,Not available,Designing an Ad Auctions Game for the Trading Agent Competition,50c88709f3fe221118c318b7754beeeb,http://dx.doi.org/10.1007/978-3-642-15117-0_11 4411,We study the combinatorial auction (CA) problem in which ,allan borodin,Not available,2010.0,10.1007/978-3-642-14165-2_9,Automata Languages and Programming,Allan2010,False,,Springer,Not available,On the Limitations of Greedy Mechanism Design for Truthful Combinatorial Auctions,f64a8e20c5757b13c758a46f53236674,http://dx.doi.org/10.1007/978-3-642-14165-2_9 4412,We study the combinatorial auction (CA) problem in which ,brendan lucier,Not available,2010.0,10.1007/978-3-642-14165-2_9,Automata Languages and Programming,Allan2010,False,,Springer,Not available,On the Limitations of Greedy Mechanism Design for Truthful Combinatorial Auctions,f64a8e20c5757b13c758a46f53236674,http://dx.doi.org/10.1007/978-3-642-14165-2_9 4413,This paper focus on biding and pricing strategies in a scenario twoheterogeneous products manufacturers selling through on-line channel. The firms competes customers in quality to price ratio. The value of prominent AdWords advertising position and the resulting price dispersion patterns are studied. We found that prominent position of an Ad words is not always favorite to all firms according to the analysis based on game theory. For the firm which produced high-quality products the revenue gained from listed on the prominent place is always higher than in the second place; However for the low-quality product firm the revenue gained from its advertisement listed on the prominent place might less than on the second place. Meanwhile the attractiveness of the prominent Ad place depends on the market structure in terms of consumer preference and consumer search behavior. The more consumers purchase from the firm listed in the prominent Ad places or the more consumers prefer high-quality product the more strict area in which the low-quality product manufacture has positive profit.,e. zhang,Not available,2010.0,10.1007/978-3-642-13498-2_16,Advances in Swarm Intelligence,E.2010,False,,Springer,Not available,Pricing and Bidding Strategy in AdWords Auction under Heterogeneous Products Scenario,8e96af1cab15d0ce5fa49d016958f606,http://dx.doi.org/10.1007/978-3-642-13498-2_16 4414,This paper focus on biding and pricing strategies in a scenario twoheterogeneous products manufacturers selling through on-line channel. The firms competes customers in quality to price ratio. The value of prominent AdWords advertising position and the resulting price dispersion patterns are studied. We found that prominent position of an Ad words is not always favorite to all firms according to the analysis based on game theory. For the firm which produced high-quality products the revenue gained from listed on the prominent place is always higher than in the second place; However for the low-quality product firm the revenue gained from its advertisement listed on the prominent place might less than on the second place. Meanwhile the attractiveness of the prominent Ad place depends on the market structure in terms of consumer preference and consumer search behavior. The more consumers purchase from the firm listed in the prominent Ad places or the more consumers prefer high-quality product the more strict area in which the low-quality product manufacture has positive profit.,yiqin zhuo,Not available,2010.0,10.1007/978-3-642-13498-2_16,Advances in Swarm Intelligence,E.2010,False,,Springer,Not available,Pricing and Bidding Strategy in AdWords Auction under Heterogeneous Products Scenario,8e96af1cab15d0ce5fa49d016958f606,http://dx.doi.org/10.1007/978-3-642-13498-2_16 4415,We study mechanism design for social welfare maximization in combinatorial auctions with general bidders given by demand oracles. It is a major open problem in this setting to design a deterministic truthful auction which would provide the best possible approximation guarantee in polynomial time even if bidders are double-minded (i.e. they assign positive value to only two sets in their demand collection). On the other hand there are known such randomized truthful auctions in this setting. In the general model of verification (i.e. some kind of overbidding can be detected) we design the first ,piotr krysta,Not available,2010.0,10.1007/978-3-642-15781-3_4,Algorithms – ESA 2010,Piotr2010,False,,Springer,Not available,Combinatorial Auctions with Verification Are Tractable,37ad9513fe1e2b67ffad6ed37a90b008,http://dx.doi.org/10.1007/978-3-642-15781-3_4 4416,We study mechanism design for social welfare maximization in combinatorial auctions with general bidders given by demand oracles. It is a major open problem in this setting to design a deterministic truthful auction which would provide the best possible approximation guarantee in polynomial time even if bidders are double-minded (i.e. they assign positive value to only two sets in their demand collection). On the other hand there are known such randomized truthful auctions in this setting. In the general model of verification (i.e. some kind of overbidding can be detected) we design the first ,carmine ventre,Not available,2010.0,10.1007/978-3-642-15781-3_4,Algorithms – ESA 2010,Piotr2010,False,,Springer,Not available,Combinatorial Auctions with Verification Are Tractable,37ad9513fe1e2b67ffad6ed37a90b008,http://dx.doi.org/10.1007/978-3-642-15781-3_4 4417,Allocating scarce resources is a difficult duty governments must face. Furthermore when participants exhibit complex preference structures (substitutes and complements) this task is even trickier. Combinatorial auctions are a good alternative for solving this problem. In this work we have developed a simulator of a combinatorial first-price sealed-bid auction. The bidding behaviour has been simulated by the application of co-evolutionary dynamics in an agent-based model. This model assumes independent bidders with bounded rationality trying to maximize profits. Finally the simulations have been tested for two environments that involve the sale of spectrum licenses (,asuncion mochon,Not available,2010.0,10.1007/978-3-642-13947-5_5,Progress in Artificial Economics,Asuncion2010,False,,Springer,Not available,Co-evolutionary Agents in Combinatorial Sealed-bid Auctions for Spectrum Licenses Markets,8e9ecdf2897042fd2ade8b0bc9610dae,http://dx.doi.org/10.1007/978-3-642-13947-5_5 4418,We study the use of auction algorithm in allocating a wireless fading channel among a set of non-cooperating users in both downlink and uplink communication scenarios. For the downlink case we develop a novel auction-based algorithm to allow users to fairly compete for a wireless fading channel. We use the all-pay auction mechanism whereby user bid for the channel during each time-slot based on the fade state of the channel and the user that makes the higher bid wins use of the channel. Under the assumption that each user has a limited budget for bidding we show the existence of a unique Nash equilibrium strategy. We show that the strategy achieves a throughput allocation for each user that is proportional to the user’s budget and establish that the aggregate throughput received by the users using the Nash equilibrium strategy is at least 3/4 of what can be obtained using an optimal centralized allocation scheme that does not take fairness into account.For the uplink case we present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a limited amount of energy available a user opportunistically adjusts its transmission power based on its own channel state to maximize the user’s own individual throughput. We derive an explicit form of the Nash equilibrium power allocation strategy. Furthermore this Nash equilibrium power allocation strategy is unique under certain capture rule. We also quantify the loss of efficiency in throughput due to user’s selfish behavior. Moreover as the number of users in the system increases the total system throughput obtained by using a Nash equilibrium strategy approaches the maximum attainable throughput.,eytan modiano,Not available,2007.0,10.1007/978-0-387-48945-2_13,Wireless Communications,Jun2007,False,,Springer,Not available,Fair Allocation of A Wireless Fading Channel: An Auction Approach,7779c974ed5247c04fececaeca3ffb92,http://dx.doi.org/10.1007/978-0-387-48945-2_13 4419,Allocating scarce resources is a difficult duty governments must face. Furthermore when participants exhibit complex preference structures (substitutes and complements) this task is even trickier. Combinatorial auctions are a good alternative for solving this problem. In this work we have developed a simulator of a combinatorial first-price sealed-bid auction. The bidding behaviour has been simulated by the application of co-evolutionary dynamics in an agent-based model. This model assumes independent bidders with bounded rationality trying to maximize profits. Finally the simulations have been tested for two environments that involve the sale of spectrum licenses (,yago saez,Not available,2010.0,10.1007/978-3-642-13947-5_5,Progress in Artificial Economics,Asuncion2010,False,,Springer,Not available,Co-evolutionary Agents in Combinatorial Sealed-bid Auctions for Spectrum Licenses Markets,8e9ecdf2897042fd2ade8b0bc9610dae,http://dx.doi.org/10.1007/978-3-642-13947-5_5 4420,Allocating scarce resources is a difficult duty governments must face. Furthermore when participants exhibit complex preference structures (substitutes and complements) this task is even trickier. Combinatorial auctions are a good alternative for solving this problem. In this work we have developed a simulator of a combinatorial first-price sealed-bid auction. The bidding behaviour has been simulated by the application of co-evolutionary dynamics in an agent-based model. This model assumes independent bidders with bounded rationality trying to maximize profits. Finally the simulations have been tested for two environments that involve the sale of spectrum licenses (,jose gomez-barroso,Not available,2010.0,10.1007/978-3-642-13947-5_5,Progress in Artificial Economics,Asuncion2010,False,,Springer,Not available,Co-evolutionary Agents in Combinatorial Sealed-bid Auctions for Spectrum Licenses Markets,8e9ecdf2897042fd2ade8b0bc9610dae,http://dx.doi.org/10.1007/978-3-642-13947-5_5 4421,Allocating scarce resources is a difficult duty governments must face. Furthermore when participants exhibit complex preference structures (substitutes and complements) this task is even trickier. Combinatorial auctions are a good alternative for solving this problem. In this work we have developed a simulator of a combinatorial first-price sealed-bid auction. The bidding behaviour has been simulated by the application of co-evolutionary dynamics in an agent-based model. This model assumes independent bidders with bounded rationality trying to maximize profits. Finally the simulations have been tested for two environments that involve the sale of spectrum licenses (,pedro isasi,Not available,2010.0,10.1007/978-3-642-13947-5_5,Progress in Artificial Economics,Asuncion2010,False,,Springer,Not available,Co-evolutionary Agents in Combinatorial Sealed-bid Auctions for Spectrum Licenses Markets,8e9ecdf2897042fd2ade8b0bc9610dae,http://dx.doi.org/10.1007/978-3-642-13947-5_5 4422,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders' reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,lawrence ausubel,Not available,2004.0,10.1007/s00199-003-0398-8,Economic Theory,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,7ebd6afc572d89bc7bf92c3f71998ca1,http://dx.doi.org/10.1007/s00199-003-0398-8 4423,We generalize the Vickrey auction to allow for reserve pricing in a multi-unit auction with interdependent values. In the Vickrey auction with reserve pricing the seller determines the quantity to be made available as a function of the bidders' reports of private information and then efficiently allocates this quantity among the bidders. Truthful bidding is a dominant strategy with private values and an ,peter cramton,Not available,2004.0,10.1007/s00199-003-0398-8,Economic Theory,M.2004,False,,Springer,Not available,Vickrey auctions with reserve pricing,7ebd6afc572d89bc7bf92c3f71998ca1,http://dx.doi.org/10.1007/s00199-003-0398-8 4424,Performance under two different double auction trading mechanisms is investigated: a call market and a continuous double auction trading mechanism. Both auctions are two-sided with several buyers and several sellers. A call market is a discrete trading mechanism in which buyers (sellers) submit a single bid (offer) in each trading period and the market clears according to well-defined rules of who trades and at what prices. In a continuous double auction trades can occur at any time in the trading period with buyers and sellers free to update unaccepted bids and offers continuously. Both trading mechanisms have wide applications in field settings and have also been the subject of intense experimental study (see Holt 1995 for a survey of experimental work).,john kagel,Not available,2004.0,10.1057/9780230523371_9,Advances in Understanding Strategic Behaviour,H.2004,False,,Springer,Not available,Double Auction Markets with Stochastic Supply and Demand Schedules: Call Markets and Continuous Auction Trading Mechanisms,a44fd95cc2f35b3da7e5623e4d5ddbab,http://dx.doi.org/10.1057/9780230523371_9 4425,Mechanisms that structure bargaining between a potential buyer and potential seller are of perpetual interest to both academics and practitioners. An ‘ideal bargaining mechanism’ would enable bargaining parties to reach an agreement 100 per cent of the time when a deal is possible and collectively realize all possible gains from trade. However the only individually rational way to achieve maximum efficiency would be for the bargaining parties truthfully to reveal their private valuation which is typically not in the players’ unilateral best interests. The result: bargaining parties end up ‘walking away’ from a potentially profitable deal especially when there is a narrow trading range. The single-stage sealed-bid ,james parco,Not available,2004.0,10.1057/9780230523371_10,Advances in Understanding Strategic Behaviour,E.2004,False,,Springer,Not available,Multistage Sealed-bid ,210502eb99534f3270275d7f3e0e1c17,http://dx.doi.org/10.1057/9780230523371_10 4426,Mechanisms that structure bargaining between a potential buyer and potential seller are of perpetual interest to both academics and practitioners. An ‘ideal bargaining mechanism’ would enable bargaining parties to reach an agreement 100 per cent of the time when a deal is possible and collectively realize all possible gains from trade. However the only individually rational way to achieve maximum efficiency would be for the bargaining parties truthfully to reveal their private valuation which is typically not in the players’ unilateral best interests. The result: bargaining parties end up ‘walking away’ from a potentially profitable deal especially when there is a narrow trading range. The single-stage sealed-bid ,amnon rapoport,Not available,2004.0,10.1057/9780230523371_10,Advances in Understanding Strategic Behaviour,E.2004,False,,Springer,Not available,Multistage Sealed-bid ,210502eb99534f3270275d7f3e0e1c17,http://dx.doi.org/10.1057/9780230523371_10 4427,Mechanisms that structure bargaining between a potential buyer and potential seller are of perpetual interest to both academics and practitioners. An ‘ideal bargaining mechanism’ would enable bargaining parties to reach an agreement 100 per cent of the time when a deal is possible and collectively realize all possible gains from trade. However the only individually rational way to achieve maximum efficiency would be for the bargaining parties truthfully to reveal their private valuation which is typically not in the players’ unilateral best interests. The result: bargaining parties end up ‘walking away’ from a potentially profitable deal especially when there is a narrow trading range. The single-stage sealed-bid ,darryl seale,Not available,2004.0,10.1057/9780230523371_10,Advances in Understanding Strategic Behaviour,E.2004,False,,Springer,Not available,Multistage Sealed-bid ,210502eb99534f3270275d7f3e0e1c17,http://dx.doi.org/10.1057/9780230523371_10 4428,Mechanisms that structure bargaining between a potential buyer and potential seller are of perpetual interest to both academics and practitioners. An ‘ideal bargaining mechanism’ would enable bargaining parties to reach an agreement 100 per cent of the time when a deal is possible and collectively realize all possible gains from trade. However the only individually rational way to achieve maximum efficiency would be for the bargaining parties truthfully to reveal their private valuation which is typically not in the players’ unilateral best interests. The result: bargaining parties end up ‘walking away’ from a potentially profitable deal especially when there is a narrow trading range. The single-stage sealed-bid ,william stein,Not available,2004.0,10.1057/9780230523371_10,Advances in Understanding Strategic Behaviour,E.2004,False,,Springer,Not available,Multistage Sealed-bid ,210502eb99534f3270275d7f3e0e1c17,http://dx.doi.org/10.1057/9780230523371_10 4429,We compare sequential and bundle procurement auctions in a framework of successive procurement situations where current success positively or negatively affects future market opportunities. We find that in bundle auctions procurement cost is lower and less risky than in sequential standard auctions but still higher than in the optimal sequential auction. Only a sequential second price auction leads to the efficient outcome.,veronika grimm,Not available,2007.0,10.1007/s00712-006-0225-3,Journal of Economics,Veronika2007,False,,Springer,Not available,Sequential versus Bundle Auctions for Recurring Procurement,a3efe65386d1fc5c9bdac4ab1d7d8a91,http://dx.doi.org/10.1007/s00712-006-0225-3 4430,Mechanisms that structure bargaining between a potential buyer and potential seller are of perpetual interest to both academics and practitioners. An ‘ideal bargaining mechanism’ would enable bargaining parties to reach an agreement 100 per cent of the time when a deal is possible and collectively realize all possible gains from trade. However the only individually rational way to achieve maximum efficiency would be for the bargaining parties truthfully to reveal their private valuation which is typically not in the players’ unilateral best interests. The result: bargaining parties end up ‘walking away’ from a potentially profitable deal especially when there is a narrow trading range. The single-stage sealed-bid ,rami zwick,Not available,2004.0,10.1057/9780230523371_10,Advances in Understanding Strategic Behaviour,E.2004,False,,Springer,Not available,Multistage Sealed-bid ,210502eb99534f3270275d7f3e0e1c17,http://dx.doi.org/10.1057/9780230523371_10 4431,Auctions have found widespread use in the last few years as a technique for supporting and automating negotiations on the Internet. For example eBay now serves as a new selling channel for individuals and small and big enterprises. Another use for auctions is for industrial procurement. In both these settings traditional auction mechanisms such as the English Dutch First (or Second) price Sealed-Bid auctions are now commonplace. These auctions types are useful for settings where there is a single unit of an item being bought/sold. However since procurement problems are business-to-business they tend to be more complex and have led to the development and application of advanced auction types that allow for negotiations over multiple units of multiple items and the configuration of the attributes of items. At the heart of auctions is the problem of decentralized resource allocation.,jayant kalagnanam,Not available,2004.0,10.1007/978-1-4020-7953-5_5,Handbook of Quantitative Supply Chain Analysis,Jayant2004,False,,Springer,Not available,Auctions Bidding and Exchange Design,c63de78f0ddff715a0e076a2fd232c1f,http://dx.doi.org/10.1007/978-1-4020-7953-5_5 4432,Auctions have found widespread use in the last few years as a technique for supporting and automating negotiations on the Internet. For example eBay now serves as a new selling channel for individuals and small and big enterprises. Another use for auctions is for industrial procurement. In both these settings traditional auction mechanisms such as the English Dutch First (or Second) price Sealed-Bid auctions are now commonplace. These auctions types are useful for settings where there is a single unit of an item being bought/sold. However since procurement problems are business-to-business they tend to be more complex and have led to the development and application of advanced auction types that allow for negotiations over multiple units of multiple items and the configuration of the attributes of items. At the heart of auctions is the problem of decentralized resource allocation.,david parkes,Not available,2004.0,10.1007/978-1-4020-7953-5_5,Handbook of Quantitative Supply Chain Analysis,Jayant2004,False,,Springer,Not available,Auctions Bidding and Exchange Design,c63de78f0ddff715a0e076a2fd232c1f,http://dx.doi.org/10.1007/978-1-4020-7953-5_5 4433,By offering high-speed communication and tight connectivity advances in information technology have opened new venues for companies to create flexible supply chains. Today many companies from the electronics pharmaceutical to the automotive industry are focusing on their core competencies and outsourcing significant portions of their business operations. As supply chains become more decentralized upstream the pricing of intermediate goods is no longer a formality used between departments — but rather the key to a company’s survival. Strangely enough while companies have spent millions of dollars to help them reduce their operating costs the majority continue to use crude techniques in deciding what price to charge for their products Anthes 1999.,wedad elmaghraby,Not available,2004.0,10.1007/978-1-4020-7953-5_6,Handbook of Quantitative Supply Chain Analysis,Wedad2004,False,,Springer,Not available,Auctions and Pricing in E-Marketplaces,49fe812ac8c6bb15ee62fa0ad9956100,http://dx.doi.org/10.1007/978-1-4020-7953-5_6 4434,We introduce a procurement auction model where capacity-constrained firms face a sequence of two procurement auctions each of them in the first-price sealed-bid design. Our main findings are that the firms’ entry decisions depend on relative project completion cost levels and that equilibrium bidding in both auction stages deviates from the standard Symmetric Independent Private Value auction model (SIPV) due to opportunity costs of bidding created by possibly employed capacity. The model highlights the fact that firms with identical completion costs for the first project may differ in entry and bidding strategies. In addition experimental data is reported in order to assess the predictive power of the model.,j. reiss,Not available,2004.0,10.1007/978-3-642-17022-5_59,Operations Research Proceedings 2003,Philipp2004,False,,Springer,Not available,First-Price Bidding and Entry Behavior in a Sequential Procurement Auction Model,54bb01fbfcd185e645b9ea765585a468,http://dx.doi.org/10.1007/978-3-642-17022-5_59 4435,We introduce a procurement auction model where capacity-constrained firms face a sequence of two procurement auctions each of them in the first-price sealed-bid design. Our main findings are that the firms’ entry decisions depend on relative project completion cost levels and that equilibrium bidding in both auction stages deviates from the standard Symmetric Independent Private Value auction model (SIPV) due to opportunity costs of bidding created by possibly employed capacity. The model highlights the fact that firms with identical completion costs for the first project may differ in entry and bidding strategies. In addition experimental data is reported in order to assess the predictive power of the model.,jens schondube,Not available,2004.0,10.1007/978-3-642-17022-5_59,Operations Research Proceedings 2003,Philipp2004,False,,Springer,Not available,First-Price Bidding and Entry Behavior in a Sequential Procurement Auction Model,54bb01fbfcd185e645b9ea765585a468,http://dx.doi.org/10.1007/978-3-642-17022-5_59 4436,This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers i.e. the scheme is executed only by an auctioneer and bidders. Combinatorial auctions in which multiple goods are sold simultaneously have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentive compatibility and Pareto efficiency.Secure GVA schemes have been developed to prevent frauds by an auctioneer. However existing methods require third-party servers to execute the protocol. Having third-party servers that are operated by independent organizations is difficult in practice. Therefore it is desirable that a protocol be executed by the participants themselves. However if bidders take part in the execution of the auction procedure a bidder might have an incentive to be an active adversary so that he manipulates the declarations of other bidders to become a winner or to decrease his payment.In our proposed scheme we use a new protocol that can achieve the same outcome as the GVA. In this protocol the procedure executed by a bidder affects neither the prices nor the allocation of the bidder. Therefore a bidder does not have an incentive to be an active adversary.,makoto yokoo,Not available,2004.0,10.1007/978-3-540-27809-2_17,Financial Cryptography,Makoto2004,False,,Springer,Not available,Secure Generalized Vickrey Auction without Third-party Servers,c3c6fad6620e1730b58393a8265df022,http://dx.doi.org/10.1007/978-3-540-27809-2_17 4437,This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers i.e. the scheme is executed only by an auctioneer and bidders. Combinatorial auctions in which multiple goods are sold simultaneously have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentive compatibility and Pareto efficiency.Secure GVA schemes have been developed to prevent frauds by an auctioneer. However existing methods require third-party servers to execute the protocol. Having third-party servers that are operated by independent organizations is difficult in practice. Therefore it is desirable that a protocol be executed by the participants themselves. However if bidders take part in the execution of the auction procedure a bidder might have an incentive to be an active adversary so that he manipulates the declarations of other bidders to become a winner or to decrease his payment.In our proposed scheme we use a new protocol that can achieve the same outcome as the GVA. In this protocol the procedure executed by a bidder affects neither the prices nor the allocation of the bidder. Therefore a bidder does not have an incentive to be an active adversary.,koutarou suzuki,Not available,2004.0,10.1007/978-3-540-27809-2_17,Financial Cryptography,Makoto2004,False,,Springer,Not available,Secure Generalized Vickrey Auction without Third-party Servers,c3c6fad6620e1730b58393a8265df022,http://dx.doi.org/10.1007/978-3-540-27809-2_17 4438,In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tasks dynamically arrive from a central manager. The agents differ in their capabilities to perform a task under different world states. Previous models concerning cooperative agents aiming for a joint goal are not applicable in such environments since self interested agents have a motivation to deviate from the joint allocation strategy in order to increase their own benefits. Given the allocation protocol set by the central manager a stable solution is a set of strategies derived from an equilibrium where no agent can benefit from changing its strategy given the other agents’ strategies. Specifically we focus on a protocol in which upon arrival of a new task the central manager starts a reverse auction among the agents and the agent who bids the lowest cost wins. We introduce the model formulate its equations and suggest equilibrium strategies for the agents. By identifying specific characteristics of the equilibria we manage to suggest an efficient algorithm for enhancing the agents’ calculation of the equilibrium strategies. A comparison with the central allocation mechanism and the effect of environmental settings on the perceived equilibrium are given using several sample environments.,david sarne,Not available,2004.0,10.1007/978-3-540-30104-2_20,Cooperative Information Agents VIII,David2004,False,,Springer,Not available,Auction Equilibrium Strategies for Task Allocation in Uncertain Environments,d5c4e2a3c74aff8ed2796f37b5629143,http://dx.doi.org/10.1007/978-3-540-30104-2_20 4439,In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tasks dynamically arrive from a central manager. The agents differ in their capabilities to perform a task under different world states. Previous models concerning cooperative agents aiming for a joint goal are not applicable in such environments since self interested agents have a motivation to deviate from the joint allocation strategy in order to increase their own benefits. Given the allocation protocol set by the central manager a stable solution is a set of strategies derived from an equilibrium where no agent can benefit from changing its strategy given the other agents’ strategies. Specifically we focus on a protocol in which upon arrival of a new task the central manager starts a reverse auction among the agents and the agent who bids the lowest cost wins. We introduce the model formulate its equations and suggest equilibrium strategies for the agents. By identifying specific characteristics of the equilibria we manage to suggest an efficient algorithm for enhancing the agents’ calculation of the equilibrium strategies. A comparison with the central allocation mechanism and the effect of environmental settings on the perceived equilibrium are given using several sample environments.,meirav hadad,Not available,2004.0,10.1007/978-3-540-30104-2_20,Cooperative Information Agents VIII,David2004,False,,Springer,Not available,Auction Equilibrium Strategies for Task Allocation in Uncertain Environments,d5c4e2a3c74aff8ed2796f37b5629143,http://dx.doi.org/10.1007/978-3-540-30104-2_20 4440,Artificial stock markets are models designed to capture essential properties of real stock markets in order to reproduce analyze or understand market dynamics with computational experiments. Despite research advances in modern finance many questions remain unsolved: market dynamics exhibit for instance particular statistical properties called ,julien derveeuw,Not available,2007.0,10.1007/978-3-540-73135-1_4,Artificial Markets Modeling,Julien2007,False,,Springer,Not available,Testing Double Auction as a Component Within a Generic Market Model Architecture,7be1461bc555e207cabc2b4fd94f56e3,http://dx.doi.org/10.1007/978-3-540-73135-1_4 4441,In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tasks dynamically arrive from a central manager. The agents differ in their capabilities to perform a task under different world states. Previous models concerning cooperative agents aiming for a joint goal are not applicable in such environments since self interested agents have a motivation to deviate from the joint allocation strategy in order to increase their own benefits. Given the allocation protocol set by the central manager a stable solution is a set of strategies derived from an equilibrium where no agent can benefit from changing its strategy given the other agents’ strategies. Specifically we focus on a protocol in which upon arrival of a new task the central manager starts a reverse auction among the agents and the agent who bids the lowest cost wins. We introduce the model formulate its equations and suggest equilibrium strategies for the agents. By identifying specific characteristics of the equilibria we manage to suggest an efficient algorithm for enhancing the agents’ calculation of the equilibrium strategies. A comparison with the central allocation mechanism and the effect of environmental settings on the perceived equilibrium are given using several sample environments.,sarit kraus,Not available,2004.0,10.1007/978-3-540-30104-2_20,Cooperative Information Agents VIII,David2004,False,,Springer,Not available,Auction Equilibrium Strategies for Task Allocation in Uncertain Environments,d5c4e2a3c74aff8ed2796f37b5629143,http://dx.doi.org/10.1007/978-3-540-30104-2_20 4442,From now on transportation,tobias ihde,Not available,2004.0,10.1007/978-3-642-57430-6_4,Dynamic Alliance Auctions,Tobias2004,False,,Springer,Not available,Conventional Freight Auctions,50d30d37320a1b5cf16b9c98137bcc08,http://dx.doi.org/10.1007/978-3-642-57430-6_4 4443,This chapter serves two purposes. First it briefly explains necessary stages of a mechanism that allows for a packagewize placement of transportation orders in Internet-based marketplaces. Second it introduces a mechanism that satisfies the requirements (R1)-(R3) as Chapter 6 will later show. This mechanism is called,tobias ihde,Not available,2004.0,10.1007/978-3-642-57430-6_5,Dynamic Alliance Auctions,Tobias2004,False,,Springer,Not available,Dynamic Alliance Auctions,63aaf0530ec50bb25721a2e3a0c2bbda,http://dx.doi.org/10.1007/978-3-642-57430-6_5 4444,Zeuthen–Hicks bargaining provides a dynamic model that explains how two parties in a negotiation make concessions to reach the Nash bargaining solution. However it is not clear whether this process will always reach the global optimum corresponding to the Nash bargaining solution or could end at a local optimum or even in disagreement. In this paper we analyze different types of utility functions both analytically and in a computational study to determine under which circumstances convergence to the Nash bargaining solution will be achieved. We show that non-standard preferences involving e.g. reference point effects might indeed lead to multiple local optima of the Nash bargaining objective function and thus failure of the bargaining process. This occurs more often if expectations of parties are mutually incompatible.,luis dias,Not available,2018.0,10.1007/s40070-018-0089-0,EURO Journal on Decision Processes,C.2018,False,,Springer,Not available,Multiple local optima in Zeuthen–Hicks bargaining: an analysis of different preference models,26c31967cf088717a5e39ccf07ba8f80,http://dx.doi.org/10.1007/s40070-018-0089-0 4445,Zeuthen–Hicks bargaining provides a dynamic model that explains how two parties in a negotiation make concessions to reach the Nash bargaining solution. However it is not clear whether this process will always reach the global optimum corresponding to the Nash bargaining solution or could end at a local optimum or even in disagreement. In this paper we analyze different types of utility functions both analytically and in a computational study to determine under which circumstances convergence to the Nash bargaining solution will be achieved. We show that non-standard preferences involving e.g. reference point effects might indeed lead to multiple local optima of the Nash bargaining objective function and thus failure of the bargaining process. This occurs more often if expectations of parties are mutually incompatible.,rudolf vetschera,Not available,2018.0,10.1007/s40070-018-0089-0,EURO Journal on Decision Processes,C.2018,False,,Springer,Not available,Multiple local optima in Zeuthen–Hicks bargaining: an analysis of different preference models,26c31967cf088717a5e39ccf07ba8f80,http://dx.doi.org/10.1007/s40070-018-0089-0 4446,When agents (bidders) have multi-demand preferences uniform price auctions are generally not immune to agents’ strategic manipulation and they may achieve an inefficient allocation. We consider economies in which a large number of identical objects have to be allocated. Agents have quasi-linear preferences with non-increasing incremental valuations. We explore the incentives of agents in uniform price auctions. An important assumption on preferences is proposed called “no monopoly.” It requires that preferences should be correlated in such a way that no agent’s incremental valuation for an additional object when he receives sufficiently many objects is higher than those of the other agents. We show that under no monopoly and other mild assumptions on preferences as the number of objects goes to infinity the payment in any uniform price auction converges to that in a Vickrey auction. We deduce that when there are sufficiently many objects truth-telling is an approximate Bayesian Nash equilibrium in each uniform price auction.,tomoya tajika,Not available,2018.0,10.1007/s00182-018-0641-y,International Journal of Game Theory,Tomoya2018,False,,Springer,Not available,Non-manipulability of uniform price auctions with a large number of objects,0684fbfbe745ba9c72f403fd1b5cc9b0,http://dx.doi.org/10.1007/s00182-018-0641-y 4447,When agents (bidders) have multi-demand preferences uniform price auctions are generally not immune to agents’ strategic manipulation and they may achieve an inefficient allocation. We consider economies in which a large number of identical objects have to be allocated. Agents have quasi-linear preferences with non-increasing incremental valuations. We explore the incentives of agents in uniform price auctions. An important assumption on preferences is proposed called “no monopoly.” It requires that preferences should be correlated in such a way that no agent’s incremental valuation for an additional object when he receives sufficiently many objects is higher than those of the other agents. We show that under no monopoly and other mild assumptions on preferences as the number of objects goes to infinity the payment in any uniform price auction converges to that in a Vickrey auction. We deduce that when there are sufficiently many objects truth-telling is an approximate Bayesian Nash equilibrium in each uniform price auction.,tomoya kazumura,Not available,2018.0,10.1007/s00182-018-0641-y,International Journal of Game Theory,Tomoya2018,False,,Springer,Not available,Non-manipulability of uniform price auctions with a large number of objects,0684fbfbe745ba9c72f403fd1b5cc9b0,http://dx.doi.org/10.1007/s00182-018-0641-y 4448,Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee of availability. Observing the popularity of Amazon spot instances among the cloud users research has intensified on defining the users’ and providers’ behavior in the spot market. This work presents an exhaustive survey of spot pricing in cloud ecosystem. An insight into the Amazon spot instances and its pricing mechanism has been presented for better understanding of the spot ecosystem. Spot pricing and resource provisioning problem modeled as a market mechanism is discussed from both computational and economics perspective. A significant amount of important research papers related to price prediction and modeling spot resource provisioning bidding strategy designing etc. are summarized and categorized to evaluate the state of the art in the context. All theoretical frameworks developed for cloud spot market are illustrated and compared in terms of the techniques and their findings. Finally research gaps are identified and various economic and computational challenges in cloud spot ecosystem are discussed as a guide to the future research.,dinesh kumar,Not available,2018.0,10.1007/s10922-017-9444-x,Journal of Network and Systems Management,Dinesh2018,False,,Springer,Not available,A Survey on Spot Pricing in Cloud Computing,03f6ba71ff6733a6c2775719560fca99,http://dx.doi.org/10.1007/s10922-017-9444-x 4449,Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee of availability. Observing the popularity of Amazon spot instances among the cloud users research has intensified on defining the users’ and providers’ behavior in the spot market. This work presents an exhaustive survey of spot pricing in cloud ecosystem. An insight into the Amazon spot instances and its pricing mechanism has been presented for better understanding of the spot ecosystem. Spot pricing and resource provisioning problem modeled as a market mechanism is discussed from both computational and economics perspective. A significant amount of important research papers related to price prediction and modeling spot resource provisioning bidding strategy designing etc. are summarized and categorized to evaluate the state of the art in the context. All theoretical frameworks developed for cloud spot market are illustrated and compared in terms of the techniques and their findings. Finally research gaps are identified and various economic and computational challenges in cloud spot ecosystem are discussed as a guide to the future research.,gaurav baranwal,Not available,2018.0,10.1007/s10922-017-9444-x,Journal of Network and Systems Management,Dinesh2018,False,,Springer,Not available,A Survey on Spot Pricing in Cloud Computing,03f6ba71ff6733a6c2775719560fca99,http://dx.doi.org/10.1007/s10922-017-9444-x 4450,Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee of availability. Observing the popularity of Amazon spot instances among the cloud users research has intensified on defining the users’ and providers’ behavior in the spot market. This work presents an exhaustive survey of spot pricing in cloud ecosystem. An insight into the Amazon spot instances and its pricing mechanism has been presented for better understanding of the spot ecosystem. Spot pricing and resource provisioning problem modeled as a market mechanism is discussed from both computational and economics perspective. A significant amount of important research papers related to price prediction and modeling spot resource provisioning bidding strategy designing etc. are summarized and categorized to evaluate the state of the art in the context. All theoretical frameworks developed for cloud spot market are illustrated and compared in terms of the techniques and their findings. Finally research gaps are identified and various economic and computational challenges in cloud spot ecosystem are discussed as a guide to the future research.,zahid raza,Not available,2018.0,10.1007/s10922-017-9444-x,Journal of Network and Systems Management,Dinesh2018,False,,Springer,Not available,A Survey on Spot Pricing in Cloud Computing,03f6ba71ff6733a6c2775719560fca99,http://dx.doi.org/10.1007/s10922-017-9444-x 4451,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4452,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4453,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4454,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4455,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4456,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4457,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4458,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4459,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4460,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4461,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4462,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4463,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4464,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4465,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4466,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4467,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4468,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4469,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4470,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4471,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4472,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4473,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4474,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4475,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4476,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4477,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4478,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4479,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4480,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 4481,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Dynamic spectrum access,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4482,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,pricing,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4483,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,game theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4484,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,auction theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4485,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Dynamic spectrum access,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4486,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,pricing,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4487,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4488,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,game theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4489,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,auction theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 4490,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Pricing,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4491,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Space technology,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4492,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Computer science,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4493,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,National electric code,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4494,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Laboratories,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4495,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Game theory,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4496,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Oligopoly,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4497,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Resource management,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4498,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4499,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,White spaces,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4500,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Cognitive radio,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4501,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Pricing,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4502,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Space technology,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4503,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Computer science,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4504,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,National electric code,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4505,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Laboratories,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4506,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Game theory,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4507,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Oligopoly,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4508,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Resource management,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4509,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4510,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,White spaces,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4511,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Cognitive radio,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4512,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Pricing,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4513,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Space technology,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4514,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Computer science,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4515,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,National electric code,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4516,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Laboratories,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4517,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Game theory,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4518,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Oligopoly,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4519,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Resource management,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4520,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4521,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,White spaces,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4522,"In the future, we can expect to see more dynamic service offerings and profiles, as users move from long-term service provider agreements to more opportunistic service models. Moreover, when the radio spectrum is itself traded in a market- based scenario, wireless service providers (WSPs) will likely require new strategies to deploy services, define service profiles, and price them. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. From an economic point of view, we analyze two main components of this overall trading system: (i) spectrum allocation to WSPs and (ii) interaction of end users with the WSPs. For this two-tier trading system, we present a winner determining sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. We propose a dynamic pricing strategy based on game theory to capture the conflict of interest between WSPs and end users, both of whom try to maximize their respective net utilities. We show that even in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price equilibrium in an oligopoly situation. Through simulation results, we show that the proposed auction entices the WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. Moreover, numerical results demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",samrat ganguly,Cognitive radio,2007.0,10.1109/DYSPAN.2007.19,2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks,Sengupta2007,False,,IEEE,Not available,An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers,8c1d1fe100e03f358f7fd86effcfec08,https://ieeexplore.ieee.org/document/4221481/ 4523,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",jeremy lin,Electricity supply industry,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4524,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",jeremy lin,Supply and demand,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4525,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",jeremy lin,Microeconomics,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4526,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",jeremy lin,Elasticity,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4527,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",jeremy lin,Aggregates,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4528,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",fernando magnago,Electricity supply industry,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4529,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",fernando magnago,Supply and demand,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4530,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",fernando magnago,Microeconomics,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4531,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4532,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",fernando magnago,Elasticity,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4533,"This chapter covers the fundamental theories and concepts of microeconomics to the extent necessary for the reader to understand the relationship between these concepts and their applications to electric power industry in general, and to electricity markets in particular. Theory of consumer behavior explains how a consumer with limited income decides which goods and services to buy based on his or her preference. Theory of a firm describes how a firm makes production decisions that minimize its cost so as to maximize its profit. The chapter provides more detailed analysis of different types of market structures and nature of competition among firms within these markets. Game theory is used to understand how markets evolve and operate. Oligopoly is a market in which only a few firms compete with one another, and entry by new firms is limited. Theory of auction explains the structures and the rules associated with auction markets and the possible market outcomes.",fernando magnago,Aggregates,,10.1002/9781119179382.ch3,Electricity Markets: Theories and Applications,LinNone,False,,IEEE,Not available,Microeconomic Theories,7b6be9c6cd67342caad99e924dad14dd, 4534,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",tran hai,auction,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4535,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",tran hai,resource allocation,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4536,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",tran hai,pricing,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4537,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",tran hai,cloud computing,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4538,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",phuong nguyen,auction,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4539,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",phuong nguyen,resource allocation,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4540,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",phuong nguyen,pricing,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4541,"Driven by pervasive mobile devices and ubiquitous wireless communication networks, mobile cloud computing emerges as an appealing paradigm to accommodate demands for running power-hungry or computation-intensive applications over resource-constrained mobile devices. Cloudlets that move available resources closer to the network edge offer a promising architecture to support real-time applications, such as online gaming and speech recognition. To stimulate service provisioning by cloudlets, it is essential to design an incentive mechanism that charges mobile devices and rewards cloudlets. Although auction has been considered as a promising form for incentive, it is challenging to design an auction mechanism that holds certain desirable properties for the cloudlet scenario. In the paper, we propose an appropriate auction mechanism for the allocation of resource between mobile devices as service users (buyers) and cloudlets as service providers (sellers). The mechanism can effectively distribute cloudlets to meet the requirement of mobile devices. By analyzing both theory and experimental results, we find that the proposed mechanism achieves individual rationality, budget balance, and near-optimal economic efficiency.",phuong nguyen,cloud computing,2017.0,10.1109/ACOMP.2017.13,2017 International Conference on Advanced Computing and Applications (ACOMP),Hai2017,False,,IEEE,Not available,A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing,590dcd97e2a775fb8119bd9af4d2a52b,https://ieeexplore.ieee.org/document/8392595/ 4542,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4543,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4544,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4545,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4546,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4547,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4548,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4549,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4550,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4551,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 4552,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Multiagent systems,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4553,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4554,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Resource management,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4555,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Power system economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4556,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Power generation economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4557,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Environmental economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4558,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Game theory,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4559,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Power system modeling,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4560,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Software engineering,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4561,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Internet,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4562,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",bang-qing li,Business,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4563,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Multiagent systems,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4564,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4565,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4566,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Resource management,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4567,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Power system economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4568,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Power generation economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4569,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Environmental economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4570,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Game theory,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4571,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Power system modeling,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4572,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Software engineering,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4573,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Internet,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4574,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",jian-chao zeng,Business,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4575,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Multiagent systems,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4576,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 4577,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Resource management,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4578,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Power system economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4579,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Power generation economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4580,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Environmental economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4581,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Game theory,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4582,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Power system modeling,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4583,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Software engineering,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4584,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Internet,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4585,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",meng wang,Business,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4586,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Multiagent systems,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4587,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4588,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Resource management,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4589,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Power system economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4590,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Power generation economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4591,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Environmental economics,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4592,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Game theory,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4593,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Power system modeling,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4594,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Software engineering,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4595,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Internet,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4596,"Agents often work together and achieve their common and individual goal under the environment where there are limited or rare resources. How to allocate these resources efficiently is critical in proceeding of cooperation and competition in multi-agent system. This paper proposes and investigates an approach to solve the problem by introducing auction theory from economics game. An agent-based multi-item auction model is studied as negotiation method so as to get some precious resources for buyer agents and allocate them for vendor agent. Some properties and impacts of agents' parameters are shown through simulating experience such as buying power, item number required by buyer agent, number of buyer agents, rules of auction and so on. All this is key and beneficial for the future mechanisms design both in agent-based software engineering and various distributed system, especially Internet-based commerce applications.",gui-mei xia,Business,2003.0,10.1109/ICMLC.2003.1259801,Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693),Li2003,False,,IEEE,Not available,A negotiation model through multi-item auction in multi-agent system,a195fcc368943e535a8804b1f3f2c059,https://ieeexplore.ieee.org/document/1259801/ 4597,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,laboratory experiments,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4598,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4599,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,behavioral operations management,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4600,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,experimental economics,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4601,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,auctions,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4602,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,operations management,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4603,"Using Laboratory Experiments to Build Better Operations Management Models focuses on controlled laboratory experiments used to test existing, and develop new, theory in operations management. Much of the methodology I discuss is in line with economics rather than psychology, which also provide a valid and useful, but different, paradigm. This monograph is organized as follows. Section 2 presents a short history of experimental economics, focusing specifically on some fundamental games that proved to be important in economics as well as in behavioral operations management. Section 3 discusses some basics of experimental design as well as ""best practices"" for conducting laboratory experiments. This section reviews issues related to providing a context, the effect of subject pool, the effect of incentives, and the uses of deception. The goal of sections 4, 5, and 6 to is outline how experiments have been used to shed light on behavioral factors within three different operational contexts -- the behavior in the Newsvendor problem (section 4), supply chain contracts (section 5), and procurement auctions (section 6). Section 7 concludes with a discussion of future trends and promising directions for future research.",elena kotak,Industrial engineering,,,Using Laboratory Experiments to Build Better Operations Management Models,KotakNone,False,,IEEE,Not available,Using Laboratory Experiments to Build Better Operations Management Models,99c1c55b77e5ddb78ca28bd295d9e292, 4604,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",tae kim,Fictitious play,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4605,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",tae kim,reinforcement learning,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4606,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",tae kim,repeated games,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4607,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",tae kim,supplier selection,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4608,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",r. bilsel,Fictitious play,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4609,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4610,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",r. bilsel,reinforcement learning,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4611,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",r. bilsel,repeated games,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4612,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",r. bilsel,supplier selection,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4613,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",soundar kumara,Fictitious play,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4614,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",soundar kumara,reinforcement learning,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4615,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",soundar kumara,repeated games,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4616,"Supplier selection is one of the most critical decisions in a supply chain. While good suppliers can contribute to the supply chain's overall performance, incorrect selection can drive the whole supply chain into disarray. In this paper, we focus on the problem of supplier selection in a manufacturing firm. We allow each supplier to compete with each other to be selected by the buyer for procurement. The competition is modeled in an auction framework as a bidding process where a supplier cannot observe immediate actions of other suppliers but has complete knowledge of their previous actions. We allow a supplier to use this knowledge in guessing other suppliers future actions and bid accordingly. Our model enables repeated games, which can be assumed to be more flexible compared to most game theory applications in the supplier selection literature. Reinforcement learning and fictitious play are used in the auction framework to implement repeated games.",soundar kumara,supplier selection,2007.0,10.1109/SOLI.2007.4383959,"2007 IEEE International Conference on Service Operations and Logistics, and Informatics",Kim2007,False,,IEEE,Not available,A Reinforcement Learning Approach for Dynamic Supplier Selection,4e0d98fb22d69b85c913fdafcbeb1f53,https://ieeexplore.ieee.org/document/4383959/ 4617,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4618,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4619,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4620,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4621,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4622,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4623,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4624,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4625,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4626,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4627,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4628,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4629,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4630,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4631,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4632,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 4633,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Internet,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4634,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Protocols,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4635,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Electronic commerce,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4636,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Artificial intelligence,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4637,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Telephony,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4638,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Costs,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4639,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Cybernetics,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4640,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Game theory,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4641,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Robustness,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4642,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4643,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Microeconomics,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 4644,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,reflexive game,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 4645,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,organization systems,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 4646,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,peer-to-peer network,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 4647,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,Data Envelopment Analysis,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 4648,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,modeling,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 4649,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4650,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4651,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4652,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4653,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4654,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4655,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4656,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4657,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4658,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4659,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4660,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4661,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 4662,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4663,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4664,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4665,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4666,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4667,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4668,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4669,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4670,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4671,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4672,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4673,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4674,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4675,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4676,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4677,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4678,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4679,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4680,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4681,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4682,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4683,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4684,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4685,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4686,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4687,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4688,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4689,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4690,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4691,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4692,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4693,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4694,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4695,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 4696,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Relays,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4697,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Quality of service,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4698,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4699,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Resource management,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4700,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Mobile communication,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4701,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Cooperative communication,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4702,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",qixuan zhu,Wireless networks,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4703,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Relays,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4704,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Quality of service,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4705,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Resource management,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4706,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Mobile communication,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4707,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Cooperative communication,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4708,"Cooperative communication is an efficient technique for mobile wireless networks supporting information transmission through relay nodes, which forward the signal received from a source node to its destination. Applying the cooperative communication in wireless networks can significantly improve the network performance. One of the most important challenges is how to efficiently allocate the access opportunity of a relay node to multiple mobile-users while taking into account the delay-bounded quality of service (QoS) for the time-sensitive multimedia data transmissions. To overcome these difficulties, in this paper we propose a novel game-theory based scheme to resolve the relay node allocation problem by measuring the maximum throughput for time-sensitive multimedia data transmission under a QoS requirement as the effective capacity gain. We formulate this one relay allocation problem as a single-relay-auction such that all mobile-user players can decide whether to patriciate in this relay auction, and the mobile-user player who places the highest bid obtains the relay allocation. The mobile-user players who lose or stay out of the auction can only directly transmit information to their destinations. Then, we derive the optimal strategies for the single-relay-auction, maximizing the payoff (effective capacity gain minus costs) in each bid round.The extensive simulation results obtained validate and evaluate our proposed schemes.",xi zhang,Wireless networks,2016.0,10.1109/GLOCOM.2016.7841767,2016 IEEE Global Communications Conference (GLOBECOM),Zhu2016,False,,IEEE,Not available,Effective-Capacity Based Auctions for Relay Selection over Wireless Cooperative Communications Networks,7e2371842ad0f6170b260f509e7b1d42,https://ieeexplore.ieee.org/document/7841767/ 4709,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4710,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,D2D,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4711,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,LTE,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4712,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,resource allocation,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4713,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,mechanism design,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4714,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,localized advertising,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4715,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,coalition,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4716,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",rafael kaliski,auction,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4717,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,D2D,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4718,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,LTE,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4719,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,resource allocation,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4720,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4721,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,mechanism design,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4722,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,localized advertising,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4723,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,coalition,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4724,"One of the goals of third generation partnership project (3GPP) is to deploy device to device (D2D) proximity services in both commercial and public safety settings. Furthermore, as the mobile market is nearing saturation, service providers (SPs) are searching for additional sources of revenue. Commercial D2D can make use of a SP's unused/underutilized spectrum, yet there are few feasible economic models for deploying commercial D2D services. In this paper, we present Localized Advertisements over D2D specTrum Reuse coAlition fraMework, which is a feasible economic model for deploying a localized advertisement coalition-based D2D service that exploits spectrum leasing and reuse. D2D Ad stations, i.e., user equipments, interested in providing the D2D service form a coalition in order to share spectrum allocated by the SP. Using game theory we design an incentive compatible resource determination mechanism and auction. In the auction localized advertisers compete for resources. We show that our auction approximates the profit performance characteristics of the vickrey clarke groves auction, yet runs in P-time. In addition, we show that with proper planning, the D2D Ad stations can be deployed in a manner such that they can fully exploit the spectrum in the subsector formed by the desired cell size. Our proposed framework enables advertisers to indirectly fund the D2D Advertisement service, while also permitting the SP the ability to profit from leasing their unused spectrum to commercial D2D services.",hung-yu wei,auction,2018.0,10.1109/TVT.2018.2853725,IEEE Transactions on Vehicular Technology,Kaliski2018,False,,IEEE,Not available,LADTRAM: A Coalition Funded Framework for Localized Advertisements Over D2D,7bad946dad6db1ca32ee6454c9466ed4,https://ieeexplore.ieee.org/document/8408482/ 4725,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4726,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4727,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4728,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4729,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4730,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4731,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4732,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4733,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4734,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4735,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4736,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4737,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4738,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4739,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4740,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4741,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4742,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4743,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4744,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4745,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4746,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4747,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4748,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4749,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4750,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4751,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4752,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4753,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4754,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4755,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4756,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4757,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4758,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4759,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4760,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4761,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4762,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4763,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 4764,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4765,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4766,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4767,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4768,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4769,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4770,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4771,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",tao jing,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4772,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4773,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4774,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4775,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4776,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4777,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4778,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4779,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",chenyu zhao,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4780,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4781,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4782,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4783,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4784,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4785,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4786,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4787,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4788,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiaoshuang xing,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4789,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4790,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4791,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4792,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4793,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4794,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4795,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",yan huo,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4796,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4797,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4798,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4799,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4800,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4801,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4802,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4803,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",wei li,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4804,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Interference,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4805,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Cognitive radio,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4806,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Resource management,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4807,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Pricing,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4808,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,TV,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4809,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4810,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Tin,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4811,"As one of the most powerful tools in game theory, double auction is widely utilized to tackle the spectrum allocation problem in a secondary market. In this paper, we propose a multi-unit double auction framework in which the conflict graph-based bidder group formation, the winner determination strategy, and the spectrum pricing are elaborately designed. Through an in-depth theoretical analysis, we prove that our auction scheme can achieve three critical properties including the individual rationality, the ex-post budget balance, and the truthfulness. Extensive simulation results validate that the proposed auction framework can significantly improve the user satisfaction degree.",xiuzhen cheng,Educational institutions,2013.0,10.1109/ICC.2013.6654967,2013 IEEE International Conference on Communications (ICC),Jing2013,False,,IEEE,Not available,A multi-unit truthful double auction framework for secondary market,aa8716dc60f94f76452c1b3aad39ab10,https://ieeexplore.ieee.org/document/6654967/ 4812,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,security,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4813,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,relay,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4814,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,spectrum leasing,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4815,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,Stackelberg game,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4816,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,Auction theory,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4817,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,cognitive radio networks,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4818,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,security,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4819,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,relay,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4820,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4821,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,spectrum leasing,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4822,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,Stackelberg game,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4823,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,Auction theory,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4824,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,cognitive radio networks,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 4825,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Game theory,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4826,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Frequency synthesizers,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4827,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Circuits,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4828,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Dynamic voltage scaling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4829,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Energy consumption,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4830,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Scheduling algorithm,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4831,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4832,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Capacitance,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4833,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Clocks,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4834,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Processor scheduling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4835,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Nash equilibrium,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4836,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Game theory,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4837,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Frequency synthesizers,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4838,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Circuits,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4839,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Dynamic voltage scaling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4840,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Energy consumption,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4841,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Scheduling algorithm,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4842,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4843,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Capacitance,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4844,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Clocks,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4845,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Processor scheduling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4846,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Nash equilibrium,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 4847,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,auction,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4848,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,strategy,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4849,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,game theory,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4850,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,computer algebra system,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4851,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,auction,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4852,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,strategy,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4853,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4854,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,game theory,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4855,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,computer algebra system,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 4856,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Game theory,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4857,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Cost function,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4858,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Data engineering,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4859,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Delay,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4860,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Network servers,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4861,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Computational complexity,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4862,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Distributed computing,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4863,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Computer networks,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4864,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4865,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Computer science,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4866,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Constraint optimization,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4867,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Game theory,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4868,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Cost function,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4869,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Data engineering,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4870,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Delay,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4871,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Network servers,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4872,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Computational complexity,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4873,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Distributed computing,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4874,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Computer networks,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4875,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4876,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Computer science,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4877,"Creating replicas of frequently accessed data objects across a read intensive network can lead to reduced communication cost and end-user response time. On the contrary, data replication in the presence of writes incurs extra cost due to multiple updates. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of the current state-of-the-art replica placement techniques suffer from high computational complexity issues. To circumvent such issues, we propose a cooperative game theoretical technique in which the servers (players) in the system collectively deliberate to converge at a replica schema that is beneficial to the system as a whole. In particular we make use of the Aumann-Shapley mechanism of cooperative game theory to propose an effective replica placement technique that yields good solutions when the system is very heavily loaded. Experimental comparisons are made against: (1) branch and bound, (2) greedy, (3) genetic, (4) Dutch auction, and (5) English auction. As demonstrated by the experimental results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Constraint optimization,2007.0,10.1109/ICPADS.2007.4447750,2007 International Conference on Parallel and Distributed Systems,Khan2007,False,,IEEE,Not available,A cooperative game theoretical replica placement technique,b26f1ce9c970904a57aee9dc375d574d,https://ieeexplore.ieee.org/document/4447750/ 4878,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Device-to-device communication,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4879,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Contracts,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4880,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Signal to noise ratio,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4881,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Base stations,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4882,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Fading channels,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4883,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Energy consumption,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4884,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",shiwei huang,Dynamic programming,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4885,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Device-to-device communication,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4886,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4887,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Contracts,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4888,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Signal to noise ratio,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4889,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Base stations,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4890,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Fading channels,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4891,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Energy consumption,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4892,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",changyan yi,Dynamic programming,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4893,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Device-to-device communication,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4894,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Contracts,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4895,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Signal to noise ratio,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4896,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Base stations,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4897,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 4898,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4899,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Fading channels,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4900,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Energy consumption,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4901,"In this paper, the incentive mechanism design issue for device-to-device (D2D) content-sharing communications is discussed. In literature, most of works are based on auction/game theory, where all content owners first report their ask prices/costs towards the base station (BS) which finally decides only one winner from them to transmit data towards the content requester. One disadvantage of these works is that content owners may be frequently activated to provide auction/game information (such as prices/costs), leading to high energy consumption, but finally may not win to gain benefit. To address this, we propose a sequential posted price mechanism where the BS sends offers with posted prices to content owners in sequence and activates only one owner each time. The BS stops sending new offers as long as there is already an owner accepting an offer or when the BS finds the expected cost of sending a new offer is larger than the cost of direct transmission. The optimal posted prices and offer- stopping rule of the BS are derived by the backward principle of dynamic programming. Simulation results show that the proposed mechanism can effectively limit the proportion of content owners being activated while the BS maintains an acceptable expected cost.",jun cai,Dynamic programming,2016.0,10.1109/GLOCOM.2016.7841547,2016 IEEE Global Communications Conference (GLOBECOM),Huang2016,False,,IEEE,Not available,A Sequential Posted Price Mechanism for D2D Content Sharing Communications,e2a542487e8066b213a855c16b0da5d6,https://ieeexplore.ieee.org/document/7841547/ 4902,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",gang wang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 4903,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",peizhen liu,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 4904,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",zhao yang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 4905,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",rui xue,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 4906,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",igor stanojev,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 4907,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",osvaldo simeone,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 4908,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",umberto spagnolini,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 4909,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 4910,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",yeheskel bar-ness,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 4911,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",raymond pickholtz,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 4912,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Wireless fidelity,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4913,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Device-to-device communication,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4914,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Mobile handsets,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4915,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Mobile computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4916,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Cloud computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4917,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",dongqing liu,Cellular networks,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4918,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Wireless fidelity,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4919,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Device-to-device communication,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4920,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Game theory,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4921,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Mobile handsets,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4922,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Mobile computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4923,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Cloud computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4924,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",lyes khoukhi,Cellular networks,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4925,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Wireless fidelity,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4926,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Device-to-device communication,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4927,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Mobile handsets,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4928,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Mobile computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4929,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Cloud computing,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4930,"In this paper, we propose two data offloading mechanisms among multiple mobile users based on game theory. We formulate the decentralized data offloading decision making problem as two decentralized data offloading game. We then design two decentralized data offloading mechanisms that can achieve Nash equilibriums of the game: multi-item auction (MIA) based data offloading and congestion game (COG) based data offloading. MIA can maximize the revenue of mobile operator (MO), while COG can minimize the payment of mobile subscribers (MSs). Moreover, both MIA and COG can improve cellular data offloading performance. Numerical results show that the proposed mechanisms can achieve efficient data offloading performance.",abdelhakim hafid,Cellular networks,2017.0,10.1109/FMEC.2017.7946402,2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),Liu2017,False,,IEEE,Not available,Decentralized data offloading for mobile cloud computing based on game theory,466b4246f029bea57c2243fdbc18f214,https://ieeexplore.ieee.org/document/7946402/ 4931,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Humans,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4932,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,auction,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4933,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,posted price,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4934,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,online advertisement,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4935,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,auction,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4936,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,posted price,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4937,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,online advertisement,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 4938,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,Carrier aggregation (CA),2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4939,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,LTE-advanced,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4940,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,resource allocation,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4941,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,auction,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4942,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Algorithm design and analysis,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4943,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,QoS,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4944,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,Strategy-proof,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4945,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",chih-yu wang,fairness,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4946,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,Carrier aggregation (CA),2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4947,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,LTE-advanced,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4948,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,resource allocation,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4949,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,auction,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4950,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,QoS,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4951,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,Strategy-proof,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4952,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",hung-yu wei,fairness,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4953,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Environmental economics,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4954,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,Carrier aggregation (CA),2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4955,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,LTE-advanced,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4956,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,resource allocation,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4957,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,auction,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4958,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,QoS,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4959,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,Strategy-proof,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4960,"Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine how carrier aggregation should best be implemented and configured to effectively address the range of UE carrier quality and their heterogeneous quality of service (QoS) requirements. In addition, most existing resource allocation methods rely on the assumption that UE always reports information truthfully, which may be unrealistic when UEs act rationally from a game-theory perspective. To address these concerns, we provide a strategy-proof auction approach to carrier aggregation design in an LTE-Advanced system. We first formulate the resource allocation problem in carrier aggregation as a non-linear optimization problem, which is proved to be NP-hard. We then propose a strategy-proof auction with a greedy resource allocation algorithm to 1) find an efficient carrier activation and resource allocation solution under the QoS requirements of UEs, and 2) guarantee that all rational UEs truthfully report their QoS requirements. Finally, we conduct extensive simulations to evaluate system performance for the proposed auction design.",wen-tsuen chen,fairness,2016.0,10.1109/TMC.2016.2524633,IEEE Transactions on Mobile Computing,Wang2016,False,,IEEE,Not available,Resource Block Allocation with Carrier-Aggregation: A Strategy-Proof Auction Design,07f0947408639c4aee6d5c5622eff7b0,https://ieeexplore.ieee.org/document/7398076/ 4961,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4962,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4963,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4964,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Autonomous agents,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4965,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4966,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4967,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4968,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4969,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4970,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4971,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",e. gadsby,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4972,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4973,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4974,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4975,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Design automation,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4976,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4977,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4978,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4979,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4980,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4981,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4982,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",s. jaimes,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4983,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4984,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4985,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4986,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Process design,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4987,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4988,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4989,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4990,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4991,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4992,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4993,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",l. najarian,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4994,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4995,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4996,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4997,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Genetic algorithms,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 4998,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 4999,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5000,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5001,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5002,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5003,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5004,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. sanchez,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5005,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5006,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5007,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5008,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5009,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Multiagent systems,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 5010,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5011,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5012,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5013,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5014,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5015,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5016,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",r. sujlana,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5017,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5018,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5019,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5020,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Marketing and sales,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 5021,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5022,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5023,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5024,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5025,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5026,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5027,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",g.l. donohue,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5028,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Transportation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5029,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Pricing,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5030,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Packaging,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5031,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",gang wang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 5032,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Stress,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5033,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Linear regression,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5034,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Game theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5035,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Utility theory,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5036,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,State estimation,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5037,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Data analysis,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5038,"Continuous increases in GMU population have severely strained the parking facilities. Currently, users are upset and frustrated with the lack of convenient parking at GMU. Our objective is to provide ideas to help alleviate the stress on the parking system. After conducting research and evaluation of the current parking system, the following base and advanced alternatives were selected. Base alternatives consist of increasing parking enforcement, providing carpooling incentives, encouraging the use of the CUE bus, and revising the distribution of the schedule of classes' student load. The advanced alternatives are differential pricing and an online auction for purchasing parking decals. For differential pricing, linear regressions were used to find the relationship between the number of decals sold and multiple independent variables. To simulate auctioning, an online auction game was conducted. Using multiattribute utility theory, it was determined that the base alternatives combined with differential pricing has the highest overall utility.",m. coyne,Monitoring,2003.0,10.1109/SIEDS.2003.158007,"IEEE Systems and Information Engineering Design Symposium, 2003",Gadsby2003,False,,IEEE,Not available,George Mason University (GMU) Fairfax campus transportation system,fe70f6a880d3e5dc6606158ffa19c950,https://ieeexplore.ieee.org/document/1242402/ 5039,"Next-generation networks have the potential to service users without pre-existing contractual arrangements by using readily accessible pricing policies. The key issue is how to enable ad-hoc users to learn about the policies offered by a particular provider and to facilitate a negotiation between the provider and the potential user. Researchers working on the pricing of network services have offered solutions based on game theory techniques, market-based mechanisms (for example auctions) and techniques based on mesh networks among others. We argue that the Network Management field, and in particular, the policy based management paradigm provides excellent ideas that can be borrowed and adapted to the field of ubiquitous or pervasive services pricing. This paper explores the prospects of using policy-based mechanisms to adequately price ubiquitous network services.",jairo gutierrez,policy-based network management,2008.0,10.1109/ISPA.2008.44,2008 IEEE International Symposium on Parallel and Distributed Processing with Applications,Gutiérrez2008,False,,IEEE,Not available,Policy-Based Network Management as a Platform for the Pricing of Ubiquitous Network Services,7b8466e245fde4c5e05d590f71639ad5,https://ieeexplore.ieee.org/document/4725178/ 5040,"Next-generation networks have the potential to service users without pre-existing contractual arrangements by using readily accessible pricing policies. The key issue is how to enable ad-hoc users to learn about the policies offered by a particular provider and to facilitate a negotiation between the provider and the potential user. Researchers working on the pricing of network services have offered solutions based on game theory techniques, market-based mechanisms (for example auctions) and techniques based on mesh networks among others. We argue that the Network Management field, and in particular, the policy based management paradigm provides excellent ideas that can be borrowed and adapted to the field of ubiquitous or pervasive services pricing. This paper explores the prospects of using policy-based mechanisms to adequately price ubiquitous network services.",jairo gutierrez,ubiquitous services pricing,2008.0,10.1109/ISPA.2008.44,2008 IEEE International Symposium on Parallel and Distributed Processing with Applications,Gutiérrez2008,False,,IEEE,Not available,Policy-Based Network Management as a Platform for the Pricing of Ubiquitous Network Services,7b8466e245fde4c5e05d590f71639ad5,https://ieeexplore.ieee.org/document/4725178/ 5041,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5042,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",peizhen liu,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 5043,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5044,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5045,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5046,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5047,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5048,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5049,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5050,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5051,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5052,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5053,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",zhao yang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 5054,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5055,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5056,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5057,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5058,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5059,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5060,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5061,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5062,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5063,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 5064,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",rui xue,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 5065,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,Multi-robot systems,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 5066,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,multi-agent coordination,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 5067,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,auction,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 5068,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,coalition game,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 5069,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ramin samii,Market Power,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5070,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ramin samii,Reactive Market,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5071,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ramin samii,RSDI,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5072,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ramin samii,Strategy Deviation Index,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5073,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",saber nourizadeh,Market Power,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5074,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",saber nourizadeh,Reactive Market,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5075,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,trading agent,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5076,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",saber nourizadeh,RSDI,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5077,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",saber nourizadeh,Strategy Deviation Index,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5078,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ali ranjbar,Market Power,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5079,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ali ranjbar,Reactive Market,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5080,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ali ranjbar,RSDI,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5081,"Reactive market power assessment is an important issue for ISOs and the regulators of the reactive power market. Due to the localized characteristics of reactive power as a technical support and its monopsonistic nature as an economic commodity, a vivid reactive market power index including market share, demand side and cost is not achieved yet. In this paper, a new reactive market power index is presented which is based on bidding strategy deviation of the GENCOs after establishing a uniform price auction reactive market. Not knowing others' offers to ISO, each unit faces a bidding strategy problem that is solved using game theory. Considering its production costs, the unit uses the resulting strategy for its offer to ISO. A 30-bus test system is used to test the proposed method.",ali ranjbar,Strategy Deviation Index,2010.0,10.1049/cp.2010.0934,"7th Mediterranean Conference and Exhibition on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2010)",Samii2010,False,,IEEE,Not available,Strategy deviation index as a new reactive market power indicator,263582a8d4a90742911ca14b0456340f, 5082,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5083,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5084,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5085,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5086,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,bidding agent,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5087,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5088,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5089,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5090,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5091,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5092,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5093,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5094,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5095,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5096,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5097,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,algorithmic trading,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5098,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5099,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5100,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5101,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5102,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5103,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5104,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5105,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5106,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5107,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5108,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,auction,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5109,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5110,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5111,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5112,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5113,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5114,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5115,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5116,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5117,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5118,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5119,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5120,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,computational game theory,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5121,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5122,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5123,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5124,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5125,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5126,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 5127,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5128,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5129,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5130,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5131,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,eBay,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5132,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5133,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5134,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5135,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5136,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5137,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5138,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5139,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5140,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5141,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5142,"Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion",michael wellman,multiagent systems,,,Trading Agents,WellmanNone,False,,IEEE,Not available,Trading Agents,7527ef1dbaf6a0657bc14d37c4a71219, 5143,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5144,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5145,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5146,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5147,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5148,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5149,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5150,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5151,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5152,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5153,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,double auction,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5154,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5155,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5156,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5157,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5158,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5159,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5160,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5161,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5162,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5163,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5164,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,fuzzy,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5165,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5166,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5167,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5168,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5169,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5170,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 5171,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Electronic commerce,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5172,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Games,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5173,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Microeconomics,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5174,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Consumer electronics,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5175,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,game,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5176,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Instruments,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5177,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,History,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5178,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Supply and demand,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5179,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Information processing,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5180,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",h. hanappi,Shape,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5181,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Electronic commerce,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5182,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Games,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5183,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Microeconomics,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5184,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Consumer electronics,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5185,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Instruments,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5186,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,double auction,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5187,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,History,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5188,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Supply and demand,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5189,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Information processing,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5190,"This paper takes the view that providers of electronic markets are to be considered as economic actors in a strategic game played with potential buyers and sellers. The crucial assumption clearly concerns the choice of instruments that a market provider is considered to have at hand. Contrary to large parts of mainstream economic theory, which assume a simple perfect auction market setting guaranteeing price flexibility and actual trade taking place only in situations where supply equals demand, the position taken here emphasizes that market mechanisms can be very diverse and trade outside of equilibrium is essential. To operationalize these core assumptions the instrument of the market provider is modeled as the choice of market mechanisms that is provided.",e. hanappi-egger,Shape,2001.0,10.1109/HICSS.2001.926220,Proceedings of the 34th Annual Hawaii International Conference on System Sciences,Hanappi2001,False,,IEEE,Not available,Electronic commerce and market mechanisms. A game-theoretic approach,9ece7ccd2987a00c672897cd29c40433,https://ieeexplore.ieee.org/document/926220/ 5191,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Game theory,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5192,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Energy consumption,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5193,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Registers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5194,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5195,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Very large scale integration,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5196,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Processor scheduling,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5197,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,fuzzy,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5198,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5199,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Linear programming,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5200,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Portable computers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5201,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,High performance computing,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5202,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Game theory,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5203,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Energy consumption,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5204,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Registers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5205,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Circuit synthesis,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5206,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Very large scale integration,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5207,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Processor scheduling,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5208,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,game,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5209,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Nash equilibrium,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5210,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Linear programming,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5211,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Portable computers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5212,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,High performance computing,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 5213,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",yunpeng wang,Double auctions,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5214,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",yunpeng wang,electric storage unit,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5215,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",yunpeng wang,energy management,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5216,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",yunpeng wang,noncooperative games,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5217,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",walid saad,Double auctions,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5218,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",walid saad,electric storage unit,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5219,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Games,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5220,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",walid saad,energy management,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5221,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",walid saad,noncooperative games,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5222,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",zhu han,Double auctions,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5223,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",zhu han,electric storage unit,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5224,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",zhu han,energy management,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5225,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",zhu han,noncooperative games,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5226,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",h. poor,Double auctions,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5227,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",h. poor,electric storage unit,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5228,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",h. poor,energy management,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5229,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",h. poor,noncooperative games,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5230,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5231,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Licenses,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5232,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",tamer basar,Double auctions,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5233,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",tamer basar,electric storage unit,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5234,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",tamer basar,energy management,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5235,"Electric storage units constitute a key element in the emerging smart grid system. In this paper, the interactions and energy trading decisions of a number of geographically distributed storage units are studied using a novel framework based on game theory. In particular, a noncooperative game is formulated between storage units, such as plug-in hybrid electric vehicles, or an array of batteries that are trading their stored energy. Here, each storage unit's owner can decide on the maximum amount of energy to sell in a local market so as to maximize a utility that reflects the tradeoff between the revenues from energy trading and the accompanying costs. Then in this energy exchange market between the storage units and the smart grid elements, the price at which energy is traded is determined via an auction mechanism. The game is shown to admit at least one Nash equilibrium and a novel algorithm that is guaranteed to reach such an equilibrium point is proposed. Simulation results show that the proposed approach yields significant performance improvements, in terms of the average utility per storage unit, reaching up to 130.2% compared to a conventional greedy approach.",tamer basar,noncooperative games,2014.0,10.1109/TSG.2013.2284664,IEEE Transactions on Smart Grid,Wang2014,False,,IEEE,Not available,A Game-Theoretic Approach to Energy Trading in the Smart Grid,386e767e7802c60d21bf6b6f33c88e2c,https://ieeexplore.ieee.org/document/6798766/ 5236,"It is argued that a reorientation of the theory and application of nonzero-sum (NZS) games is needed in order for that discipline to have a beneficial impact on societal problems such as war. Accordingly, a general strategy of cooperation with minimum sanctions (CMS) is developed and applied to prisoner's dilemma (PD) and dollar auction games. It is shown that tit-for-tat-like strategies are appropriate for all PD games, not just iterated PD, and that, contrary to previous consensus, it is rational to cooperate in the single-shot PD. In evaluating NZS strategies in human or computerized tournaments, special NZS scoring rules should be used. A water-division bargaining example is included to illustrate the superiority of the maximum-welfare approach to the Nash bargaining solution.<<ETX>>",g. rabow,Game theory,1988.0,10.1109/44.3227,IEEE Technology and Society Magazine,Rabow1988,False,,IEEE,Not available,The social implications of nonzero-sum games,69416185ff1164023d8e7326da70f9e8, 5237,"It is argued that a reorientation of the theory and application of nonzero-sum (NZS) games is needed in order for that discipline to have a beneficial impact on societal problems such as war. Accordingly, a general strategy of cooperation with minimum sanctions (CMS) is developed and applied to prisoner's dilemma (PD) and dollar auction games. It is shown that tit-for-tat-like strategies are appropriate for all PD games, not just iterated PD, and that, contrary to previous consensus, it is rational to cooperate in the single-shot PD. In evaluating NZS strategies in human or computerized tournaments, special NZS scoring rules should be used. A water-division bargaining example is included to illustrate the superiority of the maximum-welfare approach to the Nash bargaining solution.<<ETX>>",g. rabow,Humans,1988.0,10.1109/44.3227,IEEE Technology and Society Magazine,Rabow1988,False,,IEEE,Not available,The social implications of nonzero-sum games,69416185ff1164023d8e7326da70f9e8, 5238,"It is argued that a reorientation of the theory and application of nonzero-sum (NZS) games is needed in order for that discipline to have a beneficial impact on societal problems such as war. Accordingly, a general strategy of cooperation with minimum sanctions (CMS) is developed and applied to prisoner's dilemma (PD) and dollar auction games. It is shown that tit-for-tat-like strategies are appropriate for all PD games, not just iterated PD, and that, contrary to previous consensus, it is rational to cooperate in the single-shot PD. In evaluating NZS strategies in human or computerized tournaments, special NZS scoring rules should be used. A water-division bargaining example is included to illustrate the superiority of the maximum-welfare approach to the Nash bargaining solution.<<ETX>>",g. rabow,Mathematics,1988.0,10.1109/44.3227,IEEE Technology and Society Magazine,Rabow1988,False,,IEEE,Not available,The social implications of nonzero-sum games,69416185ff1164023d8e7326da70f9e8, 5239,"It is argued that a reorientation of the theory and application of nonzero-sum (NZS) games is needed in order for that discipline to have a beneficial impact on societal problems such as war. Accordingly, a general strategy of cooperation with minimum sanctions (CMS) is developed and applied to prisoner's dilemma (PD) and dollar auction games. It is shown that tit-for-tat-like strategies are appropriate for all PD games, not just iterated PD, and that, contrary to previous consensus, it is rational to cooperate in the single-shot PD. In evaluating NZS strategies in human or computerized tournaments, special NZS scoring rules should be used. A water-division bargaining example is included to illustrate the superiority of the maximum-welfare approach to the Nash bargaining solution.<<ETX>>",g. rabow,Collision mitigation,1988.0,10.1109/44.3227,IEEE Technology and Society Magazine,Rabow1988,False,,IEEE,Not available,The social implications of nonzero-sum games,69416185ff1164023d8e7326da70f9e8, 5240,"It is argued that a reorientation of the theory and application of nonzero-sum (NZS) games is needed in order for that discipline to have a beneficial impact on societal problems such as war. Accordingly, a general strategy of cooperation with minimum sanctions (CMS) is developed and applied to prisoner's dilemma (PD) and dollar auction games. It is shown that tit-for-tat-like strategies are appropriate for all PD games, not just iterated PD, and that, contrary to previous consensus, it is rational to cooperate in the single-shot PD. In evaluating NZS strategies in human or computerized tournaments, special NZS scoring rules should be used. A water-division bargaining example is included to illustrate the superiority of the maximum-welfare approach to the Nash bargaining solution.<<ETX>>",g. rabow,Military computing,1988.0,10.1109/44.3227,IEEE Technology and Society Magazine,Rabow1988,False,,IEEE,Not available,The social implications of nonzero-sum games,69416185ff1164023d8e7326da70f9e8, 5241,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Multicasting,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5242,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Biological system modeling,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5243,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Overlay Network,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5244,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Game Theory,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5245,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Strategic Behavior,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5246,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Mechanism Design,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5247,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Monopoly Auction,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5248,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Multicasting,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5249,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Overlay Network,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5250,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Game Theory,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5251,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Strategic Behavior,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5252,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Mechanism Design,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5253,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Aggregates,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5254,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Monopoly Auction,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 5255,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5256,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5257,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5258,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5259,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5260,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5261,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5262,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5263,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5264,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Game theory,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5265,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5266,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5267,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 5268,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",yong yuan,Bid inflation,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5269,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",yong yuan,competitive preference,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5270,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",yong yuan,sponsored search advertising (SSA),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5271,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",yong yuan,upper bound Nash equilibrium (UBNE),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5272,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",fei-yue wang,Bid inflation,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5273,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",fei-yue wang,competitive preference,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5274,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",fei-yue wang,sponsored search advertising (SSA),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5275,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Interference,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5276,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",fei-yue wang,upper bound Nash equilibrium (UBNE),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5277,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",daniel zeng,Bid inflation,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5278,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",daniel zeng,competitive preference,2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5279,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",daniel zeng,sponsored search advertising (SSA),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5280,"Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet provide directly relevant theoretical or managerial insights to help understand this kind of real-world competitive bidding behavior in sponsored search. Our research is targeted at filling in this important research gap. Based on a model of advertisers' rational competitive preference, we propose a novel equilibrium solution concept called the upper bound Nash equilibrium (UBNE), which can be viewed as the upper bound of the output-truthful subset in the NE continuum of sponsored search auctions. We show that the UBNE can better characterize advertisers' competitive bidding behavior than other solution concepts, offering a viable theory driven behavioral explanation for bid inflation. We also show that the UBNE is a stable outcome of competitions among advertisers in repeated game settings and yields the optimal outcome for Web search engines.",daniel zeng,upper bound Nash equilibrium (UBNE),2017.0,10.1109/TCSS.2017.2730925,IEEE Transactions on Computational Social Systems,Yuan2017,False,,IEEE,Not available,Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets,3a6874d3c703d37fabbdcb7c9c68864c,https://ieeexplore.ieee.org/document/8010442/ 5281,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,power networks,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5282,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,auction,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5283,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,prosumer,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5284,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,game theory,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5285,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,demand-supply,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5286,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",oliver holland,Economics,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5287,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,power networks,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5288,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,auction,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5289,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,prosumer,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5290,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,game theory,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5291,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,demand-supply,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 5292,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Game theory,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5293,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Scheduling algorithm,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5294,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Processor scheduling,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5295,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Circuit synthesis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5296,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Algorithm design and analysis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5297,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Games,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5298,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Energy consumption,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5299,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Nash equilibrium,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5300,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Portable computers,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5301,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,High performance computing,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5302,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Power system reliability,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5303,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Game theory,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5304,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Scheduling algorithm,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5305,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Processor scheduling,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5306,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5307,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Algorithm design and analysis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5308,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Licenses,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5309,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Energy consumption,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5310,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5311,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Portable computers,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5312,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,High performance computing,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5313,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Power system reliability,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 5314,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Relays,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5315,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Resource management,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5316,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Tin,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5317,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Cost accounting,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5318,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Signal to noise ratio,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5319,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Biological system modeling,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5320,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Games,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5321,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",ye zhong,Power markets,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5322,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Relays,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5323,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Resource management,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5324,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Tin,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5325,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Cost accounting,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5326,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Signal to noise ratio,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5327,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Games,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5328,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",pan cao,Power markets,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5329,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Relays,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5330,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Aggregates,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5331,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Resource management,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5332,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Tin,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5333,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Cost accounting,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5334,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Signal to noise ratio,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5335,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Games,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5336,"In this paper, we study the problems of power allocation in a multi-user relay-assisted wireless network. From the perspective of game theory, we formulate and analyze this power allocation problem as a power trading game by considering users as bidders and the relay as an auctioneer. Aiming at solving this problem where each bidder has a private budget limit, we apply an adaptive clinching auction algorithm, which can maximize the utilities of users and the assisted relay. Additionally, simulations illustrate the performance of the proposed method.",eduard jorswieck,Power markets,2014.0,10.1109/WCNC.2014.6951925,2014 IEEE Wireless Communications and Networking Conference (WCNC),Zhong2014,False,,IEEE,Not available,Power trading in multi-cell multi-user relay-assisted uplink with private budget limits,34aa8052c02fce46da84fc9fec6667d3,https://ieeexplore.ieee.org/document/6951925/ 5337,"This study considers China's new electricity reform and related policies as a prerequisite, makes depth analysis of the power generation and sales companies bidding model, and puts forward the game strategy of single sales company and multiple power producers that considered network constraints based on the principle of dark auction in game theory. Considering the problem of transmission obstruction, a two-layer optimisation model is established. The lower level makes the maximum profit of the generator as the objective function, using the probability function to describe the quotation behaviour of the competitors, using the average match method to solve the bidder's bid. According to the underlying information, the upper single sales company uses linear programming methods to give low-cost unit queuing priority, combined with grid operating constraints to calculate the minimum purchase cost. Through the upper and lower models, interactive solution can improve the transaction success rate and reduce the occurrence of transmission congestion. Finally, the modified IEEE14 node example is used to analyse and verify.",xiaojie zhou,,2017.0,10.1049/joe.2017.0610,The Journal of Engineering,Zhou2017,True,,IEEE,Not available,Bidding strategy of electricity market considering network constraint in new electricity improvement environment,b339e6edd2e494319495ac2f35247eaa, 5338,"This study considers China's new electricity reform and related policies as a prerequisite, makes depth analysis of the power generation and sales companies bidding model, and puts forward the game strategy of single sales company and multiple power producers that considered network constraints based on the principle of dark auction in game theory. Considering the problem of transmission obstruction, a two-layer optimisation model is established. The lower level makes the maximum profit of the generator as the objective function, using the probability function to describe the quotation behaviour of the competitors, using the average match method to solve the bidder's bid. According to the underlying information, the upper single sales company uses linear programming methods to give low-cost unit queuing priority, combined with grid operating constraints to calculate the minimum purchase cost. Through the upper and lower models, interactive solution can improve the transaction success rate and reduce the occurrence of transmission congestion. Finally, the modified IEEE14 node example is used to analyse and verify.",yajing gao,,2017.0,10.1049/joe.2017.0610,The Journal of Engineering,Zhou2017,True,,IEEE,Not available,Bidding strategy of electricity market considering network constraint in new electricity improvement environment,b339e6edd2e494319495ac2f35247eaa, 5339,"This study considers China's new electricity reform and related policies as a prerequisite, makes depth analysis of the power generation and sales companies bidding model, and puts forward the game strategy of single sales company and multiple power producers that considered network constraints based on the principle of dark auction in game theory. Considering the problem of transmission obstruction, a two-layer optimisation model is established. The lower level makes the maximum profit of the generator as the objective function, using the probability function to describe the quotation behaviour of the competitors, using the average match method to solve the bidder's bid. According to the underlying information, the upper single sales company uses linear programming methods to give low-cost unit queuing priority, combined with grid operating constraints to calculate the minimum purchase cost. Through the upper and lower models, interactive solution can improve the transaction success rate and reduce the occurrence of transmission congestion. Finally, the modified IEEE14 node example is used to analyse and verify.",wenhai yang,,2017.0,10.1049/joe.2017.0610,The Journal of Engineering,Zhou2017,True,,IEEE,Not available,Bidding strategy of electricity market considering network constraint in new electricity improvement environment,b339e6edd2e494319495ac2f35247eaa, 5340,"This study considers China's new electricity reform and related policies as a prerequisite, makes depth analysis of the power generation and sales companies bidding model, and puts forward the game strategy of single sales company and multiple power producers that considered network constraints based on the principle of dark auction in game theory. Considering the problem of transmission obstruction, a two-layer optimisation model is established. The lower level makes the maximum profit of the generator as the objective function, using the probability function to describe the quotation behaviour of the competitors, using the average match method to solve the bidder's bid. According to the underlying information, the upper single sales company uses linear programming methods to give low-cost unit queuing priority, combined with grid operating constraints to calculate the minimum purchase cost. Through the upper and lower models, interactive solution can improve the transaction success rate and reduce the occurrence of transmission congestion. Finally, the modified IEEE14 node example is used to analyse and verify.",shixiao guo,,2017.0,10.1049/joe.2017.0610,The Journal of Engineering,Zhou2017,True,,IEEE,Not available,Bidding strategy of electricity market considering network constraint in new electricity improvement environment,b339e6edd2e494319495ac2f35247eaa, 5341,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5342,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Game theory,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5343,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5344,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5345,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5346,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5347,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5348,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5349,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5350,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5351,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5352,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5353,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Interference,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5354,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5355,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5356,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5357,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5358,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5359,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5360,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5361,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5362,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5363,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 5364,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",hanna bogucka,Economics,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5365,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Resource management,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5366,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Microgrids,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5367,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Games,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5368,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Green products,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5369,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Power demand,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5370,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Joints,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5371,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",wenbo wang,Throughput,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5372,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Resource management,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5373,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Microgrids,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5374,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Games,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5375,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Games,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5376,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Green products,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5377,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Power demand,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5378,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Joints,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5379,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",andres kwasinski,Throughput,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5380,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Resource management,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5381,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Microgrids,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5382,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Games,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5383,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Green products,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5384,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Power demand,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5385,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Joints,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5386,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Licenses,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5387,"A green-energy-powered, self-sustainable cellular network is studied in this paper. To address the problem of the energy variability in the green sources, a joint energy-traffic management mechanism is proposed based on game theory. The interaction between the cellular network and a microgrid power controller is modeled as a two-level Stackelberg game. On the network level, an iterative combinatorial auction mechanism is proposed to solve the joint power-subcarrier allocation problem. On the microgrid level, an adaptive pricing mechanism is adopted for the power controller to balance between the transmission demand and the energy supply. Simulation results show that the proposed resource allocation mechanism achieves a significant improvement in the network sustainability and throughput when compared with the conventional resource allocation method.",alexis kwasinski,Throughput,2014.0,10.1109/GLOCOM.2014.7037208,2014 IEEE Global Communications Conference,Wang2014,False,,IEEE,Not available,Resource allocation in self-sustainable green wireless networks with combinatorial auction,830e1e8716eeff5b7d4f8a35769119b0,https://ieeexplore.ieee.org/document/7037208/ 5388,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",f. careri,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5389,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",f. careri,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5390,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",f. careri,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5391,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",f. careri,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5392,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",f. careri,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5393,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",c. genesi,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5394,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",c. genesi,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5395,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",c. genesi,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5396,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",c. genesi,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5397,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Biological system modeling,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5398,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",c. genesi,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5399,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",p. marannino,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5400,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",p. marannino,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5401,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",p. marannino,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5402,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",p. marannino,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5403,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",p. marannino,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5404,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",m. montagna,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5405,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",m. montagna,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5406,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",m. montagna,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5407,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",m. montagna,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5408,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Aggregates,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5409,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",m. montagna,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5410,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",s. rossi,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5411,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",s. rossi,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5412,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",s. rossi,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5413,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",s. rossi,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5414,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",s. rossi,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5415,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",i. siviero,Day-ahead market,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5416,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",i. siviero,Game Theory,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5417,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",i. siviero,Coevolutionary Genetic Algorithm,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5418,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",i. siviero,System Marginal Price,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5419,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Game theory,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5420,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered with reference to existing day-ahead markets. The usual market settlement based on the system marginal price (SMP) is first addressed, this being the most widespread energy market implementation. The pay as bid (PAB) auction has been sometimes proposed as a viable alternative to SMP with the aim of increasing competition among Gencos by discouraging collusive behaviors and market power exploitation. The bidding problem is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem makes the application of classical game theory troublesome; for this reason, an agent based method belonging to the category of coevolutionary genetic algorithms was adopted. In the present paper the results to be expected form both market arrangements are then evaluated and compared, with particular reference to the day-ahead market applied to a small system. In the tests, the situation of imperfect competition arising when one of the Gencos has the opportunity to exert market power is considered. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed.",i. siviero,Pay-as-bid,2010.0,10.1109/EEM.2010.5558675,2010 7th International Conference on the European Energy Market,Careri2010,False,,IEEE,Not available,Bidding strategies in day-ahead energy markets: System marginal price vs. pay as bid,a3c8c84ed8cc226588d1ebe68db0be9b,https://ieeexplore.ieee.org/document/5558675/ 5421,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",f. careri,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5422,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",f. careri,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5423,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",f. careri,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5424,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",f. careri,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5425,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",f. careri,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5426,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",c. genesi,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5427,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",c. genesi,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5428,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",c. genesi,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5429,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",c. genesi,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5430,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Interference,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5431,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",c. genesi,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5432,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",p. marannino,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5433,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",p. marannino,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5434,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",p. marannino,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5435,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",p. marannino,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5436,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",p. marannino,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5437,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",m. montagna,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5438,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",m. montagna,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5439,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",m. montagna,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5440,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",m. montagna,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5441,"This chapter introduces game theoretical and auction‐based models for spectrum sharing. We apply the principles from game theory and auction theory to model, design, and analyze spectrum sharing mechanisms. In this chapter, we briefly introduce dynamic carrier aggregation as an emerging spectrum sharing scenario and model the interactions of utility‐maximizing players (wireless entities) using game theory. We show that with a simple randomized best response method, the game converges to a Nash equilibrium. Later, we propose an auction mechanism for the same problem. Our simulation results show that the auction mechanism converges to an optimal solution in fewer iterations.",arturas medeisis,Economics,,10.1002/9781119057246.ch17,Opportunistic Spectrum Sharing and White Space Access: The Practical Reality,HollandNone,False,,IEEE,Not available,Economic and Game Theoretic Models for Spectrum Sharing,34d13ea7af2f3674c9f4221318e3daeb, 5442,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",m. montagna,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5443,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",s. rossi,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5444,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",s. rossi,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5445,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",s. rossi,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5446,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",s. rossi,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5447,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",s. rossi,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5448,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",i. siviero,Day-ahead market,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5449,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",i. siviero,Game Theory,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5450,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",i. siviero,Coevolutionary Genetic Algorithm,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5451,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",i. siviero,Price maker-price taker Genco,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5452,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5453,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Protocols,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5454,"In the present work, the problem of energy market price clearing and generation company (Genco) strategic bidding is considered in the framework of existing day-ahead markets with system marginal price auction. The situation of imperfect competition arising when one of the Gencos is large enough to exert market power is considered in detail, showing what bidding behaviors are to be expected when such a market arrangement occurs. The impact that inter-area transmission system congestions may have on the mechanism of system pricing is also addressed. The bidding problem faced by each Genco is formulated as a strategic multi-player game in which the choice between different bidding levels and energy amounts to be sold at the market has to be made. The large size of the problem due to the number of competitors and to the presence of transmission constraints makes the application of classical game theory troublesome. Therefore, an agent based method belonging to the category of coevolutionary genetic algorithm was selected for the solution of this problem. Test cases illustrate the different strategies that the Gencos may implement to optimize their performance at the day-ahead market. Beside some small didactical examples, the situation of the Italian day-ahead market is considered in detail.",i. siviero,Market Power,2010.0,10.1109/PES.2010.5590161,IEEE PES General Meeting,Careri2010,False,,IEEE,Not available,Strategic bidding in a day-ahead market by coevolutionary genetic algorithms,3568b132d172d738226861d8b6aa74c0,https://ieeexplore.ieee.org/document/5590161/ 5455,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5456,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5457,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5458,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5459,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5460,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5461,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5462,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5463,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5464,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Electronic commerce,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5465,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5466,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5467,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5468,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5469,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5470,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5471,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5472,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5473,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5474,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5475,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Consumer electronics,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5476,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5477,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5478,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5479,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5480,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5481,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5482,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5483,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5484,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5485,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5486,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Business,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5487,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 5488,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Crystallization,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5489,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Interference channels,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5490,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Time sharing computer systems,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5491,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Game theory,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5492,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Power control,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5493,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Nash equilibrium,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5494,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Additive noise,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5495,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,USA Councils,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5496,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Transmitters,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5497,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Humans,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5498,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",m. charafeddine,Communications Society,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5499,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Crystallization,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5500,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Interference channels,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5501,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Time sharing computer systems,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5502,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Game theory,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5503,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Power control,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5504,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Nash equilibrium,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5505,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Additive noise,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5506,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,USA Councils,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5507,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Transmitters,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5508,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Internet,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5509,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",z. han,Communications Society,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5510,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Crystallization,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5511,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Interference channels,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5512,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Time sharing computer systems,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5513,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Game theory,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5514,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Power control,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5515,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Nash equilibrium,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5516,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Additive noise,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5517,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,USA Councils,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5518,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Transmitters,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5519,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Power generation economics,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5520,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",a. paulraj,Communications Society,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5521,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Crystallization,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5522,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Interference channels,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5523,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Time sharing computer systems,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5524,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Game theory,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5525,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Power control,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5526,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Nash equilibrium,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5527,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Additive noise,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5528,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,USA Councils,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5529,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Transmitters,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5530,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Game theory,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5531,"Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2<sup>n</sup>-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper- surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2<sup>n</sup> - 1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret- matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion.",j. cioffi,Communications Society,2009.0,10.1109/ICC.2009.5198878,2009 IEEE International Conference on Communications,Charafeddine2009,False,,IEEE,Not available,Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise,e3e24bee823e01b8f4abc805ea4d887d,https://ieeexplore.ieee.org/document/5198878/ 5532,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",debashis palit,electric energy market,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5533,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",debashis palit,deregulation,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5534,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",debashis palit,economic dispatch,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5535,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",debashis palit,game theory,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5536,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",niladri chakraborty,electric energy market,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5537,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",niladri chakraborty,deregulation,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5538,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",niladri chakraborty,economic dispatch,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5539,"Power auctions in deregulated electricity market are carried out amongst a number of Generating companies (Genco) in day-ahead or hour-ahead basis. In hour-ahead electricity market each supplier bids power for hour-ahead basis &amp; the market is cleared for each hour separately. The benefit of each supplier is optimized at maximum level in each hour separately &amp; that satisfies electricity price at minimum level. In these case studies, three categories of daily load curve are considered as low, medium &amp; high peak demand situations. In each case, hourly bidding price of three bidders are discreetly considered as low, medium &amp; high bidding level. The bidding is interconnected with generation scheduling with consideration of power balance constraint, power generation limit &amp; fuel cost constraints etc. for thermal generating units. Economic generation scheduling of generating companies at different hourly bidding situations at specified daily load curve have been computed using Newton-Raphson method for standard IEEE 9 bus test system. For optimization of the power bidding problem, theory of dominance of Game Theory has been applied for searching the optimal parameters. Those are hourly scheduled load &amp; profits for the individual bidders, transmission loss &amp; market selling price at which market is cleared at each hour separately. All graphical representation describes variation of optimal power scheduling &amp; benefit profile of three bidders in respect with hourly load demand variation along with hourly variation of market price &amp; transmission loss profile.",niladri chakraborty,game theory,2014.0,10.1109/INDICON.2014.7030561,2014 Annual IEEE India Conference (INDICON),Palit2014,False,,IEEE,Not available,Optimal model of hour-ahead power bidding in deregulation,e5607af93115fee8dae54e9a816ee72b,https://ieeexplore.ieee.org/document/7030561/ 5540,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",yue zhang,Cognitive radio networks,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5541,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Solids,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5542,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",yue zhang,dynamic spectrum access,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5543,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",yue zhang,monopolistic models,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5544,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",yue zhang,probabilistic reinforcement learning,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5545,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",bin song,Cognitive radio networks,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5546,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",bin song,dynamic spectrum access,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5547,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",bin song,monopolistic models,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5548,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",bin song,probabilistic reinforcement learning,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5549,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",su gao,Cognitive radio networks,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5550,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",su gao,dynamic spectrum access,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5551,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",su gao,monopolistic models,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5552,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Mediation,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 5553,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",su gao,probabilistic reinforcement learning,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5554,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",xiaojiang du,Cognitive radio networks,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5555,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",xiaojiang du,dynamic spectrum access,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5556,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",xiaojiang du,monopolistic models,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5557,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",xiaojiang du,probabilistic reinforcement learning,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5558,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",mohsen guizani,Cognitive radio networks,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5559,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",mohsen guizani,dynamic spectrum access,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5560,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",mohsen guizani,monopolistic models,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5561,"Under the environment of cognitive radio networks, users are equipped with intelligent capabilities so that they can sense the conditions of networks and act optimally to maximize their revenues. Thus, dynamic spectrum access (DSA), which focuses on the management and distribution of the resources, is a critical problem, especially when only limited resources are available. Currently, this problem is handled by the game theory and auction theory, since this is a problem involving multiple agents. In this paper, we propose agent-based modeling method to model this multi-agent environment and probabilistic reinforcement learning to learn the optimal strategies. We focus on a simple scenario with only one primary user (PU) and multiple secondary users (SUs), and try to maximize the revenues of both sides, which may be further extended to other scenarios with different number of agents. First, we model this environment as a monopolistic market from the perspective of economics, where a PU acts as the monopoly and the SUs are passive buyers. Then, we propose probabilistic reinforcement learning methods to handle DSA so that both the PU and SUs can behave optimally by learning from the feedback of the others. Experimental results prove the flexibility and superior performance of our proposed methods.",mohsen guizani,probabilistic reinforcement learning,2018.0,10.1109/ACCESS.2018.2868476,IEEE Access,Zhang2018,True,,IEEE,Not available,Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach,ded439f4d90a3f1a21cc59ce1661afbd,https://ieeexplore.ieee.org/document/8454441/ 5562,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Resource management,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5563,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 5564,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5565,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5566,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Robot sensing systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5567,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Multi-robot systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5568,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Quality of service,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5569,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Bandwidth,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5570,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",lujia wang,Protocols,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5571,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Resource management,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5572,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Robot sensing systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5573,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Multi-robot systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5574,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Quality of service,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5575,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Bandwidth,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5576,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5577,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",ming liu,Protocols,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5578,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Resource management,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5579,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Robot sensing systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5580,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Multi-robot systems,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5581,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Quality of service,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5582,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Bandwidth,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5583,"Networked multi-robot systems benefit from a large amount of heterogeneous online data on the server, and enable poor-equipped robots to fulfill complex tasks. However, as a major bottleneck of practical network, the limited bandwidth is lack of consideration. In the matter of fact, resource competition is pervasive for practical networked robotic applications. We propose a multi-robot negotiation mechanism in this paper. It includes a game theory based auction for allocating resources that are shared among robot clients, such as the network bandwidth. We validate the proposed strategy by a joint-surveillance scenario. Experimental results demonstrate that the proposed framework achieves excellent Quality of Service (QoS) performance under the condition of resource competition, where a shared network with limited bandwidth is optimized.",max meng,Protocols,2013.0,10.1109/ICInfA.2013.6720336,2013 IEEE International Conference on Information and Automation (ICIA),Wang2013,False,,IEEE,Not available,An auction-based resource allocation strategy for joint-surveillance using networked multi-robot systems,5c62dd0b942325059ef57300bd3b8dba,https://ieeexplore.ieee.org/document/6720336/ 5584,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,Delay tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5585,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,Optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5586,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,Routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5587,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5588,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,Delay-tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5589,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,incentive compatibility,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5590,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5591,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ying cai,routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5592,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,Delay tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5593,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,Optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5594,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,Routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5595,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,Delay-tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5596,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,incentive compatibility,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5597,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5598,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5599,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",yanfang fan,routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5600,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,Delay tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5601,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,Optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5602,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,Routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5603,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,Delay-tolerant networks (DTNs),2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5604,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,incentive compatibility,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5605,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,optimal sequential stopping rule,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5606,"Delay-tolerant networks (DTNs) rely on the mobility of nodes and their contacts to make up with the lack of continuous connectivity and, thus, enable message delivery from source to destination in a “store-carry-forward” fashion. Since message delivery consumes resource such as storage and power, some nodes may choose not to forward or carry others' messages while relying on others to deliver their locally generated messages. These kinds of selfish behaviors may hinder effective communications over DTNs. In this paper, we present an efficient incentive-compatible (IC) routing protocol (ICRP) with multiple copies for two-hop DTNs based on the algorithmic game theory. It takes both the encounter probability and transmission cost into consideration to deal with the misbehaviors of selfish nodes. Moreover, we employ the optimal sequential stopping rule and Vickrey-Clarke-Groves (VCG) auction as a strategy to select optimal relay nodes to ensure that nodes that honestly report their encounter probability and transmission cost can maximize their rewards. We attempt to find the optimal stopping time threshold adaptively based on realistic probability model and propose an algorithm to calculate the threshold. Based on this threshold, we propose a new method to select relay nodes for multicopy transmissions. To ensure that the selected relay nodes can receive their rewards securely, we develop a signature scheme based on a bilinear map to prevent the malicious nodes from tampering. Through simulations, we demonstrate that ICRP can effectively stimulate nodes to forward/carry messages and achieve higher packet delivery ratio with lower transmission cost.",ding wen,routing protocol,2016.0,10.1109/TVT.2015.2454291,IEEE Transactions on Vehicular Technology,Cai2016,False,,IEEE,Not available,An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks,abc51a807f49090ca394801b6b94ccd1,https://ieeexplore.ieee.org/document/7152962/ 5607,"A cognitive radio adapts its transmission parameters to the environment. While fully cognitive radios (Mitola radios) theoretically have the best performance, dynamic spectrum access (DSA) or spectrum-sensing cognitive radio only adapts bandwidth, center frequency, and transmission time to the environment. In a hierarchical model, secondary users adapt such that they transmit only when they do not interfere with primary (preferred) users; this can be achieved by underlay, overlay, or interweaving. Interweaving has the secondary users transmit in the spectrum “holes”. A first phase performs spectrum sensing of primary emissions (based on energy detection, matched filtering, cyclostationary detection, or wavelet detection), trading off false alarm probability with the missed detection probability. Next is the spectrum management phase, in which spectrum opportunity tracking is done. Finally, spectrum sharing, i.e., the assignment of the available spectrum to the different secondary users, can be achieved by centralized control, distributed control, or uncoordinated competition. Game theory is a key mathematical tool. For partial cooperation, referee-based solutions, threat and punishment, spectrum auctions, and bargaining solutions, can be used. Overlay approaches do not avoid simultaneous transmission primary and secondary user, but rather exploit it. If the secondary user has full knowledge of the primary users’ message, it can use dirty paper coding to avoid creating interference, or even help the primary user in the transmission of its message. In underlay hierarchical access the secondary user transmits with such low power spectral density that it does not disturb the primary user: e.g., in ultrawideband (WB) communications the signal is spread over very large bandwidth through frequency hopping, coded OFDM, direct-sequence spread spectrum, or time-hopping impulse radio. Detect-and-avoid (DAA) can further reduce interference.",andreas molisch,,,10.1002/9781119992806.ch21,Wireless Communications,MolischNone,False,,IEEE,Not available,Cognitive Radio,715e533bdeeaadbe46c3ee907f562216, 5608,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",xue-hong fu,Remanufacturing product,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5609,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5610,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",xue-hong fu,Dynamic pricing,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5611,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",xue-hong fu,Game theory model,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5612,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",guo-jun ji,Remanufacturing product,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5613,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",guo-jun ji,Dynamic pricing,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5614,"Remanufacturing is one of the important task that relative to the reverse logistics of the product recycling, usually the economic and environmental impact should be considered. Comparing with the new product, the remanufacturing product there are many characteristics, such as product quality uncertainty, market unclear, etc., so the pricing problems of remanufacturing product will be difficult. In this paper, according to differences in product quality and customer preference for remanufacturing product, based on the objective of maximizing customer satisfaction and firm profits, using by two-way auction transactions game theory, the dynamic pricing model based on customer preferences for remanufacturing products is constructed, and the corresponding conclusions can help the remanufacturing enterprises to determine the price.",guo-jun ji,Game theory model,2010.0,10.1109/ICIEEM.2010.5645986,2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management,Fu2010,False,,IEEE,Not available,Dynamic pricing based on the customer's preference of remanufacturing products,0b8353060aae97734329bb0b906dfa71,https://ieeexplore.ieee.org/document/5645986/ 5615,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5616,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5617,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5618,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5619,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5620,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5621,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5622,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5623,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5624,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5625,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5626,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5627,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5628,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5629,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5630,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5631,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5632,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5633,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5634,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5635,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5636,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5637,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5638,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5639,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5640,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5641,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5642,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5643,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5644,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5645,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5646,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5647,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5648,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5649,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5650,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5651,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5652,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 5653,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5654,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",nicola capodieci,Energy,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5655,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",nicola capodieci,Market,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5656,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",nicola capodieci,Agents,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5657,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",nicola capodieci,Game theory,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5658,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giacomo cabri,Energy,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5659,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giacomo cabri,Market,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5660,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giacomo cabri,Agents,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5661,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giacomo cabri,Game theory,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5662,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giuliano pagani,Energy,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5663,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giuliano pagani,Market,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5664,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5665,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giuliano pagani,Agents,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5666,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",giuliano pagani,Game theory,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5667,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",marco aiello,Energy,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5668,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",marco aiello,Market,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5669,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",marco aiello,Agents,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5670,"Private houses are more and more enabled with devices that can produce renewable energy, and the not so remote chance of selling the surplus energy makes them new players in the energy market. This market is likely to become deregulated since each energy home-producer can negotiate the energy price with consumers, typically by means of an auction; on the other hand, consumers can always rely on energy companies, even if their energy is more expensive. This scenario could lead to advantages for users, but it is certainly complex and dynamic, and needs an appropriate management. To this purpose, in this paper we propose an agent-based application to deal with the negotiation among different parties producing and consuming energy. Software agents, thanks to their autonomy in taking decisions, well suit the requirements of the proposed scenario. For our application, we adopt a strategy derived from game theory, in order to optimize energy production and supply costs by means of negotiation and learning. The effectiveness of our approach is proved by simulation results of a situation involving energy buyers, energy producers using renewable micro-generation facilities and large-scale traditional electricity companies.",marco aiello,Game theory,2012.0,10.1109/COMPSAC.2012.90,2012 IEEE 36th Annual Computer Software and Applications Conference,Capodieci2012,False,,IEEE,Not available,An Agent-Based Application to Enable Deregulated Energy Markets,b60265b8eb499d372c72a6facd4d17ed,https://ieeexplore.ieee.org/document/6340222/ 5671,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5672,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5673,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5674,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5675,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5676,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5677,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5678,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5679,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5680,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",ryan williams,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5681,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5682,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5683,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5684,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5685,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5686,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5687,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 5688,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5689,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",andrea gasparri,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5690,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5691,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5692,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5693,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5694,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5695,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5696,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5697,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",attilio priolo,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5698,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5699,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5700,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5701,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5702,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5703,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,Asynchronous and parallel communication,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5704,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,distributed robot systems,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5705,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,graph rigidity,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5706,"In this paper, we consider the problem of evaluating the rigidity of a planar network, while satisfying common objectives of real-world systems: decentralization, asynchronicity, and parallelization. The implications that rigidity has in fundamental multirobot problems, e.g., guaranteed formation stability and relative localizability, motivates this study. We propose the decentralization of the pebble game algorithm of Jacobs et al. , which is an O(n<sup>2</sup>) method that determines the generic rigidity of a planar network. Our decentralization is based on asynchronous messaging and distributed memory, coupled with auctions for electing leaders to arbitrate rigidity evaluation. Further, we provide a parallelization that takes inspiration from gossip algorithms to yield significantly reduced execution time and messaging. An analysis of the correctness, finite termination, and complexity is given, along with a simulated application in decentralized rigidity control. Finally, we provide Monte Carlo analysis in a Contiki networking environment, illustrating the real-world applicability of our methods, and yielding a bridge between rigidity theory and realistic interacting systems.",gaurav sukhatme,networked robots,2014.0,10.1109/TRO.2014.2315713,IEEE Transactions on Robotics,Williams2014,False,,IEEE,Not available,"Evaluating Network Rigidity in Realistic Systems: Decentralization, Asynchronicity, and Parallelization",4f4ce69ea5732648ca0a9f1c81590388,https://ieeexplore.ieee.org/document/6805220/ 5707,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Wireless sensor networks,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5708,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Resource management,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5709,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5710,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Video recording,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5711,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Quality assessment,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5712,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Clustering algorithms,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5713,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Optimization,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5714,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",rituraj rituraj,Energy consumption,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5715,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Wireless sensor networks,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5716,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Resource management,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5717,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Video recording,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5718,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Quality assessment,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5719,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Clustering algorithms,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5720,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5721,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Optimization,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5722,"In this paper we present a novel framework for cluster head (CH) selection and sub-carrier allocation towards intra-cluster communication in an Orthogonal Frequency Division Multiple Access (OFDMA) based Wireless Sensor Network (WSN). The proposed framework maximizes the overall performance of the WSN in terms of the throughput, video quality and network life. The OFDMA PHY optimization criterion for rate maximization is formulated as a bi-level optimization problem for CH node selection followed by optimal OFDMA sub-carrier allocation. It is then demonstrated that the above optimal resource allocation problem can be reduced to the solution of a weighted bipartite graph matching problem and is solved employing three different schemes, namely the popular Hungarian algorithm, game theory based multi-item auction and the Gale-Shapley stable matching scheme. Based on the above formulation, we also derive an optimal scheme to minimize the energy consumption in the WSN. Further, the performance of the proposed schemes is demonstrated through simulations in the context of scalable video transmission in a video sensor network. Results illustrate that these schemes significantly outperform suboptimal WSN cluster head selection schemes in terms of data rate and video quality.",aditya jagannatham,Energy consumption,2013.0,10.1109/WMNC.2013.6549019,6th Joint IFIP Wireless and Mobile Networking Conference (WMNC),Rituraj2013,False,,IEEE,Not available,Optimal cluster head selection schemes for hierarchical OFDMA based video sensor networks,2d3c088f8a85234908d76917edb871d2,https://ieeexplore.ieee.org/document/6549019/ 5723,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",bing shi,Web Service,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5724,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",bing shi,Pricing,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5725,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",bing shi,Bidding Strategy,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5726,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",bing shi,Double Auction,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5727,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",bing shi,Bayes-Nash Equilibrium,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5728,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",jinwen wang,Web Service,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5729,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",jinwen wang,Pricing,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5730,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",jinwen wang,Bidding Strategy,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5731,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5732,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",jinwen wang,Double Auction,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5733,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",jinwen wang,Bayes-Nash Equilibrium,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5734,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",zhaowei wang,Web Service,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5735,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",zhaowei wang,Pricing,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5736,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",zhaowei wang,Bidding Strategy,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5737,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",zhaowei wang,Double Auction,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5738,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",zhaowei wang,Bayes-Nash Equilibrium,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5739,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",yalong huang,Web Service,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5740,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",yalong huang,Pricing,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5741,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",yalong huang,Bidding Strategy,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5742,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5743,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",yalong huang,Double Auction,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5744,"In the cloud platform, there exist multiple providers offering the same web service, and multiple consumers requiring the same web service. Web service providers (consumers) compete against each other to make a deal with service consumers (providers). Each service provider needs to determine a proper ask to sell the service, while each consumer needs to determine a proper bid to purchase the service. In this paper, in order to address this problem, we assume that the cloud platform runs a double auction marketplace, where web service is traded as the commodity between multiple service providers and consumers. We then use game theory to analyse the Bayes-Nash equilibrium bidding strategies of service providers and consumers on the web service. We also investigate how different service pricing policies adopted by the cloud platform can affect service providers and consumers' Bayes-Nash equilibrium bidding strategies. We show that when the cloud platform sets the uniform market equilibrium price as the service price for all matched service providers and consumers, they will bid close to their valuations on the services. However, when the cloud platform sets discriminatory prices for each matched pair of provider and consumer, service providers will ask more than their valuations and consumers will bid less than their valuations. Moreover, we also investigate the allocative efficiency when the cloud platform adopts different service pricing policies, and show that the cloud platform is very efficient in terms of allocating web services between providers and consumers.",yalong huang,Bayes-Nash Equilibrium,2017.0,10.1109/SCC.2017.18,2017 IEEE International Conference on Services Computing (SCC),Shi2017,False,,IEEE,Not available,Trading Web Services in a Double Auction-Based Cloud Platform: A Game Theoretic Analysis,1b0bb42d67296614efaebec403dccd10,https://ieeexplore.ieee.org/document/8034970/ 5745,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5746,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5747,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5748,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5749,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5750,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5751,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5752,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5753,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5754,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5755,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5756,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5757,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5758,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5759,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5760,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5761,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5762,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5763,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5764,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5765,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5766,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5767,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5768,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5769,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5770,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5771,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5772,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5773,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5774,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5775,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5776,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5777,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 5778,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,Congestion management,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5779,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,game theory,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5780,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,multi agent systems,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5781,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,Nash equivilibrium,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5782,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,plug in hybrid vehicle,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5783,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",bhuvaneswari ramachandran,stochastic power market,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5784,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,Congestion management,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5785,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,game theory,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5786,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5787,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5788,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,multi agent systems,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5789,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,Nash equivilibrium,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5790,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,plug in hybrid vehicle,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5791,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",sanjeev srivastava,stochastic power market,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5792,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,Congestion management,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5793,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,game theory,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5794,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,multi agent systems,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5795,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,Nash equivilibrium,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5796,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,plug in hybrid vehicle,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5797,"In this paper, we have proposed a congestion management scheme for smart grid infrastructures to control the power absorption from the grid in the presence of PHEVs connected to the distribution network. The decentralized solution that we have developed is based on game theory and is demonstrated to converge in a finite number of steps to a pure Nash equilibrium solution. This approach is implemented for managing the power absorbed from the grid and thereby the power bought from the grid through auctions taking place in a stochastic power and energy market. Various test cases have been developed based on the agents' strategies and also on the charging time and duration of PHEVs. The proposed approach was validated using these test cases, which were implemented in a multi agent framework.",david cartes,stochastic power market,2012.0,10.1109/PESGM.2012.6344924,2012 IEEE Power and Energy Society General Meeting,Ramachandran2012,False,,IEEE,Not available,Decentralized congestion management in stochastic electric power markets with PHEV penetration,6c7b300bbe652008c3b14fc8d259011f,https://ieeexplore.ieee.org/document/6344924/ 5798,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5799,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Dynamical bandwidth allocation,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5800,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Wireless,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5801,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Control system,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5802,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Decentralized Auction,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5803,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Game theory,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5804,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Mechanism design,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5805,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Dynamical bandwidth allocation,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5806,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Wireless,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5807,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Control system,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5808,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Decentralized Auction,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5809,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5810,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Game theory,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5811,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Mechanism design,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 5812,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Relays,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5813,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Silicon,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5814,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Games,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5815,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Bandwidth,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5816,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Resource management,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5817,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Zinc,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5818,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",igor stanojev,Wireless communication,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5819,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Relays,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5820,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5821,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Silicon,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5822,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Games,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5823,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Bandwidth,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5824,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Resource management,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5825,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Zinc,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5826,"Communication gains from relaying can be acquired even in the absence of altruistic or dedicated relays. To accommodate this, spectrum leasing for cooperation paradigm prescribes that the potential relaying node is rewarded for its relaying role with a fraction of source's bandwidth. Recently, a two-hop spectrum leasing scheme was proposed that enables the source to employ the relay only to an extent it finds beneficial, preserving the remaining bandwidth for its direct transmission, if necessary. Such a solution adds flexibility that can be particularly useful for implementation in networks involving more than two hops. In this paper, we extend this setup to include the relay selection problem in a two-hop network scenario with multiple potential relays. Since the potential relays are selfish nodes, their competitive attitude for accessing the spectrum needs to be taken into account. In addition to Stackelberg game framework used in the original setting with one relay, auction theory is applied to model the relay selection process. Analysis and numerical results are provided, demonstrating that the source-destination pair can achieve significant benefits emanating from the competitive nature of the relays.",aylin yener,Wireless communication,2013.0,10.1109/ICC.2013.6655465,2013 IEEE International Conference on Communications (ICC),Stanojev2013,False,,IEEE,Not available,Relay selection for flexible multihop communication via competitive spectrum leasing,5b33991ab13d9c7414b540b1bc4b47b3,https://ieeexplore.ieee.org/document/6655465/ 5827,"In cognitive radio networks, secondary users (SUs) are considered as selfish spectrum users, thus how to maximize the spectrum efficiency by these selfish users becomes an endless research topic. Recent studies mostly focus on the competition analysis between SUs using economic mechanism, such as game theory and auction, but the spectrum owner can hardly increase the spectrum efficiency directly when SUs apply the distributed manner. In this paper, we consider the slotted uplink scenario where several SUs have data transmitted to secondary access point (AP) under distributed random access manner. The AP decides how to divide its spectrum which maximizes the whole throughput, then SUs select the channels which would maximize their own profit. Our results show that SUs' channel selection process leads to a Nash Equilibrium, and the AP derives the proper number of channels based on the properties of NE. Moreover, we derive a rule for AP to decide which SUs should access the spectrum and lead to the increment in the whole throughput.",gaofei sun,,2012.0,10.1109/GLOCOM.2012.6504010,2012 IEEE Global Communications Conference (GLOBECOM),Sun2012,False,,IEEE,Not available,Efficient spectrum utilization with selfish secondary users in cognitive radio networks,498b708865e3e4ade661625ec93312de,https://ieeexplore.ieee.org/document/6504010/ 5828,"In cognitive radio networks, secondary users (SUs) are considered as selfish spectrum users, thus how to maximize the spectrum efficiency by these selfish users becomes an endless research topic. Recent studies mostly focus on the competition analysis between SUs using economic mechanism, such as game theory and auction, but the spectrum owner can hardly increase the spectrum efficiency directly when SUs apply the distributed manner. In this paper, we consider the slotted uplink scenario where several SUs have data transmitted to secondary access point (AP) under distributed random access manner. The AP decides how to divide its spectrum which maximizes the whole throughput, then SUs select the channels which would maximize their own profit. Our results show that SUs' channel selection process leads to a Nash Equilibrium, and the AP derives the proper number of channels based on the properties of NE. Moreover, we derive a rule for AP to decide which SUs should access the spectrum and lead to the increment in the whole throughput.",youyun xu,,2012.0,10.1109/GLOCOM.2012.6504010,2012 IEEE Global Communications Conference (GLOBECOM),Sun2012,False,,IEEE,Not available,Efficient spectrum utilization with selfish secondary users in cognitive radio networks,498b708865e3e4ade661625ec93312de,https://ieeexplore.ieee.org/document/6504010/ 5829,"In cognitive radio networks, secondary users (SUs) are considered as selfish spectrum users, thus how to maximize the spectrum efficiency by these selfish users becomes an endless research topic. Recent studies mostly focus on the competition analysis between SUs using economic mechanism, such as game theory and auction, but the spectrum owner can hardly increase the spectrum efficiency directly when SUs apply the distributed manner. In this paper, we consider the slotted uplink scenario where several SUs have data transmitted to secondary access point (AP) under distributed random access manner. The AP decides how to divide its spectrum which maximizes the whole throughput, then SUs select the channels which would maximize their own profit. Our results show that SUs' channel selection process leads to a Nash Equilibrium, and the AP derives the proper number of channels based on the properties of NE. Moreover, we derive a rule for AP to decide which SUs should access the spectrum and lead to the increment in the whole throughput.",xinxin feng,,2012.0,10.1109/GLOCOM.2012.6504010,2012 IEEE Global Communications Conference (GLOBECOM),Sun2012,False,,IEEE,Not available,Efficient spectrum utilization with selfish secondary users in cognitive radio networks,498b708865e3e4ade661625ec93312de,https://ieeexplore.ieee.org/document/6504010/ 5830,"In cognitive radio networks, secondary users (SUs) are considered as selfish spectrum users, thus how to maximize the spectrum efficiency by these selfish users becomes an endless research topic. Recent studies mostly focus on the competition analysis between SUs using economic mechanism, such as game theory and auction, but the spectrum owner can hardly increase the spectrum efficiency directly when SUs apply the distributed manner. In this paper, we consider the slotted uplink scenario where several SUs have data transmitted to secondary access point (AP) under distributed random access manner. The AP decides how to divide its spectrum which maximizes the whole throughput, then SUs select the channels which would maximize their own profit. Our results show that SUs' channel selection process leads to a Nash Equilibrium, and the AP derives the proper number of channels based on the properties of NE. Moreover, we derive a rule for AP to decide which SUs should access the spectrum and lead to the increment in the whole throughput.",xinbing wang,,2012.0,10.1109/GLOCOM.2012.6504010,2012 IEEE Global Communications Conference (GLOBECOM),Sun2012,False,,IEEE,Not available,Efficient spectrum utilization with selfish secondary users in cognitive radio networks,498b708865e3e4ade661625ec93312de,https://ieeexplore.ieee.org/document/6504010/ 5831,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5832,"In cognitive radio networks, secondary users (SUs) are considered as selfish spectrum users, thus how to maximize the spectrum efficiency by these selfish users becomes an endless research topic. Recent studies mostly focus on the competition analysis between SUs using economic mechanism, such as game theory and auction, but the spectrum owner can hardly increase the spectrum efficiency directly when SUs apply the distributed manner. In this paper, we consider the slotted uplink scenario where several SUs have data transmitted to secondary access point (AP) under distributed random access manner. The AP decides how to divide its spectrum which maximizes the whole throughput, then SUs select the channels which would maximize their own profit. Our results show that SUs' channel selection process leads to a Nash Equilibrium, and the AP derives the proper number of channels based on the properties of NE. Moreover, we derive a rule for AP to decide which SUs should access the spectrum and lead to the increment in the whole throughput.",yu cheng,,2012.0,10.1109/GLOCOM.2012.6504010,2012 IEEE Global Communications Conference (GLOBECOM),Sun2012,False,,IEEE,Not available,Efficient spectrum utilization with selfish secondary users in cognitive radio networks,498b708865e3e4ade661625ec93312de,https://ieeexplore.ieee.org/document/6504010/ 5833,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Sensors,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5834,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Resource management,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5835,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Mobile communication,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5836,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Integrated circuits,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5837,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Games,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5838,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Crowdsourcing,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5839,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",tie luo,Economics,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5840,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Sensors,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5841,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Resource management,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5842,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5843,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Mobile communication,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5844,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Integrated circuits,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5845,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Games,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5846,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Crowdsourcing,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5847,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",salil kanhere,Economics,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5848,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Sensors,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5849,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Resource management,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5850,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Mobile communication,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5851,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Integrated circuits,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5852,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Games,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5853,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5854,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Crowdsourcing,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5855,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",jianwei huang,Economics,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5856,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Sensors,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5857,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Resource management,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5858,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Mobile communication,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5859,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Integrated circuits,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5860,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Games,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5861,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Crowdsourcing,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5862,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",sajal das,Economics,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5863,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Sensors,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5864,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5865,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Resource management,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5866,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Mobile communication,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5867,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Integrated circuits,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5868,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Games,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5869,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Crowdsourcing,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5870,"Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market- driven mechanisms.",fan wu,Economics,2017.0,10.1109/MCOM.2017.1600746CM,IEEE Communications Magazine,Luo2017,False,,IEEE,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",1fdae9cab37ff724284f304837015bba,https://ieeexplore.ieee.org/document/7876960/ 5871,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",bing shi,Competing Cloud Platforms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5872,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",bing shi,Web Service,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5873,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",bing shi,Double Auction Mechanisms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5874,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",bing shi,Pricing Strategies,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5875,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5876,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",bing shi,Game Theory,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5877,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",yalong huang,Competing Cloud Platforms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5878,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",yalong huang,Web Service,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5879,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",yalong huang,Double Auction Mechanisms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5880,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",yalong huang,Pricing Strategies,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5881,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",yalong huang,Game Theory,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5882,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",jinwen wang,Competing Cloud Platforms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5883,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",jinwen wang,Web Service,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5884,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",jinwen wang,Double Auction Mechanisms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5885,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",jinwen wang,Pricing Strategies,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5886,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5887,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",jinwen wang,Game Theory,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5888,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",shengwu xiong,Competing Cloud Platforms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5889,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",shengwu xiong,Web Service,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5890,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",shengwu xiong,Double Auction Mechanisms,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5891,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",shengwu xiong,Pricing Strategies,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5892,"In this paper, we analyse how multiple competing cloud platforms set effective service prices between Web service providers and consumers. We propose a novel economic framework to model this problem. Cloud platforms run double auction mechanisms, where Web service is commodity traded by service providers (sellers) and service consumers (buyers). Multiple cloud platforms compete against each other to attract service providers and consumers. Specifically, we use game theory to analyse the pricing policies of competing cloud platforms, where service providers and consumers can choose to participate in any of the platforms, and bid or ask for the Web service. The platform selection and bidding strategies of service providers and consumers are affected by the pricing policies and vice versa, and so we propose a co-learning algorithm based on fictitious play to analyse this problem. In more detail, we investigate a setting with two competing cloud platforms who can adopt either equilibrium k pricing policy or discriminatory k pricing policy. We find that, when both cloud platforms use the same type of pricing policy, they can co-exist in equilibrium, and they have an extreme bias to service providers or consumers when setting k. When both platforms adopt different types of policies, we find that all service providers and consumers converge to the discriminatory k pricing policy and so the two competing platforms can no longer co-exist.",shengwu xiong,Game Theory,2016.0,10.1109/ICPADS.2016.0091,2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),Shi2016,False,,IEEE,Not available,A Game-Theoretic Analysis of Pricing Strategies for Competing Cloud Platforms,0c45163b011c7c894cf91f7fe47bbb4b,https://ieeexplore.ieee.org/document/7823806/ 5893,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5894,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5895,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5896,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5897,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5898,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5899,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5900,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5901,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5902,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5903,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5904,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5905,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5906,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5907,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5908,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5909,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5910,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5911,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 5912,"Social Simulation as Transdisciplinary Research (SSasTR) is a special joint organized session (OS) organized by both the Transdisciplinary Federation of Science and Technology (TraFST) and the Society of Instrument and Control Engineers (SICE). In this OS, we aim at exploring social simulation from the viewpoint of transdisciplinary research and bringing researchers from diferent felds to discuss the same issue. For this purpose, SSasTR, in particular, focuses on both the ideas from computer science as a new technology to provide insights into social science communities and the ideas coming from social sciences as new metaphors to provide insights into computer science community. To promote SSasTR, the OS gathers mostly all well-known Japanese researchers, who have much contributed to encourage this interdisciplinary research area by addressing past, present and future issues on social simulation. We have 28 oral presentations in the OS, which widely cover the significant social simulation areas, which include game theory, market and finance, auction, social networks, social models (e.g., pedestrian and disaster models), agent architecture, and human-agent interaction design.",keiki takadama,,2011.0,,SICE Annual Conference 2011,Takadama2011,False,,IEEE,Not available,TraFST-SICE joint OS social simulation as transdisciplinary research,dc3bcdf77f378e3c5abee0ad960aaf5d,https://ieeexplore.ieee.org/document/6060185/ 5913,"Social Simulation as Transdisciplinary Research (SSasTR) is a special joint organized session (OS) organized by both the Transdisciplinary Federation of Science and Technology (TraFST) and the Society of Instrument and Control Engineers (SICE). In this OS, we aim at exploring social simulation from the viewpoint of transdisciplinary research and bringing researchers from diferent felds to discuss the same issue. For this purpose, SSasTR, in particular, focuses on both the ideas from computer science as a new technology to provide insights into social science communities and the ideas coming from social sciences as new metaphors to provide insights into computer science community. To promote SSasTR, the OS gathers mostly all well-known Japanese researchers, who have much contributed to encourage this interdisciplinary research area by addressing past, present and future issues on social simulation. We have 28 oral presentations in the OS, which widely cover the significant social simulation areas, which include game theory, market and finance, auction, social networks, social models (e.g., pedestrian and disaster models), agent architecture, and human-agent interaction design.",takao terano,,2011.0,,SICE Annual Conference 2011,Takadama2011,False,,IEEE,Not available,TraFST-SICE joint OS social simulation as transdisciplinary research,dc3bcdf77f378e3c5abee0ad960aaf5d,https://ieeexplore.ieee.org/document/6060185/ 5914,"Summary form only given. One of most popular network services is web search. Modern search engines display advertisements while responding to user queries. They rely on market mechanisms to elicit prices for these advertisements, and use auctions. The algorithms for the underlying bidding and pricing tasks use techniques from three mathematical areas: mechanism design and game theory, optimization, and statistical estimation. The talk will describe the mathematical and algorithmic issues and challenges in sponsored search advertising.",shan muthukrishnan,,2008.0,10.1109/CNSR.2008.8,6th Annual Communication Networks and Services Research Conference (cnsr 2008),Muthukrishnan2008,False,,IEEE,Not available,Keynote 1 - Algorithmic Methods for Sponsored Search Advertising,84007ab3f2a8fbfa1d2b1bda6198df38,https://ieeexplore.ieee.org/document/4519826/ 5915,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5916,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5917,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5918,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5919,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5920,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5921,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5922,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5923,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5924,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5925,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5926,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5927,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 5928,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,double auction,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5929,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,fuzzy,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5930,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",haixin huang,game,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5931,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5932,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,double auction,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5933,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,fuzzy,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5934,"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants' bidding wills. Study auction participants' actions and decisions using Bellman and Zadeh's concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.",dingwei wang,game,2010.0,10.1109/ICINIS.2010.177,2010 Third International Conference on Intelligent Networks and Intelligent Systems,Huang2010,False,,IEEE,Not available,Double Auction Modeling Based on Fuzzy Game,e6372a62e70fa2228136618b43b817cd,https://ieeexplore.ieee.org/document/5693563/ 5935,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5936,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5937,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5938,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5939,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5940,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5941,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5942,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5943,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5944,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5945,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 5946,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5947,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5948,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5949,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5950,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5951,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 5952,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,auction,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5953,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5954,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,strategy,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5955,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,game theory,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5956,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",miroslav lutovac,computer algebra system,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5957,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,auction,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5958,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,strategy,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5959,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,game theory,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5960,"Auctions can be represented using applications of game theory because they present explicit trading rules. The efficient programming procedure based on game theory can be implemented in computer algebra systems (CAS). The knowledge can be hidden from user as the CAS application that can be used as regular built-in CAS function. This way, the user can focus to programming test of different strategies with different own strategy and strategies of other bidders with estimate private information. This paper presents the design of Mathematica application as an example CAS in that is programmed add-ons application that is available as built-in functions with all additional information such as error handling, help support, and help usage functionality.",aleksandra lutovac,computer algebra system,2014.0,10.1109/TELFOR.2014.7034581,2014 22nd Telecommunications Forum Telfor (TELFOR),Lutovac2014,False,,IEEE,Not available,Vickrey auction game as Mathematica application,e3a8e4005ad0f48b835d7595a90f134b,https://ieeexplore.ieee.org/document/7034581/ 5961,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,IEEE 802.16,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 5962,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,resource allocation,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 5963,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,game theory,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 5964,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5965,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,auction theory,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 5966,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5967,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5968,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",chen shengli,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5969,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5970,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5971,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5972,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5973,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5974,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5975,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5976,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5977,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5978,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5979,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5980,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5981,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5982,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5983,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5984,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5985,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5986,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",luo yunfeng,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5987,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5988,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5989,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5990,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5991,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5992,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5993,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5994,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5995,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5996,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5997,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,Shill biding,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 5998,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 5999,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6000,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6001,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6002,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6003,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6004,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6005,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6006,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6007,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6008,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 6009,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,English auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 6010,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6011,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6012,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 6013,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,electronic marketplace,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6014,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,game theory,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6015,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,framework,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6016,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,agent,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6017,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,negotiation,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6018,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,electronic marketplace,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6019,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,game theory,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6020,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, applying decision analysis method and game theory, firstly, we research the bidderpsilas optimal biding strategy on english auction and first-price sealed-bid auction with shill biding. secondly, we discuss the relations between the sellerpsilas revenue and probability of shill biding and commission rate under two important auctions types. finally, we use honest bidderpsilas expected gain and honest sellerpsilas revenue as a basis to compare these two important auctions types, and interpret some bidding behavior in practice and give some suggestion.",yang xiaohua,First-price sealed-bid auction,2008.0,10.1109/CHICC.2008.4605811,2008 27th Chinese Control Conference,Shengli2008,False,,IEEE,Not available,A comparative analysis of English Auction and First-price Sealed-bid Auction with Shill Biding,c0873e54c026a226588642ab7399cbb4, 6021,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,framework,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6022,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,agent,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6023,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,negotiation,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 6024,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,power networks,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6025,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,auction,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6026,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,prosumer,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6027,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,game theory,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6028,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",alain tcheukam,demand-supply,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6029,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,power networks,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6030,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,auction,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6031,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6032,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,prosumer,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6033,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,game theory,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6034,"In this paper we study distributed power networks using Bayesian mean-field-type game theory. A prosumer (producer-consumer) is a user that not only consumes electricity, but can also produce and store electricity. We identify and formulate the key interactions between consumers, prosumers and producers. Based on forecasted demand, each operator determines its production quantity, its mismatch cost, and engages an auction mechanism to the prosumer market. All the operators together are engaged in a competitive energy market share. The resulting supply is completed by the prosumers auction market. This determines a market price, and the consumers react to the price and generate a demand. The consistency relationship between demand and supply of the three components provides a fixed-point system, whose solution is a mean-field equilibrium.",hamidou tembine,demand-supply,2016.0,10.1109/CCDC.2016.7531026,2016 Chinese Control and Decision Conference (CCDC),Tcheukam2016,False,,IEEE,Not available,Mean-field-type games for distributed power networks in presence of prosumers,ed5a7419f1fa65db60893aac50e33081,https://ieeexplore.ieee.org/document/7531026/ 6035,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,Multimedia,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6036,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,cognitive radio networks,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6037,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,auction,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6038,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,game theory,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6039,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,cheat-proof,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6040,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,social welfare,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6041,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,Multimedia,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6042,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6043,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,cognitive radio networks,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6044,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,auction,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6045,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,game theory,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6046,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,cheat-proof,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6047,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,social welfare,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6048,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,Multimedia,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6049,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,cognitive radio networks,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6050,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,auction,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6051,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,game theory,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6052,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,cheat-proof,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6053,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6054,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,social welfare,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6055,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,Multimedia,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6056,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,cognitive radio networks,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6057,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,auction,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6058,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,game theory,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6059,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,cheat-proof,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6060,"Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the greatest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose a distributively auction-based spectrum allocation scheme, which is spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that ACA-A is cheat-proof and can maximize the social welfare. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,social welfare,2010.0,10.1109/ICASSP.2010.5496095,"2010 IEEE International Conference on Acoustics, Speech and Signal Processing",Chen2010,False,,IEEE,Not available,An auction-based framework for multimedia streaming over cognitive radio networks,8715817b5739c0413caa66ae5ca6fe6a,https://ieeexplore.ieee.org/document/5496095/ 6061,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6062,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6063,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6064,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6065,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6066,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6067,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6068,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6069,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6070,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6071,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6072,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",t. chandrashekar,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6073,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6074,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6075,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6076,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6077,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6078,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6079,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6080,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6081,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6082,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6083,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6084,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",y. narahari,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6085,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6086,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 6087,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6088,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6089,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6090,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6091,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6092,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6093,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6094,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6095,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6096,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",charles rosa,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6097,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",gangtao jia,Multi-attribute Online Auction,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6098,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6099,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6100,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6101,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6102,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6103,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6104,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6105,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6106,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6107,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6108,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",gangtao jia,VIKOR,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6109,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",devadatta kulkarni,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6110,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6111,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6112,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6113,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6114,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6115,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6116,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6117,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6118,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6119,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,IEEE 802.16,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 6120,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",gangtao jia,MDCM,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6121,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6122,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",jeffrey tew,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6123,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,Auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6124,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,combinatorial auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6125,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,e-Procurement,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6126,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,game theory,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6127,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,mechanism design,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6128,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,multiattribute auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6129,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,multi-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6130,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,negotiations,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6131,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",gangtao jia,compromise solution,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6132,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,NP-hard problems,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6133,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,single-item auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6134,"Auction-based mechanisms are extremely relevant in modern day electronic procurement systems since they enable a promising way of automating negotiations with suppliers and achieve the ideal goals of procurement efficiency and cost minimization. This paper surveys recent research and current art in the area of auction-based mechanisms for e-procurement. The survey delineates different representative scenarios in e-procurement where auctions can be deployed and describes the conceptual and mathematical aspects of different categories of procurement auctions. We discuss three broad categories: 1) single-item auctions: auctions for procuring a single unit or multiple units of a single homogeneous type of item; 2) multi-item auctions: auctions for procuring a single unit or multiple units of multiple items; and 3) multiattribute auctions where the procurement decisions are based not only on costs but also on attributes, such as lead times, maintenance contracts, quality, etc. In our review, we present the mathematical formulations under each of the above categories, bring out the game theoretic and computational issues involved in solving the problems, and summarize the current art. We also present a significant case study of auction based e-procurement at General Motors.",pankaj dayama,volume discount auctions,2007.0,10.1109/TASE.2006.885126,IEEE Transactions on Automation Science and Engineering,Chandrashekar2007,False,,IEEE,Not available,Auction-Based Mechanisms for Electronic Procurement,7d8258217912ba70fd1f8b6d0152f015,https://ieeexplore.ieee.org/document/4266807/ 6135,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6136,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6137,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6138,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6139,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6140,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6141,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6142,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",zhiguang zhang,Multi-attribute Online Auction,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6143,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6144,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6145,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6146,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6147,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6148,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6149,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6150,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6151,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6152,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6153,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",zhiguang zhang,VIKOR,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6154,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6155,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6156,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 6157,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6158,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6159,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6160,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6161,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6162,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6163,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6164,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",zhiguang zhang,MDCM,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6165,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",jingjing wang,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6166,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6167,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6168,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6169,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6170,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6171,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6172,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6173,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",chunxiao jiang,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6174,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6175,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",zhiguang zhang,compromise solution,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6176,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6177,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6178,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6179,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6180,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6181,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6182,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",zhi bie,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6183,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6184,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6185,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6186,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",yan qin,Multi-attribute Online Auction,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6187,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6188,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6189,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6190,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6191,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",tony quek,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6192,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6193,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6194,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6195,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6196,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,D2D network,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6197,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",yan qin,VIKOR,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6198,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,game theory,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6199,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,multimedia,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6200,"Device-to-device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this letter, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.",yong ren,pricing and auction,2016.0,10.1109/LWC.2016.2547395,IEEE Wireless Communications Letters,Wang2016,False,,IEEE,Not available,Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction,f9743452ea1ef2823233244ae1b8cb62,https://ieeexplore.ieee.org/document/7442523/ 6201,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6202,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6203,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6204,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6205,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6206,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6207,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6208,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",yan qin,MDCM,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6209,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6210,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6211,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6212,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6213,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6214,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6215,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6216,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6217,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6218,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6219,"Online auctions have promoted e-commerce development. Generally, B2C or C2C e-commerce auctions types often adopt normal auction Multi-attribute auction as a widely researched domain and integration of multi-attribute decision-making methods with auction theory has been studied in various research settings. Multi-attribute Online Auction decision-making needs comprehensive consideration and decision-making for numerous attributes which exist conflict, in order to reduce uncertainty and be closer to reality, the VIKOR based on interval number is proposed to solve Multi-attribute online auction problem, the result of the game among attributes forms the final compromise solution. At last an example is given to demonstrate the rationality and feasibility of the method.",yan qin,compromise solution,2010.0,10.1109/ISME.2010.243,2010 International Conference of Information Science and Management Engineering,Jia2010,False,,IEEE,Not available,Multi-attribute Online Auction Decision-Making Based on Compromise Solution,51dc7ae833901f302ff4090e812d0a41,https://ieeexplore.ieee.org/document/5573863/ 6220,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6221,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6222,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6223,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6224,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6225,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6226,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6227,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6228,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6229,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6230,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,resource allocation,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 6231,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,Cognitive Radio (CR),2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6232,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6233,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6234,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 6235,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",yongming wang,flower auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6236,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",yongming wang,supply chain performance,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6237,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",yongming wang,fresh agricultural products auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6238,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",yongming wang,first-price sealed-bid auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6239,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",yongming wang,second-price sealed-bid auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6240,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",chen xiang,flower auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6241,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",chen xiang,supply chain performance,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6242,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,dynamic spectrum sharing,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6243,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",chen xiang,fresh agricultural products auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6244,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",chen xiang,first-price sealed-bid auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6245,"Dutch auction is successfully adopted in common flowers quickly in Kunming China, Netherlands, and other places; they have a large number of flower productions. However there are few papers discuss about what kind of auction mechanism is more suitable for rare flowers. Second-price auction and first-price auction are seldom used in flowers auction. We wonder which auction mechanisms in flower trade could make a good supply chain performance. In our paper, we define the notion of performance of supply chain in second-price and first-price auction about rare flowers. Using interdependent model with one single supplier and two resellers in the auction, we show the payoffs of both sides in order to weigh the indicator total revenues of supply chain, which is used to measure the performance of rare flowers supply chain. We firstly consider the quantities in consumer market with Nash equilibrium, afterward two resellers take part into the auction game, and value the bid function. After finishing the analysis of all the games, in simulation, we illustrate some numerical examples in order to validate conclusion.",chen xiang,second-price sealed-bid auction,2014.0,10.1109/ICMA.2014.6886030,2014 IEEE International Conference on Mechatronics and Automation,Wang2014,False,,IEEE,Not available,"Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?",db10e8d231226d6511c92f19f03b8a67,https://ieeexplore.ieee.org/document/6886030/ 6246,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Protocols,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6247,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Electronic commerce,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6248,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Consumer electronics,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6249,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Business,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6250,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Humans,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6251,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Internet,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6252,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Power generation economics,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6253,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,non-cooperative game,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6254,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Game theory,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6255,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Solids,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6256,"Economic mechanisms are used to determine the flow of resources in a supply chain and to achieve an efficient allocation of goods and services in networked economies. In order to choose the ""right"" allocation mechanism for a certain situation, it is important to know about the characteristics of different negotiation situations and the set of available mechanisms that are suitable in these situations. Over the past few years, there has been an enormous interest of researchers in economics, computer science and game theory to develop advanced economic mechanisms for the creation of new types of electronic exchanges. Combinatorial auctions, multi-attribute auctions and multi-stage auctions are some of the approaches to extend the framework of mechanism design theory. In this paper, we develop a classification scheme for negotiation situations in electronic commerce based on microeconomic theory. We describe classic mechanism design and auction theory, and classify old and new approaches in this field.",m. bichler,Mediation,2000.0,10.1109/HICSS.2000.926839,Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Bichler2000,False,,IEEE,Not available,A roadmap to auction-based negotiation protocols for electronic commerce,fd440487cf68f294f941e35a7ccd43c2, 6257,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6258,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6259,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6260,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6261,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6262,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6263,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6264,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,Nash equilibrium,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6265,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6266,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6267,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",nan cheng,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6268,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6269,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6270,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6271,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6272,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6273,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6274,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6275,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,net utility function,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6276,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6277,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6278,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning lu,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6279,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6280,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6281,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6282,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6283,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6284,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6285,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6286,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",jikai yin,iterative algorithm,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6287,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6288,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6289,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",ning zhang,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6290,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6291,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6292,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6293,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6294,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6295,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6296,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6297,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,Cognitive Radio (CR),2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6298,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6299,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6300,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xiang zhang,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6301,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6302,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6303,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6304,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6305,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6306,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6307,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6308,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,dynamic spectrum sharing,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6309,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6310,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6311,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",xuemin shen,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6312,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6313,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6314,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6315,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6316,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6317,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,Cellular traffic offloading,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6318,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,vehicular communication,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6319,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,non-cooperative game,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6320,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,delay tolerant,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6321,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,game theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6322,"In this paper, we study opportunistic traffic offloading in a vehicular environment, where the cellular traffic of vehicular users (VUs) is offloaded through carrier-WiFi networks deployed by the mobile network operator (MNO). By jointly considering users' satisfaction, the offloading performance, and the MNO's revenue, two WiFi offloading mechanisms are proposed: auction game-based offloading (AGO) and congestion game-based offloading (CGO). Moreover, we introduce an approach to predict WiFi offloading potential and access cost and incorporate it in the offloading mechanisms. Specifically, with the AGO mechanism, the MNO employs auctions to sell WiFi access opportunities; VUs decide whether to bid according to their utilities and are capable of using WiFi if the auction is won. With the CGO mechanism, a VU calculates utility considering other VUs' strategies and makes offloading decisions accordingly. We show that the AGO mechanism can maximize social welfare and increase the MNO's revenue, whereas the CGO mechanism can achieve a better performance of average VU utility and fairness. Additionally, both AGO and CGO mechanisms can improve the overall WiFi offloading performance. Through simulations, we demonstrate that both AGO and CGO mechanisms can achieve higher average utility of VUs and lower average service delay and offload much more cellular traffic compared with existing offloading mechanisms.",jon mark,auction theory,2016.0,10.1109/TITS.2015.2513399,IEEE Transactions on Intelligent Transportation Systems,Cheng2016,False,,IEEE,Not available,Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,723f4e260e718bf2b6ce16fcd659ea5f,https://ieeexplore.ieee.org/document/7393581/ 6323,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,pushpita chatterjee,ad hoc networks,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6324,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,pushpita chatterjee,trust,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6325,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,pushpita chatterjee,game theory,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6326,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,pushpita chatterjee,auction,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6327,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,pushpita chatterjee,cooperation,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6328,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,indranil sengupta,ad hoc networks,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6329,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,indranil sengupta,trust,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6330,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,Nash equilibrium,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6331,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,indranil sengupta,game theory,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6332,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,indranil sengupta,auction,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6333,In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost of a packet we use two auction mechanisms procurement and Dutch auction. Trust is measured by the past behavior of each node towards proper functionality of the network.,indranil sengupta,cooperation,2009.0,10.1109/IADCC.2009.4809130,2009 IEEE International Advance Computing Conference,Chatterjee2009,False,,IEEE,Not available,A Trust based Auction oriented Routing Model for Ad Hoc Networks,3420c1bb1d20273e200fcb80c4c6c3ed,https://ieeexplore.ieee.org/document/4809130/ 6334,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6335,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6336,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6337,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6338,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6339,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6340,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6341,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,game theory,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 6342,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,net utility function,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6343,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6344,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6345,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6346,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6347,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6348,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6349,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6350,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 6351,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,bidding strategies,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6352,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,power producers,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6353,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",qi shi,iterative algorithm,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6354,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,oligopoly game model,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6355,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,auction theory,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6356,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,market clearing price,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6357,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,bidding strategies,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6358,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,power producers,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6359,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,oligopoly game model,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6360,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,auction theory,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6361,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,market clearing price,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 6362,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6363,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6364,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,Cognitive Radio (CR),2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6365,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6366,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6367,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6368,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6369,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6370,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6371,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6372,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6373,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6374,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 6375,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,dynamic spectrum sharing,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6376,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",yida xu,LUBA,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6377,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",yida xu,auction,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6378,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",yida xu,game theory,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6379,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",yida xu,generative model,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6380,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",yida xu,recurrent neural network,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6381,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",hamidou tembine,LUBA,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6382,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",hamidou tembine,auction,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6383,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",hamidou tembine,game theory,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6384,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",hamidou tembine,generative model,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6385,"Lowest unique bid auction (LUBA) sites are gaining popularity on the Internet in recent years. In this paper, we study LUBA with resubmission in discrete bid spaces. A long-standing goal in the field of Internet auction is to develop agents that can perceive and understand the strategy information behind the mechanism and can guide us to behave in a fast, frugal and smart way. We marry ideas from recurrent neural network and data to learn a generative model for generating winning bid sequences. A sequence of winning bids in Internet auctions can be viewed as a sequence of events and modeled by generative models. We learn a model that is able to capture the long dependencies in a winning bid sequence. The generated data obtained from our model and the ground truth dataset share similar distributions.",hamidou tembine,recurrent neural network,2018.0,10.1109/CCDC.2018.8407671,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Generative model of bid sequences in lowest unique bid auctions,e4bef3a1a7872577cf119c37a015e361,https://ieeexplore.ieee.org/document/8407671/ 6386,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,non-cooperative game,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6387,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6388,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6389,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6390,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6391,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6392,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6393,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6394,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6395,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6396,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6397,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,Nash equilibrium,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6398,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6399,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6400,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6401,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 6402,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",steve phelps,Empirical game theory,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6403,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",steve phelps,evolutionary computing,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6404,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",steve phelps,mechanism design,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6405,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",peter mcburney,Empirical game theory,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6406,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",peter mcburney,evolutionary computing,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6407,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",peter mcburney,mechanism design,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6408,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,net utility function,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6409,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",simon parsons,Empirical game theory,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6410,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",simon parsons,evolutionary computing,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6411,"We introduce a method for strategy acquisition in nonzero-sum <i>n</i> -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are <i>likely to be adopted</i> by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics.",simon parsons,mechanism design,2010.0,10.1109/TSMCB.2009.2034731,"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)",Phelps2010,False,,IEEE,Not available,A Novel Method for Strategy Acquisition and Its Application to a Double-Auction Market Game,814bba1579df91bae115090ffa004ae6,https://ieeexplore.ieee.org/document/5325812/ 6412,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Game theory,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6413,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Humans,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6414,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Algorithm design and analysis,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6415,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Environmental economics,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6416,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Autonomous agents,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6417,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Design automation,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6418,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Process design,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6419,"Extensive research in recent years has shown that dynamic spectrum sharing is a promising approach to address the artificial spectrum scarcity problem by improving spectrum utilization. This new communication paradigm, however, requires a well-designed spectrum allocation mechanism. This paper designs a double spectrum auction framework that allows unlicensed secondary users to obtain selected idle spectra assigned to licensed primary users. This is a win-win game because primary users can earn extra revenue and secondary users can obtain spectra they desperately need. The competition among primary users in the auction framework is studied combining game theory with a double spectrum auction in a non-cooperative game with the Nash Equilibrium (NE) as the best solution. Primary users use the prices obtained from the NE as their bid strategies to participate in the auction. In this auction sellers and buyers bid privately and confidentially, which means that the secondary users do not actually know the price and the spectrum size offered by the primary users, then a new net utility function was developed for the primary users with an iterative algorithm to find the Nash equilibrium point. Simulations demonstrate that this design effectively improves spectrum utilization.",li li,iterative algorithm,2012.0,10.1109/TST.2012.6180040,Tsinghua Science and Technology,Yin2012,True,,IEEE,Not available,Bid strategies of primary users in double spectrum auctions,aab76afeef63e002892f9144741fb0fb, 6420,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Genetic algorithms,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6421,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Multiagent systems,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6422,"We describe an evolution-based method for evaluating auction mechanisms, and apply it to a space of mechanisms including the standard first-price and second-price sealed bid auctions. We replicate results known already in the auction theory literature regarding the suitability of different mechanisms for different bidder environments, and extend the literature by establishing the superiority of novel mechanisms over standard mechanisms, for commonly occurring scenarios. Thus this paper simultaneously extends auction theory, and provides a systematic method for further such extensions.",a. byde,Marketing and sales,2003.0,10.1109/COEC.2003.1210270,"EEE International Conference on E-Commerce, 2003. CEC 2003.",Byde2003,False,,IEEE,Not available,Applying evolutionary game theory to auction mechanism design,f230dffc2fd154beb86b856bcc06ce17,https://ieeexplore.ieee.org/document/1210270/ 6423,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,Cooperative communication,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6424,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,auction,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6425,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,bidding game,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6426,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,utility,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6427,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,Cooperative communication,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6428,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,auction,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6429,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,bidding game,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6430,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Game theory,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6431,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,utility,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 6432,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Game theory,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6433,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Internet,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6434,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Business,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6435,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Consumer behavior,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6436,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Fuzzy logic,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6437,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Chromium,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6438,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Welding,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6439,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Mathematics,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6440,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Humans,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6441,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Electronic commerce,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6442,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Mathematical model,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6443,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Game theory,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6444,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Internet,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6445,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Business,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6446,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Consumer behavior,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6447,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Fuzzy logic,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6448,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Chromium,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6449,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Welding,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6450,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Mathematics,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6451,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Humans,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6452,"For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the allocation is described by the Nash equilibrium solution of the game. Due to the real time and practical application need, a quick solution of logarithm utility function is proposed, which can solve the NP problem by linear operations with significant decrease in computational complexity.",shuang lai,auction theory,2011.0,10.1109/AIMSEC.2011.6010246,"2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)",Lai2011,False,,IEEE,Not available,Game theory and generalized Vickrey auction based bandwidth resource allocation in IEEE 802.16 networks,ae2c6325a64969755b20dfe24b3e7bbf,https://ieeexplore.ieee.org/document/6010246/ 6453,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Humans,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6454,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Mathematical model,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 6455,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,Multimedia,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6456,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,cognitive radio networks,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6457,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,auction,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6458,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,game theory,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6459,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,cheat-proof,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6460,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yan chen,social welfare,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6461,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,Multimedia,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6462,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,cognitive radio networks,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6463,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,auction,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6464,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Educational institutions,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6465,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,game theory,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6466,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,cheat-proof,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6467,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",yongle wu,social welfare,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6468,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,Multimedia,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6469,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,cognitive radio networks,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6470,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,auction,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6471,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,game theory,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6472,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,cheat-proof,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6473,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",beibei wang,social welfare,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6474,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,Multimedia,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6475,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Pricing,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6476,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,cognitive radio networks,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6477,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,auction,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6478,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,game theory,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6479,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,cheat-proof,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6480,"Cognitive radio technologies have become a promising approach to efficiently utilize the spectrum. Although many works have been proposed recently in the area of cognitive radio for data communications, little effort has been made in content-aware multimedia applications over cognitive radio networks. In this paper, we study the multimedia streaming problem over cognitive radio networks, where there is one primary user and N secondary users. The uniquely scalable and delay-sensitive characteristics of multimedia data and the resulting impact on users' viewing experiences of multimedia content are explicitly involved in the utility functions, due to which the primary user and the secondary users can seamlessly switch among different quality levels to achieve the largest utilities. Then, we formulate the spectrum allocation problem as an auction game and propose three distributively auction-based spectrum allocation schemes, which are spectrum allocation using Single object pay-as-bid Ascending Clock Auction (ACA-S), spectrum allocation using Traditional Ascending Clock Auction (ACA-T), and spectrum allocation using Alternative Ascending Clock Auction (ACA-A). We prove that all three algorithms converge in a finite number of clocks. We also prove that ACA-S and ACA-A are cheat-proof while ACA-T is not. Moreover, we show that ACA-T and ACA-A can maximize the social welfare while ACA-S may not. Therefore, ACA-A is a good solution to multimedia cognitive radio networks since it can achieve maximal social welfare in a cheat-proof way. Finally, simulation results are presented to demonstrate the efficiency of the proposed algorithms.",k.j. liu,social welfare,2010.0,10.1109/TCOMM.2010.08.090528,IEEE Transactions on Communications,Chen2010,False,,IEEE,Not available,Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks,ef35f4e23a0835b1a7cf0ae756336e1b,https://ieeexplore.ieee.org/document/5555888/ 6481,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",hamed kebriaei,Auction theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6482,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",hamed kebriaei,cellular networks,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6483,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",hamed kebriaei,device-to-device (D2D) communication,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6484,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",hamed kebriaei,game theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6485,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",behrouz maham,Auction theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6486,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Software agents,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6487,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",behrouz maham,cellular networks,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6488,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",behrouz maham,device-to-device (D2D) communication,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6489,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",behrouz maham,game theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6490,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",dusit niyato,Auction theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6491,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",dusit niyato,cellular networks,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6492,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",dusit niyato,device-to-device (D2D) communication,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6493,"Device-to-device (D2D) communication has been recently proposed to reduce cellular traffic by directly connecting the local nodes. In this paper, we consider a cellular-based primary network coexisting with a cognitive D2D pair. The primary network consists of a base station and multiple cellular users, which can sell their spectrum to the D2D user. Additionally, under low-interference conditions, the spectrum can be simultaneously shared between cellular users and D2D-capable users, which is called the nonorthogonal sharing mode. We introduce a double-sided bandwidth-auction game for cognitive D2D communication. In the auction, the D2D transmitter has three types of service providers (SPs) or sharing modes. The SPs operate on different frequency spectra, and a D2D-capable pair intends to share these spectra. This situation is formulated as an auction game, where a D2D transmitter bids a demand price-bandwidth curve, and each SP offers a price-bandwidth supply curve. The Nash equilibrium point of the auction game is analytically obtained. Then, a learning method is proposed for the decision making of the players in an incomplete-information repeated game. Moreover, the convergence of the proposed learning method to the Nash equilibrium point is studied through the converse Lyapunov theorem. Finally, the proposed auction game is extended to the multiple-D2D case, and the optimal bandwidth allocation strategy to maximize the sum rate is derived.",dusit niyato,game theory,2016.0,10.1109/TVT.2015.2485304,IEEE Transactions on Vehicular Technology,Kebriaei2016,False,,IEEE,Not available,Double-Sided Bandwidth-Auction Game for Cognitive Device-to-Device Communication in Cellular Networks,f29324ca7473de17f1dd6686b11ce69c,https://ieeexplore.ieee.org/document/7286856/ 6494,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6495,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6496,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6497,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Contracts,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6498,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6499,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6500,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6501,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6502,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6503,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6504,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6505,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6506,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6507,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6508,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Mirrors,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6509,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6510,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6511,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Electricity supply industry,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6512,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Costs,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6513,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Predictive models,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6514,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Power system modeling,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6515,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Game theory,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6516,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Educational institutions,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6517,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Mathematical model,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6518,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Power system analysis computing,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6519,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Arm,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6520,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Design optimization,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6521,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",deqiang gan,Performance analysis,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6522,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Electricity supply industry,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6523,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Costs,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6524,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Predictive models,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6525,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Power system modeling,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6526,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Game theory,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6527,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Educational institutions,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6528,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Mathematical model,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6529,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Power system analysis computing,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6530,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Game theory,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6531,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Design optimization,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6532,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",jing xu,Performance analysis,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6533,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Electricity supply industry,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6534,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Costs,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6535,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Predictive models,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6536,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Power system modeling,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6537,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Game theory,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6538,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Educational institutions,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6539,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Mathematical model,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6540,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Power system analysis computing,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6541,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Electronic commerce,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6542,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Design optimization,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6543,"In our work, we formulated a price competition game for modeling oligopolistic competition in a single-period electricity market auction. An assumption made in the study is that generator marginal costs are un-identical. In this paper, we continue to study single-period auction games, with the assumption that generator marginal costs are identical. We found that the later assumption facilitates a sharper result, which states that the market clearing price at equilibrium under tight capacity constraint is unique. This assumption also permits us to obtain simpler equilibrium characterization and mathematical proofs. Furthermore, we extend the model to study the auction game in which power and reserve are auctioned simultaneously.",chen shen,Performance analysis,2003.0,10.1109/SSST.2003.1194573,"Proceedings of the 35th Southeastern Symposium on System Theory, 2003.",Gan2003,False,,IEEE,Not available,Equilibrium points in power and reserve auction games,d73f8a126bf7638788574b6dee10a205,https://ieeexplore.ieee.org/document/1194573/ 6544,"We model the multi-path multi-hop routing in networks with selfish nodes as an auction and provide a novel solution from the game-theoretical perspective. We design a mechanism that results in Nash equilibria rather than the traditional strategy proofness, which alleviates the over-payment problem of the widely used VCG mechanism. Through theoretical analysis, the proposed protocol is shown to be effective.",xueyuan su,"Mechanism design, game theory, Nash equilibrium",2009.0,10.1109/LCOMM.2009.082021,IEEE Communications Letters,Su2009,False,,IEEE,Not available,Auction in multi-path multi-hop routing,7b84188be8ea723b15053a6cc9768ca4,https://ieeexplore.ieee.org/document/4783789/ 6545,"We model the multi-path multi-hop routing in networks with selfish nodes as an auction and provide a novel solution from the game-theoretical perspective. We design a mechanism that results in Nash equilibria rather than the traditional strategy proofness, which alleviates the over-payment problem of the widely used VCG mechanism. Through theoretical analysis, the proposed protocol is shown to be effective.",sammy chan,"Mechanism design, game theory, Nash equilibrium",2009.0,10.1109/LCOMM.2009.082021,IEEE Communications Letters,Su2009,False,,IEEE,Not available,Auction in multi-path multi-hop routing,7b84188be8ea723b15053a6cc9768ca4,https://ieeexplore.ieee.org/document/4783789/ 6546,"We model the multi-path multi-hop routing in networks with selfish nodes as an auction and provide a novel solution from the game-theoretical perspective. We design a mechanism that results in Nash equilibria rather than the traditional strategy proofness, which alleviates the over-payment problem of the widely used VCG mechanism. Through theoretical analysis, the proposed protocol is shown to be effective.",gang peng,"Mechanism design, game theory, Nash equilibrium",2009.0,10.1109/LCOMM.2009.082021,IEEE Communications Letters,Su2009,False,,IEEE,Not available,Auction in multi-path multi-hop routing,7b84188be8ea723b15053a6cc9768ca4,https://ieeexplore.ieee.org/document/4783789/ 6547,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Electricity supply industry,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6548,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Optimization,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6549,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Games,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6550,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Power supplies,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6551,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Tools,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6552,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Humans,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6553,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Procurement,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6554,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Game theory,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6555,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Electricity supply industry,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6556,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Optimization,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6557,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Games,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6558,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Power supplies,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6559,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Tools,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6560,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Procurement,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6561,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Game theory,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 6562,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",amir danak,Auction theory,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6563,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6564,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Educational institutions,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6565,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",amir danak,dynamic game theory,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6566,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",amir danak,repeated games,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6567,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",amir danak,resource allocation,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6568,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",shie mannor,Auction theory,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6569,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",shie mannor,dynamic game theory,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6570,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",shie mannor,repeated games,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6571,"In this paper, we present a strategic bidding framework for repeated auctions with monitoring and entry fees. We motivate and formally define the desired properties of our framework and present a recursive bidding algorithm, according to which buyers learn to avoid submitting bids in stages where they have a relatively low chance of winning the auctioned item. The proposed bidding strategies are computationally simple as players do not need to recompute the sequential strategies from the data collected to date. Pursuing the proposed efficient bidding (EB) algorithm, players monitor their relative performance in the course of the game and submit their bids based on their current estimate of the market condition. We prove the stability and robustness of the proposed strategies and show that they dominate myopic and random bidding strategies using an experiment in search engine marketing.",shie mannor,resource allocation,2011.0,10.1109/TCIAIG.2011.2160994,IEEE Transactions on Computational Intelligence and AI in Games,Danak2011,False,,IEEE,Not available,A Robust Learning Approach to Repeated Auctions With Monitoring and Entry Fees,10b3b894c286b2b01ad110ba640a9e0e,https://ieeexplore.ieee.org/document/5936110/ 6572,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",jianwei huang,Cooperative communications,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6573,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",jianwei huang,game theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6574,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",jianwei huang,auction theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6575,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Pricing,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6576,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",jianwei huang,resource allocation,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6577,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",jianwei huang,wireless networks,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6578,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",zhu han,Cooperative communications,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6579,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",zhu han,game theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6580,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",zhu han,auction theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6581,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",zhu han,resource allocation,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6582,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",zhu han,wireless networks,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6583,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",mung chiang,Cooperative communications,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6584,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",mung chiang,game theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6585,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",mung chiang,auction theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6586,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Software agents,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6587,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",mung chiang,resource allocation,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6588,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",mung chiang,wireless networks,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6589,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",h. poor,Cooperative communications,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6590,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",h. poor,game theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6591,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",h. poor,auction theory,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6592,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",h. poor,resource allocation,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6593,"Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, the SNR auction and the power auction, that determine relay selection and relay power allocation in a distributed fashion. A single-relay network is considered first, and the existence and uniqueness of the Nash Equilibrium (i.e., the auction's outcome) are proved. It is shown that the power auction achieves the efficient allocation by maximizing the total rate increase, and the SNR auction is flexible in trading off fairness and efficiency. For both auctions, the distributed best response bid updates globally converge to the unique Nash Equilibrium in a completely asynchronous manner. The analysis is then generalized to networks with multiple relays, and the existence of the Nash Equilibrium is shown under appropriate conditions. Simulation results verify the effectiveness and robustness of the proposed algorithms.",h. poor,wireless networks,2008.0,10.1109/JSAC.2008.080919,IEEE Journal on Selected Areas in Communications,Huang2008,False,,IEEE,Not available,Auction-Based Resource Allocation for Cooperative Communications,f80dac7acbec7f539d72f19a4cd6c4fa,https://ieeexplore.ieee.org/document/4604747/ 6594,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6595,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6596,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6597,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Contracts,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6598,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6599,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6600,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6601,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6602,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6603,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6604,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6605,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6606,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6607,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6608,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Mirrors,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6609,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6610,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6611,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6612,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6613,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6614,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6615,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 6616,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",mo haghighi,Game theory,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6617,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",mo haghighi,IoT,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6618,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",mo haghighi,WSN,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6619,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Arm,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 6620,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",mo haghighi,Energy-efficient,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6621,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",mo haghighi,Sensomax,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6622,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",konstantinos maraslis,Game theory,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6623,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",konstantinos maraslis,IoT,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6624,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",konstantinos maraslis,WSN,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6625,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",konstantinos maraslis,Energy-efficient,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6626,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",konstantinos maraslis,Sensomax,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6627,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",theo tryfonas,Game theory,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6628,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",theo tryfonas,IoT,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6629,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",theo tryfonas,WSN,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6630,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6631,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",theo tryfonas,Energy-efficient,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6632,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",theo tryfonas,Sensomax,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6633,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",george oikonomou,Game theory,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6634,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",george oikonomou,IoT,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6635,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",george oikonomou,WSN,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6636,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",george oikonomou,Energy-efficient,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6637,"WSNs have a wide variety of applications, and their usability for remote monitoring of various parameters of interest is growing dramatically. Conventional applications mostly involved a single WSN for collecting raw parameters with limited aggregation on the node side, whereby more sophisticated data mining was implemented by the end-users. Recent applications however, often require more intelligent functions, in which nodes are expected to implement logical decision-makings on the aggregated data. Implementing such functions often involves more processing, and wider interactions amongst network peers, hence resulting in higher energy consumption and shorter node lifetime. Sensomax is an agent-based WSN middleware, which facilitates seamless integration of mathematical functions in large-scale wireless sensor networks. In this paper, we will investigate game theoretic and auction-based techniques in order to optimise task distribution and energy consumption in WSNs.",george oikonomou,Sensomax,2015.0,10.1109/ICSENS.2015.7370652,2015 IEEE SENSORS,Haghighi2015,False,,IEEE,Not available,Game theoretic approach towards energy-efficient task distribution in wireless sensor networks,fa56cc15d2507042f7aae46656d16245,https://ieeexplore.ieee.org/document/7370652/ 6638,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6639,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6640,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6641,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6642,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6643,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6644,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6645,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6646,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6647,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6648,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6649,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6650,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6651,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6652,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6653,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6654,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",yi wei,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6655,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6656,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6657,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6658,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6659,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6660,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",li pan,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6661,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6662,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6663,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6664,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6665,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6666,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6667,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",dong yuan,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6668,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6669,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6670,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6671,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6672,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6673,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",shijun liu,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6674,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 6675,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6676,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6677,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6678,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6679,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6680,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6681,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6682,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",lei wu,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6683,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,cloud computing,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6684,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,Infrastructure as a Service,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6685,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,auction,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6686,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,resource allocation,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6687,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6688,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,game theory,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6689,"With the rapid development of IaaS market, how to efficiently trade between cloud providers and users is becoming a new challenge which attracts huge attentions from both industry and academia. Compared with traditional fixed-price model, market-oriented trading mechanism such as auction demonstrates greater promise for resource pricing and allocation in clouds due to its adaptability and flexibility. In this paper, we focus on the competitive and bidding scenario among independent users in an auction-based IaaS market. Participants have different composite service demands and they adjust their bidding prices during the trading with the aim of obtaining appropriate amount of resources to maximize their profits. We formulate this scenario as a dynamic noncooperative game with incomplete information and propose a feedback-based distributed bidding adjustment approach to find the approximated optimal bids (i.e. Nash Equilibrium) for each user so as to achieve a fair and multi-win resources allocation outcome in the whole market. Our experimental investigation showed that with the help of our agent-based automated trading model and distributed bidding algorithms, the Nash equilibrium state of the cloud resource allocation game can be reached efficiently within an acceptable time, and the optimal bidding prices of each user could be obtained at the same time.",xiangxu meng,Nash equilibrium,2016.0,10.1109/TrustCom.2016.0240,2016 IEEE Trustcom/BigDataSE/ISPA,Wei2016,False,,IEEE,Not available,A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market,14a50e2329a99e7e7bd9d17ba16f7312,https://ieeexplore.ieee.org/document/7847123/ 6690,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,security,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6691,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,relay,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6692,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,spectrum leasing,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6693,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,Stackelberg game,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6694,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,Auction theory,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6695,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",yayan ma,cognitive radio networks,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6696,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,security,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6697,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,relay,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6698,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6699,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,spectrum leasing,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6700,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,Stackelberg game,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6701,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,Auction theory,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6702,"In cognitive radio networks, security against eavesdroppers is a critical issue. In this paper, we consider a scenario in which the primary transmitter selects one secondary transmitter to act as a relay to enhance the security of communication. And as a reward the primary transmitter allows the selected secondary transmitter to access its spectrum. We first formulate the problem as a stackelberg game with the primary transmitter and the selected secondary transmitter as the leader and the follower respectively. Next a two-level game is employed to model the interaction between the primary transmitter and secondary transmitters in which the outer framework is based on the Stackelberg game and auction theory is exploited to model the competition of secondary transmitters. Numerical results show that the proposed schemes not only improve the primary transmitter's security but also help the selected secondary transmitter maximize its own utility.",baoyun wang,cognitive radio networks,2014.0,10.1109/ICASID.2014.7064950,"2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID)",Ma2014,False,,IEEE,Not available,Improving secrecy rate via spectrum leasing for cooperative secondary users,b917007d1eb823278b0c45ba4314276b,https://ieeexplore.ieee.org/document/7064950/ 6703,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,auction game,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6704,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,cooperative communications,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6705,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,QoS provisioning,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6706,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,queue-aware,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6707,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,relay node selection,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6708,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,Auction game,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6709,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6710,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,cooperative communications,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6711,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,QoS provisioning,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6712,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,queue-aware,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6713,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",ning wang,relay node selection,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6714,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,auction game,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6715,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,cooperative communications,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6716,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,QoS provisioning,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6717,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,queue-aware,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6718,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,relay node selection,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6719,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,Auction game,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6720,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6721,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,cooperative communications,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6722,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,QoS provisioning,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6723,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,queue-aware,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6724,"Queue-aware relay selection for the uplink of a user cooperation multiple access wireless network is investigated. To achieve better overall quality-of-service (QoS), the queue states of the relay buffers are considered in the relay selection process. A distributed relay selection mechanism based on a Vickrey auction game is proposed. It is shown that with a strictly positive reserve price, the unique Nash equilibrium of the auction game achieved by a truthful bidding strategy is the best relay response under the queue length constraint. Numerical results show that a significant improvement in QoS provisioning is achieved using the proposed auction-based queue-aware relay selection, compared to fixed relaying and channel-aware relay selection, especially when the relays have high average packet arrival rates. Given a target system packet blocking rate, the proposed scheme helps to better maintain relay buffer queue stability.",t. gulliver,relay node selection,2015.0,10.1109/LWC.2015.2404832,IEEE Wireless Communications Letters,Wang2015,False,,IEEE,Not available,Distributed Queue-Aware Relay Node Selection for Cooperative Wireless Networks via Vickrey Auction Game,df05541dff1c2679e85df291eb304a17,https://ieeexplore.ieee.org/document/7045513/ 6725,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",pramod mane,Deadlock,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6726,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",pramod mane,Auction Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6727,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",pramod mane,Sealed Bidding,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6728,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",pramod mane,VCG auction,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6729,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",pramod mane,Algorithmic Game Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6730,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",shalini gupta,Deadlock,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6731,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6732,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",shalini gupta,Auction Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6733,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",shalini gupta,Sealed Bidding,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6734,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",shalini gupta,VCG auction,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6735,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",shalini gupta,Algorithmic Game Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6736,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",gautam bandyopadhyay,Deadlock,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6737,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",gautam bandyopadhyay,Auction Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6738,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",gautam bandyopadhyay,Sealed Bidding,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6739,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",gautam bandyopadhyay,VCG auction,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6740,"The problem in increasing importance in design large multiprogramming system is the deadlock that is, two or more task is unable to proceed in scenario where each task monopolizing resources and waiting for the release of resources currently need by other in that group. In this paper we give the mechanism for deadlock recovery where finite processes are in deadlock while demanding the multiple identical instances of same resource type. We use VCG truthful auction mechanism in our proposed scheme by assuming that `N' numbers of processes are in deadlock and act as bidders, put sealed bid and take participation in auction with independent private values to acquire the resources form auctioneer. We provide an efficient algorithm to resolve starvation problem has polynomial time complexity.",gautam bandyopadhyay,Algorithmic Game Theory,2010.0,10.1109/PDGC.2010.5679882,"2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)",Mane2010,False,,IEEE,Not available,Recovery of N process deadlock using auction theory,dac19a79013002f7a912463bb26b1220,https://ieeexplore.ieee.org/document/5679882/ 6741,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,Cognitive radio networks,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6742,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6743,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,auction,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6744,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,dynamic spectrum access,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6745,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,quality of service,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6746,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,Stackelberg game,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6747,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,Cognitive radio networks,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6748,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,auction,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6749,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,dynamic spectrum access,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6750,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,quality of service,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6751,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",changyan yi,Stackelberg game,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6752,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,Cognitive radio networks,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6753,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6754,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,auction,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6755,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,dynamic spectrum access,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6756,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,quality of service,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6757,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,Stackelberg game,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6758,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,Cognitive radio networks,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6759,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,auction,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6760,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,dynamic spectrum access,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6761,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,quality of service,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6762,"The dynamic spectrum access (DSA) among multiple heterogeneous primary spectrum owners (POs) and secondary users (SUs) in recall-based cognitive radio networks is investigated in this paper. In our framework, SUs demand a different amount of spectrum for their transmissions. Each PO provides a portion of radio resources for leasing and also offers its own primary users (PUs) a certain degree of quality of service (QoS). Furthermore, POs are allowed to have different spectrum trading areas and as well as heterogeneous activities between POs' users. We propose a Two-stage resource allocation scheme with combinatorial Auction and Stackelberg Game in spectrum Sharing (TAGS) to deal with the allocation problem in such a complicated system. In the first stage, a spectrum allocation is decided by running a geographically restricted combinatorial auction without the consideration of spectrum recall. In the second stage, a Stackelberg game is formulated for all users to determine their best strategies with respect to the potential spectrum recall. Both theoretical and simulation results prove that TAGS provides a feasible solution for the problem and ensures the desired economic properties for all individuals.",jun cai,Stackelberg game,2014.0,10.1109/TCOMM.2014.2363116,IEEE Transactions on Communications,Yi2014,False,,IEEE,Not available,Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks,0def7c1c6770360b0bc8de0378161488,https://ieeexplore.ieee.org/document/6924778/ 6763,"When business licenses are sold in auctions with considerable sunk bid preparation costs, efficiency and auctioneer income may be negatively affected. Inspired by the support regime for onshore wind developers in Germany (EEG 2014), a reversed multi-unit auction with sunk pre-investments (bid preparation costs) is modeled as a participation game, and the effects of bid preparation costs on the bid strategies and resulting prices is analyzed. In the scenarios considered, bid preparation costs have surprisingly strong effects, considerably inflating resulting prices.",silvester koten,wind energy,2018.0,10.1109/EEM.2018.8469931,2018 15th International Conference on the European Energy Market (EEM),Koten2018,False,,IEEE,Not available,German Wind Auctions Modeled as a Participation Game,041760470bfbe59b0772fd16fc14081c,https://ieeexplore.ieee.org/document/8469931/ 6764,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6765,"When business licenses are sold in auctions with considerable sunk bid preparation costs, efficiency and auctioneer income may be negatively affected. Inspired by the support regime for onshore wind developers in Germany (EEG 2014), a reversed multi-unit auction with sunk pre-investments (bid preparation costs) is modeled as a participation game, and the effects of bid preparation costs on the bid strategies and resulting prices is analyzed. In the scenarios considered, bid preparation costs have surprisingly strong effects, considerably inflating resulting prices.",silvester koten,mathematical model,2018.0,10.1109/EEM.2018.8469931,2018 15th International Conference on the European Energy Market (EEM),Koten2018,False,,IEEE,Not available,German Wind Auctions Modeled as a Participation Game,041760470bfbe59b0772fd16fc14081c,https://ieeexplore.ieee.org/document/8469931/ 6766,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,reflexive game,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 6767,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,organization systems,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 6768,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,peer-to-peer network,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 6769,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,Data Envelopment Analysis,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 6770,The article deals with the organization of effective work of the development teams of complex software systems. The structure of the P2P network with peer interaction of actors with the information and communication environment is given. The auction mechanism is constructed and the game theory model of policy objectives to minimize the design time of software projects is described. The methodology for constructing artificial objects (actors) and practical boundaries according with the Data Envelopment Analysis method are considered. This allows us to refine the knowledge of actors on the parameters of the partners in the game during the auction allocation of tasks.,s. orlov,modeling,2015.0,10.1109/SCM.2015.7190412,2015 XVIII International Conference on Soft Computing and Measurements (SCM),Orlov2015,False,,IEEE,Not available,Reflexive game model for control the teams of software developers,bb411ed1db1718a1de7cc950b4a91df4,https://ieeexplore.ieee.org/document/7190412/ 6771,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6772,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6773,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6774,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6775,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6776,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6777,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6778,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6779,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6780,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6781,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6782,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6783,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6784,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6785,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6786,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",ping yao,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6787,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6788,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6789,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6790,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6791,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6792,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6793,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6794,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6795,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6796,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6797,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6798,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6799,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 6800,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",jun hu,framework,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6801,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",jun hu,agent,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6802,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",jun hu,game,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6803,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",jun hu,electronic marketplace,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6804,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",chun guan,framework,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6805,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",chun guan,agent,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6806,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",chun guan,game,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6807,"In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer agents in the game-based e-marketplace can finish negotiation more efficiently.",chun guan,electronic marketplace,2008.0,10.1109/ISCSCT.2008.135,2008 International Symposium on Computer Science and Computational Technology,Hu2008,False,,IEEE,Not available,A Framework of Game-Based Electronic Marketplace,4d73187b593bf79bc728a3a913aa4ddd,https://ieeexplore.ieee.org/document/4731439/ 6808,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,Auction,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6809,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6810,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,energy efficiency,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6811,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,game theory,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6812,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,green networking,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6813,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,heterogeneous networks (HetNets),2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6814,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,multiobjective optimization,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6815,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,offloading,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6816,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",alexandra bousia,switching off,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6817,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,Auction,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6818,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,energy efficiency,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6819,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,game theory,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6820,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6821,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,green networking,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6822,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,heterogeneous networks (HetNets),2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6823,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,multiobjective optimization,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6824,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,offloading,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6825,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",elli kartsakli,switching off,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6826,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,Auction,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6827,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,energy efficiency,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6828,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,game theory,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6829,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,green networking,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6830,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,heterogeneous networks (HetNets),2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6831,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6832,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,multiobjective optimization,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6833,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,offloading,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6834,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",angelos antonopoulos,switching off,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6835,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,Auction,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6836,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,energy efficiency,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6837,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,game theory,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6838,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,green networking,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6839,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,heterogeneous networks (HetNets),2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6840,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,multiobjective optimization,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6841,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,offloading,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6842,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6843,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",luis alonso,switching off,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6844,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,Auction,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6845,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,energy efficiency,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6846,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,game theory,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6847,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,green networking,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6848,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,heterogeneous networks (HetNets),2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6849,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,multiobjective optimization,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6850,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,offloading,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6851,"The emerging data traffic demand has caused a massive deployment of network infrastructure, including Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of the unexploited SCs capacity, where the MNOs, instead of requesting the maximum capacity to meet their highest traffic expectations, offer a set of bids requesting different resources from the third party SCs at lower costs. Motivated by the conflicting financial interests of the MNOs and the third party, the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, and the necessity for energy efficient solutions, we introduce a combinatorial auction framework, which includes i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework as an energy and cost efficient solution for the resource allocation problem, and we provide extensive analytical and experimental results to estimate the potential energy and cost savings that can be achieved. In addition, we investigate the conditions under which the MNOs and the third party companies should take part in the proposed auction.",christos verikoukis,switching off,2016.0,10.1109/TVT.2016.2517698,IEEE Transactions on Vehicular Technology,Bousia2016,False,,IEEE,Not available,Multiobjective Auction-Based Switching-Off Scheme in Heterogeneous Networks: To Bid or Not to Bid?,5935bab26ed41845a51e89975830329a,https://ieeexplore.ieee.org/document/7381691/ 6852,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,Divisible resource allocation,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6853,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6854,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,double-sided auction game,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6855,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,dynamic algorithm,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6856,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,efficiency,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6857,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,Nash equilibrium,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6858,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",suli zou,convergence,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6859,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,Divisible resource allocation,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6860,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,double-sided auction game,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6861,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,dynamic algorithm,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6862,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,efficiency,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6863,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,Nash equilibrium,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6864,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6865,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",zhongjing ma,convergence,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6866,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,Divisible resource allocation,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6867,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,double-sided auction game,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6868,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,dynamic algorithm,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6869,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,efficiency,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6870,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,Nash equilibrium,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6871,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",yunfeng shao,convergence,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6872,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,Divisible resource allocation,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6873,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,double-sided auction game,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6874,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,dynamic algorithm,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6875,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6876,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,efficiency,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6877,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,Nash equilibrium,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6878,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",long ran,convergence,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6879,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,Divisible resource allocation,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6880,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,double-sided auction game,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6881,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,dynamic algorithm,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6882,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,efficiency,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6883,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,Nash equilibrium,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6884,"We formulate a class of divisible resource allocation problems among a collection of suppliers and demanders as double-sided auction games. The auction mechanism adopted in this paper inherits some properties of the VCG style auction mechanism, like the incentive compatibility and the efficiency of Nash Equilibrium (NE). In this paper, we propose a novel dynamic process to implement the efficient NE for the underlying auction game. Basically, the double-sided auction game is formulated as a pair of single-sided auction games which are coupled via a joint potential quantity such that the best responses of the players in each single-sided auction and the potential quantity are updated under certain regulations. We introduce a pair of parameters which reveals some rough information related to the valuation or cost functions of players; then, assisted with the given parameters, at each iteration step, a pair of buyer and seller update their best responses under the constrained sets of their bid profiles respectively. We show the advantage of the increase of the potential quantity and individual allocation, and hence the auction game system converges to the efficient NE.",xiangdong liu,convergence,2016.0,10.1109/CDC.2016.7799200,2016 IEEE 55th Conference on Decision and Control (CDC),Zou2016,False,,IEEE,Not available,Efficient and dynamic double auctions for resource allocation,f81e578bcbed97cdc1b8a28280d26728,https://ieeexplore.ieee.org/document/7799200/ 6885,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6886,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6887,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6888,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6889,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6890,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6891,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6892,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6893,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6894,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6895,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6896,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6897,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 6898,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6899,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6900,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6901,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6902,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6903,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6904,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6905,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6906,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6907,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6908,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6909,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6910,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6911,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6912,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6913,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 6914,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",khethavath praveen,Distributed Cloud,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6915,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",khethavath praveen,Auctions,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6916,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",khethavath praveen,Game theory,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6917,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",khethavath praveen,resource allocation,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6918,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",johnson thomas,Distributed Cloud,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6919,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",johnson thomas,Auctions,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6920,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6921,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",johnson thomas,Game theory,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6922,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",johnson thomas,resource allocation,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6923,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",hong liu,Distributed Cloud,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6924,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",hong liu,Auctions,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6925,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",hong liu,Game theory,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6926,"In a distributed cloud environment that we propose in this paper, resource providers (KP) compete to provide resources to the users. This paper discusses how resources are allocated to users by using an Auction Game. We use a simultaneous Auction mechanism and select a set of winners once we receive all contributions or bids. In a real world scenario, users request resources with multiple capabilities, and in order to find such resources we use a contribution mechanism where service providers will provide a contribution price to users for providing a resource. Users use our proposed auction mechanism to select the resources from RP's. We discuss how Nash equilibrium can be achieved and how we can avoid the problem of free riders in the distributed cloud.",hong liu,resource allocation,2014.0,10.1109/ICDSE.2014.6974611,2014 International Conference on Data Science & Engineering (ICDSE),Praveen2014,False,,IEEE,Not available,Game theoretic approach to resource provisioning in a distributed cloud,0e0919cf5c752d032483aff005209222,https://ieeexplore.ieee.org/document/6974611/ 6927,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6928,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6929,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",kun zhang,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6930,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6931,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6932,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6933,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",rui wang,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6934,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6935,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6936,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",depei qian,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6937,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,opportunistic routing,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6938,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,incentive,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6939,"Opportunistic routing significantly increases throughput in wireless mesh networks (WMNs) by utilizing the wireless broadcast medium. Most opportunistic routing protocols assume all nodes are cooperative. But in WMNs, one realistic problem is that nodes perform in their own interests and refuse to forward packets for other nodes. Game theory approach is an efficient way used in routing protocol to incentive nodes to forward other's packets. In this paper, we develop an auction incentive mechanism (AIM) for WMNs with opportunistic routing to encourage cooperation and balance energy consumption between nodes. In AIM, a fair pricing mechanism is used to incentive nodes and the pricing process is modeled as auction game reached Bayesian Nash equilibrium which maximizes the profit of each relay node. The energy status and throughput are considered in the bidding process; this not only ensures the high throughput but also balances the energy cost to reduce invalid nodes. Simulations are presented to complement our theoretical and evaluation results demonstrate its high performance in terms of stability, throughput and fairness.",zhongzhi luan,auction,2011.0,10.1109/INM.2011.5990584,12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops,Zhang2011,False,,IEEE,Not available,Enhancing cooperation with multiple stage auctions in opportunistic routing for wireless mesh networks,24b007a44987d8b6eabb2433238cf2a8,https://ieeexplore.ieee.org/document/5990584/ 6940,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Plug-in electric vehicles,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6941,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Efficient charging coordinations,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6942,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6943,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Auction,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6944,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Progressive second price auction Mechanism,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6945,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Game theory,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6946,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",suli zou,Nash equilibrium,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6947,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Plug-in electric vehicles,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6948,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Efficient charging coordinations,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6949,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Auction,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6950,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Progressive second price auction Mechanism,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6951,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Game theory,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6952,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",zhongjing ma,Nash equilibrium,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6953,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6954,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Plug-in electric vehicles,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6955,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Efficient charging coordinations,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6956,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Auction,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6957,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Progressive second price auction Mechanism,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6958,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Game theory,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6959,"We designed a distributed charging coordination method for electric vehicles over a multi-time interval with the so-called progressive second price (PSP) auction mechanism which was proposed by Lasar and Semret in order to efficiently allocate the divisible resources among multi agents. The incentive compatibility holds for the auction games under the PSP mechanism. However due to the cross-elastic correlation among the different charging instants, the marginal valuation of an individual agent at each instant is determined by both the demand at this instant and the total demand at the whole interval. This phenomena makes the underlying auction games distinct from those studied in the literature. As a main contribution of the paper, we showed that the efficient bid profile over the multi-time interval is a Nash equilibrium of the auction systems.",xiangdong liu,Nash equilibrium,2013.0,10.1109/CDC.2013.6759939,52nd IEEE Conference on Decision and Control,Zou2013,False,,IEEE,Not available,Distributed efficient charging coordinations for electric vehicles under progressive second price auction mechanism,9ece5e9ac64179ef88848e4b7e9411ea,https://ieeexplore.ieee.org/document/6759939/ 6960,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6961,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6962,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6963,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",yasaman sarlati,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6964,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6965,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6966,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6967,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6968,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",simin naghavi,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6969,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6970,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Multi-attribute auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6971,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Continuous multi-attribute double auction,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6972,"Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.",faria mofakham,Coalition-proofness,2013.0,10.1109/ECDC.2013.6556724,7th International Conference on e-Commerce in Developing Countries:with focus on e-Security,Sarlati2013,False,,IEEE,Not available,A comparison study of multi-attribute continuous double auction mechanisms,a7ab7b7a589b3f6428c134948738f8f6,https://ieeexplore.ieee.org/document/6556724/ 6973,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6974,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6975,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6976,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6977,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6978,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6979,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6980,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6981,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6982,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6983,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",jian chen,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6984,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6985,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6986,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6987,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6988,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6989,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6990,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6991,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6992,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6993,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6994,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",yunhui liu,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6995,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6996,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6997,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 6998,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 6999,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7000,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7001,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7002,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7003,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7004,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7005,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiaoqiang cai,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7006,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Pricing,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7007,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Supply chains,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7008,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 7009,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7010,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Procurement,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7011,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Cybernetics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7012,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Game theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7013,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Cost function,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7014,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Telephony,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7015,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Power generation economics,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7016,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Systems engineering and theory,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7017,"In this paper, we consider a supply chain with one supplier and two retailers, where the supplier offers the Group Buying Auction (GBA), a novel pricing mechanism, to attract the small-sized retailers who cannot enjoy the low price in the traditional quantity discount. We deal with the situation where the market demand for each retailer is random and independent, and the retailers are noncooperative in placing their orders. By applying the noncooperative game theory, we derive the retailers' optimal strategies and show that the retailers will get more profits under the GBA than those under the traditional quantity discount mechanism.",xiping song,Research and development management,2006.0,10.1109/ICSMC.2006.384579,"2006 IEEE International Conference on Systems, Man and Cybernetics",Chen2006,False,,IEEE,Not available,The Order Strategies for Competitive Retailers under the Group Buying Auction,32d2ef47da8d6aa43e80d69c94ea98c2,https://ieeexplore.ieee.org/document/4274343/ 7018,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7019,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7020,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7021,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7022,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7023,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7024,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7025,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7026,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7027,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7028,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7029,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7030,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",wayes tushar,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7031,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7032,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7033,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7034,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7035,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7036,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7037,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7038,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7039,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7040,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7041,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7042,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7043,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7044,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",bo chai,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7045,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7046,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7047,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7048,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7049,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7050,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7051,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7052,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7053,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7054,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7055,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7056,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7057,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",chau yuen,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7058,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7059,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7060,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7061,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7062,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7063,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7064,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7065,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7066,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7067,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7068,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7069,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7070,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",shisheng huang,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7071,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7072,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7073,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7074,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7075,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7076,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7077,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7078,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7079,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7080,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7081,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7082,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7083,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",david smith,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7084,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7085,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7086,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 7087,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7088,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7089,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7090,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7091,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7092,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7093,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7094,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7095,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7096,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",h. poor,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7097,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,auctions,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7098,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7099,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7100,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7101,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7102,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7103,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7104,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,Smart grid,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7105,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,shared energy storage,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7106,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,auction theory,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7107,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,Stackelberg equilibrium,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7108,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,economics,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7109,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,strategy-proof,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7110,"This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them in storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme.",zaiyue yang,incentive compatibility,2016.0,10.1109/TSG.2015.2512267,IEEE Transactions on Smart Grid,Tushar2016,False,,IEEE,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach,019eb0d8deb299541c4593527ac5665f,https://ieeexplore.ieee.org/document/7387779/ 7111,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",zhijie xie,home health care scheduling,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7112,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",zhijie xie,cost reduction,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7113,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",zhijie xie,VCG auction,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7114,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",chun wang,home health care scheduling,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7115,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",chun wang,cost reduction,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7116,"We propose a combinatorial auction for the allocation of home visits to independent health care practitioners in the setting of city home health care. Given the practitioners' different skill sets, time constraints and costs incurred in order to provide the services, the auction allocate home visits to practitioners such that all planned visits are covered with qualified practitioners and, at the same time, the overall service costs are minimized. We assume a game theoretic setting where practitioners are modeled as self-interested agents. We present a combinatorial auction as the allocation mechanism. We show that the auction is incentive compatible and the individual rational.",chun wang,VCG auction,2015.0,10.1109/ISC2.2015.7366182,2015 IEEE First International Smart Cities Conference (ISC2),Xie2015,False,,IEEE,Not available,A combinatorial auction for cost reduction in city home health care,dfee7a7c379efce1137b7eccfb5b9638,https://ieeexplore.ieee.org/document/7366182/ 7117,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",diman tootaghaj,Game Theory,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7118,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",diman tootaghaj,Contention,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7119,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",jiang dali,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 7120,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,matching,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7121,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",diman tootaghaj,Resource sharing,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7122,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",farshid farhat,Game Theory,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7123,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",farshid farhat,Contention,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7124,"Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.",farshid farhat,Resource sharing,2017.0,10.1109/ICCD.2017.32,2017 IEEE International Conference on Computer Design (ICCD),Tootaghaj2017,False,,IEEE,Not available,CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment,d0186bd1dc717d5059382dcbdccb2db3,https://ieeexplore.ieee.org/document/8119205/ 7125,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Pollution,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7126,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Games,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7127,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Bayesian methods,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7128,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Nash equilibrium,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7129,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Biological system modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7130,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Artificial neural networks,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7131,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,networks,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7132,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",congjun rao,Modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7133,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Pollution,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7134,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Games,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7135,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Bayesian methods,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7136,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Nash equilibrium,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7137,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Biological system modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7138,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Artificial neural networks,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7139,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",zhongcheng zhang,Modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7140,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Pollution,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7141,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Games,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7142,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,optimization,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7143,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Bayesian methods,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7144,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Nash equilibrium,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7145,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Biological system modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7146,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Artificial neural networks,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7147,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",huanbin liu,Modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7148,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Pollution,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7149,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Games,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7150,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Bayesian methods,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7151,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Nash equilibrium,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7152,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Biological system modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7153,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,resource allocation,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7154,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Artificial neural networks,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7155,"Pollution emission permits trade is an environment policy to control pollution by using economic means, and it will lead to achieve the optimal allocation for regional environmental funds and the total environment capacity. Based on the bilateral auction under conditions of incomplete information, a game model of tradable emission permits is established. By solving Bayesian Nash equilibrium, the equilibrium bidding strategies of the bargainers are obtained. These results will provide valuable theoretical basis and guidance method for building the pollution emission permits trade system.",chuanfeng li,Modeling,2008.0,10.1109/ICICIC.2008.34,2008 3rd International Conference on Innovative Computing Information and Control,Rao2008,False,,IEEE,Not available,A Game Model of Tradable Pollution Emission Permits Based on Bilateral Auction,a236ea76b86327642ed9f6717604bffd,https://ieeexplore.ieee.org/document/4603438/ 7156,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,Auction algorithm,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7157,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,first price sealed bid auction,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7158,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,resource allocation,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7159,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,scheduling,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7160,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,dynamic spectrum access,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7161,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",basak eraslan,cognitive radio networks,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7162,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,Auction algorithm,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7163,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,first price sealed bid auction,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7164,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,stability,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7165,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,resource allocation,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7166,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,scheduling,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7167,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,dynamic spectrum access,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7168,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",didem gozupek,cognitive radio networks,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7169,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,Auction algorithm,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7170,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,first price sealed bid auction,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7171,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,resource allocation,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7172,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,scheduling,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7173,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,dynamic spectrum access,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7174,"In this letter we propose an auction theory based algorithm for throughput maximizing scheduling in centralized cognitive radio networks (CRN). In the considered CRN scheme, a centralized base station coordinates the assignment of frequencies and time slots to cognitive users with multiple antennas. Our proposed algorithm uses first-price sealed bid auction mechanism in which frequency and time slot pairs are considered as the auctioned resources and cognitive users are the bidders. The experimental results show that our computationally efficient algorithm yields very close throughput performance to the optimization software CPLEX values.",fatih alagoz,cognitive radio networks,2011.0,10.1109/LCOMM.2011.060111.102428,IEEE Communications Letters,Eraslan2011,False,,IEEE,Not available,An Auction Theory Based Algorithm for Throughput Maximizing Scheduling in Centralized Cognitive Radio Networks,192bc7944cf1ce3121468a0841da8e1d,https://ieeexplore.ieee.org/document/5871400/ 7175,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",abhay parekh,utility,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7176,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",gongchao su,heterogeneous netwoks,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7177,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",gongchao su,user association,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7178,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",gongchao su,sequential auction,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7179,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",gongchao su,Quality of Service,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7180,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",bin chen,heterogeneous netwoks,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7181,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",bin chen,user association,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7182,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",bin chen,sequential auction,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7183,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",bin chen,Quality of Service,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7184,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",xiaohui lin,heterogeneous netwoks,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7185,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",xiaohui lin,user association,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7186,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,auctions,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7187,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",xiaohui lin,sequential auction,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7188,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",xiaohui lin,Quality of Service,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7189,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",hui wang,heterogeneous netwoks,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7190,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",hui wang,user association,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7191,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",hui wang,sequential auction,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7192,"This paper investigates the user association problem in downlink heterogeneous cellular networks. To better utilize available radio resources and simultaneously maintain user QoS requirements, we propose a user association scheme that aims to strike a tradeoff between load balancing and user QoS constraints. We introduce a sequential second-price auction game that allocates users to base stations in repeated iterations. We propose a valuation function formulation for participating buyers to respect user QoS requirements, and we introduce a game mechanism with unit demand buyers and myopic bidding strategies that encourages traffic offloading. Furthermore, we investigate the ordering of distinct users that provides an approximation to socially efficient outcomes. Numerical results validate the effectiveness of our proposed scheme and show significant rate gains for cell edge users.",hui wang,Quality of Service,2018.0,10.1109/ICUFN.2018.8436793,2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN),Su2018,False,,IEEE,Not available,A Sequential Auction Game for QoS-Aware User Association in Heterogeneous Cellular Networks,81e731e343dd3ceac2f48b2100fca0ba,https://ieeexplore.ieee.org/document/8436793/ 7193,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,Cooperative,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7194,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,auction,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7195,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,bidding,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7196,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,Nash equilibrium,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7197,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,economics,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7198,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,diversity,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7199,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,Cooperative,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7200,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,auction,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7201,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,bidding,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7202,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,Nash equilibrium,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7203,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,diversity,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 7204,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,Convergence,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7205,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,decentralized process,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7206,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,double-sided auction,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7207,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,efficiency,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7208,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,matching,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7209,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,Nash equilibrium (NE),2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7210,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",suli zou,resource allocation,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7211,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,Convergence,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7212,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,decentralized process,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7213,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,double-sided auction,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7214,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,efficiency,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7215,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,Nash equilibrium (NE),2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7216,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",zhongjing ma,resource allocation,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7217,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,Convergence,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7218,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,decentralized process,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7219,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,networks,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7220,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,double-sided auction,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7221,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,efficiency,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7222,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,Nash equilibrium (NE),2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7223,"With an effort to allocate divisible resources among suppliers and consumers, a double-sided auction model is designed to decide strategies for individual players. Under the auction mechanism with the Vickrey-Clarke- Groves-type payment, the incentive compatibility holds, and the efficient bid profile is a Nash equilibrium (NE). However, it brings difficulties for players to implement the efficient solution due to the fact that there exist infinite number of NEs in the underlying double-sided auction game. To overcome this challenge, we formulate the double-sided auction game as a pair of single-sided auction games which are coupled via a joint potential quantity of the resource. A decentralized iteration procedure is then designed to achieve the efficient solution, where a single player, a buyer, or a seller implements his best strategy with respect to a given potential quantity and a constraint on his bid strategy. Accordingly, the potential quantity is updated with respect to iteration steps as well. It is verified that the system converges to the efficient NE within finite iteration steps in the order of O(ln(1/ε)) with a representing the termination criterion of the algorithm.",xiangdong liu,resource allocation,2018.0,10.1109/TAC.2017.2737579,IEEE Transactions on Automatic Control,Zou2018,False,,IEEE,Not available,Resource Allocation Game Under Double-Sided Auction Mechanism: Efficiency and Convergence,21d482820f11901773e06c6ed271300a,https://ieeexplore.ieee.org/document/8004498/ 7224,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Cost accounting,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7225,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Data mining,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7226,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Marketing and sales,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7227,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Books,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7228,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Painting,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7229,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Game theory,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7230,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,military logistics,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 7231,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,optimization,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7232,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Context,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7233,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Probability distribution,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7234,"A central fact in the theory of optimal auction design is that the seller of a single object in an auction with n bidders, having independent, random valuations, typically cannot extract the full maximum value of the object from the buyers. We show that if the seller has access to a single bit of information, even if noisy, then the seller can extract full value. The work is meant to explore the use of information measures in mechanism design problems",b. hajek,Linear programming,2005.0,10.1109/ISIT.2005.1523341,"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.",Hajek2005,False,,IEEE,Not available,On the value of a well chosen bit to the seller in an auction,3df97b204c91b02abee3b3f4b151dc26,https://ieeexplore.ieee.org/document/1523341/ 7235,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7236,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7237,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7238,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7239,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7240,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7241,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7242,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,resource allocation,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7243,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7244,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7245,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",chuan wu,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7246,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7247,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7248,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7249,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7250,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7251,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7252,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7253,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,stability,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7254,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7255,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7256,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",baochun li,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7257,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7258,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7259,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7260,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7261,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7262,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,Distributed networks,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7263,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,Distributed application,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7264,"Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fundamental question: what problem does network resource allocation solve? This leads us, in Chapter 1, to examine what it means to satisfy a set of user applications that have different requirements of the network, and to problems in Social Choice Theory. We find that while capturing these preferences in terms of utility is clean and rigorous, there are significant limitations to this choice. Chapter 2 focuses on sharing divisible resources such as links and spectrum. Both of these resources are somewhat atypical -- a link is most accurately modeled as a queue in our context, but this leads to the analytical intractability of queueing theory, and spectrum allocation methods involve dealing with interference, a poorly understood phenomenon. Chapters 3 and 4 are introductions to two allocation workhorses: auctions and matching. In these chapters we allow the users to game the system (i.e., to be strategic), but don't allow them to collude. In Chapter 5, we relax this restriction and focus on collaboration. Finally, in Chapter 6, we discuss the theoretical yet fundamental issue of stability. Here, our contribution is mostly on making a mathematically abstruse subdiscipline more accessible without losing too much generality.",jean walrand,utility,,,Sharing Network Resources,ParekhNone,False,,IEEE,Not available,Sharing Network Resources,afb1ad335332f9fee1744df6826b83ab, 7265,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,peer-to-peer streaming,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7266,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,bandwidth auction,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7267,"In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding to channels of programming. In the case of multiple overlays, it is a challenging task to design an appropriate bandwidth allocation protocol, such that these overlays efficiently share the available upload bandwidth on peers, media content is efficiently distributed to achieve the required streaming rate, as well as the streaming costs are minimized. In this paper, we seek to design simple, effective, and decentralized strategies to resolve conflicts among coexisting streaming overlays in their bandwidth competition and combine such strategies with network-coding-based media distribution to achieve efficient multioverlay streaming. Since such strategies of conflict are game theoretic in nature, we characterize them as a decentralized collection of dynamic auction games, in which downstream peers bid for upload bandwidth at the upstream peers for the delivery of coded media blocks. With extensive theoretical analysis and performance evaluation, we show that these local games converge to an optimal topology for each overlay in realistic asynchronous environments. Together with network-coding-based media dissemination, these streaming overlays adapt to peer dynamics, fairly share peer upload bandwidth to achieve satisfactory streaming rates, and can be prioritized.",zongpeng li,multiple overlays,2008.0,10.1109/TPDS.2008.30,IEEE Transactions on Parallel and Distributed Systems,Wu2008,False,,IEEE,Not available,Dynamic Bandwidth Auctions in Multioverlay P2P Streaming with Network Coding,9d4c2959a16c224678fc7d63dde362dd,https://ieeexplore.ieee.org/document/4459317/ 7268,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,Bid cost minimization (BCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7269,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,discretization,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7270,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,electricity auction,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7271,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,hockey-stick bidding,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7272,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,matrix game,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7273,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,Nash equilibrium,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7274,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,payment cost minimization (PCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7275,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Bayesian games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7276,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,production efficiency,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7277,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",feng zhao,strategic behavior,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7278,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,Bid cost minimization (BCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7279,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,discretization,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7280,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,electricity auction,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7281,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,hockey-stick bidding,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7282,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,matrix game,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7283,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,Nash equilibrium,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7284,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,payment cost minimization (PCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7285,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,production efficiency,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7286,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Bayesian Stackelberg games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7287,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",peter luh,strategic behavior,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7288,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,Bid cost minimization (BCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7289,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,discretization,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7290,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,electricity auction,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7291,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,hockey-stick bidding,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7292,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,matrix game,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7293,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,Nash equilibrium,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7294,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,payment cost minimization (PCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7295,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,production efficiency,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7296,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",joseph yan,strategic behavior,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7297,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,incentive compatibility,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7298,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,Bid cost minimization (BCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7299,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,discretization,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7300,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,electricity auction,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7301,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,hockey-stick bidding,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7302,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,matrix game,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7303,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,Nash equilibrium,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7304,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,payment cost minimization (PCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7305,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,production efficiency,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7306,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",gary stern,strategic behavior,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7307,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,Bid cost minimization (BCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7308,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,mechanism design,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7309,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,discretization,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7310,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,electricity auction,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7311,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,hockey-stick bidding,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7312,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,matrix game,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7313,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,Nash equilibrium,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7314,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,payment cost minimization (PCM),2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7315,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,production efficiency,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7316,"Currently, most independent system operators in the U.S. run auctions by minimizing the total bid cost [""bid cost minimization"" (BCM)], and then calculate payments based on market clearing prices. Under this setup, the payment cost could be significantly higher than the minimized bid cost. Recently, an alternative auction mechanism that minimizes the consumer payment cost [""payment cost minimization"" (PCM)] has been discussed. Literature has shown that for the same set of bids, PCM leads to reduced consumer payments. However, market participants may bid differently under the two auctions, and therefore, the payment reduction may not be realized. This necessitates the study of strategic behaviors of participants. In this paper, suppliers' bidding strategies in a day-ahead energy market are investigated for both auctions by using a game theoretic framework with Nash equilibrium as the solution concept. To simplify the solution process, the originally continuous strategies are discretized to form matrix games. Discretization may cause the loss of equilibria and the creation of artificial solutions. To reduce these side effects, ""approximate Nash equilibria"" are introduced to recover lost equilibria, and additional strategy samples are evaluated to eliminate artificially created solutions. Games are then solved by examining supplier payoffs obtained from running auctions. Characteristics of auctions are exploited, leading to improved computational efficiency. Numerical testing results show that the PCM leads to significant payment reductions and relatively small increases of production costs as compared to BCM. Also, the ¿hockey-stick¿ bidding is more likely to occur under BCM. Finally, long-term impacts of PCM are discussed, and whether it would lower costs to consumers in the long run, including capacity payments, remains to be investigated.",shi-chung chang,strategic behavior,2010.0,10.1109/TPWRS.2009.2036824,IEEE Transactions on Power Systems,Zhao2010,False,,IEEE,Not available,Bid Cost Minimization Versus Payment Cost Minimization: A Game Theoretic Study of Electricity Auctions,80743783e7f870f0f4843f73dd4597f4,https://ieeexplore.ieee.org/document/5374087/ 7317,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Bayesian games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7318,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Bayesian Stackelberg games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7319,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,procurement auctions with reserve prices,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7320,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,incentive compatibility,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7321,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,mechanism design,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7322,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,procurement auctions with reserve prices,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7323,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,single leader rest follower (SLRF) games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7324,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Stackelberg equilibrium,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7325,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Bayesian games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7326,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Bayesian Stackelberg games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7327,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,incentive compatibility,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7328,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,mechanism design,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7329,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,procurement auctions with reserve prices,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7330,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,single leader rest follower (SLRF) games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7331,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,single leader rest follower (SLRF) games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7332,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Stackelberg equilibrium,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7333,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",sajal mukhopadhyay,VCG Mechanisms,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7334,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",sajal mukhopadhyay,Multiunit Auction,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7335,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",pramod mane,VCG Mechanisms,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7336,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",pramod mane,Multiunit Auction,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7337,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",d. ghosh,VCG Mechanisms,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7338,"The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that environment, in this paper an auction based truthful mechanism is proposed for selling all the tickets of the basketball match and it is shown that our auction based scheme is significantly better than the existing scheme in terms of the total income earned per match.",d. ghosh,Multiunit Auction,2010.0,10.1109/3CA.2010.5533827,"2010 International Symposium on Computer, Communication, Control and Automation (3CA)",Mukhopadhyay2010,False,,IEEE,Not available,An efficient auction based ticket booking scheme for NBA all-star event championship,29edbf94bbeb04fd052ec442cb340ab2,https://ieeexplore.ieee.org/document/5533827/ 7339,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",fu jing,Bayesian Nash equilibrium,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7340,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",fu jing,Incomplete information games,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7341,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,game theory,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 7342,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",dinesh garg,Stackelberg equilibrium,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7343,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",fu jing,Offer strategy,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7344,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",fu jing,Online double auction,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7345,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",shao pei-ji,Bayesian Nash equilibrium,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7346,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",shao pei-ji,Incomplete information games,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7347,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",shao pei-ji,Offer strategy,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7348,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",shao pei-ji,Online double auction,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7349,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",yang xiao-ping,Bayesian Nash equilibrium,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7350,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",yang xiao-ping,Incomplete information games,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7351,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",yang xiao-ping,Offer strategy,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7352,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",yang xiao-ping,Online double auction,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7353,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Bayesian games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7354,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",zhao yang,Bayesian Nash equilibrium,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7355,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",zhao yang,Incomplete information games,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7356,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",zhao yang,Offer strategy,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7357,"""Smith's mystery"" revealed the characteristics of double auction: even with insufficient information of supply and demand and a small number of traders, the double auction can achieve very high market efficiency and converge rapidly to a competitive equilibrium. These characteristics provide us an important theoretic foundation by which can preferably solve how to utilize the network resource effectively and ease the network burden in the double auction market. Meanwhile, the offer strategy in the double auction is a vital factory to affect the auction efficiency. This paper, in terms of the experimental economics, intends to develop an offer model on Bayesian Nash equilibrium based on incomplete information games and solve it. In particular, we devised simulation experiments to analyze the characters and possibilities of this model. Finally, the experiment results show that the transaction path under adopting this offer strategy follows the Marshallian path strictly; we can get a practical idea of utilizing the network resource effectively and improving the efficiency in online auction",zhao yang,Online double auction,2006.0,10.1109/ICMSE.2006.313892,2006 International Conference on Management Science and Engineering,Jing2006,False,,IEEE,Not available,Research on Traders' Offer Strategy Based on Incomplete Information Games in Online Double Auction Market and Computer Simulation,abe85855e4f24e053458829e9911a4f2,https://ieeexplore.ieee.org/document/4104943/ 7358,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",dan wu,Cooperative communications,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7359,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",dan wu,relay power allocation,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7360,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",dan wu,auction theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7361,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",dan wu,game theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7362,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",dan wu,energy saving,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7363,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",yueming cai,Cooperative communications,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7364,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Bayesian Stackelberg games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7365,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",yueming cai,relay power allocation,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7366,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",yueming cai,auction theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7367,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",yueming cai,game theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7368,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",yueming cai,energy saving,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7369,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",mohsen guizani,Cooperative communications,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7370,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",mohsen guizani,relay power allocation,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7371,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",mohsen guizani,auction theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7372,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",mohsen guizani,game theory,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7373,"It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, we propose an auction-based relay power allocation scheme over multi-user relay networks from the energy-efficient perspective. In particular, during the relay resource allocation operation, three major design goals are considered: 1) efficient utilization of relay resources, in terms of Pareto optimal relay power allocation; 2) insurance of competitive fairness among competing users; and 3) guarantee of distributed implementation with relaxation of restrictions on complete private knowledge and accurate assessments of convergence. Specifically, we take full advantage of the auction mechanism, i.e., competitive fairness with the incomplete private information of other nodes, to model the interaction among the users as a multi-winner auction based on the optimal bidding decision. By treating the proposed auction mechanism as a non-cooperative game, we obtain the unique and Pareto optimal Nash equilibrium (NE), which yields the optimal bidding decision and allocation of the relay power. Moreover, we design a distributed algorithm based on best-response functions to reach the NE allocation. In particular, the convergence and the convergent rate of the algorithm are analyzed quantitatively to clarify the application scenarios.",mohsen guizani,energy saving,2014.0,10.1109/TCOMM.2014.2331072,IEEE Transactions on Communications,Wu2014,False,,IEEE,Not available,"Auction-Based Relay Power Allocation: Pareto Optimality, Fairness, and Convergence",aa5e2c7c6f0a3b44ab437564ecb8c3b4,https://ieeexplore.ieee.org/document/6837462/ 7374,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,Cross elasticity,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7375,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,incentive compatibility,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7376,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,electric vehicles,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7377,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,game theory,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7378,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,incentive compatibility,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7379,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,Nash equilibrium,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7380,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",suli zou,progressive second price auction,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7381,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,Cross elasticity,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7382,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,electric vehicles,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7383,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,game theory,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7384,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,incentive compatibility,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7385,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,Nash equilibrium,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7386,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,mechanism design,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7387,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",zhongjing ma,progressive second price auction,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7388,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,Cross elasticity,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7389,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,electric vehicles,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7390,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,game theory,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7391,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,incentive compatibility,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7392,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,Nash equilibrium,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7393,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",xiangdong liu,progressive second price auction,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7394,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,Cross elasticity,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7395,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,electric vehicles,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7396,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,game theory,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7397,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,procurement auctions with reserve prices,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7398,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,incentive compatibility,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7399,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,Nash equilibrium,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7400,"A novel class of auction-based games is formulated to study coordination problems arising from charging a population of electric vehicles (EVs) over a finite horizon. To compete for energy allocation over the horizon, each individual EV submits a multidimensional bid, with the dimension equal to two times the number of time-steps in the horizon. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction games. However, due to the cross elasticity of EVs over the charging horizon, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles based on the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. An update mechanism for the auction game is designed. A numerical example demonstrates that the auction process converges to an efficient Nash equilibrium. The auction-based charging coordination scheme is adapted to a receding horizon formulation to account for disturbances and forecast uncertainty.",ian hiskens,progressive second price auction,2017.0,10.1109/TAC.2016.2614106,IEEE Transactions on Automatic Control,Zou2017,False,,IEEE,Not available,An Efficient Game for Coordinating Electric Vehicle Charging,ffe091261d30ff8521fca75548c60f03,https://ieeexplore.ieee.org/document/7577848/ 7401,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tao han,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7402,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tao han,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7403,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tao han,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7404,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tao han,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7405,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tao han,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7406,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tianyi xing,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7407,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tianyi xing,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7408,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,single leader rest follower (SLRF) games,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7409,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tianyi xing,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7410,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tianyi xing,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7411,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",tianyi xing,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7412,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",ning zhang,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7413,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",ning zhang,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7414,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",ning zhang,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7415,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",ning zhang,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7416,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",ning zhang,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7417,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",kaiming liu,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7418,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",kaiming liu,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7419,"In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the <i>leader</i>, makes the first move and this action is followed by the actions of the remaining agents, which are known as the <i>followers</i>. These problems are also known as <i>single</i> <i>leader</i> <i>rest</i> <i>follower</i> (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-<i>first-price</i> <i>and</i> <i>second-price</i> <i>electronic</i> <i>procurement</i> <i>auctions</i> <i>with</i> <i>reserve</i> <i>prices</i>. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering.",y. narahari,Stackelberg equilibrium,2008.0,10.1109/TASE.2007.912717,IEEE Transactions on Automation Science and Engineering,Garg2008,False,,IEEE,Not available,Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design,af9485660f6e6dc973ccf7c80294b20a,https://ieeexplore.ieee.org/document/4457908/ 7420,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",kaiming liu,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7421,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",kaiming liu,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7422,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",kaiming liu,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7423,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",bihua tang,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7424,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",bihua tang,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7425,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",bihua tang,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7426,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",bihua tang,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7427,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",bihua tang,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7428,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",yuan'an liu,dynamic spectrum sharing,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7429,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",yuan'an liu,game theory,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7430,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Nash equilibrium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7431,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",yuan'an liu,waiting-line auction,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7432,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",yuan'an liu,power allocation,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7433,"We propose a wireless spectrum sharing framework based on waiting-line auction. Our framework includes both spectrum assignment and power allocation; it is designed to maximize the primary user¿s profits as well as to optimize the overall rate under secondary users¿ minimal rate requirements. On secondary users¿ side, it is proved that bidders could achieve equilibrium bids according to Nash equilibrium strategy function, which relate to their valuations for communications. For the primary user, we design a low-complexity auction clearing algorithm that considers both primary user¿s revenue and the system overall rate.",yuan'an liu,water-filling,2008.0,10.1109/ICCS.2008.4737339,2008 11th IEEE Singapore International Conference on Communication Systems,Han2008,False,,IEEE,Not available,Wireless spectrum sharing via waiting-line auction,20b5200407bf7e2807ebfc171b04546c,https://ieeexplore.ieee.org/document/4737339/ 7434,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Relays,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7435,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Resource management,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7436,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Interference,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7437,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Cognitive radio,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7438,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Physical layer,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7439,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",tianyu wang,Security,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7440,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Relays,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7441,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Game theory,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7442,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Resource management,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7443,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Interference,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7444,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Cognitive radio,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7445,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Physical layer,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7446,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",lingyang song,Security,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7447,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Relays,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7448,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Resource management,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7449,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Interference,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7450,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Cognitive radio,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7451,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Physical layer,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7452,"With the rapid development of economy and society, it brings significant challenges to the State and military construction, but also produces a broad cooperation prospect and space. The integration between military and civilian is apparent, and the industry boundaries have become more blurred. Cooperation in all walks of life has become an irresistible trend. The paper, explains the importance and feasibility of cooperation between the military and civilian based on the game theory, analyzes the roles of auction mechanism in the military logistics, optimizes the auction mechanism to solve the problems of improving bidding prices and cheating. It also guides to select cooperators correctly.",zhu tianju,auction mechanism,2010.0,10.1109/ICISE.2010.5689241,The 2nd International Conference on Information Science and Engineering,Yao2010,False,,IEEE,Not available,On optimization of auction mechanism in the military logistics based on the game Theory,ba312594accdc05a38c4323d88da005f, 7453,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Power generation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7454,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",zhu han,Security,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7455,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Relays,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7456,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Resource management,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7457,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Interference,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7458,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Cognitive radio,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7459,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Physical layer,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7460,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",xiang cheng,Security,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7461,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Relays,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7462,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Resource management,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7463,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Interference,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7464,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Pricing,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7465,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Cognitive radio,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7466,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Physical layer,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7467,"We consider a cognitive radio network in which multiple pairs of secondary users (SUs) communicate by a one-way relay node over orthogonal channels with the existence of an eavesdropper close to the destination. The transmit power of the relay needs efficient distribution for maximizing the sum secrecy rate of the SU pairs, meanwhile satisfying the interference constraint at the single primary user (PU). Specifically, we introduce two multi-object auctions, i.e. the Vickrey auction and the sequential first-price auction, to perform this power allocation problem. We prove the existence and give the general form of the only equilibrium for each auction. We also propose two algorithms based on the equilibriums, respectively. From the simulation results, we see that the system secrecy rate curve of the Vickrey auction gradually coincides with that of the optimal allocation with increasing power units, while the sequential first-price auction reflects more fairness.",bingli jiao,Security,2012.0,10.1109/ICC.2012.6364491,2012 IEEE International Conference on Communications (ICC),Wang2012,False,,IEEE,Not available,Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks,572d447a62e774f1810318b16d99d18f,https://ieeexplore.ieee.org/document/6364491/ 7468,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",tan xuezhi,cognitive radio,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7469,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",tan xuezhi,dynamic spectrum allocation,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7470,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",tan xuezhi,auction,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7471,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",tan xuezhi,bidding,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7472,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",tan xuezhi,interference graph,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7473,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",liu yutao,cognitive radio,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7474,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",liu yutao,dynamic spectrum allocation,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7475,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Electricity supply industry,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7476,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",liu yutao,auction,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7477,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",liu yutao,bidding,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7478,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",liu yutao,interference graph,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7479,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",xu guisen,cognitive radio,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7480,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",xu guisen,dynamic spectrum allocation,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7481,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",xu guisen,auction,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7482,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",xu guisen,bidding,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7483,"Cognitive radio is an emerging technique to improve the utilization of radio frequency spectrum in wireless communication networks. In this paper, we consider the problem of spectrum sharing among a few primary users and multiple secondary users through auction games. With the second-price auction and VCG auction, we adopt a utility function to obtain the optimal total payoffs the secondary users. User collusion and cooperation behaviors have been discussed by an interference graph. The simulation results show that user collusion usually deteriorate the efficiency of dynamic spectrum allocation and may cause instability of the communication system, while the cooperation among the secondary users can not only enhance the spectrum efficiency but also compensate the primary users through some cooperative mechanisms.",xu guisen,interference graph,2009.0,10.1109/IFITA.2009.15,2009 International Forum on Information Technology and Applications,Xuezhi2009,False,,IEEE,Not available,Dynamic Spectrum Allocation in Cognitive Radio: Auction and Equilibrium,dfc594585be08510944e8149512919fe,https://ieeexplore.ieee.org/document/5231692/ 7484,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7485,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7486,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Decision making,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7487,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7488,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7489,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7490,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7491,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7492,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7493,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7494,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7495,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7496,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7497,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Power system modeling,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7498,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7499,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7500,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7501,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7502,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7503,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jaroslaw byrka,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7504,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7505,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7506,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7507,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum trading,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7508,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Power system simulation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7509,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,spectrum sharing,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7510,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,primary user,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7511,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,game theory,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7512,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,VCG,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7513,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",jakub oszmianski,HSDPA,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 7514,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,Heterogeneous wireless network,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7515,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,game theory,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7516,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,mechanism design,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7517,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,selfishness,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7518,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,rationality,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7519,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Helium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7520,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,individual rationality,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7521,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,Bayesian incentive compatibility,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7522,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",n.r. suri,optimal auction mechanisms,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7523,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,Heterogeneous wireless network,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7524,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,game theory,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7525,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,mechanism design,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7526,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,selfishness,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7527,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,rationality,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7528,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,individual rationality,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7529,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,Bayesian incentive compatibility,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7530,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jin-ho kim,Profitability,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7531,"In this paper, we develop a novel auction algorithm for procuring wireless channel by a wireless node in a heterogeneous wireless network. We assume that the service providers of the heterogeneous wireless network are selfish and non-cooperative in the sense that they are only interested in maximizing their own utilities. The wireless user needs to procure wireless channels to execute multiple tasks. To solve the problem of the wireless user, we propose a reverse optimal (REVOPT) auction and derive an expression for the expected payment by the wireless user. The proposed auction mechanism REVOPT satisfies important game theoretic properties such as Bayesian incentive compatibility and individual rationality",y. narahari,optimal auction mechanisms,2006.0,10.1109/WOCN.2006.1666541,2006 IFIP International Conference on Wireless and Optical Communications Networks,Suri2006,False,,IEEE,Not available,An auction algorithm for procuring wireless channel in a heterogenous wireless network,8ccd4c73370ffc71c2068e2f266da13e,https://ieeexplore.ieee.org/document/1666541/ 7532,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Ancillary Services,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7533,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Bidding StrategiesCapability Curves,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7534,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Deregulation,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7535,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Game Theory,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7536,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Generator,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7537,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Reactive Support,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7538,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Spinning Reserve,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7539,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Ancillary Services,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7540,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Bidding StrategiesCapability Curves,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7541,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Nash equilibrium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7542,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Deregulation,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7543,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Game Theory,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7544,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Generator,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7545,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Reactive Support,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7546,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Spinning Reserve,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 7547,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7548,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7549,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7550,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7551,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7552,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Game theory,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7553,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7554,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7555,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7556,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7557,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7558,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7559,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7560,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7561,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7562,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7563,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 7564,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Power generation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7565,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7566,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7567,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7568,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7569,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7570,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",visa koivunen,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 7571,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",yida xu,LUBA,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7572,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",yida xu,auction,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7573,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",yida xu,game theory,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7574,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",yida xu,embedding space,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7575,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Pricing,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7576,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",hamidou tembine,LUBA,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7577,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",hamidou tembine,auction,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7578,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",hamidou tembine,game theory,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7579,"In this paper, we study multi-item lowest unique bid auctions (LUBA) with resubmission under budget constraints. A representation of bids that can perceive the rich strategic meaning in the world of multi-item LUBA with resubmission is learned by an efficient method-Skip-gram model. We created and maintained a dataset which contains the relevant information of LUBA, including the winning bid combination, budget constraints, and the number of participated bidders. An Android-based application is developed and contributes the construction of the dataset. The quantitative analysis displays that the representation cluster can reflect similarities in terms of numerical information, cultural and aesthetic preference, and other bidder's behaviors. The learned representation can serve as a guide for bidders who seek to maximize their payoff and feed into a sequence generation model, such as recurrent neural network, to produce the bids combination.",hamidou tembine,embedding space,2018.0,10.1109/CCDC.2018.8407670,2018 Chinese Control And Decision Conference (CCDC),Xu2018,False,,IEEE,Not available,Distributed representations of bids in lowest unique bid auctions,44b53fcd32c67a1fdf107242d07d15cb,https://ieeexplore.ieee.org/document/8407670/ 7580,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Contracts,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7581,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Government,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7582,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Marketing and sales,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7583,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Investments,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7584,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Business,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7585,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Nash equilibrium,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7586,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Electricity supply industry,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7587,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Game theory,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7588,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Cost function,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7589,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Bayesian methods,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7590,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,IEEE news,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7591,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Contracts,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7592,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Government,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7593,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Marketing and sales,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7594,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Investments,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7595,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Business,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7596,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Nash equilibrium,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7597,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Decision making,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7598,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Game theory,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7599,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Cost function,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7600,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Bayesian methods,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7601,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The government announces a formula in terms of bids and house prices to decide the winner of the auction. All participants are required to include their sales price of the constructed houses when they submit their bids. The winner is bound by an obligation to sell the houses at the price he proposed. The firm types, opportunity costs of investment, are private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,IEEE news,2009.0,10.1109/CSO.2009.106,2009 International Joint Conference on Computational Sciences and Optimization,Chen2009,False,,IEEE,Not available,Urban Land Auctions with Incentive Contracts,50238a90905f8e4d1c1692963a246fc0,https://ieeexplore.ieee.org/document/5194070/ 7602,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",george lazaroiu,game theory,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7603,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",george lazaroiu,electricity markets,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7604,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",george lazaroiu,strategies,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7605,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",george lazaroiu,Nash equilibrium,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7606,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",virgil dumbrava,game theory,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7607,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",virgil dumbrava,electricity markets,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7608,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Power system modeling,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7609,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",virgil dumbrava,strategies,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7610,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",virgil dumbrava,Nash equilibrium,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7611,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mihnea costoiu,game theory,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7612,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mihnea costoiu,electricity markets,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7613,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mihnea costoiu,strategies,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7614,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mihnea costoiu,Nash equilibrium,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7615,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mariacristina roscia,game theory,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7616,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mariacristina roscia,electricity markets,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7617,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mariacristina roscia,strategies,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7618,"The liberalization of electricity markets in Europe was a highly-debated topic in the last thirty years. Almost three decades after the start of the deregulation processes, performances obtained by the introduction of competition in the electricity markets are still difficult to be perceived by final consumers. Until now, the assumption that the deregulated electricity markets naturally generate lower prices for consumers and economic efficiency has not been verified yet. In a deregulated electricity marketplace, participants are more interested in maximizing their own profits rather than contributing the system-wide benefits. Moreover, the particular features of the electricity industry determine electricity market participants to be more aggressive in their bidding strategies. Therefore, studying the bidding strategies of the electricity market participants becomes an important issue. In this paper, the bidding strategies for three classical power producers are analyzed for different level of power system demand in single-auction market.",mariacristina roscia,Nash equilibrium,2017.0,10.1109/EEEIC.2017.7977703,2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe),Lazaroiu2017,False,,IEEE,Not available,Game theory and competitive aspects in electricity markets,dc0840451caae907f7c4e869b06345b5,https://ieeexplore.ieee.org/document/7977703/ 7619,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Power system simulation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7620,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",xuwang liu,Multi-Attribute Reverse Auction,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7621,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",xuwang liu,Behavior Operation Management,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7622,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",xuwang liu,Grouped Bid Evaluation,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7623,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",xuwang liu,Evolutionary Game,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7624,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",xuwang liu,Behavioral Analysis,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7625,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",wei qi,Multi-Attribute Reverse Auction,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7626,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",wei qi,Behavior Operation Management,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7627,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",wei qi,Grouped Bid Evaluation,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7628,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",wei qi,Evolutionary Game,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7629,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",wei qi,Behavioral Analysis,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7630,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Helium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7631,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",dingwei wang,Multi-Attribute Reverse Auction,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7632,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",dingwei wang,Behavior Operation Management,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7633,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",dingwei wang,Grouped Bid Evaluation,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7634,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",dingwei wang,Evolutionary Game,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7635,"Bid evaluation mechanism is a key factor to the fairness of auction and resource allocation. The current bid evaluation process is usually done by two groups, business expert group and technical expert group, separately. Taking bounded rationality as precondition, it will induce the antagonistic feelings and non-cooperation behavior between two groups. This paper focus on bid evaluation behaviors of referee experts. Firstly, the bid evaluation process and existent problems within the mechanism are described, and a non-cooperative static game model about grouped bid evaluation behaviors is constructed to analyze the conditions how to achieve long-term cooperative equilibrium of two groups, and which is the Pure Strategies Nash Equilibrium. Then, the evolution paths and influencing factors of bid evaluation behaviors are analyzed with the idea of evolutionary game. We also disclose the effect of individuals' choice of policy on group behaviors. The method of this paper can offer decision support for administrative department of bid evaluation, so that they can take the best management practices and guide the referee experts' behaviors evolving to the expectative direction, to improve the fairness of bidding evaluation.",dingwei wang,Behavioral Analysis,2014.0,10.1109/CCDC.2014.6852221,The 26th Chinese Control and Decision Conference (2014 CCDC),Liu2014,False,,IEEE,Not available,An evolutionary game approach to analyzing bid evaluation behaviors for multi-attribute reverse auction,6cca135e2c33dc25edafeee206fd9bf3,https://ieeexplore.ieee.org/document/6852221/ 7636,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7637,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7638,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7639,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7640,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7641,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jong-bae park,Profitability,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7642,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7643,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7644,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7645,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7646,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7647,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7648,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7649,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7650,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7651,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7652,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Nash equilibrium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7653,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7654,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7655,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 7656,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Game theory,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7657,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Frequency synthesizers,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7658,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Circuits,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7659,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Dynamic voltage scaling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7660,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Energy consumption,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7661,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Scheduling algorithm,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7662,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Capacitance,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7663,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Game theory,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7664,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Clocks,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7665,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Processor scheduling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7666,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",a.k. murugavel,Nash equilibrium,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7667,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Game theory,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7668,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Frequency synthesizers,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7669,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Circuits,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7670,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Dynamic voltage scaling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7671,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Energy consumption,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7672,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Scheduling algorithm,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7673,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Capacitance,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7674,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 7675,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Power generation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7676,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Clocks,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7677,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Processor scheduling,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7678,"Frequency scaling has recently become an important area for exploration with respect to power and energy optimization. In this work, we describe a new methodology for simultaneous voltage and frequency scaling during scheduling in behavioral synthesis based on game theory for power and energy reduction. The problem of scheduling in synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. We develop game theoretic models and propose a resource constrained algorithm. Experimental results on selected benchmark circuits show that the proposed algorithm yields about 42.5% energy savings on the average.",n. ranganathan,Nash equilibrium,2004.0,10.1109/ICVD.2004.1261000,17th International Conference on VLSI Design. Proceedings.,Murugavel2004,False,,IEEE,Not available,Game theoretic modeling of voltage and frequency scaling during behavioral synthesis,4fe07e59ae25f1499f3000cc77e54d90,https://ieeexplore.ieee.org/document/1261000/ 7679,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",juanjuan ding,fraud auction,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7680,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",juanjuan ding,collusion,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7681,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",juanjuan ding,Quasi-Shapley value,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7682,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",xuefeng zhang,fraud auction,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7683,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",xuefeng zhang,collusion,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7684,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",xuefeng zhang,Quasi-Shapley value,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7685,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",yi wang,fraud auction,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7686,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Pricing,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7687,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",yi wang,collusion,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7688,"The fraud auction under collusion between owner of art work and investor in the art market may lead to advertisement effect, and affect the emotional estimation and non-rational decision of investor. Consequently, it would do harm to the better development of art market. This article analyzed the root and the realizable condition of collusion between owner and investor. The results showed that the benefits of owner and interior investor in fraud auction would become identical; Strengthening the control of marginal utility of one player may have an effect on the other's collusive activity, and leaded to decrease of fraud auction probability.",yi wang,Quasi-Shapley value,2011.0,10.1109/ICNC.2011.6022565,2011 Seventh International Conference on Natural Computation,Ding2011,False,,IEEE,Not available,Analysis on collusive game between owner of art work and investor,41c8247bad4e2b51caeec9b3ec0f9b56,https://ieeexplore.ieee.org/document/6022565/ 7689,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7690,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7691,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7692,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7693,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7694,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7695,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",vikraant pai,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7696,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7697,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Electricity supply industry,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7698,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7699,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7700,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7701,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7702,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7703,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",ameya prabhu,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7704,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Game theory,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7705,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Cognitive radio,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7706,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Resource management,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7707,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Sensors,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7708,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Decision making,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7709,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Bandwidth,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7710,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Genetic algorithms,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7711,"Among the many problems faced in the world of wireless Technology, the most significant one is spectrum scarcity. In terms of pure facts, the TRAI auction of spectrum bands scheduled in 2016 will generate a base price of 5.36 Lakh crores which is more than twice the revenue of major telecom providers which is around 2.5 lakh crores. This Paper proposes an algorithm which guides efficient utilization of the vacant Bandwidth in the licensed spectrum and allocating the spectrum to unlicensed users. A cognitive radio(C.R.) uses knowledge of radio technology and policy, representations of goals, and other parameters to reason about a failed attempt to satisfy a goal and attempt alternate courses of action depending upon the circumstances. This paper aims at using concepts of Game Theory to optimize the allocation of channels and use the punish and forgive strategy to ensure higher spectrum utilization. The paper holds special significance especially considering the spectrum scarcity resulting from the increase in number of mobile users from 600 million currently to around a billion by 2020, only in India..",aditya menon,Games,2016.0,10.1109/ICCUBEA.2016.7860023,2016 International Conference on Computing Communication Control and automation (ICCUBEA),Pai2016,False,,IEEE,Not available,Game Theoretic optimization of spectrum allocation in cognitive radio,7d43035c1cf24feef21e18ee164c881b,https://ieeexplore.ieee.org/document/7860023/ 7712,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,Auction,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7713,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,cooperative game,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7714,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,mechanism design,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7715,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,pricing,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7716,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,profit sharing,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7717,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",sung chun,secondary spectrum market,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7718,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,Auction,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7719,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Power system modeling,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7720,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,cooperative game,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7721,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,mechanism design,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7722,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,pricing,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7723,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,profit sharing,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7724,"Recently, dynamic spectrum sharing has been gaining interest as a potential solution to scarcity of available spectrum. We investigate the problem of designing a secondary spectrum-trading market when there are multiple sellers and multiple buyers and propose a general framework for the trading market based on an auction mechanism. To this end, we first introduce a new optimal auction mechanism, called the generalized Branco's mechanism (GBM). The GBM, which is both incentive-compatible and individually rational, is used to determine the assigned frequency bands and prices for them. Second, we assume that buyers of the spectrum are selfish and model their interaction as a noncooperative game. Using this model, we prove that when the sellers employ the GBM to vend their frequency bands, they can guarantee themselves the largest expected profits by selling their frequency bands jointly. Third, based on the previous finding, we model the interaction among the sellers as a cooperative game and demonstrate that, for any fixed strategies of the buyers, the core of the cooperative game is nonempty. This suggests that there exists a way for the sellers to share the profits from the joint sale of the spectrum so that no subset of sellers will find it beneficial to vend their frequency bands separately without the remaining sellers. Finally, we propose a profit-sharing scheme that can achieve any expected profit vector in the nonempty core of the cooperative game while satisfying two desirable properties.",richard la,secondary spectrum market,2013.0,10.1109/TNET.2012.2191418,IEEE/ACM Transactions on Networking,Chun2013,False,,IEEE,Not available,Secondary Spectrum Trading—Auction-Based Framework for Spectrum Allocation and Profit Sharing,d2fec9f4ccf54b8905f6dc20f2de0336,https://ieeexplore.ieee.org/document/6179566/ 7725,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Internet,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7726,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Protocols,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7727,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Electronic commerce,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7728,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Artificial intelligence,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7729,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Telephony,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7730,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Power system simulation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7731,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Costs,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7732,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Cybernetics,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7733,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Game theory,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7734,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Robustness,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7735,"Electronic commerce (EC) is a promising field for applying agent and artificial intelligence technologies. This article shows an overview of the theory of Internet auctions. First, we explain the basic terms and concepts used in auction and game theory literature. Then, we describe various auction protocols and examine the theoretical characteristics of these protocols.",makoto yokoo,Microeconomics,2006.0,10.1109/ICSMC.2006.384885,"2006 IEEE International Conference on Systems, Man and Cybernetics",Yokoo2006,False,,IEEE,Not available,Theory of Internet Auctions,f9f7bb5d2287804c80ee072b0d3d419e,https://ieeexplore.ieee.org/document/4274019/ 7736,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,Cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7737,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,vehicular cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7738,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,game theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7739,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,auction theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7740,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,quality of experience,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7741,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Helium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7742,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,mobile cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7743,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,privacy,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7744,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,service provisioning,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7745,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",moayad aloqaily,latency,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7746,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,Cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7747,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,vehicular cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7748,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,game theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7749,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,auction theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7750,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,quality of experience,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7751,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,mobile cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7752,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",jun-ho park,Profitability,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7753,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,privacy,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7754,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,service provisioning,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7755,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",burak kantarci,latency,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7756,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,Cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7757,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,vehicular cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7758,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,game theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7759,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,auction theory,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7760,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,quality of experience,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7761,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,mobile cloud computing,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7762,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,privacy,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7763,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Nash equilibrium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7764,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,service provisioning,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7765,"The increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing, has allowed mobile users to access a wider range of resources when mobile. As the use of vehicular cloud computing has become more popular due to its ability to improve driver and vehicle safety, researchers and industry have a growing interest in the design and development of vehicular networks for emerging applications. Vehicle drivers can now access a variety of on demand resources en route via vehicular network service providers. The adaptation of vehicular cloud services faces many challenges, including cost, privacy, and latency. The contributions of this paper are as follows. First, we propose a game theory-based framework to manage on-demand service provision in a vehicular cloud. We present three different game approaches, each of which helps drivers minimize their service costs and latency, and maximize their privacy. Second, we propose a quality-of-experience framework for service provision in a vehicular cloud for various types of users, a simple but effective model to determine driver preferences. Third, we propose using the trusted third party concept to represent drivers and service providers, and ensure fair game treatment. We develop and evaluate simulations of the proposed approaches under different network scenarios with respect to privacy, service cost, and latency, by varying the vehicle density and driver preferences. The results show that the proposed approach outperforms conventional models, since the game theory system introduces a bounded latency of ≤3%, achieves service cost savings up to 65%, and preserves driver privacy by reducing revealed information by up to 47%.",hussein mouftah,latency,2016.0,10.1109/ACCESS.2016.2575038,IEEE Access,Aloqaily2016,True,,IEEE,Not available,Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud,3d2e1d2724777fc230ec6d66c0d6f4ef,https://ieeexplore.ieee.org/document/7484744/ 7766,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7767,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7768,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7769,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7770,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7771,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",feng zhao,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7772,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7773,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7774,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Game theory,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7775,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7776,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7777,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7778,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",peter luh,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7779,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7780,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7781,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7782,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7783,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7784,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",ying zhao,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7785,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 7786,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",yang xingli,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 7787,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Power generation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7788,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7789,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7790,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7791,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7792,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7793,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",joseph yan,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7794,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7795,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7796,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7797,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7798,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Pricing,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7799,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7800,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",gary stern,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7801,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Bid cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7802,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Electricity auctions,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7803,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Matrix game,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7804,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Nash equilibrium,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7805,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Strategic behaviors,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7806,"In deregulated electricity markets, auction mechanisms are used to select supply bids for energy and ancillary services. Currently, most independent system operators in the US use a ""bid cost minimization"" auction mechanism that minimizes total supply bid costs to select bids, and afterwards settle the market based on market-clearing prices. Consequently, the consumer payments could be significantly higher than the minimized bid cost from the auction. This gives rise to ""payment cost minimization,"" an alternative auction mechanism that directly minimizes consumer payments. A review of literature shows that with the same set of supply bids, payment cost minimization leads to reduced consumer payments as compared to bid cost minimization. Since power suppliers may bid differently under different auction mechanisms, investigation of market behaviors is necessary for the comprehensive assessment of auction mechanisms. In this paper, strategic behaviors of suppliers are studied within the game theoretic framework for the two auction mechanisms. Simple two-supplier Nash games are first analyzed to provide insights. General matrix Nash games are then solved by using the approximate Nash concept and with our auction algorithms developed earlier as the core. Testing results demonstrate the cost savings for consumers under payment cost minimization as compared to bid cost minimization.",shi-chung chang,Payment cost minimization,2007.0,10.1109/PES.2007.385882,2007 IEEE Power Engineering Society General Meeting,Zhao2007,False,,IEEE,Not available,Bid Cost Minimization vs. Payment Cost Minimization: A Game Theoretic Study of Electricity Markets,4fb6425ba3e40dc4950b2941a8435119,https://ieeexplore.ieee.org/document/4275648/ 7807,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",ding li,Demand response,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7808,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",ding li,repeated Vickrey auctions,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7809,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Electricity supply industry,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7810,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",ding li,Bayesian Nash equilibria,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7811,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",ding li,block scheduling,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7812,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",sudharman jayaweera,Demand response,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7813,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",sudharman jayaweera,repeated Vickrey auctions,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7814,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",sudharman jayaweera,Bayesian Nash equilibria,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7815,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",sudharman jayaweera,block scheduling,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7816,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",asal naseri,Demand response,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7817,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",asal naseri,repeated Vickrey auctions,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7818,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",asal naseri,Bayesian Nash equilibria,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7819,"Matching demand to supply is one of the key features of smart grid infrastructure. Transforming conventional static customers into active participants who interact with the electrical utility in real time is the central idea of Demand Response (DR)\Demand Side Management (DSM) in smart grid. In this paper, we decouple utility cost minimization and customer social welfare maximization into two stages. Since the utility is usually more risk averse than risk neutral in real life, this decoupling approach is more realistic than the usually adopted optimization setup, in which the two objectives are combined in a single weighted sum. With a block processing model introduced, in the first stage a convex optimization problem is formulated to minimize utility's generation cost and delay operation cost. An optimal load demand scheduling solution, of the form of water-filling, is derived analytically. Based on the optimal load profile generated in this first stage, repeated Vickrey auctions over time intervals are adopted to allocate load demands among customers while maximizing the social welfare. Despite the fact that truthful bidding is a weakly dominant strategy for all customers in the auctioning game, collusive equilibria do exist and jeopardize utility's profit severely. Analysis on the structure of the Bayesian Nash equilibrium solutions shows that by introducing a positive reserve price the Vickrey auction can be made to be more robust against such collusion by customers. Moreover the corresponding Bayesian Nash equilibrium is essentially unique and guarantees the basic profit of the utility. We further discuss how customers' valuations and bidding strategies change over time for the repeated Vickrey auction model. Simulation results emphasizing the influences of reserve price and time interval size on utility's profit is also presented.",asal naseri,block scheduling,2011.0,10.1109/GreenCom.2011.6082508,2011 IEEE Online Conference on Green Communications,Li2011,False,,IEEE,Not available,Auctioning game based Demand Response scheduling in smart grid,5a3f7202cc9065675cbfa97ffece0fce,https://ieeexplore.ieee.org/document/6082508/ 7820,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Decision making,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7821,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",suli zou,Elastic loads,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7822,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",suli zou,Distributed control,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7823,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",suli zou,Uniform market clearing price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7824,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",suli zou,Progressive second price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7825,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",suli zou,Nash equilibrium,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7826,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",zhongjing ma,Elastic loads,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7827,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",zhongjing ma,Distributed control,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7828,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",zhongjing ma,Uniform market clearing price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7829,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",zhongjing ma,Progressive second price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7830,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",zhongjing ma,Nash equilibrium,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7831,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Power system modeling,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7832,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",xiangdong liu,Elastic loads,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7833,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",xiangdong liu,Distributed control,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7834,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",xiangdong liu,Uniform market clearing price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7835,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",xiangdong liu,Progressive second price mechanism,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7836,"In this paper, we propose a distributed method to coordinate large-scale elastic load units with auction mechanisms which have been widely applied in resource allocation problems. Distinct from the progressive second price (PSP) auction mechanism, under the market clearing price (MCP) auction mechanism, the incentive compatibility does not hold in general but holds with respect to the efficient bid profiles of other agents. We observe that the difference between the payments under PSP and MCP mechanisms vanishes as the population size goes to infinity and consequently show that the efficient bid strategy is an epsilon-Nash equilibrium in MCP auction games with epsilon converges to zero as the population size goes to infinity. As another key result developed in the paper we further show that the efficient bid strategy is an epsilon-Nash equilibrium of auction game systems with epsilon is on the second order of the second derivative of the generation cost which goes to zero as the population size goes to infinity in scalable systems.",xiangdong liu,Nash equilibrium,2013.0,,Proceedings of the 32nd Chinese Control Conference,Zou2013,False,,IEEE,Not available,Efficient coordinations of large-scale elastic loads with MCP and PSP auction mechanisms,8e20436be195fdeedeb6fae4edcc3caa,https://ieeexplore.ieee.org/document/6639866/ 7837,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",eduardo roubik,Supply Contract Assessment,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7838,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",eduardo roubik,Portfolio Management,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7839,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",eduardo roubik,Combinatorial Auctions,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7840,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",eduardo roubik,Game Theory,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7841,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",eduardo roubik,Strategic Auction Behavior,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7842,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Power system simulation,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7843,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",hugh rudnick,Supply Contract Assessment,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7844,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",hugh rudnick,Portfolio Management,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7845,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",hugh rudnick,Combinatorial Auctions,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7846,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",hugh rudnick,Game Theory,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7847,"Long term supply contracts (LTSC) auctions are being used worldwide as a tool to stimulate system expansion in electrical markets. The need to assess the strategic behavior of generation investors is herein addressed. The assumption made is that risk aversion considerations directly affect Genco's strategic behavior, and an ad-hoc static competitive game model is constructed to prove this assumption, using portfolio concepts. The model is applied to the Chilean electricity market, using real parameters and the observed behaviors in the past October 2006 Disco's LTSCs auctions. Given that the Chilean LTSCs are auctioned using combinatorial auctions, simplifications are made to address the exponentially increasing simulating time cost in obtaining Gencos strategic behavior. For that purpose, a discrete number of possible prices to offer and reduced supply block division possibilities are used. The results obtained show that risk aversion concepts directly affect the auction results. Additionally, it is shown that only the spot price uncertainty can be hedged with LTSC and therefore it is the only relevant uncertainty in this. Both aforementioned conclusions must be taken into account in any LTSC auction design.",hugh rudnick,Strategic Auction Behavior,2009.0,10.1109/PTC.2009.5281851,2009 IEEE Bucharest PowerTech,Roubik2009,False,,IEEE,Not available,Assessment of generators strategic behavior in long term supply contract auctions using portfolio concepts,7a084d6006e7a1b0bcea1e262ac24a85,https://ieeexplore.ieee.org/document/5281851/ 7848,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",hong huang,micro grid,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7849,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",hong huang,low-carbon,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7850,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",hong huang,step-price,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7851,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",hong huang,auction,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7852,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",hong huang,power peak shaving,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7853,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Helium,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7854,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",xiaozhong liao,micro grid,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7855,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",xiaozhong liao,low-carbon,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7856,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",xiaozhong liao,step-price,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7857,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",xiaozhong liao,auction,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7858,"In this paper, a micro grid price mechanism is discussed and optimised. Operators can increase the consumers's profile under step-price environment. With a novel low-carbon strategy designed in this paper, consumers make ones own decision whether to buy or sell energy with what price. By using this strategy, energy distribution can be optimised and the utilization of clean power will increase. A simulation is conducted to prove the robustness and effectiveness of the strategy.",xiaozhong liao,power peak shaving,2014.0,10.1109/CCDC.2014.6853024,The 26th Chinese Control and Decision Conference (2014 CCDC),Huang2014,False,,IEEE,Not available,Game theory applied on step-priced micro grid,a9220a4f1fb147b987bfd1d2cf4972dd,https://ieeexplore.ieee.org/document/6853024/ 7859,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Cognitive Radio Networks,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7860,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Spectrum Sharing,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7861,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Game Theory,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7862,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Auction,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7863,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Multi-armed Bandit,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7864,"Feasibility of Nash equilibrium in generation markets is analyzed using a game theory for simplified competitive electricity markets. Generation companies in the markets are classified into two groups by the state of each company at equilibrium and a new method for obtaining Nash equilibrium in N-company spot markets is explored. Spot markets are assumed to be operated as uniform pricing auctions and generation companies are assumed to submit their bids into the auctions in the form of a seal-bid. The uniform pricing auctions in this analysis are formulated as games in which generation companies correspond to the players. The coefficient of the bidding function of company-n is assigned to the strategy of the player-n (company-n) and the payoff of the player-n is defined by his profit from the uniform price auction. Based on the concept of residual demand, best response functions of each generation company in the N-company auctions are analytically derived. Finally, an efficient way to obtain all the possible equilibrium set pairs and to examine their feasibilities as Nash equilibriums are suggested. A simple numerical example with three generation companies is demonstrated to show the basic ideas of the proposed method.",sung-kwan joo,Profitability,2005.0,10.1109/PES.2005.1489513,"IEEE Power Engineering Society General Meeting, 2005",Kim2005,False,,IEEE,Not available,A method for analyzing Nash equilibrium based on clustering of generation companies,df6f2aed1cd86c295a553e7d94b4e483,https://ieeexplore.ieee.org/document/1489513/ 7865,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,Cognitive radio networks,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7866,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,spectrum sharing,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7867,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,game theory,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7868,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,auction,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7869,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",mehrdad khaledi,multi-armed bandit,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7870,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Cognitive Radio Networks,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7871,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Spectrum Sharing,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7872,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Game Theory,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7873,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Auction,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7874,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Multi-armed Bandit,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7875,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,electronic marketplace,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7876,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,Cognitive radio networks,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7877,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,spectrum sharing,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7878,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,game theory,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7879,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,auction,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7880,"Spectrum auction is considered a suitable approach to efficiently allocate spectrum among unlicensed users. In a typical spectrum auction, secondary users (SUs) bid to buy spectrum bands from a primary owner (PO) who acts as the auctioneer. Existing spectrum auctions assume that SUs have static and known values for the channels. However, in many real world settings, the SUs do not know the exact value of channel access at first, but they learn it and adapt it over time. In this paper, we study spectrum auctions in a dynamic setting where SUs can change their valuations based on their experiences with the channel quality. We propose ADAPTIVE, a dynAmic inDex Auction for sPectrum sharing with TIme-evolving ValuEs that maximizes the social welfare of the SUs. ADAPTIVE is based on multi-armed bandit models where for each user an allocation index is independently calculated in polynomial time. Then we generalize ADAPTIVE to Multi-ADAPTIVE that auctions multiple channels at each time. We provide a sufficient condition under which Multi-ADAPTIVE achieves the maximum social welfare. Both ADAPTIVE and Multi-ADAPTIVE have some desired economic properties that are formally proven in the analysis. Also, we provide a numerical performance comparison between our proposed mechanisms and the well known static auctions, namely the Vickrey second price auction and the VCG mechanism.",alhussein abouzeid,multi-armed bandit,2015.0,10.1109/TWC.2015.2443796,IEEE Transactions on Wireless Communications,Khaledi2015,False,,IEEE,Not available,Dynamic Spectrum Sharing Auction With Time-Evolving Channel Qualities,01e01faedc26a5e9073b24f8a410de37,https://ieeexplore.ieee.org/document/7121035/ 7881,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7882,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7883,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7884,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7885,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7886,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,game theory,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7887,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7888,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",shantanu biswas,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7889,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7890,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7891,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7892,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7893,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7894,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7895,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",deepak bagchi,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7896,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7897,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,online auction,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 7898,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,framework,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7899,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7900,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7901,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7902,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7903,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7904,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",y. narahari,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7905,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7906,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7907,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7908,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7909,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,agent,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7910,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7911,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7912,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",p. suresh,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7913,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7914,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7915,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7916,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7917,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7918,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7919,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",s. subrahmanya,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7920,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",hu jun,negotiation,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7921,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7922,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7923,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7924,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7925,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7926,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7927,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",u. lakshmi,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7928,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Procurement,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7929,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Carbon dioxide,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7930,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Resource management,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7931,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,electronic marketplace,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7932,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Standards,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7933,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Green products,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7934,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Companies,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7935,"Auction based mechanisms have become popular in industrial procurement settings. These mechanisms minimize the cost of procurement and at the same time achieve desirable properties such as truthful bidding by the suppliers. In this paper, we investigate the design of truthful procurement auctions taking into account an additional important issue namely carbon emissions. In particular, we focus on the following procurement problem: A buyer wishes to source multiple units of a homogeneous item from several competing suppliers who offer volume discount bids and who also provide emission curves that specify the cost of emissions as a function of volume of supply. We assume that emission curves are reported truthfully since that information is easily verifiable through standard sources. First we formulate the volume discount procurement auction problem with emission constraints under the assumption that the suppliers are honest (that is they report production costs truthfully). Next we describe a mechanism design formulation for green procurement with strategic suppliers. Our numerical experimentation shows that emission constraints can significantly alter sourcing decisions and affect the procurement costs dramatically. To the best of our knowledge, this is the first effort in explicitly taking into account carbon emissions in planning procurement auctions.",n. viswanadham,Carbon,2012.0,10.1109/CoASE.2012.6386461,2012 IEEE International Conference on Automation Science and Engineering (CASE),Biswas2012,False,,IEEE,Not available,"Mechanism design for green, truthful procurement auctions",1dc0b6f2eadb318db4d3279dd5018413,https://ieeexplore.ieee.org/document/6386461/ 7936,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",tianyu wang,Feedback Control,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7937,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",tianyu wang,CSI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7938,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",tianyu wang,ICI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7939,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",tianyu wang,Sequential Second Price Auction,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7940,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",lingyang song,Feedback Control,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7941,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",lingyang song,CSI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7942,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,game theory,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7943,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",lingyang song,ICI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7944,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",lingyang song,Sequential Second Price Auction,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7945,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhu han,Feedback Control,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7946,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhu han,CSI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7947,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhu han,ICI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7948,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhu han,Sequential Second Price Auction,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7949,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhongshan zhang,Feedback Control,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7950,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhongshan zhang,CSI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7951,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhongshan zhang,ICI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7952,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",zhongshan zhang,Sequential Second Price Auction,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7953,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,framework,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7954,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",bingli jiao,Feedback Control,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7955,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",bingli jiao,CSI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7956,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",bingli jiao,ICI,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7957,"It has been well recognized that the capacity of a wireless system is usually limited because of intracell interference and intercell interference (ICI), and many technologies have been used to combat against them in different systems. Here, we consider a closed-loop wireless network with a limited feedback rate. In such networks, channel state information (CSI) feedback has become a well recognized technique that significantly increases the down link capacity by suppressing interference. However, the existing work typically focuses more on discussing each individual mobile station (MS) rather than modeling the interactions among self-interested users in the network level. In addition, the ICI is always not considered. To this end, we propose an alternative approach to investigate CSI and ICI simultaneously in one feedback control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through a linear precoder with the co-channel cells around. Specifically, we present a feedback-rate control game using sequential second price auction, in which the feedback rate is divided into homogeneous units and auctioned off sequentially among the MSs, and for each MS the feedback rate is optimized between CSI and ICI in order to gain the largest channel capacity. Our goal is to find a productive and justified mechanism to distribute the total feedback rate, which brings not only a good performance in the sum channel capacity but also a preservation in fairness among the MSs. Simulation results show that the proposed game achieves promising performance in both efficiency and fairness under randomness of terminal location and the time-varying nature of wireless channels.",bingli jiao,Sequential Second Price Auction,2011.0,10.1109/WCSP.2011.6096846,2011 International Conference on Wireless Communications and Signal Processing (WCSP),Wang2011,False,,IEEE,Not available,A feedback rate control game using sequential second price auction for channel state information and intercell interference in wireless networks,f26687f03f73fff5b38eb79efb668d3a,https://ieeexplore.ieee.org/document/6096846/ 7958,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,first price sealed bid auction,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7959,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,incentive contracts,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7960,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,private information,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7961,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,revelation principle,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7962,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",qianqin chen,Bayesian Nash equilibrium,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7963,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,first price sealed bid auction,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7964,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,agent,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7965,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,incentive contracts,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7966,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,private information,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7967,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,revelation principle,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7968,"This paper formulates a game theoretical model of urban land auctions with incentive contracts. The auction is organized by the government seeking to exercise control over house prices. The firm type, a parameter that reflects efficiency of a firm, is private information to all firms, and utility functions of participants take general forms. This paper shows that the Bayesian Nash equilibrium firm bidding strategies are monotonic in firm types.",min fan,Bayesian Nash equilibrium,2008.0,10.1109/ISBIM.2008.223,2008 International Seminar on Business and Information Management,Chen2008,False,,IEEE,Not available,Competitive Bidding in Urban Land Auctions with Incentive Contracts,41ccdf39cd0fbfd4ccc3d841fe34822c,https://ieeexplore.ieee.org/document/5116513/ 7969,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,AF,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7970,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,OFDMA,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7971,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,Resource Allocation,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7972,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,Sequential Auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7973,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,One-Shot Auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7974,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,Shapley Value,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7975,"To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for e-marketplace. Experiments show that the new way has achieved good results.",guan chun,negotiation,2009.0,10.1109/IITA.2009.301,2009 Third International Symposium on Intelligent Information Technology Application,Jun2009,False,,IEEE,Not available,An Electronic Marketplace Based on Game Theory,2cb831b254b4f42c12ad63d1080db314,https://ieeexplore.ieee.org/document/5369089/ 7976,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,Amplify-and-forward (AF),2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7977,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,orthogonal frequency-division multiple access (OFDMA),2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7978,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,resource allocation,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7979,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,sequential auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7980,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,one-shot auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7981,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",hanan al-tous,Shapley value,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7982,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,AF,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7983,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,OFDMA,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7984,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,Resource Allocation,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7985,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,Sequential Auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7986,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 7987,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,One-Shot Auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7988,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,Shapley Value,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7989,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,Amplify-and-forward (AF),2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7990,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,orthogonal frequency-division multiple access (OFDMA),2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7991,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,resource allocation,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7992,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,sequential auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7993,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,one-shot auction,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7994,"We develop auction-based algorithms for joint allocation of resources, i.e., power profiles at the source and relay nodes and subcarrier assignment profile for multiple-user amplify-and-forward (AF) orthogonal frequency-division multiple-access (OFDMA) systems. The first algorithm is based on sequential single-item auction, where each user submits a bid based on either the marginal increase or the relative marginal increase in the data rate using the subcarrier. The first bidding strategy maximizes the sum data rate, whereas the second bidding strategy maximizes the fairness index. In both cases, the subcarrier is assigned to the user who submits the highest bid. The algorithm proceeds in a sequential fashion until all subcarriers are assigned. To reduce the synchronized interactions between the base station and the users, we propose a one-shot auction algorithm, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimation of the Shapley value. The subcarriers are then assigned based on the submitted bids using an iterative algorithm that maximizes the fairness index. The throughput and fairness indices are used to evaluate the performance of the proposed algorithms. Numerical results are used to show the merits of each algorithm.",imad barhumi,Shapley value,2015.0,10.1109/TWC.2014.2385859,IEEE Transactions on Wireless Communications,Al-Tous2015,False,,IEEE,Not available,Resource Allocation for Multiple-User AF-OFDMA Systems Using the Auction Framework,cac0368b8b8a34a182e35ec0c65cbe63,https://ieeexplore.ieee.org/document/6998093/ 7995,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 7996,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 7997,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 7998,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,privacypreserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 7999,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8000,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8001,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8002,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8003,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8004,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,Data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8005,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8006,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,privacy-preserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8007,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8008,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,buyout price,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 8009,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8010,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8011,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8012,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8013,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",lei xu,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8014,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8015,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8016,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,privacypreserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8017,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8018,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8019,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8020,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shuguang chen,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8021,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8022,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8023,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,Data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8024,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8025,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,privacy-preserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8026,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8027,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8028,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8029,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8030,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",chunxiao jiang,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8031,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8032,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8033,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8034,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,privacypreserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8035,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8036,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8037,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8038,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8039,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8040,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,Data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8041,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8042,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8043,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,privacy-preserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8044,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8045,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8046,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8047,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8048,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian wang,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8049,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8050,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8051,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,privacypreserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8052,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8053,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8054,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8055,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8056,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8057,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8058,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,Data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8059,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8060,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,privacy-preserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8061,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8062,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8063,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8064,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",xiaodong liu,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8065,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8066,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",jian yuan,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8067,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8068,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8069,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,privacypreserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8070,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8071,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8072,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8073,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8074,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8075,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,Shill bidding,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8076,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,Data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8077,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,sensitive information,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8078,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,privacy-preserving data mining,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8079,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,anonymization,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8080,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,provenance,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8081,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,game theory,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8082,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,privacy auction,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8083,"The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining, known as privacy-preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.",yong ren,anti-tracking,2014.0,10.1109/ACCESS.2014.2362522,IEEE Access,Xu2014,True,,IEEE,Not available,Information Security in Big Data: Privacy and Data Mining,ec54935d85114c84bb9864472c18a3db,https://ieeexplore.ieee.org/document/6919256/ 8084,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",amitav mukherjee,Cooperative diversity,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8085,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",amitav mukherjee,partner selection,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8086,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,English auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8087,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",amitav mukherjee,relay networks,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8088,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",amitav mukherjee,distributed resource allocation,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8089,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",amitav mukherjee,game theory,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8090,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",hyuck kwon,Cooperative diversity,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8091,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",hyuck kwon,partner selection,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8092,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",hyuck kwon,relay networks,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8093,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",hyuck kwon,distributed resource allocation,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8094,"It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of-Service (QoS) is achievable via direct transmission. An incentive-based auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object second-price auction is studied for cooperative partner selection in single-carrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users.",hyuck kwon,game theory,2010.0,10.1109/TCOMM.2010.082010.080248,IEEE Transactions on Communications,Mukherjee2010,False,,IEEE,Not available,General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks,e86562827e7a8f91305ffc5033a2ce2b,https://ieeexplore.ieee.org/document/5560176/ 8095,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Cost accounting,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8096,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Resource management,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8097,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,First-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8098,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Linear regression,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8099,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Correlation,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8100,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Economics,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8101,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Games,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8102,"This paper investigates a human subject experiment for dynamic environment auction based on the online mechanism. Dynamic environment transaction can be applied to EV power charge markets. Due to make a knowledge of design a human subject experiment for dynamic environment economic game, this paper discusses how to create an instruction for human subject and how to analyze the data. In our auction model, there are three inputs, arrival time, departure time, and evaluation. Thus we need to analyze not only truthiness of monetary bid, but also truthiness of time-window. In this paper, we propose an analyzing method for this situation.",satoshi takahashi,Linear programming,2017.0,10.1109/IIAI-AAI.2017.172,2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI),Takahashi2017,False,,IEEE,Not available,A Human Subject Experiment for Online Mechanism in Dynamic Environment Auctions,37aeaa98815ca9b313e0ea20526be3fe,https://ieeexplore.ieee.org/document/8113374/ 8103,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8104,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8105,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8106,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8107,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8108,"Aimed at the disadvantage of current research of shill bidding with different online auctions types, in this paper, Applying decision analysis method and game theory, firstly, we research the bidder's optimal biding Strategy on English Auction, First-price Sealed-bid Auction and Second-price sealed-bid auction with Shill Bidding, respectively. Secondly, we use bidder's expected gain and seller's revenue as a basis to compare these three important auctions types, and interpret some bidding behavior in practice.",shengli chen,Second-price sealed-bid auction,2011.0,10.1109/ICBMEI.2011.5920364,2011 International Conference on Business Management and Electronic Information,Chen2011,False,,IEEE,Not available,A comparative analysis of several auction types with shill bidding,90973a9bab2d17599708aef27dc79f19,https://ieeexplore.ieee.org/document/5920364/ 8109,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8110,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8111,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8112,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8113,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",samson lasaulce,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8114,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8115,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8116,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8117,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8118,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8119,"The unprecedented growth of Internet has deeply infiltrated all of today's society. With more and more people using the Internet for a wide range of purposes, Internet use has become an absolute necessity for businesses to survive and grow. Online auction has been a particularly effective form of electronic commerce and is a promising field. Online auction often enable sellers to augment their auctions with a buyout price. The strategy of bidder is very important and has effect on seller's choice of auction form. Recent theoretical research shows the benefits of English auction with buyout price. In this paper we will show the bidder's strategy on eBay buy-it-now auction with game theory. There is an equilibrium which is the optimal for any first bidder.",lu tingjie,bid strategy,2007.0,10.1109/ICSSSM.2007.4280217,2007 International Conference on Service Systems and Service Management,Xingli2007,False,,IEEE,Not available,Analysis of Bid Strategy with Game Theory in Auctions with a Buyout price,32ebdb1a40876bb87dacfc8f03c3272b,https://ieeexplore.ieee.org/document/4280217/ 8120,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Game theory,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8121,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8122,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8123,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8124,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8125,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",merouane debbah,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8126,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Game theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8127,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Wireless communication,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8128,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Law,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8129,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Legal factors,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8130,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Wireless networks,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8131,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Scheduling algorithm,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8132,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Regulators,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8133,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Signal processing algorithms,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8134,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Information theory,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8135,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,History,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8136,"Non exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency are provided. The paper will focus on technical problems arising at the physical and medium access layers of a wireless network, and not on economic aspects related to it, like the auction problem for spectrum, even though it is also an important scenario where game theory is used.",eitan altman,Information analysis,2009.0,10.1109/MSP.2009.933496,IEEE Signal Processing Magazine,Lasaulce2009,False,,IEEE,Not available,Methodologies for analyzing equilibria in wireless games,fccd33e689a75e3b0dda628dfa1aa0e5,https://ieeexplore.ieee.org/document/5230845/ 8137,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Resource management,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8138,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Cost accounting,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8139,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Interference,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8140,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Joints,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8141,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Optimization,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8142,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Processor scheduling,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8143,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Games,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8144,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",chen xu,Wireless communication,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8145,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Resource management,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8146,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Cost accounting,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8147,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Interference,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8148,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Joints,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8149,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Optimization,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8150,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Games,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8151,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",lingyang song,Wireless communication,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8152,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Resource management,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8153,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8154,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Cost accounting,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8155,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Interference,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8156,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Joints,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8157,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Optimization,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8158,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Games,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8159,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",dalin zhu,Wireless communication,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8160,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Resource management,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8161,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Cost accounting,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8162,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Interference,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8163,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Joints,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8164,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Energy consumption,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8165,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Optimization,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8166,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Games,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8167,"An auction-based joint subcarrier and power allocation approach is investigated to improve the performance of device-to-device (D2D) communication underlay cellular networks with uplink (UL) resource sharing. To maximize the system sum rate over the resource reuse of multiple D2D pairs, we introduce a reverse iterative combinatorial auction to formulate the optimization problem. In the auction, cellular channels are viewed as bidders competing to obtain rate increase while packages of D2D pairs and the corresponding transmit power are auctioned as goods in each round. We first give the evaluation of bidders' optimal value for packages, and then explain a descending price auction in detail, also give properties of convergency and low-complexity. The simulation results are finally provided to indicate the efficiency of the proposed auction-based algorithm.",ming lei,Wireless communication,2014.0,10.1109/ICC.2014.6884201,2014 IEEE International Conference on Communications (ICC),Xu2014,False,,IEEE,Not available,Subcarrier and power optimization for device-to-device underlay communication using auction games,54ced48a3ecf1ed8c2566fc1c02f6d56,https://ieeexplore.ieee.org/document/6884201/ 8168,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,Optimal strategic bidding,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8169,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,GENCO competition,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8170,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,complete and incomplete games,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8171,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,Bayesian Nash equilibrium,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8172,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,Pay As Bid auction,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8173,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,Bertrand model,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8174,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",a. mozdawar,Risk Management,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8175,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Very large scale integration,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8176,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,Optimal strategic bidding,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8177,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,GENCO competition,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8178,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,complete and incomplete games,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8179,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,Bayesian Nash equilibrium,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8180,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,Pay As Bid auction,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8181,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,Bertrand model,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8182,"The strategic bidding problem for generation companies (GENCOs) in a pay as bid market is considered with respect to risk analysis for different participant types, in which GENCOs suffer from lack of complete information about other opponents bidding strategies. According to Iran power market characteristics, in which participants should declare their maximum available energy to the ISO, Bertrand model is adopted for strategic bidding in the power market. Then, by transforming incomplete data that each GENCO has from others into complete information using game theory and bayesian Nash equilibrium, a proper method is proposed considering the power market characteristics, for maximization of GENCOs' profit according to other GENCOs' bidding behaviors and power system operating conditions because of uncertainty of sources in a power system such as strategic behavior of opponent GENCOs, demand fluctuations and forced outage of network components, calculation of equilibrium point is not enough in proper strategic bidding, so the problem utilized so that risk factor is taken into account. The method is tested on three of participants in Iran power market. The numerical results shows the efficiency of the proposed method for strategic bidding of GENCOs participate in pay as bid markets.",b. khaki,Risk Management,2009.0,10.1109/PTC.2009.5282105,2009 IEEE Bucharest PowerTech,Mozdawar2009,False,,IEEE,Not available,Strategic bidding in pay as bid power market by combined probabilistic and game theory procedures,84a9e8cc08386fee377ed457ea941839,https://ieeexplore.ieee.org/document/5282105/ 8183,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",ali bayat,Auction,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8184,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",ali bayat,game theory,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8185,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",ali bayat,wireless power transfer,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8186,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Integer linear programming,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8187,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",sonia aissa,Auction,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8188,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",sonia aissa,game theory,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8189,"We propose and analyze a self-controlled playing strategy, namedreneging strategy, for users competing for receiving wireless power. In contrast to a non-reneging strategy, users can leave the game if their received power is not up to their expectation. The performance of the reneging strategy is studied and compared with the conventional non-reneging strategy for different network operation scenarios, particularly in the presence of critical users with stringent service requirements.",sonia aissa,wireless power transfer,2018.0,10.1109/LCOMM.2018.2866433,IEEE Communications Letters,Bayat2018,False,,IEEE,Not available,Auction-Based Design and Analysis of Wireless Power Transfer Network With Critical Users,c3e098970ce9e8938823435a1e4b9027,https://ieeexplore.ieee.org/document/8443413/ 8190,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",rong du,Pursuit-evasion games,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8191,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",rong du,task assignment,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8192,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",rong du,auction,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8193,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",rong du,wireless sensor network,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8194,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",cailian chen,Pursuit-evasion games,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8195,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",cailian chen,task assignment,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8196,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",cailian chen,auction,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8197,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Portable computers,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8198,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",cailian chen,wireless sensor network,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8199,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",bo yang,Pursuit-evasion games,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8200,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",bo yang,task assignment,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8201,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",bo yang,auction,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8202,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",bo yang,wireless sensor network,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8203,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",xinping guan,Pursuit-evasion games,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8204,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",xinping guan,task assignment,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8205,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",xinping guan,auction,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8206,"In this paper, we address pursuit-evasion games with the auxiliary of wireless sensor network. Wireless sensor network can provide global information, such as the positions of evaders, for pursuers to improve the performance. However, some ready strategies cannot be used directly because of the positioning errors of wireless sensor network. By analyzing the performance of Lion Strategy, A Lion-Mirror-Tackle Strategy is proposed for single evader model to assign the roles of pursuers and reduce the time and energy consumptions of capture. In the multi-pursuer multi-evaders model, evaders are assigned for several groups of pursuers and a decentralized and realtime assignment strategy based on auction process is proposed, to provide fast response to the motion of evaders. The simulation shows the efficiency of our algorithms.",xinping guan,wireless sensor network,2012.0,10.1109/WCICA.2012.6359228,Proceedings of the 10th World Congress on Intelligent Control and Automation,Du2012,False,,IEEE,Not available,Auction based task assignment for pursuit-evasion game in wireless sensor network,7c582ee80ed4e4ec72c3ea21369a72a5,https://ieeexplore.ieee.org/document/6359228/ 8207,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Electricity supply industry,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8208,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8209,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Power system modeling,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8210,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Game theory,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8211,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,ISO,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8212,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Gallium nitride,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8213,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Nash equilibrium,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8214,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Power supplies,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8215,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Predictive models,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8216,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Constraint theory,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8217,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d. gan,Power generation,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8218,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Electricity supply industry,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8219,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Delay,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8220,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Power system modeling,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8221,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Game theory,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8222,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,ISO,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8223,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Gallium nitride,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8224,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Nash equilibrium,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8225,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Power supplies,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8226,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Predictive models,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8227,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Constraint theory,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8228,"A single-period auction game model in a pool-based electricity market is introduced in the paper. The authors study the Nash equilibrium in pure strategy sense. First equilibrium characterization under tight capacity constraints is provided. Then it is demonstrated that the auction game does not possess a pure strategy Nash equilibrium under a wide range of market conditions. To enhance the prediction power of the auction game model, a weaker form of equilibrium, quasi-equilibrium is introduced. The paper provides a characterization of quasi-equilibrium under weak capacity constraints.",d.v. bourcier,Power generation,2002.0,10.1109/PESW.2002.984961,2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309),Gan2002,False,,IEEE,Not available,A single-period auction game model for modeling oligopolistic competition in pool-based electricity markets,85368819e9271b184b4a7d42dcf7b223,https://ieeexplore.ieee.org/document/984961/ 8229,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Game theory,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8230,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8231,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Game theory,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8232,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Scheduling algorithm,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8233,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Processor scheduling,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8234,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8235,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Energy consumption,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8236,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Very large scale integration,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8237,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Integer linear programming,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8238,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Portable computers,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8239,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8240,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",a.k. murugavel,Delay,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8241,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Game theory,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8242,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Scheduling algorithm,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8243,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Scheduling algorithm,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8244,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Processor scheduling,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8245,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Circuit synthesis,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8246,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Energy consumption,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8247,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Very large scale integration,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8248,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Integer linear programming,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8249,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Portable computers,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8250,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Nash equilibrium,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8251,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Delay,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8252,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Pricing,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8253,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Processor scheduling,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8254,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Web and internet services,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8255,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Diffserv networks,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8256,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Bandwidth,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8257,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Stability,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8258,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Telecommunication traffic,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8259,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Traffic control,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8260,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Resource management,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8261,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Game theory,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8262,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",n. semret,Buildings,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8263,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Pricing,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8264,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Circuit synthesis,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8265,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Web and internet services,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8266,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Diffserv networks,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8267,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Bandwidth,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8268,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Stability,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8269,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Telecommunication traffic,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8270,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Traffic control,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8271,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Resource management,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8272,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Game theory,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8273,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",r.r.-f. liao,Buildings,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8274,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Pricing,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8275,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Energy consumption,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8276,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Web and internet services,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8277,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Diffserv networks,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8278,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Bandwidth,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8279,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Stability,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8280,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Telecommunication traffic,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8281,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Traffic control,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8282,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Resource management,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8283,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Game theory,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8284,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.t. campbell,Buildings,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8285,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Pricing,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8286,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Very large scale integration,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8287,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Web and internet services,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8288,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Diffserv networks,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8289,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Bandwidth,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8290,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Stability,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8291,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Telecommunication traffic,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8292,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Traffic control,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8293,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Resource management,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8294,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Game theory,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8295,"This paper presents a decentralized auction-based approach to pricing of edge-allocated bandwidth in a differentiated services Internet. The players in our network economy model are one raw-capacity seller per network, one broker per service per network, and users, to play the roles of whole-sellers, retailers, and end-buyers, respectively, in a two-tier wholeseller/retailer market, which is best interpreted as a ""sender-pay"" model. With the progressive second price auction mechanism as the basic building block, we conduct a game theoretic analysis, deriving optimal strategies for buyers and brokers, and show the existence of networkwide market equilibria. In addition to pricing, another key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where demand-driven dynamic allocations are made only at the edges. Based on the proposed game-theoretic model, we are able to construct an explicit necessary and sufficient condition for the stability of the game, which determines the sustainability of any set of service level agreement configurations between Internet service providers. These analytical results are validated with simulations of user and broker dynamics, using the distributed progressive second price auction as the spot market mechanism in a scenario with three interconnected networks, and two services based on the proposed standard expedited forwarding and assured forwarding per-hop behavior.",a.a. lazar,Buildings,2000.0,10.1109/49.898733,IEEE Journal on Selected Areas in Communications,Semret2000,False,,IEEE,Not available,"Pricing, provisioning and peering: dynamic markets for differentiated Internet services and implications for network interconnections",30b71379d1e419c0875c6ea7cc6b6783, 8296,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",kun zhang,opportunistic routing,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8297,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Integer linear programming,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8298,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",kun zhang,incentive,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8299,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",kun zhang,auction game,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8300,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",rui wang,opportunistic routing,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8301,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",rui wang,incentive,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8302,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",rui wang,auction game,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8303,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",depei qian,opportunistic routing,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8304,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",depei qian,incentive,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8305,"Opportunistic routing in wireless networks has strong requirement with nodes' cooperation. But in most realistic networks, nodes perform in their own interests and refuse to forward packets for others when they belong to different organizations. The aim of this paper is to provide a fair incentive mechanism to encourage cooperation and achieve the energy efficient. We propose an auction incentive mechanism (AIM) using a fair pricing mechanism to incentive nodes and modeling the pricing process as an auction game. Furthermore, we proof that, this game has a Bayesian Nash equilibrium point, and the profit of each relay node can be maximized when the game reached Bayesian Nash equilibrium. Our simulation results show that the AIM can effectively incentive network nodes to relay data, so that the network throughput could be improved. And the energy consuming of nodes is balanced that enhances the stability of networks.",depei qian,auction game,2010.0,10.1109/CSE.2010.13,2010 13th IEEE International Conference on Computational Science and Engineering,Zhang2010,False,,IEEE,Not available,AIM: An Auction Incentive Mechanism in Wireless Networks with Opportunistic Routing,df0a0ee1825ccef12661ad9d4f55ae52,https://ieeexplore.ieee.org/document/5692453/ 8306,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Jamming,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8307,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Resource management,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8308,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Portable computers,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8309,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Clocks,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8310,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Indexes,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8311,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Games,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8312,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Data communication,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8313,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",rongqing zhang,Security,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8314,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Jamming,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8315,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Resource management,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8316,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Clocks,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8317,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Indexes,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8318,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Games,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8319,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Nash equilibrium,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8320,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Data communication,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8321,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",lingyang song,Security,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8322,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Jamming,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8323,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Resource management,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8324,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Clocks,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8325,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Indexes,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8326,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Games,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8327,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Data communication,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8328,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",zhu han,Security,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8329,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Jamming,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8330,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling and binding in behavioral synthesis. The problems are formulated as auction-based noncooperative finite games for which solutions are proposed based on the Nash equilibrium. In the scheduling algorithm, a first-price sealed-bid auction approach is used while, for the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. Further, the techniques of functional unit sharing, path balancing, and register assignment are incorporated within the binding algorithm for power reduction. The combined scheduling and binding algorithm is formulated as a single noncooperative auction game with the functional units in the datapath modeled as players bidding for executing the operation in a particular control cycle. The proposed algorithms yield power reduction without any increase in area overhead and only a slight increase in the latency for some of the benchmark circuits. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method, while the scheduling and the combined scheduling and binding algorithms yield average improvements of 6.3% and 11.8%, respectively, over the integer-linear programming (ILP) approach.",n. ranganathan,Delay,2003.0,10.1109/TVLSI.2003.819566,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,Murugavel2003,False,,IEEE,Not available,A game theoretic approach for power optimization during behavioral synthesis,f25945caeed82d8078b1bc1436cd98d8,https://ieeexplore.ieee.org/document/1255478/ 8331,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Resource management,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8332,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Clocks,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8333,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Indexes,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8334,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Games,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8335,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Data communication,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8336,"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.",bingli jiao,Security,2011.0,10.1109/INFCOMW.2011.5928805,2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Zhang2011,False,,IEEE,Not available,Improve physical layer security in cooperative wireless network using distributed auction games,25704eb2ee3040f49bab03a8a72b1ebd,https://ieeexplore.ieee.org/document/5928805/ 8337,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,Approximation,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8338,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,games with few decision-makers,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8339,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,nonasymptotic,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8340,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,Approximation,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8341,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8342,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8343,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,games with few decision-makers,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8344,"Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists of approximating large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper, we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.",hamidou tembine,nonasymptotic,2014.0,10.1109/TCYB.2014.2315171,IEEE Transactions on Cybernetics,Tembine2014,False,,IEEE,Not available,Nonasymptotic Mean-Field Games,4ab5237acfc89fe54ec6f2aa3246c805,https://ieeexplore.ieee.org/document/6798664/ 8345,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Convergence,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8346,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Resource management,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8347,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Quantization,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8348,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Pricing,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8349,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Cost accounting,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8350,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Mechanical factors,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8351,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Decision making,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8352,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Game theory,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8353,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8354,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Communication networks,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8355,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peng jia,Power generation,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8356,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Convergence,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8357,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Resource management,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8358,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Quantization,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8359,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Pricing,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8360,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Cost accounting,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8361,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Mechanical factors,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8362,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Decision making,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8363,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Game theory,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8364,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8365,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Communication networks,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8366,"First, a quantized progressive second price (PSP) auction mechanism called the Unique Limit Quantized - PSP (UQ-PSP) is presented for the allocation of fixed or timevarying quantities of a resource among arbitrary populations of agents. It is shown that (i) the states (i.e. bid prices and quantities) of the corresponding iterative dynamical auction system converge to a unique quantized (Nash) equilibrium with a common limit price for all agents, (ii) the limit price of all system trajectories is independent of the initial data, and (iii) modulo the quantization level, the limiting resource allocation is efficient, that is to say the corresponding social welfare function is optimized. Second, distributed auctions on a twolevel network are developed: each vertex in the higher level network is regarded as a supplier for a uniquely associated lower level network; each such lower level network consists of a set of agents which represent buyers; and each of the lower level networks and their associated suppliers is assumed to constitute a local UQ-PSP auction A<sub>¿</sub>. The adjustment of the quantities supplied to any A<sub>¿</sub> is via a consensus-based dynamical system which exchanges quantities depending upon the limit prices of the local auctions in the (nearest neighbour) neighborhood of A<sub>¿</sub> in the higher level network. Convergence is established using a passivity property of UQ-PSP auctions and the system properties on those networks which are scale free random graphs are investigated.",peter caines,Power generation,2009.0,10.1109/CDC.2009.5400496,Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference,Jia2009,False,,IEEE,Not available,"Auctions on networks: Efficiency, consensus, passivity, rates of convergence",4ccf7ce9f60c545125e173b094bddabf,https://ieeexplore.ieee.org/document/5400496/ 8367,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",vishnuteja nanduri,auction-based allowance allocation,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8368,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",vishnuteja nanduri,cap-and-trade programs,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8369,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",vishnuteja nanduri,game-theoretic models,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8370,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",vishnuteja nanduri,climate change,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8371,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",vishnuteja nanduri,restructured electricity markets,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8372,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",wilkistar otieno,auction-based allowance allocation,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8373,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",wilkistar otieno,cap-and-trade programs,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8374,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",wilkistar otieno,game-theoretic models,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8375,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8376,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",wilkistar otieno,climate change,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8377,"Auction based CO<sub>2</sub> allowance allocation is a fundamental element of all cap-and-trade programs that are being discussed around the world. Multi-unit auctions usually follow a uniform or discriminatory pricing mechanism. Each of the auction mechanisms result in different strategic behavior by bidders. In this paper, we develop a game-theoretic model to assess the impact of these auction mechanisms on cap-and-trade and electricity markets. The game-theoretic model is solved using a nested two-stage diagonalization algorithm. The methodology is demonstrated on power network data from northern Illinois electricity market and results are discussed.",wilkistar otieno,restructured electricity markets,2011.0,10.1109/PES.2011.6039692,2011 IEEE Power and Energy Society General Meeting,Nanduri2011,False,,IEEE,Not available,Assessing the impact of different auction-based CO<inf>2</inf> allowance allocation mechanisms,c91eb8f42abbddd729004199ac00bab2,https://ieeexplore.ieee.org/document/6039692/ 8378,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,bai yanping,treasury auction market of China,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8379,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,bai yanping,single price auction,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8380,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,bai yanping,multiple price auction,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8381,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,bai yanping,statistic analysis,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8382,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,vu zhang,treasury auction market of China,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8383,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,vu zhang,single price auction,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8384,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,vu zhang,multiple price auction,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8385,The revenue between single-price auction and multiple-price auction can not be compared by auction theory. The paper establishes a statistical empirical model and uses the data of China's treasury auction market to examine the revenue between single-price auction and multiple-price auction. The paper has three important conclusions and the single-price auction can prevent the winner's course and collusion. It is the better treasury auction for the seller.,vu zhang,statistic analysis,2011.0,10.1109/ICEBEG.2011.5882483,2011 International Conference on E-Business and E-Government (ICEE),Yanping2011,False,,IEEE,Not available,The empirical study on China's treasury auction market,851e32b14c30f67d70ae963a7dc8ae79, 8386,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8387,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Multicasting,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8388,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Overlay Network,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8389,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Game Theory,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8390,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Strategic Behavior,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8391,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Mechanism Design,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8392,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",mohammad rezvani,Monopoly Auction,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8393,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Multicasting,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8394,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Overlay Network,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8395,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Game Theory,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8396,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Strategic Behavior,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8397,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8398,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Mechanism Design,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8399,"This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.",morteza analoui,Monopoly Auction,2011.0,10.1109/CCNC.2011.5766583,2011 IEEE Consumer Communications and Networking Conference (CCNC),Rezvani2011,False,,IEEE,Not available,Towards strategic resource allocation in overlay networks based on monopoly auction mechanism,e493cbcd80b91da5c7946a81fff309be,https://ieeexplore.ieee.org/document/5766583/ 8400,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",dan wu,Wireless cooperative networks,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8401,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",dan wu,auction theory,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8402,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",dan wu,energy efficiency,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8403,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",dan wu,power allocation,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8404,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",dan wu,outage probability,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8405,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",yueming cai,Wireless cooperative networks,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8406,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",yueming cai,auction theory,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8407,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",yueming cai,energy efficiency,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8408,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8409,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",yueming cai,power allocation,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8410,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",yueming cai,outage probability,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8411,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",liang zhou,Wireless cooperative networks,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8412,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",liang zhou,auction theory,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8413,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",liang zhou,energy efficiency,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8414,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",liang zhou,power allocation,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8415,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",liang zhou,outage probability,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8416,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",joel rodrigues,Wireless cooperative networks,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8417,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",joel rodrigues,auction theory,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8418,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",joel rodrigues,energy efficiency,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8419,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8420,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",joel rodrigues,power allocation,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8421,"In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.",joel rodrigues,outage probability,2012.0,10.1109/GLOCOM.2012.6503378,2012 IEEE Global Communications Conference (GLOBECOM),Wu2012,False,,IEEE,Not available,Relay power allocation in auction-based game approach,c68a2059ca1c8cb2e5eb239d8350422f,https://ieeexplore.ieee.org/document/6503378/ 8422,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",esteban feuerstein,sponsored search,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8423,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",esteban feuerstein,auction,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8424,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",esteban feuerstein,stochastic,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8425,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",esteban feuerstein,truthful,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8426,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",pablo heiber,sponsored search,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8427,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",pablo heiber,auction,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8428,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",pablo heiber,stochastic,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8429,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",pablo heiber,truthful,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8430,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8431,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",marcelo mydlarz,sponsored search,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8432,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",marcelo mydlarz,auction,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8433,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",marcelo mydlarz,stochastic,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8434,"Incentive compatibility is a central concept in auction theory, and a desirable property of auction mechanisms. In a celebrated result, Aggarwal, Goel and Motwani presented the first truthful deterministic auction for sponsored search (i.e., in a setting where multiple distinct slots are auctioned). Stochastic auctions present several advantages over deterministic ones, as they are less prone to strategic bidding, and increase the diversity of the winning bidders. Meek, Chickering and Wilson presented a family of truthful stochastic auctions for multiple identical items. We present the first class of incentive compatible stochastic auctions for the sponsored search setting. This class subsumes as special cases the laddered auctions and the stochastic auctions with the condex pricing rule, consolidating these two seemingly disconnected mechanisms in a single framework. Moreover, when the price per click depends deterministic ally on the bids the auctions in this class are unique. Accordingly, we give a precise characterization of all truthful auctions for sponsored search, in terms of the expected price that each bidder will pay per click. We also introduce randomized algorithms and pricing rules to derive, given an allocation mechanism for the single- or multiple-identical-slots scenarios, a new mechanism for the multislot framework with distinct slots. These extensions have direct practical applications.",marcelo mydlarz,truthful,2008.0,10.1109/LA-WEB.2008.17,2008 Latin American Web Conference,Feuerstein2008,False,,IEEE,Not available,Truthful Stochastic and Deterministic Auctions for Sponsored Search,bca1046ffbaeadabfc35cf3b6f02dc01,https://ieeexplore.ieee.org/document/4756160/ 8435,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",archie chapman,Demand-response (DR),2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8436,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",archie chapman,demand-side aggregation,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8437,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",archie chapman,energy use scheduling,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8438,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",archie chapman,game theory,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8439,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",archie chapman,mechanism design,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8440,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",gregor verbic,Demand-response (DR),2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8441,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8442,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",gregor verbic,demand-side aggregation,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8443,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",gregor verbic,energy use scheduling,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8444,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",gregor verbic,game theory,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8445,"This paper considers a demand-side aggregation scheme specifically for large numbers of small-loads, such as households and small- and medium-sized businesses. We introduce a novel auction format, called a staggered clock-proxy auction (SCPA), for on-line scheduling of these loads. This is a two phase format, consisting of a sequence of overlapping iterative ascending price clock auctions, one for each time-slot over a finite decision horizon, and a set of proxy auctions that begin at the termination of each individual clock auction, and which determine the final price and allocation for each time-slot. The overlapping design of the clock phases grant bidders the ability to effectively bid on intertemporal bundles of electricity use, thereby focusing on the most-relevant parts of the price-quantity space. Since electricity is a divisible good, the proxy auction uses demand-schedule bids, which the aggregator uses to compute a uniform-price competitive equilibrium for each time-slot. We show that, under mild assumptions on the bidders' utilities functions, the proxy phase implements the Vickrey-Clarke-Groves allocation, which makes straightforward bidding in the proxy phase a Bayes-Nash equilibrium. Furthermore, we demonstrate the SCPA in a scenario comprised of household agents with three different utility function types, and show how the mechanism improves the efficiency of on-line energy use scheduling.",gregor verbic,mechanism design,2017.0,10.1109/TSG.2015.2457905,IEEE Transactions on Smart Grid,Chapman2017,False,,IEEE,Not available,An Iterative On-Line Auction Mechanism for Aggregated Demand-Side Participation,a2dd09645a758a8c936f3f4c301377ae,https://ieeexplore.ieee.org/document/7182785/ 8446,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,Dynamic spectrum access,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8447,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,pricing,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8448,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,game theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8449,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",shamik sengupta,auction theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8450,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,Dynamic spectrum access,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8451,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,pricing,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8452,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8453,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8454,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,game theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8455,"The concept of dynamic spectrum access will allow the radio spectrum to be traded in a market like scenario allowing wireless service providers (WSPs) to lease chunks of spectrum on a short-term basis. Such market mechanisms will lead to competition among WSPs where they not only compete to acquire spectrum but also attract and retain users. Currently, there is little understanding on how such a dynamic trading system will operate so as to make the system feasible under economic terms. In this paper, we propose an economic framework that can be used to guide i) the dynamic spectrum allocation process and ii) the service pricing mechanisms that the providers can use. We propose a knapsack based auction model that dynamically allocates spectrum to the WSPs such that revenue and spectrum usage are maximized. We borrow techniques from game theory to capture the conflict of interest between WSPs and end users. A dynamic pricing strategy for the providers is also proposed. We show that even in a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price and channel threshold which is a direct consequence of price equilibrium. Through simulation results, we show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the spectrum, and avoids collusion among WSPs. We demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.",mainak chatterjee,auction theory,2009.0,10.1109/TNET.2008.2007758,IEEE/ACM Transactions on Networking,Sengupta2009,False,,IEEE,Not available,An Economic Framework for Dynamic Spectrum Access and Service Pricing,506f530a687d680e6b4307fc7656c61a,https://ieeexplore.ieee.org/document/4770127/ 8456,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,Multi-robot systems,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 8457,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,multi-agent coordination,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 8458,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,auction,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 8459,"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].",prithviraj dasgupta,coalition game,2012.0,10.1109/CTS.2012.6261030,2012 International Conference on Collaboration Technologies and Systems (CTS),Dasgupta2012,False,,IEEE,Not available,Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage,fb38b563bcb43abf61bd7105ab6bbf22,https://ieeexplore.ieee.org/document/6261030/ 8460,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8461,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8462,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8463,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8464,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8465,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8466,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8467,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8468,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8469,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8470,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8471,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8472,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8473,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",igor stanojev,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 8474,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",osvaldo simeone,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 8475,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8476,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",umberto spagnolini,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 8477,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",yeheskel bar-ness,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 8478,"A novel distributed scheme that combines cooperative ARQ with the spectrum leasing paradigm is proposed and analyzed. The strategy harnesses the opportunistic gains of cooperative communications, while inherently providing a spectrum-rewarding incentive for the otherwise non-cooperative relays to assist the source's transmission. As in cooperative ARQ, the source might decide to hand over the possible retransmission slots to nearby stations that were able to decode the original transmission. In the proposed scheme, however, in exchange for the cooperation, the relaying station is also awarded an opportunity to exploit the retransmission slot for its own traffic. Arbitration of relays' retransmissions is performed via an auction mechanism, with the source, the competing relays and the transmission slot acting as the auctioneer, the bidders and the bidding article, respectively. Auction theory (more generally, the theory of Bayesian games) is applied to analyze the scheme performance. It is noted that the setting here can be alternatively seen as a practical framework for implementation of property-rights cognitive radio networks. Numerical results and analysis show that the proposed scheme enables an efficient dynamic resource allocation that provides relevant gains (e.g., transmission reliability) for both the original source (primary) and the cooperating nodes (secondary users).",raymond pickholtz,"Automatic repeat request, radio spectrum management, cognitive radio, cooperative transmission, spectrum leasing. ",2010.0,10.1109/TCOMM.2010.06.080575,IEEE Transactions on Communications,Stanojev2010,False,,IEEE,Not available,Cooperative ARQ via auction-based spectrum leasing,e964e657ec1ab4dd6c521e497829f783,https://ieeexplore.ieee.org/document/5474648/ 8479,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",junni zou,Power allocation,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8480,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",junni zou,two-way relaying,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8481,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",junni zou,network coding,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8482,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",junni zou,auction game,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8483,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",junni zou,outage probability,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8484,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",hongwan xu,Power allocation,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8485,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",hongwan xu,two-way relaying,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8486,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8487,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",hongwan xu,network coding,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8488,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",hongwan xu,auction game,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8489,"The overall performance of a cooperative relaying system largely depends on power allocation schemes. In this paper, we address the power allocation problem in a network-coded multiuser two-way relaying network, where multiple pair users communicate with their partners via a common relay node, and compete for the transmit power of the relay. An auction-based power allocation scheme is proposed, in which two users in each pair bid as a single player for a maximum utility of the whole pair, and share the total pair payment in proportion to the amount of power they obtained. The convergence of the proposed auction game (i.e., the convergence to a unique Nash Equilibrium) is theoretically proved by using a standard function. Moreover, the outage behavior is systematically analyzed and a closed form of the pair outage probability is derived. Finally, the performance of the proposed scheme is verified by simulation results.",hongwan xu,outage probability,2013.0,10.1109/TWC.2012.113012.111725,IEEE Transactions on Wireless Communications,Zou2013,False,,IEEE,Not available,Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks,a26e10b8339b0082ada9ca884a0f9cbe,https://ieeexplore.ieee.org/document/6373676/ 8490,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Wireless networks,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8491,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Stochastic processes,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8492,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Nash equilibrium,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8493,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Resource virtualization,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8494,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Resource management,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8495,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Communications Society,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8496,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,USA Councils,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8497,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8498,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Game theory,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8499,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Radio spectrum management,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8500,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",fangwen fu,Technological innovation,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8501,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Wireless networks,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8502,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Stochastic processes,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8503,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Nash equilibrium,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8504,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Resource virtualization,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8505,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Resource management,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8506,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Communications Society,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8507,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,USA Councils,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8508,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8509,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Game theory,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8510,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Radio spectrum management,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8511,"We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives with different constraints. Within the proposed framework, we model the interactions among SPs and NO as a stochastic game, each stage of which is played by SPs (on behalf of the end users) and is regulated by the NO through the Vickrey-Clarke-Groves (VCG) mechanism. Due to the strong coupling between the future decisions of SPs and lack of global information at each SP, the stochastic game is notoriously hard. Instead, we introduce conjectural prices to represent the future congestion levels the end users potentially will experience, via which the future interactions between SPs are decoupled. Then, the policy to play the dynamic rate allocation game becomes selecting the conjectural prices and announcing a strategic value function (i.e., the preference on the rate) at each time. We prove that there exists one Nash equilibrium in the conjectural prices and, given the conjectural prices, the SPs have to truthfully reveal their own value function. We further prove that this Nash equilibrium results in efficient rate allocation in our virtualized wireless network. In other words, there are enough incentives for NO to advertise such a conjectural price and SPs to follow this advice.",ulaº kozat,Technological innovation,2010.0,10.1109/INFCOM.2010.5462016,2010 Proceedings IEEE INFOCOM,Fu2010,False,,IEEE,Not available,Wireless Network Virtualization as A Sequential Auction Game,9f2b7a6301f57b5329abe2c2d490d197,https://ieeexplore.ieee.org/document/5462016/ 8512,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8513,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8514,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8515,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8516,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8517,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8518,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",bin cao,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8519,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8520,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8521,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8522,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8523,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8524,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8525,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8526,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",wenqiang lang,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8527,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8528,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8529,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8530,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8531,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8532,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8533,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8534,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",yun li,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8535,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8536,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8537,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8538,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8539,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8540,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8541,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8542,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",zhuo chen,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8543,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Resource management,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8544,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Wireless networks,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8545,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Silicon,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8546,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Games,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8547,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Virtualization,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8548,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Mobile communication,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8549,"In traditional wireless network infrastructure, multiple wireless networks with various access points (APs) would be deployed in the same area. Although this deployment can easily provide service for mobile user equipment (MUE), any AP only allows the authorized MUEs to access, and thus some wireless networks might be overloaded and others might be lightly loaded. As a result, resource allocation would be inefficient. Using wireless network virtualization, an infrastructure provider (InP) can deploy only a single physical AP in the same area. This AP, which is controlled by a network operator (NO), is shared by multiple service providers (SPs) coexisting in the same AP. In the framework of wireless network virtualization, NO is in charge of resource allocation for the whole system and SP focuses on the access, connection and resource requirement of MUEs (such as the desired transmission power in downlink). In this paper, a Game theory based Two Steps Power Allocation scheme for wireless network virtualization, called G2SPA, is proposed, which designs a Stacklberg Equilibrium price strategy based on the interactions between SP and MUE, and then performs McAfee based auction to reallocate resource. The numerous experimental simulation results show that the rightness and effectiveness of G2SPA.",honggang wang,Downlink,2015.0,10.1109/GLOCOM.2015.7417554,2015 IEEE Global Communications Conference (GLOBECOM),Cao2015,False,,IEEE,Not available,Power Allocation in Wireless Network Virtualization with Buyer/Seller and Auction Game,5396a369614b6fb54ecaa037d5802d48,https://ieeexplore.ieee.org/document/7417554/ 8550,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Resource management,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8551,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Game theory,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8552,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8553,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Computer networks,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8554,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,History,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8555,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Bayesian methods,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8556,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Computerized monitoring,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8557,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Investments,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8558,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8559,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Cost function,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8560,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",amir danak,Robustness,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8561,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Resource management,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8562,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Game theory,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8563,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8564,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8565,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Computer networks,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8566,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,History,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8567,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Bayesian methods,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8568,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Computerized monitoring,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8569,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Investments,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8570,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8571,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Cost function,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8572,"This paper introduces an efficient bidding strategy for budget-constrained buyers in repeated auctions with entry fees. We present a general algorithm that is applicable to distributed resource allocation. The game is modeled on an economically reasonable assumption according to which any player can participate in an auction after paying for information about the value of the auctioned item, and for the preparation of his bid. We address learning by each bidder of an optimal participation strategy for spending his budget profitably, based on the history of his successes and failures in past transactions. Players' transient and long-term attitudes are illustrated in a symmetric Bayesian equilibrium of a market-based network resource allocation problem.",shie mannor,Robustness,2009.0,10.1109/GAMENETS.2009.5137414,2009 International Conference on Game Theory for Networks,Danak2009,False,,IEEE,Not available,Bidding efficiently in repeated auctions with entry and observation costs,1bc0167aec4e4c6cf28b30438fc265be,https://ieeexplore.ieee.org/document/5137414/ 8573,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Electricity supply industry,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8574,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Systems engineering and theory,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8575,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8576,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Decision making,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8577,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Game theory,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8578,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Power engineering and energy,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8579,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Electricity supply industry deregulation,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8580,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Design engineering,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8581,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,USA Councils,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8582,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Springs,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8583,"Summary form only given as follows. Many challenging issues arise under the newly deregulated competitive electric power markets. Instead of centralized decision-making in a vertically integrated environment as in the past, decision-making is now decentralized and driven by market forces. The collapse of the California PX market in early 2001 fostered a lot of debates on the fundamental issues in deregulating electric power markets. Among the most important reasons that cause the collapse of the California market, we focus on our discussion on gaming and price spikes. In fact these phenomena have been observed in almost every electricity market but explicit analysis of them is rare. In this paper, we examine historical bid curves from the original California day-ahead energy market. These curves have the property that slight shifts in either the supply offer or demand bid can cause large changes in the market clearing price. Based on this observation, we formulate a Prisoner's dilemma matrix game to show that suppliers have incentive to withhold capacity from the market. That is, under certain conditions, enough suppliers independently withholding capacity can shift the aggregated supply curve to cause a price spike. We call this phenomenon ""opportunistic tacit collusion"" to distinguish it from the classical ""tacit collusion"" that occurs in static repeated Prisoner's dilemma games, where the object is for all players to learn that they can always make excess profits if they withhold a small amount of capacity from the market. Once this is learned suppliers ""tacitly collude"" to sustain high market prices. We assert, however, that it is not always profitable to withhold capacity from the market, since the opportunity for raising profits does not always exist due to externalities such as the demand bid, network loading, power imports, prices in other markets, etc. In other words, the payoff's in the payoff matrix change with the externalities, making it necessary to recognize when the ""opportunity"" to drive up profits exists. When enough suppliers recognize the opportunity we get ""opportunistic tacit collusion."" As we explain, this gaming behavior can take place independently of market power, transmission constraints, or insufficient supply, and is only enhanced by those factors. Price spikes from opportunistic tacit collusion can be expected to appear in any single price auction with price insensitive demand, a property that is typical of many electricity markets. Based on the above analysis, possible remedies are proposed. The attention is given to market design and bidding mechanism. The shortcomings of the current instant bidding rule is studied first and a new bidding rule and the associated market scheme are presented.",xiaohong guan,Power generation economics,2002.0,10.1109/ICPST.2002.1053530,Proceedings. International Conference on Power System Technology,Guan2002,False,,IEEE,Not available,Gaming and price spikes in electric power markets and possible remedies,3c756ba0c51a66f078119bccb96b74f1, 8584,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,Resource allocation,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8585,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,auction game,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8586,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8587,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,Nash equilibrium,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8588,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,efficiency,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8589,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,synchronous algorithm,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8590,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",zou suli,convergence,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8591,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,Resource allocation,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8592,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,auction game,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8593,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,Nash equilibrium,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8594,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,efficiency,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8595,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,synchronous algorithm,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8596,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",ma zhongjing,convergence,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8597,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8598,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,Resource allocation,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8599,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,auction game,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8600,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,Nash equilibrium,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8601,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,efficiency,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8602,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,synchronous algorithm,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8603,"This work focuses on an auction-based scheme that develops a synchronous algorithm for solving resource allocation optimization problems from the perspective of efficiency, i.e. determining an allocation strategy that maximizes the social welfare. These problems are usually computationally and communicatively complex. In view of the competitive fairness with incomplete private information of players under auction games, as well as the incentive compatibility and the existence of efficient Nash Equilibrium (NE) under Vickrey-Clarke-Groves (VCG) mechanisms, we transform the considered resource allocation problems into VCG-style auction-based problems, which enable the derivation of an efficient-simultaneous iteration algorithm. Unlike those asynchronous algorithms, simultaneous updating in population size may bring greater challenges in system stability and convergence. In the proposed algorithm in this paper, each player synchronously updates his best response in an alternative feasible set at each iteration under a demand constraint associated with the submitted bid profile in last iteration. This can guarantee the advantage of monotonous increasing of the social welfare, further the convergence of the synchronous algorithm. Moreover, the system is shown to converge to the efficient NE, which is demonstrated by the numerical results.",liu xiangdong,convergence,2015.0,10.1109/ChiCC.2015.7260054,2015 34th Chinese Control Conference (CCC),Suli2015,False,,IEEE,Not available,Efficient distributed resource allocation under synchronous auction-based algorithm,f059112950a47e7edf78f61c9fa5179c,https://ieeexplore.ieee.org/document/7260054/ 8604,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Game theory,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8605,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Scheduling algorithm,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8606,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Processor scheduling,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8607,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Circuit synthesis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8608,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8609,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Algorithm design and analysis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8610,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Energy consumption,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8611,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Nash equilibrium,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8612,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Portable computers,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8613,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,High performance computing,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8614,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",n. ranganathan,Power system reliability,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8615,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Game theory,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8616,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Scheduling algorithm,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8617,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Processor scheduling,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8618,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8619,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8620,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Algorithm design and analysis,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8621,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Energy consumption,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8622,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8623,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Portable computers,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8624,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,High performance computing,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8625,"In this paper, we describe a new methodology based on game theory for minimizing the average power of a circuit during scheduling in behavioral synthesis. The problem of scheduling in data-path synthesis is formulated as an auction based non-cooperative finite game, for which solutions are developed based on the Nash equilibrium function. Each operation in the data-path is modeled as a player bidding for executing an operation in the given control cycle, with the estimated power consumption as the bid. Also, a combined scheduling and binding algorithm is developed using a similar approach in which the two tasks are modeled together such that the Nash equilibrium function needs to be applied only once to accomplish both the scheduling and binding tasks together. The combined algorithm yields further power reduction due to additional savings during binding. The proposed algorithms yield better power reduction than ILP-based methods with comparable run times and no increase in area overhead.",a.k. murugavel,Power system reliability,2003.0,10.1109/CODESS.2003.1275271,First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721),Ranganathan2003,False,,IEEE,Not available,A low power scheduler using game theory,6604f25ff0a738f8e04ab4318ea2f87d,https://ieeexplore.ieee.org/document/1275271/ 8626,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8627,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8628,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8629,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8630,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8631,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8632,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8633,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8634,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8635,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",mo haghighi,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8636,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8637,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8638,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8639,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8640,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8641,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8642,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8643,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8644,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8645,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",zhijin qin,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8646,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8647,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8648,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8649,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8650,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8651,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8652,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8653,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8654,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8655,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",davide carboni,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8656,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8657,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8658,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8659,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8660,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8661,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8662,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8663,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8664,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8665,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",usman adeel,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8666,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8667,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8668,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8669,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8670,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8671,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8672,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8673,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8674,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8675,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8676,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",fengrui shi,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8677,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,Game theory,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8678,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,IoT,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8679,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,WSN,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8680,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,LPWA,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8681,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,LoRa,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8682,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,Edge,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8683,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,Smart City,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8684,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,Auction,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8685,"Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks make them perfect candidates for smart city applications. LoRa is a new LPWA standard based on spread spectrum technology, which is suitable for sensor nodes enabling long battery life and bi-directional communication but with low data rates. In this paper, we will demonstrate a use-case inspired model in which, end-nodes with multiple radio transceivers (LoRa/WiFi/BLE) have the option to interconnect via multiple networks to improve communications resilience under the diverse conditions of a smart city of a billion devices. To facilitate this, each node has the ability to switch radio communications opportunistically and adaptively, and this is based on the application requirements and dynamic radio parameters.",julie mccann,Utility,2016.0,10.1109/WF-IoT.2016.7845517,2016 IEEE 3rd World Forum on Internet of Things (WF-IoT),Haghighi2016,False,,IEEE,Not available,Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks,57dd6718e6e3d6eccbcce41a04076354,https://ieeexplore.ieee.org/document/7845517/ 8686,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8687,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8688,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8689,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8690,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8691,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8692,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8693,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8694,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8695,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8696,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",ge zhu,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8697,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8698,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8699,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8700,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8701,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8702,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8703,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8704,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8705,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8706,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8707,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",s. sangwan,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8708,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8709,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Procurement,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8710,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Government,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8711,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Multiagent systems,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8712,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Internet,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8713,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,NIST,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8714,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Supply chain management,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8715,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Technological innovation,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8716,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Costs,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8717,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Decision making,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8718,"To solve the problems in government procurement or supply chain management, this paper proposes a multi-attribute online reverse auction mechanism based on multi-attribute decision-making methods, principal-agent theory and online auction technologies. Incentive compatibility constraint is imposed to encourage real weight-setting by bidders. Bargain model and evolutionary learning game are adopted to explain the convergence of the multi-round auction. A multi-attribute online reverse auction mechanism is designed. To implement the method, the architecture based on multi-agent system has been introduced, which includes four agent types. Results show that the mechanism design is incentive compatibility, and it can reduce the moral hazard of principal and risk of winner's curse. Multi-agent system can help to realize intelligent rule-setting and propositional bidder strategies in online procurement auction. In addition, it is pointed that empirical study on the auction mechanism's efficiency and Internet implement are further needed.",tingjie lu,Game theory,2009.0,10.1109/HICSS.2009.306,2009 42nd Hawaii International Conference on System Sciences,Zhu2009,False,,IEEE,Not available,Mechanism Design of Online Multi-Attribute Reverse Auction,fa383cd670700f4cb8f87d9561c1430f,https://ieeexplore.ieee.org/document/4755453/ 8719,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",somanchi sriram,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8720,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Games,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8721,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Investments,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8722,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Supply chains,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8723,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Procurement,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8724,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,System-on-a-chip,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8725,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Biological system modeling,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8726,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Games,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8727,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Investments,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8728,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Supply chains,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8729,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Procurement,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8730,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8731,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,System-on-a-chip,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8732,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Biological system modeling,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 8733,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8734,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8735,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8736,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",zhen kong,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8737,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8738,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8739,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8740,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",cheng-zhong xu,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8741,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8742,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,Wireless mesh networks,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8743,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,resource allocation,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8744,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,auction algorithms,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8745,"We analyze the problem of downlink resource allocation in a non-cooperative multi-level tree topology structured wireless mesh network in which a selfish mesh router (MR) may refuse to relay other MRs' traffic so as to improve its own performance at the cost of overall system performance. Based on game theory, we propose an auction framework, where the parent MR serves as the auctioneer while its children MRs act as bidders and compete for time-slots. We derive a payment function from radio resource used for relaying traffic instead of money, so as to simplify the implementation and avoid the possible security problems from monetary payment. We prove the existence and uniqueness of Nash Equilibrium and propose a stochastic best response updating algorithm to allow the bids to iteratively converge to NE in a practical distributed fashion. Simulation results show the proposed auction algorithm greatly outperforms traditional algorithms in non-cooperative environments.",yu-kwong kwok,game theory,2010.0,10.1109/ICPADS.2010.115,2010 IEEE 16th International Conference on Parallel and Distributed Systems,Kong2010,False,,IEEE,Not available,Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network,d5caea005101e12ab20b28691d8bc13a,https://ieeexplore.ieee.org/document/5695650/ 8746,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Resource management,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8747,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Game theory,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8748,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Grid computing,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8749,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Computational modeling,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8750,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Portals,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8751,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Distributed computing,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8752,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8753,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Cost function,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8754,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Computer science,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8755,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Performance evaluation,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8756,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",s.u. khan,Large-scale systems,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8757,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Resource management,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8758,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Game theory,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8759,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Grid computing,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8760,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Computational modeling,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8761,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Portals,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8762,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Distributed computing,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8763,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8764,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Cost function,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8765,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Computer science,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8766,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Performance evaluation,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8767,"In this paper we consider, compare and analyze three game theoretical grid resource allocation mechanisms. Namely, 1) the non-cooperative sealed-bid method where tasks are auctioned off to the highest bidder, 2) the semi-cooperative n-round sealed-bid method in which each site delegate its work to others if it cannot perform the work itself, and 3) the cooperative method in which all of the sites deliberate with one another to execute all the tasks as efficiently as possible. To experimentally evaluate the above mentioned techniques, we perform extensive simulation studies that effectively encapsulate the task and machine heterogeneity. The tasks are assumed to be independent and bear multiple execution time deadlines. The simulation model is built around a hierarchical grid infrastructure where machines are abstracted into larger computing centers labeled ""federations"", each of which are responsible for managing their own resources independently. These federations are then linked together with a primary portal to which grid tasks would be submitted. To measure the effectiveness of these game theoretical techniques, the recorded performance is evaluated against a conventional baseline method in which tasks are randomly assigned to the sites without any task execution guarantee",i. ahmad,Large-scale systems,2006.0,10.1109/IPDPS.2006.1639358,Proceedings 20th IEEE International Parallel & Distributed Processing Symposium,Khan2006,False,,IEEE,Not available,"Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation",ab9e2c8d5b7b8fad2098792ccb6421f4,https://ieeexplore.ieee.org/document/1639358/ 8768,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Testing,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8769,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Games,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8770,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Fading,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8771,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Channel estimation,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8772,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Prediction algorithms,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8773,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Throughput,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8774,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8775,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",kartik ahuja,Convergence,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8776,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Testing,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8777,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Games,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8778,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Fading,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8779,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Channel estimation,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8780,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Prediction algorithms,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8781,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Throughput,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8782,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",mai hassan,Convergence,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8783,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Testing,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8784,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Games,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8785,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8786,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8787,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Fading,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8788,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Channel estimation,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8789,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Prediction algorithms,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8790,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Throughput,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8791,"In this paper, competition among multiple secondary users (SUs) for spectrum access is modeled as a simultaneous repeated auction. Upon participation in an auction, a SU is charged with an entry fee. However, participation does not ensure an access to the channel. This tradeoff leads it to decide either for or against entering the auction. We consider no cooperation among the SUs, and model this situation as a Bayesian game. A modification of the standard regret testing procedure is proposed to fit our system model. Our proposed procedure converges to Nash equilibrium (NE) of the game. Since this procedure is computationally expensive, we propose a less expensive learning based procedure for the decision taking. We present computer simulation results to compare the average profits and bidding efficiencies over time for the proposed procedure. We also compare their bidding efficiencies to another procedure in the literature, based on second highest bid prediction.",md. hossain,Convergence,2014.0,10.1109/WCNC.2014.6952451,2014 IEEE Wireless Communications and Networking Conference (WCNC),Ahuja2014,False,,IEEE,Not available,To participate or not in spectrum auctions with entry fee: Bayesian game theoretic approach,2fb4371e85eebecad37b0b1aa4681158,https://ieeexplore.ieee.org/document/6952451/ 8792,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Distributed control,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8793,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Control systems,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8794,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Decoding,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8795,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Iterative algorithms,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8796,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Resource management,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8797,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8798,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Algorithm design and analysis,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8799,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Interference,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8800,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Power control,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8801,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Game theory,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8802,"In this paper, we study a distributed resource control problem achieving fairness and information theoretic capacity in an OFDMA system. For practicality, we consider an OFDMA system with incomplete information. The information theoretic MAC capacity region is known to be achieved by successive decoding schemes. Therefore, the problem can be formulated as a stackelberg optimization problem. As a solution of the problem, we provide a distributed game-theoretic resource allocation scheme based on iterative multi-unit second price auction. We prove the algorithm's convergence, stability and optimality through analytic model and simulations.",wonjong noh,Mathematics,2008.0,10.1109/GLOCOM.2008.ECP.798,IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference,Noh2008,False,,IEEE,Not available,A Distributed Resource Control for Fairness in OFDMA Systems: English-Auction Game with Imperfect Information,cb9c3282ba0cc333c1da6d53488249de,https://ieeexplore.ieee.org/document/4698573/ 8803,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",cai ze-su,Multi-robot system,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8804,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",cai ze-su,Pursuit-Evasion game,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8805,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",cai ze-su,Auction Mechanism,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8806,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",sun li-ning,Multi-robot system,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8807,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",sun li-ning,Pursuit-Evasion game,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8808,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8809,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",sun li-ning,Auction Mechanism,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8810,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",gao hai-bo,Multi-robot system,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8811,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",gao hai-bo,Pursuit-Evasion game,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8812,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",gao hai-bo,Auction Mechanism,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8813,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",zhou pu-cheng,Multi-robot system,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8814,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",zhou pu-cheng,Pursuit-Evasion game,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8815,"This paper mainly discusses the pursuit-evasion games, in which a team of autonomous mobile robots act as pursuers to pursue multiple moving targets cooperatively. In order to reduce the communication load during the task negotiation process, the auction mechanism in economics was introduced, and an improved task negotiation process based on multi-unit combinatorial auction was proposed. It allocated task dynamically through capability classification and independent competition. A kind of multi-robot cooperative pursuit algorithm that allows dynamic alliance is proposed. Simulation results show the feasibility and validity of the given algorithm.",zhou pu-cheng,Auction Mechanism,2008.0,10.1109/ISSCAA.2008.4776151,2008 2nd International Symposium on Systems and Control in Aerospace and Astronautics,Ze-Su2008,False,,IEEE,Not available,Multi-robot cooperative pursuit based on Combinatorial Auction mechanism under dynamic environment,03ca3a481b4a4f8cccb4eeb19c662d77,https://ieeexplore.ieee.org/document/4776151/ 8816,"This paper presents a unique fuzzy attitude based bidding strategy (FA-Bid), which employs overall assessment technique, which is combination of assessment of multiple attributes of goods and assessment of agent's attitudes to procure an item in automated auction. The assessment of attributes adapts fuzzy set technique to handle uncertainty of bidding process as well as heuristic rules to determine attitude of agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid.",jun ma,Automated Auctions,2008.0,10.1109/CIMCA.2008.103,2008 International Conference on Computational Intelligence for Modelling Control & Automation,Ma2008,False,,IEEE,Not available,A Fuzzy Bidding Strategy in Automated Auctions Using Agent's Perspective,ad40d57688ffcaff734909a295cc504b,https://ieeexplore.ieee.org/document/5172746/ 8817,"This paper presents a unique fuzzy attitude based bidding strategy (FA-Bid), which employs overall assessment technique, which is combination of assessment of multiple attributes of goods and assessment of agent's attitudes to procure an item in automated auction. The assessment of attributes adapts fuzzy set technique to handle uncertainty of bidding process as well as heuristic rules to determine attitude of agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid.",jun ma,Bidding Strategy,2008.0,10.1109/CIMCA.2008.103,2008 International Conference on Computational Intelligence for Modelling Control & Automation,Ma2008,False,,IEEE,Not available,A Fuzzy Bidding Strategy in Automated Auctions Using Agent's Perspective,ad40d57688ffcaff734909a295cc504b,https://ieeexplore.ieee.org/document/5172746/ 8818,"This paper presents a unique fuzzy attitude based bidding strategy (FA-Bid), which employs overall assessment technique, which is combination of assessment of multiple attributes of goods and assessment of agent's attitudes to procure an item in automated auction. The assessment of attributes adapts fuzzy set technique to handle uncertainty of bidding process as well as heuristic rules to determine attitude of agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid.",madhu goyal,Automated Auctions,2008.0,10.1109/CIMCA.2008.103,2008 International Conference on Computational Intelligence for Modelling Control & Automation,Ma2008,False,,IEEE,Not available,A Fuzzy Bidding Strategy in Automated Auctions Using Agent's Perspective,ad40d57688ffcaff734909a295cc504b,https://ieeexplore.ieee.org/document/5172746/ 8819,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8820,"This paper presents a unique fuzzy attitude based bidding strategy (FA-Bid), which employs overall assessment technique, which is combination of assessment of multiple attributes of goods and assessment of agent's attitudes to procure an item in automated auction. The assessment of attributes adapts fuzzy set technique to handle uncertainty of bidding process as well as heuristic rules to determine attitude of agents in simulated auctions to procure goods. The overall assessment is used to determine a price range based on current bid, which finally selects the best one as the new bid.",madhu goyal,Bidding Strategy,2008.0,10.1109/CIMCA.2008.103,2008 International Conference on Computational Intelligence for Modelling Control & Automation,Ma2008,False,,IEEE,Not available,A Fuzzy Bidding Strategy in Automated Auctions Using Agent's Perspective,ad40d57688ffcaff734909a295cc504b,https://ieeexplore.ieee.org/document/5172746/ 8821,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Modeling,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8822,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Fuzzy logic,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8823,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Software agents,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8824,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Game theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8825,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Stochastic processes,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8826,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Cost accounting,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8827,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Stock markets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8828,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Systems engineering and theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8829,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Fuzzy set theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8830,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",yadati narahari,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8831,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",fang-rui ouyang,Fuzzy sets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8832,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Modeling,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8833,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Fuzzy logic,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8834,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Software agents,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8835,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Game theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8836,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Stochastic processes,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8837,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Cost accounting,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8838,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Stock markets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8839,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Systems engineering and theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8840,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Fuzzy set theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8841,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8842,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",xian-jia wang,Fuzzy sets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8843,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Modeling,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8844,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Fuzzy logic,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8845,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Software agents,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8846,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Game theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8847,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Stochastic processes,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8848,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Cost accounting,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8849,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Stock markets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8850,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Systems engineering and theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8851,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Fuzzy set theory,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8852,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8853,"As the highly autonomous software entity, agent has been used to implement complex systems. This paper develops two different bidding strategies that guide agent's buying and selling behavior in a double auction, and simulates auction market by using the multi-agent development kit and Matlab platforms. Through the comparison of simulation results under those different strategies, we find that the profit of agents using fuzzy logic strategy is more than that of agents using evolution-bidding strategy.",hong yang,Fuzzy sets,2004.0,10.1109/ICMLC.2004.1382075,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Ouyang2004,False,,IEEE,Not available,Agent bidding strategy and simulation in double auctions,243b38b2580a9bb72de85a34795a52c6,https://ieeexplore.ieee.org/document/1382075/ 8854,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,Cognitive radios,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8855,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,cooperative communications,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8856,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,distributed dynamic spectrum leasing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8857,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,dynamic spectrum access,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8858,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,dynamic spectrum sharing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8859,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,auction game,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8860,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",sudharman jayaweera,game theory,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8861,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,Cognitive radios,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8862,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,cooperative communications,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8863,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8864,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,distributed dynamic spectrum leasing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8865,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,dynamic spectrum access,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8866,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,dynamic spectrum sharing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8867,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,auction game,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8868,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",mario bkassiny,game theory,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8869,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,Cognitive radios,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8870,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,cooperative communications,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8871,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,distributed dynamic spectrum leasing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8872,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,dynamic spectrum access,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8873,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,dynamic spectrum sharing,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8874,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhang jiangang,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8875,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,auction game,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8876,"Dynamic spectrum leasing (DSL) was proposed recently as a new paradigm for dynamic spectrum sharing (DSS) in cognitive radio networks (CRN's). In this paper, we propose a new way to encourage primary users to lease their spectrum: The secondary users (SU's) place bids indicating how much power they are willing to spend for relaying the primary signals to their destinations. In this formulation, the primary users achieve power savings due to asymmetric cooperation. We propose and analyze both a centralized and a distributed decision-making architecture for the secondary CRN. In the centralized architecture, a Secondary System Decision Center (SSDC) selects a bid for each primary channel based on optimal channel assignment for SU's. In the decentralized cognitive network architecture, we formulate an auction game-based protocol in which each SU independently places bids for each primary channel and receivers of each primary link pick the bid that will lead to the most power savings. A simple and robust distributed reinforcement learning mechanism is developed to allow the users to revise their bids and to increase their rewards. The performance results show the significant impact of reinforcement learning in both improving spectrum utilization and meeting individual SU performance requirements.",keith avery,game theory,2011.0,10.1109/TWC.2011.061311.102044,IEEE Transactions on Wireless Communications,Jayaweera2011,False,,IEEE,Not available,Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks,700e23500649db4345db65f92ea26295,https://ieeexplore.ieee.org/document/5928484/ 8877,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",hanan al-tous,AF Cooperative Communications,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8878,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",hanan al-tous,OFDMA,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8879,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",hanan al-tous,Resource Allocation,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8880,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",hanan al-tous,Shapley Value,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8881,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",hanan al-tous,One-Shot Auction,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8882,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",imad barhumi,AF Cooperative Communications,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8883,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",imad barhumi,OFDMA,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8884,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",imad barhumi,Resource Allocation,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8885,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8886,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",imad barhumi,Shapley Value,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8887,"An auction-based algorithm is proposed for subcarrier assignment for multiple users amplify and forward (AT) orthogonal frequency division multiple access (OFDMA) system aiming to maximize the fairness index. The proposed algorithm is based on one-shot auction, where each user submits bids for all subcarriers at once based on the Shapley value, a well-known cooperative-game theoretic concept. The user evaluates each subcarrier based on an estimate of the Shapley value using optimal power profiles at the source and relay nodes. The subcarriers are then allocated to the users based on the submitted bids using an iterative algorithm that aims to maximize the fairness index. The system throughput and fairness indices are used to evaluate the performance of the proposed algorithm. Numerical results are used to show the merits of the proposed algorithm.",imad barhumi,One-Shot Auction,2014.0,10.1109/GlobalSIP.2014.7032123,2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP),Al-Tous2014,False,,IEEE,Not available,One-shot auction for resource allocation in AF-OFDMA systems,973e21602919121576c8ced5a03185f9,https://ieeexplore.ieee.org/document/7032123/ 8888,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8889,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8890,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8891,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8892,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8893,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8894,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8895,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8896,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Bid Optimizer,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 8897,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 8898,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8899,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8900,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",jin guanghou,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8901,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8902,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8903,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8904,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8905,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8906,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8907,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8908,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8909,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8910,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8911,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",li gengyin,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8912,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Game theory,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8913,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Power quality,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8914,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Erbium,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8915,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Pollution,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8916,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Environmental management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8917,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Electricity supply industry,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8918,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Power grids,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8919,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Energy management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8920,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",zhu bo,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8921,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Quality management,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8922,"Licensure of emission and charging for electromagnetic pollution are the primary means to manage electromagnetic environment and ensure social equity. Emission right (ER) can be traded freely. ER trading, as an effective means to optimize and distribute resources, is the most common and important item in power quality market (PQM). The key to constitute relevant ER trade rules is how to make rational issue of initial ER to each electromagnetic pollution source, which will have decisive impact on the tendency of power quality (PQ) investment. Game theory searches decisions when players' action directly influences each other. It keeps the equilibrium of these decisions as well. The ER gross calculation, the initial distribution and the trade of ER can be described as different game processes respectively using the theory, which ensures the study of market policy and market players' action accords with actual cases. This paper analyzes and works out the ER gross using incomplete static cooperative game theory, and also proposes the Bayes Nash equilibrium for the optimized distribution of initial ER and high-quality electric energy among market players through uniform-price sealed auction model.",zhou ming,Investments,2004.0,10.1109/ICPST.2004.1460218,"2004 International Conference on Power System Technology, 2004. PowerCon 2004.",Guanghou2004,False,,IEEE,Not available,Application of game theory in power quality market,f8b9cafdb8f8ca3fc2d368963b15e726,https://ieeexplore.ieee.org/document/1460218/ 8923,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Switches,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8924,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Pricing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8925,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Mobile communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8926,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Wireless communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8927,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Games,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8928,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Ad hoc networks,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8929,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",sang jung,Mobile computing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8930,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Switches,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8931,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,stumpage transactions,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8932,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Pricing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8933,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Mobile communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8934,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Wireless communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8935,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Games,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8936,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Ad hoc networks,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8937,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seung yu,Mobile computing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8938,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Switches,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8939,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Pricing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8940,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Mobile communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8941,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Wireless communication,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8942,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,pricing approach,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8943,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Games,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8944,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Ad hoc networks,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8945,"We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs.",seong-lyun kim,Mobile computing,2014.0,10.1109/WIOPT.2014.6850339,"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)",Jung2014,False,,IEEE,Not available,Asymmetric-valued spectrum auction and competition in wireless broadband services,de5ef2b1a218eb9ee062aaa35b0d34fa,https://ieeexplore.ieee.org/document/6850339/ 8946,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",igor stanojev,Information theoretic security,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8947,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",igor stanojev,cooperative jamming,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8948,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",igor stanojev,game theory,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8949,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",igor stanojev,Stackelberg game,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8950,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",igor stanojev,auctions,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8951,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",aylin yener,Information theoretic security,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8952,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",aylin yener,cooperative jamming,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8953,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,Sealed First-price Auction(FPSB),2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8954,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",aylin yener,game theory,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8955,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",aylin yener,Stackelberg game,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8956,"Cooperative jamming paradigm in secure communications enlists network nodes to transmit noise or structured codewords, in order to impair the eavesdropper's ability to decode messages to be kept confidential from it. Such an approach can significantly help in facilitating secure communication between legitimate parties but, by definition, assumes dedicated and/or altruistic nodes willing to act as cooperative jammers. In this paper, it is demonstrated that cooperative jamming leads to meaningful secrecy rate improvements even when this assumption is removed. A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum for their own data traffic. With the goal of maximizing their data transmission rate priced by the invested power, cooperative jammers provide the jamming/transmitting power that is generally proportional to the amount of leased bandwidth. The fully decentralized framework is facilitated through a game-theoretic model, with the legitimate parties as the spectrum owners acting as the game leader, and the set of assisting jammers constituting the follower. To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework.",aylin yener,auctions,2013.0,10.1109/TWC.2012.120412.112001,IEEE Transactions on Wireless Communications,Stanojev2013,False,,IEEE,Not available,Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming,2ebdd7f66d727a4fd15fa396581c17ea,https://ieeexplore.ieee.org/document/6378498/ 8957,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Chromium,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8958,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Frequency,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8959,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Interference,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8960,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,FCC,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8961,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8962,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Radio spectrum management,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8963,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Switches,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8964,"At first, this paper shows the situation of the stumpage transactions in China, and according to the characteristics of the stumpage products and a variety of auctions, it uses the theory of the Sealed First-price Auction to show the structure of stumpage markets and the game analysis of two Bidders. Secondly, this paper establishes the auction pricing model to analyze the bidders' strategies, uses Bayesian-Nash Equilibrium in stumpage market transactions to price the stumpage products, and endues the sale price of the deal applying Sealed First-price Auction theory. Finally it has solved the problem that the current pricing methods are not suitable in the process of stumpage product on the move.",huang yingli,game and equilibrium analysis,2010.0,10.1109/ESIAT.2010.5567203,2010 The 2nd Conference on Environmental Science and Information Application Technology,Jiangang2010,False,,IEEE,Not available,Sealed First-price Auction pricing approach in the application of stumpage markets,1981279dfa17ee843e5d11118af20097,https://ieeexplore.ieee.org/document/5567203/ 8965,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Temperature,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8966,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,Channel allocation,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8967,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",sung chun,US Government,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8968,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Chromium,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8969,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Frequency,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8970,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Interference,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8971,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,FCC,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8972,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8973,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Radio spectrum management,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8974,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Switches,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8975,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,Power trading,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 8976,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Temperature,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8977,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,Channel allocation,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8978,"We examine the problem of designing an auction mechanism for dynamic spectrum sharing when there are multiple sellers and multiple buyers. First, we study the interaction among homogeneous buyers of spectrum as a noncooperative game and show the existence of a symmetric mixed-strategy Nash equilibrium (SMSNE). Second, we prove that there exists an incentive for risk neutral sellers of the spectrum to cooperate to maximize their expected profits at the SMSNEs of buyers' noncooperative game. Finally, we model the interaction among the sellers as a cooperative game and demonstrate that the core of the cooperative game is nonempty. This indicates that there exists a way for the sellers to share the profits in a such manner that no subset of sellers will deviate from cooperating with the remaining sellers.",richard la,US Government,2009.0,10.1109/GAMENETS.2009.5137438,2009 International Conference on Game Theory for Networks,Chun2009,False,,IEEE,Not available,Auction mechanism for spectrum allocation and profit sharing,e36f7225375234be41366c71b09cd8de,https://ieeexplore.ieee.org/document/5137438/ 8979,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,c. kloeck,Auction Sequence,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8980,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,c. kloeck,Radio Resource Management,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8981,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,d. grandblaise,Auction Sequence,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8982,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,d. grandblaise,Radio Resource Management,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8983,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,j. luo,Auction Sequence,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8984,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,j. luo,Radio Resource Management,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8985,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,g. dimitrakopoulos,Auction Sequence,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8986,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,auction game,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 8987,This paper describes the resource exchange between all important interfaces of a communication system using an auction sequence. Differences between the different mechanisms are shown and implementation concepts are presented,g. dimitrakopoulos,Radio Resource Management,2006.0,10.1109/MELCON.2006.1653170,MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference,Kloeck2006,False,,IEEE,Not available,Multi-level spectrum auction through radio access,cfc434b91bc109912b9d06dd0c0ff7d1,https://ieeexplore.ieee.org/document/1653170/ 8988,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",hossein khazaei,Multiple equilibria,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8989,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",hossein khazaei,equilibrium selection,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8990,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",hossein khazaei,game theory,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8991,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",hossein khazaei,financial transmission right,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8992,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",moein sabounchi,Multiple equilibria,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8993,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",moein sabounchi,equilibrium selection,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8994,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",moein sabounchi,game theory,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8995,"Existence of Multiple equilibria in electricity markets, especially financial transmission right (FTR) auctions is the main cause of ambiguity in the markets' outcomes because in such situations, players do not have an efficient tool to deal with. In this paper, we introduce a new criterion for equilibrium selection in infinite games based on two new concepts of `value' and `chance'. These two are dependent concepts which are chosen carefully to reflect the role of expected payoff and risk of one strategy in measuring the players' incentives. The aforementioned method is then, applied on a FTR auction with two players on a three node test system.",moein sabounchi,financial transmission right,2014.0,10.1109/POWERI.2014.7117770,2014 6th IEEE Power India International Conference (PIICON),Khazaei2014,False,,IEEE,Not available,A new method for equilibrium selection in financial transmission right's auctions,aa8fbc5e4e3ecfe93700e56fb850a4e8,https://ieeexplore.ieee.org/document/7117770/ 8996,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Resource management,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 8997,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,power control,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 8998,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Virtualization,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 8999,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Virtual machine monitors,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9000,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Mobile communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9001,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Communication channels,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9002,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Games,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9003,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bo fan,Wireless communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9004,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Resource management,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9005,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Virtualization,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9006,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Virtual machine monitors,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9007,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Mobile communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9008,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9009,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,energy efficiency,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9010,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Communication channels,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9011,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Games,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9012,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",hui tian,Wireless communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9013,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Resource management,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9014,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Virtualization,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9015,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Virtual machine monitors,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9016,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Mobile communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9017,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Communication channels,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9018,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Games,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9019,"Network virtualization is considered a promising solution to the gradual ossification of current wireless networks. This paper proposes a two-stage power allocation scheme in LTE air interface virtualization where radio resources are coordinated by a hypervisor among different virtual operators (VOs). In the first stage, VCG auction game is utilized to generate an initial allocation. In the game, VOs are modeled as bidders bidding for power resources on behalf of their users while hypervisor is modeled as the auctioneer. In the second stage, Shapley value in coalition game is introduced to adjust the initial power allocation. The adjustment is made according to users' rate requirements to guarantee a fair allocation among users of different VOs. Simulation proves our scheme can balance between the energy efficiency and users' rate requirements compared with two conventional schemes.",bin liu,Wireless communication,2015.0,10.1109/WCNC.2015.7127601,2015 IEEE Wireless Communications and Networking Conference (WCNC),Fan2015,False,,IEEE,Not available,Game theory based power allocation in LTE air interface virtualization,4f7b7bdb795747ed3aa00c7ae687dd61,https://ieeexplore.ieee.org/document/7127601/ 9020,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,economic cost,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9021,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",a. borghetti,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9022,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",a. borghetti,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9023,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",a. borghetti,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9024,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",a. borghetti,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9025,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",f. silvestro,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9026,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",f. silvestro,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9027,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",f. silvestro,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9028,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",f. silvestro,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9029,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",s. massucco,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9030,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",s. massucco,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9031,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sithamparanathan kandeepan,price power profile,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9032,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",s. massucco,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9033,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",s. massucco,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9034,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",l. meini,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9035,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",l. meini,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9036,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",l. meini,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9037,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",l. meini,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9038,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",c. nucci,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9039,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",c. nucci,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9040,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",c. nucci,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9041,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",c. nucci,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9042,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,Power trading,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9043,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",m. paolone,Electricity Market,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9044,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",m. paolone,Bidding Strategies,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9045,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",m. paolone,Game Theory,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9046,"The paper focuses on bidding selection mechanisms based both on offer price and electricity-quantity strategies. The aim of the paper is to present a procedure that allows the use of both game theory and of detailed cost-based unit-commitment computer codes. The procedure is conceived in a way to be as much as possible independent of the specific market rules. The results of a preliminary analysis are shown, concerning simple test cases that incorporate some distinctive characteristics of electricity markets and power plants.",m. paolone,Unit Commitment,2005.0,10.1109/PTC.2005.4524726,2005 IEEE Russia Power Tech,Borghetti2005,False,,IEEE,Not available,Bidding strategy selection in a day-ahead electricity auction system,673b6b87904a668b23c6e5d3f5785f5b,https://ieeexplore.ieee.org/document/4524726/ 9047,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",zhu ji,Ad Hoc Network,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9048,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",zhu ji,Pricing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9049,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",zhu ji,Game Theory,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9050,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",zhu ji,Routing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9051,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",wei yu,Ad Hoc Network,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9052,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",wei yu,Pricing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9053,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,auction game,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9054,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",wei yu,Game Theory,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9055,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",wei yu,Routing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9056,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",k.j. liu,Ad Hoc Network,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9057,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",k.j. liu,Pricing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9058,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",k.j. liu,Game Theory,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9059,"In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or honestly revealing its private information, cannot be directly assumed. The pricing mechanism is one way to provide incentives for the users to act cooperatively by awarding some payment for cooperative behaviors. In this paper, we consider efficient routing in self-organized MANETs and model it as multi-stage dynamic pricing games. A game theoretical framework for dynamic pricing-based routing in MANETs is proposed to maximize the sender/receiveriquests payoff by considering the dynamic nature of MANETs. Meanwhile, the forwarding incentives of the relay nodes can also be maintained by optimally pricing their packet-forwarding services based on the auction rules and introducing the cartel maintenance enforcing mechanism. The simulation results illustrate that the proposed dynamic pricing-based routing approach has significant performance gains over the existing static pricing approaches.",k.j. liu,Routing,2008.0,10.1109/JSAC.2008.080917,IEEE Journal on Selected Areas in Communications,Ji2008,False,,IEEE,Not available,A game theoretical framework for dynamic pricing-based routing in self-organized MANETs,db8665ccecb75ac121e932de54765991,https://ieeexplore.ieee.org/document/4604745/ 9060,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Games,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9061,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Game theory,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9062,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Vectors,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9063,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Cognitive radio,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9064,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,power control,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9065,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Jamming,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9066,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Stochastic processes,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9067,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",mohammad alavijeh,Educational institutions,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9068,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Games,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9069,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Game theory,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9070,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Vectors,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9071,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Cognitive radio,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9072,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Jamming,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9073,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Stochastic processes,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9074,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",behrouz maham,Educational institutions,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9075,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,energy efficiency,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9076,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Games,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9077,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Game theory,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9078,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Vectors,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9079,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Cognitive radio,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9080,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Jamming,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9081,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Stochastic processes,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9082,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",zhu han,Educational institutions,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9083,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Games,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9084,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Game theory,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9085,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Vectors,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9086,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,economic cost,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9087,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Cognitive radio,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9088,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Jamming,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9089,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Stochastic processes,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9090,"One of the most significant challenges in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against the jamming attack, providing the security defense is also challenging. In this paper, we investigate a dynamic stochastic medium consisting of some selfish secondary users and a malicious user. Each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. We design a truthful game amongst the secondary users. Furthermore, we propose a zero sum game between the whole set of secondary users and the malicious user. We prove that this problem can be converted to the randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. This solution can be changed to a trustful distributed fashion. Finally, simulation results show that the distributed algorithm with much less complexity has almost similar performances to the centralized one.",said nader-esfahani,Educational institutions,2013.0,10.1109/ICC.2013.6654966,2013 IEEE International Conference on Communications (ICC),Alavijeh2013,False,,IEEE,Not available,Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks,ed0e13a951e98bf0b16165d6d9e9fb61,https://ieeexplore.ieee.org/document/6654966/ 9091,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9092,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9093,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9094,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9095,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9096,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9097,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",sudharman jayaweera,price power profile,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9098,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9099,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9100,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9101,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",danak danak,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9102,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9103,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9104,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9105,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9106,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9107,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9108,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,Power trading,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9109,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9110,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9111,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9112,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",rahimi-kian rahimi-kian,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9113,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Wireless sensor networks,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9114,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Intelligent sensors,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9115,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Quality of service,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9116,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Game theory,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9117,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Sensor phenomena and characterization,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9118,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Technology management,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9119,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9120,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,auction game,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9121,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Network topology,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9122,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Intelligent agent,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9123,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Mobile communication,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9124,"As an emerging technology, many researches have been focused on enhancing sensor networks in the recent years. For improving the quality of service, researchers have concentrated on the notion of mobility as a means to change the network topology. Considering each node as an intelligent agent, and using the concepts of the theory of auctions, this paper introduces a novel game theoretical approach to the sensor management problem. By obviating unnecessary communication among the nodes, and offering task changing capability to them the new method addresses more network compatibility to uncertain tasks",moshiri moshiri,Data processing,2006.0,10.1109/PERSER.2006.1652233,2006 ACS/IEEE International Conference on Pervasive Services,Danak2006,False,,IEEE,Not available,Management of Wireless Sensor Networks Using the Theory of Auctions,88f7249163a3aa99309b26d3dea46a88,https://ieeexplore.ieee.org/document/1652233/ 9125,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Servers,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9126,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Heuristic algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9127,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Cognitive radio,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9128,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Resource management,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9129,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Games,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9130,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Dynamic scheduling,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9131,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,power control,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9132,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",guangen wu,Signal processing algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9133,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Servers,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9134,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Heuristic algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9135,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Cognitive radio,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9136,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Resource management,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9137,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Games,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9138,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Dynamic scheduling,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9139,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",pinyi ren,Signal processing algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9140,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Servers,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9141,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Heuristic algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9142,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,energy efficiency,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9143,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Cognitive radio,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9144,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Resource management,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9145,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Games,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9146,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Dynamic scheduling,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9147,"Auction based dynamic spectrum access is an efficient approach to solve the spectrum shortage problem. However, conventional spectrum auction algorithms mainly concentrated on maximizing the revenue, under which the dynamic spectrum access (DSA) users with poorer cognitive abilities are usually hard to win the auction for spectrum access. In this paper, we propose a novel waiting-time auction (WTA) algorithm to improve the winning probabilities for the DSA users with poorer cognitive abilities. Specifically, we formulate the spectrum allocation as an auction game. In the auction, all game users bid with waiting time to obtain the spectrum access opportunities, unlike the conventional approaches where users bid by using money. Correspondingly, users with poorer cognitive ability, usually having the lower time cost, can win the auction with higher probabilities through bidding longer waiting time. We prove that there exists a unique Nash equilibrium (NE) in the WTA based spectrum-allocation game and the NE is desirable for all game users. Both theoretical and simulation analyses show that our proposed WTA algorithm can effective improve the winning probabilities of users with lower cognitive abilities.",chao zhang,Signal processing algorithms,2011.0,10.1109/GLOCOM.2011.6133796,2011 IEEE Global Telecommunications Conference - GLOBECOM 2011,Wu2011,False,,IEEE,Not available,A Waiting-Time Auction Based Dynamic Spectrum Allocation Algorithm in Cognitive Radio Networks,325091beb8e5b8fe7fb190a2e4fce513,https://ieeexplore.ieee.org/document/6133796/ 9148,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",y. wu,Cognitive radio,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9149,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",y. wu,spectrum auction,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9150,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",y. wu,collusion resistant mechanism,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9151,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",y. wu,scalable algorithm,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9152,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",b. wang,Cognitive radio,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9153,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,economic cost,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9154,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",b. wang,spectrum auction,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9155,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",b. wang,collusion resistant mechanism,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9156,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",b. wang,scalable algorithm,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9157,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",k. liu,Cognitive radio,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9158,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",k. liu,spectrum auction,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9159,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",k. liu,collusion resistant mechanism,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9160,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",k. liu,scalable algorithm,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9161,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",t. clancy,Cognitive radio,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9162,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",t. clancy,spectrum auction,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9163,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",t. clancy,collusion resistant mechanism,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9164,"Managing the power resource in battery operated wireless devices is very crucial for extending the lifetime, here we propose the concept of power trading in wireless communications. We present a business model using sealed bid procurement auction based game theory for power-trading in cooperative wireless communication with quality of service (QoS) constraints. We formulate the problem as an auction in a buyer's market sequentially/repeatedly played with a single source and a multiple relay network. The source, in-need of cooperation of a relay due to lack of battery power to communicate with the destination, broadcasts a cooperation-request specifying its QoS requirements. The QoS that we consider here are the bit error rate and the total delay associated with relaying the source data. The relays respond with their bids in terms of Euros/bit, and the source selects the best relay based on the bids. The relays compete with each other to win the game and profit from power trading. Each relay updates its pricing index via reinforcement learning to win the game during successive bidding intervals of the repeated game. Based on this model our results show that the relay node with the best features such as a better wireless channel and a better geographical position with respect to the source and destination nodes has a better chance of winning the game, and hence giving rise to a dominant strategy. More importantly, we show that the gains from the wireless channels can be converted into economic profits which is an attractive feature of the proposed business model for power trading.",riccardo fedrizzi,price power profile,2012.0,10.1109/TWC.2012.030812.111350,IEEE Transactions on Wireless Communications,Kandeepan2012,False,,IEEE,Not available,Power-Trading in Wireless Communications: A Cooperative Networking Business Model,825818ec2f0495313dd60f67db34a298,https://ieeexplore.ieee.org/document/6168196/ 9165,"Dynamic spectrum access (DSA), enabled by cognitive radio technologies, has become a promising approach to improve efficiency in spectrum utilization, and the spectrum auction is one important DSA approach, in which secondary users lease some unused bands from primary users. However, spectrum auctions are different from existing auctions studied by economists, because spectrum resources are interference-limited rather than quantity-limited, and it is possible to award one band to multiple secondary users with negligible mutual interference. To accommodate this special feature in wireless communications, in this paper, we present a novel multi-winner spectrum auction game not existing in auction literature. As secondary users may be selfish in nature and tend to be dishonest in pursuit of higher profits, we develop effective mechanisms to suppress their dishonest/collusive behaviors when secondary users distort their valuations about spectrum resources and interference relationships. Moreover, in order to make the proposed game scalable when the size of problem grows, the semi-definite programming (SDP) relaxation is applied to reduce the complexity significantly. Finally, simulation results are presented to evaluate the proposed auction mechanisms, and demonstrate the complexity reduction as well.",t. clancy,scalable algorithm,2009.0,10.1109/TCOMM.2009.12.080578,IEEE Transactions on Communications,Wu2009,False,,IEEE,Not available,A scalable collusion-resistant multi-winner cognitive spectrum auction game,a8a5308230e27c93c3b528973e94722f,https://ieeexplore.ieee.org/document/5351676/ 9166,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",amitav mukherjee,Auction Theory,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9167,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",amitav mukherjee,Cooperative Diversity,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9168,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",amitav mukherjee,Partner Selection,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9169,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",hyuck kwon,Auction Theory,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9170,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",hyuck kwon,Cooperative Diversity,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9171,"Cooperative diversity is a form of distributed spatial diversity achieved by cooperative communication among mobile users in cellular or wireless data networks. The problem of selecting suitable partners for a cooperative strategy is more complex when prospective partners have links of dissimilar quality to a central destination, leading to the possibility of non- reciprocal cooperation. We analyze self-configuring cooperative wireless networks under conditions of minimal topology and channel link information available to users. For such cases, a robust auction-theoretic mechanism is proposed for the selection of single as well as multiple simultaneous cooperative partners. We characterize equilibrium strategies and revenue for the single-unit second-price auction and its extension, the multi-unit Vickrey auction, under conditions of uncertainty in the number of bidders requesting cooperation. The proposed auction- theoretic selection scheme is shown to be a revenue-maximizing decentralized solution for QoS delivery in cooperative wireless systems.",hyuck kwon,Partner Selection,2007.0,10.1109/ACSSC.2007.4487249,"2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers",Mukherjee2007,False,,IEEE,Not available,Robust Auction-Theoretic Partner Selection in Cooperative Diversity Wireless Networks,6b7a2ad8f20b462d204750f1a80bc9f3,https://ieeexplore.ieee.org/document/4487249/ 9172,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Energy transfer,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9173,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,cooperative communications,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9174,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Stackelberg games,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9175,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Mobile communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9176,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Vickrey auction,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9177,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,two-hop relay networks,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9178,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Energy transfer,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9179,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,cooperative communications,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9180,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Stackelberg games,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9181,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,Vickrey auction,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9182,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",burak varan,two-hop relay networks,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9183,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Energy transfer,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9184,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,cooperative communications,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9185,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Stackelberg games,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9186,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Game theory,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9187,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Vickrey auction,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9188,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,two-hop relay networks,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9189,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Energy transfer,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9190,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,cooperative communications,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9191,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Stackelberg games,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9192,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,Vickrey auction,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9193,"We consider a two-hop wireless network where the source(s) in the network have the ability to wirelessly power the relay(s) who also have their own data to send to the destination. Considering the fact that each node in the network aims to maximize its own metric, we adopt a game theoretic approach that foresees offering relaying of the sources' data in exchange for energy provided to the relays, and simultaneously offering energy to the relays in exchange for their relaying services. We first study a Stackelberg competition with the single relay node as the leader, and investigate the impact of having multiple source nodes in the system. We next study the reciprocal Stackelberg game with the single source as the leader, and investigate the inter-relay competition with multiple relays. We find that in the Stackelberg games, the leader can improve its individual utility by influencing the follower's decision accordingly, even more so when there are multiple followers. We next formulate a noncooperative game between the source and the relay and show the existence of a unique Nash equilibrium by an appropriate pricing mechanism. The equilibrium maximizes the total utility of the network and allows the destination to choose how much data to receive from each node.",aylin yener,two-hop relay networks,2015.0,10.1109/JSAC.2015.2481279,IEEE Journal on Selected Areas in Communications,Varan2015,False,,IEEE,Not available,Incentivizing Signal and Energy Cooperation in Wireless Networks,3c5aaaef8d13491bb164877b0400b169,https://ieeexplore.ieee.org/document/7274650/ 9194,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Dynamical bandwidth allocation,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9195,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Wireless,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9196,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Control system,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9197,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Resource management,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9198,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Decentralized Auction,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9199,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Game theory,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9200,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",suwatchai kamonsantiroj,Mechanism design,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9201,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Dynamical bandwidth allocation,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9202,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Wireless,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9203,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Control system,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9204,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Decentralized Auction,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9205,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Game theory,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9206,"Applications of control systems on wireless networks have been widely utilized due to their mobility. However, many Wireless Networked Control Systems (WNCS) may not cooperate with each other in order to share a limited amount of network bandwidth. Consequently, these agents may manipulate the resource in their own benefit and selfish behavior. Nevertheless, existing dynamic allocation methods may not lead to equilibrium of all network-based control system satisfactions. This paper presents a decentralized auction-based dynamic bandwidth allocation methodology based on mechanism design and game theory to allocate bandwidths of WNCS which enforces WNCS on the same network to request a bandwidth with actual requirement. The proposed mechanism results has proofed an actual bandwidth requirement is the dominant strategy and the exceed bandwidth requirement cannot provide the higher utility than the actual bandwidth requirement. The total utility is the solutions of maximized social welfare.",luepol pipanmekaporn,Mechanism design,2014.0,10.1109/IIAI-AAI.2014.91,2014 IIAI 3rd International Conference on Advanced Applied Informatics,Kamonsantiroj2014,False,,IEEE,Not available,Decentralized Auction-Based Bandwidth Allocation in a Wireless Networked Control Systems,8fdd3c8d7629fb988e07145a8593c16b,https://ieeexplore.ieee.org/document/6913335/ 9207,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Bandwidth,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9208,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Data processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9209,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Resource management,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9210,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Nash equilibrium,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9211,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Cost accounting,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9212,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Game theory,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9213,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Communication networks,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9214,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",rahul jain,Robustness,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9215,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Bandwidth,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9216,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Resource management,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9217,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Nash equilibrium,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9218,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Cost accounting,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9219,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Bayesian methods,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9220,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Game theory,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9221,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Communication networks,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9222,"We propose a mechanism for auctioning bundles of multiple divisible goods. Such a mechanism is very useful for allocation of bandwidth in a network where the buyers want the same amount of bandwidth on each link in their route. We allow for buyers to specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple routes. We first propose a single-sided VCG- type mechanism. However, instead of reporting their valuation functions, the players only reveal a two-dimensional bid signal - the maximum quantity that they want and the per unit price they are willing to pay. The proposed mechanism is a weak Nash-implementation, i.e., it has a non-unique Nash equilibrium that implements the social-welfare maximizing allocation. We show the existence of an efficient Nash equilibrium in the corresponding auction game. We show through an example that there are other Nash equilibria that are not efficient. Further, we provide a sufficient characterization of all efficient Nash equilibria. We then generalize this to buyers getting arbitrary amounts of various goods. This require each buyer to submit a bid separately for each good but their utility function a general function of allocations of various divisible goods. Then, we present a double-sided auction mechanism for multiple divisible goods with buyers and sellers. We show that there exists a Nash equilibrium of this auction game which yields the efficient allocation.",jean walrand,Robustness,2008.0,10.1109/NOMSW.2007.38,NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops,Jain2008,False,,IEEE,Not available,An Efficient Mechanism for Network Bandwidth Auction,6ef1f927671e134b9737b5a24be92c71,https://ieeexplore.ieee.org/document/4509954/ 9223,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",mehdi adian,Cooperative Cognitive Radio Networks,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9224,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",mehdi adian,Spectrum Leasing,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9225,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",mehdi adian,Auction Theory,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9226,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",hassan aghaeinia,Cooperative Cognitive Radio Networks,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9227,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",hassan aghaeinia,Spectrum Leasing,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9228,"The problem of resource allocation in a spectrum leasing scenario in Cooperative Cognitive Radio Networks (CCRN) is addressed, in this work. The system model consists of a number of primary user (PU) pairs and a secondary user (SU) pair. We propose a solution for resource allocation problem in the spectrum leasing scenario. More specifically, we determine when is beneficial for a PU to lease its unused spectrum portion to SU and how much of PU's resource is optimum to be leased. The SU is supposed to cooperate with PUs by relaying the PUs' signals, in return. Besides, the optimum allocated cooperating power of SU to relay each PU's signals is determined. An efficient auction mechanism is proposed and the existence of the Nash Equilibrium (NE) for the proposed auction game is proved.",hassan aghaeinia,Auction Theory,2012.0,10.1109/IranianCEE.2012.6292551,20th Iranian Conference on Electrical Engineering (ICEE2012),Adian2012,False,,IEEE,Not available,Spectrum leasing in cooperative cognitive radio networks: An auction-based approach,c2b0498161561b8d95f220a2ba239787,https://ieeexplore.ieee.org/document/6292551/ 9229,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9230,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9231,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Wireless networks,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9232,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9233,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9234,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9235,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9236,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",sebastian kruse,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9237,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9238,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9239,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9240,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9241,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9242,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Spread spectrum communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9243,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",alexandra brintrup,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9244,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9245,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9246,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9247,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9248,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9249,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",duncan mcfarlane,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9250,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9251,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9252,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9253,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",khajonpong akkarajitsakul,Distributed processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9254,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9255,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9256,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",tomas lopez,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9257,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9258,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9259,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9260,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9261,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9262,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",kenneth owens,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9263,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,Dutch auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9264,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Mobile communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9265,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,imperfectly substitutable goods,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9266,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,intelligent products,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9267,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,multiagent systems,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9268,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,service supply chain,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9269,"Self-serving assets (SSAs) are a new interpretation of the intelligent product technology, set to transform product lifecycle management through automation. SSAs are engineering assets that autonomously monitor their health and expiry dates, search for suppliers, and negotiate with them, while they are still in use by the customer. The concept enables more timely and transparent supplier decision making while eliminating central database transactions and tedious manual effort. Autonomous self-interested agents that act on behalf of their stakeholders naturally give rise to an allocation problem, under the assumption of private information held by trade parties and capacity constrained suppliers providing imperfectly substitutable goods (ISGs). In this paper, we develop and compare three automated competition mechanisms, constructed as iterative games, and test them in the context of the aerospace service supply chain. The competition mechanisms include a prioritized selection mechanism, extended Vickrey, and reverse Dutch auctions. Our context drives us to seek mechanisms that will not only perform well in terms of economic theory, but also in terms of computational performance. Key findings are that extended Vickrey auctions can handle multiple criteria and provide higher market efficiency at lower computational cost, especially in small to medium markets. As scalability is an issue in large markets, the use of auctions is recommended only for complex high value assets or under uncertain market scenarios. As business-to-business (B2B) environments are becoming the norm for many global companies, our study aims to be exemplary to those who would like to implement automated auction mechanisms in highly complex environments.",william krechel,Vickrey auctions,2013.0,10.1109/TCIAIG.2012.2222406,IEEE Transactions on Computational Intelligence and AI in Games,Kruse2013,False,,IEEE,Not available,Designing Automated Allocation Mechanisms for Service Procurement of Imperfectly Substitutable Services,dde84070e2845131d7066d6e397f2699,https://ieeexplore.ieee.org/document/6320688/ 9270,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Protocols,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9271,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Servers,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9272,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Cryptography,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9273,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Games,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9274,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Game theory,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9275,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Game theory,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9276,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Polynomials,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9277,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",tham siong,Field-flow fractionation,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9278,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Protocols,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9279,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Servers,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9280,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Cryptography,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9281,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Games,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9282,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Game theory,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9283,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Polynomials,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9284,"Vickrey auction has its comparative advantages [1] in economic perspectives. In second price sealed-bid auction, bidderspsila bidding strategies are not affected by closing method. In a first-price auction, bidders always bid below their values. In year 2007, author proposed one round first price anonymous auction protocol [2] to solve the tie problem in one round auction. This paper is to extend the one round anonymous auction protocol from first price to second price auction protocol.",chang cheng,Field-flow fractionation,2008.0,10.1109/ITSIM.2008.4631977,2008 International Symposium on Information Technology,Siong2008,False,,IEEE,Not available,Design and analysis of one round anonymous second price auction protocol,885dd5b86ddf75d4bb23b08355873f5b,https://ieeexplore.ieee.org/document/4631977/ 9285,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",amir danak,Grid computing,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9286,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Resource management,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9287,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",amir danak,resource allocation,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9288,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",amir danak,dynamic game theory,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9289,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",amir danak,repeated games,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9290,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",amir danak,auction theory.,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9291,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",shie mannor,Grid computing,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9292,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",shie mannor,resource allocation,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9293,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",shie mannor,dynamic game theory,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9294,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",shie mannor,repeated games,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9295,"We analyze rational strategies of users in a dynamic grid market. We consider efficient usage of the shared resources in modeling users' preference relations, an objective that prevents congestion and consequently the collapse of the grid system. A repeated auction-based allocation protocol is presented for sharing the computational grid resources. We present a utility-maximizing bidding algorithm and illustrate the transient and long-term attitudes of users in an equilibrium of the dynamic resource-allocation game. It is shown that efficient bidding improves the long-term profits of the grid users.",shie mannor,auction theory.,2011.0,10.1109/TPDS.2011.29,IEEE Transactions on Parallel and Distributed Systems,Danak2011,False,,IEEE,Not available,Efficient Bidding in Dynamic Grid Markets,cef3721c50ad026039357e6c1aeed748,https://ieeexplore.ieee.org/document/5871254/ 9296,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Auction,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9297,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Data processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9298,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Game theory,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9299,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Offloading,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9300,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Heterogeneous networks,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9301,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Switching off,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9302,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Base station cooperation,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9303,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",alexandra bousia,Energy efficiency,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9304,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Auction,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9305,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Game theory,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9306,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Offloading,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9307,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Heterogeneous networks,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9308,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Bayesian methods,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9309,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Switching off,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9310,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Base station cooperation,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9311,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",elli kartsakli,Energy efficiency,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9312,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Auction,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9313,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Game theory,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9314,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Offloading,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9315,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Heterogeneous networks,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9316,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Switching off,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9317,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Base station cooperation,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9318,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",angelos antonopoulos,Energy efficiency,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9319,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Wireless networks,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9320,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Auction,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9321,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Game theory,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9322,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Offloading,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9323,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Heterogeneous networks,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9324,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Switching off,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9325,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Base station cooperation,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9326,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",luis alonso,Energy efficiency,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9327,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Auction,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9328,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Game theory,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9329,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Offloading,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9330,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Spread spectrum communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9331,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Heterogeneous networks,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9332,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Switching off,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9333,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Base station cooperation,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9334,"The emerging traffic demand has triggered an impressive deployment of network infrastructure, including macro Base Stations (BSs) and Small Cells (SCs), leading to increased energy consumption and expenditures. However, the network underutilization during low traffic periods (e.g., night zone) enables the Mobile Network Operators (MNOs) to save energy by having their traffic served by third-party SCs, thus being able to switch off their BSs. In this paper, we propose a novel market approach to foster the opportunistic utilization of unexploited SCs capacity, where the MNOs lease the resources of third-party SCs and deactivate their BSs. Motivated by the conflicting interests of the MNOs and the restricted capacity of the SCs that is not adequate to carry the whole traffic in multi-operator scenarios, we introduce a combinatorial auction framework, which includes: i) a bidding strategy, ii) a resource allocation scheme, and iii) a pricing rule. We propose a multiobjective framework to provide an energy efficient solution for the resource allocation problem and we provide extensive analytical and experimental results to estimate the potential energy savings.",christos verikoukis,Energy efficiency,2016.0,10.1109/EuCNC.2016.7561058,2016 European Conference on Networks and Communications (EuCNC),Bousia2016,False,,IEEE,Not available,Auction-based offloading for base station switching off in Heterogeneous Networks,1cb08e6d7da07f666fc1565f0a77ad3d,https://ieeexplore.ieee.org/document/7561058/ 9335,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",xingyu shi,Divisible resource sharing,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9336,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",xingyu shi,progressive second price auction,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9337,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",xingyu shi,sequential iterative algorithm,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9338,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",xingyu shi,convergence,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9339,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",xingyu shi,efficient Nash equilibrium,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9340,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",suli zou,Divisible resource sharing,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9341,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9342,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",ekram hossain,Distributed processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9343,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",suli zou,progressive second price auction,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9344,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",suli zou,sequential iterative algorithm,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9345,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",suli zou,convergence,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9346,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",suli zou,efficient Nash equilibrium,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9347,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",zhongjing ma,Divisible resource sharing,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9348,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",zhongjing ma,progressive second price auction,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9349,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",zhongjing ma,sequential iterative algorithm,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9350,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",zhongjing ma,convergence,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9351,"In this paper we study the auction games for the allocation of divisible resources under the progressive second price mechanism under which the incentive compatibility holds, i.e., the truth-telling bid strategy is the best response of individual players under this mechanism. We design a novel dynamic process for the underlying PSP auction games following which the system will converge to the Nash equilibrium. More specifically, instead of directly updating individuals best response successively, proposed by Lazar and Semret, under which the convergence may not hold, we define an update policy to determine which player is allowed to update his best response in next update step, and assign an upper limit of the resource quantity which can be submitted by this player; then following the proposed update mechanism and under certain mild conditions, the auction system can converge to a Nash equilibrium which is demonstrated with numerical examples.",zhongjing ma,efficient Nash equilibrium,2014.0,10.1109/CCDC.2014.6852447,The 26th Chinese Control and Decision Conference (2014 CCDC),Shi2014,False,,IEEE,Not available,A novel algorithm for divisible resource allocations under PSP auction mechanism,97b44dee0f225c1639ad793cb13be1a9,https://ieeexplore.ieee.org/document/6852447/ 9352,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9353,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Mobile communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9354,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9355,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9356,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9357,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9358,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9359,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9360,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9361,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9362,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9363,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9364,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Game theory,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9365,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9366,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9367,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9368,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 9369,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",x. zhou,cooperation partner,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9370,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",x. zhou,double auction,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9371,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",x. zhou,favor degree,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9372,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",x. zhou,Multi-agent,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9373,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",z. bao,cooperation partner,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9374,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",z. bao,double auction,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9375,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Resource management,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9376,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",z. bao,favor degree,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9377,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",z. bao,Multi-agent,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9378,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",y. zhao,cooperation partner,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9379,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",y. zhao,double auction,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9380,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",y. zhao,favor degree,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9381,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",y. zhao,Multi-agent,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9382,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",w. wang,cooperation partner,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9383,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",w. wang,double auction,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9384,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",w. wang,favor degree,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9385,"In some systems, running after a period of time, agents form cooperation partnership. However, there are two problems in the bidding strategy of double auction between cooperative agents. Firstly, the auctioneer or bidder can't make an effective response to the pricing program while the opposite changes itself strategy. Secondly, because of incomplete information, the bargain efficiency is low in equilibrium. Aimed at these problems, a conception of favor degree is presented from the views of both auctioneer and bidder, and it is used to simulate the stimulation of nerve cells. This paper brings forward a novel bidding strategy of double auction based on the favor degree, which makes the two agents call for the long-term interests rather than immediate interests. So this strategy enlarges the trading range and improves the trading efficiency. Finally, the validity of the model is proved by a case.",w. wang,Multi-agent,2009.0,10.1109/ICIEEM.2009.5344275,2009 16th International Conference on Industrial Engineering and Engineering Management,Zhou2009,False,,IEEE,Not available,A bidding strategy between agents based on double auction,b81b8f79f01084b5f7a0a5290bd3119c,https://ieeexplore.ieee.org/document/5344275/ 9386,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Data processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9387,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",zhongjing ma,Deregulated electricity market,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9388,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",zhongjing ma,Hierarchical allication,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9389,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",zhongjing ma,PSP auction mechanism,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9390,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",zhongjing ma,Efficient allocation,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9391,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",zhongjing ma,Nash equilibrium,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9392,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",yingying cui,Deregulated electricity market,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9393,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",yingying cui,Hierarchical allication,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9394,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",yingying cui,PSP auction mechanism,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9395,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",yingying cui,Efficient allocation,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9396,"In hierarchical electricity market, the retailers buy electricity from generation provider and then sell it to users. Retailers play an important role in the distribution channel by matching supply and demand, but they also potentially cause inefficiencies in electricity allocation. To induce an efficient allocation of electricity, we propose a novel hierarchical distributed method under PSP auction mechanism. Under this mechanism, each of players, either the generation provider or the retailers, obtains their electricity allocation through the PSP auction method by submitting a multi-dimensional bid profile, instead of telling their private cost or valuation function, then the retailers economically distribute the electricity, acquired in the PSP auction, among users. Moreover, the valuation function of retailers depends on the revenues that they sell the electricity to users. As a main result, in this paper we show that there exists an efficient Nash equilibrium (NE) for the underlying auction games.",yingying cui,Nash equilibrium,2014.0,10.1109/CCDC.2014.6852545,The 26th Chinese Control and Decision Conference (2014 CCDC),Ma2014,False,,IEEE,Not available,Optimal hierarchical allocation in deregulated electricity market under PSP auction mechanism,6ee60e9c01af8ca821f5c7720e593ef6,https://ieeexplore.ieee.org/document/6852545/ 9397,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Bayesian methods,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9398,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9399,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9400,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9401,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",tianyi qu,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9402,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9403,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9404,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9405,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",nan zhao,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9406,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9407,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9408,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Wireless networks,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9409,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9410,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",hongxi yin,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9411,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,cognitive radio,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9412,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,interference alignment,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9413,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,spectrum sharing,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9414,"In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile the time resource can be reasonably distributed. Simulation results are presented to show the effectiveness of the proposed scheme.",f. yu,game theory,2012.0,10.1109/ICCT.2012.6511190,2012 IEEE 14th International Conference on Communication Technology,Qu2012,False,,IEEE,Not available,Interference alignment for overlay cognitive radio based on game theory,4b5950a53db832753e2c7f6455c1c0a2,https://ieeexplore.ieee.org/document/6511190/ 9415,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",chaoping guo,Game theory,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9416,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",chaoping guo,mechanism design,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9417,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",chaoping guo,routing,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9418,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",kun han,Game theory,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9419,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Spread spectrum communication,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9420,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",kun han,mechanism design,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9421,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",kun han,routing,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9422,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",hailin zhang,Game theory,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9423,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",hailin zhang,mechanism design,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9424,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",hailin zhang,routing,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9425,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",yongzhao li,Game theory,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9426,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",yongzhao li,mechanism design,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9427,"The paper considers the problem of joint assignment of bandwidth and route in multi-path selfish networks. We model this problem as auction game and make mechanism design. The model is a convex optimization problem, and large computation overhead is needed to resolve it. We make theoretical analysis and present two algorithms to resolve the model. One is hybrid water filling assignment algorithm for non-linear cost function, and the other is Least-Cost-Path-based assignment algorithm for linear cost function. Extensive evaluations show that these two algorithm can decrease computation overhead and the second also decrease the total cost of participant nodes.",yongzhao li,routing,2011.0,10.1109/ICUFN.2011.5949134,2011 Third International Conference on Ubiquitous and Future Networks (ICUFN),Guo2011,False,,IEEE,Not available,Auction-based bandwidth assignment for multi-path routing in selfish networks,b768bc5a82c38fdafa6193d4c63c6351,https://ieeexplore.ieee.org/document/5949134/ 9428,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Resource management,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9429,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Optimization,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9430,"A wireless network allows multiple nodes to share a set of available resources for data transmission. The nodes can either compete or cooperate with each other to achieve their individual objectives or a group objective. Game theory is a mathematical tool developed to understand the situations of conflict among rational entities. In this article, we consider the applications of game theory to address the problem of distributed radio resource allocation in wireless networks under uncertainty, where an individual wireless node has to make a decision without having complete information about the other nodes in the network. In particular, a noncooperative game model with incomplete information is our focus. First, different approaches to solve the distributed radio resource allocation problem under uncertainty are reviewed. Then different game theoretic approaches to resource allocation in wireless networks and related work in the literature are presented. Application of a Bayesian game is then discussed to solve the distributed resource allocation problem. To this end, we provide an example to illustrate the application of a Bayesian game-theoretic model to solve the distributed bandwidth sharing problem among multiple mobile nodes competing for the shared bandwidth from a wireless access point. In this case, a mobile node is unable to completely observe other mobile nodes' behavior (e.g., speed of movement, bandwidth demand). A distributed algorithm is proposed to obtain the bidding strategy of the mobile nodes for bandwidth auction in this game model. The Bayesian Nash equilibrium is considered as the solution of this game.",dusit niyato,Distributed processing,2011.0,10.1109/MCOM.2011.5978425,IEEE Communications Magazine,Akkarajitsakul2011,False,,IEEE,Not available,Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game,60ebae2f26c892b85f0add5943437354,https://ieeexplore.ieee.org/document/5978425/ 9431,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Batteries,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9432,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Games,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9433,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Nash equilibrium,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9434,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Electric vehicles,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9435,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",zhongjing ma,Electronic mail,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9436,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Resource management,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9437,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Optimization,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9438,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Batteries,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9439,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Games,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9440,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Nash equilibrium,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9441,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9442,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Electric vehicles,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9443,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",suli zou,Electronic mail,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9444,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Resource management,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9445,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Optimization,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9446,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Batteries,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9447,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Games,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9448,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Nash equilibrium,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9449,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Electric vehicles,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9450,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",xiangdong liu,Electronic mail,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9451,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Resource management,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9452,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9453,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9454,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Optimization,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9455,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Batteries,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9456,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Games,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9457,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Nash equilibrium,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9458,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Electric vehicles,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9459,"An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.",ian hiskens,Electronic mail,2015.0,10.1109/ACC.2015.7171793,2015 American Control Conference (ACC),Ma2015,False,,IEEE,Not available,Efficient coordination of electric vehicle charging using a progressive second price auction,23e24d25358c53769c78c688431debc6,https://ieeexplore.ieee.org/document/7171793/ 9460,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",renato leme,game theory,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9461,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",renato leme,price of anarchy,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9462,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",renato leme,GSP,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9463,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",renato leme,Sponsored Search Auction,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9464,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9465,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",eva tardos,game theory,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9466,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",eva tardos,price of anarchy,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9467,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",eva tardos,GSP,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9468,"The Generalized Second Price Auction has been the main mechanism used by search companies to auction positions for advertisements on search pages. In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full information setting, socially optimal Nash equilibria are known to exist (i.e., the Price of Stability is 1). This paper is the first to prove bounds on the price of anarchy, and to give any bounds in the Bayesian setting. Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated strategies. In the full information setting we prove a bound of 1.618 for the price of anarchy for pure Nash equilibria, and a bound of 4 for mixed Nash equilibria. We also prove a bound of 8 for the price of anarchy in the Bayesian setting, when valuations are drawn independently, and the valuation is known only to the bidder and only the distributions used are common knowledge. Our proof exhibits a combinatorial structure of Nash equilibria and uses this structure to bound the price of anarchy. While establishing the structure is simple in the case of pure and mixed Nash equilibria, the extension to the Bayesian setting requires the use of novel combinatorial techniques that can be of independent interest.",eva tardos,Sponsored Search Auction,2010.0,10.1109/FOCS.2010.75,2010 IEEE 51st Annual Symposium on Foundations of Computer Science,Leme2010,False,,IEEE,Not available,Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction,e029e070cea1fc594d992be74ec2b4ce,https://ieeexplore.ieee.org/document/5671346/ 9469,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Licenses,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9470,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Performance analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9471,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Computational modeling,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9472,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,FCC,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9473,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Information analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9474,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Impedance,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9475,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9476,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Clocks,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9477,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Mechanical factors,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9478,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Environmental economics,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9479,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",william sharkey,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9480,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Licenses,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9481,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Performance analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9482,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Computational modeling,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9483,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,FCC,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9484,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Information analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9485,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Impedance,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9486,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",e. amadi,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9487,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Clocks,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9488,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Mechanical factors,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9489,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Environmental economics,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9490,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",fernando beltran,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9491,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Licenses,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9492,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Performance analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9493,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Computational modeling,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9494,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,FCC,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9495,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Information analysis,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9496,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Impedance,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9497,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9498,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Clocks,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9499,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Mechanical factors,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9500,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Environmental economics,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9501,"This paper employs simulation methods to evaluate the ability of three different auction mechanisms to determine an efficient license regime for radio spectrum as well as the efficient ownership of the associated rights. The two regimes explored are ldquolicensedrdquo spectrum, in which a winning bidder maintains exclusive rights to use the spectrum, subject only to technical restrictions, and ldquonon-licensedrdquo spectrum, in which multiple users are able to share spectrum on an open access basis. For each auction, we examine bidder incentives and provide detailed reports on both auction revenue and bidder surplus in a set of Nash equilibrium outcomes. Results are consistent with the preliminary conclusions of Bykowsky et al. (2008), that a market can be used to allocate spectrum between licensed and unlicensed use. When there is a clear market preference for either licensed or unlicensed use, all three auction mechanisms arrive at efficient outcomes. However, in the absence of such a preference, a first-price auction appears to be the preferred mechanism.",mark bykowsky,Nash equilibrium,2009.0,10.1109/GAMENETS.2009.5137437,2009 International Conference on Game Theory for Networks,Sharkey2009,False,,IEEE,Not available,Computational analysis of an auction for licensed and unlicensed use of spectrum,2bd1c7bd47cce785be4a6ec79a939c34,https://ieeexplore.ieee.org/document/5137437/ 9502,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",luo lijuan,network selection,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9503,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",luo lijuan,real-time business,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9504,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",luo lijuan,game theory,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9505,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",luo lijuan,auction,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9506,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",lv tingjie,network selection,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9507,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",lv tingjie,real-time business,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9508,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9509,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",lv tingjie,game theory,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9510,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",lv tingjie,auction,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9511,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",chen xia,network selection,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9512,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",chen xia,real-time business,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9513,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",chen xia,game theory,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9514,"In the framework of heterogeneous wireless networks, it is diffcult for every user to obtain QoS-based services anywhere at any time. Due to heterogeneous networks, the dynamic network selection scheme needs to achieve seamless mobility, and also supports the optimization of service quality and load balancing. According to different business characteristics, this paper describes different real-time businesses in utility functions, and solves network selection problems for real-time businesses. Based on auction mechanism, it introduces the upset price in order to maximize online profts. Meanwhile, the network selection scheme is also helpful to control network congestion. The study of real-time business network selection based on auction mechanism can not only meet the demands of service quality of multiple realtime applications, but also achieves load balancing between different networks.",chen xia,auction,2014.0,10.1109/CC.2014.6825267,China Communications,Lijuan2014,False,,IEEE,Not available,Real-time business network selection based on auction mechanism,67aef91069f4a42792d115dc0ee169db, 9515,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",saeed alaei,Auction Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9516,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",saeed alaei,Mechanism Design,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9517,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",saeed alaei,Algorithmic Game Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9518,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",saeed alaei,Anonymous Pricing,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9519,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9520,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",jason hartline,Auction Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9521,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",jason hartline,Mechanism Design,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9522,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",jason hartline,Algorithmic Game Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9523,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",jason hartline,Anonymous Pricing,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9524,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",rad niazadeh,Auction Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9525,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",rad niazadeh,Mechanism Design,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9526,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",rad niazadeh,Algorithmic Game Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9527,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",rad niazadeh,Anonymous Pricing,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9528,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",emmanouil pountourakis,Auction Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9529,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",emmanouil pountourakis,Mechanism Design,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9530,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9531,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",emmanouil pountourakis,Algorithmic Game Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9532,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",emmanouil pountourakis,Anonymous Pricing,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9533,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",yang yuan,Auction Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9534,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",yang yuan,Mechanism Design,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9535,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",yang yuan,Algorithmic Game Theory,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9536,"For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Rough garden showed that the approximation factor of the second-price auction with an anonymous reserve is between two and four. We consider the more demanding problem of approximating the revenue of the ex ante relaxation of the auction problem by posting an anonymous price (while supplies last) and prove that their worst-case ratio is e. As a corollary, the upper-bound of anonymous pricing or anonymous reserves versus the optimal auction improves from four to e. We conclude that, up to an e factor, discrimination and simultaneity are unimportant for driving revenue in single-item auctions.",yang yuan,Anonymous Pricing,2015.0,10.1109/FOCS.2015.92,2015 IEEE 56th Annual Symposium on Foundations of Computer Science,Alaei2015,False,,IEEE,Not available,Optimal Auctions vs. Anonymous Pricing,7691ab961a54a50816a1f8083ccc9575,https://ieeexplore.ieee.org/document/7354466/ 9537,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",chenkun tsung,Nash Equilibrium,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9538,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",chenkun tsung,local search procedure,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9539,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",chenkun tsung,combinatorial auction,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9540,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",chenkun tsung,winner determination problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9541,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",g. eheduru,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9542,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",chenkun tsung,NP-complete problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9543,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",hannjang ho,Nash Equilibrium,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9544,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",hannjang ho,local search procedure,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9545,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",hannjang ho,combinatorial auction,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9546,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",hannjang ho,winner determination problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9547,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",hannjang ho,NP-complete problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9548,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",singling lee,Nash Equilibrium,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9549,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",singling lee,local search procedure,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9550,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",singling lee,combinatorial auction,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9551,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",singling lee,winner determination problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9552,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9553,"Determining winners in combinatorial auctions is an NP-complete problem. Based on the idea of searching Nash Equilibria (NE), this paper presents a local search procedure to determine winners. To improve the solution quality calculated by the local search, we propose Nash Equilibrium Search Approach (NESA) to probe various NE solutions. According to the simulation results, auctioneer's revenue in NESA is at least 1.08% and 9.10% more than that in a general GA and Casanova, respectively. A stable solution based on NESA will be obtained within 400 seconds. Moreover, simulation results show that the solution quality of NESA is near-optimal.",singling lee,NP-complete problem,2011.0,10.1109/ISPA.2011.13,2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications,Tsung2011,False,,IEEE,Not available,An Equilibrium-Based Approach for Determining Winners in Combinatorial Auctions,26891a4a760c54bc6e09b6e0bdf6c0d1,https://ieeexplore.ieee.org/document/5951881/ 9554,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Games,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9555,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Pricing,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9556,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Equations,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9557,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Internet,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9558,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,IEEE Communications Society,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9559,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Optimization,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9560,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pei li,Nash equilibrium,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9561,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Games,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9562,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Pricing,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9563,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9564,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9565,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Equations,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9566,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Internet,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9567,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,IEEE Communications Society,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9568,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Optimization,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9569,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",kai xing,Nash equilibrium,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9570,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Games,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9571,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Pricing,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9572,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Equations,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9573,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Internet,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9574,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,IEEE Communications Society,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9575,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9576,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Optimization,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9577,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",hui wang,Nash equilibrium,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9578,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Games,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9579,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Pricing,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9580,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Equations,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9581,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Internet,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9582,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,IEEE Communications Society,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9583,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Optimization,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9584,"Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private APs under the awareness of the growing popularity of private wireless access points (APs) and the increasing attention on their potential of being used to provide network service to public users. We formulate this problem as a novel network pricing game as a single-user multi-AP location-dependent reverse auction. Our theoretical study has identified the unique characteristics of the support structure of the pricing game in single AP and two-AP scenarios, and further propose the optimal strategy to reach the equilibrium under both special and general multi-AP scenarios. The the correctness, effectiveness, and economic properties of the results have been validated in both theoretical analysis and numerical study.",pengyi fan,Nash equilibrium,2011.0,10.1109/icc.2011.5963189,2011 IEEE International Conference on Communications (ICC),Li2011,False,,IEEE,Not available,Tussle between APs in a Pricing Game: A Location-Dependent Multi-AP Reverse Auction,23e7e5356a8fea3a2985d3a1d6388bb2,https://ieeexplore.ieee.org/document/5963189/ 9585,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,Auctions,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9586,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9587,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,average reward stochastic games,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9588,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,competitive Markov decision processes (CMDPs),2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9589,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,deregulated electricity markets,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9590,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,market power,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9591,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",vishnuteja nanduri,reinforcement learning (RL),2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9592,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,Auctions,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9593,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,average reward stochastic games,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9594,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,competitive Markov decision processes (CMDPs),2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9595,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,deregulated electricity markets,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9596,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,market power,2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9597,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",f. eze,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9598,"Auctions serve as a primary pricing mechanism in various market segments of a deregulated power industry. In day-ahead (DA) energy markets, strategies such as uniform price, discriminatory, and second-price uniform auctions result in different price settlements and thus offer different levels of market power. In this paper, we present a nonzero sum stochastic game theoretic model and a reinforcement learning (RL)-based solution framework that allow assessment of market power in DA markets. Since there are no available methods to obtain exact analytical solutions of stochastic games, an RL-based approach is utilized, which offers a computationally viable tool to obtain approximate solutions. These solutions provide effective bidding strategies for the DA market participants. The market powers associated with the bidding strategies are calculated using well-known indexes like Herfindahl-Hirschmann index and Lerner index and two new indices, quantity modulated price index (QMPI) and revenue-based market power index (RMPI), which are developed in this paper. The proposed RL-based methodology is tested on a sample network",tapas das,reinforcement learning (RL),2007.0,10.1109/TPWRS.2006.888977,IEEE Transactions on Power Systems,Nanduri2007,False,,IEEE,Not available,A Reinforcement Learning Model to Assess Market Power Under Auction-Based Energy Pricing,cdbf5d58de86e401a15c33f00c3751a6,https://ieeexplore.ieee.org/document/4077130/ 9599,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",wenyuan tang,Network economics,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9600,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",wenyuan tang,mechanism design,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9601,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",wenyuan tang,auctions,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9602,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",wenyuan tang,hierarchical models,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9603,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",wenyuan tang,resource allocation,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9604,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",rahul jain,Network economics,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9605,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",rahul jain,mechanism design,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9606,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",rahul jain,auctions,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9607,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",rahul jain,hierarchical models,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9608,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9609,"Motivated by allocation of bandwidth, wireless spectrum and cloud computing services in secondary network markets, we introduce a hierarchical auction model for network resource allocation. A Tier 1 provider owns a homogeneous network resource and holds an auction to allocate this resource among Tier 2 operators, who in turn allocate the acquired resource among Tier 3 entities. The Tier 2 operators play the role of middlemen, since their utilities for the resource depend on the revenues gained from resale. We first consider static hierarchical auction mechanisms for indivisible resources. We study a class of mechanisms wherein each sub-mechanism is either a first-price or VCG auction, and show that incentive compatibility and efficiency cannot be simultaneously achieved. We also briefly discuss sequential auctions as well as the incomplete information setting. We then propose two VCG-type hierarchical mechanisms for divisible resources. The first one is composed of single-sided auctions at each tier, while the second one employs double-sided auctions at all tiers except Tier 1. Both mechanisms induce an efficient Nash equilibrium.",rahul jain,resource allocation,2012.0,10.1109/JSAC.2012.121204,IEEE Journal on Selected Areas in Communications,Tang2012,False,,IEEE,Not available,Hierarchical Auction Mechanisms for Network Resource Allocation,8aa66d20e79017a64b91edb3bb47c0ef,https://ieeexplore.ieee.org/document/6354270/ 9610,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9611,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9612,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9613,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9614,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9615,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9616,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9617,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9618,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9619,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9620,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wang peng,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9621,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9622,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9623,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9624,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9625,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9626,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9627,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9628,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9629,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9630,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9631,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",wu yan-hong,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9632,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9633,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9634,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9635,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9636,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9637,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9638,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9639,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9640,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9641,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9642,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",yang hua-chun,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9643,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power markets,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9644,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Contracts,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9645,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation economics,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9646,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9647,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Game theory,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9648,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power generation planning,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9649,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Helium,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9650,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Power engineering and energy,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9651,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Resource management,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9652,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",c. ikerionwu,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9653,"In the power generation market, the long-term contract is one of the common and important choices of power generation company and transaction center to pursue benefits and evade risks. In this paper, in virtue of the resource allocation means in the economic activities, the means of forming a long-term contract is categorized into 3 classes; appointment means, negotiation means and bidding (sealed auction) means. This dissertation adopts such concepts as Bayes equilibrium of incorporative game theory, discusses the rational conditions of contract price formation in the negotiation means, and lays an important foundation for the transactions and supervision of such contract patterns.",he ren-mu,Investments,2002.0,10.1109/ICPST.2002.1067844,Proceedings. International Conference on Power System Technology,Peng2002,False,,IEEE,Not available,Bayes equilibrium on negotiation means transaction of the power market long-term contract,329c64538db10860747e587684020288,https://ieeexplore.ieee.org/document/1067844/ 9654,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Game theory,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9655,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Electronic commerce,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9656,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Humans,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9657,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Educational institutions,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9658,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Pricing,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9659,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Software agents,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9660,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Contracts,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9661,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Mirrors,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9662,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",frank guerin,Arm,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9663,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Game theory,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9664,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Game theory,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9665,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Electronic commerce,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9666,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Humans,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9667,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Educational institutions,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9668,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Pricing,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9669,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Software agents,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9670,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Contracts,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9671,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Mirrors,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9672,"Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are common knowledge among the agents. For example, in an auction where truthful bidding is an equilibrium strategy, unless this is common knowledge, it may not be rational for an agent to bid truthfully. It is currently not clear how this state of common knowledge can be achieved, especially in open agent societies where agents may encounter previously unseen auction specifications. We need a method for communicating the rules of the game to the agents, and the agents need to be able to determine its properties. We present a machine-readable language in which the rules of the game can be written. We show that it is not feasible for an agent to determine the properties of any arbitrary specification, unless information about the properties is communicated and/or certain restrictions are placed on the specification. We look at two special cases where common knowledge is achievable: auctions with identical players where the two highest bidders determine the price, and Groves mechanisms with a restriction on the pricing rule.",emmanuel tadjouddine,Arm,2006.0,10.1109/IAT.2006.106,2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology,Guerin2006,False,,IEEE,Not available,Realising Common Knowledge Assumptions in Agent Auctions,8ecdbac73c48af672a19850d0b3d5173,https://ieeexplore.ieee.org/document/4052980/ 9673,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9674,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",harold martin,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9675,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Zero-sum game,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9676,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9677,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9678,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9679,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9680,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9681,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9682,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9683,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9684,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",jing huang,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9685,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9686,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Attacker,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9687,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9688,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9689,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9690,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9691,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9692,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9693,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9694,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9695,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",da-you liu,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9696,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Internet,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9697,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Defender,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9698,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Electronic commerce,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9699,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Mobile agents,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9700,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Business,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9701,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Grid computing,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9702,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Educational institutions,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9703,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Computer science,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9704,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Application software,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9705,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Paper technology,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9706,"Auction is a typical commercial activity. Online autonomous auction based on agent is a rising research field in electronic commerce and has a broad application foreground. Most researches focus on the mechanisms and strategies of auction but neglect the study of other key issues in building online autonomous auction system, such as locating the auction hall and the cooperation between trade partners. So the paper investigates these questions based on mobile agent technology and game theory. In the paper an autonomous online auction model is brought forward and implemented, which supports two auction mechanisms of first price sealed-bid auction and double auction, and the linear bidding strategy of the two auction mechanisms is also given.",bo yang,Game theory,2004.0,10.1109/ICMLC.2004.1380617,Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826),Huang2004,False,,IEEE,Not available,Online autonomous auction model based on agent,1ce5a4ffc68c60ae485c59dbebb5597f,https://ieeexplore.ieee.org/document/1380617/ 9707,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,uplink MU-MIMO,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9708,"Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.",k. okafor,Linear Programming,2017.0,10.1109/KBEI.2017.8324996,2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),Amadi2017,False,,IEEE,Not available,Anti-DDoS firewall; A zero-sum mitigation game model for distributed denial of service attack using Linear programming,168a0701e6c003dc0c1e11bcbf371e89,https://ieeexplore.ieee.org/document/8324996/ 9709,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,dynamic traffic,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9710,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,distributed,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9711,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,access point selection,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9712,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,scheduling,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9713,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,auction game,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9714,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,pricing,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9715,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,strategy-proofness,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9716,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,utility maximization,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9717,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,social welfare maximization,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9718,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,throughput,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9719,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Electricity supply industry,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9720,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",mengjie xie,load balancing,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9721,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,uplink MU-MIMO,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9722,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,dynamic traffic,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9723,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,distributed,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9724,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,access point selection,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9725,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,scheduling,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9726,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,auction game,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9727,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,pricing,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9728,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,strategy-proofness,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9729,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,utility maximization,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9730,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Optimization,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9731,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,social welfare maximization,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9732,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,throughput,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9733,"We study the uplink multi-user multiple-input multiple-output (UL MU-MIMO) channel in a wireless local area network (WLAN) with multiple access points (APs) and multiple stations (STAs). APs are allocated with different orthogonal frequency-division multiplexing (OFDM) subcarriers. Each AP has multiple antennas and applies zero-forcing successive interference cancellation (ZF-SIC) as in [1] for spatial multiplexing in its own MU-MIMO channel. STAs arrive and depart dynamically. The joint AP selection and STA scheduling problem is modeled as an auction game. STAs perform AP selection to maximize their utility, which is a function of the expected rate, the valuation and the price charged by APs. APs schedule STAs to maximize the social welfare and set price to ensure truthful revelation of STAs' valuation. The auction is conducted in a distributed fashion and requires subtle information exchange. Shown by the simulation, the proposed mechanism has superior performance in respect of social welfare, throughput and load balancing.",tat lok,load balancing,2016.0,10.1109/ICC.2016.7510766,2016 IEEE International Conference on Communications (ICC),Xie2016,False,,IEEE,Not available,Access point selection and auction-based scheduling in uplink MU-MIMO WLANs,55b8edc25cd9a6ac3276c14dd3090e06,https://ieeexplore.ieee.org/document/7510766/ 9734,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",gang wang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 9735,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",peizhen liu,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 9736,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",zhao yang,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 9737,"Mobile data offloading through third-party Femtocell access points (FAPs) is an emerging technology which is used to alleviate congestion in cellular network. We propose a distributed algorithm that combines college admissions game with auction theory to achieve the maximum social welfare of offloading and guarantee the Quality of service (QoS) of Mobile users (MUs). As the optimal problem is NP-hard, the college admissions game is developed to solve the sub-problem of matching between FAPs and MUs. The Second revenue sealed-bid auction with a reserve price (SRSARP) algorithm is developed to solve another sub-problem of matching between Wireless operators (WOs) and FAPs. The simulation results reveal that the distributed algorithm we proposed achieves the performance very close to that of the centralized method and significantly better than those of the random and Maxprice algorithms.",rui xue,,2018.0,10.1049/cje.2017.09.001,Chinese Journal of Electronics,Wang2018,False,,IEEE,Not available,Joint College Admissions Game and Auction Theory for Data Offloading in Heterogeneous Networks,1bd9977c83786264e2ea4ac7274686b6, 9738,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",wee tan,auction,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9739,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",wee tan,pricing,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9740,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",wee tan,Cloud,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9741,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Games,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9742,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",wee tan,bandwidth,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9743,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",wee tan,game theory,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9744,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",dinil divakaran,auction,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9745,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",dinil divakaran,pricing,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9746,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",dinil divakaran,Cloud,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9747,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",dinil divakaran,bandwidth,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9748,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",dinil divakaran,game theory,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9749,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",mohan gurusamy,auction,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9750,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",mohan gurusamy,pricing,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9751,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",mohan gurusamy,Cloud,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9752,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Power supplies,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9753,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",mohan gurusamy,bandwidth,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9754,"With the ubiquitous adoption of Cloud services by both companies and consumers alike, lack of an efficient system to explicitly price and allocate limited bandwidth has severely impacted the performance of Cloud user-applications. In this context, we consider a two-tier pricing model - consisting of Reservation Phase and Dynamic Phase - that caters to the needs of different kinds of applications. While the Reservation Phase can be used by Cloud users to obtain guarantees on minimum bandwidth well ahead in time, Dynamic Phase can be used to demand and obtain (possibly) additional bandwidth dynamically. Bandwidth being a limited resource, we develop a unique multi-stage uniform price auction with supply uncertainty to dynamically allocate bandwidth to users in the Dynamic Phase. We study the proposed model using a game theoretical approach. Our results prove that proposed auction mechanism is a promising approach for bandwidth allocation. We show that the model promotes the dual advantage of market efficiency and maximum revenue for the Cloud provider. We also demonstrate the price stability using numerical simulations. We argue that for rational, payoff-maximizing tenants of Cloud, the price is stable over the long run which makes the mechanism suitable for practical use.",mohan gurusamy,game theory,2014.0,10.1109/ICC.2014.6883772,2014 IEEE International Conference on Communications (ICC),Tan2014,False,,IEEE,Not available,Uniform price auction for allocation of dynamic cloud bandwidth,fbab66376427c585b01b9953e7afd3a7,https://ieeexplore.ieee.org/document/6883772/ 9755,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Maintenance,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9756,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Nash equilibrium,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9757,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Student members,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9758,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Power generation,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9759,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Electricity supply industry,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9760,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Large-scale systems,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9761,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,System testing,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9762,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-h. kim,Dynamic scheduling,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9763,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Tools,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9764,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Maintenance,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9765,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Nash equilibrium,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9766,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Student members,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9767,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Power generation,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9768,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Electricity supply industry,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9769,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Large-scale systems,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9770,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,System testing,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9771,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-b. park,Dynamic scheduling,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9772,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Maintenance,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9773,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Nash equilibrium,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9774,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Procurement,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9775,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Student members,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9776,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Power generation,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9777,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Electricity supply industry,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9778,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Large-scale systems,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9779,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,System testing,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9780,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",j.-k. park,Dynamic scheduling,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9781,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Maintenance,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9782,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Nash equilibrium,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9783,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Student members,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9784,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Power generation,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9785,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Microgrids,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9786,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",orcun karaca,Game theory,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9787,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Electricity supply industry,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9788,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Large-scale systems,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9789,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,System testing,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9790,"In this paper, a new approach to maintenance scheduling of generating units (MSU) in competitive electricity markets is presented. The main contribution of this study can be focused on modeling a game-theoretic framework for the MSU problem to analyze strategic behaviors of generating companies (Gencos). The MSU problem is formulated as a dynamic noncooperative game with complete information. The player corresponds to the profit maximizing individual Genco, and the payoff of each player is defined as the profit from the energy auction market. The optimal strategy profile is defined by the Nash equilibrium of the game. Numerical results for two-Genco systems are used to demonstrate the basic ideas of the proposed scheme, and large-scale IEEE reliability test systems are also considered to show the applicability of the proposed framework. The results obtained indicate that maintenance schedule can be one of the crucial strategic behaviors whereby Genco maximizes his profit in a competitive market environment.",b.h. kim,Dynamic scheduling,2003.0,10.1109/PES.2003.1270380,2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491),Kim2003,False,,IEEE,Not available,A new game-theoretic framework for maintenance strategy analysis,3e10a8bb096203d59067c8b3d55dd23f, 9791,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Nash equilibrium,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9792,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Costs,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9793,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Electricity supply industry,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9794,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Power generation,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9795,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Power system modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9796,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Counting circuits,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9797,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Electricity supply industry,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9798,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Game theory,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9799,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Terminology,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9800,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",y.s. son,Load modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9801,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Nash equilibrium,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9802,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Costs,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9803,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Electricity supply industry,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9804,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Power generation,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9805,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Power system modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9806,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Counting circuits,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9807,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Game theory,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9808,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Optimization,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9809,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Terminology,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9810,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",r. baldick,Load modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9811,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Nash equilibrium,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9812,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Costs,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9813,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Electricity supply industry,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9814,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Power generation,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9815,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Power system modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9816,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Counting circuits,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9817,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Game theory,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9818,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Terminology,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9819,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Games,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9820,"We reanalyze a bilateral electricity market model, previously presented in , where suppliers own multiple generators. We clarify some implicit assumptions in the model and prove that, under one detailed specification of the assumptions, the previously suggested Nash equilibria for the model are inconsistent with the definition of Nash equilibrium. We discuss the implications and comment on the relationship to multiple unit auction theory.",s. siddiqi,Load modeling,2004.0,10.1109/TPWRS.2004.825932,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,"Reanalysis of ""Nash equilibrium bidding strategies in a bilateral electricity market""",b575f2ae6cde009728784dfb14c986aa,https://ieeexplore.ieee.org/document/1295039/ 9821,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",xu zhaoye,physical layer security,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9822,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",xu zhaoye,beamforming,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9823,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",xu zhaoye,stackelberg equilibrium,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9824,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",lu ruimin,physical layer security,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9825,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",lu ruimin,beamforming,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9826,"To improve the physical layer security in the wireless communication network with an eavesdropper and a friendly jammer, this paper make use of beamforming to aim the jamming signal's main lobe to the eavesdropper and to diminish the jamming signal to the destination node, improving the efficiency of jamming power usage. On this basis, we propose a power auction model, in which we regard the source node as the buyer and the destination node as the seller and build corresponding utility function respectively. Then by using a distributed algorithm, Stackelberg equilibrium can be reached, maximizing the system utility and obtaining the corresponding secrecy capacity.",lu ruimin,stackelberg equilibrium,2017.0,10.1109/EIIS.2017.8298616,2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS),Zhaoye2017,False,,IEEE,Not available,Stackelberg game in physical security when friendly jammers using beamforming,a2c96f25536f6d7993ab9ca1a897170a,https://ieeexplore.ieee.org/document/8298616/ 9827,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,auction,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9828,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,posted price,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9829,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",e. zhang,online advertisement,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9830,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Power supplies,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9831,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,auction,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9832,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,posted price,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9833,"Online advertising plays more important role in 21st century. Scholars pay much attention on how to bid in sponsored search auction. While few research have been done on advertisers facing mixed pricing mechanisms and need to compete in product market. Base on game theory, we set advertisers' Ad channel choice model by taking competition in product market into consideration. The comparison of heterogeneous advertisers profit under two kinds of pricing mechanism - auction vs posted price when the advertisers know a certain consumers' search, click behavior pattern and purchase decision rule shows as the cost to provide high quality product reduce, High quality product advertiser prefers auction mechanism, while Low quality product advertiser prefers posted price. When consumers' search cost are decrease, namely, the proportion of consumers who would like purchase after comparison increase, the advertisers prefer posted price mechanism simultaneously.",zhuo yi-qin,online advertisement,2011.0,10.1109/ICMSE.2011.6069981,2011 International Conference on Management Science & Engineering 18th Annual Conference Proceedings,Zhang2011,False,,IEEE,Not available,Online advertising channel choice — Posted price vs. auction,6eea5286fc369dc326ac9bbb0b2e1b32,https://ieeexplore.ieee.org/document/6069981/ 9834,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",chonho lee,Cloud computing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9835,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",chonho lee,group auction,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9836,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",chonho lee,resource provisioning,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9837,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",chonho lee,resource pricing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9838,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",ping wang,Cloud computing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9839,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",ping wang,group auction,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9840,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",ping wang,resource provisioning,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9841,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Tools,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9842,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",ping wang,resource pricing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9843,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",dusit niyato,Cloud computing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9844,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",dusit niyato,group auction,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9845,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",dusit niyato,resource provisioning,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9846,"The increasing number of cloud-based Internet applications has led to the demand for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system helps them decide when and how providers will allocate their resources and to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers).",dusit niyato,resource pricing,2015.0,10.1109/TSC.2013.24,IEEE Transactions on Services Computing,Lee2015,False,,IEEE,Not available,A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications,38e96b0a1fd21e8431a0317e3fb2c55c,https://ieeexplore.ieee.org/document/6497442/ 9847,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9848,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9849,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9850,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-cheng tseng,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9851,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9852,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Procurement,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9853,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9854,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9855,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",chih-chieh wang,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9856,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9857,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9858,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9859,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",fang-chang kuo,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9860,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9861,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9862,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9863,"We consider two prominent mechanisms for the electricity market; the pay-as-bid mechanism, currently applied in certain control reserve markets, and the proposed Vickrey- Clarke-Groves mechanism, an established auction mechanism used in advertising and spectrum auctions, for example. Bringing in tools from game theory and auction theory, we compare the Nash equilibria of these two mechanisms in terms of social efficiency and strategic behavior of the players. Furthermore, by formulating a coalitional game corresponding to the electricity market, we propose alternative mechanisms that incentivize truthful bidding while ensuring shill bidding is not profitable. Finally, we analyze the proposed mechanisms in a case study based on electricity market data.",maryam kamgarpour,Game theory,2017.0,10.1109/CDC.2017.8264596,2017 IEEE 56th Annual Conference on Decision and Control (CDC),Karaca2017,False,,IEEE,Not available,Game theoretic analysis of electricity market auction mechanisms,fbc7e7f246dc4bec94d5967881b025f3,https://ieeexplore.ieee.org/document/8264596/ 9864,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",hwang-cheng wang,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9865,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,handoff,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9866,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,auction,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9867,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,femtocell,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9868,"In the two-tier femtocell networks, a macrocell user equipment (MUE) initiates a handoff procedure when the received signal strength from its serving macrocell base station (MBS) is below a predefined threshold. By introducing the concept of game theory, this paper proposes a handoff mechanism that comprises two phases. In the first phase, a modified Dutch auction (MDA) is used to sift the candidate femtocell base stations (FBSs) from the neighboring FBSs of the MUE. If the number of candidate FBSs is greater than one, the second phase is initiated. In the second phase, each candidate FBS determines if it wants to accept the handoff request of the MUE by executing a stochastic election process (SEP). In SEP, in order to balance the load of FBSs, an FBS with light load is with higher probability to accept the handoff request. Simulation results show that the loads of FBSs are balanced by employing the proposed game based handoff mechanism in the two-tier femtocell networks.",kuo-chang ting,load-balancing,2013.0,10.1109/GLOCOMW.2013.6855697,2013 IEEE Global Communications Conference (GLOBECOM),Tseng2013,False,,IEEE,Not available,A load-balancing handoff mechanism for two-tier femtocell networks: A game approach,99e40e77832731c7d48f36cc30f69312, 9869,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,Auction theory,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9870,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,bandwidth allocation,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9871,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,fairness,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9872,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,Nash equilibrium,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9873,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,pricing,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9874,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Games,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9875,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,utility,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9876,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,valuation,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9877,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",navid tadayon,5G,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9878,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,Auction theory,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9879,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,bandwidth allocation,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9880,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,fairness,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9881,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,Nash equilibrium,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9882,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,pricing,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9883,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,utility,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9884,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,valuation,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9885,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Investments,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9886,"The “unlimited” performance and machine-centric architecture visions for future wireless networks transform the fundamental task of allocating radio resources into a complex optimization problem that is not quickly solvable. Inspired by the increasing intelligence of connected machines, and the prosperity of auctions as efficient allocation mechanisms in the economic sector, this paper provides an alternative perspective to the problem of optimal spectrum assignment for the fifth generation (5G) of wireless networks. In a systematic approach to deal with this problem, an efficacious allocation mechanism is characterized by six axioms: incentive compatibility, individual rationality, fairness, efficiency, revenue maximization, and computational manageability. The first three are incorporated into the allocation mechanism through a nonlinear spectrum pricing. By inducing incentive compatibility through these prices, revelation of the true valuations becomes the Nash Equilibrium and puts the mechanism in the class of revelation mechanisms. The latter fact triggers the realization of the last three axioms, whereby an optimization problem is formed to find the optimal mechanism in the class of revelation mechanisms, which, by the virtue of the revelation principle, is the optimal mechanism among all auction classes. Further, it is shown that the proposed mechanism is highly scalable, as the solution to the optimization problem is obtained by root-finding operations and solving almost linear system of equations. These properties make the proposed resource allocation mechanism an ideal candidate for deployment in 5G networks.",sonia aissa,5G,2018.0,10.1109/TSP.2018.2862398,IEEE Transactions on Signal Processing,Tadayon2018,False,,IEEE,Not available,Radio Resource Allocation and Pricing: Auction-Based Design and Applications,afc5b9b595819b4814292a54e349eaeb,https://ieeexplore.ieee.org/document/8424917/ 9887,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Relays,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9888,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Games,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9889,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Throughput,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9890,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Energy exchange,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9891,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Wireless communication,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9892,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Energy harvesting,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9893,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",burak varan,Computational modeling,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9894,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Relays,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9895,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Games,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9896,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Density estimation robust algorithm,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 9897,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Supply chains,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9898,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Throughput,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9899,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Energy exchange,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9900,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Wireless communication,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9901,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Energy harvesting,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9902,"In this paper, we study a cooperative two-hop network with multiple sources and multiple relays where the energy required for the relays is transferred by the sources. In return, the relays transmit the sources' data, along with their own data, to the destination. We consider the setup where each node's objective is to maximize the amount of its own data delivered to the destination. We take a game theoretic approach and first model the selfish cooperation scenario with one source and one relay as a Stackelberg game where (i) the relay or (ii) the source is the leader. We demonstrate how the leader of the game takes advantage of its ability to compute the follower's optimal strategy to influence the follower and improve its own utility. In both cases, we also consider the case with multiple followers. We employ Vickrey auctions to model the inter-follower competition. We identify the winner of the auction in both cases and observe that the followers must compromise their individual utilities to win the auction. Consequently, the leader's utility turns out to be nondecreasing in the number of competing followers.",aylin yener,Computational modeling,2015.0,10.1109/GLOCOM.2015.7417623,2015 IEEE Global Communications Conference (GLOBECOM),Varan2015,False,,IEEE,Not available,Auction Schemes for Energy and Signal Cooperation in Two-Hop Networks,e6e88f9e5233461b49d1713a93f098fd,https://ieeexplore.ieee.org/document/7417623/ 9903,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Relays,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9904,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Heuristic algorithms,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9905,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Servers,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9906,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Resource management,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9907,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Nash equilibrium,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9908,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Procurement,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9909,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Wireless communication,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9910,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",jinglei li,Bit error rate,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9911,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Relays,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9912,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Heuristic algorithms,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9913,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Servers,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9914,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Resource management,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9915,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Nash equilibrium,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9916,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Wireless communication,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9917,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",qinghai yang,Bit error rate,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9918,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Relays,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9919,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,System-on-a-chip,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9920,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Heuristic algorithms,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9921,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Servers,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9922,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Resource management,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9923,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Nash equilibrium,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9924,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Wireless communication,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9925,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",kyung kwak,Bit error rate,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9926,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Relays,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9927,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Heuristic algorithms,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9928,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Servers,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9929,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Resource management,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9930,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",xueguang zhou,Biological system modeling,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9931,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Nash equilibrium,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9932,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Wireless communication,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9933,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",fenglin fu,Bit error rate,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9934,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Relays,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9935,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Heuristic algorithms,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9936,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Servers,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9937,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Resource management,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9938,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Nash equilibrium,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9939,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Wireless communication,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9940,"In this paper, the auction theory based power allocation is investigated for relay communications, wherein all relays bid for the transmit power from a server. A target BER at the destination is introduced as the power-bidding criterion to guarantee the received signal's availability. For maximizing the revenue, all relay nodes compete for the limit power resource and attain the Nash equilibrium. Given the local information, we develop a dynamic updating algorithm to adjust the allocation. Moreover, the stability of the dynamic algorithm is demonstrated and analyzed.",peiwen zhu,Bit error rate,2010.0,10.1109/ISCIT.2010.5665046,2010 10th International Symposium on Communications and Information Technologies,Li2010,False,,IEEE,Not available,Auction-based power allocation for relay communication,dd5e8b599aa55f3dc4a787379454cf01,https://ieeexplore.ieee.org/document/5665046/ 9941,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Games,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9942,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",zhu han,Auction theory,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9943,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",zhu han,cognitive radio,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9944,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",zhu han,spectrum access,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9945,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",zhu han,Dirichlet process,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9946,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",zhu han,and Bayesian nonparametric learning,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9947,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",rong zheng,Auction theory,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9948,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",rong zheng,cognitive radio,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9949,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",rong zheng,spectrum access,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9950,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",rong zheng,Dirichlet process,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9951,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",rong zheng,and Bayesian nonparametric learning,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9952,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Investments,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9953,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",h. poor,Auction theory,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9954,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",h. poor,cognitive radio,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9955,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",h. poor,spectrum access,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9956,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",h. poor,Dirichlet process,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9957,"In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmission upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. To solve such a problem, a Bayesian nonparametric belief update scheme is constructed based on the Dirichlet process. Efficient bidding learning algorithms are proposed via which users can decide whether or not to participate in the bidding according to the belief update. Properties of optimal bidding and initial bidding are proved. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good trade-off between long-term efficiency and fairness.",h. poor,and Bayesian nonparametric learning,2011.0,10.1109/TWC.2011.010411.100838,IEEE Transactions on Wireless Communications,Han2011,False,,IEEE,Not available,Repeated Auctions with Bayesian Nonparametric Learning for Spectrum Access in Cognitive Radio Networks,738f6ff9d3cd245e0044827007e76245,https://ieeexplore.ieee.org/document/5692900/ 9958,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Game theory,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9959,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Energy consumption,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9960,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Registers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9961,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Circuit synthesis,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9962,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Very large scale integration,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9963,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Supply chains,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9964,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Processor scheduling,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9965,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Nash equilibrium,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9966,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Linear programming,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9967,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,Portable computers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9968,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",a.k. murugavel,High performance computing,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9969,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Game theory,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9970,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Energy consumption,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9971,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Registers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9972,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Circuit synthesis,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9973,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Very large scale integration,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9974,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Procurement,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9975,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Processor scheduling,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9976,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Nash equilibrium,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9977,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Linear programming,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9978,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,Portable computers,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9979,"In this paper, we describe a new algorithm based on game theory for minimizing the average power of a circuit during binding in behavioral synthesis. The problem is formulated as an auction based non-cooperative finite game for which a solution is proposed based on the Nash equilibrium. For the binding algorithm, each functional unit in the datapath is modeled as a player bidding for executing an operation with the estimated power consumption as the bid. The operations are bound to the modules such that the total power consumption is minimized. Further, the techniques of functional unit sharing, path balancing and register assignment are incorporated within the binding algorithm for power reduction. The proposed algorithm yields power reduction without any increase in area or delay overhead. Experimental results indicate that the proposed game theoretic solution for binding yields an improvement of 13.9% over the linear programming (LP) method.",n. ranganathan,High performance computing,2003.0,10.1109/ICVD.2003.1183176,"16th International Conference on VLSI Design, 2003. Proceedings.",Murugavel2003,False,,IEEE,Not available,A game-theoretic approach for binding in behavioral synthesis,d843e1d754d30844452fbbd2a484ef31,https://ieeexplore.ieee.org/document/1183176/ 9980,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,cognitive radio,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9981,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,spectrum sharing,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9982,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,primary user (PU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9983,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,secondary user (SU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9984,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,spectrum holes,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9985,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,System-on-a-chip,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9986,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",monisha devi,auction theory,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9987,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,cognitive radio,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9988,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,spectrum sharing,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9989,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,primary user (PU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9990,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,secondary user (SU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9991,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,spectrum holes,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9992,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",nityananda sarma,auction theory,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9993,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,cognitive radio,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9994,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,spectrum sharing,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9995,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,primary user (PU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9996,"This paper focuses on integrating of reverse auctions into the ongoing operation of firms and forming a long-term cooperative relationships between the suppliers and the buyers. Based on the theory of evolutionary economics and the game theory, we present the construction of the evolutionary game model in online reverse auctions. For illustration, an evolutionary phase diagram is utilized to show the effective of the model in analyzing the influential factors of the supply chain stability. Analytic results show that the buyers might promote supply chain integration by relatively increasing the fixed costs of bidding, giving some investments to the suppliers, and qualifying the multiple criteria of the suppliers. Besides, the marketing regulator should establish a punishment mechanism to prevent the opportunists from entering the ORA marketing. Those results can guard and lead the participants of reverse auctions, and inspire the buyers to design a more efficiency mechanism.",jian zhang,Biological system modeling,2010.0,10.1109/ICMSS.2010.5577273,2010 International Conference on Management and Service Science,Zhou2010,False,,IEEE,Not available,An Evolutionary Game Theoretic Perspective on Online Reverse Auctions,ac3d3f9fe519d84b4e2687a2dad5dfd9,https://ieeexplore.ieee.org/document/5577273/ 9997,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,secondary user (SU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9998,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,spectrum holes,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 9999,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",sanjib deka,auction theory,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10000,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,cognitive radio,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10001,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,spectrum sharing,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10002,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,primary user (PU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10003,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,secondary user (SU),2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10004,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,spectrum holes,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10005,"Cognitive radio (CR) proffers a paradigm to improve spectrum utilization efficiency by assigning vacant licensed bands among unlicensed users. With different functionalities incorporating the CR system, spectrum sharing is one such key functionality that allows an efficient allocation of the spectrum resource. This paper concentrates on the concern related to spectrum sharing in cognitive radio networks (CRN) such that radio frequency can have an effective usage among licensed and unlicensed users. The paper formulates an auction-based spectrum allocation mechanism where bids for available bands are collected from secondary users and the primary owner decides upon the channel allocation while being restricted to single-unit-single-user allocation constraint and avoiding any harmful interference. A sequential bidding policy is deployed during the game that incorporates the winner determination and pricing strategies. Simulation results for the proposed approach unveil its effectiveness in allocating unused spectrum bands.",prakash chauhan,auction theory,2017.0,10.1109/ANTS.2017.8384188,2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS),Devi2017,False,,IEEE,Not available,Sequential bidding auction mechanism for spectrum sharing in cognitive radio networks,77d3b794b357375a9e7701b48bec6407,https://ieeexplore.ieee.org/document/8384188/ 10006,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Sponsored Search,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 10007,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Real-time systems,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 10008,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10009,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10010,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10011,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10012,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10013,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10014,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10015,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10016,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10017,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",mehmet cintuglu,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10018,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Game theory,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 10019,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10020,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10021,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10022,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10023,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10024,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10025,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10026,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10027,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10028,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",harold martin,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10029,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computational modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 10030,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10031,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10032,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10033,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10034,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10035,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,Game-theory,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10036,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,microgrid,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10037,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,multiagent systems,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10038,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,phasor measurement units (PMU),2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10039,"This paper presents a real-time implementation of a multiagent-based game theory reverse auction model for microgrid market operations featuring conventional and renewable distributed energy resources (DER). Studies were conducted on a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units, and a combined load. The multiagent-based platform was applied to monitor, control, and perform the reverse auction process of DERs. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with an hour-ahead market approach for the 24 h of the day. The proposed methodology was realistically implemented and operated at the Florida International University smart grid test system. The investigation shows that the proposed algorithm and the industrial hardware-based infrastructure can be implemented in the existing electric utility grid as new assets of the system are added.",osama mohammed,reverse auction,2015.0,10.1109/TSG.2014.2387215,IEEE Transactions on Smart Grid,Cintuglu2015,False,,IEEE,Not available,Real-Time Implementation of Multiagent-Based Game Theory Reverse Auction Model for Microgrid Market Operation,1ecee6b2ad50f4722f7b923eeb687599,https://ieeexplore.ieee.org/document/7015616/ 10040,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Load modeling,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 10041,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,Cooperative,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10042,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,auction,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10043,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,bidding,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10044,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,Nash equilibrium,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10045,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",oluseye adeleke,diversity,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10046,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,Cooperative,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10047,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,auction,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10048,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,bidding,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10049,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,Nash equilibrium,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10050,"In this paper, a new strategy for selecting the most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game is proposed. In this game, in which the conventional theories of economic auction are applied, the cooperative communication network is modeled as a single-node, multi-relay system in which the source node acts as the auctioneer while the relay nodes or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Results show that like what happens in conventional bidding process, the higher the price a relay can pay, the higher the amount of power that the source node will be willing to sell, and by extension, the higher the utility of the source node. It is also seen in the results that the relay node closest to the destination node gives the highest utility to the source and thus the highest chance of being selected in the cooperative process; all with the intent of improving the transmit diversity of the network.",damilare akande,diversity,2017.0,10.1109/NIGERCON.2017.8281883,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Adeleke2017,False,,IEEE,Not available,Relay node selection for cooperative wireless systems using the bidder's game,49c059511ffea2ba6daf565ab5ef5a36,https://ieeexplore.ieee.org/document/8281883/ 10051,"This paper presents a real-time implementation of multi-agent based game theory reverse auction model for microgrid market operation featuring conventional and renewable distributed energy resources (DER). Studies were conducted for a grid connected microgrid consisting of a synchronous generator, two inverter-based generation units and a combined load. The Multi-agent based platform was applied to monitoring, controlling and per-forming the reverse auction process of the DER. A competitive game-theory reverse auction model was investigated to schedule the DER unit commitment with hour-ahead market approach for the twenty-four hours of the day. The proposed methodology was realistically implemented and operated at Florida International University, Smart Grid Test system. The investigation shows that the proposed algorithm and the industrial based hardware structure can be implemented in existing electric utility grid as new assets of the system are added.",osama mohammed,Computers,2016.0,10.1109/PESGM.2016.7741074,2016 IEEE Power and Energy Society General Meeting (PESGM),Cintuglu2016,False,,IEEE,Not available,Real-time implementation of multiagent-based game theory reverse auction model for microgrid market operation,892e9b2b95e2504f99a638d9b0368ebf, 10052,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10053,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10054,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10055,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10056,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",handayani sartono,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10057,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10058,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10059,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10060,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10061,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",yong chew,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10062,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10063,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10064,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10065,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10066,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10067,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",woon chin,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10068,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Non-cooperative game,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10069,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Double auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10070,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Variable supply auction,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10071,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Dynamic spectrum sharing,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10072,"Conclusion drawn from field measurement is that the allocation of radio spectrum to operators in a static manner does not make efficient use of the scarce spectrum resources. Dynamically allocating radio spectrum based on the demands using auction is one possible approach to improve spectrum utilization efficiency. In this paper, we consider a spectrum auction game, each spectrum supplier (SS) is competing against other suppliers so as to sell as much quantity as possible to maximize its own profit. On the other hand, bandwidth bidders (BBs) are also competing against each other to get the amount of demand spectrum at a lower price. In general, understanding the supply and demand relationship decides the selling price. We propose an auction game which jointly taking in consideration the competition among SSs and BBs, where the bid for the secondary reused spectrum takes place. Given that each SS knows the bandwidth available for secondary reuse over a period of time, with the assistance of a spectrum broker, our approach uses the open bid auction theory to decide the equilibrium point. Towards the end of the bidding process, suppliers and bidders will settle at an equilibrium point, whereby the selling quantities and bidding price are obtained. Our scheme can achieve a rather stable price per bandwidth when total demands do not exceed the total supply.",chau yuen,Private commons,2009.0,10.1109/PIMRC.2009.5449802,"2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications",Sartono2009,False,,IEEE,Not available,Joint demand and supply auction pricing strategy in dynamic spectrum sharing,ae104b6e454e10989e6af39af90cdfc9,https://ieeexplore.ieee.org/document/5449802/ 10073,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10074,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10075,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10076,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10077,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10078,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",you son,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10079,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10080,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10081,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10082,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10083,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",r. baldick,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10084,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10085,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10086,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10087,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10088,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10089,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",kwang-ho lee,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10090,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,Auction theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10091,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,electricity market,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10092,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,game theory,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10093,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,market design,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10094,"This paper analyzes the competing pricing mechanisms of uniform and pay-as-bid pricing in an electricity market. Game theory and auction theory are adopted to analyze the strategic behavior of a big player and a small player in a short-term auction game. Contrary to what would be expected from the conclusion of the ""revenue equivalence theorem,"" we prove that for a two-player static game the Nash Equilibrium (NE) under pay-as-bid pricing will yield less total revenue in expectation than under uniform pricing when demand is inelastic. To confirm this theoretical result we simulated the model using a mixed-strategy NE solver. We extended the model to an elastic demand case and showed that pay-as-bid pricing also led to a larger expected total demand being served when demand is elastic.",shams siddiqi,market power,2004.0,10.1109/TPWRS.2004.836192,IEEE Transactions on Power Systems,Son2004,False,,IEEE,Not available,Short-term electricity market auction game analysis: uniform and pay-as-bid pricing,446675b159215efddd48fd3cfe040493,https://ieeexplore.ieee.org/document/1350839/ 10095,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",nilson filho,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10096,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Computer crime,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10097,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Intelligent networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10098,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Wireless sensor networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10099,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Sensor phenomena and characterization,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10100,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Game theory,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10101,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Power generation economics,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10102,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Nash equilibrium,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10103,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Data security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10104,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Routing protocols,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10105,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",a. agah,Communication system security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10106,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10107,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Computer crime,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10108,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Intelligent networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10109,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Wireless sensor networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10110,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Sensor phenomena and characterization,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10111,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Game theory,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10112,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Power generation economics,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10113,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Nash equilibrium,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10114,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Data security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10115,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Routing protocols,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10116,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",k. basu,Communication system security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10117,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Cooperative Game Theory,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 10118,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10119,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Computer crime,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10120,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Intelligent networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10121,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Wireless sensor networks,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10122,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Sensor phenomena and characterization,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10123,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Game theory,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10124,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Power generation economics,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10125,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Nash equilibrium,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10126,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Data security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10127,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Routing protocols,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10128,"This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the requirement for security enforcement using auction theory that allows detection of non cooperative nodes. In the proposed protocol, nodes prefer to participate in forwarding incoming packets and gaining reputation in the network. Nodes willing to do so must compete against each other. The competition is based on auction theory. We also formulate attack-defense problem as a non-cooperative nonzero-sum two-player game between an attacker and a wireless sensor network. This game achieves Nash equilibrium and thus leading to a defense strategy for the network. This approach is called utility based dynamic source routing (UDSR), which incorporates the total utility of each route in data packets. Results show that the proposed game frameworks significantly increase the chance of success in defense strategy for the wireless sensor network",s.k. das,Communication system security,2005.0,10.1109/MAHSS.2005.1542840,"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.",Agah2005,False,,IEEE,Not available,Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling,40591977f0d5b02d86055015e733db5c,https://ieeexplore.ieee.org/document/1542840/ 10129,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10130,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Game theory,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10131,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Internet,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10132,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Business,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10133,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Consumer behavior,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10134,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Fuzzy logic,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10135,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Chromium,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10136,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Welding,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10137,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Mathematics,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10138,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Humans,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10139,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",s. russell,Mathematical model,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10140,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",felipe saraiva,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10141,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Game theory,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10142,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Internet,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10143,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Business,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10144,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Consumer behavior,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10145,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Fuzzy logic,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10146,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Chromium,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10147,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Welding,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10148,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Mathematics,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10149,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Humans,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10150,"Many decisions by humans, businesses, and automated agents in Internet transactions can be modeled in traditional game-theoretic terms. Examples include B-to-B price negotiations, B-to-C competition for customers, and C-to-C online auctions. When multiple viewpoints, uncertainty, and interval values are considered, these game theory situations become examples of fuzzy games. In addition, the payoff values weighed during a strategy or e-competition are often not exclusively monetary. Web site visitors have budgets of time, attention, and patience that also have a generalized utility value. Uniquely Internet factors frequently become paramount, such as visual aesthetics, sensory-motor interactivity, and social interplay, as well as affective, habit-based, and loss-prospect-avoidance determiners of their competitive and strategic e-consumer behaviors. These weighed tradeoffs that determine user persistence and Web business success are quite unlike the traditional rational summations in games. A fuzzy game-theoretic approach is explored here that begins to deal with some of the above e-commerce peculiarities.",w.a. lodwick,Mathematical model,2002.0,10.1109/NAFIPS.2002.1018036,2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622),Russell2002,False,,IEEE,Not available,Fuzzy game theory and Internet commerce: e-strategy and metarationality,64b95fb9b91fefe887fb258ccd82eff6,https://ieeexplore.ieee.org/document/1018036/ 10151,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,Artificial intelligence,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10152,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10153,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10154,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10155,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10156,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",jian-bing liu,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10157,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10158,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10159,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10160,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10161,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",hong ren,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10162,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,game theory,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10163,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,the game theory,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10164,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,incomplete information,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10165,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,non-cooperation game,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10166,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,bidding,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10167,"Construction project bidding is a kind of transaction way of construction project the most widely used ,the bidding is a closed price auction, the game among the bidders and the tenders belongs to a kind of non-cooperation and incomplete static game and so does it among the tenders. According to the special rules of bidding, the game theory is put into construction project bidding ,the game model of bidding mechanism is set up, the game process of a non-cooperation and incomplete information static is analyzed among the tenders according with the different strategies of tendering price, the conclusion can be drawn to be applied to construction project bidding , which can realize ldquothe incentive and compatibility constraintsrdquo and ldquopersonal participating in constraintsrdquo. Meanwhile, the moral hazard and the adverse selection can be avoided. At last, the great degree of equilibrium and the Pareto optimization can be achieved.",xiao-jian guo,construction project,2009.0,10.1109/JCAI.2009.28,2009 International Joint Conference on Artificial Intelligence,Liu2009,False,,IEEE,Not available,Study on the Game Mechanism of Construction Project Bidding,7ba93fa234c6f9676942bd23949a827c,https://ieeexplore.ieee.org/document/5159127/ 10168,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Pollution,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10169,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Power quality,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10170,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Erbium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10171,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Energy management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10172,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Quality management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10173,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,auctions in electric markets,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10174,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Pressure control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10175,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Power industry,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10176,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Optimal control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10177,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Nash equilibrium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10178,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",guanghou jin,Game theory,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10179,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Pollution,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10180,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Power quality,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10181,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Erbium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10182,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Energy management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10183,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Quality management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10184,"The various changes that have occurred in the electricity markets around the world have introduced competition among the participants in this sector. Thus, the generation agents that participate on electrical energy auctions may prefer to build optimal strategies to maximize their profits. Mathematical models based on game theory have been used in the analysis of electric energy markets and especially in electricity auctions. In this sense, this theory optimizes the decision-making process for setting prices offered by the generators to the system operator in a power auction. This paper deals with a comparative analysis of individual strategies of generating units, using a non-cooperative game theory approach and incomplete information on various types of auctions. A modified version of IEEE 57-bus test system is used to illustrate the main features of the auction models used.",v. paucar,electric power systems,2016.0,10.1109/CACIDI.2016.7786001,IEEE CACIDI 2016 - IEEE Conference on Computer Sciences,Filho2016,False,,IEEE,Not available,Comparative analysis of game theory application to various types of auctions in electric markets,2ce5ec33b212294859b0b3d432c32a6b,https://ieeexplore.ieee.org/document/7786001/ 10185,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Pressure control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10186,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Power industry,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10187,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Optimal control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10188,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Nash equilibrium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10189,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",gengyin li,Game theory,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10190,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Pollution,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10191,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Power quality,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10192,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Erbium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10193,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Energy management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10194,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Quality management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10195,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10196,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Pressure control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10197,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Power industry,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10198,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Optimal control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10199,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Nash equilibrium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10200,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",ming zhou,Game theory,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10201,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Pollution,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10202,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Power quality,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10203,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Erbium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10204,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Energy management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10205,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Quality management,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10206,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10207,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Pressure control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10208,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Power industry,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10209,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Optimal control,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10210,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Nash equilibrium,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10211,"Management of power quality (PQ) suffers more pressure from economy and social equity, it is necessary to control electromagnetic pollution emitted from both electric utilities and customers. Calculation of optimal emission right (ER) gross and its distribution is an important content of controlling electromagnetic pollution, and it should be worked out based on cooperative game. This paper analyses game actions among all members in one point of common connection (PCC) for pursuing ER and high PQ, and clarifies the highest price of ER and PQ service that is acceptable for gamers. This paper adopts uniform price sealed auction model to make gamers take the acceptable highest price of ER and PQ service as their bidding price, and PQ supervision department (PQSD) can make full use of their information from auction, then the calculated ER gross can satisfy Pareto optimality. That gross can maximize social integrative benefits. This auction model also proposes the Bayes Nash equilibrium for the optimal distribution of ER among all gamers. This equilibrium can optimize distribution of social and electromagnetic resource. Examples indicate that the proposed model for optimal gross and distribution of ER based on game theory is feasible and effective.",yixin ni,Game theory,2005.0,10.1109/PES.2005.1489325,"IEEE Power Engineering Society General Meeting, 2005",Jin2005,False,,IEEE,Not available,Research on allocation of gross electromagnetic pollution emission right in power quality markets,78c9f75d65395109d161891e5b5d6086,https://ieeexplore.ieee.org/document/1489325/ 10212,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10213,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10214,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",michael kaisers,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10215,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10216,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10217,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10218,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",karl tuyls,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10219,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10220,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10221,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",frank thuijsman,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10222,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Evolutionary game theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10223,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Auction theory,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10224,"Auctions are pervasive in todaypsilas society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by introducing a methodology to approximate heuristic payoff tables by normal form games. An example from the auction domain is transformed by this means and an evolutionary game theory analysis is applied subsequently. The information loss in the normal form approximation is shown to be reasonably small such that the concise normal form representation can be leveraged in order to make strategic decisions in auctions. In particular, a mix of trading strategies that guarantees a certain profit is computed and further applications are indicated.",simon parsons,Multi-agent games,2008.0,10.1109/WIIAT.2008.261,2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology,Kaisers2008,False,,IEEE,Not available,Auction Analysis by Normal Form Game Approximation,46b9f80a7237f5abef108d6e4a91e551,https://ieeexplore.ieee.org/document/4740664/ 10225,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,bidding strategies,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10226,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,power producers,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10227,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,oligopoly game model,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10228,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nash bargaining,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 10229,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10230,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,auction theory,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10231,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",wenxia you,market clearing price,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10232,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,bidding strategies,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10233,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,power producers,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10234,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,oligopoly game model,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10235,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,auction theory,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10236,"The bidding strategies of the generation companies in electricity markets is a research hotspot which requires applications of game theory. This paper reviews the research status of bidding strategies of power suppliers and the pricing rules in electricity markets. The paper is mainly composed of two parts. The first part is to introduce the bidding models of power producers based on the oligopoly game models and auction theory. The second part focuses on the pricing rules with uniform market clearing mechanism, which provides four kinds of pricing rules. In the end, the conclusions and prospects of the paper are presented.",dandan xu,market clearing price,2011.0,10.1109/ICECENG.2011.6058055,2011 International Conference on Electrical and Control Engineering,You2011,False,,IEEE,Not available,Study on bidding strategies of power producers,cb9b29a487691f0760bf8633146b2579, 10237,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10238,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10239,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10240,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10241,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10242,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10243,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10244,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10245,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10246,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",wayes tushar,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10247,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10248,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10249,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10250,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10251,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10252,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10253,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10254,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10255,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10256,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",chau yuen,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10257,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10258,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10259,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10260,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10261,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10262,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",amin nezarat,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10263,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10264,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10265,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10266,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",hamed mohsenian-rad,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10267,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10268,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10269,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10270,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10271,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10272,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10273,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Scheduling,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10274,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10275,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10276,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",tapan saha,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10277,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10278,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10279,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10280,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10281,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10282,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10283,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10284,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Resource Allocation,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10285,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10286,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",h. poor,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10287,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Peer-to-peer computing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10288,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Game theory,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10289,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Signal processing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10290,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Smart grids,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10291,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Renewable energy sources,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10292,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Pricing,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10293,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Energy management,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10294,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Power markets,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10295,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Game Theory,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10296,"Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables each prosumer (i.e., an energy consumer who also produces electricity) of the network to participate in energy trading with other prosumers and the grid. This poses a significant challenge in terms of modeling the decisionmaking process of the participants' conflicting interests and motivating prosumers to participate in energy trading and cooperate, if necessary, in achieving different energy-management goals. Therefore, such a decisionmaking process needs to be built on solid mathematical and signal processing principles that can ensure an efficient operation of the electric power grid. This article provides an overview of the use of game-theoretic approaches for P2P energy trading as a feasible and effective means of energy management. Various game- and auction-theoretic approaches are discussed by following a systematic classification to provide information on the importance of game theory for smart energy research. This article also focuses on the key features of P2P energy trading and gives an introduction to an existing P2P testbed. Furthermore, the article gives specific game- and auction-theoretic models that have recently been used in P2P energy trading and discusses important findings arising from these approaches.",kristin wood,Power grid,2018.0,10.1109/MSP.2018.2818327,IEEE Signal Processing Magazine,Tushar2018,False,,IEEE,Not available,Transforming Energy Networks via Peer-to-Peer Energy Trading: The Potential of Game-Theoretic Approaches,0fad75907eecd969699fa996171f2438,https://ieeexplore.ieee.org/document/8398582/ 10297,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Game theory,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10298,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Distributed computing,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10299,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Delay,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10300,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Constraint optimization,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10301,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Scalability,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10302,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Design methodology,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10303,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Centralized control,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10304,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Control systems,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10305,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Genetics,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10306,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Cloud Computing,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10307,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",samee khan,Costs,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10308,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Game theory,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10309,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Distributed computing,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10310,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Delay,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10311,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Constraint optimization,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10312,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Scalability,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10313,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Design methodology,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10314,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Centralized control,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10315,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Control systems,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10316,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Genetics,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10317,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Nash Equilibrium,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10318,"Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, which is NP-complete in general. A majority of conventional replica placement techniques falter on issues of scalability or solution quality. To counteract such issues, we propose a game theoretical replica placement technique, in which computational agents compete for the allocation or reallocation of replicas onto their servers in order to reduce the user perceived access delays. The technique is based upon six well-defined axioms, each guaranteeing certain basic game theoretical properties. This eccentric method of designing game theoretical techniques using axioms is unique in the literature and takes away from the designers the cumbersome mathematical details of game theory. The distinctive feature of these axioms is that when amassed together, their individual properties constrict into one system-wide performance enhancement property, which in our case is the reduction of access time. The control of the proposed technique is ""semi-distributed"" in nature, wherein all the heavy processing is done on the servers of the distributed system and the central body is only required to take a binary decision: (0) not to replicate or (1) to replicate. This semi-distributed approach makes the technique scalable and helps solutions to converge in a fast turn-around time without loosing much of the solution quality. Experimental comparisons are made against: 1) branch and bound, 2) greedy, 3) genetic, 4) Dutch auction, and 5) English auction. As attested by the results, the proposed technique maintains superior solution quality in terms of lower communication cost and reduced execution time.",ishfaq ahmad,Costs,2007.0,10.1109/IPDPS.2007.370279,2007 IEEE International Parallel and Distributed Processing Symposium,Khan2007,False,,IEEE,Not available,A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems,7293499f137573d9df4103b9880aa3f4,https://ieeexplore.ieee.org/document/4228007/ 10319,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Ancillary Services,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10320,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Bidding StrategiesCapability Curves,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10321,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Deregulation,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10322,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Game Theory,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10323,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Generator,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10324,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Reactive Support,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10325,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",allen morinec,Spinning Reserve,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10326,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Ancillary Services,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10327,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Bidding StrategiesCapability Curves,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10328,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Multi-Agent System,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10329,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Deregulation,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10330,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Game Theory,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10331,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Generator,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10332,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Reactive Support,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10333,"This paper describes a simple method to derive strategic equilibrium solutions for a single Generating Company (GENCO) bidding in electricity markets. This method computes the product mix of real power and the ancillary services of reactive power and spinning reserve supplied by GENCO. Generator capability curves are incorporated into a two-player competitive market model to simulate market auctions for real power and ancillary services. Player 1 is defined as the GENCO entering the auction and Player 2 is the equivalent representation of all other GENCOs competing in the auction. Game theory techniques are utilized to identify optimal Nash Equilibrium solutions for the power market auctions, which are optimal bidding strategies for the competing players. Software was developed to automatically simulate the market auction and identify equilibrium solutions from a defined combination of bidding strategies. Simulations demonstrate that the computed equilibrium solution optimizes the GENCO's payoff.",f. villaseca,Spinning Reserve,2008.0,10.1109/NAPS.2008.5307329,2008 40th North American Power Symposium,Morinec2008,False,,IEEE,Not available,Optimal generator bidding strategies for power and ancillary services using game theory,2c9999811912f44a083801f4f5781e55,https://ieeexplore.ieee.org/document/5307329/ 10334,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10335,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10336,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10337,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10338,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",e. amadi,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10339,"In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the bidders. The proposed bid optimizer algorithm transforms the reported values of the bidders for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the bidders. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the bidders. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the bidders.",nittala chaitanya,Nucleolus.,2009.0,10.1109/WI-IAT.2009.191,2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology,Sriram2009,False,,IEEE,Not available,A Novel Bid Optimizer for Sponsored Search Auctions Using Cooperative Game Theory,b7354f06931c4dc434942fdb51ad5480,https://ieeexplore.ieee.org/document/5285141/ 10340,"Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented new methods for solving this NP-complete problem have used heuristic algorithm. Based on economic aspects of cloud environments, using market oriented model for solving allocation problem can decrease the complexity and converge it to the best solution in minimum time. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneers utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.",gh. dastghaibifard,Auction,2015.0,10.1109/NGCT.2015.7375071,2015 1st International Conference on Next Generation Computing Technologies (NGCT),Nezarat2015,False,,IEEE,Not available,Efficient Nash equilibrium resource allocation based on game theory mechanism in cloud computing by using auction,bd279f04eebc040f0a83d04f24aeaf7f,https://ieeexplore.ieee.org/document/7375071/ 10341,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10342,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10343,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10344,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10345,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",g. eheduru,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10346,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10347,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10348,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10349,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10350,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",f. eze,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10351,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10352,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10353,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10354,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10355,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10356,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",c. ikerionwu,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10357,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Game theory,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10358,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Zero-sum game,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10359,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Attacker,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10360,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Defender,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10361,"The concept of game theory has found application in security and is usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender.",h. amuji,Linear Programming,2017.0,10.1109/NIGERCON.2017.8281903,2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON),Amadi2017,False,,IEEE,Not available,A zero-sum mitigation game model for distributed denial of service attack using linear programming,55620b65ff73305fb4648a7591879ded,https://ieeexplore.ieee.org/document/8281903/ 10362,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10363,The method of experimental economics is applied to research of Genco bidding strategy and market behavior of uniform price and pay-as-bid (PAB) auction mechanisms under different demand side response conditions with the multi-unit simultaneous auction model. The basic theories of experimental economics are introduced first. Then the experimental design is presented. Both qualitative analysis and quantitative analysis with strict statistic approaches are carried out on the experimental results. Several important conclusions are reached and can be used as reference to design of auction mechanisms in electricity markets. The research presented in this paper shows that experimental method has many advantages over traditional microeconomics and game theory in research of electricity markets and has many merits in modeling realistic electricity markets.,haoyong chen,Electricity Markets,2007.0,,2007 International Power Engineering Conference (IPEC 2007),Chen2007,False,,IEEE,Not available,Experimental analysis of uniform price and PAB auctions in electricity markets,8f9090ca4234ef98a69a0b55977711e8,https://ieeexplore.ieee.org/document/4509995/ 10364,The method of experimental economics is applied to research of Genco bidding strategy and market behavior of uniform price and pay-as-bid (PAB) auction mechanisms under different demand side response conditions with the multi-unit simultaneous auction model. The basic theories of experimental economics are introduced first. Then the experimental design is presented. Both qualitative analysis and quantitative analysis with strict statistic approaches are carried out on the experimental results. Several important conclusions are reached and can be used as reference to design of auction mechanisms in electricity markets. The research presented in this paper shows that experimental method has many advantages over traditional microeconomics and game theory in research of electricity markets and has many merits in modeling realistic electricity markets.,haoyong chen,Experimental Economics,2007.0,,2007 International Power Engineering Conference (IPEC 2007),Chen2007,False,,IEEE,Not available,Experimental analysis of uniform price and PAB auctions in electricity markets,8f9090ca4234ef98a69a0b55977711e8,https://ieeexplore.ieee.org/document/4509995/ 10365,The method of experimental economics is applied to research of Genco bidding strategy and market behavior of uniform price and pay-as-bid (PAB) auction mechanisms under different demand side response conditions with the multi-unit simultaneous auction model. The basic theories of experimental economics are introduced first. Then the experimental design is presented. Both qualitative analysis and quantitative analysis with strict statistic approaches are carried out on the experimental results. Several important conclusions are reached and can be used as reference to design of auction mechanisms in electricity markets. The research presented in this paper shows that experimental method has many advantages over traditional microeconomics and game theory in research of electricity markets and has many merits in modeling realistic electricity markets.,haoyong chen,Auction Mechanism,2007.0,,2007 International Power Engineering Conference (IPEC 2007),Chen2007,False,,IEEE,Not available,Experimental analysis of uniform price and PAB auctions in electricity markets,8f9090ca4234ef98a69a0b55977711e8,https://ieeexplore.ieee.org/document/4509995/ 10366,The method of experimental economics is applied to research of Genco bidding strategy and market behavior of uniform price and pay-as-bid (PAB) auction mechanisms under different demand side response conditions with the multi-unit simultaneous auction model. The basic theories of experimental economics are introduced first. Then the experimental design is presented. Both qualitative analysis and quantitative analysis with strict statistic approaches are carried out on the experimental results. Several important conclusions are reached and can be used as reference to design of auction mechanisms in electricity markets. The research presented in this paper shows that experimental method has many advantages over traditional microeconomics and game theory in research of electricity markets and has many merits in modeling realistic electricity markets.,haoyong chen,Market Equilibrium,2007.0,,2007 International Power Engineering Conference (IPEC 2007),Chen2007,False,,IEEE,Not available,Experimental analysis of uniform price and PAB auctions in electricity markets,8f9090ca4234ef98a69a0b55977711e8,https://ieeexplore.ieee.org/document/4509995/ 10367,The method of experimental economics is applied to research of Genco bidding strategy and market behavior of uniform price and pay-as-bid (PAB) auction mechanisms under different demand side response conditions with the multi-unit simultaneous auction model. The basic theories of experimental economics are introduced first. Then the experimental design is presented. Both qualitative analysis and quantitative analysis with strict statistic approaches are carried out on the experimental results. Several important conclusions are reached and can be used as reference to design of auction mechanisms in electricity markets. The research presented in this paper shows that experimental method has many advantages over traditional microeconomics and game theory in research of electricity markets and has many merits in modeling realistic electricity markets.,haoyong chen,Bidding Strategy,2007.0,,2007 International Power Engineering Conference (IPEC 2007),Chen2007,False,,IEEE,Not available,Experimental analysis of uniform price and PAB auctions in electricity markets,8f9090ca4234ef98a69a0b55977711e8,https://ieeexplore.ieee.org/document/4509995/ 10368,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10369,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10370,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10371,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10372,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10373,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Resource management,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10374,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenxia you,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10375,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10376,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10377,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10378,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10379,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10380,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",dandan xu,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10381,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,power suppliers,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10382,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,sealed auction,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10383,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,bidding strategies,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10384,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Cognitive radio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10385,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,private information,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10386,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,market clearing price,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10387,"In the background of deregulated electricity marketplaces, the electricity price is not determined by a power authority but by competitive bidding behaviors of power suppliers. Competitive bidding makes power supplies being no longer just the electricity price takers. Each power supplier becomes involved in setting the electricity price. He could maximize his own profits according to information of his private cost and the market. But at the same time, power suppliers have to face some uncertain market information. It is significant to build power suppliers' bidding strategies models which can provide support for suppliers' bidding decision. Fortunately, sealed auction is a static game of incomplete information in essence and it can be more conformed to the features of bidding in electricity market, so auction models have been proposed for representing strategic behaviors of power suppliers. The related literatures for the most part have considered the costs as independent random variables drawn from some specific distribution and the price as an expected forecast value. However, given the demand, the price in fact is determined by the ordered bids of suppliers according to the market clearing rules. So the clearing price is a function of the power supplier's own bid and the competitive opponents' bids distributions. Based on the hypothesis that all suppliers have the same generation capacity and have no withholding strategies, the number of winners is fixed when the power demand is given. Hence, the market clearing price is an order statistic. In this paper, the sealed auction theory is applied to analysis the power supplier's bidding actions. Firstly, the probabilities of a supplier winning or loosing the bid are obtained in virtue of the order statistic method. The power supplier's bidding model is constructed. The general expressions of optimal bidding strategies of suppliers are derived next by using optimization theory and solving a differential equation. The results suggest that the equilibrium bid is increasing in cost and is always above or equal to the cost. The bid-cost margin is influenced by the total quantity of demand and the costs distributions. Then, a numerical example is presented to confirm the presented method. At last, the power demand's effects on the suppliers' bidding strategies are discussed.",wenwu li,order statistic,2010.0,10.1109/POWERCON.2010.5666545,2010 International Conference on Power System Technology,You2010,False,,IEEE,Not available,Research on optimal bidding strategies for power suppliers based on sealed auction,13ba93c4b1771629cd75c24d13d592d6,https://ieeexplore.ieee.org/document/5666545/ 10388,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10389,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10390,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10391,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10392,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",bo-qing yang,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10393,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,ad hoc network,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10394,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,cooperative transmission,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10395,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Channel estimation,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10396,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,game theory,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10397,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,shapely value,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10398,"In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent ""monopoly"" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding protocol based upon repeated games and coalitional games.",hao sun,the first-price sealed auction,2010.0,10.1109/MINES.2010.40,2010 International Conference on Multimedia Information Networking and Security,Yang2010,False,,IEEE,Not available,Packet Forwarding Based on Cooperative Game and Auction Theory in Wireless Ad Hoc Network,f16254a198e74d72959286bbdd79f05b,https://ieeexplore.ieee.org/document/5670936/ 10399,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Resource management,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10400,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Bit rate,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10401,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Streaming media,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10402,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Optimization,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10403,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Video recording,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10404,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Quality assessment,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10405,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",damien schroeder,Wireless communication,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10406,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Signal to noise ratio,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10407,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Resource management,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10408,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Bit rate,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10409,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Streaming media,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10410,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Optimization,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10411,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Video recording,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10412,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Quality assessment,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10413,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",ali essaili,Wireless communication,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10414,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Resource management,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10415,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Bit rate,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10416,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Streaming media,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10417,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jayaprakash rajasekharan,Uncertainty,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10418,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Optimization,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10419,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Video recording,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10420,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Quality assessment,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10421,"Quality-of-Experience (QoE)-driven centralized resource allocation approaches for video streaming have been studied intensively but require the availability of utility information about the video content and channel conditions of all users at the central optimization entity to perform an optimal allocation. On the other hand, the practical application of game-theory-based decentralized resource allocation approaches for potentially selfish users has been limited so far. This is mainly because the varying network conditions and the delay constraints for wireless multimedia communications require low-complexity methods with fast convergence. We propose an auction-based radio resource allocation method which is shown to converge within a bounded number of iterations. The achieved allocation maximizes the average QoE over all users, while the users are maximizing their own payoff. The users pay a price for the requested resources which is defined on the utility scale. The proposed game-theory framework is compatible with cross-layer optimization approaches, as the resources are abstracted to provide an interface between the application and the lower layers. We implement the proposed resource allocation scheme in a simulated LTE uplink environment with multiple video streaming users. Experimental results confirm the derived properties and additionally show that, unlike state-of-the-art decentralized resource allocation schemes, our proposed auction is scalable, as the number of iterations to converge decreases with an increasing number of participating users.",eckehard steinbach,Wireless communication,2016.0,10.1109/ICCW.2016.7503843,2016 IEEE International Conference on Communications Workshops (ICC),Schroeder2016,False,,IEEE,Not available,Fast converging auction-based resource allocation for QoE-driven wireless video streaming,6bda3960dc0208c42073e4efee921fed,https://ieeexplore.ieee.org/document/7503843/ 10422,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,Cooperative communication,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10423,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,auction,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10424,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,bidding game,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10425,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",o. adeleke,utility,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10426,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,Cooperative communication,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10427,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,auction,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10428,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Games,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10429,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,bidding game,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10430,"We propose in this paper a new mechanism for selecting a most suitable partner in a cooperative wireless communication system, using a type of game called the Bidding game. In this game, in which the conventional theories of economic bidding are applied, the cooperative communication network is modeled as a single-user, multi-relay system in which the source acts as the auctioneer while the relays or partners act as the bidders in the game. The resource being auctioned here is power, and the relay which offers the highest bid in terms of price is selected and allocated power by the source node. Our findings show that there is a linear relationship between the utility achievable by a source node and the selection of a suitable partner for the cooperative process by that node. Our simulation also shows that the proximity of a relay node to the source node has an effect on the selectability of the node prior to the bidding.",m. salleh,utility,2013.0,10.1109/MICC.2013.6805792,2013 IEEE 11th Malaysia International Conference on Communications (MICC),Adeleke2013,False,,IEEE,Not available,Relay selection mechanism for cooperative communications using a game-theoretic approach,261708d2cb7384b21939eaae7aba4abc,https://ieeexplore.ieee.org/document/6805792/ 10431,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10432,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10433,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10434,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10435,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",prabodini semasinghe,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10436,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10437,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10438,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10439,"This paper addresses the problem of spectrum sharing in cognitive radios where secondary users (SUs) cooperatively sense the spectrum for identifying and accessing unoccupied spectrum bands. It is shown that spectrum sensing and sharing scenario can be modeled as a transferable utility (TU) cooperative game and that Vickrey-Clarke-Groves (VCG) auction mechanism can be used to allocate spectrum resources fairly to each user. SUs form coalitions to jointly sense the spectrum. The worth of each SU is calculated according to the work done for the coalition in terms of the information obtained about primary user (PU) activity from sensing the spectrum. The resulting games are balanced and superadditive and each SU gets a pay-off according to her worth in the coalition. Depending upon their spectrum needs, SUs use this pay-off to bid for unoccupied bands of spectrum through an VCG auction. VCG auction mechanism provides SUs with an incentive to bid truthfully according to their demand and is socially optimal. The concepts and results are illustrated using a simple example.",jan eriksson,Sensors,2011.0,10.1109/PIMRC.2011.6140044,"2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications",Rajasekharan2011,False,,IEEE,Not available,Cooperative game theory and auctioning for spectrum allocation in cognitive radios,0ea643a052d93812b3b79bee9d541bf0,https://ieeexplore.ieee.org/document/6140044/ 10440,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10441,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",setareh maghsudi,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10442,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Internet of things,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10443,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Communication technology,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10444,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Wireless communication,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10445,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Game theory,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10446,"As a result of rapid advancement in communication technologies, the Internet of Things (i.e., ubiquitous connectivity among a very large number of persons and physical objects) is now becoming a reality. Nonetheless, a variety of challenges remain to be addressed, one of them being the efficient resource management in IoT. On one hand, central resource allocation is infeasible for large numbers of entities, due to excessive computational cost as well as immoderate overhead required for information acquisition. On the other hand, the devices connecting to IoT are expected to act smart, making decisions and performing tasks without human intervention. These characteristics render distributed resource management an essential feature of future IoT. Traditionally, game theory is applied to effectively analyze the interactive decision making of agents with conflicting interests. Nevertheless, conventional game models are not adequate to model large-scale systems, since they suffer from many shortcomings including analytical complexity, slow convergence, and excessive overhead due to information acquisition/exchange. In this article, we explore some non-conventional game theoretic models that fit the inherent characteristics of future large-scale IoT systems. Specifically, we discuss evolutionary games, mean field games, minority games, mean field bandit games, and mean field auctions. We provide the basics of each of these game models and discuss the potential IoT-related resource management problems that can be solved by using these models. We also discuss challenges, pitfalls, and future research directions.",ekram hossain,Resource management,2017.0,10.1109/MCOM.2017.1600568CM,IEEE Communications Magazine,Semasinghe2017,False,,IEEE,Not available,Game Theoretic Mechanisms for Resource Management in Massive Wireless IoT Systems,c5baf5117fae49022cb9eb734ca3cf8e,https://ieeexplore.ieee.org/document/7842422/ 10447,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,Auctions,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 10448,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,valuation function,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 10449,"We propose to use generalization of a second price VCG auction to dynamically allocate shared radio resources among collocated, equally prioritized mobile network operators in multi carrier HSDPA cellular network. The spectrum usage priority will be dynamically decided based on the comparison of individual valuation functions, used as an input for the spectrum auctioning game. After theoretical introduction to the game theory, we demonstrate that short term auction based spectrum sharing provides spectrum utilization gains for coalition of MNO's having un-equall cell specific traffic loads, allowing network operators to secure their business and at the same time, open new market possibilities with additional revenue opportunities.",michal szydelko,spectrum broker,2012.0,10.4108/icst.crowncom.2012.248463,2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM),Szydelko2012,False,,IEEE,Not available,Dynamic valuation function based definition of the primary spectrum user in collocated cellular networks,84974cc9959a85e9e4ea9394f1ef50a0,https://ieeexplore.ieee.org/document/6333757/ 10450," We propose a general framework for modelling and solving deductive games, where one player selects a secret code and the other player strives to discover this code using a minimal number of allowed experiments that reveal some partial information about the code. The framework is implemented in a software tool Cobra, and its functionality is demonstrated by producing new results about existing deductive games. ",miroslav klimos,,2014.0,,arXiv,Klimos2014,True,,arXiv,Not available,Strategy Synthesis for General Deductive Games Based on SAT Solving,4da5fd520ed6dabb76cc12179ce7dff7,http://arxiv.org/abs/1407.3926v2 10451," We propose a general framework for modelling and solving deductive games, where one player selects a secret code and the other player strives to discover this code using a minimal number of allowed experiments that reveal some partial information about the code. The framework is implemented in a software tool Cobra, and its functionality is demonstrated by producing new results about existing deductive games. ",antonin kucera,,2014.0,,arXiv,Klimos2014,True,,arXiv,Not available,Strategy Synthesis for General Deductive Games Based on SAT Solving,4da5fd520ed6dabb76cc12179ce7dff7,http://arxiv.org/abs/1407.3926v2 10452," We study an ensemble of individuals playing the two games of the so-called Parrondo paradox. In our study, players are allowed to choose the game to be played by the whole ensemble in each turn. The choice cannot conform to the preferences of all the players and, consequently, they face a simple frustration phenomenon that requires some strategy to make a collective decision. We consider several such strategies and analyze how fluctuations can be used to improve the performance of the system. ",b. sotillo,,2014.0,10.1140/epjst/e2007-00068-0,"Eur. Phys. J. Special Topics 143, 39 (2007)",Parrondo2014,True,,arXiv,Not available,Collective decision making and paradoxical games,c655f281edf34ee886edc2b09cf69f10,http://arxiv.org/abs/1410.0241v1 10453," In this invited contribution, we propose a comprehensive introduction to game theory applied in computer aided synthesis. In this context, we give some classical results on two-player zero-sum games and then on multi-player non zero-sum games. The simple case of one-player games is strongly related to automata theory on infinite words. All along the article, we focus on general approaches to solve the studied problems, and we provide several illustrative examples as well as intuitions on the proofs. ",veronique bruyere,,2017.0,,arXiv,Bruyère2017,True,,arXiv,Not available,Computer aided synthesis: a game theoretic approach,6cd7a2291a6666d2b7cb57d1b955981d,http://arxiv.org/abs/1706.00652v1 10454," In a reachability-time game, players Min and Max choose moves so that the time to reach a final state in a timed automaton is minimised or maximised, respectively. Asarin and Maler showed decidability of reachability-time games on strongly non-Zeno timed automata using a value iteration algorithm. This paper complements their work by providing a strategy improvement algorithm for the problem. It also generalizes their decidability result because the proposed strategy improvement algorithm solves reachability-time games on all timed automata. The exact computational complexity of solving reachability-time games is also established: the problem is EXPTIME-complete for timed automata with at least two clocks. ",marcin jurdzinski,,2009.0,,"M. Jurdzi\'nski and A. Trivedi, Reachability-Time Games on Timed Automata (Extended Abstract), In ICALP, Volume 4596 of LNCS, pages 838--849, Springer 2007",Jurdziński2009,True,,arXiv,Not available,Reachability-time games on timed automata,fc19727ff3356306da6e4e97d0ef78d6,http://arxiv.org/abs/0907.3414v1 10455," In a reachability-time game, players Min and Max choose moves so that the time to reach a final state in a timed automaton is minimised or maximised, respectively. Asarin and Maler showed decidability of reachability-time games on strongly non-Zeno timed automata using a value iteration algorithm. This paper complements their work by providing a strategy improvement algorithm for the problem. It also generalizes their decidability result because the proposed strategy improvement algorithm solves reachability-time games on all timed automata. The exact computational complexity of solving reachability-time games is also established: the problem is EXPTIME-complete for timed automata with at least two clocks. ",ashutosh trivedi,,2009.0,,"M. Jurdzi\'nski and A. Trivedi, Reachability-Time Games on Timed Automata (Extended Abstract), In ICALP, Volume 4596 of LNCS, pages 838--849, Springer 2007",Jurdziński2009,True,,arXiv,Not available,Reachability-time games on timed automata,fc19727ff3356306da6e4e97d0ef78d6,http://arxiv.org/abs/0907.3414v1 10456," Parrondo's paradox occurs in sequences of games in which a winning expectation may be obtained by playing the games in a random order, even though each game in the sequence may be lost when played individually. Several variations of Parrondo's games apparently with paradoxical property have been introduced; history dependence, one dimensional line, two dimensional lattice and so on. In this article, we examine whether Parrondo's paradox occurs or not in scale free networks. This is interesting as an empirical study, since scale free networks are ubiquitous in our real world. First some simulation results are given and after that theoretical studies are made. As a result, we mostly confirm that Parrondo's paradox can not occur in the naive case, where the game has the same number of parameters as the original Parrondo's game. ",norihito toyota,,2012.0,,"Bulletin of Hokkaido Information University, Vol23.No1, 2011 Oct",Toyota2012,True,,arXiv,Not available,"Does Parrondo Paradox occur in Scale Free Networks? -A simple Consideration-",432952930109c8cb230d2da36b243efa,http://arxiv.org/abs/1204.5249v1 10457," Implementations of mobile games have become prevalent industrial technology due to the ubiquitous nature of mobile devices. However, simultaneous-movement multiplayer games, games that a player competes simultaneously with other players, are usually affected by such parameters as latency, type of game architecture and type of communication technology. This paper makes a review of the above parameters, considering the pros and cons of the various techniques used in addressing each parameter. It then goes ahead to propose an enhanced mechanism for dealing with packet delays based on partitioning the game background into grids. The proposed design is implemented and tested using Bluetooth and Wi-Fi communication technologies. The efficiency and effectiveness of the design are also analyzed. ",samuel opoku,,2012.0,,"Cyber Journals: Multidisciplinary Journals in Science and Technology, JSAT, Vol. 3, No. 4, pg 1-8, 2012",Opoku2012,True,,arXiv,Not available,"A Simultaneous-Movement Mobile Multiplayer Game Design based on Adaptive Background Partitioning Technique",7b4b880fa17483246b947e7e820f9cfd,http://arxiv.org/abs/1209.3052v1 10458," We introduce a non-diffusive spatial coupling term into the replicator equation of evolutionary game theory. The spatial flux is based on motion due to local gradients in the relative fitness of each strategy, providing a game-dependent alternative to diffusive coupling. We study numerically the development of patterns in 1D for two-strategy games including the coordination game and the prisoner's dilemma, and in 2D for the rock-paper-scissors game. In 1D we observe modified travelling wave solutions in the presence of diffusion, and asymptotic attracting states under a frozen strategy assumption without diffusion. In 2D we observe spiral formation and breakup in the frozen strategy rock-paper-scissors game without diffusion. A change of variables appropriate to replicator dynamics is shown to correctly capture the 1D asymptotic steady state via a nonlinear diffusion equation. ",russ deforest,,2012.0,10.1103/PhysRevE.87.062138,arXiv,deForest2012,True,,arXiv,Not available,"Spatial Pattern Dynamics due to the Fitness Gradient Flux in Evolutionary Games",93d1d332c69e921a046b9ab8c2f186a4,http://arxiv.org/abs/1212.3098v1 10459," We introduce a non-diffusive spatial coupling term into the replicator equation of evolutionary game theory. The spatial flux is based on motion due to local gradients in the relative fitness of each strategy, providing a game-dependent alternative to diffusive coupling. We study numerically the development of patterns in 1D for two-strategy games including the coordination game and the prisoner's dilemma, and in 2D for the rock-paper-scissors game. In 1D we observe modified travelling wave solutions in the presence of diffusion, and asymptotic attracting states under a frozen strategy assumption without diffusion. In 2D we observe spiral formation and breakup in the frozen strategy rock-paper-scissors game without diffusion. A change of variables appropriate to replicator dynamics is shown to correctly capture the 1D asymptotic steady state via a nonlinear diffusion equation. ",andrew belmonte,,2012.0,10.1103/PhysRevE.87.062138,arXiv,deForest2012,True,,arXiv,Not available,"Spatial Pattern Dynamics due to the Fitness Gradient Flux in Evolutionary Games",93d1d332c69e921a046b9ab8c2f186a4,http://arxiv.org/abs/1212.3098v1 10460," Recently, Apt and Markakis introduced a model for product adoption in social networks with multiple products, where the agents, influenced by their neighbours, can adopt one out of several alternatives (products). To analyze these networks we introduce social network games in which product adoption is obligatory. We show that when the underlying graph is a simple cycle, there is a polynomial time algorithm allowing us to determine whether the game has a Nash equilibrium. In contrast, in the arbitrary case this problem is NP-complete. We also show that the problem of determining whether the game is weakly acyclic is co-NP hard. Using these games we analyze various types of paradoxes that can arise in the considered networks. One of them corresponds to the well-known Braess paradox in congestion games. In particular, we show that social networks exist with the property that by adding an additional product to a specific node, the choices of the nodes will unavoidably evolve in such a way that everybody is strictly worse off. ",krzysztof apt,,2013.0,10.4204/EPTCS.119.16,"EPTCS 119, 2013, pp. 180-193",Apt2013,True,,arXiv,Not available,Social Network Games with Obligatory Product Selection,e6dfa31a1973b6feaf89e38e372f99ba,http://arxiv.org/abs/1305.5050v3 10461," Recently, Apt and Markakis introduced a model for product adoption in social networks with multiple products, where the agents, influenced by their neighbours, can adopt one out of several alternatives (products). To analyze these networks we introduce social network games in which product adoption is obligatory. We show that when the underlying graph is a simple cycle, there is a polynomial time algorithm allowing us to determine whether the game has a Nash equilibrium. In contrast, in the arbitrary case this problem is NP-complete. We also show that the problem of determining whether the game is weakly acyclic is co-NP hard. Using these games we analyze various types of paradoxes that can arise in the considered networks. One of them corresponds to the well-known Braess paradox in congestion games. In particular, we show that social networks exist with the property that by adding an additional product to a specific node, the choices of the nodes will unavoidably evolve in such a way that everybody is strictly worse off. ",sunil simon,,2013.0,10.4204/EPTCS.119.16,"EPTCS 119, 2013, pp. 180-193",Apt2013,True,,arXiv,Not available,Social Network Games with Obligatory Product Selection,e6dfa31a1973b6feaf89e38e372f99ba,http://arxiv.org/abs/1305.5050v3 10462," We give an algorithm for solving stochastic parity games with almost-sure winning conditions on lossy channel systems, for the case where the players are restricted to finite-memory strategies. First, we describe a general framework, where we consider the class of 2.5-player games with almost-sure parity winning conditions on possibly infinite game graphs, assuming that the game contains a finite attractor. An attractor is a set of states (not necessarily absorbing) that is almost surely re-visited regardless of the players' decisions. We present a scheme that characterizes the set of winning states for each player. Then, we instantiate this scheme to obtain an algorithm for stochastic game lossy channel systems. ",parosh abdulla,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Stochastic Parity Games on Lossy Channel Systems,b26d1abd64b4573c2506856c85634800,http://arxiv.org/abs/1305.5228v2 10463," We give an algorithm for solving stochastic parity games with almost-sure winning conditions on lossy channel systems, for the case where the players are restricted to finite-memory strategies. First, we describe a general framework, where we consider the class of 2.5-player games with almost-sure parity winning conditions on possibly infinite game graphs, assuming that the game contains a finite attractor. An attractor is a set of states (not necessarily absorbing) that is almost surely re-visited regardless of the players' decisions. We present a scheme that characterizes the set of winning states for each player. Then, we instantiate this scheme to obtain an algorithm for stochastic game lossy channel systems. ",lorenzo clemente,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Stochastic Parity Games on Lossy Channel Systems,b26d1abd64b4573c2506856c85634800,http://arxiv.org/abs/1305.5228v2 10464," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",michael menz,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10465," We give an algorithm for solving stochastic parity games with almost-sure winning conditions on lossy channel systems, for the case where the players are restricted to finite-memory strategies. First, we describe a general framework, where we consider the class of 2.5-player games with almost-sure parity winning conditions on possibly infinite game graphs, assuming that the game contains a finite attractor. An attractor is a set of states (not necessarily absorbing) that is almost surely re-visited regardless of the players' decisions. We present a scheme that characterizes the set of winning states for each player. Then, we instantiate this scheme to obtain an algorithm for stochastic game lossy channel systems. ",richard mayr,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Stochastic Parity Games on Lossy Channel Systems,b26d1abd64b4573c2506856c85634800,http://arxiv.org/abs/1305.5228v2 10466," We give an algorithm for solving stochastic parity games with almost-sure winning conditions on lossy channel systems, for the case where the players are restricted to finite-memory strategies. First, we describe a general framework, where we consider the class of 2.5-player games with almost-sure parity winning conditions on possibly infinite game graphs, assuming that the game contains a finite attractor. An attractor is a set of states (not necessarily absorbing) that is almost surely re-visited regardless of the players' decisions. We present a scheme that characterizes the set of winning states for each player. Then, we instantiate this scheme to obtain an algorithm for stochastic game lossy channel systems. ",sven sandberg,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Stochastic Parity Games on Lossy Channel Systems,b26d1abd64b4573c2506856c85634800,http://arxiv.org/abs/1305.5228v2 10467," A mediator implements a correlated equilibrium when it proposes a strategy to each player confidentially such that the mediator's proposal is the best interest for every player to follow. In this paper, we present a mediator that implements the best correlated equilibrium for an extended El Farol game with symmetric players. The extended El Farol game we consider incorporates both negative and positive network effects. We study the degree to which this type of mediator can decrease the overall social cost. In particular, we give an exact characterization of Mediation Value (MV) and Enforcement Value (EV) for this game. MV is the ratio of the minimum social cost over all Nash equilibria to the minimum social cost over all mediators, and EV is the ratio of the minimum social cost over all mediators to the optimal social cost. This sort of exact characterization is uncommon for games with both kinds of network effects. An interesting outcome of our results is that both the MV and EV values can be unbounded for our game. ",dieter mitsche,,2013.0,,arXiv,Mitsche2013,True,,arXiv,Not available,The Power of Mediation in an Extended El Farol Game,dce755a25e485618890c139b5fbf2f26,http://arxiv.org/abs/1307.7122v2 10468," A mediator implements a correlated equilibrium when it proposes a strategy to each player confidentially such that the mediator's proposal is the best interest for every player to follow. In this paper, we present a mediator that implements the best correlated equilibrium for an extended El Farol game with symmetric players. The extended El Farol game we consider incorporates both negative and positive network effects. We study the degree to which this type of mediator can decrease the overall social cost. In particular, we give an exact characterization of Mediation Value (MV) and Enforcement Value (EV) for this game. MV is the ratio of the minimum social cost over all Nash equilibria to the minimum social cost over all mediators, and EV is the ratio of the minimum social cost over all mediators to the optimal social cost. This sort of exact characterization is uncommon for games with both kinds of network effects. An interesting outcome of our results is that both the MV and EV values can be unbounded for our game. ",george saad,,2013.0,,arXiv,Mitsche2013,True,,arXiv,Not available,The Power of Mediation in an Extended El Farol Game,dce755a25e485618890c139b5fbf2f26,http://arxiv.org/abs/1307.7122v2 10469," A mediator implements a correlated equilibrium when it proposes a strategy to each player confidentially such that the mediator's proposal is the best interest for every player to follow. In this paper, we present a mediator that implements the best correlated equilibrium for an extended El Farol game with symmetric players. The extended El Farol game we consider incorporates both negative and positive network effects. We study the degree to which this type of mediator can decrease the overall social cost. In particular, we give an exact characterization of Mediation Value (MV) and Enforcement Value (EV) for this game. MV is the ratio of the minimum social cost over all Nash equilibria to the minimum social cost over all mediators, and EV is the ratio of the minimum social cost over all mediators to the optimal social cost. This sort of exact characterization is uncommon for games with both kinds of network effects. An interesting outcome of our results is that both the MV and EV values can be unbounded for our game. ",jared saia,,2013.0,,arXiv,Mitsche2013,True,,arXiv,Not available,The Power of Mediation in an Extended El Farol Game,dce755a25e485618890c139b5fbf2f26,http://arxiv.org/abs/1307.7122v2 10470," We present a version of the Banach-Mazur game, where open sets are replaced by elements of a fixed partially ordered set. We show how to apply it in the theory of Fraisse limits and beyond, obtaining simple proofs of universality of certain objects and classes. ",wieslaw kubis,,2015.0,,arXiv,Kubiś2015,True,,arXiv,Not available,Banach-Mazur game played in partially ordered sets,804b60baea8902a22c0e443bade3bea5,http://arxiv.org/abs/1505.01094v1 10471," We prove an $N^{2-o(1)}$ lower bound on the randomized communication complexity of finding an $\epsilon$-approximate Nash equilibrium (for constant $\epsilon>0$) in a two-player $N\times N$ game. ",mika goos,,2018.0,,arXiv,Göös2018,True,,arXiv,Not available,Near-Optimal Communication Lower Bounds for Approximate Nash Equilibria,449546a60eb7803b12565fdb9bc04673,http://arxiv.org/abs/1805.06387v1 10472," We prove an $N^{2-o(1)}$ lower bound on the randomized communication complexity of finding an $\epsilon$-approximate Nash equilibrium (for constant $\epsilon>0$) in a two-player $N\times N$ game. ",aviad rubinstein,,2018.0,,arXiv,Göös2018,True,,arXiv,Not available,Near-Optimal Communication Lower Bounds for Approximate Nash Equilibria,449546a60eb7803b12565fdb9bc04673,http://arxiv.org/abs/1805.06387v1 10473," Intention recognition is an important characteristic of intelligent agents. In their interactions with others, they try to read others' intentions and make an image of others to choose their actions accordingly. While the way in which players choose their actions depending on such intentions has been investigated in game theory, how dynamic changes in intentions by mutually reading others' intentions are incorporated into game theory has not been explored. We present a novel formulation of game theory in which players read others' intentions and change their own through an iterated game. Here, intention is given as a function of the other's action and the own action to be taken accordingly as the dependent variable, while the mutual recognition of intention is represented as the functional dynamics. It is shown that a player suffers no disadvantage when he/she recognizes the other's intention, whereas the functional dynamics reach equilibria in which both players' intentions are optimized. These cover a classical Nash and Stackelberg equilibria but we extend them in this study: Novel equilibria exist depending on the degree of mutual recognition. Moreover, the degree to which each player recognizes the other can also differ. This formulation is applied to resource competition, duopoly, and prisoner's dilemma games. For example, in the resource competition game with player-dependent capacity on gaining the resource, the superior player's recognition leads to the exploitation of the other, while the inferior player's recognition leads to cooperation through which both players' payoffs increase. ",yuma fujimoto,,2018.0,,arXiv,Fujimoto2018,True,,arXiv,Not available,Functional Dynamics by Intention Recognition in Iterated Games,480bebc232dee3901fc55bfc0b594884,http://arxiv.org/abs/1810.01740v1 10474," Intention recognition is an important characteristic of intelligent agents. In their interactions with others, they try to read others' intentions and make an image of others to choose their actions accordingly. While the way in which players choose their actions depending on such intentions has been investigated in game theory, how dynamic changes in intentions by mutually reading others' intentions are incorporated into game theory has not been explored. We present a novel formulation of game theory in which players read others' intentions and change their own through an iterated game. Here, intention is given as a function of the other's action and the own action to be taken accordingly as the dependent variable, while the mutual recognition of intention is represented as the functional dynamics. It is shown that a player suffers no disadvantage when he/she recognizes the other's intention, whereas the functional dynamics reach equilibria in which both players' intentions are optimized. These cover a classical Nash and Stackelberg equilibria but we extend them in this study: Novel equilibria exist depending on the degree of mutual recognition. Moreover, the degree to which each player recognizes the other can also differ. This formulation is applied to resource competition, duopoly, and prisoner's dilemma games. For example, in the resource competition game with player-dependent capacity on gaining the resource, the superior player's recognition leads to the exploitation of the other, while the inferior player's recognition leads to cooperation through which both players' payoffs increase. ",kunihiko kaneko,,2018.0,,arXiv,Fujimoto2018,True,,arXiv,Not available,Functional Dynamics by Intention Recognition in Iterated Games,480bebc232dee3901fc55bfc0b594884,http://arxiv.org/abs/1810.01740v1 10475," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",justin wang,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10476," We analyze the problem of distributed power allocation for orthogonal multiple access channels by considering a continuous non-cooperative game whose strategy space represents the users' distribution of transmission power over the network's channels. When the channels are static, we find that this game admits an exact potential function and this allows us to show that it has a unique equilibrium almost surely. Furthermore, using the game's potential property, we derive a modified version of the replicator dynamics of evolutionary game theory which applies to this continuous game, and we show that if the network's users employ a distributed learning scheme based on these dynamics, then they converge to equilibrium exponentially quickly. On the other hand, a major challenge occurs if the channels do not remain static but fluctuate stochastically over time, following a stationary ergodic process. In that case, the associated ergodic game still admits a unique equilibrium, but the learning analysis becomes much more complicated because the replicator dynamics are no longer deterministic. Nonetheless, by employing results from the theory of stochastic approximation, we show that users still converge to the game's unique equilibrium. Our analysis hinges on a game-theoretical result which is of independent interest: in finite player games which admit a (possibly nonlinear) convex potential function, the replicator dynamics (suitably modified to account for nonlinear payoffs) converge to an eps-neighborhood of an equilibrium at time of order O(log(1/eps)). ",panayotis mertikopoulos,,2011.0,10.1109/JSAC.2012.1201xx,"IEEE Journal on Selected Areas in Communication, vol. 30, no. 1, pp. 1-11, January 2012",Mertikopoulos2011,True,,arXiv,Not available,"Distributed Learning Policies for Power Allocation in Multiple Access Channels",de13946b1cb5ab79ebd752ddae3a47eb,http://arxiv.org/abs/1103.3541v2 10477," We analyze the problem of distributed power allocation for orthogonal multiple access channels by considering a continuous non-cooperative game whose strategy space represents the users' distribution of transmission power over the network's channels. When the channels are static, we find that this game admits an exact potential function and this allows us to show that it has a unique equilibrium almost surely. Furthermore, using the game's potential property, we derive a modified version of the replicator dynamics of evolutionary game theory which applies to this continuous game, and we show that if the network's users employ a distributed learning scheme based on these dynamics, then they converge to equilibrium exponentially quickly. On the other hand, a major challenge occurs if the channels do not remain static but fluctuate stochastically over time, following a stationary ergodic process. In that case, the associated ergodic game still admits a unique equilibrium, but the learning analysis becomes much more complicated because the replicator dynamics are no longer deterministic. Nonetheless, by employing results from the theory of stochastic approximation, we show that users still converge to the game's unique equilibrium. Our analysis hinges on a game-theoretical result which is of independent interest: in finite player games which admit a (possibly nonlinear) convex potential function, the replicator dynamics (suitably modified to account for nonlinear payoffs) converge to an eps-neighborhood of an equilibrium at time of order O(log(1/eps)). ",elena belmega,,2011.0,10.1109/JSAC.2012.1201xx,"IEEE Journal on Selected Areas in Communication, vol. 30, no. 1, pp. 1-11, January 2012",Mertikopoulos2011,True,,arXiv,Not available,"Distributed Learning Policies for Power Allocation in Multiple Access Channels",de13946b1cb5ab79ebd752ddae3a47eb,http://arxiv.org/abs/1103.3541v2 10478," We analyze the problem of distributed power allocation for orthogonal multiple access channels by considering a continuous non-cooperative game whose strategy space represents the users' distribution of transmission power over the network's channels. When the channels are static, we find that this game admits an exact potential function and this allows us to show that it has a unique equilibrium almost surely. Furthermore, using the game's potential property, we derive a modified version of the replicator dynamics of evolutionary game theory which applies to this continuous game, and we show that if the network's users employ a distributed learning scheme based on these dynamics, then they converge to equilibrium exponentially quickly. On the other hand, a major challenge occurs if the channels do not remain static but fluctuate stochastically over time, following a stationary ergodic process. In that case, the associated ergodic game still admits a unique equilibrium, but the learning analysis becomes much more complicated because the replicator dynamics are no longer deterministic. Nonetheless, by employing results from the theory of stochastic approximation, we show that users still converge to the game's unique equilibrium. Our analysis hinges on a game-theoretical result which is of independent interest: in finite player games which admit a (possibly nonlinear) convex potential function, the replicator dynamics (suitably modified to account for nonlinear payoffs) converge to an eps-neighborhood of an equilibrium at time of order O(log(1/eps)). ",aris moustakas,,2011.0,10.1109/JSAC.2012.1201xx,"IEEE Journal on Selected Areas in Communication, vol. 30, no. 1, pp. 1-11, January 2012",Mertikopoulos2011,True,,arXiv,Not available,"Distributed Learning Policies for Power Allocation in Multiple Access Channels",de13946b1cb5ab79ebd752ddae3a47eb,http://arxiv.org/abs/1103.3541v2 10479," We analyze the problem of distributed power allocation for orthogonal multiple access channels by considering a continuous non-cooperative game whose strategy space represents the users' distribution of transmission power over the network's channels. When the channels are static, we find that this game admits an exact potential function and this allows us to show that it has a unique equilibrium almost surely. Furthermore, using the game's potential property, we derive a modified version of the replicator dynamics of evolutionary game theory which applies to this continuous game, and we show that if the network's users employ a distributed learning scheme based on these dynamics, then they converge to equilibrium exponentially quickly. On the other hand, a major challenge occurs if the channels do not remain static but fluctuate stochastically over time, following a stationary ergodic process. In that case, the associated ergodic game still admits a unique equilibrium, but the learning analysis becomes much more complicated because the replicator dynamics are no longer deterministic. Nonetheless, by employing results from the theory of stochastic approximation, we show that users still converge to the game's unique equilibrium. Our analysis hinges on a game-theoretical result which is of independent interest: in finite player games which admit a (possibly nonlinear) convex potential function, the replicator dynamics (suitably modified to account for nonlinear payoffs) converge to an eps-neighborhood of an equilibrium at time of order O(log(1/eps)). ",samson lasaulce,,2011.0,10.1109/JSAC.2012.1201xx,"IEEE Journal on Selected Areas in Communication, vol. 30, no. 1, pp. 1-11, January 2012",Mertikopoulos2011,True,,arXiv,Not available,"Distributed Learning Policies for Power Allocation in Multiple Access Channels",de13946b1cb5ab79ebd752ddae3a47eb,http://arxiv.org/abs/1103.3541v2 10480," We consider both finite-state game graphs and recursive game graphs (or pushdown game graphs), that can model the control flow of sequential programs with recursion, with multi-dimensional mean-payoff objectives. In pushdown games two types of strategies are relevant: global strategies, that depend on the entire global history; and modular strategies, that have only local memory and thus do not depend on the context of invocation. We present solutions to several fundamental algorithmic questions and our main contributions are as follows: (1) We show that finite-state multi-dimensional mean-payoff games can be solved in polynomial time if the number of dimensions and the maximal absolute value of the weight is fixed; whereas if the number of dimensions is arbitrary, then problem is already known to be coNP-complete. (2) We show that pushdown graphs with multi-dimensional mean-payoff objectives can be solved in polynomial time. (3) For pushdown games under global strategies both single and multi-dimensional mean-payoff objectives problems are known to be undecidable, and we show that under modular strategies the multi-dimensional problem is also undecidable (whereas under modular strategies the single dimensional problem is NP-complete). We show that if the number of modules, the number of exits, and the maximal absolute value of the weight is fixed, then pushdown games under modular strategies with single dimensional mean-payoff objectives can be solved in polynomial time, and if either of the number of exits or the number of modules is not bounded, then the problem is NP-hard. (4) Finally we show that a fixed parameter tractable algorithm for finite-state multi-dimensional mean-payoff games or pushdown games under modular strategies with single-dimensional mean-payoff objectives would imply the solution of the long-standing open problem of fixed parameter tractability of parity games. ",krishnendu chatterjee,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Hyperplane Separation Technique for Multidimensional Mean-Payoff Games,bbe76b21e05bb756b09e08e1478addeb,http://arxiv.org/abs/1210.3141v2 10481," We consider both finite-state game graphs and recursive game graphs (or pushdown game graphs), that can model the control flow of sequential programs with recursion, with multi-dimensional mean-payoff objectives. In pushdown games two types of strategies are relevant: global strategies, that depend on the entire global history; and modular strategies, that have only local memory and thus do not depend on the context of invocation. We present solutions to several fundamental algorithmic questions and our main contributions are as follows: (1) We show that finite-state multi-dimensional mean-payoff games can be solved in polynomial time if the number of dimensions and the maximal absolute value of the weight is fixed; whereas if the number of dimensions is arbitrary, then problem is already known to be coNP-complete. (2) We show that pushdown graphs with multi-dimensional mean-payoff objectives can be solved in polynomial time. (3) For pushdown games under global strategies both single and multi-dimensional mean-payoff objectives problems are known to be undecidable, and we show that under modular strategies the multi-dimensional problem is also undecidable (whereas under modular strategies the single dimensional problem is NP-complete). We show that if the number of modules, the number of exits, and the maximal absolute value of the weight is fixed, then pushdown games under modular strategies with single dimensional mean-payoff objectives can be solved in polynomial time, and if either of the number of exits or the number of modules is not bounded, then the problem is NP-hard. (4) Finally we show that a fixed parameter tractable algorithm for finite-state multi-dimensional mean-payoff games or pushdown games under modular strategies with single-dimensional mean-payoff objectives would imply the solution of the long-standing open problem of fixed parameter tractability of parity games. ",yaron velner,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Hyperplane Separation Technique for Multidimensional Mean-Payoff Games,bbe76b21e05bb756b09e08e1478addeb,http://arxiv.org/abs/1210.3141v2 10482," We recently introduced p-automata, automata that read discrete-time Markov chains. We used turn-based stochastic parity games to define acceptance of Markov chains by a subclass of p-automata. Definition of acceptance required a cumbersome and complicated reduction to a series of turn-based stochastic parity games. The reduction could not support acceptance by general p-automata, which was left undefined as there was no notion of games that supported it. Here we generalize two-player games by adding a structural acceptance condition called obligations. Obligations are orthogonal to the linear winning conditions that define winning. Obligations are a declaration that player 0 can achieve a certain value from a configuration. If the obligation is met, the value of that configuration for player 0 is 1. One cannot define value in obligation games by the standard mechanism of considering the measure of winning paths on a Markov chain and taking the supremum of the infimum of all strategies. Mainly because obligations need definition even for Markov chains and the nature of obligations has the flavor of an infinite nesting of supremum and infimum operators. We define value via a reduction to turn-based games similar to Martin's proof of determinacy of Blackwell games with Borel objectives. Based on this definition, we show that games are determined. We show that for Markov chains with Borel objectives and obligations, and finite turn-based stochastic parity games with obligations there exists an alternative and simpler characterization of the value function. Based on this simpler definition we give an exponential time algorithm to analyze finite turn-based stochastic parity games with obligations. Finally, we show that obligation games provide the necessary framework for reasoning about p-automata and that they generalize the previous definition. ",krishnendu chatterjee,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Obligation Blackwell Games and p-Automata,697c69bc8ce2cb008633e5fefcb12735,http://arxiv.org/abs/1206.5174v3 10483," We recently introduced p-automata, automata that read discrete-time Markov chains. We used turn-based stochastic parity games to define acceptance of Markov chains by a subclass of p-automata. Definition of acceptance required a cumbersome and complicated reduction to a series of turn-based stochastic parity games. The reduction could not support acceptance by general p-automata, which was left undefined as there was no notion of games that supported it. Here we generalize two-player games by adding a structural acceptance condition called obligations. Obligations are orthogonal to the linear winning conditions that define winning. Obligations are a declaration that player 0 can achieve a certain value from a configuration. If the obligation is met, the value of that configuration for player 0 is 1. One cannot define value in obligation games by the standard mechanism of considering the measure of winning paths on a Markov chain and taking the supremum of the infimum of all strategies. Mainly because obligations need definition even for Markov chains and the nature of obligations has the flavor of an infinite nesting of supremum and infimum operators. We define value via a reduction to turn-based games similar to Martin's proof of determinacy of Blackwell games with Borel objectives. Based on this definition, we show that games are determined. We show that for Markov chains with Borel objectives and obligations, and finite turn-based stochastic parity games with obligations there exists an alternative and simpler characterization of the value function. Based on this simpler definition we give an exponential time algorithm to analyze finite turn-based stochastic parity games with obligations. Finally, we show that obligation games provide the necessary framework for reasoning about p-automata and that they generalize the previous definition. ",nir piterman,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Obligation Blackwell Games and p-Automata,697c69bc8ce2cb008633e5fefcb12735,http://arxiv.org/abs/1206.5174v3 10484," Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 1993] instead at each step only one randomly chosen player is allowed to update. We study properties of the all-logit dynamics in the context of local interaction games, a class of games that has been used to model complex social phenomena and physical systems. In a local interaction game, players are the vertices of a social graph whose edges are two-player potential games. Each player picks one strategy to be played for all the games she is involved in and the payoff of the player is the sum of the payoffs from each of the games. We prove that local interaction games characterize the class of games for which the all-logit dynamics is reversible. We then compare the stationary behavior of one-logit and all-logit dynamics. Specifically, we look at the expected value of a notable class of observables, that we call decomposable observables. We prove that the difference between the expected values of the observables at stationarity for the two dynamics depends only on the rationality level beta and on the distance of the social graph from a bipartite graph. In particular, if the social graph is bipartite then decomposable observables have the same expected value. Finally, we show that the mixing time of the all-logit dynamics has the same twofold behavior that has been highlighted in the case of the one-logit: for some games it exponentially depends on the rationality level beta, whereas for other games it can be upper bounded by a function independent from beta. ",vincenzo auletta,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Logit Dynamics with Concurrent Updates for Local-Interaction Games,d4fb3451e2ab935ee050a1a5e5c1e54d,http://arxiv.org/abs/1207.2908v4 10485," Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 1993] instead at each step only one randomly chosen player is allowed to update. We study properties of the all-logit dynamics in the context of local interaction games, a class of games that has been used to model complex social phenomena and physical systems. In a local interaction game, players are the vertices of a social graph whose edges are two-player potential games. Each player picks one strategy to be played for all the games she is involved in and the payoff of the player is the sum of the payoffs from each of the games. We prove that local interaction games characterize the class of games for which the all-logit dynamics is reversible. We then compare the stationary behavior of one-logit and all-logit dynamics. Specifically, we look at the expected value of a notable class of observables, that we call decomposable observables. We prove that the difference between the expected values of the observables at stationarity for the two dynamics depends only on the rationality level beta and on the distance of the social graph from a bipartite graph. In particular, if the social graph is bipartite then decomposable observables have the same expected value. Finally, we show that the mixing time of the all-logit dynamics has the same twofold behavior that has been highlighted in the case of the one-logit: for some games it exponentially depends on the rationality level beta, whereas for other games it can be upper bounded by a function independent from beta. ",diodato ferraioli,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Logit Dynamics with Concurrent Updates for Local-Interaction Games,d4fb3451e2ab935ee050a1a5e5c1e54d,http://arxiv.org/abs/1207.2908v4 10486," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",jiyang xie,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10487," Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 1993] instead at each step only one randomly chosen player is allowed to update. We study properties of the all-logit dynamics in the context of local interaction games, a class of games that has been used to model complex social phenomena and physical systems. In a local interaction game, players are the vertices of a social graph whose edges are two-player potential games. Each player picks one strategy to be played for all the games she is involved in and the payoff of the player is the sum of the payoffs from each of the games. We prove that local interaction games characterize the class of games for which the all-logit dynamics is reversible. We then compare the stationary behavior of one-logit and all-logit dynamics. Specifically, we look at the expected value of a notable class of observables, that we call decomposable observables. We prove that the difference between the expected values of the observables at stationarity for the two dynamics depends only on the rationality level beta and on the distance of the social graph from a bipartite graph. In particular, if the social graph is bipartite then decomposable observables have the same expected value. Finally, we show that the mixing time of the all-logit dynamics has the same twofold behavior that has been highlighted in the case of the one-logit: for some games it exponentially depends on the rationality level beta, whereas for other games it can be upper bounded by a function independent from beta. ",francesco pasquale,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Logit Dynamics with Concurrent Updates for Local-Interaction Games,d4fb3451e2ab935ee050a1a5e5c1e54d,http://arxiv.org/abs/1207.2908v4 10488," Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 1993] instead at each step only one randomly chosen player is allowed to update. We study properties of the all-logit dynamics in the context of local interaction games, a class of games that has been used to model complex social phenomena and physical systems. In a local interaction game, players are the vertices of a social graph whose edges are two-player potential games. Each player picks one strategy to be played for all the games she is involved in and the payoff of the player is the sum of the payoffs from each of the games. We prove that local interaction games characterize the class of games for which the all-logit dynamics is reversible. We then compare the stationary behavior of one-logit and all-logit dynamics. Specifically, we look at the expected value of a notable class of observables, that we call decomposable observables. We prove that the difference between the expected values of the observables at stationarity for the two dynamics depends only on the rationality level beta and on the distance of the social graph from a bipartite graph. In particular, if the social graph is bipartite then decomposable observables have the same expected value. Finally, we show that the mixing time of the all-logit dynamics has the same twofold behavior that has been highlighted in the case of the one-logit: for some games it exponentially depends on the rationality level beta, whereas for other games it can be upper bounded by a function independent from beta. ",paolo penna,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Logit Dynamics with Concurrent Updates for Local-Interaction Games,d4fb3451e2ab935ee050a1a5e5c1e54d,http://arxiv.org/abs/1207.2908v4 10489," Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 1993] instead at each step only one randomly chosen player is allowed to update. We study properties of the all-logit dynamics in the context of local interaction games, a class of games that has been used to model complex social phenomena and physical systems. In a local interaction game, players are the vertices of a social graph whose edges are two-player potential games. Each player picks one strategy to be played for all the games she is involved in and the payoff of the player is the sum of the payoffs from each of the games. We prove that local interaction games characterize the class of games for which the all-logit dynamics is reversible. We then compare the stationary behavior of one-logit and all-logit dynamics. Specifically, we look at the expected value of a notable class of observables, that we call decomposable observables. We prove that the difference between the expected values of the observables at stationarity for the two dynamics depends only on the rationality level beta and on the distance of the social graph from a bipartite graph. In particular, if the social graph is bipartite then decomposable observables have the same expected value. Finally, we show that the mixing time of the all-logit dynamics has the same twofold behavior that has been highlighted in the case of the one-logit: for some games it exponentially depends on the rationality level beta, whereas for other games it can be upper bounded by a function independent from beta. ",giuseppe persiano,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Logit Dynamics with Concurrent Updates for Local-Interaction Games,d4fb3451e2ab935ee050a1a5e5c1e54d,http://arxiv.org/abs/1207.2908v4 10490," Facility location games have been a topic of major interest in economics, operations research and computer science, starting from the seminal work by Hotelling. Spatial facility location models have successfully predicted the outcome of competition in a variety of scenarios. In a typical facility location game, users/customers/voters are mapped to a metric space representing their preferences, and each player picks a point (facility) in that space. In most facility location games considered in the literature, users are assumed to act deterministically: given the facilities chosen by the players, users are attracted to their nearest facility. This paper introduces facility location games with probabilistic attraction, dubbed Shapley facility location games, due to a surprising connection to the Shapley value. The specific attraction function we adopt in this model is aligned with the recent findings of the behavioral economics literature on choice prediction. Given this model, our first main result is that Shapley facility location games are potential games; hence, they possess pure Nash equilibrium. Moreover, the latter is true for any compact user space, any user distribution over that space, and any number of players. Note that this is in sharp contrast to Hotelling facility location games. In our second main result we show that under the assumption that players can compute an approximate best response, approximate equilibrium profiles can be learned efficiently by the players via dynamics. Our third main result is a bound on the Price of Anarchy of this class of games, as well as showing the bound is tight. Ultimately, we show that player payoffs coincide with their Shapley value in a coalition game, where coalition gains are the social welfare of the users. ",omer ben-porat,,2017.0,,arXiv,Ben-Porat2017,True,,arXiv,Not available,Shapley Facility Location Games,b08f648e7ac1f83ea735514801cc98cd,http://arxiv.org/abs/1709.10278v2 10491," Facility location games have been a topic of major interest in economics, operations research and computer science, starting from the seminal work by Hotelling. Spatial facility location models have successfully predicted the outcome of competition in a variety of scenarios. In a typical facility location game, users/customers/voters are mapped to a metric space representing their preferences, and each player picks a point (facility) in that space. In most facility location games considered in the literature, users are assumed to act deterministically: given the facilities chosen by the players, users are attracted to their nearest facility. This paper introduces facility location games with probabilistic attraction, dubbed Shapley facility location games, due to a surprising connection to the Shapley value. The specific attraction function we adopt in this model is aligned with the recent findings of the behavioral economics literature on choice prediction. Given this model, our first main result is that Shapley facility location games are potential games; hence, they possess pure Nash equilibrium. Moreover, the latter is true for any compact user space, any user distribution over that space, and any number of players. Note that this is in sharp contrast to Hotelling facility location games. In our second main result we show that under the assumption that players can compute an approximate best response, approximate equilibrium profiles can be learned efficiently by the players via dynamics. Our third main result is a bound on the Price of Anarchy of this class of games, as well as showing the bound is tight. Ultimately, we show that player payoffs coincide with their Shapley value in a coalition game, where coalition gains are the social welfare of the users. ",moshe tennenholtz,,2017.0,,arXiv,Ben-Porat2017,True,,arXiv,Not available,Shapley Facility Location Games,b08f648e7ac1f83ea735514801cc98cd,http://arxiv.org/abs/1709.10278v2 10492," Motivated by problems in percolation theory, we study the following 2-player positional game. Let $\Lambda_{m \times n}$ be a rectangular grid-graph with $m$ vertices in each row and $n$ vertices in each column. Two players, Maker and Breaker, play in alternating turns. On each of her turns, Maker claims $p$ (as-yet unclaimed) edges of the board $\Lambda_{m \times n}$, while on each of his turns Breaker claims $q$ (as-yet unclaimed) edges of the board and destroys them. Maker wins the game if she manages to claim all the edges of a crossing path joining the left-hand side of the board to its right-hand side, otherwise Breaker wins. We call this game the $(p,q)$-crossing game on $\Lambda_{m \times n}$. Given $m,n\in \mathbb{N}$, for which pairs $(p,q)$ does Maker have a winning strategy for the $(p,q)$-crossing game on $\Lambda_{m \times n}$? The $(1,1)$-case corresponds exactly to the popular game of Bridg-it, which is well understood due to it being a special case of the older Shannon switching game. In this paper, we study the general $(p,q)$-case. Our main result is to establish the following transition: $\bullet$ If $p\geqslant 2q$, then Maker wins the game on arbitrarily long versions of the narrowest board possible, i.e. Maker has a winning strategy for the $(2q, q)$-crossing game on $\Lambda_{m \times(q+1)}$ for any $m\in \mathbb{N}$; $\bullet$ if $p\leqslant 2q-1$, then for every width $n$ of the board, Breaker has a winning strategy for the $(p,q)$-crossing game on $\Lambda_{m \times n}$ for all sufficiently large board-lengths $m$. Our winning strategies in both cases adapt more generally to other grids and crossing games. In addition we pose many new questions and problems. ",a. day,,2018.0,,arXiv,Day2018,True,,arXiv,Not available,Maker-Breaker Percolation Games I: Crossing Grids,00727d55c7d24564ec1385ba717ecc40,http://arxiv.org/abs/1810.05190v1 10493," Motivated by problems in percolation theory, we study the following 2-player positional game. Let $\Lambda_{m \times n}$ be a rectangular grid-graph with $m$ vertices in each row and $n$ vertices in each column. Two players, Maker and Breaker, play in alternating turns. On each of her turns, Maker claims $p$ (as-yet unclaimed) edges of the board $\Lambda_{m \times n}$, while on each of his turns Breaker claims $q$ (as-yet unclaimed) edges of the board and destroys them. Maker wins the game if she manages to claim all the edges of a crossing path joining the left-hand side of the board to its right-hand side, otherwise Breaker wins. We call this game the $(p,q)$-crossing game on $\Lambda_{m \times n}$. Given $m,n\in \mathbb{N}$, for which pairs $(p,q)$ does Maker have a winning strategy for the $(p,q)$-crossing game on $\Lambda_{m \times n}$? The $(1,1)$-case corresponds exactly to the popular game of Bridg-it, which is well understood due to it being a special case of the older Shannon switching game. In this paper, we study the general $(p,q)$-case. Our main result is to establish the following transition: $\bullet$ If $p\geqslant 2q$, then Maker wins the game on arbitrarily long versions of the narrowest board possible, i.e. Maker has a winning strategy for the $(2q, q)$-crossing game on $\Lambda_{m \times(q+1)}$ for any $m\in \mathbb{N}$; $\bullet$ if $p\leqslant 2q-1$, then for every width $n$ of the board, Breaker has a winning strategy for the $(p,q)$-crossing game on $\Lambda_{m \times n}$ for all sufficiently large board-lengths $m$. Our winning strategies in both cases adapt more generally to other grids and crossing games. In addition we pose many new questions and problems. ",victor falgas-ravry,,2018.0,,arXiv,Day2018,True,,arXiv,Not available,Maker-Breaker Percolation Games I: Crossing Grids,00727d55c7d24564ec1385ba717ecc40,http://arxiv.org/abs/1810.05190v1 10494," The numbers game is a one-player game played on a finite simple graph with certain ``amplitudes'' assigned to its edges and with an initial assignment of real numbers to its nodes. The moves of the game successively transform the numbers at the nodes using the amplitudes in a certain way. This game has been studied previously by Proctor, Mozes, Bjorner, Eriksson, and Wildberger. We show that those connected such graphs for which the numbers game meets a certain finiteness requirement are precisely the Dynkin diagrams associated with the finite-dimensional complex simple Lie algebras. As a consequence of our proof we obtain the classifications of the finite-dimensional Kac-Moody algebras and of the finite Weyl groups. We use Coxeter group theory to establish a more general result that applies to Eriksson's E-games: an E-game meets the finiteness requirement if and only if a naturally associated Coxeter group is finite. To prove this and some other finiteness results we further develop Eriksson's theory of a geometric representation of Coxeter groups and observe some curious differences of this representation from the standard geometric representation. ",robert donnelly,,2006.0,,arXiv,Donnelly2006,True,,arXiv,Not available,"The numbers game, geometric representations of Coxeter groups, and Dynkin diagram classification results",93d00041875960da1b571c0be525b72a,http://arxiv.org/abs/math/0610702v1 10495," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",yutao jiao,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 10496," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",ping wang,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 10497," In this paper, a gentle introduction to Game Theory is presented in the form of basic concepts and examples. Minimax and Nash's theorem are introduced as the formal definitions for optimal strategies and equilibria in zero-sum and nonzero-sum games. Several elements of cooperative gaming, coalitions, voting ensembles, voting power and collective efficiency are described in brief. Analytical (matrix) and extended (tree-graph) forms of game representation is illustrated as the basic tools for identifying optimal strategies and ""solutions"" in games of any kind. Next, a typology of four standard nonzero-sum games is investigated, analyzing the Nash equilibria and the optimal strategies in each case. Signaling, stance and third-party intermediates are described as very important properties when analyzing strategic moves, while credibility and reputation is described as crucial factors when signaling promises or threats. Utility is introduced as a generalization of typical cost/gain functions and it is used to explain the incentives of irrational players under the scope of ""rational irrationality"". Finally, a brief reference is presented for several other more advanced concepts of gaming, including emergence of cooperation, evolutionary stable strategies, two-level games, metagames, hypergames and the Harsanyi transformation. ",harris georgiou,,2015.0,,arXiv,Georgiou2015,True,,arXiv,Not available,"Elements of Game Theory - Part I: Foundations, acts and mechanisms",77780bd40ba2dfeda5900f14ee1aae15,http://arxiv.org/abs/1506.05148v1 10498," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",dusit niyato,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 10499," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",mohammad alsheikh,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 10500," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",shaohan feng,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 10501," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",li-hsing yen,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 10502," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",guang-hong sun,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 10503," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",hedyeh beyhaghi,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 10504," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",negin golrezaei,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 10505," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",renato leme,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 10506," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",martin pal,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 10507," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",balasubramanian siva,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 10508," In many cases the Nash equilibria are not predictive of the experimental players' behaviour. For some games of Game Theory it is proposed here a method to estimate the probabilities with which the different options will be actually chosen by balanced players, i.e. players that are neither too competitive, nor too cooperative. This will allow to measure the intrinsec cooperativeness degree of a game, only in function of its payoffs. The method is shaped on the Prisoner's Dilemma, then generalized for asymmetric tables, N players and N options. It is adapted to other conditions like Chicken Game, Battle of the Sexes, Stag Hunt and Translators (a new name proposed for a particular condition). Then the method is applied to other games like Diner's Dilemma, Public Goods Game, Traveler's Dilemma and War of Attrition. These games are so analyzed in a probabilistic way that is consistent to what we could expect intuitively, overcoming some known paradoxes of the Game Theory. ",cesco reale,,2014.0,,arXiv,Reale2014,True,,arXiv,Not available,"How much is convenient to defect? A method to estimate the cooperation probability in Prisoner's Dilemma and other games",c8479431bae1162ef38b3e7d8b5eb3d0,http://arxiv.org/abs/1404.2306v1 10509," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",gianluca brero,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 10510," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sebastien lahaie,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 10511," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sven seuken,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 10512," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",sujit gujar,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 10513," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",y narahari,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 10514," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",shahar dobzinski,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 10515," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",jan vondrak,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 10519," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",ian gemp,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 10520," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",m. faqiry,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 10521," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",sanjoy das,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 10522," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 10523," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 10524," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",shuchi chawla,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 10525," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",jason hartline,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 10526," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",denis nekipelov,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 10527," Pertaining to Agent-based Computational Economics (ACE), this work presents two models for the rise and downfall of speculative bubbles through an exchange price fixing based on double auction mechanisms. The first model is based on a finite time horizon context, where the expected dividends decrease along time. The second model follows the {\em greater fool} hypothesis; the agent behaviour depends on the comparison of the estimated risk with the greater fool's. Simulations shed some light on the influent parameters and the necessary conditions for the apparition of speculative bubbles in an asset market within the considered framework. ",yann semet,,2005.0,,arXiv,Semet2005,True,,arXiv,Not available,Artificial Agents and Speculative Bubbles,e4efe4af55a52726e25bcbc3df25166a,http://arxiv.org/abs/cs/0511093v1 10528," Pertaining to Agent-based Computational Economics (ACE), this work presents two models for the rise and downfall of speculative bubbles through an exchange price fixing based on double auction mechanisms. The first model is based on a finite time horizon context, where the expected dividends decrease along time. The second model follows the {\em greater fool} hypothesis; the agent behaviour depends on the comparison of the estimated risk with the greater fool's. Simulations shed some light on the influent parameters and the necessary conditions for the apparition of speculative bubbles in an asset market within the considered framework. ",sylvain gelly,,2005.0,,arXiv,Semet2005,True,,arXiv,Not available,Artificial Agents and Speculative Bubbles,e4efe4af55a52726e25bcbc3df25166a,http://arxiv.org/abs/cs/0511093v1 10529," Pertaining to Agent-based Computational Economics (ACE), this work presents two models for the rise and downfall of speculative bubbles through an exchange price fixing based on double auction mechanisms. The first model is based on a finite time horizon context, where the expected dividends decrease along time. The second model follows the {\em greater fool} hypothesis; the agent behaviour depends on the comparison of the estimated risk with the greater fool's. Simulations shed some light on the influent parameters and the necessary conditions for the apparition of speculative bubbles in an asset market within the considered framework. ",marc schoenauer,,2005.0,,arXiv,Semet2005,True,,arXiv,Not available,Artificial Agents and Speculative Bubbles,e4efe4af55a52726e25bcbc3df25166a,http://arxiv.org/abs/cs/0511093v1 10530," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",sridhar mahadevan,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 10531," Pertaining to Agent-based Computational Economics (ACE), this work presents two models for the rise and downfall of speculative bubbles through an exchange price fixing based on double auction mechanisms. The first model is based on a finite time horizon context, where the expected dividends decrease along time. The second model follows the {\em greater fool} hypothesis; the agent behaviour depends on the comparison of the estimated risk with the greater fool's. Simulations shed some light on the influent parameters and the necessary conditions for the apparition of speculative bubbles in an asset market within the considered framework. ",michele sebag,,2005.0,,arXiv,Semet2005,True,,arXiv,Not available,Artificial Agents and Speculative Bubbles,e4efe4af55a52726e25bcbc3df25166a,http://arxiv.org/abs/cs/0511093v1 10532," This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum. ",yoshifumi manabe,,2012.0,10.4204/EPTCS.78.2,"EPTCS 78, 2012, pp. 15-23",Manabe2012,True,,arXiv,Not available,A Cryptographic Moving-Knife Cake-Cutting Protocol,a6eb782c75213445fc265c09618d6ab5,http://arxiv.org/abs/1202.4507v1 10533," This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum. ",tatsuaki okamoto,,2012.0,10.4204/EPTCS.78.2,"EPTCS 78, 2012, pp. 15-23",Manabe2012,True,,arXiv,Not available,A Cryptographic Moving-Knife Cake-Cutting Protocol,a6eb782c75213445fc265c09618d6ab5,http://arxiv.org/abs/1202.4507v1 10534," For product rating environments, similar to that of Amazon Reviews, it has been shown that the truthful elicitation of feedback is possible through mechanisms which pay buyer reports contingent on the reports of other buyers. We study whether similar mechanisms can be designed for reputation mechanisms at online auction sites where the buyers' experiences are partially determined by a strategic seller. We show that this is impossible for the basic setting. However, introducing a small prior belief that the seller is a cooperative commitment player leads to a payment scheme with a truthful perfect Bayesian equilibrium. ",jens witkowski,,2012.0,,arXiv,Witkowski2012,True,,arXiv,Not available,Truthful Feedback for Sanctioning Reputation Mechanisms,901bdf347f1f5ec4f1c2726ce57cddff,http://arxiv.org/abs/1203.3527v1 10535," In this paper, we study a general online linear programming problem whose formulation encompasses many practical dynamic resource allocation problems, including internet advertising display applications, revenue management, various routing, packing, and auction problems. We propose a model, which under mild assumptions, allows us to design near-optimal learning-based online algorithms that do not require the a priori knowledge about the total number of online requests to come, a first of its kind. We then consider two variants of the problem that relax the initial assumptions imposed on the proposed model. ",patrick jaillet,,2012.0,,arXiv,Jaillet2012,True,,arXiv,Not available,Near-Optimal Online Algorithms for Dynamic Resource Allocation Problems,d5045473260077e14409826e8d353268,http://arxiv.org/abs/1208.2596v1 10536," In this paper, we study a general online linear programming problem whose formulation encompasses many practical dynamic resource allocation problems, including internet advertising display applications, revenue management, various routing, packing, and auction problems. We propose a model, which under mild assumptions, allows us to design near-optimal learning-based online algorithms that do not require the a priori knowledge about the total number of online requests to come, a first of its kind. We then consider two variants of the problem that relax the initial assumptions imposed on the proposed model. ",xin lu,,2012.0,,arXiv,Jaillet2012,True,,arXiv,Not available,Near-Optimal Online Algorithms for Dynamic Resource Allocation Problems,d5045473260077e14409826e8d353268,http://arxiv.org/abs/1208.2596v1 10537," We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have been decided, withdraw some of her false-name identities (have some of her false-name identities refuse to pay). While these withdrawn identities will not obtain the items they won, their initial presence may have been beneficial to the agent's other identities. We define a mechanism to be false-name-proof with withdrawal (FNPW) if the aforementioned manipulation is never beneficial. FNPW is a stronger condition than false-name-proofness (FNP). ",mingyu guo,,2012.0,,arXiv,Guo2012,True,,arXiv,Not available,False-name-proofness with Bid Withdrawal,947c374098c2c518be559e8e6ff9314c,http://arxiv.org/abs/1208.6501v2 10538," We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have been decided, withdraw some of her false-name identities (have some of her false-name identities refuse to pay). While these withdrawn identities will not obtain the items they won, their initial presence may have been beneficial to the agent's other identities. We define a mechanism to be false-name-proof with withdrawal (FNPW) if the aforementioned manipulation is never beneficial. FNPW is a stronger condition than false-name-proofness (FNP). ",vincent conitzer,,2012.0,,arXiv,Guo2012,True,,arXiv,Not available,False-name-proofness with Bid Withdrawal,947c374098c2c518be559e8e6ff9314c,http://arxiv.org/abs/1208.6501v2 10539," In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this model. To predict, RoxyBot builds a stochastic model of market prices by simulating simultaneous ascending auctions. To optimize, RoxyBot relies on the sample average approximation method, a stochastic optimization technique. ",amy greenwald,,2014.0,10.1613/jair.2904,"Journal Of Artificial Intelligence Research, Volume 36, pages 513-546, 2009",Greenwald2014,True,,arXiv,Not available,RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel,bc993e6babb9b47283da382376e8e8a3,http://arxiv.org/abs/1401.3829v1 10540," In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this model. To predict, RoxyBot builds a stochastic model of market prices by simulating simultaneous ascending auctions. To optimize, RoxyBot relies on the sample average approximation method, a stochastic optimization technique. ",seong lee,,2014.0,10.1613/jair.2904,"Journal Of Artificial Intelligence Research, Volume 36, pages 513-546, 2009",Greenwald2014,True,,arXiv,Not available,RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel,bc993e6babb9b47283da382376e8e8a3,http://arxiv.org/abs/1401.3829v1 10541," We introduce the minority game theory for two kinds of the Korean treasury bond (KTB) in Korean futures exchange markets. Since we discuss numerically the standard deviation and the global efficiency for an arbitrary strategy, our case is found to be approximate to the majority game. Our result presented will be compared with numerical findings for the well-known minority and majority game models. ",seong-min yoon,,2005.0,,arXiv,Yoon2005,True,,arXiv,Not available,Dynamical Minority Games in Futures Exchange Markets,0180828379d058832e9f0a7a1c7aa16b,http://arxiv.org/abs/physics/0503016v1 10542," In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this model. To predict, RoxyBot builds a stochastic model of market prices by simulating simultaneous ascending auctions. To optimize, RoxyBot relies on the sample average approximation method, a stochastic optimization technique. ",victor naroditskiy,,2014.0,10.1613/jair.2904,"Journal Of Artificial Intelligence Research, Volume 36, pages 513-546, 2009",Greenwald2014,True,,arXiv,Not available,RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel,bc993e6babb9b47283da382376e8e8a3,http://arxiv.org/abs/1401.3829v1 10543," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",alessandro chiesa,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 10544," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 10545," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 10546," We study how standard auction objectives in sponsored search markets change with refinements in the prediction of the relevance (click-through rates) of ads. We study mechanisms that optimize for a convex combination of efficiency and revenue. We show that the objective function of such a mechanism can only improve with refined (improved) relevance predictions, i.e., the search engine has no disincentive to perform these refinements. More interestingly, we show that under assumptions, refinements to relevance predictions can only improve the efficiency of any such mechanism. Our main technical contribution is to study how relevance refinements affect the similarity between ranking by virtual-value (revenue ranking) and ranking by value (efficiency ranking). Finally, we discuss implications of our results to the literature on signaling. ",mukund sundararajan,,2013.0,,arXiv,Sundararajan2013,True,,arXiv,Not available,Refine Predictions Ad Infinitum?,42f6283cd09b37f29b229b99a37ab491,http://arxiv.org/abs/1302.6700v1 10547," We study how standard auction objectives in sponsored search markets change with refinements in the prediction of the relevance (click-through rates) of ads. We study mechanisms that optimize for a convex combination of efficiency and revenue. We show that the objective function of such a mechanism can only improve with refined (improved) relevance predictions, i.e., the search engine has no disincentive to perform these refinements. More interestingly, we show that under assumptions, refinements to relevance predictions can only improve the efficiency of any such mechanism. Our main technical contribution is to study how relevance refinements affect the similarity between ranking by virtual-value (revenue ranking) and ranking by value (efficiency ranking). Finally, we discuss implications of our results to the literature on signaling. ",inbal talgam-cohen,,2013.0,,arXiv,Sundararajan2013,True,,arXiv,Not available,Refine Predictions Ad Infinitum?,42f6283cd09b37f29b229b99a37ab491,http://arxiv.org/abs/1302.6700v1 10548," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",xi chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 10549," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",ilias diakonikolas,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 10550," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",dimitris paparas,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 10551," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",xiaorui sun,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 10552," We introduce the minority game theory for two kinds of the Korean treasury bond (KTB) in Korean futures exchange markets. Since we discuss numerically the standard deviation and the global efficiency for an arbitrary strategy, our case is found to be approximate to the majority game. Our result presented will be compared with numerical findings for the well-known minority and majority game models. ",kyungsik kim,,2005.0,,arXiv,Yoon2005,True,,arXiv,Not available,Dynamical Minority Games in Futures Exchange Markets,0180828379d058832e9f0a7a1c7aa16b,http://arxiv.org/abs/physics/0503016v1 10553," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",mihalis yannakakis,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 10554," We investigate the problem of a principal looking to contract an expert to provide a probability forecast for a categorical event. We assume all experts have a common public prior on the event's probability, but can form more accurate opinions by engaging in research. Various experts' research costs are unknown to the principal. We present a truthful and efficient mechanism for the principal's problem of contracting an expert. This results in the principal contracting the best expert to do the work, and the principal's expected utility is equivalent to having the second best expert in-house. Our mechanism connects scoring rules with auctions, a connection that is useful when obtaining new information requires costly research. ",mark braverman,,2014.0,,arXiv,Braverman2014,True,,arXiv,Not available,Contracting Experts With Unknown Cost Structures,78e10302ee69cb6538141674b338060f,http://arxiv.org/abs/1404.7239v1 10555," We investigate the problem of a principal looking to contract an expert to provide a probability forecast for a categorical event. We assume all experts have a common public prior on the event's probability, but can form more accurate opinions by engaging in research. Various experts' research costs are unknown to the principal. We present a truthful and efficient mechanism for the principal's problem of contracting an expert. This results in the principal contracting the best expert to do the work, and the principal's expected utility is equivalent to having the second best expert in-house. Our mechanism connects scoring rules with auctions, a connection that is useful when obtaining new information requires costly research. ",gal oshri,,2014.0,,arXiv,Braverman2014,True,,arXiv,Not available,Contracting Experts With Unknown Cost Structures,78e10302ee69cb6538141674b338060f,http://arxiv.org/abs/1404.7239v1 10556," We consider a class of two-player zero-sum stochastic games with finite state and compact control spaces, which we call stochastic shortest path (SSP) games. They are undiscounted total cost stochastic dynamic games that have a cost-free termination state. Exploiting the close connection of these games to single-player SSP problems, we introduce novel model conditions under which we show that the SSP games have strong optimality properties, including the existence of a unique solution to the dynamic programming equation, the existence of optimal stationary policies, and the convergence of value and policy iteration. We then focus on finite state and control SSP games and the classical Q-learning algorithm for computing the value function. Q-learning is a model-free, asynchronous stochastic iterative algorithm. By the theory of stochastic approximation involving monotone nonexpansive mappings, it is known to converge when its associated dynamic programming equation has a unique solution and its iterates are bounded with probability one. For the SSP case, as the main result of this paper, we prove the boundedness of the Q-learning iterates under our proposed model conditions, thereby establishing completely the convergence of Q-learning for a broad class of total cost finite-space stochastic games. ",huizhen yu,,2014.0,,arXiv,Yu2014,True,,arXiv,Not available,Stochastic Shortest Path Games and Q-Learning,a3366040642a9ef5d73877922f451b32,http://arxiv.org/abs/1412.8570v1 10557," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",thomas brihaye,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10558," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",gilles geeraerts,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10559," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",axel haddad,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10560," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",benjamin monmege,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10561," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",guillermo perez,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10562," We study a generalisation of sabotage games, a model of dynamic network games introduced by van Benthem. The original definition of the game is inherently finite and therefore does not allow one to model infinite processes. We propose an extension of the sabotage games in which the first player (Runner) traverses an arena with dynamic weights determined by the second player (Saboteur). In our model of quantitative sabotage games, Saboteur is now given a budget that he can distribute amongst the edges of the graph, whilst Runner attempts to minimise the quantity of budget witnessed while completing his task. We show that, on the one hand, for most of the classical cost functions considered in the literature, the problem of determining if Runner has a strategy to ensure a cost below some threshold is EXPTIME-complete. On the other hand, if the budget of Saboteur is fixed a priori, then the problem is in PTIME for most cost functions. Finally, we show that restricting the dynamics of the game also leads to better complexity. ",gabriel renault,,2015.0,,arXiv,Brihaye2015,True,,arXiv,Not available,Quantitative Games under Failures,fd97428fcd5533925dd5ab9a55420ec7,http://arxiv.org/abs/1504.06744v2 10563," In this work, we discuss a number game that develops in a manner similar to that on which Gilbreath's conjecture on iterated absolute differences between consecutive primes is formulated. In our case the action occurs at the exponent level and there, the evolution is reminiscent of that in a final Ducci game. We present features of the whole field of the game created by the successive generations, prove an analog of Gilbreath's conjecture, and raise some open questions. ",cristian cobeli,,2014.0,10.1080/10236198.2014.940337,"Journal of Difference Equations and Applications Journal of Difference Equations and Applications Volume 20, Issue 11, 2014, pages 1489--1501",Cobeli2014,True,,arXiv,Not available,A game with divisors and absolute differences of exponents,d678be7138975e194ba2951f76c951cc,http://arxiv.org/abs/1411.1334v1 10564," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum bargaining games which are a special class of quantum market games without institutionalized clearinghouses. ",e. piotrowski,,2001.0,10.1016/S0378-4371(02)00592-7,"Physica A, 308 (2002) 391",Piotrowski2001,True,,arXiv,Not available,Quantum Bargaining Games,c4db4019b9e049735c12fae262987a98,http://arxiv.org/abs/quant-ph/0106140v1 10565," We study optimal and nearly-optimal quantum strategies for non-local XOR games. First, we prove the following general result: for every non-local XOR game, there exists a set of relations with the properties: (1) a quantum strategy is optimal for the game if and only if it satisfies the relations, and (2) a quantum strategy is nearly optimal for the game if and only if it approximately satisfies the relations. Next, we focus attention on a specific infinite family of XOR games: the CHSH(n) games. This family generalizes the well-known CHSH game. We describe the general form of CHSH(n) optimal strategies. Then, we adapt the concept of intertwining operator from representation theory and use that to characterize nearly-optimal CHSH(n) strategies. ",dimiter ostrev,,2015.0,,arXiv,Ostrev2015,True,,arXiv,Not available,"The structure of optimal and nearly-optimal quantum strategies for non-local XOR games",84e469034368a2bf0c0c679e97375f6e,http://arxiv.org/abs/1506.00607v1 10566," We study balanced solutions for network bargaining games with general capacities, where agents can participate in a fixed but arbitrary number of contracts. We provide the first polynomial time algorithm for computing balanced solutions for these games. In addition, we prove that an instance has a balanced solution if and only if it has a stable one. Our methods use a new idea of reducing an instance with general capacities to a network bargaining game with unit capacities defined on an auxiliary graph. This represents a departure from previous approaches, which rely on computing an allocation in the intersection of the core and prekernel of a corresponding cooperative game, and then proving that the solution corresponding to this allocation is balanced. In fact, we show that such cooperative game methods do not extend to general capacity games, since contrary to the case of unit capacities, there exist allocations in the intersection of the core and prekernel with no corresponding balanced solution. Finally, we identify two sufficient conditions under which the set of balanced solutions corresponds to the intersection of the core and prekernel, thereby extending the class of games for which this result was previously known. ",linda farczadi,,2013.0,,arXiv,Farczadi2013,True,,arXiv,Not available,Network bargaining with general capacities,76fe46bb06eabca8fdf2dcb3b1e07d92,http://arxiv.org/abs/1306.4302v1 10567," We study balanced solutions for network bargaining games with general capacities, where agents can participate in a fixed but arbitrary number of contracts. We provide the first polynomial time algorithm for computing balanced solutions for these games. In addition, we prove that an instance has a balanced solution if and only if it has a stable one. Our methods use a new idea of reducing an instance with general capacities to a network bargaining game with unit capacities defined on an auxiliary graph. This represents a departure from previous approaches, which rely on computing an allocation in the intersection of the core and prekernel of a corresponding cooperative game, and then proving that the solution corresponding to this allocation is balanced. In fact, we show that such cooperative game methods do not extend to general capacity games, since contrary to the case of unit capacities, there exist allocations in the intersection of the core and prekernel with no corresponding balanced solution. Finally, we identify two sufficient conditions under which the set of balanced solutions corresponds to the intersection of the core and prekernel, thereby extending the class of games for which this result was previously known. ",konstantinos georgiou,,2013.0,,arXiv,Farczadi2013,True,,arXiv,Not available,Network bargaining with general capacities,76fe46bb06eabca8fdf2dcb3b1e07d92,http://arxiv.org/abs/1306.4302v1 10568," We study balanced solutions for network bargaining games with general capacities, where agents can participate in a fixed but arbitrary number of contracts. We provide the first polynomial time algorithm for computing balanced solutions for these games. In addition, we prove that an instance has a balanced solution if and only if it has a stable one. Our methods use a new idea of reducing an instance with general capacities to a network bargaining game with unit capacities defined on an auxiliary graph. This represents a departure from previous approaches, which rely on computing an allocation in the intersection of the core and prekernel of a corresponding cooperative game, and then proving that the solution corresponding to this allocation is balanced. In fact, we show that such cooperative game methods do not extend to general capacity games, since contrary to the case of unit capacities, there exist allocations in the intersection of the core and prekernel with no corresponding balanced solution. Finally, we identify two sufficient conditions under which the set of balanced solutions corresponds to the intersection of the core and prekernel, thereby extending the class of games for which this result was previously known. ",jochen koenemann,,2013.0,,arXiv,Farczadi2013,True,,arXiv,Not available,Network bargaining with general capacities,76fe46bb06eabca8fdf2dcb3b1e07d92,http://arxiv.org/abs/1306.4302v1 10569," We investigate a new class of congestion games, called Totally Unimodular (TU) Congestion Games, where the players' strategies are binary vectors inside polyhedra defined by totally unimodular constraint matrices. Network congestion games belong to this class. In the symmetric case, when all players have the same strategy set, we design an algorithm that finds an optimal aggregated strategy and then decomposes it into the single players' strategies. This approach yields strongly polynomial-time algorithms to (i) find a pure Nash equilibrium, and (ii) compute a socially optimal state, if the delay functions are weakly convex. We also show how this technique can be extended to matroid congestion games. We introduce some combinatorial TU congestion games, where the players' strategies are matchings, vertex covers, edge covers, and stable sets of a given bipartite graph. In the asymmetric case, we show that for these games (i) it is PLS-complete to find a pure Nash equilibrium even in case of linear delay functions, and (ii) it is NP-hard to compute a socially optimal state, even in case of weakly convex delay functions. ",alberto pia,,2015.0,,arXiv,Pia2015,True,,arXiv,Not available,Totally Unimodular Congestion Games,af8571316c725ad50bb9c1a6718fe07c,http://arxiv.org/abs/1511.02784v2 10570," We investigate a new class of congestion games, called Totally Unimodular (TU) Congestion Games, where the players' strategies are binary vectors inside polyhedra defined by totally unimodular constraint matrices. Network congestion games belong to this class. In the symmetric case, when all players have the same strategy set, we design an algorithm that finds an optimal aggregated strategy and then decomposes it into the single players' strategies. This approach yields strongly polynomial-time algorithms to (i) find a pure Nash equilibrium, and (ii) compute a socially optimal state, if the delay functions are weakly convex. We also show how this technique can be extended to matroid congestion games. We introduce some combinatorial TU congestion games, where the players' strategies are matchings, vertex covers, edge covers, and stable sets of a given bipartite graph. In the asymmetric case, we show that for these games (i) it is PLS-complete to find a pure Nash equilibrium even in case of linear delay functions, and (ii) it is NP-hard to compute a socially optimal state, even in case of weakly convex delay functions. ",michael ferris,,2015.0,,arXiv,Pia2015,True,,arXiv,Not available,Totally Unimodular Congestion Games,af8571316c725ad50bb9c1a6718fe07c,http://arxiv.org/abs/1511.02784v2 10571," We investigate a new class of congestion games, called Totally Unimodular (TU) Congestion Games, where the players' strategies are binary vectors inside polyhedra defined by totally unimodular constraint matrices. Network congestion games belong to this class. In the symmetric case, when all players have the same strategy set, we design an algorithm that finds an optimal aggregated strategy and then decomposes it into the single players' strategies. This approach yields strongly polynomial-time algorithms to (i) find a pure Nash equilibrium, and (ii) compute a socially optimal state, if the delay functions are weakly convex. We also show how this technique can be extended to matroid congestion games. We introduce some combinatorial TU congestion games, where the players' strategies are matchings, vertex covers, edge covers, and stable sets of a given bipartite graph. In the asymmetric case, we show that for these games (i) it is PLS-complete to find a pure Nash equilibrium even in case of linear delay functions, and (ii) it is NP-hard to compute a socially optimal state, even in case of weakly convex delay functions. ",carla michini,,2015.0,,arXiv,Pia2015,True,,arXiv,Not available,Totally Unimodular Congestion Games,af8571316c725ad50bb9c1a6718fe07c,http://arxiv.org/abs/1511.02784v2 10572," We introduce Shortest Connection Game, a two-player game played on a directed graph with edge costs. Given two designated vertices in which they start, the players take turns in choosing edges emanating from the vertex they are currently located at. In this way, each of the players forms a path that origins from its respective starting vertex. The game ends as soon as the two paths meet, i.e., a connection between the players is established. Each player has to carry the cost of its chosen edges and thus aims at minimizing its own total cost. In this work we analyze the computational complexity of Shortest Connection Game. On the negative side, the game turns out to be computationally hard even on restricted graph classes such as bipartite, acyclic and cactus graphs. On the positive side, we can give a polynomial time algorithm for cactus graphs when the game is restricted to simple paths. ",andreas darmann,,2015.0,,arXiv,Darmann2015,True,,arXiv,Not available,The Shortest Connection Game,ab04ded092e93b1c62cf9cc8a2a3ef12,http://arxiv.org/abs/1511.07847v2 10573," We introduce Shortest Connection Game, a two-player game played on a directed graph with edge costs. Given two designated vertices in which they start, the players take turns in choosing edges emanating from the vertex they are currently located at. In this way, each of the players forms a path that origins from its respective starting vertex. The game ends as soon as the two paths meet, i.e., a connection between the players is established. Each player has to carry the cost of its chosen edges and thus aims at minimizing its own total cost. In this work we analyze the computational complexity of Shortest Connection Game. On the negative side, the game turns out to be computationally hard even on restricted graph classes such as bipartite, acyclic and cactus graphs. On the positive side, we can give a polynomial time algorithm for cactus graphs when the game is restricted to simple paths. ",ulrich pferschy,,2015.0,,arXiv,Darmann2015,True,,arXiv,Not available,The Shortest Connection Game,ab04ded092e93b1c62cf9cc8a2a3ef12,http://arxiv.org/abs/1511.07847v2 10574," We introduce Shortest Connection Game, a two-player game played on a directed graph with edge costs. Given two designated vertices in which they start, the players take turns in choosing edges emanating from the vertex they are currently located at. In this way, each of the players forms a path that origins from its respective starting vertex. The game ends as soon as the two paths meet, i.e., a connection between the players is established. Each player has to carry the cost of its chosen edges and thus aims at minimizing its own total cost. In this work we analyze the computational complexity of Shortest Connection Game. On the negative side, the game turns out to be computationally hard even on restricted graph classes such as bipartite, acyclic and cactus graphs. On the positive side, we can give a polynomial time algorithm for cactus graphs when the game is restricted to simple paths. ",joachim schauer,,2015.0,,arXiv,Darmann2015,True,,arXiv,Not available,The Shortest Connection Game,ab04ded092e93b1c62cf9cc8a2a3ef12,http://arxiv.org/abs/1511.07847v2 10575," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum bargaining games which are a special class of quantum market games without institutionalized clearinghouses. ",j. sladkowski,,2001.0,10.1016/S0378-4371(02)00592-7,"Physica A, 308 (2002) 391",Piotrowski2001,True,,arXiv,Not available,Quantum Bargaining Games,c4db4019b9e049735c12fae262987a98,http://arxiv.org/abs/quant-ph/0106140v1 10576," This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance behaviour through motivation of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment. ",nalin arachchilage,,2016.0,,arXiv,Arachchilage2016,True,,arXiv,Not available,"Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks",d96079bfd3786bce75cfd47bde84cbde,http://arxiv.org/abs/1602.03929v1 10577," This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance behaviour through motivation of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment. ",melissa cole,,2016.0,,arXiv,Arachchilage2016,True,,arXiv,Not available,"Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks",d96079bfd3786bce75cfd47bde84cbde,http://arxiv.org/abs/1602.03929v1 10578," We study a class of evolutionary game dynamics defined by balancing a gain determined by the game's payoffs against a cost of motion that captures the difficulty with which the population moves between states. Costs of motion are represented by a Riemannian metric, i.e., a state-dependent inner product on the set of population states. The replicator dynamics and the (Euclidean) projection dynamics are the archetypal examples of the class we study. Like these representative dynamics, all Riemannian game dynamics satisfy certain basic desiderata, including positive correlation and global convergence in potential games. Moreover, when the underlying Riemannian metric satisfies a Hessian integrability condition, the resulting dynamics preserve many further properties of the replicator and projection dynamics. We examine the close connections between Hessian game dynamics and reinforcement learning in normal form games, extending and elucidating a well-known link between the replicator dynamics and exponential reinforcement learning. ",panayotis mertikopoulos,,2016.0,,arXiv,Mertikopoulos2016,True,,arXiv,Not available,Riemannian game dynamics,e64b910d7c8c7fac2333be70f27a2282,http://arxiv.org/abs/1603.09173v3 10579," We study a class of evolutionary game dynamics defined by balancing a gain determined by the game's payoffs against a cost of motion that captures the difficulty with which the population moves between states. Costs of motion are represented by a Riemannian metric, i.e., a state-dependent inner product on the set of population states. The replicator dynamics and the (Euclidean) projection dynamics are the archetypal examples of the class we study. Like these representative dynamics, all Riemannian game dynamics satisfy certain basic desiderata, including positive correlation and global convergence in potential games. Moreover, when the underlying Riemannian metric satisfies a Hessian integrability condition, the resulting dynamics preserve many further properties of the replicator and projection dynamics. We examine the close connections between Hessian game dynamics and reinforcement learning in normal form games, extending and elucidating a well-known link between the replicator dynamics and exponential reinforcement learning. ",william sandholm,,2016.0,,arXiv,Mertikopoulos2016,True,,arXiv,Not available,Riemannian game dynamics,e64b910d7c8c7fac2333be70f27a2282,http://arxiv.org/abs/1603.09173v3 10580," We present tropical games, a generalization of combinatorial min-max games based on tropical algebras. Our model breaks the traditional symmetry of rational zero-sum games where players have exactly opposed goals (min vs. max), is more widely applicable than min-max and also supports a form of pruning, despite it being less effective than alpha-beta. Actually, min-max games may be seen as particular cases where both the game and its dual are tropical: when the dual of a tropical game is also tropical, the power of alpha-beta is completely recovered. We formally develop the model and prove that the tropical pruning strategy is correct, then conclude by showing how the problem of approximated parsing can be modeled as a tropical game, profiting from pruning. ",jean-vincent loddo,,2010.0,,arXiv,Loddo2010,True,,arXiv,Not available,How to correctly prune tropical trees,f6ba040c1a17ce77ae6cf6c722324a47,http://arxiv.org/abs/1005.1475v2 10581," We present tropical games, a generalization of combinatorial min-max games based on tropical algebras. Our model breaks the traditional symmetry of rational zero-sum games where players have exactly opposed goals (min vs. max), is more widely applicable than min-max and also supports a form of pruning, despite it being less effective than alpha-beta. Actually, min-max games may be seen as particular cases where both the game and its dual are tropical: when the dual of a tropical game is also tropical, the power of alpha-beta is completely recovered. We formally develop the model and prove that the tropical pruning strategy is correct, then conclude by showing how the problem of approximated parsing can be modeled as a tropical game, profiting from pruning. ",luca saiu,,2010.0,,arXiv,Loddo2010,True,,arXiv,Not available,How to correctly prune tropical trees,f6ba040c1a17ce77ae6cf6c722324a47,http://arxiv.org/abs/1005.1475v2 10582," A recent body of experimental literature has studied empirical game-theoretical analysis, in which we have partial knowledge of a game, consisting of observations of a subset of the pure-strategy profiles and their associated payoffs to players. The aim is to find an exact or approximate Nash equilibrium of the game, based on these observations. It is usually assumed that the strategy profiles may be chosen in an on-line manner by the algorithm. We study a corresponding computational learning model, and the query complexity of learning equilibria for various classes of games. We give basic results for bimatrix and graphical games. Our focus is on symmetric network congestion games. For directed acyclic networks, we can learn the cost functions (and hence compute an equilibrium) while querying just a small fraction of pure-strategy profiles. For the special case of parallel links, we have the stronger result that an equilibrium can be identified while only learning a small fraction of the cost values. ",john fearnley,,2013.0,,arXiv,Fearnley2013,True,,arXiv,Not available,Learning Equilibria of Games via Payoff Queries,7ac0d29340de145580d5b4407bcfdeca,http://arxiv.org/abs/1302.3116v4 10583," A recent body of experimental literature has studied empirical game-theoretical analysis, in which we have partial knowledge of a game, consisting of observations of a subset of the pure-strategy profiles and their associated payoffs to players. The aim is to find an exact or approximate Nash equilibrium of the game, based on these observations. It is usually assumed that the strategy profiles may be chosen in an on-line manner by the algorithm. We study a corresponding computational learning model, and the query complexity of learning equilibria for various classes of games. We give basic results for bimatrix and graphical games. Our focus is on symmetric network congestion games. For directed acyclic networks, we can learn the cost functions (and hence compute an equilibrium) while querying just a small fraction of pure-strategy profiles. For the special case of parallel links, we have the stronger result that an equilibrium can be identified while only learning a small fraction of the cost values. ",martin gairing,,2013.0,,arXiv,Fearnley2013,True,,arXiv,Not available,Learning Equilibria of Games via Payoff Queries,7ac0d29340de145580d5b4407bcfdeca,http://arxiv.org/abs/1302.3116v4 10584," A recent body of experimental literature has studied empirical game-theoretical analysis, in which we have partial knowledge of a game, consisting of observations of a subset of the pure-strategy profiles and their associated payoffs to players. The aim is to find an exact or approximate Nash equilibrium of the game, based on these observations. It is usually assumed that the strategy profiles may be chosen in an on-line manner by the algorithm. We study a corresponding computational learning model, and the query complexity of learning equilibria for various classes of games. We give basic results for bimatrix and graphical games. Our focus is on symmetric network congestion games. For directed acyclic networks, we can learn the cost functions (and hence compute an equilibrium) while querying just a small fraction of pure-strategy profiles. For the special case of parallel links, we have the stronger result that an equilibrium can be identified while only learning a small fraction of the cost values. ",paul goldberg,,2013.0,,arXiv,Fearnley2013,True,,arXiv,Not available,Learning Equilibria of Games via Payoff Queries,7ac0d29340de145580d5b4407bcfdeca,http://arxiv.org/abs/1302.3116v4 10585," A recent body of experimental literature has studied empirical game-theoretical analysis, in which we have partial knowledge of a game, consisting of observations of a subset of the pure-strategy profiles and their associated payoffs to players. The aim is to find an exact or approximate Nash equilibrium of the game, based on these observations. It is usually assumed that the strategy profiles may be chosen in an on-line manner by the algorithm. We study a corresponding computational learning model, and the query complexity of learning equilibria for various classes of games. We give basic results for bimatrix and graphical games. Our focus is on symmetric network congestion games. For directed acyclic networks, we can learn the cost functions (and hence compute an equilibrium) while querying just a small fraction of pure-strategy profiles. For the special case of parallel links, we have the stronger result that an equilibrium can be identified while only learning a small fraction of the cost values. ",rahul savani,,2013.0,,arXiv,Fearnley2013,True,,arXiv,Not available,Learning Equilibria of Games via Payoff Queries,7ac0d29340de145580d5b4407bcfdeca,http://arxiv.org/abs/1302.3116v4 10586," Correlated equilibria are sometimes more efficient than the Nash equilibria of a game without signals. We investigate whether the availability of quantum signals in the context of a classical strategic game may allow the players to achieve even better efficiency than in any correlated equilibrium with classical signals, and find the answer to be positive. ",pierfrancesco mura,,2003.0,10.1142/S0219749905000724,"Int. J. Quantum Inform., 03, 183 (2005)",Mura2003,True,,arXiv,Not available,Correlated Equilibria of Classical Strategic Games with Quantum Signals,7e8a9f3db90450fef9419e23971afbac,http://arxiv.org/abs/quant-ph/0309033v1 10587," We introduce versions of game-theoretic semantics (GTS) for Alternating-Time Temporal Logic (ATL). In GTS, truth is defined in terms of existence of a winning strategy in a semantic evaluation game, and thus the game-theoretic perspective appears in the framework of ATL on two semantic levels: on the object level in the standard semantics of the strategic operators, and on the meta-level where game-theoretic logical semantics is applied to ATL. We unify these two perspectives into semantic evaluation games specially designed for ATL. The game-theoretic perspective enables us to identify new variants of the semantics of ATL based on limiting the time resources available to the verifier and falsifier in the semantic evaluation game. We introduce and analyse an unbounded and (ordinal) bounded GTS and prove these to be equivalent to the standard (Tarski-style) compositional semantics. We show that in these both versions of GTS, truth of ATL formulae can always be determined in finite time, i.e., without constructing infinite paths. We also introduce a non-equivalent finitely bounded semantics and argue that it is natural from both logical and game-theoretic perspectives. ",valentin goranko,,2016.0,,arXiv,Goranko2016,True,,arXiv,Not available,Game-Theoretic Semantics for Alternating-Time Temporal Logic,1aea9a7858a695b26a1da604a089a97b,http://arxiv.org/abs/1602.07667v2 10588," We introduce versions of game-theoretic semantics (GTS) for Alternating-Time Temporal Logic (ATL). In GTS, truth is defined in terms of existence of a winning strategy in a semantic evaluation game, and thus the game-theoretic perspective appears in the framework of ATL on two semantic levels: on the object level in the standard semantics of the strategic operators, and on the meta-level where game-theoretic logical semantics is applied to ATL. We unify these two perspectives into semantic evaluation games specially designed for ATL. The game-theoretic perspective enables us to identify new variants of the semantics of ATL based on limiting the time resources available to the verifier and falsifier in the semantic evaluation game. We introduce and analyse an unbounded and (ordinal) bounded GTS and prove these to be equivalent to the standard (Tarski-style) compositional semantics. We show that in these both versions of GTS, truth of ATL formulae can always be determined in finite time, i.e., without constructing infinite paths. We also introduce a non-equivalent finitely bounded semantics and argue that it is natural from both logical and game-theoretic perspectives. ",antti kuusisto,,2016.0,,arXiv,Goranko2016,True,,arXiv,Not available,Game-Theoretic Semantics for Alternating-Time Temporal Logic,1aea9a7858a695b26a1da604a089a97b,http://arxiv.org/abs/1602.07667v2 10589," We introduce versions of game-theoretic semantics (GTS) for Alternating-Time Temporal Logic (ATL). In GTS, truth is defined in terms of existence of a winning strategy in a semantic evaluation game, and thus the game-theoretic perspective appears in the framework of ATL on two semantic levels: on the object level in the standard semantics of the strategic operators, and on the meta-level where game-theoretic logical semantics is applied to ATL. We unify these two perspectives into semantic evaluation games specially designed for ATL. The game-theoretic perspective enables us to identify new variants of the semantics of ATL based on limiting the time resources available to the verifier and falsifier in the semantic evaluation game. We introduce and analyse an unbounded and (ordinal) bounded GTS and prove these to be equivalent to the standard (Tarski-style) compositional semantics. We show that in these both versions of GTS, truth of ATL formulae can always be determined in finite time, i.e., without constructing infinite paths. We also introduce a non-equivalent finitely bounded semantics and argue that it is natural from both logical and game-theoretic perspectives. ",raine ronnholm,,2016.0,,arXiv,Goranko2016,True,,arXiv,Not available,Game-Theoretic Semantics for Alternating-Time Temporal Logic,1aea9a7858a695b26a1da604a089a97b,http://arxiv.org/abs/1602.07667v2 10590," We introduce a class of finite strategic games with the property that every deviation of a coalition of players that is profitable to each of its members strictly decreases the lexicographical order of a certain function defined on the set of strategy profiles. We call this property the Lexicographical Improvement Property (LIP) and show that it implies the existence of a generalized strong ordinal potential function. We use this characterization to derive existence, efficiency and fairness properties of strong Nash equilibria. We then study a class of games that generalizes congestion games with bottleneck objectives that we call bottleneck congestion games. We show that these games possess the LIP and thus the above mentioned properties. For bottleneck congestion games in networks, we identify cases in which the potential function associated with the LIP leads to polynomial time algorithms computing a strong Nash equilibrium. Finally, we investigate the LIP for infinite games. We show that the LIP does not imply the existence of a generalized strong ordinal potential, thus, the existence of SNE does not follow. Assuming that the function associated with the LIP is continuous, however, we prove existence of SNE. As a consequence, we prove that bottleneck congestion games with infinite strategy spaces and continuous cost functions possess a strong Nash equilibrium. ",tobias harks,,2009.0,,arXiv,Harks2009,True,,arXiv,Not available,"Strong Nash Equilibria in Games with the Lexicographical Improvement Property",3c08edbe39633b6fa13f684471ff9250,http://arxiv.org/abs/0909.0347v1 10591," We introduce a class of finite strategic games with the property that every deviation of a coalition of players that is profitable to each of its members strictly decreases the lexicographical order of a certain function defined on the set of strategy profiles. We call this property the Lexicographical Improvement Property (LIP) and show that it implies the existence of a generalized strong ordinal potential function. We use this characterization to derive existence, efficiency and fairness properties of strong Nash equilibria. We then study a class of games that generalizes congestion games with bottleneck objectives that we call bottleneck congestion games. We show that these games possess the LIP and thus the above mentioned properties. For bottleneck congestion games in networks, we identify cases in which the potential function associated with the LIP leads to polynomial time algorithms computing a strong Nash equilibrium. Finally, we investigate the LIP for infinite games. We show that the LIP does not imply the existence of a generalized strong ordinal potential, thus, the existence of SNE does not follow. Assuming that the function associated with the LIP is continuous, however, we prove existence of SNE. As a consequence, we prove that bottleneck congestion games with infinite strategy spaces and continuous cost functions possess a strong Nash equilibrium. ",max klimm,,2009.0,,arXiv,Harks2009,True,,arXiv,Not available,"Strong Nash Equilibria in Games with the Lexicographical Improvement Property",3c08edbe39633b6fa13f684471ff9250,http://arxiv.org/abs/0909.0347v1 10592," We introduce a class of finite strategic games with the property that every deviation of a coalition of players that is profitable to each of its members strictly decreases the lexicographical order of a certain function defined on the set of strategy profiles. We call this property the Lexicographical Improvement Property (LIP) and show that it implies the existence of a generalized strong ordinal potential function. We use this characterization to derive existence, efficiency and fairness properties of strong Nash equilibria. We then study a class of games that generalizes congestion games with bottleneck objectives that we call bottleneck congestion games. We show that these games possess the LIP and thus the above mentioned properties. For bottleneck congestion games in networks, we identify cases in which the potential function associated with the LIP leads to polynomial time algorithms computing a strong Nash equilibrium. Finally, we investigate the LIP for infinite games. We show that the LIP does not imply the existence of a generalized strong ordinal potential, thus, the existence of SNE does not follow. Assuming that the function associated with the LIP is continuous, however, we prove existence of SNE. As a consequence, we prove that bottleneck congestion games with infinite strategy spaces and continuous cost functions possess a strong Nash equilibrium. ",rolf moehring,,2009.0,,arXiv,Harks2009,True,,arXiv,Not available,"Strong Nash Equilibria in Games with the Lexicographical Improvement Property",3c08edbe39633b6fa13f684471ff9250,http://arxiv.org/abs/0909.0347v1 10593," We study Maker/Breaker games on the edges of the complete graph, as introduced by Chvatal and Erdos. We show that in the (m:b) clique game played on K_{N}, the complete graph on N vertices, Maker can achieve a K_{q} for q = (m/(log_{2}(b + 1)) - o(1)) * log N, which partially solves an open problem by Beck. Moreover, we show that in the (1:1) clique game played on K_{N} for a sufficiently large N, Maker can achieve a K_{q} in only 2^(2q/3) moves, which improves the previous best bound and answers a question of Beck. Finally we consider the so called tournament game. A tournament is a directed graph where every pair of vertices is connected by a single directed edge. The tournament game is played on K_{N}. At the beginning Breaker fixes an arbitrary tournament T_{q} on q vertices. Maker and Breaker then alternately take turns at claiming one unclaimed edge e and selecting one of the two possible orientations. Maker wins if his graph contains a copy of the goal tournament T_{q}; otherwise Breaker wins. We show that Maker wins the tournament game on K_{N} with q = (1 - o(1))*log_{2}(N) which supports the random graph intuition: the threshold for q is asymptotically the same for the game played by two ""clever'' players and the game played by two ``random'' players. This last result solves an open problem of Beck which he included in his list of the seven most humiliating open problems. ",heidi gebauer,,2009.0,,arXiv,Gebauer2009,True,,arXiv,Not available,"A Strategy for Maker in the Clique Game which Helps to Tackle some Open Problems by Beck",07d982ca0f6a918c22a5db7247c61911,http://arxiv.org/abs/0909.4362v2 10594," In resource buying games a set of players jointly buys a subset of a finite resource set E (e.g., machines, edges, or nodes in a digraph). The cost of a resource e depends on the number (or load) of players using e, and has to be paid completely by the players before it becomes available. Each player i needs at least one set of a predefined family S_i in 2^E to be available. Thus, resource buying games can be seen as a variant of congestion games in which the load-dependent costs of the resources can be shared arbitrarily among the players. A strategy of player i in resource buying games is a tuple consisting of one of i's desired configurations S_i together with a payment vector p_i in R^E_+ indicating how much i is willing to contribute towards the purchase of the chosen resources. In this paper, we study the existence and computational complexity of pure Nash equilibria (PNE, for short) of resource buying games. In contrast to classical congestion games for which equilibria are guaranteed to exist, the existence of equilibria in resource buying games strongly depends on the underlying structure of the S_i's and the behavior of the cost functions. We show that for marginally non-increasing cost functions, matroids are exactly the right structure to consider, and that resource buying games with marginally non-decreasing cost functions always admit a PNE. ",tobias harks,,2012.0,,arXiv,Harks2012,True,,arXiv,Not available,Resource Buying Games,e741f4b552ace7cb617d67a9ed951163,http://arxiv.org/abs/1204.4111v1 10595," In resource buying games a set of players jointly buys a subset of a finite resource set E (e.g., machines, edges, or nodes in a digraph). The cost of a resource e depends on the number (or load) of players using e, and has to be paid completely by the players before it becomes available. Each player i needs at least one set of a predefined family S_i in 2^E to be available. Thus, resource buying games can be seen as a variant of congestion games in which the load-dependent costs of the resources can be shared arbitrarily among the players. A strategy of player i in resource buying games is a tuple consisting of one of i's desired configurations S_i together with a payment vector p_i in R^E_+ indicating how much i is willing to contribute towards the purchase of the chosen resources. In this paper, we study the existence and computational complexity of pure Nash equilibria (PNE, for short) of resource buying games. In contrast to classical congestion games for which equilibria are guaranteed to exist, the existence of equilibria in resource buying games strongly depends on the underlying structure of the S_i's and the behavior of the cost functions. We show that for marginally non-increasing cost functions, matroids are exactly the right structure to consider, and that resource buying games with marginally non-decreasing cost functions always admit a PNE. ",britta peis,,2012.0,,arXiv,Harks2012,True,,arXiv,Not available,Resource Buying Games,e741f4b552ace7cb617d67a9ed951163,http://arxiv.org/abs/1204.4111v1 10596," We prove that the determinacy of Gale-Stewart games whose winning sets are infinitary rational relations accepted by 2-tape B\""uchi automata is equivalent to the determinacy of (effective) analytic Gale-Stewart games which is known to be a large cardinal assumption. Then we prove that winning strategies, when they exist, can be very complex, i.e. highly non-effective, in these games. We prove the same results for Gale-Stewart games with winning sets accepted by real-time 1-counter B\""uchi automata, then extending previous results obtained about these games. Then we consider the strenghs of determinacy for these games, and we prove that there is a transfinite sequence of 2-tape B\""uchi automata (respectively, of real-time 1-counter B\""uchi automata) $A_\alpha$, indexed by recursive ordinals, such that the games $G(L(A_\alpha))$ have strictly increasing strenghs of determinacy. Moreover there is a 2-tape B\""uchi automaton (respectively, a real-time 1-counter B\""uchi automaton) B such that the determinacy of G(L(B)) is equivalent to the (effective) analytic determinacy and thus has the maximal strength of determinacy. We show also that the determinacy of Wadge games between two players in charge of infinitary rational relations accepted by 2-tape B\""uchi automata is equivalent to the (effective) analytic determinacy, and thus not provable in ZFC. ",olivier finkel,,2013.0,,arXiv,Finkel2013,True,,arXiv,Not available,Infinite Games Specified by 2-Tape Automata,d85629db6a3be25255af57b4a467c1a2,http://arxiv.org/abs/1312.3797v1 10597," We prove an n-EXPTIME lower bound for the problem of deciding the winner in a reachability game on Higher Order Pushdown Automata (HPDA) of level n. This bound matches the known upper bound for parity games on HPDA. As a consequence the mu-calculus model checking over graphs given by n-HPDA is n-EXPTIME complete. ",thierry cachat,,2007.0,,arXiv,Cachat2007,True,,arXiv,Not available,The Complexity of Games on Higher Order Pushdown Automata,ece3544793a874991c5741e0be436afc,http://arxiv.org/abs/0705.0262v1 10598," First cycle games (FCG) are played on a finite graph by two players who push a token along the edges until a vertex is repeated, and a simple cycle is formed. The winner is determined by some fixed property Y of the sequence of labels of the edges (or nodes) forming this cycle. These games are traditionally of interest because of their connection with infinite-duration games such as parity and mean-payoff games. We study the memory requirements for winning strategies of FCGs and certain associated infinite duration games. We exhibit a simple FCG that is not memoryless determined (this corrects a mistake in \it Memoryless determinacy of parity and mean payoff games: a simple proof by Bj\""orklund, Sandberg, Vorobyov (2004) that claims that FCGs for which Y is closed under cyclic permutations are memoryless determined). We show that /Theta(n)! memory (where n is the number of nodes in the graph), which is always sufficient, may be necessary to win some FCGs. On the other hand, we identify easy to check conditions on Y (i.e., Y is closed under cyclic permutations, and both Y and its complement are closed under concatenation) that are sufficient to ensure that the corresponding FCGs and their associated infinite duration games are memoryless determined. We demonstrate that many games considered in the literature, such as mean-payoff, parity, energy, etc., satisfy these conditions. On the complexity side, we show (for efficiently computable Y) that while solving FCGs is in PSPACE, solving some families of FCGs is PSPACE-hard. ",benjamin aminof,,2014.0,10.4204/EPTCS.146.11,"EPTCS 146, 2014, pp. 83-90",Aminof2014,True,,arXiv,Not available,First Cycle Games,ce429c4f494731669ab8a865b9421237,http://arxiv.org/abs/1404.0843v1 10599," First cycle games (FCG) are played on a finite graph by two players who push a token along the edges until a vertex is repeated, and a simple cycle is formed. The winner is determined by some fixed property Y of the sequence of labels of the edges (or nodes) forming this cycle. These games are traditionally of interest because of their connection with infinite-duration games such as parity and mean-payoff games. We study the memory requirements for winning strategies of FCGs and certain associated infinite duration games. We exhibit a simple FCG that is not memoryless determined (this corrects a mistake in \it Memoryless determinacy of parity and mean payoff games: a simple proof by Bj\""orklund, Sandberg, Vorobyov (2004) that claims that FCGs for which Y is closed under cyclic permutations are memoryless determined). We show that /Theta(n)! memory (where n is the number of nodes in the graph), which is always sufficient, may be necessary to win some FCGs. On the other hand, we identify easy to check conditions on Y (i.e., Y is closed under cyclic permutations, and both Y and its complement are closed under concatenation) that are sufficient to ensure that the corresponding FCGs and their associated infinite duration games are memoryless determined. We demonstrate that many games considered in the literature, such as mean-payoff, parity, energy, etc., satisfy these conditions. On the complexity side, we show (for efficiently computable Y) that while solving FCGs is in PSPACE, solving some families of FCGs is PSPACE-hard. ",sasha rubin,,2014.0,10.4204/EPTCS.146.11,"EPTCS 146, 2014, pp. 83-90",Aminof2014,True,,arXiv,Not available,First Cycle Games,ce429c4f494731669ab8a865b9421237,http://arxiv.org/abs/1404.0843v1 10600," This paper introduces algorithm instance games (AIGs) as a conceptual classification applying to games in which outcomes are resolved from joint strategies algorithmically. For such games, a fundamental question asks: How do the details of the algorithm's description influence agents' strategic behavior? We analyze two versions of an AIG based on the set-cover optimization problem. In these games, joint strategies correspond to instances of the set-cover problem, with each subset (of a given universe of elements) representing the strategy of a single agent. Outcomes are covers computed from the joint strategies by a set-cover algorithm. In one variant of this game, outcomes are computed by a deterministic greedy algorithm, and the other variant utilizes a non-deterministic form of the greedy algorithm. We characterize Nash equilibrium strategies for both versions of the game, finding that agents' strategies can vary considerably between the two settings. In particular, we find that the version of the game based on the deterministic algorithm only admits Nash equilibrium in which agents choose strategies (i.e., subsets) containing at most one element, with no two agents picking the same element. On the other hand, in the version of the game based on the non-deterministic algorithm, Nash equilibrium strategies can include agents with zero, one, or every element, and the same element can appear in the strategies of multiple agents. ",samuel johnson,,2014.0,,arXiv,Johnson2014,True,,arXiv,Not available,Algorithm Instance Games,9fcd24d4699b2a33408fcccc993f14ff,http://arxiv.org/abs/1405.3296v1 10601," This paper introduces algorithm instance games (AIGs) as a conceptual classification applying to games in which outcomes are resolved from joint strategies algorithmically. For such games, a fundamental question asks: How do the details of the algorithm's description influence agents' strategic behavior? We analyze two versions of an AIG based on the set-cover optimization problem. In these games, joint strategies correspond to instances of the set-cover problem, with each subset (of a given universe of elements) representing the strategy of a single agent. Outcomes are covers computed from the joint strategies by a set-cover algorithm. In one variant of this game, outcomes are computed by a deterministic greedy algorithm, and the other variant utilizes a non-deterministic form of the greedy algorithm. We characterize Nash equilibrium strategies for both versions of the game, finding that agents' strategies can vary considerably between the two settings. In particular, we find that the version of the game based on the deterministic algorithm only admits Nash equilibrium in which agents choose strategies (i.e., subsets) containing at most one element, with no two agents picking the same element. On the other hand, in the version of the game based on the non-deterministic algorithm, Nash equilibrium strategies can include agents with zero, one, or every element, and the same element can appear in the strategies of multiple agents. ",tsai-ching lu,,2014.0,,arXiv,Johnson2014,True,,arXiv,Not available,Algorithm Instance Games,9fcd24d4699b2a33408fcccc993f14ff,http://arxiv.org/abs/1405.3296v1 10602," A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total function XOR-d game with uniform inputs can be a pseudo-telepathy game, there exists a quantum strategy to win the game only when there is a classical strategy also. We then study the principle of lack of quantum advantage in the distributed non-local computation of binary functions which is a well-known information-theoretic principle designed to pick out quantum correlations from amongst general no-signaling ones. We prove a large-alphabet generalization of this principle, showing that quantum theory provides no advantage in the task of non-local distributed computation of a restricted class of functions with $d$ outcomes for prime $d$, while general no-signaling boxes do. Finally, we consider the question whether there exist two-party tight Bell inequalities with no quantum advantage, and show that the binary non-local computation game inequalities for the restricted class of functions are not facet defining for any number of inputs. ",ravishankar ramanathan,,2015.0,10.1103/PhysRevA.93.022333,"Phys. Rev. A 93, 022333 (2016)",Ramanathan2015,True,,arXiv,Not available,"Generalized XOR games with $d$ outcomes and the task of non-local computation",34048681679ac8b811cd281f4c5178e9,http://arxiv.org/abs/1502.02974v2 10603," A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total function XOR-d game with uniform inputs can be a pseudo-telepathy game, there exists a quantum strategy to win the game only when there is a classical strategy also. We then study the principle of lack of quantum advantage in the distributed non-local computation of binary functions which is a well-known information-theoretic principle designed to pick out quantum correlations from amongst general no-signaling ones. We prove a large-alphabet generalization of this principle, showing that quantum theory provides no advantage in the task of non-local distributed computation of a restricted class of functions with $d$ outcomes for prime $d$, while general no-signaling boxes do. Finally, we consider the question whether there exist two-party tight Bell inequalities with no quantum advantage, and show that the binary non-local computation game inequalities for the restricted class of functions are not facet defining for any number of inputs. ",remigiusz augusiak,,2015.0,10.1103/PhysRevA.93.022333,"Phys. Rev. A 93, 022333 (2016)",Ramanathan2015,True,,arXiv,Not available,"Generalized XOR games with $d$ outcomes and the task of non-local computation",34048681679ac8b811cd281f4c5178e9,http://arxiv.org/abs/1502.02974v2 10604," A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total function XOR-d game with uniform inputs can be a pseudo-telepathy game, there exists a quantum strategy to win the game only when there is a classical strategy also. We then study the principle of lack of quantum advantage in the distributed non-local computation of binary functions which is a well-known information-theoretic principle designed to pick out quantum correlations from amongst general no-signaling ones. We prove a large-alphabet generalization of this principle, showing that quantum theory provides no advantage in the task of non-local distributed computation of a restricted class of functions with $d$ outcomes for prime $d$, while general no-signaling boxes do. Finally, we consider the question whether there exist two-party tight Bell inequalities with no quantum advantage, and show that the binary non-local computation game inequalities for the restricted class of functions are not facet defining for any number of inputs. ",glaucia murta,,2015.0,10.1103/PhysRevA.93.022333,"Phys. Rev. A 93, 022333 (2016)",Ramanathan2015,True,,arXiv,Not available,"Generalized XOR games with $d$ outcomes and the task of non-local computation",34048681679ac8b811cd281f4c5178e9,http://arxiv.org/abs/1502.02974v2 10605," Priced timed games are optimal-cost reachability games played between two players---the controller and the environment---by moving a token along the edges of infinite graphs of configurations of priced timed automata. The goal of the controller is to reach a given set of target locations as cheaply as possible, while the goal of the environment is the opposite. Priced timed games are known to be undecidable for timed automata with $3$ or more clocks, while they are known to be decidable for automata with $1$ clock. In an attempt to recover decidability for priced timed games Bouyer, Markey, and Sankur studied robust priced timed games where the environment has the power to slightly perturb delays proposed by the controller. Unfortunately, however, they showed that the natural problem of deciding the existence of optimal limit-strategy---optimal strategy of the controller where the perturbations tend to vanish in the limit---is undecidable with $10$ or more clocks. In this paper we revisit this problem and improve our understanding of the decidability of these games. We show that the limit-strategy problem is already undecidable for a subclass of robust priced timed games with $5$ or more clocks. On a positive side, we show the decidability of the existence of almost optimal strategies for the same subclass of one-clock robust priced timed games by adapting a classical construction by Bouyer at al. for one-clock priced timed games. ",shibashis guha,,2015.0,,arXiv,Guha2015,True,,arXiv,Not available,Revisiting Robustness in Priced Timed Games,24a2159fbbcaa08b6d9f39cc41a8865d,http://arxiv.org/abs/1507.05787v1 10606," Priced timed games are optimal-cost reachability games played between two players---the controller and the environment---by moving a token along the edges of infinite graphs of configurations of priced timed automata. The goal of the controller is to reach a given set of target locations as cheaply as possible, while the goal of the environment is the opposite. Priced timed games are known to be undecidable for timed automata with $3$ or more clocks, while they are known to be decidable for automata with $1$ clock. In an attempt to recover decidability for priced timed games Bouyer, Markey, and Sankur studied robust priced timed games where the environment has the power to slightly perturb delays proposed by the controller. Unfortunately, however, they showed that the natural problem of deciding the existence of optimal limit-strategy---optimal strategy of the controller where the perturbations tend to vanish in the limit---is undecidable with $10$ or more clocks. In this paper we revisit this problem and improve our understanding of the decidability of these games. We show that the limit-strategy problem is already undecidable for a subclass of robust priced timed games with $5$ or more clocks. On a positive side, we show the decidability of the existence of almost optimal strategies for the same subclass of one-clock robust priced timed games by adapting a classical construction by Bouyer at al. for one-clock priced timed games. ",shankara krishna,,2015.0,,arXiv,Guha2015,True,,arXiv,Not available,Revisiting Robustness in Priced Timed Games,24a2159fbbcaa08b6d9f39cc41a8865d,http://arxiv.org/abs/1507.05787v1 10607," Priced timed games are optimal-cost reachability games played between two players---the controller and the environment---by moving a token along the edges of infinite graphs of configurations of priced timed automata. The goal of the controller is to reach a given set of target locations as cheaply as possible, while the goal of the environment is the opposite. Priced timed games are known to be undecidable for timed automata with $3$ or more clocks, while they are known to be decidable for automata with $1$ clock. In an attempt to recover decidability for priced timed games Bouyer, Markey, and Sankur studied robust priced timed games where the environment has the power to slightly perturb delays proposed by the controller. Unfortunately, however, they showed that the natural problem of deciding the existence of optimal limit-strategy---optimal strategy of the controller where the perturbations tend to vanish in the limit---is undecidable with $10$ or more clocks. In this paper we revisit this problem and improve our understanding of the decidability of these games. We show that the limit-strategy problem is already undecidable for a subclass of robust priced timed games with $5$ or more clocks. On a positive side, we show the decidability of the existence of almost optimal strategies for the same subclass of one-clock robust priced timed games by adapting a classical construction by Bouyer at al. for one-clock priced timed games. ",lakshmi manasa,,2015.0,,arXiv,Guha2015,True,,arXiv,Not available,Revisiting Robustness in Priced Timed Games,24a2159fbbcaa08b6d9f39cc41a8865d,http://arxiv.org/abs/1507.05787v1 10608," We prove an n-EXPTIME lower bound for the problem of deciding the winner in a reachability game on Higher Order Pushdown Automata (HPDA) of level n. This bound matches the known upper bound for parity games on HPDA. As a consequence the mu-calculus model checking over graphs given by n-HPDA is n-EXPTIME complete. ",igor walukiewicz,,2007.0,,arXiv,Cachat2007,True,,arXiv,Not available,The Complexity of Games on Higher Order Pushdown Automata,ece3544793a874991c5741e0be436afc,http://arxiv.org/abs/0705.0262v1 10609," Priced timed games are optimal-cost reachability games played between two players---the controller and the environment---by moving a token along the edges of infinite graphs of configurations of priced timed automata. The goal of the controller is to reach a given set of target locations as cheaply as possible, while the goal of the environment is the opposite. Priced timed games are known to be undecidable for timed automata with $3$ or more clocks, while they are known to be decidable for automata with $1$ clock. In an attempt to recover decidability for priced timed games Bouyer, Markey, and Sankur studied robust priced timed games where the environment has the power to slightly perturb delays proposed by the controller. Unfortunately, however, they showed that the natural problem of deciding the existence of optimal limit-strategy---optimal strategy of the controller where the perturbations tend to vanish in the limit---is undecidable with $10$ or more clocks. In this paper we revisit this problem and improve our understanding of the decidability of these games. We show that the limit-strategy problem is already undecidable for a subclass of robust priced timed games with $5$ or more clocks. On a positive side, we show the decidability of the existence of almost optimal strategies for the same subclass of one-clock robust priced timed games by adapting a classical construction by Bouyer at al. for one-clock priced timed games. ",ashutosh trivedi,,2015.0,,arXiv,Guha2015,True,,arXiv,Not available,Revisiting Robustness in Priced Timed Games,24a2159fbbcaa08b6d9f39cc41a8865d,http://arxiv.org/abs/1507.05787v1 10610," We study the computational complexity of finding stable outcomes in hedonic games, which are a class of coalition formation games. We restrict our attention to symmetric additively-separable hedonic games, which are a nontrivial subclass of such games that are guaranteed to possess stable outcomes. These games are specified by an undirected edge- weighted graph: nodes are players, an outcome of the game is a partition of the nodes into coalitions, and the utility of a node is the sum of incident edge weights in the same coalition. We consider several stability requirements defined in the literature. These are based on restricting feasible player deviations, for example, by giving existing coalition members veto power. We extend these restrictions by considering more general forms of preference aggregation for coalition members. In particular, we consider voting schemes to decide if coalition members will allow a player to enter or leave their coalition. For all of the stability requirements we consider, the existence of a stable outcome is guaranteed by a potential function argument, and local improvements will converge to a stable outcome. We provide an almost complete characterization of these games in terms of the tractability of computing such stable outcomes. Our findings comprise positive results in the form of polynomial-time algorithms, and negative (PLS-completeness) results. The negative results extend to more general hedonic games. ",martin gairing,,2015.0,,arXiv,Gairing2015,True,,arXiv,Not available,"Computing stable outcomes in symmetric additively-separable hedonic games",b7302dd3a046e50373675fc1f3d189c9,http://arxiv.org/abs/1509.05322v1 10611," We study the computational complexity of finding stable outcomes in hedonic games, which are a class of coalition formation games. We restrict our attention to symmetric additively-separable hedonic games, which are a nontrivial subclass of such games that are guaranteed to possess stable outcomes. These games are specified by an undirected edge- weighted graph: nodes are players, an outcome of the game is a partition of the nodes into coalitions, and the utility of a node is the sum of incident edge weights in the same coalition. We consider several stability requirements defined in the literature. These are based on restricting feasible player deviations, for example, by giving existing coalition members veto power. We extend these restrictions by considering more general forms of preference aggregation for coalition members. In particular, we consider voting schemes to decide if coalition members will allow a player to enter or leave their coalition. For all of the stability requirements we consider, the existence of a stable outcome is guaranteed by a potential function argument, and local improvements will converge to a stable outcome. We provide an almost complete characterization of these games in terms of the tractability of computing such stable outcomes. Our findings comprise positive results in the form of polynomial-time algorithms, and negative (PLS-completeness) results. The negative results extend to more general hedonic games. ",rahul savani,,2015.0,,arXiv,Gairing2015,True,,arXiv,Not available,"Computing stable outcomes in symmetric additively-separable hedonic games",b7302dd3a046e50373675fc1f3d189c9,http://arxiv.org/abs/1509.05322v1 10612," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",jon feldman,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 10613," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",s. muthukrishnan,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 10614," A double auction game with an infinite number of buyers and sellers is introduced. All sellers posses one unit of a good, all buyers desire to buy one unit. Each seller and each buyer has a private valuation of the good. The distribution of the valuations define supply and demand functions. One unit of the good is auctioned. At successive, discrete time instances, a player is randomly selected to make a bid (buyer) or an ask (seller). When the maximum of the bids becomes larger than the minimum of the asks, a transaction occurs and the auction is closed. The players have to choose the value of their bid or ask before the auction starts and use this value when they are selected. Assuming that the supply and demand functions are known, expected profits as functions of the strategies are derived, as well as expected transaction prices. It is shown that for linear supply and demand functions, there exists at most one Bayesian Nash equilibrium. Competitive behaviour is not an equilibrium of the game. For linear supply and demand functions, the sum of the expected profit of the sellers and the buyers is the same for the Bayesian Nash equilibrium and the market where players behave competitively. Connections are made with the ZI-C traders model and the $k$-double auction. ",matthijs ruijgrok,,2012.0,,arXiv,Ruijgrok2012,True,,arXiv,Not available,A single-item continuous double auction game,00db6b2be8334ad69ade5dc74e975d50,http://arxiv.org/abs/1210.5541v1 10615," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",michael menz,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10616," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",justin wang,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10617," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",jiyang xie,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 10618," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",ron holzman,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 10619," This paper gives game-theoretic versions of several results on ""merging of opinions"" obtained in measure-theoretic probability and algorithmic randomness theory. An advantage of the game-theoretic versions over the measure-theoretic results is that they are pointwise, their advantage over the algorithmic randomness results is that they are non-asymptotic, but the most important advantage over both is that they are very constructive, giving explicit and efficient strategies for players in a game of prediction. ",vladimir vovk,,2007.0,,arXiv,Vovk2007,True,,arXiv,Not available,Merging of opinions in game-theoretic probability,26ee593c94e82ba4d59e55b146afe1c7,http://arxiv.org/abs/0705.0372v1 10620," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",noa kfir-dahav,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 10621," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",dov monderer,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 10622," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",moshe tennenholtz,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 10623," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 10624," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",noam nisan,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 10625," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",balasubramanian sivan,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 10626," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",vasilis syrgkanis,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 10627," We study the design of mechanisms in combinatorial auction domains. We focus on settings where the auction is repeated, motivated by auctions for licenses or advertising space. We consider models of agent behaviour in which they either apply common learning techniques to minimize the regret of their bidding strategies, or apply short-sighted best-response strategies. We ask: when can a black-box approximation algorithm for the base auction problem be converted into a mechanism that approximately preserves the original algorithm's approximation factor on average over many iterations? We present a general reduction for a broad class of algorithms when agents minimize external regret. We also present a new mechanism for the combinatorial auction problem that attains an $O(\sqrt{m})$ approximation on average when agents apply best-response dynamics. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions,bbb3a99cbd2817e6316e772ef5d192bd,http://arxiv.org/abs/0909.5677v1 10630," We consider the $n\times n$ game of Phutball. It is shown that, given an arbitrary position of stones on the board, it is a PSPACE-hard problem to determine whether the specified player can win the game, regardless of the opponent's choices made during the game. ",dariusz dereniowski,,2008.0,10.1016/j.tcs.2010.08.019,Theoretical Computer Science 411 (2010) 3971-3978,Dereniowski2008,True,,arXiv,Not available,Phutball is PSPACE-hard,11708d5fd58d4d01c57b2292d1f877b1,http://arxiv.org/abs/0804.1777v2 10634," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",amin khan,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 10635," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",xavier vilaca,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 10636," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",luis rodrigues,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 10637," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",felix freitag,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 10638," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",ruggiero cavallo,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 10639," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",prabhakar krishnamurthy,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 10640," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",maxim sviridenko,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 10641," The value of a finite-state two-player zero-sum stochastic game with limit-average payoff can be approximated to within $\epsilon$ in time exponential in a polynomial in the size of the game times polynomial in logarithmic in $\frac{1}{\epsilon}$, for all $\epsilon>0$. ",krishnendu chatterjee,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Stochastic Limit-Average Games are in EXPTIME,b970cdabd82f4d24fd0e7f74a3769d7c,http://arxiv.org/abs/0805.2622v1 10642," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",christopher wilkens,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 10643," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",marco scarsini,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 10644," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",eilon solan,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 10645," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",nicolas vieille,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 10646," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 10647," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 10648," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 10649," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 10650," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",nicolas bousquet,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 10651," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",yang cai,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 10652," The value of a finite-state two-player zero-sum stochastic game with limit-average payoff can be approximated to within $\epsilon$ in time exponential in a polynomial in the size of the game times polynomial in logarithmic in $\frac{1}{\epsilon}$, for all $\epsilon>0$. ",rupak majumdar,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Stochastic Limit-Average Games are in EXPTIME,b970cdabd82f4d24fd0e7f74a3769d7c,http://arxiv.org/abs/0805.2622v1 10653," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",christoph hunkenschroder,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 10654," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",adrian vetta,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 10655," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",haoran yu,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 10656," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",george iosifidis,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 10657," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",jianwei huang,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 10658," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",leandros tassiulas,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 10659," We discuss bundle auctions within the framework of an integer allocation problem. We show that for multi-unit auctions, of which bundle auctions are a special case, market equilibrium and constrained market equilibrium are equivalent concepts. This equivalence, allows us to obtain a computable necessary and sufficient condition for the existence of constrained market equilibrium for bundle auctions. We use this result to obtain a necessary and sufficient condition for the existence of market equilibrium for multi-unit auctions. After obtaining the induced bundle auction of a nonnegative TU game, we show that the existence of market equilibrium implies the existence of a possibly different market equilibrium as well, which corresponds very naturally to an outcome in the matching core of the TU game. Consequently we show that the matching core of the nonnegative TU game is non-empty if and only if the induced market game has a market equilibrium. ",somdeb lahiri,,2006.0,,arXiv,Lahiri2006,True,,arXiv,Not available,"Market Equilibrium for Bundle Auctions and the Matching Core of Nonnegative TU Games",76077471140c9fabd94199f3a8422910,http://arxiv.org/abs/cs/0603032v3 10660," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",sriram somanchi,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 10661," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",chaitanya nittala,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 10662," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",narahari yadati,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 10663," The value of a finite-state two-player zero-sum stochastic game with limit-average payoff can be approximated to within $\epsilon$ in time exponential in a polynomial in the size of the game times polynomial in logarithmic in $\frac{1}{\epsilon}$, for all $\epsilon>0$. ",thomas henzinger,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Stochastic Limit-Average Games are in EXPTIME,b970cdabd82f4d24fd0e7f74a3769d7c,http://arxiv.org/abs/0805.2622v1 10664," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",mireille bossy,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 10665," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",nadia maizi,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 10666," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",odile pourtallier,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 10667," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",jingjing wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 10668," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",chunxiao jiang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 10669," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",zhi bie,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 10670," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",tony quek,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 10671," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",yong ren,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 10672," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",tony luo,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 10673," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",salil kanhere,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 10674," In this work, we discuss a number game that develops in a manner similar to that on which Gilbreath's conjecture on iterated absolute differences between consecutive primes is formulated. In our case the action occurs at the exponent level and there, the evolution is reminiscent of that in a final Ducci game. We present features of the whole field of the game created by the successive generations, prove an analog of Gilbreath's conjecture, and raise some open questions. ",alexandru zaharescu,,2014.0,10.1080/10236198.2014.940337,"Journal of Difference Equations and Applications Journal of Difference Equations and Applications Volume 20, Issue 11, 2014, pages 1489--1501",Cobeli2014,True,,arXiv,Not available,A game with divisors and absolute differences of exponents,d678be7138975e194ba2951f76c951cc,http://arxiv.org/abs/1411.1334v1 10675," We consider two-player turn-based games with zero-reachability and zero-safety objectives generated by extended vector addition systems with states. Although the problem of deciding the winner in such games is undecidable in general, we identify several decidable and even tractable subcases of this problem obtained by restricting the number of counters and/or the sets of target configurations. ",tomas brazdil,,2010.0,,arXiv,Brazdil2010,True,,arXiv,Not available,Reachability Games on Extended Vector Addition Systems with States,95d5e47423c859fda1b7ebf61c2e23ab,http://arxiv.org/abs/1002.2557v1 10676," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",jianwei huang,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 10677," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",sajal das,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 10678," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",fan wu,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 10679," We perform a simulation-based analysis of keyword auctions modeled as one-shot games of incomplete information to study a series of mechanism design questions. Our first question addresses the degree to which incentive compatibility fails in generalized second-price (GSP) auctions. Our results suggest that sincere bidding in GSP auctions is a strikingly poor strategy and a poor predictor of equilibrium outcomes. We next show that the rank-by-revenue mechanism is welfare optimal, corroborating past results. Finally, we analyze profit as a function of auction mechanism under a series of alternative settings. Our conclusions coincide with those of Lahaie and Pennock [2007] when values and quality scores are strongly positively correlated: in such a case, rank-by-bid rules are clearly superior. We diverge, however, in showing that auctions that put little weight on quality scores almost universally dominate the pure rank-by-revenue scheme. ",yevgeniy vorobeychik,,2012.0,,arXiv,Vorobeychik2012,True,,arXiv,Not available,"Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies",64e32e4b8a979d74cfdf4d780679e078,http://arxiv.org/abs/1205.2607v1 10680," We consider two aspects of quantum game theory: the extent to which the quantum solution solves the original classical game, and to what extent the new solution can be obtained in a classical model. ",s. enk,,2002.0,10.1103/PhysRevA.66.024306,"Phys Rev A 66, 024306 (2002)",Enk2002,True,,arXiv,Not available,Classical Rules in Quantum Games,995b458b1c4c3b6fe37df9877b79acc9,http://arxiv.org/abs/quant-ph/0203133v2 10681," We consider two aspects of quantum game theory: the extent to which the quantum solution solves the original classical game, and to what extent the new solution can be obtained in a classical model. ",r. pike,,2002.0,10.1103/PhysRevA.66.024306,"Phys Rev A 66, 024306 (2002)",Enk2002,True,,arXiv,Not available,Classical Rules in Quantum Games,995b458b1c4c3b6fe37df9877b79acc9,http://arxiv.org/abs/quant-ph/0203133v2 10682," The physical world obeys the rules of quantum, as opposed to classical, physics. Since the playing of any particular game requires physical resources, the question arises as to how Game Theory itself would change if it were extended into the quantum domain. Here we provide a general formalism for {\em quantum} games, and illustrate the explicit application of this new formalism to a quantized version of the well-known prisoner's dilemma game. ",chiu lee,,2002.0,,arXiv,Lee2002,True,,arXiv,Not available,Non-Cooperative Quantum Game Theory,6cd4a57630a5bda08b6c93441d3dec78,http://arxiv.org/abs/quant-ph/0210192v2 10683," The physical world obeys the rules of quantum, as opposed to classical, physics. Since the playing of any particular game requires physical resources, the question arises as to how Game Theory itself would change if it were extended into the quantum domain. Here we provide a general formalism for {\em quantum} games, and illustrate the explicit application of this new formalism to a quantized version of the well-known prisoner's dilemma game. ",neil johnson,,2002.0,,arXiv,Lee2002,True,,arXiv,Not available,Non-Cooperative Quantum Game Theory,6cd4a57630a5bda08b6c93441d3dec78,http://arxiv.org/abs/quant-ph/0210192v2 10684," We propose an abstract approach to coalition formation that focuses on simple merge and split rules transforming partitions of a group of players. We identify conditions under which every iteration of these rules yields a unique partition. The main conceptual tool is a specific notion of a stable partition. The results are parametrized by a preference relation between partitions of a group of players and naturally apply to coalitional TU-games, hedonic games and exchange economy games. ",krzysztof apt,,2007.0,,arXiv,Apt2007,True,,arXiv,Not available,A Generic Approach to Coalition Formation,cb5c1653269bf035228e9b3bab7f8caf,http://arxiv.org/abs/0709.0435v3 10685," We propose an abstract approach to coalition formation that focuses on simple merge and split rules transforming partitions of a group of players. We identify conditions under which every iteration of these rules yields a unique partition. The main conceptual tool is a specific notion of a stable partition. The results are parametrized by a preference relation between partitions of a group of players and naturally apply to coalitional TU-games, hedonic games and exchange economy games. ",andreas witzel,,2007.0,,arXiv,Apt2007,True,,arXiv,Not available,A Generic Approach to Coalition Formation,cb5c1653269bf035228e9b3bab7f8caf,http://arxiv.org/abs/0709.0435v3 10686," We consider two-player turn-based games with zero-reachability and zero-safety objectives generated by extended vector addition systems with states. Although the problem of deciding the winner in such games is undecidable in general, we identify several decidable and even tractable subcases of this problem obtained by restricting the number of counters and/or the sets of target configurations. ",petr jancar,,2010.0,,arXiv,Brazdil2010,True,,arXiv,Not available,Reachability Games on Extended Vector Addition Systems with States,95d5e47423c859fda1b7ebf61c2e23ab,http://arxiv.org/abs/1002.2557v1 10687," In cooperative game theory, games in partition function form are real-valued function on the set of so-called embedded coalitions, that is, pairs $(S,\pi)$ where $S$ is a subset (coalition) of the set $N$ of players, and $\pi$ is a partition of $N$ containing $S$. Despite the fact that many studies have been devoted to such games, surprisingly nobody clearly defined a structure (i.e., an order) on embedded coalitions, resulting in scattered and divergent works, lacking unification and proper analysis. The aim of the paper is to fill this gap, thus to study the structure of embedded coalitions (called here embedded subsets), and the properties of games in partition function form. ",michel grabisch,,2010.0,,Discrete Applied Mathematics 158 (2010) 479-488,Grabisch2010,True,,arXiv,Not available,The lattice of embedded subsets,5ff81d259e38360ee87bed9dc151b8a8,http://arxiv.org/abs/1002.3814v1 10688," We adapt the method used by Jaynes to derive the equilibria of statistical physics to instead derive equilibria of bounded rational game theory. We analyze the dependence of these equilibria on the parameters of the underlying game, focusing on hysteresis effects. In particular, we show that by gradually imposing individual-specific tax rates on the players of the game, and then gradually removing those taxes, the players move from a poor equilibrium to one that is better for all of them. ",david wolpert,,2010.0,,arXiv,Wolpert2010,True,,arXiv,Not available,Hysteresis effects of changing parameters of noncooperative games,43edbccaea9201b35b9ede61aabd5f19,http://arxiv.org/abs/1010.5749v1 10689," We adapt the method used by Jaynes to derive the equilibria of statistical physics to instead derive equilibria of bounded rational game theory. We analyze the dependence of these equilibria on the parameters of the underlying game, focusing on hysteresis effects. In particular, we show that by gradually imposing individual-specific tax rates on the players of the game, and then gradually removing those taxes, the players move from a poor equilibrium to one that is better for all of them. ",michael harre,,2010.0,,arXiv,Wolpert2010,True,,arXiv,Not available,Hysteresis effects of changing parameters of noncooperative games,43edbccaea9201b35b9ede61aabd5f19,http://arxiv.org/abs/1010.5749v1 10690," We adapt the method used by Jaynes to derive the equilibria of statistical physics to instead derive equilibria of bounded rational game theory. We analyze the dependence of these equilibria on the parameters of the underlying game, focusing on hysteresis effects. In particular, we show that by gradually imposing individual-specific tax rates on the players of the game, and then gradually removing those taxes, the players move from a poor equilibrium to one that is better for all of them. ",eckehard olbrich,,2010.0,,arXiv,Wolpert2010,True,,arXiv,Not available,Hysteresis effects of changing parameters of noncooperative games,43edbccaea9201b35b9ede61aabd5f19,http://arxiv.org/abs/1010.5749v1 10691," We adapt the method used by Jaynes to derive the equilibria of statistical physics to instead derive equilibria of bounded rational game theory. We analyze the dependence of these equilibria on the parameters of the underlying game, focusing on hysteresis effects. In particular, we show that by gradually imposing individual-specific tax rates on the players of the game, and then gradually removing those taxes, the players move from a poor equilibrium to one that is better for all of them. ",nils bertschinger,,2010.0,,arXiv,Wolpert2010,True,,arXiv,Not available,Hysteresis effects of changing parameters of noncooperative games,43edbccaea9201b35b9ede61aabd5f19,http://arxiv.org/abs/1010.5749v1 10692," We adapt the method used by Jaynes to derive the equilibria of statistical physics to instead derive equilibria of bounded rational game theory. We analyze the dependence of these equilibria on the parameters of the underlying game, focusing on hysteresis effects. In particular, we show that by gradually imposing individual-specific tax rates on the players of the game, and then gradually removing those taxes, the players move from a poor equilibrium to one that is better for all of them. ",juergen jost,,2010.0,,arXiv,Wolpert2010,True,,arXiv,Not available,Hysteresis effects of changing parameters of noncooperative games,43edbccaea9201b35b9ede61aabd5f19,http://arxiv.org/abs/1010.5749v1 10693," Positional games are a branch of combinatorics, researching a variety of two-player games, ranging from popular recreational games such as Tic-Tac-Toe and Hex, to purely abstract games played on graphs and hypergraphs. It is closely connected to many other combinatorial disciplines such as Ramsey theory, extremal graph and set theory, probabilistic combinatorics, and to computer science. We survey the basic notions of the field, its approaches and tools, as well as numerous recent advances, standing open problems and promising research directions. ",michael krivelevich,,2014.0,,arXiv,Krivelevich2014,True,,arXiv,Not available,Positional Games,8f95bda259ab1b331cd0db629689c2d3,http://arxiv.org/abs/1404.2731v1 10694," We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behavior of the individual players in population, which is myopic, greedy and irrational. The stability of the dynamics is governed by optimal transport metric, entropy and Fisher information. ",shui-nee chow,,2017.0,,arXiv,Chow2017,True,,arXiv,Not available,Population games and Discrete optimal transport,6ba0b6f593deca91610c9007c5261429,http://arxiv.org/abs/1704.00855v1 10695," We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behavior of the individual players in population, which is myopic, greedy and irrational. The stability of the dynamics is governed by optimal transport metric, entropy and Fisher information. ",wuchen li,,2017.0,,arXiv,Chow2017,True,,arXiv,Not available,Population games and Discrete optimal transport,6ba0b6f593deca91610c9007c5261429,http://arxiv.org/abs/1704.00855v1 10696," We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behavior of the individual players in population, which is myopic, greedy and irrational. The stability of the dynamics is governed by optimal transport metric, entropy and Fisher information. ",jun lu,,2017.0,,arXiv,Chow2017,True,,arXiv,Not available,Population games and Discrete optimal transport,6ba0b6f593deca91610c9007c5261429,http://arxiv.org/abs/1704.00855v1 10697," We consider two-player turn-based games with zero-reachability and zero-safety objectives generated by extended vector addition systems with states. Although the problem of deciding the winner in such games is undecidable in general, we identify several decidable and even tractable subcases of this problem obtained by restricting the number of counters and/or the sets of target configurations. ",antonin kucera,,2010.0,,arXiv,Brazdil2010,True,,arXiv,Not available,Reachability Games on Extended Vector Addition Systems with States,95d5e47423c859fda1b7ebf61c2e23ab,http://arxiv.org/abs/1002.2557v1 10698," We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behavior of the individual players in population, which is myopic, greedy and irrational. The stability of the dynamics is governed by optimal transport metric, entropy and Fisher information. ",haomin zhou,,2017.0,,arXiv,Chow2017,True,,arXiv,Not available,Population games and Discrete optimal transport,6ba0b6f593deca91610c9007c5261429,http://arxiv.org/abs/1704.00855v1 10699," What is a finite-state strategy in a delay game? We answer this surprisingly non-trivial question and present a very general framework for computing such strategies: they exist for all winning conditions that are recognized by automata with acceptance conditions that satisfy a certain aggregation property. Our framework also yields upper bounds on the complexity of determining the winner of such delay games and upper bounds on the necessary lookahead to win the game. In particular, we cover all previous results of that kind as special cases of our uniform approach. ",martin zimmermann,,2017.0,10.4204/EPTCS.256.11,"EPTCS 256, 2017, pp. 151-165",Zimmermann2017,True,,arXiv,Not available,Finite-state Strategies in Delay Games,df24d7718150c54046a6546bef433b03,http://arxiv.org/abs/1709.03539v1 10700," The category of open games, which provides a strongly compositional foundation of economic game theory, is intermediate between symmetric monoidal and compact closed. More precisely it has counits with no corresponding units, and a partially defined duality. There exist open games with the same types as unit maps, given by agents with the strategic goal of predicting a future value. Such agents appear in earlier work on selection functions. We explore the algebraic properties of these agents via the symmetric monoidal bicategory whose 2-cells are morphisms between open games, and show how the resulting structure approximates a compact closed category with a family of lax commutative bialgebras. ",joe bolt,,2018.0,,arXiv,Bolt2018,True,,arXiv,Not available,The algebra of predicting agents,6c9889261ec8c21a02543f038426764b,http://arxiv.org/abs/1803.10131v1 10701," The category of open games, which provides a strongly compositional foundation of economic game theory, is intermediate between symmetric monoidal and compact closed. More precisely it has counits with no corresponding units, and a partially defined duality. There exist open games with the same types as unit maps, given by agents with the strategic goal of predicting a future value. Such agents appear in earlier work on selection functions. We explore the algebraic properties of these agents via the symmetric monoidal bicategory whose 2-cells are morphisms between open games, and show how the resulting structure approximates a compact closed category with a family of lax commutative bialgebras. ",jules hedges,,2018.0,,arXiv,Bolt2018,True,,arXiv,Not available,The algebra of predicting agents,6c9889261ec8c21a02543f038426764b,http://arxiv.org/abs/1803.10131v1 10702," The category of open games, which provides a strongly compositional foundation of economic game theory, is intermediate between symmetric monoidal and compact closed. More precisely it has counits with no corresponding units, and a partially defined duality. There exist open games with the same types as unit maps, given by agents with the strategic goal of predicting a future value. Such agents appear in earlier work on selection functions. We explore the algebraic properties of these agents via the symmetric monoidal bicategory whose 2-cells are morphisms between open games, and show how the resulting structure approximates a compact closed category with a family of lax commutative bialgebras. ",viktor winschel,,2018.0,,arXiv,Bolt2018,True,,arXiv,Not available,The algebra of predicting agents,6c9889261ec8c21a02543f038426764b,http://arxiv.org/abs/1803.10131v1 10703," Background: Using digital games for educational purposes has been associated with higher levels of motivation among learners of different educational levels. However, the underlying psychological factors involved in digital game based learning (DGBL) have been rarely analyzed considering self-determination theory (SDT, Ryan \& Deci, 2000b); the relation of SDT with the flow experience (Csikszentmihalyi, 1990) has neither been evaluated in the context of DGBL. ",jean-nicolas proulx,,2018.0,10.1177/1046878116674399,"Simulation and Gaming, SAGE Publications, 2017, 48 (1), pp.81 - 97",Proulx2018,True,,arXiv,Not available,"Learning Mechanics and Game Mechanics Under the Perspective of Self-Determination Theory to Foster Motivation in Digital Game Based Learning",9d611ea76991049f273a24a5b8ee5ec9,http://arxiv.org/abs/1805.08053v1 10704," Background: Using digital games for educational purposes has been associated with higher levels of motivation among learners of different educational levels. However, the underlying psychological factors involved in digital game based learning (DGBL) have been rarely analyzed considering self-determination theory (SDT, Ryan \& Deci, 2000b); the relation of SDT with the flow experience (Csikszentmihalyi, 1990) has neither been evaluated in the context of DGBL. ",margarida romero,,2018.0,10.1177/1046878116674399,"Simulation and Gaming, SAGE Publications, 2017, 48 (1), pp.81 - 97",Proulx2018,True,,arXiv,Not available,"Learning Mechanics and Game Mechanics Under the Perspective of Self-Determination Theory to Foster Motivation in Digital Game Based Learning",9d611ea76991049f273a24a5b8ee5ec9,http://arxiv.org/abs/1805.08053v1 10705," Background: Using digital games for educational purposes has been associated with higher levels of motivation among learners of different educational levels. However, the underlying psychological factors involved in digital game based learning (DGBL) have been rarely analyzed considering self-determination theory (SDT, Ryan \& Deci, 2000b); the relation of SDT with the flow experience (Csikszentmihalyi, 1990) has neither been evaluated in the context of DGBL. ",sylvester arnab,,2018.0,10.1177/1046878116674399,"Simulation and Gaming, SAGE Publications, 2017, 48 (1), pp.81 - 97",Proulx2018,True,,arXiv,Not available,"Learning Mechanics and Game Mechanics Under the Perspective of Self-Determination Theory to Foster Motivation in Digital Game Based Learning",9d611ea76991049f273a24a5b8ee5ec9,http://arxiv.org/abs/1805.08053v1 10706," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",atsushi iwasaki,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 10707," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",david kempe,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 10708," The classical model of signaling games assumes that the receiver exactly know the type space (private information) of the sender and be able to discriminate each type of the sender distinctly. However, the justification of this assumption is questionable. It is more reasonable to let the receiver recognize the pattern of the sender. In this paper, we investigate what happens if the assumption is relaxed. A framework of signaling games with pattern recognition and an example are given. ",haoyang wu,,2010.0,,arXiv,Wu2010,True,,arXiv,Not available,Signaling games with pattern recognition,e4256953d4aa3a26b69bbfe5b65c7658,http://arxiv.org/abs/1002.4298v1 10709," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",mahyar salek,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 10710," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",makoto yokoo,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 10711," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 10712," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",jan vondrak,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 10713," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",shahar dobzinski,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 10714," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",renato leme,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 10715," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",deepan palguna,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 10716," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",david love,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 10717," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",ilya pollak,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 10718," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",wei chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10719," We consider the discrete-time quantum walk in the plane, and present a quantum implementation of Parrondo's game for four players. Physical significance of the game strategies are also discussed. ",clement ampadu,,2011.0,,arXiv,Ampadu2011,True,,arXiv,Not available,A Quantum Analogue of Parrondo's Game,8d2b422c784ee0495bb443e86fd243ec,http://arxiv.org/abs/1104.5275v5 10720," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",di he,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10721," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tie-yan liu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10722," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tao qin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10723," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",yixin tao,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10724," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",liwei wang,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 10725," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",gagan goel,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 10726," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",vahab mirrokni,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 10727," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",renato leme,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 10728," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",yoram bachrach,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 10729," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",sofia ceppi,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 10730," The emergence of cooperation figures among the main goal of game theory in competitive-cooperative environments. Potential games have long been hinted as viable alternatives to study realistic player behavior. Here, we expand the potential games approach by taking into account the inherent risks of cooperation. We show the Public Goods game reduce to a Hamiltonian with one-body operators, with the correct Nash Equilibrium as the ground state. The inclusion of punishments to the Public Goods game reduces the cooperation risk, creating two-body interaction with a rich phase diagram, where phase transitions segregates the cooperative from competitive regimes. ",g. nakamura,,2018.0,10.1016/j.physa.2018.09.194,[Physica A 515(2018) 102-111],Nakamura2018,True,,arXiv,Not available,"Cooperation risk and Nash equilibrium: quantitative description for realistic players",170b886bc4db9507726b0717da89519d,http://arxiv.org/abs/1801.06505v1 10731," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",ian kash,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 10732," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",peter key,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 10733," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",david kurokawa,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 10734," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",satyanath bhat,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 10735," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",shweta jain,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 10736," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",sujit gujar,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 10737," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",y. narahari,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 10738," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",yaonan jin,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 10739," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",pinyan lu,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 10740," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",zhihao tang,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 10741," The emergence of cooperation figures among the main goal of game theory in competitive-cooperative environments. Potential games have long been hinted as viable alternatives to study realistic player behavior. Here, we expand the potential games approach by taking into account the inherent risks of cooperation. We show the Public Goods game reduce to a Hamiltonian with one-body operators, with the correct Nash Equilibrium as the ground state. The inclusion of punishments to the Public Goods game reduces the cooperation risk, creating two-body interaction with a rich phase diagram, where phase transitions segregates the cooperative from competitive regimes. ",g. contesini,,2018.0,10.1016/j.physa.2018.09.194,[Physica A 515(2018) 102-111],Nakamura2018,True,,arXiv,Not available,"Cooperation risk and Nash equilibrium: quantitative description for realistic players",170b886bc4db9507726b0717da89519d,http://arxiv.org/abs/1801.06505v1 10742," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",tao xiao,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 10743," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",chaoyue niu,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 10744," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",minping zhou,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 10745," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",zhenzhe zheng,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 10746," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",fan wu,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 10747," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",guihai chen,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 10748," Richman games are zero-sum games, where in each turn players bid in order to determine who will play next [Lazarus et al.'99]. We extend the theory to impartial general-sum two player games called \emph{bidding games}, showing the existence of pure subgame-perfect equilibria (PSPE). In particular, we show that PSPEs form a semilattice, with a unique and natural \emph{Bottom Equilibrium}. Our main result shows that if only two actions available to the players in each node, then the Bottom Equilibrium has additional properties: (a) utilities are monotone in budget; (b) every outcome is Pareto-efficient; and (c) any Pareto-efficient outcome is attained for some budget. In the context of combinatorial bargaining, we show that a player with a fraction of X% of the total budget prefers her allocation to X% of the possible allocations. In addition, we provide a polynomial-time algorithm to compute the Bottom Equilibrium of a binary bidding game. ",gil kalai,,2013.0,,arXiv,Kalai2013,True,,arXiv,Not available,Bidding Games and Efficient Allocations,467bdddd94bdeb68e6847b59afe954d2,http://arxiv.org/abs/1311.0913v5 10749," Richman games are zero-sum games, where in each turn players bid in order to determine who will play next [Lazarus et al.'99]. We extend the theory to impartial general-sum two player games called \emph{bidding games}, showing the existence of pure subgame-perfect equilibria (PSPE). In particular, we show that PSPEs form a semilattice, with a unique and natural \emph{Bottom Equilibrium}. Our main result shows that if only two actions available to the players in each node, then the Bottom Equilibrium has additional properties: (a) utilities are monotone in budget; (b) every outcome is Pareto-efficient; and (c) any Pareto-efficient outcome is attained for some budget. In the context of combinatorial bargaining, we show that a player with a fraction of X% of the total budget prefers her allocation to X% of the possible allocations. In addition, we provide a polynomial-time algorithm to compute the Bottom Equilibrium of a binary bidding game. ",reshef meir,,2013.0,,arXiv,Kalai2013,True,,arXiv,Not available,Bidding Games and Efficient Allocations,467bdddd94bdeb68e6847b59afe954d2,http://arxiv.org/abs/1311.0913v5 10750," Richman games are zero-sum games, where in each turn players bid in order to determine who will play next [Lazarus et al.'99]. We extend the theory to impartial general-sum two player games called \emph{bidding games}, showing the existence of pure subgame-perfect equilibria (PSPE). In particular, we show that PSPEs form a semilattice, with a unique and natural \emph{Bottom Equilibrium}. Our main result shows that if only two actions available to the players in each node, then the Bottom Equilibrium has additional properties: (a) utilities are monotone in budget; (b) every outcome is Pareto-efficient; and (c) any Pareto-efficient outcome is attained for some budget. In the context of combinatorial bargaining, we show that a player with a fraction of X% of the total budget prefers her allocation to X% of the possible allocations. In addition, we provide a polynomial-time algorithm to compute the Bottom Equilibrium of a binary bidding game. ",moshe tennenholtz,,2013.0,,arXiv,Kalai2013,True,,arXiv,Not available,Bidding Games and Efficient Allocations,467bdddd94bdeb68e6847b59afe954d2,http://arxiv.org/abs/1311.0913v5 10751," In this work, we present a logic based on first-order CTL, namely Game Analysis Logic (GAL), in order to reason about games. We relate models and solution concepts of Game Theory as models and formulas of GAL, respectively. Precisely, we express extensive games with perfect in- formation as models of GAL, and Nash equilibrium and subgame perfect equilibrium by means of formulas of GAL. From a practical point of view, we provide a GAL model checker in order to analyze games automatically. We use our model checker in at least two directions: to find solution con- cepts of Game Theory; and, to analyze players that are based on standard algorithms of the AI community, such as the minimax procedure. ",davi vasconcelos,,2014.0,,arXiv,Vasconcelos2014,True,,arXiv,Not available,Reasoning about Games via a First-order Modal Model Checking Approach,5990b00ceb7d167765a9996299ddce35,http://arxiv.org/abs/1402.1377v2 10752," The emergence of cooperation figures among the main goal of game theory in competitive-cooperative environments. Potential games have long been hinted as viable alternatives to study realistic player behavior. Here, we expand the potential games approach by taking into account the inherent risks of cooperation. We show the Public Goods game reduce to a Hamiltonian with one-body operators, with the correct Nash Equilibrium as the ground state. The inclusion of punishments to the Public Goods game reduces the cooperation risk, creating two-body interaction with a rich phase diagram, where phase transitions segregates the cooperative from competitive regimes. ",a. martinez,,2018.0,10.1016/j.physa.2018.09.194,[Physica A 515(2018) 102-111],Nakamura2018,True,,arXiv,Not available,"Cooperation risk and Nash equilibrium: quantitative description for realistic players",170b886bc4db9507726b0717da89519d,http://arxiv.org/abs/1801.06505v1 10753," In this work, we present a logic based on first-order CTL, namely Game Analysis Logic (GAL), in order to reason about games. We relate models and solution concepts of Game Theory as models and formulas of GAL, respectively. Precisely, we express extensive games with perfect in- formation as models of GAL, and Nash equilibrium and subgame perfect equilibrium by means of formulas of GAL. From a practical point of view, we provide a GAL model checker in order to analyze games automatically. We use our model checker in at least two directions: to find solution con- cepts of Game Theory; and, to analyze players that are based on standard algorithms of the AI community, such as the minimax procedure. ",edward haeusler,,2014.0,,arXiv,Vasconcelos2014,True,,arXiv,Not available,Reasoning about Games via a First-order Modal Model Checking Approach,5990b00ceb7d167765a9996299ddce35,http://arxiv.org/abs/1402.1377v2 10754," McLennan and Tourky (2010) showed that ""imitation games"" provide a new view of the computation of Nash equilibria of bimatrix games with the Lemke-Howson algorithm. In an imitation game, the payoff matrix of one of the players is the identity matrix. We study the more general ""unit vector games"", which are already known, where the payoff matrix of one player is composed of unit vectors. Our main application is a simplification of the construction by Savani and von Stengel (2006) of bimatrix games where two basic equilibrium-finding algorithms take exponentially many steps: the Lemke-Howson algorithm, and support enumeration. ",rahul savani,,2015.0,10.1111/ijet.12077,"International Journal of Economic Theory 12 (2016), 7-27",Savani2015,True,,arXiv,Not available,Unit Vector Games,3e7932021683268cf3afbe992c71d8dc,http://arxiv.org/abs/1501.02243v3 10755," McLennan and Tourky (2010) showed that ""imitation games"" provide a new view of the computation of Nash equilibria of bimatrix games with the Lemke-Howson algorithm. In an imitation game, the payoff matrix of one of the players is the identity matrix. We study the more general ""unit vector games"", which are already known, where the payoff matrix of one player is composed of unit vectors. Our main application is a simplification of the construction by Savani and von Stengel (2006) of bimatrix games where two basic equilibrium-finding algorithms take exponentially many steps: the Lemke-Howson algorithm, and support enumeration. ",bernhard stengel,,2015.0,10.1111/ijet.12077,"International Journal of Economic Theory 12 (2016), 7-27",Savani2015,True,,arXiv,Not available,Unit Vector Games,3e7932021683268cf3afbe992c71d8dc,http://arxiv.org/abs/1501.02243v3 10756," We develop a quasi-polynomial time Las Vegas algorithm for approximating Nash equilibria in polymatrix games over trees, under a mild renormalizing assumption. Our result, in particular, leads to an expected polynomial-time algorithm for computing approximate Nash equilibria of tree polymatrix games in which the number of actions per player is a fixed constant. Further, for trees with constant degree, the running time of the algorithm matches the best known upper bound for approximating Nash equilibria in bimatrix games (Lipton, Markakis, and Mehta 2003). Notably, this work closely complements the hardness result of Rubinstein (2015), which establishes the inapproximability of Nash equilibria in polymatrix games over constant-degree bipartite graphs with two actions per player. ",siddharth barman,,2016.0,,arXiv,Barman2016,True,,arXiv,Not available,Approximating Nash Equilibria in Tree Polymatrix Games,bb608cac4c20dda2111366bdf32f250a,http://arxiv.org/abs/1604.02676v1 10757," We develop a quasi-polynomial time Las Vegas algorithm for approximating Nash equilibria in polymatrix games over trees, under a mild renormalizing assumption. Our result, in particular, leads to an expected polynomial-time algorithm for computing approximate Nash equilibria of tree polymatrix games in which the number of actions per player is a fixed constant. Further, for trees with constant degree, the running time of the algorithm matches the best known upper bound for approximating Nash equilibria in bimatrix games (Lipton, Markakis, and Mehta 2003). Notably, this work closely complements the hardness result of Rubinstein (2015), which establishes the inapproximability of Nash equilibria in polymatrix games over constant-degree bipartite graphs with two actions per player. ",katrina ligett,,2016.0,,arXiv,Barman2016,True,,arXiv,Not available,Approximating Nash Equilibria in Tree Polymatrix Games,bb608cac4c20dda2111366bdf32f250a,http://arxiv.org/abs/1604.02676v1 10758," We develop a quasi-polynomial time Las Vegas algorithm for approximating Nash equilibria in polymatrix games over trees, under a mild renormalizing assumption. Our result, in particular, leads to an expected polynomial-time algorithm for computing approximate Nash equilibria of tree polymatrix games in which the number of actions per player is a fixed constant. Further, for trees with constant degree, the running time of the algorithm matches the best known upper bound for approximating Nash equilibria in bimatrix games (Lipton, Markakis, and Mehta 2003). Notably, this work closely complements the hardness result of Rubinstein (2015), which establishes the inapproximability of Nash equilibria in polymatrix games over constant-degree bipartite graphs with two actions per player. ",georgios piliouras,,2016.0,,arXiv,Barman2016,True,,arXiv,Not available,Approximating Nash Equilibria in Tree Polymatrix Games,bb608cac4c20dda2111366bdf32f250a,http://arxiv.org/abs/1604.02676v1 10759," Mean-payoff games on timed automata are played on the infinite weighted graph of configurations of priced timed automata between two players, Player Min and Player Max, by moving a token along the states of the graph to form an infinite run. The goal of Player Min is to minimize the limit average weight of the run, while the goal of the Player Max is the opposite. Brenguier, Cassez, and Raskin recently studied a variation of these games and showed that mean-payoff games are undecidable for timed automata with five or more clocks. We refine this result by proving the undecidability of mean-payoff games with three clocks. On a positive side, we show the decidability of mean-payoff games on one-clock timed automata with binary price-rates. A key contribution of this paper is the application of dynamic programming based proof techniques applied in the context of average reward optimization on an uncountable state and action space. ",shibashis guha,,2016.0,,arXiv,Guha2016,True,,arXiv,Not available,Mean-Payoff Games on Timed Automata,c4ff9e5ce278b334fd123f2674eaa4b8,http://arxiv.org/abs/1607.08480v1 10760," Mean-payoff games on timed automata are played on the infinite weighted graph of configurations of priced timed automata between two players, Player Min and Player Max, by moving a token along the states of the graph to form an infinite run. The goal of Player Min is to minimize the limit average weight of the run, while the goal of the Player Max is the opposite. Brenguier, Cassez, and Raskin recently studied a variation of these games and showed that mean-payoff games are undecidable for timed automata with five or more clocks. We refine this result by proving the undecidability of mean-payoff games with three clocks. On a positive side, we show the decidability of mean-payoff games on one-clock timed automata with binary price-rates. A key contribution of this paper is the application of dynamic programming based proof techniques applied in the context of average reward optimization on an uncountable state and action space. ",marcin jurdzinski,,2016.0,,arXiv,Guha2016,True,,arXiv,Not available,Mean-Payoff Games on Timed Automata,c4ff9e5ce278b334fd123f2674eaa4b8,http://arxiv.org/abs/1607.08480v1 10761," Mean-payoff games on timed automata are played on the infinite weighted graph of configurations of priced timed automata between two players, Player Min and Player Max, by moving a token along the states of the graph to form an infinite run. The goal of Player Min is to minimize the limit average weight of the run, while the goal of the Player Max is the opposite. Brenguier, Cassez, and Raskin recently studied a variation of these games and showed that mean-payoff games are undecidable for timed automata with five or more clocks. We refine this result by proving the undecidability of mean-payoff games with three clocks. On a positive side, we show the decidability of mean-payoff games on one-clock timed automata with binary price-rates. A key contribution of this paper is the application of dynamic programming based proof techniques applied in the context of average reward optimization on an uncountable state and action space. ",krishna s.,,2016.0,,arXiv,Guha2016,True,,arXiv,Not available,Mean-Payoff Games on Timed Automata,c4ff9e5ce278b334fd123f2674eaa4b8,http://arxiv.org/abs/1607.08480v1 10762," Mean-payoff games on timed automata are played on the infinite weighted graph of configurations of priced timed automata between two players, Player Min and Player Max, by moving a token along the states of the graph to form an infinite run. The goal of Player Min is to minimize the limit average weight of the run, while the goal of the Player Max is the opposite. Brenguier, Cassez, and Raskin recently studied a variation of these games and showed that mean-payoff games are undecidable for timed automata with five or more clocks. We refine this result by proving the undecidability of mean-payoff games with three clocks. On a positive side, we show the decidability of mean-payoff games on one-clock timed automata with binary price-rates. A key contribution of this paper is the application of dynamic programming based proof techniques applied in the context of average reward optimization on an uncountable state and action space. ",ashutosh trivedi,,2016.0,,arXiv,Guha2016,True,,arXiv,Not available,Mean-Payoff Games on Timed Automata,c4ff9e5ce278b334fd123f2674eaa4b8,http://arxiv.org/abs/1607.08480v1 10763," In this paper we describe several player preferences in games with $N \geq 2$ players, in particular the case $N = 3$, and use them to simplify game trees, using the game of Clobber as our example. We show that, using a fixed starting player and a certain ruleset, any short game can be simplified to a value in a very concise set. Omitting the fixed starting player and generalising the theory to more than 3 players remains a challenge. ",luc edixhoven,,2018.0,,arXiv,Edixhoven2018,True,,arXiv,Not available,Player preferences in $N$-player games,76adbafbf708a18f40b6e761744dce27,http://arxiv.org/abs/1806.01043v1 10764," Communication games are collaborative information processing tasks involving a number of players with limited communication. Such games are useful tools for studying physical theories. A physical theory exhibits preparation contextuality whenever observed behaviour cannot be explained by a preparation noncontextual model. Here we show that there is a fundamental connection between the performance in communication games and the degree of preparation (non)contextuality. For this purpose, we present a general framework that allows us to construct communication games such that the game performance corresponds to a measure of preparation (non)contextuality. We illustrate the power of this framework by, 1) deriving many examples of tests of preparation contextuality, 2) showing that quantum violations of Bell inequalities can be derived from quantum violations of preparation noncontextuality, 3) qualitatively and quantitatively explaining related previous results on preparation contextuality in quantum communication games, and 4) solving the open problem of revealing the preparation contextuality of the maximally mixed quantum state in any dimension. ",armin tavakoli,,2016.0,,arXiv,Tavakoli2016,True,,arXiv,Not available,Quantum communication games manifest preparation contextuality,51a71c68c8c3c3aee39c858bd83240e1,http://arxiv.org/abs/1609.09301v3 10765," What is a finite-state strategy in a delay game? We answer this surprisingly non-trivial question by presenting a very general framework that allows to remove delay: finite-state strategies exist for all winning conditions where the resulting delay-free game admits a finite-state strategy. The framework is applicable to games whose winning condition is recognized by an automaton with an acceptance condition that satisfies a certain aggregation property. Our framework also yields upper bounds on the complexity of determining the winner of such delay games and upper bounds on the necessary lookahead to win the game. In particular, we cover all previous results of that kind as special cases of our uniform approach. ",sarah winter,,2017.0,,arXiv,Winter2017,True,,arXiv,Not available,Finite-state Strategies in Delay Games (full version),19c8aaedb5964ca88e0195203327dfca,http://arxiv.org/abs/1704.08887v3 10766," What is a finite-state strategy in a delay game? We answer this surprisingly non-trivial question by presenting a very general framework that allows to remove delay: finite-state strategies exist for all winning conditions where the resulting delay-free game admits a finite-state strategy. The framework is applicable to games whose winning condition is recognized by an automaton with an acceptance condition that satisfies a certain aggregation property. Our framework also yields upper bounds on the complexity of determining the winner of such delay games and upper bounds on the necessary lookahead to win the game. In particular, we cover all previous results of that kind as special cases of our uniform approach. ",martin zimmermann,,2017.0,,arXiv,Winter2017,True,,arXiv,Not available,Finite-state Strategies in Delay Games (full version),19c8aaedb5964ca88e0195203327dfca,http://arxiv.org/abs/1704.08887v3 10767," The paper studies the convergence properties of (continuous) best-response dynamics from game theory. Despite their fundamental role in game theory, best-response dynamics are poorly understood in many games of interest due to the discontinuous, set-valued nature of the best-response map. The paper focuses on elucidating several important properties of best-response dynamics in the class of multi-agent games known as potential games---a class of games with fundamental importance in multi-agent systems and distributed control. It is shown that in almost every potential game and for almost every initial condition, the best-response dynamics (i) have a unique solution, (ii) converge to pure-strategy Nash equilibria, and (iii) converge at an exponential rate. ",brian swenson,,2017.0,,arXiv,Swenson2017,True,,arXiv,Not available,On Best-Response Dynamics in Potential Games,1be528c123c8ef2d0c32cc6894f056e5,http://arxiv.org/abs/1707.06465v2 10768," The paper studies the convergence properties of (continuous) best-response dynamics from game theory. Despite their fundamental role in game theory, best-response dynamics are poorly understood in many games of interest due to the discontinuous, set-valued nature of the best-response map. The paper focuses on elucidating several important properties of best-response dynamics in the class of multi-agent games known as potential games---a class of games with fundamental importance in multi-agent systems and distributed control. It is shown that in almost every potential game and for almost every initial condition, the best-response dynamics (i) have a unique solution, (ii) converge to pure-strategy Nash equilibria, and (iii) converge at an exponential rate. ",ryan murray,,2017.0,,arXiv,Swenson2017,True,,arXiv,Not available,On Best-Response Dynamics in Potential Games,1be528c123c8ef2d0c32cc6894f056e5,http://arxiv.org/abs/1707.06465v2 10769," The paper studies the convergence properties of (continuous) best-response dynamics from game theory. Despite their fundamental role in game theory, best-response dynamics are poorly understood in many games of interest due to the discontinuous, set-valued nature of the best-response map. The paper focuses on elucidating several important properties of best-response dynamics in the class of multi-agent games known as potential games---a class of games with fundamental importance in multi-agent systems and distributed control. It is shown that in almost every potential game and for almost every initial condition, the best-response dynamics (i) have a unique solution, (ii) converge to pure-strategy Nash equilibria, and (iii) converge at an exponential rate. ",soummya kar,,2017.0,,arXiv,Swenson2017,True,,arXiv,Not available,On Best-Response Dynamics in Potential Games,1be528c123c8ef2d0c32cc6894f056e5,http://arxiv.org/abs/1707.06465v2 10770," In this work, we aim to answer the question- what triggers cooperative behaviour in the thermodynamic limit by taking recourse to the Public goods game. Using the idea of mapping the Ising model Hamiltonian to payoffs in game theory we calculate the Magnetisation of a game in the thermodynamic limit. We see a phase transition in the thermodynamic limit of the two player Public goods game. We observe that punishment acts as an external field for the two player Public goods game triggering cooperation, while cost can be a trigger for defection or suppressing cooperation. Finally, reward also acts as a trigger for cooperation while the role of inverse temperature (fluctuations in choices) remains ambiguous. ",shubhayan sarkar,,2018.0,,arXiv,Sarkar2018,True,,arXiv,Not available,"Triggers for cooperative behavior in the thermodynamic limit: a case study in Public goods game",acd310a91b5eb44f18c5ef33ca615944,http://arxiv.org/abs/1804.06465v1 10771," In this work, we aim to answer the question- what triggers cooperative behaviour in the thermodynamic limit by taking recourse to the Public goods game. Using the idea of mapping the Ising model Hamiltonian to payoffs in game theory we calculate the Magnetisation of a game in the thermodynamic limit. We see a phase transition in the thermodynamic limit of the two player Public goods game. We observe that punishment acts as an external field for the two player Public goods game triggering cooperation, while cost can be a trigger for defection or suppressing cooperation. Finally, reward also acts as a trigger for cooperation while the role of inverse temperature (fluctuations in choices) remains ambiguous. ",colin benjamin,,2018.0,,arXiv,Sarkar2018,True,,arXiv,Not available,"Triggers for cooperative behavior in the thermodynamic limit: a case study in Public goods game",acd310a91b5eb44f18c5ef33ca615944,http://arxiv.org/abs/1804.06465v1 10772," Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios. Many algorithmic solutions require discrete, finite games with payoffs that have a closed-form specification. In contrast, many real-world applications require modeling with continuous action spaces and black-box utility functions where payoff information is available only in the form of empirical (often expensive and/or noisy) observations of strategy profiles. To the best of our knowledge, few tools exist for solving the class of expensive, black-box continuous games. In this paper, we develop a method to find equilibria for such games in a sequential decision-making framework using Bayesian Optimization. The proposed approach is validated on a collection of synthetic game problems with varying degree of noise and action space dimensions. The results indicate that it is capable of improving the maximum regret in noisy and high dimensions to a greater extent than hierarchical or discretized methods. ",abdullah al-dujaili,,2018.0,,arXiv,Al-Dujaili2018,True,,arXiv,Not available,"Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach",e1ad9cc1d533da07f087dee132bcbaae,http://arxiv.org/abs/1804.10586v2 10773," Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios. Many algorithmic solutions require discrete, finite games with payoffs that have a closed-form specification. In contrast, many real-world applications require modeling with continuous action spaces and black-box utility functions where payoff information is available only in the form of empirical (often expensive and/or noisy) observations of strategy profiles. To the best of our knowledge, few tools exist for solving the class of expensive, black-box continuous games. In this paper, we develop a method to find equilibria for such games in a sequential decision-making framework using Bayesian Optimization. The proposed approach is validated on a collection of synthetic game problems with varying degree of noise and action space dimensions. The results indicate that it is capable of improving the maximum regret in noisy and high dimensions to a greater extent than hierarchical or discretized methods. ",erik hemberg,,2018.0,,arXiv,Al-Dujaili2018,True,,arXiv,Not available,"Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach",e1ad9cc1d533da07f087dee132bcbaae,http://arxiv.org/abs/1804.10586v2 10774," In this paper we describe several player preferences in games with $N \geq 2$ players, in particular the case $N = 3$, and use them to simplify game trees, using the game of Clobber as our example. We show that, using a fixed starting player and a certain ruleset, any short game can be simplified to a value in a very concise set. Omitting the fixed starting player and generalising the theory to more than 3 players remains a challenge. ",walter kosters,,2018.0,,arXiv,Edixhoven2018,True,,arXiv,Not available,Player preferences in $N$-player games,76adbafbf708a18f40b6e761744dce27,http://arxiv.org/abs/1806.01043v1 10775," Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios. Many algorithmic solutions require discrete, finite games with payoffs that have a closed-form specification. In contrast, many real-world applications require modeling with continuous action spaces and black-box utility functions where payoff information is available only in the form of empirical (often expensive and/or noisy) observations of strategy profiles. To the best of our knowledge, few tools exist for solving the class of expensive, black-box continuous games. In this paper, we develop a method to find equilibria for such games in a sequential decision-making framework using Bayesian Optimization. The proposed approach is validated on a collection of synthetic game problems with varying degree of noise and action space dimensions. The results indicate that it is capable of improving the maximum regret in noisy and high dimensions to a greater extent than hierarchical or discretized methods. ",una-may o'reilly,,2018.0,,arXiv,Al-Dujaili2018,True,,arXiv,Not available,"Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach",e1ad9cc1d533da07f087dee132bcbaae,http://arxiv.org/abs/1804.10586v2 10776," A bidimensional representation of the space of 2x2 Symmetric Games in the strategic representation is proposed. This representation provides a tool for the classification of 2x2 symmetric games, quantification of the fraction of them having a certain feature, and predictions of changes in the characteristics of a game when a change in done on the payoff matrix that defines it. ",alvaro huertas-rosero,,2003.0,,arXiv,Huertas-Rosero2003,True,,arXiv,Not available,A Cartography for 2x2 Symmetric Games,b5abdfefb2423f933953e526d67c7ac5,http://arxiv.org/abs/cs/0312005v2 10777," This paper investigates the different effects of chaotic switching on Parrondo's games, as compared to random and periodic switching. The rate of winning of Parrondo's games with chaotic switching depends on coefficient(s) defining the chaotic generator, initial conditions of the chaotic sequence and the proportion of Game A played. Maximum rate of winning can be obtained with all the above mentioned factors properly set, and this occurs when chaotic switching approaches periodic behavior. ",t. tang,,2004.0,10.1117/12.561307,arXiv,Tang2004,True,,arXiv,Not available,Parrondo's games with chaotic switching,af598de691fcf5794d358938a5a4ca29,http://arxiv.org/abs/cs/0404016v1 10778," This paper investigates the different effects of chaotic switching on Parrondo's games, as compared to random and periodic switching. The rate of winning of Parrondo's games with chaotic switching depends on coefficient(s) defining the chaotic generator, initial conditions of the chaotic sequence and the proportion of Game A played. Maximum rate of winning can be obtained with all the above mentioned factors properly set, and this occurs when chaotic switching approaches periodic behavior. ",a. allison,,2004.0,10.1117/12.561307,arXiv,Tang2004,True,,arXiv,Not available,Parrondo's games with chaotic switching,af598de691fcf5794d358938a5a4ca29,http://arxiv.org/abs/cs/0404016v1 10779," This paper investigates the different effects of chaotic switching on Parrondo's games, as compared to random and periodic switching. The rate of winning of Parrondo's games with chaotic switching depends on coefficient(s) defining the chaotic generator, initial conditions of the chaotic sequence and the proportion of Game A played. Maximum rate of winning can be obtained with all the above mentioned factors properly set, and this occurs when chaotic switching approaches periodic behavior. ",d. abbott,,2004.0,10.1117/12.561307,arXiv,Tang2004,True,,arXiv,Not available,Parrondo's games with chaotic switching,af598de691fcf5794d358938a5a4ca29,http://arxiv.org/abs/cs/0404016v1 10780," In this paper we present a novel generic mapping between Graphical Games and Markov Random Fields so that pure Nash equilibria in the former can be found by statistical inference on the latter. Thus, the problem of deciding whether a graphical game has a pure Nash equilibrium, a well-known intractable problem, can be attacked by well-established algorithms such as Belief Propagation, Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes of graphical games become thus tractable, including all classes already known, but also new classes such as the games with O(log n) treewidth. ",constantinos daskalakis,,2005.0,,arXiv,Daskalakis2005,True,,arXiv,Not available,Computing Pure Nash Equilibria via Markov Random Fields,29537bc1c540c075d60a682a3be5efe0,http://arxiv.org/abs/cs/0510031v1 10781," We investigate systematically the impact of human intervention in the training of computer players in a strategy board game. In that game, computer players utilise reinforcement learning with neural networks for evolving their playing strategies and demonstrate a slow learning speed. Human intervention can significantly enhance learning performance, but carry-ing it out systematically seems to be more of a problem of an integrated game development environment as opposed to automatic evolutionary learning. ",dimitris kalles,,2006.0,,arXiv,Kalles2006,True,,arXiv,Not available,"On Measuring the Impact of Human Actions in the Machine Learning of a Board Game's Playing Policies",6801450c0d9469ad993dd32341d45912,http://arxiv.org/abs/cs/0611163v1 10782," The ``losing positions"" of certain combinatorial games constitute linear error detecting and correcting codes. We show that a large class of games that can be cast in the form of *annihilation games*, provides a potentially polynomial method for computing codes (*anncodes*). We also give a short proof of the basic properties of the previously known *lexicodes*, which are defined by means of an exponential algorithm, and are related to game theory. The set of lexicodes is seen to constitute a subset of the set of anncodes. In the final section we indicate, by means of an example, how the method of producing lexicodes can be applied optimally to find anncodes. Some extensions are indicated. ",aviezri fraenkel,,1995.0,,arXiv,Fraenkel1995,True,,arXiv,Not available,Error-correcting codes derived from combinatorial games,29d34b83b146d348001dcc2e0327b01a,http://arxiv.org/abs/math/9504211v1 10783," It is known that the memory is relevant in the symmetric phase of the minority game. In our previous work we have successfully explained the quasi-periodic behavior of the game in the symmetric phase with the help of the probability theory. Based on this explanation, we are able to determine how the memory affects the variance of the system in this paper. By using some particular types of fake history such as periodic type and random type, we determine how efficient the memory has been used in the standard game. Furthermore, the analysis on the effective memory strongly supports the result we proposed previously that there are three distinct phases in the minority game. ",c. hung,,2006.0,10.1016/j.physa.2007.02.048,arXiv,Hung2006,True,,arXiv,Not available,Effective memory of the minority game,e3c300fa74d4975422d07ae9282e4b59,http://arxiv.org/abs/physics/0607206v1 10784," It is known that the memory is relevant in the symmetric phase of the minority game. In our previous work we have successfully explained the quasi-periodic behavior of the game in the symmetric phase with the help of the probability theory. Based on this explanation, we are able to determine how the memory affects the variance of the system in this paper. By using some particular types of fake history such as periodic type and random type, we determine how efficient the memory has been used in the standard game. Furthermore, the analysis on the effective memory strongly supports the result we proposed previously that there are three distinct phases in the minority game. ",s. liaw,,2006.0,10.1016/j.physa.2007.02.048,arXiv,Hung2006,True,,arXiv,Not available,Effective memory of the minority game,e3c300fa74d4975422d07ae9282e4b59,http://arxiv.org/abs/physics/0607206v1 10785," Symmetry is inherent in the definition of most of the two-player zero-sum games, including parity, mean-payoff, and discounted-payoff games. It is therefore quite surprising that no symmetric analysis techniques for these games exist. We develop a novel symmetric strategy improvement algorithm where, in each iteration, the strategies of both players are improved simultaneously. We show that symmetric strategy improvement defies Friedmann's traps, which shook the belief in the potential of classic strategy improvement to be polynomial. ",sven schewe,,2015.0,,arXiv,Schewe2015,True,,arXiv,Not available,Symmetric Strategy Improvement,9ed5406e5049fe575822de4dd3225fac,http://arxiv.org/abs/1501.06484v1 10786," In the time since a merger of quantum mechanics and game theory was proposed formally in 1999, the two distinct perspectives apparent in this merger of applying quantum mechanics to game theory, referred to henceforth as the theory of ""quantized games"", and of applying game theory to quantum mechanics, referred to henceforth as ""gaming the quantum"", have become synonymous under the single ill-defined term ""quantum game"". Here, these two perspectives are delineated and a game-theoretically proper description of what makes a multi-player, non-cooperative game quantum mechanical, is given. Within the context of this description, finding a Nash equilibrium in a strictly competitive quantum game is shown to be equivalent to finding a solution to a simultaneous best approximation problem in the state space of quantum objects, thus setting up a framework for a game theory inspired study of ""equilibrium"" behavior of quantum physical systems such as those utilized in quantum information processing and computation. ",faisal khan,,2012.0,,"Quantum Information & Computation, Vol.13 No.3&4 March 1, 2013",Khan2012,True,,arXiv,Not available,Gaming the Quantum,e39d9ee3ce8c63cea2dc13c49ac4ebbc,http://arxiv.org/abs/1202.1142v6 10787," An evolutionarily stable strategy (ESS) was originally defined as a static concept but later given a dynamic characterization. A well known theorem in evolutionary game theory says that an ESS is an attractor of replicator dynamics but not every attractor is an ESS. We search for a dynamic characterization of ESSs in quantum games and find that in certain asymmetric bi-matrix games evolutionary stability of attractors can change as the game switches between its two forms, one classical and the other quantum. ",azhar iqbal,,2001.0,,arXiv,Iqbal2001,True,,arXiv,Not available,Equilibria of Replicator Dynamics in Quantum Games,dfd59a463c1b8d9e34a78b3d46359582,http://arxiv.org/abs/quant-ph/0106135v2 10788," An evolutionarily stable strategy (ESS) was originally defined as a static concept but later given a dynamic characterization. A well known theorem in evolutionary game theory says that an ESS is an attractor of replicator dynamics but not every attractor is an ESS. We search for a dynamic characterization of ESSs in quantum games and find that in certain asymmetric bi-matrix games evolutionary stability of attractors can change as the game switches between its two forms, one classical and the other quantum. ",a. toor,,2001.0,,arXiv,Iqbal2001,True,,arXiv,Not available,Equilibria of Replicator Dynamics in Quantum Games,dfd59a463c1b8d9e34a78b3d46359582,http://arxiv.org/abs/quant-ph/0106135v2 10789," Non-transitivity can arise in games with three or more strategies $A,B,C$, when $A$ beats $B$, $B$ beats $C$, and $C$ beats $A$, ($A>B>C>A$). An example is the children's game \textquotedblleft rock, scissors, paper"" ($R,S,P$) where $R>S>P>R$. We discuss the conditions under which quantum versions of $R,S,P$ retain the non-transitive characteristics of the corresponding classical game. Some physical implications of non-transitivity in quantum game theory are also considered. ",michael stohler,,2003.0,,arXiv,Stohler2003,True,,arXiv,Not available,Non-Transitive Quantum Games,3ffc26e9041443c98894fc7758fc072f,http://arxiv.org/abs/quant-ph/0307072v1 10790," Non-transitivity can arise in games with three or more strategies $A,B,C$, when $A$ beats $B$, $B$ beats $C$, and $C$ beats $A$, ($A>B>C>A$). An example is the children's game \textquotedblleft rock, scissors, paper"" ($R,S,P$) where $R>S>P>R$. We discuss the conditions under which quantum versions of $R,S,P$ retain the non-transitive characteristics of the corresponding classical game. Some physical implications of non-transitivity in quantum game theory are also considered. ",ephraim fischbach,,2003.0,,arXiv,Stohler2003,True,,arXiv,Not available,Non-Transitive Quantum Games,3ffc26e9041443c98894fc7758fc072f,http://arxiv.org/abs/quant-ph/0307072v1 10791," Effects of classical/quantum correlations and operations in game theory are analyzed using Samaritan's Dilemma. We observe that introducing either quantum or classical correlations to the game results in the emergence of a unique or multiple Nash equilibria (NE) which do not exist in the original classical game. It is shown that the strategies creating the NE and the amount of payoffs the players receive at these NE's depend on the type of the correlation. We also discuss whether the Samaritan can resolve the dilemma acting unilaterally. ",sahin ozdemir,,2003.0,,"Physics Letters A, 313, 218 (2004)",Ozdemir2003,True,,arXiv,Not available,Samaritan's Dilemma: Classical and quantum strategies in Welfare Game,599d4d6c247456262802b901de101c78,http://arxiv.org/abs/quant-ph/0311074v1 10792," Effects of classical/quantum correlations and operations in game theory are analyzed using Samaritan's Dilemma. We observe that introducing either quantum or classical correlations to the game results in the emergence of a unique or multiple Nash equilibria (NE) which do not exist in the original classical game. It is shown that the strategies creating the NE and the amount of payoffs the players receive at these NE's depend on the type of the correlation. We also discuss whether the Samaritan can resolve the dilemma acting unilaterally. ",junichi shimamura,,2003.0,,"Physics Letters A, 313, 218 (2004)",Ozdemir2003,True,,arXiv,Not available,Samaritan's Dilemma: Classical and quantum strategies in Welfare Game,599d4d6c247456262802b901de101c78,http://arxiv.org/abs/quant-ph/0311074v1 10793," Effects of classical/quantum correlations and operations in game theory are analyzed using Samaritan's Dilemma. We observe that introducing either quantum or classical correlations to the game results in the emergence of a unique or multiple Nash equilibria (NE) which do not exist in the original classical game. It is shown that the strategies creating the NE and the amount of payoffs the players receive at these NE's depend on the type of the correlation. We also discuss whether the Samaritan can resolve the dilemma acting unilaterally. ",fumiaki morikoshi,,2003.0,,"Physics Letters A, 313, 218 (2004)",Ozdemir2003,True,,arXiv,Not available,Samaritan's Dilemma: Classical and quantum strategies in Welfare Game,599d4d6c247456262802b901de101c78,http://arxiv.org/abs/quant-ph/0311074v1 10794," Effects of classical/quantum correlations and operations in game theory are analyzed using Samaritan's Dilemma. We observe that introducing either quantum or classical correlations to the game results in the emergence of a unique or multiple Nash equilibria (NE) which do not exist in the original classical game. It is shown that the strategies creating the NE and the amount of payoffs the players receive at these NE's depend on the type of the correlation. We also discuss whether the Samaritan can resolve the dilemma acting unilaterally. ",nobuyuki imoto,,2003.0,,"Physics Letters A, 313, 218 (2004)",Ozdemir2003,True,,arXiv,Not available,Samaritan's Dilemma: Classical and quantum strategies in Welfare Game,599d4d6c247456262802b901de101c78,http://arxiv.org/abs/quant-ph/0311074v1 10795," We refine existing general network optimization techniques, give new characterizations for the class of problems to which they can be applied, and show that they can also be used to solve various two-player games in almost linear time. Among these is a new variant of the network interdiction problem, where the interdictor wants to destroy high-capacity paths from the source to the destination using a vertex-wise limited budget of arc removals. We also show that replacing the limit average in mean payoff games by the maximum weight results in a class of games amenable to these techniques. ",daniel andersson,,2008.0,,arXiv,Andersson2008,True,,arXiv,Not available,Solving Min-Max Problems with Applications to Games,c4847a86d7dbac1b4971fc3dde289fe2,http://arxiv.org/abs/0801.4130v1 10796," We present an approach for implementing a specific form of collaborative industrial practices-called Industrial Symbiotic Networks (ISNs)-as MC-Net cooperative games and address the so called ISN implementation problem. This is, the characteristics of ISNs may lead to inapplicability of fair and stable benefit allocation methods even if the collaboration is a collectively desired one. Inspired by realistic ISN scenarios and the literature on normative multi-agent systems, we consider regulations and normative socioeconomic policies as two elements that in combination with ISN games resolve the situation and result in the concept of coordinated ISNs. ",vahid yazdanpanah,,2018.0,,arXiv,Yazdanpanah2018,True,,arXiv,Not available,Industrial Symbiotic Networks as Coordinated Games,d2fd43877046206f12359f571dc507b0,http://arxiv.org/abs/1804.07183v1 10797," In the time since a merger of quantum mechanics and game theory was proposed formally in 1999, the two distinct perspectives apparent in this merger of applying quantum mechanics to game theory, referred to henceforth as the theory of ""quantized games"", and of applying game theory to quantum mechanics, referred to henceforth as ""gaming the quantum"", have become synonymous under the single ill-defined term ""quantum game"". Here, these two perspectives are delineated and a game-theoretically proper description of what makes a multi-player, non-cooperative game quantum mechanical, is given. Within the context of this description, finding a Nash equilibrium in a strictly competitive quantum game is shown to be equivalent to finding a solution to a simultaneous best approximation problem in the state space of quantum objects, thus setting up a framework for a game theory inspired study of ""equilibrium"" behavior of quantum physical systems such as those utilized in quantum information processing and computation. ",simon phoenix,,2012.0,,"Quantum Information & Computation, Vol.13 No.3&4 March 1, 2013",Khan2012,True,,arXiv,Not available,Gaming the Quantum,e39d9ee3ce8c63cea2dc13c49ac4ebbc,http://arxiv.org/abs/1202.1142v6 10798," We present an approach for implementing a specific form of collaborative industrial practices-called Industrial Symbiotic Networks (ISNs)-as MC-Net cooperative games and address the so called ISN implementation problem. This is, the characteristics of ISNs may lead to inapplicability of fair and stable benefit allocation methods even if the collaboration is a collectively desired one. Inspired by realistic ISN scenarios and the literature on normative multi-agent systems, we consider regulations and normative socioeconomic policies as two elements that in combination with ISN games resolve the situation and result in the concept of coordinated ISNs. ",devrim yazan,,2018.0,,arXiv,Yazdanpanah2018,True,,arXiv,Not available,Industrial Symbiotic Networks as Coordinated Games,d2fd43877046206f12359f571dc507b0,http://arxiv.org/abs/1804.07183v1 10799," We present an approach for implementing a specific form of collaborative industrial practices-called Industrial Symbiotic Networks (ISNs)-as MC-Net cooperative games and address the so called ISN implementation problem. This is, the characteristics of ISNs may lead to inapplicability of fair and stable benefit allocation methods even if the collaboration is a collectively desired one. Inspired by realistic ISN scenarios and the literature on normative multi-agent systems, we consider regulations and normative socioeconomic policies as two elements that in combination with ISN games resolve the situation and result in the concept of coordinated ISNs. ",henk zijm,,2018.0,,arXiv,Yazdanpanah2018,True,,arXiv,Not available,Industrial Symbiotic Networks as Coordinated Games,d2fd43877046206f12359f571dc507b0,http://arxiv.org/abs/1804.07183v1 10800," We study an impartial game introduced by Anderson and Harary. The game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for finite groups of the form $T \times H$, where $T$ is a $2$-group and $H$ is a group of odd order. This includes all nilpotent and hence abelian groups. ",bret benesh,,2018.0,,arXiv,Benesh2018,True,,arXiv,Not available,Impartial achievement games for generating nilpotent groups,000199c000cc47fdbced9290d5958be0,http://arxiv.org/abs/1805.01409v1 10801," We study an impartial game introduced by Anderson and Harary. The game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for finite groups of the form $T \times H$, where $T$ is a $2$-group and $H$ is a group of odd order. This includes all nilpotent and hence abelian groups. ",dana ernst,,2018.0,,arXiv,Benesh2018,True,,arXiv,Not available,Impartial achievement games for generating nilpotent groups,000199c000cc47fdbced9290d5958be0,http://arxiv.org/abs/1805.01409v1 10802," We study an impartial game introduced by Anderson and Harary. The game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for finite groups of the form $T \times H$, where $T$ is a $2$-group and $H$ is a group of odd order. This includes all nilpotent and hence abelian groups. ",nandor sieben,,2018.0,,arXiv,Benesh2018,True,,arXiv,Not available,Impartial achievement games for generating nilpotent groups,000199c000cc47fdbced9290d5958be0,http://arxiv.org/abs/1805.01409v1 10803," We formalize the current practice of strategic mining in multi-cryptocurrency markets as a game, and prove that any better-response learning in such games converges to equilibrium. We then offer a reward design scheme that moves the system configuration from any initial equilibrium to a desired one for any better-response learning of the miners. Our work introduces the first multi-coin strategic attack for adaptive and learning miners, as well as the study of reward design in a multi-agent system of learning agents. ",alexander spiegelman,,2018.0,,arXiv,Spiegelman2018,True,,arXiv,Not available,Game of Coins,07b0c13544e1bcd47173f05b43d209fe,http://arxiv.org/abs/1805.08979v1 10804," We formalize the current practice of strategic mining in multi-cryptocurrency markets as a game, and prove that any better-response learning in such games converges to equilibrium. We then offer a reward design scheme that moves the system configuration from any initial equilibrium to a desired one for any better-response learning of the miners. Our work introduces the first multi-coin strategic attack for adaptive and learning miners, as well as the study of reward design in a multi-agent system of learning agents. ",idit keidar,,2018.0,,arXiv,Spiegelman2018,True,,arXiv,Not available,Game of Coins,07b0c13544e1bcd47173f05b43d209fe,http://arxiv.org/abs/1805.08979v1 10805," We formalize the current practice of strategic mining in multi-cryptocurrency markets as a game, and prove that any better-response learning in such games converges to equilibrium. We then offer a reward design scheme that moves the system configuration from any initial equilibrium to a desired one for any better-response learning of the miners. Our work introduces the first multi-coin strategic attack for adaptive and learning miners, as well as the study of reward design in a multi-agent system of learning agents. ",moshe tennenholtz,,2018.0,,arXiv,Spiegelman2018,True,,arXiv,Not available,Game of Coins,07b0c13544e1bcd47173f05b43d209fe,http://arxiv.org/abs/1805.08979v1 10806," In this paper, we show that different types of evolutionary game dynamics are, in principle, special cases of a dynamical system model based on our previously reported framework of generalized growth transforms. The framework shows that different dynamics arise as a result of minimizing a population energy such that the population as a whole evolves to reach the most stable state. By introducing a population dependent time-constant in the generalized growth transform model, the proposed framework can be used to explain a vast repertoire of evolutionary dynamics, including some novel forms of game dynamics with non-linear payoffs. ",oindrila chatterjee,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"A Unified Perspective of Evolutionary Game Dynamics Using Generalized Growth Transforms",5e84d740d44ad09f256628160ec2b55b,http://arxiv.org/abs/1811.02010v1 10807," In this paper, we show that different types of evolutionary game dynamics are, in principle, special cases of a dynamical system model based on our previously reported framework of generalized growth transforms. The framework shows that different dynamics arise as a result of minimizing a population energy such that the population as a whole evolves to reach the most stable state. By introducing a population dependent time-constant in the generalized growth transform model, the proposed framework can be used to explain a vast repertoire of evolutionary dynamics, including some novel forms of game dynamics with non-linear payoffs. ",shantanu chakrabartty,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"A Unified Perspective of Evolutionary Game Dynamics Using Generalized Growth Transforms",5e84d740d44ad09f256628160ec2b55b,http://arxiv.org/abs/1811.02010v1 10808," In this paper, we view the Internet under a game-theoretic lens in an effort to explain and overcome the Internet's innovation slump. Game Theory is used to model Internet environments as problems of technological competition toward the end of understanding their emergent phenomena and the evolutionary forces that shape them. However, our results extend beyond understanding the Internet architecture toward helping the Internet population achieve socially desirable outcomes. ",ioannis avramopoulos,,2012.0,,arXiv,Avramopoulos2012,True,,arXiv,Not available,Architectural innovation: A game-theoretic approach,2423e8604ccf6d46eb158b186c0dc9fa,http://arxiv.org/abs/1210.7789v1 10809," Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, developing analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game. ",aidin ferdowsi,,2017.0,,arXiv,Ferdowsi2017,True,,arXiv,Not available,Generalized Colonel Blotto Game,00d5c792fdc4b578ad6cb00d1e11e60e,http://arxiv.org/abs/1710.01381v2 10810," Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, developing analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game. ",anibal sanjab,,2017.0,,arXiv,Ferdowsi2017,True,,arXiv,Not available,Generalized Colonel Blotto Game,00d5c792fdc4b578ad6cb00d1e11e60e,http://arxiv.org/abs/1710.01381v2 10811," Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, developing analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game. ",walid saad,,2017.0,,arXiv,Ferdowsi2017,True,,arXiv,Not available,Generalized Colonel Blotto Game,00d5c792fdc4b578ad6cb00d1e11e60e,http://arxiv.org/abs/1710.01381v2 10812," Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, developing analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game. ",tamer basar,,2017.0,,arXiv,Ferdowsi2017,True,,arXiv,Not available,Generalized Colonel Blotto Game,00d5c792fdc4b578ad6cb00d1e11e60e,http://arxiv.org/abs/1710.01381v2 10813," In this paper we survey some surprising connections between group theory, the theory of automata and formal languages, the theory of ends, infinite games of perfect information, and monadic second-order logic. ",tullio ceccherini-silberstein,,2012.0,10.1016/j.ejc.2012.03.010,"European J. Combin. 33 (2012) no. 7, 1330-1368",Ceccherini-Silberstein2012,True,,arXiv,Not available,"Groups, Graphs, Languages, Automata, Games and Second-order Monadic Logic",5805c915ffb067823277d14a4f32195a,http://arxiv.org/abs/1201.3108v1 10814," In this paper we survey some surprising connections between group theory, the theory of automata and formal languages, the theory of ends, infinite games of perfect information, and monadic second-order logic. ",michel coornaert,,2012.0,10.1016/j.ejc.2012.03.010,"European J. Combin. 33 (2012) no. 7, 1330-1368",Ceccherini-Silberstein2012,True,,arXiv,Not available,"Groups, Graphs, Languages, Automata, Games and Second-order Monadic Logic",5805c915ffb067823277d14a4f32195a,http://arxiv.org/abs/1201.3108v1 10815," In this paper we survey some surprising connections between group theory, the theory of automata and formal languages, the theory of ends, infinite games of perfect information, and monadic second-order logic. ",francesca fiorenzi,,2012.0,10.1016/j.ejc.2012.03.010,"European J. Combin. 33 (2012) no. 7, 1330-1368",Ceccherini-Silberstein2012,True,,arXiv,Not available,"Groups, Graphs, Languages, Automata, Games and Second-order Monadic Logic",5805c915ffb067823277d14a4f32195a,http://arxiv.org/abs/1201.3108v1 10816," In this paper we survey some surprising connections between group theory, the theory of automata and formal languages, the theory of ends, infinite games of perfect information, and monadic second-order logic. ",paul schupp,,2012.0,10.1016/j.ejc.2012.03.010,"European J. Combin. 33 (2012) no. 7, 1330-1368",Ceccherini-Silberstein2012,True,,arXiv,Not available,"Groups, Graphs, Languages, Automata, Games and Second-order Monadic Logic",5805c915ffb067823277d14a4f32195a,http://arxiv.org/abs/1201.3108v1 10817," Classical game theory treats players as special---a description of a game contains a full, explicit enumeration of all players---even though in the real world, ""players"" are no more fundamentally special than rocks or clouds. It isn't trivial to find a decision-theoretic foundation for game theory in which an agent's coplayers are a non-distinguished part of the agent's environment. Attempts to model both players and the environment as Turing machines, for example, fail for standard diagonalization reasons. In this paper, we introduce a ""reflective"" type of oracle, which is able to answer questions about the outputs of oracle machines with access to the same oracle. These oracles avoid diagonalization by answering some queries randomly. We show that machines with access to a reflective oracle can be used to define rational agents using causal decision theory. These agents model their environment as a probabilistic oracle machine, which may contain other agents as a non-distinguished part. We show that if such agents interact, they will play a Nash equilibrium, with the randomization in mixed strategies coming from the randomization in the oracle's answers. This can be seen as providing a foundation for classical game theory in which players aren't special. ",benja fallenstein,,2015.0,,arXiv,Fallenstein2015,True,,arXiv,Not available,Reflective Oracles: A Foundation for Classical Game Theory,f97a3dd47499c2d5ba16a7645f9a0375,http://arxiv.org/abs/1508.04145v1 10818," Classical game theory treats players as special---a description of a game contains a full, explicit enumeration of all players---even though in the real world, ""players"" are no more fundamentally special than rocks or clouds. It isn't trivial to find a decision-theoretic foundation for game theory in which an agent's coplayers are a non-distinguished part of the agent's environment. Attempts to model both players and the environment as Turing machines, for example, fail for standard diagonalization reasons. In this paper, we introduce a ""reflective"" type of oracle, which is able to answer questions about the outputs of oracle machines with access to the same oracle. These oracles avoid diagonalization by answering some queries randomly. We show that machines with access to a reflective oracle can be used to define rational agents using causal decision theory. These agents model their environment as a probabilistic oracle machine, which may contain other agents as a non-distinguished part. We show that if such agents interact, they will play a Nash equilibrium, with the randomization in mixed strategies coming from the randomization in the oracle's answers. This can be seen as providing a foundation for classical game theory in which players aren't special. ",jessica taylor,,2015.0,,arXiv,Fallenstein2015,True,,arXiv,Not available,Reflective Oracles: A Foundation for Classical Game Theory,f97a3dd47499c2d5ba16a7645f9a0375,http://arxiv.org/abs/1508.04145v1 10819," Economic ensembles can be modeled as networks of interacting agents whose be-haviors are described in terms of game theory. The evolutionary paradigm has been applied to two-person games to discover strategies in this context. Subse-quently, many-player games, and specifically global games (where payoffs depend collectively on all the rest of the players) as with the minimal game, have been studied. The minority game is attractive because it has intuitive similarities to e.g. securing niche businesses. We enhance this intuitive similarity by extending the game through the introduction of delayed payoffs. Payoffs depend on the values of future moves; we reward choices which later on become popular. We study agents' moves in such global game with delayed payoff. Instead of an evolutionary approach we allow learning in the agents. We study strategies that may emerge through learning in agents in such games. ",wan abdullah,,2002.0,,arXiv,Abdullah2002,True,,arXiv,Not available,Learning strategies for global games with delayed payoffs,6fa8f6462a9a7066b0bbd51577f2c472,http://arxiv.org/abs/cond-mat/0210659v1 10820," Classical game theory treats players as special---a description of a game contains a full, explicit enumeration of all players---even though in the real world, ""players"" are no more fundamentally special than rocks or clouds. It isn't trivial to find a decision-theoretic foundation for game theory in which an agent's coplayers are a non-distinguished part of the agent's environment. Attempts to model both players and the environment as Turing machines, for example, fail for standard diagonalization reasons. In this paper, we introduce a ""reflective"" type of oracle, which is able to answer questions about the outputs of oracle machines with access to the same oracle. These oracles avoid diagonalization by answering some queries randomly. We show that machines with access to a reflective oracle can be used to define rational agents using causal decision theory. These agents model their environment as a probabilistic oracle machine, which may contain other agents as a non-distinguished part. We show that if such agents interact, they will play a Nash equilibrium, with the randomization in mixed strategies coming from the randomization in the oracle's answers. This can be seen as providing a foundation for classical game theory in which players aren't special. ",paul christiano,,2015.0,,arXiv,Fallenstein2015,True,,arXiv,Not available,Reflective Oracles: A Foundation for Classical Game Theory,f97a3dd47499c2d5ba16a7645f9a0375,http://arxiv.org/abs/1508.04145v1 10821," The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases. ",georges rahi,,2016.0,,arXiv,Rahi2016,True,,arXiv,Not available,"Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage",eac333bcdea8267aef9e6b9c34d607d9,http://arxiv.org/abs/1610.02103v1 10822," The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases. ",anibal sanjab,,2016.0,,arXiv,Rahi2016,True,,arXiv,Not available,"Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage",eac333bcdea8267aef9e6b9c34d607d9,http://arxiv.org/abs/1610.02103v1 10823," The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases. ",walid saad,,2016.0,,arXiv,Rahi2016,True,,arXiv,Not available,"Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage",eac333bcdea8267aef9e6b9c34d607d9,http://arxiv.org/abs/1610.02103v1 10824," The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases. ",narayan mandayam,,2016.0,,arXiv,Rahi2016,True,,arXiv,Not available,"Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage",eac333bcdea8267aef9e6b9c34d607d9,http://arxiv.org/abs/1610.02103v1 10825," The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases. ",h. poor,,2016.0,,arXiv,Rahi2016,True,,arXiv,Not available,"Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage",eac333bcdea8267aef9e6b9c34d607d9,http://arxiv.org/abs/1610.02103v1 10826," We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. ",krzysztof apt,,2005.0,,arXiv,Apt2005,True,,arXiv,Not available,CP-nets and Nash equilibria,cea29c494376a90af7c6758c5d2dff98,http://arxiv.org/abs/cs/0509071v1 10827," We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. ",francesca rossi,,2005.0,,arXiv,Apt2005,True,,arXiv,Not available,CP-nets and Nash equilibria,cea29c494376a90af7c6758c5d2dff98,http://arxiv.org/abs/cs/0509071v1 10828," We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. ",k. venable,,2005.0,,arXiv,Apt2005,True,,arXiv,Not available,CP-nets and Nash equilibria,cea29c494376a90af7c6758c5d2dff98,http://arxiv.org/abs/cs/0509071v1 10829," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",christian schmid,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10830," The Banzhaf index, Shapley-Shubik index and other voting power indices measure the importance of a player in a coalitional game. We consider a simple coalitional game called the spanning connectivity game (SCG) based on an undirected, unweighted multigraph, where edges are players. We examine the computational complexity of computing the voting power indices of edges in the SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is #P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices can be computed in polynomial time. Among other results, it is proved that Banzhaf indices can be computed in polynomial time for graphs with bounded treewidth. It is also shown that for any reasonable representation of a simple game, a polynomial time algorithm to compute the Shapley-Shubik indices implies a polynomial time algorithm to compute the Banzhaf indices. As a corollary, computing the Shapley value is #P-complete for simple games represented by the set of minimal winning coalitions, Threshold Network Flow Games, Vertex Connectivity Games and Coalitional Skill Games. ",haris aziz,,2009.0,,arXiv,Aziz2009,True,,arXiv,Not available,Spanning connectivity games,c73293503d73dcf41c64e2d8c7164e38,http://arxiv.org/abs/0906.3643v1 10831," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",adrian flitney,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10832," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",witlef wieczorek,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10833," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",nikolai kiesel,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10834," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",harald weinfurter,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10835," Game theory is central to the understanding of competitive interactions arising in many fields, from the social and physical sciences to economics. Recently, as the definition of information is generalized to include entangled quantum systems, quantum game theory has emerged as a framework for understanding the competitive flow of quantum information. Up till now only two-player quantum games have been demonstrated. Here we report the first experiment that implements a four-player quantum Minority game over tunable four-partite entangled states encoded in the polarization of single photons. Experimental application of appropriate quantum player strategies give equilibrium payoff values well above those achievable in the classical game. These results are in excellent quantitative agreement with our theoretical analysis of the symmetric Pareto optimal strategies. Our result demonstrate for the first time how non-trivial equilibria can arise in a competitive situation involving quantum agents and pave the way for a range of quantum transaction applications. ",lloyd hollenberg,,2008.0,10.1088/1367-2630/12/6/063031,"New J. Phys.12:063031, 2010",Schmid2008,True,,arXiv,Not available,Experimental implementation of a four-player quantum game,779e7536ffb7ea318f68232af48d95da,http://arxiv.org/abs/0901.0063v1 10836," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",bernhard rumpe,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 10837," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",guido wimmel,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 10838," A smart city provides its people with high standard of living through advanced technologies and transport is one of the major foci. With the advent of autonomous vehicles (AVs), an AV-based public transportation system has been proposed recently, which is capable of providing new forms of transportation services with high efficiency, high flexibility, and low cost. For the benefit of passengers, multitenancy can increase market competition leading to lower service charge and higher quality of service. In this paper, we study the pricing issue of the multi-tenant AV public transportation system and three types of services are defined. The pricing process for each service type is modeled as a combinatorial auction, in which the service providers, as bidders, compete for offering transportation services. The winners of the auction are determined through an integer linear program. To prevent the bidders from raising their bids for higher returns, we propose a strategy-proof Vickrey-Clarke-Groves-based charging mechanism, which can maximize the social welfare, to settle the final charges for the customers. We perform extensive simulations to verify the analytical results and evaluate the performance of the charging mechanism. ",albert lam,,2015.0,10.1109/TITS.2015.2490800,arXiv,Lam2015,True,,arXiv,Not available,"Combinatorial Auction-Based Pricing for Multi-tenant Autonomous Vehicle Public Transportation System",b5ac0a9ed472667c860e254dbe19c5e1,http://arxiv.org/abs/1503.01425v2 10839," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",honggang zhang,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 10840," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",benyuan liu,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 10841," The Banzhaf index, Shapley-Shubik index and other voting power indices measure the importance of a player in a coalitional game. We consider a simple coalitional game called the spanning connectivity game (SCG) based on an undirected, unweighted multigraph, where edges are players. We examine the computational complexity of computing the voting power indices of edges in the SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is #P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices can be computed in polynomial time. Among other results, it is proved that Banzhaf indices can be computed in polynomial time for graphs with bounded treewidth. It is also shown that for any reasonable representation of a simple game, a polynomial time algorithm to compute the Shapley-Shubik indices implies a polynomial time algorithm to compute the Banzhaf indices. As a corollary, computing the Shapley value is #P-complete for simple games represented by the set of minimal winning coalitions, Threshold Network Flow Games, Vertex Connectivity Games and Coalitional Skill Games. ",oded lachish,,2009.0,,arXiv,Aziz2009,True,,arXiv,Not available,Spanning connectivity games,c73293503d73dcf41c64e2d8c7164e38,http://arxiv.org/abs/0906.3643v1 10842," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",hengky susanto,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 10843," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",guoliang xue,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 10844," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",michal feldman,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 10845," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",brendan lucier,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 10846," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",noam nisan,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 10847," With spectrum auctions as our prime motivation, in this paper we analyze combinatorial auctions where agents' valuations exhibit complementarities. Assuming that the agents only value bundles of size at most $k$ and also assuming that we can assess prices, we present a mechanism that is efficient, approximately envy-free, asymptotically strategy-proof and that has polynomial-time complexity. Modifying an iterative rounding procedure from assignment problems, we use the primal and dual optimal solutions to the linear programming relaxation of the auction problem to construct a lottery for the allocations and to assess the prices to bundles. The allocations in the lottery over-allocate goods by at most $k-1$ units, and the dual prices are shown to be (approximately) envy-free irrespective of the allocation chosen. We conclude with a detailed numerical investigation of a specific spectrum allocation problem. ",dengwang tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Approximately Envy-Free Spectrum Allocation with Complementarities,862505c6a6807e294532306a7e1ba66b,http://arxiv.org/abs/1606.01457v1 10848," With spectrum auctions as our prime motivation, in this paper we analyze combinatorial auctions where agents' valuations exhibit complementarities. Assuming that the agents only value bundles of size at most $k$ and also assuming that we can assess prices, we present a mechanism that is efficient, approximately envy-free, asymptotically strategy-proof and that has polynomial-time complexity. Modifying an iterative rounding procedure from assignment problems, we use the primal and dual optimal solutions to the linear programming relaxation of the auction problem to construct a lottery for the allocations and to assess the prices to bundles. The allocations in the lottery over-allocate goods by at most $k-1$ units, and the dual prices are shown to be (approximately) envy-free irrespective of the allocation chosen. We conclude with a detailed numerical investigation of a specific spectrum allocation problem. ",vijay subramanian,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Approximately Envy-Free Spectrum Allocation with Complementarities,862505c6a6807e294532306a7e1ba66b,http://arxiv.org/abs/1606.01457v1 10849," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",rad niazadeh,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 10850," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",christopher wilkens,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 10851," This research proposes a novel auction mechanism for transactive energy exchange between buyers and sellers, modeled as agents in a microgrid. The mechanism is implemented by a separate microgrid controller (MC) agent, and requires big data flow with the other agents through an iterative bidding process. Although private user information remains hidden to the MC, a theoretical analysis shows that under the assumption of convexity of the agents utilities, the proposed auction is still able to maximize the social welfare (SW), i.e. the aggregate utilities of the agents. In addition, it is shown that the mechanism exhibits the key desirable features of individual rationality and weak budget balance, guaranteeing that neither the payoff to any agent nor the net monetary revenue after termination, is negative. The proposed approach also incorporates a mechanism to redistribute the sellers shares in a fair manner. As an example, a maximum entropy based fair redistribution scheme is addressed. The theoretical analysis reported here is accompanied by extensive set of simulations that illustrate the various aspects of the proposed mechanism. ",m. faqiry,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Transactive Energy Auction with Hidden User Information in Microgrid,40e6b3636da9fd540a92bdfd0ba738f6,http://arxiv.org/abs/1608.03649v1 10852," The Banzhaf index, Shapley-Shubik index and other voting power indices measure the importance of a player in a coalitional game. We consider a simple coalitional game called the spanning connectivity game (SCG) based on an undirected, unweighted multigraph, where edges are players. We examine the computational complexity of computing the voting power indices of edges in the SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is #P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices can be computed in polynomial time. Among other results, it is proved that Banzhaf indices can be computed in polynomial time for graphs with bounded treewidth. It is also shown that for any reasonable representation of a simple game, a polynomial time algorithm to compute the Shapley-Shubik indices implies a polynomial time algorithm to compute the Banzhaf indices. As a corollary, computing the Shapley value is #P-complete for simple games represented by the set of minimal winning coalitions, Threshold Network Flow Games, Vertex Connectivity Games and Coalitional Skill Games. ",mike paterson,,2009.0,,arXiv,Aziz2009,True,,arXiv,Not available,Spanning connectivity games,c73293503d73dcf41c64e2d8c7164e38,http://arxiv.org/abs/0906.3643v1 10853," This research proposes a novel auction mechanism for transactive energy exchange between buyers and sellers, modeled as agents in a microgrid. The mechanism is implemented by a separate microgrid controller (MC) agent, and requires big data flow with the other agents through an iterative bidding process. Although private user information remains hidden to the MC, a theoretical analysis shows that under the assumption of convexity of the agents utilities, the proposed auction is still able to maximize the social welfare (SW), i.e. the aggregate utilities of the agents. In addition, it is shown that the mechanism exhibits the key desirable features of individual rationality and weak budget balance, guaranteeing that neither the payoff to any agent nor the net monetary revenue after termination, is negative. The proposed approach also incorporates a mechanism to redistribute the sellers shares in a fair manner. As an example, a maximum entropy based fair redistribution scheme is addressed. The theoretical analysis reported here is accompanied by extensive set of simulations that illustrate the various aspects of the proposed mechanism. ",sanjoy das,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Transactive Energy Auction with Hidden User Information in Microgrid,40e6b3636da9fd540a92bdfd0ba738f6,http://arxiv.org/abs/1608.03649v1 10854," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",jaya mukhopadhyay,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 10855," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",anita pal,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 10856," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",sajal mukhopadhyay,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 10857," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",vikash singh,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 10858," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",albert lam,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 10859," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",longbo huang,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 10860," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",alonso silva,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 10861," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",walid saad,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 10862," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",shipra agrawal,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 10863," The Banzhaf index, Shapley-Shubik index and other voting power indices measure the importance of a player in a coalitional game. We consider a simple coalitional game called the spanning connectivity game (SCG) based on an undirected, unweighted multigraph, where edges are players. We examine the computational complexity of computing the voting power indices of edges in the SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is #P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices can be computed in polynomial time. Among other results, it is proved that Banzhaf indices can be computed in polynomial time for graphs with bounded treewidth. It is also shown that for any reasonable representation of a simple game, a polynomial time algorithm to compute the Shapley-Shubik indices implies a polynomial time algorithm to compute the Banzhaf indices. As a corollary, computing the Shapley value is #P-complete for simple games represented by the set of minimal winning coalitions, Threshold Network Flow Games, Vertex Connectivity Games and Coalitional Skill Games. ",rahul savani,,2009.0,,arXiv,Aziz2009,True,,arXiv,Not available,Spanning connectivity games,c73293503d73dcf41c64e2d8c7164e38,http://arxiv.org/abs/0906.3643v1 10864," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",constantinos daskalakis,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 10865," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",vahab mirrokni,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 10866," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",balasubramanian sivan,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 10867," We investigate how well continuous-time fictitious play in two-player games performs in terms of average payoff, particularly compared to Nash equilibrium payoff. We show that in many games, fictitious play outperforms Nash equilibrium on average or even at all times, and moreover that any game is linearly equivalent to one in which this is the case. Conversely, we provide conditions under which Nash equilibrium payoff dominates fictitious play payoff. A key step in our analysis is to show that fictitious play dynamics asymptotically converges the set of coarse correlated equilibria (a fact which is implicit in the literature). ",georg ostrovski,,2013.0,,arXiv,Ostrovski2013,True,,arXiv,Not available,Payoff Performance of Fictitious Play,156d5064e2706b6e2b97887b46cbddf7,http://arxiv.org/abs/1308.4049v2 10868," We investigate how well continuous-time fictitious play in two-player games performs in terms of average payoff, particularly compared to Nash equilibrium payoff. We show that in many games, fictitious play outperforms Nash equilibrium on average or even at all times, and moreover that any game is linearly equivalent to one in which this is the case. Conversely, we provide conditions under which Nash equilibrium payoff dominates fictitious play payoff. A key step in our analysis is to show that fictitious play dynamics asymptotically converges the set of coarse correlated equilibria (a fact which is implicit in the literature). ",sebastian strien,,2013.0,,arXiv,Ostrovski2013,True,,arXiv,Not available,Payoff Performance of Fictitious Play,156d5064e2706b6e2b97887b46cbddf7,http://arxiv.org/abs/1308.4049v2 10869," In a guessing game, players guess the value of a random real number selected using some probability density function. The winner may be determined in various ways; for example, a winner can be a player whose guess is closest in magnitude to the target or a winner can be a player coming closest without guessing higher than the target. We study optimal strategies for players in these games and determine some of them for two, three, and four players. ",anthony mendes,,2014.0,10.4169/amer.math.monthly.121.01.033,Amer. Math. Monthly 121 (2014) 33-44,Mendes2014,True,,arXiv,Not available,Guessing games,635af709d137f376c31ff027da367fb6,http://arxiv.org/abs/1401.2493v1 10870," In a guessing game, players guess the value of a random real number selected using some probability density function. The winner may be determined in various ways; for example, a winner can be a player whose guess is closest in magnitude to the target or a winner can be a player coming closest without guessing higher than the target. We study optimal strategies for players in these games and determine some of them for two, three, and four players. ",kent morrison,,2014.0,10.4169/amer.math.monthly.121.01.033,Amer. Math. Monthly 121 (2014) 33-44,Mendes2014,True,,arXiv,Not available,Guessing games,635af709d137f376c31ff027da367fb6,http://arxiv.org/abs/1401.2493v1 10871," In this paper we introduce a capacity allocation game which models the problem of maximizing network utility from the perspective of distributed noncooperative agents. Motivated by the idea of self-managed networks, in the developed framework decision-making entities are associated with individual transmission links, deciding on the way they split capacity among concurrent flows. An efficient decentralized algorithm is given for computing strongly Pareto-optimal strategies, constituting a pure Nash equilibrium. Subsequently, we discuss the properties of the introduced game related to the Price of Anarchy and Price of Stability. The paper is concluded with an experimental study. ",dariusz gcasior,,2012.0,10.1016/j.comnet.2013.06.012,arXiv,Gcasior2012,True,,arXiv,Not available,"Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks",340bea00df40356c9a9940513a34bd91,http://arxiv.org/abs/1206.2448v2 10872," In this paper we introduce a capacity allocation game which models the problem of maximizing network utility from the perspective of distributed noncooperative agents. Motivated by the idea of self-managed networks, in the developed framework decision-making entities are associated with individual transmission links, deciding on the way they split capacity among concurrent flows. An efficient decentralized algorithm is given for computing strongly Pareto-optimal strategies, constituting a pure Nash equilibrium. Subsequently, we discuss the properties of the introduced game related to the Price of Anarchy and Price of Stability. The paper is concluded with an experimental study. ",maciej drwal,,2012.0,10.1016/j.comnet.2013.06.012,arXiv,Gcasior2012,True,,arXiv,Not available,"Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks",340bea00df40356c9a9940513a34bd91,http://arxiv.org/abs/1206.2448v2 10873," Escalation is the fact that in a game (for instance an auction), the agents play forever. It is not necessary to consider complex examples to establish its rationality. In particular, the $0,1$-game is an extremely simple infinite game in which escalation arises naturally and rationally. In some sense, it can be considered as the paradigm of escalation. Through an example of economic games, we show the benefit economics can take of coinduction. ",pierre lescanne,,2013.0,,"Dans CALCO 2013 - 5th Conference on Algebra and Coalgebra in Computer Science, CALCO 2013, Warsaw : Poland (2013)",Lescanne2013,True,,arXiv,Not available,A simple case of rationality of escalation,f5031be006a4e4f9f06ef0bb27e7aea2,http://arxiv.org/abs/1306.2284v1 10874," An average-time game is played on the infinite graph of configurations of a finite timed automaton. The two players, Min and Max, construct an infinite run of the automaton by taking turns to perform a timed transition. Player Min wants to minimise the average time per transition and player Max wants to maximise it. A solution of average-time games is presented using a reduction to average-price game on a finite graph. A direct consequence is an elementary proof of determinacy for average-time games. This complements our results for reachability-time games and partially solves a problem posed by Bouyer et al., to design an algorithm for solving average-price games on priced timed automata. The paper also establishes the exact computational complexity of solving average-time games: the problem is EXPTIME-complete for timed automata with at least two clocks. ",marcin jurdzinski,,2009.0,,"M. Jurdzinski and A. Trivedi. Average-Time Games, In Proc.FSTTCS'08, volume 08004 of Dagstuhl Seminar Proceedings, 2008",Jurdzinski2009,True,,arXiv,Not available,Average-Time Games on Timed Automata,ee31341e2ad896e279bfed2148aff388,http://arxiv.org/abs/0910.2891v1 10875," Consider a 2-player normal-form game repeated over time. We introduce an adaptive learning procedure, where the players only observe their own realized payoff at each stage. We assume that agents do not know their own payoff function, and have no information on the other player. Furthermore, we assume that they have restrictions on their own action set such that, at each stage, their choice is limited to a subset of their action set. We prove that the empirical distributions of play converge to the set of Nash equilibria for zero-sum and potential games, and games where one player has two actions. ",mario bravo,,2013.0,,arXiv,Bravo2013,True,,arXiv,Not available,Reinforcement learning with restrictions on the action set,c0dd5dd0668c1834af77734a0fe26602,http://arxiv.org/abs/1306.2918v1 10876," Consider a 2-player normal-form game repeated over time. We introduce an adaptive learning procedure, where the players only observe their own realized payoff at each stage. We assume that agents do not know their own payoff function, and have no information on the other player. Furthermore, we assume that they have restrictions on their own action set such that, at each stage, their choice is limited to a subset of their action set. We prove that the empirical distributions of play converge to the set of Nash equilibria for zero-sum and potential games, and games where one player has two actions. ",mathieu faure,,2013.0,,arXiv,Bravo2013,True,,arXiv,Not available,Reinforcement learning with restrictions on the action set,c0dd5dd0668c1834af77734a0fe26602,http://arxiv.org/abs/1306.2918v1 10877," We consider stationary viscous Mean-Field Games systems in the case of local, decreasing and unbounded coupling. These systems arise in ergodic mean-field game theory, and describe Nash equilibria of games with a large number of agents aiming at aggregation. We show how the dimension of the state space, the behavior of the coupling and the Hamiltonian at infinity affect the existence and non-existence of regular solutions. Our approach relies on the study of Sobolev regularity of the invariant measure and a blow-up procedure which is calibrated on the scaling properties of the system. In very special cases we observe uniqueness of solutions. Finally, we apply our methods to obtain new existence results for MFG systems with competition, namely when the coupling is local and increasing. ",marco cirant,,2016.0,,arXiv,Cirant2016,True,,arXiv,Not available,Stationary focusing Mean Field Games,23bd8a15f1d42125d55c8862cee7bc67,http://arxiv.org/abs/1602.04231v1 10880," Coordination mechanisms aim to mitigate the impact of selfishness when scheduling jobs to different machines. Such a mechanism defines a scheduling policy within each machine and naturally induces a game among the selfish job owners. The desirable properties of a coordination mechanism includes simplicity in its definition and efficiency of the outcomes of the induced game. We present a broad class of coordination mechanisms for unrelated machine scheduling that are simple to define and we identify one of its members (mechanism \Dcoord) that is superior to all known mechanisms. \Dcoord\ induces potential games with logarithmic price of anarchy and only constant price of stability. Both bounds are almost optimal. ",ioannis caragiannis,,2016.0,,arXiv,Caragiannis2016,True,,arXiv,Not available,An almost ideal coordination mechanism for unrelated machine scheduling,ebdf5e5fd1853fb80aceec52c52ecd2d,http://arxiv.org/abs/1605.04674v1 10881," Coordination mechanisms aim to mitigate the impact of selfishness when scheduling jobs to different machines. Such a mechanism defines a scheduling policy within each machine and naturally induces a game among the selfish job owners. The desirable properties of a coordination mechanism includes simplicity in its definition and efficiency of the outcomes of the induced game. We present a broad class of coordination mechanisms for unrelated machine scheduling that are simple to define and we identify one of its members (mechanism \Dcoord) that is superior to all known mechanisms. \Dcoord\ induces potential games with logarithmic price of anarchy and only constant price of stability. Both bounds are almost optimal. ",angelo fanelli,,2016.0,,arXiv,Caragiannis2016,True,,arXiv,Not available,An almost ideal coordination mechanism for unrelated machine scheduling,ebdf5e5fd1853fb80aceec52c52ecd2d,http://arxiv.org/abs/1605.04674v1 10882," Game semantics has been used with considerable success in formulating fully abstract semantics for languages with higher-order procedures and a wide range of computational effects. Recently, nominal games have been proposed for modelling functional languages with names. These are ordinary, stateful games cast in the theory of nominal sets developed by Pitts and Gabbay. Here we take nominal games one step further, by developing a fully abstract semantics for a language with nominal general references. ",nikos tzevelekos,,2009.0,10.2168/LMCS-5(3:8)2009,"Logical Methods in Computer Science, Volume 5, Issue 3 (September 11, 2009) lmcs:918",Tzevelekos2009,True,,arXiv,Not available,Full abstraction for nominal general references,3853751dd22c8d69a3ce05ad4bab41be,http://arxiv.org/abs/0907.4477v2 10883," It has been shown that a functional interpretation of proofs in mathematical analysis can be given by the product of selection functions, a mode of recursion that has an intuitive reading in terms of the computation of optimal strategies in sequential games. We argue that this result has genuine practical value by interpreting some well-known theorems of mathematics and demonstrating that the product gives these theorems a natural computational interpretation that can be clearly understood in game theoretic terms. ",paulo oliva,,2012.0,,arXiv,Oliva2012,True,,arXiv,Not available,"A Game-Theoretic Computational Interpretation of Proofs in Classical Analysis",decfedc2116af07c950f40ab1ec6b1d4,http://arxiv.org/abs/1204.5244v1 10884," It has been shown that a functional interpretation of proofs in mathematical analysis can be given by the product of selection functions, a mode of recursion that has an intuitive reading in terms of the computation of optimal strategies in sequential games. We argue that this result has genuine practical value by interpreting some well-known theorems of mathematics and demonstrating that the product gives these theorems a natural computational interpretation that can be clearly understood in game theoretic terms. ",thomas powell,,2012.0,,arXiv,Oliva2012,True,,arXiv,Not available,"A Game-Theoretic Computational Interpretation of Proofs in Classical Analysis",decfedc2116af07c950f40ab1ec6b1d4,http://arxiv.org/abs/1204.5244v1 10885," An average-time game is played on the infinite graph of configurations of a finite timed automaton. The two players, Min and Max, construct an infinite run of the automaton by taking turns to perform a timed transition. Player Min wants to minimise the average time per transition and player Max wants to maximise it. A solution of average-time games is presented using a reduction to average-price game on a finite graph. A direct consequence is an elementary proof of determinacy for average-time games. This complements our results for reachability-time games and partially solves a problem posed by Bouyer et al., to design an algorithm for solving average-price games on priced timed automata. The paper also establishes the exact computational complexity of solving average-time games: the problem is EXPTIME-complete for timed automata with at least two clocks. ",ashutosh trivedi,,2009.0,,"M. Jurdzinski and A. Trivedi. Average-Time Games, In Proc.FSTTCS'08, volume 08004 of Dagstuhl Seminar Proceedings, 2008",Jurdzinski2009,True,,arXiv,Not available,Average-Time Games on Timed Automata,ee31341e2ad896e279bfed2148aff388,http://arxiv.org/abs/0910.2891v1 10886," Zero-sum asymmetric games model decision making scenarios involving two competing players who have different information about the game being played. A particular case is that of nested information, where one (informed) player has superior information over the other (uninformed) player. This paper considers the case of nested information in repeated zero-sum games and studies the computation of strategies for both the informed and uninformed players for finite-horizon and discounted infinite-horizon nested information games. For finite-horizon settings, we exploit that for both players, the security strategy, and also the opponent's corresponding best response depend only on the informed player's history of actions. Using this property, we refine the sequence form, and formulate an LP computation of player strategies that is linear in the size of the uninformed player's action set. For the infinite-horizon discounted game, we construct LP formulations to compute the approximated security strategies for both players, and provide a bound on the performance difference between the approximated security strategies and the security strategies. Finally, we illustrate the results on a network interdiction game between an informed system administrator and uniformed intruder. ",lichun li,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Efficient Strategy Computation in Zero-Sum Asymmetric Repeated Games,bf75d7d27343b9d22d27b7b44a56f1f6,http://arxiv.org/abs/1703.01952v2 10887," Zero-sum asymmetric games model decision making scenarios involving two competing players who have different information about the game being played. A particular case is that of nested information, where one (informed) player has superior information over the other (uninformed) player. This paper considers the case of nested information in repeated zero-sum games and studies the computation of strategies for both the informed and uninformed players for finite-horizon and discounted infinite-horizon nested information games. For finite-horizon settings, we exploit that for both players, the security strategy, and also the opponent's corresponding best response depend only on the informed player's history of actions. Using this property, we refine the sequence form, and formulate an LP computation of player strategies that is linear in the size of the uninformed player's action set. For the infinite-horizon discounted game, we construct LP formulations to compute the approximated security strategies for both players, and provide a bound on the performance difference between the approximated security strategies and the security strategies. Finally, we illustrate the results on a network interdiction game between an informed system administrator and uniformed intruder. ",jeff shamma,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Efficient Strategy Computation in Zero-Sum Asymmetric Repeated Games,bf75d7d27343b9d22d27b7b44a56f1f6,http://arxiv.org/abs/1703.01952v2 10888," We present efficient algorithms for computing optimal or approximately optimal strategies in a zero-sum game for which Player I has n pure strategies and Player II has an arbitrary number of pure strategies. We assume that for any given mixed strategy of Player I, a best response or ""approximate"" best response of Player II can be found by an oracle in time polynomial in n. We then show how our algorithms may be applied to several search games with applications to security and counter-terrorism. We evaluate our main algorithm experimentally on a prototypical search game. Our results show it performs well compared to an existing, well-known algorithm for solving zero-sum games that can also be used to solve search games, given a best response oracle. ",lisa hellerstein,,2017.0,,arXiv,Hellerstein2017,True,,arXiv,Not available,"Solving Zero-sum Games using Best Response Oracles with Applications to Search Games",71db1b220bc9f95df2cccf893ede13e5,http://arxiv.org/abs/1704.02657v4 10889," We present efficient algorithms for computing optimal or approximately optimal strategies in a zero-sum game for which Player I has n pure strategies and Player II has an arbitrary number of pure strategies. We assume that for any given mixed strategy of Player I, a best response or ""approximate"" best response of Player II can be found by an oracle in time polynomial in n. We then show how our algorithms may be applied to several search games with applications to security and counter-terrorism. We evaluate our main algorithm experimentally on a prototypical search game. Our results show it performs well compared to an existing, well-known algorithm for solving zero-sum games that can also be used to solve search games, given a best response oracle. ",thomas lidbetter,,2017.0,,arXiv,Hellerstein2017,True,,arXiv,Not available,"Solving Zero-sum Games using Best Response Oracles with Applications to Search Games",71db1b220bc9f95df2cccf893ede13e5,http://arxiv.org/abs/1704.02657v4 10890," We present efficient algorithms for computing optimal or approximately optimal strategies in a zero-sum game for which Player I has n pure strategies and Player II has an arbitrary number of pure strategies. We assume that for any given mixed strategy of Player I, a best response or ""approximate"" best response of Player II can be found by an oracle in time polynomial in n. We then show how our algorithms may be applied to several search games with applications to security and counter-terrorism. We evaluate our main algorithm experimentally on a prototypical search game. Our results show it performs well compared to an existing, well-known algorithm for solving zero-sum games that can also be used to solve search games, given a best response oracle. ",daniel pirutinsky,,2017.0,,arXiv,Hellerstein2017,True,,arXiv,Not available,"Solving Zero-sum Games using Best Response Oracles with Applications to Search Games",71db1b220bc9f95df2cccf893ede13e5,http://arxiv.org/abs/1704.02657v4 10891," This paper is about computing constrained approximate Nash equilibria in polymatrix games, which are succinctly represented many-player games defined by an interaction graph between the players. In a recent breakthrough, Rubinstein showed that there exists a small constant $\epsilon$, such that it is PPAD-complete to find an (unconstrained) $\epsilon$-Nash equilibrium of a polymatrix game. In the first part of the paper, we show that is NP-hard to decide if a polymatrix game has a constrained approximate equilibrium for 9 natural constraints and any non-trivial approximation guarantee. These results hold even for planar bipartite polymatrix games with degree 3 and at most 7 strategies per player, and all non-trivial approximation guarantees. These results stand in contrast to similar results for bimatrix games, which obviously need a non-constant number of actions, and which rely on stronger complexity-theoretic conjectures such as the exponential time hypothesis. In the second part, we provide a deterministic QPTAS for interaction graphs with bounded treewidth and with logarithmically many actions per player that can compute constrained approximate equilibria for a wide family of constraints that cover many of the constraints dealt with in the first part. ",argyrios deligkas,,2017.0,,arXiv,Deligkas2017,True,,arXiv,Not available,Computing Constrained Approximate Equilibria in Polymatrix Games,7c01994c8c85555323f3d6a08d47ac5e,http://arxiv.org/abs/1705.02266v2 10892," This paper is about computing constrained approximate Nash equilibria in polymatrix games, which are succinctly represented many-player games defined by an interaction graph between the players. In a recent breakthrough, Rubinstein showed that there exists a small constant $\epsilon$, such that it is PPAD-complete to find an (unconstrained) $\epsilon$-Nash equilibrium of a polymatrix game. In the first part of the paper, we show that is NP-hard to decide if a polymatrix game has a constrained approximate equilibrium for 9 natural constraints and any non-trivial approximation guarantee. These results hold even for planar bipartite polymatrix games with degree 3 and at most 7 strategies per player, and all non-trivial approximation guarantees. These results stand in contrast to similar results for bimatrix games, which obviously need a non-constant number of actions, and which rely on stronger complexity-theoretic conjectures such as the exponential time hypothesis. In the second part, we provide a deterministic QPTAS for interaction graphs with bounded treewidth and with logarithmically many actions per player that can compute constrained approximate equilibria for a wide family of constraints that cover many of the constraints dealt with in the first part. ",john fearnley,,2017.0,,arXiv,Deligkas2017,True,,arXiv,Not available,Computing Constrained Approximate Equilibria in Polymatrix Games,7c01994c8c85555323f3d6a08d47ac5e,http://arxiv.org/abs/1705.02266v2 10893," This paper is about computing constrained approximate Nash equilibria in polymatrix games, which are succinctly represented many-player games defined by an interaction graph between the players. In a recent breakthrough, Rubinstein showed that there exists a small constant $\epsilon$, such that it is PPAD-complete to find an (unconstrained) $\epsilon$-Nash equilibrium of a polymatrix game. In the first part of the paper, we show that is NP-hard to decide if a polymatrix game has a constrained approximate equilibrium for 9 natural constraints and any non-trivial approximation guarantee. These results hold even for planar bipartite polymatrix games with degree 3 and at most 7 strategies per player, and all non-trivial approximation guarantees. These results stand in contrast to similar results for bimatrix games, which obviously need a non-constant number of actions, and which rely on stronger complexity-theoretic conjectures such as the exponential time hypothesis. In the second part, we provide a deterministic QPTAS for interaction graphs with bounded treewidth and with logarithmically many actions per player that can compute constrained approximate equilibria for a wide family of constraints that cover many of the constraints dealt with in the first part. ",rahul savani,,2017.0,,arXiv,Deligkas2017,True,,arXiv,Not available,Computing Constrained Approximate Equilibria in Polymatrix Games,7c01994c8c85555323f3d6a08d47ac5e,http://arxiv.org/abs/1705.02266v2 10894," Additively separable hedonic games and fractional hedonic games have received considerable attention. They are coalition forming games of selfish agents based on their mutual preferences. Most of the work in the literature characterizes the existence and structure of stable outcomes (i.e., partitions in coalitions), assuming that preferences are given. However, there is little discussion on this assumption. In fact, agents receive different utilities if they belong to different partitions, and thus it is natural for them to declare their preferences strategically in order to maximize their benefit. In this paper we consider strategyproof mechanisms for additively separable hedonic games and fractional hedonic games, that is, partitioning methods without payments such that utility maximizing agents have no incentive to lie about their true preferences. We focus on social welfare maximization and provide several lower and upper bounds on the performance achievable by strategyproof mechanisms for general and specific additive functions. In most of the cases we provide tight or asymptotically tight results. All our mechanisms are simple and can be computed in polynomial time. Moreover, all the lower bounds are unconditional, that is, they do not rely on any computational or complexity assumptions. ",michele flammini,,2017.0,,arXiv,Flammini2017,True,,arXiv,Not available,"Strategyproof Mechanisms for Additively Separable Hedonic Games and Fractional Hedonic Games",9b4eb17688537b923c7b298ea87e6d06,http://arxiv.org/abs/1706.09007v1 10895," Additively separable hedonic games and fractional hedonic games have received considerable attention. They are coalition forming games of selfish agents based on their mutual preferences. Most of the work in the literature characterizes the existence and structure of stable outcomes (i.e., partitions in coalitions), assuming that preferences are given. However, there is little discussion on this assumption. In fact, agents receive different utilities if they belong to different partitions, and thus it is natural for them to declare their preferences strategically in order to maximize their benefit. In this paper we consider strategyproof mechanisms for additively separable hedonic games and fractional hedonic games, that is, partitioning methods without payments such that utility maximizing agents have no incentive to lie about their true preferences. We focus on social welfare maximization and provide several lower and upper bounds on the performance achievable by strategyproof mechanisms for general and specific additive functions. In most of the cases we provide tight or asymptotically tight results. All our mechanisms are simple and can be computed in polynomial time. Moreover, all the lower bounds are unconditional, that is, they do not rely on any computational or complexity assumptions. ",gianpiero monaco,,2017.0,,arXiv,Flammini2017,True,,arXiv,Not available,"Strategyproof Mechanisms for Additively Separable Hedonic Games and Fractional Hedonic Games",9b4eb17688537b923c7b298ea87e6d06,http://arxiv.org/abs/1706.09007v1 10896," Symmetry is inherent in the definition of most of the two-player zero-sum games, including parity, mean-payoff, and discounted-payoff games. It is therefore quite surprising that no symmetric analysis techniques for these games exist. We develop a novel symmetric strategy improvement algorithm where, in each iteration, the strategies of both players are improved simultaneously. We show that symmetric strategy improvement defies Friedmann's traps, which shook the belief in the potential of classic strategy improvement to be polynomial. ",ashutosh trivedi,,2015.0,,arXiv,Schewe2015,True,,arXiv,Not available,Symmetric Strategy Improvement,9ed5406e5049fe575822de4dd3225fac,http://arxiv.org/abs/1501.06484v1 10897," Given a rank-1 bimatrix game (A,B), i.e., where rank(A+B)=1, we construct a suitable linear subspace of the rank-1 game space and show that this subspace is homeomorphic to its Nash equilibrium correspondence. Using this homeomorphism, we give the first polynomial time algorithm for computing an exact Nash equilibrium of a rank-1 bimatrix game. This settles an open question posed in Kannan and Theobald (SODA 2007) and Theobald (2007). In addition, we give a novel algorithm to enumerate all the Nash equilibria of a rank-1 game and show that a similar technique may also be applied for finding a Nash equilibrium of any bimatrix game. This technique also proves the existence, oddness and the index theorem of Nash equilibria in a bimatrix game. Further, we extend the rank-1 homeomorphism result to a fixed rank game space, and give a fixed point formulation on $[0,1]^k$ for solving a rank-k game. The homeomorphism and the fixed point formulation are piece-wise linear and considerably simpler than the classical constructions. ",bharat adsul,,2010.0,,arXiv,Adsul2010,True,,arXiv,Not available,Rank-1 Bi-matrix Games: A Homeomorphism and a Polynomial Time Algorithm,61c07a1d1d85589d480950bc0b83fb96,http://arxiv.org/abs/1010.3083v2 10898," Additively separable hedonic games and fractional hedonic games have received considerable attention. They are coalition forming games of selfish agents based on their mutual preferences. Most of the work in the literature characterizes the existence and structure of stable outcomes (i.e., partitions in coalitions), assuming that preferences are given. However, there is little discussion on this assumption. In fact, agents receive different utilities if they belong to different partitions, and thus it is natural for them to declare their preferences strategically in order to maximize their benefit. In this paper we consider strategyproof mechanisms for additively separable hedonic games and fractional hedonic games, that is, partitioning methods without payments such that utility maximizing agents have no incentive to lie about their true preferences. We focus on social welfare maximization and provide several lower and upper bounds on the performance achievable by strategyproof mechanisms for general and specific additive functions. In most of the cases we provide tight or asymptotically tight results. All our mechanisms are simple and can be computed in polynomial time. Moreover, all the lower bounds are unconditional, that is, they do not rely on any computational or complexity assumptions. ",qiang zhang,,2017.0,,arXiv,Flammini2017,True,,arXiv,Not available,"Strategyproof Mechanisms for Additively Separable Hedonic Games and Fractional Hedonic Games",9b4eb17688537b923c7b298ea87e6d06,http://arxiv.org/abs/1706.09007v1 10899," Monte Carlo Tree Search (MCTS) has been extended to many imperfect information games. However, due to the added complexity that uncertainty introduces, these adaptations have not reached the same level of practical success as their perfect information counterparts. In this paper we consider the development of agents that perform well against humans in imperfect information games with partially observable actions. We introduce the Semi-Determinized-MCTS (SDMCTS), a variant of the Information Set MCTS algorithm (ISMCTS). More specifically, SDMCTS generates a predictive model of the unobservable portion of the opponent's actions from historical behavioral data. Next, SDMCTS performs simulations on an instance of the game where the unobservable portion of the opponent's actions are determined. Thereby, it facilitates the use of the predictive model in order to decrease uncertainty. We present an implementation of the SDMCTS applied to the Cheat Game, a well-known card game, with partially observable (and often deceptive) actions. Results from experiments with 120 subjects playing a head-to-head Cheat Game against our SDMCTS agents suggest that SDMCTS performs well against humans, and its performance improves as the predictive model's accuracy increases. ",moshe bitan,,2017.0,,arXiv,Bitan2017,True,,arXiv,Not available,"Combining Prediction of Human Decisions with ISMCTS in Imperfect Information Games",1fc819ffda9aa499aa89c2f123d2e556,http://arxiv.org/abs/1709.09451v2 10900," Monte Carlo Tree Search (MCTS) has been extended to many imperfect information games. However, due to the added complexity that uncertainty introduces, these adaptations have not reached the same level of practical success as their perfect information counterparts. In this paper we consider the development of agents that perform well against humans in imperfect information games with partially observable actions. We introduce the Semi-Determinized-MCTS (SDMCTS), a variant of the Information Set MCTS algorithm (ISMCTS). More specifically, SDMCTS generates a predictive model of the unobservable portion of the opponent's actions from historical behavioral data. Next, SDMCTS performs simulations on an instance of the game where the unobservable portion of the opponent's actions are determined. Thereby, it facilitates the use of the predictive model in order to decrease uncertainty. We present an implementation of the SDMCTS applied to the Cheat Game, a well-known card game, with partially observable (and often deceptive) actions. Results from experiments with 120 subjects playing a head-to-head Cheat Game against our SDMCTS agents suggest that SDMCTS performs well against humans, and its performance improves as the predictive model's accuracy increases. ",sarit kraus,,2017.0,,arXiv,Bitan2017,True,,arXiv,Not available,"Combining Prediction of Human Decisions with ISMCTS in Imperfect Information Games",1fc819ffda9aa499aa89c2f123d2e556,http://arxiv.org/abs/1709.09451v2 10901," Cooperative games provide a framework to study cooperation among self-interested agents. They offer a number of solution concepts describing how the outcome of the cooperation should be shared among the players. Unfortunately, computational problems associated with many of these solution concepts tend to be intractable---NP-hard or worse. In this paper, we incorporate complexity measures recently proposed by Feige and Izsak (2013), called dependency degree and supermodular degree, into the complexity analysis of cooperative games. We show that many computational problems for cooperative games become tractable for games whose dependency degree or supermodular degree are bounded. In particular, we prove that simple games admit efficient algorithms for various solution concepts when the supermodular degree is small; further, we show that computing the Shapley value is always in FPT with respect to the dependency degree. Finally, we note that, while determining the dependency among players is computationally hard, there are efficient algorithms for special classes of games. ",ayumi igarashi,,2017.0,,arXiv,Igarashi2017,True,,arXiv,Not available,Cooperative Games with Bounded Dependency Degree,c091a374d81129d71834a4f15babf7e3,http://arxiv.org/abs/1711.07310v3 10902," Cooperative games provide a framework to study cooperation among self-interested agents. They offer a number of solution concepts describing how the outcome of the cooperation should be shared among the players. Unfortunately, computational problems associated with many of these solution concepts tend to be intractable---NP-hard or worse. In this paper, we incorporate complexity measures recently proposed by Feige and Izsak (2013), called dependency degree and supermodular degree, into the complexity analysis of cooperative games. We show that many computational problems for cooperative games become tractable for games whose dependency degree or supermodular degree are bounded. In particular, we prove that simple games admit efficient algorithms for various solution concepts when the supermodular degree is small; further, we show that computing the Shapley value is always in FPT with respect to the dependency degree. Finally, we note that, while determining the dependency among players is computationally hard, there are efficient algorithms for special classes of games. ",rani izsak,,2017.0,,arXiv,Igarashi2017,True,,arXiv,Not available,Cooperative Games with Bounded Dependency Degree,c091a374d81129d71834a4f15babf7e3,http://arxiv.org/abs/1711.07310v3 10903," Cooperative games provide a framework to study cooperation among self-interested agents. They offer a number of solution concepts describing how the outcome of the cooperation should be shared among the players. Unfortunately, computational problems associated with many of these solution concepts tend to be intractable---NP-hard or worse. In this paper, we incorporate complexity measures recently proposed by Feige and Izsak (2013), called dependency degree and supermodular degree, into the complexity analysis of cooperative games. We show that many computational problems for cooperative games become tractable for games whose dependency degree or supermodular degree are bounded. In particular, we prove that simple games admit efficient algorithms for various solution concepts when the supermodular degree is small; further, we show that computing the Shapley value is always in FPT with respect to the dependency degree. Finally, we note that, while determining the dependency among players is computationally hard, there are efficient algorithms for special classes of games. ",edith elkind,,2017.0,,arXiv,Igarashi2017,True,,arXiv,Not available,Cooperative Games with Bounded Dependency Degree,c091a374d81129d71834a4f15babf7e3,http://arxiv.org/abs/1711.07310v3 10904," We introduce a three-player nonlocal game, with a finite number of classical questions and answers, such that the optimal success probability of $1$ in the game can only be achieved in the limit of strategies using arbitrarily high-dimensional entangled states. Precisely, there exists a constant $0 1 and obtain several interesting results. ",akash sarma,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 11271," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",sujit gujar,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 11272," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",y. narahari,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 11273," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",sudhir singh,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 11274," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. The VCG mechanism guarantees very high social welfare both in single- and multi-good auctions, so long as Knightian players do not select strategies that are dominated. With such Knightian players, however, we prove that the VCG mechanism guarantees very poor social welfare in unrestricted combinatorial auctions. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,"Knightian Analysis of the VCG Mechanism in Unrestricted Combinatorial Auctions",8547ec952285828b1f02882a9447a257,http://arxiv.org/abs/1403.6410v1 11275," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",vwani roychowdhury,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 11276," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",john byers,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 11277," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",michael mitzenmacher,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 11278," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",georgios zervas,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 11279," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",sujit gujar,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 11280," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",y narahari,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 11281," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",devansh dikshit,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 11282," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",y. narahari,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 11283," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",elchanan mossel,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 11284," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",christos papadimitriou,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 11285," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. The VCG mechanism guarantees very high social welfare both in single- and multi-good auctions, so long as Knightian players do not select strategies that are dominated. With such Knightian players, however, we prove that the VCG mechanism guarantees very poor social welfare in unrestricted combinatorial auctions. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,"Knightian Analysis of the VCG Mechanism in Unrestricted Combinatorial Auctions",8547ec952285828b1f02882a9447a257,http://arxiv.org/abs/1403.6410v1 11286," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",michael schapira,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 11287," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",yaron singer,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 11288," In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main ideas behind our techniques are to use randomization and various schemes to escrow reputations scores until appropriate external events occur. Depending on the degree of utility and privacy needed, these external techniques could depend on the number and type of reputation scores collected. Moreover, if additional privacy protection is needed, then random sampling can be used with respect reputation scores in such a way that reputation aggregates remain useful, but individual reputation scores are probabilistically hidden from users. Finally, we show that if privacy is also desired with respect to the the reputation aggregator, then we can use zero-knowledge proofs for reputation comparisons. ",michael goodrich,,2011.0,,arXiv,Goodrich2011,True,,arXiv,Not available,"Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions",5c1cb68b65a402f6ed0e06a32e998f1e,http://arxiv.org/abs/1102.4602v2 11289," In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main ideas behind our techniques are to use randomization and various schemes to escrow reputations scores until appropriate external events occur. Depending on the degree of utility and privacy needed, these external techniques could depend on the number and type of reputation scores collected. Moreover, if additional privacy protection is needed, then random sampling can be used with respect reputation scores in such a way that reputation aggregates remain useful, but individual reputation scores are probabilistically hidden from users. Finally, we show that if privacy is also desired with respect to the the reputation aggregator, then we can use zero-knowledge proofs for reputation comparisons. ",florian kerschbaum,,2011.0,,arXiv,Goodrich2011,True,,arXiv,Not available,"Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions",5c1cb68b65a402f6ed0e06a32e998f1e,http://arxiv.org/abs/1102.4602v2 11290," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",yang zhang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 11291," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",dusit niyato,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 11292," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",ping wang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 11293," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",marco caminati,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11294," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",manfred kerber,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11295," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",christoph lange,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11296," This paper presents the first polynomial-time algorithm for position and matroid auction environments that learns, from samples from an unknown bounded valuation distribution, an auction with expected revenue arbitrarily close to the maximum possible. In contrast to most previous work, our results apply to arbitrary (not necessarily regular) distributions and the strongest possible benchmark, the Myerson-optimal auction. Learning a near-optimal auction for an irregular distribution is technically challenging because it requires learning the appropriate ""ironed intervals,"" a delicate global property of the distribution. ",tim roughgarden,,2015.0,,arXiv,Roughgarden2015,True,,arXiv,Not available,Ironing in the Dark,681890da5a497a03bb3076622b9c42eb,http://arxiv.org/abs/1511.06918v1 11297," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",colin rowat,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11298," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",tri wijaya,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 11299," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",kate larson,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 11300," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",karl aberer,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 11301," To support a freight carrier in a combinatorial transport auction, we proposes an exact and two heuristic strategies for bidding on subsets of requests. The exact bidding strategy is based on the concept of elementary request combinations. We show that it is sufficient and necessary for a carrier to bid on each elementary request combination in order to guarantee the same result as bidding on each element of the powerset of the set of tendered requests. Both heuristic bidding strategies identify promising request combinations. For this, pairwise synergies based on saving values as well as the capacitated p-median problem are used. The bidding strategies are evaluated by a computational study that simulates an auction. It is based on 174 benchmark instances and therefore easily extendable by other researchers. On average, the two heuristic strategies achieve 91 percent and 81 percent of the available sales potential while generating 36 and only 4 percent of the bundle bids of the exact strategy. Therefore, the proposed bidding strategies help a carrier to increase her chance to win and at the same time reduce the computational burden to participate in a combinatorial transport auction. ",tobias buer,,2014.0,,arXiv,Buer2014,True,,arXiv,Not available,"An exact and two heuristic strategies for truthful bidding in combinatorial transport auctions",611aeda8ce911008ee60fe78da5674a8,http://arxiv.org/abs/1406.1928v1 11302," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",anna osepayshvili,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 11303," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",michael wellman,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 11304," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",daniel reeves,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 11305," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",jeffrey mackie-mason,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 11306," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",mohammad alavijeh,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 11307," This paper presents the first polynomial-time algorithm for position and matroid auction environments that learns, from samples from an unknown bounded valuation distribution, an auction with expected revenue arbitrarily close to the maximum possible. In contrast to most previous work, our results apply to arbitrary (not necessarily regular) distributions and the strongest possible benchmark, the Myerson-optimal auction. Learning a near-optimal auction for an irregular distribution is technically challenging because it requires learning the appropriate ""ironed intervals,"" a delicate global property of the distribution. ",okke schrijvers,,2015.0,,arXiv,Roughgarden2015,True,,arXiv,Not available,Ironing in the Dark,681890da5a497a03bb3076622b9c42eb,http://arxiv.org/abs/1511.06918v1 11308," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",behrouz maham,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 11309," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",zhu han,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 11310," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",walid saad,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 11311," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",jinzhong niu,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 11312," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",simon parsons,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 11313," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",jaya mukhopadhyay,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 11314," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",anita pal,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 11315," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",sajal mukhopadhyay,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 11316," Agents (specially humans) with smart devices are stemming with astounding rapidity and that may play a big role in information and communication technology apart from being used only as a mere calling devices. Inculcating the power of smart devices carried by the agents in several different applications is commonly termed as participatory sensing (PS). In this paper, for the first time a truthful quality adaptive participatory sensing is presented in an online double auction environment. The proposed algorithm is simulated with a benchmark mechanism that adapts the existing McAfee's Double Auction (MDA) directly in the online environment. ",vikash singh,,2016.0,,arXiv,Mukhopadhyay2016,True,,arXiv,Not available,Quality adaptive online double auction in participatory sensing,77df908d13e55ba9b9ae986572887284,http://arxiv.org/abs/1608.04857v2 11317," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",moshe babaioff,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 11318," Turn-based stochastic games and its important subclass Markov decision processes (MDPs) provide models for systems with both probabilistic and nondeterministic behaviors. We consider turn-based stochastic games with two classical quantitative objectives: discounted-sum and long-run average objectives. The game models and the quantitative objectives are widely used in probabilistic verification, planning, optimal inventory control, network protocol and performance analysis. Games and MDPs that model realistic systems often have very large state spaces, and probabilistic abstraction techniques are necessary to handle the state-space explosion. The commonly used full-abstraction techniques do not yield space-savings for systems that have many states with similar value, but does not necessarily have similar transition structure. A semi-abstraction technique, namely Magnifying-lens abstractions (MLA), that clusters states based on value only, disregarding differences in their transition relation was proposed for qualitative objectives (reachability and safety objectives). In this paper we extend the MLA technique to solve stochastic games with discounted-sum and long-run average objectives. We present the MLA technique based abstraction-refinement algorithm for stochastic games and MDPs with discounted-sum objectives. For long-run average objectives, our solution works for all MDPs and a sub-class of stochastic games where every state has the same value. ",krishnendu chatterjee,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,"Magnifying Lens Abstraction for Stochastic Games with Discounted and Long-run Average Objectives",b569e178623c01f71a4ccee9ececd6cc,http://arxiv.org/abs/1107.2132v1 11319," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",yogeshwer sharma,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 11320," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",aleksandrs slivkins,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 11321," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",ioannis caragiannis,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11322," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",christos kaklamanis,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11323," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",panagiotis kanellopoulos,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11324," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",maria kyropoulou,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11325," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",brendan lucier,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11326," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",renato leme,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11327," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",eva tardos,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 11328," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 11329," Turn-based stochastic games and its important subclass Markov decision processes (MDPs) provide models for systems with both probabilistic and nondeterministic behaviors. We consider turn-based stochastic games with two classical quantitative objectives: discounted-sum and long-run average objectives. The game models and the quantitative objectives are widely used in probabilistic verification, planning, optimal inventory control, network protocol and performance analysis. Games and MDPs that model realistic systems often have very large state spaces, and probabilistic abstraction techniques are necessary to handle the state-space explosion. The commonly used full-abstraction techniques do not yield space-savings for systems that have many states with similar value, but does not necessarily have similar transition structure. A semi-abstraction technique, namely Magnifying-lens abstractions (MLA), that clusters states based on value only, disregarding differences in their transition relation was proposed for qualitative objectives (reachability and safety objectives). In this paper we extend the MLA technique to solve stochastic games with discounted-sum and long-run average objectives. We present the MLA technique based abstraction-refinement algorithm for stochastic games and MDPs with discounted-sum objectives. For long-run average objectives, our solution works for all MDPs and a sub-class of stochastic games where every state has the same value. ",luca alfaro,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,"Magnifying Lens Abstraction for Stochastic Games with Discounted and Long-run Average Objectives",b569e178623c01f71a4ccee9ececd6cc,http://arxiv.org/abs/1107.2132v1 11330," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 11331," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 11332," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 11333," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",thodoris lykouris,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 11334," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",vasilis syrgkanis,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 11335," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",eva tardos,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 11336," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",ashwinkumar badanidiyuru,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 11337," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",kshipra bhawalkar,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 11338," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",haifeng xu,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 11339," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",sang jung,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11340," Sharing unused vehicles is one practical solution for traffic congestion. We propose an advanced vehicle-sharing service that maximizes the sharing of vehicles and improves traffic efficiency by coordinating user trips via an information system. We formulate ride-sharing games that model externalities in vehicle sharing caused by insufficient vehicle supply. We show how Bayes correlated equilibrium can coordinate players in ride-sharing games and verify the resultant improvement in the price of anarchy. ",tatsuya iwase,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,Coordination of Players in Ride-Sharing Games by Signaling,b9533bd921fb374e92ba398a8abe854c,http://arxiv.org/abs/1604.00706v1 11341," Turn-based stochastic games and its important subclass Markov decision processes (MDPs) provide models for systems with both probabilistic and nondeterministic behaviors. We consider turn-based stochastic games with two classical quantitative objectives: discounted-sum and long-run average objectives. The game models and the quantitative objectives are widely used in probabilistic verification, planning, optimal inventory control, network protocol and performance analysis. Games and MDPs that model realistic systems often have very large state spaces, and probabilistic abstraction techniques are necessary to handle the state-space explosion. The commonly used full-abstraction techniques do not yield space-savings for systems that have many states with similar value, but does not necessarily have similar transition structure. A semi-abstraction technique, namely Magnifying-lens abstractions (MLA), that clusters states based on value only, disregarding differences in their transition relation was proposed for qualitative objectives (reachability and safety objectives). In this paper we extend the MLA technique to solve stochastic games with discounted-sum and long-run average objectives. We present the MLA technique based abstraction-refinement algorithm for stochastic games and MDPs with discounted-sum objectives. For long-run average objectives, our solution works for all MDPs and a sub-class of stochastic games where every state has the same value. ",pritam roy,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,"Magnifying Lens Abstraction for Stochastic Games with Discounted and Long-run Average Objectives",b569e178623c01f71a4ccee9ececd6cc,http://arxiv.org/abs/1107.2132v1 11342," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seung yu,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11343," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seong-lyun kim,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11344," We consider two sided matching markets consisting of agents with non-transferable utilities; agents from the opposite sides form matching pairs (e.g., buyers-sellers) and negotiate the terms of their math which may include a monetary transfer. Competitive equilibria are the elements of the core of this game. We present the first combinatorial characterization of competitive equilibria that relates the utility of each agent at equilibrium to the equilibrium utilities of other agents in a strictly smaller market excluding that agent; thus automatically providing a constructive proof of existence of competitive equilibria in such markets. Our characterization also yields a group strategyproof mechanism for allocating indivisible goods to unit demand buyers with non-quasilinear utilities that highly resembles the Vickrey Clarke Groves (VCG) mechanism. As a direct application of this, we present a group strategyproof welfare maximizing mechanism for Ad-Auctions without requiring the usual assumption that search engine and advertisers have consistent estimates of the clickthrough rates. ",saeed alaei,,2010.0,,arXiv,Alaei2010,True,,arXiv,Not available,"Competitive Equilibria in Two Sided Matching Markets with Non-transferable Utilities",d842efe3f1d72b934d652b1420b53cb0,http://arxiv.org/abs/1006.4696v4 11345," We consider two sided matching markets consisting of agents with non-transferable utilities; agents from the opposite sides form matching pairs (e.g., buyers-sellers) and negotiate the terms of their math which may include a monetary transfer. Competitive equilibria are the elements of the core of this game. We present the first combinatorial characterization of competitive equilibria that relates the utility of each agent at equilibrium to the equilibrium utilities of other agents in a strictly smaller market excluding that agent; thus automatically providing a constructive proof of existence of competitive equilibria in such markets. Our characterization also yields a group strategyproof mechanism for allocating indivisible goods to unit demand buyers with non-quasilinear utilities that highly resembles the Vickrey Clarke Groves (VCG) mechanism. As a direct application of this, we present a group strategyproof welfare maximizing mechanism for Ad-Auctions without requiring the usual assumption that search engine and advertisers have consistent estimates of the clickthrough rates. ",kamal jain,,2010.0,,arXiv,Alaei2010,True,,arXiv,Not available,"Competitive Equilibria in Two Sided Matching Markets with Non-transferable Utilities",d842efe3f1d72b934d652b1420b53cb0,http://arxiv.org/abs/1006.4696v4 11346," We consider two sided matching markets consisting of agents with non-transferable utilities; agents from the opposite sides form matching pairs (e.g., buyers-sellers) and negotiate the terms of their math which may include a monetary transfer. Competitive equilibria are the elements of the core of this game. We present the first combinatorial characterization of competitive equilibria that relates the utility of each agent at equilibrium to the equilibrium utilities of other agents in a strictly smaller market excluding that agent; thus automatically providing a constructive proof of existence of competitive equilibria in such markets. Our characterization also yields a group strategyproof mechanism for allocating indivisible goods to unit demand buyers with non-quasilinear utilities that highly resembles the Vickrey Clarke Groves (VCG) mechanism. As a direct application of this, we present a group strategyproof welfare maximizing mechanism for Ad-Auctions without requiring the usual assumption that search engine and advertisers have consistent estimates of the clickthrough rates. ",azarakhsh malekian,,2010.0,,arXiv,Alaei2010,True,,arXiv,Not available,"Competitive Equilibria in Two Sided Matching Markets with Non-transferable Utilities",d842efe3f1d72b934d652b1420b53cb0,http://arxiv.org/abs/1006.4696v4 11347," We initiate the study of efficient mechanism design with guaranteed good properties even when players participate in multiple different mechanisms simultaneously or sequentially. We define the class of smooth mechanisms, related to smooth games defined by Roughgarden, that can be thought of as mechanisms that generate approximately market clearing prices. We show that smooth mechanisms result in high quality outcome in equilibrium both in the full information setting and in the Bayesian setting with uncertainty about participants, as well as in learning outcomes. Our main result is to show that such mechanisms compose well: smoothness locally at each mechanism implies efficiency globally. For mechanisms where good performance requires that bidders do not bid above their value, we identify the notion of a weakly smooth mechanism. Weakly smooth mechanisms, such as the Vickrey auction, are approximately efficient under the no-overbidding assumption. Similar to smooth mechanisms, weakly smooth mechanisms behave well in composition, and have high quality outcome in equilibrium (assuming no overbidding) both in the full information setting and in the Bayesian setting, as well as in learning outcomes. In most of the paper we assume participants have quasi-linear valuations. We also extend some of our results to settings where participants have budget constraints. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Composable and Efficient Mechanisms,49276162aaeb714058a67bcb663f63e9,http://arxiv.org/abs/1211.1325v1 11348," We initiate the study of efficient mechanism design with guaranteed good properties even when players participate in multiple different mechanisms simultaneously or sequentially. We define the class of smooth mechanisms, related to smooth games defined by Roughgarden, that can be thought of as mechanisms that generate approximately market clearing prices. We show that smooth mechanisms result in high quality outcome in equilibrium both in the full information setting and in the Bayesian setting with uncertainty about participants, as well as in learning outcomes. Our main result is to show that such mechanisms compose well: smoothness locally at each mechanism implies efficiency globally. For mechanisms where good performance requires that bidders do not bid above their value, we identify the notion of a weakly smooth mechanism. Weakly smooth mechanisms, such as the Vickrey auction, are approximately efficient under the no-overbidding assumption. Similar to smooth mechanisms, weakly smooth mechanisms behave well in composition, and have high quality outcome in equilibrium (assuming no overbidding) both in the full information setting and in the Bayesian setting, as well as in learning outcomes. In most of the paper we assume participants have quasi-linear valuations. We also extend some of our results to settings where participants have budget constraints. ",eva tardos,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Composable and Efficient Mechanisms,49276162aaeb714058a67bcb663f63e9,http://arxiv.org/abs/1211.1325v1 11349," Recent analysis of empirical data [F. Radicchi, A. Baronchelli & L.A.N. Amaral. PloS ONE 7, e029910 (2012)] showed that humans adopt L\'evy flight strategies when exploring the bid space in on-line auctions. A game theoretical model proved that the observed L\'evy exponents are nearly optimal, being close to the exponent value that guarantees the maximal economical return to players. Here, we rationalize these findings by adopting an evolutionary perspective. We show that a simple evolutionary process is able to account for the empirical measurements with the only assumption that the reproductive fitness of a player is proportional to her search ability. Contrarily to previous modeling, our approach describes the emergence of the observed exponent without resorting to any strong assumptions on the initial searching strategies. Our results generalize earlier research, and open novel questions in cognitive, behavioral and evolutionary sciences. ",filippo radicchi,,2012.0,10.1103/PhysRevE.85.061121,"Phys. Rev. E 85, 061121 (2012)",Radicchi2012,True,,arXiv,Not available,Evolution of optimal Lévy-flight strategies in human mental searches,4b4f7364c2bdc7098137d47b326b5bef,http://arxiv.org/abs/1204.2485v2 11350," Recent analysis of empirical data [F. Radicchi, A. Baronchelli & L.A.N. Amaral. PloS ONE 7, e029910 (2012)] showed that humans adopt L\'evy flight strategies when exploring the bid space in on-line auctions. A game theoretical model proved that the observed L\'evy exponents are nearly optimal, being close to the exponent value that guarantees the maximal economical return to players. Here, we rationalize these findings by adopting an evolutionary perspective. We show that a simple evolutionary process is able to account for the empirical measurements with the only assumption that the reproductive fitness of a player is proportional to her search ability. Contrarily to previous modeling, our approach describes the emergence of the observed exponent without resorting to any strong assumptions on the initial searching strategies. Our results generalize earlier research, and open novel questions in cognitive, behavioral and evolutionary sciences. ",andrea baronchelli,,2012.0,10.1103/PhysRevE.85.061121,"Phys. Rev. E 85, 061121 (2012)",Radicchi2012,True,,arXiv,Not available,Evolution of optimal Lévy-flight strategies in human mental searches,4b4f7364c2bdc7098137d47b326b5bef,http://arxiv.org/abs/1204.2485v2 11351," A game-theoretic model of scrip (artificial currency) systems is analyzed. It is shown that relative entropy can be used to characterize the distribution of agent wealth when all agents use threshold strategies---that is, they volunteer to do work iff they have below a threshold amount of money. Monotonicity of agents' best-reply functions is used to show that scrip systems have pure strategy equilibria where all agents use threshold strategies. An algorithm is given that can compute such an equilibrium and the resulting distribution of wealth. ",ian kash,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,An Equilibrium Analysis of Scrip Systems,6922f02cfdf65e967da85803c1d46612,http://arxiv.org/abs/1204.2942v2 11352," An extensive literature in economics and social science addresses contests, in which players compete to outperform each other on some measurable criterion, often referred to as a player's score, or output. Players incur costs that are an increasing function of score, but receive prizes for obtaining higher score than their competitors. In this paper we study finite games that are discretized contests, and the problems of computing exact and approximate Nash equilibria. Our motivation is the worst-case hardness of Nash equilibrium computation, and the resulting interest in important classes of games that admit polynomial-time algorithms. For games that have a tie-breaking rule for players' scores, we present a polynomial-time algorithm for computing an exact equilibrium in the 2-player case, and for multiple players, a characterization of Nash equilibria that shows an interesting parallel between these games and unrestricted 2-player games in normal form. When ties are allowed, via a reduction from these games to a subclass of anonymous games, we give approximation schemes for two special cases: constant-sized set of strategies, and constant number of players. ",leslie goldberg,,2013.0,10.1016/j.tcs.2013.01.013,TCS 476 24-37 (2013),Goldberg2013,True,,arXiv,Not available,Ranking Games that have Competitiveness-based Strategies,66e9ff64ea7d85130a0581a9704952df,http://arxiv.org/abs/1301.5844v1 11353," A game-theoretic model of scrip (artificial currency) systems is analyzed. It is shown that relative entropy can be used to characterize the distribution of agent wealth when all agents use threshold strategies---that is, they volunteer to do work iff they have below a threshold amount of money. Monotonicity of agents' best-reply functions is used to show that scrip systems have pure strategy equilibria where all agents use threshold strategies. An algorithm is given that can compute such an equilibrium and the resulting distribution of wealth. ",eric friedman,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,An Equilibrium Analysis of Scrip Systems,6922f02cfdf65e967da85803c1d46612,http://arxiv.org/abs/1204.2942v2 11354," A game-theoretic model of scrip (artificial currency) systems is analyzed. It is shown that relative entropy can be used to characterize the distribution of agent wealth when all agents use threshold strategies---that is, they volunteer to do work iff they have below a threshold amount of money. Monotonicity of agents' best-reply functions is used to show that scrip systems have pure strategy equilibria where all agents use threshold strategies. An algorithm is given that can compute such an equilibrium and the resulting distribution of wealth. ",joseph halpern,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,An Equilibrium Analysis of Scrip Systems,6922f02cfdf65e967da85803c1d46612,http://arxiv.org/abs/1204.2942v2 11355," Hat problems have recently become a popular topic in combinatorics and discrete mathematics. These have been shown to be strongly related to coding theory, network coding, and auctions. We consider the following version of the hat game, introduced by Winkler and studied by Butler et al. A team is composed of several players; each player is assigned a hat of a given colour; they do not see their own colour, but can see some other hats, according to a directed graph. The team wins if they have a strategy such that, for any possible assignment of colours to their hats, at least one player guesses their own hat colour correctly. In this paper, we discover some new classes of graphs which allow a winning strategy, thus answering some of the open questions in Butler et al. We also derive upper bounds on the maximal number of possible hat colours that allow for a winning strategy for a given graph. ",maximilien gadouleau,,2013.0,,arXiv,Gadouleau2013,True,,arXiv,Not available,New constructions and bounds for Winkler's hat game,cb8b8fd055ef59a4d83f15bd187cef7b,http://arxiv.org/abs/1311.2022v1 11356," Hat problems have recently become a popular topic in combinatorics and discrete mathematics. These have been shown to be strongly related to coding theory, network coding, and auctions. We consider the following version of the hat game, introduced by Winkler and studied by Butler et al. A team is composed of several players; each player is assigned a hat of a given colour; they do not see their own colour, but can see some other hats, according to a directed graph. The team wins if they have a strategy such that, for any possible assignment of colours to their hats, at least one player guesses their own hat colour correctly. In this paper, we discover some new classes of graphs which allow a winning strategy, thus answering some of the open questions in Butler et al. We also derive upper bounds on the maximal number of possible hat colours that allow for a winning strategy for a given graph. ",nicholas georgiou,,2013.0,,arXiv,Gadouleau2013,True,,arXiv,Not available,New constructions and bounds for Winkler's hat game,cb8b8fd055ef59a4d83f15bd187cef7b,http://arxiv.org/abs/1311.2022v1 11357," This work gives the first natural non-utilitarian problems for which the trivial $n$ approximation via VCG mechanisms is the best possible. That is, no truthful mechanism can be better than $n$ approximate, where $n$ is the number of agents. The problems are the min-max variant of shortest path and (directed) minimum spanning tree mechanism design problems. In these procurement auctions, agents own the edges of a network, and the corresponding edge costs are private. Instead of the total weight of the subnetwork, in the min-max variant we aim to minimize the maximum agent cost. ",stefano leucci,,2017.0,10.1016/j.geb.2018.05.003,arXiv,Leucci2017,True,,arXiv,Not available,"No truthful mechanism can be better than $n$ approximate for two natural problems",ef5b56b5b09e339e8ec1f136ed7a61cd,http://arxiv.org/abs/1712.06709v2 11358," This work gives the first natural non-utilitarian problems for which the trivial $n$ approximation via VCG mechanisms is the best possible. That is, no truthful mechanism can be better than $n$ approximate, where $n$ is the number of agents. The problems are the min-max variant of shortest path and (directed) minimum spanning tree mechanism design problems. In these procurement auctions, agents own the edges of a network, and the corresponding edge costs are private. Instead of the total weight of the subnetwork, in the min-max variant we aim to minimize the maximum agent cost. ",akaki mamageishvili,,2017.0,10.1016/j.geb.2018.05.003,arXiv,Leucci2017,True,,arXiv,Not available,"No truthful mechanism can be better than $n$ approximate for two natural problems",ef5b56b5b09e339e8ec1f136ed7a61cd,http://arxiv.org/abs/1712.06709v2 11359," This work gives the first natural non-utilitarian problems for which the trivial $n$ approximation via VCG mechanisms is the best possible. That is, no truthful mechanism can be better than $n$ approximate, where $n$ is the number of agents. The problems are the min-max variant of shortest path and (directed) minimum spanning tree mechanism design problems. In these procurement auctions, agents own the edges of a network, and the corresponding edge costs are private. Instead of the total weight of the subnetwork, in the min-max variant we aim to minimize the maximum agent cost. ",paolo penna,,2017.0,10.1016/j.geb.2018.05.003,arXiv,Leucci2017,True,,arXiv,Not available,"No truthful mechanism can be better than $n$ approximate for two natural problems",ef5b56b5b09e339e8ec1f136ed7a61cd,http://arxiv.org/abs/1712.06709v2 11360," Display advertising is an important online advertising type where banner advertisements (shortly ad) on websites are usually measured by how many times they are viewed by online users. There are two major channels to sell ad views. They can be auctioned off in real time or be directly sold through guaranteed contracts in advance. The former is also known as real-time bidding (RTB), in which media buyers come to a common marketplace to compete for a single ad view and this inventory will be allocated to a buyer in milliseconds by an auction model. Unlike RTB, buying and selling guaranteed contracts are not usually programmatic but through private negotiations as advertisers would like to customise their requests and purchase ad views in bulk. In this paper, we propose a simple model that facilitates the automation of direct sales. In our model, a media seller puts future ad views on sale and receives buy requests sequentially over time until the future delivery period. The seller maintains a hidden yet dynamically changing reserve price in order to decide whether to accept a buy request or not. The future supply and demand are assumed to be well estimated and static, and the model's revenue management is using inventory control theory where each computed reverse price is based on the updated supply and demand, and the unsold future ad views will be auctioned off in RTB to the meet the unfulfilled demand. The model has several desirable properties. First, it is not limited to the demand arrival assumption. Second, it will not affect the current equilibrium between RTB and direct sales as there are no posted guaranteed prices. Third, the model uses the expected revenue from RTB as a lower bound for inventory control and we show that a publisher can receive expected total revenue greater than or equal to those from only RTB if she uses the computed dynamic reserves prices for direct sales. ",bowei chen,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Risk-aware dynamic reserve prices of programmatic guarantee in display advertising",372e3f46562a43395c84a05978ccedf3,http://arxiv.org/abs/1701.05219v1 11361," We consider the ""Offline Ad Slot Scheduling"" problem, where advertisers must be scheduled to ""sponsored search"" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search. We give a truthful mechanism under the utility model where bidders try to maximize their clicks, subject to their personal constraints. In addition, we show that the revenue-maximizing mechanism is not truthful, but has a Nash equilibrium whose outcome is identical to our mechanism. As far as we can tell, this is the first treatment of sponsored search that directly incorporates both multiple slots and budget constraints into an analysis of incentives. Our mechanism employs a descending-price auction that maintains a solution to a certain machine scheduling problem whose job lengths depend on the price, and hence is variable over the auction. The price stops when the set of bidders that can afford that price pack exactly into a block of ad slots, at which point the mechanism allocates that block and continues on the remaining slots. To prove our result on the equilibrium of the revenue-maximizing mechanism, we first show that a greedy algorithm suffices to solve the revenue-maximizing linear program; we then use this insight to prove that bidders allocated in the same block of our mechanism have no incentive to deviate from bidding the fixed price of that block. ",jon feldman,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,A Truthful Mechanism for Offline Ad Slot Scheduling,10d5e35e30dd0c04f3b84181fb2a785d,http://arxiv.org/abs/0801.2931v1 11362," We consider the ""Offline Ad Slot Scheduling"" problem, where advertisers must be scheduled to ""sponsored search"" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search. We give a truthful mechanism under the utility model where bidders try to maximize their clicks, subject to their personal constraints. In addition, we show that the revenue-maximizing mechanism is not truthful, but has a Nash equilibrium whose outcome is identical to our mechanism. As far as we can tell, this is the first treatment of sponsored search that directly incorporates both multiple slots and budget constraints into an analysis of incentives. Our mechanism employs a descending-price auction that maintains a solution to a certain machine scheduling problem whose job lengths depend on the price, and hence is variable over the auction. The price stops when the set of bidders that can afford that price pack exactly into a block of ad slots, at which point the mechanism allocates that block and continues on the remaining slots. To prove our result on the equilibrium of the revenue-maximizing mechanism, we first show that a greedy algorithm suffices to solve the revenue-maximizing linear program; we then use this insight to prove that bidders allocated in the same block of our mechanism have no incentive to deviate from bidding the fixed price of that block. ",s. muthukrishnan,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,A Truthful Mechanism for Offline Ad Slot Scheduling,10d5e35e30dd0c04f3b84181fb2a785d,http://arxiv.org/abs/0801.2931v1 11363," An extensive literature in economics and social science addresses contests, in which players compete to outperform each other on some measurable criterion, often referred to as a player's score, or output. Players incur costs that are an increasing function of score, but receive prizes for obtaining higher score than their competitors. In this paper we study finite games that are discretized contests, and the problems of computing exact and approximate Nash equilibria. Our motivation is the worst-case hardness of Nash equilibrium computation, and the resulting interest in important classes of games that admit polynomial-time algorithms. For games that have a tie-breaking rule for players' scores, we present a polynomial-time algorithm for computing an exact equilibrium in the 2-player case, and for multiple players, a characterization of Nash equilibria that shows an interesting parallel between these games and unrestricted 2-player games in normal form. When ties are allowed, via a reduction from these games to a subclass of anonymous games, we give approximation schemes for two special cases: constant-sized set of strategies, and constant number of players. ",paul goldberg,,2013.0,10.1016/j.tcs.2013.01.013,TCS 476 24-37 (2013),Goldberg2013,True,,arXiv,Not available,Ranking Games that have Competitiveness-based Strategies,66e9ff64ea7d85130a0581a9704952df,http://arxiv.org/abs/1301.5844v1 11364," We consider the ""Offline Ad Slot Scheduling"" problem, where advertisers must be scheduled to ""sponsored search"" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search. We give a truthful mechanism under the utility model where bidders try to maximize their clicks, subject to their personal constraints. In addition, we show that the revenue-maximizing mechanism is not truthful, but has a Nash equilibrium whose outcome is identical to our mechanism. As far as we can tell, this is the first treatment of sponsored search that directly incorporates both multiple slots and budget constraints into an analysis of incentives. Our mechanism employs a descending-price auction that maintains a solution to a certain machine scheduling problem whose job lengths depend on the price, and hence is variable over the auction. The price stops when the set of bidders that can afford that price pack exactly into a block of ad slots, at which point the mechanism allocates that block and continues on the remaining slots. To prove our result on the equilibrium of the revenue-maximizing mechanism, we first show that a greedy algorithm suffices to solve the revenue-maximizing linear program; we then use this insight to prove that bidders allocated in the same block of our mechanism have no incentive to deviate from bidding the fixed price of that block. ",evdokia nikolova,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,A Truthful Mechanism for Offline Ad Slot Scheduling,10d5e35e30dd0c04f3b84181fb2a785d,http://arxiv.org/abs/0801.2931v1 11365," We consider the ""Offline Ad Slot Scheduling"" problem, where advertisers must be scheduled to ""sponsored search"" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search. We give a truthful mechanism under the utility model where bidders try to maximize their clicks, subject to their personal constraints. In addition, we show that the revenue-maximizing mechanism is not truthful, but has a Nash equilibrium whose outcome is identical to our mechanism. As far as we can tell, this is the first treatment of sponsored search that directly incorporates both multiple slots and budget constraints into an analysis of incentives. Our mechanism employs a descending-price auction that maintains a solution to a certain machine scheduling problem whose job lengths depend on the price, and hence is variable over the auction. The price stops when the set of bidders that can afford that price pack exactly into a block of ad slots, at which point the mechanism allocates that block and continues on the remaining slots. To prove our result on the equilibrium of the revenue-maximizing mechanism, we first show that a greedy algorithm suffices to solve the revenue-maximizing linear program; we then use this insight to prove that bidders allocated in the same block of our mechanism have no incentive to deviate from bidding the fixed price of that block. ",martin pal,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,A Truthful Mechanism for Offline Ad Slot Scheduling,10d5e35e30dd0c04f3b84181fb2a785d,http://arxiv.org/abs/0801.2931v1 11366," Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve, but even close approximations of perfect privacy suffer from the same lower bounds. By contrast, we show that, if the values of the parties are drawn uniformly at random from {0,...,2^k-1}, then, for both problems, simple and natural communication protocols have privacy-approximation ratios that are linear in k (i.e., logarithmic in the size of the space of possible inputs). We conjecture that this improved privacy-approximation ratio is achievable for any probability distribution. ",joan feigenbaum,,2009.0,,arXiv,Feigenbaum2009,True,,arXiv,Not available,Approximate Privacy: Foundations and Quantification,56a37385baf96115db07057656cce267,http://arxiv.org/abs/0910.5714v2 11367," Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve, but even close approximations of perfect privacy suffer from the same lower bounds. By contrast, we show that, if the values of the parties are drawn uniformly at random from {0,...,2^k-1}, then, for both problems, simple and natural communication protocols have privacy-approximation ratios that are linear in k (i.e., logarithmic in the size of the space of possible inputs). We conjecture that this improved privacy-approximation ratio is achievable for any probability distribution. ",aaron jaggard,,2009.0,,arXiv,Feigenbaum2009,True,,arXiv,Not available,Approximate Privacy: Foundations and Quantification,56a37385baf96115db07057656cce267,http://arxiv.org/abs/0910.5714v2 11368," Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve, but even close approximations of perfect privacy suffer from the same lower bounds. By contrast, we show that, if the values of the parties are drawn uniformly at random from {0,...,2^k-1}, then, for both problems, simple and natural communication protocols have privacy-approximation ratios that are linear in k (i.e., logarithmic in the size of the space of possible inputs). We conjecture that this improved privacy-approximation ratio is achievable for any probability distribution. ",michael schapira,,2009.0,,arXiv,Feigenbaum2009,True,,arXiv,Not available,Approximate Privacy: Foundations and Quantification,56a37385baf96115db07057656cce267,http://arxiv.org/abs/0910.5714v2 11369," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",tanmoy chakraborty,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 11370," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",eyal even-dar,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 11371," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",sudipto guha,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 11372," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",yishay mansour,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 11373," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",s. muthukrishnan,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 11374," An extensive literature in economics and social science addresses contests, in which players compete to outperform each other on some measurable criterion, often referred to as a player's score, or output. Players incur costs that are an increasing function of score, but receive prizes for obtaining higher score than their competitors. In this paper we study finite games that are discretized contests, and the problems of computing exact and approximate Nash equilibria. Our motivation is the worst-case hardness of Nash equilibrium computation, and the resulting interest in important classes of games that admit polynomial-time algorithms. For games that have a tie-breaking rule for players' scores, we present a polynomial-time algorithm for computing an exact equilibrium in the 2-player case, and for multiple players, a characterization of Nash equilibria that shows an interesting parallel between these games and unrestricted 2-player games in normal form. When ties are allowed, via a reduction from these games to a subclass of anonymous games, we give approximation schemes for two special cases: constant-sized set of strategies, and constant number of players. ",piotr krysta,,2013.0,10.1016/j.tcs.2013.01.013,TCS 476 24-37 (2013),Goldberg2013,True,,arXiv,Not available,Ranking Games that have Competitiveness-based Strategies,66e9ff64ea7d85130a0581a9704952df,http://arxiv.org/abs/1301.5844v1 11375," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",yakov babichenko,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 11376," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",shahar dobzinski,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 11377," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",noam nisan,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 11378," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 11379," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 11380," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",milan bradonjic,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 11381," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 11382," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",nicolas bousquet,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 11383," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",yang cai,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 11384," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",christoph hunkenschroder,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 11385," An extensive literature in economics and social science addresses contests, in which players compete to outperform each other on some measurable criterion, often referred to as a player's score, or output. Players incur costs that are an increasing function of score, but receive prizes for obtaining higher score than their competitors. In this paper we study finite games that are discretized contests, and the problems of computing exact and approximate Nash equilibria. Our motivation is the worst-case hardness of Nash equilibrium computation, and the resulting interest in important classes of games that admit polynomial-time algorithms. For games that have a tie-breaking rule for players' scores, we present a polynomial-time algorithm for computing an exact equilibrium in the 2-player case, and for multiple players, a characterization of Nash equilibria that shows an interesting parallel between these games and unrestricted 2-player games in normal form. When ties are allowed, via a reduction from these games to a subclass of anonymous games, we give approximation schemes for two special cases: constant-sized set of strategies, and constant number of players. ",carmine ventre,,2013.0,10.1016/j.tcs.2013.01.013,TCS 476 24-37 (2013),Goldberg2013,True,,arXiv,Not available,Ranking Games that have Competitiveness-based Strategies,66e9ff64ea7d85130a0581a9704952df,http://arxiv.org/abs/1301.5844v1 11386," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",adrian vetta,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 11387," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",haoran yu,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 11388," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",george iosifidis,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 11389," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",jianwei huang,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 11390," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",leandros tassiulas,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 11391," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",michael wellman,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 11392," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",lu hong,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 11393," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",scott page,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 11394," Escalation is the fact that in a game (for instance in an auction), the agents play forever. The $0,1$-game is an extremely simple infinite game with intelligent agents in which escalation arises. It shows at the light of research on cognitive psychology the difference between intelligence (algorithmic mind) and rationality (algorithmic and reflective mind) in decision processes. It also shows that depending on the point of view (inside or outside) the rationality of the agent may change which is proposed to be called the principle of relativity. ",pierre lescanne,,2015.0,,arXiv,Lescanne2015,True,,arXiv,Not available,Intelligent escalation and the principle of relativity,e9fb90171d17cba57c9c48729b5075dd,http://arxiv.org/abs/1505.07212v1 11395," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",srinivas reddy,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 11396," We consider a sequential inspection game where an inspector uses a limited number of inspections over a larger number of time periods to detect a violation (an illegal act) of an inspectee. Compared with earlier models, we allow varying rewards to the inspectee for successful violations. As one possible example, the most valuable reward may be the completion of a sequence of thefts of nuclear material needed to build a nuclear bomb. The inspectee can observe the inspector, but the inspector can only determine if a violation happens during a stage where he inspects, which terminates the game; otherwise the game continues. Under reasonable assumptions for the payoffs, the inspector's strategy is independent of the number of successful violations. This allows to apply a recursive description of the game, even though this normally assumes fully informed players after each stage. The resulting recursive equation in three variables for the equilibrium payoff of the game, which generalizes several other known equations of this kind, is solved explicitly in terms of sums of binomial coefficients. We also extend this approach to non-zero-sum games and, similar to Maschler (1966), ""inspector leadership"" where the inspector commits to (the same) randomized inspection schedule, but the inspectee acts legally (rather than mixes as in the simultaneous game) as long as inspections remain. ",bernhard stengel,,2014.0,10.1287/moor.2015.0762,"Mathematics of Operations Research 43:3 (2016), 935-952",Stengel2014,True,,arXiv,Not available,Recursive Inspection Games,abd90fd1d3fdd3f008c74c5755451e03,http://arxiv.org/abs/1412.0129v2 11397," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",mayukh dass,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 11398," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",wayes tushar,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11399," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",chau yuen,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11400," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",hamed mohsenian-rad,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11401," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",tapan saha,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11402," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",h. poor,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11403," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",kristin wood,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 11404," We study the design and approximation of optimal crowdsourcing contests. Crowdsourcing contests can be modeled as all-pay auctions because entrants must exert effort up-front to enter. Unlike all-pay auctions where a usual design objective would be to maximize revenue, in crowdsourcing contests, the principal only benefits from the submission with the highest quality. We give a theory for optimal crowdsourcing contests that mirrors the theory of optimal auction design: the optimal crowdsourcing contest is a virtual valuation optimizer (the virtual valuation function depends on the distribution of contestant skills and the number of contestants). We also compare crowdsourcing contests with more conventional means of procurement. In this comparison, crowdsourcing contests are relatively disadvantaged because the effort of losing contestants is wasted. Nonetheless, we show that crowdsourcing contests are 2-approximations to conventional methods for a large family of ""regular"" distributions, and 4-approximations, otherwise. ",shuchi chawla,,2011.0,,arXiv,Chawla2011,True,,arXiv,Not available,Optimal Crowdsourcing Contests,085870653cb275647f85fb7d4a4bd371,http://arxiv.org/abs/1111.2893v1 11405," We study the design and approximation of optimal crowdsourcing contests. Crowdsourcing contests can be modeled as all-pay auctions because entrants must exert effort up-front to enter. Unlike all-pay auctions where a usual design objective would be to maximize revenue, in crowdsourcing contests, the principal only benefits from the submission with the highest quality. We give a theory for optimal crowdsourcing contests that mirrors the theory of optimal auction design: the optimal crowdsourcing contest is a virtual valuation optimizer (the virtual valuation function depends on the distribution of contestant skills and the number of contestants). We also compare crowdsourcing contests with more conventional means of procurement. In this comparison, crowdsourcing contests are relatively disadvantaged because the effort of losing contestants is wasted. Nonetheless, we show that crowdsourcing contests are 2-approximations to conventional methods for a large family of ""regular"" distributions, and 4-approximations, otherwise. ",jason hartline,,2011.0,,arXiv,Chawla2011,True,,arXiv,Not available,Optimal Crowdsourcing Contests,085870653cb275647f85fb7d4a4bd371,http://arxiv.org/abs/1111.2893v1 11406," We study the design and approximation of optimal crowdsourcing contests. Crowdsourcing contests can be modeled as all-pay auctions because entrants must exert effort up-front to enter. Unlike all-pay auctions where a usual design objective would be to maximize revenue, in crowdsourcing contests, the principal only benefits from the submission with the highest quality. We give a theory for optimal crowdsourcing contests that mirrors the theory of optimal auction design: the optimal crowdsourcing contest is a virtual valuation optimizer (the virtual valuation function depends on the distribution of contestant skills and the number of contestants). We also compare crowdsourcing contests with more conventional means of procurement. In this comparison, crowdsourcing contests are relatively disadvantaged because the effort of losing contestants is wasted. Nonetheless, we show that crowdsourcing contests are 2-approximations to conventional methods for a large family of ""regular"" distributions, and 4-approximations, otherwise. ",balasubramanian sivan,,2011.0,,arXiv,Chawla2011,True,,arXiv,Not available,Optimal Crowdsourcing Contests,085870653cb275647f85fb7d4a4bd371,http://arxiv.org/abs/1111.2893v1 11407," What does it mean to fully understand the behavior of a network of adaptive agents? The golden standard typically is the behavior of learning dynamics in potential games, where many evolutionary dynamics, e.g., replicator, are known to converge to sets of equilibria. Even in such classic settings many critical questions remain unanswered. We examine issues such as: Point-wise convergence: Does the system actually equilibrate even in the presence of continuums of equilibria? Computing regions of attraction: Given point-wise convergence can we compute the region of asymptotic stability of each equilibrium (e.g., estimate its volume, geometry)? System invariants: Invariant functions remain constant along every system trajectory. This notion is orthogonal to the game theoretic concept of a potential function, which always strictly increases/decreases along system trajectories. Do dynamics in potential games exhibit invariant functions? If so, how many? How do these functions look like? Based on these geometric characterizations, we propose a novel quantitative framework for analyzing the efficiency of potential games with many equilibria. The predictions of different equilibria are weighted by their probability to arise under evolutionary dynamics given uniformly random initial conditions. This average case analysis is shown to offer novel insights in classic game theoretic challenges, including quantifying the risk dominance in stag-hunt games and allowing for more nuanced performance analysis in networked coordination and congestion games with large gaps between price of stability and price of anarchy. ",ioannis panageas,,2014.0,,arXiv,Panageas2014,True,,arXiv,Not available,"Average Case Performance of Replicator Dynamics in Potential Games via Computing Regions of Attraction",afb2302882a575b686c027be9fe1c8a5,http://arxiv.org/abs/1403.3885v6 11408," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",yiannis giannakopoulos,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 11409," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",elias koutsoupias,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 11410," By treating combinatorial games as dynamical systems, we are able to address a longstanding open question in combinatorial game theory, namely, how the introduction of a ""pass"" move into a game affects its behavior. We consider two well known combinatorial games, 3-pile Nim and 3-row Chomp. In the case of Nim, we observe that the introduction of the pass dramatically alters the game's underlying structure, rendering it considerably more complex, while for Chomp, the pass move is found to have relatively minimal impact. We show how these results can be understood by recasting these games as dynamical systems describable by dynamical recursion relations. From these recursion relations we are able to identify underlying structural connections between these ""games with passes"" and a recently introduced class of ""generic (perturbed) games."" This connection, together with a (non-rigorous) numerical stability analysis, allows one to understand and predict the effect of a pass on a game. ",rebecca morrison,,2012.0,10.1063/1.3650234,"Chaos 21, 043108; 2011",Morrison2012,True,,arXiv,Not available,Combinatorial Games with a Pass: A dynamical systems approach,ea59085a5b22c36738c87be535cc2f74,http://arxiv.org/abs/1204.3222v1 11411," By treating combinatorial games as dynamical systems, we are able to address a longstanding open question in combinatorial game theory, namely, how the introduction of a ""pass"" move into a game affects its behavior. We consider two well known combinatorial games, 3-pile Nim and 3-row Chomp. In the case of Nim, we observe that the introduction of the pass dramatically alters the game's underlying structure, rendering it considerably more complex, while for Chomp, the pass move is found to have relatively minimal impact. We show how these results can be understood by recasting these games as dynamical systems describable by dynamical recursion relations. From these recursion relations we are able to identify underlying structural connections between these ""games with passes"" and a recently introduced class of ""generic (perturbed) games."" This connection, together with a (non-rigorous) numerical stability analysis, allows one to understand and predict the effect of a pass on a game. ",eric friedman,,2012.0,10.1063/1.3650234,"Chaos 21, 043108; 2011",Morrison2012,True,,arXiv,Not available,Combinatorial Games with a Pass: A dynamical systems approach,ea59085a5b22c36738c87be535cc2f74,http://arxiv.org/abs/1204.3222v1 11412," By treating combinatorial games as dynamical systems, we are able to address a longstanding open question in combinatorial game theory, namely, how the introduction of a ""pass"" move into a game affects its behavior. We consider two well known combinatorial games, 3-pile Nim and 3-row Chomp. In the case of Nim, we observe that the introduction of the pass dramatically alters the game's underlying structure, rendering it considerably more complex, while for Chomp, the pass move is found to have relatively minimal impact. We show how these results can be understood by recasting these games as dynamical systems describable by dynamical recursion relations. From these recursion relations we are able to identify underlying structural connections between these ""games with passes"" and a recently introduced class of ""generic (perturbed) games."" This connection, together with a (non-rigorous) numerical stability analysis, allows one to understand and predict the effect of a pass on a game. ",adam landsberg,,2012.0,10.1063/1.3650234,"Chaos 21, 043108; 2011",Morrison2012,True,,arXiv,Not available,Combinatorial Games with a Pass: A dynamical systems approach,ea59085a5b22c36738c87be535cc2f74,http://arxiv.org/abs/1204.3222v1 11413," A model of stochastic games where multiple controllers jointly control the evolution of the state of a dynamic system but have access to different information about the state and action processes is considered. The asymmetry of information among the controllers makes it difficult to compute or characterize Nash equilibria. Using common information among the controllers, the game with asymmetric information is shown to be equivalent to another game with symmetric information. Further, under certain conditions, a Markov state is identified for the equivalent symmetric information game and its Markov perfect equilibria are characterized. This characterization provides a backward induction algorithm to find Nash equilibria of the original game with asymmetric information in pure or behavioral strategies. Each step of this algorithm involves finding Bayesian Nash equilibria of a one-stage Bayesian game. The class of Nash equilibria of the original game that can be characterized in this backward manner are named common information based Markov perfect equilibria. ",ashutosh nayyar,,2012.0,,arXiv,Nayyar2012,True,,arXiv,Not available,"Nash Equilibria for Stochastic Games with Asymmetric Information-Part 1: Finite Games",1a6066dcca976980f6830d106da3449b,http://arxiv.org/abs/1209.3549v1 11414," A model of stochastic games where multiple controllers jointly control the evolution of the state of a dynamic system but have access to different information about the state and action processes is considered. The asymmetry of information among the controllers makes it difficult to compute or characterize Nash equilibria. Using common information among the controllers, the game with asymmetric information is shown to be equivalent to another game with symmetric information. Further, under certain conditions, a Markov state is identified for the equivalent symmetric information game and its Markov perfect equilibria are characterized. This characterization provides a backward induction algorithm to find Nash equilibria of the original game with asymmetric information in pure or behavioral strategies. Each step of this algorithm involves finding Bayesian Nash equilibria of a one-stage Bayesian game. The class of Nash equilibria of the original game that can be characterized in this backward manner are named common information based Markov perfect equilibria. ",abhishek gupta,,2012.0,,arXiv,Nayyar2012,True,,arXiv,Not available,"Nash Equilibria for Stochastic Games with Asymmetric Information-Part 1: Finite Games",1a6066dcca976980f6830d106da3449b,http://arxiv.org/abs/1209.3549v1 11415," A model of stochastic games where multiple controllers jointly control the evolution of the state of a dynamic system but have access to different information about the state and action processes is considered. The asymmetry of information among the controllers makes it difficult to compute or characterize Nash equilibria. Using common information among the controllers, the game with asymmetric information is shown to be equivalent to another game with symmetric information. Further, under certain conditions, a Markov state is identified for the equivalent symmetric information game and its Markov perfect equilibria are characterized. This characterization provides a backward induction algorithm to find Nash equilibria of the original game with asymmetric information in pure or behavioral strategies. Each step of this algorithm involves finding Bayesian Nash equilibria of a one-stage Bayesian game. The class of Nash equilibria of the original game that can be characterized in this backward manner are named common information based Markov perfect equilibria. ",cedric langbort,,2012.0,,arXiv,Nayyar2012,True,,arXiv,Not available,"Nash Equilibria for Stochastic Games with Asymmetric Information-Part 1: Finite Games",1a6066dcca976980f6830d106da3449b,http://arxiv.org/abs/1209.3549v1 11416," A model of stochastic games where multiple controllers jointly control the evolution of the state of a dynamic system but have access to different information about the state and action processes is considered. The asymmetry of information among the controllers makes it difficult to compute or characterize Nash equilibria. Using common information among the controllers, the game with asymmetric information is shown to be equivalent to another game with symmetric information. Further, under certain conditions, a Markov state is identified for the equivalent symmetric information game and its Markov perfect equilibria are characterized. This characterization provides a backward induction algorithm to find Nash equilibria of the original game with asymmetric information in pure or behavioral strategies. Each step of this algorithm involves finding Bayesian Nash equilibria of a one-stage Bayesian game. The class of Nash equilibria of the original game that can be characterized in this backward manner are named common information based Markov perfect equilibria. ",tamer basar,,2012.0,,arXiv,Nayyar2012,True,,arXiv,Not available,"Nash Equilibria for Stochastic Games with Asymmetric Information-Part 1: Finite Games",1a6066dcca976980f6830d106da3449b,http://arxiv.org/abs/1209.3549v1 11417," Quantitative games are two-player zero-sum games played on directed weighted graphs. Total-payoff games (that can be seen as a refinement of the well-studied mean-payoff games) are the variant where the payoff of a play is computed as the sum of the weights. Our aim is to describe the first pseudo-polynomial time algorithm for total-payoff games in the presence of arbitrary weights. It consists of a non-trivial application of the value iteration paradigm. Indeed, it requires to study, as a milestone, a refinement of these games, called min-cost reachability games, where we add a reachability objective to one of the players. For these games, we give an efficient value iteration algorithm to compute the values and optimal strategies (when they exist), that runs in pseudo-polynomial time. We also propose heuristics allowing one to possibly speed up the computations in both cases. ",thomas brihaye,,2014.0,,arXiv,Brihaye2014,True,,arXiv,Not available,To Reach or not to Reach? Efficient Algorithms for Total-Payoff Games,f34dd05c7734c3edded345d7cd0e3c34,http://arxiv.org/abs/1407.5030v4 11418," What does it mean to fully understand the behavior of a network of adaptive agents? The golden standard typically is the behavior of learning dynamics in potential games, where many evolutionary dynamics, e.g., replicator, are known to converge to sets of equilibria. Even in such classic settings many critical questions remain unanswered. We examine issues such as: Point-wise convergence: Does the system actually equilibrate even in the presence of continuums of equilibria? Computing regions of attraction: Given point-wise convergence can we compute the region of asymptotic stability of each equilibrium (e.g., estimate its volume, geometry)? System invariants: Invariant functions remain constant along every system trajectory. This notion is orthogonal to the game theoretic concept of a potential function, which always strictly increases/decreases along system trajectories. Do dynamics in potential games exhibit invariant functions? If so, how many? How do these functions look like? Based on these geometric characterizations, we propose a novel quantitative framework for analyzing the efficiency of potential games with many equilibria. The predictions of different equilibria are weighted by their probability to arise under evolutionary dynamics given uniformly random initial conditions. This average case analysis is shown to offer novel insights in classic game theoretic challenges, including quantifying the risk dominance in stag-hunt games and allowing for more nuanced performance analysis in networked coordination and congestion games with large gaps between price of stability and price of anarchy. ",georgios piliouras,,2014.0,,arXiv,Panageas2014,True,,arXiv,Not available,"Average Case Performance of Replicator Dynamics in Potential Games via Computing Regions of Attraction",afb2302882a575b686c027be9fe1c8a5,http://arxiv.org/abs/1403.3885v6 11419," Quantitative games are two-player zero-sum games played on directed weighted graphs. Total-payoff games (that can be seen as a refinement of the well-studied mean-payoff games) are the variant where the payoff of a play is computed as the sum of the weights. Our aim is to describe the first pseudo-polynomial time algorithm for total-payoff games in the presence of arbitrary weights. It consists of a non-trivial application of the value iteration paradigm. Indeed, it requires to study, as a milestone, a refinement of these games, called min-cost reachability games, where we add a reachability objective to one of the players. For these games, we give an efficient value iteration algorithm to compute the values and optimal strategies (when they exist), that runs in pseudo-polynomial time. We also propose heuristics allowing one to possibly speed up the computations in both cases. ",gilles geeraerts,,2014.0,,arXiv,Brihaye2014,True,,arXiv,Not available,To Reach or not to Reach? Efficient Algorithms for Total-Payoff Games,f34dd05c7734c3edded345d7cd0e3c34,http://arxiv.org/abs/1407.5030v4 11420," Quantitative games are two-player zero-sum games played on directed weighted graphs. Total-payoff games (that can be seen as a refinement of the well-studied mean-payoff games) are the variant where the payoff of a play is computed as the sum of the weights. Our aim is to describe the first pseudo-polynomial time algorithm for total-payoff games in the presence of arbitrary weights. It consists of a non-trivial application of the value iteration paradigm. Indeed, it requires to study, as a milestone, a refinement of these games, called min-cost reachability games, where we add a reachability objective to one of the players. For these games, we give an efficient value iteration algorithm to compute the values and optimal strategies (when they exist), that runs in pseudo-polynomial time. We also propose heuristics allowing one to possibly speed up the computations in both cases. ",axel haddad,,2014.0,,arXiv,Brihaye2014,True,,arXiv,Not available,To Reach or not to Reach? Efficient Algorithms for Total-Payoff Games,f34dd05c7734c3edded345d7cd0e3c34,http://arxiv.org/abs/1407.5030v4 11421," Quantitative games are two-player zero-sum games played on directed weighted graphs. Total-payoff games (that can be seen as a refinement of the well-studied mean-payoff games) are the variant where the payoff of a play is computed as the sum of the weights. Our aim is to describe the first pseudo-polynomial time algorithm for total-payoff games in the presence of arbitrary weights. It consists of a non-trivial application of the value iteration paradigm. Indeed, it requires to study, as a milestone, a refinement of these games, called min-cost reachability games, where we add a reachability objective to one of the players. For these games, we give an efficient value iteration algorithm to compute the values and optimal strategies (when they exist), that runs in pseudo-polynomial time. We also propose heuristics allowing one to possibly speed up the computations in both cases. ",benjamin monmege,,2014.0,,arXiv,Brihaye2014,True,,arXiv,Not available,To Reach or not to Reach? Efficient Algorithms for Total-Payoff Games,f34dd05c7734c3edded345d7cd0e3c34,http://arxiv.org/abs/1407.5030v4 11422," We present a quantum approach to a signaling game; a special kind of extensive games of incomplete information. Our model is based on quantum schemes for games in strategic form where players perform unitary operators on their own qubits of some fixed initial state and the payoff function is given by a measurement on the resulting final state. We show that the quantum game induced by our scheme coincides with a signaling game as a special case and outputs nonclassical results in general. As an example, we consider a quantum extension of the signaling game in which the chance move is a three-parameter unitary operator whereas the players' actions are equivalent to classical ones. In this case, we study the game in terms of Nash equilibria and refine the pure Nash equilibria adapting to the quantum game the notion of a weak perfect Bayesian equilibrium. ",piotr frackiewicz,,2014.0,10.1088/1751-8113/47/30/305301,J. Phys. A: Math. Theor. 47 305301 2014,Frackiewicz2014,True,,arXiv,Not available,Quantum signaling game,6a8c5871b96b01685474008646f4745b,http://arxiv.org/abs/1407.6757v1 11423," A game-theoretic setting provides a mathematical basis for analysis of strategic interaction among competing agents and provides insights into both classical and quantum decision theory and questions of strategic choice. An outstanding mathematical question, is to understand the conditions under which a classical game-theoretic setting can be transformed to a quantum game, and under which conditions there is an equivalence. In this paper, we consider quantum games as those that allow non-factorizable probabilities. We discuss two approaches for obtaining a non-factorizable game and study the outcome of such games. We demonstrate how the standard version of a quantum game can be analyzed as a non-factorizable game and determine the limitations of our approach. ",azhar iqbal,,2014.0,,"Royal Society Open Science, Vol. 3, Art. No. 150477 (2016)",Iqbal2014,True,,arXiv,Not available,"On the equivalence between non-factorizable mixed-strategy classical games and quantum games",440fe33b5b9e1478c090e4c46fba101a,http://arxiv.org/abs/1409.4878v5 11424," A game-theoretic setting provides a mathematical basis for analysis of strategic interaction among competing agents and provides insights into both classical and quantum decision theory and questions of strategic choice. An outstanding mathematical question, is to understand the conditions under which a classical game-theoretic setting can be transformed to a quantum game, and under which conditions there is an equivalence. In this paper, we consider quantum games as those that allow non-factorizable probabilities. We discuss two approaches for obtaining a non-factorizable game and study the outcome of such games. We demonstrate how the standard version of a quantum game can be analyzed as a non-factorizable game and determine the limitations of our approach. ",james chappell,,2014.0,,"Royal Society Open Science, Vol. 3, Art. No. 150477 (2016)",Iqbal2014,True,,arXiv,Not available,"On the equivalence between non-factorizable mixed-strategy classical games and quantum games",440fe33b5b9e1478c090e4c46fba101a,http://arxiv.org/abs/1409.4878v5 11425," A game-theoretic setting provides a mathematical basis for analysis of strategic interaction among competing agents and provides insights into both classical and quantum decision theory and questions of strategic choice. An outstanding mathematical question, is to understand the conditions under which a classical game-theoretic setting can be transformed to a quantum game, and under which conditions there is an equivalence. In this paper, we consider quantum games as those that allow non-factorizable probabilities. We discuss two approaches for obtaining a non-factorizable game and study the outcome of such games. We demonstrate how the standard version of a quantum game can be analyzed as a non-factorizable game and determine the limitations of our approach. ",derek abbott,,2014.0,,"Royal Society Open Science, Vol. 3, Art. No. 150477 (2016)",Iqbal2014,True,,arXiv,Not available,"On the equivalence between non-factorizable mixed-strategy classical games and quantum games",440fe33b5b9e1478c090e4c46fba101a,http://arxiv.org/abs/1409.4878v5 11426," We present a simple primal-dual algorithm for computing approximate Nash-equilibria in two-person zero-sum sequential games with incomplete information and perfect recall (like Texas Hold'em Poker). Our algorithm is numerically stable, performs only basic iterations (i.e matvec multiplications, clipping, etc., and no calls to external first-order oracles, no matrix inversions, etc.), and is applicable to a broad class of two-person zero-sum games including simultaneous games and sequential games with incomplete information and perfect recall. The applicability to the latter kind of games is thanks to the sequence-form representation which allows us to encode any such game as a matrix game with convex polytopial strategy profiles. We prove that the number of iterations needed to produce a Nash-equilibrium with a given precision is inversely proportional to the precision. As proof-of-concept, we present experimental results on matrix games on simplexes and Kuhn Poker. ",elvis dohmatob,,2015.0,,arXiv,Dohmatob2015,True,,arXiv,Not available,"A simple and numerically stable primal-dual algorithm for computing Nash-equilibria in sequential games with incomplete information",ba00be03644864ae5efe8716535350b1,http://arxiv.org/abs/1507.07901v5 11427," Nonlocality, one of the most remarkable aspects of quantum mechanics, is closely related to Bayesian game theory. Quantum mechanics can offer advantages to some Bayesian games, if the payoff functions are related to Bell inequalities in some way. Most of these Bayesian games that have been discussed are common interest games. Recently the first conflicting interest Bayesian game is proposed in Phys. Rev. Lett. 114, 020401 (2015). In the present paper we present three new conflicting interest Bayesian games where quantum mechanics offers advantages. The first game is linked with Cereceda inequalities, the second game is linked with a generalized Bell inequality with 3 possible measurement outcomes, and the third game is linked with a generalized Bell inequality with 3 possible measurement settings. ",haozhen situ,,2015.0,10.1007/s11128-015-1171-1,"Quantum Information Processing, 15(1):137-145, 2016",Situ2015,True,,arXiv,Not available,Two-player conflicting interest Bayesian games and Bell nonlocality,d66dfb487ad569b7cc81c8f596bf8370,http://arxiv.org/abs/1508.01601v3 11428," This paper introduces a class of games, called unit-sphere games, where strategies are real vectors with unit 2-norms (or, on a unit-sphere). As a result, they can no longer be interpreted as probability distributions over actions, but rather be thought of as allocations of one unit of resource to actions and the multiplicative payoff effect on each action is proportional to square-root of the amount of resource allocated to that action. The new definition generates a number of interesting consequences. We first characterize sufficient and necessary conditions under which a two-player unit-sphere game has a Nash equilibrium. The characterization effectively reduces solving a unit-sphere game to finding all eigenvalues and eigenvectors of the product of individual payoff matrices. For any unit-sphere game with non-negative payoff matrices, there always exists a unique Nash equilibrium; furthermore, the unique equilibrium is efficiently reachable via Cournot adjustment. In addition, we show that any equilibrium in positive unit-sphere games corresponds to approximate equilibria in the corresponding normal-form games. Analogous but weaker results are extended to positive n-player unit-sphere games. ",pingzhong tang,,2015.0,,arXiv,Tang2015,True,,arXiv,Not available,Unit-sphere games,dd61528b548e4c693b81bbf07d6db897,http://arxiv.org/abs/1509.05480v1 11429," We introduce a new solution concept, called periodicity, for selecting optimal strategies in strategic form games. This periodicity solution concept yields new insight into non-trivial games. In mixed strategy strategic form games, periodic solutions yield values for the utility function of each player that are equal to the Nash equilibrium ones. In contrast to the Nash strategies, here the payoffs of each player are robust against what the opponent plays. Sometimes, periodicity strategies yield higher utilities, and sometimes the Nash strategies do, but often the utilities of these two strategies coincide. We formally define and study periodic strategies in two player perfect information strategic form games with pure strategies and we prove that every non-trivial finite game has at least one periodic strategy, with non-trivial meaning non-degenerate payoffs. In some classes of games where mixed strategies are used, we identify quantitative features. Particularly interesting are the implications for collective action games, since there the collective action strategy can be incorporated in a purely non-cooperative context. Moreover, we address the periodicity issue when the players have a continuum set of strategies available. ",v. oikonomou,,2013.0,10.1142/S0219525917500096,"Advances in Complex Systems, Vol. 20, No. 5 (2017) 1750009",Oikonomou2013,True,,arXiv,Not available,"Periodic Strategies: A New Solution Concept and an Algorithm for NonTrivial Strategic Form Games",83d5b3f6f1e2e01f40b657ea9e28495e,http://arxiv.org/abs/1307.2035v4 11430," This paper introduces a class of games, called unit-sphere games, where strategies are real vectors with unit 2-norms (or, on a unit-sphere). As a result, they can no longer be interpreted as probability distributions over actions, but rather be thought of as allocations of one unit of resource to actions and the multiplicative payoff effect on each action is proportional to square-root of the amount of resource allocated to that action. The new definition generates a number of interesting consequences. We first characterize sufficient and necessary conditions under which a two-player unit-sphere game has a Nash equilibrium. The characterization effectively reduces solving a unit-sphere game to finding all eigenvalues and eigenvectors of the product of individual payoff matrices. For any unit-sphere game with non-negative payoff matrices, there always exists a unique Nash equilibrium; furthermore, the unique equilibrium is efficiently reachable via Cournot adjustment. In addition, we show that any equilibrium in positive unit-sphere games corresponds to approximate equilibria in the corresponding normal-form games. Analogous but weaker results are extended to positive n-player unit-sphere games. ",hanrui zhang,,2015.0,,arXiv,Tang2015,True,,arXiv,Not available,Unit-sphere games,dd61528b548e4c693b81bbf07d6db897,http://arxiv.org/abs/1509.05480v1 11431," Imperfect recall games represent dynamic interactions where players forget previously known information, such as a history of played actions. The importance of imperfect recall games stems from allowing a concise representation of strategies compared to perfect recall games where players remember all information. However, most of the algorithmic results are negative for imperfect recall games -- a Nash equilibrium~(NE) does not have to exist and computing a best response or a maxmin strategy is NP-hard. We focus on a subclass of imperfect recall games, called A-loss recall games, where a best response can be found in polynomial time. We derive novel properties of A-loss recall games, including (1) a sufficient and necessary condition for the existence of NE in A-loss recall games, (2) example where both NE and maxmin require irrational numbers for rational input, and (3) NP-hardness of problems related to finding maxmin strategies and existence of a NE strategy. ",jiri cermak,,2016.0,,arXiv,Cermak2016,True,,arXiv,Not available,"Solution Concepts in A-Loss Recall Games: Existence and Computational Complexity",967435ea7f0413b5f0619e0b70ced118,http://arxiv.org/abs/1608.01500v3 11432," Imperfect recall games represent dynamic interactions where players forget previously known information, such as a history of played actions. The importance of imperfect recall games stems from allowing a concise representation of strategies compared to perfect recall games where players remember all information. However, most of the algorithmic results are negative for imperfect recall games -- a Nash equilibrium~(NE) does not have to exist and computing a best response or a maxmin strategy is NP-hard. We focus on a subclass of imperfect recall games, called A-loss recall games, where a best response can be found in polynomial time. We derive novel properties of A-loss recall games, including (1) a sufficient and necessary condition for the existence of NE in A-loss recall games, (2) example where both NE and maxmin require irrational numbers for rational input, and (3) NP-hardness of problems related to finding maxmin strategies and existence of a NE strategy. ",branislav bosansky,,2016.0,,arXiv,Cermak2016,True,,arXiv,Not available,"Solution Concepts in A-Loss Recall Games: Existence and Computational Complexity",967435ea7f0413b5f0619e0b70ced118,http://arxiv.org/abs/1608.01500v3 11433," Imperfect recall games represent dynamic interactions where players forget previously known information, such as a history of played actions. The importance of imperfect recall games stems from allowing a concise representation of strategies compared to perfect recall games where players remember all information. However, most of the algorithmic results are negative for imperfect recall games -- a Nash equilibrium~(NE) does not have to exist and computing a best response or a maxmin strategy is NP-hard. We focus on a subclass of imperfect recall games, called A-loss recall games, where a best response can be found in polynomial time. We derive novel properties of A-loss recall games, including (1) a sufficient and necessary condition for the existence of NE in A-loss recall games, (2) example where both NE and maxmin require irrational numbers for rational input, and (3) NP-hardness of problems related to finding maxmin strategies and existence of a NE strategy. ",michal pechoucek,,2016.0,,arXiv,Cermak2016,True,,arXiv,Not available,"Solution Concepts in A-Loss Recall Games: Existence and Computational Complexity",967435ea7f0413b5f0619e0b70ced118,http://arxiv.org/abs/1608.01500v3 11434," Energy games, which model quantitative consumption of a limited resource, e.g., time or energy, play a central role in quantitative models for reactive systems. Reactive synthesis constructs a controller which satisfies a given specification, if one exists. For energy games a synthesized controller ensures to satisfy not only the safety constraints of the specification but also the quantitative constraints expressed in the energy game. A symbolic algorithm for energy games, recently presented by Chatterjee et al., is symbolic in its representation of quantitative values but concrete in the representation of game states and transitions. In this paper we present an algorithm that is symbolic both in the quantitative values and in the underlying game representation. We have implemented our algorithm using two different symbolic representations for reactive games, Binary Decision Diagrams (BDD) and Algebraic Decision Diagrams (ADD). We investigate the commonalities and differences of the two implementations and compare their running times on specifications of energy games. ",shahar maoz,,2016.0,10.4204/EPTCS.229.5,"EPTCS 229, 2016, pp. 35-54",Maoz2016,True,,arXiv,Not available,Symbolic BDD and ADD Algorithms for Energy Games,e36f3d04821e168b5c50395f793e51f2,http://arxiv.org/abs/1611.07622v1 11435," Energy games, which model quantitative consumption of a limited resource, e.g., time or energy, play a central role in quantitative models for reactive systems. Reactive synthesis constructs a controller which satisfies a given specification, if one exists. For energy games a synthesized controller ensures to satisfy not only the safety constraints of the specification but also the quantitative constraints expressed in the energy game. A symbolic algorithm for energy games, recently presented by Chatterjee et al., is symbolic in its representation of quantitative values but concrete in the representation of game states and transitions. In this paper we present an algorithm that is symbolic both in the quantitative values and in the underlying game representation. We have implemented our algorithm using two different symbolic representations for reactive games, Binary Decision Diagrams (BDD) and Algebraic Decision Diagrams (ADD). We investigate the commonalities and differences of the two implementations and compare their running times on specifications of energy games. ",or pistiner,,2016.0,10.4204/EPTCS.229.5,"EPTCS 229, 2016, pp. 35-54",Maoz2016,True,,arXiv,Not available,Symbolic BDD and ADD Algorithms for Energy Games,e36f3d04821e168b5c50395f793e51f2,http://arxiv.org/abs/1611.07622v1 11436," Energy games, which model quantitative consumption of a limited resource, e.g., time or energy, play a central role in quantitative models for reactive systems. Reactive synthesis constructs a controller which satisfies a given specification, if one exists. For energy games a synthesized controller ensures to satisfy not only the safety constraints of the specification but also the quantitative constraints expressed in the energy game. A symbolic algorithm for energy games, recently presented by Chatterjee et al., is symbolic in its representation of quantitative values but concrete in the representation of game states and transitions. In this paper we present an algorithm that is symbolic both in the quantitative values and in the underlying game representation. We have implemented our algorithm using two different symbolic representations for reactive games, Binary Decision Diagrams (BDD) and Algebraic Decision Diagrams (ADD). We investigate the commonalities and differences of the two implementations and compare their running times on specifications of energy games. ",jan ringert,,2016.0,10.4204/EPTCS.229.5,"EPTCS 229, 2016, pp. 35-54",Maoz2016,True,,arXiv,Not available,Symbolic BDD and ADD Algorithms for Energy Games,e36f3d04821e168b5c50395f793e51f2,http://arxiv.org/abs/1611.07622v1 11437," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",hiromitsu hattori,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 11438," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",makoto yokoo,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 11439," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",yuko sakurai,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 11440," We introduce a new solution concept, called periodicity, for selecting optimal strategies in strategic form games. This periodicity solution concept yields new insight into non-trivial games. In mixed strategy strategic form games, periodic solutions yield values for the utility function of each player that are equal to the Nash equilibrium ones. In contrast to the Nash strategies, here the payoffs of each player are robust against what the opponent plays. Sometimes, periodicity strategies yield higher utilities, and sometimes the Nash strategies do, but often the utilities of these two strategies coincide. We formally define and study periodic strategies in two player perfect information strategic form games with pure strategies and we prove that every non-trivial finite game has at least one periodic strategy, with non-trivial meaning non-degenerate payoffs. In some classes of games where mixed strategies are used, we identify quantitative features. Particularly interesting are the implications for collective action games, since there the collective action strategy can be incorporated in a purely non-cooperative context. Moreover, we address the periodicity issue when the players have a continuum set of strategies available. ",j. jost,,2013.0,10.1142/S0219525917500096,"Advances in Complex Systems, Vol. 20, No. 5 (2017) 1750009",Oikonomou2013,True,,arXiv,Not available,"Periodic Strategies: A New Solution Concept and an Algorithm for NonTrivial Strategic Form Games",83d5b3f6f1e2e01f40b657ea9e28495e,http://arxiv.org/abs/1307.2035v4 11441," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",toramatsu shintani,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 11442," We consider the well known, and notoriously difficult, problem of a single revenue-maximizing seller selling two or more heterogeneous goods to a single buyer whose private values for the goods are drawn from a (possibly correlated) known distribution, and whose valuation is additive over the goods. We show that when there are two (or more) goods, _simple mechanisms_ -- such as selling the goods separately or as a bundle -- _may yield only a negligible fraction of the optimal revenue_. This resolves the open problem of Briest, Chawla, Kleinberg, and Weinberg (JET 2015) who prove the result for at least three goods in the related setup of a unit-demand buyer. We also introduce the menu size as a simple measure of the complexity of mechanisms, and show that the revenue may increase polynomially with _menu size_ and that no bounded menu size can ensure any positive fraction of the optimal revenue. The menu size also turns out to ""pin down"" the revenue properties of deterministic mechanisms. ",sergiu hart,,2013.0,,arXiv,Hart2013,True,,arXiv,Not available,"Selling Multiple Correlated Goods: Revenue Maximization and Menu-Size Complexity (old title: ""The Menu-Size Complexity of Auctions"")",26b610af615c7c72025173d60c61f9bb,http://arxiv.org/abs/1304.6116v3 11443," We consider the well known, and notoriously difficult, problem of a single revenue-maximizing seller selling two or more heterogeneous goods to a single buyer whose private values for the goods are drawn from a (possibly correlated) known distribution, and whose valuation is additive over the goods. We show that when there are two (or more) goods, _simple mechanisms_ -- such as selling the goods separately or as a bundle -- _may yield only a negligible fraction of the optimal revenue_. This resolves the open problem of Briest, Chawla, Kleinberg, and Weinberg (JET 2015) who prove the result for at least three goods in the related setup of a unit-demand buyer. We also introduce the menu size as a simple measure of the complexity of mechanisms, and show that the revenue may increase polynomially with _menu size_ and that no bounded menu size can ensure any positive fraction of the optimal revenue. The menu size also turns out to ""pin down"" the revenue properties of deterministic mechanisms. ",noam nisan,,2013.0,,arXiv,Hart2013,True,,arXiv,Not available,"Selling Multiple Correlated Goods: Revenue Maximization and Menu-Size Complexity (old title: ""The Menu-Size Complexity of Auctions"")",26b610af615c7c72025173d60c61f9bb,http://arxiv.org/abs/1304.6116v3 11444," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",chen xu,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11445," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",lingyang song,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11446," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",zhu han,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11447," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",qun zhao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11448," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiaoli wang,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11449," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiang cheng,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11450," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",bingli jiao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 11451," Sharing unused vehicles is one practical solution for traffic congestion. We propose an advanced vehicle-sharing service that maximizes the sharing of vehicles and improves traffic efficiency by coordinating user trips via an information system. We formulate ride-sharing games that model externalities in vehicle sharing caused by insufficient vehicle supply. We show how Bayes correlated equilibrium can coordinate players in ride-sharing games and verify the resultant improvement in the price of anarchy. ",takahiro shiga,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,Coordination of Players in Ride-Sharing Games by Signaling,b9533bd921fb374e92ba398a8abe854c,http://arxiv.org/abs/1604.00706v1 11452," We propose the study of computing the Shapley value for a new class of cooperative games that we call budgeted games, and investigate in particular knapsack budgeted games, a version modeled after the classical knapsack problem. In these games, the ""value"" of a set $S$ of agents is determined only by a critical subset $T\subseteq S$ of the agents and not the entirety of $S$ due to a budget constraint that limits how large $T$ can be. We show that the Shapley value can be computed in time faster than by the na\""ive exponential time algorithm when there are sufficiently many agents, and also provide an algorithm that approximates the Shapley value within an additive error. For a related budgeted game associated with a greedy heuristic, we show that the Shapley value can be computed in pseudo-polynomial time. Furthermore, we generalize our proof techniques and propose what we term algorithmic representation framework that captures a broad class of cooperative games with the property of efficient computation of the Shapley value. The main idea is that the problem of determining the efficient computation can be reduced to that of finding an alternative representation of the games and an associated algorithm for computing the underlying value function with small time and space complexities in the representation size. ",smriti bhagat,,2014.0,,arXiv,Bhagat2014,True,,arXiv,Not available,The Shapley Value in Knapsack Budgeted Games,032a0d86723c7d5d5b93ac865324bed3,http://arxiv.org/abs/1409.5200v1 11453," In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations. ",jonathan donier,,2015.0,10.1088/1742-5468/aa4e8e,arXiv,Donier2015,True,,arXiv,Not available,"From Walras' auctioneer to continuous time double auctions: A general dynamic theory of supply and demand",7a64809be5215b76462cff360e99b6e2,http://arxiv.org/abs/1506.03758v1 11454," In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations. ",jean-philippe bouchaud,,2015.0,10.1088/1742-5468/aa4e8e,arXiv,Donier2015,True,,arXiv,Not available,"From Walras' auctioneer to continuous time double auctions: A general dynamic theory of supply and demand",7a64809be5215b76462cff360e99b6e2,http://arxiv.org/abs/1506.03758v1 11455," In Zeng et al. [Fluct. Noise Lett. 7 (2007) L439--L447] the analysis of the lowest unique positive integer game is simplified by some reasonable assumptions that make the problem tractable for arbitrary numbers of players. However, here we show that the solution obtained for rational players is not a Nash equilibrium and that a rational utility maximizer with full computational capability would arrive at a solution with a superior expected payoff. An exact solution is presented for the three- and four-player cases and an approximate solution for an arbitrary number of players. ",adrian flitney,,2008.0,,Fluct. Noise Lett. 8 (2008) C1-C4,Flitney2008,True,,arXiv,Not available,"Comments on ""Reverse auction: the lowest positive integer game""",25fd8ccd4c07b9b0d8fb8e37e9f30047,http://arxiv.org/abs/0801.1535v1 11456," As the number of resources on chip multiprocessors (CMPs) increases, the complexity of how to best allocate these resources increases drastically. Because the higher number of applications makes the interaction and impacts of various memory levels more complex. Also, the selection of the objective function to define what \enquote{best} means for all applications is challenging. Memory-level parallelism (MLP) aware replacement algorithms in CMPs try to maximize the overall system performance or equalize each application's performance degradation due to sharing. However, depending on the selected \enquote{performance} metric, these algorithms are not efficiently implemented, because these centralized approaches mostly need some further information regarding about applications' need. In this paper, we propose a contention-aware game-theoretic resource management approach (CARMA) using market auction mechanism to find an optimal strategy for each application in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we consider two cases: (i) cache competition game, and (ii) main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches. ",farshid farhat,,2017.0,,arXiv,Farhat2017,True,,arXiv,Not available,"CARMA: Contention-aware Auction-based Resource Management in Architecture",e96a94cf2967d68de4e7a03781cd9312,http://arxiv.org/abs/1710.00073v4 11457," As the number of resources on chip multiprocessors (CMPs) increases, the complexity of how to best allocate these resources increases drastically. Because the higher number of applications makes the interaction and impacts of various memory levels more complex. Also, the selection of the objective function to define what \enquote{best} means for all applications is challenging. Memory-level parallelism (MLP) aware replacement algorithms in CMPs try to maximize the overall system performance or equalize each application's performance degradation due to sharing. However, depending on the selected \enquote{performance} metric, these algorithms are not efficiently implemented, because these centralized approaches mostly need some further information regarding about applications' need. In this paper, we propose a contention-aware game-theoretic resource management approach (CARMA) using market auction mechanism to find an optimal strategy for each application in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we consider two cases: (i) cache competition game, and (ii) main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches. ",diman tootaghaj,,2017.0,,arXiv,Farhat2017,True,,arXiv,Not available,"CARMA: Contention-aware Auction-based Resource Management in Architecture",e96a94cf2967d68de4e7a03781cd9312,http://arxiv.org/abs/1710.00073v4 11458," An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an ""integrated"" wireless network access model that enables users to enjoy mobility, seamless access and high quality of service in an all-IP network on an ""Anytime, Anywhere"" basis. The term ""integrated"" is used to denote that the Future Internet wireless ""last mile"" is expected to comprise multiple heterogeneous geographically coexisting wireless networks, each having different capacity and coverage radius. The efficient management of the wireless access network resources is crucial due to their scarcity that renders wireless access a potential bottleneck for the provision of high quality services. In this paper we propose an auction mechanism for allocating the bandwidth of such a network so that efficiency is attained, i.e. social welfare is maximized. In particular, we propose an incentive-compatible, efficient auction-based mechanism of low computational complexity. We define a repeated game to address user utilities and incentives issues. Subsequently, we extend this mechanism so that it can also accommodate multicast sessions. We also analyze the computational complexity and message overhead of the proposed mechanism. We then show how user bids can be replaced from weights generated by the network and transform the auction to a cooperative mechanism capable of prioritizing certain classes of services and emulating DiffServ and time-of-day pricing schemes. The theoretical analysis is complemented by simulations that assess the proposed mechanisms properties and performance. We finally provide some concluding remarks and directions for future research. ",emmanouil dramitinos,,2010.0,,arXiv,Dramitinos2010,True,,arXiv,Not available,"Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet",d216f8395291d73be3f794b8248f3c63,http://arxiv.org/abs/1001.5194v1 11459," An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an ""integrated"" wireless network access model that enables users to enjoy mobility, seamless access and high quality of service in an all-IP network on an ""Anytime, Anywhere"" basis. The term ""integrated"" is used to denote that the Future Internet wireless ""last mile"" is expected to comprise multiple heterogeneous geographically coexisting wireless networks, each having different capacity and coverage radius. The efficient management of the wireless access network resources is crucial due to their scarcity that renders wireless access a potential bottleneck for the provision of high quality services. In this paper we propose an auction mechanism for allocating the bandwidth of such a network so that efficiency is attained, i.e. social welfare is maximized. In particular, we propose an incentive-compatible, efficient auction-based mechanism of low computational complexity. We define a repeated game to address user utilities and incentives issues. Subsequently, we extend this mechanism so that it can also accommodate multicast sessions. We also analyze the computational complexity and message overhead of the proposed mechanism. We then show how user bids can be replaced from weights generated by the network and transform the auction to a cooperative mechanism capable of prioritizing certain classes of services and emulating DiffServ and time-of-day pricing schemes. The theoretical analysis is complemented by simulations that assess the proposed mechanisms properties and performance. We finally provide some concluding remarks and directions for future research. ",isabelle lassous,,2010.0,,arXiv,Dramitinos2010,True,,arXiv,Not available,"Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet",d216f8395291d73be3f794b8248f3c63,http://arxiv.org/abs/1001.5194v1 11460," The ultimate value of theories of the fundamental mechanisms comprising the asset price in financial systems will be reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidences from the fields of finance, mathematics, and even physics to explain states observed in the real financial markets, previous theories that attempt to fully explain the complexities of financial markets have been inadequate. In this study, we propose an artificial double auction market as an agent-based model approach to study the origin of complex states in the financial markets, characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategy of chartist traders after market information arrives should reduce market stability originating in the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders with a fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by a fraction of chartists, P_{c}. We show that mimicking real financial markets state, which emerges in real financial systems, is given between approximately P_{c} = 0.40 and P_{c} = 0.85, but that mimicking the efficient market hypothesis state can be generated in a range of less than P_{c} = 0.40. In particular, we observe that the mimicking market collapse state created in a value greater than P_{c} = 0.85, in which a liquidity shortage occurs, and the phase transition behavior is P_{c} = 0.85. ",kyubin yim,,2015.0,10.1371/journal.pone.0152608,arXiv,Yim2015,True,,arXiv,Not available,"Understanding Financial Market States Using Artificial Double Auction Market",cde9982f5c460c98ee88315d2d0776f9,http://arxiv.org/abs/1503.00913v1 11461," The ultimate value of theories of the fundamental mechanisms comprising the asset price in financial systems will be reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidences from the fields of finance, mathematics, and even physics to explain states observed in the real financial markets, previous theories that attempt to fully explain the complexities of financial markets have been inadequate. In this study, we propose an artificial double auction market as an agent-based model approach to study the origin of complex states in the financial markets, characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategy of chartist traders after market information arrives should reduce market stability originating in the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders with a fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by a fraction of chartists, P_{c}. We show that mimicking real financial markets state, which emerges in real financial systems, is given between approximately P_{c} = 0.40 and P_{c} = 0.85, but that mimicking the efficient market hypothesis state can be generated in a range of less than P_{c} = 0.40. In particular, we observe that the mimicking market collapse state created in a value greater than P_{c} = 0.85, in which a liquidity shortage occurs, and the phase transition behavior is P_{c} = 0.85. ",gabjin oh,,2015.0,10.1371/journal.pone.0152608,arXiv,Yim2015,True,,arXiv,Not available,"Understanding Financial Market States Using Artificial Double Auction Market",cde9982f5c460c98ee88315d2d0776f9,http://arxiv.org/abs/1503.00913v1 11462," The ultimate value of theories of the fundamental mechanisms comprising the asset price in financial systems will be reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidences from the fields of finance, mathematics, and even physics to explain states observed in the real financial markets, previous theories that attempt to fully explain the complexities of financial markets have been inadequate. In this study, we propose an artificial double auction market as an agent-based model approach to study the origin of complex states in the financial markets, characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategy of chartist traders after market information arrives should reduce market stability originating in the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders with a fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by a fraction of chartists, P_{c}. We show that mimicking real financial markets state, which emerges in real financial systems, is given between approximately P_{c} = 0.40 and P_{c} = 0.85, but that mimicking the efficient market hypothesis state can be generated in a range of less than P_{c} = 0.40. In particular, we observe that the mimicking market collapse state created in a value greater than P_{c} = 0.85, in which a liquidity shortage occurs, and the phase transition behavior is P_{c} = 0.85. ",seunghwan kim,,2015.0,10.1371/journal.pone.0152608,arXiv,Yim2015,True,,arXiv,Not available,"Understanding Financial Market States Using Artificial Double Auction Market",cde9982f5c460c98ee88315d2d0776f9,http://arxiv.org/abs/1503.00913v1 11463," We propose the study of computing the Shapley value for a new class of cooperative games that we call budgeted games, and investigate in particular knapsack budgeted games, a version modeled after the classical knapsack problem. In these games, the ""value"" of a set $S$ of agents is determined only by a critical subset $T\subseteq S$ of the agents and not the entirety of $S$ due to a budget constraint that limits how large $T$ can be. We show that the Shapley value can be computed in time faster than by the na\""ive exponential time algorithm when there are sufficiently many agents, and also provide an algorithm that approximates the Shapley value within an additive error. For a related budgeted game associated with a greedy heuristic, we show that the Shapley value can be computed in pseudo-polynomial time. Furthermore, we generalize our proof techniques and propose what we term algorithmic representation framework that captures a broad class of cooperative games with the property of efficient computation of the Shapley value. The main idea is that the problem of determining the efficient computation can be reduced to that of finding an alternative representation of the games and an associated algorithm for computing the underlying value function with small time and space complexities in the representation size. ",anthony kim,,2014.0,,arXiv,Bhagat2014,True,,arXiv,Not available,The Shapley Value in Knapsack Budgeted Games,032a0d86723c7d5d5b93ac865324bed3,http://arxiv.org/abs/1409.5200v1 11464," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",jianwei huang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 11465," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",zhu han,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 11466," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",mung chiang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 11467," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",h. poor,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 11468," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",srinivas reddy,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 11469," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",mayukh dass,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 11470," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",hu fu,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 11471," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",chris liaw,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 11472," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",pinyan lu,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 11473," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",zhihao tang,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 11474," We propose the study of computing the Shapley value for a new class of cooperative games that we call budgeted games, and investigate in particular knapsack budgeted games, a version modeled after the classical knapsack problem. In these games, the ""value"" of a set $S$ of agents is determined only by a critical subset $T\subseteq S$ of the agents and not the entirety of $S$ due to a budget constraint that limits how large $T$ can be. We show that the Shapley value can be computed in time faster than by the na\""ive exponential time algorithm when there are sufficiently many agents, and also provide an algorithm that approximates the Shapley value within an additive error. For a related budgeted game associated with a greedy heuristic, we show that the Shapley value can be computed in pseudo-polynomial time. Furthermore, we generalize our proof techniques and propose what we term algorithmic representation framework that captures a broad class of cooperative games with the property of efficient computation of the Shapley value. The main idea is that the problem of determining the efficient computation can be reduced to that of finding an alternative representation of the games and an associated algorithm for computing the underlying value function with small time and space complexities in the representation size. ",s. muthukrishnan,,2014.0,,arXiv,Bhagat2014,True,,arXiv,Not available,The Shapley Value in Knapsack Budgeted Games,032a0d86723c7d5d5b93ac865324bed3,http://arxiv.org/abs/1409.5200v1 11475," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",orcun karaca,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 11476," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",pier sessa,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 11477," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",neil walton,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 11478," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",maryam kamgarpour,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 11479," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",li-hsing yen,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 11480," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",guang-hong sun,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 11481," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",hedyeh beyhaghi,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 11482," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",negin golrezaei,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 11483," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",renato leme,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 11484," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",martin pal,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 11485," We propose the study of computing the Shapley value for a new class of cooperative games that we call budgeted games, and investigate in particular knapsack budgeted games, a version modeled after the classical knapsack problem. In these games, the ""value"" of a set $S$ of agents is determined only by a critical subset $T\subseteq S$ of the agents and not the entirety of $S$ due to a budget constraint that limits how large $T$ can be. We show that the Shapley value can be computed in time faster than by the na\""ive exponential time algorithm when there are sufficiently many agents, and also provide an algorithm that approximates the Shapley value within an additive error. For a related budgeted game associated with a greedy heuristic, we show that the Shapley value can be computed in pseudo-polynomial time. Furthermore, we generalize our proof techniques and propose what we term algorithmic representation framework that captures a broad class of cooperative games with the property of efficient computation of the Shapley value. The main idea is that the problem of determining the efficient computation can be reduced to that of finding an alternative representation of the games and an associated algorithm for computing the underlying value function with small time and space complexities in the representation size. ",udi weinsberg,,2014.0,,arXiv,Bhagat2014,True,,arXiv,Not available,The Shapley Value in Knapsack Budgeted Games,032a0d86723c7d5d5b93ac865324bed3,http://arxiv.org/abs/1409.5200v1 11486," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",balasubramanian siva,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 11487," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",gianluca brero,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 11488," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sebastien lahaie,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 11489," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sven seuken,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 11490," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",benny lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 11491," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",daniel lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 11492," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",noam nisan,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 11493," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",simone pigolotti,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 11494," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",sebastian bernhardsson,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 11495," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",jeppe juul,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 11496," Strategy improvement is a widely-used and well-studied class of algorithms for solving graph-based infinite games. These algorithms are parameterized by a switching rule, and one of the most natural rules is ""all switches"" which switches as many edges as possible in each iteration. Continuing a recent line of work, we study all-switches strategy improvement from the perspective of computational complexity. We consider two natural decision problems, both of which have as input a game $G$, a starting strategy $s$, and an edge $e$. The problems are: 1.) The edge switch problem, namely, is the edge $e$ ever switched by all-switches strategy improvement when it is started from $s$ on game $G$? 2.) The optimal strategy problem, namely, is the edge $e$ used in the final strategy that is found by strategy improvement when it is started from $s$ on game $G$? We show $\mathtt{PSPACE}$-completeness of the edge switch problem and optimal strategy problem for the following settings: Parity games with the discrete strategy improvement algorithm of V\""oge and Jurdzi\'nski; mean-payoff games with the gain-bias algorithm [14,37]; and discounted-payoff games and simple stochastic games with their standard strategy improvement algorithms. We also show $\mathtt{PSPACE}$-completeness of an analogous problem to edge switch for the bottom-antipodal algorithm for finding the sink of an Acyclic Unique Sink Orientation on a cube. ",john fearnley,,2015.0,10.23638/LMCS-14(4:9)2018,arXiv,Fearnley2015,True,,arXiv,Not available,The Complexity of All-switches Strategy Improvement,5268c0043cb8ed16ffdee6b87338d971,http://arxiv.org/abs/1507.04500v4 11497," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",gorm galster,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 11498," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",pierpaolo vivo,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 11503," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",jianwei huang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 11504," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",zhu han,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 11505," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",mung chiang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 11506," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",h. poor,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 11507," Strategy improvement is a widely-used and well-studied class of algorithms for solving graph-based infinite games. These algorithms are parameterized by a switching rule, and one of the most natural rules is ""all switches"" which switches as many edges as possible in each iteration. Continuing a recent line of work, we study all-switches strategy improvement from the perspective of computational complexity. We consider two natural decision problems, both of which have as input a game $G$, a starting strategy $s$, and an edge $e$. The problems are: 1.) The edge switch problem, namely, is the edge $e$ ever switched by all-switches strategy improvement when it is started from $s$ on game $G$? 2.) The optimal strategy problem, namely, is the edge $e$ used in the final strategy that is found by strategy improvement when it is started from $s$ on game $G$? We show $\mathtt{PSPACE}$-completeness of the edge switch problem and optimal strategy problem for the following settings: Parity games with the discrete strategy improvement algorithm of V\""oge and Jurdzi\'nski; mean-payoff games with the gain-bias algorithm [14,37]; and discounted-payoff games and simple stochastic games with their standard strategy improvement algorithms. We also show $\mathtt{PSPACE}$-completeness of an analogous problem to edge switch for the bottom-antipodal algorithm for finding the sink of an Acyclic Unique Sink Orientation on a cube. ",rahul savani,,2015.0,10.23638/LMCS-14(4:9)2018,arXiv,Fearnley2015,True,,arXiv,Not available,The Complexity of All-switches Strategy Improvement,5268c0043cb8ed16ffdee6b87338d971,http://arxiv.org/abs/1507.04500v4 11508," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",xinyang deng,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 11509," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",yong deng,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 11510," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",qi liu,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 11511," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",zhen wang,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 11512," This paper extends the theory of subset team games, a generalization of cooperative game theory requiring a payoff function that is defined for all subsets of players. This subset utility is used to define both altruistic and selfish contributions of a player to the team. We investigate properties of these games, and analyze the implications of altruism and selfishness for general situations, for prisoner's dilemma, and for a specific game with a Cobb-Douglas utility. ",elisha peterson,,2009.0,,arXiv,Peterson2009,True,,arXiv,Not available,Cooperation in Subset Team Games: Altruism and Selfishness,bf308965f8586ed86cb28b1e45ee4994,http://arxiv.org/abs/0907.2376v1 11513," We introduce several methods of decomposition for two player normal form games. Viewing the set of all games as a vector space, we exhibit explicit orthonormal bases for the subspaces of potential games, zero-sum games, and their orthogonal complements which we call anti-potential games and anti-zero-sum games, respectively. Perhaps surprisingly, every anti-potential game comes either from the Rock-Paper-Scissors type games (in the case of symmetric games) or from the Matching Pennies type games (in the case of asymmetric games). Using these decompositions, we prove old (and some new) cycle criteria for potential and zero-sum games (as orthogonality relations between subspaces). We illustrate the usefulness of our decomposition by (a) analyzing the generalized Rock-Paper-Scissors game, (b) completely characterizing the set of all null-stable games, (c) providing a large class of strict stable games, (d) relating the game decomposition to the decomposition of vector fields for the replicator equations, (e) constructing Lyapunov functions for some replicator dynamics, and (f) constructing Zeeman games -games with an interior asymptotically stable Nash equilibrium and a pure strategy ESS. ",sung-ha hwang,,2011.0,,arXiv,Hwang2011,True,,arXiv,Not available,"Decompositions of two player games: potential, zero-sum, and stable games",99fcb9950abf8f9f1d8f2f7206c037bd,http://arxiv.org/abs/1106.3552v2 11514," We introduce several methods of decomposition for two player normal form games. Viewing the set of all games as a vector space, we exhibit explicit orthonormal bases for the subspaces of potential games, zero-sum games, and their orthogonal complements which we call anti-potential games and anti-zero-sum games, respectively. Perhaps surprisingly, every anti-potential game comes either from the Rock-Paper-Scissors type games (in the case of symmetric games) or from the Matching Pennies type games (in the case of asymmetric games). Using these decompositions, we prove old (and some new) cycle criteria for potential and zero-sum games (as orthogonality relations between subspaces). We illustrate the usefulness of our decomposition by (a) analyzing the generalized Rock-Paper-Scissors game, (b) completely characterizing the set of all null-stable games, (c) providing a large class of strict stable games, (d) relating the game decomposition to the decomposition of vector fields for the replicator equations, (e) constructing Lyapunov functions for some replicator dynamics, and (f) constructing Zeeman games -games with an interior asymptotically stable Nash equilibrium and a pure strategy ESS. ",luc rey-bellet,,2011.0,,arXiv,Hwang2011,True,,arXiv,Not available,"Decompositions of two player games: potential, zero-sum, and stable games",99fcb9950abf8f9f1d8f2f7206c037bd,http://arxiv.org/abs/1106.3552v2 11515," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",neil ghani,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 11516," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",jules hedges,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 11517," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",viktor winschel,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 11518," Game theory provides a general mathematical background to study the effect of pair interactions and evolutionary rules on the macroscopic behavior of multi-player games where players with a finite number of strategies may represent a wide scale of biological objects, human individuals, or even their associations. In these systems the interactions are characterized by matrices that can be decomposed into elementary matrices (games) and classified into four types. The concept of decomposition helps the identification of potential games and also the evaluation of the potential that plays a crucial role in the determination of the preferred Nash equilibrium, and defines the Boltzmann distribution towards which these systems evolve for suitable types of dynamical rules. This survey draws parallel between the potential games and the kinetic Ising type models which are investigated for a wide scale of connectivity structures. We discuss briefly the applicability of the tools and concepts of statistical physics and thermodynamics. Additionally the general features of ordering phenomena, phase transitions and slow relaxations are outlined and applied to evolutionary games. The discussion extends to games with three or more strategies. Finally we discuss what happens when the system is weakly driven out of the ""equilibrium state"" by switching on non-potential components representing games of cyclic dominance. ",gyorgy szabo,,2015.0,10.1016/j.physrep.2016.02.006,arXiv,Szabo2015,True,,arXiv,Not available,Evolutionary potential games on lattices,77fbbef257a257dfcab9fc7460eb4249,http://arxiv.org/abs/1508.03147v2 11519," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",philipp zahn,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 11520," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",erich graedel,,2006.0,,arXiv,Graedel2006,True,,arXiv,Not available,Postinal Determinacy of Games with Infinitely Many Priorities,ce6650a5254159cd89375e1a066375b4,http://arxiv.org/abs/cs/0610034v2 11521," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",igor walukiewicz,,2006.0,,arXiv,Graedel2006,True,,arXiv,Not available,Postinal Determinacy of Games with Infinitely Many Priorities,ce6650a5254159cd89375e1a066375b4,http://arxiv.org/abs/cs/0610034v2 11522," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",erich graedel,,2006.0,10.2168/LMCS-2(4:6)2006,"Logical Methods in Computer Science, Volume 2, Issue 4 (November 3, 2006) lmcs:2242",Graedel2006,True,,arXiv,Not available,Positional Determinacy of Games with Infinitely Many Priorities,1a617bb2e2d376fb38e6ec667b9dabaf,http://arxiv.org/abs/cs/0610035v2 11523," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",igor walukiewicz,,2006.0,10.2168/LMCS-2(4:6)2006,"Logical Methods in Computer Science, Volume 2, Issue 4 (November 3, 2006) lmcs:2242",Graedel2006,True,,arXiv,Not available,Positional Determinacy of Games with Infinitely Many Priorities,1a617bb2e2d376fb38e6ec667b9dabaf,http://arxiv.org/abs/cs/0610035v2 11524," Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objective. Our main results are as follows: (a) exponential memory is necessary and sufficient for winning strategies in energy parity games; (b) the problem of deciding the winner in energy parity games can be solved in NP \cap coNP; and (c) we give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is polynomially equivalent to the problem of deciding the winner in mean-payoff parity games, while optimal strategies may require infinite memory in mean-payoff parity games. As a consequence we obtain a conceptually simple algorithm to solve mean-payoff parity games. ",krishnendu chatterjee,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Energy Parity Games,f78f4db9fa6d62bd65bf6d7c942a58bd,http://arxiv.org/abs/1001.5183v4 11525," Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objective. Our main results are as follows: (a) exponential memory is necessary and sufficient for winning strategies in energy parity games; (b) the problem of deciding the winner in energy parity games can be solved in NP \cap coNP; and (c) we give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is polynomially equivalent to the problem of deciding the winner in mean-payoff parity games, while optimal strategies may require infinite memory in mean-payoff parity games. As a consequence we obtain a conceptually simple algorithm to solve mean-payoff parity games. ",laurent doyen,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Energy Parity Games,f78f4db9fa6d62bd65bf6d7c942a58bd,http://arxiv.org/abs/1001.5183v4 11526," We present a new model of incomplete information games without private information in which the players use a distributionally robust optimization approach to cope with the payoff uncertainty. With some specific restrictions, we show that our ""Distributionally Robust Game"" constitutes a true generalization of three popular finite games. These are the Complete Information Games, Bayesian Games and Robust Games. Subsequently, we prove that the set of equilibria of an arbitrary distributionally robust game with specified ambiguity set can be computed as the component-wise projection of the solution set of a multi-linear system of equations and inequalities. For special cases of such games we show equivalence to complete information finite games (Nash Games) with the same number of players and same action spaces. Thus, when our game falls within these special cases one can simply solve the corresponding Nash Game. Finally, we demonstrate the applicability of our new model of games and highlight its importance. ",nicolas loizou,,2016.0,10.5220/0005753301860196,arXiv,Loizou2016,True,,arXiv,Not available,Distributionally Robust Games with Risk-averse Players,d2ccb37137357b659190074e1801af95,http://arxiv.org/abs/1610.00651v1 11527," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",sven schewe,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 11528," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",alexander weinert,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 11529," Game theory provides a general mathematical background to study the effect of pair interactions and evolutionary rules on the macroscopic behavior of multi-player games where players with a finite number of strategies may represent a wide scale of biological objects, human individuals, or even their associations. In these systems the interactions are characterized by matrices that can be decomposed into elementary matrices (games) and classified into four types. The concept of decomposition helps the identification of potential games and also the evaluation of the potential that plays a crucial role in the determination of the preferred Nash equilibrium, and defines the Boltzmann distribution towards which these systems evolve for suitable types of dynamical rules. This survey draws parallel between the potential games and the kinetic Ising type models which are investigated for a wide scale of connectivity structures. We discuss briefly the applicability of the tools and concepts of statistical physics and thermodynamics. Additionally the general features of ordering phenomena, phase transitions and slow relaxations are outlined and applied to evolutionary games. The discussion extends to games with three or more strategies. Finally we discuss what happens when the system is weakly driven out of the ""equilibrium state"" by switching on non-potential components representing games of cyclic dominance. ",istvan borsos,,2015.0,10.1016/j.physrep.2016.02.006,arXiv,Szabo2015,True,,arXiv,Not available,Evolutionary potential games on lattices,77fbbef257a257dfcab9fc7460eb4249,http://arxiv.org/abs/1508.03147v2 11530," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",martin zimmermann,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 11531," Traditional game theory assumes that the players in the game are aware of the rules of the game. However, in practice, often the players are unaware or have only partial knowledge about the game they are playing. They may also have knowledge that other players have only partial knowledge of the game they are playing, which they can try to exploit. We present a novel mathematical formulation of such games. We make use of Kripke semantics, which are a way to keep track of what different players know and do not know about the world. We propose a notion of equilibrium for such games, and show that equilibrium always exists. ",manoj gopalkrishnan,,2014.0,,arXiv,Gopalkrishnan2014,True,,arXiv,Not available,Playing games in an uncertain world,3224d8c5e314fc5c0810f8edb8497a63,http://arxiv.org/abs/1402.4570v1 11532," Traditional game theory assumes that the players in the game are aware of the rules of the game. However, in practice, often the players are unaware or have only partial knowledge about the game they are playing. They may also have knowledge that other players have only partial knowledge of the game they are playing, which they can try to exploit. We present a novel mathematical formulation of such games. We make use of Kripke semantics, which are a way to keep track of what different players know and do not know about the world. We propose a notion of equilibrium for such games, and show that equilibrium always exists. ",girish varma,,2014.0,,arXiv,Gopalkrishnan2014,True,,arXiv,Not available,Playing games in an uncertain world,3224d8c5e314fc5c0810f8edb8497a63,http://arxiv.org/abs/1402.4570v1 11533," Using data obtained in a controlled ad-auction experiment that we ran, we evaluate the regret-based approach to econometrics that was recently suggested by Nekipelov, Syrgkanis, and Tardos (EC 2015). We found that despite the weak regret-based assumptions, the results were (at least) as accurate as those obtained using classic equilibrium-based assumptions. En route we studied to what extent humans actually minimize regret in our ad auction, and found a significant difference between the ""high types"" (players with a high valuation) who indeed rationally minimized regret and the ""low types"" who significantly overbid. We suggest that correcting for these biases and adjusting the regret-based econometric method may improve the accuracy of estimated values. ",noam nisan,,2016.0,10.1145/3038912.3052621,arXiv,Nisan2016,True,,arXiv,Not available,An Experimental Evaluation of Regret-Based Econometrics,442641c200499fbcbcc239815cfc291d,http://arxiv.org/abs/1605.03838v2 11534," Using data obtained in a controlled ad-auction experiment that we ran, we evaluate the regret-based approach to econometrics that was recently suggested by Nekipelov, Syrgkanis, and Tardos (EC 2015). We found that despite the weak regret-based assumptions, the results were (at least) as accurate as those obtained using classic equilibrium-based assumptions. En route we studied to what extent humans actually minimize regret in our ad auction, and found a significant difference between the ""high types"" (players with a high valuation) who indeed rationally minimized regret and the ""low types"" who significantly overbid. We suggest that correcting for these biases and adjusting the regret-based econometric method may improve the accuracy of estimated values. ",gali noti,,2016.0,10.1145/3038912.3052621,arXiv,Nisan2016,True,,arXiv,Not available,An Experimental Evaluation of Regret-Based Econometrics,442641c200499fbcbcc239815cfc291d,http://arxiv.org/abs/1605.03838v2 11535," The goal of an auction is to determine commodity prices such that all participants are perfectly happy. Such a solution is called a competitive equilibrium and does not exist in general. For this reason we are interested in solutions which are similar to a competitive equilibrium. The article introduces two relaxations of a competitive equilibrium for general auctions. Both relaxations determine one price per commodity by solving a difficult non-convex optimization problem. The first model is a mathematical program with equilibrium constraints (MPEC), which ensures that each participant is either perfectly happy or his bid is rejected. An exact algorithm and a heuristic are provided for this model. The second model is a relaxation of the first one and only ensures that no participant incurs a loss. In an optimal solution to the second model, no participant can be made better off without making another one worse off. ",johannes muller,,2013.0,,arXiv,Müller2013,True,,arXiv,Not available,Competitive Equilibrium Relaxations in General Auctions,717eceee956c9f6965a10ea07bc7d977,http://arxiv.org/abs/1307.2852v2 11536," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",erel segal-halevi,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 11537," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",avinatan hassidim,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 11538," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",yonatan aumann,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 11539," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",rad niazadeh,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 11540," We consider repeated zero-sum games with incomplete information on the side of Player 2 with the total payoff given by the non-normalized sum of stage gains. In the classical examples the value $V_N$ of such an $N$-stage game is of the order of $N$ or $\sqrt{N}$ as $N\to \infty$. Our aim is to find what is causing another type of asymptotic behavior of the value $V_N$ observed for the discrete version of the financial market model introduced by De Meyer and Saley. For this game Domansky and independently De Meyer with Marino found that $V_N$ remains bounded as $N\to\infty$ and converges to the limit value. This game is almost-fair, i.e., if Player 1 forgets his private information the value becomes zero. We describe a class of almost-fair games having bounded values in terms of an easy-checkable property of the auxiliary non-revealing game. We call this property the piecewise property, and it says that there exists an optimal strategy of Player 2 that is piecewise-constant as a function of a prior distribution $p$. Discrete market models have the piecewise property. We show that for non-piecewise almost-fair games with an additional non-degeneracy condition $V_N$ is of the order of $\sqrt{N}$. ",fedor sandomirskiy,,2015.0,,arXiv,Sandomirskiy2015,True,,arXiv,Not available,"On repeated zero-sum games with incomplete information and asymptotically bounded values",1add76defc42716f0b65cca879d8db2b,http://arxiv.org/abs/1509.01727v2 11541," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",christopher wilkens,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 11542," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",zhiyi huang,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 11543," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",jinyan liu,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 11544," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",xiangning wang,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 11545," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",nikhil devanur,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 11546," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",jason hartline,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 11547," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",qiqi yan,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 11548," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",yiding feng,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 11549," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",jason hartline,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 11551," We consider a game-theoretical problem called selfish 2-dimensional bin packing game, a generalization of the 1-dimensional case already treated in the literature. In this game, the items to be packed are rectangles, and the bins are unit squares. The game starts with a set of items arbitrarily packed in bins. The cost of an item is defined as the ratio between its area and the total occupied area of the respective bin. Each item is a selfish player that wants to minimize its cost. A migration of an item to another bin is allowed only when its cost is decreased. We show that this game always converges to a Nash equilibrium (a stable packing where no single item can decrease its cost by migrating to another bin). We show that the pure price of anarchy of this game is unbounded, so we address the particular case where all items are squares. We show that the pure price of anarchy of the selfish square packing game is at least 2.3634 and at most 2.6875. We also present analogous results for the strong Nash equilibrium (a stable packing where no nonempty set of items can simultaneously migrate to another common bin and decrease the cost of each item in the set). We show that the strong price of anarchy when all items are squares is at least 2.0747 and at most 2.3605. ",cristina fernandes,,2017.0,,arXiv,Fernandes2017,True,,arXiv,Not available,Prices of anarchy of selfish 2D bin packing games,a08777f5569b5d925bc74a5b7e1ded65,http://arxiv.org/abs/1707.07882v1 11555," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",tansu alpcan,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 11556," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",holger boche,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 11557," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",siddharth naik,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 11558," Empirical game-theoretic analysis (EGTA) has recently been applied successfully to analyze the behavior of large numbers of competing traders in a continuous double auction market. Multiagent simulation methods like EGTA are useful for studying complex strategic environments like a stock market, where it is not feasible to solve analytically for the rational behavior of each agent. A weakness of simulation-based methods in strategic settings, however, is that it is typically impossible to prove that the strategy profile assigned to the simulated agents is stable, as in a Nash equilibrium. I propose using reinforcement learning to analyze the regret of supposed Nash-equilibrium strategy profiles found by EGTA. I have developed a new library of reinforcement learning tools, which I have integrated into an extended version of the market simulator from our prior work. I provide evidence for the effectiveness of our library methods, both on a suite of benchmark problems from the literature, and on non-equilibrium strategy profiles in our market environment. Finally, I use our new reinforcement learning tools to provide evidence that the equilibria found by EGTA in our recent continuous double auction study are likely to have only negligible regret, even with respect to an extended strategy space. ",mason wright,,2016.0,,arXiv,Wright2016,True,,arXiv,Not available,"Using Reinforcement Learning to Validate Empirical Game-Theoretic Analysis: A Continuous Double Auction Study",94c650ee22363db4f127a6d972e21b38,http://arxiv.org/abs/1604.06710v1 11559," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",alessandro chiesa,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 11560," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",silvio micali,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 11561," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",zeyuan zhu,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 11562," We consider the task of computing an approximation of a trembling hand perfect equilibrium for an n-player game in strategic form, n >= 3. We show that this task is complete for the complexity class FIXP_a. In particular, the task is polynomial time equivalent to the task of computing an approximation of a Nash equilibrium in strategic form games with three (or more) players. ",kousha etessami,,2014.0,,arXiv,Etessami2014,True,,arXiv,Not available,"The complexity of approximating a trembling hand perfect equilibrium of a multi-player game in strategic form",e405ed5721dac4b4c7328a4e711f0ec1,http://arxiv.org/abs/1408.1017v1 11563," We consider a large community of individuals who mix strongly and meet in pairs to bet on a coin toss. We investigate the asset distribution of the players involved in this zero-sum repeated game. Our main result is that the asset distribution converges to the exponential distribution, irrespective of the size of the bet, as long as players can never go bankrupt. Analytical results suggests that the exponential distribution is a stable fixed point for this zero-sum repreated game. This is confirmed in numerical experiments. ",romulus breban,,2016.0,,arXiv,Breban2016,True,,arXiv,Not available,A mathematical model for a gaming community,97546e2b1517e4546fea86c59f75d497,http://arxiv.org/abs/1607.03161v1 11564," We consider a game-theoretical problem called selfish 2-dimensional bin packing game, a generalization of the 1-dimensional case already treated in the literature. In this game, the items to be packed are rectangles, and the bins are unit squares. The game starts with a set of items arbitrarily packed in bins. The cost of an item is defined as the ratio between its area and the total occupied area of the respective bin. Each item is a selfish player that wants to minimize its cost. A migration of an item to another bin is allowed only when its cost is decreased. We show that this game always converges to a Nash equilibrium (a stable packing where no single item can decrease its cost by migrating to another bin). We show that the pure price of anarchy of this game is unbounded, so we address the particular case where all items are squares. We show that the pure price of anarchy of the selfish square packing game is at least 2.3634 and at most 2.6875. We also present analogous results for the strong Nash equilibrium (a stable packing where no nonempty set of items can simultaneously migrate to another common bin and decrease the cost of each item in the set). We show that the strong price of anarchy when all items are squares is at least 2.0747 and at most 2.3605. ",carlos ferreira,,2017.0,,arXiv,Fernandes2017,True,,arXiv,Not available,Prices of anarchy of selfish 2D bin packing games,a08777f5569b5d925bc74a5b7e1ded65,http://arxiv.org/abs/1707.07882v1 11565," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",nikhil devanur,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 11566," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",jamie morgenstern,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 11567," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",vasilis syrgkanis,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 11568," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",e. piotrowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 11569," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",j. sladkowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 11570," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",yishay mansour,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11571," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",s. muthukrishnan,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11572," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",noam nisan,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11573," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",simina branzei,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 11574," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",clara forero,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 11575," We consider a game-theoretical problem called selfish 2-dimensional bin packing game, a generalization of the 1-dimensional case already treated in the literature. In this game, the items to be packed are rectangles, and the bins are unit squares. The game starts with a set of items arbitrarily packed in bins. The cost of an item is defined as the ratio between its area and the total occupied area of the respective bin. Each item is a selfish player that wants to minimize its cost. A migration of an item to another bin is allowed only when its cost is decreased. We show that this game always converges to a Nash equilibrium (a stable packing where no single item can decrease its cost by migrating to another bin). We show that the pure price of anarchy of this game is unbounded, so we address the particular case where all items are squares. We show that the pure price of anarchy of the selfish square packing game is at least 2.3634 and at most 2.6875. We also present analogous results for the strong Nash equilibrium (a stable packing where no nonempty set of items can simultaneously migrate to another common bin and decrease the cost of each item in the set). We show that the strong price of anarchy when all items are squares is at least 2.0747 and at most 2.3605. ",flavio miyazawa,,2017.0,,arXiv,Fernandes2017,True,,arXiv,Not available,Prices of anarchy of selfish 2D bin packing games,a08777f5569b5d925bc74a5b7e1ded65,http://arxiv.org/abs/1707.07882v1 11576," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",kate larson,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 11577," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",peter miltersen,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 11578," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",darrell hoy,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 11579," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",kamal jain,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 11580," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",christopher wilkens,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 11581," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",gagan goel,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 11582," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",mohammad khani,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 11583," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",renato leme,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 11584," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 11585," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",eva tardos,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 11586," We consider a game-theoretical problem called selfish 2-dimensional bin packing game, a generalization of the 1-dimensional case already treated in the literature. In this game, the items to be packed are rectangles, and the bins are unit squares. The game starts with a set of items arbitrarily packed in bins. The cost of an item is defined as the ratio between its area and the total occupied area of the respective bin. Each item is a selfish player that wants to minimize its cost. A migration of an item to another bin is allowed only when its cost is decreased. We show that this game always converges to a Nash equilibrium (a stable packing where no single item can decrease its cost by migrating to another bin). We show that the pure price of anarchy of this game is unbounded, so we address the particular case where all items are squares. We show that the pure price of anarchy of the selfish square packing game is at least 2.3634 and at most 2.6875. We also present analogous results for the strong Nash equilibrium (a stable packing where no nonempty set of items can simultaneously migrate to another common bin and decrease the cost of each item in the set). We show that the strong price of anarchy when all items are squares is at least 2.0747 and at most 2.3605. ",yoshiko wakabayashi,,2017.0,,arXiv,Fernandes2017,True,,arXiv,Not available,Prices of anarchy of selfish 2D bin packing games,a08777f5569b5d925bc74a5b7e1ded65,http://arxiv.org/abs/1707.07882v1 11587," A standard result from auction theory is that bidding truthfully in a second price auction is a weakly dominant strategy, or, in the language of digital advertising, 'the cost per mille (eCPM) is equal to the click through rate (CTR) times the cost per clicks (CPC)'. However, such assertion is incorrect if the buyers are subject to ROI constraints. More generally, several predictions derived by the traditional auction theory literature fail to apply. This is what I propose to discuss in this article. I formalize the notion of ROI constrained auctions and derive a Nash equilibrium for second price auctions. I then extend this result to any combination of first and second price payment rules and do an asymptotic analysis of the equilibrium as the number of bidders increases. Further I expose a revenue equivalence property, and finish with a proposal for a dynamic extension of the bidder ROI constrained optimization problem. ",benamin heymann,,2018.0,,arXiv,Heymann2018,True,,arXiv,Not available,ROI constrained Auctions,ea30776161bd25310cf171082853a0f9,http://arxiv.org/abs/1809.08837v1 11588," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",amos fiat,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 11589," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",stefano leonardi,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 11590," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",jared saia,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 11591," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",piotr sankowski,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 11592," In the classical prophet inequality, a gambler observes a sequence of stochastic rewards $V_1,...,V_n$ and must decide, for each reward $V_i$, whether to keep it and stop the game or to forfeit the reward forever and reveal the next value $V_i$. The gambler's goal is to obtain a constant fraction of the expected reward that the optimal offline algorithm would get. Recently, prophet inequalities have been generalized to settings where the gambler can choose $k$ items, and, more generally, where he can choose any independent set in a matroid. However, all the existing algorithms require the gambler to know the distribution from which the rewards $V_1,...,V_n$ are drawn. The assumption that the gambler knows the distribution from which $V_1,...,V_n$ are drawn is very strong. Instead, we work with the much simpler assumption that the gambler only knows a few samples from this distribution. We construct the first single-sample prophet inequalities for many settings of interest, whose guarantees all match the best possible asymptotically, \emph{even with full knowledge of the distribution}. Specifically, we provide a novel single-sample algorithm when the gambler can choose any $k$ elements whose analysis is based on random walks with limited correlation. In addition, we provide a black-box method for converting specific types of solutions to the related \emph{secretary problem} to single-sample prophet inequalities, and apply it to several existing algorithms. Finally, we provide a constant-sample prophet inequality for constant-degree bipartite matchings. We apply these results to design the first posted-price and multi-dimensional auction mechanisms with limited information in settings with asymmetric bidders. ",pablo azar,,2013.0,,arXiv,Azar2013,True,,arXiv,Not available,Prophet Inequalities with Limited Information,c5c72d967b51c90d1c1eae63ff856eef,http://arxiv.org/abs/1307.3736v1 11593," In the classical prophet inequality, a gambler observes a sequence of stochastic rewards $V_1,...,V_n$ and must decide, for each reward $V_i$, whether to keep it and stop the game or to forfeit the reward forever and reveal the next value $V_i$. The gambler's goal is to obtain a constant fraction of the expected reward that the optimal offline algorithm would get. Recently, prophet inequalities have been generalized to settings where the gambler can choose $k$ items, and, more generally, where he can choose any independent set in a matroid. However, all the existing algorithms require the gambler to know the distribution from which the rewards $V_1,...,V_n$ are drawn. The assumption that the gambler knows the distribution from which $V_1,...,V_n$ are drawn is very strong. Instead, we work with the much simpler assumption that the gambler only knows a few samples from this distribution. We construct the first single-sample prophet inequalities for many settings of interest, whose guarantees all match the best possible asymptotically, \emph{even with full knowledge of the distribution}. Specifically, we provide a novel single-sample algorithm when the gambler can choose any $k$ elements whose analysis is based on random walks with limited correlation. In addition, we provide a black-box method for converting specific types of solutions to the related \emph{secretary problem} to single-sample prophet inequalities, and apply it to several existing algorithms. Finally, we provide a constant-sample prophet inequality for constant-degree bipartite matchings. We apply these results to design the first posted-price and multi-dimensional auction mechanisms with limited information in settings with asymmetric bidders. ",robert kleinberg,,2013.0,,arXiv,Azar2013,True,,arXiv,Not available,Prophet Inequalities with Limited Information,c5c72d967b51c90d1c1eae63ff856eef,http://arxiv.org/abs/1307.3736v1 11594," In the classical prophet inequality, a gambler observes a sequence of stochastic rewards $V_1,...,V_n$ and must decide, for each reward $V_i$, whether to keep it and stop the game or to forfeit the reward forever and reveal the next value $V_i$. The gambler's goal is to obtain a constant fraction of the expected reward that the optimal offline algorithm would get. Recently, prophet inequalities have been generalized to settings where the gambler can choose $k$ items, and, more generally, where he can choose any independent set in a matroid. However, all the existing algorithms require the gambler to know the distribution from which the rewards $V_1,...,V_n$ are drawn. The assumption that the gambler knows the distribution from which $V_1,...,V_n$ are drawn is very strong. Instead, we work with the much simpler assumption that the gambler only knows a few samples from this distribution. We construct the first single-sample prophet inequalities for many settings of interest, whose guarantees all match the best possible asymptotically, \emph{even with full knowledge of the distribution}. Specifically, we provide a novel single-sample algorithm when the gambler can choose any $k$ elements whose analysis is based on random walks with limited correlation. In addition, we provide a black-box method for converting specific types of solutions to the related \emph{secretary problem} to single-sample prophet inequalities, and apply it to several existing algorithms. Finally, we provide a constant-sample prophet inequality for constant-degree bipartite matchings. We apply these results to design the first posted-price and multi-dimensional auction mechanisms with limited information in settings with asymmetric bidders. ",s. weinberg,,2013.0,,arXiv,Azar2013,True,,arXiv,Not available,Prophet Inequalities with Limited Information,c5c72d967b51c90d1c1eae63ff856eef,http://arxiv.org/abs/1307.3736v1 11595," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",gilles barthe,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11596," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",marco gaboardi,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11597," The introduction of LTE over unlicensed bands (LTE-U) will enable LTE base stations (BSs) to boost their capacity and offload their traffic by exploiting the underused unlicensed bands. However, to reap the benefits of LTE-U, it is necessary to address various new challenges associated with LTE-U and WiFi coexistence. In particular, new resource management techniques must be developed to optimize the usage of the network resources while handling the interdependence between WiFi and LTE users and ensuring that WiFi users are not jeopardized. To this end, in this paper, a new game theoretic tool, dubbed as \emph{multi-game} framework is proposed as a promising approach for modeling resource allocation problems in LTE-U. In such a framework, multiple, co-existing and coupled games across heterogeneous channels can be formulated to capture the specific characteristics of LTE-U. Such games can be of different properties and types but their outcomes are largely interdependent. After introducing the basics of the multi-game framework, two classes of algorithms are outlined to achieve the new solution concepts of multi-games. Simulation results are then conducted to show how such a multi-game can effectively capture the specific properties of LTE-U and make of it a ""friendly"" neighbor to WiFi. ",kenza hamidouche,,2016.0,,arXiv,Hamidouche2016,True,,arXiv,Not available,"A Multi-Game Framework for Harmonized LTE-U and WiFi Coexistence over Unlicensed Bands",6a839cf714fdcaeae4eead24983949ee,http://arxiv.org/abs/1607.00934v1 11598," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",emilio arias,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11599," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",justin hsu,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11600," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",aaron roth,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11601," Mechanism design is the study of algorithm design in which the inputs to the algorithm are controlled by strategic agents, who must be incentivized to faithfully report them. Unlike typical programmatic properties, it is not sufficient for algorithms to merely satisfy the property---incentive properties are only useful if the strategic agents also believe this fact. Verification is an attractive way to convince agents that the incentive properties actually hold, but mechanism design poses several unique challenges: interesting properties can be sophisticated relational properties of probabilistic computations involving expected values, and mechanisms may rely on other probabilistic properties, like differential privacy, to achieve their goals. We introduce a relational refinement type system, called $\mathsf{HOARe}^2$, for verifying mechanism design and differential privacy. We show that $\mathsf{HOARe}^2$ is sound w.r.t. a denotational semantics, and correctly models $(\epsilon,\delta)$-differential privacy; moreover, we show that it subsumes DFuzz, an existing linear dependent type system for differential privacy. Finally, we develop an SMT-based implementation of $\mathsf{HOARe}^2$ and use it to verify challenging examples of mechanism design, including auctions and aggregative games, and new proposed examples from differential privacy. ",pierre-yves strub,,2014.0,10.1145/2676726.2677000,arXiv,Barthe2014,True,,arXiv,Not available,"Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy",2c5cae3ee9e06d229ca427cc9156783b,http://arxiv.org/abs/1407.6845v2 11602," In this work, we aim to create a data marketplace; a robust real-time matching mechanism to efficiently buy and sell training data for Machine Learning tasks. While the monetization of data and pre-trained models is an essential focus of industry today, there does not exist a market mechanism to price training data and match buyers to vendors while still addressing the associated (computational and other) complexity. The challenge in creating such a market stems from the very nature of data as an asset: (i) it is freely replicable; (ii) its value is inherently combinatorial due to correlation with signal in other data; (iii) prediction tasks and the value of accuracy vary widely; (iv) usefulness of training data is difficult to verify a priori without first applying it to a prediction task. As our main contributions we: (i) propose a mathematical model for a two-sided data market and formally define the key associated challenges; (ii) construct algorithms for such a market to function and rigorously prove how they meet the challenges defined. We highlight two technical contributions: (i) a new notion of ""fairness"" required for cooperative games with freely replicable goods; (ii) a truthful, zero regret mechanism for auctioning a particular class of combinatorial goods based on utilizing Myerson's payment function and the Multiplicative Weights algorithm. These might be of independent interest. ",anish agarwal,,2018.0,,arXiv,Agarwal2018,True,,arXiv,Not available,A Marketplace for Data: An Algorithmic Solution,b34d52987ae1f509bf803657e21f3a25,http://arxiv.org/abs/1805.08125v2 11603," In this work, we aim to create a data marketplace; a robust real-time matching mechanism to efficiently buy and sell training data for Machine Learning tasks. While the monetization of data and pre-trained models is an essential focus of industry today, there does not exist a market mechanism to price training data and match buyers to vendors while still addressing the associated (computational and other) complexity. The challenge in creating such a market stems from the very nature of data as an asset: (i) it is freely replicable; (ii) its value is inherently combinatorial due to correlation with signal in other data; (iii) prediction tasks and the value of accuracy vary widely; (iv) usefulness of training data is difficult to verify a priori without first applying it to a prediction task. As our main contributions we: (i) propose a mathematical model for a two-sided data market and formally define the key associated challenges; (ii) construct algorithms for such a market to function and rigorously prove how they meet the challenges defined. We highlight two technical contributions: (i) a new notion of ""fairness"" required for cooperative games with freely replicable goods; (ii) a truthful, zero regret mechanism for auctioning a particular class of combinatorial goods based on utilizing Myerson's payment function and the Multiplicative Weights algorithm. These might be of independent interest. ",munther dahleh,,2018.0,,arXiv,Agarwal2018,True,,arXiv,Not available,A Marketplace for Data: An Algorithmic Solution,b34d52987ae1f509bf803657e21f3a25,http://arxiv.org/abs/1805.08125v2 11604," In this work, we aim to create a data marketplace; a robust real-time matching mechanism to efficiently buy and sell training data for Machine Learning tasks. While the monetization of data and pre-trained models is an essential focus of industry today, there does not exist a market mechanism to price training data and match buyers to vendors while still addressing the associated (computational and other) complexity. The challenge in creating such a market stems from the very nature of data as an asset: (i) it is freely replicable; (ii) its value is inherently combinatorial due to correlation with signal in other data; (iii) prediction tasks and the value of accuracy vary widely; (iv) usefulness of training data is difficult to verify a priori without first applying it to a prediction task. As our main contributions we: (i) propose a mathematical model for a two-sided data market and formally define the key associated challenges; (ii) construct algorithms for such a market to function and rigorously prove how they meet the challenges defined. We highlight two technical contributions: (i) a new notion of ""fairness"" required for cooperative games with freely replicable goods; (ii) a truthful, zero regret mechanism for auctioning a particular class of combinatorial goods based on utilizing Myerson's payment function and the Multiplicative Weights algorithm. These might be of independent interest. ",tuhin sarkar,,2018.0,,arXiv,Agarwal2018,True,,arXiv,Not available,A Marketplace for Data: An Algorithmic Solution,b34d52987ae1f509bf803657e21f3a25,http://arxiv.org/abs/1805.08125v2 11605," We present an algebraic framework for the analysis of combinatorial games. This framework embraces the classical theory of partizan games as well as a number of misere games, comply-constrain games, and card games that have been studied more recently. It focuses on the construction of the quotient monoid of a game, an idea that has been successively applied to several classes of games. ",johan wastlund,,2009.0,,arXiv,Wästlund2009,True,,arXiv,Not available,The strange algebra of combinatorial games,0423a63df35c558f6651b3f6da1d9b6d,http://arxiv.org/abs/0912.0448v1 11606," Persuasion, defined as the act of exploiting an informational advantage in order to effect the decisions of others, is ubiquitous. Indeed, persuasive communication has been estimated to account for almost a third of all economic activity in the US. This paper examines persuasion through a computational lens, focusing on what is perhaps the most basic and fundamental model in this space: the celebrated Bayesian persuasion model of Kamenica and Gentzkow. Here there are two players, a sender and a receiver. The receiver must take one of a number of actions with a-priori unknown payoff, and the sender has access to additional information regarding the payoffs. The sender can commit to revealing a noisy signal regarding the realization of the payoffs of various actions, and would like to do so as to maximize her own payoff assuming a perfectly rational receiver. We examine the sender's optimization task in three of the most natural input models for this problem, and essentially pin down its computational complexity in each. When the payoff distributions of the different actions are i.i.d. and given explicitly, we exhibit a polynomial-time (exact) algorithm, and a ""simple"" $(1-1/e)$-approximation algorithm. Our optimal scheme for the i.i.d. setting involves an analogy to auction theory, and makes use of Border's characterization of the space of reduced-forms for single-item auctions. When action payoffs are independent but non-identical with marginal distributions given explicitly, we show that it is #P-hard to compute the optimal expected sender utility. Finally, we consider a general (possibly correlated) joint distribution of action payoffs presented by a black box sampling oracle, and exhibit a fully polynomial-time approximation scheme (FPTAS) with a bi-criteria guarantee. We show that this result is the best possible in the black-box model for information-theoretic reasons. ",shaddin dughmi,,2015.0,,arXiv,Dughmi2015,True,,arXiv,Not available,Algorithmic Bayesian Persuasion,599f8875a038647b2e966df8e2aaec38,http://arxiv.org/abs/1503.05988v3 11607," Persuasion, defined as the act of exploiting an informational advantage in order to effect the decisions of others, is ubiquitous. Indeed, persuasive communication has been estimated to account for almost a third of all economic activity in the US. This paper examines persuasion through a computational lens, focusing on what is perhaps the most basic and fundamental model in this space: the celebrated Bayesian persuasion model of Kamenica and Gentzkow. Here there are two players, a sender and a receiver. The receiver must take one of a number of actions with a-priori unknown payoff, and the sender has access to additional information regarding the payoffs. The sender can commit to revealing a noisy signal regarding the realization of the payoffs of various actions, and would like to do so as to maximize her own payoff assuming a perfectly rational receiver. We examine the sender's optimization task in three of the most natural input models for this problem, and essentially pin down its computational complexity in each. When the payoff distributions of the different actions are i.i.d. and given explicitly, we exhibit a polynomial-time (exact) algorithm, and a ""simple"" $(1-1/e)$-approximation algorithm. Our optimal scheme for the i.i.d. setting involves an analogy to auction theory, and makes use of Border's characterization of the space of reduced-forms for single-item auctions. When action payoffs are independent but non-identical with marginal distributions given explicitly, we show that it is #P-hard to compute the optimal expected sender utility. Finally, we consider a general (possibly correlated) joint distribution of action payoffs presented by a black box sampling oracle, and exhibit a fully polynomial-time approximation scheme (FPTAS) with a bi-criteria guarantee. We show that this result is the best possible in the black-box model for information-theoretic reasons. ",haifeng xu,,2015.0,,arXiv,Dughmi2015,True,,arXiv,Not available,Algorithmic Bayesian Persuasion,599f8875a038647b2e966df8e2aaec38,http://arxiv.org/abs/1503.05988v3 11608," The introduction of LTE over unlicensed bands (LTE-U) will enable LTE base stations (BSs) to boost their capacity and offload their traffic by exploiting the underused unlicensed bands. However, to reap the benefits of LTE-U, it is necessary to address various new challenges associated with LTE-U and WiFi coexistence. In particular, new resource management techniques must be developed to optimize the usage of the network resources while handling the interdependence between WiFi and LTE users and ensuring that WiFi users are not jeopardized. To this end, in this paper, a new game theoretic tool, dubbed as \emph{multi-game} framework is proposed as a promising approach for modeling resource allocation problems in LTE-U. In such a framework, multiple, co-existing and coupled games across heterogeneous channels can be formulated to capture the specific characteristics of LTE-U. Such games can be of different properties and types but their outcomes are largely interdependent. After introducing the basics of the multi-game framework, two classes of algorithms are outlined to achieve the new solution concepts of multi-games. Simulation results are then conducted to show how such a multi-game can effectively capture the specific properties of LTE-U and make of it a ""friendly"" neighbor to WiFi. ",walid saad,,2016.0,,arXiv,Hamidouche2016,True,,arXiv,Not available,"A Multi-Game Framework for Harmonized LTE-U and WiFi Coexistence over Unlicensed Bands",6a839cf714fdcaeae4eead24983949ee,http://arxiv.org/abs/1607.00934v1 11609," We develop efficient algorithms to construct utility maximizing mechanisms in the presence of risk averse players (buyers and sellers) in Bayesian settings. We model risk aversion by a concave utility function, and players play strategically to maximize their expected utility. Bayesian mechanism design has usually focused on maximizing expected revenue in a {\em risk neutral} environment, and no succinct characterization of expected utility maximizing mechanisms is known even for single-parameter multi-unit auctions. We first consider the problem of designing optimal DSIC mechanism for a risk averse seller in the case of multi-unit auctions, and we give a poly-time computable SPM that is $(1-1/e-\eps)$-approximation to the expected utility of the seller in an optimal DSIC mechanism. Our result is based on a novel application of a correlation gap bound, along with {\em splitting} and {\em merging} of random variables to redistribute probability mass across buyers. This allows us to reduce our problem to that of checking feasibility of a small number of distinct configurations, each of which corresponds to a covering LP. A feasible solution to the LP gives us the distribution on prices for each buyer to use in a randomized SPM. We next consider the setting when buyers as well as the seller are risk averse, and the objective is to maximize the seller's expected utility. We design a truthful-in-expectation mechanism whose utility is a $(1-1/e -\eps)^3$-approximation to the optimal BIC mechanism under two mild assumptions. Our mechanism consists of multiple rounds that processes each buyer in a round with small probability. Lastly, we consider the problem of revenue maximization for a risk neutral seller in presence of risk averse buyers, and give a poly-time algorithm to design an optimal mechanism for the seller. ",anand bhalgat,,2011.0,,arXiv,Bhalgat2011,True,,arXiv,Not available,Mechanism Design and Risk Aversion,7e1a3e9baf187a9eb07ee8dbc215d83c,http://arxiv.org/abs/1107.4722v3 11610," We develop efficient algorithms to construct utility maximizing mechanisms in the presence of risk averse players (buyers and sellers) in Bayesian settings. We model risk aversion by a concave utility function, and players play strategically to maximize their expected utility. Bayesian mechanism design has usually focused on maximizing expected revenue in a {\em risk neutral} environment, and no succinct characterization of expected utility maximizing mechanisms is known even for single-parameter multi-unit auctions. We first consider the problem of designing optimal DSIC mechanism for a risk averse seller in the case of multi-unit auctions, and we give a poly-time computable SPM that is $(1-1/e-\eps)$-approximation to the expected utility of the seller in an optimal DSIC mechanism. Our result is based on a novel application of a correlation gap bound, along with {\em splitting} and {\em merging} of random variables to redistribute probability mass across buyers. This allows us to reduce our problem to that of checking feasibility of a small number of distinct configurations, each of which corresponds to a covering LP. A feasible solution to the LP gives us the distribution on prices for each buyer to use in a randomized SPM. We next consider the setting when buyers as well as the seller are risk averse, and the objective is to maximize the seller's expected utility. We design a truthful-in-expectation mechanism whose utility is a $(1-1/e -\eps)^3$-approximation to the optimal BIC mechanism under two mild assumptions. Our mechanism consists of multiple rounds that processes each buyer in a round with small probability. Lastly, we consider the problem of revenue maximization for a risk neutral seller in presence of risk averse buyers, and give a poly-time algorithm to design an optimal mechanism for the seller. ",tanmoy chakraborty,,2011.0,,arXiv,Bhalgat2011,True,,arXiv,Not available,Mechanism Design and Risk Aversion,7e1a3e9baf187a9eb07ee8dbc215d83c,http://arxiv.org/abs/1107.4722v3 11611," We develop efficient algorithms to construct utility maximizing mechanisms in the presence of risk averse players (buyers and sellers) in Bayesian settings. We model risk aversion by a concave utility function, and players play strategically to maximize their expected utility. Bayesian mechanism design has usually focused on maximizing expected revenue in a {\em risk neutral} environment, and no succinct characterization of expected utility maximizing mechanisms is known even for single-parameter multi-unit auctions. We first consider the problem of designing optimal DSIC mechanism for a risk averse seller in the case of multi-unit auctions, and we give a poly-time computable SPM that is $(1-1/e-\eps)$-approximation to the expected utility of the seller in an optimal DSIC mechanism. Our result is based on a novel application of a correlation gap bound, along with {\em splitting} and {\em merging} of random variables to redistribute probability mass across buyers. This allows us to reduce our problem to that of checking feasibility of a small number of distinct configurations, each of which corresponds to a covering LP. A feasible solution to the LP gives us the distribution on prices for each buyer to use in a randomized SPM. We next consider the setting when buyers as well as the seller are risk averse, and the objective is to maximize the seller's expected utility. We design a truthful-in-expectation mechanism whose utility is a $(1-1/e -\eps)^3$-approximation to the optimal BIC mechanism under two mild assumptions. Our mechanism consists of multiple rounds that processes each buyer in a round with small probability. Lastly, we consider the problem of revenue maximization for a risk neutral seller in presence of risk averse buyers, and give a poly-time algorithm to design an optimal mechanism for the seller. ",sanjeev khanna,,2011.0,,arXiv,Bhalgat2011,True,,arXiv,Not available,Mechanism Design and Risk Aversion,7e1a3e9baf187a9eb07ee8dbc215d83c,http://arxiv.org/abs/1107.4722v3 11612," Traffic congestion in urban road networks is a costly problem that affects all major cities in developed countries. To tackle this problem, it is possible (i) to act on the supply side, increasing the number of roads or lanes in a network, (ii) to reduce the demand, restricting the access to urban areas at specific hours or to specific vehicles, or (iii) to improve the efficiency of the existing network, by means of a widespread use of so-called Intelligent Transportation Systems (ITS). In line with the recent advances in smart transportation management infrastructures, ITS has turned out to be a promising field of application for artificial intelligence techniques. In particular, multiagent systems seem to be the ideal candidates for the design and implementation of ITS. In fact, drivers can be naturally modelled as autonomous agents that interact with the transportation management infrastructure, thereby generating a large-scale, open, agent-based system. To regulate such a system and maintain a smooth and efficient flow of traffic, decentralised mechanisms for the management of the transportation infrastructure are needed. In this article we propose a distributed, market-inspired, mechanism for the management of a future urban road network, where intelligent autonomous vehicles, operated by software agents on behalf of their human owners, interact with the infrastructure in order to travel safely and efficiently through the road network. Building on the reservation-based intersection control model proposed by Dresner and Stone, we consider two different scenarios: one with a single intersection and one with a network of intersections. In the former, we analyse the performance of a novel policy based on combinatorial auctions for the allocation of reservations. In the latter, we analyse the impact that a traffic assignment strategy inspired by competitive markets has on the drivers route choices. Finally we propose an adaptive management mechanism that integrates the auction-based traffic control policy with the competitive traffic assignment strategy. ",matteo vasirani,,2014.0,10.1613/jair.3560,"Journal Of Artificial Intelligence Research, Volume 43, pages 621-659, 2012",Vasirani2014,True,,arXiv,Not available,"A Market-Inspired Approach for Intersection Management in Urban Road Traffic Networks",8517df11a3becc2850c973ecbfab377f,http://arxiv.org/abs/1401.5851v1 11613," Traffic congestion in urban road networks is a costly problem that affects all major cities in developed countries. To tackle this problem, it is possible (i) to act on the supply side, increasing the number of roads or lanes in a network, (ii) to reduce the demand, restricting the access to urban areas at specific hours or to specific vehicles, or (iii) to improve the efficiency of the existing network, by means of a widespread use of so-called Intelligent Transportation Systems (ITS). In line with the recent advances in smart transportation management infrastructures, ITS has turned out to be a promising field of application for artificial intelligence techniques. In particular, multiagent systems seem to be the ideal candidates for the design and implementation of ITS. In fact, drivers can be naturally modelled as autonomous agents that interact with the transportation management infrastructure, thereby generating a large-scale, open, agent-based system. To regulate such a system and maintain a smooth and efficient flow of traffic, decentralised mechanisms for the management of the transportation infrastructure are needed. In this article we propose a distributed, market-inspired, mechanism for the management of a future urban road network, where intelligent autonomous vehicles, operated by software agents on behalf of their human owners, interact with the infrastructure in order to travel safely and efficiently through the road network. Building on the reservation-based intersection control model proposed by Dresner and Stone, we consider two different scenarios: one with a single intersection and one with a network of intersections. In the former, we analyse the performance of a novel policy based on combinatorial auctions for the allocation of reservations. In the latter, we analyse the impact that a traffic assignment strategy inspired by competitive markets has on the drivers route choices. Finally we propose an adaptive management mechanism that integrates the auction-based traffic control policy with the competitive traffic assignment strategy. ",sascha ossowski,,2014.0,10.1613/jair.3560,"Journal Of Artificial Intelligence Research, Volume 43, pages 621-659, 2012",Vasirani2014,True,,arXiv,Not available,"A Market-Inspired Approach for Intersection Management in Urban Road Traffic Networks",8517df11a3becc2850c973ecbfab377f,http://arxiv.org/abs/1401.5851v1 11614," There are two major ways of selling impressions in display advertising. They are either sold in spot through auction mechanisms or in advance via guaranteed contracts. The former has achieved a significant automation via real-time bidding (RTB); however, the latter is still mainly done over the counter through direct sales. This paper proposes a mathematical model that allocates and prices the future impressions between real-time auctions and guaranteed contracts. Under conventional economic assumptions, our model shows that the two ways can be seamless combined programmatically and the publisher's revenue can be maximized via price discrimination and optimal allocation. We consider advertisers are risk-averse, and they would be willing to purchase guaranteed impressions if the total costs are less than their private values. We also consider that an advertiser's purchase behavior can be affected by both the guaranteed price and the time interval between the purchase time and the impression delivery date. Our solution suggests an optimal percentage of future impressions to sell in advance and provides an explicit formula to calculate at what prices to sell. We find that the optimal guaranteed prices are dynamic and are non-decreasing over time. We evaluate our method with RTB datasets and find that the model adopts different strategies in allocation and pricing according to the level of competition. From the experiments we find that, in a less competitive market, lower prices of the guaranteed contracts will encourage the purchase in advance and the revenue gain is mainly contributed by the increased competition in future RTB. In a highly competitive market, advertisers are more willing to purchase the guaranteed contracts and thus higher prices are expected. The revenue gain is largely contributed by the guaranteed selling. ",bowei chen,,2014.0,10.1145/2648584.2648585,arXiv,Chen2014,True,,arXiv,Not available,"A dynamic pricing model for unifying programmatic guarantee and real-time bidding in display advertising",bed1b749dfbbeb684791847ab6a31ee6,http://arxiv.org/abs/1405.5189v3 11615," There are two major ways of selling impressions in display advertising. They are either sold in spot through auction mechanisms or in advance via guaranteed contracts. The former has achieved a significant automation via real-time bidding (RTB); however, the latter is still mainly done over the counter through direct sales. This paper proposes a mathematical model that allocates and prices the future impressions between real-time auctions and guaranteed contracts. Under conventional economic assumptions, our model shows that the two ways can be seamless combined programmatically and the publisher's revenue can be maximized via price discrimination and optimal allocation. We consider advertisers are risk-averse, and they would be willing to purchase guaranteed impressions if the total costs are less than their private values. We also consider that an advertiser's purchase behavior can be affected by both the guaranteed price and the time interval between the purchase time and the impression delivery date. Our solution suggests an optimal percentage of future impressions to sell in advance and provides an explicit formula to calculate at what prices to sell. We find that the optimal guaranteed prices are dynamic and are non-decreasing over time. We evaluate our method with RTB datasets and find that the model adopts different strategies in allocation and pricing according to the level of competition. From the experiments we find that, in a less competitive market, lower prices of the guaranteed contracts will encourage the purchase in advance and the revenue gain is mainly contributed by the increased competition in future RTB. In a highly competitive market, advertisers are more willing to purchase the guaranteed contracts and thus higher prices are expected. The revenue gain is largely contributed by the guaranteed selling. ",shuai yuan,,2014.0,10.1145/2648584.2648585,arXiv,Chen2014,True,,arXiv,Not available,"A dynamic pricing model for unifying programmatic guarantee and real-time bidding in display advertising",bed1b749dfbbeb684791847ab6a31ee6,http://arxiv.org/abs/1405.5189v3 11616," There are two major ways of selling impressions in display advertising. They are either sold in spot through auction mechanisms or in advance via guaranteed contracts. The former has achieved a significant automation via real-time bidding (RTB); however, the latter is still mainly done over the counter through direct sales. This paper proposes a mathematical model that allocates and prices the future impressions between real-time auctions and guaranteed contracts. Under conventional economic assumptions, our model shows that the two ways can be seamless combined programmatically and the publisher's revenue can be maximized via price discrimination and optimal allocation. We consider advertisers are risk-averse, and they would be willing to purchase guaranteed impressions if the total costs are less than their private values. We also consider that an advertiser's purchase behavior can be affected by both the guaranteed price and the time interval between the purchase time and the impression delivery date. Our solution suggests an optimal percentage of future impressions to sell in advance and provides an explicit formula to calculate at what prices to sell. We find that the optimal guaranteed prices are dynamic and are non-decreasing over time. We evaluate our method with RTB datasets and find that the model adopts different strategies in allocation and pricing according to the level of competition. From the experiments we find that, in a less competitive market, lower prices of the guaranteed contracts will encourage the purchase in advance and the revenue gain is mainly contributed by the increased competition in future RTB. In a highly competitive market, advertisers are more willing to purchase the guaranteed contracts and thus higher prices are expected. The revenue gain is largely contributed by the guaranteed selling. ",jun wang,,2014.0,10.1145/2648584.2648585,arXiv,Chen2014,True,,arXiv,Not available,"A dynamic pricing model for unifying programmatic guarantee and real-time bidding in display advertising",bed1b749dfbbeb684791847ab6a31ee6,http://arxiv.org/abs/1405.5189v3 11617," Dynamic spectrum access is a new paradigm of secondary spectrum utilization and sharing. It allows unlicensed secondary users (SUs) to exploit opportunistically the under-utilized licensed spectrum. Market mechanism is a widely-used promising means to regulate the consuming behaviours of users and, hence, achieves the efficient allocation and consumption of limited resources. In this paper, we propose and study a hybrid secondary spectrum market consisting of both the futures market and the spot market, in which SUs (buyers) purchase under-utilized licensed spectrum from a spectrum regulator, either through predefined contracts via the futures market, or through spot transactions via the spot market. We focus on the optimal spectrum allocation among SUs in an exogenous hybrid market that maximizes the secondary spectrum utilization efficiency. The problem is challenging due to the stochasticity and asymmetry of network information. To solve this problem, we first derive an off-line optimal allocation policy that maximizes the ex-ante expected spectrum utilization efficiency based on the stochastic distribution of network information. We then propose an on-line VickreyCClarkeCGroves (VCG) auction that determines the real-time allocation and pricing of every spectrum based on the realized network information and the pre-derived off-line policy. We further show that with the spatial frequency reuse, the proposed VCG auction is NP-hard; hence, it is not suitable for on-line implementation, especially in a large-scale market. To this end, we propose a heuristics approach based on an on-line VCG-like mechanism with polynomial-time complexity, and further characterize the corresponding performance loss bound analytically. We finally provide extensive numerical results to evaluate the performance of the proposed solutions. ",lin gao,,2014.0,,arXiv,Gao2014,True,,arXiv,Not available,"Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access",7753f9b222bb6848cb0061b7c2f4281c,http://arxiv.org/abs/1405.7175v3 11618," Dynamic spectrum access is a new paradigm of secondary spectrum utilization and sharing. It allows unlicensed secondary users (SUs) to exploit opportunistically the under-utilized licensed spectrum. Market mechanism is a widely-used promising means to regulate the consuming behaviours of users and, hence, achieves the efficient allocation and consumption of limited resources. In this paper, we propose and study a hybrid secondary spectrum market consisting of both the futures market and the spot market, in which SUs (buyers) purchase under-utilized licensed spectrum from a spectrum regulator, either through predefined contracts via the futures market, or through spot transactions via the spot market. We focus on the optimal spectrum allocation among SUs in an exogenous hybrid market that maximizes the secondary spectrum utilization efficiency. The problem is challenging due to the stochasticity and asymmetry of network information. To solve this problem, we first derive an off-line optimal allocation policy that maximizes the ex-ante expected spectrum utilization efficiency based on the stochastic distribution of network information. We then propose an on-line VickreyCClarkeCGroves (VCG) auction that determines the real-time allocation and pricing of every spectrum based on the realized network information and the pre-derived off-line policy. We further show that with the spatial frequency reuse, the proposed VCG auction is NP-hard; hence, it is not suitable for on-line implementation, especially in a large-scale market. To this end, we propose a heuristics approach based on an on-line VCG-like mechanism with polynomial-time complexity, and further characterize the corresponding performance loss bound analytically. We finally provide extensive numerical results to evaluate the performance of the proposed solutions. ",biying shou,,2014.0,,arXiv,Gao2014,True,,arXiv,Not available,"Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access",7753f9b222bb6848cb0061b7c2f4281c,http://arxiv.org/abs/1405.7175v3 11619," The introduction of LTE over unlicensed bands (LTE-U) will enable LTE base stations (BSs) to boost their capacity and offload their traffic by exploiting the underused unlicensed bands. However, to reap the benefits of LTE-U, it is necessary to address various new challenges associated with LTE-U and WiFi coexistence. In particular, new resource management techniques must be developed to optimize the usage of the network resources while handling the interdependence between WiFi and LTE users and ensuring that WiFi users are not jeopardized. To this end, in this paper, a new game theoretic tool, dubbed as \emph{multi-game} framework is proposed as a promising approach for modeling resource allocation problems in LTE-U. In such a framework, multiple, co-existing and coupled games across heterogeneous channels can be formulated to capture the specific characteristics of LTE-U. Such games can be of different properties and types but their outcomes are largely interdependent. After introducing the basics of the multi-game framework, two classes of algorithms are outlined to achieve the new solution concepts of multi-games. Simulation results are then conducted to show how such a multi-game can effectively capture the specific properties of LTE-U and make of it a ""friendly"" neighbor to WiFi. ",merouane debbah,,2016.0,,arXiv,Hamidouche2016,True,,arXiv,Not available,"A Multi-Game Framework for Harmonized LTE-U and WiFi Coexistence over Unlicensed Bands",6a839cf714fdcaeae4eead24983949ee,http://arxiv.org/abs/1607.00934v1 11620," Dynamic spectrum access is a new paradigm of secondary spectrum utilization and sharing. It allows unlicensed secondary users (SUs) to exploit opportunistically the under-utilized licensed spectrum. Market mechanism is a widely-used promising means to regulate the consuming behaviours of users and, hence, achieves the efficient allocation and consumption of limited resources. In this paper, we propose and study a hybrid secondary spectrum market consisting of both the futures market and the spot market, in which SUs (buyers) purchase under-utilized licensed spectrum from a spectrum regulator, either through predefined contracts via the futures market, or through spot transactions via the spot market. We focus on the optimal spectrum allocation among SUs in an exogenous hybrid market that maximizes the secondary spectrum utilization efficiency. The problem is challenging due to the stochasticity and asymmetry of network information. To solve this problem, we first derive an off-line optimal allocation policy that maximizes the ex-ante expected spectrum utilization efficiency based on the stochastic distribution of network information. We then propose an on-line VickreyCClarkeCGroves (VCG) auction that determines the real-time allocation and pricing of every spectrum based on the realized network information and the pre-derived off-line policy. We further show that with the spatial frequency reuse, the proposed VCG auction is NP-hard; hence, it is not suitable for on-line implementation, especially in a large-scale market. To this end, we propose a heuristics approach based on an on-line VCG-like mechanism with polynomial-time complexity, and further characterize the corresponding performance loss bound analytically. We finally provide extensive numerical results to evaluate the performance of the proposed solutions. ",ying-ju chen,,2014.0,,arXiv,Gao2014,True,,arXiv,Not available,"Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access",7753f9b222bb6848cb0061b7c2f4281c,http://arxiv.org/abs/1405.7175v3 11621," Dynamic spectrum access is a new paradigm of secondary spectrum utilization and sharing. It allows unlicensed secondary users (SUs) to exploit opportunistically the under-utilized licensed spectrum. Market mechanism is a widely-used promising means to regulate the consuming behaviours of users and, hence, achieves the efficient allocation and consumption of limited resources. In this paper, we propose and study a hybrid secondary spectrum market consisting of both the futures market and the spot market, in which SUs (buyers) purchase under-utilized licensed spectrum from a spectrum regulator, either through predefined contracts via the futures market, or through spot transactions via the spot market. We focus on the optimal spectrum allocation among SUs in an exogenous hybrid market that maximizes the secondary spectrum utilization efficiency. The problem is challenging due to the stochasticity and asymmetry of network information. To solve this problem, we first derive an off-line optimal allocation policy that maximizes the ex-ante expected spectrum utilization efficiency based on the stochastic distribution of network information. We then propose an on-line VickreyCClarkeCGroves (VCG) auction that determines the real-time allocation and pricing of every spectrum based on the realized network information and the pre-derived off-line policy. We further show that with the spatial frequency reuse, the proposed VCG auction is NP-hard; hence, it is not suitable for on-line implementation, especially in a large-scale market. To this end, we propose a heuristics approach based on an on-line VCG-like mechanism with polynomial-time complexity, and further characterize the corresponding performance loss bound analytically. We finally provide extensive numerical results to evaluate the performance of the proposed solutions. ",jianwei huang,,2014.0,,arXiv,Gao2014,True,,arXiv,Not available,"Combining Spot and Futures Markets: A Hybrid Market Approach to Dynamic Spectrum Access",7753f9b222bb6848cb0061b7c2f4281c,http://arxiv.org/abs/1405.7175v3 11622," The Gibbard-Satterthwaite Impossibility Theorem holds that dictatorship is the only Pareto optimal and strategyproof social choice function on the full domain of preferences. Much of the work in mechanism design aims at getting around this impossibility theorem. Three grand success stories stand out. On the domains of single peaked preferences, of house matching, and of quasilinear preferences, there are appealing Pareto optimal and strategyproof social choice functions. We investigate whether these success stories are robust to strengthening strategyproofness to obvious strategyproofness (OSP), recently introduced by Li (2015). For single peaked preferences, we characterize the class of OSP-implementable and unanimous social choice functions as dictatorships with safeguards against extremism - mechanisms (which turn out to also be Pareto optimal) in which the dictator can choose the outcome, but other agents may prevent the dictator from choosing an outcome that is too extreme. Median voting is consequently not OSP-implementable. Indeed, the only OSP-implementable quantile rules choose either the minimal or the maximal ideal point. For house matching, we characterize the class of OSP-implementable and Pareto optimal matching rules as sequential barter with lurkers - a significant generalization over bossy variants of bipolar serially dictatorial rules. While Li (2015) shows that second-price auctions are OSP-implementable when only one good is sold, we show that this positive result does not extend to the case of multiple goods. Even when all agents' preferences over goods are quasilinear and additive, no welfare-maximizing auction where losers pay nothing is OSP-implementable when more than one good is sold. Our analysis makes use of a gradual revelation principle, an analog of the (direct) revelation principle for OSP mechanisms that we present and prove. ",sophie bade,,2016.0,,arXiv,Bade2016,True,,arXiv,Not available,Gibbard-Satterthwaite Success Stories and Obvious Strategyproofness,7641f81a818133f916e4034995df7773,http://arxiv.org/abs/1610.04873v3 11623," The Gibbard-Satterthwaite Impossibility Theorem holds that dictatorship is the only Pareto optimal and strategyproof social choice function on the full domain of preferences. Much of the work in mechanism design aims at getting around this impossibility theorem. Three grand success stories stand out. On the domains of single peaked preferences, of house matching, and of quasilinear preferences, there are appealing Pareto optimal and strategyproof social choice functions. We investigate whether these success stories are robust to strengthening strategyproofness to obvious strategyproofness (OSP), recently introduced by Li (2015). For single peaked preferences, we characterize the class of OSP-implementable and unanimous social choice functions as dictatorships with safeguards against extremism - mechanisms (which turn out to also be Pareto optimal) in which the dictator can choose the outcome, but other agents may prevent the dictator from choosing an outcome that is too extreme. Median voting is consequently not OSP-implementable. Indeed, the only OSP-implementable quantile rules choose either the minimal or the maximal ideal point. For house matching, we characterize the class of OSP-implementable and Pareto optimal matching rules as sequential barter with lurkers - a significant generalization over bossy variants of bipolar serially dictatorial rules. While Li (2015) shows that second-price auctions are OSP-implementable when only one good is sold, we show that this positive result does not extend to the case of multiple goods. Even when all agents' preferences over goods are quasilinear and additive, no welfare-maximizing auction where losers pay nothing is OSP-implementable when more than one good is sold. Our analysis makes use of a gradual revelation principle, an analog of the (direct) revelation principle for OSP mechanisms that we present and prove. ",yannai gonczarowski,,2016.0,,arXiv,Bade2016,True,,arXiv,Not available,Gibbard-Satterthwaite Success Stories and Obvious Strategyproofness,7641f81a818133f916e4034995df7773,http://arxiv.org/abs/1610.04873v3 11624," The Robinson-Goforth topology of swaps in adjoining payoffs elegantly arranges 2x2 ordinal games in accordance with important properties including symmetry, number of dominant strategies and Nash Equilibria, and alignment of interests. Adding payoff families based on Nash Equilibria illustrates an additional aspect of this order and aids visualization of the topology. Making ties through half-swaps not only creates simpler games within the topology, but, in reverse, breaking ties shows the evolution of preferences, yielding a natural ordering for the topology of 2x2 games with ties. An ordinal game not only represents an equivalence class of games with real values, but also a discrete equivalent of the normalized version of those games. The topology provides coordinates which could be used to identify related games in a semantic web ontology and facilitate comparative analysis of agent-based simulations and other research in game theory, as well as charting relationships and potential moves between games as a tool for institutional analysis and design. ",bryan bruns,,2010.0,,arXiv,Bruns2010,True,,arXiv,Not available,"Navigating the Topology of 2x2 Games: An Introductory Note on Payoff Families, Normalization, and Natural Order",690d69d05aefe0b8c229c1cc59bb0f25,http://arxiv.org/abs/1010.4727v1 11625," Although mixed extensions of finite games always admit equilibria, this is not the case for countable games, the best-known example being Wald's pick-the-larger-integer game. Several authors have provided conditions for the existence of equilibria in infinite games. These conditions are typically of topological nature and are rarely applicable to countable games. Here we establish an existence result for the equilibrium of countable games when the strategy sets are a countable group and the payoffs are functions of the group operation. In order to obtain the existence of equilibria, finitely additive mixed strategies have to be allowed. This creates a problem of selection of a product measure of mixed strategies. We propose a family of such selections and prove existence of an equilibrium that does not depend on the selection. As a byproduct we show that if finitely additive mixed strategies are allowed, then Wald's game admits an equilibrium. We also prove existence of equilibria for nontrivial extensions of matching-pennies and rock-scissors-paper. Finally we extend the main results to uncountable games. ",valerio capraro,,2012.0,10.1016/j.geb.2013.01.010,Games and Economic Behavior 79 (2013) 163-180,Capraro2012,True,,arXiv,Not available,Existence of equilibria in countable games: an algebraic approach,b99a13d1d776e71220e18f392a41eb2d,http://arxiv.org/abs/1203.2301v3 11626," Although mixed extensions of finite games always admit equilibria, this is not the case for countable games, the best-known example being Wald's pick-the-larger-integer game. Several authors have provided conditions for the existence of equilibria in infinite games. These conditions are typically of topological nature and are rarely applicable to countable games. Here we establish an existence result for the equilibrium of countable games when the strategy sets are a countable group and the payoffs are functions of the group operation. In order to obtain the existence of equilibria, finitely additive mixed strategies have to be allowed. This creates a problem of selection of a product measure of mixed strategies. We propose a family of such selections and prove existence of an equilibrium that does not depend on the selection. As a byproduct we show that if finitely additive mixed strategies are allowed, then Wald's game admits an equilibrium. We also prove existence of equilibria for nontrivial extensions of matching-pennies and rock-scissors-paper. Finally we extend the main results to uncountable games. ",marco scarsini,,2012.0,10.1016/j.geb.2013.01.010,Games and Economic Behavior 79 (2013) 163-180,Capraro2012,True,,arXiv,Not available,Existence of equilibria in countable games: an algebraic approach,b99a13d1d776e71220e18f392a41eb2d,http://arxiv.org/abs/1203.2301v3 11627," Decomposition, i.e. independently analyzing possible subgames, has proven to be an essential principle for effective decision-making in perfect information games. However, in imperfect information games, decomposition has proven to be problematic. To date, all proposed techniques for decomposition in imperfect information games have abandoned theoretical guarantees. This work presents the first technique for decomposing an imperfect information game into subgames that can be solved independently, while retaining optimality guarantees on the full-game solution. We can use this technique to construct theoretically justified algorithms that make better use of information available at run-time, overcome memory or disk limitations at run-time, or make a time/space trade-off to overcome memory or disk limitations while solving a game. In particular, we present an algorithm for subgame solving which guarantees performance in the whole game, in contrast to existing methods which may have unbounded error. In addition, we present an offline game solving algorithm, CFR-D, which can produce a Nash equilibrium for a game that is larger than available storage. ",neil burch,,2013.0,,arXiv,Burch2013,True,,arXiv,Not available,Solving Imperfect Information Games Using Decomposition,1a52428db07b9e237b9f8bdb386c3777,http://arxiv.org/abs/1303.4441v4 11628," Decomposition, i.e. independently analyzing possible subgames, has proven to be an essential principle for effective decision-making in perfect information games. However, in imperfect information games, decomposition has proven to be problematic. To date, all proposed techniques for decomposition in imperfect information games have abandoned theoretical guarantees. This work presents the first technique for decomposing an imperfect information game into subgames that can be solved independently, while retaining optimality guarantees on the full-game solution. We can use this technique to construct theoretically justified algorithms that make better use of information available at run-time, overcome memory or disk limitations at run-time, or make a time/space trade-off to overcome memory or disk limitations while solving a game. In particular, we present an algorithm for subgame solving which guarantees performance in the whole game, in contrast to existing methods which may have unbounded error. In addition, we present an offline game solving algorithm, CFR-D, which can produce a Nash equilibrium for a game that is larger than available storage. ",michael johanson,,2013.0,,arXiv,Burch2013,True,,arXiv,Not available,Solving Imperfect Information Games Using Decomposition,1a52428db07b9e237b9f8bdb386c3777,http://arxiv.org/abs/1303.4441v4 11629," Decomposition, i.e. independently analyzing possible subgames, has proven to be an essential principle for effective decision-making in perfect information games. However, in imperfect information games, decomposition has proven to be problematic. To date, all proposed techniques for decomposition in imperfect information games have abandoned theoretical guarantees. This work presents the first technique for decomposing an imperfect information game into subgames that can be solved independently, while retaining optimality guarantees on the full-game solution. We can use this technique to construct theoretically justified algorithms that make better use of information available at run-time, overcome memory or disk limitations at run-time, or make a time/space trade-off to overcome memory or disk limitations while solving a game. In particular, we present an algorithm for subgame solving which guarantees performance in the whole game, in contrast to existing methods which may have unbounded error. In addition, we present an offline game solving algorithm, CFR-D, which can produce a Nash equilibrium for a game that is larger than available storage. ",michael bowling,,2013.0,,arXiv,Burch2013,True,,arXiv,Not available,Solving Imperfect Information Games Using Decomposition,1a52428db07b9e237b9f8bdb386c3777,http://arxiv.org/abs/1303.4441v4 11630," In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender's payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker's and defender's actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 62% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 57% compared to a baseline equal probability policy. ",nof abuzainab,,2017.0,,arXiv,Abuzainab2017,True,,arXiv,Not available,"Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems",17cdd4e16ce332ae63851570623fe1ba,http://arxiv.org/abs/1708.05741v2 11631," In the field of computational game theory, games are often compared in terms of their size. This can be measured in several ways, including the number of unique game states, the number of decision points, and the total number of legal actions over all decision points. These numbers are either known or estimated for a wide range of classic games such as chess and checkers. In the stochastic and imperfect information game of poker, these sizes are easily computed in ""limit"" games which restrict the players' available actions, but until now had only been estimated for the more complicated ""no-limit"" variants. In this paper, we describe a simple algorithm for quickly computing the size of two-player no-limit poker games, provide an implementation of this algorithm, and present for the first time precise counts of the number of game states, information sets, actions and terminal nodes in the no-limit poker games played in the Annual Computer Poker Competition. ",michael johanson,,2013.0,,arXiv,Johanson2013,True,,arXiv,Not available,Measuring the Size of Large No-Limit Poker Games,c19079e4bf16cb0481647e272f4a79ef,http://arxiv.org/abs/1302.7008v2 11632," Self-serving, rational agents sometimes cooperate to their mutual benefit. The two-player iterated prisoner's dilemma game is a model for including the emergence of cooperation. It is generally believed that there is no simple ultimatum strategy which a player can control the return of the other participants. The recent discovery of the powerful class of zero-determinant strategies in the iterated prisoner's dilemma dramatically expands our understanding of the classic game by uncovering strategies that provide a unilateral advantage to sentient players pitted against unwitting opponents. However, strategies in the prisoner's dilemma game are only two strategies. Are there these results for general multi-strategy games? To address this question, the paper develops a theory for zero-determinant strategies for multi-strategy games, with any number of strategies. The analytical results exhibit a similar yet different scenario to the case of two-strategy games. Zero-determinant strategies in iterated prisoner's dilemma can be seen as degenerate case of our results. The results are also applied to the snowdrift game, the hawk-dove game and the chicken game. ",jin-li guo,,2014.0,,arXiv,Guo2014,True,,arXiv,Not available,Zero-determinant strategies in iterated multi-strategy games,bee7b1e250bf6d586f87c644a19b0e66,http://arxiv.org/abs/1409.1786v2 11633," In this study, we formulate positive and negative externalities caused by changes in the supply of shared vehicles as ride sharing games. The study aims to understand the price of anarchy (PoA) and its improvement via a coordination technique in ride sharing games. A critical question is whether ride sharing games exhibit a pure Nash equilibrium (pNE) since the PoA bound assumes it. Our result shows a sufficient condition for a ride sharing game to have a finite improvement property and a pNE similar to potential games. This is the first step to analyze PoA bound and its improvement by coordination in ride sharing games. We also show an example of coordinating players in ride sharing games using signaling and evaluate the improvement in the PoA. ",tatsuya iwase,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,Pure Nash Equilibrium and Coordination of Players in Ride Sharing Games,6f61fdf170b5d85541dfeb54d1d7b39f,http://arxiv.org/abs/1604.00710v1 11634," In this study, we formulate positive and negative externalities caused by changes in the supply of shared vehicles as ride sharing games. The study aims to understand the price of anarchy (PoA) and its improvement via a coordination technique in ride sharing games. A critical question is whether ride sharing games exhibit a pure Nash equilibrium (pNE) since the PoA bound assumes it. Our result shows a sufficient condition for a ride sharing game to have a finite improvement property and a pNE similar to potential games. This is the first step to analyze PoA bound and its improvement by coordination in ride sharing games. We also show an example of coordinating players in ride sharing games using signaling and evaluate the improvement in the PoA. ",takahiro shiga,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,Pure Nash Equilibrium and Coordination of Players in Ride Sharing Games,6f61fdf170b5d85541dfeb54d1d7b39f,http://arxiv.org/abs/1604.00710v1 11635," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",erik ferragut,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11636," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",andrew brady,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11637," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",ethan brady,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11638," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",jacob ferragut,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11639," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",nathan ferragut,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11640," Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, players have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and ploy multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one's opponent's possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies. ",max wildgruber,,2015.0,,arXiv,Ferragut2015,True,,arXiv,Not available,HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts,abb4a1168e1ea7a76e821d09e05ad691,http://arxiv.org/abs/1511.04389v1 11641," In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender's payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker's and defender's actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 62% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 57% compared to a baseline equal probability policy. ",walid saad,,2017.0,,arXiv,Abuzainab2017,True,,arXiv,Not available,"Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems",17cdd4e16ce332ae63851570623fe1ba,http://arxiv.org/abs/1708.05741v2 11642," Artificial agents are typically oriented to the realization of an externally assigned task and try to optimize over secondary aspects of plan execution such time lapse or power consumption, technically displaying a quasi-dichotomous preference relation. Boolean games have been developed as a paradigm for modelling societies of agents with this type of preference. In boolean games agents exercise control over propositional variables and strive to achieve a goal formula whose realization might require the opponents' cooperation. Recently, a theory of incentive engineering for such games has been devised, where an external authority steers the outcome of the game towards certain desirable properties consistent with players' goals, by imposing a taxation mechanism on the players that makes the outcomes that do not comply with those properties less appealing to them. The present contribution stems from a complementary perspective and studies, instead, how games with quasi-dichotomous preferences can be transformed from inside, rather than from outside, by endowing players with the possibility of sacrificing a part of their payoff received at a certain outcome in order to convince other players to play a certain strategy. Concretely we explore the properties of endogenous games with goals, obtained coupling strategic games with goals, a generalization of boolean games, with the machinery of endogenous games coming from game theory. We analyze equilibria in those structures, showing the preconditions needed for desirable outcomes to be achieved without external intervention. What our results show is that endogenous games with goals display specific irreducible features - with respect to what already known for endogenous games - which makes them worth studying in their own sake. ",paolo turrini,,2013.0,,arXiv,Turrini2013,True,,arXiv,Not available,"Endogenous games with goals: side-payments among goal-directed artificial agents",5147b5e9fd453792001d011866bf29ab,http://arxiv.org/abs/1311.3088v2 11643," Game theory is the standard tool used to model strategic interactions in evolutionary biology and social science. Traditional game theory studies the equilibria of simple games. But is traditional game theory applicable if the game is complicated, and if not, what is? We investigate this question here, defining a complicated game as one with many possible moves, and therefore many possible payoffs conditional on those moves. We investigate two-person games in which the players learn based on experience. By generating games at random we show that under some circumstances the strategies of the two players converge to fixed points, but under others they follow limit cycles or chaotic attractors. The dimension of the chaotic attractors can be very high, implying that the dynamics of the strategies are effectively random. In the chaotic regime the payoffs fluctuate intermittently, showing bursts of rapid change punctuated by periods of quiescence, similar to what is observed in fluid turbulence and financial markets. Our results suggest that such intermittency is a highly generic phenomenon, and that there is a large parameter regime for which complicated strategic interactions generate inherently unpredictable behavior that is best described in the language of dynamical systems theory ",tobias galla,,2011.0,,arXiv,Galla2011,True,,arXiv,Not available,Complex dynamics in learning complicated games,0ec5b24e33c9c87a7116726eeab4635a,http://arxiv.org/abs/1109.4250v1 11644," Game theory is the standard tool used to model strategic interactions in evolutionary biology and social science. Traditional game theory studies the equilibria of simple games. But is traditional game theory applicable if the game is complicated, and if not, what is? We investigate this question here, defining a complicated game as one with many possible moves, and therefore many possible payoffs conditional on those moves. We investigate two-person games in which the players learn based on experience. By generating games at random we show that under some circumstances the strategies of the two players converge to fixed points, but under others they follow limit cycles or chaotic attractors. The dimension of the chaotic attractors can be very high, implying that the dynamics of the strategies are effectively random. In the chaotic regime the payoffs fluctuate intermittently, showing bursts of rapid change punctuated by periods of quiescence, similar to what is observed in fluid turbulence and financial markets. Our results suggest that such intermittency is a highly generic phenomenon, and that there is a large parameter regime for which complicated strategic interactions generate inherently unpredictable behavior that is best described in the language of dynamical systems theory ",j. farmer,,2011.0,,arXiv,Galla2011,True,,arXiv,Not available,Complex dynamics in learning complicated games,0ec5b24e33c9c87a7116726eeab4635a,http://arxiv.org/abs/1109.4250v1 11645," We pursue a general theory of quantum games. We show that quantum games are more efficient than classical games, and provide a saturated upper bound for this efficiency. We demonstrate that the set of finite classical games is a strict subset of the set of finite quantum games. We also deduce the quantum version of the Minimax Theorem and the Nash Equilibrium Theorem. ",chiu lee,,2002.0,10.1103/PhysRevA.67.022311,"Phys. Rev. A 67, 022311 (2003)",Lee2002,True,,arXiv,Not available,Efficiency and formalism of quantum games,2a182d134aed5fd9a51af5f3827da3e7,http://arxiv.org/abs/quant-ph/0207012v4 11646," We pursue a general theory of quantum games. We show that quantum games are more efficient than classical games, and provide a saturated upper bound for this efficiency. We demonstrate that the set of finite classical games is a strict subset of the set of finite quantum games. We also deduce the quantum version of the Minimax Theorem and the Nash Equilibrium Theorem. ",neil johnson,,2002.0,10.1103/PhysRevA.67.022311,"Phys. Rev. A 67, 022311 (2003)",Lee2002,True,,arXiv,Not available,Efficiency and formalism of quantum games,2a182d134aed5fd9a51af5f3827da3e7,http://arxiv.org/abs/quant-ph/0207012v4 11647," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",he huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11648," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",yu-e sun,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11649," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",xiang-yang li,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11650," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",hongli xu,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11651," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",yousong zhou,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11652," We show that, in John Conway's board game Phutball (or Philosopher's Football), it is NP-complete to determine whether the current player has a move that immediately wins the game. In contrast, the similar problems of determining whether there is an immediately winning move in checkers, or a move that kings a man, are both solvable in polynomial time. ",erik demaine,,2000.0,,"More Games of No Chance, MSRI Publications 42, 2002, pp. 351-360",Demaine2000,True,,arXiv,Not available,Phutball Endgames are Hard,cd4ae3bc2ee1d7d30cb897cacfb70794,http://arxiv.org/abs/cs/0008025v2 11653," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",liusheng huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 11654," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",zhili chen,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 11655," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",he huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 11656," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",liusheng huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 11657," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",evangelos markakis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 11658," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",orestis telelis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 11659," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",bart keijzer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 11660," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",evangelos markakis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 11661," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",guido schafer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 11662," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",orestis telelis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 11663," We show that, in John Conway's board game Phutball (or Philosopher's Football), it is NP-complete to determine whether the current player has a move that immediately wins the game. In contrast, the similar problems of determining whether there is an immediately winning move in checkers, or a move that kings a man, are both solvable in polynomial time. ",martin demaine,,2000.0,,"More Games of No Chance, MSRI Publications 42, 2002, pp. 351-360",Demaine2000,True,,arXiv,Not available,Phutball Endgames are Hard,cd4ae3bc2ee1d7d30cb897cacfb70794,http://arxiv.org/abs/cs/0008025v2 11664," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",deepan palguna,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 11665," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",david love,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 11666," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",ilya pollak,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 11667," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",zheng wen,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 11668," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",eric bax,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 11669," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",james li,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 11670," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",riccardo colini-baldeschi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 11671," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",monika henzinger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 11672," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",stefano leonardi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 11673," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",martin starnberger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 11674," We consider the problem of designing incentive-compatible, ex-post individually rational (IR) mechanisms for covering problems in the Bayesian setting, where players' types are drawn from an underlying distribution and may be correlated, and the goal is to minimize the expected total payment made by the mechanism. We formulate a notion of incentive compatibility (IC) that we call {\em support-based IC} that is substantially more robust than Bayesian IC, and develop black-box reductions from support-based-IC mechanism design to algorithm design. For single-dimensional settings, this black-box reduction applies even when we only have an LP-relative {\em approximation algorithm} for the algorithmic problem. Thus, we obtain near-optimal mechanisms for various covering settings including single-dimensional covering problems, multi-item procurement auctions, and multidimensional facility location. ",hadi minooei,,2013.0,,arXiv,Minooei2013,True,,arXiv,Not available,"Near-Optimal and Robust Mechanism Design for Covering Problems with Correlated Players",4b465a62c7f83d037774200b31dfc61d,http://arxiv.org/abs/1311.6883v2 11675," We show that, in John Conway's board game Phutball (or Philosopher's Football), it is NP-complete to determine whether the current player has a move that immediately wins the game. In contrast, the similar problems of determining whether there is an immediately winning move in checkers, or a move that kings a man, are both solvable in polynomial time. ",david eppstein,,2000.0,,"More Games of No Chance, MSRI Publications 42, 2002, pp. 351-360",Demaine2000,True,,arXiv,Not available,Phutball Endgames are Hard,cd4ae3bc2ee1d7d30cb897cacfb70794,http://arxiv.org/abs/cs/0008025v2 11676," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",nikhil devanur,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 11677," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",zhiyi huang,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 11678," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",christos-alexandros psomas,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 11679," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",mark braverman,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 11680," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",jieming mao,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 11681," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",s. weinberg,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 11682," Virtualization has been seen as one of the main evolution trends in the forthcoming fifth generation (5G) cellular networks which enables the decoupling of infrastructure from the services it provides. In this case, the roles of infrastructure providers (InPs) and mobile virtual network operators (MVNOs) can be logically separated and the resources (e.g., subchannels, power, and antennas) of a base station owned by an InP can be transparently shared by multiple MVNOs, while each MVNO virtually owns the entire BS. Naturally, the issue of resource allocation arises. In particular, the InP is required to abstract the physical resources into isolated slices for each MVNO who then allocates the resources within the slice to its subscribed users. In this paper, we aim to address this two-level hierarchical resource allocation problem while satisfying the requirements of efficient resource allocation, strict inter-slice isolation, and the ability of intra-slice customization. To this end, we design a hierarchical combinatorial auction mechanism, based on which a truthful and sub-efficient resource allocation framework is provided. Specifically, winner determination problems (WDPs) are formulated for the InP and MVNOs, and computationally tractable algorithms are proposed to solve these WDPs. Also, pricing schemes are designed to ensure incentive compatibility. The designed mechanism can achieve social efficiency in each level even if each party involved acts selfishly. Numerical results show the effectiveness of the proposed scheme. ",kun zhu,,2015.0,,arXiv,Zhu2015,True,,arXiv,Not available,"Virtualization of 5G Cellular Networks as a Hierarchical Combinatorial Auction",ccc273bf99037d30aff4e7f1c3ff132b,http://arxiv.org/abs/1511.08256v1 11683," Virtualization has been seen as one of the main evolution trends in the forthcoming fifth generation (5G) cellular networks which enables the decoupling of infrastructure from the services it provides. In this case, the roles of infrastructure providers (InPs) and mobile virtual network operators (MVNOs) can be logically separated and the resources (e.g., subchannels, power, and antennas) of a base station owned by an InP can be transparently shared by multiple MVNOs, while each MVNO virtually owns the entire BS. Naturally, the issue of resource allocation arises. In particular, the InP is required to abstract the physical resources into isolated slices for each MVNO who then allocates the resources within the slice to its subscribed users. In this paper, we aim to address this two-level hierarchical resource allocation problem while satisfying the requirements of efficient resource allocation, strict inter-slice isolation, and the ability of intra-slice customization. To this end, we design a hierarchical combinatorial auction mechanism, based on which a truthful and sub-efficient resource allocation framework is provided. Specifically, winner determination problems (WDPs) are formulated for the InP and MVNOs, and computationally tractable algorithms are proposed to solve these WDPs. Also, pricing schemes are designed to ensure incentive compatibility. The designed mechanism can achieve social efficiency in each level even if each party involved acts selfishly. Numerical results show the effectiveness of the proposed scheme. ",ekram hossain,,2015.0,,arXiv,Zhu2015,True,,arXiv,Not available,"Virtualization of 5G Cellular Networks as a Hierarchical Combinatorial Auction",ccc273bf99037d30aff4e7f1c3ff132b,http://arxiv.org/abs/1511.08256v1 11684," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",nikhil devanur,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11685," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",balasubramanian sivan,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11686," Using game and probability theories, I study the French popular game 421, a perfect information stochastic stage game. The problem is to find strategies maximizing the probability of some expected utility. I only solve a player's round against providence, a problem of fate stochastic management: beyond the backward induction solution, bounded complexity motivates heuristic policies. For a unique goal utility, a simple optimal policy, ratchet, is obtained. Its result probabilities are compiled and used, for arbitrary utilities, as the logic of goal identification policies. Various policies appear, close to human behavior, and are exactly evaluated by solving the Kolmogorov equation. ",pierre albarede,,2000.0,,arXiv,Albarede2000,True,,arXiv,Not available,"Fate stochastic management and policy benchmark in 421, a popular game",b288ba581cc7da7cc8acba4a31ba4be4,http://arxiv.org/abs/math/0007129v1 11687," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",vasilis syrgkanis,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11688," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",shahar dobzinski,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 11689," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",noam nisan,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 11690," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",sigal oren,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 11691," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",shuchi chawla,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 11692," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",hu fu,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 11693," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",anna karlin,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 11694," Online auctions are among the most influential e-business applications. Their impact on trading for businesses, as well as consumers, is both remarkable and inevitable. There have been considerable efforts in setting up market places, but, with respects to market volume, online trading is still in its early stages. This chapter discusses the benefits of the concept of Internet marketplaces, with the highest impact on pricing strategies, namely, the conduction of online business auctions. We discuss their benefits, problems and possible solutions. In addition, we sketch actions for suppliers to achieve a better strategic position in the upcoming Internet market places. ",bernhard rumpe,,2014.0,,"Managing E-Commerce and Mobile Computing Technologies IRM Press, 2003",Rumpe2014,True,,arXiv,Not available,E-Business Experiences with Online Auctions,788717a26f25d81a06f4c70a792226ac,http://arxiv.org/abs/1409.6559v1 11695," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",erel segal-halevi,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 11696," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",avinatan hassidim,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 11697," We strengthen non-structure theorems for almost free Abelian groups by studying long Ehrenfeucht-Fraisse games between a fixed group of cardinality lambda and a free Abelian group. A group is called epsilon-game-free if the isomorphism player has a winning strategy in the game (of the described form) of length epsilon in lambda. We prove for a large set of successor cardinals lambda=mu^+ existence of nonfree (mu*omega_1)-game-free groups of cardinality lambda. We concentrate on successors of singular cardinals. ",saharon shelah,,2002.0,,arXiv,Shelah2002,True,,arXiv,Not available,"Almost free groups and Ehrenfeucht-Fra\""ıssé games for successors of singular cardinals",3e92a595ab1d4ca76265339be528a4aa,http://arxiv.org/abs/math/0212063v1 11698," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",yonatan aumann,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 11699," In settings where full incentive-compatibility is not available, such as core-constraint combinatorial auctions and budget-balanced combinatorial exchanges, we may wish to design mechanisms that are as incentive-compatible as possible. This paper offers a new characterization of approximate incentive-compatibility by casting the pricing problem as a meta-game between the center and the participating agents. Through a suitable set of simplifications, we describe the equilibrium of this game as a variational problem. We use this to characterize the space of optimal prices, enabling closed-form solutions in restricted cases, and numerically-determined prices in the general case. We offer theory motivating this approach, and numerical experiments showing its application. ",benjamin lubin,,2015.0,,arXiv,Lubin2015,True,,arXiv,Not available,Games and Meta-Games: Pricing Rules for Combinatorial Mechanisms,8eda734471a1abf5b64efbf8aa7cad1a,http://arxiv.org/abs/1503.06244v1 11700," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",xuelin shi,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 11701," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",ke xu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 11702," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",jiangchuan liu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 11703," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",yong wang,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 11704," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",ron holzman,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11705," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",noa kfir-dahav,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11706," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",dov monderer,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11707," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",moshe tennenholtz,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11708," We strengthen non-structure theorems for almost free Abelian groups by studying long Ehrenfeucht-Fraisse games between a fixed group of cardinality lambda and a free Abelian group. A group is called epsilon-game-free if the isomorphism player has a winning strategy in the game (of the described form) of length epsilon in lambda. We prove for a large set of successor cardinals lambda=mu^+ existence of nonfree (mu*omega_1)-game-free groups of cardinality lambda. We concentrate on successors of singular cardinals. ",pauli vaisanen,,2002.0,,arXiv,Shelah2002,True,,arXiv,Not available,"Almost free groups and Ehrenfeucht-Fra\""ıssé games for successors of singular cardinals",3e92a595ab1d4ca76265339be528a4aa,http://arxiv.org/abs/math/0212063v1 11709," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",pinyan lu,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 11710," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",tao xiao,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 11711," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",amin khan,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 11712," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",xavier vilaca,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 11713," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",luis rodrigues,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 11714," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",felix freitag,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 11715," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",lior fishman,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 11716," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",vanessa reams,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 11717," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",david simmons,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 11718," Changes in payoffs can transform Prisoner's Dilemma and other social dilemmas into harmonious win-win games. Using the Robinson-Goforth topology of 2x2 games, this paper analyzes how payoff swaps turn Prisoner's Dilemma into other games, compares Prisoner's Dilemmas with other families of games, traces paths that affect the difficulty of transforming Prisoner's Dilemma and other social dilemmas into win-win games, and shows how ties connect simpler and more complex games. Charts illustrate the relationships between the 144 strict ordinal 2x2 games, the 38 symmetric 2x2 ordinal games with and without ties, and the complete set of 1,413 2x2 ordinal games. Payoffs from the symmetric ordinal 2x2 games combine to form asymmetric games, generating coordinates for a simple labeling scheme to uniquely identify and locate all asymmetric ordinal 2x2 games. The expanded topology elegantly maps relationships between 2x2 games with and without ties, enables a systematic understanding of the potential for transformations in social dilemmas and other strategic interactions, offers a tool for institutional analysis and design, and locates a variety of interesting games for further research. ",bryan bruns,,2012.0,,arXiv,Bruns2012,True,,arXiv,Not available,"Escaping Prisoner's Dilemmas: From Discord to Harmony in the Landscape of 2x2 Games",03fc279768051cef330b42ad51b9a46c,http://arxiv.org/abs/1206.1880v1 11719," We compute a parametric description of the totally mixed Nash equilibria of a generic game in normal form with pre-fixed structure. Using this representation, we show conditions under which a game has the maximum possible number of this kind of equilibria. Then, we present a symbolic procedure that allows us to describe and estimate the number of isolated totally mixed Nash equilibria of an arbitrary game. Under certain assumptions, the algorithm computes the exact number of these equilibria. ",g. jeronimo,,2007.0,,arXiv,Jeronimo2007,True,,arXiv,Not available,A parametric representation of totally mixed Nash equilibria,079cadf1e9ac47324fdcac70fbdb0b8d,http://arxiv.org/abs/math/0703436v1 11720," We study tree games developed recently by Matteo Mio as a game interpretation of the probabilistic $\mu$-calculus. With expressive power comes complexity. Mio showed that tree games are able to encode Blackwell games and, consequently, are not determined under deterministic strategies. We show that non-stochastic tree games with objectives recognisable by so-called game automata are determined under deterministic, finite memory strategies. Moreover, we give an elementary algorithmic procedure which, for an arbitrary regular language L and a finite non-stochastic tree game with a winning objective L decides if the game is determined under deterministic strategies. ",marcin przybylko,,2014.0,10.4204/EPTCS.161.20,"EPTCS 161, 2014, pp. 231-244",Przybyłko2014,True,,arXiv,Not available,Tree games with regular objectives,a9704b729e28aacabd82219a63cea093,http://arxiv.org/abs/1408.6477v1 11721," We generalize a concept of classical finite extensive game to make it useful for application of quantum objects. The generalization extends a quantum realization scheme of static games to any finite extensive game. It represents an extension of any classical finite extensive games to the quantum domain. In addition our model is compatible with well-known quantum schemes of static games. The paper is summed up by two examples. ",piotr frackiewicz,,2010.0,,arXiv,Frackiewicz2010,True,,arXiv,Not available,Quantum realization of extensive games,0fd92db8f41cc89ea6518ce8291d8c3e,http://arxiv.org/abs/1008.3366v1 11722," The paper is devoted to quantization of extensive games with the use of both the Marinatto-Weber and the Eisert-Wilkens-Lewenstein concept of quantum game. We revise the current conception of quantum ultimatum game and we show why the proposal is unacceptable. To support our comment, we present the new idea of the quantum ultimatum game. Our scheme also makes a point of departure for a protocol to quantize extensive games. ",piotr frackiewicz,,2011.0,,arXiv,Frackiewicz2011,True,,arXiv,Not available,Quantum information approach to the ultimatum game,48164113511c96de38c48d639571f3fc,http://arxiv.org/abs/1109.2169v1 11723," In this paper, some new criteria for detecting whether a finite game is potential are proposed by solving potential equations. The verification equations with the minimal number for checking a potential game are obtained for the first time. Some connections between the potential equations and the existing characterizations of potential games are established. It is revealed that a finite game is potential if and only if its every bi-matrix sub-game is potential. ",xinyun liu,,2015.0,,arXiv,Liu2015,True,,arXiv,Not available,On Potential Equations of Finite Games,14ac282d465af47fbdb459a61904a439,http://arxiv.org/abs/1504.07342v1 11724," In this paper, some new criteria for detecting whether a finite game is potential are proposed by solving potential equations. The verification equations with the minimal number for checking a potential game are obtained for the first time. Some connections between the potential equations and the existing characterizations of potential games are established. It is revealed that a finite game is potential if and only if its every bi-matrix sub-game is potential. ",jiandong zhu,,2015.0,,arXiv,Liu2015,True,,arXiv,Not available,On Potential Equations of Finite Games,14ac282d465af47fbdb459a61904a439,http://arxiv.org/abs/1504.07342v1 11725," We consider some well-known families of two-player, zero-sum, perfect information games that can be viewed as special cases of Shapley's stochastic games. We show that the following tasks are polynomial time equivalent: - Solving simple stochastic games. - Solving stochastic mean-payoff games with rewards and probabilities given in unary. - Solving stochastic mean-payoff games with rewards and probabilities given in binary. ",vladimir gurvich,,2008.0,,arXiv,Gurvich2008,True,,arXiv,Not available,On the computational complexity of solving stochastic mean-payoff games,bd67a71f26c2168e2fa6e1d9a9b97f8b,http://arxiv.org/abs/0812.0486v1 11726," We consider some well-known families of two-player, zero-sum, perfect information games that can be viewed as special cases of Shapley's stochastic games. We show that the following tasks are polynomial time equivalent: - Solving simple stochastic games. - Solving stochastic mean-payoff games with rewards and probabilities given in unary. - Solving stochastic mean-payoff games with rewards and probabilities given in binary. ",peter miltersen,,2008.0,,arXiv,Gurvich2008,True,,arXiv,Not available,On the computational complexity of solving stochastic mean-payoff games,bd67a71f26c2168e2fa6e1d9a9b97f8b,http://arxiv.org/abs/0812.0486v1 11727," We provide several tests to determine whether a game is a potential game or whether it is a zero-sum equivalent game---a game which is strategically equivalent to a zero-sum game in the same way that a potential game is strategically equivalent to a common interest game. We present a unified framework applicable for both potential and zero-sum equivalent games by deriving a simple but useful characterization of these games. This allows us to re-derive known criteria for potential games, as well as obtain several new criteria. In particular, we prove (1) new integral tests for potential games and for zero-sum equivalent games, (2) a new derivative test for zero-sum equivalent games, and (3) a new representation characterization for zero-sum equivalent games. ",sung-ha hwang,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,Simple Characterizations of Potential Games and Zero-sum Games,607e3704508fe1114d05a948c98bc898,http://arxiv.org/abs/1602.04410v1 11728," We provide several tests to determine whether a game is a potential game or whether it is a zero-sum equivalent game---a game which is strategically equivalent to a zero-sum game in the same way that a potential game is strategically equivalent to a common interest game. We present a unified framework applicable for both potential and zero-sum equivalent games by deriving a simple but useful characterization of these games. This allows us to re-derive known criteria for potential games, as well as obtain several new criteria. In particular, we prove (1) new integral tests for potential games and for zero-sum equivalent games, (2) a new derivative test for zero-sum equivalent games, and (3) a new representation characterization for zero-sum equivalent games. ",luc rey-bellet,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,Simple Characterizations of Potential Games and Zero-sum Games,607e3704508fe1114d05a948c98bc898,http://arxiv.org/abs/1602.04410v1 11729," We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems. ",kyle burke,,2007.0,,arXiv,Burke2007,True,,arXiv,Not available,Games on the Sperner Triangle,581fb77ba83bdd38efe248e1cc1a347b,http://arxiv.org/abs/cs/0702153v1 11730," We compute a parametric description of the totally mixed Nash equilibria of a generic game in normal form with pre-fixed structure. Using this representation, we show conditions under which a game has the maximum possible number of this kind of equilibria. Then, we present a symbolic procedure that allows us to describe and estimate the number of isolated totally mixed Nash equilibria of an arbitrary game. Under certain assumptions, the algorithm computes the exact number of these equilibria. ",d. perrucci,,2007.0,,arXiv,Jeronimo2007,True,,arXiv,Not available,A parametric representation of totally mixed Nash equilibria,079cadf1e9ac47324fdcac70fbdb0b8d,http://arxiv.org/abs/math/0703436v1 11731," We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems. ",shang-hua teng,,2007.0,,arXiv,Burke2007,True,,arXiv,Not available,Games on the Sperner Triangle,581fb77ba83bdd38efe248e1cc1a347b,http://arxiv.org/abs/cs/0702153v1 11732," Game tree search algorithms such as minimax have been used with enormous success in turn-based adversarial games such as Chess or Checkers. However, such algorithms cannot be directly applied to real-time strategy (RTS) games because a number of reasons. For example, minimax assumes a turn-taking game mechanics, not present in RTS games. In this paper we present RTMM, a real-time variant of the standard minimax algorithm, and discuss its applicability in the context of RTS games. We discuss its strengths and weaknesses, and evaluate it in two real-time games. ",santiago ontanon,,2012.0,,arXiv,Ontanon2012,True,,arXiv,Not available,Experiments with Game Tree Search in Real-Time Strategy Games,8f42804b7b4be821b6c23f1259408c1e,http://arxiv.org/abs/1208.1940v1 11733," In a two-person Rock-Paper-Scissors (RPS) game, if we set a loss worth nothing and a tie worth 1, and the payoff of winning (the incentive a) as a variable, this game is called as generalized RPS game. The generalized RPS game is a representative mathematical model to illustrate the game dynamics, appearing widely in textbook. However, how actual motions in these games depend on the incentive has never been reported quantitatively. Using the data from 7 games with different incentives, including 84 groups of 6 subjects playing the game in 300-round, with random-pair tournaments and local information recorded, we find that, both on social and individual level, the actual motions are changing continuously with the incentive. More expressively, some representative findings are, (1) in social collective strategy transit views, the forward transition vector field is more and more centripetal as the stability of the system increasing; (2) In the individual behavior of strategy transit view, there exists a phase transformation as the stability of the systems increasing, and the phase transformation point being near the standard RPS; (3) Conditional response behaviors are structurally changing accompanied by the controlled incentive. As a whole, the best response behavior increases and the win-stay lose-shift (WSLS) behavior declines with the incentive. Further, the outcome of win, tie, and lose influence the best response behavior and WSLS behavior. Both as the best response behavior, the win-stay behavior declines with the incentive while the lose-left-shift behavior increase with the incentive. And both as the WSLS behavior, the lose-left-shift behavior increase with the incentive, but the lose-right-shift behaviors declines with the incentive. We hope to learn which one in tens of learning models can interpret the empirical observation above. ",zhijian wang,,2014.0,,arXiv,Wang2014,True,,arXiv,Not available,"Incentive and stability in the Rock-Paper-Scissors game: an experimental investigation",cfefe305f98e39a4d7c0caa966a321bf,http://arxiv.org/abs/1407.1170v1 11734," In a two-person Rock-Paper-Scissors (RPS) game, if we set a loss worth nothing and a tie worth 1, and the payoff of winning (the incentive a) as a variable, this game is called as generalized RPS game. The generalized RPS game is a representative mathematical model to illustrate the game dynamics, appearing widely in textbook. However, how actual motions in these games depend on the incentive has never been reported quantitatively. Using the data from 7 games with different incentives, including 84 groups of 6 subjects playing the game in 300-round, with random-pair tournaments and local information recorded, we find that, both on social and individual level, the actual motions are changing continuously with the incentive. More expressively, some representative findings are, (1) in social collective strategy transit views, the forward transition vector field is more and more centripetal as the stability of the system increasing; (2) In the individual behavior of strategy transit view, there exists a phase transformation as the stability of the systems increasing, and the phase transformation point being near the standard RPS; (3) Conditional response behaviors are structurally changing accompanied by the controlled incentive. As a whole, the best response behavior increases and the win-stay lose-shift (WSLS) behavior declines with the incentive. Further, the outcome of win, tie, and lose influence the best response behavior and WSLS behavior. Both as the best response behavior, the win-stay behavior declines with the incentive while the lose-left-shift behavior increase with the incentive. And both as the WSLS behavior, the lose-left-shift behavior increase with the incentive, but the lose-right-shift behaviors declines with the incentive. We hope to learn which one in tens of learning models can interpret the empirical observation above. ",bin xu,,2014.0,,arXiv,Wang2014,True,,arXiv,Not available,"Incentive and stability in the Rock-Paper-Scissors game: an experimental investigation",cfefe305f98e39a4d7c0caa966a321bf,http://arxiv.org/abs/1407.1170v1 11735," We propose a class of two person perfect information games based on weighted graphs. One of these games can be described in terms of a round pizza which is cut radially into pieces of varying size. The two players alternately take pieces subject to the following rule: Once the first piece has been chosen, all subsequent selections must be adjacent to the hole left by the previously taken pieces. Each player tries to get as much pizza as possible. The original pizza problem was to settle the conjecture that Player One can always get at least half of the pizza. The conjecture turned out to be false. Our main result is a complete solution of a somewhat simpler class of games, concatenations of stacks and two-ended stacks, and we provide a linear time algorithm for this. The algorithm and its output can be described without reference to games. It produces a certain kind of partition of a given finite sequence of real numbers. The conditions on the partition involve alternating sums of various segments of the given sequence. We do not know whether these partitions have applications outside of game theory. The algorithm leads to a quadratic time algorithm which gives the value and an optimal initial move for pizza games. We also provide some general theory concerning the semigroup of equivalence classes of graph games. ",daniel brown,,2015.0,,arXiv,Brown2015,True,,arXiv,Not available,Graph games and the pizza problem,67872de882431aac3818d776ce928fe3,http://arxiv.org/abs/1509.07533v2 11736," We propose a class of two person perfect information games based on weighted graphs. One of these games can be described in terms of a round pizza which is cut radially into pieces of varying size. The two players alternately take pieces subject to the following rule: Once the first piece has been chosen, all subsequent selections must be adjacent to the hole left by the previously taken pieces. Each player tries to get as much pizza as possible. The original pizza problem was to settle the conjecture that Player One can always get at least half of the pizza. The conjecture turned out to be false. Our main result is a complete solution of a somewhat simpler class of games, concatenations of stacks and two-ended stacks, and we provide a linear time algorithm for this. The algorithm and its output can be described without reference to games. It produces a certain kind of partition of a given finite sequence of real numbers. The conditions on the partition involve alternating sums of various segments of the given sequence. We do not know whether these partitions have applications outside of game theory. The algorithm leads to a quadratic time algorithm which gives the value and an optimal initial move for pizza games. We also provide some general theory concerning the semigroup of equivalence classes of graph games. ",lawrence brown,,2015.0,,arXiv,Brown2015,True,,arXiv,Not available,Graph games and the pizza problem,67872de882431aac3818d776ce928fe3,http://arxiv.org/abs/1509.07533v2 11737," Extensive work has been conducted both in game theory and logic to model strategic interaction. An important question is whether we can use these theories to design agents for interacting with people? On the one hand, they provide a formal design specification for agent strategies. On the other hand, people do not necessarily adhere to playing in accordance with these strategies, and their behavior is affected by a multitude of social and psychological factors. In this paper we will consider the question of whether strategies implied by theories of strategic behavior can be used by automated agents that interact proficiently with people. We will focus on automated agents that we built that need to interact with people in two negotiation settings: bargaining and deliberation. For bargaining we will study game-theory based equilibrium agents and for argumentation we will discuss logic-based argumentation theory. We will also consider security games and persuasion games and will discuss the benefits of using equilibrium based agents. ",sarit kraus,,2016.0,10.4204/EPTCS.215.2,"EPTCS 215, 2016, pp. 13-27",Kraus2016,True,,arXiv,Not available,Human-Agent Decision-making: Combining Theory and Practice,2240bad224ff7d9deb4917f84cef3c1e,http://arxiv.org/abs/1606.07514v1 11738," This article introduces the application of game theory to understand noisy real-time signaling and the resulting behavioral dynamics in microscopic populations such as bacteria and other cells. It presents a bridge between the fields of molecular communication and microscopic game theory. Molecular communication uses conventional communication engineering theory and techniques to study and design systems that use chemical molecules as information carriers. Microscopic game theory models interactions within and between populations of cells and microorganisms. Integrating these two fields provides unique opportunities to understand and control microscopic populations that have imperfect signal propagation. Two case studies, namely bacteria quorum sensing and tumor cell signaling, are presented with example games to demonstrate the potential of this approach. ",adam noel,,2017.0,,arXiv,Noel2017,True,,arXiv,Not available,"Using Game Theory for Real-Time Behavioral Dynamics in Microscopic Populations with Noisy Signaling",5eb572c867d3067dc2386970d33125d8,http://arxiv.org/abs/1711.04870v2 11739," This article introduces the application of game theory to understand noisy real-time signaling and the resulting behavioral dynamics in microscopic populations such as bacteria and other cells. It presents a bridge between the fields of molecular communication and microscopic game theory. Molecular communication uses conventional communication engineering theory and techniques to study and design systems that use chemical molecules as information carriers. Microscopic game theory models interactions within and between populations of cells and microorganisms. Integrating these two fields provides unique opportunities to understand and control microscopic populations that have imperfect signal propagation. Two case studies, namely bacteria quorum sensing and tumor cell signaling, are presented with example games to demonstrate the potential of this approach. ",yuting fang,,2017.0,,arXiv,Noel2017,True,,arXiv,Not available,"Using Game Theory for Real-Time Behavioral Dynamics in Microscopic Populations with Noisy Signaling",5eb572c867d3067dc2386970d33125d8,http://arxiv.org/abs/1711.04870v2 11740," This article introduces the application of game theory to understand noisy real-time signaling and the resulting behavioral dynamics in microscopic populations such as bacteria and other cells. It presents a bridge between the fields of molecular communication and microscopic game theory. Molecular communication uses conventional communication engineering theory and techniques to study and design systems that use chemical molecules as information carriers. Microscopic game theory models interactions within and between populations of cells and microorganisms. Integrating these two fields provides unique opportunities to understand and control microscopic populations that have imperfect signal propagation. Two case studies, namely bacteria quorum sensing and tumor cell signaling, are presented with example games to demonstrate the potential of this approach. ",nan yang,,2017.0,,arXiv,Noel2017,True,,arXiv,Not available,"Using Game Theory for Real-Time Behavioral Dynamics in Microscopic Populations with Noisy Signaling",5eb572c867d3067dc2386970d33125d8,http://arxiv.org/abs/1711.04870v2 11741," We compute a parametric description of the totally mixed Nash equilibria of a generic game in normal form with pre-fixed structure. Using this representation, we show conditions under which a game has the maximum possible number of this kind of equilibria. Then, we present a symbolic procedure that allows us to describe and estimate the number of isolated totally mixed Nash equilibria of an arbitrary game. Under certain assumptions, the algorithm computes the exact number of these equilibria. ",j. sabia,,2007.0,,arXiv,Jeronimo2007,True,,arXiv,Not available,A parametric representation of totally mixed Nash equilibria,079cadf1e9ac47324fdcac70fbdb0b8d,http://arxiv.org/abs/math/0703436v1 11742," This article introduces the application of game theory to understand noisy real-time signaling and the resulting behavioral dynamics in microscopic populations such as bacteria and other cells. It presents a bridge between the fields of molecular communication and microscopic game theory. Molecular communication uses conventional communication engineering theory and techniques to study and design systems that use chemical molecules as information carriers. Microscopic game theory models interactions within and between populations of cells and microorganisms. Integrating these two fields provides unique opportunities to understand and control microscopic populations that have imperfect signal propagation. Two case studies, namely bacteria quorum sensing and tumor cell signaling, are presented with example games to demonstrate the potential of this approach. ",dimitrios makrakis,,2017.0,,arXiv,Noel2017,True,,arXiv,Not available,"Using Game Theory for Real-Time Behavioral Dynamics in Microscopic Populations with Noisy Signaling",5eb572c867d3067dc2386970d33125d8,http://arxiv.org/abs/1711.04870v2 11743," This article introduces the application of game theory to understand noisy real-time signaling and the resulting behavioral dynamics in microscopic populations such as bacteria and other cells. It presents a bridge between the fields of molecular communication and microscopic game theory. Molecular communication uses conventional communication engineering theory and techniques to study and design systems that use chemical molecules as information carriers. Microscopic game theory models interactions within and between populations of cells and microorganisms. Integrating these two fields provides unique opportunities to understand and control microscopic populations that have imperfect signal propagation. Two case studies, namely bacteria quorum sensing and tumor cell signaling, are presented with example games to demonstrate the potential of this approach. ",andrew eckford,,2017.0,,arXiv,Noel2017,True,,arXiv,Not available,"Using Game Theory for Real-Time Behavioral Dynamics in Microscopic Populations with Noisy Signaling",5eb572c867d3067dc2386970d33125d8,http://arxiv.org/abs/1711.04870v2 11744," The dense deployment of small-cell base stations in HetSNets requires efficient resource allocation techniques. More precisely, the problem of associating users to SBSs must be revised and carefully studied. This problem is NP-hard and requires solving an integer optimization problem. In order to efficiently solve this problem, we model it using non-cooperative game theory. First, we design two non-cooperative games to solve the problem and show the existence of pure Nash equilibria (PNE) in both games. These equilibria are shown to be far from the social optimum. Hence, we propose a better game design in order to approach this optimum. This new game is proved to have no PNE in general. However, simulations show, for Rayleigh fading channels, that a PNE always exists for all instances of the game. In addition, we show that its prices of anarchy and stability are close to one. We propose a best response dynamics (BRD) algorithm that converges to a PNE when it exists. Because of the high information exchange of BRD, a completely distributed algorithm, based on the theory of learning, is proposed. Simulations show that this algorithm has tight-to-optimal performance and further it converges to a PNE (when existing) with high probability. ",zoubeir mlika,,2015.0,,arXiv,Mlika2015,True,,arXiv,Not available,On the Base Station Association Problem in HetSNets,6e9791ed14dc61c0c519b1993278fd1e,http://arxiv.org/abs/1508.00527v1 11745," The dense deployment of small-cell base stations in HetSNets requires efficient resource allocation techniques. More precisely, the problem of associating users to SBSs must be revised and carefully studied. This problem is NP-hard and requires solving an integer optimization problem. In order to efficiently solve this problem, we model it using non-cooperative game theory. First, we design two non-cooperative games to solve the problem and show the existence of pure Nash equilibria (PNE) in both games. These equilibria are shown to be far from the social optimum. Hence, we propose a better game design in order to approach this optimum. This new game is proved to have no PNE in general. However, simulations show, for Rayleigh fading channels, that a PNE always exists for all instances of the game. In addition, we show that its prices of anarchy and stability are close to one. We propose a best response dynamics (BRD) algorithm that converges to a PNE when it exists. Because of the high information exchange of BRD, a completely distributed algorithm, based on the theory of learning, is proposed. Simulations show that this algorithm has tight-to-optimal performance and further it converges to a PNE (when existing) with high probability. ",elmahdi driouch,,2015.0,,arXiv,Mlika2015,True,,arXiv,Not available,On the Base Station Association Problem in HetSNets,6e9791ed14dc61c0c519b1993278fd1e,http://arxiv.org/abs/1508.00527v1 11746," The dense deployment of small-cell base stations in HetSNets requires efficient resource allocation techniques. More precisely, the problem of associating users to SBSs must be revised and carefully studied. This problem is NP-hard and requires solving an integer optimization problem. In order to efficiently solve this problem, we model it using non-cooperative game theory. First, we design two non-cooperative games to solve the problem and show the existence of pure Nash equilibria (PNE) in both games. These equilibria are shown to be far from the social optimum. Hence, we propose a better game design in order to approach this optimum. This new game is proved to have no PNE in general. However, simulations show, for Rayleigh fading channels, that a PNE always exists for all instances of the game. In addition, we show that its prices of anarchy and stability are close to one. We propose a best response dynamics (BRD) algorithm that converges to a PNE when it exists. Because of the high information exchange of BRD, a completely distributed algorithm, based on the theory of learning, is proposed. Simulations show that this algorithm has tight-to-optimal performance and further it converges to a PNE (when existing) with high probability. ",wessam ajib,,2015.0,,arXiv,Mlika2015,True,,arXiv,Not available,On the Base Station Association Problem in HetSNets,6e9791ed14dc61c0c519b1993278fd1e,http://arxiv.org/abs/1508.00527v1 11747," The dense deployment of small-cell base stations in HetSNets requires efficient resource allocation techniques. More precisely, the problem of associating users to SBSs must be revised and carefully studied. This problem is NP-hard and requires solving an integer optimization problem. In order to efficiently solve this problem, we model it using non-cooperative game theory. First, we design two non-cooperative games to solve the problem and show the existence of pure Nash equilibria (PNE) in both games. These equilibria are shown to be far from the social optimum. Hence, we propose a better game design in order to approach this optimum. This new game is proved to have no PNE in general. However, simulations show, for Rayleigh fading channels, that a PNE always exists for all instances of the game. In addition, we show that its prices of anarchy and stability are close to one. We propose a best response dynamics (BRD) algorithm that converges to a PNE when it exists. Because of the high information exchange of BRD, a completely distributed algorithm, based on the theory of learning, is proposed. Simulations show that this algorithm has tight-to-optimal performance and further it converges to a PNE (when existing) with high probability. ",halima elbiaze,,2015.0,,arXiv,Mlika2015,True,,arXiv,Not available,On the Base Station Association Problem in HetSNets,6e9791ed14dc61c0c519b1993278fd1e,http://arxiv.org/abs/1508.00527v1 11748," A number of recent studies have focused on novel features in game theory when the games are played using quantum mechanical toolbox (entanglement, unitary operators, measurement). Researchers have concentrated in two-player-two strategy, 2x2, dilemma containing classical games, and transferred them into quantum realm showing that in quantum pure strategies dilemmas in such games can be resolved if entanglement is distributed between the players armed with quantum operations. Moreover, it became clear that the players receive the highest sum of payoffs available in the game, which are otherwise impossible in classical pure strategies. Encouraged by the observation of rich dynamics of physical systems with many interacting parties and the power of entanglement in quantum versions of 2x2 games, it became generally accepted that quantum versions can be easily extended to N-player situations by simply allowing N-partite entangled states. In this article, however, we show that this is not generally true because the reproducibility of classical tasks in quantum domain imposes limitations on the type of entanglement and quantum operators. We propose a benchmark for the evaluation of quantum and classical versions of games, and derive the necessary and sufficient conditions for a physical realization. We give examples of entangled states that can and cannot be used, and the characteristics of quantum operators used as strategies. ",junichi shimamura,,2005.0,,arXiv,Shimamura2005,True,,arXiv,Not available,"Playing games in quantum mechanical settings: A necessary and sufficient condition",75103f7c44f0d5bfea0bcb06c6a179a9,http://arxiv.org/abs/quant-ph/0508105v1 11749," A number of recent studies have focused on novel features in game theory when the games are played using quantum mechanical toolbox (entanglement, unitary operators, measurement). Researchers have concentrated in two-player-two strategy, 2x2, dilemma containing classical games, and transferred them into quantum realm showing that in quantum pure strategies dilemmas in such games can be resolved if entanglement is distributed between the players armed with quantum operations. Moreover, it became clear that the players receive the highest sum of payoffs available in the game, which are otherwise impossible in classical pure strategies. Encouraged by the observation of rich dynamics of physical systems with many interacting parties and the power of entanglement in quantum versions of 2x2 games, it became generally accepted that quantum versions can be easily extended to N-player situations by simply allowing N-partite entangled states. In this article, however, we show that this is not generally true because the reproducibility of classical tasks in quantum domain imposes limitations on the type of entanglement and quantum operators. We propose a benchmark for the evaluation of quantum and classical versions of games, and derive the necessary and sufficient conditions for a physical realization. We give examples of entangled states that can and cannot be used, and the characteristics of quantum operators used as strategies. ",sahin ozdemir,,2005.0,,arXiv,Shimamura2005,True,,arXiv,Not available,"Playing games in quantum mechanical settings: A necessary and sufficient condition",75103f7c44f0d5bfea0bcb06c6a179a9,http://arxiv.org/abs/quant-ph/0508105v1 11750," A number of recent studies have focused on novel features in game theory when the games are played using quantum mechanical toolbox (entanglement, unitary operators, measurement). Researchers have concentrated in two-player-two strategy, 2x2, dilemma containing classical games, and transferred them into quantum realm showing that in quantum pure strategies dilemmas in such games can be resolved if entanglement is distributed between the players armed with quantum operations. Moreover, it became clear that the players receive the highest sum of payoffs available in the game, which are otherwise impossible in classical pure strategies. Encouraged by the observation of rich dynamics of physical systems with many interacting parties and the power of entanglement in quantum versions of 2x2 games, it became generally accepted that quantum versions can be easily extended to N-player situations by simply allowing N-partite entangled states. In this article, however, we show that this is not generally true because the reproducibility of classical tasks in quantum domain imposes limitations on the type of entanglement and quantum operators. We propose a benchmark for the evaluation of quantum and classical versions of games, and derive the necessary and sufficient conditions for a physical realization. We give examples of entangled states that can and cannot be used, and the characteristics of quantum operators used as strategies. ",nobuyuki imoto,,2005.0,,arXiv,Shimamura2005,True,,arXiv,Not available,"Playing games in quantum mechanical settings: A necessary and sufficient condition",75103f7c44f0d5bfea0bcb06c6a179a9,http://arxiv.org/abs/quant-ph/0508105v1 11751," Simple stochastic games are two-player zero-sum stochastic games with turn-based moves, perfect information, and reachability winning conditions. We present two new algorithms computing the values of simple stochastic games. Both of them rely on the existence of optimal permutation strategies, a class of positional strategies derived from permutations of the random vertices. The ""permutation-enumeration"" algorithm performs an exhaustive search among these strategies, while the ""permutation-improvement"" algorithm is based on successive improvements, \`a la Hoffman-Karp. Our algorithms improve previously known algorithms in several aspects. First they run in polynomial time when the number of random vertices is fixed, so the problem of solving simple stochastic games is fixed-parameter tractable when the parameter is the number of random vertices. Furthermore, our algorithms do not require the input game to be transformed into a stopping game. Finally, the permutation-enumeration algorithm does not use linear programming, while the permutation-improvement algorithm may run in polynomial time. ",hugo gimbert,,2007.0,10.2168/LMCS-5(2:9)2009,"Logical Methods in Computer Science, Volume 5, Issue 2 (May 25, 2009) lmcs:1119",Gimbert2007,True,,arXiv,Not available,Solving Simple Stochastic Games with Few Random Vertices,b58561725fe71f2049ffaba538e29607,http://arxiv.org/abs/0712.1765v6 11752," In these lecture notes we investigate the implications of the identification of strategies with quantum operations in game theory beyond the results presented in [J. Eisert, M. Wilkens, and M. Lewenstein, Phys. Rev. Lett. 83, 3077 (1999)]. After introducing a general framework, we study quantum games with a classical analogue in order to flesh out the peculiarities of game theoretical settings in the quantum domain. Special emphasis is given to a detailed investigation of different sets of quantum strategies. ",j. eisert,,2000.0,10.1080/09500340008232180,J. Mod. Opt. 47 (2000) 2543,Eisert2000,True,,arXiv,Not available,Quantum Games,0bba94ff8933b0a0ec4b20babe14361a,http://arxiv.org/abs/quant-ph/0004076v1 11753," Simple stochastic games are two-player zero-sum stochastic games with turn-based moves, perfect information, and reachability winning conditions. We present two new algorithms computing the values of simple stochastic games. Both of them rely on the existence of optimal permutation strategies, a class of positional strategies derived from permutations of the random vertices. The ""permutation-enumeration"" algorithm performs an exhaustive search among these strategies, while the ""permutation-improvement"" algorithm is based on successive improvements, \`a la Hoffman-Karp. Our algorithms improve previously known algorithms in several aspects. First they run in polynomial time when the number of random vertices is fixed, so the problem of solving simple stochastic games is fixed-parameter tractable when the parameter is the number of random vertices. Furthermore, our algorithms do not require the input game to be transformed into a stopping game. Finally, the permutation-enumeration algorithm does not use linear programming, while the permutation-improvement algorithm may run in polynomial time. ",florian horn,,2007.0,10.2168/LMCS-5(2:9)2009,"Logical Methods in Computer Science, Volume 5, Issue 2 (May 25, 2009) lmcs:1119",Gimbert2007,True,,arXiv,Not available,Solving Simple Stochastic Games with Few Random Vertices,b58561725fe71f2049ffaba538e29607,http://arxiv.org/abs/0712.1765v6 11754," Weighted voting games (WVG) are coalitional games in which an agent's contribution to a coalition is given by his it weight, and a coalition wins if its total weight meets or exceeds a given quota. These games model decision-making in political bodies as well as collaboration and surplus division in multiagent domains. The computational complexity of various solution concepts for weighted voting games received a lot of attention in recent years. In particular, Elkind et al.(2007) studied the complexity of stability-related solution concepts in WVGs, namely, of the core, the least core, and the nucleolus. While they have completely characterized the algorithmic complexity of the core and the least core, for the nucleolus they have only provided an NP-hardness result. In this paper, we solve an open problem posed by Elkind et al. by showing that the nucleolus of WVGs, and, more generally, k-vector weighted voting games with fixed k, can be computed in pseudopolynomial time, i.e., there exists an algorithm that correctly computes the nucleolus and runs in time polynomial in the number of players and the maximum weight. In doing so, we propose a general framework for computing the nucleolus, which may be applicable to a wider of class of games. ",edith elkind,,2008.0,10.1145/1496770.1496807,"Proceedings of SODA 2009, pp. 327-335",Elkind2008,True,,arXiv,Not available,Computing the nucleolus of weighted voting games,cfaadf395211e7188a4995f51dc5b61f,http://arxiv.org/abs/0808.0298v1 11755," Weighted voting games (WVG) are coalitional games in which an agent's contribution to a coalition is given by his it weight, and a coalition wins if its total weight meets or exceeds a given quota. These games model decision-making in political bodies as well as collaboration and surplus division in multiagent domains. The computational complexity of various solution concepts for weighted voting games received a lot of attention in recent years. In particular, Elkind et al.(2007) studied the complexity of stability-related solution concepts in WVGs, namely, of the core, the least core, and the nucleolus. While they have completely characterized the algorithmic complexity of the core and the least core, for the nucleolus they have only provided an NP-hardness result. In this paper, we solve an open problem posed by Elkind et al. by showing that the nucleolus of WVGs, and, more generally, k-vector weighted voting games with fixed k, can be computed in pseudopolynomial time, i.e., there exists an algorithm that correctly computes the nucleolus and runs in time polynomial in the number of players and the maximum weight. In doing so, we propose a general framework for computing the nucleolus, which may be applicable to a wider of class of games. ",dmitrii pasechnik,,2008.0,10.1145/1496770.1496807,"Proceedings of SODA 2009, pp. 327-335",Elkind2008,True,,arXiv,Not available,Computing the nucleolus of weighted voting games,cfaadf395211e7188a4995f51dc5b61f,http://arxiv.org/abs/0808.0298v1 11756," Sprouts is a two-player topological game, invented in 1967 by Michael Paterson and John Conway. The game starts with p spots, lasts at most 3p-1 moves, and the player who makes the last move wins. In the misere version of Sprouts, on the contrary, the player who makes the last move loses. Sprouts is a very intricate game, and the first computer analysis in 1991 reached only p=11. New results were made possible in 2007 up to p=32 by using combinatorial game theory: when a position is a sum of independant games, it is possible to replace some of these games by a natural number, called the nimber, without changing the winning or losing outcome of the complete position. However, this reduction does not apply to the misere version, making the analysis of Sprouts (and more generally of any game) more difficult in the misere version. In 1991, only p=9 was reached in misere Sprouts, and we describe in this paper how we obtained up to p=17. First, we describe a theoretical tool, the reduced canonical tree, which plays a role similar to the nimber in the normal version. Then, we describe the way we have implemented it in our program, and detail the results it allowed us to obtain on misere Sprouts. ",julien lemoine,,2009.0,,arXiv,Lemoine2009,True,,arXiv,Not available,Analysis of misere Sprouts game with reduced canonical trees,c99c97e62f878dd4a1cea07eb4f728cb,http://arxiv.org/abs/0908.4407v1 11757," Sprouts is a two-player topological game, invented in 1967 by Michael Paterson and John Conway. The game starts with p spots, lasts at most 3p-1 moves, and the player who makes the last move wins. In the misere version of Sprouts, on the contrary, the player who makes the last move loses. Sprouts is a very intricate game, and the first computer analysis in 1991 reached only p=11. New results were made possible in 2007 up to p=32 by using combinatorial game theory: when a position is a sum of independant games, it is possible to replace some of these games by a natural number, called the nimber, without changing the winning or losing outcome of the complete position. However, this reduction does not apply to the misere version, making the analysis of Sprouts (and more generally of any game) more difficult in the misere version. In 1991, only p=9 was reached in misere Sprouts, and we describe in this paper how we obtained up to p=17. First, we describe a theoretical tool, the reduced canonical tree, which plays a role similar to the nimber in the normal version. Then, we describe the way we have implemented it in our program, and detail the results it allowed us to obtain on misere Sprouts. ",simon viennot,,2009.0,,arXiv,Lemoine2009,True,,arXiv,Not available,Analysis of misere Sprouts game with reduced canonical trees,c99c97e62f878dd4a1cea07eb4f728cb,http://arxiv.org/abs/0908.4407v1 11758," This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party cannot design a new game, cannot enforce agents' behavior, cannot enforce payments by the agents, and cannot prohibit strategies available to the agents. However, he can influence the outcome of the game by committing to non-negative monetary transfers for the different strategy profiles that may be selected by the agents. The interested party assumes that agents are rational in the commonly agreed sense that they do not use dominated strategies. Hence, a certain subset of outcomes is implemented in a given game if by adding non-negative payments, rational players will necessarily produce an outcome in this subset. Obviously, by making sufficiently big payments one can implement any desirable outcome. The question is what is the cost of implementation? In this paper we introduce the notion of k-implementation of a desired set of strategy profiles, where k stands for the amount of payment that need to be actually made in order to implement desirable outcomes. A major point in k-implementation is that monetary offers need not necessarily materialize when following desired behaviors. We define and study k-implementation in the contexts of games with complete and incomplete information. In the latter case we mainly focus on the VCG games. Our setting is later extended to deal with mixed strategies using correlation devices. Together, the paper introduces and studies the implementation of desirable outcomes by a reliable party who cannot modify game rules (i.e. provide protocols), complementing previous work in mechanism design, while making it more applicable to many realistic CS settings. ",d. monderer,,2011.0,10.1613/jair.1231,"Journal Of Artificial Intelligence Research, Volume 21, pages 37-62, 2004",Monderer2011,True,,arXiv,Not available,K-Implementation,6b1cb555730b96113a2075b4e0d338ff,http://arxiv.org/abs/1107.0022v1 11759," This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party cannot design a new game, cannot enforce agents' behavior, cannot enforce payments by the agents, and cannot prohibit strategies available to the agents. However, he can influence the outcome of the game by committing to non-negative monetary transfers for the different strategy profiles that may be selected by the agents. The interested party assumes that agents are rational in the commonly agreed sense that they do not use dominated strategies. Hence, a certain subset of outcomes is implemented in a given game if by adding non-negative payments, rational players will necessarily produce an outcome in this subset. Obviously, by making sufficiently big payments one can implement any desirable outcome. The question is what is the cost of implementation? In this paper we introduce the notion of k-implementation of a desired set of strategy profiles, where k stands for the amount of payment that need to be actually made in order to implement desirable outcomes. A major point in k-implementation is that monetary offers need not necessarily materialize when following desired behaviors. We define and study k-implementation in the contexts of games with complete and incomplete information. In the latter case we mainly focus on the VCG games. Our setting is later extended to deal with mixed strategies using correlation devices. Together, the paper introduces and studies the implementation of desirable outcomes by a reliable party who cannot modify game rules (i.e. provide protocols), complementing previous work in mechanism design, while making it more applicable to many realistic CS settings. ",m. tennenholtz,,2011.0,10.1613/jair.1231,"Journal Of Artificial Intelligence Research, Volume 21, pages 37-62, 2004",Monderer2011,True,,arXiv,Not available,K-Implementation,6b1cb555730b96113a2075b4e0d338ff,http://arxiv.org/abs/1107.0022v1 11760," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",christoph lange,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11761," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",marco caminati,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11762," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",manfred kerber,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11763," In these lecture notes we investigate the implications of the identification of strategies with quantum operations in game theory beyond the results presented in [J. Eisert, M. Wilkens, and M. Lewenstein, Phys. Rev. Lett. 83, 3077 (1999)]. After introducing a general framework, we study quantum games with a classical analogue in order to flesh out the peculiarities of game theoretical settings in the quantum domain. Special emphasis is given to a detailed investigation of different sets of quantum strategies. ",m. wilkens,,2000.0,10.1080/09500340008232180,J. Mod. Opt. 47 (2000) 2543,Eisert2000,True,,arXiv,Not available,Quantum Games,0bba94ff8933b0a0ec4b20babe14361a,http://arxiv.org/abs/quant-ph/0004076v1 11764," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",till mossakowski,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11765," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",colin rowat,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11766," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",makarius wenzel,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11767," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",wolfgang windsteiger,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 11768," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",gagan aggarwal,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 11769," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",s. muthukrishnan,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 11770," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",jon feldman,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 11771," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",sayan bhattacharya,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 11772," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",janardhan kulkarni,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 11773," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",xiaoming xu,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 11774," In bi-matrix games the Bishop-Cannings theorem of the classical evolutionary game theory does not permit pure evolutionarily stable strategies (ESSs) when a mixed ESS exists. We find the necessary form of two-qubit initial quantum states when a switch-over to a quantum version of the game also changes the evolutionary stability of a mixed symmetric Nash equilibrium. ",a. iqbal,,2001.0,,"Communications in Theoretical Physics. Vol. 42, No. 3, pp 335-338, 2004",Iqbal2001,True,,arXiv,Not available,Stability of mixed Nash equilibria in symmetric quantum games,3afdb31681093f6a1e0e74e51ac83a52,http://arxiv.org/abs/quant-ph/0106056v4 11775," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",e. piotrowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 11776," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",j. sladkowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 11777," This paper describes a study of agent bidding strategies, assuming combinatorial valuations for complementary and substitutable goods, in three auction environments: sequential auctions, simultaneous auctions, and the Trading Agent Competition (TAC) Classic hotel auction design, a hybrid of sequential and simultaneous auctions. The problem of bidding in sequential auctions is formulated as an MDP, and it is argued that expected marginal utility bidding is the optimal bidding policy. The problem of bidding in simultaneous auctions is formulated as a stochastic program, and it is shown by example that marginal utility bidding is not an optimal bidding policy, even in deterministic settings. Two alternative methods of approximating a solution to this stochastic program are presented: the first method, which relies on expected values, is optimal in deterministic environments; the second method, which samples the nondeterministic environment, is asymptotically optimal as the number of samples tends to infinity. Finally, experiments with these various bidding policies are described in the TAC Classic setting. ",amy greenwald,,2012.0,,arXiv,Greenwald2012,True,,arXiv,Not available,Bidding under Uncertainty: Theory and Experiments,dbd48c8c55e316a5932a641d9c4b28f5,http://arxiv.org/abs/1207.4108v1 11778," This paper describes a study of agent bidding strategies, assuming combinatorial valuations for complementary and substitutable goods, in three auction environments: sequential auctions, simultaneous auctions, and the Trading Agent Competition (TAC) Classic hotel auction design, a hybrid of sequential and simultaneous auctions. The problem of bidding in sequential auctions is formulated as an MDP, and it is argued that expected marginal utility bidding is the optimal bidding policy. The problem of bidding in simultaneous auctions is formulated as a stochastic program, and it is shown by example that marginal utility bidding is not an optimal bidding policy, even in deterministic settings. Two alternative methods of approximating a solution to this stochastic program are presented: the first method, which relies on expected values, is optimal in deterministic environments; the second method, which samples the nondeterministic environment, is asymptotically optimal as the number of samples tends to infinity. Finally, experiments with these various bidding policies are described in the TAC Classic setting. ",justin boyan,,2012.0,,arXiv,Greenwald2012,True,,arXiv,Not available,Bidding under Uncertainty: Theory and Experiments,dbd48c8c55e316a5932a641d9c4b28f5,http://arxiv.org/abs/1207.4108v1 11779," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",shuchi chawla,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11780," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",jason hartline,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11781," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",denis nekipelov,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11782," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",christopher wilkens,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 11783," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",ruggiero cavallo,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 11784," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",rad niazadeh,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 11785," We consider the problem of designing incentive-compatible, ex-post individually rational (IR) mechanisms for covering problems in the Bayesian setting, where players' types are drawn from an underlying distribution and may be correlated, and the goal is to minimize the expected total payment made by the mechanism. We formulate a notion of incentive compatibility (IC) that we call {\em support-based IC} that is substantially more robust than Bayesian IC, and develop black-box reductions from support-based-IC mechanism design to algorithm design. For single-dimensional settings, this black-box reduction applies even when we only have an LP-relative {\em approximation algorithm} for the algorithmic problem. Thus, we obtain near-optimal mechanisms for various covering settings including single-dimensional covering problems, multi-item procurement auctions, and multidimensional facility location. ",chaitanya swamy,,2013.0,,arXiv,Minooei2013,True,,arXiv,Not available,"Near-Optimal and Robust Mechanism Design for Covering Problems with Correlated Players",4b465a62c7f83d037774200b31dfc61d,http://arxiv.org/abs/1311.6883v2 11786," In bi-matrix games the Bishop-Cannings theorem of the classical evolutionary game theory does not permit pure evolutionarily stable strategies (ESSs) when a mixed ESS exists. We find the necessary form of two-qubit initial quantum states when a switch-over to a quantum version of the game also changes the evolutionary stability of a mixed symmetric Nash equilibrium. ",a. toor,,2001.0,,"Communications in Theoretical Physics. Vol. 42, No. 3, pp 335-338, 2004",Iqbal2001,True,,arXiv,Not available,Stability of mixed Nash equilibria in symmetric quantum games,3afdb31681093f6a1e0e74e51ac83a52,http://arxiv.org/abs/quant-ph/0106056v4 11787," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",daniel lehmann,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 11788," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",liadan o'callaghan,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 11789," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",yoav shoham,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 11790," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",jason hartline,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 11791," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",darrell hoy,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 11792," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",sam taggart,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 11793," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",nicola gatti,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 11794," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",alessandro lazaric,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 11795," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",marco rocco,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 11796," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",francesco trovo,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 11797," We apply several quantization schemes to simple versions of the Chinos game. Classically, for two players with one coin each, there is a symmetric stable strategy that allows each player to win half of the times on average. A partial quantization of the game (semiclassical) allows us to find a winning strategy for the second player, but it is unstable w.r.t. the classical strategy. However, in a fully quantum version of the game we find a winning strategy for the first player that is optimal: the symmetric classical situation is broken at the quantum level. ",f. guinea,,2002.0,10.1088/0305-4470/36/13/104,J.Phys. A36 (2003) L197,Guinea2002,True,,arXiv,Not available,Quantum Chinos Game: winning strategies through quantum fluctuations,1c1a3dae12e1747d6277bc8d8c0d33fd,http://arxiv.org/abs/quant-ph/0201140v1 11798," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",mojgan khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 11799," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",mehrdad khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 11800," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",sneha kasera,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 11801," The Competition Complexity of an auction measures how much competition is needed for the revenue of a simple auction to surpass the optimal revenue. A classic result from auction theory by Bulow and Klemperer [9], states that the Competition Complexity of VCG, in the case of n i.i.d. buyers and a single item, is 1, i.e., it is better to recruit one extra buyer and run a second price auction than to learn exactly the buyers' underlying distribution and run the revenue-maximizing auction tailored to this distribution. In this paper we study the Competition Complexity of dynamic auctions. Consider the following setting: a monopolist is auctioning off m items in m consecutive stages to n interested buyers. A buyer realizes her value for item k in the beginning of stage k. We prove that the Competition Complexity of dynamic auctions is at most 3n, and at least linear in n, even when the buyers' values are correlated across stages, under a monotone hazard rate assumption on the stage (marginal) distributions. We also prove results on the number of additional buyers necessary for VCG at every stage to be an {\alpha}-approximation of the optimal revenue; we term this number the {\alpha}-approximate Competition Complexity. As a corollary we provide the first results on prior-independent dynamic auctions. This is, to the best of our knowledge, the first non-trivial positive guarantees for simple ex-post IR dynamic auctions for correlated stages. A key step towards proving bounds on the Competition Complexity is getting a good benchmark/upper bound to the optimal revenue. To this end, we extend the recent duality framework of Cai et al. [12] to dynamic settings. As an aside to our approach we obtain a revenue non-monotonicity lemma for dynamic auctions, which may be of independent interest. ",siqi liu,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,On the Competition Complexity of Dynamic Mechanism Design,f090611655a52bf487c4460a9a64d7d0,http://arxiv.org/abs/1709.07955v2 11802," The Competition Complexity of an auction measures how much competition is needed for the revenue of a simple auction to surpass the optimal revenue. A classic result from auction theory by Bulow and Klemperer [9], states that the Competition Complexity of VCG, in the case of n i.i.d. buyers and a single item, is 1, i.e., it is better to recruit one extra buyer and run a second price auction than to learn exactly the buyers' underlying distribution and run the revenue-maximizing auction tailored to this distribution. In this paper we study the Competition Complexity of dynamic auctions. Consider the following setting: a monopolist is auctioning off m items in m consecutive stages to n interested buyers. A buyer realizes her value for item k in the beginning of stage k. We prove that the Competition Complexity of dynamic auctions is at most 3n, and at least linear in n, even when the buyers' values are correlated across stages, under a monotone hazard rate assumption on the stage (marginal) distributions. We also prove results on the number of additional buyers necessary for VCG at every stage to be an {\alpha}-approximation of the optimal revenue; we term this number the {\alpha}-approximate Competition Complexity. As a corollary we provide the first results on prior-independent dynamic auctions. This is, to the best of our knowledge, the first non-trivial positive guarantees for simple ex-post IR dynamic auctions for correlated stages. A key step towards proving bounds on the Competition Complexity is getting a good benchmark/upper bound to the optimal revenue. To this end, we extend the recent duality framework of Cai et al. [12] to dynamic settings. As an aside to our approach we obtain a revenue non-monotonicity lemma for dynamic auctions, which may be of independent interest. ",christos-alexandros psomas,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,On the Competition Complexity of Dynamic Mechanism Design,f090611655a52bf487c4460a9a64d7d0,http://arxiv.org/abs/1709.07955v2 11803," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",miroslav dudik,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11804," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",nika haghtalab,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11805," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",haipeng luo,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11806," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",robert schapire,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11807," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",vasilis syrgkanis,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11808," We apply several quantization schemes to simple versions of the Chinos game. Classically, for two players with one coin each, there is a symmetric stable strategy that allows each player to win half of the times on average. A partial quantization of the game (semiclassical) allows us to find a winning strategy for the second player, but it is unstable w.r.t. the classical strategy. However, in a fully quantum version of the game we find a winning strategy for the first player that is optimal: the symmetric classical situation is broken at the quantum level. ",m. martin-delgado,,2002.0,10.1088/0305-4470/36/13/104,J.Phys. A36 (2003) L197,Guinea2002,True,,arXiv,Not available,Quantum Chinos Game: winning strategies through quantum fluctuations,1c1a3dae12e1747d6277bc8d8c0d33fd,http://arxiv.org/abs/quant-ph/0201140v1 11809," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",jennifer vaughan,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 11810," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",sang jung,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11811," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seung yu,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11812," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seong-lyun kim,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 11813," In the standard formulation of mechanism design, a key assumption is that the designer has reliable information and technology to determine a prior distribution on types of the agents. In the meanwhile, as pointed out by the Wilson's Principle, a mechanism should reply as little as possible on the accuracy of prior type distribution. In this paper, we put forward a model to formalize and quantify this statement. In our model, each agent has a type distribution. In addition, the agent can commit to a fake distribution and bids consistently and credibly with respect to the fake distribution (i.e., plays Bayes equilibrium under the fake distributions). We study the equilibria of the induced distribution-committing games in several well-known mechanisms. Our results can be summarized as follows: (1) the game induced by Myerson's auction under our model is strategically equivalent to the first price auction under the standard model. As a consequence, they are revenue-equivalent as well. (2) the second-price auction yields weakly better revenue than several reserve-based and virtual-value-based auctions, under our fake distribution model. These results echo the recent literature on prior-independent mechanism design. ",pingzhong tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,How to manipulate truthful prior-dependent mechanisms?,585f28ae137d7fb2663881355ead7c4b,http://arxiv.org/abs/1606.02409v2 11814," In the standard formulation of mechanism design, a key assumption is that the designer has reliable information and technology to determine a prior distribution on types of the agents. In the meanwhile, as pointed out by the Wilson's Principle, a mechanism should reply as little as possible on the accuracy of prior type distribution. In this paper, we put forward a model to formalize and quantify this statement. In our model, each agent has a type distribution. In addition, the agent can commit to a fake distribution and bids consistently and credibly with respect to the fake distribution (i.e., plays Bayes equilibrium under the fake distributions). We study the equilibria of the induced distribution-committing games in several well-known mechanisms. Our results can be summarized as follows: (1) the game induced by Myerson's auction under our model is strategically equivalent to the first price auction under the standard model. As a consequence, they are revenue-equivalent as well. (2) the second-price auction yields weakly better revenue than several reserve-based and virtual-value-based auctions, under our fake distribution model. These results echo the recent literature on prior-independent mechanism design. ",yulong zeng,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,How to manipulate truthful prior-dependent mechanisms?,585f28ae137d7fb2663881355ead7c4b,http://arxiv.org/abs/1606.02409v2 11815," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",mehrdad khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 11816," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",alhussein abouzeid,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 11817," The idea of this paper is an advanced game concept. This concept is expected to model non-monetary bilateral cooperations between self-interested agents. Such non-monetary cases are social cooperations like allocation of high level jobs or sexual relationships among humans. In a barter double auction, there is a big amount of agents. Every agent has a vector of parameters which specifies his demand and a vector which specifies his offer. Two agents can achieve a commitment through barter exchange. The subjective satisfaction level (a number between 0% and 100%) of an agent is as high as small is the distance between his demand and the accepted offer. This paper introduces some facets of this complex game concept. ",rustam tagiew,,2009.0,,arXiv,Tagiew2009,True,,arXiv,Not available,Towards Barter Double Auction as Model for Bilateral Social Cooperations,c981e51ee87f644962b38c95e56cff71,http://arxiv.org/abs/0905.3709v1 11818," A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper. The proposed protocol has three appealing characteristic: First, it offers conditional privacy-preservation: on the one hand, the bidder is anonymous to the public, on the other hand, only the collaboration of auctioneer and registration manager can reveal the true identity of a malicious bidder. Second, it does not require to maintain a black list which records the evicted malicious bidders. Finally, it is efficient: it saves the communication round complexity comparing with previously proposed solutions. ",hu xiong,,2010.0,,arXiv,Xiong2010,True,,arXiv,Not available,Privacy-Preserving English Auction Protocol with Round Efficiency,4e427502e1a9771c8e9d3d3468aeb6de,http://arxiv.org/abs/1010.5642v1 11819," In evolutionary game theory an Evolutionarily Stable Strategy (ESS) is a refinement of the Nash equilibrium concept that is sometimes also recognized as evolutionary stability. It is a game-theoretic model, well known to mathematical biologists, that was found quite useful in the understanding of evolutionary dynamics of a population. This chapter presents an analysis of evolutionary stability in the emerging field of quantum games. ",azhar iqbal,,2007.0,10.1142/9781848162556_0013,arXiv,Iqbal2007,True,,arXiv,Not available,Evolutionary stability in quantum games,4785a35e7fdaafb63f61aea852de0fea,http://arxiv.org/abs/0706.1413v2 11820," A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper. The proposed protocol has three appealing characteristic: First, it offers conditional privacy-preservation: on the one hand, the bidder is anonymous to the public, on the other hand, only the collaboration of auctioneer and registration manager can reveal the true identity of a malicious bidder. Second, it does not require to maintain a black list which records the evicted malicious bidders. Finally, it is efficient: it saves the communication round complexity comparing with previously proposed solutions. ",zhong chen,,2010.0,,arXiv,Xiong2010,True,,arXiv,Not available,Privacy-Preserving English Auction Protocol with Round Efficiency,4e427502e1a9771c8e9d3d3468aeb6de,http://arxiv.org/abs/1010.5642v1 11821," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",ilan adler,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 11822," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",dorit hochbaum,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 11823," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",nikhil devanur,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11824," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",balasubramanian sivan,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11825," We study a basic auction design problem with online supply. There are two unit-demand bidders and two types of items. The first item type will arrive first for sure, and the second item type may or may not arrive. The auctioneer has to decide the allocation of an item immediately after each item arrives, but is allowed to compute payments after knowing how many items arrived. For this problem we show that there is no deterministic truthful and individually rational mechanism that, even with unbounded computational resources, gets any finite approximation factor to the optimal social welfare. ",vasilis syrgkanis,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,"Truthful Multi-Parameter Auctions with Online Supply: an Impossible Combination",b8a88311dcfae57f99b396c5cf0d20f2,http://arxiv.org/abs/1511.03699v2 11826," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",moshe babaioff,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 11827," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",shahar dobzinski,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 11828," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",sigal oren,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 11829," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",ron holzman,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11830," In evolutionary game theory an Evolutionarily Stable Strategy (ESS) is a refinement of the Nash equilibrium concept that is sometimes also recognized as evolutionary stability. It is a game-theoretic model, well known to mathematical biologists, that was found quite useful in the understanding of evolutionary dynamics of a population. This chapter presents an analysis of evolutionary stability in the emerging field of quantum games. ",taksu cheon,,2007.0,10.1142/9781848162556_0013,arXiv,Iqbal2007,True,,arXiv,Not available,Evolutionary stability in quantum games,4785a35e7fdaafb63f61aea852de0fea,http://arxiv.org/abs/0706.1413v2 11831," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",noa kfir-dahav,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11832," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",dov monderer,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11833," This paper analyzes individually-rational ex post equilibrium in the VC (Vickrey-Clarke) combinatorial auctions. If $\Sigma$ is a family of bundles of goods, the organizer may restrict the participants by requiring them to submit their bids only for bundles in $\Sigma$. The $\Sigma$-VC combinatorial auctions (multi-good auctions) obtained in this way are known to be individually-rational truth-telling mechanisms. In contrast, this paper deals with non-restricted VC auctions, in which the buyers restrict themselves to bids on bundles in $\Sigma$, because it is rational for them to do so. That is, it may be that when the buyers report their valuation of the bundles in $\Sigma$, they are in an equilibrium. We fully characterize those $\Sigma$ that induce individually rational equilibrium in every VC auction, and we refer to the associated equilibrium as a bundling equilibrium. The number of bundles in $\Sigma$ represents the communication complexity of the equilibrium. A special case of bundling equilibrium is partition-based equilibrium, in which $\Sigma$ is a field, that is, it is generated by a partition. We analyze the tradeoff between communication complexity and economic efficiency of bundling equilibrium, focusing in particular on partition-based equilibrium. ",moshe tennenholtz,,2002.0,,arXiv,Holzman2002,True,,arXiv,Not available,Bundling Equilibrium in Combinatorial auctions,39f59f9b9422d579228f8bf1f037e1df,http://arxiv.org/abs/cs/0201010v1 11834," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",kay-yut chen,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 11835," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",tad hogg,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 11836," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 11837," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",noam nisan,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 11838," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",pranav dandekar,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 11839," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",nadia fawaz,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 11840," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",stratis ioannidis,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 11841," In many settings, money is a tool of exchange with minimal inherent utility --- agents will spend it in a way that maximizes the value of goods received subject to reasonable constraints, giving only second-order consideration to the trade-off between value and price. While this perspective is commonly captured in consumer choice theory, market equilibrium theory, and other fields, it is markedly absent from the mechanism design literature --- agents strategizing in a mechanism with money are almost always assumed to incorporate money as an objective through quasilinear valuations. We study a simple model of value maximizers that captures online advertisers and other agents who may view money solely as a constraint, and study general questions of mechanism design for such agents. We show that the feasible and optimal points faced by a mechanism designer change dramatically from the quasilinear realm and lay a foundation for a broader study of value maximization in mechanism design. Along the way, we offer new insight into the generalized second price (GSP) auction commonly used in Internet advertising. Through the lens of value maximization, GSP metamorphosizes into a truthful auction, sound in its principles and elegant in its simplicity. ",christopher wilkens,,2016.0,,arXiv,Wilkens2016,True,,arXiv,Not available,Mechanism Design for Value Maximizers,a6212f63a166a1a4fdfef661a1e414b7,http://arxiv.org/abs/1607.04362v2 11842," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 11843," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 11844," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 11845," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",ilan cohen,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 11846," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",alon eden,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 11847," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",amos fiat,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 11848," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",lukasz jez,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 11849," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",balasubramanian sivan,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 11850," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",vasilis syrgkanis,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 11851," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",jonathan weed,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 11852," In many settings, money is a tool of exchange with minimal inherent utility --- agents will spend it in a way that maximizes the value of goods received subject to reasonable constraints, giving only second-order consideration to the trade-off between value and price. While this perspective is commonly captured in consumer choice theory, market equilibrium theory, and other fields, it is markedly absent from the mechanism design literature --- agents strategizing in a mechanism with money are almost always assumed to incorporate money as an objective through quasilinear valuations. We study a simple model of value maximizers that captures online advertisers and other agents who may view money solely as a constraint, and study general questions of mechanism design for such agents. We show that the feasible and optimal points faced by a mechanism designer change dramatically from the quasilinear realm and lay a foundation for a broader study of value maximization in mechanism design. Along the way, we offer new insight into the generalized second price (GSP) auction commonly used in Internet advertising. Through the lens of value maximization, GSP metamorphosizes into a truthful auction, sound in its principles and elegant in its simplicity. ",ruggiero cavallo,,2016.0,,arXiv,Wilkens2016,True,,arXiv,Not available,Mechanism Design for Value Maximizers,a6212f63a166a1a4fdfef661a1e414b7,http://arxiv.org/abs/1607.04362v2 11853," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",vianney perchet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 11854," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",philippe rigollet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 11855," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",michal feldman,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 11856," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",hu fu,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 11857," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",nick gravin,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 11858," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",brendan lucier,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 11859," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",bach ha,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 11860," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",jason hartline,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 11861," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",nianxia cao,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11862," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",swastik brahma,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11863," In many settings, money is a tool of exchange with minimal inherent utility --- agents will spend it in a way that maximizes the value of goods received subject to reasonable constraints, giving only second-order consideration to the trade-off between value and price. While this perspective is commonly captured in consumer choice theory, market equilibrium theory, and other fields, it is markedly absent from the mechanism design literature --- agents strategizing in a mechanism with money are almost always assumed to incorporate money as an objective through quasilinear valuations. We study a simple model of value maximizers that captures online advertisers and other agents who may view money solely as a constraint, and study general questions of mechanism design for such agents. We show that the feasible and optimal points faced by a mechanism designer change dramatically from the quasilinear realm and lay a foundation for a broader study of value maximization in mechanism design. Along the way, we offer new insight into the generalized second price (GSP) auction commonly used in Internet advertising. Through the lens of value maximization, GSP metamorphosizes into a truthful auction, sound in its principles and elegant in its simplicity. ",rad niazadeh,,2016.0,,arXiv,Wilkens2016,True,,arXiv,Not available,Mechanism Design for Value Maximizers,a6212f63a166a1a4fdfef661a1e414b7,http://arxiv.org/abs/1607.04362v2 11864," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",pramod varshney,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11865," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",i. hafalir,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 11866," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",r. ravi,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 11867," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",a. sayedi,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 11868," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",hu fu,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 11869," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",jason hartline,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 11870," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",darrell hoy,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 11871," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 11872," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",allan borodin,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 11873," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",eric bax,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 11874," In many settings, money is a tool of exchange with minimal inherent utility --- agents will spend it in a way that maximizes the value of goods received subject to reasonable constraints, giving only second-order consideration to the trade-off between value and price. While this perspective is commonly captured in consumer choice theory, market equilibrium theory, and other fields, it is markedly absent from the mechanism design literature --- agents strategizing in a mechanism with money are almost always assumed to incorporate money as an objective through quasilinear valuations. We study a simple model of value maximizers that captures online advertisers and other agents who may view money solely as a constraint, and study general questions of mechanism design for such agents. We show that the feasible and optimal points faced by a mechanism designer change dramatically from the quasilinear realm and lay a foundation for a broader study of value maximization in mechanism design. Along the way, we offer new insight into the generalized second price (GSP) auction commonly used in Internet advertising. Through the lens of value maximization, GSP metamorphosizes into a truthful auction, sound in its principles and elegant in its simplicity. ",samuel taggart,,2016.0,,arXiv,Wilkens2016,True,,arXiv,Not available,Mechanism Design for Value Maximizers,a6212f63a166a1a4fdfef661a1e414b7,http://arxiv.org/abs/1607.04362v2 11875," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",james li,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 11876," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",zheng wen,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 11877," After experimentation with other designs, the major search engines converged on the weighted, generalized second-price auction (wGSP) for selling keyword advertisements. Notably, this convergence occurred before position auctions were well understood (or, indeed, widely studied) theoretically. While much progress has been made since, theoretical analysis is still not able to settle the question of why search engines found wGSP preferable to other position auctions. We approach this question in a new way, adopting a new analytical paradigm we dub ""computational mechanism analysis."" By sampling position auction games from a given distribution, encoding them in a computationally efficient representation language, computing their Nash equilibria, and then calculating economic quantities of interest, we can quantitatively answer questions that theoretical methods have not. We considered seven widely studied valuation models from the literature and three position auction variants (generalized first price, unweighted generalized second price, and wGSP). We found that wGSP consistently showed the best ads of any position auction, measured both by social welfare and by relevance (expected number of clicks). Even in models where wGSP was already known to have bad worse-case efficiency, we found that it almost always performed well on average. In contrast, we found that revenue was extremely variable across auction mechanisms, and was highly sensitive to equilibrium selection, the preference model, and the valuation distribution. ",david thompson,,2014.0,,arXiv,Thompson2014,True,,arXiv,Not available,Computational Analysis of Perfect-Information Position Auctions,f3a38c36eed541cde0a0c52c6d2ed0bb,http://arxiv.org/abs/1408.0703v1 11878," After experimentation with other designs, the major search engines converged on the weighted, generalized second-price auction (wGSP) for selling keyword advertisements. Notably, this convergence occurred before position auctions were well understood (or, indeed, widely studied) theoretically. While much progress has been made since, theoretical analysis is still not able to settle the question of why search engines found wGSP preferable to other position auctions. We approach this question in a new way, adopting a new analytical paradigm we dub ""computational mechanism analysis."" By sampling position auction games from a given distribution, encoding them in a computationally efficient representation language, computing their Nash equilibria, and then calculating economic quantities of interest, we can quantitatively answer questions that theoretical methods have not. We considered seven widely studied valuation models from the literature and three position auction variants (generalized first price, unweighted generalized second price, and wGSP). We found that wGSP consistently showed the best ads of any position auction, measured both by social welfare and by relevance (expected number of clicks). Even in models where wGSP was already known to have bad worse-case efficiency, we found that it almost always performed well on average. In contrast, we found that revenue was extremely variable across auction mechanisms, and was highly sensitive to equilibrium selection, the preference model, and the valuation distribution. ",kevin leyton-brown,,2014.0,,arXiv,Thompson2014,True,,arXiv,Not available,Computational Analysis of Perfect-Information Position Auctions,f3a38c36eed541cde0a0c52c6d2ed0bb,http://arxiv.org/abs/1408.0703v1 11882," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",vincent conitzer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 11883," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",christian kroer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 11884," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",eric sodomka,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 11885," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",sharad borle,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 11886," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",nicolas stier-moses,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 11887," We develop extensions to auction theory results that are useful in real life scenarios. 1. Since valuations are generally positive we first develop approximations using the log-normal distribution. This would be useful for many finance related auction settings since asset prices are usually non-negative. 2. We formulate a positive symmetric discrete distribution, which is likely to be followed by the total number of auction participants, and incorporate this into auction theory results. 3. We develop extensions when the valuations of the bidders are interdependent and incorporate all the results developed into a final combined realistic setting. 4. Our methods can be a practical tool for bidders and auction sellers to maximize their profits. The models developed here could be potentially useful for inventory estimation and for wholesale procurement of financial instruments and also non-financial commodities. All the propositions are new results and they refer to existing results which are stated as Lemmas. ",ravi kashyap,,2018.0,10.1016/j.rie.2018.09.001,arXiv,Kashyap2018,True,,arXiv,Not available,Auction Theory Extensions for Real Life Applications,782c5cfe7c66113e160469ab1e1f98de,http://arxiv.org/abs/1810.01736v1 11888," We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms of \emph{knowledge-based programs}. Intuitively, all solution concepts are implementations of two knowledge-based programs, one appropriate for games represented in normal form, the other for games represented in extensive form. These knowledge-based programs can be viewed as embodying rationality. The representation works even if (a) information sets do not capture an agent's knowledge, (b) uncertainty is not represented by probability, or (c) the underlying game is not common knowledge. ",joseph halpern,,2006.0,,arXiv,Halpern2006,True,,arXiv,Not available,Characterizing Solution Concepts in Games Using Knowledge-Based Programs,c0fae1371ab963b363eeb7048e5eaf82,http://arxiv.org/abs/cs/0610098v1 11889," We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms of \emph{knowledge-based programs}. Intuitively, all solution concepts are implementations of two knowledge-based programs, one appropriate for games represented in normal form, the other for games represented in extensive form. These knowledge-based programs can be viewed as embodying rationality. The representation works even if (a) information sets do not capture an agent's knowledge, (b) uncertainty is not represented by probability, or (c) the underlying game is not common knowledge. ",yoram moses,,2006.0,,arXiv,Halpern2006,True,,arXiv,Not available,Characterizing Solution Concepts in Games Using Knowledge-Based Programs,c0fae1371ab963b363eeb7048e5eaf82,http://arxiv.org/abs/cs/0610098v1 11890," Recently the concept of quantum information has been introduced into game theory. Here we present the first study of quantum games with more than two players. We discover that such games can possess a new form of equilibrium strategy, one which has no analogue either in traditional games or even in two-player quantum games. In these `pure' coherent equilibria, entanglement shared among multiple players enables new kinds of cooperative behavior: indeed it can act as a contract, in the sense that it prevents players from successfully betraying one-another. ",simon benjamin,,2000.0,10.1103/PhysRevA.64.030301,"Phys. Rev. A 64(3):030301, 2001",Benjamin2000,True,,arXiv,Not available,Multi-Player Quantum Games,a867f77ed902801c1df241166631f93a,http://arxiv.org/abs/quant-ph/0007038v2 11891," Recently the concept of quantum information has been introduced into game theory. Here we present the first study of quantum games with more than two players. We discover that such games can possess a new form of equilibrium strategy, one which has no analogue either in traditional games or even in two-player quantum games. In these `pure' coherent equilibria, entanglement shared among multiple players enables new kinds of cooperative behavior: indeed it can act as a contract, in the sense that it prevents players from successfully betraying one-another. ",patrick hayden,,2000.0,10.1103/PhysRevA.64.030301,"Phys. Rev. A 64(3):030301, 2001",Benjamin2000,True,,arXiv,Not available,Multi-Player Quantum Games,a867f77ed902801c1df241166631f93a,http://arxiv.org/abs/quant-ph/0007038v2 11892," The description of resources in game semantics has never achieved the simplicity and precision of linear logic, because of a misleading conception: the belief that linear logic is more primitive than game semantics. We advocate instead the contrary: that game semantics is conceptually more primitive than linear logic. Starting from this revised point of view, we design a categorical model of resources in game semantics, and construct an arena game model where the usual notion of bracketing is extended to multi- bracketing in order to capture various resource policies: linear, affine and exponential. ",paul-andre mellies,,2007.0,,arXiv,Melliès2007,True,,arXiv,Not available,Resource modalities in game semantics,3e3d520cbe97c83b60bef878bb563cb1,http://arxiv.org/abs/0705.0462v1 11893," The description of resources in game semantics has never achieved the simplicity and precision of linear logic, because of a misleading conception: the belief that linear logic is more primitive than game semantics. We advocate instead the contrary: that game semantics is conceptually more primitive than linear logic. Starting from this revised point of view, we design a categorical model of resources in game semantics, and construct an arena game model where the usual notion of bracketing is extended to multi- bracketing in order to capture various resource policies: linear, affine and exponential. ",nicolas tabareau,,2007.0,,arXiv,Melliès2007,True,,arXiv,Not available,Resource modalities in game semantics,3e3d520cbe97c83b60bef878bb563cb1,http://arxiv.org/abs/0705.0462v1 11894," A bimatrix game $(A,B)$ is called a game of rank $k$ if the rank of the matrix $A+B$ is at most $k$. We consider the problem of enumerating the Nash equilibria in (non-degenerate) games of rank 1. In particular, we show that even for games of rank 1 not all equilibria can be reached by a Lemke-Howson path and present a parametric simplex-type algorithm for enumerating all Nash equilibria of a non-degenerate game of rank 1. ",thorsten theobald,,2007.0,,arXiv,Theobald2007,True,,arXiv,Not available,Enumerating the Nash equilibria of rank 1-games,6e867cbb40ce8de53b1d7199baa0d4d4,http://arxiv.org/abs/0709.1263v1 11895," We present efficient approximation algorithms for finding Nash equilibria in anonymous games, that is, games in which the players utilities, though different, do not differentiate between other players. Our results pertain to such games with many players but few strategies. We show that any such game has an approximate pure Nash equilibrium, computable in polynomial time, with approximation O(s^2 L), where s is the number of strategies and L is the Lipschitz constant of the utilities. Finally, we show that there is a PTAS for finding an epsilon ",constantinos daskalakis,,2007.0,,arXiv,Daskalakis2007,True,,arXiv,Not available,Computing Equilibria in Anonymous Games,c5744457e2d5072aee7127a07b1e20c2,http://arxiv.org/abs/0710.5582v1 11896," We study multidimensional mechanism design in a common scenario where players have private information about their willingness to pay and their ability to pay. We provide a complete characterization of dominant-strategy incentive-compatible direct mechanisms where over-reporting the budget is not possible. In several settings, reporting larger budgets can be made suboptimal with a small randomized modification to the payments. We then derive a closely related partial characterization for the general case where players can arbitrarily misreport their private budgets. Immediate applications of these results include simple characterizations for mechanisms with publicly-known budgets and for mechanisms without monetary transfers. The celebrated revenue equivalence theorem states that the seller""s revenue for a broad class of standard auction formats and settings will be the same in equilibrium. Our main application is a revenue equivalence theorem for financially constrained bidders. ",ahuva mualem,,2014.0,,arXiv,Mualem2014,True,,arXiv,Not available,"Monotonicity, Revenue Equivalence and Budgets",41ad666623265778ff597308d3a17d41,http://arxiv.org/abs/1404.7784v1 11897," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",peter boatwright,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 11898," We present efficient approximation algorithms for finding Nash equilibria in anonymous games, that is, games in which the players utilities, though different, do not differentiate between other players. Our results pertain to such games with many players but few strategies. We show that any such game has an approximate pure Nash equilibrium, computable in polynomial time, with approximation O(s^2 L), where s is the number of strategies and L is the Lipschitz constant of the utilities. Finally, we show that there is a PTAS for finding an epsilon ",christos papadimitriou,,2007.0,,arXiv,Daskalakis2007,True,,arXiv,Not available,Computing Equilibria in Anonymous Games,c5744457e2d5072aee7127a07b1e20c2,http://arxiv.org/abs/0710.5582v1 11899," For some well-known games, such as the Traveler's Dilemma or the Centipede Game, traditional game-theoretic solution concepts--and most notably Nash equilibrium--predict outcomes that are not consistent with empirical observations. In this paper, we introduce a new solution concept, iterated regret minimization, which exhibits the same qualitative behavior as that observed in experiments in many games of interest, including Traveler's Dilemma, the Centipede Game, Nash bargaining, and Bertrand competition. As the name suggests, iterated regret minimization involves the iterated deletion of strategies that do not minimize regret. ",joseph halpern,,2008.0,,arXiv,Halpern2008,True,,arXiv,Not available,Iterated Regret Minimization: A More Realistic Solution Concept,516a94d9990c1d3b0a7d7639ed3216b8,http://arxiv.org/abs/0810.3023v1 11900," For some well-known games, such as the Traveler's Dilemma or the Centipede Game, traditional game-theoretic solution concepts--and most notably Nash equilibrium--predict outcomes that are not consistent with empirical observations. In this paper, we introduce a new solution concept, iterated regret minimization, which exhibits the same qualitative behavior as that observed in experiments in many games of interest, including Traveler's Dilemma, the Centipede Game, Nash bargaining, and Bertrand competition. As the name suggests, iterated regret minimization involves the iterated deletion of strategies that do not minimize regret. ",rafael pass,,2008.0,,arXiv,Halpern2008,True,,arXiv,Not available,Iterated Regret Minimization: A More Realistic Solution Concept,516a94d9990c1d3b0a7d7639ed3216b8,http://arxiv.org/abs/0810.3023v1 11901," The paper studies one-shot two-player games with non-Bayesian uncertainty. The players have an attitude that ranges from optimism to pessimism in the face of uncertainty. Given the attitudes, each player forms a belief about the set of possible strategies of the other player. If these beliefs are consistent, one says that they form an uncertainty equilibrium. One then considers a two-phase game where the players first choose their attitude and then play the resulting game. The paper illustrates these notions with a number of games where the approach provides a new insight into the plausible strategies of the players. ",jiwoong lee,,2009.0,,arXiv,Lee2009,True,,arXiv,Not available,Optimism in Games with Non-Probabilistic Uncertainty,c386c077d36951cb6535b78d2a7931a4,http://arxiv.org/abs/0912.3886v3 11902," The paper studies one-shot two-player games with non-Bayesian uncertainty. The players have an attitude that ranges from optimism to pessimism in the face of uncertainty. Given the attitudes, each player forms a belief about the set of possible strategies of the other player. If these beliefs are consistent, one says that they form an uncertainty equilibrium. One then considers a two-phase game where the players first choose their attitude and then play the resulting game. The paper illustrates these notions with a number of games where the approach provides a new insight into the plausible strategies of the players. ",jean walrand,,2009.0,,arXiv,Lee2009,True,,arXiv,Not available,Optimism in Games with Non-Probabilistic Uncertainty,c386c077d36951cb6535b78d2a7931a4,http://arxiv.org/abs/0912.3886v3 11903," Each of two players, by turns, rolls a dice several times accumulating the successive scores until he decides to stop, or he rolls an ace. When stopping, the accumulated turn score is added to the player account and the dice is given to his opponent. If he rolls an ace, the dice is given to the opponent without adding any point. In this paper we formulate this game in the framework of competitive Markov decision processes (also known as stochastic games), show that the game has a value, provide an algorithm to compute the optimal minimax strategy, and present results of this algorithm in three different variants of the game. ",fabian crocce,,2009.0,,arXiv,Crocce2009,True,,arXiv,Not available,Optimal minimax strategy in a dice game,7273ab182ac6bc9da51dc474e26f1da6,http://arxiv.org/abs/0912.5518v1 11904," Each of two players, by turns, rolls a dice several times accumulating the successive scores until he decides to stop, or he rolls an ace. When stopping, the accumulated turn score is added to the player account and the dice is given to his opponent. If he rolls an ace, the dice is given to the opponent without adding any point. In this paper we formulate this game in the framework of competitive Markov decision processes (also known as stochastic games), show that the game has a value, provide an algorithm to compute the optimal minimax strategy, and present results of this algorithm in three different variants of the game. ",ernesto mordecki,,2009.0,,arXiv,Crocce2009,True,,arXiv,Not available,Optimal minimax strategy in a dice game,7273ab182ac6bc9da51dc474e26f1da6,http://arxiv.org/abs/0912.5518v1 11905," Game semantics provides an interactive point of view on proofs, which enables one to describe precisely their dynamical behavior during cut elimination, by considering formulas as games on which proofs induce strategies. We are specifically interested here in relating two such semantics of linear logic, of very different flavor, which both take in account concurrent features of the proofs: asynchronous games and concurrent games. Interestingly, we show that associating a concurrent strategy to an asynchronous strategy can be seen as a semantical counterpart of the focusing property of linear logic. ",samuel mimram,,2010.0,10.1007/978-3-642-13962-8_37,6th Conference on Computability in Europe 6158 (2010),Mimram2010,True,,arXiv,Not available,Focusing in Asynchronous Games,0bf0665eee634ebfcfbf5df54834a294,http://arxiv.org/abs/1004.3134v1 11906," This article concerns the resolution of impartial combinatorial games, and in particular games that can be split in sums of independent positions. We prove that in order to compute the outcome of a sum of independent positions, it is always more efficient to compute separately the nimbers of each independent position than to develop directly the game tree of the sum. The concept of nimber is therefore inevitable to solve impartial games, even when we only try to determinate the winning or losing outcome of a starting position. We also describe algorithms to use nimbers efficiently and finally, we give a review of the results obtained on two impartial games: Sprouts and Cram. ",julien lemoine,,2010.0,,arXiv,Lemoine2010,True,,arXiv,Not available,Nimbers are inevitable,31a87d5a0efd2d99605535ca85e5c8b1,http://arxiv.org/abs/1011.5841v1 11907," This article concerns the resolution of impartial combinatorial games, and in particular games that can be split in sums of independent positions. We prove that in order to compute the outcome of a sum of independent positions, it is always more efficient to compute separately the nimbers of each independent position than to develop directly the game tree of the sum. The concept of nimber is therefore inevitable to solve impartial games, even when we only try to determinate the winning or losing outcome of a starting position. We also describe algorithms to use nimbers efficiently and finally, we give a review of the results obtained on two impartial games: Sprouts and Cram. ",simon viennot,,2010.0,,arXiv,Lemoine2010,True,,arXiv,Not available,Nimbers are inevitable,31a87d5a0efd2d99605535ca85e5c8b1,http://arxiv.org/abs/1011.5841v1 11908," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",joseph kadane,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 11909," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",yishay mansour,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11910," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",s. muthukrishnan,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11911," Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange. ",noam nisan,,2012.0,,arXiv,Mansour2012,True,,arXiv,Not available,Doubleclick Ad Exchange Auction,fd62f604dea41517bfc5f6de1ecac315,http://arxiv.org/abs/1204.0535v1 11912," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",l. blumrosen,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 11913," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",n. nisan,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 11914," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",i. segal,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 11915," We provide an exact analytical solution of the Nash equilibrium for $k$- price auctions. We also introduce a new type of auction and demonstrate that it has fair solutions other than the second price auctions, therefore paving the way for replacing second price auctions. ",martin mihelich,,2018.0,,arXiv,Mihelich2018,True,,arXiv,Not available,k-price auctions and Combination auctions,9e5690462e56356f76d38d42dcf1fcd0,http://arxiv.org/abs/1810.03494v2 11916," We provide an exact analytical solution of the Nash equilibrium for $k$- price auctions. We also introduce a new type of auction and demonstrate that it has fair solutions other than the second price auctions, therefore paving the way for replacing second price auctions. ",yan shu,,2018.0,,arXiv,Mihelich2018,True,,arXiv,Not available,k-price auctions and Combination auctions,9e5690462e56356f76d38d42dcf1fcd0,http://arxiv.org/abs/1810.03494v2 11917," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",nianxia cao,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11918," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",swastik brahma,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11919," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",chenyang li,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 11920," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",pramod varshney,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 11921," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",ashish goel,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 11922," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",kamesh munagala,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 11923," We introduce a novel characterization of all Walrasian price vectors in terms of forbidden over- and under demanded sets for monotone gross substitute combinatorial auctions. For ascending and descending auctions we suggest a universal framework for finding the minimum or maximum Walrasian price vectors for monotone gross substitute combinatorial auctions. An ascending (descending) auction is guaranteed to find the minimum (maximum) Walrasian if and only if it follows the suggested framework. ",oren ben-zwi,,2016.0,,arXiv,Ben-Zwi2016,True,,arXiv,Not available,Walrasian's Characterization and a Universal Ascending Auction,5240bf4f1cd8dffe3cb81174390cd88e,http://arxiv.org/abs/1605.03826v1 11924," We discuss bundle auctions within the framework of an integer allocation problem. We show that for multi-unit auctions, of which bundle auctions are a special case, market equilibrium and constrained market equilibrium are equivalent concepts. This equivalence, allows us to obtain a computable necessary and sufficient condition for the existence of constrained market equilibrium for bundle auctions. We use this result to obtain a necessary and sufficient condition for the existence of market equilibrium for multi-unit auctions. After obtaining the induced bundle auction of a nonnegative TU game, we show that the existence of market equilibrium implies the existence of a possibly different market equilibrium as well, which corresponds very naturally to an outcome in the matching core of the TU game. Consequently we show that the matching core of the nonnegative TU game is non-empty if and only if the induced market game has a market equilibrium. ",somdeb lahiri,,2006.0,,arXiv,Lahiri2006,True,,arXiv,Not available,"Market Equilibrium for Bundle Auctions and the Matching Core of Nonnegative TU Games",76077471140c9fabd94199f3a8422910,http://arxiv.org/abs/cs/0603032v3 11925," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",shuchi chawla,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11926," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",jason hartline,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11927," This paper develops the theory of mechanism redesign by which an auctioneer can reoptimize an auction based on bid data collected from previous iterations of the auction on bidders from the same market. We give a direct method for estimation of the revenue of a counterfactual auction from the bids in the current auction. The estimator is a simple weighted order statistic of the bids and has the optimal error rate. Two applications of our estimator are A/B testing (a.k.a., randomized controlled trials) and instrumented optimization (i.e., revenue optimization subject to being able to do accurate inference of any counterfactual auction revenue). ",denis nekipelov,,2017.0,,arXiv,Chawla2017,True,,arXiv,Not available,Mechanism Redesign,a312c5c3589a474f9976919d15bb28b3,http://arxiv.org/abs/1708.04699v1 11928," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",marco caminati,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11929," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",manfred kerber,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11930," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",mingyi hong,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 11931," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",christoph lange,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11932," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",colin rowat,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 11936," We examine a proposed auction using quantum states to represent bids and distributed adiabatic search to find the winner. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy guarantee, and present methods by which bidders can counter such attacks. We also suggest possible quantum circuit implementations of the auctions protocol, and quantum circuits to perpetrate and to counter attacks by a dishonest auctioneer. ",saikat guha,,2007.0,,"Int. J. of Quantum Information, Vol. 6, No. 4, August 2008",Guha2007,True,,arXiv,Not available,"Quantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations",d5bb8068f213467f99f14062d1828dbc,http://arxiv.org/abs/0707.2051v2 11937," We examine a proposed auction using quantum states to represent bids and distributed adiabatic search to find the winner. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy guarantee, and present methods by which bidders can counter such attacks. We also suggest possible quantum circuit implementations of the auctions protocol, and quantum circuits to perpetrate and to counter attacks by a dishonest auctioneer. ",tad hogg,,2007.0,,"Int. J. of Quantum Information, Vol. 6, No. 4, August 2008",Guha2007,True,,arXiv,Not available,"Quantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations",d5bb8068f213467f99f14062d1828dbc,http://arxiv.org/abs/0707.2051v2 11938," We examine a proposed auction using quantum states to represent bids and distributed adiabatic search to find the winner. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy guarantee, and present methods by which bidders can counter such attacks. We also suggest possible quantum circuit implementations of the auctions protocol, and quantum circuits to perpetrate and to counter attacks by a dishonest auctioneer. ",david fattal,,2007.0,,"Int. J. of Quantum Information, Vol. 6, No. 4, August 2008",Guha2007,True,,arXiv,Not available,"Quantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations",d5bb8068f213467f99f14062d1828dbc,http://arxiv.org/abs/0707.2051v2 11939," We examine a proposed auction using quantum states to represent bids and distributed adiabatic search to find the winner. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy guarantee, and present methods by which bidders can counter such attacks. We also suggest possible quantum circuit implementations of the auctions protocol, and quantum circuits to perpetrate and to counter attacks by a dishonest auctioneer. ",timothy spiller,,2007.0,,"Int. J. of Quantum Information, Vol. 6, No. 4, August 2008",Guha2007,True,,arXiv,Not available,"Quantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations",d5bb8068f213467f99f14062d1828dbc,http://arxiv.org/abs/0707.2051v2 11940," We examine a proposed auction using quantum states to represent bids and distributed adiabatic search to find the winner. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy guarantee, and present methods by which bidders can counter such attacks. We also suggest possible quantum circuit implementations of the auctions protocol, and quantum circuits to perpetrate and to counter attacks by a dishonest auctioneer. ",raymond beausoleil,,2007.0,,"Int. J. of Quantum Information, Vol. 6, No. 4, August 2008",Guha2007,True,,arXiv,Not available,"Quantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations",d5bb8068f213467f99f14062d1828dbc,http://arxiv.org/abs/0707.2051v2 11941," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",randy cogill,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 11942," In an electronic auction protocol, the main participants are the seller, a set of trusted auctioneer(s) and the set of bidders. In this paper we consider the situation where there is a seller and a set of n bidders intending to come to an agreement on the selling price of a certain good. Full private or bidder-resolved auction means that this agreement is reached without the help of trusted parties or auctioneers. Therefore, only the seller and the set of bidders are involved, the role of the auctioneers becomes obsolete in this case. property.We propose a new technique for the design of a full private sealed-bid auction protocol. ",maged ibrahim,,2012.0,,arXiv,Ibrahim2012,True,,arXiv,Not available,"A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction",401779a0918e0464f934416fc7787f8a,http://arxiv.org/abs/1211.2875v1 11943," This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case, we derive an optimal randomized bidding algorithm, by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general $k$-bidder case, if the number of objects is a multiple of $k$, an optimal randomized bidding algorithm is found. If the $k-1$ disadvantaged bidders employ that same algorithm, each of them can obtain at least $1/k$ of the objects regardless of the bidding algorithm the adversary uses. These two algorithms are based on closed-form solutions to certain multivariate probability distributions. In situations where a closed-form solution cannot be obtained, we study a restricted class of bidding algorithms as an approximation to desired optimal algorithms. ",ming-yang kao,,2000.0,,"SIAM Journal on Computing, 28(3):955--969, 1999",Kao2000,True,,arXiv,Not available,Optimal Bidding Algorithms Against Cheating in Multiple-Object Auctions,a0a3390e4f35ad04137ffaa7744125c2,http://arxiv.org/abs/cs/0011023v1 11944," This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case, we derive an optimal randomized bidding algorithm, by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general $k$-bidder case, if the number of objects is a multiple of $k$, an optimal randomized bidding algorithm is found. If the $k-1$ disadvantaged bidders employ that same algorithm, each of them can obtain at least $1/k$ of the objects regardless of the bidding algorithm the adversary uses. These two algorithms are based on closed-form solutions to certain multivariate probability distributions. In situations where a closed-form solution cannot be obtained, we study a restricted class of bidding algorithms as an approximation to desired optimal algorithms. ",junfeng qi,,2000.0,,"SIAM Journal on Computing, 28(3):955--969, 1999",Kao2000,True,,arXiv,Not available,Optimal Bidding Algorithms Against Cheating in Multiple-Object Auctions,a0a3390e4f35ad04137ffaa7744125c2,http://arxiv.org/abs/cs/0011023v1 11945," This paper studies some basic problems in a multiple-object auction model using methodologies from theoretical computer science. We are especially concerned with situations where an adversary bidder knows the bidding algorithms of all the other bidders. In the two-bidder case, we derive an optimal randomized bidding algorithm, by which the disadvantaged bidder can procure at least half of the auction objects despite the adversary's a priori knowledge of his algorithm. In the general $k$-bidder case, if the number of objects is a multiple of $k$, an optimal randomized bidding algorithm is found. If the $k-1$ disadvantaged bidders employ that same algorithm, each of them can obtain at least $1/k$ of the objects regardless of the bidding algorithm the adversary uses. These two algorithms are based on closed-form solutions to certain multivariate probability distributions. In situations where a closed-form solution cannot be obtained, we study a restricted class of bidding algorithms as an approximation to desired optimal algorithms. ",lei tan,,2000.0,,"SIAM Journal on Computing, 28(3):955--969, 1999",Kao2000,True,,arXiv,Not available,Optimal Bidding Algorithms Against Cheating in Multiple-Object Auctions,a0a3390e4f35ad04137ffaa7744125c2,http://arxiv.org/abs/cs/0011023v1 11949," In this paper, we aim to empirically examine the value of website usage and sellers' listing behavior in the two leading Internet auctions sites, eBay and Yahoo!Auctions. The descriptive data analysis of the seller's equilibrium listing behavior indicates that a seller's higher expected auction revenue from eBay is correlated with a lager number of potential bidders measured by website usage per listing. Our estimation results, based on the logarithm specifications of sellers' expected auction revenues and potential bidders' website usage, show that in a median case, (i) 1 percent increase of the unique visitors (page views) per listed item induces 0.022 (0.007) percent increase of a seller's expected auction revenue; and (ii) 1 percent increase of sellers' listings induces 1.99 (4.74) percent increase of the unique visitors (page views). Since increased expected auction revenues will induce more listings, we can infer positive feedback effects between the number of listings and website usage. Consequently, Yahoo!Auctions, which has substantially less listings, has greater incentives to increase listings via these feedback effects which are reflected in its fee schedules. ",sangin park,,2001.0,,arXiv,Park2001,True,,arXiv,Not available,Value of Usage and Seller's Listing Behavior in Internet Auctions,4421c6cff561e2cd0317be36d49827b2,http://arxiv.org/abs/cs/0109088v1 11950," This paper examines the effects of licensing conditions, in particular of spectrum fees, on the pricing and diffusion of mobile communications services. Seemingly exorbitant sums paid for 3G licenses in the UK, Germany in 2000 and similarly high fees paid by U.S. carriers in the re-auctioning of PCS licenses early in 2001 raised concerns as to the impacts of the market entry regime on the mobile communications market. The evidence from the GSM and PCS markets reviewed in this paper suggests that market entry fees do indeed influence the subsequent development of the market. We discuss three potential transmission channels by which license fees can influence the price and quantity of service sold in a wireless market: an increase in average cost, an increase in incremental costs, and impacts of sunk costs on the emerging market structure. From this conceptual debate, an empirical model is developed and tested using cross-sectional data for the residential mobile voice market. We utilize a structural equation approach, modeling the supply and demand relationships subject to the constraint that supply equals demand. The results confirm the existence of a positive effect of license fees on the cost of supply. However, we also find that higher market concentration has a positive effect on the overall supply in the market, perhaps supporting a Schumpeterian view that a certain degree of market concentration facilitates efficiency. ",johannes bauer,,2001.0,,arXiv,Bauer2001,True,,arXiv,Not available,"Spectrum auctions, pricing and network expansion in wireless telecommunications",9605b182862d695621dda83052746de8,http://arxiv.org/abs/cs/0109108v1 11951," Models of auctions or tendering processes are introduced. In every round of bidding the players select their bid from a probability distribution and whenever a bid is unsuccessful, it is discarded and replaced. For simple models, the probability distributions evolve to a stationary power law with the exponent dependent only on the number of players. For most situations, the system converges towards a state where all players are identical. A number of variations of this model are introduced and the application of these models to the dynamics of market makers is discussed. The effect of price uncertainty on bid distributions is presented. An underlying market structure generates heterogenous agents which do not have power law bid distribution in general. ",r. d'hulst,,2001.0,10.1016/S0378-4371(01)00128-5,arXiv,D'Hulst2001,True,,arXiv,Not available,Bid distributions of competing agents in simple models of auctions,3faa3df88e2ebc626db358cf910c4231,http://arxiv.org/abs/nlin/0102016v1 11952," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",alfredo garcia,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 11953," Models of auctions or tendering processes are introduced. In every round of bidding the players select their bid from a probability distribution and whenever a bid is unsuccessful, it is discarded and replaced. For simple models, the probability distributions evolve to a stationary power law with the exponent dependent only on the number of players. For most situations, the system converges towards a state where all players are identical. A number of variations of this model are introduced and the application of these models to the dynamics of market makers is discussed. The effect of price uncertainty on bid distributions is presented. An underlying market structure generates heterogenous agents which do not have power law bid distribution in general. ",g. rodgers,,2001.0,10.1016/S0378-4371(01)00128-5,arXiv,D'Hulst2001,True,,arXiv,Not available,Bid distributions of competing agents in simple models of auctions,3faa3df88e2ebc626db358cf910c4231,http://arxiv.org/abs/nlin/0102016v1 11954," In this paper, the survival function of waiting times between orders and the corresponding trades in a double-auction market is studied both by means of experiments and of empirical data. It turns out that, already at the level of order durations, the survival function cannot be represented by a single exponential, thus ruling out the hypothesis of constant activity during trading. This fact has direct consequences for market microstructural models. They must include such a non-exponential behaviour to be realistic. ",enrico scalas,,2006.0,10.1016/j.physa.2005.09.047,"Physica A, Volume 366, 1 July 2006, Pages 463-471",Scalas2006,True,,arXiv,Not available,Waiting times between orders and trades in double-auction markets,c35ae653983c30230eb41fa87bc481c1,http://arxiv.org/abs/physics/0608273v1 11955," In this paper, the survival function of waiting times between orders and the corresponding trades in a double-auction market is studied both by means of experiments and of empirical data. It turns out that, already at the level of order durations, the survival function cannot be represented by a single exponential, thus ruling out the hypothesis of constant activity during trading. This fact has direct consequences for market microstructural models. They must include such a non-exponential behaviour to be realistic. ",taisei kaizoji,,2006.0,10.1016/j.physa.2005.09.047,"Physica A, Volume 366, 1 July 2006, Pages 463-471",Scalas2006,True,,arXiv,Not available,Waiting times between orders and trades in double-auction markets,c35ae653983c30230eb41fa87bc481c1,http://arxiv.org/abs/physics/0608273v1 11956," In this paper, the survival function of waiting times between orders and the corresponding trades in a double-auction market is studied both by means of experiments and of empirical data. It turns out that, already at the level of order durations, the survival function cannot be represented by a single exponential, thus ruling out the hypothesis of constant activity during trading. This fact has direct consequences for market microstructural models. They must include such a non-exponential behaviour to be realistic. ",michael kirchler,,2006.0,10.1016/j.physa.2005.09.047,"Physica A, Volume 366, 1 July 2006, Pages 463-471",Scalas2006,True,,arXiv,Not available,Waiting times between orders and trades in double-auction markets,c35ae653983c30230eb41fa87bc481c1,http://arxiv.org/abs/physics/0608273v1 11957," In this paper, the survival function of waiting times between orders and the corresponding trades in a double-auction market is studied both by means of experiments and of empirical data. It turns out that, already at the level of order durations, the survival function cannot be represented by a single exponential, thus ruling out the hypothesis of constant activity during trading. This fact has direct consequences for market microstructural models. They must include such a non-exponential behaviour to be realistic. ",juergen huber,,2006.0,10.1016/j.physa.2005.09.047,"Physica A, Volume 366, 1 July 2006, Pages 463-471",Scalas2006,True,,arXiv,Not available,Waiting times between orders and trades in double-auction markets,c35ae653983c30230eb41fa87bc481c1,http://arxiv.org/abs/physics/0608273v1 11958," In this paper, the survival function of waiting times between orders and the corresponding trades in a double-auction market is studied both by means of experiments and of empirical data. It turns out that, already at the level of order durations, the survival function cannot be represented by a single exponential, thus ruling out the hypothesis of constant activity during trading. This fact has direct consequences for market microstructural models. They must include such a non-exponential behaviour to be realistic. ",alessandra tedeschi,,2006.0,10.1016/j.physa.2005.09.047,"Physica A, Volume 366, 1 July 2006, Pages 463-471",Scalas2006,True,,arXiv,Not available,Waiting times between orders and trades in double-auction markets,c35ae653983c30230eb41fa87bc481c1,http://arxiv.org/abs/physics/0608273v1 11959," The arrival process of bidders and bids in online auctions is important for studying and modeling supply and demand in the online marketplace. A popular assumption in the online auction literature is that a Poisson bidder arrival process is a reasonable approximation. This approximation underlies theoretical derivations, statistical models and simulations used in field studies. However, when it comes to the bid arrivals, empirical research has shown that the process is far from Poisson, with early bidding and last-moment bids taking place. An additional feature that has been reported by various authors is an apparent self-similarity in the bid arrival process. Despite the wide evidence for the changing bidding intensities and the self-similarity, there has been no rigorous attempt at developing a model that adequately approximates bid arrivals and accounts for these features. The goal of this paper is to introduce a family of distributions that well-approximate the bid time distribution in hard-close auctions. We call this the BARISTA process (Bid ARrivals In STAges) because of its ability to generate different intensities at different stages. We describe the properties of this model, show how to simulate bid arrivals from it, and how to use it for estimation and inference. We illustrate its power and usefulness by fitting simulated and real data from eBay.com. Finally, we show how a Poisson bidder arrival process relates to a BARISTA bid arrival process. ",galit shmueli,,2007.0,10.1214/07-AOAS117,"Annals of Applied Statistics 2007, Vol. 1, No. 2, 412-441",Shmueli2007,True,,arXiv,Not available,The BARISTA: A model for bid arrivals in online auctions,e60cd4db498588512832c31993e3e715,http://arxiv.org/abs/0712.1962v1 11960," The arrival process of bidders and bids in online auctions is important for studying and modeling supply and demand in the online marketplace. A popular assumption in the online auction literature is that a Poisson bidder arrival process is a reasonable approximation. This approximation underlies theoretical derivations, statistical models and simulations used in field studies. However, when it comes to the bid arrivals, empirical research has shown that the process is far from Poisson, with early bidding and last-moment bids taking place. An additional feature that has been reported by various authors is an apparent self-similarity in the bid arrival process. Despite the wide evidence for the changing bidding intensities and the self-similarity, there has been no rigorous attempt at developing a model that adequately approximates bid arrivals and accounts for these features. The goal of this paper is to introduce a family of distributions that well-approximate the bid time distribution in hard-close auctions. We call this the BARISTA process (Bid ARrivals In STAges) because of its ability to generate different intensities at different stages. We describe the properties of this model, show how to simulate bid arrivals from it, and how to use it for estimation and inference. We illustrate its power and usefulness by fitting simulated and real data from eBay.com. Finally, we show how a Poisson bidder arrival process relates to a BARISTA bid arrival process. ",ralph russo,,2007.0,10.1214/07-AOAS117,"Annals of Applied Statistics 2007, Vol. 1, No. 2, 412-441",Shmueli2007,True,,arXiv,Not available,The BARISTA: A model for bid arrivals in online auctions,e60cd4db498588512832c31993e3e715,http://arxiv.org/abs/0712.1962v1 11961," The arrival process of bidders and bids in online auctions is important for studying and modeling supply and demand in the online marketplace. A popular assumption in the online auction literature is that a Poisson bidder arrival process is a reasonable approximation. This approximation underlies theoretical derivations, statistical models and simulations used in field studies. However, when it comes to the bid arrivals, empirical research has shown that the process is far from Poisson, with early bidding and last-moment bids taking place. An additional feature that has been reported by various authors is an apparent self-similarity in the bid arrival process. Despite the wide evidence for the changing bidding intensities and the self-similarity, there has been no rigorous attempt at developing a model that adequately approximates bid arrivals and accounts for these features. The goal of this paper is to introduce a family of distributions that well-approximate the bid time distribution in hard-close auctions. We call this the BARISTA process (Bid ARrivals In STAges) because of its ability to generate different intensities at different stages. We describe the properties of this model, show how to simulate bid arrivals from it, and how to use it for estimation and inference. We illustrate its power and usefulness by fitting simulated and real data from eBay.com. Finally, we show how a Poisson bidder arrival process relates to a BARISTA bid arrival process. ",wolfgang jank,,2007.0,10.1214/07-AOAS117,"Annals of Applied Statistics 2007, Vol. 1, No. 2, 412-441",Shmueli2007,True,,arXiv,Not available,The BARISTA: A model for bid arrivals in online auctions,e60cd4db498588512832c31993e3e715,http://arxiv.org/abs/0712.1962v1 11962," We study the statistical regularities of opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in opening call auction and the closing price of last trading day, is asymmetric and that the distribution displays a sharp peak at zero relative price and a relatively wide peak at negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a $q$-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed. ",gao-feng gu,,2009.0,10.1016/j.physa.2009.09.019,"Physica A 389 (2), 278-286 (2010)",Gu2009,True,,arXiv,Not available,Empirical regularities of opening call auction in Chinese stock market,a0defd0df45e9e711e329a9720335d03,http://arxiv.org/abs/0905.0582v1 11963," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",kevin leyton-brown,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 11964," We study the statistical regularities of opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in opening call auction and the closing price of last trading day, is asymmetric and that the distribution displays a sharp peak at zero relative price and a relatively wide peak at negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a $q$-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed. ",fei ren,,2009.0,10.1016/j.physa.2009.09.019,"Physica A 389 (2), 278-286 (2010)",Gu2009,True,,arXiv,Not available,Empirical regularities of opening call auction in Chinese stock market,a0defd0df45e9e711e329a9720335d03,http://arxiv.org/abs/0905.0582v1 11965," We study the statistical regularities of opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in opening call auction and the closing price of last trading day, is asymmetric and that the distribution displays a sharp peak at zero relative price and a relatively wide peak at negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a $q$-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed. ",xiao-hui ni,,2009.0,10.1016/j.physa.2009.09.019,"Physica A 389 (2), 278-286 (2010)",Gu2009,True,,arXiv,Not available,Empirical regularities of opening call auction in Chinese stock market,a0defd0df45e9e711e329a9720335d03,http://arxiv.org/abs/0905.0582v1 11966," We study the statistical regularities of opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in opening call auction and the closing price of last trading day, is asymmetric and that the distribution displays a sharp peak at zero relative price and a relatively wide peak at negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a $q$-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed. ",wei chen,,2009.0,10.1016/j.physa.2009.09.019,"Physica A 389 (2), 278-286 (2010)",Gu2009,True,,arXiv,Not available,Empirical regularities of opening call auction in Chinese stock market,a0defd0df45e9e711e329a9720335d03,http://arxiv.org/abs/0905.0582v1 11967," We study the statistical regularities of opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in opening call auction and the closing price of last trading day, is asymmetric and that the distribution displays a sharp peak at zero relative price and a relatively wide peak at negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a $q$-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed. ",wei-xing zhou,,2009.0,10.1016/j.physa.2009.09.019,"Physica A 389 (2), 278-286 (2010)",Gu2009,True,,arXiv,Not available,Empirical regularities of opening call auction in Chinese stock market,a0defd0df45e9e711e329a9720335d03,http://arxiv.org/abs/0905.0582v1 11968," Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory, it is then possible to measure how responsible each node is for the worth of the network. The literature on the topic is already quite large, and is scattered among game-theoretic and computer science venues. We review the main game-theoretic network centrality measures from both bodies of literature and organize them into two categories: those that are more focused on the connectivity of nodes, and those that are more focused on the synergies achieved by nodes in groups. We present and explain each centrality, with a focus on algorithms and complexity. ",mateusz tarkowski,,2017.0,,arXiv,Tarkowski2017,True,,arXiv,Not available,Game-theoretic Network Centrality: A Review,7b9e8212f73ac565fcabaa394fc27504,http://arxiv.org/abs/1801.00218v1 11969," Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory, it is then possible to measure how responsible each node is for the worth of the network. The literature on the topic is already quite large, and is scattered among game-theoretic and computer science venues. We review the main game-theoretic network centrality measures from both bodies of literature and organize them into two categories: those that are more focused on the connectivity of nodes, and those that are more focused on the synergies achieved by nodes in groups. We present and explain each centrality, with a focus on algorithms and complexity. ",tomasz michalak,,2017.0,,arXiv,Tarkowski2017,True,,arXiv,Not available,Game-theoretic Network Centrality: A Review,7b9e8212f73ac565fcabaa394fc27504,http://arxiv.org/abs/1801.00218v1 11970," Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory, it is then possible to measure how responsible each node is for the worth of the network. The literature on the topic is already quite large, and is scattered among game-theoretic and computer science venues. We review the main game-theoretic network centrality measures from both bodies of literature and organize them into two categories: those that are more focused on the connectivity of nodes, and those that are more focused on the synergies achieved by nodes in groups. We present and explain each centrality, with a focus on algorithms and complexity. ",talal rahwan,,2017.0,,arXiv,Tarkowski2017,True,,arXiv,Not available,Game-theoretic Network Centrality: A Review,7b9e8212f73ac565fcabaa394fc27504,http://arxiv.org/abs/1801.00218v1 11971," Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory, it is then possible to measure how responsible each node is for the worth of the network. The literature on the topic is already quite large, and is scattered among game-theoretic and computer science venues. We review the main game-theoretic network centrality measures from both bodies of literature and organize them into two categories: those that are more focused on the connectivity of nodes, and those that are more focused on the synergies achieved by nodes in groups. We present and explain each centrality, with a focus on algorithms and complexity. ",michael wooldridge,,2017.0,,arXiv,Tarkowski2017,True,,arXiv,Not available,Game-theoretic Network Centrality: A Review,7b9e8212f73ac565fcabaa394fc27504,http://arxiv.org/abs/1801.00218v1 11972," A hydra game is proposed, and the fact that every hydra eventually die out is shown to be equivalent (over a weak arithmetic) to the 1-consistency of set theory KPM for recursively Mahlo universes. ",toshiyasu arai,,2018.0,,arXiv,Arai2018,True,,arXiv,Not available,Hydra games for recursively Mahlo operations,0d4ef3282c084e8868fd63a74fe7f9f6,http://arxiv.org/abs/1808.04522v1 11973," The story of conflict and cooperation has started millions of years ago, and now it is everywhere: In biology, computer science, economics, humanities, law, philosophy, political science, and psychology. Wars, airline alliances, trade, oligopolistic cartels, evolution of species and genes, and team sports are examples of games of conflict and cooperation. However, Nash (1951)'s noncooperative games - in which each player acts independently without collaboration with any of the others - has become the dominant ideology in economics, game theory, and related fields. A simple falsification of this noncooperative theory is scientific publication: It is a rather competitive game, yet collaboration is widespread. In this paper, I propose a novel way to rationally play games of conflict and cooperation under the Principle of Free Will - players are free to cooperate to coordinate their actions or act independently. Anyone with a basic game theory background will be familiar with the setup in this paper, which is based on simple game trees. In fact, one hardly needs any mathematics to follow the arguments. ",mehmet ismail,,2018.0,,arXiv,Ismail2018,True,,arXiv,Not available,The story of conflict and cooperation,29fcf3e0eed72c61dc286cd4e46b07fa,http://arxiv.org/abs/1808.06750v1 11974," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",moshe tennenholtz,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 11975," Ad Hoc and Mesh networks are good samples of multi agent systems, where their nodes access the channel through carrier sense multiple access method, while a node channel access influence the access of neighbor nodes to the channel. Hence, game theory is a strong tool for studying this kind of networks. Carrier sense multiple access parameters such as minimum and maximum size of contention window and persistence factor can be modified based on game theoretic methods. In this study different games for tuning the parameters is investigated and different challenges are examined. ",mahdieh ghazvini,,2012.0,10.5121/ijwmn.2012.4419,arXiv,Ghazvini2012,True,,arXiv,Not available,Carrier Sense Multiple Access Tuning Parameters using Game Theory,7cfbeb43c0e039a7a834b23f75967359,http://arxiv.org/abs/1210.2911v1 11976," Ad Hoc and Mesh networks are good samples of multi agent systems, where their nodes access the channel through carrier sense multiple access method, while a node channel access influence the access of neighbor nodes to the channel. Hence, game theory is a strong tool for studying this kind of networks. Carrier sense multiple access parameters such as minimum and maximum size of contention window and persistence factor can be modified based on game theoretic methods. In this study different games for tuning the parameters is investigated and different challenges are examined. ",naser movahedinia,,2012.0,10.5121/ijwmn.2012.4419,arXiv,Ghazvini2012,True,,arXiv,Not available,Carrier Sense Multiple Access Tuning Parameters using Game Theory,7cfbeb43c0e039a7a834b23f75967359,http://arxiv.org/abs/1210.2911v1 11977," Ad Hoc and Mesh networks are good samples of multi agent systems, where their nodes access the channel through carrier sense multiple access method, while a node channel access influence the access of neighbor nodes to the channel. Hence, game theory is a strong tool for studying this kind of networks. Carrier sense multiple access parameters such as minimum and maximum size of contention window and persistence factor can be modified based on game theoretic methods. In this study different games for tuning the parameters is investigated and different challenges are examined. ",kamal jamshidi,,2012.0,10.5121/ijwmn.2012.4419,arXiv,Ghazvini2012,True,,arXiv,Not available,Carrier Sense Multiple Access Tuning Parameters using Game Theory,7cfbeb43c0e039a7a834b23f75967359,http://arxiv.org/abs/1210.2911v1 11978," Knowing the reflection of game theory and ethics, we develop a mathematical representation to bridge the gap between the concepts in moral philosophy (e.g., Kantian and Utilitarian) and AI ethics industry technology standard (e.g., IEEE P7000 standard series for Ethical AI). As an application, we demonstrate how human value can be obtained from the experimental game theory (e.g., trust game experiment) so as to build an ethical AI. Moreover, an approach to test the ethics (rightness or wrongness) of a given AI algorithm by using an iterated Prisoner's Dilemma Game experiment is discussed as an example. Compared with existing mathematical frameworks and testing method on AI ethics technology, the advantages of the proposed approach are analyzed. ",yijia wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,Using experimental game theory to transit human values to ethical AI,ee27e990f104fddaf70ef895ced599c1,http://arxiv.org/abs/1711.05905v1 11979," Knowing the reflection of game theory and ethics, we develop a mathematical representation to bridge the gap between the concepts in moral philosophy (e.g., Kantian and Utilitarian) and AI ethics industry technology standard (e.g., IEEE P7000 standard series for Ethical AI). As an application, we demonstrate how human value can be obtained from the experimental game theory (e.g., trust game experiment) so as to build an ethical AI. Moreover, an approach to test the ethics (rightness or wrongness) of a given AI algorithm by using an iterated Prisoner's Dilemma Game experiment is discussed as an example. Compared with existing mathematical frameworks and testing method on AI ethics technology, the advantages of the proposed approach are analyzed. ",yan wan,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,Using experimental game theory to transit human values to ethical AI,ee27e990f104fddaf70ef895ced599c1,http://arxiv.org/abs/1711.05905v1 11980," Knowing the reflection of game theory and ethics, we develop a mathematical representation to bridge the gap between the concepts in moral philosophy (e.g., Kantian and Utilitarian) and AI ethics industry technology standard (e.g., IEEE P7000 standard series for Ethical AI). As an application, we demonstrate how human value can be obtained from the experimental game theory (e.g., trust game experiment) so as to build an ethical AI. Moreover, an approach to test the ethics (rightness or wrongness) of a given AI algorithm by using an iterated Prisoner's Dilemma Game experiment is discussed as an example. Compared with existing mathematical frameworks and testing method on AI ethics technology, the advantages of the proposed approach are analyzed. ",zhijian wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,Using experimental game theory to transit human values to ethical AI,ee27e990f104fddaf70ef895ced599c1,http://arxiv.org/abs/1711.05905v1 11981," This paper deals with design of the secure blockchain network framework to prevent damages from an attacker. The design is based on the hybrid theoretical approaches which is named as the Blockchain Governance Game. The framework of this game finds the best strategy towards preparation for preventing attacker a network malfunction. Analytically tractable results are obtained by using hybrid of the fluctuation theory and the mixed strategy game theory which enables to predict the moment for operations and deliver the optimal portion of backup nodes to protect the blockchain network. ",song-kyoo kim,,2018.0,,arXiv,Kim2018,True,,arXiv,Not available,The Trailer of Blockchain Governance Game,853c6f17bb1753c9489ece284fd2e073,http://arxiv.org/abs/1807.05581v1 11982," Motivated by the fact that in many game-theoretic settings, the game analyzed is only an approximation to the game being played, in this work we analyze equilibrium computation for the broad and natural class of bimatrix games that are stable to perturbations. We specifically focus on games with the property that small changes in the payoff matrices do not cause the Nash equilibria of the game to fluctuate wildly. For such games we show how one can compute approximate Nash equilibria more efficiently than the general result of Lipton et al. \cite{LMM03}, by an amount that depends on the degree of stability of the game and that reduces to their bound in the worst case. Furthermore, we show that for stable games the approximate equilibria found will be close in variation distance to true equilibria, and moreover this holds even if we are given as input only a perturbation of the actual underlying stable game. For uniformly-stable games, where the equilibria fluctuate at most quasi-linearly in the extent of the perturbation, we get a particularly dramatic improvement. Here, we achieve a fully quasi-polynomial-time approximation scheme: that is, we can find $1/\poly(n)$-approximate equilibria in quasi-polynomial time. This is in marked contrast to the general class of bimatrix games for which finding such approximate equilibria is PPAD-hard. In particular, under the (widely believed) assumption that PPAD is not contained in quasi-polynomial time, our results imply that such uniformly stable games are inherently easier for computation of approximate equilibria than general bimatrix games. ",maria-florina balcan,,2010.0,,arXiv,Balcan2010,True,,arXiv,Not available,Nash Equilibria in Perturbation Resilient Games,3293376db334e616d515c10fec2f70ad,http://arxiv.org/abs/1008.1827v5 11983," Motivated by the fact that in many game-theoretic settings, the game analyzed is only an approximation to the game being played, in this work we analyze equilibrium computation for the broad and natural class of bimatrix games that are stable to perturbations. We specifically focus on games with the property that small changes in the payoff matrices do not cause the Nash equilibria of the game to fluctuate wildly. For such games we show how one can compute approximate Nash equilibria more efficiently than the general result of Lipton et al. \cite{LMM03}, by an amount that depends on the degree of stability of the game and that reduces to their bound in the worst case. Furthermore, we show that for stable games the approximate equilibria found will be close in variation distance to true equilibria, and moreover this holds even if we are given as input only a perturbation of the actual underlying stable game. For uniformly-stable games, where the equilibria fluctuate at most quasi-linearly in the extent of the perturbation, we get a particularly dramatic improvement. Here, we achieve a fully quasi-polynomial-time approximation scheme: that is, we can find $1/\poly(n)$-approximate equilibria in quasi-polynomial time. This is in marked contrast to the general class of bimatrix games for which finding such approximate equilibria is PPAD-hard. In particular, under the (widely believed) assumption that PPAD is not contained in quasi-polynomial time, our results imply that such uniformly stable games are inherently easier for computation of approximate equilibria than general bimatrix games. ",mark braverman,,2010.0,,arXiv,Balcan2010,True,,arXiv,Not available,Nash Equilibria in Perturbation Resilient Games,3293376db334e616d515c10fec2f70ad,http://arxiv.org/abs/1008.1827v5 11984," Studying games in the complete information model makes them analytically tractable. However, large $n$ player interactions are more realistically modeled as games of incomplete information, where players may know little to nothing about the types of other players. Unfortunately, games in incomplete information settings lose many of the nice properties of complete information games: the quality of equilibria can become worse, the equilibria lose their ex-post properties, and coordinating on an equilibrium becomes even more difficult. Because of these problems, we would like to study games of incomplete information, but still implement equilibria of the complete information game induced by the (unknown) realized player types. This problem was recently studied by Kearns et al. and solved in large games by means of introducing a weak mediator: their mediator took as input reported types of players, and output suggested actions which formed a correlated equilibrium of the underlying game. Players had the option to play independently of the mediator, or ignore its suggestions, but crucially, if they decided to opt-in to the mediator, they did not have the power to lie about their type. In this paper, we rectify this deficiency in the setting of large congestion games. We give, in a sense, the weakest possible mediator: it cannot enforce participation, verify types, or enforce its suggestions. Moreover, our mediator implements a Nash equilibrium of the complete information game. We show that it is an (asymptotic) ex-post equilibrium of the incomplete information game for all players to use the mediator honestly, and that when they do so, they end up playing an approximate Nash equilibrium of the induced complete information game. In particular, truthful use of the mediator is a Bayes-Nash equilibrium in any Bayesian game for any prior. ",ryan rogers,,2013.0,,arXiv,Rogers2013,True,,arXiv,Not available,Asymptotically Truthful Equilibrium Selection in Large Congestion Games,e4e5fb190267dc9b29b1c4ba1e396e14,http://arxiv.org/abs/1311.2625v2 11985," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",navin bhat,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 11986," Studying games in the complete information model makes them analytically tractable. However, large $n$ player interactions are more realistically modeled as games of incomplete information, where players may know little to nothing about the types of other players. Unfortunately, games in incomplete information settings lose many of the nice properties of complete information games: the quality of equilibria can become worse, the equilibria lose their ex-post properties, and coordinating on an equilibrium becomes even more difficult. Because of these problems, we would like to study games of incomplete information, but still implement equilibria of the complete information game induced by the (unknown) realized player types. This problem was recently studied by Kearns et al. and solved in large games by means of introducing a weak mediator: their mediator took as input reported types of players, and output suggested actions which formed a correlated equilibrium of the underlying game. Players had the option to play independently of the mediator, or ignore its suggestions, but crucially, if they decided to opt-in to the mediator, they did not have the power to lie about their type. In this paper, we rectify this deficiency in the setting of large congestion games. We give, in a sense, the weakest possible mediator: it cannot enforce participation, verify types, or enforce its suggestions. Moreover, our mediator implements a Nash equilibrium of the complete information game. We show that it is an (asymptotic) ex-post equilibrium of the incomplete information game for all players to use the mediator honestly, and that when they do so, they end up playing an approximate Nash equilibrium of the induced complete information game. In particular, truthful use of the mediator is a Bayes-Nash equilibrium in any Bayesian game for any prior. ",aaron roth,,2013.0,,arXiv,Rogers2013,True,,arXiv,Not available,Asymptotically Truthful Equilibrium Selection in Large Congestion Games,e4e5fb190267dc9b29b1c4ba1e396e14,http://arxiv.org/abs/1311.2625v2 11987," A systematic theory is introduced that describes stochastic effects in game theory. In a biological context, such effects are relevant for the evolution of finite populations with frequency-dependent selection. They are characterized by quantum Nash equilibria, a generalization of the well-known Nash equilibrium points in classical game theory. The implications of this theory for biological systems are discussed in detail. ",michael lassig,,2002.0,,arXiv,Lassig2002,True,,arXiv,Not available,Quantum Game Theory,ae2dfac2b8636b411e3663c55a0e6a2c,http://arxiv.org/abs/cond-mat/0206093v1 11988," A stochastic model for behavioral changes by imitative pair interactions of individuals is developed. `Microscopic' assumptions on the specific form of the imitative processes lead to a stochastic version of the game dynamical equations. That means, the approximate mean value equations of these equations are the game dynamical equations of evolutionary game theory. The stochastic version of the game dynamical equations allows the derivation of covariance equations. These should always be solved along with the ordinary game dynamical equations. On the one hand, the average behavior is affected by the covariances so that the game dynamical equations must be corrected for increasing covariances. Otherwise they may become invalid in the course of time. On the other hand, the covariances are a measure for the reliability of game dynamical descriptions. An increase of the covariances beyond a critical value indicates a phase transition, i.e. a sudden change in the properties of the considered social system. The applicability and use of the introduced equations are illustrated by computational results for the social self-organization of behavioral conventions. ",dirk helbing,,1998.0,,"Theory and Decision 40, 149-179 (1996)",Helbing1998,True,,arXiv,Not available,"A stochastic behavioral model and a `microscopic' foundation of evolutionary game theory",cbd77217106eff83582f5d1b3a2ae170,http://arxiv.org/abs/cond-mat/9805340v1 11989," I consider issues in distributed computation that should be of relevance to game theory. In particular, I focus on (a) representing knowledge and uncertainty, (b) dealing with failures, and (c) specification of mechanisms. ",joseph halpern,,2002.0,,arXiv,Halpern2002,True,,arXiv,Not available,A computer scientist looks at game theory,2b106a6c635c6b7790423e57568db7ad,http://arxiv.org/abs/cs/0201016v1 11990," Game theory has many limitations implicit in its application. By utilizing multiagent modeling, it is possible to solve a number of problems that are unsolvable using traditional game theory. In this paper reinforcement learning is applied to neural networks to create intelligent agents ",evan hurwitz,,2007.0,,arXiv,Hurwitz2007,True,,arXiv,Not available,Multi-Agent Modeling Using Intelligent Agents in the Game of Lerpa,3c39241d4d475e8e509b851ea760d20f,http://arxiv.org/abs/0706.0280v1 11991," Game theory has many limitations implicit in its application. By utilizing multiagent modeling, it is possible to solve a number of problems that are unsolvable using traditional game theory. In this paper reinforcement learning is applied to neural networks to create intelligent agents ",tshilidzi marwala,,2007.0,,arXiv,Hurwitz2007,True,,arXiv,Not available,Multi-Agent Modeling Using Intelligent Agents in the Game of Lerpa,3c39241d4d475e8e509b851ea760d20f,http://arxiv.org/abs/0706.0280v1 11992," The fundamental laws of quantum world upsets the logical foundation of classic physics. They are completely counter-intuitive with many bizarre behaviors. However, this paper shows that they may make sense from the perspective of a general decision-optimization principle for cooperation. This principle also offers a generalization of Nash equilibrium, a key concept in game theory, for better payoffs and stability of game playing. ",xiaofei huang,,2009.0,,arXiv,Huang2009,True,,arXiv,Not available,A Decision-Optimization Approach to Quantum Mechanics and Game Theory,ecd8d8e34dd579b14a8761017b3692d6,http://arxiv.org/abs/0911.5548v2 11993," The basic Monty Hall problem is explored to introduce into the fundamental concepts of the game theory and to give a complete Bayesian and a (noncooperative) game-theoretic analysis of the situation. Simple combinatorial arguments are used to exclude the holding action and to find minimax solutions. ",alexander gnedin,,2011.0,,arXiv,Gnedin2011,True,,arXiv,Not available,The Monty Hall Problem in the Game Theory Class,9eabed5844463c7723bac1b9954b431e,http://arxiv.org/abs/1107.0326v1 11994," We give an $\dfrac{1}{54}$ separation between 5-party pseudo-telepathy games and two-local theories. We define the notion of strategy in a k-local theory for a game, and extend the method of Chao and Reichardt. We also study variation of the game to minimize the classical winning probability. ",louis mathieu,,2018.0,,arXiv,Mathieu2018,True,,arXiv,Not available,Separating pseudo-telepathy games and two-local theories,c77e9db42103f187655042f2d1962dae,http://arxiv.org/abs/1806.08661v1 11995," We give an $\dfrac{1}{54}$ separation between 5-party pseudo-telepathy games and two-local theories. We define the notion of strategy in a k-local theory for a game, and extend the method of Chao and Reichardt. We also study variation of the game to minimize the classical winning probability. ",mehdi mhalla,,2018.0,,arXiv,Mathieu2018,True,,arXiv,Not available,Separating pseudo-telepathy games and two-local theories,c77e9db42103f187655042f2d1962dae,http://arxiv.org/abs/1806.08661v1 11996," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",yoav shoham,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 11997," Theory of quantum games is a new area of investigation that has gone through rapid development during the last few years. Initial motivation for playing games, in the quantum world, comes from the possibility of re-formulating quantum communication protocols, and algorithms, in terms of games between quantum and classical players. The possibility led to the view that quantum games have a potential to provide helpful insight into working of quantum algorithms, and even in finding new ones. This thesis analyzes and compares some interesting games when played classically and quantum mechanically. A large part of the thesis concerns investigations into a refinement notion of the Nash equilibrium concept. The refinement, called an evolutionarily stable strategy (ESS), was originally introduced in 1970s by mathematical biologists to model an evolving population using techniques borrowed from game theory. Analysis is developed around a situation when quantization changes ESSs without affecting corresponding Nash equilibria. Effects of quantization on solution-concepts other than Nash equilibrium are presented and discussed. For this purpose the notions of value of coalition, backwards-induction outcome, and subgame-perfect outcome are selected. Repeated games are known to have different information structure than one-shot games. Investigation is presented into a possible way where quantization changes the outcome of a repeated game. Lastly, two new suggestions are put forward to play quantum versions of classical matrix games. The first one uses the association of De Broglie's waves, with travelling material objects, as a resource for playing a quantum game. The second suggestion concerns an EPR type setting exploiting directly the correlations in Bell's inequalities to play a bi-matrix game. ",azhar iqbal,,2005.0,,arXiv,Iqbal2005,True,,arXiv,Not available,Studies in the Theory of Quantum Games,e736da3a0308f82a8c2fa57a2dc33eb9,http://arxiv.org/abs/quant-ph/0503176v4 11998," With increasing game size, a problem of computational complexity arises. This is especially true in real world problems such as in social systems, where there is a significant population of players involved in the game, and the complexity problem is critical. Previous studies in algorithmic game theory propose succinct games that enable small descriptions of payoff matrices and reduction of complexities. However, some of the suggested compromises lose generality with strict assumptions such as symmetries in utility functions and cannot be applied to the full range of real world problems that may be presented. Graphical games are relatively promising, with a good balance between complexity and generality. However, they assume a given graph structure of players' interactions and cannot be applied to games without such known graphs. This study proposes a method to identify an interaction graph between players and subsequently decompose games into smaller components by cutting out weak interactions for the purpose of reducing complexity. At the beginning, players' mutual dependencies on their utilities are quantified as variance-covariance matrices among players. Then, the interaction graphs among players are identified by solving eigenvalue problems. Players' interactions are further decomposed into linear combinations of games. This helps to find a consistent equilibrium, which is a Nash equilibrium specified by the decomposition, with reduced computational complexity. Finally, experiments on simple example games are shown to verify the proposed method. ",tatsuya iwase,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,"Linear Game Theory : Reduction of complexity by decomposing large games into partial games",cfaf4aeb25df8df72cbd47886eb442b7,http://arxiv.org/abs/1609.00481v2 11999," With increasing game size, a problem of computational complexity arises. This is especially true in real world problems such as in social systems, where there is a significant population of players involved in the game, and the complexity problem is critical. Previous studies in algorithmic game theory propose succinct games that enable small descriptions of payoff matrices and reduction of complexities. However, some of the suggested compromises lose generality with strict assumptions such as symmetries in utility functions and cannot be applied to the full range of real world problems that may be presented. Graphical games are relatively promising, with a good balance between complexity and generality. However, they assume a given graph structure of players' interactions and cannot be applied to games without such known graphs. This study proposes a method to identify an interaction graph between players and subsequently decompose games into smaller components by cutting out weak interactions for the purpose of reducing complexity. At the beginning, players' mutual dependencies on their utilities are quantified as variance-covariance matrices among players. Then, the interaction graphs among players are identified by solving eigenvalue problems. Players' interactions are further decomposed into linear combinations of games. This helps to find a consistent equilibrium, which is a Nash equilibrium specified by the decomposition, with reduced computational complexity. Finally, experiments on simple example games are shown to verify the proposed method. ",takahiro shiga,,2016.0,,arXiv,Iwase2016,True,,arXiv,Not available,"Linear Game Theory : Reduction of complexity by decomposing large games into partial games",cfaf4aeb25df8df72cbd47886eb442b7,http://arxiv.org/abs/1609.00481v2 12000," The so called \emph{quantum game theory} has recently been proclaimed as one of the new branches in the development of both quantum information theory and game theory. However, the notion of a quantum game itself has never been strictly defined, which has led to a lot of conceptual confusion among different authors. In this paper we introduce a new conceptual framework of a \emph{scenario} and an \emph{implementation} of a game. It is shown that the procedures of ""quantization"" of games proposed in the literature lead in fact to several different games which can be defined within the same scenario, but apart from this they may have nothing in common with the original game. Within the framework we put forward, a lot of conceptual misunderstandings that have arisen around ""quantum games"" can be stated clearly and resolved uniquely. In particular, the proclaimed essential role of entanglement in several static ""quantum games"", and their connection with Bell inequalities, is disproved. ",marcin markiewicz,,2010.0,,arXiv,Markiewicz2010,True,,arXiv,Not available,Static Quantum Games Revisited,6eef12debfa7d3c72ce47a45e80b3bd1,http://arxiv.org/abs/1001.2257v3 12001," The so called \emph{quantum game theory} has recently been proclaimed as one of the new branches in the development of both quantum information theory and game theory. However, the notion of a quantum game itself has never been strictly defined, which has led to a lot of conceptual confusion among different authors. In this paper we introduce a new conceptual framework of a \emph{scenario} and an \emph{implementation} of a game. It is shown that the procedures of ""quantization"" of games proposed in the literature lead in fact to several different games which can be defined within the same scenario, but apart from this they may have nothing in common with the original game. Within the framework we put forward, a lot of conceptual misunderstandings that have arisen around ""quantum games"" can be stated clearly and resolved uniquely. In particular, the proclaimed essential role of entanglement in several static ""quantum games"", and their connection with Bell inequalities, is disproved. ",adrian kosowski,,2010.0,,arXiv,Markiewicz2010,True,,arXiv,Not available,Static Quantum Games Revisited,6eef12debfa7d3c72ce47a45e80b3bd1,http://arxiv.org/abs/1001.2257v3 12002," The so called \emph{quantum game theory} has recently been proclaimed as one of the new branches in the development of both quantum information theory and game theory. However, the notion of a quantum game itself has never been strictly defined, which has led to a lot of conceptual confusion among different authors. In this paper we introduce a new conceptual framework of a \emph{scenario} and an \emph{implementation} of a game. It is shown that the procedures of ""quantization"" of games proposed in the literature lead in fact to several different games which can be defined within the same scenario, but apart from this they may have nothing in common with the original game. Within the framework we put forward, a lot of conceptual misunderstandings that have arisen around ""quantum games"" can be stated clearly and resolved uniquely. In particular, the proclaimed essential role of entanglement in several static ""quantum games"", and their connection with Bell inequalities, is disproved. ",tomasz tylec,,2010.0,,arXiv,Markiewicz2010,True,,arXiv,Not available,Static Quantum Games Revisited,6eef12debfa7d3c72ce47a45e80b3bd1,http://arxiv.org/abs/1001.2257v3 12003," The so called \emph{quantum game theory} has recently been proclaimed as one of the new branches in the development of both quantum information theory and game theory. However, the notion of a quantum game itself has never been strictly defined, which has led to a lot of conceptual confusion among different authors. In this paper we introduce a new conceptual framework of a \emph{scenario} and an \emph{implementation} of a game. It is shown that the procedures of ""quantization"" of games proposed in the literature lead in fact to several different games which can be defined within the same scenario, but apart from this they may have nothing in common with the original game. Within the framework we put forward, a lot of conceptual misunderstandings that have arisen around ""quantum games"" can be stated clearly and resolved uniquely. In particular, the proclaimed essential role of entanglement in several static ""quantum games"", and their connection with Bell inequalities, is disproved. ",jaroslaw pykacz,,2010.0,,arXiv,Markiewicz2010,True,,arXiv,Not available,Static Quantum Games Revisited,6eef12debfa7d3c72ce47a45e80b3bd1,http://arxiv.org/abs/1001.2257v3 12004," The so called \emph{quantum game theory} has recently been proclaimed as one of the new branches in the development of both quantum information theory and game theory. However, the notion of a quantum game itself has never been strictly defined, which has led to a lot of conceptual confusion among different authors. In this paper we introduce a new conceptual framework of a \emph{scenario} and an \emph{implementation} of a game. It is shown that the procedures of ""quantization"" of games proposed in the literature lead in fact to several different games which can be defined within the same scenario, but apart from this they may have nothing in common with the original game. Within the framework we put forward, a lot of conceptual misunderstandings that have arisen around ""quantum games"" can be stated clearly and resolved uniquely. In particular, the proclaimed essential role of entanglement in several static ""quantum games"", and their connection with Bell inequalities, is disproved. ",cyril gavoille,,2010.0,,arXiv,Markiewicz2010,True,,arXiv,Not available,Static Quantum Games Revisited,6eef12debfa7d3c72ce47a45e80b3bd1,http://arxiv.org/abs/1001.2257v3 12005," We consider dynamic cooperative games, where the worth of coalitions varies over time according to the history of allocations. When defining the core of a dynamic game, we allow the possibility for coalitions to deviate at any time and thereby to give rise to a new environment. A coalition that considers a deviation needs to take the consequences into account because from the deviation point on, the game is no longer played with the original set of players. The deviating coalition becomes the new grand coalition which, in turn, induces a new dynamic game. The stage games of the new dynamical game depend on all previous allocation including those that have materialized from the deviating time on. We define three types of core solutions: fair core, stable core and credible core. We characterize the first two in case where the instantaneous game depends on the last allocation (rather than on the whole history of allocations) and the third in the general case. The analysis and the results resembles to a great extent the theory of non-cooperative dynamic games. ",ehud lehrer,,2012.0,10.1007/s13235-013-0078-7,arXiv,Lehrer2012,True,,arXiv,Not available,On the Core of Dynamic Cooperative Games,58f2e7f9f4c969af4424853be108d6c6,http://arxiv.org/abs/1203.2832v1 12006," We consider dynamic cooperative games, where the worth of coalitions varies over time according to the history of allocations. When defining the core of a dynamic game, we allow the possibility for coalitions to deviate at any time and thereby to give rise to a new environment. A coalition that considers a deviation needs to take the consequences into account because from the deviation point on, the game is no longer played with the original set of players. The deviating coalition becomes the new grand coalition which, in turn, induces a new dynamic game. The stage games of the new dynamical game depend on all previous allocation including those that have materialized from the deviating time on. We define three types of core solutions: fair core, stable core and credible core. We characterize the first two in case where the instantaneous game depends on the last allocation (rather than on the whole history of allocations) and the third in the general case. The analysis and the results resembles to a great extent the theory of non-cooperative dynamic games. ",marco scarsini,,2012.0,10.1007/s13235-013-0078-7,arXiv,Lehrer2012,True,,arXiv,Not available,On the Core of Dynamic Cooperative Games,58f2e7f9f4c969af4424853be108d6c6,http://arxiv.org/abs/1203.2832v1 12007," We study online combinatorial auctions with production costs proposed by Blum et al. using the online primal dual framework. In this model, buyers arrive online, and the seller can produce multiple copies of each item subject to a non-decreasing marginal cost per copy. The goal is to allocate items to maximize social welfare less total production cost. For arbitrary (strictly convex and differentiable) production cost functions, we characterize the optimal competitive ratio achievable by online mechanisms/algorithms. We show that online posted pricing mechanisms, which are incentive compatible, can achieve competitive ratios arbitrarily close to the optimal, and construct lower bound instances on which no online algorithms, not necessarily incentive compatible, can do better. Our positive results improve or match the results in several previous work, e.g., Bartal et al., Blum et al., and Buchbinder and Gonen. Our lower bounds apply to randomized algorithms and resolve an open problem by Buchbinder and Gonen. ",zhiyi huang,,2014.0,,arXiv,Huang2014,True,,arXiv,Not available,Welfare Maximization with Production Costs: A Primal Dual Approach,27dcc6d472daf0d669bf53036f648385,http://arxiv.org/abs/1411.4384v1 12008," Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group seems to be much easier to implement. Simulations involving humans have already been performed. We will focus on problems related to combinatorial auctions and technical assumptions that are made. Quantum approach offers at least two important developments. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of agent's activity could in principle be guaranteed. Then we point out some key problem that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for experimental realization in the near future. We conclude by describing potential customers, estimating the potential market size and possible timing. ",e. piotrowski,,2007.0,10.1016/j.physa.2008.02.071,arXiv,Piotrowski2007,True,,arXiv,Not available,Quantum Auctions: Facts and Myths,9b0ea8dc27e625617206a0c9d0b751c6,http://arxiv.org/abs/0709.4096v1 12009," This paper addresses several significant gaps in the theory of restricted mis\`ere play (Plambeck, Siegel 2008), primarily in the well-studied universe of dead-ending games, $\mathcal{E}$ (Milley, Renault 2013); if a player run out of moves in $X\in \mathcal E$, then they can never move again in any follower of $X$. A universe of games is a class of games which is closed under disjunctive sum, taking options and conjugates. We use novel results from absolute combinatorial game theory (Larsson, Nowakowski, Santos 2017) to show that $\mathcal{E}$ and the universe $\mathcal{D}\subset \mathcal{E}$ of dicot games (either both, or none of the players can move) have 'options only' test for comparison of games, and this in turn is used to define unique reduced games (canonical forms) in $\mathcal{E}$. We develop the reductions for $\mathcal{E}$ by extending analogous work for $\mathcal{D}$, in particular by solving the problem of reversibility through ends in the larger universe. Finally, by using the defined canonical forms in $\mathcal{E}$ and $\mathcal{D}$, we prove that both of these universes, as well as the subuniverse of impartial games, have the conjugate property: every inverse game is obtained by swapping sides of the players. ",urban larsson,,2018.0,,arXiv,Larsson2018,True,,arXiv,Not available,"Progress on misère dead ends: game comparison, canonical form, and conjugate inverses",5fef6e54adcbbee03b127a87ce8455ef,http://arxiv.org/abs/1807.11297v1 12010," This paper addresses several significant gaps in the theory of restricted mis\`ere play (Plambeck, Siegel 2008), primarily in the well-studied universe of dead-ending games, $\mathcal{E}$ (Milley, Renault 2013); if a player run out of moves in $X\in \mathcal E$, then they can never move again in any follower of $X$. A universe of games is a class of games which is closed under disjunctive sum, taking options and conjugates. We use novel results from absolute combinatorial game theory (Larsson, Nowakowski, Santos 2017) to show that $\mathcal{E}$ and the universe $\mathcal{D}\subset \mathcal{E}$ of dicot games (either both, or none of the players can move) have 'options only' test for comparison of games, and this in turn is used to define unique reduced games (canonical forms) in $\mathcal{E}$. We develop the reductions for $\mathcal{E}$ by extending analogous work for $\mathcal{D}$, in particular by solving the problem of reversibility through ends in the larger universe. Finally, by using the defined canonical forms in $\mathcal{E}$ and $\mathcal{D}$, we prove that both of these universes, as well as the subuniverse of impartial games, have the conjugate property: every inverse game is obtained by swapping sides of the players. ",rebecca milley,,2018.0,,arXiv,Larsson2018,True,,arXiv,Not available,"Progress on misère dead ends: game comparison, canonical form, and conjugate inverses",5fef6e54adcbbee03b127a87ce8455ef,http://arxiv.org/abs/1807.11297v1 12011," This paper addresses several significant gaps in the theory of restricted mis\`ere play (Plambeck, Siegel 2008), primarily in the well-studied universe of dead-ending games, $\mathcal{E}$ (Milley, Renault 2013); if a player run out of moves in $X\in \mathcal E$, then they can never move again in any follower of $X$. A universe of games is a class of games which is closed under disjunctive sum, taking options and conjugates. We use novel results from absolute combinatorial game theory (Larsson, Nowakowski, Santos 2017) to show that $\mathcal{E}$ and the universe $\mathcal{D}\subset \mathcal{E}$ of dicot games (either both, or none of the players can move) have 'options only' test for comparison of games, and this in turn is used to define unique reduced games (canonical forms) in $\mathcal{E}$. We develop the reductions for $\mathcal{E}$ by extending analogous work for $\mathcal{D}$, in particular by solving the problem of reversibility through ends in the larger universe. Finally, by using the defined canonical forms in $\mathcal{E}$ and $\mathcal{D}$, we prove that both of these universes, as well as the subuniverse of impartial games, have the conjugate property: every inverse game is obtained by swapping sides of the players. ",richard nowakowski,,2018.0,,arXiv,Larsson2018,True,,arXiv,Not available,"Progress on misère dead ends: game comparison, canonical form, and conjugate inverses",5fef6e54adcbbee03b127a87ce8455ef,http://arxiv.org/abs/1807.11297v1 12012," This paper addresses several significant gaps in the theory of restricted mis\`ere play (Plambeck, Siegel 2008), primarily in the well-studied universe of dead-ending games, $\mathcal{E}$ (Milley, Renault 2013); if a player run out of moves in $X\in \mathcal E$, then they can never move again in any follower of $X$. A universe of games is a class of games which is closed under disjunctive sum, taking options and conjugates. We use novel results from absolute combinatorial game theory (Larsson, Nowakowski, Santos 2017) to show that $\mathcal{E}$ and the universe $\mathcal{D}\subset \mathcal{E}$ of dicot games (either both, or none of the players can move) have 'options only' test for comparison of games, and this in turn is used to define unique reduced games (canonical forms) in $\mathcal{E}$. We develop the reductions for $\mathcal{E}$ by extending analogous work for $\mathcal{D}$, in particular by solving the problem of reversibility through ends in the larger universe. Finally, by using the defined canonical forms in $\mathcal{E}$ and $\mathcal{D}$, we prove that both of these universes, as well as the subuniverse of impartial games, have the conjugate property: every inverse game is obtained by swapping sides of the players. ",gabriel renault,,2018.0,,arXiv,Larsson2018,True,,arXiv,Not available,"Progress on misère dead ends: game comparison, canonical form, and conjugate inverses",5fef6e54adcbbee03b127a87ce8455ef,http://arxiv.org/abs/1807.11297v1 12013," This paper addresses several significant gaps in the theory of restricted mis\`ere play (Plambeck, Siegel 2008), primarily in the well-studied universe of dead-ending games, $\mathcal{E}$ (Milley, Renault 2013); if a player run out of moves in $X\in \mathcal E$, then they can never move again in any follower of $X$. A universe of games is a class of games which is closed under disjunctive sum, taking options and conjugates. We use novel results from absolute combinatorial game theory (Larsson, Nowakowski, Santos 2017) to show that $\mathcal{E}$ and the universe $\mathcal{D}\subset \mathcal{E}$ of dicot games (either both, or none of the players can move) have 'options only' test for comparison of games, and this in turn is used to define unique reduced games (canonical forms) in $\mathcal{E}$. We develop the reductions for $\mathcal{E}$ by extending analogous work for $\mathcal{D}$, in particular by solving the problem of reversibility through ends in the larger universe. Finally, by using the defined canonical forms in $\mathcal{E}$ and $\mathcal{D}$, we prove that both of these universes, as well as the subuniverse of impartial games, have the conjugate property: every inverse game is obtained by swapping sides of the players. ",carlos santos,,2018.0,,arXiv,Larsson2018,True,,arXiv,Not available,"Progress on misère dead ends: game comparison, canonical form, and conjugate inverses",5fef6e54adcbbee03b127a87ce8455ef,http://arxiv.org/abs/1807.11297v1 12014," Zero-sum stochastic games are easy to solve as they can be cast as simple Markov decision processes. This is however not the case with general-sum stochastic games. A fairly general optimization problem formulation is available for general-sum stochastic games by Filar and Vrieze [2004]. However, the optimization problem there has a non-linear objective and non-linear constraints with special structure. Since gradients of both the objective as well as constraints of this optimization problem are well defined, gradient based schemes seem to be a natural choice. We discuss a gradient scheme tuned for two-player stochastic games. We show in simulations that this scheme indeed converges to a Nash equilibrium, for a simple terrain exploration problem modelled as a general-sum stochastic game. However, it turns out that only global minima of the optimization problem correspond to Nash equilibria of the underlying general-sum stochastic game, while gradient schemes only guarantee convergence to local minima. We then provide important necessary conditions for gradient schemes to converge to Nash equilibria in general-sum stochastic games. ",h. prasad,,2015.0,,arXiv,Prasad2015,True,,arXiv,Not available,A Study of Gradient Descent Schemes for General-Sum Stochastic Games,b5c30f89b91a6ef42dabcba36161bbbe,http://arxiv.org/abs/1507.00093v1 12015," Zero-sum stochastic games are easy to solve as they can be cast as simple Markov decision processes. This is however not the case with general-sum stochastic games. A fairly general optimization problem formulation is available for general-sum stochastic games by Filar and Vrieze [2004]. However, the optimization problem there has a non-linear objective and non-linear constraints with special structure. Since gradients of both the objective as well as constraints of this optimization problem are well defined, gradient based schemes seem to be a natural choice. We discuss a gradient scheme tuned for two-player stochastic games. We show in simulations that this scheme indeed converges to a Nash equilibrium, for a simple terrain exploration problem modelled as a general-sum stochastic game. However, it turns out that only global minima of the optimization problem correspond to Nash equilibria of the underlying general-sum stochastic game, while gradient schemes only guarantee convergence to local minima. We then provide important necessary conditions for gradient schemes to converge to Nash equilibria in general-sum stochastic games. ",shalabh bhatnagar,,2015.0,,arXiv,Prasad2015,True,,arXiv,Not available,A Study of Gradient Descent Schemes for General-Sum Stochastic Games,b5c30f89b91a6ef42dabcba36161bbbe,http://arxiv.org/abs/1507.00093v1 12016," Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock). ",thomas brihaye,,2015.0,10.4230/LIPIcs.FSTTCS.2015.278,arXiv,Brihaye2015,True,,arXiv,Not available,Simple Priced Timed Games Are Not That Simple,41ca0328b760e7f71107fb47bc139023,http://arxiv.org/abs/1507.03786v2 12017," Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock). ",gilles geeraerts,,2015.0,10.4230/LIPIcs.FSTTCS.2015.278,arXiv,Brihaye2015,True,,arXiv,Not available,Simple Priced Timed Games Are Not That Simple,41ca0328b760e7f71107fb47bc139023,http://arxiv.org/abs/1507.03786v2 12018," Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock). ",axel haddad,,2015.0,10.4230/LIPIcs.FSTTCS.2015.278,arXiv,Brihaye2015,True,,arXiv,Not available,Simple Priced Timed Games Are Not That Simple,41ca0328b760e7f71107fb47bc139023,http://arxiv.org/abs/1507.03786v2 12019," Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group seems to be much easier to implement. Simulations involving humans have already been performed. We will focus on problems related to combinatorial auctions and technical assumptions that are made. Quantum approach offers at least two important developments. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of agent's activity could in principle be guaranteed. Then we point out some key problem that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for experimental realization in the near future. We conclude by describing potential customers, estimating the potential market size and possible timing. ",j. sladkowski,,2007.0,10.1016/j.physa.2008.02.071,arXiv,Piotrowski2007,True,,arXiv,Not available,Quantum Auctions: Facts and Myths,9b0ea8dc27e625617206a0c9d0b751c6,http://arxiv.org/abs/0709.4096v1 12020," Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock). ",engel lefaucheux,,2015.0,10.4230/LIPIcs.FSTTCS.2015.278,arXiv,Brihaye2015,True,,arXiv,Not available,Simple Priced Timed Games Are Not That Simple,41ca0328b760e7f71107fb47bc139023,http://arxiv.org/abs/1507.03786v2 12021," Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock). ",benjamin monmege,,2015.0,10.4230/LIPIcs.FSTTCS.2015.278,arXiv,Brihaye2015,True,,arXiv,Not available,Simple Priced Timed Games Are Not That Simple,41ca0328b760e7f71107fb47bc139023,http://arxiv.org/abs/1507.03786v2 12022," A mediator is a mechanism that can only suggest actions to players, as a function of all agents' reported types, in a given game of incomplete information. We study what is achievable by two kinds of mediators, ""strong"" and ""weak."" Players can choose to opt-out of using a strong mediator but cannot misrepresent their type if they opt-in. Such a mediator is ""strong"" because we can view it as having the ability to verify player types. Weak mediators lack this ability--- players are free to misrepresent their type to a weak mediator. We show a striking result---in a prior-free setting, assuming only that the game is large and players have private types, strong mediators can implement approximate equilibria of the complete-information game. If the game is a congestion game, then the same result holds using only weak mediators. Our result follows from a novel application of differential privacy, in particular, a variant we propose called joint differential privacy. ",michael kearns,,2015.0,,arXiv,Kearns2015,True,,arXiv,Not available,Robust Mediators in Large Games,c8e3f29ca0c0e6e84f8f4ecc1b768301,http://arxiv.org/abs/1512.02698v2 12023," A mediator is a mechanism that can only suggest actions to players, as a function of all agents' reported types, in a given game of incomplete information. We study what is achievable by two kinds of mediators, ""strong"" and ""weak."" Players can choose to opt-out of using a strong mediator but cannot misrepresent their type if they opt-in. Such a mediator is ""strong"" because we can view it as having the ability to verify player types. Weak mediators lack this ability--- players are free to misrepresent their type to a weak mediator. We show a striking result---in a prior-free setting, assuming only that the game is large and players have private types, strong mediators can implement approximate equilibria of the complete-information game. If the game is a congestion game, then the same result holds using only weak mediators. Our result follows from a novel application of differential privacy, in particular, a variant we propose called joint differential privacy. ",mallesh pai,,2015.0,,arXiv,Kearns2015,True,,arXiv,Not available,Robust Mediators in Large Games,c8e3f29ca0c0e6e84f8f4ecc1b768301,http://arxiv.org/abs/1512.02698v2 12024," A mediator is a mechanism that can only suggest actions to players, as a function of all agents' reported types, in a given game of incomplete information. We study what is achievable by two kinds of mediators, ""strong"" and ""weak."" Players can choose to opt-out of using a strong mediator but cannot misrepresent their type if they opt-in. Such a mediator is ""strong"" because we can view it as having the ability to verify player types. Weak mediators lack this ability--- players are free to misrepresent their type to a weak mediator. We show a striking result---in a prior-free setting, assuming only that the game is large and players have private types, strong mediators can implement approximate equilibria of the complete-information game. If the game is a congestion game, then the same result holds using only weak mediators. Our result follows from a novel application of differential privacy, in particular, a variant we propose called joint differential privacy. ",ryan rogers,,2015.0,,arXiv,Kearns2015,True,,arXiv,Not available,Robust Mediators in Large Games,c8e3f29ca0c0e6e84f8f4ecc1b768301,http://arxiv.org/abs/1512.02698v2 12025," A mediator is a mechanism that can only suggest actions to players, as a function of all agents' reported types, in a given game of incomplete information. We study what is achievable by two kinds of mediators, ""strong"" and ""weak."" Players can choose to opt-out of using a strong mediator but cannot misrepresent their type if they opt-in. Such a mediator is ""strong"" because we can view it as having the ability to verify player types. Weak mediators lack this ability--- players are free to misrepresent their type to a weak mediator. We show a striking result---in a prior-free setting, assuming only that the game is large and players have private types, strong mediators can implement approximate equilibria of the complete-information game. If the game is a congestion game, then the same result holds using only weak mediators. Our result follows from a novel application of differential privacy, in particular, a variant we propose called joint differential privacy. ",aaron roth,,2015.0,,arXiv,Kearns2015,True,,arXiv,Not available,Robust Mediators in Large Games,c8e3f29ca0c0e6e84f8f4ecc1b768301,http://arxiv.org/abs/1512.02698v2 12026," A mediator is a mechanism that can only suggest actions to players, as a function of all agents' reported types, in a given game of incomplete information. We study what is achievable by two kinds of mediators, ""strong"" and ""weak."" Players can choose to opt-out of using a strong mediator but cannot misrepresent their type if they opt-in. Such a mediator is ""strong"" because we can view it as having the ability to verify player types. Weak mediators lack this ability--- players are free to misrepresent their type to a weak mediator. We show a striking result---in a prior-free setting, assuming only that the game is large and players have private types, strong mediators can implement approximate equilibria of the complete-information game. If the game is a congestion game, then the same result holds using only weak mediators. Our result follows from a novel application of differential privacy, in particular, a variant we propose called joint differential privacy. ",jonathan ullman,,2015.0,,arXiv,Kearns2015,True,,arXiv,Not available,Robust Mediators in Large Games,c8e3f29ca0c0e6e84f8f4ecc1b768301,http://arxiv.org/abs/1512.02698v2 12027," Extensive-form games with imperfect recall are an important game-theoretic model that allows a compact representation of strategies in dynamic strategic interactions. Practical use of imperfect recall games is limited due to negative theoretical results: a Nash equilibrium does not have to exist, computing maxmin strategies is NP-hard, and they may require irrational numbers. We present the first algorithm for approximating maxmin strategies in two-player zero-sum imperfect recall games without absentmindedness. We modify the well-known sequence-form linear program to model strategies in imperfect recall games and use a recent technique to approximate bilinear terms. Our main algorithm is a branch-and-bound search over these linear programs that provably reaches a desired approximation after an exponential number of steps in the size of the game. Experimental evaluation shows that the proposed algorithm can approximate maxmin strategies of randomly generated imperfect recall games of sizes beyond toy-problems within few minutes. ",branislav bosansky,,2016.0,,arXiv,Bosansky2016,True,,arXiv,Not available,"Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall",56b17358f5b20ed710101a6e100142db,http://arxiv.org/abs/1608.01510v2 12028," Extensive-form games with imperfect recall are an important game-theoretic model that allows a compact representation of strategies in dynamic strategic interactions. Practical use of imperfect recall games is limited due to negative theoretical results: a Nash equilibrium does not have to exist, computing maxmin strategies is NP-hard, and they may require irrational numbers. We present the first algorithm for approximating maxmin strategies in two-player zero-sum imperfect recall games without absentmindedness. We modify the well-known sequence-form linear program to model strategies in imperfect recall games and use a recent technique to approximate bilinear terms. Our main algorithm is a branch-and-bound search over these linear programs that provably reaches a desired approximation after an exponential number of steps in the size of the game. Experimental evaluation shows that the proposed algorithm can approximate maxmin strategies of randomly generated imperfect recall games of sizes beyond toy-problems within few minutes. ",jiri cermak,,2016.0,,arXiv,Bosansky2016,True,,arXiv,Not available,"Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall",56b17358f5b20ed710101a6e100142db,http://arxiv.org/abs/1608.01510v2 12029," Extensive-form games with imperfect recall are an important game-theoretic model that allows a compact representation of strategies in dynamic strategic interactions. Practical use of imperfect recall games is limited due to negative theoretical results: a Nash equilibrium does not have to exist, computing maxmin strategies is NP-hard, and they may require irrational numbers. We present the first algorithm for approximating maxmin strategies in two-player zero-sum imperfect recall games without absentmindedness. We modify the well-known sequence-form linear program to model strategies in imperfect recall games and use a recent technique to approximate bilinear terms. Our main algorithm is a branch-and-bound search over these linear programs that provably reaches a desired approximation after an exponential number of steps in the size of the game. Experimental evaluation shows that the proposed algorithm can approximate maxmin strategies of randomly generated imperfect recall games of sizes beyond toy-problems within few minutes. ",karel horak,,2016.0,,arXiv,Bosansky2016,True,,arXiv,Not available,"Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall",56b17358f5b20ed710101a6e100142db,http://arxiv.org/abs/1608.01510v2 12030," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",eyal even-dar,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 12031," Extensive-form games with imperfect recall are an important game-theoretic model that allows a compact representation of strategies in dynamic strategic interactions. Practical use of imperfect recall games is limited due to negative theoretical results: a Nash equilibrium does not have to exist, computing maxmin strategies is NP-hard, and they may require irrational numbers. We present the first algorithm for approximating maxmin strategies in two-player zero-sum imperfect recall games without absentmindedness. We modify the well-known sequence-form linear program to model strategies in imperfect recall games and use a recent technique to approximate bilinear terms. Our main algorithm is a branch-and-bound search over these linear programs that provably reaches a desired approximation after an exponential number of steps in the size of the game. Experimental evaluation shows that the proposed algorithm can approximate maxmin strategies of randomly generated imperfect recall games of sizes beyond toy-problems within few minutes. ",michal pechoucek,,2016.0,,arXiv,Bosansky2016,True,,arXiv,Not available,"Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall",56b17358f5b20ed710101a6e100142db,http://arxiv.org/abs/1608.01510v2 12032," We introduce and study Minkowski games. These are two player games, where the players take turns to chose positions in $\mathbb{R}^d$ based on some rules. Variants include boundedness games, where one player wants to keep the positions bounded, and the other wants to escape to infinity; as well as safety games, where one player wants to stay within a prescribed set, while the other wants to leave it. We provide some general characterizations of which player can win such games, and explore the computational complexity of the associated decision problems. A natural representation of boundedness games yields coNP-completeness, whereas the safety games are undecidable. ",stephane roux,,2016.0,,arXiv,Roux2016,True,,arXiv,Not available,Minkowski games,7d5cde4988ffebecb20e69d06541c1c7,http://arxiv.org/abs/1609.07048v2 12033," We introduce and study Minkowski games. These are two player games, where the players take turns to chose positions in $\mathbb{R}^d$ based on some rules. Variants include boundedness games, where one player wants to keep the positions bounded, and the other wants to escape to infinity; as well as safety games, where one player wants to stay within a prescribed set, while the other wants to leave it. We provide some general characterizations of which player can win such games, and explore the computational complexity of the associated decision problems. A natural representation of boundedness games yields coNP-completeness, whereas the safety games are undecidable. ",arno pauly,,2016.0,,arXiv,Roux2016,True,,arXiv,Not available,Minkowski games,7d5cde4988ffebecb20e69d06541c1c7,http://arxiv.org/abs/1609.07048v2 12034," We introduce and study Minkowski games. These are two player games, where the players take turns to chose positions in $\mathbb{R}^d$ based on some rules. Variants include boundedness games, where one player wants to keep the positions bounded, and the other wants to escape to infinity; as well as safety games, where one player wants to stay within a prescribed set, while the other wants to leave it. We provide some general characterizations of which player can win such games, and explore the computational complexity of the associated decision problems. A natural representation of boundedness games yields coNP-completeness, whereas the safety games are undecidable. ",jean-francois raskin,,2016.0,,arXiv,Roux2016,True,,arXiv,Not available,Minkowski games,7d5cde4988ffebecb20e69d06541c1c7,http://arxiv.org/abs/1609.07048v2 12035," There has been significant interest in studying security games for modeling the interplay of attacks and defenses on various systems involving critical infrastructure, financial system security, political campaigns, and civil safeguarding. However, existing security game models typically either assume additive utility functions, or that the attacker can attack only one target. Such assumptions lead to tractable analysis, but miss key inherent dependencies that exist among different targets in current complex networks. In this paper, we generalize the classical security game models to allow for non-additive utility functions. We also allow attackers to be able to attack multiple targets. We examine such a general security game from a theoretical perspective and provide a unified view. In particular, we show that each security game is equivalent to a combinatorial optimization problem over a set system $\varepsilon$, which consists of defender's pure strategy space. The key technique we use is based on the transformation, projection of a polytope, and the elipsoid method. This work settles several open questions in security game domain and significantly extends the state of-the-art of both the polynomial solvable and NP-hard class of the security game. ",sinong wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Security Game with Non-additive Utilities and Multiple Attacker Resources",b21fada596bcb1604b8530a1113ba156,http://arxiv.org/abs/1701.08644v1 12036," There has been significant interest in studying security games for modeling the interplay of attacks and defenses on various systems involving critical infrastructure, financial system security, political campaigns, and civil safeguarding. However, existing security game models typically either assume additive utility functions, or that the attacker can attack only one target. Such assumptions lead to tractable analysis, but miss key inherent dependencies that exist among different targets in current complex networks. In this paper, we generalize the classical security game models to allow for non-additive utility functions. We also allow attackers to be able to attack multiple targets. We examine such a general security game from a theoretical perspective and provide a unified view. In particular, we show that each security game is equivalent to a combinatorial optimization problem over a set system $\varepsilon$, which consists of defender's pure strategy space. The key technique we use is based on the transformation, projection of a polytope, and the elipsoid method. This work settles several open questions in security game domain and significantly extends the state of-the-art of both the polynomial solvable and NP-hard class of the security game. ",ness shroff,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Security Game with Non-additive Utilities and Multiple Attacker Resources",b21fada596bcb1604b8530a1113ba156,http://arxiv.org/abs/1701.08644v1 12037," We introduce perfect half space games, in which the goal of Player 2 is to make the sums of encountered multi-dimensional weights diverge in a direction which is consistent with a chosen sequence of perfect half spaces (chosen dynamically by Player 2). We establish that the bounding games of Jurdzi\'nski et al. (ICALP 2015) can be reduced to perfect half space games, which in turn can be translated to the lexicographic energy games of Colcombet and Niwi\'nski, and are positionally determined in a strong sense (Player 2 can play without knowing the current perfect half space). We finally show how perfect half space games and bounding games can be employed to solve multi-dimensional energy parity games in pseudo-polynomial time when both the numbers of energy dimensions and of priorities are fixed, regardless of whether the initial credit is given as part of the input or existentially quantified. This also yields an optimal 2-EXPTIME complexity with given initial credit, where the best known upper bound was non-elementary. ",thomas colcombet,,2017.0,,arXiv,Colcombet2017,True,,arXiv,Not available,Perfect Half Space Games,7f7c8206a49a99a52e85160ceab8317c,http://arxiv.org/abs/1704.05626v2 12038," We introduce perfect half space games, in which the goal of Player 2 is to make the sums of encountered multi-dimensional weights diverge in a direction which is consistent with a chosen sequence of perfect half spaces (chosen dynamically by Player 2). We establish that the bounding games of Jurdzi\'nski et al. (ICALP 2015) can be reduced to perfect half space games, which in turn can be translated to the lexicographic energy games of Colcombet and Niwi\'nski, and are positionally determined in a strong sense (Player 2 can play without knowing the current perfect half space). We finally show how perfect half space games and bounding games can be employed to solve multi-dimensional energy parity games in pseudo-polynomial time when both the numbers of energy dimensions and of priorities are fixed, regardless of whether the initial credit is given as part of the input or existentially quantified. This also yields an optimal 2-EXPTIME complexity with given initial credit, where the best known upper bound was non-elementary. ",marcin jurdzinski,,2017.0,,arXiv,Colcombet2017,True,,arXiv,Not available,Perfect Half Space Games,7f7c8206a49a99a52e85160ceab8317c,http://arxiv.org/abs/1704.05626v2 12039," We introduce perfect half space games, in which the goal of Player 2 is to make the sums of encountered multi-dimensional weights diverge in a direction which is consistent with a chosen sequence of perfect half spaces (chosen dynamically by Player 2). We establish that the bounding games of Jurdzi\'nski et al. (ICALP 2015) can be reduced to perfect half space games, which in turn can be translated to the lexicographic energy games of Colcombet and Niwi\'nski, and are positionally determined in a strong sense (Player 2 can play without knowing the current perfect half space). We finally show how perfect half space games and bounding games can be employed to solve multi-dimensional energy parity games in pseudo-polynomial time when both the numbers of energy dimensions and of priorities are fixed, regardless of whether the initial credit is given as part of the input or existentially quantified. This also yields an optimal 2-EXPTIME complexity with given initial credit, where the best known upper bound was non-elementary. ",ranko lazic,,2017.0,,arXiv,Colcombet2017,True,,arXiv,Not available,Perfect Half Space Games,7f7c8206a49a99a52e85160ceab8317c,http://arxiv.org/abs/1704.05626v2 12040," We introduce perfect half space games, in which the goal of Player 2 is to make the sums of encountered multi-dimensional weights diverge in a direction which is consistent with a chosen sequence of perfect half spaces (chosen dynamically by Player 2). We establish that the bounding games of Jurdzi\'nski et al. (ICALP 2015) can be reduced to perfect half space games, which in turn can be translated to the lexicographic energy games of Colcombet and Niwi\'nski, and are positionally determined in a strong sense (Player 2 can play without knowing the current perfect half space). We finally show how perfect half space games and bounding games can be employed to solve multi-dimensional energy parity games in pseudo-polynomial time when both the numbers of energy dimensions and of priorities are fixed, regardless of whether the initial credit is given as part of the input or existentially quantified. This also yields an optimal 2-EXPTIME complexity with given initial credit, where the best known upper bound was non-elementary. ",sylvain schmitz,,2017.0,,arXiv,Colcombet2017,True,,arXiv,Not available,Perfect Half Space Games,7f7c8206a49a99a52e85160ceab8317c,http://arxiv.org/abs/1704.05626v2 12041," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",yishay mansour,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 12042," We revisit the crucial issue of natural game equivalences, and semantics of game logics based on these. We present reasons for investigating finer concepts of game equivalence than equality of standard powers, though staying short of modal bisimulation. Concretely, we propose a more finegrained notion of equality of ""basic powers"" which record what players can force plus what they leave to others to do, a crucial feature of interaction. This notion is closer to game-theoretic strategic form, as we explain in detail, while remaining amenable to logical analysis. We determine the properties of basic powers via a new representation theorem, find a matching ""instantial neighborhood game logic"", and show how our analysis can be extended to a new game algebra and dynamic game logic. ",johan benthem,,2017.0,10.4204/EPTCS.251.5,"EPTCS 251, 2017, pp. 57-74",Benthem2017,True,,arXiv,Not available,A New Game Equivalence and its Modal Logic,8c8e6a6e43a0faad83cb51052bb4b6be,http://arxiv.org/abs/1707.08737v1 12043," We revisit the crucial issue of natural game equivalences, and semantics of game logics based on these. We present reasons for investigating finer concepts of game equivalence than equality of standard powers, though staying short of modal bisimulation. Concretely, we propose a more finegrained notion of equality of ""basic powers"" which record what players can force plus what they leave to others to do, a crucial feature of interaction. This notion is closer to game-theoretic strategic form, as we explain in detail, while remaining amenable to logical analysis. We determine the properties of basic powers via a new representation theorem, find a matching ""instantial neighborhood game logic"", and show how our analysis can be extended to a new game algebra and dynamic game logic. ",nick bezhanishvili,,2017.0,10.4204/EPTCS.251.5,"EPTCS 251, 2017, pp. 57-74",Benthem2017,True,,arXiv,Not available,A New Game Equivalence and its Modal Logic,8c8e6a6e43a0faad83cb51052bb4b6be,http://arxiv.org/abs/1707.08737v1 12044," We revisit the crucial issue of natural game equivalences, and semantics of game logics based on these. We present reasons for investigating finer concepts of game equivalence than equality of standard powers, though staying short of modal bisimulation. Concretely, we propose a more finegrained notion of equality of ""basic powers"" which record what players can force plus what they leave to others to do, a crucial feature of interaction. This notion is closer to game-theoretic strategic form, as we explain in detail, while remaining amenable to logical analysis. We determine the properties of basic powers via a new representation theorem, find a matching ""instantial neighborhood game logic"", and show how our analysis can be extended to a new game algebra and dynamic game logic. ",sebastian enqvist,,2017.0,10.4204/EPTCS.251.5,"EPTCS 251, 2017, pp. 57-74",Benthem2017,True,,arXiv,Not available,A New Game Equivalence and its Modal Logic,8c8e6a6e43a0faad83cb51052bb4b6be,http://arxiv.org/abs/1707.08737v1 12045," Strategic interactions between competitive entities are generally considered from the perspective of complete revelations of benefits achieved from those interactions, in the form of public payoff functions in the announced games. In this work, we propose a formal framework for a competitive ecosystem where each player is permitted to deviate from publicly optimal strategies under certain private payoffs greater than public payoffs, given that these deviations have certain acceptable bounds as agreed by all players. We call this game theoretic construction an Intention Game. We formally define an Intention Game, and notions of equilibria that exist in such deviant interactions. We give an example of a Cournot competition in a partially honest setting. We compare Intention Games with conventional strategic form games. Finally, we give a cryptographic use of Intention Games and a dual interpretation of this novel framework. ",aditya ahuja,,2017.0,,arXiv,Ahuja2017,True,,arXiv,Not available,Intention Games,80460553aa87de6ac38840a7f3ff4f9b,http://arxiv.org/abs/1712.09259v1 12046," Reinforcement Learning (RL) is a research area that has blossomed tremendously in recent years and has shown remarkable potential in among others successfully playing computer games. However, there only exists a few game platforms that provide diversity in tasks and state-space needed to advance RL algorithms. The existing platforms offer RL access to Atari- and a few web-based games, but no platform fully expose access to Flash games. This is unfortunate because applying RL to Flash games have potential to push the research of RL algorithms. This paper introduces the Flash Reinforcement Learning platform (FlashRL) which attempts to fill this gap by providing an environment for thousands of Flash games on a novel platform for Flash automation. It opens up easy experimentation with RL algorithms for Flash games, which has previously been challenging. The platform shows excellent performance with as little as 5% CPU utilization on consumer hardware. It shows promising results for novel reinforcement learning algorithms. ",per-arne andersen,,2018.0,,arXiv,Andersen2018,True,,arXiv,Not available,FlashRL: A Reinforcement Learning Platform for Flash Games,1125e95578c27d5699f2d772f6676f90,http://arxiv.org/abs/1801.08841v1 12047," Reinforcement Learning (RL) is a research area that has blossomed tremendously in recent years and has shown remarkable potential in among others successfully playing computer games. However, there only exists a few game platforms that provide diversity in tasks and state-space needed to advance RL algorithms. The existing platforms offer RL access to Atari- and a few web-based games, but no platform fully expose access to Flash games. This is unfortunate because applying RL to Flash games have potential to push the research of RL algorithms. This paper introduces the Flash Reinforcement Learning platform (FlashRL) which attempts to fill this gap by providing an environment for thousands of Flash games on a novel platform for Flash automation. It opens up easy experimentation with RL algorithms for Flash games, which has previously been challenging. The platform shows excellent performance with as little as 5% CPU utilization on consumer hardware. It shows promising results for novel reinforcement learning algorithms. ",morten goodwin,,2018.0,,arXiv,Andersen2018,True,,arXiv,Not available,FlashRL: A Reinforcement Learning Platform for Flash Games,1125e95578c27d5699f2d772f6676f90,http://arxiv.org/abs/1801.08841v1 12048," Reinforcement Learning (RL) is a research area that has blossomed tremendously in recent years and has shown remarkable potential in among others successfully playing computer games. However, there only exists a few game platforms that provide diversity in tasks and state-space needed to advance RL algorithms. The existing platforms offer RL access to Atari- and a few web-based games, but no platform fully expose access to Flash games. This is unfortunate because applying RL to Flash games have potential to push the research of RL algorithms. This paper introduces the Flash Reinforcement Learning platform (FlashRL) which attempts to fill this gap by providing an environment for thousands of Flash games on a novel platform for Flash automation. It opens up easy experimentation with RL algorithms for Flash games, which has previously been challenging. The platform shows excellent performance with as little as 5% CPU utilization on consumer hardware. It shows promising results for novel reinforcement learning algorithms. ",ole-christoffer granmo,,2018.0,,arXiv,Andersen2018,True,,arXiv,Not available,FlashRL: A Reinforcement Learning Platform for Flash Games,1125e95578c27d5699f2d772f6676f90,http://arxiv.org/abs/1801.08841v1 12049," We study competition between firms in labor markets, following a combinatorial model suggested by Kelso and Crawford [1982]. In this model, each firm is trying to recruit workers by offering a higher salary than its competitors, and its production function defines the utility generated from any actual set of recruited workers. We define two natural classes of production functions for firms, where the first one is based on additive capacities (weights), and the second on the influence of workers in a social network. We then analyze the existence of pure subgame perfect equilibrium (PSPE) in the labor market and its properties. While neither class holds the gross substitutes condition, we show that in both classes the existence of PSPE is guaranteed under certain restrictions, and in particular when there are only two competing firms. As a corollary, there exists a Walrasian equilibrium in a corresponding combinatorial auction, where bidders' valuation functions belong to these classes. While a PSPE may not exist when there are more than two firms, we perform an empirical study of equilibrium outcomes for the case of weight-based games with three firms, which extend our analytical results. We then show that stability can in some cases be extended to coalitional stability, and study the distribution of profit between firms and their workers in weight-based games. ",reshef meir,,2013.0,,arXiv,Meir2013,True,,arXiv,Not available,Equilibrium in Labor Markets with Few Firms,d6648c3dfd5eb0b3ce46a1c40d7e27af,http://arxiv.org/abs/1306.5855v1 12050," We study competition between firms in labor markets, following a combinatorial model suggested by Kelso and Crawford [1982]. In this model, each firm is trying to recruit workers by offering a higher salary than its competitors, and its production function defines the utility generated from any actual set of recruited workers. We define two natural classes of production functions for firms, where the first one is based on additive capacities (weights), and the second on the influence of workers in a social network. We then analyze the existence of pure subgame perfect equilibrium (PSPE) in the labor market and its properties. While neither class holds the gross substitutes condition, we show that in both classes the existence of PSPE is guaranteed under certain restrictions, and in particular when there are only two competing firms. As a corollary, there exists a Walrasian equilibrium in a corresponding combinatorial auction, where bidders' valuation functions belong to these classes. While a PSPE may not exist when there are more than two firms, we perform an empirical study of equilibrium outcomes for the case of weight-based games with three firms, which extend our analytical results. We then show that stability can in some cases be extended to coalitional stability, and study the distribution of profit between firms and their workers in weight-based games. ",moshe tennenholtz,,2013.0,,arXiv,Meir2013,True,,arXiv,Not available,Equilibrium in Labor Markets with Few Firms,d6648c3dfd5eb0b3ce46a1c40d7e27af,http://arxiv.org/abs/1306.5855v1 12051," For Internet applications like sponsored search, cautions need to be taken when using machine learning to optimize their mechanisms (e.g., auction) since self-interested agents in these applications may change their behaviors (and thus the data distribution) in response to the mechanisms. To tackle this problem, a framework called game-theoretic machine learning (GTML) was recently proposed, which first learns a Markov behavior model to characterize agents' behaviors, and then learns the optimal mechanism by simulating agents' behavior changes in response to the mechanism. While GTML has demonstrated practical success, its generalization analysis is challenging because the behavior data are non-i.i.d. and dependent on the mechanism. To address this challenge, first, we decompose the generalization error for GTML into the behavior learning error and the mechanism learning error; second, for the behavior learning error, we obtain novel non-asymptotic error bounds for both parametric and non-parametric behavior learning methods; third, for the mechanism learning error, we derive a uniform convergence bound based on a new concept called nested covering number of the mechanism space and the generalization analysis techniques developed for mixing sequences. To the best of our knowledge, this is the first work on the generalization analysis of GTML, and we believe it has general implications to the theoretical analysis of other complicated machine learning problems. ",haifang li,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Generalization Analysis for Game-Theoretic Machine Learning,b10f08c55b2ce758685a0a44e09e2b87,http://arxiv.org/abs/1410.3341v1 12052," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",vahab mirrokni,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 12053," For Internet applications like sponsored search, cautions need to be taken when using machine learning to optimize their mechanisms (e.g., auction) since self-interested agents in these applications may change their behaviors (and thus the data distribution) in response to the mechanisms. To tackle this problem, a framework called game-theoretic machine learning (GTML) was recently proposed, which first learns a Markov behavior model to characterize agents' behaviors, and then learns the optimal mechanism by simulating agents' behavior changes in response to the mechanism. While GTML has demonstrated practical success, its generalization analysis is challenging because the behavior data are non-i.i.d. and dependent on the mechanism. To address this challenge, first, we decompose the generalization error for GTML into the behavior learning error and the mechanism learning error; second, for the behavior learning error, we obtain novel non-asymptotic error bounds for both parametric and non-parametric behavior learning methods; third, for the mechanism learning error, we derive a uniform convergence bound based on a new concept called nested covering number of the mechanism space and the generalization analysis techniques developed for mixing sequences. To the best of our knowledge, this is the first work on the generalization analysis of GTML, and we believe it has general implications to the theoretical analysis of other complicated machine learning problems. ",fei tian,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Generalization Analysis for Game-Theoretic Machine Learning,b10f08c55b2ce758685a0a44e09e2b87,http://arxiv.org/abs/1410.3341v1 12054," For Internet applications like sponsored search, cautions need to be taken when using machine learning to optimize their mechanisms (e.g., auction) since self-interested agents in these applications may change their behaviors (and thus the data distribution) in response to the mechanisms. To tackle this problem, a framework called game-theoretic machine learning (GTML) was recently proposed, which first learns a Markov behavior model to characterize agents' behaviors, and then learns the optimal mechanism by simulating agents' behavior changes in response to the mechanism. While GTML has demonstrated practical success, its generalization analysis is challenging because the behavior data are non-i.i.d. and dependent on the mechanism. To address this challenge, first, we decompose the generalization error for GTML into the behavior learning error and the mechanism learning error; second, for the behavior learning error, we obtain novel non-asymptotic error bounds for both parametric and non-parametric behavior learning methods; third, for the mechanism learning error, we derive a uniform convergence bound based on a new concept called nested covering number of the mechanism space and the generalization analysis techniques developed for mixing sequences. To the best of our knowledge, this is the first work on the generalization analysis of GTML, and we believe it has general implications to the theoretical analysis of other complicated machine learning problems. ",wei chen,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Generalization Analysis for Game-Theoretic Machine Learning,b10f08c55b2ce758685a0a44e09e2b87,http://arxiv.org/abs/1410.3341v1 12055," For Internet applications like sponsored search, cautions need to be taken when using machine learning to optimize their mechanisms (e.g., auction) since self-interested agents in these applications may change their behaviors (and thus the data distribution) in response to the mechanisms. To tackle this problem, a framework called game-theoretic machine learning (GTML) was recently proposed, which first learns a Markov behavior model to characterize agents' behaviors, and then learns the optimal mechanism by simulating agents' behavior changes in response to the mechanism. While GTML has demonstrated practical success, its generalization analysis is challenging because the behavior data are non-i.i.d. and dependent on the mechanism. To address this challenge, first, we decompose the generalization error for GTML into the behavior learning error and the mechanism learning error; second, for the behavior learning error, we obtain novel non-asymptotic error bounds for both parametric and non-parametric behavior learning methods; third, for the mechanism learning error, we derive a uniform convergence bound based on a new concept called nested covering number of the mechanism space and the generalization analysis techniques developed for mixing sequences. To the best of our knowledge, this is the first work on the generalization analysis of GTML, and we believe it has general implications to the theoretical analysis of other complicated machine learning problems. ",tao qin,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Generalization Analysis for Game-Theoretic Machine Learning,b10f08c55b2ce758685a0a44e09e2b87,http://arxiv.org/abs/1410.3341v1 12056," For Internet applications like sponsored search, cautions need to be taken when using machine learning to optimize their mechanisms (e.g., auction) since self-interested agents in these applications may change their behaviors (and thus the data distribution) in response to the mechanisms. To tackle this problem, a framework called game-theoretic machine learning (GTML) was recently proposed, which first learns a Markov behavior model to characterize agents' behaviors, and then learns the optimal mechanism by simulating agents' behavior changes in response to the mechanism. While GTML has demonstrated practical success, its generalization analysis is challenging because the behavior data are non-i.i.d. and dependent on the mechanism. To address this challenge, first, we decompose the generalization error for GTML into the behavior learning error and the mechanism learning error; second, for the behavior learning error, we obtain novel non-asymptotic error bounds for both parametric and non-parametric behavior learning methods; third, for the mechanism learning error, we derive a uniform convergence bound based on a new concept called nested covering number of the mechanism space and the generalization analysis techniques developed for mixing sequences. To the best of our knowledge, this is the first work on the generalization analysis of GTML, and we believe it has general implications to the theoretical analysis of other complicated machine learning problems. ",tie-yan liu,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Generalization Analysis for Game-Theoretic Machine Learning,b10f08c55b2ce758685a0a44e09e2b87,http://arxiv.org/abs/1410.3341v1 12057," We consider the problem of streaming live content to a cluster of co-located wireless devices that have both an expensive unicast base-station-to-device (B2D) interface, as well as an inexpensive broadcast device-to-device (D2D) interface, which can be used simultaneously. Our setting is a streaming system that uses a block-by-block random linear coding approach to achieve a target percentage of on-time deliveries with minimal B2D usage. Our goal is to design an incentive framework that would promote such cooperation across devices, while ensuring good quality of service. Based on ideas drawn from truth-telling auctions, we design a mechanism that achieves this goal via appropriate transfers (monetary payments or rebates) in a setting with a large number of devices, and with peer arrivals and departures. Here, we show that a Mean Field Game can be used to accurately approximate our system. Furthermore, the complexity of calculating the best responses under this regime is low. We implement the proposed system on an Android testbed, and illustrate its efficient performance using real world experiments. ",jian li,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,"Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective",fe28edfa2680b19e665d5c31e97966dd,http://arxiv.org/abs/1604.02435v2 12058," We consider the problem of streaming live content to a cluster of co-located wireless devices that have both an expensive unicast base-station-to-device (B2D) interface, as well as an inexpensive broadcast device-to-device (D2D) interface, which can be used simultaneously. Our setting is a streaming system that uses a block-by-block random linear coding approach to achieve a target percentage of on-time deliveries with minimal B2D usage. Our goal is to design an incentive framework that would promote such cooperation across devices, while ensuring good quality of service. Based on ideas drawn from truth-telling auctions, we design a mechanism that achieves this goal via appropriate transfers (monetary payments or rebates) in a setting with a large number of devices, and with peer arrivals and departures. Here, we show that a Mean Field Game can be used to accurately approximate our system. Furthermore, the complexity of calculating the best responses under this regime is low. We implement the proposed system on an Android testbed, and illustrate its efficient performance using real world experiments. ",rajarshi bhattacharyya,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,"Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective",fe28edfa2680b19e665d5c31e97966dd,http://arxiv.org/abs/1604.02435v2 12059," We consider the problem of streaming live content to a cluster of co-located wireless devices that have both an expensive unicast base-station-to-device (B2D) interface, as well as an inexpensive broadcast device-to-device (D2D) interface, which can be used simultaneously. Our setting is a streaming system that uses a block-by-block random linear coding approach to achieve a target percentage of on-time deliveries with minimal B2D usage. Our goal is to design an incentive framework that would promote such cooperation across devices, while ensuring good quality of service. Based on ideas drawn from truth-telling auctions, we design a mechanism that achieves this goal via appropriate transfers (monetary payments or rebates) in a setting with a large number of devices, and with peer arrivals and departures. Here, we show that a Mean Field Game can be used to accurately approximate our system. Furthermore, the complexity of calculating the best responses under this regime is low. We implement the proposed system on an Android testbed, and illustrate its efficient performance using real world experiments. ",suman paul,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,"Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective",fe28edfa2680b19e665d5c31e97966dd,http://arxiv.org/abs/1604.02435v2 12060," We consider the problem of streaming live content to a cluster of co-located wireless devices that have both an expensive unicast base-station-to-device (B2D) interface, as well as an inexpensive broadcast device-to-device (D2D) interface, which can be used simultaneously. Our setting is a streaming system that uses a block-by-block random linear coding approach to achieve a target percentage of on-time deliveries with minimal B2D usage. Our goal is to design an incentive framework that would promote such cooperation across devices, while ensuring good quality of service. Based on ideas drawn from truth-telling auctions, we design a mechanism that achieves this goal via appropriate transfers (monetary payments or rebates) in a setting with a large number of devices, and with peer arrivals and departures. Here, we show that a Mean Field Game can be used to accurately approximate our system. Furthermore, the complexity of calculating the best responses under this regime is low. We implement the proposed system on an Android testbed, and illustrate its efficient performance using real world experiments. ",srinivas shakkottai,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,"Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective",fe28edfa2680b19e665d5c31e97966dd,http://arxiv.org/abs/1604.02435v2 12061," We consider the problem of streaming live content to a cluster of co-located wireless devices that have both an expensive unicast base-station-to-device (B2D) interface, as well as an inexpensive broadcast device-to-device (D2D) interface, which can be used simultaneously. Our setting is a streaming system that uses a block-by-block random linear coding approach to achieve a target percentage of on-time deliveries with minimal B2D usage. Our goal is to design an incentive framework that would promote such cooperation across devices, while ensuring good quality of service. Based on ideas drawn from truth-telling auctions, we design a mechanism that achieves this goal via appropriate transfers (monetary payments or rebates) in a setting with a large number of devices, and with peer arrivals and departures. Here, we show that a Mean Field Game can be used to accurately approximate our system. Furthermore, the complexity of calculating the best responses under this regime is low. We implement the proposed system on an Android testbed, and illustrate its efficient performance using real world experiments. ",vijay subramanian,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,"Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective",fe28edfa2680b19e665d5c31e97966dd,http://arxiv.org/abs/1604.02435v2 12062," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",anders drachen,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 12063," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",s. muthukrishnan,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 12064," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",joseph riley,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 12065," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",shawna baskin,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 12066," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",diego klabjan,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 12067," As is well known, many classes of markets have efficient equilibria, but this depends on agents being non-strategic, i.e. that they declare their true demands when offered goods at particular prices, or in other words, that they are price-takers. An important question is how much the equilibria degrade in the face of strategic behavior, i.e. what is the Price of Anarchy (PoA) of the market viewed as a mechanism? Often, PoA bounds are modest constants such as 4/3 or 2. Nonetheless, in practice a guarantee that no more than 25% or 50% of the economic value is lost may be unappealing. This paper asks whether significantly better bounds are possible under plausible assumptions. In particular, we look at how these worst case guarantees improve in the following large settings. Large Walrasian auctions: These are auctions with many copies of each item and many agents. We show that the PoA tends to 1 as the market size increases, under suitable conditions, mainly that there is some uncertainty about the numbers of copies of each good and demands obey the gross substitutes condition. We also note that some such assumption is unavoidable. Large Fisher markets: Fisher markets are a class of economies that has received considerable attention in the computer science literature. A large market is one in which at equilibrium, each buyer makes only a small fraction of the total purchases; the smaller the fraction, the larger the market. Here the main condition is that demands are based on homogeneous monotone utility functions that satisfy the gross substitutes condition. Again, the PoA tends to 1 as the market size increases. Furthermore, in each setting, we quantify the tradeoff between market size and the PoA. ",richard cole,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,Large Market Games with Near Optimal Efficiency,d8155497c7994fc04ed19891fc5578fb,http://arxiv.org/abs/1508.07370v5 12068," As is well known, many classes of markets have efficient equilibria, but this depends on agents being non-strategic, i.e. that they declare their true demands when offered goods at particular prices, or in other words, that they are price-takers. An important question is how much the equilibria degrade in the face of strategic behavior, i.e. what is the Price of Anarchy (PoA) of the market viewed as a mechanism? Often, PoA bounds are modest constants such as 4/3 or 2. Nonetheless, in practice a guarantee that no more than 25% or 50% of the economic value is lost may be unappealing. This paper asks whether significantly better bounds are possible under plausible assumptions. In particular, we look at how these worst case guarantees improve in the following large settings. Large Walrasian auctions: These are auctions with many copies of each item and many agents. We show that the PoA tends to 1 as the market size increases, under suitable conditions, mainly that there is some uncertainty about the numbers of copies of each good and demands obey the gross substitutes condition. We also note that some such assumption is unavoidable. Large Fisher markets: Fisher markets are a class of economies that has received considerable attention in the computer science literature. A large market is one in which at equilibrium, each buyer makes only a small fraction of the total purchases; the smaller the fraction, the larger the market. Here the main condition is that demands are based on homogeneous monotone utility functions that satisfy the gross substitutes condition. Again, the PoA tends to 1 as the market size increases. Furthermore, in each setting, we quantify the tradeoff between market size and the PoA. ",yixin tao,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,Large Market Games with Near Optimal Efficiency,d8155497c7994fc04ed19891fc5578fb,http://arxiv.org/abs/1508.07370v5 12069," We study a model of congestible resources, where pricing and scheduling are intertwined. Motivated by the problem of pricing cloud instances, we model a cloud computing service as linked $GI/GI/\cdot$ queuing systems where the provider chooses to offer a fixed pricing service, a dynamic market based service, or a hybrid of both, where jobs can be preempted in the market-based service. Users (jobs), who are heterogeneous in both the value they place on service and their cost for waiting, then choose between the services offered. Combining insights from auction theory with queuing theory we are able to characterize user equilibrium behavior, and show its insensitivity to the precise market design mechanism used. We then provide theoretical and simulation based evidence suggesting that a fixed price typically, though not always, generates a higher expected revenue than the hybrid system for the provider. ",vineet abhishek,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,Fixed and Market Pricing for Cloud Services,c7538dd882237fde86c8b4052aa403c7,http://arxiv.org/abs/1201.5621v2 12070," We study a model of congestible resources, where pricing and scheduling are intertwined. Motivated by the problem of pricing cloud instances, we model a cloud computing service as linked $GI/GI/\cdot$ queuing systems where the provider chooses to offer a fixed pricing service, a dynamic market based service, or a hybrid of both, where jobs can be preempted in the market-based service. Users (jobs), who are heterogeneous in both the value they place on service and their cost for waiting, then choose between the services offered. Combining insights from auction theory with queuing theory we are able to characterize user equilibrium behavior, and show its insensitivity to the precise market design mechanism used. We then provide theoretical and simulation based evidence suggesting that a fixed price typically, though not always, generates a higher expected revenue than the hybrid system for the provider. ",ian kash,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,Fixed and Market Pricing for Cloud Services,c7538dd882237fde86c8b4052aa403c7,http://arxiv.org/abs/1201.5621v2 12071," We study a model of congestible resources, where pricing and scheduling are intertwined. Motivated by the problem of pricing cloud instances, we model a cloud computing service as linked $GI/GI/\cdot$ queuing systems where the provider chooses to offer a fixed pricing service, a dynamic market based service, or a hybrid of both, where jobs can be preempted in the market-based service. Users (jobs), who are heterogeneous in both the value they place on service and their cost for waiting, then choose between the services offered. Combining insights from auction theory with queuing theory we are able to characterize user equilibrium behavior, and show its insensitivity to the precise market design mechanism used. We then provide theoretical and simulation based evidence suggesting that a fixed price typically, though not always, generates a higher expected revenue than the hybrid system for the provider. ",peter key,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,Fixed and Market Pricing for Cloud Services,c7538dd882237fde86c8b4052aa403c7,http://arxiv.org/abs/1201.5621v2 12072," We study new classes of games, called zero-sum equivalent games and zero-sum equivalent potential games, and prove decomposition theorems involving these classes of games. We say that two games are ""strategically equivalent"" if, for every player, the payoff differences between two strategies (holding other players' strategies fixed) are identical. A zero-sum equivalent game is a game that is strategically equivalent to a zero-sum game; a zero-sum equivalent potential game is a zero-sum equivalent game that is strategically equivalent to a common interest game. We also call a game ""normalized"" if the sum of one player's payoffs, given the other players' strategies, is always zero. We show that any normal form game can be uniquely decomposed into either (i) a zero-sum equivalent game and a normalized common interest game, or (ii) a zero-sum equivalent potential game, a normalized zero-sum game, and a normalized common interest game, each with distinctive equilibrium properties. For example, we show that two-player zero-sum equivalent games with finite strategy sets generically have a unique Nash equilibrium and that two-player zero-sum equivalent potential games with finite strategy sets generically have a strictly dominant Nash equilibrium. ",sung-ha hwang,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,"Strategic Decompositions of Normal Form Games: Zero-sum Games and Potential Games",346880354949f351b0cb54b7322a55dc,http://arxiv.org/abs/1602.06648v2 12073," We study new classes of games, called zero-sum equivalent games and zero-sum equivalent potential games, and prove decomposition theorems involving these classes of games. We say that two games are ""strategically equivalent"" if, for every player, the payoff differences between two strategies (holding other players' strategies fixed) are identical. A zero-sum equivalent game is a game that is strategically equivalent to a zero-sum game; a zero-sum equivalent potential game is a zero-sum equivalent game that is strategically equivalent to a common interest game. We also call a game ""normalized"" if the sum of one player's payoffs, given the other players' strategies, is always zero. We show that any normal form game can be uniquely decomposed into either (i) a zero-sum equivalent game and a normalized common interest game, or (ii) a zero-sum equivalent potential game, a normalized zero-sum game, and a normalized common interest game, each with distinctive equilibrium properties. For example, we show that two-player zero-sum equivalent games with finite strategy sets generically have a unique Nash equilibrium and that two-player zero-sum equivalent potential games with finite strategy sets generically have a strictly dominant Nash equilibrium. ",luc rey-bellet,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,"Strategic Decompositions of Normal Form Games: Zero-sum Games and Potential Games",346880354949f351b0cb54b7322a55dc,http://arxiv.org/abs/1602.06648v2 12074," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",uri nadav,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 12075," This problem is a series of biddings and auctions. Each round of bidding and auction are different from previous ones because of the change of network topology, variance of budget set by the sender, and possible evolution of strategies of other nodes. The huge strategy space of relay nodes makes the formulation to a game very difficult. We present a brief qualitative analysis in this paper, and propose a bidding strategy based on learning algorithms. ",di li,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Mobile Adhoc Offloading,e4f0cf1e437b9e855c989ea3fc838500,http://arxiv.org/abs/1401.4528v1 12076," This problem is a series of biddings and auctions. Each round of bidding and auction are different from previous ones because of the change of network topology, variance of budget set by the sender, and possible evolution of strategies of other nodes. The huge strategy space of relay nodes makes the formulation to a game very difficult. We present a brief qualitative analysis in this paper, and propose a bidding strategy based on learning algorithms. ",asya mitseva,,2014.0,,arXiv,Li2014,True,,arXiv,Not available,Mobile Adhoc Offloading,e4f0cf1e437b9e855c989ea3fc838500,http://arxiv.org/abs/1401.4528v1 12077," Substitute valuations (in some contexts called gross substitute valuations) are prominent in combinatorial auction theory. An algorithm is given in this paper for generating a substitute valuation through Monte Carlo simulation. In addition, the geometry of the set of all substitute valuations for a fixed number of goods K is investigated. The set consists of a union of polyhedrons, and the maximal polyhedrons are identified for K=4. It is shown that the maximum dimension of the maximal polyhedrons increases with K nearly as fast as two to the power K. Consequently, under broad conditions, if a combinatorial algorithm can present an arbitrary substitute valuation given a list of input numbers, the list must grow nearly as fast as two to the power K. ",bruce hajek,,2007.0,10.1016/j.peva.2008.07.001,arXiv,Hajek2007,True,,arXiv,Not available,Substitute Valuations: Generation and Structure,1db61a2821a480c8a9644cd604951c74,http://arxiv.org/abs/0712.3870v3 12078," We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement, (ii) the capacity of the access network is limited, and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness, we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have. ",xiaohan kang,,2010.0,,arXiv,Kang2010,True,,arXiv,Not available,"A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks",690d6eedd69c19fe9de99c87fbfbabf9,http://arxiv.org/abs/1010.2713v3 12079," We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement, (ii) the capacity of the access network is limited, and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness, we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have. ",juan jaramillo,,2010.0,,arXiv,Kang2010,True,,arXiv,Not available,"A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks",690d6eedd69c19fe9de99c87fbfbabf9,http://arxiv.org/abs/1010.2713v3 12080," We study admission control mechanisms for wireless access networks where (i) each user has a minimum service requirement, (ii) the capacity of the access network is limited, and (iii) the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements. To guarantee truthfulness, we use auction theory to design a mechanism where users compete to be admitted into the network. We propose admission control mechanisms under which the access point intelligently allocates resources based on the announced minimum service requirements to ensure that users have no incentive to lie and the capacity constraint is fulfilled. We also prove the properties that any feasible mechanism should have. ",lei ying,,2010.0,,arXiv,Kang2010,True,,arXiv,Not available,"A Strategy-Proof and Non-monetary Admission Control Mechanism for Wireless Access Networks",690d6eedd69c19fe9de99c87fbfbabf9,http://arxiv.org/abs/1010.2713v3 12081," In this paper, we introduce the concept of infinitely split Nash equilibrium in repeated games in which the profile sets are chain-complete posets. Then by using a fixed point theorem on posets in [8], we prove an existence theorem. As an application, we study the repeated extended Bertrant duopoly model of price competition. ",jinlu li,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Infinitely Split Nash Equilibrium Problems in Repeated Games,fd7779ab8d063ef0718b4276939bf926,http://arxiv.org/abs/1712.08509v1 12082," We provide an efficient algorithm for computing the nucleolus for an instance of a weighted cooperative matching game. This resolves a long-standing open question of [Kern and Paulusma, Mathematics of Operations Research, 2003]. ",jochen koenemann,,2018.0,,arXiv,Koenemann2018,True,,arXiv,Not available,"Computing the Nucleolus of Weighted Cooperative Matching Games in Polynomial Time",d7271edc8933ef45113be4469ff7c9b7,http://arxiv.org/abs/1803.03249v2 12083," We provide an efficient algorithm for computing the nucleolus for an instance of a weighted cooperative matching game. This resolves a long-standing open question of [Kern and Paulusma, Mathematics of Operations Research, 2003]. ",kanstantsin pashkovich,,2018.0,,arXiv,Koenemann2018,True,,arXiv,Not available,"Computing the Nucleolus of Weighted Cooperative Matching Games in Polynomial Time",d7271edc8933ef45113be4469ff7c9b7,http://arxiv.org/abs/1803.03249v2 12084," We provide an efficient algorithm for computing the nucleolus for an instance of a weighted cooperative matching game. This resolves a long-standing open question of [Kern and Paulusma, Mathematics of Operations Research, 2003]. ",justin toth,,2018.0,,arXiv,Koenemann2018,True,,arXiv,Not available,"Computing the Nucleolus of Weighted Cooperative Matching Games in Polynomial Time",d7271edc8933ef45113be4469ff7c9b7,http://arxiv.org/abs/1803.03249v2 12085," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",moshe babaioff,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 12086," We consider continuous-time equilibrium seeking in monotone aggregative games with coupling constraints. We propose semi-decentralized integral dynamics and prove their global convergence to a variational generalized aggregative or Nash equilibrium. The proof is based on Lyapunov arguments and invariance techniques for differential inclusions. ",claudio persis,,2018.0,,arXiv,Persis2018,True,,arXiv,Not available,"Continuous-time integral dynamics for monotone aggregative games with coupling constraints",5f2142b77007470073a94942cebb64f4,http://arxiv.org/abs/1805.03270v1 12087," We consider continuous-time equilibrium seeking in monotone aggregative games with coupling constraints. We propose semi-decentralized integral dynamics and prove their global convergence to a variational generalized aggregative or Nash equilibrium. The proof is based on Lyapunov arguments and invariance techniques for differential inclusions. ",sergio grammatico,,2018.0,,arXiv,Persis2018,True,,arXiv,Not available,"Continuous-time integral dynamics for monotone aggregative games with coupling constraints",5f2142b77007470073a94942cebb64f4,http://arxiv.org/abs/1805.03270v1 12088," In this paper we study continuous-time two-player zero-sum optimal switching games on a finite horizon. Using the theory of doubly reflected BSDEs with interconnected barriers, we show that this game has a value and an equilibrium in the players' switching controls. ",said hamadene,,2018.0,,arXiv,Hamadène2018,True,,arXiv,Not available,"A probabilistic verification theorem for the finite horizon two-player zero-sum optimal switching game in continuous time",6aea7be80f3045cc0cbf11c04eb24ac1,http://arxiv.org/abs/1806.00345v1 12089," In this paper we study continuous-time two-player zero-sum optimal switching games on a finite horizon. Using the theory of doubly reflected BSDEs with interconnected barriers, we show that this game has a value and an equilibrium in the players' switching controls. ",randall martyr,,2018.0,,arXiv,Hamadène2018,True,,arXiv,Not available,"A probabilistic verification theorem for the finite horizon two-player zero-sum optimal switching game in continuous time",6aea7be80f3045cc0cbf11c04eb24ac1,http://arxiv.org/abs/1806.00345v1 12090," In this paper we study continuous-time two-player zero-sum optimal switching games on a finite horizon. Using the theory of doubly reflected BSDEs with interconnected barriers, we show that this game has a value and an equilibrium in the players' switching controls. ",john moriarty,,2018.0,,arXiv,Hamadène2018,True,,arXiv,Not available,"A probabilistic verification theorem for the finite horizon two-player zero-sum optimal switching game in continuous time",6aea7be80f3045cc0cbf11c04eb24ac1,http://arxiv.org/abs/1806.00345v1 12091," We prove that a player $\alpha$ has a winning strategy in the Banach--Mazur game on a space $X$ if and only if $X$ is F-Y countably $\pi$-domain representable. We show that Choquet complete spaces are F-Y countably domain representable. We give an example of a space, which is F-Y countably domain representable, but it is not F-Y $\pi$-domain representable. ",judyta bak,,2018.0,,arXiv,Bąk2018,True,,arXiv,Not available,The Banach--Mazur game and the strong Choquet game in domain theory,422151de4bc8b1f195968b0c99689f95,http://arxiv.org/abs/1806.00785v1 12092," We prove that a player $\alpha$ has a winning strategy in the Banach--Mazur game on a space $X$ if and only if $X$ is F-Y countably $\pi$-domain representable. We show that Choquet complete spaces are F-Y countably domain representable. We give an example of a space, which is F-Y countably domain representable, but it is not F-Y $\pi$-domain representable. ",andrzej kucharski,,2018.0,,arXiv,Bąk2018,True,,arXiv,Not available,The Banach--Mazur game and the strong Choquet game in domain theory,422151de4bc8b1f195968b0c99689f95,http://arxiv.org/abs/1806.00785v1 12093," We investigate the effect of information asymmetry on a dynamic Cournot duopoly game with bounded rationality. Concretely, we study how one player's possession of information about the other player's behavior in a duopoly affects the stability of the Cournot-Nash equilibrium. We theoretically and numerically show that the information stabilizes the Cournot-Nash equilibrium and suppresses chaotic behavior in the duopoly. ",masahiko ueda,,2018.0,,arXiv,Ueda2018,True,,arXiv,Not available,"Effect of information asymmetry in Cournot duopoly game with bounded rationality",6081d6028938103df68443a4050703cf,http://arxiv.org/abs/1809.10865v1 12094," The future smart grid is envisioned as a large-scale cyber-physical system encompassing advanced power, communications, control, and computing technologies. In order to accommodate these technologies, it will have to build on solid mathematical tools that can ensure an efficient and robust operation of such heterogeneous and large-scale cyber-physical systems. In this context, this paper is an overview on the potential of applying game theory for addressing relevant and timely open problems in three emerging areas that pertain to the smart grid: micro-grid systems, demand-side management, and communications. In each area, the state-of-the-art contributions are gathered and a systematic treatment, using game theory, of some of the most relevant problems for future power systems is provided. Future opportunities for adopting game theoretic methodologies in the transition from legacy systems toward smart and intelligent grids are also discussed. In a nutshell, this article provides a comprehensive account of the application of game theory in smart grid systems tailored to the interdisciplinary characteristics of these systems that integrate components from power systems, networking, communications, and control. ",walid saad,,2012.0,,arXiv,Saad2012,True,,arXiv,Not available,Game Theoretic Methods for the Smart Grid,7ead6c8982c1fbdb05617f316a712a11,http://arxiv.org/abs/1202.0452v1 12095," The future smart grid is envisioned as a large-scale cyber-physical system encompassing advanced power, communications, control, and computing technologies. In order to accommodate these technologies, it will have to build on solid mathematical tools that can ensure an efficient and robust operation of such heterogeneous and large-scale cyber-physical systems. In this context, this paper is an overview on the potential of applying game theory for addressing relevant and timely open problems in three emerging areas that pertain to the smart grid: micro-grid systems, demand-side management, and communications. In each area, the state-of-the-art contributions are gathered and a systematic treatment, using game theory, of some of the most relevant problems for future power systems is provided. Future opportunities for adopting game theoretic methodologies in the transition from legacy systems toward smart and intelligent grids are also discussed. In a nutshell, this article provides a comprehensive account of the application of game theory in smart grid systems tailored to the interdisciplinary characteristics of these systems that integrate components from power systems, networking, communications, and control. ",zhu han,,2012.0,,arXiv,Saad2012,True,,arXiv,Not available,Game Theoretic Methods for the Smart Grid,7ead6c8982c1fbdb05617f316a712a11,http://arxiv.org/abs/1202.0452v1 12096," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",liad blumrosen,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 12097," The future smart grid is envisioned as a large-scale cyber-physical system encompassing advanced power, communications, control, and computing technologies. In order to accommodate these technologies, it will have to build on solid mathematical tools that can ensure an efficient and robust operation of such heterogeneous and large-scale cyber-physical systems. In this context, this paper is an overview on the potential of applying game theory for addressing relevant and timely open problems in three emerging areas that pertain to the smart grid: micro-grid systems, demand-side management, and communications. In each area, the state-of-the-art contributions are gathered and a systematic treatment, using game theory, of some of the most relevant problems for future power systems is provided. Future opportunities for adopting game theoretic methodologies in the transition from legacy systems toward smart and intelligent grids are also discussed. In a nutshell, this article provides a comprehensive account of the application of game theory in smart grid systems tailored to the interdisciplinary characteristics of these systems that integrate components from power systems, networking, communications, and control. ",h. poor,,2012.0,,arXiv,Saad2012,True,,arXiv,Not available,Game Theoretic Methods for the Smart Grid,7ead6c8982c1fbdb05617f316a712a11,http://arxiv.org/abs/1202.0452v1 12098," The future smart grid is envisioned as a large-scale cyber-physical system encompassing advanced power, communications, control, and computing technologies. In order to accommodate these technologies, it will have to build on solid mathematical tools that can ensure an efficient and robust operation of such heterogeneous and large-scale cyber-physical systems. In this context, this paper is an overview on the potential of applying game theory for addressing relevant and timely open problems in three emerging areas that pertain to the smart grid: micro-grid systems, demand-side management, and communications. In each area, the state-of-the-art contributions are gathered and a systematic treatment, using game theory, of some of the most relevant problems for future power systems is provided. Future opportunities for adopting game theoretic methodologies in the transition from legacy systems toward smart and intelligent grids are also discussed. In a nutshell, this article provides a comprehensive account of the application of game theory in smart grid systems tailored to the interdisciplinary characteristics of these systems that integrate components from power systems, networking, communications, and control. ",tamer basar,,2012.0,,arXiv,Saad2012,True,,arXiv,Not available,Game Theoretic Methods for the Smart Grid,7ead6c8982c1fbdb05617f316a712a11,http://arxiv.org/abs/1202.0452v1 12099," This paper establishes a connection between the notion of observation (or monitoring) structure in game theory and the one of communication channels in Shannon theory. One of the objectives is to know under which conditions an arbitrary monitoring structure can be transformed into a more pertinent monitoring structure. To this end, a mediator is added to the game. The objective of the mediator is to choose a signalling scheme that allows the players to have perfect, almost perfect or public monitoring and all of this, at a minimum cost in terms of signalling. Graph coloring, source coding, and channel coding are exploited to deal with these issues. A wireless power control game is used to illustrate these notions but the applicability of the provided results and, more importantly, the framework of transforming monitoring structures go much beyond this example. ",mael treust,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"The price of re-establishing perfect, almost perfect or public monitoring in games with arbitrary monitoring",badbf25dd359559162bc96422418a001,http://arxiv.org/abs/1210.6365v1 12100," This paper establishes a connection between the notion of observation (or monitoring) structure in game theory and the one of communication channels in Shannon theory. One of the objectives is to know under which conditions an arbitrary monitoring structure can be transformed into a more pertinent monitoring structure. To this end, a mediator is added to the game. The objective of the mediator is to choose a signalling scheme that allows the players to have perfect, almost perfect or public monitoring and all of this, at a minimum cost in terms of signalling. Graph coloring, source coding, and channel coding are exploited to deal with these issues. A wireless power control game is used to illustrate these notions but the applicability of the provided results and, more importantly, the framework of transforming monitoring structures go much beyond this example. ",samson lasaulce,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"The price of re-establishing perfect, almost perfect or public monitoring in games with arbitrary monitoring",badbf25dd359559162bc96422418a001,http://arxiv.org/abs/1210.6365v1 12101," We address the problem of solving parity games with imperfect information on finite graphs of bounded structural complexity. It is a major open problem whether parity games with perfect information can be solved in PTIME. Restricting the structural complexity of the game arenas, however, often leads to efficient algorithms for parity games. Such results are known for graph classes of bounded tree-width, DAG-width, directed path-width, and entanglement, which we describe in terms of cops and robber games. Conversely, the introduction of imperfect information makes the problem more difficult, it becomes EXPTIME-hard. We analyse the interaction of both approaches. We use a simple method to measure the amount of ""unawareness""' of a player, the amount of imperfect information. It turns out that if it is unbounded, low structural complexity does not make the problem simpler. It remains EXPTIME-hard or PSPACE-hard even on very simple graphs. For games with bounded imperfect information we analyse the powerset construction, which is commonly used to convert a game of imperfect information into an equivalent game with perfect information. This construction preserves boundedness of directed path-width and DAG-width, but not of entanglement or of tree-width. Hence, if directed path-width or DAG-width are bounded, parity games with bounded imperfect information can be solved in PTIME. For DAG-width we follow two approaches. One leads to a generalization of the known fact that perfect information parity games are in PTIME if DAG-width is bounded. We prove this theorem for non-monotone DAG-width. The other approach introduces a cops and robbers game (with multiple robbers) on directed graphs, considered Richerby and Thilikos forundirected graphs. We show a tight linear bound for the number of additional cops needed to capture an additional robber. ",bernd puchala,,2017.0,,arXiv,Puchala2017,True,,arXiv,Not available,"Parity Games, Imperfect Information and Structural Complexity",957cc6a1233d928638bc150fca3cbf3f,http://arxiv.org/abs/1703.00683v1 12102," We address the problem of solving parity games with imperfect information on finite graphs of bounded structural complexity. It is a major open problem whether parity games with perfect information can be solved in PTIME. Restricting the structural complexity of the game arenas, however, often leads to efficient algorithms for parity games. Such results are known for graph classes of bounded tree-width, DAG-width, directed path-width, and entanglement, which we describe in terms of cops and robber games. Conversely, the introduction of imperfect information makes the problem more difficult, it becomes EXPTIME-hard. We analyse the interaction of both approaches. We use a simple method to measure the amount of ""unawareness""' of a player, the amount of imperfect information. It turns out that if it is unbounded, low structural complexity does not make the problem simpler. It remains EXPTIME-hard or PSPACE-hard even on very simple graphs. For games with bounded imperfect information we analyse the powerset construction, which is commonly used to convert a game of imperfect information into an equivalent game with perfect information. This construction preserves boundedness of directed path-width and DAG-width, but not of entanglement or of tree-width. Hence, if directed path-width or DAG-width are bounded, parity games with bounded imperfect information can be solved in PTIME. For DAG-width we follow two approaches. One leads to a generalization of the known fact that perfect information parity games are in PTIME if DAG-width is bounded. We prove this theorem for non-monotone DAG-width. The other approach introduces a cops and robbers game (with multiple robbers) on directed graphs, considered Richerby and Thilikos forundirected graphs. We show a tight linear bound for the number of additional cops needed to capture an additional robber. ",roman rabinovich,,2017.0,,arXiv,Puchala2017,True,,arXiv,Not available,"Parity Games, Imperfect Information and Structural Complexity",957cc6a1233d928638bc150fca3cbf3f,http://arxiv.org/abs/1703.00683v1 12103," In two-player games on graphs, the players move a token through a graph to produce an infinite path, which determines the winner or payoff of the game. Such games are central in formal verification since they model the interaction between a non-terminating system and its environment. We study {\em bidding games} in which the players bid for the right to move the token. Two bidding rules have been defined. In {\em Richman} bidding, in each round, the players simultaneously submit bids, and the higher bidder moves the token and pays the other player. {\em Poorman} bidding is similar except that the winner of the bidding pays the ""bank"" rather than the other player. While poorman reachability games have been studied before, we present, for the first time, results on {\em infinite-duration} poorman games. A central quantity in these games is the {\em ratio} between the two players' initial budgets. The questions we study concern a necessary and sufficient ratio with which a player can achieve a goal. For reachability objectives, such {\em threshold ratios} are known to exist for both bidding rules. We show that the properties of poorman reachability games extend to complex qualitative objectives such as parity, similarly to the Richman case. Our most interesting results concern quantitative poorman games, namely poorman mean-payoff games, where we construct optimal strategies depending on the initial ratio, by showing a connection with {\em random-turn based games}. The connection in itself is interesting, because it does not hold for reachability poorman games. We also solve the complexity problems that arise in poorman bidding games. ",guy avni,,2018.0,,arXiv,Avni2018,True,,arXiv,Not available,Infinite-Duration Poorman-Bidding Games,65a6e00011e852026fbd4530dd5323bf,http://arxiv.org/abs/1804.04372v3 12104," In two-player games on graphs, the players move a token through a graph to produce an infinite path, which determines the winner or payoff of the game. Such games are central in formal verification since they model the interaction between a non-terminating system and its environment. We study {\em bidding games} in which the players bid for the right to move the token. Two bidding rules have been defined. In {\em Richman} bidding, in each round, the players simultaneously submit bids, and the higher bidder moves the token and pays the other player. {\em Poorman} bidding is similar except that the winner of the bidding pays the ""bank"" rather than the other player. While poorman reachability games have been studied before, we present, for the first time, results on {\em infinite-duration} poorman games. A central quantity in these games is the {\em ratio} between the two players' initial budgets. The questions we study concern a necessary and sufficient ratio with which a player can achieve a goal. For reachability objectives, such {\em threshold ratios} are known to exist for both bidding rules. We show that the properties of poorman reachability games extend to complex qualitative objectives such as parity, similarly to the Richman case. Our most interesting results concern quantitative poorman games, namely poorman mean-payoff games, where we construct optimal strategies depending on the initial ratio, by showing a connection with {\em random-turn based games}. The connection in itself is interesting, because it does not hold for reachability poorman games. We also solve the complexity problems that arise in poorman bidding games. ",thomas henzinger,,2018.0,,arXiv,Avni2018,True,,arXiv,Not available,Infinite-Duration Poorman-Bidding Games,65a6e00011e852026fbd4530dd5323bf,http://arxiv.org/abs/1804.04372v3 12105," In two-player games on graphs, the players move a token through a graph to produce an infinite path, which determines the winner or payoff of the game. Such games are central in formal verification since they model the interaction between a non-terminating system and its environment. We study {\em bidding games} in which the players bid for the right to move the token. Two bidding rules have been defined. In {\em Richman} bidding, in each round, the players simultaneously submit bids, and the higher bidder moves the token and pays the other player. {\em Poorman} bidding is similar except that the winner of the bidding pays the ""bank"" rather than the other player. While poorman reachability games have been studied before, we present, for the first time, results on {\em infinite-duration} poorman games. A central quantity in these games is the {\em ratio} between the two players' initial budgets. The questions we study concern a necessary and sufficient ratio with which a player can achieve a goal. For reachability objectives, such {\em threshold ratios} are known to exist for both bidding rules. We show that the properties of poorman reachability games extend to complex qualitative objectives such as parity, similarly to the Richman case. Our most interesting results concern quantitative poorman games, namely poorman mean-payoff games, where we construct optimal strategies depending on the initial ratio, by showing a connection with {\em random-turn based games}. The connection in itself is interesting, because it does not hold for reachability poorman games. We also solve the complexity problems that arise in poorman bidding games. ",rasmus ibsen-jensen,,2018.0,,arXiv,Avni2018,True,,arXiv,Not available,Infinite-Duration Poorman-Bidding Games,65a6e00011e852026fbd4530dd5323bf,http://arxiv.org/abs/1804.04372v3 12106," We consider a deterministic realization of Parrondo games and use periodic orbit theory to analyze their asymptotic behavior. ",roberto artuso,,2005.0,10.1088/0305-4470/39/6/005,J. Phys. A: Math. Gen. 39 1285-1295 2006,Artuso2005,True,,arXiv,Not available,Recycling Parrondo games,bd31f851d77da86da9b09855d72784a8,http://arxiv.org/abs/nlin/0510058v1 12107," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",aaron roth,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 12108," We consider a deterministic realization of Parrondo games and use periodic orbit theory to analyze their asymptotic behavior. ",lucia cavallasca,,2005.0,10.1088/0305-4470/39/6/005,J. Phys. A: Math. Gen. 39 1285-1295 2006,Artuso2005,True,,arXiv,Not available,Recycling Parrondo games,bd31f851d77da86da9b09855d72784a8,http://arxiv.org/abs/nlin/0510058v1 12109," We consider a deterministic realization of Parrondo games and use periodic orbit theory to analyze their asymptotic behavior. ",giampaolo cristadoro,,2005.0,10.1088/0305-4470/39/6/005,J. Phys. A: Math. Gen. 39 1285-1295 2006,Artuso2005,True,,arXiv,Not available,Recycling Parrondo games,bd31f851d77da86da9b09855d72784a8,http://arxiv.org/abs/nlin/0510058v1 12110," We propose a quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory. ",e. piotrowski,,2001.0,10.1016/S0378-4371(02)00842-7,Physica A 312 (2002) 208,Piotrowski2001,True,,arXiv,Not available,Quantum Market Games,8115c299744874483443bcd716127ec6,http://arxiv.org/abs/quant-ph/0104006v1 12111," We propose a quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory. ",j. sladkowski,,2001.0,10.1016/S0378-4371(02)00842-7,Physica A 312 (2002) 208,Piotrowski2001,True,,arXiv,Not available,Quantum Market Games,8115c299744874483443bcd716127ec6,http://arxiv.org/abs/quant-ph/0104006v1 12112," On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. The idea of quantum artificial intelligence is explained. ",katarzyna miakisz,,2004.0,,arXiv,Miakisz2004,True,,arXiv,Not available,Quantization of Games: Towards Quantum Artificial Intelligence,6a02f2ed00a370cc4aec6d6f04b9a6d4,http://arxiv.org/abs/quant-ph/0412215v1 12113," On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. The idea of quantum artificial intelligence is explained. ",edward piotrowski,,2004.0,,arXiv,Miakisz2004,True,,arXiv,Not available,Quantization of Games: Towards Quantum Artificial Intelligence,6a02f2ed00a370cc4aec6d6f04b9a6d4,http://arxiv.org/abs/quant-ph/0412215v1 12114," On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. The idea of quantum artificial intelligence is explained. ",jan sladkowski,,2004.0,,arXiv,Miakisz2004,True,,arXiv,Not available,Quantization of Games: Towards Quantum Artificial Intelligence,6a02f2ed00a370cc4aec6d6f04b9a6d4,http://arxiv.org/abs/quant-ph/0412215v1 12115," We analyse Selten's concept of trembling hand perfect equilibria in the context of quantum game theory. We define trembles as mixed quantum strategies by replacing discrete probabilities with probability distribution functions. Explicit examples of analysis are given. ",ireneusz pakula,,2007.0,,arXiv,Pakula2007,True,,arXiv,Not available,Analysis of trembling hand perfect equilibria in quantum games,e9baaa4eb1d3ea82e4bc8380fa9551e4,http://arxiv.org/abs/0705.1083v1 12116," For the most up-to-date version please visit http://www.cis.upenn.edu/~brautbar/ccgame.pdf ",mickey brautbar,,2010.0,,arXiv,Brautbar2010,True,,arXiv,Not available,A Clustering Coefficient Network Formation Game,276ae1c5d759c79d91194eb5d0a25b91,http://arxiv.org/abs/1010.1561v2 12117," For the most up-to-date version please visit http://www.cis.upenn.edu/~brautbar/ccgame.pdf ",michael kearns,,2010.0,,arXiv,Brautbar2010,True,,arXiv,Not available,A Clustering Coefficient Network Formation Game,276ae1c5d759c79d91194eb5d0a25b91,http://arxiv.org/abs/1010.1561v2 12118," We study online combinatorial auctions with production costs proposed by Blum et al. using the online primal dual framework. In this model, buyers arrive online, and the seller can produce multiple copies of each item subject to a non-decreasing marginal cost per copy. The goal is to allocate items to maximize social welfare less total production cost. For arbitrary (strictly convex and differentiable) production cost functions, we characterize the optimal competitive ratio achievable by online mechanisms/algorithms. We show that online posted pricing mechanisms, which are incentive compatible, can achieve competitive ratios arbitrarily close to the optimal, and construct lower bound instances on which no online algorithms, not necessarily incentive compatible, can do better. Our positive results improve or match the results in several previous work, e.g., Bartal et al., Blum et al., and Buchbinder and Gonen. Our lower bounds apply to randomized algorithms and resolve an open problem by Buchbinder and Gonen. ",anthony kim,,2014.0,,arXiv,Huang2014,True,,arXiv,Not available,Welfare Maximization with Production Costs: A Primal Dual Approach,27dcc6d472daf0d669bf53036f648385,http://arxiv.org/abs/1411.4384v1 12119," The bi-objective winner determination problem (2WDP-SC) of a combinatorial procurement auction for transport contracts is characterized by a set B of bundle bids, with each bundle bid b in B consisting of a bidding carrier c_b, a bid price p_b, and a set tau_b transport contracts which is a subset of the set T of tendered transport contracts. Additionally, the transport quality q_{t,c_b} is given which is expected to be realized when a transport contract t is executed by a carrier c_b. The task of the auctioneer is to find a set X of winning bids (X subset B), such that each transport contract is part of at least one winning bid, the total procurement costs are minimized, and the total transport quality is maximized. This article presents a metaheuristic approach for the 2WDP-SC which integrates the greedy randomized adaptive search procedure with a two-stage candidate component selection procedure, large neighborhood search, and self-adaptive parameter setting in order to find a competitive set of non-dominated solutions. The heuristic outperforms all existing approaches. For seven small benchmark instances, the heuristic is the sole approach that finds all Pareto-optimal solutions. For 28 out of 30 large instances, none of the existing approaches is able to compute a solution that dominates a solution found by the proposed heuristic. ",tobias buer,,2012.0,10.1016/j.cor.2013.04.004,"Computers & Operations Research 41 (2014), 208-220",Buer2012,True,,arXiv,Not available,"A Pareto-metaheuristic for a bi-objective winner determination problem in a combinatorial reverse auction",db2db698ee71be3c52a6c6d693607f2e,http://arxiv.org/abs/1201.4342v2 12120," Game versions of the Monty Hall Problem are discussed. The focus is on the principle of eliminating the dominated strategies, both in the zero-sum and noncooperative formulations. ",alexander gnedin,,2011.0,,arXiv,Gnedin2011,True,,arXiv,Not available,The Monty Hall Problem: Switching is Forced by the Strategic Thinking,aaa81715244fb7f3d822b15e1f50088e,http://arxiv.org/abs/1103.3890v2 12121," A working definition of the term \quantum game"" is developed in an attempt to gain insights into aspects of quantum mechanics via game theory. ",faisal khan,,2011.0,,arXiv,Khan2011,True,,arXiv,Not available,Nash equilibrium in quantum superpositions,aa5a39a1ad73dddad76ffbddf8656a79,http://arxiv.org/abs/1106.3019v1 12122," A working definition of the term \quantum game"" is developed in an attempt to gain insights into aspects of quantum mechanics via game theory. ",simon. phoenix,,2011.0,,arXiv,Khan2011,True,,arXiv,Not available,Nash equilibrium in quantum superpositions,aa5a39a1ad73dddad76ffbddf8656a79,http://arxiv.org/abs/1106.3019v1 12123," We present a constructive proof of Brouwer's fixed point theorem with sequentially at most one fixed point, and apply it to the mini-max theorem of zero-sum games. ",yasuhito tanaka,,2011.0,,arXiv,Tanaka2011,True,,arXiv,Not available,Brouwer's fixed point theorem with sequentially at most one fixed point,c6864bedd8e68d8a4b747bdaebde8c97,http://arxiv.org/abs/1108.2201v1 12124," It is NP-hard to decide if a given pure-strategy Nash equilibrium of a given three-player game in strategic form with integer payoffs is trembling hand perfect. ",peter miltersen,,2008.0,,arXiv,Miltersen2008,True,,arXiv,Not available,Trembling hand perfection is NP-hard,1f4d3f81b30fc47df4d64753bafee791,http://arxiv.org/abs/0812.0492v1 12125," An overview of different variants of the submodular welfare maximization problem in combinatorial auctions. In particular, I studied the existing algorithmic and game theoretic results for submodular welfare maximization problem and its applications in other areas such as social networks. ",samira samadi,,2013.0,,arXiv,Samadi2013,True,,arXiv,Not available,Submodular Welfare Maximization,db065c3a2e22f4fea80bab840b6fad2b,http://arxiv.org/abs/1311.5603v1 12126," Many packing, scheduling and covering problems that were previously considered by computer science literature in the context of various transportation and production problems, appear also suitable for describing and modeling various fundamental aspects in networks optimization such as routing, resource allocation, congestion control, etc. Various combinatorial problems were already studied from the game theoretic standpoint, and we attempt to complement to this body of research. Specifically, we consider the bin packing problem both in the classic and parametric versions, the job scheduling problem and the machine covering problem in various machine models. We suggest new interpretations of such problems in the context of modern networks and study these problems from a game theoretic perspective by modeling them as games, and then concerning various game theoretic concepts in these games by combining tools from game theory and the traditional combinatorial optimization. In the framework of this research we introduce and study models that were not considered before, and also improve upon previously known results. ",elena kleiman,,2011.0,,arXiv,Kleiman2011,True,,arXiv,Not available,"Packing, Scheduling and Covering Problems in a Game-Theoretic Perspective",6a5cff702caaeb87b37988ac104185e4,http://arxiv.org/abs/1110.6407v1 12127," With the growth of the internet it is becoming increasingly important to understand how the behaviour of players is affected by the topology of the network interconnecting them. Many models which involve networks of interacting players have been proposed and best response games are amongst the simplest. In best response games each vertex simultaneously updates to employ the best response to their current surroundings. We concentrate upon trying to understand the dynamics of best response games on regular graphs with many strategies. When more than two strategies are present highly complex dynamics can ensue. We focus upon trying to understand exactly how best response games on regular graphs sample from the space of possible cellular automata. To understand this issue we investigate convex divisions in high dimensional space and we prove that almost every division of $k-1$ dimensional space into $k$ convex regions includes a single point where all regions meet. We then find connections between the convex geometry of best response games and the theory of alternating circuits on graphs. Exploiting these unexpected connections allows us to gain an interesting answer to our question of when cellular automata are best response games. ",richard southwell,,2013.0,,arXiv,Southwell2013,True,,arXiv,Not available,Best Response Games on Regular Graphs,7efeb98959fbd2143a0cfaf55e2ffec3,http://arxiv.org/abs/1301.5738v1 12128," With the growth of the internet it is becoming increasingly important to understand how the behaviour of players is affected by the topology of the network interconnecting them. Many models which involve networks of interacting players have been proposed and best response games are amongst the simplest. In best response games each vertex simultaneously updates to employ the best response to their current surroundings. We concentrate upon trying to understand the dynamics of best response games on regular graphs with many strategies. When more than two strategies are present highly complex dynamics can ensue. We focus upon trying to understand exactly how best response games on regular graphs sample from the space of possible cellular automata. To understand this issue we investigate convex divisions in high dimensional space and we prove that almost every division of $k-1$ dimensional space into $k$ convex regions includes a single point where all regions meet. We then find connections between the convex geometry of best response games and the theory of alternating circuits on graphs. Exploiting these unexpected connections allows us to gain an interesting answer to our question of when cellular automata are best response games. ",chris cannings,,2013.0,,arXiv,Southwell2013,True,,arXiv,Not available,Best Response Games on Regular Graphs,7efeb98959fbd2143a0cfaf55e2ffec3,http://arxiv.org/abs/1301.5738v1 12129," One of the long-debated issues in coalitional game theory is how to extend the Shapley value to games with externalities (partition-function games). When externalities are present, not only can a player's marginal contribution - a central notion to the Shapley value - be defined in a variety of ways, but it is also not obvious which axiomatization should be used. Consequently, a number of authors extended the Shapley value using complex and often unintuitive axiomatizations. Furthermore, no algorithm to approximate any extension of the Shapley value to partition-function games has been proposed to date. Given this background, we prove in this paper that, for any well-defined measure of marginal contribution, Shapley's original four axioms imply a unique value for games with externalities. As an consequence of this general theorem, we show that values proposed by Macho-Stadler et al., McQuillin and Bolger can be derived from Shapley's axioms. Building upon our analysis of marginal contribution, we develop a general algorithm to approximate extensions of the Shapley value to games with externalities using a Monte Carlo simulation technique. ",oskar skibski,,2013.0,,arXiv,Skibski2013,True,,arXiv,Not available,The Shapley Axiomatization for Values in Partition Function Games,58aee22297c957484e439b168297c1f1,http://arxiv.org/abs/1308.6255v1 12130," The bi-objective winner determination problem (2WDP-SC) of a combinatorial procurement auction for transport contracts is characterized by a set B of bundle bids, with each bundle bid b in B consisting of a bidding carrier c_b, a bid price p_b, and a set tau_b transport contracts which is a subset of the set T of tendered transport contracts. Additionally, the transport quality q_{t,c_b} is given which is expected to be realized when a transport contract t is executed by a carrier c_b. The task of the auctioneer is to find a set X of winning bids (X subset B), such that each transport contract is part of at least one winning bid, the total procurement costs are minimized, and the total transport quality is maximized. This article presents a metaheuristic approach for the 2WDP-SC which integrates the greedy randomized adaptive search procedure with a two-stage candidate component selection procedure, large neighborhood search, and self-adaptive parameter setting in order to find a competitive set of non-dominated solutions. The heuristic outperforms all existing approaches. For seven small benchmark instances, the heuristic is the sole approach that finds all Pareto-optimal solutions. For 28 out of 30 large instances, none of the existing approaches is able to compute a solution that dominates a solution found by the proposed heuristic. ",herbert kopfer,,2012.0,10.1016/j.cor.2013.04.004,"Computers & Operations Research 41 (2014), 208-220",Buer2012,True,,arXiv,Not available,"A Pareto-metaheuristic for a bi-objective winner determination problem in a combinatorial reverse auction",db2db698ee71be3c52a6c6d693607f2e,http://arxiv.org/abs/1201.4342v2 12131," One of the long-debated issues in coalitional game theory is how to extend the Shapley value to games with externalities (partition-function games). When externalities are present, not only can a player's marginal contribution - a central notion to the Shapley value - be defined in a variety of ways, but it is also not obvious which axiomatization should be used. Consequently, a number of authors extended the Shapley value using complex and often unintuitive axiomatizations. Furthermore, no algorithm to approximate any extension of the Shapley value to partition-function games has been proposed to date. Given this background, we prove in this paper that, for any well-defined measure of marginal contribution, Shapley's original four axioms imply a unique value for games with externalities. As an consequence of this general theorem, we show that values proposed by Macho-Stadler et al., McQuillin and Bolger can be derived from Shapley's axioms. Building upon our analysis of marginal contribution, we develop a general algorithm to approximate extensions of the Shapley value to games with externalities using a Monte Carlo simulation technique. ",tomasz michalak,,2013.0,,arXiv,Skibski2013,True,,arXiv,Not available,The Shapley Axiomatization for Values in Partition Function Games,58aee22297c957484e439b168297c1f1,http://arxiv.org/abs/1308.6255v1 12132," One of the long-debated issues in coalitional game theory is how to extend the Shapley value to games with externalities (partition-function games). When externalities are present, not only can a player's marginal contribution - a central notion to the Shapley value - be defined in a variety of ways, but it is also not obvious which axiomatization should be used. Consequently, a number of authors extended the Shapley value using complex and often unintuitive axiomatizations. Furthermore, no algorithm to approximate any extension of the Shapley value to partition-function games has been proposed to date. Given this background, we prove in this paper that, for any well-defined measure of marginal contribution, Shapley's original four axioms imply a unique value for games with externalities. As an consequence of this general theorem, we show that values proposed by Macho-Stadler et al., McQuillin and Bolger can be derived from Shapley's axioms. Building upon our analysis of marginal contribution, we develop a general algorithm to approximate extensions of the Shapley value to games with externalities using a Monte Carlo simulation technique. ",michael wooldridge,,2013.0,,arXiv,Skibski2013,True,,arXiv,Not available,The Shapley Axiomatization for Values in Partition Function Games,58aee22297c957484e439b168297c1f1,http://arxiv.org/abs/1308.6255v1 12134," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. Recently, such games with quantitative winning conditions in weak MSO with the unbounding quantifier were studied, but their properties turned out to be unsatisfactory. In particular, unbounded lookahead is in general necessary. Here, we study delay games with winning conditions given by Prompt-LTL, Linear Temporal Logic equipped with a parameterized eventually operator whose scope is bounded. Our main result shows that solving Prompt-LTL delay games is complete for triply-exponential time. Furthermore, we give tight triply-exponential bounds on the necessary lookahead and on the scope of the parameterized eventually operator. Thus, we identify Prompt-LTL as the first known class of well-behaved quantitative winning conditions for delay games. Finally, we show that applying our techniques to delay games with \omega-regular winning conditions answers open questions in the cases where the winning conditions are given by non-deterministic, universal, or alternating automata. ",felix klein,,2016.0,,arXiv,Klein2016,True,,arXiv,Not available,Prompt Delay,2e17ab87323dcc6c07e980c10b0e479b,http://arxiv.org/abs/1602.05045v2 12135," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. Recently, such games with quantitative winning conditions in weak MSO with the unbounding quantifier were studied, but their properties turned out to be unsatisfactory. In particular, unbounded lookahead is in general necessary. Here, we study delay games with winning conditions given by Prompt-LTL, Linear Temporal Logic equipped with a parameterized eventually operator whose scope is bounded. Our main result shows that solving Prompt-LTL delay games is complete for triply-exponential time. Furthermore, we give tight triply-exponential bounds on the necessary lookahead and on the scope of the parameterized eventually operator. Thus, we identify Prompt-LTL as the first known class of well-behaved quantitative winning conditions for delay games. Finally, we show that applying our techniques to delay games with \omega-regular winning conditions answers open questions in the cases where the winning conditions are given by non-deterministic, universal, or alternating automata. ",martin zimmermann,,2016.0,,arXiv,Klein2016,True,,arXiv,Not available,Prompt Delay,2e17ab87323dcc6c07e980c10b0e479b,http://arxiv.org/abs/1602.05045v2 12136," Population protocols have been introduced by Angluin et {al.} as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. The model has been considered as a computational model in several papers. Input values are initially distributed among the agents, and the agents must eventually converge to the the correct output. Predicates on the initial configurations that can be computed by such protocols have been characterized under various hypotheses. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. In this paper, we investigate under which conditions population protocols, or more generally pairwise interaction rules, can be considered as the result of a symmetric game. We prove that not all rules can be considered as symmetric games.% We prove that some basic protocols can be realized using symmetric games. As a side effect of our study, we also prove that any population protocol can be simulated by a symmetric one (but not necessarily a game). ",olivier bournez,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Population Protocols that Correspond to Symmetric Games,2e83f3b3b16211e0826edfe056979567,http://arxiv.org/abs/0907.3126v1 12137," Population protocols have been introduced by Angluin et {al.} as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. The model has been considered as a computational model in several papers. Input values are initially distributed among the agents, and the agents must eventually converge to the the correct output. Predicates on the initial configurations that can be computed by such protocols have been characterized under various hypotheses. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. In this paper, we investigate under which conditions population protocols, or more generally pairwise interaction rules, can be considered as the result of a symmetric game. We prove that not all rules can be considered as symmetric games.% We prove that some basic protocols can be realized using symmetric games. As a side effect of our study, we also prove that any population protocol can be simulated by a symmetric one (but not necessarily a game). ",jeremie chalopin,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Population Protocols that Correspond to Symmetric Games,2e83f3b3b16211e0826edfe056979567,http://arxiv.org/abs/0907.3126v1 12138," Population protocols have been introduced by Angluin et {al.} as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. The model has been considered as a computational model in several papers. Input values are initially distributed among the agents, and the agents must eventually converge to the the correct output. Predicates on the initial configurations that can be computed by such protocols have been characterized under various hypotheses. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. In this paper, we investigate under which conditions population protocols, or more generally pairwise interaction rules, can be considered as the result of a symmetric game. We prove that not all rules can be considered as symmetric games.% We prove that some basic protocols can be realized using symmetric games. As a side effect of our study, we also prove that any population protocol can be simulated by a symmetric one (but not necessarily a game). ",johanne cohen,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Population Protocols that Correspond to Symmetric Games,2e83f3b3b16211e0826edfe056979567,http://arxiv.org/abs/0907.3126v1 12139," Population protocols have been introduced by Angluin et {al.} as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. The model has been considered as a computational model in several papers. Input values are initially distributed among the agents, and the agents must eventually converge to the the correct output. Predicates on the initial configurations that can be computed by such protocols have been characterized under various hypotheses. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. In this paper, we investigate under which conditions population protocols, or more generally pairwise interaction rules, can be considered as the result of a symmetric game. We prove that not all rules can be considered as symmetric games.% We prove that some basic protocols can be realized using symmetric games. As a side effect of our study, we also prove that any population protocol can be simulated by a symmetric one (but not necessarily a game). ",xavier koegler,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Population Protocols that Correspond to Symmetric Games,2e83f3b3b16211e0826edfe056979567,http://arxiv.org/abs/0907.3126v1 12141," Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities necessitates an automatic approach to selecting good deals and determining merchant payments. We approach this challenge as a market design problem. We postulate that merchants already have a good idea of the attractiveness of their deal to consumers as well as the amount they are willing to pay to offer their deal. The goal is to design an auction that maximizes a combination of the revenue of the auctioneer (platform), welfare of the bidders (merchants), and the positive externality on a third party (the consumer), despite the asymmetry of information about this consumer benefit. We design auctions that truthfully elicit this information from the merchants and maximize the social welfare objective, and we characterize the consumer welfare functions for which this objective is truthfully implementable. We generalize this characterization to a very broad mechanism-design setting and give examples of other applications. ",yang cai,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,Designing Markets for Daily Deals,6b5dc8b4098d3c30894780fce13d80e6,http://arxiv.org/abs/1310.0548v1 12142," We study two-player (zero-sum) concurrent mean-payoff games played on a finite-state graph. We focus on the important sub-class of ergodic games where all states are visited infinitely often with probability 1. The algorithmic study of ergodic games was initiated in a seminal work of Hoffman and Karp in 1966, but all basic complexity questions have remained unresolved. Our main results for ergodic games are as follows: We establish (1) an optimal exponential bound on the patience of stationary strategies (where patience of a distribution is the inverse of the smallest positive probability and represents a complexity measure of a stationary strategy); (2) the approximation problem lie in FNP; (3) the approximation problem is at least as hard as the decision problem for simple stochastic games (for which NP intersection coNP is the long-standing best known bound). We present a variant of the strategy-iteration algorithm by Hoffman and Karp; show that both our algorithm and the classical value-iteration algorithm can approximate the value in exponential time; and identify a subclass where the value-iteration algorithm is a FPTAS. We also show that the exact value can be expressed in the existential theory of the reals, and establish square-root sum hardness for a related class of games. ",krishnendu chatterjee,,2014.0,,arXiv,Chatterjee2014,True,,arXiv,Not available,The Complexity of Ergodic Mean-payoff Games,590fcbdeb0b26c7ea443cf356ca747f4,http://arxiv.org/abs/1404.5734v1 12143," We study two-player (zero-sum) concurrent mean-payoff games played on a finite-state graph. We focus on the important sub-class of ergodic games where all states are visited infinitely often with probability 1. The algorithmic study of ergodic games was initiated in a seminal work of Hoffman and Karp in 1966, but all basic complexity questions have remained unresolved. Our main results for ergodic games are as follows: We establish (1) an optimal exponential bound on the patience of stationary strategies (where patience of a distribution is the inverse of the smallest positive probability and represents a complexity measure of a stationary strategy); (2) the approximation problem lie in FNP; (3) the approximation problem is at least as hard as the decision problem for simple stochastic games (for which NP intersection coNP is the long-standing best known bound). We present a variant of the strategy-iteration algorithm by Hoffman and Karp; show that both our algorithm and the classical value-iteration algorithm can approximate the value in exponential time; and identify a subclass where the value-iteration algorithm is a FPTAS. We also show that the exact value can be expressed in the existential theory of the reals, and establish square-root sum hardness for a related class of games. ",rasmus ibsen-jensen,,2014.0,,arXiv,Chatterjee2014,True,,arXiv,Not available,The Complexity of Ergodic Mean-payoff Games,590fcbdeb0b26c7ea443cf356ca747f4,http://arxiv.org/abs/1404.5734v1 12144," Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network. ",qizhi fang,,2015.0,,arXiv,Fang2015,True,,arXiv,Not available,The Least-core and Nucleolus of Path Cooperative Games,d62f921a108528867d68e837ee729865,http://arxiv.org/abs/1503.04575v1 12145," Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network. ",bo li,,2015.0,,arXiv,Fang2015,True,,arXiv,Not available,The Least-core and Nucleolus of Path Cooperative Games,d62f921a108528867d68e837ee729865,http://arxiv.org/abs/1503.04575v1 12146," Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network. ",xiaohan shan,,2015.0,,arXiv,Fang2015,True,,arXiv,Not available,The Least-core and Nucleolus of Path Cooperative Games,d62f921a108528867d68e837ee729865,http://arxiv.org/abs/1503.04575v1 12147," Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network. ",xiaoming sun,,2015.0,,arXiv,Fang2015,True,,arXiv,Not available,The Least-core and Nucleolus of Path Cooperative Games,d62f921a108528867d68e837ee729865,http://arxiv.org/abs/1503.04575v1 12148," We study hedonic games with dichotomous preferences. Hedonic games are cooperative games in which players desire to form coalitions, but only care about the makeup of the coalitions of which they are members; they are indifferent about the makeup of other coalitions. The assumption of dichotomous preferences means that, additionally, each player's preference relation partitions the set of coalitions of which that player is a member into just two equivalence classes: satisfactory and unsatisfactory. A player is indifferent between satisfactory coalitions, and is indifferent between unsatisfactory coalitions, but strictly prefers any satisfactory coalition over any unsatisfactory coalition. We develop a succinct representation for such games, in which each player's preference relation is represented by a propositional formula. We show how solution concepts for hedonic games with dichotomous preferences are characterised by propositional formulas. ",haris aziz,,2015.0,,arXiv,Aziz2015,True,,arXiv,Not available,Boolean Hedonic Games,c98e4f6cc8c4329acae9a09bc9f8c961,http://arxiv.org/abs/1509.07062v1 12149," We study hedonic games with dichotomous preferences. Hedonic games are cooperative games in which players desire to form coalitions, but only care about the makeup of the coalitions of which they are members; they are indifferent about the makeup of other coalitions. The assumption of dichotomous preferences means that, additionally, each player's preference relation partitions the set of coalitions of which that player is a member into just two equivalence classes: satisfactory and unsatisfactory. A player is indifferent between satisfactory coalitions, and is indifferent between unsatisfactory coalitions, but strictly prefers any satisfactory coalition over any unsatisfactory coalition. We develop a succinct representation for such games, in which each player's preference relation is represented by a propositional formula. We show how solution concepts for hedonic games with dichotomous preferences are characterised by propositional formulas. ",paul harrenstein,,2015.0,,arXiv,Aziz2015,True,,arXiv,Not available,Boolean Hedonic Games,c98e4f6cc8c4329acae9a09bc9f8c961,http://arxiv.org/abs/1509.07062v1 12150," We study hedonic games with dichotomous preferences. Hedonic games are cooperative games in which players desire to form coalitions, but only care about the makeup of the coalitions of which they are members; they are indifferent about the makeup of other coalitions. The assumption of dichotomous preferences means that, additionally, each player's preference relation partitions the set of coalitions of which that player is a member into just two equivalence classes: satisfactory and unsatisfactory. A player is indifferent between satisfactory coalitions, and is indifferent between unsatisfactory coalitions, but strictly prefers any satisfactory coalition over any unsatisfactory coalition. We develop a succinct representation for such games, in which each player's preference relation is represented by a propositional formula. We show how solution concepts for hedonic games with dichotomous preferences are characterised by propositional formulas. ",jerome lang,,2015.0,,arXiv,Aziz2015,True,,arXiv,Not available,Boolean Hedonic Games,c98e4f6cc8c4329acae9a09bc9f8c961,http://arxiv.org/abs/1509.07062v1 12151," We study hedonic games with dichotomous preferences. Hedonic games are cooperative games in which players desire to form coalitions, but only care about the makeup of the coalitions of which they are members; they are indifferent about the makeup of other coalitions. The assumption of dichotomous preferences means that, additionally, each player's preference relation partitions the set of coalitions of which that player is a member into just two equivalence classes: satisfactory and unsatisfactory. A player is indifferent between satisfactory coalitions, and is indifferent between unsatisfactory coalitions, but strictly prefers any satisfactory coalition over any unsatisfactory coalition. We develop a succinct representation for such games, in which each player's preference relation is represented by a propositional formula. We show how solution concepts for hedonic games with dichotomous preferences are characterised by propositional formulas. ",michael wooldridge,,2015.0,,arXiv,Aziz2015,True,,arXiv,Not available,Boolean Hedonic Games,c98e4f6cc8c4329acae9a09bc9f8c961,http://arxiv.org/abs/1509.07062v1 12152," Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities necessitates an automatic approach to selecting good deals and determining merchant payments. We approach this challenge as a market design problem. We postulate that merchants already have a good idea of the attractiveness of their deal to consumers as well as the amount they are willing to pay to offer their deal. The goal is to design an auction that maximizes a combination of the revenue of the auctioneer (platform), welfare of the bidders (merchants), and the positive externality on a third party (the consumer), despite the asymmetry of information about this consumer benefit. We design auctions that truthfully elicit this information from the merchants and maximize the social welfare objective, and we characterize the consumer welfare functions for which this objective is truthfully implementable. We generalize this characterization to a very broad mechanism-design setting and give examples of other applications. ",mohammad mahdian,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,Designing Markets for Daily Deals,6b5dc8b4098d3c30894780fce13d80e6,http://arxiv.org/abs/1310.0548v1 12153," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",ilan adler,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 12154," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",dorit hochbaum,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 12155," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",elias koutsoupias,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 12156," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",stefano leonardi,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 12157," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",tim roughgarden,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 12158," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",jaya mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12159," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",vikash singh,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12160," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",sajal mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12161," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",anita pal,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12162," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",yiannis giannakopoulos,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 12163," Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities necessitates an automatic approach to selecting good deals and determining merchant payments. We approach this challenge as a market design problem. We postulate that merchants already have a good idea of the attractiveness of their deal to consumers as well as the amount they are willing to pay to offer their deal. The goal is to design an auction that maximizes a combination of the revenue of the auctioneer (platform), welfare of the bidders (merchants), and the positive externality on a third party (the consumer), despite the asymmetry of information about this consumer benefit. We design auctions that truthfully elicit this information from the merchants and maximize the social welfare objective, and we characterize the consumer welfare functions for which this objective is truthfully implementable. We generalize this characterization to a very broad mechanism-design setting and give examples of other applications. ",aranyak mehta,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,Designing Markets for Daily Deals,6b5dc8b4098d3c30894780fce13d80e6,http://arxiv.org/abs/1310.0548v1 12164," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",elias koutsoupias,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 12165," We introduce a new sample complexity measure, which we refer to as split-sample growth rate. For any hypothesis $H$ and for any sample $S$ of size $m$, the split-sample growth rate $\hat{\tau}_H(m)$ counts how many different hypotheses can empirical risk minimization output on any sub-sample of $S$ of size $m/2$. We show that the expected generalization error is upper bounded by $O\left(\sqrt{\frac{\log(\hat{\tau}_H(2m))}{m}}\right)$. Our result is enabled by a strengthening of the Rademacher complexity analysis of the expected generalization error. We show that this sample complexity measure, greatly simplifies the analysis of the sample complexity of optimal auction design, for many auction classes studied in the literature. Their sample complexity can be derived solely by noticing that in these auction classes, ERM on any sample or sub-sample will pick parameters that are equal to one of the points in the sample. ",vasilis syrgkanis,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,"A Sample Complexity Measure with Applications to Learning Optimal Auctions",f2815595a5693bfca8ece62506201cec,http://arxiv.org/abs/1704.02598v2 12166," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",marco caminati,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 12167," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",manfred kerber,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 12168," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",colin rowat,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 12169," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",anna osepayshvili,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 12170," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",michael wellman,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 12171," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",daniel reeves,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 12172," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",jeffrey mackie-mason,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 12173," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",constantinos daskalakis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 12174," Daily deals platforms such as Amazon Local, Google Offers, GroupOn, and LivingSocial have provided a new channel for merchants to directly market to consumers. In order to maximize consumer acquisition and retention, these platforms would like to offer deals that give good value to users. Currently, selecting such deals is done manually; however, the large number of submarkets and localities necessitates an automatic approach to selecting good deals and determining merchant payments. We approach this challenge as a market design problem. We postulate that merchants already have a good idea of the attractiveness of their deal to consumers as well as the amount they are willing to pay to offer their deal. The goal is to design an auction that maximizes a combination of the revenue of the auctioneer (platform), welfare of the bidders (merchants), and the positive externality on a third party (the consumer), despite the asymmetry of information about this consumer benefit. We design auctions that truthfully elicit this information from the merchants and maximize the social welfare objective, and we characterize the consumer welfare functions for which this objective is truthfully implementable. We generalize this characterization to a very broad mechanism-design setting and give examples of other applications. ",bo waggoner,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,Designing Markets for Daily Deals,6b5dc8b4098d3c30894780fce13d80e6,http://arxiv.org/abs/1310.0548v1 12175," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",vasilis syrgkanis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 12176," In a combinatorial auction with item bidding, agents participate in multiple single-item second-price auctions at once. As some items might be substitutes, agents need to strategize in order to maximize their utilities. A number of results indicate that high welfare can be achieved this way, giving bounds on the welfare at equilibrium. Recently, however, criticism has been raised that equilibria are hard to compute and therefore unlikely to be attained. In this paper, we take a different perspective. We study simple best-response dynamics. That is, agents are activated one after the other and each activated agent updates his strategy myopically to a best response against the other agents' current strategies. Often these dynamics may take exponentially long before they converge or they may not converge at all. However, as we show, convergence is not even necessary for good welfare guarantees. Given that agents' bid updates are aggressive enough but not too aggressive, the game will remain in states of good welfare after each agent has updated his bid at least once. In more detail, we show that if agents have fractionally subadditive valuations, natural dynamics reach and remain in a state that provides a $1/3$ approximation to the optimal welfare after each agent has updated his bid at least once. For subadditive valuations, we can guarantee an $\Omega(1/\log m)$ approximation in case of $m$ items that applies after each agent has updated his bid at least once and at any point after that. The latter bound is complemented by a negative result, showing that no kind of best-response dynamics can guarantee more than an $o(\log \log m/\log m)$ fraction of the optimal social welfare. ",paul dutting,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Best-Response Dynamics in Combinatorial Auctions with Item Bidding,b212d14063aab71ccc19013f6cae3c28,http://arxiv.org/abs/1607.04149v2 12177," In a combinatorial auction with item bidding, agents participate in multiple single-item second-price auctions at once. As some items might be substitutes, agents need to strategize in order to maximize their utilities. A number of results indicate that high welfare can be achieved this way, giving bounds on the welfare at equilibrium. Recently, however, criticism has been raised that equilibria are hard to compute and therefore unlikely to be attained. In this paper, we take a different perspective. We study simple best-response dynamics. That is, agents are activated one after the other and each activated agent updates his strategy myopically to a best response against the other agents' current strategies. Often these dynamics may take exponentially long before they converge or they may not converge at all. However, as we show, convergence is not even necessary for good welfare guarantees. Given that agents' bid updates are aggressive enough but not too aggressive, the game will remain in states of good welfare after each agent has updated his bid at least once. In more detail, we show that if agents have fractionally subadditive valuations, natural dynamics reach and remain in a state that provides a $1/3$ approximation to the optimal welfare after each agent has updated his bid at least once. For subadditive valuations, we can guarantee an $\Omega(1/\log m)$ approximation in case of $m$ items that applies after each agent has updated his bid at least once and at any point after that. The latter bound is complemented by a negative result, showing that no kind of best-response dynamics can guarantee more than an $o(\log \log m/\log m)$ fraction of the optimal social welfare. ",thomas kesselheim,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Best-Response Dynamics in Combinatorial Auctions with Item Bidding,b212d14063aab71ccc19013f6cae3c28,http://arxiv.org/abs/1607.04149v2 12180," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",yagil engel,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 12181," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",michael wellman,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 12182," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",hu fu,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 12183," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",nima haghpanah,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 12184," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",jason hartline,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 12185," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",mark braverman,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 12186," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",robert kleinberg,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 12187," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",simina branzei,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 12188," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",aris filos-ratsikas,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 12189," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",peter miltersen,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 12190," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",yulong zeng,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 12191," We study the design of mechanisms in combinatorial auction domains. We focus on settings where the auction is repeated, motivated by auctions for licenses or advertising space. We consider models of agent behaviour in which they either apply common learning techniques to minimize the regret of their bidding strategies, or apply short-sighted best-response strategies. We ask: when can a black-box approximation algorithm for the base auction problem be converted into a mechanism that approximately preserves the original algorithm's approximation factor on average over many iterations? We present a general reduction for a broad class of algorithms when agents minimize external regret. We also present a new mechanism for the combinatorial auction problem that attains an $O(\sqrt{m})$ approximation on average when agents apply best-response dynamics. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions,bbb3a99cbd2817e6316e772ef5d192bd,http://arxiv.org/abs/0909.5677v1 12192," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 12193," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 12194," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 12195," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 12196," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",jieming mao,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 12197," Online double auctions (DAs) model a dynamic two-sided matching problem with private information and self-interest, and are relevant for dynamic resource and task allocation problems. We present a general method to design truthful DAs, such that no agent can benefit from misreporting its arrival time, duration, or value. The family of DAs is parameterized by a pricing rule, and includes a generalization of McAfee's truthful DA to this dynamic setting. We present an empirical study, in which we study the allocative-surplus and agent surplus for a number of different DAs. Our results illustrate that dynamic pricing rules are important to provide good market efficiency for markets with high volatility or low volume. ",jonathan bredin,,2012.0,,arXiv,Bredin2012,True,,arXiv,Not available,Models for Truthful Online Double Auctions,4317e3466310ada4542c96752d79ff62,http://arxiv.org/abs/1207.1360v1 12198," Online double auctions (DAs) model a dynamic two-sided matching problem with private information and self-interest, and are relevant for dynamic resource and task allocation problems. We present a general method to design truthful DAs, such that no agent can benefit from misreporting its arrival time, duration, or value. The family of DAs is parameterized by a pricing rule, and includes a generalization of McAfee's truthful DA to this dynamic setting. We present an empirical study, in which we study the allocative-surplus and agent surplus for a number of different DAs. Our results illustrate that dynamic pricing rules are important to provide good market efficiency for markets with high volatility or low volume. ",david parkes,,2012.0,,arXiv,Bredin2012,True,,arXiv,Not available,Models for Truthful Online Double Auctions,4317e3466310ada4542c96752d79ff62,http://arxiv.org/abs/1207.1360v1 12199," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",paul duetting,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 12200," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",monika henzinger,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 12201," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",martin starnberger,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 12202," The goal of an auction is to determine commodity prices such that all participants are perfectly happy. Such a solution is called a competitive equilibrium and does not exist in general. For this reason we are interested in solutions which are similar to a competitive equilibrium. The article introduces two relaxations of a competitive equilibrium for general auctions. Both relaxations determine one price per commodity by solving a difficult non-convex optimization problem. The first model is a mathematical program with equilibrium constraints (MPEC), which ensures that each participant is either perfectly happy or his bid is rejected. An exact algorithm and a heuristic are provided for this model. The second model is a relaxation of the first one and only ensures that no participant incurs a loss. In an optimal solution to the second model, no participant can be made better off without making another one worse off. ",johannes muller,,2013.0,,arXiv,Müller2013,True,,arXiv,Not available,Competitive Equilibrium Relaxations in General Auctions,717eceee956c9f6965a10ea07bc7d977,http://arxiv.org/abs/1307.2852v2 12203," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dengji zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 12204," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dongmo zhang,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 12205," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",laurent perrussel,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 12206," We prove that for any pair $(s,t)$ of nonnegative numbers with $s+t=1$, the set of two-dimensional $(s,t)$-badly approximable vectors is winning for Schmidt's game. As a consequence, we give a direct proof of Schmidt's conjecture using his game. ",jinpeng an,,2012.0,10.1215/00127094-3165862,"Duke Math. J. 165, no. 2 (2016), 267-284",An2012,True,,arXiv,Not available,Two-dimensional badly approximable vectors and Schmidt's game,33d0c85d525baed2cd318698ae99057f,http://arxiv.org/abs/1204.3610v2 12207," We study the communication complexity of combinatorial auctions via interpolation mechanisms that interpolate between non-truthful and truthful protocols. Specifically, an interpolation mechanism has two phases. In the first phase, the bidders participate in some non-truthful protocol whose output is itself a truthful protocol. In the second phase, the bidders participate in the truthful protocol selected during phase one. Note that virtually all existing auctions have either a non-existent first phase (and are therefore truthful mechanisms), or a non-existent second phase (and are therefore just traditional protocols, analyzed via the Price of Anarchy/Stability). The goal of this paper is to understand the benefits of interpolation mechanisms versus truthful mechanisms or traditional protocols, and develop the necessary tools to formally study them. Interestingly, we exhibit settings where interpolation mechanisms greatly outperform the optimal traditional and truthful protocols. Yet, we also exhibit settings where interpolation mechanisms are provably no better than truthful ones. Finally, we apply our new machinery to prove that the recent single-bid mechanism of Devanur et. al.~\cite{DevanurMSW15} (the only pre-existing interpolation mechanism in the literature) achieves the optimal price of anarchy among a wide class of protocols, a claim that simply can't be addressed by appealing just to machinery from communication complexity or the study of truthful mechanisms. ",s. weinberg,,2015.0,,arXiv,Braverman2015,True,,arXiv,Not available,"Interpolating Between Truthful and non-Truthful Mechanisms for Combinatorial Auctions",7b082c8bec388514308076ad59e37875,http://arxiv.org/abs/1511.02831v1 12208," Risk is a well-known turn based board game where the primary objective is nothing less than the world domination. Gameplay is based on battles between armies located in adjacent territories on the map of Earth. The combat's outcome is decided by rolling dice, and therefore a probabilistic approach can be taken. Although several results are derived, the conclusions suggest that the gameplay is highly depending on luck. ",manu harju,,2012.0,,arXiv,Harju2012,True,,arXiv,Not available,On probabilities of Risk type board game combats,51fe908801a1e3249b37a90c99d7c08f,http://arxiv.org/abs/1204.4082v1 12209," We study a simple scheduling game for the speed scaling model. Players want their job to complete early, which however generates a big energy consumption. We address the game from the mechanism design side, and by charging the energy usage to the players we seek for a good compromize between quality of service and energy usage. ",oscar vasquez,,2012.0,,arXiv,Vásquez2012,True,,arXiv,Not available,"Energy in computing systems with speed scaling: optimization and mechanisms design",fa7916e9daa31b81ba48f2471547a1bb,http://arxiv.org/abs/1212.6375v1 12210," Counterfactual Regret Minimization and variants (e.g. Public Chance Sampling CFR and Pure CFR) have been known as the best approaches for creating approximate Nash equilibrium solutions for imperfect information games such as poker. This paper introduces CFR$^+$, a new algorithm that typically outperforms the previously known algorithms by an order of magnitude or more in terms of computation time while also potentially requiring less memory. ",oskari tammelin,,2014.0,,arXiv,Tammelin2014,True,,arXiv,Not available,Solving Large Imperfect Information Games Using CFR+,578319936fd6b633a57a290282066f51,http://arxiv.org/abs/1407.5042v1 12211," We give a game-theoretic proof of the celebrated Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair coin tossing. Our proof, based on Bayesian strategy, is explicit as many other game-theoretic proofs of the laws in probability theory. ",takeyuki sasai,,2014.0,,arXiv,Sasai2014,True,,arXiv,Not available,"A game-theoretic proof of Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair-coin tossing",fc1eb349dd1e0eef0edc90f274d144db,http://arxiv.org/abs/1408.1790v2 12212," We give a game-theoretic proof of the celebrated Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair coin tossing. Our proof, based on Bayesian strategy, is explicit as many other game-theoretic proofs of the laws in probability theory. ",kenshi miyabe,,2014.0,,arXiv,Sasai2014,True,,arXiv,Not available,"A game-theoretic proof of Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair-coin tossing",fc1eb349dd1e0eef0edc90f274d144db,http://arxiv.org/abs/1408.1790v2 12213," We give a game-theoretic proof of the celebrated Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair coin tossing. Our proof, based on Bayesian strategy, is explicit as many other game-theoretic proofs of the laws in probability theory. ",akimichi takemura,,2014.0,,arXiv,Sasai2014,True,,arXiv,Not available,"A game-theoretic proof of Erdos-Feller-Kolmogorov-Petrowsky law of the iterated logarithm for fair-coin tossing",fc1eb349dd1e0eef0edc90f274d144db,http://arxiv.org/abs/1408.1790v2 12214," We model and study the game mechanisms and human behavior of the anarchy mode in Twitch Plays Pokemon with a pure-jump continuous-time Markov process. We computed the winning probability and expected game time for $1$ player and $N$ players and identified when collaboration helps. A numerical plug-in example is also provided. ",scott chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,A Crude Analysis of Twitch Plays Pokemon,c329ad4d87629151a1b4db750d2eff15,http://arxiv.org/abs/1408.4925v1 12215," We establish a relation between two models of contracts: binary session types, and a model based on event structures and game-theoretic notions. In particular, we show that compliance in session types corresponds to the existence of certain winning strategies in game-based contracts. ",massimo bartoletti,,2014.0,10.4204/EPTCS.166.9,"EPTCS 166, 2014, pp. 86-93",Bartoletti2014,True,,arXiv,Not available,A note on two notions of compliance,2986709d288c5925f78be3edc06cf69f,http://arxiv.org/abs/1410.7472v1 12216," We establish a relation between two models of contracts: binary session types, and a model based on event structures and game-theoretic notions. In particular, we show that compliance in session types corresponds to the existence of certain winning strategies in game-based contracts. ",tiziana cimoli,,2014.0,10.4204/EPTCS.166.9,"EPTCS 166, 2014, pp. 86-93",Bartoletti2014,True,,arXiv,Not available,A note on two notions of compliance,2986709d288c5925f78be3edc06cf69f,http://arxiv.org/abs/1410.7472v1 12217," We establish a relation between two models of contracts: binary session types, and a model based on event structures and game-theoretic notions. In particular, we show that compliance in session types corresponds to the existence of certain winning strategies in game-based contracts. ",g. pinna,,2014.0,10.4204/EPTCS.166.9,"EPTCS 166, 2014, pp. 86-93",Bartoletti2014,True,,arXiv,Not available,A note on two notions of compliance,2986709d288c5925f78be3edc06cf69f,http://arxiv.org/abs/1410.7472v1 12218," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",elchanan mossel,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12219," We study the abstract Banach-Mazur game played with finitely generated structures instead of open sets. We characterize the existence of winning strategies aiming at a single countably generated structure. We also introduce the concept of weak Fraisse classes, extending the classical Fraisse theory and revealing its relations to our Banach-Mazur game. ",adam krawczyk,,2017.0,,arXiv,Krawczyk2017,True,,arXiv,Not available,Games on finitely generated structures,75e9389ac8cc0ccf23871d7b34ef2048,http://arxiv.org/abs/1701.05756v3 12220," We study the abstract Banach-Mazur game played with finitely generated structures instead of open sets. We characterize the existence of winning strategies aiming at a single countably generated structure. We also introduce the concept of weak Fraisse classes, extending the classical Fraisse theory and revealing its relations to our Banach-Mazur game. ",wieslaw kubis,,2017.0,,arXiv,Krawczyk2017,True,,arXiv,Not available,Games on finitely generated structures,75e9389ac8cc0ccf23871d7b34ef2048,http://arxiv.org/abs/1701.05756v3 12221," Continuous and discrete game-theoretic models of dispersed material drying process are formalized and studied in the paper. The existence of optimal drying strategies is shown through application of results from the theory of differential games and dynamic programming. These optimal strategies can be found numerically. ",oleg malafeyev,,2017.0,,arXiv,Malafeyev2017,True,,arXiv,Not available,Differential Game Model of Dispersed Material Drying,584c0d8aaee800798c6375f93ad69974,http://arxiv.org/abs/1705.11129v1 12222," Continuous and discrete game-theoretic models of dispersed material drying process are formalized and studied in the paper. The existence of optimal drying strategies is shown through application of results from the theory of differential games and dynamic programming. These optimal strategies can be found numerically. ",denis rylow,,2017.0,,arXiv,Malafeyev2017,True,,arXiv,Not available,Differential Game Model of Dispersed Material Drying,584c0d8aaee800798c6375f93ad69974,http://arxiv.org/abs/1705.11129v1 12223," Continuous and discrete game-theoretic models of dispersed material drying process are formalized and studied in the paper. The existence of optimal drying strategies is shown through application of results from the theory of differential games and dynamic programming. These optimal strategies can be found numerically. ",irina zaitseva,,2017.0,,arXiv,Malafeyev2017,True,,arXiv,Not available,Differential Game Model of Dispersed Material Drying,584c0d8aaee800798c6375f93ad69974,http://arxiv.org/abs/1705.11129v1 12224," Continuous and discrete game-theoretic models of dispersed material drying process are formalized and studied in the paper. The existence of optimal drying strategies is shown through application of results from the theory of differential games and dynamic programming. These optimal strategies can be found numerically. ",lydia novozhilova,,2017.0,,arXiv,Malafeyev2017,True,,arXiv,Not available,Differential Game Model of Dispersed Material Drying,584c0d8aaee800798c6375f93ad69974,http://arxiv.org/abs/1705.11129v1 12225," This paper shows that, for symmetric games in normal form, strategy profiles that satisfy Hofstadter's Superrationality criterion also satisfy both of Halpern's and Pass's criteria under Common Counterfactual Belief of Rationality: minimax-rationalizability and individual rationality. ",ghislain fourny,,2017.0,,arXiv,Fourny2017,True,,arXiv,Not available,"Common Counterfactual Belief of Rationality Subsumes Superrationality On Symmetric Games",f98dbe09256f15c18b1d1cda38704ffd,http://arxiv.org/abs/1707.01816v2 12226," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",riccardo colini-baldeschi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12227," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",paul goldberg,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12228," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",bart keijzer,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12229," Providing an adequate long-term participation incentive is important for a participatory sensing system to maintain enough number of active users (sensors), so as to collect a sufficient number of data samples and support a desired level of service quality. In this work, we consider the sensor selection problem in a general time-dependent and location-aware participatory sensing system, taking the long-term user participation incentive into explicit consideration. We study the problem systematically under different information scenarios, regarding both future information and current information (realization). In particular, we propose a Lyapunov-based VCG auction policy for the on-line sensor selection, which converges asymptotically to the optimal off-line benchmark performance, even with no future information and under (current) information asymmetry. Extensive numerical results show that our proposed policy outperforms the state-of-art policies in the literature, in terms of both user participation (e.g., reducing the user dropping probability by 25% to 90%) and social performance (e.g., increasing the social welfare by 15% to 80%). ",lin gao,,2015.0,10.1109/INFOCOM.2015.7218673,arXiv,Gao2015,True,,arXiv,Not available,Providing Long-Term Participation Incentive in Participatory Sensing,f989c413a1c10cec68960b99ac31cf68,http://arxiv.org/abs/1501.02480v2 12230," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",christos papadimitriou,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12231," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",stefano leonardi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12232," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",tim roughgarden,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12233," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",stefano turchetta,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 12234," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",alon eden,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 12235," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",michal feldman,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 12236," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",ophir friedler,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 12237," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",inbal talgam-cohen,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 12238," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",s. weinberg,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 12239," The security of the Bitcoin system is based on having a large amount of computational power in the hands of honest miners. Such miners are incentivized to join the system and validate transactions by the payments issued by the protocol to anyone who creates blocks. As new bitcoins creation rate decreases (halving every 4 years), the revenue derived from transaction fees start to have an increasingly important role. We argue that Bitcoin's current fee market does not extract revenue well when blocks are not congested. This effect has implications for the scalability debate: revenue from transaction fees may decrease if block size is increased. The current mechanism is a ""pay your bid"" auction in which included transactions pay the amount they suggested. We propose two alternative auction mechanisms: The Monopolistic Price Mechanism, and the Random Sampling Optimal Price Mechanism (due to Goldberg et al.). In the monopolistic price mechanism, the miner chooses the number of accepted transactions in the block, and all transactions pay exactly the smallest bid included in the block. The mechanism thus sets the block size dynamically (up to a bound required for fast block propagation and other security concerns). We show, using analysis and simulations, that this mechanism extracts revenue better from users, and that it is nearly incentive compatible: the profit due to strategic bidding relative to honest biding decreases as the number of bidders grows. Users can then simply set their bids truthfully to exactly the amount they are willing to pay to transact, and do not need to utilize fee estimate mechanisms, do not resort to bid shading and do not need to adjust transaction fees (via replace-by-fee mechanisms) if the mempool grows. We discuss these and other properties of our mechanisms, and explore various desired properties of fee market mechanisms for crypto-currencies. ",ron lavi,,2017.0,,arXiv,Lavi2017,True,,arXiv,Not available,Redesigning Bitcoin's fee market,9bcd5f353277a862147e3dc2d50fa94c,http://arxiv.org/abs/1709.08881v1 12240," The security of the Bitcoin system is based on having a large amount of computational power in the hands of honest miners. Such miners are incentivized to join the system and validate transactions by the payments issued by the protocol to anyone who creates blocks. As new bitcoins creation rate decreases (halving every 4 years), the revenue derived from transaction fees start to have an increasingly important role. We argue that Bitcoin's current fee market does not extract revenue well when blocks are not congested. This effect has implications for the scalability debate: revenue from transaction fees may decrease if block size is increased. The current mechanism is a ""pay your bid"" auction in which included transactions pay the amount they suggested. We propose two alternative auction mechanisms: The Monopolistic Price Mechanism, and the Random Sampling Optimal Price Mechanism (due to Goldberg et al.). In the monopolistic price mechanism, the miner chooses the number of accepted transactions in the block, and all transactions pay exactly the smallest bid included in the block. The mechanism thus sets the block size dynamically (up to a bound required for fast block propagation and other security concerns). We show, using analysis and simulations, that this mechanism extracts revenue better from users, and that it is nearly incentive compatible: the profit due to strategic bidding relative to honest biding decreases as the number of bidders grows. Users can then simply set their bids truthfully to exactly the amount they are willing to pay to transact, and do not need to utilize fee estimate mechanisms, do not resort to bid shading and do not need to adjust transaction fees (via replace-by-fee mechanisms) if the mempool grows. We discuss these and other properties of our mechanisms, and explore various desired properties of fee market mechanisms for crypto-currencies. ",or sattath,,2017.0,,arXiv,Lavi2017,True,,arXiv,Not available,Redesigning Bitcoin's fee market,9bcd5f353277a862147e3dc2d50fa94c,http://arxiv.org/abs/1709.08881v1 12241," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",michael schapira,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12242," The security of the Bitcoin system is based on having a large amount of computational power in the hands of honest miners. Such miners are incentivized to join the system and validate transactions by the payments issued by the protocol to anyone who creates blocks. As new bitcoins creation rate decreases (halving every 4 years), the revenue derived from transaction fees start to have an increasingly important role. We argue that Bitcoin's current fee market does not extract revenue well when blocks are not congested. This effect has implications for the scalability debate: revenue from transaction fees may decrease if block size is increased. The current mechanism is a ""pay your bid"" auction in which included transactions pay the amount they suggested. We propose two alternative auction mechanisms: The Monopolistic Price Mechanism, and the Random Sampling Optimal Price Mechanism (due to Goldberg et al.). In the monopolistic price mechanism, the miner chooses the number of accepted transactions in the block, and all transactions pay exactly the smallest bid included in the block. The mechanism thus sets the block size dynamically (up to a bound required for fast block propagation and other security concerns). We show, using analysis and simulations, that this mechanism extracts revenue better from users, and that it is nearly incentive compatible: the profit due to strategic bidding relative to honest biding decreases as the number of bidders grows. Users can then simply set their bids truthfully to exactly the amount they are willing to pay to transact, and do not need to utilize fee estimate mechanisms, do not resort to bid shading and do not need to adjust transaction fees (via replace-by-fee mechanisms) if the mempool grows. We discuss these and other properties of our mechanisms, and explore various desired properties of fee market mechanisms for crypto-currencies. ",aviv zohar,,2017.0,,arXiv,Lavi2017,True,,arXiv,Not available,Redesigning Bitcoin's fee market,9bcd5f353277a862147e3dc2d50fa94c,http://arxiv.org/abs/1709.08881v1 12243," An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an ""integrated"" wireless network access model that enables users to enjoy mobility, seamless access and high quality of service in an all-IP network on an ""Anytime, Anywhere"" basis. The term ""integrated"" is used to denote that the Future Internet wireless ""last mile"" is expected to comprise multiple heterogeneous geographically coexisting wireless networks, each having different capacity and coverage radius. The efficient management of the wireless access network resources is crucial due to their scarcity that renders wireless access a potential bottleneck for the provision of high quality services. In this paper we propose an auction mechanism for allocating the bandwidth of such a network so that efficiency is attained, i.e. social welfare is maximized. In particular, we propose an incentive-compatible, efficient auction-based mechanism of low computational complexity. We define a repeated game to address user utilities and incentives issues. Subsequently, we extend this mechanism so that it can also accommodate multicast sessions. We also analyze the computational complexity and message overhead of the proposed mechanism. We then show how user bids can be replaced from weights generated by the network and transform the auction to a cooperative mechanism capable of prioritizing certain classes of services and emulating DiffServ and time-of-day pricing schemes. The theoretical analysis is complemented by simulations that assess the proposed mechanisms properties and performance. We finally provide some concluding remarks and directions for future research. ",emmanouil dramitinos,,2010.0,,arXiv,Dramitinos2010,True,,arXiv,Not available,"Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet",d216f8395291d73be3f794b8248f3c63,http://arxiv.org/abs/1001.5194v1 12244," An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an ""integrated"" wireless network access model that enables users to enjoy mobility, seamless access and high quality of service in an all-IP network on an ""Anytime, Anywhere"" basis. The term ""integrated"" is used to denote that the Future Internet wireless ""last mile"" is expected to comprise multiple heterogeneous geographically coexisting wireless networks, each having different capacity and coverage radius. The efficient management of the wireless access network resources is crucial due to their scarcity that renders wireless access a potential bottleneck for the provision of high quality services. In this paper we propose an auction mechanism for allocating the bandwidth of such a network so that efficiency is attained, i.e. social welfare is maximized. In particular, we propose an incentive-compatible, efficient auction-based mechanism of low computational complexity. We define a repeated game to address user utilities and incentives issues. Subsequently, we extend this mechanism so that it can also accommodate multicast sessions. We also analyze the computational complexity and message overhead of the proposed mechanism. We then show how user bids can be replaced from weights generated by the network and transform the auction to a cooperative mechanism capable of prioritizing certain classes of services and emulating DiffServ and time-of-day pricing schemes. The theoretical analysis is complemented by simulations that assess the proposed mechanisms properties and performance. We finally provide some concluding remarks and directions for future research. ",isabelle lassous,,2010.0,,arXiv,Dramitinos2010,True,,arXiv,Not available,"Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet",d216f8395291d73be3f794b8248f3c63,http://arxiv.org/abs/1001.5194v1 12245," Device-to-Device (D2D) communication is a technology component for LTE-A. The existing researches allow D2D as an underlay to the cellular network to increase the spectral efficiency. In this book, D2D communication underlaying cellular networks is studied. Some physical-layer techniques and cross-layer optimization methods on resource management and interference avoidance are proposed and discussed. WINNER II channel models is applied to be the signal and interference model and simulation results show that the performance of D2D link is closely related to the distance between D2D transmitter and receiver and that between interference source and the receiver. Besides, by power control, D2D SINR degrades, which will naturally contribute to low interference to cellular communication. A simple mode selection method of D2D communication is introduced. Based on path-loss (PL) mode selection criterion, D2D gives better performance than traditional cellular system. When D2D pair is farther away from the BS, a better results can be obtained. Game theory, which offers a wide variety of analytical tools to study the complex interactions of players and predict their choices, can be used for power and radio resource management in D2D communication. A reverse iterative combinatorial auction is formulated as a mechanism to allocate the spectrum resources for D2D communications with multiple user pairs sharing the same channel. In addition, a game theoretic approach is developed to implement joint scheduling, power control and channel allocation for D2D communication. Finally, joint power and spectrum resource allocation method is studied under consideration of battery lifetime, which is an important application of D2D communication on increasing user's energy efficiency. The simulation results show that all these methods have beneficial effects on improving the system performance. ",chen xu,,2013.0,,arXiv,Xu2013,True,,arXiv,Not available,Resource Management for Device-to-Device Underlay Communication,7c020e45ea9afe517d2edf9c6a9a2fc4,http://arxiv.org/abs/1311.1018v1 12246," Device-to-Device (D2D) communication is a technology component for LTE-A. The existing researches allow D2D as an underlay to the cellular network to increase the spectral efficiency. In this book, D2D communication underlaying cellular networks is studied. Some physical-layer techniques and cross-layer optimization methods on resource management and interference avoidance are proposed and discussed. WINNER II channel models is applied to be the signal and interference model and simulation results show that the performance of D2D link is closely related to the distance between D2D transmitter and receiver and that between interference source and the receiver. Besides, by power control, D2D SINR degrades, which will naturally contribute to low interference to cellular communication. A simple mode selection method of D2D communication is introduced. Based on path-loss (PL) mode selection criterion, D2D gives better performance than traditional cellular system. When D2D pair is farther away from the BS, a better results can be obtained. Game theory, which offers a wide variety of analytical tools to study the complex interactions of players and predict their choices, can be used for power and radio resource management in D2D communication. A reverse iterative combinatorial auction is formulated as a mechanism to allocate the spectrum resources for D2D communications with multiple user pairs sharing the same channel. In addition, a game theoretic approach is developed to implement joint scheduling, power control and channel allocation for D2D communication. Finally, joint power and spectrum resource allocation method is studied under consideration of battery lifetime, which is an important application of D2D communication on increasing user's energy efficiency. The simulation results show that all these methods have beneficial effects on improving the system performance. ",lingyang song,,2013.0,,arXiv,Xu2013,True,,arXiv,Not available,Resource Management for Device-to-Device Underlay Communication,7c020e45ea9afe517d2edf9c6a9a2fc4,http://arxiv.org/abs/1311.1018v1 12247," Device-to-Device (D2D) communication is a technology component for LTE-A. The existing researches allow D2D as an underlay to the cellular network to increase the spectral efficiency. In this book, D2D communication underlaying cellular networks is studied. Some physical-layer techniques and cross-layer optimization methods on resource management and interference avoidance are proposed and discussed. WINNER II channel models is applied to be the signal and interference model and simulation results show that the performance of D2D link is closely related to the distance between D2D transmitter and receiver and that between interference source and the receiver. Besides, by power control, D2D SINR degrades, which will naturally contribute to low interference to cellular communication. A simple mode selection method of D2D communication is introduced. Based on path-loss (PL) mode selection criterion, D2D gives better performance than traditional cellular system. When D2D pair is farther away from the BS, a better results can be obtained. Game theory, which offers a wide variety of analytical tools to study the complex interactions of players and predict their choices, can be used for power and radio resource management in D2D communication. A reverse iterative combinatorial auction is formulated as a mechanism to allocate the spectrum resources for D2D communications with multiple user pairs sharing the same channel. In addition, a game theoretic approach is developed to implement joint scheduling, power control and channel allocation for D2D communication. Finally, joint power and spectrum resource allocation method is studied under consideration of battery lifetime, which is an important application of D2D communication on increasing user's energy efficiency. The simulation results show that all these methods have beneficial effects on improving the system performance. ",zhu han,,2013.0,,arXiv,Xu2013,True,,arXiv,Not available,Resource Management for Device-to-Device Underlay Communication,7c020e45ea9afe517d2edf9c6a9a2fc4,http://arxiv.org/abs/1311.1018v1 12248," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",kristoffer hansen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 12249," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",michal koucky,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 12250," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",niels lauritzen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 12251," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",peter miltersen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 12252," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",yaron singer,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12253," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",elias tsigaridas,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 12254," In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations. ",jonathan donier,,2015.0,10.1088/1742-5468/aa4e8e,arXiv,Donier2015,True,,arXiv,Not available,"From Walras' auctioneer to continuous time double auctions: A general dynamic theory of supply and demand",7a64809be5215b76462cff360e99b6e2,http://arxiv.org/abs/1506.03758v1 12255," In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations. ",jean-philippe bouchaud,,2015.0,10.1088/1742-5468/aa4e8e,arXiv,Donier2015,True,,arXiv,Not available,"From Walras' auctioneer to continuous time double auctions: A general dynamic theory of supply and demand",7a64809be5215b76462cff360e99b6e2,http://arxiv.org/abs/1506.03758v1 12256," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",stephane roux,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 12257," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",pierre lescanne,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 12258," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",rene vestergaard,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 12259," We consider the classical mathematical economics problem of {\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent's preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson '81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom '06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent's preference is given by multiple values for each of the multiple services available) [Manelli and Vincent '07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time. ",shuchi chawla,,2009.0,,arXiv,Chawla2009,True,,arXiv,Not available,Sequential Posted Pricing and Multi-parameter Mechanism Design,a66bceccbcab23a2d2218f8eb8202e69,http://arxiv.org/abs/0907.2435v2 12260," We consider the classical mathematical economics problem of {\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent's preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson '81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom '06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent's preference is given by multiple values for each of the multiple services available) [Manelli and Vincent '07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time. ",jason hartline,,2009.0,,arXiv,Chawla2009,True,,arXiv,Not available,Sequential Posted Pricing and Multi-parameter Mechanism Design,a66bceccbcab23a2d2218f8eb8202e69,http://arxiv.org/abs/0907.2435v2 12261," We consider the classical mathematical economics problem of {\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent's preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson '81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom '06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent's preference is given by multiple values for each of the multiple services available) [Manelli and Vincent '07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time. ",david malec,,2009.0,,arXiv,Chawla2009,True,,arXiv,Not available,Sequential Posted Pricing and Multi-parameter Mechanism Design,a66bceccbcab23a2d2218f8eb8202e69,http://arxiv.org/abs/0907.2435v2 12262," We consider the classical mathematical economics problem of {\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent's preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson '81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom '06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent's preference is given by multiple values for each of the multiple services available) [Manelli and Vincent '07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time. ",balasubramanian sivan,,2009.0,,arXiv,Chawla2009,True,,arXiv,Not available,Sequential Posted Pricing and Multi-parameter Mechanism Design,a66bceccbcab23a2d2218f8eb8202e69,http://arxiv.org/abs/0907.2435v2 12263," The Generalized Second Price auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction under various equilibrium concepts. In particular, we demonstrate that the Bayesian Price of Anarchy is at most $2(1-1/e)^{-1} \approx 3.16$, significantly improving upon previously known bounds. Our techniques are intuitively straightforward and extend in a number of ways. For one, our result extends to a bound on the performance of GSP at coarse correlated equilibria, which captures (for example) a repeated-auction setting in which agents apply regret-minimizing bidding strategies. In addition, our analysis is robust against the presence of byzantine agents who cannot be assumed to participate rationally. Additionally, we present tight bounds for the social welfare obtained at pure NE for the special case of an auction for 3 slots, and discuss potential methods for extending this analysis to an arbitrary number of slots. ",brendan lucier,,2010.0,,arXiv,Lucier2010,True,,arXiv,Not available,Improved Social Welfare Bounds for GSP at Equilibrium,9d5226b9c0cb03597ca7881d44193871,http://arxiv.org/abs/1011.3268v1 12264," We examine perfect information stochastic mean-payoff games - a class of games containing as special sub-classes the usual mean-payoff games and parity games. We show that deterministic memoryless strategies that are optimal for discounted games with state-dependent discount factors close to 1 are optimal for priority mean-payoff games establishing a strong link between these two classes. ",hugo gimbert,,2010.0,10.4204/EPTCS.25.5,"EPTCS 25, 2010, pp. 7-21",Gimbert2010,True,,arXiv,Not available,Blackwell-Optimal Strategies in Priority Mean-Payoff Games,2b28541db7ba6b9614000b9ad2f71df3,http://arxiv.org/abs/1006.1402v1 12265," We examine perfect information stochastic mean-payoff games - a class of games containing as special sub-classes the usual mean-payoff games and parity games. We show that deterministic memoryless strategies that are optimal for discounted games with state-dependent discount factors close to 1 are optimal for priority mean-payoff games establishing a strong link between these two classes. ",wieslaw zielonka,,2010.0,10.4204/EPTCS.25.5,"EPTCS 25, 2010, pp. 7-21",Gimbert2010,True,,arXiv,Not available,Blackwell-Optimal Strategies in Priority Mean-Payoff Games,2b28541db7ba6b9614000b9ad2f71df3,http://arxiv.org/abs/1006.1402v1 12266," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",elchanan mossel,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12267," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",christos papadimitriou,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12268," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",michael schapira,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12269," The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits. ",yaron singer,,2009.0,,arXiv,Mossel2009,True,,arXiv,Not available,"VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension",ae48fff96663b7d3d47aa14c4fc20182,http://arxiv.org/abs/0905.1995v1 12270," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",yang zhang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12271," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",dusit niyato,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12272," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",ping wang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12273," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",alon eden,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 12274," The Generalized Second Price auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction under various equilibrium concepts. In particular, we demonstrate that the Bayesian Price of Anarchy is at most $2(1-1/e)^{-1} \approx 3.16$, significantly improving upon previously known bounds. Our techniques are intuitively straightforward and extend in a number of ways. For one, our result extends to a bound on the performance of GSP at coarse correlated equilibria, which captures (for example) a repeated-auction setting in which agents apply regret-minimizing bidding strategies. In addition, our analysis is robust against the presence of byzantine agents who cannot be assumed to participate rationally. Additionally, we present tight bounds for the social welfare obtained at pure NE for the special case of an auction for 3 slots, and discuss potential methods for extending this analysis to an arbitrary number of slots. ",renato leme,,2010.0,,arXiv,Lucier2010,True,,arXiv,Not available,Improved Social Welfare Bounds for GSP at Equilibrium,9d5226b9c0cb03597ca7881d44193871,http://arxiv.org/abs/1011.3268v1 12275," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",michal feldman,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 12276," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",adi vardi,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 12277," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",maja rudolph,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 12278," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",joseph ellis,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 12279," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",david blei,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 12280," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",jonathan weed,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 12281," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",vianney perchet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 12282," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",philippe rigollet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 12283," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",sumanth sudeendra,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 12284," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",megha saini,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 12285," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",vineet abhishek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 12286," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",shrisha rao,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 12287," With spectrum auctions as our prime motivation, in this paper we analyze combinatorial auctions where agents' valuations exhibit complementarities. Assuming that the agents only value bundles of size at most $k$ and also assuming that we can assess prices, we present a mechanism that is efficient, approximately envy-free, asymptotically strategy-proof and that has polynomial-time complexity. Modifying an iterative rounding procedure from assignment problems, we use the primal and dual optimal solutions to the linear programming relaxation of the auction problem to construct a lottery for the allocations and to assess the prices to bundles. The allocations in the lottery over-allocate goods by at most $k-1$ units, and the dual prices are shown to be (approximately) envy-free irrespective of the allocation chosen. We conclude with a detailed numerical investigation of a specific spectrum allocation problem. ",dengwang tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Approximately Envy-Free Spectrum Allocation with Complementarities,862505c6a6807e294532306a7e1ba66b,http://arxiv.org/abs/1606.01457v1 12288," With spectrum auctions as our prime motivation, in this paper we analyze combinatorial auctions where agents' valuations exhibit complementarities. Assuming that the agents only value bundles of size at most $k$ and also assuming that we can assess prices, we present a mechanism that is efficient, approximately envy-free, asymptotically strategy-proof and that has polynomial-time complexity. Modifying an iterative rounding procedure from assignment problems, we use the primal and dual optimal solutions to the linear programming relaxation of the auction problem to construct a lottery for the allocations and to assess the prices to bundles. The allocations in the lottery over-allocate goods by at most $k-1$ units, and the dual prices are shown to be (approximately) envy-free irrespective of the allocation chosen. We conclude with a detailed numerical investigation of a specific spectrum allocation problem. ",vijay subramanian,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Approximately Envy-Free Spectrum Allocation with Complementarities,862505c6a6807e294532306a7e1ba66b,http://arxiv.org/abs/1606.01457v1 12289," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",reihaneh hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 12290," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",ali movaghar,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 12291," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",hamid hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 12292," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",mireille bossy,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 12293," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",nadia maizi,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 12294," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",odile pourtallier,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 12295," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",tony luo,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 12296," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",bruce hajek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 12297," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",salil kanhere,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 12298," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",jianwei huang,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 12299," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",sajal das,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 12300," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",fan wu,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 12301," Stochastic games are a classical model in game theory in which two opponents interact over a finite set of states that change stochastically over time. The two central solution concepts for these games are the discounted values and the limit values. Efficiently computing these values is an important problem in game theory. In this paper, we describe new algorithms for computing them, which run in polynomial time for any fixed number of states, and which considerably improve the dependence on the number of states given by Hansen, Koucky, Lauritzen, Miltersen and Tsigaridas (STOC 2011). ",miquel oliu-barton,,2018.0,,arXiv,Oliu-Barton2018,True,,arXiv,Not available,New complexity bounds in stochastic games,eb6b9ed0ff396819f26b1a244daa0030,http://arxiv.org/abs/1810.13019v1 12302," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The paper presents the history and basic ideas of quantum game theory. Description of Giffen paradoxes in this new formalism is discussed. ",j. sladkowski,,2002.0,10.1016/S0378-4371(02)01859-9,"Physica A324:234-240,2003",Sladkowski2002,True,,arXiv,Not available,Giffen paradoxes in quantum market games,47a970f9ad68aeb4bcd9f1241d2c143b,http://arxiv.org/abs/cond-mat/0211083v1 12303," Amazons is a board game which combines elements of Chess and Go. It has become popular in recent years, and has served as a useful platform for both game-theoretic study and AI games research. Buro showed that simple Amazons endgames are NP-equivalent, leaving the complexity of the general case as an open problem. We settle this problem, by showing that deciding the outcome of an n x n Amazons position is PSPACE-hard. We give a reduction from one of the PSPACE-complete two-player formula games described by Schaefer. Since the number of moves in an Amazons game is polynomially bounded (unlike Chess and Go), Amazons is in PSPACE. It is thus on a par with other two-player, bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our construction also provides an alternate proof that simple Amazons endgames are NP-equivalent. Our reduction uses a number of amazons polynomial in the input formula length; a remaining open problem is the complexity of Amazons when only a constant number of amazons is used. ",robert hearn,,2005.0,,arXiv,Hearn2005,True,,arXiv,Not available,Amazons is PSPACE-complete,1e55e24e6da705772640dbbf1ad34bc0,http://arxiv.org/abs/cs/0502013v1 12304," In this expository paper we illustrate the generality of game theoretic probability protocols of Shafer and Vovk (2001) in finite-horizon discrete games. By restricting ourselves to finite-horizon discrete games, we can explicitly describe how discrete distributions with finite support and the discrete pricing formulas, such as the Cox-Ross-Rubinstein formula, are naturally derived from game-theoretic probability protocols. Corresponding to any discrete distribution with finite support, we construct a finite-horizon discrete game, a replicating strategy of Skeptic, and a neutral forecasting strategy of Forecaster, such that the discrete distribution is derived from the game. Construction of a replicating strategy is the same as in the standard arbitrage arguments of pricing European options in the binomial tree models. However the game theoretic framework is advantageous because no a priori probabilistic assumption is needed. ",akimichi takemura,,2005.0,,"J. Japan Statist. Soc., Vol.37, No.1, 2007, 87-104",Takemura2005,True,,arXiv,Not available,"Game theoretic derivation of discrete distributions and discrete pricing formulas",3b19e70897b36eb372690886014e6abb,http://arxiv.org/abs/math/0509367v1 12305," In this expository paper we illustrate the generality of game theoretic probability protocols of Shafer and Vovk (2001) in finite-horizon discrete games. By restricting ourselves to finite-horizon discrete games, we can explicitly describe how discrete distributions with finite support and the discrete pricing formulas, such as the Cox-Ross-Rubinstein formula, are naturally derived from game-theoretic probability protocols. Corresponding to any discrete distribution with finite support, we construct a finite-horizon discrete game, a replicating strategy of Skeptic, and a neutral forecasting strategy of Forecaster, such that the discrete distribution is derived from the game. Construction of a replicating strategy is the same as in the standard arbitrage arguments of pricing European options in the binomial tree models. However the game theoretic framework is advantageous because no a priori probabilistic assumption is needed. ",taiji suzuki,,2005.0,,"J. Japan Statist. Soc., Vol.37, No.1, 2007, 87-104",Takemura2005,True,,arXiv,Not available,"Game theoretic derivation of discrete distributions and discrete pricing formulas",3b19e70897b36eb372690886014e6abb,http://arxiv.org/abs/math/0509367v1 12306," Quantum game theory offers a lot of interesting questions, and it is relevant to use the quantum information theory to resolve or improve games with lack of information : how to use the power of quantum entanglement to show the superiority of a quantum player that is allowed to use quantum mechanics versus a classical player, how to use quantum communication properties in cooperative games ... But games are also useful to make notions easier to understand, and permit to apprehend easier new ways of reasoning. The objective of this work is to formalize and to study a simple game with qubits using quantum notions of measurement and superposition but keeping a simple formalism so that knowing quantum mechanics is not necessary to play the game. We solve a quantum combinatorial game by giving a winning strategy for it. We also propose a quantisation of a family of combinatorial games. ",sylvain gravier,,2003.0,,arXiv,Gravier2003,True,,arXiv,Not available,Let us play with qubits,78e8966839f3e36b02a3a17fbadb1862,http://arxiv.org/abs/quant-ph/0311018v1 12307," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",steven williams,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 12308," Quantum game theory offers a lot of interesting questions, and it is relevant to use the quantum information theory to resolve or improve games with lack of information : how to use the power of quantum entanglement to show the superiority of a quantum player that is allowed to use quantum mechanics versus a classical player, how to use quantum communication properties in cooperative games ... But games are also useful to make notions easier to understand, and permit to apprehend easier new ways of reasoning. The objective of this work is to formalize and to study a simple game with qubits using quantum notions of measurement and superposition but keeping a simple formalism so that knowing quantum mechanics is not necessary to play the game. We solve a quantum combinatorial game by giving a winning strategy for it. We also propose a quantisation of a family of combinatorial games. ",philippe jorrand,,2003.0,,arXiv,Gravier2003,True,,arXiv,Not available,Let us play with qubits,78e8966839f3e36b02a3a17fbadb1862,http://arxiv.org/abs/quant-ph/0311018v1 12309," Quantum game theory offers a lot of interesting questions, and it is relevant to use the quantum information theory to resolve or improve games with lack of information : how to use the power of quantum entanglement to show the superiority of a quantum player that is allowed to use quantum mechanics versus a classical player, how to use quantum communication properties in cooperative games ... But games are also useful to make notions easier to understand, and permit to apprehend easier new ways of reasoning. The objective of this work is to formalize and to study a simple game with qubits using quantum notions of measurement and superposition but keeping a simple formalism so that knowing quantum mechanics is not necessary to play the game. We solve a quantum combinatorial game by giving a winning strategy for it. We also propose a quantisation of a family of combinatorial games. ",mehdi mhalla,,2003.0,,arXiv,Gravier2003,True,,arXiv,Not available,Let us play with qubits,78e8966839f3e36b02a3a17fbadb1862,http://arxiv.org/abs/quant-ph/0311018v1 12310," Quantum game theory offers a lot of interesting questions, and it is relevant to use the quantum information theory to resolve or improve games with lack of information : how to use the power of quantum entanglement to show the superiority of a quantum player that is allowed to use quantum mechanics versus a classical player, how to use quantum communication properties in cooperative games ... But games are also useful to make notions easier to understand, and permit to apprehend easier new ways of reasoning. The objective of this work is to formalize and to study a simple game with qubits using quantum notions of measurement and superposition but keeping a simple formalism so that knowing quantum mechanics is not necessary to play the game. We solve a quantum combinatorial game by giving a winning strategy for it. We also propose a quantisation of a family of combinatorial games. ",charles payan,,2003.0,,arXiv,Gravier2003,True,,arXiv,Not available,Let us play with qubits,78e8966839f3e36b02a3a17fbadb1862,http://arxiv.org/abs/quant-ph/0311018v1 12311," We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox. ",s. perlaza,,2009.0,,arXiv,Perlaza2009,True,,arXiv,Not available,"On the Base Station Selection and Base Station Sharing in Self-Configuring Networks",c4e0dd817d56c3bd6e1c7d7d6247778f,http://arxiv.org/abs/0908.1667v1 12312," We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox. ",e. belmega,,2009.0,,arXiv,Perlaza2009,True,,arXiv,Not available,"On the Base Station Selection and Base Station Sharing in Self-Configuring Networks",c4e0dd817d56c3bd6e1c7d7d6247778f,http://arxiv.org/abs/0908.1667v1 12313," We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox. ",s. lasaulce,,2009.0,,arXiv,Perlaza2009,True,,arXiv,Not available,"On the Base Station Selection and Base Station Sharing in Self-Configuring Networks",c4e0dd817d56c3bd6e1c7d7d6247778f,http://arxiv.org/abs/0908.1667v1 12314," We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox. ",m. debbah,,2009.0,,arXiv,Perlaza2009,True,,arXiv,Not available,"On the Base Station Selection and Base Station Sharing in Self-Configuring Networks",c4e0dd817d56c3bd6e1c7d7d6247778f,http://arxiv.org/abs/0908.1667v1 12315," The solution of parity games over pushdown graphs (Walukiewicz '96) was the first step towards an effective theory of infinite-state games. It was shown that winning strategies for pushdown games can be implemented again as pushdown automata. We continue this study and investigate the connection between game presentations and winning strategies in altogether six cases of game arenas, among them realtime pushdown systems, visibly pushdown systems, and counter systems. In four cases we show by a uniform proof method that we obtain strategies implementable by the same type of pushdown machine as given in the game arena. We prove that for the two remaining cases this correspondence fails. In the conclusion we address the question of an abstract criterion that explains the results. ",wladimir fridman,,2010.0,10.4204/EPTCS.25.14,"EPTCS 25, 2010, pp. 132-145",Fridman2010,True,,arXiv,Not available,Formats of Winning Strategies for Six Types of Pushdown Games,e60dc61b9a2475af224ae3844c723e08,http://arxiv.org/abs/1006.1415v1 12316," In a recent paper, Junge and Palazuelos presented two two-player games exhibiting interesting properties. In their first game, entangled players can perform notably better than classical players. The quantitative gap between the two cases is remarkably large, especially as a function of the number of inputs to the players. In their second game, entangled players can perform notably better than players that are restricted to using a maximally entangled state (of arbitrary dimension). This was the first game exhibiting such a behavior. The analysis of both games is heavily based on non-trivial results from Banach space theory and operator space theory. Here we present two games exhibiting a similar behavior, but with proofs that are arguably simpler, using elementary probabilistic techniques and standard quantum information arguments. Our games also give better quantitative bounds. ",oded regev,,2011.0,,arXiv,Regev2011,True,,arXiv,Not available,Bell Violations through Independent Bases Games,ddafa37e7218c10aa99287399282ab10,http://arxiv.org/abs/1101.0576v3 12317," A correlated equilibrium is a fundamental solution concept in game theory that enjoys many desirable properties. However, it requires a trusted mediator, which is a major drawback in many practical applications. A computational solution to this problem was proposed by Dodis, Halevi and Rabin. They extended the original game by adding an initial communication stage and showed that any correlated strategy for 2-player games can be achieved, provided that the players are computationally bounded. In this paper, we show that if the players can communicate via a quantum channel before the game, then any correlated equilibrium for 2-player games can be achieved, without a trusted mediator and unconditionally. This provides another example of a major advantage of quantum information processing. More precisely, we prove that for any correlated equilibrium p of a strategic game G, there exists an extended game (with a quantum communication initial stage) Q with an efficiently computable approximate Nash equilibrium q, such that the expected payoff for both players in q is at least as high as in p. The main cryptographic tool used in the construction is the quantum weak coin flipping protocol of Mochon. ",iordanis kerenidis,,2011.0,,arXiv,Kerenidis2011,True,,arXiv,Not available,"A quantum protocol for sampling correlated equilibria unconditionally and without a mediator",1a1cbfc5b72a9295f16b46ae948345ff,http://arxiv.org/abs/1104.1770v1 12318," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",yuval emek,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 12319," A correlated equilibrium is a fundamental solution concept in game theory that enjoys many desirable properties. However, it requires a trusted mediator, which is a major drawback in many practical applications. A computational solution to this problem was proposed by Dodis, Halevi and Rabin. They extended the original game by adding an initial communication stage and showed that any correlated strategy for 2-player games can be achieved, provided that the players are computationally bounded. In this paper, we show that if the players can communicate via a quantum channel before the game, then any correlated equilibrium for 2-player games can be achieved, without a trusted mediator and unconditionally. This provides another example of a major advantage of quantum information processing. More precisely, we prove that for any correlated equilibrium p of a strategic game G, there exists an extended game (with a quantum communication initial stage) Q with an efficiently computable approximate Nash equilibrium q, such that the expected payoff for both players in q is at least as high as in p. The main cryptographic tool used in the construction is the quantum weak coin flipping protocol of Mochon. ",shengyu zhang,,2011.0,,arXiv,Kerenidis2011,True,,arXiv,Not available,"A quantum protocol for sampling correlated equilibria unconditionally and without a mediator",1a1cbfc5b72a9295f16b46ae948345ff,http://arxiv.org/abs/1104.1770v1 12320," We propose a new interpretation of the strange phenomena that some authors have observed about the Wald game. This interpretation is possible thanks to the new language of \emph{loadings} that Morrison and the author have introduced in a previous work. Using the theory of loadings and allowed strategies, we are also able to prove that Wald's game admits a \emph{natural} solution and, as one can expect, the game turns out to be fair for this solution. As a technical tool, we introduce the notion of \emph{embedding a game into another game} that could be of interest from a theoretical point of view. \emph{En passant} we find a very easy example of a game which is loadable in infinitely many different ways. ",valerio capraro,,2011.0,,arXiv,Capraro2011,True,,arXiv,Not available,Solution of Wald's game using loadings and allowed strategies,ed78db6936712e908a32e1a9ab4a1eea,http://arxiv.org/abs/1106.3679v2 12321," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",renato leme,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 12322," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",vasilis syrgkanis,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 12323," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",eva tardos,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 12324," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",thomas nedelec,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12325," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",marc abeille,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12326," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",clement calauzenes,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12327," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",noureddine karoui,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12328," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",benjamin heymann,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12329," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",michal feldman,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 12330," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",vianney perchet,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 12331," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",maria-florina balcan,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 12332," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",tuomas sandholm,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 12333," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",ellen vitercik,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 12334," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",sayan bhattacharya,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 12335," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",janardhan kulkarni,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 12336," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",xiaoming xu,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 12337," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",di he,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 12338," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",wei chen,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 12339," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",liwei wang,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 12340," Providing an adequate long-term participation incentive is important for a participatory sensing system to maintain enough number of active users (sensors), so as to collect a sufficient number of data samples and support a desired level of service quality. In this work, we consider the sensor selection problem in a general time-dependent and location-aware participatory sensing system, taking the long-term user participation incentive into explicit consideration. We study the problem systematically under different information scenarios, regarding both future information and current information (realization). In particular, we propose a Lyapunov-based VCG auction policy for the on-line sensor selection, which converges asymptotically to the optimal off-line benchmark performance, even with no future information and under (current) information asymmetry. Extensive numerical results show that our proposed policy outperforms the state-of-art policies in the literature, in terms of both user participation (e.g., reducing the user dropping probability by 25% to 90%) and social performance (e.g., increasing the social welfare by 15% to 80%). ",fen hou,,2015.0,10.1109/INFOCOM.2015.7218673,arXiv,Gao2015,True,,arXiv,Not available,Providing Long-Term Participation Incentive in Participatory Sensing,f989c413a1c10cec68960b99ac31cf68,http://arxiv.org/abs/1501.02480v2 12341," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",iftah gamzu,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 12342," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",tie-yan liu,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 12343," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12344," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",hu fu,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12345," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",robert kleinberg,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12346," We develop extensions to auction theory results that are useful in real life scenarios. 1. Since valuations are generally positive we first develop approximations using the log-normal distribution. This would be useful for many finance related auction settings since asset prices are usually non-negative. 2. We formulate a positive symmetric discrete distribution, which is likely to be followed by the total number of auction participants, and incorporate this into auction theory results. 3. We develop extensions when the valuations of the bidders are interdependent and incorporate all the results developed into a final combined realistic setting. 4. Our methods can be a practical tool for bidders and auction sellers to maximize their profits. The models developed here could be potentially useful for inventory estimation and for wholesale procurement of financial instruments and also non-financial commodities. All the propositions are new results and they refer to existing results which are stated as Lemmas. ",ravi kashyap,,2018.0,10.1016/j.rie.2018.09.001,arXiv,Kashyap2018,True,,arXiv,Not available,Auction Theory Extensions for Real Life Applications,782c5cfe7c66113e160469ab1e1f98de,http://arxiv.org/abs/1810.01736v1 12347," We present different versions of a conjecture which would express that first price mechanisms never work very badly in a very general class of problems. The definitions include most of the problems where there is a principal (seller) who has the right to exclude others from the game. The exact definitions are motivated by the ""first price mechanism"" in E Cs: ""Efficient Teamwork"", but the conjecture is relevant for most auction problems, e.g. for combinatorial auctions. ",endre csoka,,2015.0,,arXiv,Csóka2015,True,,arXiv,Not available,A conjecture about the efficiency of first price mechanisms,4a6ef1a4215680da45f9622a67dd0d72,http://arxiv.org/abs/1508.03651v3 12348," A standard result from auction theory is that bidding truthfully in a second price auction is a weakly dominant strategy, or, in the language of digital advertising, 'the cost per mille (eCPM) is equal to the click through rate (CTR) times the cost per clicks (CPC)'. However, such assertion is incorrect if the buyers are subject to ROI constraints. More generally, several predictions derived by the traditional auction theory literature fail to apply. This is what I propose to discuss in this article. I formalize the notion of ROI constrained auctions and derive a Nash equilibrium for second price auctions. I then extend this result to any combination of first and second price payment rules and do an asymptotic analysis of the equilibrium as the number of bidders increases. Further I expose a revenue equivalence property, and finish with a proposal for a dynamic extension of the bidder ROI constrained optimization problem. ",benamin heymann,,2018.0,,arXiv,Heymann2018,True,,arXiv,Not available,ROI constrained Auctions,ea30776161bd25310cf171082853a0f9,http://arxiv.org/abs/1809.08837v1 12352," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",renato leme,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 12353," Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2^n-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper-surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2^n-1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret-matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion. ",mohamad charafeddine,,2010.0,,arXiv,Charafeddine2010,True,,arXiv,Not available,"Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference as Noise",84bcb467638a14ecb099b88f8f4026cc,http://arxiv.org/abs/1008.3608v1 12354," Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2^n-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper-surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2^n-1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret-matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion. ",zhu han,,2010.0,,arXiv,Charafeddine2010,True,,arXiv,Not available,"Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference as Noise",84bcb467638a14ecb099b88f8f4026cc,http://arxiv.org/abs/1008.3608v1 12355," Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2^n-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper-surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2^n-1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret-matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion. ",arogyaswami paulraj,,2010.0,,arXiv,Charafeddine2010,True,,arXiv,Not available,"Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference as Noise",84bcb467638a14ecb099b88f8f4026cc,http://arxiv.org/abs/1008.3608v1 12356," Treating the interference as noise in the n-user interference channel, the paper describes a novel approach to the rates region, composed by the time-sharing convex hull of 2^n-1 corner points achieved through On/Off binary power control. The resulting rates region is denoted crystallized rates region. By treating the interference as noise, the n-user rates region frontiers has been found in the literature to be the convex hull of n hyper-surfaces. The rates region bounded by these hyper-surfaces is not necessarily convex, and thereby a convex hull operation is imposed through the strategy of time-sharing. This paper simplifies this rates region in the n-dimensional space by having only an On/Off binary power control. This consequently leads to 2^n-1 corner points situated within the rates region. A time-sharing convex hull is imposed onto those corner points, forming the crystallized rates region. The paper focuses on game theoretic concepts to achieve that crystallized convex hull via correlated equilibrium. In game theory, the correlated equilibrium set is convex, and it consists of the time-sharing mixed strategies of the Nash equilibriums. In addition, the paper considers a mechanism design approach to carefully design a utility function, particularly the Vickrey-Clarke-Groves auction utility, where the solution point is situated on the correlated equilibrium set. Finally, the paper proposes a self learning algorithm, namely the regret-matching algorithm, that converges to the solution point on the correlated equilibrium set in a distributed fashion. ",john cioffi,,2010.0,,arXiv,Charafeddine2010,True,,arXiv,Not available,"Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference as Noise",84bcb467638a14ecb099b88f8f4026cc,http://arxiv.org/abs/1008.3608v1 12357," It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of- Service (QoS) is achievable via direct transmission. An incentivebased auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object secondprice auction is studied for cooperative partner selection in singlecarrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users. ",amitav mukherjee,,2010.0,,arXiv,Mukherjee2010,True,,arXiv,Not available,"General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks",89577886668403404475f52b4d21fdee,http://arxiv.org/abs/1008.3199v1 12358," It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of- Service (QoS) is achievable via direct transmission. An incentivebased auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object secondprice auction is studied for cooperative partner selection in singlecarrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users. ",hyuck kwon,,2010.0,,arXiv,Mukherjee2010,True,,arXiv,Not available,"General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks",89577886668403404475f52b4d21fdee,http://arxiv.org/abs/1008.3199v1 12359," An abstraction of normal form games is proposed, called Feasibility/Desirability Games (or FD Games in short). FD Games can be seen from three points of view: as a new presentation of games in which Nash equilibria can be found, as choice models in microeconomics or as a model of evolution in games. ",pierre lescanne,,2009.0,,arXiv,Lescanne2009,True,,arXiv,Not available,"Feasibility/Desirability Games for Normal Form Games, Choice Models and Evolutionary Games",fb6e0d914e8a0bad0d7f29d2e021afec,http://arxiv.org/abs/0907.5469v1 12360," Auctions in which agents' payoffs are random variables have received increased attention in recent years. In particular, recent work in algorithmic mechanism design has produced mechanisms employing internal randomization, partly in response to limitations on deterministic mechanisms imposed by computational complexity. For many of these mechanisms, which are often referred to as truthful-in-expectation, incentive compatibility is contingent on the assumption that agents are risk-neutral. These mechanisms have been criticized on the grounds that this assumption is too strong, because ""real"" agents are typically risk averse, and moreover their precise attitude towards risk is typically unknown a-priori. In response, researchers in algorithmic mechanism design have sought the design of universally-truthful mechanisms --- mechanisms for which incentive-compatibility makes no assumptions regarding agents' attitudes towards risk. We show that any truthful-in-expectation mechanism can be generically transformed into a mechanism that is incentive compatible even when agents are risk averse, without modifying the mechanism's allocation rule. The transformed mechanism does not require reporting of agents' risk profiles. Equivalently, our result can be stated as follows: Every (randomized) allocation rule that is implementable in dominant strategies when players are risk neutral is also implementable when players are endowed with an arbitrary and unknown concave utility function for money. ",shaddin dughmi,,2012.0,,arXiv,Dughmi2012,True,,arXiv,Not available,"Mechanisms for Risk Averse Agents, Without Loss",34312f7d4bd96da9ab65952eb6677893,http://arxiv.org/abs/1206.2957v1 12361," Auctions in which agents' payoffs are random variables have received increased attention in recent years. In particular, recent work in algorithmic mechanism design has produced mechanisms employing internal randomization, partly in response to limitations on deterministic mechanisms imposed by computational complexity. For many of these mechanisms, which are often referred to as truthful-in-expectation, incentive compatibility is contingent on the assumption that agents are risk-neutral. These mechanisms have been criticized on the grounds that this assumption is too strong, because ""real"" agents are typically risk averse, and moreover their precise attitude towards risk is typically unknown a-priori. In response, researchers in algorithmic mechanism design have sought the design of universally-truthful mechanisms --- mechanisms for which incentive-compatibility makes no assumptions regarding agents' attitudes towards risk. We show that any truthful-in-expectation mechanism can be generically transformed into a mechanism that is incentive compatible even when agents are risk averse, without modifying the mechanism's allocation rule. The transformed mechanism does not require reporting of agents' risk profiles. Equivalently, our result can be stated as follows: Every (randomized) allocation rule that is implementable in dominant strategies when players are risk neutral is also implementable when players are endowed with an arbitrary and unknown concave utility function for money. ",yuval peres,,2012.0,,arXiv,Dughmi2012,True,,arXiv,Not available,"Mechanisms for Risk Averse Agents, Without Loss",34312f7d4bd96da9ab65952eb6677893,http://arxiv.org/abs/1206.2957v1 12362," Planned experiments are the gold standard in reliably comparing the causal effect of switching from a baseline policy to a new policy. One critical shortcoming of classical experimental methods, however, is that they typically do not take into account the dynamic nature of response to policy changes. For instance, in an experiment where we seek to understand the effects of a new ad pricing policy on auction revenue, agents may adapt their bidding in response to the experimental pricing changes. Thus, causal effects of the new pricing policy after such adaptation period, the {\em long-term causal effects}, are not captured by the classical methodology even though they clearly are more indicative of the value of the new policy. Here, we formalize a framework to define and estimate long-term causal effects of policy changes in multiagent economies. Central to our approach is behavioral game theory, which we leverage to formulate the ignorability assumptions that are necessary for causal inference. Under such assumptions we estimate long-term causal effects through a latent space approach, where a behavioral model of how agents act conditional on their latent behaviors is combined with a temporal model of how behaviors evolve over time. ",panagiotis panagiotis,,2015.0,,arXiv,Panagiotis2015,True,,arXiv,Not available,Long-term causal effects via behavioral game theory,62fbc44c9448b0eedf682ed5666578f7,http://arxiv.org/abs/1501.02315v8 12363," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",moshe tennenholtz,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 12364," Planned experiments are the gold standard in reliably comparing the causal effect of switching from a baseline policy to a new policy. One critical shortcoming of classical experimental methods, however, is that they typically do not take into account the dynamic nature of response to policy changes. For instance, in an experiment where we seek to understand the effects of a new ad pricing policy on auction revenue, agents may adapt their bidding in response to the experimental pricing changes. Thus, causal effects of the new pricing policy after such adaptation period, the {\em long-term causal effects}, are not captured by the classical methodology even though they clearly are more indicative of the value of the new policy. Here, we formalize a framework to define and estimate long-term causal effects of policy changes in multiagent economies. Central to our approach is behavioral game theory, which we leverage to formulate the ignorability assumptions that are necessary for causal inference. Under such assumptions we estimate long-term causal effects through a latent space approach, where a behavioral model of how agents act conditional on their latent behaviors is combined with a temporal model of how behaviors evolve over time. ",toulis toulis,,2015.0,,arXiv,Panagiotis2015,True,,arXiv,Not available,Long-term causal effects via behavioral game theory,62fbc44c9448b0eedf682ed5666578f7,http://arxiv.org/abs/1501.02315v8 12365," Planned experiments are the gold standard in reliably comparing the causal effect of switching from a baseline policy to a new policy. One critical shortcoming of classical experimental methods, however, is that they typically do not take into account the dynamic nature of response to policy changes. For instance, in an experiment where we seek to understand the effects of a new ad pricing policy on auction revenue, agents may adapt their bidding in response to the experimental pricing changes. Thus, causal effects of the new pricing policy after such adaptation period, the {\em long-term causal effects}, are not captured by the classical methodology even though they clearly are more indicative of the value of the new policy. Here, we formalize a framework to define and estimate long-term causal effects of policy changes in multiagent economies. Central to our approach is behavioral game theory, which we leverage to formulate the ignorability assumptions that are necessary for causal inference. Under such assumptions we estimate long-term causal effects through a latent space approach, where a behavioral model of how agents act conditional on their latent behaviors is combined with a temporal model of how behaviors evolve over time. ",david parkes,,2015.0,,arXiv,Panagiotis2015,True,,arXiv,Not available,Long-term causal effects via behavioral game theory,62fbc44c9448b0eedf682ed5666578f7,http://arxiv.org/abs/1501.02315v8 12366," Internet search companies sell advertisement slots based on users' search queries via an auction. Advertisers have to determine how to place bids on the keywords of their interest in order to maximize their return for a given budget: this is the budget optimization problem. The solution depends on the distribution of future queries. In this paper, we formulate stochastic versions of the budget optimization problem based on natural probabilistic models of distribution over future queries, and address two questions that arise. [Evaluation] Given a solution, can we evaluate the expected value of the objective function? [Optimization] Can we find a solution that maximizes the objective function in expectation? Our main results are approximation and complexity results for these two problems in our three stochastic models. In particular, our algorithmic results show that simple prefix strategies that bid on all cheap keywords up to some level are either optimal or good approximations for many cases; we show other cases to be NP-hard. ",s. muthukrishnan,,2006.0,,arXiv,Muthukrishnan2006,True,,arXiv,Not available,Stochastic Models for Budget Optimization in Search-Based Advertising,7655f40d013165bf11d93b2e96785703,http://arxiv.org/abs/cs/0612072v2 12367," Internet search companies sell advertisement slots based on users' search queries via an auction. Advertisers have to determine how to place bids on the keywords of their interest in order to maximize their return for a given budget: this is the budget optimization problem. The solution depends on the distribution of future queries. In this paper, we formulate stochastic versions of the budget optimization problem based on natural probabilistic models of distribution over future queries, and address two questions that arise. [Evaluation] Given a solution, can we evaluate the expected value of the objective function? [Optimization] Can we find a solution that maximizes the objective function in expectation? Our main results are approximation and complexity results for these two problems in our three stochastic models. In particular, our algorithmic results show that simple prefix strategies that bid on all cheap keywords up to some level are either optimal or good approximations for many cases; we show other cases to be NP-hard. ",martin pal,,2006.0,,arXiv,Muthukrishnan2006,True,,arXiv,Not available,Stochastic Models for Budget Optimization in Search-Based Advertising,7655f40d013165bf11d93b2e96785703,http://arxiv.org/abs/cs/0612072v2 12368," Internet search companies sell advertisement slots based on users' search queries via an auction. Advertisers have to determine how to place bids on the keywords of their interest in order to maximize their return for a given budget: this is the budget optimization problem. The solution depends on the distribution of future queries. In this paper, we formulate stochastic versions of the budget optimization problem based on natural probabilistic models of distribution over future queries, and address two questions that arise. [Evaluation] Given a solution, can we evaluate the expected value of the objective function? [Optimization] Can we find a solution that maximizes the objective function in expectation? Our main results are approximation and complexity results for these two problems in our three stochastic models. In particular, our algorithmic results show that simple prefix strategies that bid on all cheap keywords up to some level are either optimal or good approximations for many cases; we show other cases to be NP-hard. ",zoya svitkina,,2006.0,,arXiv,Muthukrishnan2006,True,,arXiv,Not available,Stochastic Models for Budget Optimization in Search-Based Advertising,7655f40d013165bf11d93b2e96785703,http://arxiv.org/abs/cs/0612072v2 12369," Mechanism design is now a standard tool in computer science for aligning the incentives of self-interested agents with the objectives of a system designer. There is, however, a fundamental disconnect between the traditional application domains of mechanism design (such as auctions) and those arising in computer science (such as networks): while monetary transfers (i.e., payments) are essential for most of the known positive results in mechanism design, they are undesirable or even technologically infeasible in many computer systems. Classical impossibility results imply that the reach of mechanisms without transfers is severely limited. Computer systems typically do have the ability to reduce service quality--routing systems can drop or delay traffic, scheduling protocols can delay the release of jobs, and computational payment schemes can require computational payments from users (e.g., in spam-fighting systems). Service degradation is tantamount to requiring that users burn money}, and such ``payments'' can be used to influence the preferences of the agents at a cost of degrading the social surplus. We develop a framework for the design and analysis of money-burning mechanisms to maximize the residual surplus--the total value of the chosen outcome minus the payments required. ",jason hartline,,2008.0,,arXiv,Hartline2008,True,,arXiv,Not available,Optimal Mechansim Design and Money Burning,668b14825363262c234de62cc911ff07,http://arxiv.org/abs/0804.2097v1 12370," Mechanism design is now a standard tool in computer science for aligning the incentives of self-interested agents with the objectives of a system designer. There is, however, a fundamental disconnect between the traditional application domains of mechanism design (such as auctions) and those arising in computer science (such as networks): while monetary transfers (i.e., payments) are essential for most of the known positive results in mechanism design, they are undesirable or even technologically infeasible in many computer systems. Classical impossibility results imply that the reach of mechanisms without transfers is severely limited. Computer systems typically do have the ability to reduce service quality--routing systems can drop or delay traffic, scheduling protocols can delay the release of jobs, and computational payment schemes can require computational payments from users (e.g., in spam-fighting systems). Service degradation is tantamount to requiring that users burn money}, and such ``payments'' can be used to influence the preferences of the agents at a cost of degrading the social surplus. We develop a framework for the design and analysis of money-burning mechanisms to maximize the residual surplus--the total value of the chosen outcome minus the payments required. ",tim roughgarden,,2008.0,,arXiv,Hartline2008,True,,arXiv,Not available,Optimal Mechansim Design and Money Burning,668b14825363262c234de62cc911ff07,http://arxiv.org/abs/0804.2097v1 12371," Market-based conservation instruments, such as payments, auctions or tradable permits, are environmental policies that create financial incentives for landowners to engage in voluntary conservation on their land. But what if ecological processes operate across property boundaries and land use decisions on one property influence ecosystem functions on neighboring sites? This paper examines how to account for such spatial externalities when designing market-based conservation instruments. We use an agent-based model to analyze different spatial metrics and their implications on land use decisions in a dynamic cost environment. The model contains a number of alternative submodels which differ in incentive design and social interactions of agents, the latter including coordinating as well as cooperating behavior of agents. We find that incentive design and social interactions have a strong influence on the spatial allocation and the costs of the conservation market. ",florian hartig,,2008.0,10.1016/j.ecocom.2009.07.001,"Ecological Complexity, 2010, 7, 91-99",Hartig2008,True,,arXiv,Not available,"Stay by thy neighbor? Social organization determines the efficiency of biodiversity markets with spatial incentives",0959175a1b66498d8db5fc78a970fe43,http://arxiv.org/abs/0808.0111v2 12372," Market-based conservation instruments, such as payments, auctions or tradable permits, are environmental policies that create financial incentives for landowners to engage in voluntary conservation on their land. But what if ecological processes operate across property boundaries and land use decisions on one property influence ecosystem functions on neighboring sites? This paper examines how to account for such spatial externalities when designing market-based conservation instruments. We use an agent-based model to analyze different spatial metrics and their implications on land use decisions in a dynamic cost environment. The model contains a number of alternative submodels which differ in incentive design and social interactions of agents, the latter including coordinating as well as cooperating behavior of agents. We find that incentive design and social interactions have a strong influence on the spatial allocation and the costs of the conservation market. ",martin drechsler,,2008.0,10.1016/j.ecocom.2009.07.001,"Ecological Complexity, 2010, 7, 91-99",Hartig2008,True,,arXiv,Not available,"Stay by thy neighbor? Social organization determines the efficiency of biodiversity markets with spatial incentives",0959175a1b66498d8db5fc78a970fe43,http://arxiv.org/abs/0808.0111v2 12373," In many settings the power of truthful mechanisms is severely bounded. In this paper we use randomization to overcome this problem. In particular, we construct an FPTAS for multi-unit auctions that is truthful in expectation, whereas there is evidence that no polynomial-time truthful deterministic mechanism provides an approximation ratio better than 2. We also show for the first time that truthful in expectation polynomial-time mechanisms are \emph{provably} stronger than polynomial-time universally truthful mechanisms. Specifically, we show that there is a setting in which: (1) there is a non-polynomial time truthful mechanism that always outputs the optimal solution, and that (2) no universally truthful randomized mechanism can provide an approximation ratio better than 2 in polynomial time, but (3) an FPTAS that is truthful in expectation exists. ",shahar dobzinski,,2009.0,,arXiv,Dobzinski2009,True,,arXiv,Not available,On the Power of Randomization in Algorithmic Mechanism Design,79493903485a571afb71339070dec3ad,http://arxiv.org/abs/0904.4193v2 12375," In many settings the power of truthful mechanisms is severely bounded. In this paper we use randomization to overcome this problem. In particular, we construct an FPTAS for multi-unit auctions that is truthful in expectation, whereas there is evidence that no polynomial-time truthful deterministic mechanism provides an approximation ratio better than 2. We also show for the first time that truthful in expectation polynomial-time mechanisms are \emph{provably} stronger than polynomial-time universally truthful mechanisms. Specifically, we show that there is a setting in which: (1) there is a non-polynomial time truthful mechanism that always outputs the optimal solution, and that (2) no universally truthful randomized mechanism can provide an approximation ratio better than 2 in polynomial time, but (3) an FPTAS that is truthful in expectation exists. ",shaddin dughmi,,2009.0,,arXiv,Dobzinski2009,True,,arXiv,Not available,On the Power of Randomization in Algorithmic Mechanism Design,79493903485a571afb71339070dec3ad,http://arxiv.org/abs/0904.4193v2 12376," Display advertising has traditionally been sold via guaranteed contracts -- a guaranteed contract is a deal between a publisher and an advertiser to allocate a certain number of impressions over a certain period, for a pre-specified price per impression. However, as spot markets for display ads, such as the RightMedia Exchange, have grown in prominence, the selection of advertisements to show on a given page is increasingly being chosen based on price, using an auction. As the number of participants in the exchange grows, the price of an impressions becomes a signal of its value. This correlation between price and value means that a seller implementing the contract through bidding should offer the contract buyer a range of prices, and not just the cheapest impressions necessary to fulfill its demand. Implementing a contract using a range of prices, is akin to creating a mutual fund of advertising impressions, and requires {\em randomized bidding}. We characterize what allocations can be implemented with randomized bidding, namely those where the desired share obtained at each price is a non-increasing function of price. In addition, we provide a full characterization of when a set of campaigns are compatible and how to implement them with randomized bidding strategies. ",arpita ghosh,,2009.0,,arXiv,Ghosh2009,True,,arXiv,Not available,Bidding for Representative Allocations for Display Advertising,16d305f9a00effd29ae2d4996ba665f4,http://arxiv.org/abs/0910.0880v1 12377," Display advertising has traditionally been sold via guaranteed contracts -- a guaranteed contract is a deal between a publisher and an advertiser to allocate a certain number of impressions over a certain period, for a pre-specified price per impression. However, as spot markets for display ads, such as the RightMedia Exchange, have grown in prominence, the selection of advertisements to show on a given page is increasingly being chosen based on price, using an auction. As the number of participants in the exchange grows, the price of an impressions becomes a signal of its value. This correlation between price and value means that a seller implementing the contract through bidding should offer the contract buyer a range of prices, and not just the cheapest impressions necessary to fulfill its demand. Implementing a contract using a range of prices, is akin to creating a mutual fund of advertising impressions, and requires {\em randomized bidding}. We characterize what allocations can be implemented with randomized bidding, namely those where the desired share obtained at each price is a non-increasing function of price. In addition, we provide a full characterization of when a set of campaigns are compatible and how to implement them with randomized bidding strategies. ",preston mcafee,,2009.0,,arXiv,Ghosh2009,True,,arXiv,Not available,Bidding for Representative Allocations for Display Advertising,16d305f9a00effd29ae2d4996ba665f4,http://arxiv.org/abs/0910.0880v1 12378," Display advertising has traditionally been sold via guaranteed contracts -- a guaranteed contract is a deal between a publisher and an advertiser to allocate a certain number of impressions over a certain period, for a pre-specified price per impression. However, as spot markets for display ads, such as the RightMedia Exchange, have grown in prominence, the selection of advertisements to show on a given page is increasingly being chosen based on price, using an auction. As the number of participants in the exchange grows, the price of an impressions becomes a signal of its value. This correlation between price and value means that a seller implementing the contract through bidding should offer the contract buyer a range of prices, and not just the cheapest impressions necessary to fulfill its demand. Implementing a contract using a range of prices, is akin to creating a mutual fund of advertising impressions, and requires {\em randomized bidding}. We characterize what allocations can be implemented with randomized bidding, namely those where the desired share obtained at each price is a non-increasing function of price. In addition, we provide a full characterization of when a set of campaigns are compatible and how to implement them with randomized bidding strategies. ",kishore papineni,,2009.0,,arXiv,Ghosh2009,True,,arXiv,Not available,Bidding for Representative Allocations for Display Advertising,16d305f9a00effd29ae2d4996ba665f4,http://arxiv.org/abs/0910.0880v1 12379," Display advertising has traditionally been sold via guaranteed contracts -- a guaranteed contract is a deal between a publisher and an advertiser to allocate a certain number of impressions over a certain period, for a pre-specified price per impression. However, as spot markets for display ads, such as the RightMedia Exchange, have grown in prominence, the selection of advertisements to show on a given page is increasingly being chosen based on price, using an auction. As the number of participants in the exchange grows, the price of an impressions becomes a signal of its value. This correlation between price and value means that a seller implementing the contract through bidding should offer the contract buyer a range of prices, and not just the cheapest impressions necessary to fulfill its demand. Implementing a contract using a range of prices, is akin to creating a mutual fund of advertising impressions, and requires {\em randomized bidding}. We characterize what allocations can be implemented with randomized bidding, namely those where the desired share obtained at each price is a non-increasing function of price. In addition, we provide a full characterization of when a set of campaigns are compatible and how to implement them with randomized bidding strategies. ",sergei vassilvitskii,,2009.0,,arXiv,Ghosh2009,True,,arXiv,Not available,Bidding for Representative Allocations for Display Advertising,16d305f9a00effd29ae2d4996ba665f4,http://arxiv.org/abs/0910.0880v1 12380," One of the Multi-Agent Systems that is widely used by various government agencies, buyers and sellers in a market economy, in such a manner so as to attain optimized resource allocation, is the Combinatorial Auctioning System (CAS). We study another important aspect of resource allocations in CAS, namely fairness. We present two important notions of fairness in CAS, extended fairness and basic fairness. We give an algorithm that works by incorporating a metric to ensure fairness in a CAS that uses the Vickrey-Clark-Groves (VCG) mechanism, and uses an algorithm of Sandholm to achieve optimality. Mathematical formulations are given to represent measures of extended fairness and basic fairness. ",megha saini,,2008.0,,arXiv,Saini2008,True,,arXiv,Not available,Fairness in Combinatorial Auctioning Systems,f2441e23af3cf4578ae1d5d947fe8bd1,http://arxiv.org/abs/0809.2168v1 12381," One of the Multi-Agent Systems that is widely used by various government agencies, buyers and sellers in a market economy, in such a manner so as to attain optimized resource allocation, is the Combinatorial Auctioning System (CAS). We study another important aspect of resource allocations in CAS, namely fairness. We present two important notions of fairness in CAS, extended fairness and basic fairness. We give an algorithm that works by incorporating a metric to ensure fairness in a CAS that uses the Vickrey-Clark-Groves (VCG) mechanism, and uses an algorithm of Sandholm to achieve optimality. Mathematical formulations are given to represent measures of extended fairness and basic fairness. ",shrisha rao,,2008.0,,arXiv,Saini2008,True,,arXiv,Not available,Fairness in Combinatorial Auctioning Systems,f2441e23af3cf4578ae1d5d947fe8bd1,http://arxiv.org/abs/0809.2168v1 12382," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",darrell hoy,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 12383," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",denis nekipelov,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 12384," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",vasilis syrgkanis,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 12386," We study auctions with additive valuations where agents have a limit on the number of goods they may receive. We refer to such valuations as {\em capacitated} and seek mechanisms that maximize social welfare and are simultaneously incentive compatible, envy-free, individually rational, and have no positive transfers. If capacities are infinite, then sequentially repeating the 2nd price Vickrey auction meets these requirements. In 1983, Leonard showed that for unit capacities, VCG with Clarke Pivot payments is also envy free. For capacities that are all unit or all infinite, the mechanism produces a Walrasian pricing (subject to capacity constraints). Here, we consider general capacities. For homogeneous capacities (all capacities equal) we show that VCG with Clarke Pivot payments is envy free (VCG with Clarke Pivot payments is always incentive compatible, individually rational, and has no positive transfers). Contrariwise, there is no incentive compatible Walrasian pricing. For heterogeneous capacities, we show that there is no mechanism with all 4 properties, but at least in some cases, one can achieve both incentive compatibility and envy freeness. ",edith cohen,,2010.0,,arXiv,Cohen2010,True,,arXiv,Not available,Truth and Envy in Capacitated Allocation Games,b6634adc599671539fa36cae317f872d,http://arxiv.org/abs/1003.5326v2 12387," We study auctions with additive valuations where agents have a limit on the number of goods they may receive. We refer to such valuations as {\em capacitated} and seek mechanisms that maximize social welfare and are simultaneously incentive compatible, envy-free, individually rational, and have no positive transfers. If capacities are infinite, then sequentially repeating the 2nd price Vickrey auction meets these requirements. In 1983, Leonard showed that for unit capacities, VCG with Clarke Pivot payments is also envy free. For capacities that are all unit or all infinite, the mechanism produces a Walrasian pricing (subject to capacity constraints). Here, we consider general capacities. For homogeneous capacities (all capacities equal) we show that VCG with Clarke Pivot payments is envy free (VCG with Clarke Pivot payments is always incentive compatible, individually rational, and has no positive transfers). Contrariwise, there is no incentive compatible Walrasian pricing. For heterogeneous capacities, we show that there is no mechanism with all 4 properties, but at least in some cases, one can achieve both incentive compatibility and envy freeness. ",michal feldman,,2010.0,,arXiv,Cohen2010,True,,arXiv,Not available,Truth and Envy in Capacitated Allocation Games,b6634adc599671539fa36cae317f872d,http://arxiv.org/abs/1003.5326v2 12388," We study auctions with additive valuations where agents have a limit on the number of goods they may receive. We refer to such valuations as {\em capacitated} and seek mechanisms that maximize social welfare and are simultaneously incentive compatible, envy-free, individually rational, and have no positive transfers. If capacities are infinite, then sequentially repeating the 2nd price Vickrey auction meets these requirements. In 1983, Leonard showed that for unit capacities, VCG with Clarke Pivot payments is also envy free. For capacities that are all unit or all infinite, the mechanism produces a Walrasian pricing (subject to capacity constraints). Here, we consider general capacities. For homogeneous capacities (all capacities equal) we show that VCG with Clarke Pivot payments is envy free (VCG with Clarke Pivot payments is always incentive compatible, individually rational, and has no positive transfers). Contrariwise, there is no incentive compatible Walrasian pricing. For heterogeneous capacities, we show that there is no mechanism with all 4 properties, but at least in some cases, one can achieve both incentive compatibility and envy freeness. ",amos fiat,,2010.0,,arXiv,Cohen2010,True,,arXiv,Not available,Truth and Envy in Capacitated Allocation Games,b6634adc599671539fa36cae317f872d,http://arxiv.org/abs/1003.5326v2 12389," We study auctions with additive valuations where agents have a limit on the number of goods they may receive. We refer to such valuations as {\em capacitated} and seek mechanisms that maximize social welfare and are simultaneously incentive compatible, envy-free, individually rational, and have no positive transfers. If capacities are infinite, then sequentially repeating the 2nd price Vickrey auction meets these requirements. In 1983, Leonard showed that for unit capacities, VCG with Clarke Pivot payments is also envy free. For capacities that are all unit or all infinite, the mechanism produces a Walrasian pricing (subject to capacity constraints). Here, we consider general capacities. For homogeneous capacities (all capacities equal) we show that VCG with Clarke Pivot payments is envy free (VCG with Clarke Pivot payments is always incentive compatible, individually rational, and has no positive transfers). Contrariwise, there is no incentive compatible Walrasian pricing. For heterogeneous capacities, we show that there is no mechanism with all 4 properties, but at least in some cases, one can achieve both incentive compatibility and envy freeness. ",haim kaplan,,2010.0,,arXiv,Cohen2010,True,,arXiv,Not available,Truth and Envy in Capacitated Allocation Games,b6634adc599671539fa36cae317f872d,http://arxiv.org/abs/1003.5326v2 12390," We study auctions with additive valuations where agents have a limit on the number of goods they may receive. We refer to such valuations as {\em capacitated} and seek mechanisms that maximize social welfare and are simultaneously incentive compatible, envy-free, individually rational, and have no positive transfers. If capacities are infinite, then sequentially repeating the 2nd price Vickrey auction meets these requirements. In 1983, Leonard showed that for unit capacities, VCG with Clarke Pivot payments is also envy free. For capacities that are all unit or all infinite, the mechanism produces a Walrasian pricing (subject to capacity constraints). Here, we consider general capacities. For homogeneous capacities (all capacities equal) we show that VCG with Clarke Pivot payments is envy free (VCG with Clarke Pivot payments is always incentive compatible, individually rational, and has no positive transfers). Contrariwise, there is no incentive compatible Walrasian pricing. For heterogeneous capacities, we show that there is no mechanism with all 4 properties, but at least in some cases, one can achieve both incentive compatibility and envy freeness. ",svetlana olonetsky,,2010.0,,arXiv,Cohen2010,True,,arXiv,Not available,Truth and Envy in Capacitated Allocation Games,b6634adc599671539fa36cae317f872d,http://arxiv.org/abs/1003.5326v2 12396," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",ilias diakonikolas,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 12397," We initiate the study of markets for private data, though the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a theory of privacy as a commodity is missing. In this paper, we propose to build such a theory. Specifically, we consider a setting in which a data analyst wishes to buy information from a population from which he can estimate some statistic. The analyst wishes to obtain an accurate estimate cheaply. On the other hand, the owners of the private data experience some cost for their loss of privacy, and must be compensated for this loss. Agents are selfish, and wish to maximize their profit, so our goal is to design truthful mechanisms. Our main result is that such auctions can naturally be viewed and optimally solved as variants of multi-unit procurement auctions. Based on this result, we derive auctions for two natural settings which are optimal up to small constant factors: 1. In the setting in which the data analyst has a fixed accuracy goal, we show that an application of the classic Vickrey auction achieves the analyst's accuracy goal while minimizing his total payment. 2. In the setting in which the data analyst has a fixed budget, we give a mechanism which maximizes the accuracy of the resulting estimate while guaranteeing that the resulting sum payments do not exceed the analysts budget. In both cases, our comparison class is the set of envy-free mechanisms, which correspond to the natural class of fixed-price mechanisms in our setting. In both of these results, we ignore the privacy cost due to possible correlations between an individuals private data and his valuation for privacy itself. We then show that generically, no individually rational mechanism can compensate individuals for the privacy loss incurred due to their reported valuations for privacy. ",arpita ghosh,,2010.0,,arXiv,Ghosh2010,True,,arXiv,Not available,Selling Privacy at Auction,2080cb49b8371524a02d80f9b3c973c9,http://arxiv.org/abs/1011.1375v4 12398," We initiate the study of markets for private data, though the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a theory of privacy as a commodity is missing. In this paper, we propose to build such a theory. Specifically, we consider a setting in which a data analyst wishes to buy information from a population from which he can estimate some statistic. The analyst wishes to obtain an accurate estimate cheaply. On the other hand, the owners of the private data experience some cost for their loss of privacy, and must be compensated for this loss. Agents are selfish, and wish to maximize their profit, so our goal is to design truthful mechanisms. Our main result is that such auctions can naturally be viewed and optimally solved as variants of multi-unit procurement auctions. Based on this result, we derive auctions for two natural settings which are optimal up to small constant factors: 1. In the setting in which the data analyst has a fixed accuracy goal, we show that an application of the classic Vickrey auction achieves the analyst's accuracy goal while minimizing his total payment. 2. In the setting in which the data analyst has a fixed budget, we give a mechanism which maximizes the accuracy of the resulting estimate while guaranteeing that the resulting sum payments do not exceed the analysts budget. In both cases, our comparison class is the set of envy-free mechanisms, which correspond to the natural class of fixed-price mechanisms in our setting. In both of these results, we ignore the privacy cost due to possible correlations between an individuals private data and his valuation for privacy itself. We then show that generically, no individually rational mechanism can compensate individuals for the privacy loss incurred due to their reported valuations for privacy. ",aaron roth,,2010.0,,arXiv,Ghosh2010,True,,arXiv,Not available,Selling Privacy at Auction,2080cb49b8371524a02d80f9b3c973c9,http://arxiv.org/abs/1011.1375v4 12399," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",yu cheng,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 12400," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",ho cheung,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 12401," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",shaddin dughmi,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 12402," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",shanghua teng,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 12403," We suggest a general method for inferring players' values from their actions in repeated games. The method extends and improves upon the recent suggestion of (Nekipelov et al., EC 2015) and is based on the assumption that players are more likely to exhibit sequences of actions that have lower regret. We evaluate this ""quantal regret"" method on two different datasets from experiments of repeated games with controlled player values: those of (Selten and Chmura, AER 2008) on a variety of two-player 2x2 games and our own experiment on ad-auctions (Noti et al., WWW 2014). We find that the quantal regret method is consistently and significantly more precise than either ""classic"" econometric methods that are based on Nash equilibria, or the ""min-regret"" method of (Nekipelov et al., EC 2015). ",noam nisan,,2017.0,,arXiv,Nisan2017,True,,arXiv,Not available,"A ""Quantal Regret"" Method for Structural Econometrics in Repeated Games",b1355190de9960b920279c5745050f0e,http://arxiv.org/abs/1702.04254v2 12404," We suggest a general method for inferring players' values from their actions in repeated games. The method extends and improves upon the recent suggestion of (Nekipelov et al., EC 2015) and is based on the assumption that players are more likely to exhibit sequences of actions that have lower regret. We evaluate this ""quantal regret"" method on two different datasets from experiments of repeated games with controlled player values: those of (Selten and Chmura, AER 2008) on a variety of two-player 2x2 games and our own experiment on ad-auctions (Noti et al., WWW 2014). We find that the quantal regret method is consistently and significantly more precise than either ""classic"" econometric methods that are based on Nash equilibria, or the ""min-regret"" method of (Nekipelov et al., EC 2015). ",gali noti,,2017.0,,arXiv,Nisan2017,True,,arXiv,Not available,"A ""Quantal Regret"" Method for Structural Econometrics in Repeated Games",b1355190de9960b920279c5745050f0e,http://arxiv.org/abs/1702.04254v2 12405," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",bowei chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 12406," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",jun wang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 12407," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",christos papadimitriou,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 12408," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",ingemar cox,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 12409," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",mohan kankanhalli,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 12410," Lookahead search is perhaps the most natural and widely used game playing strategy. Given the practical importance of the method, the aim of this paper is to provide a theoretical performance examination of lookahead search in a wide variety of applications. To determine a strategy play using lookahead search}, each agent predicts multiple levels of possible re-actions to her move (via the use of a search tree), and then chooses the play that optimizes her future payoff accounting for these re-actions. There are several choices of optimization function the agents can choose, where the most appropriate choice of function will depend on the specifics of the actual game - we illustrate this in our examples. Furthermore, the type of search tree chosen by computationally-constrained agent can vary. We focus on the case where agents can evaluate only a bounded number, $k$, of moves into the future. That is, we use depth $k$ search trees and call this approach {\em k-lookahead search}. We apply our method in five well-known settings: AdWord auctions; industrial organization (Cournot's model); congestion games; valid-utility games and basic-utility games; cost-sharing network design games. We consider two questions. First, what is the expected social quality of outcome when agents apply lookahead search? Second, what interactive behaviours can be exhibited when players use lookahead search? ",vahab mirrokni,,2012.0,,arXiv,Mirrokni2012,True,,arXiv,Not available,On the Implications of Lookahead Search in Game Playing,18914c4b5cec5906fdf44dffa01273b7,http://arxiv.org/abs/1202.4134v1 12411," Lookahead search is perhaps the most natural and widely used game playing strategy. Given the practical importance of the method, the aim of this paper is to provide a theoretical performance examination of lookahead search in a wide variety of applications. To determine a strategy play using lookahead search}, each agent predicts multiple levels of possible re-actions to her move (via the use of a search tree), and then chooses the play that optimizes her future payoff accounting for these re-actions. There are several choices of optimization function the agents can choose, where the most appropriate choice of function will depend on the specifics of the actual game - we illustrate this in our examples. Furthermore, the type of search tree chosen by computationally-constrained agent can vary. We focus on the case where agents can evaluate only a bounded number, $k$, of moves into the future. That is, we use depth $k$ search trees and call this approach {\em k-lookahead search}. We apply our method in five well-known settings: AdWord auctions; industrial organization (Cournot's model); congestion games; valid-utility games and basic-utility games; cost-sharing network design games. We consider two questions. First, what is the expected social quality of outcome when agents apply lookahead search? Second, what interactive behaviours can be exhibited when players use lookahead search? ",nithum thain,,2012.0,,arXiv,Mirrokni2012,True,,arXiv,Not available,On the Implications of Lookahead Search in Game Playing,18914c4b5cec5906fdf44dffa01273b7,http://arxiv.org/abs/1202.4134v1 12412," Lookahead search is perhaps the most natural and widely used game playing strategy. Given the practical importance of the method, the aim of this paper is to provide a theoretical performance examination of lookahead search in a wide variety of applications. To determine a strategy play using lookahead search}, each agent predicts multiple levels of possible re-actions to her move (via the use of a search tree), and then chooses the play that optimizes her future payoff accounting for these re-actions. There are several choices of optimization function the agents can choose, where the most appropriate choice of function will depend on the specifics of the actual game - we illustrate this in our examples. Furthermore, the type of search tree chosen by computationally-constrained agent can vary. We focus on the case where agents can evaluate only a bounded number, $k$, of moves into the future. That is, we use depth $k$ search trees and call this approach {\em k-lookahead search}. We apply our method in five well-known settings: AdWord auctions; industrial organization (Cournot's model); congestion games; valid-utility games and basic-utility games; cost-sharing network design games. We consider two questions. First, what is the expected social quality of outcome when agents apply lookahead search? Second, what interactive behaviours can be exhibited when players use lookahead search? ",adrian vetta,,2012.0,,arXiv,Mirrokni2012,True,,arXiv,Not available,On the Implications of Lookahead Search in Game Playing,18914c4b5cec5906fdf44dffa01273b7,http://arxiv.org/abs/1202.4134v1 12413," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 12414," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 12415," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 12416," One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity constraints and the inevitability of mediators in adword auctions",f59c866f5ff88136736fa710377aaf40,http://arxiv.org/abs/0709.0204v1 12417," Empirical game-theoretic analysis (EGTA) has recently been applied successfully to analyze the behavior of large numbers of competing traders in a continuous double auction market. Multiagent simulation methods like EGTA are useful for studying complex strategic environments like a stock market, where it is not feasible to solve analytically for the rational behavior of each agent. A weakness of simulation-based methods in strategic settings, however, is that it is typically impossible to prove that the strategy profile assigned to the simulated agents is stable, as in a Nash equilibrium. I propose using reinforcement learning to analyze the regret of supposed Nash-equilibrium strategy profiles found by EGTA. I have developed a new library of reinforcement learning tools, which I have integrated into an extended version of the market simulator from our prior work. I provide evidence for the effectiveness of our library methods, both on a suite of benchmark problems from the literature, and on non-equilibrium strategy profiles in our market environment. Finally, I use our new reinforcement learning tools to provide evidence that the equilibria found by EGTA in our recent continuous double auction study are likely to have only negligible regret, even with respect to an extended strategy space. ",mason wright,,2016.0,,arXiv,Wright2016,True,,arXiv,Not available,"Using Reinforcement Learning to Validate Empirical Game-Theoretic Analysis: A Continuous Double Auction Study",94c650ee22363db4f127a6d972e21b38,http://arxiv.org/abs/1604.06710v1 12418," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",george pierrakos,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 12419," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",weiran shen,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12420," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",binghui peng,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12421," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",hanpeng liu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12422," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",michael zhang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12423," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",ruohan qian,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12424," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",yan hong,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12425," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zhi guo,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12426," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zongyao ding,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12427," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pengjun lu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12428," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pingzhong tang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 12429," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",yaron singer,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 12430," The repeated posted price auction is a game with two players: the seller and the buyer. This game consists of rounds, indexed by natural numbers $i=1,2,\dots$, and in each round the seller proposes to the buyer a unit of good (think of fish or a place for advertisement) with the price $Q_i$. Let the buyer's valuation of this good be $q\in \mathbb R_{>0}$, we call $q$ the {\it type} of the buyer. In each round the buyer has two options: accept the deal (and then we set $a_i=1$) or reject it (we set $a_i=0$). In this round, the buyer's {\it surplus} is $a_i(q-Q_i)$ and the seller's {\it revenue} is $a_iQ_i$. I propose a strategy $S$ for the seller and argue why the resulting revenue is the best that the seller can achieve among a reasonable class of strategies. ",nikita kalinin,,2018.0,,arXiv,Kalinin2018,True,,arXiv,Not available,"New mechanism for repeated posted price auction with a strategic buyer without discounting",47266e0997c460353507fbf94b060f96,http://arxiv.org/abs/1806.02661v1 12431," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",shahar dobzinski,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 12432," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",ami mor,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 12433," In auction theory, cryptography has been used to achieve anonymity of the participants, security and privacy of the bids, secure computation and to simulate mediator (auctioneer). Auction theory focuses on revenue and Cryptography focuses on security and privacy. Involving Cryptography at base level, to enhance revenue gives entirely new perspective and insight to Auction theory, thereby achieving the core goals of auction theory. In this report, we try to investigate an interesting field of study in Auction Theory using Cryptographic primitives. ",amjed shareef,,2012.0,,arXiv,Shareef2012,True,,arXiv,Not available,"Short Report on: Possible directions to Auctions with Cryptographic pre-play",c04173a7604b7b653f8c49c8d20b09ba,http://arxiv.org/abs/1210.6450v1 12434," Statistical properties of order-driven double-auction markets with Bid-Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called {\it Madhavan-Richardson-Roomans model} (MRR for short) to simulate the stochastic process of the price-change in empirical data sets (say, EUR/JPY or USD/JPY exchange rates) in which the Bid-Ask spread fluctuates in time. We find that the MRR theory apparently fails to simulate so much as the qualitative behaviour ('non-monotonic' behaviour) of the response function $R(l)$ ($l$ denotes the difference of times at which the response function is evaluated) calculated from the data. Especially, we confirm that the stochastic nature of the Bid-Ask spread causes apparent deviations from a linear relationship between the $R(l)$ and the auto-correlation function $C(l)$, namely, $R(l) \propto -C(l)$. To make the microscopic model of double-auction markets having stochastic Bid-Ask spread, we use the minority game with a finite market history length and find numerically that appropriate extension of the game shows quite similar behaviour of the response function to the empirical evidence. We also reveal that the minority game modeling with the adaptive ('annealed') look-up table reproduces the non-linear relationship $R(l) \propto -f(C(l))$ ($f(x)$ stands for a non-linear function leading to '$\lambda$-shapes') more effectively than the fixed (`quenched') look-up table does. ",takero ibuki,,2010.0,,arXiv,Ibuki2010,True,,arXiv,Not available,"Response of double-auction markets to instantaneous Selling-Buying signals with stochastic Bid-Ask spread",52046c998f5409364604f07bf8d99a5f,http://arxiv.org/abs/1011.0748v2 12435," Statistical properties of order-driven double-auction markets with Bid-Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called {\it Madhavan-Richardson-Roomans model} (MRR for short) to simulate the stochastic process of the price-change in empirical data sets (say, EUR/JPY or USD/JPY exchange rates) in which the Bid-Ask spread fluctuates in time. We find that the MRR theory apparently fails to simulate so much as the qualitative behaviour ('non-monotonic' behaviour) of the response function $R(l)$ ($l$ denotes the difference of times at which the response function is evaluated) calculated from the data. Especially, we confirm that the stochastic nature of the Bid-Ask spread causes apparent deviations from a linear relationship between the $R(l)$ and the auto-correlation function $C(l)$, namely, $R(l) \propto -C(l)$. To make the microscopic model of double-auction markets having stochastic Bid-Ask spread, we use the minority game with a finite market history length and find numerically that appropriate extension of the game shows quite similar behaviour of the response function to the empirical evidence. We also reveal that the minority game modeling with the adaptive ('annealed') look-up table reproduces the non-linear relationship $R(l) \propto -f(C(l))$ ($f(x)$ stands for a non-linear function leading to '$\lambda$-shapes') more effectively than the fixed (`quenched') look-up table does. ",jun-ichi inoue,,2010.0,,arXiv,Ibuki2010,True,,arXiv,Not available,"Response of double-auction markets to instantaneous Selling-Buying signals with stochastic Bid-Ask spread",52046c998f5409364604f07bf8d99a5f,http://arxiv.org/abs/1011.0748v2 12436," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",zhu han,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 12437," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",rong zheng,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 12438," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",vincent poor,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 12439," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",simone pigolotti,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 12440," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",yang zhang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12441," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",sebastian bernhardsson,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 12442," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",jeppe juul,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 12443," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",gorm galster,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 12444," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",pierpaolo vivo,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 12445," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",chonho lee,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 12446," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",ping wang,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 12447," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",dusit niyato,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 12448," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yu wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12449," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jiayi liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12450," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yuxiang liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12451," Providing an adequate long-term participation incentive is important for a participatory sensing system to maintain enough number of active users (sensors), so as to collect a sufficient number of data samples and support a desired level of service quality. In this work, we consider the sensor selection problem in a general time-dependent and location-aware participatory sensing system, taking the long-term user participation incentive into explicit consideration. We study the problem systematically under different information scenarios, regarding both future information and current information (realization). In particular, we propose a Lyapunov-based VCG auction policy for the on-line sensor selection, which converges asymptotically to the optimal off-line benchmark performance, even with no future information and under (current) information asymmetry. Extensive numerical results show that our proposed policy outperforms the state-of-art policies in the literature, in terms of both user participation (e.g., reducing the user dropping probability by 25% to 90%) and social performance (e.g., increasing the social welfare by 15% to 80%). ",jianwei huang,,2015.0,10.1109/INFOCOM.2015.7218673,arXiv,Gao2015,True,,arXiv,Not available,Providing Long-Term Participation Incentive in Participatory Sensing,f989c413a1c10cec68960b99ac31cf68,http://arxiv.org/abs/1501.02480v2 12452," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",dusit niyato,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12453," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jun hao,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12454," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yang he,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12455," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jinghe hu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12456," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",weipeng yan,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12457," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",mantian li,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 12458," We design approximate weakly group strategy-proof mechanisms for resource reallocation problems using Milgrom and Segal's deferred acceptance auction framework: the radio spectrum and network bandwidth reallocation problems in the procurement auction setting and the cost minimization problem with set cover constraints in the selling auction setting. Our deferred acceptance auctions are derived from simple greedy algorithms for the underlying optimization problems and guarantee approximately optimal social welfare (cost) of the agents retaining their rights (contracts). In the reallocation problems, we design procurement auctions to purchase agents' broadcast/access rights to free up some of the resources such that the unpurchased rights can still be exercised with respect to the remaining resources. In the cost minimization problem, we design a selling auction to sell early termination rights to agents with existing contracts such that some minimal constraints are still satisfied with remaining contracts. In these problems, while the ""allocated"" agents transact, exchanging rights and payments, the objective and feasibility constraints are on the ""rejected"" agents. ",anthony kim,,2015.0,,arXiv,Kim2015,True,,arXiv,Not available,"Welfare Maximization with Deferred Acceptance Auctions in Reallocation Problems",7aead1c2c81a7153c1e1ec9bab0aa4b5,http://arxiv.org/abs/1507.01353v3 12459," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",hu fu,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 12460," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",nicole immolica,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 12461," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",brendan lucier,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 12462," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",philipp strack,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 12463," A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On the other hand, some resources are complementary that the user will need them as a bundle (e.g., users need both wireless connection and storage for online photo posting). In this paper, we first model the resource allocation process of a mobile cloud computing system as an auction mechanism with premium and discount factors. The premium and discount factors indicate complementary and substitutable relations among cloud resources provided by the service provider. Then, we analyze the individual rationality and incentive compatibility (truthfulness) properties of the users in the proposed auction mechanism. The optimal solutions of the resource allocation and cost charging schemes in the auction mechanism is discussed afterwards. ",ping wang,,2013.0,,arXiv,Zhang2013,True,,arXiv,Not available,"An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems",83832788c29aa9a4608f8988ca8126d0,http://arxiv.org/abs/1304.6176v1 12464," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",michal feldman,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 12465," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",brendan lucier,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 12466," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",noam nisan,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 12467," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",nicola gatti,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12468," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",marco rocco,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12469," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",paolo serafino,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12470," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",carmine ventre,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12471," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",erel segal-halevi,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 12472," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",avinatan hassidim,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 12473," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",yonatan aumann,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 12474," To support a freight carrier in a combinatorial transport auction, we proposes an exact and two heuristic strategies for bidding on subsets of requests. The exact bidding strategy is based on the concept of elementary request combinations. We show that it is sufficient and necessary for a carrier to bid on each elementary request combination in order to guarantee the same result as bidding on each element of the powerset of the set of tendered requests. Both heuristic bidding strategies identify promising request combinations. For this, pairwise synergies based on saving values as well as the capacitated p-median problem are used. The bidding strategies are evaluated by a computational study that simulates an auction. It is based on 174 benchmark instances and therefore easily extendable by other researchers. On average, the two heuristic strategies achieve 91 percent and 81 percent of the available sales potential while generating 36 and only 4 percent of the bundle bids of the exact strategy. Therefore, the proposed bidding strategies help a carrier to increase her chance to win and at the same time reduce the computational burden to participate in a combinatorial transport auction. ",tobias buer,,2014.0,,arXiv,Buer2014,True,,arXiv,Not available,"An exact and two heuristic strategies for truthful bidding in combinatorial transport auctions",611aeda8ce911008ee60fe78da5674a8,http://arxiv.org/abs/1406.1928v1 12475," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",amin khan,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 12476," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",xavier vilaca,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 12477," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",luis rodrigues,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 12478," In decentralized systems, nodes often need to coordinate to access shared resources in a fair manner. One approach to perform such arbitration is to rely on auction mechanisms. Although there is an extensive literature that studies auctions, most of these works assume the existence of a central, trusted auctioneer. Unfortunately, in fully decentralized systems, where the nodes that need to cooperate operate under separate spheres of control, such central trusted entity may not exist. Notable examples of such decentralized systems include community networks, clouds of clouds, cooperative nano data centres, among others. In this paper, we make theoretical and practical contributions to distribute the role of the auctioneer. From the theoretical perspective, we propose a framework of distributed simulations of the auctioneer that are Nash equilibria resilient to coalitions and asynchrony. From the practical perspective, our protocols leverage the distributed nature of the simulations to parallelise the execution. We have implemented a prototype that instantiates the framework for bandwidth allocation in community networks, and evaluated it in a real distributed setting. ",felix freitag,,2016.0,,"36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016). Nara, Japan. 27-30 June 2016",Khan2016,True,,arXiv,Not available,"A Distributed Auctioneer for Resource Allocation in Decentralized Systems",228c98acf447ef8d8aa659298c3355f2,http://arxiv.org/abs/1604.07259v1 12479," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",rad niazadeh,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 12480," Quasiliearity is a ubiquitous and questionable assumption in the standard study of Walrasian equilibria. Quasilinearity implies that a buyer's value for goods purchased in a Walrasian equilibrium is always additive with goods purchased with unspent money. It is a particularly suspect assumption in combinatorial auctions, where buyers' complex preferences over goods would naturally extend beyond the items obtained in the Walrasian equilibrium. We study Walrasian equilibria in combinatorial auctions when quasilinearity is not assumed. We show that existence can be reduced to an Arrow-Debreu style market with one divisible good and many indivisible goods, and that a ""fractional"" Walrasian equilibrium always exists. We also show that standard integral Walrasian equilibria are related to integral solutions of an induced configuration LP associated with a fractional Walrasian equilibrium, generalizing known results for both quasilinear and non-quasilnear settings. ",christopher wilkens,,2016.0,,arXiv,Niazadeh2016,True,,arXiv,Not available,"Competitive Equilibria for Non-quasilinear Bidders in Combinatorial Auctions",1096bd51a9de3c21d25a878090417b4b,http://arxiv.org/abs/1606.06846v1 12481," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",erel segal-halevi,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12482," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",avinatan hassidim,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12483," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",yonatan aumann,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12484," This research proposes a novel auction mechanism for transactive energy exchange between buyers and sellers, modeled as agents in a microgrid. The mechanism is implemented by a separate microgrid controller (MC) agent, and requires big data flow with the other agents through an iterative bidding process. Although private user information remains hidden to the MC, a theoretical analysis shows that under the assumption of convexity of the agents utilities, the proposed auction is still able to maximize the social welfare (SW), i.e. the aggregate utilities of the agents. In addition, it is shown that the mechanism exhibits the key desirable features of individual rationality and weak budget balance, guaranteeing that neither the payoff to any agent nor the net monetary revenue after termination, is negative. The proposed approach also incorporates a mechanism to redistribute the sellers shares in a fair manner. As an example, a maximum entropy based fair redistribution scheme is addressed. The theoretical analysis reported here is accompanied by extensive set of simulations that illustrate the various aspects of the proposed mechanism. ",m. faqiry,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Transactive Energy Auction with Hidden User Information in Microgrid,40e6b3636da9fd540a92bdfd0ba738f6,http://arxiv.org/abs/1608.03649v1 12485," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",dan marinescu,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 12486," This research proposes a novel auction mechanism for transactive energy exchange between buyers and sellers, modeled as agents in a microgrid. The mechanism is implemented by a separate microgrid controller (MC) agent, and requires big data flow with the other agents through an iterative bidding process. Although private user information remains hidden to the MC, a theoretical analysis shows that under the assumption of convexity of the agents utilities, the proposed auction is still able to maximize the social welfare (SW), i.e. the aggregate utilities of the agents. In addition, it is shown that the mechanism exhibits the key desirable features of individual rationality and weak budget balance, guaranteeing that neither the payoff to any agent nor the net monetary revenue after termination, is negative. The proposed approach also incorporates a mechanism to redistribute the sellers shares in a fair manner. As an example, a maximum entropy based fair redistribution scheme is addressed. The theoretical analysis reported here is accompanied by extensive set of simulations that illustrate the various aspects of the proposed mechanism. ",sanjoy das,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Transactive Energy Auction with Hidden User Information in Microgrid,40e6b3636da9fd540a92bdfd0ba738f6,http://arxiv.org/abs/1608.03649v1 12487," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. We consider delay games with winning conditions expressed in weak monadic second order logic with the unbounding quantifier (WMSO+U), which is able to express (un)boundedness properties. It is decidable whether the delaying player is able to win such a game with bounded lookahead, i.e., if she only skips a finite number of moves. However, bounded lookahead is not always sufficient: we present a game that can be won with unbounded lookahead, but not with bounded lookahead. Then, we consider WMSO+U delay games with unbounded lookahead and show that the exact evolution of the lookahead is irrelevant: the winner is always the same, as long as the initial lookahead is large enough and the lookahead tends to infinity. ",martin zimmermann,,2015.0,,arXiv,Zimmermann2015,True,,arXiv,Not available,Unbounded Lookahead in WMSO+U Games,b734f2c7277d1d5593fa9ec3eba6b89c,http://arxiv.org/abs/1509.07495v2 12488," The paper defines a non-cooperative simultaneous finite game to study coalition structure formation with intra and inter-coalition externalities. The novelty of the game is that the game definition embeds a \textit{coalition structure formation mechanism}. This mechanism portions a set of strategies of the game into partition-specific strategy domains, what makes every partition to be a non-cooperative game with partition-specific payoffs for every player. The mechanism includes a maximum coalition size, a set of eligible partitions with coalitions sizes no greater than this number (which also serves as a restriction for a maximum number of deviators) and a coalition structure formation rule. The paper defines a family of nested non-cooperative games parametrized by a size of a maximum coalition size. Every game in the family has an equilibrium in mixed strategies. The equilibrium can generate more than one coalition and encompasses intra and inter group externalities, what makes it different from the Shapley value. Presence of individual payoff allocation makes it different from a strong Nash, coalition-proof equilibrium, and some other equilibrium concepts. The accompanying papers demonstrate applications of the proposed toolkit. ",dmitry levando,,2016.0,,arXiv,Levando2016,True,,arXiv,Not available,Formation of coalition structures as a non-cooperative game 1: theory,2fe1228f489173a04e5a7b76840dbe2c,http://arxiv.org/abs/1612.02344v1 12489," We demonstrate the usefulness of adding delay to infinite games with quantitative winning conditions. In a delay game, one of the players may delay her moves to obtain a lookahead on her opponent's moves. We show that determining the winner of delay games with winning conditions given by parity automata with costs is EXPTIME-complete and that exponential bounded lookahead is both sufficient and in general necessary. Thus, although the parity condition with costs is a quantitative extension of the parity condition, our results show that adding costs does not increase the complexity of delay games with parity conditions. Furthermore, we study a new phenomenon that appears in quantitative delay games: lookahead can be traded for the quality of winning strategies and vice versa. We determine the extent of this tradeoff. In particular, even the smallest lookahead allows to improve the quality of an optimal strategy from the worst possible value to almost the smallest possible one. Thus, the benefit of introducing lookahead is twofold: not only does it allow the delaying player to win games she would lose without, but lookahead also allows her to improve the quality of her winning strategies in games she wins even without lookahead. ",martin zimmermann,,2017.0,,arXiv,Zimmermann2017,True,,arXiv,Not available,Games with Costs and Delays,0bb4884e2fbf375177a15166d499aaa9,http://arxiv.org/abs/1701.02168v2 12490," Nash equilibrium (NE) is a central concept in game theory. Here we prove formally a published theorem on existence of an NE in two proof assistants, Coq and Isabelle: starting from a game with finitely many outcomes, one may derive a game by rewriting each of these outcomes with either of two basic outcomes, namely that Player 1 wins or that Player 2 wins. If all ways of deriving such a win/lose game lead to a game where one player has a winning strategy, the original game also has a Nash equilibrium. This article makes three other contributions: first, while the original proof invoked linear extension of strict partial orders, here we avoid it by generalizing the relevant definition. Second, we notice that the theorem also implies the existence of a secure equilibrium, a stronger version of NE that was introduced for model checking. Third, we also notice that the constructive proof of the theorem computes secure equilibria for non-zero-sum priority games (generalizing parity games) in quasi-polynomial time. ",stephane roux,,2017.0,10.4204/EPTCS.256.4,"EPTCS 256, 2017, pp. 46-60",Roux2017,True,,arXiv,Not available,An Existence Theorem of Nash Equilibrium in Coq and Isabelle,c849f1d181a6d82329dcfda7ed7095e2,http://arxiv.org/abs/1709.02096v1 12491," Nash equilibrium (NE) is a central concept in game theory. Here we prove formally a published theorem on existence of an NE in two proof assistants, Coq and Isabelle: starting from a game with finitely many outcomes, one may derive a game by rewriting each of these outcomes with either of two basic outcomes, namely that Player 1 wins or that Player 2 wins. If all ways of deriving such a win/lose game lead to a game where one player has a winning strategy, the original game also has a Nash equilibrium. This article makes three other contributions: first, while the original proof invoked linear extension of strict partial orders, here we avoid it by generalizing the relevant definition. Second, we notice that the theorem also implies the existence of a secure equilibrium, a stronger version of NE that was introduced for model checking. Third, we also notice that the constructive proof of the theorem computes secure equilibria for non-zero-sum priority games (generalizing parity games) in quasi-polynomial time. ",erik martin-dorel,,2017.0,10.4204/EPTCS.256.4,"EPTCS 256, 2017, pp. 46-60",Roux2017,True,,arXiv,Not available,An Existence Theorem of Nash Equilibrium in Coq and Isabelle,c849f1d181a6d82329dcfda7ed7095e2,http://arxiv.org/abs/1709.02096v1 12492," Nash equilibrium (NE) is a central concept in game theory. Here we prove formally a published theorem on existence of an NE in two proof assistants, Coq and Isabelle: starting from a game with finitely many outcomes, one may derive a game by rewriting each of these outcomes with either of two basic outcomes, namely that Player 1 wins or that Player 2 wins. If all ways of deriving such a win/lose game lead to a game where one player has a winning strategy, the original game also has a Nash equilibrium. This article makes three other contributions: first, while the original proof invoked linear extension of strict partial orders, here we avoid it by generalizing the relevant definition. Second, we notice that the theorem also implies the existence of a secure equilibrium, a stronger version of NE that was introduced for model checking. Third, we also notice that the constructive proof of the theorem computes secure equilibria for non-zero-sum priority games (generalizing parity games) in quasi-polynomial time. ",jan-georg smaus,,2017.0,10.4204/EPTCS.256.4,"EPTCS 256, 2017, pp. 46-60",Roux2017,True,,arXiv,Not available,An Existence Theorem of Nash Equilibrium in Coq and Isabelle,c849f1d181a6d82329dcfda7ed7095e2,http://arxiv.org/abs/1709.02096v1 12493," In this paper, we study the problem of deciding the winner of reachability switching games. These games provide deterministic analogues of Markovian systems. We study zero-, one-, and two-player variants of these games. We show that the zero-player case is NL-hard, the one-player case is NP-complete, and that the two-player case is PSPACE-hard and in EXPTIME. In the one- and two-player cases, the problem of determining the winner of a switching game turns out to be much harder than the problem of determining the winner of a Markovian game. We also study the structure of winning strategies in these games, and in particular we show that both players in a two-player reachability switching game require exponential memory. ",john fearnley,,2017.0,,arXiv,Fearnley2017,True,,arXiv,Not available,Reachability Switching Games,4eb76a8241d219073d7ad9abe9a3e702,http://arxiv.org/abs/1709.08991v2 12494," In this paper, we study the problem of deciding the winner of reachability switching games. These games provide deterministic analogues of Markovian systems. We study zero-, one-, and two-player variants of these games. We show that the zero-player case is NL-hard, the one-player case is NP-complete, and that the two-player case is PSPACE-hard and in EXPTIME. In the one- and two-player cases, the problem of determining the winner of a switching game turns out to be much harder than the problem of determining the winner of a Markovian game. We also study the structure of winning strategies in these games, and in particular we show that both players in a two-player reachability switching game require exponential memory. ",martin gairing,,2017.0,,arXiv,Fearnley2017,True,,arXiv,Not available,Reachability Switching Games,4eb76a8241d219073d7ad9abe9a3e702,http://arxiv.org/abs/1709.08991v2 12495," In this paper, we study the problem of deciding the winner of reachability switching games. These games provide deterministic analogues of Markovian systems. We study zero-, one-, and two-player variants of these games. We show that the zero-player case is NL-hard, the one-player case is NP-complete, and that the two-player case is PSPACE-hard and in EXPTIME. In the one- and two-player cases, the problem of determining the winner of a switching game turns out to be much harder than the problem of determining the winner of a Markovian game. We also study the structure of winning strategies in these games, and in particular we show that both players in a two-player reachability switching game require exponential memory. ",matthias mnich,,2017.0,,arXiv,Fearnley2017,True,,arXiv,Not available,Reachability Switching Games,4eb76a8241d219073d7ad9abe9a3e702,http://arxiv.org/abs/1709.08991v2 12496," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",ashkan paya,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 12497," In this paper, we study the problem of deciding the winner of reachability switching games. These games provide deterministic analogues of Markovian systems. We study zero-, one-, and two-player variants of these games. We show that the zero-player case is NL-hard, the one-player case is NP-complete, and that the two-player case is PSPACE-hard and in EXPTIME. In the one- and two-player cases, the problem of determining the winner of a switching game turns out to be much harder than the problem of determining the winner of a Markovian game. We also study the structure of winning strategies in these games, and in particular we show that both players in a two-player reachability switching game require exponential memory. ",rahul savani,,2017.0,,arXiv,Fearnley2017,True,,arXiv,Not available,Reachability Switching Games,4eb76a8241d219073d7ad9abe9a3e702,http://arxiv.org/abs/1709.08991v2 12498," We propose a new class of games, called Multi-Games (MG), in which a given number of players play a fixed number of basic games simultaneously. In each round of the MG, each player will have a specific set of weights, one for each basic game, which add up to one and represent the fraction of the player's investment in each basic game. The total payoff for each player is then the convex combination, with the corresponding weights, of the payoffs it obtains in the basic games. The basic games in a MG can be regarded as different environments for the players. When the players' weights for the different games in MG are private information or types with given conditional probability distributions, we obtain a particular class of Bayesian games. We show that for the class of so-called completely pure regular Double Game (DG) with finite sets of types, the Nash equilibria (NE) of the basic games can be used to compute a Bayesian Nash equilibrium of the DG in linear time with respect to the number of types of the players. We study a DG for the Prisoner's Dilemma (PD) by extending the PD with a second so-called Social Game (SG), generalising the notion of altruistic extension of a game in which players have different altruistic levels (or social coefficients). We study two different examples of Bayesian games in this context in which the social coefficients have a finite set of values and each player only knows the probability distribution of the opponent's social coefficient. In the first case we have a completely pure regular DG for which we deduce a Bayesian NE. Finally, we use the second example to compare various strategies in a round-robin tournament of the DG for PD, in which the players can change their social coefficients incrementally from one round to the next. ",abbas edalat,,2012.0,,arXiv,Edalat2012,True,,arXiv,Not available,Multi-games and a double game extension of the Prisoner's Dilemma,e5b2d441dd43925081e98609ea411681,http://arxiv.org/abs/1205.4973v3 12499," We propose a new class of games, called Multi-Games (MG), in which a given number of players play a fixed number of basic games simultaneously. In each round of the MG, each player will have a specific set of weights, one for each basic game, which add up to one and represent the fraction of the player's investment in each basic game. The total payoff for each player is then the convex combination, with the corresponding weights, of the payoffs it obtains in the basic games. The basic games in a MG can be regarded as different environments for the players. When the players' weights for the different games in MG are private information or types with given conditional probability distributions, we obtain a particular class of Bayesian games. We show that for the class of so-called completely pure regular Double Game (DG) with finite sets of types, the Nash equilibria (NE) of the basic games can be used to compute a Bayesian Nash equilibrium of the DG in linear time with respect to the number of types of the players. We study a DG for the Prisoner's Dilemma (PD) by extending the PD with a second so-called Social Game (SG), generalising the notion of altruistic extension of a game in which players have different altruistic levels (or social coefficients). We study two different examples of Bayesian games in this context in which the social coefficients have a finite set of values and each player only knows the probability distribution of the opponent's social coefficient. In the first case we have a completely pure regular DG for which we deduce a Bayesian NE. Finally, we use the second example to compare various strategies in a round-robin tournament of the DG for PD, in which the players can change their social coefficients incrementally from one round to the next. ",ali ghoroghi,,2012.0,,arXiv,Edalat2012,True,,arXiv,Not available,Multi-games and a double game extension of the Prisoner's Dilemma,e5b2d441dd43925081e98609ea411681,http://arxiv.org/abs/1205.4973v3 12500," We propose a new class of games, called Multi-Games (MG), in which a given number of players play a fixed number of basic games simultaneously. In each round of the MG, each player will have a specific set of weights, one for each basic game, which add up to one and represent the fraction of the player's investment in each basic game. The total payoff for each player is then the convex combination, with the corresponding weights, of the payoffs it obtains in the basic games. The basic games in a MG can be regarded as different environments for the players. When the players' weights for the different games in MG are private information or types with given conditional probability distributions, we obtain a particular class of Bayesian games. We show that for the class of so-called completely pure regular Double Game (DG) with finite sets of types, the Nash equilibria (NE) of the basic games can be used to compute a Bayesian Nash equilibrium of the DG in linear time with respect to the number of types of the players. We study a DG for the Prisoner's Dilemma (PD) by extending the PD with a second so-called Social Game (SG), generalising the notion of altruistic extension of a game in which players have different altruistic levels (or social coefficients). We study two different examples of Bayesian games in this context in which the social coefficients have a finite set of values and each player only knows the probability distribution of the opponent's social coefficient. In the first case we have a completely pure regular DG for which we deduce a Bayesian NE. Finally, we use the second example to compare various strategies in a round-robin tournament of the DG for PD, in which the players can change their social coefficients incrementally from one round to the next. ",georgios sakellariou,,2012.0,,arXiv,Edalat2012,True,,arXiv,Not available,Multi-games and a double game extension of the Prisoner's Dilemma,e5b2d441dd43925081e98609ea411681,http://arxiv.org/abs/1205.4973v3 12501," We show that a Bayesian strategy map profile is a Bayesian Nash Equilibrium independent of any prior if and only if the Bayesian strategy map profile, evaluated at any type profile, is the Nash equilibrium of the so-called local deterministic game corresponding to that type profile. We call such a Bayesian game type-regular. We then show that an m-dimensional n-agent Bayesian game whose utilities are linearly dependent on the types of the agents is equivalent, following a normalisation of the type space of each agent into the (m-1)-simplex, to a simultaneous competition in nm so-called basic n-agent games. If the game is own-type-linear, i.e., the utility of each player only depends linearly on its own type, then the Bayesian game is equivalent to a simultaneous competition in m basic n-agent games, called a multi-game. We then prove that an own-type-linear Bayesian game is type-regular if it is type-regular on the vertices of the (m-1)-simplex, a result which provides a large class of type-regular Bayesian maps. The class of m-dimensional own-type-linear Bayesian games can model, via their equivalence with multi-games, simultaneous decision-making in m different environments. We show that a two dimensional own-type-linear Bayesian game can be used to give a new model of the Prisoner's Dilemma (PD) in which the prosocial tendencies of the agents are considered as their types and the two agents play simultaneously in the PD as well as in a prosocial game. This Bayesian game addresses the materialistic and the prosocial tendencies of the agents. Similarly, we present a new two dimensional Bayesian model of the Trust game in which the type of the two agents reflect their prosocial tendency or trustfulness, which leads to more reasonable Nash equilibria. We finally consider an example of such multi-environment decision making in production by several companies in multi-markets. ",abbas edalat,,2018.0,,arXiv,Edalat2018,True,,arXiv,Not available,Prior Independent Equilibria and Linear Multi-dimensional Bayesian Games,291781ba150773d5b155e8ce82ca1f85,http://arxiv.org/abs/1804.02806v1 12502," We show that a Bayesian strategy map profile is a Bayesian Nash Equilibrium independent of any prior if and only if the Bayesian strategy map profile, evaluated at any type profile, is the Nash equilibrium of the so-called local deterministic game corresponding to that type profile. We call such a Bayesian game type-regular. We then show that an m-dimensional n-agent Bayesian game whose utilities are linearly dependent on the types of the agents is equivalent, following a normalisation of the type space of each agent into the (m-1)-simplex, to a simultaneous competition in nm so-called basic n-agent games. If the game is own-type-linear, i.e., the utility of each player only depends linearly on its own type, then the Bayesian game is equivalent to a simultaneous competition in m basic n-agent games, called a multi-game. We then prove that an own-type-linear Bayesian game is type-regular if it is type-regular on the vertices of the (m-1)-simplex, a result which provides a large class of type-regular Bayesian maps. The class of m-dimensional own-type-linear Bayesian games can model, via their equivalence with multi-games, simultaneous decision-making in m different environments. We show that a two dimensional own-type-linear Bayesian game can be used to give a new model of the Prisoner's Dilemma (PD) in which the prosocial tendencies of the agents are considered as their types and the two agents play simultaneously in the PD as well as in a prosocial game. This Bayesian game addresses the materialistic and the prosocial tendencies of the agents. Similarly, we present a new two dimensional Bayesian model of the Trust game in which the type of the two agents reflect their prosocial tendency or trustfulness, which leads to more reasonable Nash equilibria. We finally consider an example of such multi-environment decision making in production by several companies in multi-markets. ",samira ghorban,,2018.0,,arXiv,Edalat2018,True,,arXiv,Not available,Prior Independent Equilibria and Linear Multi-dimensional Bayesian Games,291781ba150773d5b155e8ce82ca1f85,http://arxiv.org/abs/1804.02806v1 12503," Conventional noncooperative game theory hypothesizes that the joint strategy of a set of players in a game must satisfy an ""equilibrium concept"". All other joint strategies are considered impossible; the only issue is what equilibrium concept is ""correct"". This hypothesis violates the desiderata underlying probability theory. Indeed, probability theory renders moot the problem of what equilibrium concept is correct - every joint strategy can arise with non-zero probability. Rather than a first-principles derivation of an equilibrium concept, game theory requires a first-principles derivation of a distribution over joint (mixed) strategies. This paper shows how information theory can provide such a distribution over joint strategies. If a scientist external to the game wants to distill such a distribution to a point prediction, that prediction should be set by decision theory, using their (!) loss function. So the predicted joint strategy - the ""equilibrium concept"" - varies with the external scientist's loss function. It is shown here that in many games, having a probability distribution with support restricted to Nash equilibria - as stipulated by conventional game theory - is impossible. It is also show how to: i) Derive an information-theoretic quantification of a player's degree of rationality; ii) Derive bounded rationality as a cost of computation; iii) Elaborate the close formal relationship between game theory and statistical physics; iv) Use this relationship to extend game theory to allow stochastically varying numbers of players. ",david wolpert,,2005.0,,arXiv,Wolpert2005,True,,arXiv,Not available,A Predictive Theory of Games,a26adef59a9c721c73a67819740faf10,http://arxiv.org/abs/nlin/0512015v1 12504," We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide algorithms to compute the corresponding optimal strategies. As typical in (simultaneous) game theory, the optimal strategy is usually mixed, i.e., probabilistic, for both the attacker and the defender. From the point of view of information flow, this was to be expected in the case of the defender, since it is well known that randomization at the level of the system design may help to reduce information leaks. Regarding the attacker, however, this seems the first work (w.r.t. the literature in information flow) proving formally that in certain cases the optimal attack strategy is necessarily probabilistic. ",mario alvim,,2017.0,,arXiv,Alvim2017,True,,arXiv,Not available,Information Leakage Games,116e7c8a22cf970a7f37ccf52acb4ba8,http://arxiv.org/abs/1705.05030v2 12505," We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide algorithms to compute the corresponding optimal strategies. As typical in (simultaneous) game theory, the optimal strategy is usually mixed, i.e., probabilistic, for both the attacker and the defender. From the point of view of information flow, this was to be expected in the case of the defender, since it is well known that randomization at the level of the system design may help to reduce information leaks. Regarding the attacker, however, this seems the first work (w.r.t. the literature in information flow) proving formally that in certain cases the optimal attack strategy is necessarily probabilistic. ",konstantinos chatzikokolakis,,2017.0,,arXiv,Alvim2017,True,,arXiv,Not available,Information Leakage Games,116e7c8a22cf970a7f37ccf52acb4ba8,http://arxiv.org/abs/1705.05030v2 12506," We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide algorithms to compute the corresponding optimal strategies. As typical in (simultaneous) game theory, the optimal strategy is usually mixed, i.e., probabilistic, for both the attacker and the defender. From the point of view of information flow, this was to be expected in the case of the defender, since it is well known that randomization at the level of the system design may help to reduce information leaks. Regarding the attacker, however, this seems the first work (w.r.t. the literature in information flow) proving formally that in certain cases the optimal attack strategy is necessarily probabilistic. ",yusuke kawamoto,,2017.0,,arXiv,Alvim2017,True,,arXiv,Not available,Information Leakage Games,116e7c8a22cf970a7f37ccf52acb4ba8,http://arxiv.org/abs/1705.05030v2 12507," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",john morrison,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 12508," We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide algorithms to compute the corresponding optimal strategies. As typical in (simultaneous) game theory, the optimal strategy is usually mixed, i.e., probabilistic, for both the attacker and the defender. From the point of view of information flow, this was to be expected in the case of the defender, since it is well known that randomization at the level of the system design may help to reduce information leaks. Regarding the attacker, however, this seems the first work (w.r.t. the literature in information flow) proving formally that in certain cases the optimal attack strategy is necessarily probabilistic. ",catuscia palamidessi,,2017.0,,arXiv,Alvim2017,True,,arXiv,Not available,Information Leakage Games,116e7c8a22cf970a7f37ccf52acb4ba8,http://arxiv.org/abs/1705.05030v2 12509," This volume contains the proceedings of the Fourth International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2013). The symposium took place in Borca di Cadore, Italy, from 29th to 31st of August 2013. The proceedings of the symposium contain the abstracts of three invited talks and 17 papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers range over a wide spectrum, including algorithmic and behavioral game theory, game semantics, formal languages and automata theory, modal and temporal logics, software verification, hybrid systems. ",gabriele puppis,,2013.0,10.4204/EPTCS.119,"EPTCS 119, 2013",Puppis2013,True,,arXiv,Not available,"Proceedings Fourth International Symposium on Games, Automata, Logics and Formal Verification",f10271f18a13ce3e0567926d1203fb15,http://arxiv.org/abs/1307.4162v1 12510," This volume contains the proceedings of the Fourth International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2013). The symposium took place in Borca di Cadore, Italy, from 29th to 31st of August 2013. The proceedings of the symposium contain the abstracts of three invited talks and 17 papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers range over a wide spectrum, including algorithmic and behavioral game theory, game semantics, formal languages and automata theory, modal and temporal logics, software verification, hybrid systems. ",tiziano villa,,2013.0,10.4204/EPTCS.119,"EPTCS 119, 2013",Puppis2013,True,,arXiv,Not available,"Proceedings Fourth International Symposium on Games, Automata, Logics and Formal Verification",f10271f18a13ce3e0567926d1203fb15,http://arxiv.org/abs/1307.4162v1 12511," We provide an algorithm for computing the nucleolus for an instance of a weighted voting game in pseudo-polynomial time. This resolves an open question posed by Elkind. et.al. 2007. ",kanstantsin pashkovich,,2018.0,,arXiv,Pashkovich2018,True,,arXiv,Not available,"Computing the Nucleolus of Weighted Voting Games in Pseudo-polynomial Time",a3b3586b02ded25ee62efb3e7dbca64a,http://arxiv.org/abs/1810.02670v1 12512," We consider two-player games played in real time on game structures with clocks and parity objectives. The games are concurrent in that at each turn, both players independently propose a time delay and an action, and the action with the shorter delay is chosen. To prevent a player from winning by blocking time, we restrict each player to strategies that ensure that the player cannot be responsible for causing a zeno run. First, we present an efficient reduction of these games to turn-based (i.e., nonconcurrent) finite-state (i.e., untimed) parity games. The states of the resulting game are pairs of clock regions of the original game. Our reduction improves the best known complexity for solving timed parity games. Moreover, the rich class of algorithms for classical parity games can now be applied to timed parity games. Second, we consider two restricted classes of strategies for the player that represents the controller in a real-time synthesis problem, namely, limit-robust and bounded-robust strategies. Using a limit-robust strategy, the controller cannot choose an exact real-valued time delay but must allow for some nonzero jitter in each of its actions. If there is a given lower bound on the jitter, then the strategy is bounded-robust. We show that exact strategies are more powerful than limit-robust strategies, which are more powerful than bounded-robust strategies for any bound. For both kinds of robust strategies, we present efficient reductions to standard timed automaton games. These reductions provide algorithms for the synthesis of robust real-time controllers. ",krishnendu chatterjee,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Timed Parity Games: Complexity and Robustness,dd1b146263b0531a1f4ec457a3eceb24,http://arxiv.org/abs/0807.1165v1 12513," We consider two-player games played in real time on game structures with clocks and parity objectives. The games are concurrent in that at each turn, both players independently propose a time delay and an action, and the action with the shorter delay is chosen. To prevent a player from winning by blocking time, we restrict each player to strategies that ensure that the player cannot be responsible for causing a zeno run. First, we present an efficient reduction of these games to turn-based (i.e., nonconcurrent) finite-state (i.e., untimed) parity games. The states of the resulting game are pairs of clock regions of the original game. Our reduction improves the best known complexity for solving timed parity games. Moreover, the rich class of algorithms for classical parity games can now be applied to timed parity games. Second, we consider two restricted classes of strategies for the player that represents the controller in a real-time synthesis problem, namely, limit-robust and bounded-robust strategies. Using a limit-robust strategy, the controller cannot choose an exact real-valued time delay but must allow for some nonzero jitter in each of its actions. If there is a given lower bound on the jitter, then the strategy is bounded-robust. We show that exact strategies are more powerful than limit-robust strategies, which are more powerful than bounded-robust strategies for any bound. For both kinds of robust strategies, we present efficient reductions to standard timed automaton games. These reductions provide algorithms for the synthesis of robust real-time controllers. ",thomas henzinger,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Timed Parity Games: Complexity and Robustness,dd1b146263b0531a1f4ec457a3eceb24,http://arxiv.org/abs/0807.1165v1 12514," We consider two-player games played in real time on game structures with clocks and parity objectives. The games are concurrent in that at each turn, both players independently propose a time delay and an action, and the action with the shorter delay is chosen. To prevent a player from winning by blocking time, we restrict each player to strategies that ensure that the player cannot be responsible for causing a zeno run. First, we present an efficient reduction of these games to turn-based (i.e., nonconcurrent) finite-state (i.e., untimed) parity games. The states of the resulting game are pairs of clock regions of the original game. Our reduction improves the best known complexity for solving timed parity games. Moreover, the rich class of algorithms for classical parity games can now be applied to timed parity games. Second, we consider two restricted classes of strategies for the player that represents the controller in a real-time synthesis problem, namely, limit-robust and bounded-robust strategies. Using a limit-robust strategy, the controller cannot choose an exact real-valued time delay but must allow for some nonzero jitter in each of its actions. If there is a given lower bound on the jitter, then the strategy is bounded-robust. We show that exact strategies are more powerful than limit-robust strategies, which are more powerful than bounded-robust strategies for any bound. For both kinds of robust strategies, we present efficient reductions to standard timed automaton games. These reductions provide algorithms for the synthesis of robust real-time controllers. ",vinayak prabhu,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Timed Parity Games: Complexity and Robustness,dd1b146263b0531a1f4ec457a3eceb24,http://arxiv.org/abs/0807.1165v1 12515," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. First, we present a simple proof of the fact that in concurrent reachability games, for all $\epsilon>0$, memoryless $\epsilon$-optimal strategies exist. A memoryless strategy is independent of the history of plays, and an $\epsilon$-optimal strategy achieves the objective with probability within $\epsilon$ of the value of the game. In contrast to previous proofs of this fact, our proof is more elementary and more combinatorial. Second, we present a strategy-improvement (a.k.a.\ policy-iteration) algorithm for concurrent games with reachability objectives. We then present a strategy-improvement algorithm for concurrent games with safety objectives. Our algorithms yield sequences of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the game. Our result is significant because the strategy-improvement algorithm for safety games provides, for the first time, a way to approximate the value of a concurrent safety game from below. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",krishnendu chatterjee,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Improvement for Concurrent Reachability and Safety Games,46bd81a89bd0cb4563d9d5ad5eefe6c3,http://arxiv.org/abs/1201.2834v3 12516," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. First, we present a simple proof of the fact that in concurrent reachability games, for all $\epsilon>0$, memoryless $\epsilon$-optimal strategies exist. A memoryless strategy is independent of the history of plays, and an $\epsilon$-optimal strategy achieves the objective with probability within $\epsilon$ of the value of the game. In contrast to previous proofs of this fact, our proof is more elementary and more combinatorial. Second, we present a strategy-improvement (a.k.a.\ policy-iteration) algorithm for concurrent games with reachability objectives. We then present a strategy-improvement algorithm for concurrent games with safety objectives. Our algorithms yield sequences of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the game. Our result is significant because the strategy-improvement algorithm for safety games provides, for the first time, a way to approximate the value of a concurrent safety game from below. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",luca alfaro,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Improvement for Concurrent Reachability and Safety Games,46bd81a89bd0cb4563d9d5ad5eefe6c3,http://arxiv.org/abs/1201.2834v3 12517," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. First, we present a simple proof of the fact that in concurrent reachability games, for all $\epsilon>0$, memoryless $\epsilon$-optimal strategies exist. A memoryless strategy is independent of the history of plays, and an $\epsilon$-optimal strategy achieves the objective with probability within $\epsilon$ of the value of the game. In contrast to previous proofs of this fact, our proof is more elementary and more combinatorial. Second, we present a strategy-improvement (a.k.a.\ policy-iteration) algorithm for concurrent games with reachability objectives. We then present a strategy-improvement algorithm for concurrent games with safety objectives. Our algorithms yield sequences of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the game. Our result is significant because the strategy-improvement algorithm for safety games provides, for the first time, a way to approximate the value of a concurrent safety game from below. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",thomas henzinger,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Improvement for Concurrent Reachability and Safety Games,46bd81a89bd0cb4563d9d5ad5eefe6c3,http://arxiv.org/abs/1201.2834v3 12518," An auction house cannot generally provide the optimal auction technology to every client. Instead it provides one or several auction technologies, and clients select the most appropriate one. For example, eBay provides ascending auctions and ""buy-it-now"" pricing. For each client the offered technology may not be optimal, but it would be too costly for clients to create their own. We call these mechanisms, which emphasize generality rather than optimality, platform mechanisms. A platform mechanism will be adopted by a client if its performance exceeds that of the client's outside option, e.g., hiring (at a cost) a consultant to design the optimal mechanism. We ask two related questions. First, for what costs of the outside option will the platform be universally adopted? Second, what is the structure of good platform mechanisms? We answer these questions using a novel prior-free analysis framework in which we seek mechanisms that are approximately optimal for every prior. ",jason hartline,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Optimal Platform Design,410dfb425ffbd37b30b1a2725a9da250,http://arxiv.org/abs/1412.8518v1 12519," We consider both discrete and continuous time finite state-action stochastic games. In discrete time stochastic games, it is known that a stationary Blackwell-Nash equilibrium (BNE) exists for a single controller additive reward (SC-AR) stochastic game which is a special case of a general stochastic game. We show that, in general, the additive reward condition is needed for the existence of a BNE. We give an example of a single controller stochastic game which does not satisfy additive reward condition. We show that this example does not have a stationary BNE. For a general discrete time discounted stochastic game we give two different sets of conditions and show that a stationary Nash equilibrium that satisfies any set of conditions is a BNE. One of these sets of conditions weakens a set of conditions available in the literature. For continuous time stochastic games, we give an example that does not have a stationary BNE. In fact, this example is a single controller continuous time stochastic game. Then, we introduce a continuous time SC-AR stochastic game. We show that there always exists a stationary deterministic BNE for continuous time SC-AR stochastic game. For a general continuous time discounted stochastic game we give two different sets of conditions and show that a Nash equilibrium that satisfies any set of conditions is a BNE. ",vikas singh,,2016.0,,arXiv,Singh2016,True,,arXiv,Not available,"Blackwell-Nash Equilibrium for Discrete and Continuous Time Stochastic Games",b082058858198067902cb71162fce0a4,http://arxiv.org/abs/1605.00977v1 12520," We consider both discrete and continuous time finite state-action stochastic games. In discrete time stochastic games, it is known that a stationary Blackwell-Nash equilibrium (BNE) exists for a single controller additive reward (SC-AR) stochastic game which is a special case of a general stochastic game. We show that, in general, the additive reward condition is needed for the existence of a BNE. We give an example of a single controller stochastic game which does not satisfy additive reward condition. We show that this example does not have a stationary BNE. For a general discrete time discounted stochastic game we give two different sets of conditions and show that a stationary Nash equilibrium that satisfies any set of conditions is a BNE. One of these sets of conditions weakens a set of conditions available in the literature. For continuous time stochastic games, we give an example that does not have a stationary BNE. In fact, this example is a single controller continuous time stochastic game. Then, we introduce a continuous time SC-AR stochastic game. We show that there always exists a stationary deterministic BNE for continuous time SC-AR stochastic game. For a general continuous time discounted stochastic game we give two different sets of conditions and show that a Nash equilibrium that satisfies any set of conditions is a BNE. ",n. hemachandra,,2016.0,,arXiv,Singh2016,True,,arXiv,Not available,"Blackwell-Nash Equilibrium for Discrete and Continuous Time Stochastic Games",b082058858198067902cb71162fce0a4,http://arxiv.org/abs/1605.00977v1 12521," We consider a class of fully stochastic and fully distributed algorithms, that we prove to learn equilibria in games. Indeed, we consider a family of stochastic distributed dynamics that we prove to converge weakly (in the sense of weak convergence for probabilistic processes) towards their mean-field limit, i.e an ordinary differential equation (ODE) in the general case. We focus then on a class of stochastic dynamics where this ODE turns out to be related to multipopulation replicator dynamics. Using facts known about convergence of this ODE, we discuss the convergence of the initial stochastic dynamics: For general games, there might be non-convergence, but when convergence of the ODE holds, considered stochastic algorithms converge towards Nash equilibria. For games admitting Lyapunov functions, that we call Lyapunov games, the stochastic dynamics converge. We prove that any ordinal potential game, and hence any potential game is a Lyapunov game, with a multiaffine Lyapunov function. For Lyapunov games with a multiaffine Lyapunov function, we prove that this Lyapunov function is a super-martingale over the stochastic dynamics. This leads a way to provide bounds on their time of convergence by martingale arguments. This applies in particular for many classes of games that have been considered in literature, including several load balancing game scenarios and congestion games. ",olivier bournez,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Learning Equilibria in Games by Stochastic Distributed Algorithms,0bb170f82be70781feacca2a853784f7,http://arxiv.org/abs/0907.1916v1 12522," We consider a class of fully stochastic and fully distributed algorithms, that we prove to learn equilibria in games. Indeed, we consider a family of stochastic distributed dynamics that we prove to converge weakly (in the sense of weak convergence for probabilistic processes) towards their mean-field limit, i.e an ordinary differential equation (ODE) in the general case. We focus then on a class of stochastic dynamics where this ODE turns out to be related to multipopulation replicator dynamics. Using facts known about convergence of this ODE, we discuss the convergence of the initial stochastic dynamics: For general games, there might be non-convergence, but when convergence of the ODE holds, considered stochastic algorithms converge towards Nash equilibria. For games admitting Lyapunov functions, that we call Lyapunov games, the stochastic dynamics converge. We prove that any ordinal potential game, and hence any potential game is a Lyapunov game, with a multiaffine Lyapunov function. For Lyapunov games with a multiaffine Lyapunov function, we prove that this Lyapunov function is a super-martingale over the stochastic dynamics. This leads a way to provide bounds on their time of convergence by martingale arguments. This applies in particular for many classes of games that have been considered in literature, including several load balancing game scenarios and congestion games. ",johanne cohen,,2009.0,,arXiv,Bournez2009,True,,arXiv,Not available,Learning Equilibria in Games by Stochastic Distributed Algorithms,0bb170f82be70781feacca2a853784f7,http://arxiv.org/abs/0907.1916v1 12523," We consider infinite duration alternating move games. These games were previously studied by Roth, Balcan, Kalai and Mansour. They presented an FPTAS for computing an approximated equilibrium, and conjectured that there is a polynomial algorithm for finding an exact equilibrium. We extend their study in two directions: (1) We show that finding an exact equilibrium, even for two-player zero-sum games, is polynomial time equivalent to finding a winning strategy for a (two-player) mean-payoff game on graphs. The existence of a polynomial algorithm for the latter is a long standing open question in computer science. Our hardness result for two-player games suggests that two-player alternating move games are harder to solve than two-player simultaneous move games, while the work of Roth et al., suggests that for $k\geq 3$, $k$-player games are easier to analyze in the alternating move setting. (2) We show that optimal equilibriums (with respect to the social welfare metric) can be obtained by pure strategies, and we present an FPTAS for computing a pure approximated equilibrium that is $\delta$-optimal with respect to the social welfare metric. This result extends the previous work by presenting an FPTAS that finds a much more desirable approximated equilibrium. We also show that if there is a polynomial algorithm for mean-payoff games on graphs, then there is a polynomial algorithm that computes an optimal exact equilibrium, and hence, (two-player) mean-payoff games on graphs are inter-reducible with $k$-player alternating move games, for any $k\geq 2$. ",yaron velner,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Infinitely Repeated Alternating Move Games,8bd54cc5a95e0f51afd38dd79ca86493,http://arxiv.org/abs/1212.6632v2 12524," We study the limiting behavior of competitive agents employing gradient-based learning algorithms through the lens of dynamical systems theory. Specifically, we introduce a general framework for competitive gradient-based learning that allows us to analyze a wide breadth of learning algorithms including policy gradient reinforcement learning, gradient based bandits, and certain online convex optimization algorithms. We show that for both potential games and general-sum games, when agents employ gradient-based learning algorithms, they will avoid a non-negligible subset of the local Nash equilibria. This is a strongly negative result for gradient-based learning in games. Our framework also sheds light on the issue of convergence to non-Nash strategies in general-sum and zero-sum games which have no relevance to the underlying game, and arise solely due to the choice of algorithm. The existence and frequency of strategies may explain some of the difficulties encountered when using gradient descent in zero-sum games (e.g. to train generative adversarial networks). Finally, we introduce a new class of games, Morse-Smale games, for which the gradient dynamics correspond to gradient-like flows. This class encompasses a large set of commonly encountered games. For Morse-Smale games, we show that competitive gradient-based learning converges to either limit cycles, Nash equilibria, or non-Nash fixed points almost surely. To reinforce our theoretical contributions, we provide empirical results that highlight the frequency of Nash equilibria that are almost surely avoided by policy gradient in linear quadratic games. Indeed, we present empirical results that show that policy gradient almost surely avoids the unique global Nash equilibrium in one out of five randomly sampled linear quadratic games. ",eric mazumdar,,2018.0,,arXiv,Mazumdar2018,True,,arXiv,Not available,On the Convergence of Gradient-Based Learning in Continuous Games,d9bd269ba7a0f201d8e93d43a4834459,http://arxiv.org/abs/1804.05464v2 12525," We study the limiting behavior of competitive agents employing gradient-based learning algorithms through the lens of dynamical systems theory. Specifically, we introduce a general framework for competitive gradient-based learning that allows us to analyze a wide breadth of learning algorithms including policy gradient reinforcement learning, gradient based bandits, and certain online convex optimization algorithms. We show that for both potential games and general-sum games, when agents employ gradient-based learning algorithms, they will avoid a non-negligible subset of the local Nash equilibria. This is a strongly negative result for gradient-based learning in games. Our framework also sheds light on the issue of convergence to non-Nash strategies in general-sum and zero-sum games which have no relevance to the underlying game, and arise solely due to the choice of algorithm. The existence and frequency of strategies may explain some of the difficulties encountered when using gradient descent in zero-sum games (e.g. to train generative adversarial networks). Finally, we introduce a new class of games, Morse-Smale games, for which the gradient dynamics correspond to gradient-like flows. This class encompasses a large set of commonly encountered games. For Morse-Smale games, we show that competitive gradient-based learning converges to either limit cycles, Nash equilibria, or non-Nash fixed points almost surely. To reinforce our theoretical contributions, we provide empirical results that highlight the frequency of Nash equilibria that are almost surely avoided by policy gradient in linear quadratic games. Indeed, we present empirical results that show that policy gradient almost surely avoids the unique global Nash equilibrium in one out of five randomly sampled linear quadratic games. ",lillian ratliff,,2018.0,,arXiv,Mazumdar2018,True,,arXiv,Not available,On the Convergence of Gradient-Based Learning in Continuous Games,d9bd269ba7a0f201d8e93d43a4834459,http://arxiv.org/abs/1804.05464v2 12526," We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equilibrium) no longer hold. Nevertheless, we can use the framework to provide psychologically appealing explanations to observed behavior in well-studied games (such as finitely repeated prisoner's dilemma and rock-paper-scissors). Furthermore, we provide natural conditions on games sufficient to guarantee that equilibria exist. As an application of this framework, we consider a notion of game-theoretic implementation of mediators in computational games. We show that a special case of this notion is equivalent to a variant of the traditional cryptographic definition of protocol security; this result shows that, when taking computation into account, the two approaches used for dealing with ""deviating"" players in two different communities -- Nash equilibrium in game theory and zero-knowledge ""simulation"" in cryptography -- are intimately related. ",joseph halpern,,2008.0,,arXiv,Halpern2008,True,,arXiv,Not available,Game Theory with Costly Computation,18b2dc8a1364733ab8e5d5382e264eb8,http://arxiv.org/abs/0809.0024v1 12527," We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equilibrium) no longer hold. Nevertheless, we can use the framework to provide psychologically appealing explanations to observed behavior in well-studied games (such as finitely repeated prisoner's dilemma and rock-paper-scissors). Furthermore, we provide natural conditions on games sufficient to guarantee that equilibria exist. As an application of this framework, we consider a notion of game-theoretic implementation of mediators in computational games. We show that a special case of this notion is equivalent to a variant of the traditional cryptographic definition of protocol security; this result shows that, when taking computation into account, the two approaches used for dealing with ""deviating"" players in two different communities -- Nash equilibrium in game theory and zero-knowledge ""simulation"" in cryptography -- are intimately related. ",rafael pass,,2008.0,,arXiv,Halpern2008,True,,arXiv,Not available,Game Theory with Costly Computation,18b2dc8a1364733ab8e5d5382e264eb8,http://arxiv.org/abs/0809.0024v1 12528," Weakly acyclic games form a natural generalization of the class of games that have the finite improvement property (FIP). In such games one stipulates that from any initial joint strategy some finite improvement path exists. We classify weakly acyclic games using the concept of a scheduler introduced in arXiv:1202.2209. We also show that finite games that can be solved by the iterated elimination of never best response strategies are weakly acyclic. Finally, we explain how the schedulers allow us to improve the bounds on finding a Nash equilibrium in a weakly acyclic game. ",krzysztof apt,,2012.0,,arXiv,Apt2012,True,,arXiv,Not available,A Classification of Weakly Acyclic Games,d6a03b4276b78e1d3489ccbb54dedf28,http://arxiv.org/abs/1206.0130v5 12529," An auction house cannot generally provide the optimal auction technology to every client. Instead it provides one or several auction technologies, and clients select the most appropriate one. For example, eBay provides ascending auctions and ""buy-it-now"" pricing. For each client the offered technology may not be optimal, but it would be too costly for clients to create their own. We call these mechanisms, which emphasize generality rather than optimality, platform mechanisms. A platform mechanism will be adopted by a client if its performance exceeds that of the client's outside option, e.g., hiring (at a cost) a consultant to design the optimal mechanism. We ask two related questions. First, for what costs of the outside option will the platform be universally adopted? Second, what is the structure of good platform mechanisms? We answer these questions using a novel prior-free analysis framework in which we seek mechanisms that are approximately optimal for every prior. ",tim roughgarden,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Optimal Platform Design,410dfb425ffbd37b30b1a2725a9da250,http://arxiv.org/abs/1412.8518v1 12530," Weakly acyclic games form a natural generalization of the class of games that have the finite improvement property (FIP). In such games one stipulates that from any initial joint strategy some finite improvement path exists. We classify weakly acyclic games using the concept of a scheduler introduced in arXiv:1202.2209. We also show that finite games that can be solved by the iterated elimination of never best response strategies are weakly acyclic. Finally, we explain how the schedulers allow us to improve the bounds on finding a Nash equilibrium in a weakly acyclic game. ",sunil simon,,2012.0,,arXiv,Apt2012,True,,arXiv,Not available,A Classification of Weakly Acyclic Games,d6a03b4276b78e1d3489ccbb54dedf28,http://arxiv.org/abs/1206.0130v5 12531," Looks at state interactions from an agent based AI perspective to see state interactions as an example of emergent intelligent behavior. Exposes basic principles of game theory. ",eric engle,,2008.0,,arXiv,Engle2008,True,,arXiv,Not available,Agent Models of Political Interactions,d4fd58097f629d6d7a65109a1035663d,http://arxiv.org/abs/0809.0458v1 12532," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",wenkui ding,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 12533," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tao wu,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 12534," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tao qin,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 12535," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tie-yan liu,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 12536," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",nianxia cao,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 12537," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",swastik brahma,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 12538," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",pramod varshney,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 12539," Future wireless networks are expected to be highly heterogeneous with the co-existence of macrocells and small cells as well as provide support for device-to-device (D2D) communication. In such muti-tier heterogeneous systems centralized radio resource allocation and interference management schemes will not be scalable. In this work, we propose an auction-based distributed solution to allocate radio resources in a muti-tier heterogeneous network. We provide the bound of achievable data rate and show that the complexity of the proposed scheme is linear with number of transmitter nodes and the available resources. The signaling issues (e.g., information exchange over control channels) for the proposed distributed solution is also discussed. Numerical results show the effectiveness of proposed solution in comparison with a centralized resource allocation scheme. ",monowar hasan,,2015.0,,arXiv,Hasan2015,True,,arXiv,Not available,"Distributed Resource Allocation in D2D-Enabled Multi-tier Cellular Networks: An Auction Approach",9193cb40d367d8593d69cb2780d79489,http://arxiv.org/abs/1501.04199v2 12540," Within the context of video games the notion of perfectly rational agents can be undesirable as it leads to uninteresting situations, where humans face tough adversarial decision makers. Current frameworks for stochastic games and reinforcement learning prohibit tuneable strategies as they seek optimal performance. In this paper, we enable such tuneable behaviour by generalising soft Q-learning to stochastic games, where more than one agent interact strategically. We contribute both theoretically and empirically. On the theory side, we show that games with soft Q-learning exhibit a unique value and generalise team games and zero-sum games far beyond these two extremes to cover a continuous spectrum of gaming behaviour. Experimentally, we show how tuning agents' constraints affect performance and demonstrate, through a neural network architecture, how to reliably balance games with high-dimensional representations. ",jordi grau-moya,,2018.0,,arXiv,Grau-Moya2018,True,,arXiv,Not available,Balancing Two-Player Stochastic Games with Soft Q-Learning,858943ac7cc8980688c5a6e110edeec8,http://arxiv.org/abs/1802.03216v1 12541," Future wireless networks are expected to be highly heterogeneous with the co-existence of macrocells and small cells as well as provide support for device-to-device (D2D) communication. In such muti-tier heterogeneous systems centralized radio resource allocation and interference management schemes will not be scalable. In this work, we propose an auction-based distributed solution to allocate radio resources in a muti-tier heterogeneous network. We provide the bound of achievable data rate and show that the complexity of the proposed scheme is linear with number of transmitter nodes and the available resources. The signaling issues (e.g., information exchange over control channels) for the proposed distributed solution is also discussed. Numerical results show the effectiveness of proposed solution in comparison with a centralized resource allocation scheme. ",ekram hossain,,2015.0,,arXiv,Hasan2015,True,,arXiv,Not available,"Distributed Resource Allocation in D2D-Enabled Multi-tier Cellular Networks: An Auction Approach",9193cb40d367d8593d69cb2780d79489,http://arxiv.org/abs/1501.04199v2 12542," In a recent and ongoing work, Baldwin and Klemperer explored a connection between tropical geometry and economics. They gave a sufficient condition for the existence of competitive equilibrium in product-mix auctions of indivisible goods. This result, which we call the Unimodularity Theorem, can also be traced back to the work of Danilov, Koshevoy, and Murota in discrete convex analysis. We give a new proof of the Unimodularity Theorem via the classical unimodularity theorem in integer programming. We give a unified treatment of these results via tropical geometry and formulate a new sufficient condition for competitive equilibrium when there are only two types of product. Generalizations of our theorem in higher dimensions are equivalent to various forms of the Oda conjecture in algebraic geometry. ",ngoc tran,,2015.0,,arXiv,Tran2015,True,,arXiv,Not available,Product-Mix Auctions and Tropical Geometry,0ac60af28727ed7c03a4f526379a0973,http://arxiv.org/abs/1505.05737v4 12543," In a recent and ongoing work, Baldwin and Klemperer explored a connection between tropical geometry and economics. They gave a sufficient condition for the existence of competitive equilibrium in product-mix auctions of indivisible goods. This result, which we call the Unimodularity Theorem, can also be traced back to the work of Danilov, Koshevoy, and Murota in discrete convex analysis. We give a new proof of the Unimodularity Theorem via the classical unimodularity theorem in integer programming. We give a unified treatment of these results via tropical geometry and formulate a new sufficient condition for competitive equilibrium when there are only two types of product. Generalizations of our theorem in higher dimensions are equivalent to various forms of the Oda conjecture in algebraic geometry. ",josephine yu,,2015.0,,arXiv,Tran2015,True,,arXiv,Not available,Product-Mix Auctions and Tropical Geometry,0ac60af28727ed7c03a4f526379a0973,http://arxiv.org/abs/1505.05737v4 12544," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",nicola gatti,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12545," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",marco rocco,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12546," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",paolo serafino,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12547," Sponsored Search Auctions (SSAs) arguably represent the problem at the intersection of computer science and economics with the deepest applications in real life. Within the realm of SSAs, the study of the effects that showing one ad has on the other ads, a.k.a. externalities in economics, is of utmost importance and has so far attracted the attention of much research. However, even the basic question of modeling the problem has so far escaped a definitive answer. The popular cascade model is arguably too idealized to really describe the phenomenon yet it allows a good comprehension of the problem. Other models, instead, describe the setting more adequately but are too complex to permit a satisfactory theoretical analysis. In this work, we attempt to get the best of both approaches: firstly, we define a number of general mathematical formulations for the problem in the attempt to have a rich description of externalities in SSAs and, secondly, prove a host of results drawing a nearly complete picture about the computational complexity of the problem. We complement these approximability results with some considerations about mechanism design in our context. ",carmine ventre,,2016.0,,arXiv,Gatti2016,True,,arXiv,Not available,Towards Better Models of Externalities in Sponsored Search Auctions,78c9078127ff3d98b04c0caeb2a4dbe3,http://arxiv.org/abs/1604.04095v1 12548," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",shih-tang su,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 12549," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",jacob abernethy,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 12550," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",grant schoenebeck,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 12551," Within the context of video games the notion of perfectly rational agents can be undesirable as it leads to uninteresting situations, where humans face tough adversarial decision makers. Current frameworks for stochastic games and reinforcement learning prohibit tuneable strategies as they seek optimal performance. In this paper, we enable such tuneable behaviour by generalising soft Q-learning to stochastic games, where more than one agent interact strategically. We contribute both theoretically and empirically. On the theory side, we show that games with soft Q-learning exhibit a unique value and generalise team games and zero-sum games far beyond these two extremes to cover a continuous spectrum of gaming behaviour. Experimentally, we show how tuning agents' constraints affect performance and demonstrate, through a neural network architecture, how to reliably balance games with high-dimensional representations. ",felix leibfried,,2018.0,,arXiv,Grau-Moya2018,True,,arXiv,Not available,Balancing Two-Player Stochastic Games with Soft Q-Learning,858943ac7cc8980688c5a6e110edeec8,http://arxiv.org/abs/1802.03216v1 12552," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",vijay subramanian,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 12553," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",erel segal-halevi,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12554," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",avinatan hassidim,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12555," In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs. ",yonatan aumann,,2016.0,10.1007/978-3-662-53354-3_21,arXiv,Segal-Halevi2016,True,,arXiv,Not available,SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism,cf43ec5f5919b37740be89d51b7b96c7,http://arxiv.org/abs/1607.05139v1 12556," Computational and economic results suggest that social welfare maximization and combinatorial auction design are much easier when bidders' valuations satisfy the ""gross substitutes"" condition. The goal of this paper is to evaluate rigorously the folklore belief that the main take-aways from these results remain valid in settings where the gross substitutes condition holds only approximately. We show that for valuations that pointwise approximate a gross substitutes valuation (in fact even a linear valuation), optimal social welfare cannot be approximated to within a subpolynomial factor and demand oracles cannot be simulated using a subexponential number of value queries. We then provide several positive results by imposing additional structure on the valuations (beyond gross substitutes), using a more stringent notion of approximation, and/or using more powerful oracle access to the valuations. For example, we prove that the performance of the greedy algorithm degrades gracefully for near-linear valuations with approximately decreasing marginal values, that with demand queries, approximate welfare guarantees for XOS valuations degrade gracefully for valuations that are pointwise close to XOS, and that the performance of the Kelso-Crawford auction degrades gracefully for valuations that are close to various subclasses of gross substitutes valuations. ",tim roughgarden,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,When Are Welfare Guarantees Robust?,233e547dc256dcef58b4d3cc691e87a0,http://arxiv.org/abs/1608.02402v1 12557," Computational and economic results suggest that social welfare maximization and combinatorial auction design are much easier when bidders' valuations satisfy the ""gross substitutes"" condition. The goal of this paper is to evaluate rigorously the folklore belief that the main take-aways from these results remain valid in settings where the gross substitutes condition holds only approximately. We show that for valuations that pointwise approximate a gross substitutes valuation (in fact even a linear valuation), optimal social welfare cannot be approximated to within a subpolynomial factor and demand oracles cannot be simulated using a subexponential number of value queries. We then provide several positive results by imposing additional structure on the valuations (beyond gross substitutes), using a more stringent notion of approximation, and/or using more powerful oracle access to the valuations. For example, we prove that the performance of the greedy algorithm degrades gracefully for near-linear valuations with approximately decreasing marginal values, that with demand queries, approximate welfare guarantees for XOS valuations degrade gracefully for valuations that are pointwise close to XOS, and that the performance of the Kelso-Crawford auction degrades gracefully for valuations that are close to various subclasses of gross substitutes valuations. ",inbal talgam-cohen,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,When Are Welfare Guarantees Robust?,233e547dc256dcef58b4d3cc691e87a0,http://arxiv.org/abs/1608.02402v1 12558," Computational and economic results suggest that social welfare maximization and combinatorial auction design are much easier when bidders' valuations satisfy the ""gross substitutes"" condition. The goal of this paper is to evaluate rigorously the folklore belief that the main take-aways from these results remain valid in settings where the gross substitutes condition holds only approximately. We show that for valuations that pointwise approximate a gross substitutes valuation (in fact even a linear valuation), optimal social welfare cannot be approximated to within a subpolynomial factor and demand oracles cannot be simulated using a subexponential number of value queries. We then provide several positive results by imposing additional structure on the valuations (beyond gross substitutes), using a more stringent notion of approximation, and/or using more powerful oracle access to the valuations. For example, we prove that the performance of the greedy algorithm degrades gracefully for near-linear valuations with approximately decreasing marginal values, that with demand queries, approximate welfare guarantees for XOS valuations degrade gracefully for valuations that are pointwise close to XOS, and that the performance of the Kelso-Crawford auction degrades gracefully for valuations that are close to various subclasses of gross substitutes valuations. ",jan vondrak,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,When Are Welfare Guarantees Robust?,233e547dc256dcef58b4d3cc691e87a0,http://arxiv.org/abs/1608.02402v1 12559," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",amy greenwald,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 12560," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",takehiro oyakawa,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 12561," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",vasilis syrgkanis,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 12562," We show that computing the revenue-optimal deterministic auction in unit-demand single-buyer Bayesian settings, i.e. the optimal item-pricing, is computationally hard even in single-item settings where the buyer's value distribution is a sum of independently distributed attributes, or multi-item settings where the buyer's values for the items are independent. We also show that it is intractable to optimally price the grand bundle of multiple items for an additive bidder whose values for the items are independent. These difficulties stem from implicit definitions of a value distribution. We provide three instances of how different properties of implicit distributions can lead to intractability: the first is a #P-hardness proof, while the remaining two are reductions from the SQRT-SUM problem of Garey, Graham, and Johnson. While simple pricing schemes can oftentimes approximate the best scheme in revenue, they can have drastically different underlying structure. We argue therefore that either the specification of the input distribution must be highly restricted in format, or it is necessary for the goal to be mere approximation to the optimal scheme's revenue instead of computing properties of the scheme itself. ",constantinos daskalakis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,Optimal Pricing is Hard,b3516571612190603079393cfb9437e1,http://arxiv.org/abs/1503.02516v1 12563," Within the context of video games the notion of perfectly rational agents can be undesirable as it leads to uninteresting situations, where humans face tough adversarial decision makers. Current frameworks for stochastic games and reinforcement learning prohibit tuneable strategies as they seek optimal performance. In this paper, we enable such tuneable behaviour by generalising soft Q-learning to stochastic games, where more than one agent interact strategically. We contribute both theoretically and empirically. On the theory side, we show that games with soft Q-learning exhibit a unique value and generalise team games and zero-sum games far beyond these two extremes to cover a continuous spectrum of gaming behaviour. Experimentally, we show how tuning agents' constraints affect performance and demonstrate, through a neural network architecture, how to reliably balance games with high-dimensional representations. ",haitham bou-ammar,,2018.0,,arXiv,Grau-Moya2018,True,,arXiv,Not available,Balancing Two-Player Stochastic Games with Soft Q-Learning,858943ac7cc8980688c5a6e110edeec8,http://arxiv.org/abs/1802.03216v1 12564," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",sevi baltaoglu,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 12565," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",lang tong,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 12566," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",qing zhao,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 12567," We show that it is NP-Complete to decide whether a bimatrix game is degenerate and it is Co-NP-Complete to decide whether a bimatrix game is nondegenerate. ",ye du,,2009.0,,arXiv,Du2009,True,,arXiv,Not available,On the Complexity of Deciding Degeneracy in Games,d72cd2ca7eb17a37f0e411076b1957b3,http://arxiv.org/abs/0905.3012v1 12568," We solve the classical ""Game of Pure Strategy"" using linear programming. We notice an intricate even-odd behavior in the results of our computations, that seems to encourage odd or maximal bids. ",glenn rhoads,,2012.0,10.3390/g3040150,Games 3 (2012) 150--156,Rhoads2012,True,,arXiv,Not available,The Game of Pure Strategy is solved!,d81359740d2905b18834b6d751aaf4e9,http://arxiv.org/abs/1202.0695v1 12569," We solve the classical ""Game of Pure Strategy"" using linear programming. We notice an intricate even-odd behavior in the results of our computations, that seems to encourage odd or maximal bids. ",laurent bartholdi,,2012.0,10.3390/g3040150,Games 3 (2012) 150--156,Rhoads2012,True,,arXiv,Not available,The Game of Pure Strategy is solved!,d81359740d2905b18834b6d751aaf4e9,http://arxiv.org/abs/1202.0695v1 12570," Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission. ",e. ahmed,,2012.0,,arXiv,Ahmed2012,True,,arXiv,Not available,On Dynamical Cournot Game on a Graph,ed2609c57a331e1506cdb54489e64cb9,http://arxiv.org/abs/1208.4528v1 12571," Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission. ",m. shehata,,2012.0,,arXiv,Ahmed2012,True,,arXiv,Not available,On Dynamical Cournot Game on a Graph,ed2609c57a331e1506cdb54489e64cb9,http://arxiv.org/abs/1208.4528v1 12572," Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission. ",h. el-saka,,2012.0,,arXiv,Ahmed2012,True,,arXiv,Not available,On Dynamical Cournot Game on a Graph,ed2609c57a331e1506cdb54489e64cb9,http://arxiv.org/abs/1208.4528v1 12573," The rank of a bimatrix game (A,B) is the rank of the matrix A+B. We give a construction of rank-1 games with exponentially many equilibria, which answers an open problem by Kannan and Theobald (2010). ",bernhard stengel,,2012.0,,arXiv,Stengel2012,True,,arXiv,Not available,Rank-1 Games With Exponentially Many Nash Equilibria,83f8f522de390746f815e12d87578086,http://arxiv.org/abs/1211.2405v1 12574," Crypto-currencies are digital assets designed to work as a medium of exchange, e.g., Bitcoin, but they are susceptible to attacks (dishonest behavior of participants). A framework for the analysis of attacks in crypto-currencies requires (a) modeling of game-theoretic aspects to analyze incentives for deviation from honest behavior; (b) concurrent interactions between participants; and (c) analysis of long-term monetary gains. Traditional game-theoretic approaches for the analysis of security protocols consider either qualitative temporal properties such as safety and termination, or the very special class of one-shot (stateless) games. However, to analyze general attacks on protocols for crypto-currencies, both stateful analysis and quantitative objectives are necessary. In this work our main contributions are as follows: (a) we show how a class of concurrent mean-payoff games, namely ergodic games, can model various attacks that arise naturally in crypto-currencies; (b) we present the first practical implementation of algorithms for ergodic games that scales to model realistic problems for crypto-currencies; and (c) we present experimental results showing that our framework can handle games with thousands of states and millions of transitions. ",krishnendu chatterjee,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies",fe4f71cbe3bbde6159d5f64270672f66,http://arxiv.org/abs/1806.03108v1 12575," We introduce the notion of stable solution in mean field game theory: they are locally isolated solutions of the mean field game system. We prove that such solutions exist in potential mean field games and are local attractors for learning procedures. ",ariela briani,,2016.0,,arXiv,Briani2016,True,,arXiv,Not available,Stable solutions in potential mean field game systems,66bb82909540cbfdbbb959f8496ef33b,http://arxiv.org/abs/1612.01877v1 12576," We introduce the notion of stable solution in mean field game theory: they are locally isolated solutions of the mean field game system. We prove that such solutions exist in potential mean field games and are local attractors for learning procedures. ",pierre cardaliaguet,,2016.0,,arXiv,Briani2016,True,,arXiv,Not available,Stable solutions in potential mean field game systems,66bb82909540cbfdbbb959f8496ef33b,http://arxiv.org/abs/1612.01877v1 12577," Partially-ordered set games, also called poset games, are a class of two-player combinatorial games. The playing field consists of a set of elements, some of which are greater than other elements. Two players take turns removing an element and all elements greater than it, and whoever takes the last element wins. Examples of poset games include Nim and Chomp. We investigate the complexity of computing which player of a poset game has a winning strategy. We give an inductive procedure that modifies poset games to change the nim- value which informally captures the winning strategies in the game. For a generic poset game G, we describe an efficient method for constructing a game not G such that the first player has a winning strategy if and only if the second player has a winning strategy on G. This solves the long-standing problem of whether this construction can be done efficiently. This construction also allows us to reduce the class of Boolean formulas to poset games, establishing a lower bound on the complexity of poset games. ",adam kalinich,,2011.0,10.1016/j.ipl.2011.09.016,arXiv,Kalinich2011,True,,arXiv,Not available,Flipping the Winner of a Poset Game,1718da1b50248395ef182a0767b60260,http://arxiv.org/abs/1111.4872v1 12578," The game of baccarat has evolved from a parlor game played by French aristocrats in the first half of the 19th century to a casino game that generated over US\$41 billion in revenue for the casinos of Macau in 2013. The parlor game was originally a three-person zero-sum game. Later in the 19th century it was simplified to a two-person zero-sum game. Early in the 20th century the parlor game became a casino game, no longer zero-sum. In the mid 20th century, the strategic casino game became a nonstrategic game, with players competing against the house instead of against each other. We argue that this evolution was motivated by both economic and game-theoretic considerations. ",s. ethier,,2013.0,,arXiv,Ethier2013,True,,arXiv,Not available,The evolution of the game of baccarat,734e2d14017f15ed8b68b90357b420da,http://arxiv.org/abs/1308.1481v2 12579," The game of baccarat has evolved from a parlor game played by French aristocrats in the first half of the 19th century to a casino game that generated over US\$41 billion in revenue for the casinos of Macau in 2013. The parlor game was originally a three-person zero-sum game. Later in the 19th century it was simplified to a two-person zero-sum game. Early in the 20th century the parlor game became a casino game, no longer zero-sum. In the mid 20th century, the strategic casino game became a nonstrategic game, with players competing against the house instead of against each other. We argue that this evolution was motivated by both economic and game-theoretic considerations. ",jiyeon lee,,2013.0,,arXiv,Ethier2013,True,,arXiv,Not available,The evolution of the game of baccarat,734e2d14017f15ed8b68b90357b420da,http://arxiv.org/abs/1308.1481v2 12580," Quantum games with incomplete information can be studied within a Bayesian framework. We analyze games quantized within the EWL framework [Eisert, Wilkens, and Lewenstein, Phys Rev. Lett. 83, 3077 (1999)]. We solve for the Nash equilibria of a variety of two-player quantum games and compare the results to the solutions of the corresponding classical games. We then analyze Bayesian games where there is uncertainty about the player types in two-player conflicting interest games. The solutions to the Bayesian games are found to have a phase diagram-like structure where different equilibria exist in different parameter regions, depending both on the amount of uncertainty and the degree of entanglement. We find that in games where a Pareto-optimal solution is not a Nash equilibrium, it is possible for the quantized game to have an advantage over the classical version. In addition, we analyze the behavior of the solutions as the strategy choices approach an unrestricted operation. We find that some games have a continuum of solutions, bounded by the solutions of a simpler restricted game. A deeper understanding of Bayesian quantum game theory could lead to novel quantum applications in a multi-agent setting. ",neal solmeyer,,2017.0,,arXiv,Solmeyer2017,True,,arXiv,Not available,"Characterizing the Nash equilibria of three-player Bayesian quantum games",ccad2736114574b51a3c8f0f41ef538a,http://arxiv.org/abs/1703.03292v1 12581," Quantum games with incomplete information can be studied within a Bayesian framework. We analyze games quantized within the EWL framework [Eisert, Wilkens, and Lewenstein, Phys Rev. Lett. 83, 3077 (1999)]. We solve for the Nash equilibria of a variety of two-player quantum games and compare the results to the solutions of the corresponding classical games. We then analyze Bayesian games where there is uncertainty about the player types in two-player conflicting interest games. The solutions to the Bayesian games are found to have a phase diagram-like structure where different equilibria exist in different parameter regions, depending both on the amount of uncertainty and the degree of entanglement. We find that in games where a Pareto-optimal solution is not a Nash equilibrium, it is possible for the quantized game to have an advantage over the classical version. In addition, we analyze the behavior of the solutions as the strategy choices approach an unrestricted operation. We find that some games have a continuum of solutions, bounded by the solutions of a simpler restricted game. A deeper understanding of Bayesian quantum game theory could lead to novel quantum applications in a multi-agent setting. ",radhakrishnan balu,,2017.0,,arXiv,Solmeyer2017,True,,arXiv,Not available,"Characterizing the Nash equilibria of three-player Bayesian quantum games",ccad2736114574b51a3c8f0f41ef538a,http://arxiv.org/abs/1703.03292v1 12582," We consider a class of coalition formation games called hedonic games, i.e., games in which the utility of a player is completely determined by the coalition that the player belongs to. We first define the class of subset-additive hedonic games and show that they have the same representation power as the class of hedonic games. We then define a restriction of subset-additive hedonic games that we call subset-neutral hedonic games and generalize a result by Bogomolnaia and Jackson (2002) by showing the existence of a Nash stable partition and an individually stable partition in such games. We also consider neutrally anonymous hedonic games and show that they form a subclass of the subset-additive hedonic games. Finally, we show the existence of a core stable partition that is also individually stable in neutrally anonymous hedonic games by exhibiting an algorithm to compute such a partition. ",warut suksompong,,2018.0,10.1016/j.mathsocsci.2015.07.004,"Mathematical Social Sciences, 78:1-5 (2015)",Suksompong2018,True,,arXiv,Not available,Individual and Group Stability in Neutral Restrictions of Hedonic Games,1f8caac94a6a1058da7df1e6310f1bd7,http://arxiv.org/abs/1804.03315v1 12583," Studying Nash dynamics is an important approach for analyzing the outcome of games with repeated selfish behavior of self-interested agents. Sink equilibria has been introduced by Goemans, Mirrokni, and Vetta for studying social cost on Nash dynamics over pure strategies in games. However, they do not address the complexity of sink equilibria in these games. Recently, Fabrikant and Papadimitriou initiated the study of the complexity of Nash dynamics in two classes of games. In order to completely understand the complexity of Nash dynamics in a variety of games, we study the following three questions for various games: (i) given a state in game, can we verify if this state is in a sink equilibrium or not? (ii) given an instance of a game, can we verify if there exists any sink equilibrium other than pure Nash equilibria? and (iii) given an instance of a game, can we verify if there exists a pure Nash equilibrium (i.e, a sink equilibrium with one state)? In this paper, we almost answer all of the above questions for a variety of classes of games with succinct representation, including anonymous games, player-specific and weighted congestion games, valid-utility games, and two-sided market games. In particular, for most of these problems, we show that (i) it is PSPACE-complete to verify if a given state is in a sink equilibrium, (ii) it is NP-hard to verify if there exists a pure Nash equilibrium in the game or not, (iii) it is PSPACE-complete to verify if there exists any sink equilibrium other than pure Nash equilibria. To solve these problems, we illustrate general techniques that could be used to answer similar questions in other classes of games. ",vahab mirrokni,,2009.0,,arXiv,Mirrokni2009,True,,arXiv,Not available,On the complexity of Nash dynamics and Sink Equilibria,af72e9522db4cb7ab46eb551fd614055,http://arxiv.org/abs/0902.0382v1 12584," Studying Nash dynamics is an important approach for analyzing the outcome of games with repeated selfish behavior of self-interested agents. Sink equilibria has been introduced by Goemans, Mirrokni, and Vetta for studying social cost on Nash dynamics over pure strategies in games. However, they do not address the complexity of sink equilibria in these games. Recently, Fabrikant and Papadimitriou initiated the study of the complexity of Nash dynamics in two classes of games. In order to completely understand the complexity of Nash dynamics in a variety of games, we study the following three questions for various games: (i) given a state in game, can we verify if this state is in a sink equilibrium or not? (ii) given an instance of a game, can we verify if there exists any sink equilibrium other than pure Nash equilibria? and (iii) given an instance of a game, can we verify if there exists a pure Nash equilibrium (i.e, a sink equilibrium with one state)? In this paper, we almost answer all of the above questions for a variety of classes of games with succinct representation, including anonymous games, player-specific and weighted congestion games, valid-utility games, and two-sided market games. In particular, for most of these problems, we show that (i) it is PSPACE-complete to verify if a given state is in a sink equilibrium, (ii) it is NP-hard to verify if there exists a pure Nash equilibrium in the game or not, (iii) it is PSPACE-complete to verify if there exists any sink equilibrium other than pure Nash equilibria. To solve these problems, we illustrate general techniques that could be used to answer similar questions in other classes of games. ",alexander skopalik,,2009.0,,arXiv,Mirrokni2009,True,,arXiv,Not available,On the complexity of Nash dynamics and Sink Equilibria,af72e9522db4cb7ab46eb551fd614055,http://arxiv.org/abs/0902.0382v1 12585," Crypto-currencies are digital assets designed to work as a medium of exchange, e.g., Bitcoin, but they are susceptible to attacks (dishonest behavior of participants). A framework for the analysis of attacks in crypto-currencies requires (a) modeling of game-theoretic aspects to analyze incentives for deviation from honest behavior; (b) concurrent interactions between participants; and (c) analysis of long-term monetary gains. Traditional game-theoretic approaches for the analysis of security protocols consider either qualitative temporal properties such as safety and termination, or the very special class of one-shot (stateless) games. However, to analyze general attacks on protocols for crypto-currencies, both stateful analysis and quantitative objectives are necessary. In this work our main contributions are as follows: (a) we show how a class of concurrent mean-payoff games, namely ergodic games, can model various attacks that arise naturally in crypto-currencies; (b) we present the first practical implementation of algorithms for ergodic games that scales to model realistic problems for crypto-currencies; and (c) we present experimental results showing that our framework can handle games with thousands of states and millions of transitions. ",amir goharshady,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies",fe4f71cbe3bbde6159d5f64270672f66,http://arxiv.org/abs/1806.03108v1 12586," We prove that in a normal form n-player game with m actions for each player, there exists an approximate Nash equilibrium where each player randomizes uniformly among a set of O(log(m) + log(n)) pure strategies. This result induces an $N^{\log \log N}$ algorithm for computing an approximate Nash equilibrium in games where the number of actions is polynomial in the number of players (m=poly(n)), where $N=nm^n$ is the size of the game (the input size). In addition, we establish an inverse connection between the entropy of Nash equilibria in the game, and the time it takes to find such an approximate Nash equilibrium using the random sampling algorithm. ",yakov babichenko,,2013.0,,arXiv,Babichenko2013,True,,arXiv,Not available,Approximate Nash Equilibria via Sampling,44b1fa7f65e8912ff3e640d0e3fa7ac5,http://arxiv.org/abs/1307.4934v1 12587," We prove that in a normal form n-player game with m actions for each player, there exists an approximate Nash equilibrium where each player randomizes uniformly among a set of O(log(m) + log(n)) pure strategies. This result induces an $N^{\log \log N}$ algorithm for computing an approximate Nash equilibrium in games where the number of actions is polynomial in the number of players (m=poly(n)), where $N=nm^n$ is the size of the game (the input size). In addition, we establish an inverse connection between the entropy of Nash equilibria in the game, and the time it takes to find such an approximate Nash equilibrium using the random sampling algorithm. ",ron peretz,,2013.0,,arXiv,Babichenko2013,True,,arXiv,Not available,Approximate Nash Equilibria via Sampling,44b1fa7f65e8912ff3e640d0e3fa7ac5,http://arxiv.org/abs/1307.4934v1 12588," A 5x5 board is the smallest board on which one can set up all kind of chess pieces as a start position. We consider Gardner's minichess variant in which all pieces are set as in a standard chessboard (from Rook to King). This game has roughly 9x10^{18} legal positions and is comparable in this respect with checkers. We weakly solve this game, that is we prove its game-theoretic value and give a strategy to draw against best play for White and Black sides. Our approach requires surprisingly small computing power. We give a human readable proof. The way the result is obtained is generic and could be generalized to bigger chess settings or to other games. ",mehdi mhalla,,2013.0,,arXiv,Mhalla2013,True,,arXiv,Not available,Gardner's Minichess Variant is solved,507bac5c4274b0313673978a81d50d9f,http://arxiv.org/abs/1307.7118v1 12589," A 5x5 board is the smallest board on which one can set up all kind of chess pieces as a start position. We consider Gardner's minichess variant in which all pieces are set as in a standard chessboard (from Rook to King). This game has roughly 9x10^{18} legal positions and is comparable in this respect with checkers. We weakly solve this game, that is we prove its game-theoretic value and give a strategy to draw against best play for White and Black sides. Our approach requires surprisingly small computing power. We give a human readable proof. The way the result is obtained is generic and could be generalized to bigger chess settings or to other games. ",frederic prost,,2013.0,,arXiv,Mhalla2013,True,,arXiv,Not available,Gardner's Minichess Variant is solved,507bac5c4274b0313673978a81d50d9f,http://arxiv.org/abs/1307.7118v1 12590," The notion of interchangeability has been introduced by John Nash in one of his original papers on equilibria. This paper studies properties of Nash equilibria interchangeability in cellular games that model behavior of infinite chain of homogeneous economic agents. The paper shows that there are games in which strategy of any given player is interchangeable with strategies of players in an arbitrary large neighborhood of the given player, but is not interchangeable with the strategy of a remote player outside of the neighborhood. The main technical result is a sound and complete logical system describing universal properties of interchangeability common to all cellular games. ",pavel naumov,,2014.0,,arXiv,Naumov2014,True,,arXiv,Not available,Equilibria Interchangeability in Cellular Games,7e93c7fcdfa04d456326663151f68a4b,http://arxiv.org/abs/1402.1156v2 12591," The notion of interchangeability has been introduced by John Nash in one of his original papers on equilibria. This paper studies properties of Nash equilibria interchangeability in cellular games that model behavior of infinite chain of homogeneous economic agents. The paper shows that there are games in which strategy of any given player is interchangeable with strategies of players in an arbitrary large neighborhood of the given player, but is not interchangeable with the strategy of a remote player outside of the neighborhood. The main technical result is a sound and complete logical system describing universal properties of interchangeability common to all cellular games. ",margaret protzman,,2014.0,,arXiv,Naumov2014,True,,arXiv,Not available,Equilibria Interchangeability in Cellular Games,7e93c7fcdfa04d456326663151f68a4b,http://arxiv.org/abs/1402.1156v2 12592," We investigate a model for representing large multiplayer games, which satisfy strong symmetry properties. This model is made of multiple copies of an arena; each player plays in his own arena, and can partially observe what the other players do. Therefore, this game has partial information and symmetry constraints, which make the computation of Nash equilibria difficult. We show several undecidability results, and for bounded-memory strategies, we precisely characterize the complexity of computing pure Nash equilibria (for qualitative objectives) in this game model. ",patricia bouyer,,2014.0,10.4204/EPTCS.146.7,"EPTCS 146, 2014, pp. 49-55",Bouyer2014,True,,arXiv,Not available,Nash Equilibria in Symmetric Games with Partial Observation,14ae1b8e09530a5339da952792deccca,http://arxiv.org/abs/1404.0839v1 12593," We investigate a model for representing large multiplayer games, which satisfy strong symmetry properties. This model is made of multiple copies of an arena; each player plays in his own arena, and can partially observe what the other players do. Therefore, this game has partial information and symmetry constraints, which make the computation of Nash equilibria difficult. We show several undecidability results, and for bounded-memory strategies, we precisely characterize the complexity of computing pure Nash equilibria (for qualitative objectives) in this game model. ",nicolas markey,,2014.0,10.4204/EPTCS.146.7,"EPTCS 146, 2014, pp. 49-55",Bouyer2014,True,,arXiv,Not available,Nash Equilibria in Symmetric Games with Partial Observation,14ae1b8e09530a5339da952792deccca,http://arxiv.org/abs/1404.0839v1 12594," We investigate a model for representing large multiplayer games, which satisfy strong symmetry properties. This model is made of multiple copies of an arena; each player plays in his own arena, and can partially observe what the other players do. Therefore, this game has partial information and symmetry constraints, which make the computation of Nash equilibria difficult. We show several undecidability results, and for bounded-memory strategies, we precisely characterize the complexity of computing pure Nash equilibria (for qualitative objectives) in this game model. ",steen vester,,2014.0,10.4204/EPTCS.146.7,"EPTCS 146, 2014, pp. 49-55",Bouyer2014,True,,arXiv,Not available,Nash Equilibria in Symmetric Games with Partial Observation,14ae1b8e09530a5339da952792deccca,http://arxiv.org/abs/1404.0839v1 12595," Subtraction games are a class of impartial combinatorial games whose positions correspond to nonnegative integers and whose moves correspond to subtracting one of a fixed set of numbers from the current position. Though they are easy to define, sub- traction games have proven difficult to analyze. In particular, few general results about their Sprague-Grundy values are known. In this paper, we construct an example of a subtraction game whose sequence of Sprague-Grundy values is ternary and aperiodic, and we develop a theory that might lead to a generalization of our construction. ",nathan fox,,2014.0,,arXiv,Fox2014,True,,arXiv,Not available,On Aperiodic Subtraction Games with Bounded Nim Sequence,a640915e7410468654120de915fa3639,http://arxiv.org/abs/1407.2823v1 12596," Crypto-currencies are digital assets designed to work as a medium of exchange, e.g., Bitcoin, but they are susceptible to attacks (dishonest behavior of participants). A framework for the analysis of attacks in crypto-currencies requires (a) modeling of game-theoretic aspects to analyze incentives for deviation from honest behavior; (b) concurrent interactions between participants; and (c) analysis of long-term monetary gains. Traditional game-theoretic approaches for the analysis of security protocols consider either qualitative temporal properties such as safety and termination, or the very special class of one-shot (stateless) games. However, to analyze general attacks on protocols for crypto-currencies, both stateful analysis and quantitative objectives are necessary. In this work our main contributions are as follows: (a) we show how a class of concurrent mean-payoff games, namely ergodic games, can model various attacks that arise naturally in crypto-currencies; (b) we present the first practical implementation of algorithms for ergodic games that scales to model realistic problems for crypto-currencies; and (c) we present experimental results showing that our framework can handle games with thousands of states and millions of transitions. ",rasmus ibsen-jensen,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies",fe4f71cbe3bbde6159d5f64270672f66,http://arxiv.org/abs/1806.03108v1 12597," Two losing gambling games, when alternated in a periodic or random fashion, can produce a winning game. This paradox has been inspired by certain physical systems capable of rectifying fluctuations: the so-called Brownian ratchets. In this paper we review this paradox, from Brownian ratchets to the most recent studies on collective games, providing some intuitive explanations of the unexpected phenomena that we will find along the way. ",j. parrondo,,2014.0,10.1080/00107510310001644836,"Contemporary Physics 45 (2), 147 (2004)",Parrondo2014,True,,arXiv,Not available,Brownian motion and gambling: from ratchets to paradoxical games,a7df2fa4e8480106145adb4d244b4811,http://arxiv.org/abs/1410.0485v1 12598," Two losing gambling games, when alternated in a periodic or random fashion, can produce a winning game. This paradox has been inspired by certain physical systems capable of rectifying fluctuations: the so-called Brownian ratchets. In this paper we review this paradox, from Brownian ratchets to the most recent studies on collective games, providing some intuitive explanations of the unexpected phenomena that we will find along the way. ",l. dinis,,2014.0,10.1080/00107510310001644836,"Contemporary Physics 45 (2), 147 (2004)",Parrondo2014,True,,arXiv,Not available,Brownian motion and gambling: from ratchets to paradoxical games,a7df2fa4e8480106145adb4d244b4811,http://arxiv.org/abs/1410.0485v1 12599," We study a Bayesian coordination game where agents receive private information on the game's payoff structure. In addition, agents receive private signals on each other's private information. We show that once agents possess these different types of information, there exists a coordination game in the evaluation of this information. And even though the precisions of both signal types is exogenous, the precision with which agents predict each other's actions at equilibrium turns out to be endogenous. As a consequence, we find that there exist multiple equilibria if the private signals' precision is high. These equilibria differ with regard to the way that agents weight their private information to reason about each other's actions. ",dominik grafenhofer,,2014.0,,arXiv,Grafenhofer2014,True,,arXiv,Not available,Observing Each Other's Observations in the Electronic Mail Game,0fa0054d75c9de25514f07b0f2ac605d,http://arxiv.org/abs/1501.00882v1 12600," We study a Bayesian coordination game where agents receive private information on the game's payoff structure. In addition, agents receive private signals on each other's private information. We show that once agents possess these different types of information, there exists a coordination game in the evaluation of this information. And even though the precisions of both signal types is exogenous, the precision with which agents predict each other's actions at equilibrium turns out to be endogenous. As a consequence, we find that there exist multiple equilibria if the private signals' precision is high. These equilibria differ with regard to the way that agents weight their private information to reason about each other's actions. ",wolgang kuhle,,2014.0,,arXiv,Grafenhofer2014,True,,arXiv,Not available,Observing Each Other's Observations in the Electronic Mail Game,0fa0054d75c9de25514f07b0f2ac605d,http://arxiv.org/abs/1501.00882v1 12601," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",michal feldman,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 12602," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",nicole immorlica,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 12603," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",brendan lucier,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 12604," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",tim roughgarden,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 12605," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",vasilis syrgkanis,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 12606," The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algorithms, and hardness results for several classes of these sequential games. ",branislav bosansky,,2015.0,,arXiv,Bosansky2015,True,,arXiv,Not available,Computation of Stackelberg Equilibria of Finite Sequential Games,1302fdc22eb42e8ccd9e24b50b80de73,http://arxiv.org/abs/1507.07677v3 12607," Crypto-currencies are digital assets designed to work as a medium of exchange, e.g., Bitcoin, but they are susceptible to attacks (dishonest behavior of participants). A framework for the analysis of attacks in crypto-currencies requires (a) modeling of game-theoretic aspects to analyze incentives for deviation from honest behavior; (b) concurrent interactions between participants; and (c) analysis of long-term monetary gains. Traditional game-theoretic approaches for the analysis of security protocols consider either qualitative temporal properties such as safety and termination, or the very special class of one-shot (stateless) games. However, to analyze general attacks on protocols for crypto-currencies, both stateful analysis and quantitative objectives are necessary. In this work our main contributions are as follows: (a) we show how a class of concurrent mean-payoff games, namely ergodic games, can model various attacks that arise naturally in crypto-currencies; (b) we present the first practical implementation of algorithms for ergodic games that scales to model realistic problems for crypto-currencies; and (c) we present experimental results showing that our framework can handle games with thousands of states and millions of transitions. ",yaron velner,,2018.0,,arXiv,Chatterjee2018,True,,arXiv,Not available,"Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies",fe4f71cbe3bbde6159d5f64270672f66,http://arxiv.org/abs/1806.03108v1 12608," The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algorithms, and hardness results for several classes of these sequential games. ",simina branzei,,2015.0,,arXiv,Bosansky2015,True,,arXiv,Not available,Computation of Stackelberg Equilibria of Finite Sequential Games,1302fdc22eb42e8ccd9e24b50b80de73,http://arxiv.org/abs/1507.07677v3 12609," The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algorithms, and hardness results for several classes of these sequential games. ",kristoffer hansen,,2015.0,,arXiv,Bosansky2015,True,,arXiv,Not available,Computation of Stackelberg Equilibria of Finite Sequential Games,1302fdc22eb42e8ccd9e24b50b80de73,http://arxiv.org/abs/1507.07677v3 12610," The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algorithms, and hardness results for several classes of these sequential games. ",peter miltersen,,2015.0,,arXiv,Bosansky2015,True,,arXiv,Not available,Computation of Stackelberg Equilibria of Finite Sequential Games,1302fdc22eb42e8ccd9e24b50b80de73,http://arxiv.org/abs/1507.07677v3 12611," The Stackelberg equilibrium solution concept describes optimal strategies to commit to: Player 1 (termed the leader) publicly commits to a strategy and Player 2 (termed the follower) plays a best response to this strategy (ties are broken in favor of the leader). We study Stackelberg equilibria in finite sequential games (or extensive-form games) and provide new exact algorithms, approximate algorithms, and hardness results for several classes of these sequential games. ",troels sorensen,,2015.0,,arXiv,Bosansky2015,True,,arXiv,Not available,Computation of Stackelberg Equilibria of Finite Sequential Games,1302fdc22eb42e8ccd9e24b50b80de73,http://arxiv.org/abs/1507.07677v3 12612," We show that equilibria of a sequential semi-anonymous nonatomic game (SSNG) can be adopted by players in corresponding large but finite dynamic games to achieve near-equilibrium payoffs. Such equilibria in the form of random state-to-action rules are parsimonious in form and easy to execute, as they are both oblivious of past history and blind to other players' present states. Our transient results can be extended to a stationary case, where the finite counterparts are special discounted stochastic games. The kind of equilibria we adopt for SSNG are similar to distributional equilibria that are well understood in literature, and they themselves are shown to exist. ",jian yang,,2015.0,10.1007/s00182-016-0539-5,arXiv,Yang2015,True,,arXiv,Not available,"A Link between Sequential Semi-anonymous Nonatomic Games and their Large Finite Counterparts",1ade5b1d1865405f54f2620c5f6ed1f4,http://arxiv.org/abs/1510.06809v2 12613," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",alessandro chiesa,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 12614," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 12615," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 12616," We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with a known distribution of valuations. We show that a tight lower bound on the seller's expected revenue is $1/e$ times the geometric expectation of the buyer's valuation, and that this bound is uniquely achieved for the equal revenue distribution. We show also that when the valuation's expectation and geometric expectation are close, then the seller's expected revenue is close to the expected valuation. ",omer tamuz,,2012.0,10.1016/j.orl.2013.05.011,"Operations Research Letters, 2013, Volume 41, Issue 5, Pages 474--476",Tamuz2012,True,,arXiv,Not available,A lower bound on seller revenue in single buyer monopoly auctions,954a0ec6ed24fa018aca695167e8594b,http://arxiv.org/abs/1204.5551v2 12617," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",shahar dobzinski,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 12618," Leadership games provide a powerful paradigm to model many real-world settings. Most literature focuses on games with a single follower who acts optimistically, breaking ties in favour of the leader. Unfortunately, for real-world applications, this is unlikely. In this paper, we look for efficiently solvable games with multiple followers who play either optimistically or pessimistically, i.e., breaking ties in favour or against the leader. We study the computational complexity of finding or approximating an optimistic or pessimistic leader-follower equilibrium in specific classes of succinct games---polymatrix like---which are equivalent to 2-player Bayesian games with uncertainty over the follower, with interdependent or independent types. Furthermore, we provide an exact algorithm to find a pessimistic equilibrium for those game classes. Finally, we show that in general polymatrix games the computation is harder even when players are forced to play pure strategies. ",giuseppe nittis,,2018.0,,arXiv,Nittis2018,True,,arXiv,Not available,"Computing the Strategy to Commit to in Polymatrix Games (Extended Version)",3a70b5e2984a9c3436810e28b23473ab,http://arxiv.org/abs/1807.11914v1 12619," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",noam nisan,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 12620," We study the necessity of interaction between individuals for obtaining approximately efficient allocations. The role of interaction in markets has received significant attention in economic thinking, e.g. in Hayek's 1945 classic paper. We consider this problem in the framework of simultaneous communication complexity. We analyze the amount of simultaneous communication required for achieving an approximately efficient allocation. In particular, we consider two settings: combinatorial auctions with unit demand bidders (bipartite matching) and combinatorial auctions with subadditive bidders. For both settings we first show that non-interactive systems have enormous communication costs relative to interactive ones. On the other hand, we show that limited interaction enables us to find approximately efficient allocations. ",sigal oren,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Economic Efficiency Requires Interaction,24a583e582b38b9979f6fd7900b03f82,http://arxiv.org/abs/1311.4721v2 12621," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",shuchi chawla,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 12622," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",hu fu,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 12623," We study revenue maximization in settings where agents' values are interdependent: each agent receives a signal drawn from a correlated distribution and agents' values are functions of all of the signals. We introduce a variant of the generalized VCG auction with reserve prices and random admission, and show that this auction gives a constant approximation to the optimal expected revenue in matroid environments. Our results do not require any assumptions on the signal distributions, however, they require the value functions to satisfy a standard single-crossing property and a concavity-type condition. ",anna karlin,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Approximate Revenue Maximization in Interdependent Value Settings,87699ee2d45c980632c0c2a40970db50,http://arxiv.org/abs/1408.4424v1 12624," We study the problem of designing optimal auctions under restrictions on the set of permissible allocations. In addition to allowing us to restrict to deterministic mechanisms, we can also indirectly model non-additive valuations. We prove a strong duality result, extending a result due to Daskalakis et al. [2015], that guarantees the existence of a certificate of optimality for optimal restricted mechanisms. As a corollary of our result, we provide a new characterization of the set of allocations that the optimal mechanism may actually use. To illustrate our result we find and certify optimal mechanisms for four settings where previous frameworks do not apply, and provide new economic intuition about some of the tools that have previously been used to find optimal mechanisms. ",ian kash,,2016.0,,arXiv,Kash2016,True,,arXiv,Not available,Optimal Auctions with Restricted Allocations,7cf59cd335a5df245037f886e818e726,http://arxiv.org/abs/1606.01610v1 12625," We study the problem of designing optimal auctions under restrictions on the set of permissible allocations. In addition to allowing us to restrict to deterministic mechanisms, we can also indirectly model non-additive valuations. We prove a strong duality result, extending a result due to Daskalakis et al. [2015], that guarantees the existence of a certificate of optimality for optimal restricted mechanisms. As a corollary of our result, we provide a new characterization of the set of allocations that the optimal mechanism may actually use. To illustrate our result we find and certify optimal mechanisms for four settings where previous frameworks do not apply, and provide new economic intuition about some of the tools that have previously been used to find optimal mechanisms. ",rafael frongillo,,2016.0,,arXiv,Kash2016,True,,arXiv,Not available,Optimal Auctions with Restricted Allocations,7cf59cd335a5df245037f886e818e726,http://arxiv.org/abs/1606.01610v1 12626," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",jaya mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12627," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",vikash singh,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12628," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",sajal mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12629," Leadership games provide a powerful paradigm to model many real-world settings. Most literature focuses on games with a single follower who acts optimistically, breaking ties in favour of the leader. Unfortunately, for real-world applications, this is unlikely. In this paper, we look for efficiently solvable games with multiple followers who play either optimistically or pessimistically, i.e., breaking ties in favour or against the leader. We study the computational complexity of finding or approximating an optimistic or pessimistic leader-follower equilibrium in specific classes of succinct games---polymatrix like---which are equivalent to 2-player Bayesian games with uncertainty over the follower, with interdependent or independent types. Furthermore, we provide an exact algorithm to find a pessimistic equilibrium for those game classes. Finally, we show that in general polymatrix games the computation is harder even when players are forced to play pure strategies. ",alberto marchesi,,2018.0,,arXiv,Nittis2018,True,,arXiv,Not available,"Computing the Strategy to Commit to in Polymatrix Games (Extended Version)",3a70b5e2984a9c3436810e28b23473ab,http://arxiv.org/abs/1807.11914v1 12630," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",anita pal,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 12631," We study the social efficiency of several well-known mechanisms for the allocation of a set of available (advertising) positions to a set of competing budget-constrained users (advertisers). Specifically, we focus on the Generalized Second Price auction (GSP), the Vickrey-Clarke-Groves mechanism (VCG) and the Expressive Generalized First Price auction (EGFP). Using the liquid welfare as our efficiency benchmark, we prove a tight bound of 2 on the liquid price of anarchy and stability of these mechanisms for pure Nash equilibria. ",alexandros voudouris,,2018.0,,arXiv,Voudouris2018,True,,arXiv,Not available,A note on the efficiency of position mechanisms with budget constraints,d3f6504f26c4c8bce31c687da6891293,http://arxiv.org/abs/1804.09649v1 12632," Previous works suggested the use of Branch and Bound techniques for finding the optimal allocation in (multi-unit) combinatorial auctions. They remarked that Linear Programming could provide a good upper-bound to the optimal allocation, but they went on using lighter and less tight upper-bound heuristics, on the ground that LP was too time-consuming to be used repetitively to solve large combinatorial auctions. We present the results of extensive experiments solving large (multi-unit) combinatorial auctions generated according to distributions proposed by different researchers. Our surprising conclusion is that Linear Programming is worth using. Investing almost all of one's computing time in using LP to bound from above the value of the optimal solution in order to prune aggressively pays off. We present a way to save on the number of calls to the LP routine and experimental results comparing different heuristics for choosing the bid to be considered next. Those results show that the ordering based on the square root of the size of the bids that was shown to be theoretically optimal in a previous paper by the authors performs surprisingly better than others in practice. Choosing to deal first with the bid with largest coefficient (typically 1) in the optimal solution of the relaxed LP problem, is also a good choice. The gap between the lower bound provided by greedy heuristics and the upper bound provided by LP is typically small and pruning is therefore extensive. For most distributions, auctions of a few hundred goods among a few thousand bids can be solved in practice. All experiments were run on a PC under Matlab. ",rica gonen,,2002.0,,arXiv,Gonen2002,True,,arXiv,Not available,Linear Programming helps solving large multi-unit combinatorial auctions,f0cec6aca985105d31dfc4b77338322b,http://arxiv.org/abs/cs/0202016v1 12633," Previous works suggested the use of Branch and Bound techniques for finding the optimal allocation in (multi-unit) combinatorial auctions. They remarked that Linear Programming could provide a good upper-bound to the optimal allocation, but they went on using lighter and less tight upper-bound heuristics, on the ground that LP was too time-consuming to be used repetitively to solve large combinatorial auctions. We present the results of extensive experiments solving large (multi-unit) combinatorial auctions generated according to distributions proposed by different researchers. Our surprising conclusion is that Linear Programming is worth using. Investing almost all of one's computing time in using LP to bound from above the value of the optimal solution in order to prune aggressively pays off. We present a way to save on the number of calls to the LP routine and experimental results comparing different heuristics for choosing the bid to be considered next. Those results show that the ordering based on the square root of the size of the bids that was shown to be theoretically optimal in a previous paper by the authors performs surprisingly better than others in practice. Choosing to deal first with the bid with largest coefficient (typically 1) in the optimal solution of the relaxed LP problem, is also a good choice. The gap between the lower bound provided by greedy heuristics and the upper bound provided by LP is typically small and pruning is therefore extensive. For most distributions, auctions of a few hundred goods among a few thousand bids can be solved in practice. All experiments were run on a PC under Matlab. ",daniel lehmann,,2002.0,,arXiv,Gonen2002,True,,arXiv,Not available,Linear Programming helps solving large multi-unit combinatorial auctions,f0cec6aca985105d31dfc4b77338322b,http://arxiv.org/abs/cs/0202016v1 12634," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",atsushi iwasaki,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 12635," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",david kempe,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 12636," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",mahyar salek,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 12637," We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs. We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $\Omega(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation. ",makoto yokoo,,2011.0,,arXiv,Iwasaki2011,True,,arXiv,Not available,False-name-proof Mechanisms for Hiring a Team,43c3d3cb51e9bf918ce49edcc2d09147,http://arxiv.org/abs/1106.2378v1 12638," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",m. babaioff,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 12639," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",n. nisan,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 12640," Leadership games provide a powerful paradigm to model many real-world settings. Most literature focuses on games with a single follower who acts optimistically, breaking ties in favour of the leader. Unfortunately, for real-world applications, this is unlikely. In this paper, we look for efficiently solvable games with multiple followers who play either optimistically or pessimistically, i.e., breaking ties in favour or against the leader. We study the computational complexity of finding or approximating an optimistic or pessimistic leader-follower equilibrium in specific classes of succinct games---polymatrix like---which are equivalent to 2-player Bayesian games with uncertainty over the follower, with interdependent or independent types. Furthermore, we provide an exact algorithm to find a pessimistic equilibrium for those game classes. Finally, we show that in general polymatrix games the computation is harder even when players are forced to play pure strategies. ",nicola gatti,,2018.0,,arXiv,Nittis2018,True,,arXiv,Not available,"Computing the Strategy to Commit to in Polymatrix Games (Extended Version)",3a70b5e2984a9c3436810e28b23473ab,http://arxiv.org/abs/1807.11914v1 12641," The model of congestion games is widely used to analyze games related to traffic and communication. A central property of these games is that they are potential games and hence posses a pure Nash equilibrium. In reality it is often the case that some players cooperatively decide on their joint action in order to maximize the coalition's total utility. This is by modeled by Coalitional Congestion Games. Typical settings include truck drivers who work for the same shipping company, or routers that belong to the same ISP. The formation of coalitions will typically imply that the resulting coalitional congestion game will no longer posses a pure Nash equilibrium. In this paper we provide conditions under which such games are potential games and posses a pure Nash equilibrium. ",sergey kuniavsky,,2011.0,,arXiv,Kuniavsky2011,True,,arXiv,Not available,Equilibrium and Potential in Coalitional Congestion Games,8847bddcb3dedc1b59680feed4d544d1,http://arxiv.org/abs/1111.3933v1 12642," The model of congestion games is widely used to analyze games related to traffic and communication. A central property of these games is that they are potential games and hence posses a pure Nash equilibrium. In reality it is often the case that some players cooperatively decide on their joint action in order to maximize the coalition's total utility. This is by modeled by Coalitional Congestion Games. Typical settings include truck drivers who work for the same shipping company, or routers that belong to the same ISP. The formation of coalitions will typically imply that the resulting coalitional congestion game will no longer posses a pure Nash equilibrium. In this paper we provide conditions under which such games are potential games and posses a pure Nash equilibrium. ",rann smorodinsky,,2011.0,,arXiv,Kuniavsky2011,True,,arXiv,Not available,Equilibrium and Potential in Coalitional Congestion Games,8847bddcb3dedc1b59680feed4d544d1,http://arxiv.org/abs/1111.3933v1 12643," Cooperative games model the allocation of profit from joint actions, following considerations such as stability and fairness. We propose the reliability extension of such games, where agents may fail to participate in the game. In the reliability extension, each agent only ""survives"" with a certain probability, and a coalition's value is the probability that its surviving members would be a winning coalition in the base game. We study prominent solution concepts in such games, showing how to approximate the Shapley value and how to compute the core in games with few agent types. We also show that applying the reliability extension may stabilize the game, making the core non-empty even when the base game has an empty core. ",yoram bachrach,,2012.0,,arXiv,Bachrach2012,True,,arXiv,Not available,Solving Cooperative Reliability Games,de79ac734197870f1a64230ea7ce5d68,http://arxiv.org/abs/1202.3700v1 12644," Cooperative games model the allocation of profit from joint actions, following considerations such as stability and fairness. We propose the reliability extension of such games, where agents may fail to participate in the game. In the reliability extension, each agent only ""survives"" with a certain probability, and a coalition's value is the probability that its surviving members would be a winning coalition in the base game. We study prominent solution concepts in such games, showing how to approximate the Shapley value and how to compute the core in games with few agent types. We also show that applying the reliability extension may stabilize the game, making the core non-empty even when the base game has an empty core. ",reshef meir,,2012.0,,arXiv,Bachrach2012,True,,arXiv,Not available,Solving Cooperative Reliability Games,de79ac734197870f1a64230ea7ce5d68,http://arxiv.org/abs/1202.3700v1 12645," Cooperative games model the allocation of profit from joint actions, following considerations such as stability and fairness. We propose the reliability extension of such games, where agents may fail to participate in the game. In the reliability extension, each agent only ""survives"" with a certain probability, and a coalition's value is the probability that its surviving members would be a winning coalition in the base game. We study prominent solution concepts in such games, showing how to approximate the Shapley value and how to compute the core in games with few agent types. We also show that applying the reliability extension may stabilize the game, making the core non-empty even when the base game has an empty core. ",michal feldman,,2012.0,,arXiv,Bachrach2012,True,,arXiv,Not available,Solving Cooperative Reliability Games,de79ac734197870f1a64230ea7ce5d68,http://arxiv.org/abs/1202.3700v1 12646," Cooperative games model the allocation of profit from joint actions, following considerations such as stability and fairness. We propose the reliability extension of such games, where agents may fail to participate in the game. In the reliability extension, each agent only ""survives"" with a certain probability, and a coalition's value is the probability that its surviving members would be a winning coalition in the base game. We study prominent solution concepts in such games, showing how to approximate the Shapley value and how to compute the core in games with few agent types. We also show that applying the reliability extension may stabilize the game, making the core non-empty even when the base game has an empty core. ",moshe tennenholtz,,2012.0,,arXiv,Bachrach2012,True,,arXiv,Not available,Solving Cooperative Reliability Games,de79ac734197870f1a64230ea7ce5d68,http://arxiv.org/abs/1202.3700v1 12647," We detail the rules and mathematical structure of Al-Jabar, a game invented by the authors based on intuitive concepts of color-mixing and ideas from abstract algebra. Game-play consists of manipulating colored game pieces; we discuss how these colored pieces form a group structure and how this structure, along with an operation used to combine the pieces, is used to create a game of strategy. We also consider extensions of the game rules to other group structures. Note: While this is an article for general readership originally published online by Gathering for Gardner in honor of Martin Gardner's birthday (Oct. 2011), Al-Jabar has been played in university abstract algebra courses as a teaching tool, as well as by game enthusiasts, since its release. Moreover, the algebraic game structure described has sparked further work by other mathematicians and game designers. Thus, we submit this article to the ArXiV as a resource for educators as well as those interested in mathematical games. ",cyrus hettle,,2013.0,,arXiv,Hettle2013,True,,arXiv,Not available,Al-Jabar: A Mathematical Game of Strategy,df39a3731863a253894eb3b9f7cb8bbc,http://arxiv.org/abs/1310.5596v2 12648," We detail the rules and mathematical structure of Al-Jabar, a game invented by the authors based on intuitive concepts of color-mixing and ideas from abstract algebra. Game-play consists of manipulating colored game pieces; we discuss how these colored pieces form a group structure and how this structure, along with an operation used to combine the pieces, is used to create a game of strategy. We also consider extensions of the game rules to other group structures. Note: While this is an article for general readership originally published online by Gathering for Gardner in honor of Martin Gardner's birthday (Oct. 2011), Al-Jabar has been played in university abstract algebra courses as a teaching tool, as well as by game enthusiasts, since its release. Moreover, the algebraic game structure described has sparked further work by other mathematicians and game designers. Thus, we submit this article to the ArXiV as a resource for educators as well as those interested in mathematical games. ",robert schneider,,2013.0,,arXiv,Hettle2013,True,,arXiv,Not available,Al-Jabar: A Mathematical Game of Strategy,df39a3731863a253894eb3b9f7cb8bbc,http://arxiv.org/abs/1310.5596v2 12649," Over the years, researchers have studied the complexity of several decision versions of Nash equilibrium in (symmetric) two-player games (bimatrix games). To the best of our knowledge, the last remaining open problem of this sort is the following; it was stated by Papadimitriou in 2007: find a non-symmetric Nash equilibrium (NE) in a symmetric game. We show that this problem is NP-complete and the problem of counting the number of non-symmetric NE in a symmetric game is #P-complete. In 2005, Kannan and Theobald defined the ""rank of a bimatrix game"" represented by matrices (A, B) to be rank(A+B) and asked whether a NE can be computed in rank 1 games in polynomial time. Observe that the rank 0 case is precisely the zero sum case, for which a polynomial time algorithm follows from von Neumann's reduction of such games to linear programming. In 2011, Adsul et. al. obtained an algorithm for rank 1 games; however, it does not solve the case of symmetric rank 1 games. We resolve this problem. ",ruta mehta,,2014.0,,arXiv,Mehta2014,True,,arXiv,Not available,Settling Some Open Problems on 2-Player Symmetric Nash Equilibria,175c7bf1e4d4a2f263a86cfd264ab9ee,http://arxiv.org/abs/1412.0969v1 12650," Over the years, researchers have studied the complexity of several decision versions of Nash equilibrium in (symmetric) two-player games (bimatrix games). To the best of our knowledge, the last remaining open problem of this sort is the following; it was stated by Papadimitriou in 2007: find a non-symmetric Nash equilibrium (NE) in a symmetric game. We show that this problem is NP-complete and the problem of counting the number of non-symmetric NE in a symmetric game is #P-complete. In 2005, Kannan and Theobald defined the ""rank of a bimatrix game"" represented by matrices (A, B) to be rank(A+B) and asked whether a NE can be computed in rank 1 games in polynomial time. Observe that the rank 0 case is precisely the zero sum case, for which a polynomial time algorithm follows from von Neumann's reduction of such games to linear programming. In 2011, Adsul et. al. obtained an algorithm for rank 1 games; however, it does not solve the case of symmetric rank 1 games. We resolve this problem. ",vijay vazirani,,2014.0,,arXiv,Mehta2014,True,,arXiv,Not available,Settling Some Open Problems on 2-Player Symmetric Nash Equilibria,175c7bf1e4d4a2f263a86cfd264ab9ee,http://arxiv.org/abs/1412.0969v1 12651," Computing an equilibrium in congestion games can be challenging when the number of players is large. Yet, it is a problem to be addressed in practice, for instance to forecast the state of the system and be able to control it. In this work, we analyze the case of generalized atomic congestion games, with coupling constraints, and with players that are heterogeneous through their action sets and their utility functions. We obtain an approximation of the variational Nash equilibria---a notion generalizing Nash equilibria in the presence of coupling constraints---of a large atomic congestion game by an equilibrium of an auxiliary population game, where each population corresponds to a group of atomic players of the initial game. Because the variational inequalities characterizing the equilibrium of the auxiliary game have smaller dimension than the original problem, this approach enables the fast computation of an estimation of equilibria in a large congestion game with thousands of heterogeneous players. ",cheng wan,,2018.0,,arXiv,Wan2018,True,,arXiv,Not available,"Efficient Estimation of Equilibria of Large Congestion Games with Heterogeneous Players",8b2934b64e4c3a5960a408ee9ab75809,http://arxiv.org/abs/1810.01436v1 12652," Over the years, researchers have studied the complexity of several decision versions of Nash equilibrium in (symmetric) two-player games (bimatrix games). To the best of our knowledge, the last remaining open problem of this sort is the following; it was stated by Papadimitriou in 2007: find a non-symmetric Nash equilibrium (NE) in a symmetric game. We show that this problem is NP-complete and the problem of counting the number of non-symmetric NE in a symmetric game is #P-complete. In 2005, Kannan and Theobald defined the ""rank of a bimatrix game"" represented by matrices (A, B) to be rank(A+B) and asked whether a NE can be computed in rank 1 games in polynomial time. Observe that the rank 0 case is precisely the zero sum case, for which a polynomial time algorithm follows from von Neumann's reduction of such games to linear programming. In 2011, Adsul et. al. obtained an algorithm for rank 1 games; however, it does not solve the case of symmetric rank 1 games. We resolve this problem. ",sadra yazdanbod,,2014.0,,arXiv,Mehta2014,True,,arXiv,Not available,Settling Some Open Problems on 2-Player Symmetric Nash Equilibria,175c7bf1e4d4a2f263a86cfd264ab9ee,http://arxiv.org/abs/1412.0969v1 12653," We consider parity games on infinite graphs where configurations are represented by control-states and integer vectors. This framework subsumes two classic game problems: parity games on vector addition systems with states (vass) and multidimensional energy parity games. We show that the multidimensional energy parity game problem is inter-reducible with a subclass of single-sided parity games on vass where just one player can modify the integer counters and the opponent can only change control-states. Our main result is that the minimal elements of the upward-closed winning set of these single-sided parity games on vass are computable. This implies that the Pareto frontier of the minimal initial credit needed to win multidimensional energy parity games is also computable, solving an open question from the literature. Moreover, our main result implies the decidability of weak simulation preorder/equivalence between finite-state systems and vass, and the decidability of model checking vass with a large fragment of the modal mu-calculus. ",parosh abdulla,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Solving Parity Games on Integer Vectors,6d39099795974838f8527bdcdb6894c1,http://arxiv.org/abs/1306.2806v1 12654," We consider parity games on infinite graphs where configurations are represented by control-states and integer vectors. This framework subsumes two classic game problems: parity games on vector addition systems with states (vass) and multidimensional energy parity games. We show that the multidimensional energy parity game problem is inter-reducible with a subclass of single-sided parity games on vass where just one player can modify the integer counters and the opponent can only change control-states. Our main result is that the minimal elements of the upward-closed winning set of these single-sided parity games on vass are computable. This implies that the Pareto frontier of the minimal initial credit needed to win multidimensional energy parity games is also computable, solving an open question from the literature. Moreover, our main result implies the decidability of weak simulation preorder/equivalence between finite-state systems and vass, and the decidability of model checking vass with a large fragment of the modal mu-calculus. ",richard mayr,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Solving Parity Games on Integer Vectors,6d39099795974838f8527bdcdb6894c1,http://arxiv.org/abs/1306.2806v1 12655," We consider parity games on infinite graphs where configurations are represented by control-states and integer vectors. This framework subsumes two classic game problems: parity games on vector addition systems with states (vass) and multidimensional energy parity games. We show that the multidimensional energy parity game problem is inter-reducible with a subclass of single-sided parity games on vass where just one player can modify the integer counters and the opponent can only change control-states. Our main result is that the minimal elements of the upward-closed winning set of these single-sided parity games on vass are computable. This implies that the Pareto frontier of the minimal initial credit needed to win multidimensional energy parity games is also computable, solving an open question from the literature. Moreover, our main result implies the decidability of weak simulation preorder/equivalence between finite-state systems and vass, and the decidability of model checking vass with a large fragment of the modal mu-calculus. ",arnaud sangnier,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Solving Parity Games on Integer Vectors,6d39099795974838f8527bdcdb6894c1,http://arxiv.org/abs/1306.2806v1 12656," We consider parity games on infinite graphs where configurations are represented by control-states and integer vectors. This framework subsumes two classic game problems: parity games on vector addition systems with states (vass) and multidimensional energy parity games. We show that the multidimensional energy parity game problem is inter-reducible with a subclass of single-sided parity games on vass where just one player can modify the integer counters and the opponent can only change control-states. Our main result is that the minimal elements of the upward-closed winning set of these single-sided parity games on vass are computable. This implies that the Pareto frontier of the minimal initial credit needed to win multidimensional energy parity games is also computable, solving an open question from the literature. Moreover, our main result implies the decidability of weak simulation preorder/equivalence between finite-state systems and vass, and the decidability of model checking vass with a large fragment of the modal mu-calculus. ",jeremy sproston,,2013.0,,arXiv,Abdulla2013,True,,arXiv,Not available,Solving Parity Games on Integer Vectors,6d39099795974838f8527bdcdb6894c1,http://arxiv.org/abs/1306.2806v1 12657," We introduce a parametrized version of the Wadge game for functions and show that each lower cone in the Weihrauch degrees is characterized by such a game. These parametrized Wadge games subsume the original Wadge game, the eraser and backtrack games as well as Semmes's tree games. In particular, we propose that the lower cones in the Weihrauch degrees are the answer to Andretta's question on which classes of functions admit game characterizations. We then discuss some applications of such parametrized Wadge games. Using machinery from Weihrauch reducibility theory, we introduce games characterizing every (transfinite) level of the Baire hierarchy via an iteration of a pruning derivative on countably branching trees. ",hugo nobrega,,2015.0,,arXiv,Nobrega2015,True,,arXiv,Not available,Game characterizations and lower cones in the Weihrauch degrees,dcf08c7eb3a60630ae91cbd48e1f0983,http://arxiv.org/abs/1511.03693v2 12658," We introduce a parametrized version of the Wadge game for functions and show that each lower cone in the Weihrauch degrees is characterized by such a game. These parametrized Wadge games subsume the original Wadge game, the eraser and backtrack games as well as Semmes's tree games. In particular, we propose that the lower cones in the Weihrauch degrees are the answer to Andretta's question on which classes of functions admit game characterizations. We then discuss some applications of such parametrized Wadge games. Using machinery from Weihrauch reducibility theory, we introduce games characterizing every (transfinite) level of the Baire hierarchy via an iteration of a pruning derivative on countably branching trees. ",arno pauly,,2015.0,,arXiv,Nobrega2015,True,,arXiv,Not available,Game characterizations and lower cones in the Weihrauch degrees,dcf08c7eb3a60630ae91cbd48e1f0983,http://arxiv.org/abs/1511.03693v2 12659," We provide the first fully polynomial time approximation scheme (FPTAS) for computing an approximate mixed-strategy Nash equilibrium in tree-structured graphical multi-hypermatrix games (GMhGs). GMhGs are generalizations of normal-form games, graphical games, graphical polymatrix games, and hypergraphical games. Computing an exact mixed-strategy Nash equilibria in graphical polymatrix games is PPAD-complete and thus generally believed to be intractable. In contrast, to the best of our knowledge, we are the first to establish an FPTAS for tree polymatrix games as well as tree graphical games when the number of actions is bounded by a constant. As a corollary, we give a quasi-polynomial time approximation scheme (quasi-PTAS) when the number of actions is bounded by the logarithm of the number of players. ",luis ortiz,,2016.0,,arXiv,Ortiz2016,True,,arXiv,Not available,"FPTAS for Mixed-Strategy Nash Equilibria in Tree Graphical Games and Their Generalizations",44a1508ac714e1da1a89d79e1c548f5f,http://arxiv.org/abs/1602.05237v2 12660," We provide the first fully polynomial time approximation scheme (FPTAS) for computing an approximate mixed-strategy Nash equilibrium in tree-structured graphical multi-hypermatrix games (GMhGs). GMhGs are generalizations of normal-form games, graphical games, graphical polymatrix games, and hypergraphical games. Computing an exact mixed-strategy Nash equilibria in graphical polymatrix games is PPAD-complete and thus generally believed to be intractable. In contrast, to the best of our knowledge, we are the first to establish an FPTAS for tree polymatrix games as well as tree graphical games when the number of actions is bounded by a constant. As a corollary, we give a quasi-polynomial time approximation scheme (quasi-PTAS) when the number of actions is bounded by the logarithm of the number of players. ",mohammad irfan,,2016.0,,arXiv,Ortiz2016,True,,arXiv,Not available,"FPTAS for Mixed-Strategy Nash Equilibria in Tree Graphical Games and Their Generalizations",44a1508ac714e1da1a89d79e1c548f5f,http://arxiv.org/abs/1602.05237v2 12661," The Nash equilibrium is an important benchmark for behaviour in systems of strategic autonomous agents. Polymatrix games are a succinct and expressive representation of multiplayer games that model pairwise interactions between players. The empirical performance of algorithms to solve these games has received little attention, despite their wide-ranging applications. In this paper we carry out a comprehensive empirical study of two prominent algorithms for computing a sample equilibrium in these games, Lemke's algorithm that computes an exact equilibrium, and a gradient descent method that computes an approximate equilibrium. Our study covers games arising from a number of interesting applications. We find that Lemke's algorithm can compute exact equilibria in relatively large games in a reasonable amount of time. If we are willing to accept (high-quality) approximate equilibria, then we can deal with much larger games using the descent method. We also report on which games are most challenging for each of the algorithms. ",argyrios deligkas,,2016.0,,arXiv,Deligkas2016,True,,arXiv,Not available,An Empirical Study on Computing Equilibria in Polymatrix Games,9539ac58376d60a3fa69812df7278d76,http://arxiv.org/abs/1602.06865v2 12662," Computing an equilibrium in congestion games can be challenging when the number of players is large. Yet, it is a problem to be addressed in practice, for instance to forecast the state of the system and be able to control it. In this work, we analyze the case of generalized atomic congestion games, with coupling constraints, and with players that are heterogeneous through their action sets and their utility functions. We obtain an approximation of the variational Nash equilibria---a notion generalizing Nash equilibria in the presence of coupling constraints---of a large atomic congestion game by an equilibrium of an auxiliary population game, where each population corresponds to a group of atomic players of the initial game. Because the variational inequalities characterizing the equilibrium of the auxiliary game have smaller dimension than the original problem, this approach enables the fast computation of an estimation of equilibria in a large congestion game with thousands of heterogeneous players. ",paulin jacquot,,2018.0,,arXiv,Wan2018,True,,arXiv,Not available,"Efficient Estimation of Equilibria of Large Congestion Games with Heterogeneous Players",8b2934b64e4c3a5960a408ee9ab75809,http://arxiv.org/abs/1810.01436v1 12663," The Nash equilibrium is an important benchmark for behaviour in systems of strategic autonomous agents. Polymatrix games are a succinct and expressive representation of multiplayer games that model pairwise interactions between players. The empirical performance of algorithms to solve these games has received little attention, despite their wide-ranging applications. In this paper we carry out a comprehensive empirical study of two prominent algorithms for computing a sample equilibrium in these games, Lemke's algorithm that computes an exact equilibrium, and a gradient descent method that computes an approximate equilibrium. Our study covers games arising from a number of interesting applications. We find that Lemke's algorithm can compute exact equilibria in relatively large games in a reasonable amount of time. If we are willing to accept (high-quality) approximate equilibria, then we can deal with much larger games using the descent method. We also report on which games are most challenging for each of the algorithms. ",john fearnley,,2016.0,,arXiv,Deligkas2016,True,,arXiv,Not available,An Empirical Study on Computing Equilibria in Polymatrix Games,9539ac58376d60a3fa69812df7278d76,http://arxiv.org/abs/1602.06865v2 12664," The Nash equilibrium is an important benchmark for behaviour in systems of strategic autonomous agents. Polymatrix games are a succinct and expressive representation of multiplayer games that model pairwise interactions between players. The empirical performance of algorithms to solve these games has received little attention, despite their wide-ranging applications. In this paper we carry out a comprehensive empirical study of two prominent algorithms for computing a sample equilibrium in these games, Lemke's algorithm that computes an exact equilibrium, and a gradient descent method that computes an approximate equilibrium. Our study covers games arising from a number of interesting applications. We find that Lemke's algorithm can compute exact equilibria in relatively large games in a reasonable amount of time. If we are willing to accept (high-quality) approximate equilibria, then we can deal with much larger games using the descent method. We also report on which games are most challenging for each of the algorithms. ",tobenna igwe,,2016.0,,arXiv,Deligkas2016,True,,arXiv,Not available,An Empirical Study on Computing Equilibria in Polymatrix Games,9539ac58376d60a3fa69812df7278d76,http://arxiv.org/abs/1602.06865v2 12665," The Nash equilibrium is an important benchmark for behaviour in systems of strategic autonomous agents. Polymatrix games are a succinct and expressive representation of multiplayer games that model pairwise interactions between players. The empirical performance of algorithms to solve these games has received little attention, despite their wide-ranging applications. In this paper we carry out a comprehensive empirical study of two prominent algorithms for computing a sample equilibrium in these games, Lemke's algorithm that computes an exact equilibrium, and a gradient descent method that computes an approximate equilibrium. Our study covers games arising from a number of interesting applications. We find that Lemke's algorithm can compute exact equilibria in relatively large games in a reasonable amount of time. If we are willing to accept (high-quality) approximate equilibria, then we can deal with much larger games using the descent method. We also report on which games are most challenging for each of the algorithms. ",rahul savani,,2016.0,,arXiv,Deligkas2016,True,,arXiv,Not available,An Empirical Study on Computing Equilibria in Polymatrix Games,9539ac58376d60a3fa69812df7278d76,http://arxiv.org/abs/1602.06865v2 12666," Parity games play a central role in model checking and satisfiability checking. Solving parity games is computationally expensive, among others due to the size of the games, which, for model checking problems, can easily contain $10^9$ vertices or beyond. Equivalence relations can be used to reduce the size of a parity game, thereby potentially alleviating part of the computational burden. We reconsider (governed) bisimulation and (governed) stuttering bisimulation, and we give detailed proofs that these relations are equivalences, have unique quotients and they approximate the winning regions of parity games. Furthermore, we present game-based characterisations of these relations. Using these characterisations our equivalences are compared to relations for parity games that can be found in the literature, such as direct simulation equivalence and delayed simulation equivalence. To complete the overview we develop coinductive characterisations of direct- and delayed simulation equivalence and we establish a lattice of equivalences for parity games. ",s. cranen,,2016.0,,arXiv,Cranen2016,True,,arXiv,Not available,Parity Game Reductions,546faad4fcc05be0fc87c337925b0b3d,http://arxiv.org/abs/1603.06422v1 12667," Parity games play a central role in model checking and satisfiability checking. Solving parity games is computationally expensive, among others due to the size of the games, which, for model checking problems, can easily contain $10^9$ vertices or beyond. Equivalence relations can be used to reduce the size of a parity game, thereby potentially alleviating part of the computational burden. We reconsider (governed) bisimulation and (governed) stuttering bisimulation, and we give detailed proofs that these relations are equivalences, have unique quotients and they approximate the winning regions of parity games. Furthermore, we present game-based characterisations of these relations. Using these characterisations our equivalences are compared to relations for parity games that can be found in the literature, such as direct simulation equivalence and delayed simulation equivalence. To complete the overview we develop coinductive characterisations of direct- and delayed simulation equivalence and we establish a lattice of equivalences for parity games. ",j. keiren,,2016.0,,arXiv,Cranen2016,True,,arXiv,Not available,Parity Game Reductions,546faad4fcc05be0fc87c337925b0b3d,http://arxiv.org/abs/1603.06422v1 12668," Parity games play a central role in model checking and satisfiability checking. Solving parity games is computationally expensive, among others due to the size of the games, which, for model checking problems, can easily contain $10^9$ vertices or beyond. Equivalence relations can be used to reduce the size of a parity game, thereby potentially alleviating part of the computational burden. We reconsider (governed) bisimulation and (governed) stuttering bisimulation, and we give detailed proofs that these relations are equivalences, have unique quotients and they approximate the winning regions of parity games. Furthermore, we present game-based characterisations of these relations. Using these characterisations our equivalences are compared to relations for parity games that can be found in the literature, such as direct simulation equivalence and delayed simulation equivalence. To complete the overview we develop coinductive characterisations of direct- and delayed simulation equivalence and we establish a lattice of equivalences for parity games. ",t. willemse,,2016.0,,arXiv,Cranen2016,True,,arXiv,Not available,Parity Game Reductions,546faad4fcc05be0fc87c337925b0b3d,http://arxiv.org/abs/1603.06422v1 12669," The performance of two pivoting algorithms, due to Lemke and Cottle and Dantzig, is studied on linear complementarity problems (LCPs) that arise from infinite games, such as parity, average-reward, and discounted games. The algorithms have not been previously studied in the context of infinite games, and they offer alternatives to the classical strategy-improvement algorithms. The two algorithms are described purely in terms of discounted games, thus bypassing the reduction from the games to LCPs, and hence facilitating a better understanding of the algorithms when applied to games. A family of parity games is given, on which both algorithms run in exponential time, indicating that in the worst case they perform no better for parity, average-reward, or discounted games than they do for general P-matrix LCPs. ",john fearnley,,2009.0,,arXiv,Fearnley2009,True,,arXiv,Not available,Linear Complementarity Algorithms for Infinite Games,53a4d1b8f5ec04f0e80237a79568d3de,http://arxiv.org/abs/0909.5653v1 12670," The performance of two pivoting algorithms, due to Lemke and Cottle and Dantzig, is studied on linear complementarity problems (LCPs) that arise from infinite games, such as parity, average-reward, and discounted games. The algorithms have not been previously studied in the context of infinite games, and they offer alternatives to the classical strategy-improvement algorithms. The two algorithms are described purely in terms of discounted games, thus bypassing the reduction from the games to LCPs, and hence facilitating a better understanding of the algorithms when applied to games. A family of parity games is given, on which both algorithms run in exponential time, indicating that in the worst case they perform no better for parity, average-reward, or discounted games than they do for general P-matrix LCPs. ",marcin jurdzinski,,2009.0,,arXiv,Fearnley2009,True,,arXiv,Not available,Linear Complementarity Algorithms for Infinite Games,53a4d1b8f5ec04f0e80237a79568d3de,http://arxiv.org/abs/0909.5653v1 12671," The performance of two pivoting algorithms, due to Lemke and Cottle and Dantzig, is studied on linear complementarity problems (LCPs) that arise from infinite games, such as parity, average-reward, and discounted games. The algorithms have not been previously studied in the context of infinite games, and they offer alternatives to the classical strategy-improvement algorithms. The two algorithms are described purely in terms of discounted games, thus bypassing the reduction from the games to LCPs, and hence facilitating a better understanding of the algorithms when applied to games. A family of parity games is given, on which both algorithms run in exponential time, indicating that in the worst case they perform no better for parity, average-reward, or discounted games than they do for general P-matrix LCPs. ",rahul savani,,2009.0,,arXiv,Fearnley2009,True,,arXiv,Not available,Linear Complementarity Algorithms for Infinite Games,53a4d1b8f5ec04f0e80237a79568d3de,http://arxiv.org/abs/0909.5653v1 12672," In this paper, we study nonzero-sum separable games, which are continuous games whose payoffs take a sum-of-products form. Included in this subclass are all finite games and polynomial games. We investigate the structure of equilibria in separable games. We show that these games admit finitely supported Nash equilibria. Motivated by the bounds on the supports of mixed equilibria in two-player finite games in terms of the ranks of the payoff matrices, we define the notion of the rank of an n-player continuous game and use this to provide bounds on the cardinality of the support of equilibrium strategies. We present a general characterization theorem that states that a continuous game has finite rank if and only if it is separable. Using our rank results, we present an efficient algorithm for computing approximate equilibria of two-player separable games with fixed strategy spaces in time polynomial in the rank of the game. ",noah stein,,2007.0,10.1007/s00182-008-0129-2,"International Journal of Game Theory, Vol. 37, No. 4, pp. 457-474, 2008.",Stein2007,True,,arXiv,Not available,Separable and Low-Rank Continuous Games,262034fa2121d7a1875e06157e83dcf7,http://arxiv.org/abs/0707.3462v1 12673," We consider the task of computing an approximation of a trembling hand perfect equilibrium for an n-player game in strategic form, n >= 3. We show that this task is complete for the complexity class FIXP_a. In particular, the task is polynomial time equivalent to the task of computing an approximation of a Nash equilibrium in strategic form games with three (or more) players. ",kristoffer hansen,,2014.0,,arXiv,Etessami2014,True,,arXiv,Not available,"The complexity of approximating a trembling hand perfect equilibrium of a multi-player game in strategic form",e405ed5721dac4b4c7328a4e711f0ec1,http://arxiv.org/abs/1408.1017v1 12674," We show that computing the revenue-optimal deterministic auction in unit-demand single-buyer Bayesian settings, i.e. the optimal item-pricing, is computationally hard even in single-item settings where the buyer's value distribution is a sum of independently distributed attributes, or multi-item settings where the buyer's values for the items are independent. We also show that it is intractable to optimally price the grand bundle of multiple items for an additive bidder whose values for the items are independent. These difficulties stem from implicit definitions of a value distribution. We provide three instances of how different properties of implicit distributions can lead to intractability: the first is a #P-hardness proof, while the remaining two are reductions from the SQRT-SUM problem of Garey, Graham, and Johnson. While simple pricing schemes can oftentimes approximate the best scheme in revenue, they can have drastically different underlying structure. We argue therefore that either the specification of the input distribution must be highly restricted in format, or it is necessary for the goal to be mere approximation to the optimal scheme's revenue instead of computing properties of the scheme itself. ",alan deckelbaum,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,Optimal Pricing is Hard,b3516571612190603079393cfb9437e1,http://arxiv.org/abs/1503.02516v1 12675," Computing an equilibrium in congestion games can be challenging when the number of players is large. Yet, it is a problem to be addressed in practice, for instance to forecast the state of the system and be able to control it. In this work, we analyze the case of generalized atomic congestion games, with coupling constraints, and with players that are heterogeneous through their action sets and their utility functions. We obtain an approximation of the variational Nash equilibria---a notion generalizing Nash equilibria in the presence of coupling constraints---of a large atomic congestion game by an equilibrium of an auxiliary population game, where each population corresponds to a group of atomic players of the initial game. Because the variational inequalities characterizing the equilibrium of the auxiliary game have smaller dimension than the original problem, this approach enables the fast computation of an estimation of equilibria in a large congestion game with thousands of heterogeneous players. ",olivier beaude,,2018.0,,arXiv,Wan2018,True,,arXiv,Not available,"Efficient Estimation of Equilibria of Large Congestion Games with Heterogeneous Players",8b2934b64e4c3a5960a408ee9ab75809,http://arxiv.org/abs/1810.01436v1 12676," In this paper, we study nonzero-sum separable games, which are continuous games whose payoffs take a sum-of-products form. Included in this subclass are all finite games and polynomial games. We investigate the structure of equilibria in separable games. We show that these games admit finitely supported Nash equilibria. Motivated by the bounds on the supports of mixed equilibria in two-player finite games in terms of the ranks of the payoff matrices, we define the notion of the rank of an n-player continuous game and use this to provide bounds on the cardinality of the support of equilibrium strategies. We present a general characterization theorem that states that a continuous game has finite rank if and only if it is separable. Using our rank results, we present an efficient algorithm for computing approximate equilibria of two-player separable games with fixed strategy spaces in time polynomial in the rank of the game. ",asuman ozdaglar,,2007.0,10.1007/s00182-008-0129-2,"International Journal of Game Theory, Vol. 37, No. 4, pp. 457-474, 2008.",Stein2007,True,,arXiv,Not available,Separable and Low-Rank Continuous Games,262034fa2121d7a1875e06157e83dcf7,http://arxiv.org/abs/0707.3462v1 12677," In this paper, we study nonzero-sum separable games, which are continuous games whose payoffs take a sum-of-products form. Included in this subclass are all finite games and polynomial games. We investigate the structure of equilibria in separable games. We show that these games admit finitely supported Nash equilibria. Motivated by the bounds on the supports of mixed equilibria in two-player finite games in terms of the ranks of the payoff matrices, we define the notion of the rank of an n-player continuous game and use this to provide bounds on the cardinality of the support of equilibrium strategies. We present a general characterization theorem that states that a continuous game has finite rank if and only if it is separable. Using our rank results, we present an efficient algorithm for computing approximate equilibria of two-player separable games with fixed strategy spaces in time polynomial in the rank of the game. ",pablo parrilo,,2007.0,10.1007/s00182-008-0129-2,"International Journal of Game Theory, Vol. 37, No. 4, pp. 457-474, 2008.",Stein2007,True,,arXiv,Not available,Separable and Low-Rank Continuous Games,262034fa2121d7a1875e06157e83dcf7,http://arxiv.org/abs/0707.3462v1 12678," In a vintage paper concerning Parsimonious games, a subset of constant sum homogeneous weighted majority games, Isbell introduced a twin relationship based on transposition properties of the incidence matrices upon minimal winning coalitions of such games. A careful investigation of such properties allowed the discovery of some results on twin games presented in this paper. In detail we show that a) twin games have the same minimal winning quota and b) each Parsimonious game admits a unique balanced lottery on minimal winning coalitions, whose probabilities are given by the individual weights of its twin game. ",flavio pressacco,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,Twin relationships in Parsimonious Games: some results,fb08eeaf8181d639916803818794af6a,http://arxiv.org/abs/1404.2305v1 12679," In a vintage paper concerning Parsimonious games, a subset of constant sum homogeneous weighted majority games, Isbell introduced a twin relationship based on transposition properties of the incidence matrices upon minimal winning coalitions of such games. A careful investigation of such properties allowed the discovery of some results on twin games presented in this paper. In detail we show that a) twin games have the same minimal winning quota and b) each Parsimonious game admits a unique balanced lottery on minimal winning coalitions, whose probabilities are given by the individual weights of its twin game. ",giacomo plazzotta,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,Twin relationships in Parsimonious Games: some results,fb08eeaf8181d639916803818794af6a,http://arxiv.org/abs/1404.2305v1 12680," In a vintage paper concerning Parsimonious games, a subset of constant sum homogeneous weighted majority games, Isbell introduced a twin relationship based on transposition properties of the incidence matrices upon minimal winning coalitions of such games. A careful investigation of such properties allowed the discovery of some results on twin games presented in this paper. In detail we show that a) twin games have the same minimal winning quota and b) each Parsimonious game admits a unique balanced lottery on minimal winning coalitions, whose probabilities are given by the individual weights of its twin game. ",laura ziani,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,Twin relationships in Parsimonious Games: some results,fb08eeaf8181d639916803818794af6a,http://arxiv.org/abs/1404.2305v1 12681," We introduce a new class of population games that we call monotropic; these are games characterized by the presence of a unique globally neutrally stable Nash equilibrium. Monotropic games generalize strictly concave potential games and zero sum games with a unique minimax solution. Within the class of monotropic games, we study a multiplicative weights dynamic. We show that, depending on a parameter called the learning rate, multiplicative weights are interior globally convergent to the unique equilibrium of monotropic games, but may also induce chaotic behavior if the learning rate is not carefully chosen. ",ioannis avramopoulos,,2014.0,,arXiv,Avramopoulos2014,True,,arXiv,Not available,Multiplicative weights in monotropic games,9aa0993fd42f631ead187ce1aa3dd5c1,http://arxiv.org/abs/1404.4163v2 12682," This paper explores a PAC (probably approximately correct) learning model in cooperative games. Specifically, we are given $m$ random samples of coalitions and their values, taken from some unknown cooperative game; can we predict the values of unseen coalitions? We study the PAC learnability of several well-known classes of cooperative games, such as network flow games, threshold task games, and induced subgraph games. We also establish a novel connection between PAC learnability and core stability: for games that are efficiently learnable, it is possible to find payoff divisions that are likely to be stable using a polynomial number of samples. ",maria-florina balcan,,2015.0,,arXiv,Balcan2015,True,,arXiv,Not available,Learning Cooperative Games,41a312da8a0cc109589fa9cda03b6731,http://arxiv.org/abs/1505.00039v2 12683," This paper explores a PAC (probably approximately correct) learning model in cooperative games. Specifically, we are given $m$ random samples of coalitions and their values, taken from some unknown cooperative game; can we predict the values of unseen coalitions? We study the PAC learnability of several well-known classes of cooperative games, such as network flow games, threshold task games, and induced subgraph games. We also establish a novel connection between PAC learnability and core stability: for games that are efficiently learnable, it is possible to find payoff divisions that are likely to be stable using a polynomial number of samples. ",ariel procaccia,,2015.0,,arXiv,Balcan2015,True,,arXiv,Not available,Learning Cooperative Games,41a312da8a0cc109589fa9cda03b6731,http://arxiv.org/abs/1505.00039v2 12684," This paper explores a PAC (probably approximately correct) learning model in cooperative games. Specifically, we are given $m$ random samples of coalitions and their values, taken from some unknown cooperative game; can we predict the values of unseen coalitions? We study the PAC learnability of several well-known classes of cooperative games, such as network flow games, threshold task games, and induced subgraph games. We also establish a novel connection between PAC learnability and core stability: for games that are efficiently learnable, it is possible to find payoff divisions that are likely to be stable using a polynomial number of samples. ",yair zick,,2015.0,,arXiv,Balcan2015,True,,arXiv,Not available,Learning Cooperative Games,41a312da8a0cc109589fa9cda03b6731,http://arxiv.org/abs/1505.00039v2 12685," We give a strict mathematical description for a refinement of the Marinatto-Weber quantum game scheme. The model allows the players to choose projector operators that determine the state on which they perform their local operators. The game induced by the scheme generalizes finite strategic form game. In particular, it covers normal representations of extensive games, i.e., strategic games generated by extensive ones. We illustrate our idea with an example of extensive game and prove that rational choices in the classical game and its quantum counterpart may lead to significantly different outcomes. ",piotr frackiewicz,,2017.0,10.1007/s11128-015-0979-z,"Quantum Information Processing 14, 1809 (2015)",Frąckiewicz2017,True,,arXiv,Not available,A new quantum scheme for normal-form games,1454df573c72c55a357de352568a8cc9,http://arxiv.org/abs/1701.07096v1 12686," Computing an equilibrium in congestion games can be challenging when the number of players is large. Yet, it is a problem to be addressed in practice, for instance to forecast the state of the system and be able to control it. In this work, we analyze the case of generalized atomic congestion games, with coupling constraints, and with players that are heterogeneous through their action sets and their utility functions. We obtain an approximation of the variational Nash equilibria---a notion generalizing Nash equilibria in the presence of coupling constraints---of a large atomic congestion game by an equilibrium of an auxiliary population game, where each population corresponds to a group of atomic players of the initial game. Because the variational inequalities characterizing the equilibrium of the auxiliary game have smaller dimension than the original problem, this approach enables the fast computation of an estimation of equilibria in a large congestion game with thousands of heterogeneous players. ",nadia oudjane,,2018.0,,arXiv,Wan2018,True,,arXiv,Not available,"Efficient Estimation of Equilibria of Large Congestion Games with Heterogeneous Players",8b2934b64e4c3a5960a408ee9ab75809,http://arxiv.org/abs/1810.01436v1 12687," Creating strong agents for games with more than two players is a major open problem in AI. Common approaches are based on approximating game-theoretic solution concepts such as Nash equilibrium, which have strong theoretical guarantees in two-player zero-sum games, but no guarantees in non-zero-sum games or in games with more than two players. We describe an agent that is able to defeat a variety of realistic opponents using an exact Nash equilibrium strategy in a 3-player imperfect-information game. This shows that, despite a lack of theoretical guarantees, agents based on Nash equilibrium strategies can be successful in multiplayer games after all. ",sam ganzfried,,2018.0,,arXiv,Ganzfried2018,True,,arXiv,Not available,"Successful Nash Equilibrium Agent for a 3-Player Imperfect-Information Game",c8352a17bca4d6d195462cd3c0f9a75b,http://arxiv.org/abs/1804.04789v1 12688," Creating strong agents for games with more than two players is a major open problem in AI. Common approaches are based on approximating game-theoretic solution concepts such as Nash equilibrium, which have strong theoretical guarantees in two-player zero-sum games, but no guarantees in non-zero-sum games or in games with more than two players. We describe an agent that is able to defeat a variety of realistic opponents using an exact Nash equilibrium strategy in a 3-player imperfect-information game. This shows that, despite a lack of theoretical guarantees, agents based on Nash equilibrium strategies can be successful in multiplayer games after all. ",austin nowak,,2018.0,,arXiv,Ganzfried2018,True,,arXiv,Not available,"Successful Nash Equilibrium Agent for a 3-Player Imperfect-Information Game",c8352a17bca4d6d195462cd3c0f9a75b,http://arxiv.org/abs/1804.04789v1 12689," Creating strong agents for games with more than two players is a major open problem in AI. Common approaches are based on approximating game-theoretic solution concepts such as Nash equilibrium, which have strong theoretical guarantees in two-player zero-sum games, but no guarantees in non-zero-sum games or in games with more than two players. We describe an agent that is able to defeat a variety of realistic opponents using an exact Nash equilibrium strategy in a 3-player imperfect-information game. This shows that, despite a lack of theoretical guarantees, agents based on Nash equilibrium strategies can be successful in multiplayer games after all. ",joannier pinales,,2018.0,,arXiv,Ganzfried2018,True,,arXiv,Not available,"Successful Nash Equilibrium Agent for a 3-Player Imperfect-Information Game",c8352a17bca4d6d195462cd3c0f9a75b,http://arxiv.org/abs/1804.04789v1 12690," This work establishes sufficient conditions for existence of saddle points in discrete Markov games. The result reveals the relation between dynamic games and static games using dynamic programming equations. This result enables us to prove existence of saddle points of non-separable stochastic differential games of regime-switching diffusions under appropriate conditions. ",q. song,,2006.0,,arXiv,Song2006,True,,arXiv,Not available,"Existence of Saddle Points in Discrete Markov Games and Its Application in Numerical Methods for Stochastic Differential Games",9648f540053a5f81f39877a05a6854b3,http://arxiv.org/abs/math/0603600v1 12691," This work establishes sufficient conditions for existence of saddle points in discrete Markov games. The result reveals the relation between dynamic games and static games using dynamic programming equations. This result enables us to prove existence of saddle points of non-separable stochastic differential games of regime-switching diffusions under appropriate conditions. ",g. yin,,2006.0,,arXiv,Song2006,True,,arXiv,Not available,"Existence of Saddle Points in Discrete Markov Games and Its Application in Numerical Methods for Stochastic Differential Games",9648f540053a5f81f39877a05a6854b3,http://arxiv.org/abs/math/0603600v1 12692," The paper uses a non-cooperative simultaneous game for coalition structure formation (Levando, 2016) to demonstrate some applications of the introduced game: a cooperation, a Bayesian game within a coalition with intra-coalition externalities, a stochastic game, where states are coalition structures; self-enforcement properties of a non-cooperative equilibrium and a construction of a non-cooperative stability criterion. ",dmitry levando,,2016.0,,arXiv,Levando2016,True,,arXiv,Not available,"Formation of coalition structures as a non-cooperative game 2: applications",ab8004f3d1506d19bb3bcbbf26575fc1,http://arxiv.org/abs/1612.03742v1 12693," Graph Pebbling is a well-studied single-player game on graphs. We introduce the game of Blocking Pebbles which adapts Graph Pebbling into a two-player strategy game in order to examine it within the context of Combinatorial Game Theory. Positions with game values matching all integers, all nimbers, and many infinitesimals and switches are found. ",michael fisher,,2017.0,,arXiv,Fisher2017,True,,arXiv,Not available,The Game of Blocking Pebbles,9d7cc005c13433e2af538c566c5a14e1,http://arxiv.org/abs/1712.01173v2 12694," Graph Pebbling is a well-studied single-player game on graphs. We introduce the game of Blocking Pebbles which adapts Graph Pebbling into a two-player strategy game in order to examine it within the context of Combinatorial Game Theory. Positions with game values matching all integers, all nimbers, and many infinitesimals and switches are found. ",craig tennenhouse,,2017.0,,arXiv,Fisher2017,True,,arXiv,Not available,The Game of Blocking Pebbles,9d7cc005c13433e2af538c566c5a14e1,http://arxiv.org/abs/1712.01173v2 12695," We give polynomial time algorithms for deciding almost-sure and limit-sure reachability in Branching Concurrent Stochastic Games (BCSGs). These are a class of infinite-state imperfect-information stochastic games that generalize both finite-state concurrent stochastic reachability games, as well as branching simple stochastic reachability games. ",kousha etessami,,2018.0,,arXiv,Etessami2018,True,,arXiv,Not available,Reachability for Branching Concurrent Stochastic Games,87fe45ef93be32a87e2bc7168bda315a,http://arxiv.org/abs/1806.03907v2 12696," We give polynomial time algorithms for deciding almost-sure and limit-sure reachability in Branching Concurrent Stochastic Games (BCSGs). These are a class of infinite-state imperfect-information stochastic games that generalize both finite-state concurrent stochastic reachability games, as well as branching simple stochastic reachability games. ",emanuel martinov,,2018.0,,arXiv,Etessami2018,True,,arXiv,Not available,Reachability for Branching Concurrent Stochastic Games,87fe45ef93be32a87e2bc7168bda315a,http://arxiv.org/abs/1806.03907v2 12697," This document collects the lecture notes from my mini-course ""Complexity Theory, Game Theory, and Economics,"" taught at the Bellairs Research Institute of McGill University, Holetown, Barbados, February 19--23, 2017, as the 29th McGill Invitational Workshop on Computational Complexity. The goal of this mini-course is twofold: (i) to explain how complexity theory has helped illuminate several barriers in economics and game theory; and (ii) to illustrate how game-theoretic questions have led to new and interesting complexity theory, including recent several breakthroughs. It consists of two five-lecture sequences: the Solar Lectures, focusing on the communication and computational complexity of computing equilibria; and the Lunar Lectures, focusing on applications of complexity theory in game theory and economics. No background in game theory is assumed. ",tim roughgarden,,2018.0,,arXiv,Roughgarden2018,True,,arXiv,Not available,"Complexity Theory, Game Theory, and Economics",735a21812ffc818b47e1d8266a64c518,http://arxiv.org/abs/1801.00734v1 12698," We give polynomial time algorithms for deciding almost-sure and limit-sure reachability in Branching Concurrent Stochastic Games (BCSGs). These are a class of infinite-state imperfect-information stochastic games that generalize both finite-state concurrent stochastic reachability games, as well as branching simple stochastic reachability games. ",alistair stewart,,2018.0,,arXiv,Etessami2018,True,,arXiv,Not available,Reachability for Branching Concurrent Stochastic Games,87fe45ef93be32a87e2bc7168bda315a,http://arxiv.org/abs/1806.03907v2 12699," We give polynomial time algorithms for deciding almost-sure and limit-sure reachability in Branching Concurrent Stochastic Games (BCSGs). These are a class of infinite-state imperfect-information stochastic games that generalize both finite-state concurrent stochastic reachability games, as well as branching simple stochastic reachability games. ",mihalis yannakakis,,2018.0,,arXiv,Etessami2018,True,,arXiv,Not available,Reachability for Branching Concurrent Stochastic Games,87fe45ef93be32a87e2bc7168bda315a,http://arxiv.org/abs/1806.03907v2 12700," Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting user entry (yet not necessarily a higher revenue) in other domains. In this paper, we explore a new dimension in optimal Tullock contest design, by superseding the contest prize---which is fixed in conventional Tullock contests---with a prize function that is dependent on the (unknown) winner's contribution, in order to maximize the crowdsourcer's utility. We show that this approach leads to attractive practical advantages: (a) it is well-suited for rapid prototyping in fully distributed web agents and smartphone apps; (b) it overcomes the disincentive to participate caused by players' antagonism to an increasing number of rivals. Furthermore, we optimize conventional, fixed-prize Tullock contests to construct the most superior benchmark to compare against our mechanism. Through extensive evaluations, we show that our mechanism significantly outperforms the optimal benchmark, by over three folds on the crowdsourcer's utility cum profit and up to nine folds on the players' social welfare. ",t. luo,,2017.0,10.1109/INFOCOM.2015.7218641,"Proc. IEEE INFOCOM, 2015, pp. 2515-2523",Luo2017,True,,arXiv,Not available,Crowdsourcing with Tullock contests: A new perspective,69b679535d1120d69a5879af59db87c5,http://arxiv.org/abs/1701.01216v1 12701," Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting user entry (yet not necessarily a higher revenue) in other domains. In this paper, we explore a new dimension in optimal Tullock contest design, by superseding the contest prize---which is fixed in conventional Tullock contests---with a prize function that is dependent on the (unknown) winner's contribution, in order to maximize the crowdsourcer's utility. We show that this approach leads to attractive practical advantages: (a) it is well-suited for rapid prototyping in fully distributed web agents and smartphone apps; (b) it overcomes the disincentive to participate caused by players' antagonism to an increasing number of rivals. Furthermore, we optimize conventional, fixed-prize Tullock contests to construct the most superior benchmark to compare against our mechanism. Through extensive evaluations, we show that our mechanism significantly outperforms the optimal benchmark, by over three folds on the crowdsourcer's utility cum profit and up to nine folds on the players' social welfare. ",s. kanhere,,2017.0,10.1109/INFOCOM.2015.7218641,"Proc. IEEE INFOCOM, 2015, pp. 2515-2523",Luo2017,True,,arXiv,Not available,Crowdsourcing with Tullock contests: A new perspective,69b679535d1120d69a5879af59db87c5,http://arxiv.org/abs/1701.01216v1 12702," Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting user entry (yet not necessarily a higher revenue) in other domains. In this paper, we explore a new dimension in optimal Tullock contest design, by superseding the contest prize---which is fixed in conventional Tullock contests---with a prize function that is dependent on the (unknown) winner's contribution, in order to maximize the crowdsourcer's utility. We show that this approach leads to attractive practical advantages: (a) it is well-suited for rapid prototyping in fully distributed web agents and smartphone apps; (b) it overcomes the disincentive to participate caused by players' antagonism to an increasing number of rivals. Furthermore, we optimize conventional, fixed-prize Tullock contests to construct the most superior benchmark to compare against our mechanism. Through extensive evaluations, we show that our mechanism significantly outperforms the optimal benchmark, by over three folds on the crowdsourcer's utility cum profit and up to nine folds on the players' social welfare. ",h-p. tan,,2017.0,10.1109/INFOCOM.2015.7218641,"Proc. IEEE INFOCOM, 2015, pp. 2515-2523",Luo2017,True,,arXiv,Not available,Crowdsourcing with Tullock contests: A new perspective,69b679535d1120d69a5879af59db87c5,http://arxiv.org/abs/1701.01216v1 12703," Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting user entry (yet not necessarily a higher revenue) in other domains. In this paper, we explore a new dimension in optimal Tullock contest design, by superseding the contest prize---which is fixed in conventional Tullock contests---with a prize function that is dependent on the (unknown) winner's contribution, in order to maximize the crowdsourcer's utility. We show that this approach leads to attractive practical advantages: (a) it is well-suited for rapid prototyping in fully distributed web agents and smartphone apps; (b) it overcomes the disincentive to participate caused by players' antagonism to an increasing number of rivals. Furthermore, we optimize conventional, fixed-prize Tullock contests to construct the most superior benchmark to compare against our mechanism. Through extensive evaluations, we show that our mechanism significantly outperforms the optimal benchmark, by over three folds on the crowdsourcer's utility cum profit and up to nine folds on the players' social welfare. ",f. wu,,2017.0,10.1109/INFOCOM.2015.7218641,"Proc. IEEE INFOCOM, 2015, pp. 2515-2523",Luo2017,True,,arXiv,Not available,Crowdsourcing with Tullock contests: A new perspective,69b679535d1120d69a5879af59db87c5,http://arxiv.org/abs/1701.01216v1 12704," Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting user entry (yet not necessarily a higher revenue) in other domains. In this paper, we explore a new dimension in optimal Tullock contest design, by superseding the contest prize---which is fixed in conventional Tullock contests---with a prize function that is dependent on the (unknown) winner's contribution, in order to maximize the crowdsourcer's utility. We show that this approach leads to attractive practical advantages: (a) it is well-suited for rapid prototyping in fully distributed web agents and smartphone apps; (b) it overcomes the disincentive to participate caused by players' antagonism to an increasing number of rivals. Furthermore, we optimize conventional, fixed-prize Tullock contests to construct the most superior benchmark to compare against our mechanism. Through extensive evaluations, we show that our mechanism significantly outperforms the optimal benchmark, by over three folds on the crowdsourcer's utility cum profit and up to nine folds on the players' social welfare. ",h. wu,,2017.0,10.1109/INFOCOM.2015.7218641,"Proc. IEEE INFOCOM, 2015, pp. 2515-2523",Luo2017,True,,arXiv,Not available,Crowdsourcing with Tullock contests: A new perspective,69b679535d1120d69a5879af59db87c5,http://arxiv.org/abs/1701.01216v1 12705," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",mark braverman,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 12706," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",jieming mao,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 12707," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",s. weinberg,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 12708," Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming Multi-Access Edge Computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as Quality of Experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game usefulness, namely: rational vs. evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse trade-offs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios. ",jose moura,,2017.0,,arXiv,Moura2017,True,,arXiv,Not available,"Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends",25fd6e74f2c45a918143eb1feec87660,http://arxiv.org/abs/1704.00323v5 12709," This paper proposes an optimal dynamic model for combining guaranteed and spot markets in display advertising. We assume a media seller can well estimate the total supply and demand of page views from a specific advertisement (in short ad) slot in a specific future period. The model helps the seller to determine how to distribute and price those future page views between guaranteed contracts and advertising auctions. The former is sold algorithmically in advance while the latter happens in a few milliseconds after a user visits the Web page in the future. Therefore, the former is called programmatic guarantee (PG) and the latter is called real-time bidding (RTB). This is one of a few studies that investigate the RTB-based posted price PG for display advertising. The optimization problem is challenging because the allocation and pricing of PG affect the expected revenue from future RTB campaigns. Several assumptions are made on media buyers' behavior, such as risk aversion, stochastic demand arrivals, and effects of time and guaranteed contract price. We use dynamic programming to solve the optimization problem and our solution is relatively scalable and efficient. We validate the proposed model with an RTB dataset and find it increases the seller's expected total revenue by adopting different pricing and allocation strategies according to the level of competition in future RTB campaigns. ",bowei chen,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Combining guaranteed and spot markets in display advertising: selling guaranteed page views with stochastic demand",b0de52117639319d5a78aab5e76d7c4b,http://arxiv.org/abs/1708.01348v2 12710," This paper proposes an optimal dynamic model for combining guaranteed and spot markets in display advertising. We assume a media seller can well estimate the total supply and demand of page views from a specific advertisement (in short ad) slot in a specific future period. The model helps the seller to determine how to distribute and price those future page views between guaranteed contracts and advertising auctions. The former is sold algorithmically in advance while the latter happens in a few milliseconds after a user visits the Web page in the future. Therefore, the former is called programmatic guarantee (PG) and the latter is called real-time bidding (RTB). This is one of a few studies that investigate the RTB-based posted price PG for display advertising. The optimization problem is challenging because the allocation and pricing of PG affect the expected revenue from future RTB campaigns. Several assumptions are made on media buyers' behavior, such as risk aversion, stochastic demand arrivals, and effects of time and guaranteed contract price. We use dynamic programming to solve the optimization problem and our solution is relatively scalable and efficient. We validate the proposed model with an RTB dataset and find it increases the seller's expected total revenue by adopting different pricing and allocation strategies according to the level of competition in future RTB campaigns. ",jingmin huang,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Combining guaranteed and spot markets in display advertising: selling guaranteed page views with stochastic demand",b0de52117639319d5a78aab5e76d7c4b,http://arxiv.org/abs/1708.01348v2 12711," This paper proposes an optimal dynamic model for combining guaranteed and spot markets in display advertising. We assume a media seller can well estimate the total supply and demand of page views from a specific advertisement (in short ad) slot in a specific future period. The model helps the seller to determine how to distribute and price those future page views between guaranteed contracts and advertising auctions. The former is sold algorithmically in advance while the latter happens in a few milliseconds after a user visits the Web page in the future. Therefore, the former is called programmatic guarantee (PG) and the latter is called real-time bidding (RTB). This is one of a few studies that investigate the RTB-based posted price PG for display advertising. The optimization problem is challenging because the allocation and pricing of PG affect the expected revenue from future RTB campaigns. Several assumptions are made on media buyers' behavior, such as risk aversion, stochastic demand arrivals, and effects of time and guaranteed contract price. We use dynamic programming to solve the optimization problem and our solution is relatively scalable and efficient. We validate the proposed model with an RTB dataset and find it increases the seller's expected total revenue by adopting different pricing and allocation strategies according to the level of competition in future RTB campaigns. ",yufei huang,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Combining guaranteed and spot markets in display advertising: selling guaranteed page views with stochastic demand",b0de52117639319d5a78aab5e76d7c4b,http://arxiv.org/abs/1708.01348v2 12712," This paper proposes an optimal dynamic model for combining guaranteed and spot markets in display advertising. We assume a media seller can well estimate the total supply and demand of page views from a specific advertisement (in short ad) slot in a specific future period. The model helps the seller to determine how to distribute and price those future page views between guaranteed contracts and advertising auctions. The former is sold algorithmically in advance while the latter happens in a few milliseconds after a user visits the Web page in the future. Therefore, the former is called programmatic guarantee (PG) and the latter is called real-time bidding (RTB). This is one of a few studies that investigate the RTB-based posted price PG for display advertising. The optimization problem is challenging because the allocation and pricing of PG affect the expected revenue from future RTB campaigns. Several assumptions are made on media buyers' behavior, such as risk aversion, stochastic demand arrivals, and effects of time and guaranteed contract price. We use dynamic programming to solve the optimization problem and our solution is relatively scalable and efficient. We validate the proposed model with an RTB dataset and find it increases the seller's expected total revenue by adopting different pricing and allocation strategies according to the level of competition in future RTB campaigns. ",stefanos kollias,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Combining guaranteed and spot markets in display advertising: selling guaranteed page views with stochastic demand",b0de52117639319d5a78aab5e76d7c4b,http://arxiv.org/abs/1708.01348v2 12713," This paper proposes an optimal dynamic model for combining guaranteed and spot markets in display advertising. We assume a media seller can well estimate the total supply and demand of page views from a specific advertisement (in short ad) slot in a specific future period. The model helps the seller to determine how to distribute and price those future page views between guaranteed contracts and advertising auctions. The former is sold algorithmically in advance while the latter happens in a few milliseconds after a user visits the Web page in the future. Therefore, the former is called programmatic guarantee (PG) and the latter is called real-time bidding (RTB). This is one of a few studies that investigate the RTB-based posted price PG for display advertising. The optimization problem is challenging because the allocation and pricing of PG affect the expected revenue from future RTB campaigns. Several assumptions are made on media buyers' behavior, such as risk aversion, stochastic demand arrivals, and effects of time and guaranteed contract price. We use dynamic programming to solve the optimization problem and our solution is relatively scalable and efficient. We validate the proposed model with an RTB dataset and find it increases the seller's expected total revenue by adopting different pricing and allocation strategies according to the level of competition in future RTB campaigns. ",shigang yue,,2017.0,,arXiv,Chen2017,True,,arXiv,Not available,"Combining guaranteed and spot markets in display advertising: selling guaranteed page views with stochastic demand",b0de52117639319d5a78aab5e76d7c4b,http://arxiv.org/abs/1708.01348v2 12714," We consider a setting where $p$ public resources are to be allocated among $n$ competing and strategic agents so as to maximize social welfare (the objects should be allocated to those who value them the most). This is called allocative efficiency (AE). We need the agents to report their valuations for obtaining these resources, truthfully referred to as dominant strategy incentive compatibility (DSIC). We use auction-based mechanisms to achieve AE and DSIC yet budget balance cannot be ensured, due to Green-Laffont Impossibility Theorem. That is, the net transfer of money cannot be zero. This problem has been addressed by designing a redistribution mechanism so as to ensure a minimum surplus of money as well as AE and DSIC. The objective could be to minimize surplus in expectation or in the worst case and these $p$ objects could be homogeneous or heterogeneous. Designing redistribution mechanisms which perform well in expectation becomes analytically challenging for heterogeneous settings. In this paper, we take a completely different, data-driven approach. We train a neural network to determine an optimal redistribution mechanism based on given settings with both the objectives, optimal in expectation and optimal in the worst case. We also propose a loss function to train a neural network to optimize worst case. We design neural networks with the underlying rebate functions being linear as well as nonlinear in terms of bids of the agents. Our networks' performances are same as the theoretical guarantees for the cases where it has been solved. We observe that a neural network based redistribution mechanism for homogeneous settings which uses nonlinear rebate functions outperforms linear rebate functions when the objective is optimal in expectation. Our approach also yields an optimal in expectation redistribution mechanism for heterogeneous settings. ",p manisha,,2018.0,,arXiv,Manisha2018,True,,arXiv,Not available,Learning Optimal Redistribution Mechanisms through Neural Networks,4ed81d70a1b0089ed74079d4b7442326,http://arxiv.org/abs/1801.08808v1 12715," We consider a setting where $p$ public resources are to be allocated among $n$ competing and strategic agents so as to maximize social welfare (the objects should be allocated to those who value them the most). This is called allocative efficiency (AE). We need the agents to report their valuations for obtaining these resources, truthfully referred to as dominant strategy incentive compatibility (DSIC). We use auction-based mechanisms to achieve AE and DSIC yet budget balance cannot be ensured, due to Green-Laffont Impossibility Theorem. That is, the net transfer of money cannot be zero. This problem has been addressed by designing a redistribution mechanism so as to ensure a minimum surplus of money as well as AE and DSIC. The objective could be to minimize surplus in expectation or in the worst case and these $p$ objects could be homogeneous or heterogeneous. Designing redistribution mechanisms which perform well in expectation becomes analytically challenging for heterogeneous settings. In this paper, we take a completely different, data-driven approach. We train a neural network to determine an optimal redistribution mechanism based on given settings with both the objectives, optimal in expectation and optimal in the worst case. We also propose a loss function to train a neural network to optimize worst case. We design neural networks with the underlying rebate functions being linear as well as nonlinear in terms of bids of the agents. Our networks' performances are same as the theoretical guarantees for the cases where it has been solved. We observe that a neural network based redistribution mechanism for homogeneous settings which uses nonlinear rebate functions outperforms linear rebate functions when the objective is optimal in expectation. Our approach also yields an optimal in expectation redistribution mechanism for heterogeneous settings. ",c jawahar,,2018.0,,arXiv,Manisha2018,True,,arXiv,Not available,Learning Optimal Redistribution Mechanisms through Neural Networks,4ed81d70a1b0089ed74079d4b7442326,http://arxiv.org/abs/1801.08808v1 12716," We consider a setting where $p$ public resources are to be allocated among $n$ competing and strategic agents so as to maximize social welfare (the objects should be allocated to those who value them the most). This is called allocative efficiency (AE). We need the agents to report their valuations for obtaining these resources, truthfully referred to as dominant strategy incentive compatibility (DSIC). We use auction-based mechanisms to achieve AE and DSIC yet budget balance cannot be ensured, due to Green-Laffont Impossibility Theorem. That is, the net transfer of money cannot be zero. This problem has been addressed by designing a redistribution mechanism so as to ensure a minimum surplus of money as well as AE and DSIC. The objective could be to minimize surplus in expectation or in the worst case and these $p$ objects could be homogeneous or heterogeneous. Designing redistribution mechanisms which perform well in expectation becomes analytically challenging for heterogeneous settings. In this paper, we take a completely different, data-driven approach. We train a neural network to determine an optimal redistribution mechanism based on given settings with both the objectives, optimal in expectation and optimal in the worst case. We also propose a loss function to train a neural network to optimize worst case. We design neural networks with the underlying rebate functions being linear as well as nonlinear in terms of bids of the agents. Our networks' performances are same as the theoretical guarantees for the cases where it has been solved. We observe that a neural network based redistribution mechanism for homogeneous settings which uses nonlinear rebate functions outperforms linear rebate functions when the objective is optimal in expectation. Our approach also yields an optimal in expectation redistribution mechanism for heterogeneous settings. ",sujit gujar,,2018.0,,arXiv,Manisha2018,True,,arXiv,Not available,Learning Optimal Redistribution Mechanisms through Neural Networks,4ed81d70a1b0089ed74079d4b7442326,http://arxiv.org/abs/1801.08808v1 12717," The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the other properties. The current state-of-the-art of such mechanisms for two-sided markets can be categorized as giving one (but not both) of the following two types of approximation guarantees on the gains from trade: a constant ex-ante guarantee, measured with respect to the second-best efficiency benchmark, or an asymptotically optimal ex-post guarantee, measured with respect to the first-best efficiency benchmark. Here the second-best efficiency benchmark refers to the highest gains from trade attainable by any IR, IC and weakly budget balanced mechanism, while the first-best efficiency benchmark refers to the maximum gains from trade (attainable by the VCG mechanism, which is not weakly budget balanced). In this paper, we construct simple mechanisms for double-auction and matching markets that simultaneously achieve both types of guarantees: these are ex-post IR, Bayesian IC, and ex-post weakly budget balanced mechanisms that 1) ex-ante guarantee a constant fraction of the gains from trade of the second-best, and 2) ex-post guarantee a realization-dependent fraction of the gains from trade of the first-best, such that this realization-dependent fraction converges to 1 (full efficiency) as the market grows large. ",moshe babaioff,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,"The Best of Both Worlds: Asymptotically Efficient Mechanisms with a Guarantee on the Expected Gains-From-Trade",ae591a3d2f3324352a7309ef0f88f502,http://arxiv.org/abs/1802.08023v1 12718," The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the other properties. The current state-of-the-art of such mechanisms for two-sided markets can be categorized as giving one (but not both) of the following two types of approximation guarantees on the gains from trade: a constant ex-ante guarantee, measured with respect to the second-best efficiency benchmark, or an asymptotically optimal ex-post guarantee, measured with respect to the first-best efficiency benchmark. Here the second-best efficiency benchmark refers to the highest gains from trade attainable by any IR, IC and weakly budget balanced mechanism, while the first-best efficiency benchmark refers to the maximum gains from trade (attainable by the VCG mechanism, which is not weakly budget balanced). In this paper, we construct simple mechanisms for double-auction and matching markets that simultaneously achieve both types of guarantees: these are ex-post IR, Bayesian IC, and ex-post weakly budget balanced mechanisms that 1) ex-ante guarantee a constant fraction of the gains from trade of the second-best, and 2) ex-post guarantee a realization-dependent fraction of the gains from trade of the first-best, such that this realization-dependent fraction converges to 1 (full efficiency) as the market grows large. ",yang cai,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,"The Best of Both Worlds: Asymptotically Efficient Mechanisms with a Guarantee on the Expected Gains-From-Trade",ae591a3d2f3324352a7309ef0f88f502,http://arxiv.org/abs/1802.08023v1 12719," Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming Multi-Access Edge Computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as Quality of Experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game usefulness, namely: rational vs. evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse trade-offs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios. ",david hutchison,,2017.0,,arXiv,Moura2017,True,,arXiv,Not available,"Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends",25fd6e74f2c45a918143eb1feec87660,http://arxiv.org/abs/1704.00323v5 12720," The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the other properties. The current state-of-the-art of such mechanisms for two-sided markets can be categorized as giving one (but not both) of the following two types of approximation guarantees on the gains from trade: a constant ex-ante guarantee, measured with respect to the second-best efficiency benchmark, or an asymptotically optimal ex-post guarantee, measured with respect to the first-best efficiency benchmark. Here the second-best efficiency benchmark refers to the highest gains from trade attainable by any IR, IC and weakly budget balanced mechanism, while the first-best efficiency benchmark refers to the maximum gains from trade (attainable by the VCG mechanism, which is not weakly budget balanced). In this paper, we construct simple mechanisms for double-auction and matching markets that simultaneously achieve both types of guarantees: these are ex-post IR, Bayesian IC, and ex-post weakly budget balanced mechanisms that 1) ex-ante guarantee a constant fraction of the gains from trade of the second-best, and 2) ex-post guarantee a realization-dependent fraction of the gains from trade of the first-best, such that this realization-dependent fraction converges to 1 (full efficiency) as the market grows large. ",yannai gonczarowski,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,"The Best of Both Worlds: Asymptotically Efficient Mechanisms with a Guarantee on the Expected Gains-From-Trade",ae591a3d2f3324352a7309ef0f88f502,http://arxiv.org/abs/1802.08023v1 12721," The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the other properties. The current state-of-the-art of such mechanisms for two-sided markets can be categorized as giving one (but not both) of the following two types of approximation guarantees on the gains from trade: a constant ex-ante guarantee, measured with respect to the second-best efficiency benchmark, or an asymptotically optimal ex-post guarantee, measured with respect to the first-best efficiency benchmark. Here the second-best efficiency benchmark refers to the highest gains from trade attainable by any IR, IC and weakly budget balanced mechanism, while the first-best efficiency benchmark refers to the maximum gains from trade (attainable by the VCG mechanism, which is not weakly budget balanced). In this paper, we construct simple mechanisms for double-auction and matching markets that simultaneously achieve both types of guarantees: these are ex-post IR, Bayesian IC, and ex-post weakly budget balanced mechanisms that 1) ex-ante guarantee a constant fraction of the gains from trade of the second-best, and 2) ex-post guarantee a realization-dependent fraction of the gains from trade of the first-best, such that this realization-dependent fraction converges to 1 (full efficiency) as the market grows large. ",mingfei zhao,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,"The Best of Both Worlds: Asymptotically Efficient Mechanisms with a Guarantee on the Expected Gains-From-Trade",ae591a3d2f3324352a7309ef0f88f502,http://arxiv.org/abs/1802.08023v1 12722," Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely predictable. In this paper, we present a dynamic contract approach where an advance payment is made at the time of reservation based on partial information about spectrum reservation utility. Once the complete information is obtained, a rebate on the payment is made if the reservation is released. In this paper, we present a contract theoretic approach to design an incentivized mechanism that coerces the applications to reveal their true application type resulting in greater profitability of the IoT network operator. The operator offers a menu of contracts with advanced payments and rebate to the IoT applications without having knowledge about the types of applications. The decision of the applications in selecting a contract leads to a revelation of their true type to the operator which allows it to generate higher profits than a traditional spectrum auction mechanism. Under some assumptions on distribution of the utility of the applications, closed form solutions for the optimal dynamic spectrum reservation contract are provided and the sensitivity against system parameters is analyzed. ",muhammad farooq,,2018.0,,"16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2018)",Farooq2018,True,,arXiv,Not available,"Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems",5203b522e4851caf9c7d0671879cf101,http://arxiv.org/abs/1803.07842v1 12723," Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely predictable. In this paper, we present a dynamic contract approach where an advance payment is made at the time of reservation based on partial information about spectrum reservation utility. Once the complete information is obtained, a rebate on the payment is made if the reservation is released. In this paper, we present a contract theoretic approach to design an incentivized mechanism that coerces the applications to reveal their true application type resulting in greater profitability of the IoT network operator. The operator offers a menu of contracts with advanced payments and rebate to the IoT applications without having knowledge about the types of applications. The decision of the applications in selecting a contract leads to a revelation of their true type to the operator which allows it to generate higher profits than a traditional spectrum auction mechanism. Under some assumptions on distribution of the utility of the applications, closed form solutions for the optimal dynamic spectrum reservation contract are provided and the sensitivity against system parameters is analyzed. ",quanyan zhu,,2018.0,,"16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2018)",Farooq2018,True,,arXiv,Not available,"Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems",5203b522e4851caf9c7d0671879cf101,http://arxiv.org/abs/1803.07842v1 12724," Using AI approaches to automatically design mechanisms has been a central research mission at the interface of AI and economics [Conitzer and Sandholm, 2002]. Previous approaches that a empt to design revenue optimal auctions for the multi-dimensional settings fall short in at least one of the three aspects: 1) representation --- search in a space that probably does not even contain the optimal mechanism; 2) exactness --- finding a mechanism that is either not truthful or far from optimal; 3) domain dependence --- need a different design for different environment settings. To resolve the three difficulties, in this paper, we put forward a uni ed neural network based framework that automatically learns to design revenue optimal mechanisms. Our framework consists of a mechanism network that takes an input distribution for training and outputs a mechanism, as well as a buyer network that takes a mechanism as input and output an action. Such a separation in design mitigates the difficulty to impose incentive compatibility constraints on the mechanism, by making it a rational choice of the buyer. As a result, our framework easily overcomes the previously mentioned difficulty in incorporating IC constraints and always returns exactly incentive compatible mechanisms. We then applied our framework to a number of multi-item revenue optimal design settings, for a few of which the theoretically optimal mechanisms are unknown. We then go on to theoretically prove that the mechanisms found by our framework are indeed optimal. ",weiran shen,,2018.0,,arXiv,Shen2018,True,,arXiv,Not available,"Computer-aided mechanism design: designing revenue-optimal mechanisms via neural networks",be1f8d89003ffc4472eb005e36362253,http://arxiv.org/abs/1805.03382v1 12725," Using AI approaches to automatically design mechanisms has been a central research mission at the interface of AI and economics [Conitzer and Sandholm, 2002]. Previous approaches that a empt to design revenue optimal auctions for the multi-dimensional settings fall short in at least one of the three aspects: 1) representation --- search in a space that probably does not even contain the optimal mechanism; 2) exactness --- finding a mechanism that is either not truthful or far from optimal; 3) domain dependence --- need a different design for different environment settings. To resolve the three difficulties, in this paper, we put forward a uni ed neural network based framework that automatically learns to design revenue optimal mechanisms. Our framework consists of a mechanism network that takes an input distribution for training and outputs a mechanism, as well as a buyer network that takes a mechanism as input and output an action. Such a separation in design mitigates the difficulty to impose incentive compatibility constraints on the mechanism, by making it a rational choice of the buyer. As a result, our framework easily overcomes the previously mentioned difficulty in incorporating IC constraints and always returns exactly incentive compatible mechanisms. We then applied our framework to a number of multi-item revenue optimal design settings, for a few of which the theoretically optimal mechanisms are unknown. We then go on to theoretically prove that the mechanisms found by our framework are indeed optimal. ",pingzhong tang,,2018.0,,arXiv,Shen2018,True,,arXiv,Not available,"Computer-aided mechanism design: designing revenue-optimal mechanisms via neural networks",be1f8d89003ffc4472eb005e36362253,http://arxiv.org/abs/1805.03382v1 12726," Using AI approaches to automatically design mechanisms has been a central research mission at the interface of AI and economics [Conitzer and Sandholm, 2002]. Previous approaches that a empt to design revenue optimal auctions for the multi-dimensional settings fall short in at least one of the three aspects: 1) representation --- search in a space that probably does not even contain the optimal mechanism; 2) exactness --- finding a mechanism that is either not truthful or far from optimal; 3) domain dependence --- need a different design for different environment settings. To resolve the three difficulties, in this paper, we put forward a uni ed neural network based framework that automatically learns to design revenue optimal mechanisms. Our framework consists of a mechanism network that takes an input distribution for training and outputs a mechanism, as well as a buyer network that takes a mechanism as input and output an action. Such a separation in design mitigates the difficulty to impose incentive compatibility constraints on the mechanism, by making it a rational choice of the buyer. As a result, our framework easily overcomes the previously mentioned difficulty in incorporating IC constraints and always returns exactly incentive compatible mechanisms. We then applied our framework to a number of multi-item revenue optimal design settings, for a few of which the theoretically optimal mechanisms are unknown. We then go on to theoretically prove that the mechanisms found by our framework are indeed optimal. ",song zuo,,2018.0,,arXiv,Shen2018,True,,arXiv,Not available,"Computer-aided mechanism design: designing revenue-optimal mechanisms via neural networks",be1f8d89003ffc4472eb005e36362253,http://arxiv.org/abs/1805.03382v1 12727," Fair division is the problem of dividing one or several goods amongst two or more agents in a way that satisfies a suitable fairness criterion. These Notes provide a succinct introduction to the field. We cover three main topics. First, we need to define what is to be understood by a ""fair"" allocation of goods to individuals. We present an overview of the most important fairness criteria (as well as the closely related criteria for economic efficiency) developed in the literature, together with a short discussion of their axiomatic foundations. Second, we give an introduction to cake-cutting procedures as an example of methods for fairly dividing a single divisible resource amongst a group of individuals. Third, we discuss the combinatorial optimisation problem of fairly allocating a set of indivisible goods to a group of agents, covering both centralised algorithms (similar to auctions) and a distributed approach based on negotiation. While the classical literature on fair division has largely developed within Economics, these Notes are specifically written for readers with a background in Computer Science or similar, and who may be (or may wish to be) engaged in research in Artificial Intelligence, Multiagent Systems, or Computational Social Choice. References for further reading, as well as a small number of exercises, are included. Notes prepared for a tutorial at the 11th European Agent Systems Summer School (EASSS-2009), Torino, Italy, 31 August and 1 September 2009. Updated for a tutorial at the COST-ADT Doctoral School on Computational Social Choice, Estoril, Portugal, 9--14 April 2010. ",ulle endriss,,2018.0,,arXiv,Endriss2018,True,,arXiv,Not available,Lecture Notes on Fair Division,4fdc6da30826c452bcbf9afdff55bd6c,http://arxiv.org/abs/1806.04234v1 12728," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",di wu,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12729," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",cheng chen,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12730," We solve the game of Babylon when played with chips of two colors, giving a winning strategy for the second player in all previously unsolved cases. ",agelos georgakopoulos,,2011.0,,arXiv,Georgakopoulos2011,True,,arXiv,Not available,Two-Color Babylon,6873b698e85aec74101d8ff8f73b5389,http://arxiv.org/abs/1111.4189v1 12731," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",xun yang,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12732," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",xiujun chen,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12733," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",qing tan,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12734," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",jian xu,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12735," In online display advertising, guaranteed contracts and real-time bidding (RTB) are two major ways to sell impressions for a publisher. Despite the increasing popularity of RTB, there is still half of online display advertising revenue generated from guaranteed contracts. Therefore, simultaneously selling impressions through both guaranteed contracts and RTB is a straightforward choice for a publisher to maximize its yield. However, deriving the optimal strategy to allocate impressions is not a trivial task, especially when the environment is unstable in real-world applications. In this paper, we formulate the impression allocation problem as an auction problem where each contract can submit virtual bids for individual impressions. With this formulation, we derive the optimal impression allocation strategy by solving the optimal bidding functions for contracts. Since the bids from contracts are decided by the publisher, we propose a multi-agent reinforcement learning (MARL) approach to derive cooperative policies for the publisher to maximize its yield in an unstable environment. The proposed approach also resolves the common challenges in MARL such as input dimension explosion, reward credit assignment, and non-stationary environment. Experimental evaluations on large-scale real datasets demonstrate the effectiveness of our approach. ",kun gai,,2018.0,,arXiv,Wu2018,True,,arXiv,Not available,"A Multi-Agent Reinforcement Learning Method for Impression Allocation in Online Display Advertising",8c08ced459a934afa12816e3ece76d77,http://arxiv.org/abs/1809.03152v1 12736," Hierarchical simple games - both disjunctive and conjunctive - are natural generalizations of simple majority games. They take their origin in the theory of secret sharing. Another important generalization of simple majority games with origin in economics and politics are weighted and roughly weighted majority games. In this paper we characterize roughly weighted hierarchical games identifying where the two approaches coincide. ",ali hameed,,2012.0,,arXiv,Hameed2012,True,,arXiv,Not available,Roughly Weighted Hierarchical Simple Games,69f49e5ad6558a27c6611e449ae4b2b8,http://arxiv.org/abs/1205.2152v1 12737," Hierarchical simple games - both disjunctive and conjunctive - are natural generalizations of simple majority games. They take their origin in the theory of secret sharing. Another important generalization of simple majority games with origin in economics and politics are weighted and roughly weighted majority games. In this paper we characterize roughly weighted hierarchical games identifying where the two approaches coincide. ",arkadii slinko,,2012.0,,arXiv,Hameed2012,True,,arXiv,Not available,Roughly Weighted Hierarchical Simple Games,69f49e5ad6558a27c6611e449ae4b2b8,http://arxiv.org/abs/1205.2152v1 12738," This paper presents the first polynomial-time algorithm for position and matroid auction environments that learns, from samples from an unknown bounded valuation distribution, an auction with expected revenue arbitrarily close to the maximum possible. In contrast to most previous work, our results apply to arbitrary (not necessarily regular) distributions and the strongest possible benchmark, the Myerson-optimal auction. Learning a near-optimal auction for an irregular distribution is technically challenging because it requires learning the appropriate ""ironed intervals,"" a delicate global property of the distribution. ",tim roughgarden,,2015.0,,arXiv,Roughgarden2015,True,,arXiv,Not available,Ironing in the Dark,681890da5a497a03bb3076622b9c42eb,http://arxiv.org/abs/1511.06918v1 12739," This paper presents the first polynomial-time algorithm for position and matroid auction environments that learns, from samples from an unknown bounded valuation distribution, an auction with expected revenue arbitrarily close to the maximum possible. In contrast to most previous work, our results apply to arbitrary (not necessarily regular) distributions and the strongest possible benchmark, the Myerson-optimal auction. Learning a near-optimal auction for an irregular distribution is technically challenging because it requires learning the appropriate ""ironed intervals,"" a delicate global property of the distribution. ",okke schrijvers,,2015.0,,arXiv,Roughgarden2015,True,,arXiv,Not available,Ironing in the Dark,681890da5a497a03bb3076622b9c42eb,http://arxiv.org/abs/1511.06918v1 12740," Consider the problem of allocating goods to buyers through an auction. An auction is efficient if the resulting allocation maximizes total welfare, conditional on the information available. If buyers have private values, the Vickrey-Groves-Clarke mechanism is efficient. If buyers have common values and a buyer's information can be summarized as a one-dimensional signal, Dasgupta and Maskin present an efficient auction. We construct an efficient auction mechanism in case buyer information is multidimensional, for a restricted class of valuation functions, and we prove which of the assumptions made are necessary for the existence of an efficient mechanism. ",andrei ciupan,,2018.0,,arXiv,Ciupan2018,True,,arXiv,Not available,Efficient Auctions With Common Values,bfcb250d2a768f4e13c9f3223858143f,http://arxiv.org/abs/1805.08568v1 12741," We solve the game of Babylon when played with chips of two colors, giving a winning strategy for the second player in all previously unsolved cases. ",peter winkler,,2011.0,,arXiv,Georgakopoulos2011,True,,arXiv,Not available,Two-Color Babylon,6873b698e85aec74101d8ff8f73b5389,http://arxiv.org/abs/1111.4189v1 12742," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",christoph lange,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12743," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",marco caminati,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12744," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",manfred kerber,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12745," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",till mossakowski,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12746," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",colin rowat,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12747," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",makarius wenzel,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12748," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",wolfgang windsteiger,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 12749," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 12750," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 12751," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 12752," In evolutionary game theory, evolutionarily stable states are characterised by the folk theorem because exact solutions to the replicator equation are difficult to obtain. It is generally assumed that the folk theorem, which is the fundamental theory for non-cooperative games, defines all Nash equilibria in infinitely repeated games. Here, we prove that Nash equilibria that are not characterised by the folk theorem do exist. By adopting specific reactive strategies, a group of players can be better off by coordinating their actions in repeated games. We call it a type-k equilibrium when a group of k players coordinate their actions and they have no incentive to deviate from their strategies simultaneously. The existence and stability of the type-k equilibrium in general games is discussed. This study shows that the sets of Nash equilibria and evolutionarily stable states have greater cardinality than classic game theory has predicted in many repeated games. ",jiawei li,,2014.0,10.1371/journal.pone.0136032,arXiv,Li2014,True,,arXiv,Not available,"On Nash Equilibrium and Evolutionarily Stable States that Are Not Characterised by the Folk Theorem",5ad41e90f91ca6b88ae10ee96db53770,http://arxiv.org/abs/1412.6077v3 12753," This paper studies an environment of simultaneous, separate, first-price auctions for complementary goods. Agents observe private values of each good before making bids, and the complementarity between goods is explicitly incorporated in their utility. For simplicity, a model is presented with two first-price auctions and two bidders. We show that a monotone pure-strategy Bayesian Nash Equilibrium exists in the environment. ",wiroy shin,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Simultaneous auctions for complementary goods,878b4680f06c7892ffefd2adfbc511d7,http://arxiv.org/abs/1312.2641v1 12754," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",shaddin dughmi,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 12755," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",li han,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 12756," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",noam nisan,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 12757," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",david kempe,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 12758," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",mahyar salek,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 12759," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",cristopher moore,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 12760," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",marc abeille,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 12761," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",clement calauzenes,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 12762," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",noureddine karoui,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 12763," In evolutionary game theory, evolutionarily stable states are characterised by the folk theorem because exact solutions to the replicator equation are difficult to obtain. It is generally assumed that the folk theorem, which is the fundamental theory for non-cooperative games, defines all Nash equilibria in infinitely repeated games. Here, we prove that Nash equilibria that are not characterised by the folk theorem do exist. By adopting specific reactive strategies, a group of players can be better off by coordinating their actions in repeated games. We call it a type-k equilibrium when a group of k players coordinate their actions and they have no incentive to deviate from their strategies simultaneously. The existence and stability of the type-k equilibrium in general games is discussed. This study shows that the sets of Nash equilibria and evolutionarily stable states have greater cardinality than classic game theory has predicted in many repeated games. ",graham kendall,,2014.0,10.1371/journal.pone.0136032,arXiv,Li2014,True,,arXiv,Not available,"On Nash Equilibrium and Evolutionarily Stable States that Are Not Characterised by the Folk Theorem",5ad41e90f91ca6b88ae10ee96db53770,http://arxiv.org/abs/1412.6077v3 12764," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",thomas nedelec,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 12765," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",vianney perchet,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 12766," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",christopher wilkens,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 12767," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",ruggiero cavallo,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 12768," Nearly fifteen years ago, Google unveiled the generalized second price (GSP) auction. By all theoretical accounts including their own [Varian 14], this was the wrong auction --- the Vickrey-Clarke-Groves (VCG) auction would have been the proper choice --- yet GSP has succeeded spectacularly. We give a deep justification for GSP's success: advertisers' preferences map to a model we call value maximization, they do not maximize profit as the standard theory would believe. For value maximizers, GSP is the truthful auction [Aggarwal 09]. Moreover, this implies an axiomatization of GSP --- it is an auction whose prices are truthful for value maximizers --- that can be applied much more broadly than the simple model for which GSP was originally designed. In particular, applying it to arbitrary single-parameter domains recovers the folklore definition of GSP. Through the lens of value maximization, GSP metamorphosizes into a powerful auction, sound in its principles and elegant in its simplicity. ",rad niazadeh,,2017.0,,arXiv,Wilkens2017,True,,arXiv,Not available,GSP - The Cinderella of Mechanism Design,37f1d9869fed0190838d780e4a393699,http://arxiv.org/abs/1701.05946v1 12769," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",kay-yut chen,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 12770," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",tad hogg,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 12771," We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equilibrium) no longer hold. Nevertheless, we can use the framework to provide psychologically appealing explanations of observed behavior in well-studied games (such as finitely repeated prisoner's dilemma and rock-paper-scissors). Furthermore, we provide natural conditions on games sufficient to guarantee that equilibria exist. ",joseph halpern,,2014.0,,arXiv,Halpern2014,True,,arXiv,Not available,Algorithmic Rationality: Game Theory with Costly Computation,f78f3488629fb65771c552cf314e61b4,http://arxiv.org/abs/1412.2993v1 12772," We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equilibrium) no longer hold. Nevertheless, we can use the framework to provide psychologically appealing explanations of observed behavior in well-studied games (such as finitely repeated prisoner's dilemma and rock-paper-scissors). Furthermore, we provide natural conditions on games sufficient to guarantee that equilibria exist. ",rafael pass,,2014.0,,arXiv,Halpern2014,True,,arXiv,Not available,Algorithmic Rationality: Game Theory with Costly Computation,f78f3488629fb65771c552cf314e61b4,http://arxiv.org/abs/1412.2993v1 12773," Just as war is sometimes fallaciously represented as a zero sum game -- when in fact war is a negative sum game - stock market trading, a positive sum game over time, is often erroneously represented as a zero sum game. This is called the ""zero sum fallacy"" -- the erroneous belief that one trader in a stock market exchange can only improve their position provided some other trader's position deteriorates. However, a positive sum game in absolute terms can be recast as a zero sum game in relative terms. Similarly it appears that negative sum games in absolute terms have been recast as zero sum games in relative terms: otherwise, why would zero sum games be used to represent situations of war? Such recasting may have heuristic or pedagogic interest but recasting must be clearly explicited or risks generating confusion. Keywords: Game theory, stock trading and agent based AI. ",eric engle,,2008.0,,arXiv,Engle2008,True,,arXiv,Not available,The Stock Market as a Game: An Agent Based Approach to Trading in Stocks,bd26d34baeca5ee35c42a8e6845aef2e,http://arxiv.org/abs/0809.0448v1 12774," Evolutionary game theory is a powerful framework for studying evolution in populations of interacting individuals. A common assumption in evolutionary game theory is that interactions are symmetric, which means that the players are distinguished by only their strategies. In nature, however, the microscopic interactions between players are nearly always asymmetric due to environmental effects, differing baseline characteristics, and other possible sources of heterogeneity. To model these phenomena, we introduce into evolutionary game theory two broad classes of asymmetric interactions: ecological and genotypic. Ecological asymmetry results from variation in the environments of the players, while genotypic asymmetry is a consequence of the players having differing baseline genotypes. We develop a theory of these forms of asymmetry for games in structured populations and use the classical social dilemmas, the Prisoner's Dilemma and the Snowdrift Game, for illustrations. Interestingly, asymmetric games reveal essential differences between models of genetic evolution based on reproduction and models of cultural evolution based on imitation that are not apparent in symmetric games. ",alex mcavoy,,2015.0,10.1371/journal.pcbi.1004349,"PLoS Computational Biology vol. 11 no. 8, e1004349 (2015)",McAvoy2015,True,,arXiv,Not available,Asymmetric evolutionary games,35130fbf7e9c4edeaa8898a64e2d66ca,http://arxiv.org/abs/1506.07472v1 12775," Mean-payoff games are important quantitative models for open reactive systems. They have been widely studied as games of full observation. In this paper we investigate the algorithmic properties of several sub-classes of mean-payoff games where the players have asymmetric information about the state of the game. These games are in general undecidable and not determined according to the classical definition. We show that such games are determined under a more general notion of winning strategy. We also consider mean-payoff games where the winner can be determined by the winner of a finite cycle-forming game. This yields several decidable classes of mean-payoff games of asymmetric information that require only finite-memory strategies, including a generalization of full-observation games where positional strategies are sufficient. We give an exponential time algorithm for determining the winner of the latter. ",paul hunter,,2013.0,,arXiv,Hunter2013,True,,arXiv,Not available,Mean-payoff Games with Partial Observation,7775f5c96701b5f4021aec7c4abd1c2d,http://arxiv.org/abs/1309.5462v6 12776," Mean-payoff games are important quantitative models for open reactive systems. They have been widely studied as games of full observation. In this paper we investigate the algorithmic properties of several sub-classes of mean-payoff games where the players have asymmetric information about the state of the game. These games are in general undecidable and not determined according to the classical definition. We show that such games are determined under a more general notion of winning strategy. We also consider mean-payoff games where the winner can be determined by the winner of a finite cycle-forming game. This yields several decidable classes of mean-payoff games of asymmetric information that require only finite-memory strategies, including a generalization of full-observation games where positional strategies are sufficient. We give an exponential time algorithm for determining the winner of the latter. ",arno pauly,,2013.0,,arXiv,Hunter2013,True,,arXiv,Not available,Mean-payoff Games with Partial Observation,7775f5c96701b5f4021aec7c4abd1c2d,http://arxiv.org/abs/1309.5462v6 12777," Mean-payoff games are important quantitative models for open reactive systems. They have been widely studied as games of full observation. In this paper we investigate the algorithmic properties of several sub-classes of mean-payoff games where the players have asymmetric information about the state of the game. These games are in general undecidable and not determined according to the classical definition. We show that such games are determined under a more general notion of winning strategy. We also consider mean-payoff games where the winner can be determined by the winner of a finite cycle-forming game. This yields several decidable classes of mean-payoff games of asymmetric information that require only finite-memory strategies, including a generalization of full-observation games where positional strategies are sufficient. We give an exponential time algorithm for determining the winner of the latter. ",guillermo perez,,2013.0,,arXiv,Hunter2013,True,,arXiv,Not available,Mean-payoff Games with Partial Observation,7775f5c96701b5f4021aec7c4abd1c2d,http://arxiv.org/abs/1309.5462v6 12778," Mean-payoff games are important quantitative models for open reactive systems. They have been widely studied as games of full observation. In this paper we investigate the algorithmic properties of several sub-classes of mean-payoff games where the players have asymmetric information about the state of the game. These games are in general undecidable and not determined according to the classical definition. We show that such games are determined under a more general notion of winning strategy. We also consider mean-payoff games where the winner can be determined by the winner of a finite cycle-forming game. This yields several decidable classes of mean-payoff games of asymmetric information that require only finite-memory strategies, including a generalization of full-observation games where positional strategies are sufficient. We give an exponential time algorithm for determining the winner of the latter. ",jean-francois raskin,,2013.0,,arXiv,Hunter2013,True,,arXiv,Not available,Mean-payoff Games with Partial Observation,7775f5c96701b5f4021aec7c4abd1c2d,http://arxiv.org/abs/1309.5462v6 12779," The use of game theoretic models has been quite successful in describing various cooperative and non-cooperative optimization problems in networks and other domains of computer systems. In this paper, we study an application of game theoretic models in the domain of distributed system, where nodes play a game to balance the total processing loads among themselves. We have used congestion gaming model, a model of game theory where many agents compete for allocating resources, and studied the existence of Nash Equilibrium for such types of games. As the classical congestion game is known to be PLS-Complete, we use an approximation, called the \epsilon-Congestion game, which converges to \epsilon-Nash equilibrium within finite number of steps under selected conditions. Our focus is to define the load balancing problem using the model of \epsilon-congestion games, and finally provide a greedy algorithm for load balancing in distributed systems. We have simulated our proposed system to show the effect of \epsilon-congestion game, and the distribution of load at equilibrium state. ",sandip chakraborty,,2013.0,,arXiv,Chakraborty2013,True,,arXiv,Not available,"Approximate Congestion Games for Load Balancing in Distributed Environment",981816ced532570b6debf0befdeb5e95,http://arxiv.org/abs/1305.3354v1 12780," The use of game theoretic models has been quite successful in describing various cooperative and non-cooperative optimization problems in networks and other domains of computer systems. In this paper, we study an application of game theoretic models in the domain of distributed system, where nodes play a game to balance the total processing loads among themselves. We have used congestion gaming model, a model of game theory where many agents compete for allocating resources, and studied the existence of Nash Equilibrium for such types of games. As the classical congestion game is known to be PLS-Complete, we use an approximation, called the \epsilon-Congestion game, which converges to \epsilon-Nash equilibrium within finite number of steps under selected conditions. Our focus is to define the load balancing problem using the model of \epsilon-congestion games, and finally provide a greedy algorithm for load balancing in distributed systems. We have simulated our proposed system to show the effect of \epsilon-congestion game, and the distribution of load at equilibrium state. ",soumyadip majumder,,2013.0,,arXiv,Chakraborty2013,True,,arXiv,Not available,"Approximate Congestion Games for Load Balancing in Distributed Environment",981816ced532570b6debf0befdeb5e95,http://arxiv.org/abs/1305.3354v1 12781," The use of game theoretic models has been quite successful in describing various cooperative and non-cooperative optimization problems in networks and other domains of computer systems. In this paper, we study an application of game theoretic models in the domain of distributed system, where nodes play a game to balance the total processing loads among themselves. We have used congestion gaming model, a model of game theory where many agents compete for allocating resources, and studied the existence of Nash Equilibrium for such types of games. As the classical congestion game is known to be PLS-Complete, we use an approximation, called the \epsilon-Congestion game, which converges to \epsilon-Nash equilibrium within finite number of steps under selected conditions. Our focus is to define the load balancing problem using the model of \epsilon-congestion games, and finally provide a greedy algorithm for load balancing in distributed systems. We have simulated our proposed system to show the effect of \epsilon-congestion game, and the distribution of load at equilibrium state. ",diganta goswami,,2013.0,,arXiv,Chakraborty2013,True,,arXiv,Not available,"Approximate Congestion Games for Load Balancing in Distributed Environment",981816ced532570b6debf0befdeb5e95,http://arxiv.org/abs/1305.3354v1 12782," In the game theory literature, there appears to be little research on equilibrium selection for normal-form games with an infinite strategy space and discontinuous utility functions. Moreover, many existing selection methods are not applicable to games involving both cooperative and noncooperative scenarios (e.g., ""games on signed graphs""). With the purpose of equilibrium selection, the power allocation game developed in \cite{allocation}, which is a static, resource allocation game on signed graphs, will be reformulated into an extensive form. Results about the subgame perfect Nash equilibria in the extensive-form game will be given. This appears to be the first time that subgame perfection based on time-varying graphs is used for equilibrium selection in network games. This idea of subgame perfection proposed in the paper may be extrapolated to other network games, which will be illustrated with a simple example of congestion games. ",yuke li,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,The Power Allocation Game on Dynamic Networks: Subgame Perfection,426e7f32e8ec461b985d2e83bba7c38c,http://arxiv.org/abs/1802.00908v2 12783," In the game theory literature, there appears to be little research on equilibrium selection for normal-form games with an infinite strategy space and discontinuous utility functions. Moreover, many existing selection methods are not applicable to games involving both cooperative and noncooperative scenarios (e.g., ""games on signed graphs""). With the purpose of equilibrium selection, the power allocation game developed in \cite{allocation}, which is a static, resource allocation game on signed graphs, will be reformulated into an extensive form. Results about the subgame perfect Nash equilibria in the extensive-form game will be given. This appears to be the first time that subgame perfection based on time-varying graphs is used for equilibrium selection in network games. This idea of subgame perfection proposed in the paper may be extrapolated to other network games, which will be illustrated with a simple example of congestion games. ",a. morse,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,The Power Allocation Game on Dynamic Networks: Subgame Perfection,426e7f32e8ec461b985d2e83bba7c38c,http://arxiv.org/abs/1802.00908v2 12784," This paper provides theoretical bounds for empirical game theoretical analysis of complex multi-agent interactions. We provide insights in the empirical meta game showing that a Nash equilibrium of the meta-game is an approximate Nash equilibrium of the true underlying game. We investigate and show how many data samples are required to obtain a close enough approximation of the underlying game. Additionally, we extend the meta-game analysis methodology to asymmetric games. The state-of-the-art has only considered empirical games in which agents have access to the same strategy sets and the payoff structure is symmetric, implying that agents are interchangeable. Finally, we carry out an empirical illustration of the generalised method in several domains, illustrating the theory and evolutionary dynamics of several versions of the AlphaGo algorithm (symmetric), the dynamics of the Colonel Blotto game played by human players on Facebook (symmetric), and an example of a meta-game in Leduc Poker (asymmetric), generated by the PSRO multi-agent learning algorithm. ",karl tuyls,,2018.0,,arXiv,Tuyls2018,True,,arXiv,Not available,A Generalised Method for Empirical Game Theoretic Analysis,95d6810b12ebf390f68f1284dfc7c4dc,http://arxiv.org/abs/1803.06376v1 12785," We show that computing the revenue-optimal deterministic auction in unit-demand single-buyer Bayesian settings, i.e. the optimal item-pricing, is computationally hard even in single-item settings where the buyer's value distribution is a sum of independently distributed attributes, or multi-item settings where the buyer's values for the items are independent. We also show that it is intractable to optimally price the grand bundle of multiple items for an additive bidder whose values for the items are independent. These difficulties stem from implicit definitions of a value distribution. We provide three instances of how different properties of implicit distributions can lead to intractability: the first is a #P-hardness proof, while the remaining two are reductions from the SQRT-SUM problem of Garey, Graham, and Johnson. While simple pricing schemes can oftentimes approximate the best scheme in revenue, they can have drastically different underlying structure. We argue therefore that either the specification of the input distribution must be highly restricted in format, or it is necessary for the goal to be mere approximation to the optimal scheme's revenue instead of computing properties of the scheme itself. ",christos tzamos,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,Optimal Pricing is Hard,b3516571612190603079393cfb9437e1,http://arxiv.org/abs/1503.02516v1 12786," Evolutionary game theory is a powerful framework for studying evolution in populations of interacting individuals. A common assumption in evolutionary game theory is that interactions are symmetric, which means that the players are distinguished by only their strategies. In nature, however, the microscopic interactions between players are nearly always asymmetric due to environmental effects, differing baseline characteristics, and other possible sources of heterogeneity. To model these phenomena, we introduce into evolutionary game theory two broad classes of asymmetric interactions: ecological and genotypic. Ecological asymmetry results from variation in the environments of the players, while genotypic asymmetry is a consequence of the players having differing baseline genotypes. We develop a theory of these forms of asymmetry for games in structured populations and use the classical social dilemmas, the Prisoner's Dilemma and the Snowdrift Game, for illustrations. Interestingly, asymmetric games reveal essential differences between models of genetic evolution based on reproduction and models of cultural evolution based on imitation that are not apparent in symmetric games. ",christoph hauert,,2015.0,10.1371/journal.pcbi.1004349,"PLoS Computational Biology vol. 11 no. 8, e1004349 (2015)",McAvoy2015,True,,arXiv,Not available,Asymmetric evolutionary games,35130fbf7e9c4edeaa8898a64e2d66ca,http://arxiv.org/abs/1506.07472v1 12787," This paper provides theoretical bounds for empirical game theoretical analysis of complex multi-agent interactions. We provide insights in the empirical meta game showing that a Nash equilibrium of the meta-game is an approximate Nash equilibrium of the true underlying game. We investigate and show how many data samples are required to obtain a close enough approximation of the underlying game. Additionally, we extend the meta-game analysis methodology to asymmetric games. The state-of-the-art has only considered empirical games in which agents have access to the same strategy sets and the payoff structure is symmetric, implying that agents are interchangeable. Finally, we carry out an empirical illustration of the generalised method in several domains, illustrating the theory and evolutionary dynamics of several versions of the AlphaGo algorithm (symmetric), the dynamics of the Colonel Blotto game played by human players on Facebook (symmetric), and an example of a meta-game in Leduc Poker (asymmetric), generated by the PSRO multi-agent learning algorithm. ",julien perolat,,2018.0,,arXiv,Tuyls2018,True,,arXiv,Not available,A Generalised Method for Empirical Game Theoretic Analysis,95d6810b12ebf390f68f1284dfc7c4dc,http://arxiv.org/abs/1803.06376v1 12788," This paper provides theoretical bounds for empirical game theoretical analysis of complex multi-agent interactions. We provide insights in the empirical meta game showing that a Nash equilibrium of the meta-game is an approximate Nash equilibrium of the true underlying game. We investigate and show how many data samples are required to obtain a close enough approximation of the underlying game. Additionally, we extend the meta-game analysis methodology to asymmetric games. The state-of-the-art has only considered empirical games in which agents have access to the same strategy sets and the payoff structure is symmetric, implying that agents are interchangeable. Finally, we carry out an empirical illustration of the generalised method in several domains, illustrating the theory and evolutionary dynamics of several versions of the AlphaGo algorithm (symmetric), the dynamics of the Colonel Blotto game played by human players on Facebook (symmetric), and an example of a meta-game in Leduc Poker (asymmetric), generated by the PSRO multi-agent learning algorithm. ",marc lanctot,,2018.0,,arXiv,Tuyls2018,True,,arXiv,Not available,A Generalised Method for Empirical Game Theoretic Analysis,95d6810b12ebf390f68f1284dfc7c4dc,http://arxiv.org/abs/1803.06376v1 12789," This paper provides theoretical bounds for empirical game theoretical analysis of complex multi-agent interactions. We provide insights in the empirical meta game showing that a Nash equilibrium of the meta-game is an approximate Nash equilibrium of the true underlying game. We investigate and show how many data samples are required to obtain a close enough approximation of the underlying game. Additionally, we extend the meta-game analysis methodology to asymmetric games. The state-of-the-art has only considered empirical games in which agents have access to the same strategy sets and the payoff structure is symmetric, implying that agents are interchangeable. Finally, we carry out an empirical illustration of the generalised method in several domains, illustrating the theory and evolutionary dynamics of several versions of the AlphaGo algorithm (symmetric), the dynamics of the Colonel Blotto game played by human players on Facebook (symmetric), and an example of a meta-game in Leduc Poker (asymmetric), generated by the PSRO multi-agent learning algorithm. ",joel leibo,,2018.0,,arXiv,Tuyls2018,True,,arXiv,Not available,A Generalised Method for Empirical Game Theoretic Analysis,95d6810b12ebf390f68f1284dfc7c4dc,http://arxiv.org/abs/1803.06376v1 12790," This paper provides theoretical bounds for empirical game theoretical analysis of complex multi-agent interactions. We provide insights in the empirical meta game showing that a Nash equilibrium of the meta-game is an approximate Nash equilibrium of the true underlying game. We investigate and show how many data samples are required to obtain a close enough approximation of the underlying game. Additionally, we extend the meta-game analysis methodology to asymmetric games. The state-of-the-art has only considered empirical games in which agents have access to the same strategy sets and the payoff structure is symmetric, implying that agents are interchangeable. Finally, we carry out an empirical illustration of the generalised method in several domains, illustrating the theory and evolutionary dynamics of several versions of the AlphaGo algorithm (symmetric), the dynamics of the Colonel Blotto game played by human players on Facebook (symmetric), and an example of a meta-game in Leduc Poker (asymmetric), generated by the PSRO multi-agent learning algorithm. ",thore graepel,,2018.0,,arXiv,Tuyls2018,True,,arXiv,Not available,A Generalised Method for Empirical Game Theoretic Analysis,95d6810b12ebf390f68f1284dfc7c4dc,http://arxiv.org/abs/1803.06376v1 12791," We present a consistent formulation of quantum game theory that accommodates all possible strategies in Hilbert space. The physical content of the quantum strategy is revealed as a family of classical games representing altruistic game play supplemented by quantum interferences. Crucial role of the entanglement in quantum strategy is illustrated by an example of quantum game representing the Bell's experiment. ",taksu cheon,,2006.0,10.1063/1.2400897,arXiv,Cheon2006,True,,arXiv,Not available,Game Theory Formulated on Hilbert Space,2346a6aa38664049b20ca5da97c759b5,http://arxiv.org/abs/quant-ph/0605134v1 12792," We investigate a two-player zero-sum stochastic differential game in which one of the players has more information on the game than his opponent. We show how to construct numerical schemes for the value function of this game, which is given by the solution of a quasilinear partial differential equation with obstacle. ",christine grun,,2011.0,,arXiv,Grün2011,True,,arXiv,Not available,"A probabilistic-numerical approximation for an obstacle problem arising in game theory",236bff89f6459ff1309385bc7f9cee63,http://arxiv.org/abs/1111.4136v1 12793," Two-player zero-sum repeated games are well understood. Computing the value of such a game is straightforward. Additionally, if the payoffs are dependent on a random state of the game known to one, both, or neither of the players, the resulting value of the game has been analyzed under the framework of Bayesian games. This investigation considers the optimal performance in a game when a helper is transmitting state information to one of the players. Encoding information for an adversarial setting (game) requires a different result than rate-distortion theory provides. Game theory has accentuated the importance of randomization (mixed strategy), which does not find a significant role in most communication modems and source coding codecs. Higher rates of communication, used in the right way, allow the message to include the necessary random component useful in games. ",paul cuff,,2009.0,,arXiv,Cuff2009,True,,arXiv,Not available,State Information in Bayesian Games,5308843227fd255ecb3176f388e0cf26,http://arxiv.org/abs/0911.0874v1 12794," This is an introduction into John Conway's beautiful Combinatorial Game Theory, providing precise statements and detailed proofs for the fundamental parts of his theory. (1) Combinatorial game theory, (2) the GROUP of games, (3) the FIELD of numbers, (4) ordinal numbers, (5) games and numbers, (6) infinitesimal games, (7) impartial games. ",dierk schleicher,,2004.0,,"Moscow Math Journal 6 2 (2006), 359-388",Schleicher2004,True,,arXiv,Not available,An Introduction to Conway's Games and Numbers,7c7b0758343f1e1db65709658e353a50,http://arxiv.org/abs/math/0410026v2 12795," This is an introduction into John Conway's beautiful Combinatorial Game Theory, providing precise statements and detailed proofs for the fundamental parts of his theory. (1) Combinatorial game theory, (2) the GROUP of games, (3) the FIELD of numbers, (4) ordinal numbers, (5) games and numbers, (6) infinitesimal games, (7) impartial games. ",michael stoll,,2004.0,,"Moscow Math Journal 6 2 (2006), 359-388",Schleicher2004,True,,arXiv,Not available,An Introduction to Conway's Games and Numbers,7c7b0758343f1e1db65709658e353a50,http://arxiv.org/abs/math/0410026v2 12796," This paper is concerned with a non-zero sum differential game problem of an anticipated forward-backward stochastic differential delayed equation under partial information. We establish a necessary maximum principle and sufficient verification theorem of the game system by virtue of the duality and convex variational method. We apply the theoretical results and stochastic filtering theory to study a linear-quadratic game system and derive the explicit form of the Nash equilibrium point and discuss the existence and uniqueness in particular cases. As an application, we consider a time-delayed pension fund manage problem with nonlinear expectation and obtain the Nash equilibrium point. ",yi zhuang,,2017.0,,arXiv,Zhuang2017,True,,arXiv,Not available,"Non-zero sum differential games of forward-backward stochastic differential delayed equations under partial information and application",f83d558a0da444d5905e5577c9bb22d7,http://arxiv.org/abs/1702.04883v1 12797," The paper is devoted to game-theoretic methods for community detection in networks. The traditional methods for detecting community structure are based on selecting denser subgraphs inside the network. Here we propose to use the methods of cooperative game theory that highlight not only the link density but also the mechanisms of cluster formation. Specifically, we suggest two approaches from cooperative game theory: the first approach is based on the Myerson value, whereas the second approach is based on hedonic games. Both approaches allow to detect clusters with various resolution. However, the tuning of the resolution parameter in the hedonic games approach is particularly intuitive. Furthermore, the modularity based approach and its generalizations can be viewed as particular cases of the hedonic games. ",konstantin avrachenkov,,2017.0,10.1086/jar.33.4.3629752,arXiv,Avrachenkov2017,True,,arXiv,Not available,Cooperative Game Theory Approaches for Network Partitioning,f6827d714d98d944b6f0809ce3f3c62b,http://arxiv.org/abs/1707.03587v2 12798," In this paper, we study the notion of admissibility for randomised strategies in concurrent games. Intuitively, an admissible strategy is one where the player plays `as well as possible', because there is no other strategy that dominates it, i.e., that wins (almost surely) against a super set of adversarial strategies. We prove that admissible strategies always exist in concurrent games, and we characterise them precisely. Then, when the objectives of the players are omega-regular, we show how to perform assume-admissible synthesis, i.e., how to compute admissible strategies that win (almost surely) under the hypothesis that the other players play admissible ",nicolas basset,,2017.0,,arXiv,Basset2017,True,,arXiv,Not available,Admissibility in Concurrent Games,43d573f31a23c238034648a2d402dce0,http://arxiv.org/abs/1702.06439v1 12799," In this paper, we study the notion of admissibility for randomised strategies in concurrent games. Intuitively, an admissible strategy is one where the player plays `as well as possible', because there is no other strategy that dominates it, i.e., that wins (almost surely) against a super set of adversarial strategies. We prove that admissible strategies always exist in concurrent games, and we characterise them precisely. Then, when the objectives of the players are omega-regular, we show how to perform assume-admissible synthesis, i.e., how to compute admissible strategies that win (almost surely) under the hypothesis that the other players play admissible ",gilles geeraerts,,2017.0,,arXiv,Basset2017,True,,arXiv,Not available,Admissibility in Concurrent Games,43d573f31a23c238034648a2d402dce0,http://arxiv.org/abs/1702.06439v1 12800," In this paper, we study the notion of admissibility for randomised strategies in concurrent games. Intuitively, an admissible strategy is one where the player plays `as well as possible', because there is no other strategy that dominates it, i.e., that wins (almost surely) against a super set of adversarial strategies. We prove that admissible strategies always exist in concurrent games, and we characterise them precisely. Then, when the objectives of the players are omega-regular, we show how to perform assume-admissible synthesis, i.e., how to compute admissible strategies that win (almost surely) under the hypothesis that the other players play admissible ",jean-francois raskin,,2017.0,,arXiv,Basset2017,True,,arXiv,Not available,Admissibility in Concurrent Games,43d573f31a23c238034648a2d402dce0,http://arxiv.org/abs/1702.06439v1 12801," In this paper, we study the notion of admissibility for randomised strategies in concurrent games. Intuitively, an admissible strategy is one where the player plays `as well as possible', because there is no other strategy that dominates it, i.e., that wins (almost surely) against a super set of adversarial strategies. We prove that admissible strategies always exist in concurrent games, and we characterise them precisely. Then, when the objectives of the players are omega-regular, we show how to perform assume-admissible synthesis, i.e., how to compute admissible strategies that win (almost surely) under the hypothesis that the other players play admissible ",ocan sankur,,2017.0,,arXiv,Basset2017,True,,arXiv,Not available,Admissibility in Concurrent Games,43d573f31a23c238034648a2d402dce0,http://arxiv.org/abs/1702.06439v1 12802," We consider MultiCriteria Decision Analysis models which are defined over discrete attributes, taking a finite number of values. We do not assume that the model is monotonically increasing with respect to the attributes values. Our aim is to define an importance index for such general models, considering that they are equivalent to $k$-ary games (multichoice games). We show that classical solutions like the Shapley value are not suitable for such models, essentially because of the efficiency axiom which does not make sense in this context. We propose an importance index which is a kind of average variation of the model along the attributes. We give an axiomatic characterization of it. ",mustapha ridaoui,,2017.0,,arXiv,Ridaoui2017,True,,arXiv,Not available,Axiomatization of an importance index for $k$-ary games,c97f95fc113f30d2e2f6bf1bddb87a33,http://arxiv.org/abs/1704.02264v1 12803," We consider MultiCriteria Decision Analysis models which are defined over discrete attributes, taking a finite number of values. We do not assume that the model is monotonically increasing with respect to the attributes values. Our aim is to define an importance index for such general models, considering that they are equivalent to $k$-ary games (multichoice games). We show that classical solutions like the Shapley value are not suitable for such models, essentially because of the efficiency axiom which does not make sense in this context. We propose an importance index which is a kind of average variation of the model along the attributes. We give an axiomatic characterization of it. ",michel grabisch,,2017.0,,arXiv,Ridaoui2017,True,,arXiv,Not available,Axiomatization of an importance index for $k$-ary games,c97f95fc113f30d2e2f6bf1bddb87a33,http://arxiv.org/abs/1704.02264v1 12804," We consider MultiCriteria Decision Analysis models which are defined over discrete attributes, taking a finite number of values. We do not assume that the model is monotonically increasing with respect to the attributes values. Our aim is to define an importance index for such general models, considering that they are equivalent to $k$-ary games (multichoice games). We show that classical solutions like the Shapley value are not suitable for such models, essentially because of the efficiency axiom which does not make sense in this context. We propose an importance index which is a kind of average variation of the model along the attributes. We give an axiomatic characterization of it. ",christophe labreuche,,2017.0,,arXiv,Ridaoui2017,True,,arXiv,Not available,Axiomatization of an importance index for $k$-ary games,c97f95fc113f30d2e2f6bf1bddb87a33,http://arxiv.org/abs/1704.02264v1 12805," Hedonic games are meant to model how coalitions of people form and break apart in the real world. However, it is difficult to run simulations when everything must be done by hand on paper. We present an online software that allows fast and visual simulation of several types of hedonic games. http://lukemiles.org/hedonic-games/ ",luke miles,,2017.0,,arXiv,Miles2017,True,,arXiv,Not available,A Simulator for Hedonic Games,c6fc56a6cd65404f5bb772bc8fd226bc,http://arxiv.org/abs/1706.08501v2 12806," We introduce set packing games as an abstraction of situations in which $n$ selfish players select subsets of a finite set of indivisible items, and analyze the quality of several equilibria for this class of games. Assuming that players are able to approximately play equilibrium strategies, we show that the total quality of the resulting equilibrium solutions is only moderately suboptimal. Our results are tight bounds on the price of anarchy for three equilibrium concepts, namely Nash equilibria, subgame perfect equilibria, and an equilibrium concept that we refer to as $k$-collusion Nash equilibrium. ",jasper jong,,2017.0,,arXiv,Jong2017,True,,arXiv,Not available,The Quality of Equilibria for Set Packing Games,565d232ea7fbaac044ebb94963f1ce35,http://arxiv.org/abs/1709.10289v1 12807," We introduce set packing games as an abstraction of situations in which $n$ selfish players select subsets of a finite set of indivisible items, and analyze the quality of several equilibria for this class of games. Assuming that players are able to approximately play equilibrium strategies, we show that the total quality of the resulting equilibrium solutions is only moderately suboptimal. Our results are tight bounds on the price of anarchy for three equilibrium concepts, namely Nash equilibria, subgame perfect equilibria, and an equilibrium concept that we refer to as $k$-collusion Nash equilibrium. ",marc uetz,,2017.0,,arXiv,Jong2017,True,,arXiv,Not available,The Quality of Equilibria for Set Packing Games,565d232ea7fbaac044ebb94963f1ce35,http://arxiv.org/abs/1709.10289v1 12808," The paper is devoted to game-theoretic methods for community detection in networks. The traditional methods for detecting community structure are based on selecting denser subgraphs inside the network. Here we propose to use the methods of cooperative game theory that highlight not only the link density but also the mechanisms of cluster formation. Specifically, we suggest two approaches from cooperative game theory: the first approach is based on the Myerson value, whereas the second approach is based on hedonic games. Both approaches allow to detect clusters with various resolution. However, the tuning of the resolution parameter in the hedonic games approach is particularly intuitive. Furthermore, the modularity based approach and its generalizations can be viewed as particular cases of the hedonic games. ",aleksei kondratev,,2017.0,10.1086/jar.33.4.3629752,arXiv,Avrachenkov2017,True,,arXiv,Not available,Cooperative Game Theory Approaches for Network Partitioning,f6827d714d98d944b6f0809ce3f3c62b,http://arxiv.org/abs/1707.03587v2 12809," This paper contains a reformulation of any $n$-player finite, static game into a framework of distributed, dynamical system based on agents' payoff-based deviations. The reformulation generalizes the method employed in the second part of the study of countries' relation formation problem in Li and Morse (2017) to the case of any finite, static game. In the paper two deviation rules are provided and possible applications of this framework are discussed. ",yuke li,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,"A Distributed, Dynamical System View of Finite, Static Games",34b01475cc34a6777dfb9f6cf3b67790,http://arxiv.org/abs/1710.06838v1 12810," This paper contains a reformulation of any $n$-player finite, static game into a framework of distributed, dynamical system based on agents' payoff-based deviations. The reformulation generalizes the method employed in the second part of the study of countries' relation formation problem in Li and Morse (2017) to the case of any finite, static game. In the paper two deviation rules are provided and possible applications of this framework are discussed. ",fengjiao liu,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,"A Distributed, Dynamical System View of Finite, Static Games",34b01475cc34a6777dfb9f6cf3b67790,http://arxiv.org/abs/1710.06838v1 12811," This paper contains a reformulation of any $n$-player finite, static game into a framework of distributed, dynamical system based on agents' payoff-based deviations. The reformulation generalizes the method employed in the second part of the study of countries' relation formation problem in Li and Morse (2017) to the case of any finite, static game. In the paper two deviation rules are provided and possible applications of this framework are discussed. ",a. morse,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,"A Distributed, Dynamical System View of Finite, Static Games",34b01475cc34a6777dfb9f6cf3b67790,http://arxiv.org/abs/1710.06838v1 12812," Weighted committee games generalize $n$-player simple voting games to $m\ge 3$ alternatives. The committee's aggregation rule treats votes anonymously but parties, shareholders, members of supranational organizations, etc. differ in their numbers of votes. Infinitely many vote distributions induce only finitely many distinct mappings from preference profiles to winners, i.e., non-equivalent committees. We identify and compare all committees which use Borda, Copeland, plurality or antiplurality rule. Their geometry and differing numbers of equivalence classes - e.g., 51 for Borda vs. 4 for Copeland rule if $n\!=m\!=3$ - have so far escaped notice. They determine voting equilibria, the distribution of power and other aspects of collective choice. ",sascha kurz,,2017.0,,arXiv,Kurz2017,True,,arXiv,Not available,Weighted Committee Games,3b67feb49563fcfccd4520335716d509,http://arxiv.org/abs/1712.03114v1 12813," Weighted committee games generalize $n$-player simple voting games to $m\ge 3$ alternatives. The committee's aggregation rule treats votes anonymously but parties, shareholders, members of supranational organizations, etc. differ in their numbers of votes. Infinitely many vote distributions induce only finitely many distinct mappings from preference profiles to winners, i.e., non-equivalent committees. We identify and compare all committees which use Borda, Copeland, plurality or antiplurality rule. Their geometry and differing numbers of equivalence classes - e.g., 51 for Borda vs. 4 for Copeland rule if $n\!=m\!=3$ - have so far escaped notice. They determine voting equilibria, the distribution of power and other aspects of collective choice. ",alexander mayer,,2017.0,,arXiv,Kurz2017,True,,arXiv,Not available,Weighted Committee Games,3b67feb49563fcfccd4520335716d509,http://arxiv.org/abs/1712.03114v1 12814," Weighted committee games generalize $n$-player simple voting games to $m\ge 3$ alternatives. The committee's aggregation rule treats votes anonymously but parties, shareholders, members of supranational organizations, etc. differ in their numbers of votes. Infinitely many vote distributions induce only finitely many distinct mappings from preference profiles to winners, i.e., non-equivalent committees. We identify and compare all committees which use Borda, Copeland, plurality or antiplurality rule. Their geometry and differing numbers of equivalence classes - e.g., 51 for Borda vs. 4 for Copeland rule if $n\!=m\!=3$ - have so far escaped notice. They determine voting equilibria, the distribution of power and other aspects of collective choice. ",stefan napel,,2017.0,,arXiv,Kurz2017,True,,arXiv,Not available,Weighted Committee Games,3b67feb49563fcfccd4520335716d509,http://arxiv.org/abs/1712.03114v1 12815," We provide a unified variational inequality framework for the study of fundamental properties of the Nash equilibrium in network games. We identify several conditions on the underlying network (in terms of spectral norm, infinity norm and minimum eigenvalue of its adjacency matrix) that guarantee existence, uniqueness, convergence and continuity of equilibrium in general network games with multidimensional and possibly constrained strategy sets. We delineate the relations between these conditions and characterize classes of networks that satisfy each of these conditions. ",francesca parise,,2017.0,,arXiv,Parise2017,True,,arXiv,Not available,"A variational inequality framework for network games: Existence, uniqueness, convergence and sensitivity analysis",32ec199f834698b89c811cf308f76d46,http://arxiv.org/abs/1712.08277v2 12816," We provide a unified variational inequality framework for the study of fundamental properties of the Nash equilibrium in network games. We identify several conditions on the underlying network (in terms of spectral norm, infinity norm and minimum eigenvalue of its adjacency matrix) that guarantee existence, uniqueness, convergence and continuity of equilibrium in general network games with multidimensional and possibly constrained strategy sets. We delineate the relations between these conditions and characterize classes of networks that satisfy each of these conditions. ",asuman ozdaglar,,2017.0,,arXiv,Parise2017,True,,arXiv,Not available,"A variational inequality framework for network games: Existence, uniqueness, convergence and sensitivity analysis",32ec199f834698b89c811cf308f76d46,http://arxiv.org/abs/1712.08277v2 12817," This paper introduces a novel payoff-based learning scheme for distributed optimization in repeatedly-played strategic-form games. Standard reinforcement-based learning exhibits several limitations with respect to their asymptotic stability. For example, in two-player coordination games, payoff-dominant (or efficient) Nash equilibria may not be stochastically stable. In this work, we present an extension of perturbed learning automata, namely aspiration-based perturbed learning automata (APLA) that overcomes these limitations. We provide a stochastic stability analysis of APLA in multi-player coordination games. We further show that payoff-dominant Nash equilibria are the only stochastically stable states. ",georgios chasparis,,2018.0,,arXiv,Chasparis2018,True,,arXiv,Not available,Aspiration-based Perturbed Learning Automata,692f02ba322a75c457d1acab67ba3873,http://arxiv.org/abs/1803.02751v1 12818," In this paper, we consider continuous-time semi-decentralized dynamics for the equilibrium computation in a class of aggregative games. Specifically, we propose a scheme where decentralized projected-gradient dynamics are driven by an integral control law. To prove global exponential convergence of the proposed dynamics to an aggregative equilibrium, we adopt a quadratic Lyapunov function argument. We derive a sufficient condition for global convergence that we position within the recent literature on aggregative games, and in particular we show that it improves on established results. ",claudio persis,,2018.0,,arXiv,Persis2018,True,,arXiv,Not available,"Continuous-time integral dynamics for Aggregative Game equilibrium seeking",b7fc9c586bec001222663b844f5a06cd,http://arxiv.org/abs/1803.10448v1 12819," The paper is devoted to game-theoretic methods for community detection in networks. The traditional methods for detecting community structure are based on selecting denser subgraphs inside the network. Here we propose to use the methods of cooperative game theory that highlight not only the link density but also the mechanisms of cluster formation. Specifically, we suggest two approaches from cooperative game theory: the first approach is based on the Myerson value, whereas the second approach is based on hedonic games. Both approaches allow to detect clusters with various resolution. However, the tuning of the resolution parameter in the hedonic games approach is particularly intuitive. Furthermore, the modularity based approach and its generalizations can be viewed as particular cases of the hedonic games. ",vladimir mazalov,,2017.0,10.1086/jar.33.4.3629752,arXiv,Avrachenkov2017,True,,arXiv,Not available,Cooperative Game Theory Approaches for Network Partitioning,f6827d714d98d944b6f0809ce3f3c62b,http://arxiv.org/abs/1707.03587v2 12820," In this paper, we consider continuous-time semi-decentralized dynamics for the equilibrium computation in a class of aggregative games. Specifically, we propose a scheme where decentralized projected-gradient dynamics are driven by an integral control law. To prove global exponential convergence of the proposed dynamics to an aggregative equilibrium, we adopt a quadratic Lyapunov function argument. We derive a sufficient condition for global convergence that we position within the recent literature on aggregative games, and in particular we show that it improves on established results. ",sergio grammatico,,2018.0,,arXiv,Persis2018,True,,arXiv,Not available,"Continuous-time integral dynamics for Aggregative Game equilibrium seeking",b7fc9c586bec001222663b844f5a06cd,http://arxiv.org/abs/1803.10448v1 12821," In this paper, some new criteria for detecting whether a finite game is potential are proposed by solving potential equations. The verification equations with the minimal number for checking a potential game are obtained for the first time. Some connections between the potential equations and the existing characterizations of potential games are established. It is revealed that a finite game is potential if and only if its every bi-matrix sub-game is potential. ",xinyun liu,,2015.0,,arXiv,Liu2015,True,,arXiv,Not available,On Potential Equations of Finite Games,14ac282d465af47fbdb459a61904a439,http://arxiv.org/abs/1504.07342v1 12822," In this paper, some new criteria for detecting whether a finite game is potential are proposed by solving potential equations. The verification equations with the minimal number for checking a potential game are obtained for the first time. Some connections between the potential equations and the existing characterizations of potential games are established. It is revealed that a finite game is potential if and only if its every bi-matrix sub-game is potential. ",jiandong zhu,,2015.0,,arXiv,Liu2015,True,,arXiv,Not available,On Potential Equations of Finite Games,14ac282d465af47fbdb459a61904a439,http://arxiv.org/abs/1504.07342v1 12823," We consider some well-known families of two-player, zero-sum, perfect information games that can be viewed as special cases of Shapley's stochastic games. We show that the following tasks are polynomial time equivalent: - Solving simple stochastic games. - Solving stochastic mean-payoff games with rewards and probabilities given in unary. - Solving stochastic mean-payoff games with rewards and probabilities given in binary. ",vladimir gurvich,,2008.0,,arXiv,Gurvich2008,True,,arXiv,Not available,On the computational complexity of solving stochastic mean-payoff games,bd67a71f26c2168e2fa6e1d9a9b97f8b,http://arxiv.org/abs/0812.0486v1 12824," We consider some well-known families of two-player, zero-sum, perfect information games that can be viewed as special cases of Shapley's stochastic games. We show that the following tasks are polynomial time equivalent: - Solving simple stochastic games. - Solving stochastic mean-payoff games with rewards and probabilities given in unary. - Solving stochastic mean-payoff games with rewards and probabilities given in binary. ",peter miltersen,,2008.0,,arXiv,Gurvich2008,True,,arXiv,Not available,On the computational complexity of solving stochastic mean-payoff games,bd67a71f26c2168e2fa6e1d9a9b97f8b,http://arxiv.org/abs/0812.0486v1 12825," We provide several tests to determine whether a game is a potential game or whether it is a zero-sum equivalent game---a game which is strategically equivalent to a zero-sum game in the same way that a potential game is strategically equivalent to a common interest game. We present a unified framework applicable for both potential and zero-sum equivalent games by deriving a simple but useful characterization of these games. This allows us to re-derive known criteria for potential games, as well as obtain several new criteria. In particular, we prove (1) new integral tests for potential games and for zero-sum equivalent games, (2) a new derivative test for zero-sum equivalent games, and (3) a new representation characterization for zero-sum equivalent games. ",sung-ha hwang,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,Simple Characterizations of Potential Games and Zero-sum Games,607e3704508fe1114d05a948c98bc898,http://arxiv.org/abs/1602.04410v1 12826," We provide several tests to determine whether a game is a potential game or whether it is a zero-sum equivalent game---a game which is strategically equivalent to a zero-sum game in the same way that a potential game is strategically equivalent to a common interest game. We present a unified framework applicable for both potential and zero-sum equivalent games by deriving a simple but useful characterization of these games. This allows us to re-derive known criteria for potential games, as well as obtain several new criteria. In particular, we prove (1) new integral tests for potential games and for zero-sum equivalent games, (2) a new derivative test for zero-sum equivalent games, and (3) a new representation characterization for zero-sum equivalent games. ",luc rey-bellet,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,Simple Characterizations of Potential Games and Zero-sum Games,607e3704508fe1114d05a948c98bc898,http://arxiv.org/abs/1602.04410v1 12827," We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems. ",kyle burke,,2007.0,,arXiv,Burke2007,True,,arXiv,Not available,Games on the Sperner Triangle,581fb77ba83bdd38efe248e1cc1a347b,http://arxiv.org/abs/cs/0702153v1 12828," We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems. ",shang-hua teng,,2007.0,,arXiv,Burke2007,True,,arXiv,Not available,Games on the Sperner Triangle,581fb77ba83bdd38efe248e1cc1a347b,http://arxiv.org/abs/cs/0702153v1 12829," Game tree search algorithms such as minimax have been used with enormous success in turn-based adversarial games such as Chess or Checkers. However, such algorithms cannot be directly applied to real-time strategy (RTS) games because a number of reasons. For example, minimax assumes a turn-taking game mechanics, not present in RTS games. In this paper we present RTMM, a real-time variant of the standard minimax algorithm, and discuss its applicability in the context of RTS games. We discuss its strengths and weaknesses, and evaluate it in two real-time games. ",santiago ontanon,,2012.0,,arXiv,Ontanon2012,True,,arXiv,Not available,Experiments with Game Tree Search in Real-Time Strategy Games,8f42804b7b4be821b6c23f1259408c1e,http://arxiv.org/abs/1208.1940v1 12830," The goal of the paper is to introduce a set of problems which we call mean field games of timing. We motivate the formulation by a dynamic model of bank run in a continuous-time setting. We briefly review the economic and game theoretic contributions at the root of our effort, and we develop a mathematical theory for continuous-time stochastic games where the strategic decisions of the players are merely choices of times at which they leave the game, and the interaction between the strategic players is of a mean field nature. ",rene carmona,,2016.0,,arXiv,Carmona2016,True,,arXiv,Not available,Mean field games of timing and models for bank runs,5439d47ad05d8685def7704359d7629b,http://arxiv.org/abs/1606.03709v3 12831," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",daniel neider,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 12832," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",roman rabinovich,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 12833," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",martin zimmermann,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 12834," We study two-player zero-sum games over infinite-state graphs with boundedness conditions. Our first contribution is about the strategy complexity, i.e the memory required for winning strategies: we prove that over general infinite-state graphs, memoryless strategies are sufficient for finitary B\""uchi games, and finite-memory suffices for finitary parity games. We then study pushdown boundedness games, with two contributions. First we prove a collapse result for pushdown omega B games, implying the decidability of solving these games. Second we consider pushdown games with finitary parity along with stack boundedness conditions, and show that solving these games is EXPTIME-complete. ",krishnendu chatterjee,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Infinite-state games with finitary conditions,a2f4a20556f9aa17e8865d987d61f2e4,http://arxiv.org/abs/1301.2661v2 12835," We study two-player zero-sum games over infinite-state graphs with boundedness conditions. Our first contribution is about the strategy complexity, i.e the memory required for winning strategies: we prove that over general infinite-state graphs, memoryless strategies are sufficient for finitary B\""uchi games, and finite-memory suffices for finitary parity games. We then study pushdown boundedness games, with two contributions. First we prove a collapse result for pushdown omega B games, implying the decidability of solving these games. Second we consider pushdown games with finitary parity along with stack boundedness conditions, and show that solving these games is EXPTIME-complete. ",nathanael fijalkow,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Infinite-state games with finitary conditions,a2f4a20556f9aa17e8865d987d61f2e4,http://arxiv.org/abs/1301.2661v2 12836," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",peter duersch,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 12837," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",joerg oechssler,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 12838," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",burkhard schipper,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 12839," The concept of dimension in simple games was introduced as a measure of the remoteness of a given game from a weighted game. Taylor and Zwicker (1993) demonstrated that the dimension of a simple game can grow exponentially in the number of players. However, the problem of worst-case growth of the dimension in complete games was left open. Freixas and Puente (2008) showed that complete games of arbitrary dimension exist and, in particular, their examples demonstrate that the worst-case growth of dimension in complete games is at least linear. In this paper, using a novel technique of Kurz and Napel (2016), we demonstrate that the worst-case growth of dimension in complete simple games is exponential in the number of players. ",liam o'dwyer,,2016.0,,arXiv,O'Dwyer2016,True,,arXiv,Not available,Growth of Dimension in Complete Simple Games,e754e01e214da83fa5dffd3ba143b268,http://arxiv.org/abs/1605.05114v1 12840," The concept of dimension in simple games was introduced as a measure of the remoteness of a given game from a weighted game. Taylor and Zwicker (1993) demonstrated that the dimension of a simple game can grow exponentially in the number of players. However, the problem of worst-case growth of the dimension in complete games was left open. Freixas and Puente (2008) showed that complete games of arbitrary dimension exist and, in particular, their examples demonstrate that the worst-case growth of dimension in complete games is at least linear. In this paper, using a novel technique of Kurz and Napel (2016), we demonstrate that the worst-case growth of dimension in complete simple games is exponential in the number of players. ",arkadii slinko,,2016.0,,arXiv,O'Dwyer2016,True,,arXiv,Not available,Growth of Dimension in Complete Simple Games,e754e01e214da83fa5dffd3ba143b268,http://arxiv.org/abs/1605.05114v1 12841," The goal of the paper is to introduce a set of problems which we call mean field games of timing. We motivate the formulation by a dynamic model of bank run in a continuous-time setting. We briefly review the economic and game theoretic contributions at the root of our effort, and we develop a mathematical theory for continuous-time stochastic games where the strategic decisions of the players are merely choices of times at which they leave the game, and the interaction between the strategic players is of a mean field nature. ",francois delarue,,2016.0,,arXiv,Carmona2016,True,,arXiv,Not available,Mean field games of timing and models for bank runs,5439d47ad05d8685def7704359d7629b,http://arxiv.org/abs/1606.03709v3 12842," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",jason hartline,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 12843," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",vasilis syrgkanis,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 12844," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",eva tardos,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 12845," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12846," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",hu fu,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12847," This short note exhibits a truthful-in-expectation $O(\frac {\log m} {\log \log m})$-approximation mechanism for combinatorial auctions with subadditive bidders that uses polynomial communication. ",robert kleinberg,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Truthfulness via Proxies,2401366d98f04e01a9c2e4b8a0929dc7,http://arxiv.org/abs/1011.3232v2 12848," This paper has been withdrawn by the author. ",riccardo baldeschi,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 12849," This paper has been withdrawn by the author. ",stefano leonardi,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 12850," This paper has been withdrawn by the author. ",guido schaefer,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 12851," In this work we consider selling items using a sequential first price auction mechanism. We generalize the assumption of conservative bidding to extensive form games (henceforth optimistic conservative bidding), and show that for both linear and unit demand valuations, the only pure subgame perfect equilibrium where buyers are bidding in an optimistic conservative manner is the minimal Walrasian equilibrium. In addition, we show examples where without the requirement of conservative bidding, subgame perfect equilibria can admit a variety of unlikely predictions, including high price of anarchy and low revenue in markets composed of additive bidders, equilibria which elicit all the surplus as revenue, and more. We also show that the order in which the items are sold can influence the outcome. ",avinatan hassidim,,2015.0,,arXiv,Hassidim2015,True,,arXiv,Not available,Optimistic-Conservative Bidding in Sequential Auctions,c6fd86a7cc35a673c38000c2d9da43f4,http://arxiv.org/abs/1501.07687v1 12852," The goal of the paper is to introduce a set of problems which we call mean field games of timing. We motivate the formulation by a dynamic model of bank run in a continuous-time setting. We briefly review the economic and game theoretic contributions at the root of our effort, and we develop a mathematical theory for continuous-time stochastic games where the strategic decisions of the players are merely choices of times at which they leave the game, and the interaction between the strategic players is of a mean field nature. ",daniel lacker,,2016.0,,arXiv,Carmona2016,True,,arXiv,Not available,Mean field games of timing and models for bank runs,5439d47ad05d8685def7704359d7629b,http://arxiv.org/abs/1606.03709v3 12853," In this work we consider selling items using a sequential first price auction mechanism. We generalize the assumption of conservative bidding to extensive form games (henceforth optimistic conservative bidding), and show that for both linear and unit demand valuations, the only pure subgame perfect equilibrium where buyers are bidding in an optimistic conservative manner is the minimal Walrasian equilibrium. In addition, we show examples where without the requirement of conservative bidding, subgame perfect equilibria can admit a variety of unlikely predictions, including high price of anarchy and low revenue in markets composed of additive bidders, equilibria which elicit all the surplus as revenue, and more. We also show that the order in which the items are sold can influence the outcome. ",yishay mansour,,2015.0,,arXiv,Hassidim2015,True,,arXiv,Not available,Optimistic-Conservative Bidding in Sequential Auctions,c6fd86a7cc35a673c38000c2d9da43f4,http://arxiv.org/abs/1501.07687v1 12854," We present different versions of a conjecture which would express that first price mechanisms never work very badly in a very general class of problems. The definitions include most of the problems where there is a principal (seller) who has the right to exclude others from the game. The exact definitions are motivated by the ""first price mechanism"" in E Cs: ""Efficient Teamwork"", but the conjecture is relevant for most auction problems, e.g. for combinatorial auctions. ",endre csoka,,2015.0,,arXiv,Csóka2015,True,,arXiv,Not available,A conjecture about the efficiency of first price mechanisms,4a6ef1a4215680da45f9622a67dd0d72,http://arxiv.org/abs/1508.03651v3 12855," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 12856," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 12857," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 12858," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 12859," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",sudhir singh,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 12860," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",vwani roychowdhury,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 12861," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",ioannis caragiannis,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12862," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",christos kaklamanis,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12863," We present the choreography enactment pricing game, a cooperative game-theoretic model for the study of scheduling of jobs using competitor service providers. A choreography (a peer-to-peer service composition model) needs a set of services to fulfill its jobs requirements. Users must choose, for each requirement, which service providers will be used to enact the choreography at lowest cost. Due to the lack of centralization, vendors can form alliances to control the market. We show a novel algorithm capable of detecting alliances among service providers, based on our study of the bargaining set of this game. ",johanne cohen,,2016.0,,arXiv,Cohen2016,True,,arXiv,Not available,"Detecting service provider alliances on the choreography enactment pricing game",1e1d502f8df8879adee6a0ce78c94507,http://arxiv.org/abs/1606.07111v1 12864," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",panagiotis kanellopoulos,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12865," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",maria kyropoulou,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12866," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",brendan lucier,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12867," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",renato leme,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12868," The Generalized Second Price (GSP) auction is the primary auction used for monetizing the use of the Internet. It is well-known that truthtelling is not a dominant strategy in this auction and that inefficient equilibria can arise. In this paper we study the space of equilibria in GSP, and quantify the efficiency loss that can arise in equilibria under a wide range of sources of uncertainty, as well as in the full information setting. The traditional Bayesian game models uncertainty in the valuations (types) of the participants. The Generalized Second Price (GSP) auction gives rise to a further form of uncertainty: the selection of quality factors resulting in uncertainty about the behavior of the underlying ad allocation algorithm. The bounds we obtain apply to both forms of uncertainty, and are robust in the sense that they apply under various perturbations of the solution concept, extending to models with information asymmetries and bounded rationality in the form of learning strategies. We present a constant bound (2.927) on the factor of the efficiency loss (\emph{price of anarchy}) of the corresponding game for the Bayesian model of partial information about other participants and about ad quality factors. For the full information setting, we prove a surprisingly low upper bound of 1.282 on the price of anarchy over pure Nash equilibria, nearly matching a lower bound of 1.259 for the case of three advertisers. Further, we do not require that the system reaches equilibrium, and give similarly low bounds also on the quality degradation for any no-regret learning outcome. Our conclusion is that the number of advertisers in the auction has almost no impact on the price of anarchy, and that the efficiency of GSP is very robust with respect to the belief and rationality assumptions imposed on the participants. ",eva tardos,,2012.0,,arXiv,Caragiannis2012,True,,arXiv,Not available,"Bounding the inefficiency of outcomes in generalized second price auctions",afa8437918c95216d24e097281ad5381,http://arxiv.org/abs/1201.6429v2 12869," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",mohammad alavijeh,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 12870," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",behrouz maham,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 12871," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",zhu han,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 12872," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",walid saad,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 12873," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",gagan aggarwal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 12874," We present the choreography enactment pricing game, a cooperative game-theoretic model for the study of scheduling of jobs using competitor service providers. A choreography (a peer-to-peer service composition model) needs a set of services to fulfill its jobs requirements. Users must choose, for each requirement, which service providers will be used to enact the choreography at lowest cost. Due to the lack of centralization, vendors can form alliances to control the market. We show a novel algorithm capable of detecting alliances among service providers, based on our study of the bargaining set of this game. ",daniel cordeiro,,2016.0,,arXiv,Cohen2016,True,,arXiv,Not available,"Detecting service provider alliances on the choreography enactment pricing game",1e1d502f8df8879adee6a0ce78c94507,http://arxiv.org/abs/1606.07111v1 12875," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",s. muthukrishnan,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 12876," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",david pal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 12877," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",martin pal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 12878," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",akash sarma,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 12879," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",sujit gujar,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 12880," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",y. narahari,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 12883," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",j. bredin,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 12884," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",q. duong,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 12885," We present the choreography enactment pricing game, a cooperative game-theoretic model for the study of scheduling of jobs using competitor service providers. A choreography (a peer-to-peer service composition model) needs a set of services to fulfill its jobs requirements. Users must choose, for each requirement, which service providers will be used to enact the choreography at lowest cost. Due to the lack of centralization, vendors can form alliances to control the market. We show a novel algorithm capable of detecting alliances among service providers, based on our study of the bargaining set of this game. ",loubna echabbi,,2016.0,,arXiv,Cohen2016,True,,arXiv,Not available,"Detecting service provider alliances on the choreography enactment pricing game",1e1d502f8df8879adee6a0ce78c94507,http://arxiv.org/abs/1606.07111v1 12886," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",d. parkes,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 12887," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",yagil engel,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 12888," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",michael wellman,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 12889," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",michal feldman,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 12890," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",hu fu,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 12891," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",nick gravin,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 12892," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",brendan lucier,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 12893," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",xiaojun feng,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 12894," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",peng lin,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 12895," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",qian zhang,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 12896," An online truthful budgeted matching problem is considered for a bipartite graph, where the right vertices are available ahead of time, and individual left vertices arrive sequentially. On arrival of a left vertex, its edge utilities (or weights) to all the right vertices and a corresponding cost (or bid) are revealed. If a left vertex is matched to any of the right vertices, then it has to be paid at least as much as its cost. The problem is to match each left vertex instantaneously and irrevocably to any one of the right vertices, if at all, to find the maximum weight matching that is truthful, under a payment budget constraint. Truthfulness condition requires that no left vertex has any incentive of misreporting its cost. Assuming that the vertices arrive in an uniformly random order (secretary model) with arbitrary utilities, a truthful algorithm is proposed that is $24\beta$-competitive (where $\beta$ is the ratio of the maximum and the minimum utility) and satisfies the payment budget constraint. Direct applications of this problem include crowdsourcing auctions, and matching wireless users to cooperative relays in device-to-device enabled cellular network. ",rahul vaze,,2016.0,,arXiv,Vaze2016,True,,arXiv,Not available,Online Budgeted Truthful Matching,eb95b7b49876d02b29bfaa6ebd382163,http://arxiv.org/abs/1606.00581v1 12897," We study natural strategic games on directed graphs, which capture the idea of coordination in the absence of globally common strategies. We show that these games do not need to have a pure Nash equilibrium and that the problem of determining their existence is NP-complete. The same holds for strong equilibria. We also exhibit some classes of games for which strong equilibria exist and prove that a strong equilibrium can then be found in linear time. ",krzysztof apt,,2016.0,10.4204/EPTCS.215.6,"EPTCS 215, 2016, pp. 67-80",Apt2016,True,,arXiv,Not available,Coordination Games on Directed Graphs,a2d7104aec1513d5523364eca185b4d6,http://arxiv.org/abs/1606.07517v1 12898," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",jamie morgenstern,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 12899," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",tim roughgarden,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 12900," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",zhili chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 12901," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",tianjiao ni,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 12902," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",hong zhong,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 12903," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",shun zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 12904," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",jie cui,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 12905," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",john byers,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 12906," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",michael mitzenmacher,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 12907," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",georgios zervas,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 12908," We study natural strategic games on directed graphs, which capture the idea of coordination in the absence of globally common strategies. We show that these games do not need to have a pure Nash equilibrium and that the problem of determining their existence is NP-complete. The same holds for strong equilibria. We also exhibit some classes of games for which strong equilibria exist and prove that a strong equilibrium can then be found in linear time. ",sunil simon,,2016.0,10.4204/EPTCS.215.6,"EPTCS 215, 2016, pp. 67-80",Apt2016,True,,arXiv,Not available,Coordination Games on Directed Graphs,a2d7104aec1513d5523364eca185b4d6,http://arxiv.org/abs/1606.07517v1 12909," We perform a simulation-based analysis of keyword auctions modeled as one-shot games of incomplete information to study a series of mechanism design questions. Our first question addresses the degree to which incentive compatibility fails in generalized second-price (GSP) auctions. Our results suggest that sincere bidding in GSP auctions is a strikingly poor strategy and a poor predictor of equilibrium outcomes. We next show that the rank-by-revenue mechanism is welfare optimal, corroborating past results. Finally, we analyze profit as a function of auction mechanism under a series of alternative settings. Our conclusions coincide with those of Lahaie and Pennock [2007] when values and quality scores are strongly positively correlated: in such a case, rank-by-bid rules are clearly superior. We diverge, however, in showing that auctions that put little weight on quality scores almost universally dominate the pure rank-by-revenue scheme. ",yevgeniy vorobeychik,,2012.0,,arXiv,Vorobeychik2012,True,,arXiv,Not available,"Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies",64e32e4b8a979d74cfdf4d780679e078,http://arxiv.org/abs/1205.2607v1 12910," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",gagan goel,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 12911," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",mohammad khani,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 12912," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",renato leme,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 12913," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",nikhil devanur,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 12914," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",zhiyi huang,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 12915," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",christos-alexandros psomas,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 12916," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",nicolas bousquet,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 12917," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",yang cai,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 12918," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",adrian vetta,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 12919," We study natural strategic games on directed graphs, which capture the idea of coordination in the absence of globally common strategies. We show that these games do not need to have a pure Nash equilibrium and that the problem of determining their existence is NP-complete. The same holds for strong equilibria. We also exhibit some classes of games for which strong equilibria exist and prove that a strong equilibrium can then be found in linear time. ",dominik wojtczak,,2016.0,10.4204/EPTCS.215.6,"EPTCS 215, 2016, pp. 67-80",Apt2016,True,,arXiv,Not available,Coordination Games on Directed Graphs,a2d7104aec1513d5523364eca185b4d6,http://arxiv.org/abs/1606.07517v1 12920," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",amy greenwald,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 12921," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",takehiro oyakawa,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 12922," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",vasilis syrgkanis,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 12923," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",xiaoru zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 12924," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",lin gao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 12925," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",bin cao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 12926," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",zhang li,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 12927," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",mengjing wang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 12928," We provide algorithms that learn simple auctions whose revenue is approximately optimal in multi-item multi-bidder settings, for a wide range of valuations including unit-demand, additive, constrained additive, XOS, and subadditive. We obtain our learning results in two settings. The first is the commonly studied setting where sample access to the bidders' distributions over valuations is given, for both regular distributions and arbitrary distributions with bounded support. Our algorithms require polynomially many samples in the number of items and bidders. The second is a more general max-min learning setting that we introduce, where we are given ""approximate distributions,"" and we seek to compute an auction whose revenue is approximately optimal simultaneously for all ""true distributions"" that are close to the given ones. These results are more general in that they imply the sample-based results, and are also applicable in settings where we have no sample access to the underlying distributions but have estimated them indirectly via market research or by observation of previously run, potentially non-truthful auctions. Our results hold for valuation distributions satisfying the standard (and necessary) independence-across-items property. They also generalize and improve upon recent works, which have provided algorithms that learn approximately optimal auctions in more restricted settings with additive, subadditive and unit-demand valuations using sample access to distributions. We generalize these results to the complete unit-demand, additive, and XOS setting, to i.i.d. subadditive bidders, and to the max-min setting. Our results are enabled by new uniform convergence bounds for hypotheses classes under product measures. Our bounds result in exponential savings in sample complexity compared to bounds derived by bounding the VC dimension, and are of independent interest. ",yang cai,,2017.0,,arXiv,Cai2017,True,,arXiv,Not available,Learning Multi-item Auctions with (or without) Samples,408585e8b13a56f44952826ff8c99770,http://arxiv.org/abs/1709.00228v1 12929," We provide algorithms that learn simple auctions whose revenue is approximately optimal in multi-item multi-bidder settings, for a wide range of valuations including unit-demand, additive, constrained additive, XOS, and subadditive. We obtain our learning results in two settings. The first is the commonly studied setting where sample access to the bidders' distributions over valuations is given, for both regular distributions and arbitrary distributions with bounded support. Our algorithms require polynomially many samples in the number of items and bidders. The second is a more general max-min learning setting that we introduce, where we are given ""approximate distributions,"" and we seek to compute an auction whose revenue is approximately optimal simultaneously for all ""true distributions"" that are close to the given ones. These results are more general in that they imply the sample-based results, and are also applicable in settings where we have no sample access to the underlying distributions but have estimated them indirectly via market research or by observation of previously run, potentially non-truthful auctions. Our results hold for valuation distributions satisfying the standard (and necessary) independence-across-items property. They also generalize and improve upon recent works, which have provided algorithms that learn approximately optimal auctions in more restricted settings with additive, subadditive and unit-demand valuations using sample access to distributions. We generalize these results to the complete unit-demand, additive, and XOS setting, to i.i.d. subadditive bidders, and to the max-min setting. Our results are enabled by new uniform convergence bounds for hypotheses classes under product measures. Our bounds result in exponential savings in sample complexity compared to bounds derived by bounding the VC dimension, and are of independent interest. ",constantinos daskalakis,,2017.0,,arXiv,Cai2017,True,,arXiv,Not available,Learning Multi-item Auctions with (or without) Samples,408585e8b13a56f44952826ff8c99770,http://arxiv.org/abs/1709.00228v1 12930," This paper introduces and analyses some models in the framework of Mean Field Games describing interactions between two populations motivated by the studies on urban settlements and residential choice by Thomas Schelling. For static games, a large population limit is proved. For differential games with noise, the existence of solutions is established for the systems of partial differential equations of Mean Field Game theory, in the stationary and in the evolutive case. Numerical methods are proposed, with several simulations. In the examples and in the numerical results, particular emphasis is put on the phenomenon of segregation between the populations. ",yves achdou,,2016.0,,arXiv,Achdou2016,True,,arXiv,Not available,Mean Field Games models of segregation,7ea4fb196c4eccb4cec6f73b15c9c56e,http://arxiv.org/abs/1607.04453v1 12931," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",yaonan jin,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 12932," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",pinyan lu,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 12933," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",zhihao tang,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 12934," We consider the simplest and most fundamental problem of selling a single item to a number of buyers whose values are drawn from known independent and regular distributions. There are four most widely-used and widely-studied mechanisms in this literature: Anonymous Posted-Pricing (AP), Second-Price Auction with Anonymous Reserve (AR), Sequential Posted-Pricing (SPM), and Myerson Auction (OPT). Myerson Auction is optimal but complicated, which also suffers a few issues in practice such as fairness; AP is the simplest one but its revenue is also the lowest among these four; AR and SPM are of intermediate complexity and revenue. We study the revenue gaps among these four mechanisms, which is defined as the largest ratio between revenues from two mechanisms. We establish two tight ratios and one tighter bound: 1. SPM/AP. This ratio studies the power of discrimination in pricing schemes. We obtain the tight ratio of roughly $2.62$, closing the previous known bounds $[e / (e - 1), e]$. 2. AR/AP. This ratio studies the relative power of auction vs. pricing schemes, when no discrimination is allowed. We get the tight ratio of $\pi^2 / 6 \approx 1.64$, closing the previous known bounds $[e / (e - 1), e]$. 3. OPT/AR. This ratio studies the power of discrimination in auctions. Previously, the revenue gap is known to be in interval $[2, e]$, and the lower-bound of $2$ is conjectured to be tight~\cite{HR09,H13,AHNPY15}. We disprove this conjecture by obtaining a better lower-bound of $2.15$. ",tao xiao,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Revenue Gaps among Simple Mechanisms,39085f74b7147d39dad8ee844df876a9,http://arxiv.org/abs/1804.00480v1 12935," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",chaoyue niu,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 12936," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",minping zhou,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 12937," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",zhenzhe zheng,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 12938," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",fan wu,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 12939," Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually unwilling to reveal their sensitive bids and identities. In this paper, we jointly consider the auction verifiability and the advertisers' privacy preservation, and thus propose ERA, which is an Efficient, pRivacy-preserving, and verifiAble online auction mechanism for ad exchanges. ERA exploits an order preserving encryption scheme to guarantee privacy preservation, and achieves verifiability by constructing a novel protocol of privacy preserving integer comparison, which is built on the Paillier homomorphic encryption scheme. We extensively evaluate the performance of ERA, and our evaluation results show that ERA satisfies several desirable properties with low computation, communication, and storage overheads, so ERA can be easily deployed in today's ad exchanges. ",guihai chen,,2018.0,10.1016/j.jnca.2017.08.012,"C. Niu, M. Zhou, Z. Zheng, F. Wu, G. Chen, ERA: towards privacy preservation and verifiability for online ad exchanges, Journal of Network and Computer Applications 98 (2017) 1-10. doi:10.1016/j.jnca.2017.08.012",Niu2018,True,,arXiv,Not available,"ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges",649fa597d89269e580594a4ec3b62108,http://arxiv.org/abs/1804.01735v1 12940," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",yutao jiao,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 12941," This paper introduces and analyses some models in the framework of Mean Field Games describing interactions between two populations motivated by the studies on urban settlements and residential choice by Thomas Schelling. For static games, a large population limit is proved. For differential games with noise, the existence of solutions is established for the systems of partial differential equations of Mean Field Game theory, in the stationary and in the evolutive case. Numerical methods are proposed, with several simulations. In the examples and in the numerical results, particular emphasis is put on the phenomenon of segregation between the populations. ",martino bardi,,2016.0,,arXiv,Achdou2016,True,,arXiv,Not available,Mean Field Games models of segregation,7ea4fb196c4eccb4cec6f73b15c9c56e,http://arxiv.org/abs/1607.04453v1 12942," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",ping wang,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 12943," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",dusit niyato,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 12944," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",kongrath suankaewmanee,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 12945," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 12946," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 12947," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 12948," A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,For-profit mediators in sponsored search advertising,688a328c17255b9c8553bfbc0ac43cf3,http://arxiv.org/abs/0707.1057v2 12949," An extension of the WHILE-language is developed for programming game-theoretic mechanisms involving multiple agents. Examples of such mechanisms include auctions, voting procedures, and negotiation protocols. A structured operational semantics is provided in terms of extensive games of almost perfect information. Hoare-style partial correctness assertions are proposed to reason about the correctness of these mechanisms, where correctness is interpreted as the existence of a subgame perfect equilibrium. Using an extensional approach to pre- and postconditions, we show that an extension of Hoare's original calculus is sound and complete for reasoning about subgame perfect equilibria in game-theoretic mechanisms. ",marc pauly,,2002.0,,arXiv,Pauly2002,True,,arXiv,Not available,Programming and Verifying Subgame Perfect Mechanisms,f8b7afa0e431db1d7f91e1009f67d470,http://arxiv.org/abs/cs/0211002v2 12950," The numbers game is a one-player game played on a finite simple graph with certain ``amplitudes'' assigned to its edges and with an initial assignment of real numbers to its nodes. The moves of the game successively transform the numbers at the nodes using the amplitudes in a certain way. This game and its interactions with Coxeter/Weyl group theory and Lie theory have been studied by many authors. Following Eriksson, we allow the amplitudes on graph edges to be certain real numbers. Games played on such graphs are ``E-games.'' We show that for certain such three-node cyclic graphs, any numbers game will diverge when played from an initial assignment of nonnegative real numbers not all zero. This result is a key step in a Dynkin diagram classification (obtained elsewhere) of all E-game graphs which meet a certain finiteness requirement. ",robert donnelly,,2007.0,,arXiv,Donnelly2007,True,,arXiv,Not available,"Eriksson's numbers game on certain edge-weighted three-node cyclic graphs",5d75a24c11b8be7e958656324a7c8838,http://arxiv.org/abs/0708.0880v2 12951," Weighted voting games are ubiquitous mathematical models which are used in economics, political science, neuroscience, threshold logic, reliability theory and distributed systems. They model situations where agents with variable voting weight vote in favour of or against a decision. A coalition of agents is winning if and only if the sum of weights of the coalition exceeds or equals a specified quota. The Banzhaf index is a measure of voting power of an agent in a weighted voting game. It depends on the number of coalitions in which the agent is the difference in the coalition winning or losing. It is well known that computing Banzhaf indices in a weighted voting game is NP-hard. We give a comprehensive classification of weighted voting games which can be solved in polynomial time. Among other results, we provide a polynomial ($O(k{(\frac{n}{k})}^k)$) algorithm to compute the Banzhaf indices in weighted voting games in which the number of weight values is bounded by $k$. ",haris aziz,,2008.0,,arXiv,Aziz2008,True,,arXiv,Not available,Computing voting power in easy weighted voting games,3ad22248c103323c6ec2ce314d3321ba,http://arxiv.org/abs/0811.2497v2 12952," This paper introduces and analyses some models in the framework of Mean Field Games describing interactions between two populations motivated by the studies on urban settlements and residential choice by Thomas Schelling. For static games, a large population limit is proved. For differential games with noise, the existence of solutions is established for the systems of partial differential equations of Mean Field Game theory, in the stationary and in the evolutive case. Numerical methods are proposed, with several simulations. In the examples and in the numerical results, particular emphasis is put on the phenomenon of segregation between the populations. ",marco cirant,,2016.0,,arXiv,Achdou2016,True,,arXiv,Not available,Mean Field Games models of segregation,7ea4fb196c4eccb4cec6f73b15c9c56e,http://arxiv.org/abs/1607.04453v1 12953," Weighted voting games are ubiquitous mathematical models which are used in economics, political science, neuroscience, threshold logic, reliability theory and distributed systems. They model situations where agents with variable voting weight vote in favour of or against a decision. A coalition of agents is winning if and only if the sum of weights of the coalition exceeds or equals a specified quota. The Banzhaf index is a measure of voting power of an agent in a weighted voting game. It depends on the number of coalitions in which the agent is the difference in the coalition winning or losing. It is well known that computing Banzhaf indices in a weighted voting game is NP-hard. We give a comprehensive classification of weighted voting games which can be solved in polynomial time. Among other results, we provide a polynomial ($O(k{(\frac{n}{k})}^k)$) algorithm to compute the Banzhaf indices in weighted voting games in which the number of weight values is bounded by $k$. ",mike paterson,,2008.0,,arXiv,Aziz2008,True,,arXiv,Not available,Computing voting power in easy weighted voting games,3ad22248c103323c6ec2ce314d3321ba,http://arxiv.org/abs/0811.2497v2 12954," Consider a game where Alice generates an integer and Bob wins if he can factor that integer. Traditional game theory tells us that Bob will always win this game even though in practice Alice will win given our usual assumptions about the hardness of factoring. We define a new notion of bounded rationality, where the payoffs of players are discounted by the computation time they take to produce their actions. We use this notion to give a direct correspondence between the existence of equilibria where Alice has a winning strategy and the hardness of factoring. Namely, under a natural assumption on the discount rates, there is an equilibriumwhere Alice has a winning strategy iff there is a linear-time samplable distribution with respect to which Factoring is hard on average. We also give general results for discounted games over countable action spaces, including showing that any game with bounded and computable payoffs has an equilibrium in our model, even if each player is allowed a countable number of actions. It follows, for example, that the Largest Integer game has an equilibrium in our model though it has no Nash equilibria or epsilon-Nash equilibria. ",lance fortnow,,2009.0,,arXiv,Fortnow2009,True,,arXiv,Not available,Bounding Rationality by Discounting Time,80dbaa036223768ee20f8f24e83bee06,http://arxiv.org/abs/0911.3162v1 12955," Consider a game where Alice generates an integer and Bob wins if he can factor that integer. Traditional game theory tells us that Bob will always win this game even though in practice Alice will win given our usual assumptions about the hardness of factoring. We define a new notion of bounded rationality, where the payoffs of players are discounted by the computation time they take to produce their actions. We use this notion to give a direct correspondence between the existence of equilibria where Alice has a winning strategy and the hardness of factoring. Namely, under a natural assumption on the discount rates, there is an equilibriumwhere Alice has a winning strategy iff there is a linear-time samplable distribution with respect to which Factoring is hard on average. We also give general results for discounted games over countable action spaces, including showing that any game with bounded and computable payoffs has an equilibrium in our model, even if each player is allowed a countable number of actions. It follows, for example, that the Largest Integer game has an equilibrium in our model though it has no Nash equilibria or epsilon-Nash equilibria. ",rahul santhanam,,2009.0,,arXiv,Fortnow2009,True,,arXiv,Not available,Bounding Rationality by Discounting Time,80dbaa036223768ee20f8f24e83bee06,http://arxiv.org/abs/0911.3162v1 12956," Partial-monitoring games constitute a mathematical framework for sequential decision making problems with imperfect feedback: The learner repeatedly chooses an action, opponent responds with an outcome, and then the learner suffers a loss and receives a feedback signal, both of which are fixed functions of the action and the outcome. The goal of the learner is to minimize his total cumulative loss. We make progress towards the classification of these games based on their minimax expected regret. Namely, we classify almost all games with two outcomes and finite number of actions: We show that their minimax expected regret is either zero, $\widetilde{\Theta}(\sqrt{T})$, $\Theta(T^{2/3})$, or $\Theta(T)$ and we give a simple and efficiently computable classification of these four classes of games. Our hope is that the result can serve as a stepping stone toward classifying all finite partial-monitoring games. ",andras antos,,2011.0,,arXiv,Antos2011,True,,arXiv,Not available,Toward a Classification of Finite Partial-Monitoring Games,983fadd94584937399d7dd2631d5f563,http://arxiv.org/abs/1102.2041v3 12957," Partial-monitoring games constitute a mathematical framework for sequential decision making problems with imperfect feedback: The learner repeatedly chooses an action, opponent responds with an outcome, and then the learner suffers a loss and receives a feedback signal, both of which are fixed functions of the action and the outcome. The goal of the learner is to minimize his total cumulative loss. We make progress towards the classification of these games based on their minimax expected regret. Namely, we classify almost all games with two outcomes and finite number of actions: We show that their minimax expected regret is either zero, $\widetilde{\Theta}(\sqrt{T})$, $\Theta(T^{2/3})$, or $\Theta(T)$ and we give a simple and efficiently computable classification of these four classes of games. Our hope is that the result can serve as a stepping stone toward classifying all finite partial-monitoring games. ",gabor bartok,,2011.0,,arXiv,Antos2011,True,,arXiv,Not available,Toward a Classification of Finite Partial-Monitoring Games,983fadd94584937399d7dd2631d5f563,http://arxiv.org/abs/1102.2041v3 12958," Partial-monitoring games constitute a mathematical framework for sequential decision making problems with imperfect feedback: The learner repeatedly chooses an action, opponent responds with an outcome, and then the learner suffers a loss and receives a feedback signal, both of which are fixed functions of the action and the outcome. The goal of the learner is to minimize his total cumulative loss. We make progress towards the classification of these games based on their minimax expected regret. Namely, we classify almost all games with two outcomes and finite number of actions: We show that their minimax expected regret is either zero, $\widetilde{\Theta}(\sqrt{T})$, $\Theta(T^{2/3})$, or $\Theta(T)$ and we give a simple and efficiently computable classification of these four classes of games. Our hope is that the result can serve as a stepping stone toward classifying all finite partial-monitoring games. ",david pal,,2011.0,,arXiv,Antos2011,True,,arXiv,Not available,Toward a Classification of Finite Partial-Monitoring Games,983fadd94584937399d7dd2631d5f563,http://arxiv.org/abs/1102.2041v3 12959," Partial-monitoring games constitute a mathematical framework for sequential decision making problems with imperfect feedback: The learner repeatedly chooses an action, opponent responds with an outcome, and then the learner suffers a loss and receives a feedback signal, both of which are fixed functions of the action and the outcome. The goal of the learner is to minimize his total cumulative loss. We make progress towards the classification of these games based on their minimax expected regret. Namely, we classify almost all games with two outcomes and finite number of actions: We show that their minimax expected regret is either zero, $\widetilde{\Theta}(\sqrt{T})$, $\Theta(T^{2/3})$, or $\Theta(T)$ and we give a simple and efficiently computable classification of these four classes of games. Our hope is that the result can serve as a stepping stone toward classifying all finite partial-monitoring games. ",csaba szepesvari,,2011.0,,arXiv,Antos2011,True,,arXiv,Not available,Toward a Classification of Finite Partial-Monitoring Games,983fadd94584937399d7dd2631d5f563,http://arxiv.org/abs/1102.2041v3 12960," One-clock priced timed games is a class of two-player, zero-sum, continuous-time games that was defined and thoroughly studied in previous works. We show that one-clock priced timed games can be solved in time m 12^n n^(O(1)), where n is the number of states and m is the number of actions. The best previously known time bound for solving one-clock priced timed games was 2^(O(n^2+m)), due to Rutkowski. For our improvement, we introduce and study a new algorithm for solving one-clock priced timed games, based on the sweep-line technique from computational geometry and the strategy iteration paradigm from the algorithmic theory of Markov decision processes. As a corollary, we also improve the analysis of previous algorithms due to Bouyer, Cassez, Fleury, and Larsen; and Alur, Bernadsky, and Madhusudan. ",thomas hansen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,A Faster Algorithm for Solving One-Clock Priced Timed Games,a10979772198a8d2f3129ca828b0b547,http://arxiv.org/abs/1201.3498v3 12961," One-clock priced timed games is a class of two-player, zero-sum, continuous-time games that was defined and thoroughly studied in previous works. We show that one-clock priced timed games can be solved in time m 12^n n^(O(1)), where n is the number of states and m is the number of actions. The best previously known time bound for solving one-clock priced timed games was 2^(O(n^2+m)), due to Rutkowski. For our improvement, we introduce and study a new algorithm for solving one-clock priced timed games, based on the sweep-line technique from computational geometry and the strategy iteration paradigm from the algorithmic theory of Markov decision processes. As a corollary, we also improve the analysis of previous algorithms due to Bouyer, Cassez, Fleury, and Larsen; and Alur, Bernadsky, and Madhusudan. ",rasmus ibsen-jensen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,A Faster Algorithm for Solving One-Clock Priced Timed Games,a10979772198a8d2f3129ca828b0b547,http://arxiv.org/abs/1201.3498v3 12962," One-clock priced timed games is a class of two-player, zero-sum, continuous-time games that was defined and thoroughly studied in previous works. We show that one-clock priced timed games can be solved in time m 12^n n^(O(1)), where n is the number of states and m is the number of actions. The best previously known time bound for solving one-clock priced timed games was 2^(O(n^2+m)), due to Rutkowski. For our improvement, we introduce and study a new algorithm for solving one-clock priced timed games, based on the sweep-line technique from computational geometry and the strategy iteration paradigm from the algorithmic theory of Markov decision processes. As a corollary, we also improve the analysis of previous algorithms due to Bouyer, Cassez, Fleury, and Larsen; and Alur, Bernadsky, and Madhusudan. ",peter miltersen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,A Faster Algorithm for Solving One-Clock Priced Timed Games,a10979772198a8d2f3129ca828b0b547,http://arxiv.org/abs/1201.3498v3 12963," Counterfactual Regret Minimization (CFR) is the most popular iterative algorithm for solving zero-sum imperfect-information games. Regret-Based Pruning (RBP) is an improvement that allows poorly-performing actions to be temporarily pruned, thus speeding up CFR. We introduce Total RBP, a new form of RBP that reduces the space requirements of CFR as actions are pruned. We prove that in zero-sum games it asymptotically prunes any action that is not part of a best response to some Nash equilibrium. This leads to provably faster convergence and lower space requirements. Experiments show that Total RBP results in an order of magnitude reduction in space, and the reduction factor increases with game size. ",noam brown,,2016.0,,arXiv,Brown2016,True,,arXiv,Not available,"Reduced Space and Faster Convergence in Imperfect-Information Games via Regret-Based Pruning",df965df732f14973977233fcf567ceb8,http://arxiv.org/abs/1609.03234v1 12964," Counterfactual Regret Minimization (CFR) is an efficient no-regret learning algorithm for decision problems modeled as extensive games. CFR's regret bounds depend on the requirement of perfect recall: players always remember information that was revealed to them and the order in which it was revealed. In games without perfect recall, however, CFR's guarantees do not apply. In this paper, we present the first regret bound for CFR when applied to a general class of games with imperfect recall. In addition, we show that CFR applied to any abstraction belonging to our general class results in a regret bound not just for the abstract game, but for the full game as well. We verify our theory and show how imperfect recall can be used to trade a small increase in regret for a significant reduction in memory in three domains: die-roll poker, phantom tic-tac-toe, and Bluff. ",marc lanctot,,2012.0,,arXiv,Lanctot2012,True,,arXiv,Not available,No-Regret Learning in Extensive-Form Games with Imperfect Recall,59b99487d0e573566824e34e4f47d0a2,http://arxiv.org/abs/1205.0622v1 12965," Counterfactual Regret Minimization (CFR) is an efficient no-regret learning algorithm for decision problems modeled as extensive games. CFR's regret bounds depend on the requirement of perfect recall: players always remember information that was revealed to them and the order in which it was revealed. In games without perfect recall, however, CFR's guarantees do not apply. In this paper, we present the first regret bound for CFR when applied to a general class of games with imperfect recall. In addition, we show that CFR applied to any abstraction belonging to our general class results in a regret bound not just for the abstract game, but for the full game as well. We verify our theory and show how imperfect recall can be used to trade a small increase in regret for a significant reduction in memory in three domains: die-roll poker, phantom tic-tac-toe, and Bluff. ",richard gibson,,2012.0,,arXiv,Lanctot2012,True,,arXiv,Not available,No-Regret Learning in Extensive-Form Games with Imperfect Recall,59b99487d0e573566824e34e4f47d0a2,http://arxiv.org/abs/1205.0622v1 12966," Counterfactual Regret Minimization (CFR) is an efficient no-regret learning algorithm for decision problems modeled as extensive games. CFR's regret bounds depend on the requirement of perfect recall: players always remember information that was revealed to them and the order in which it was revealed. In games without perfect recall, however, CFR's guarantees do not apply. In this paper, we present the first regret bound for CFR when applied to a general class of games with imperfect recall. In addition, we show that CFR applied to any abstraction belonging to our general class results in a regret bound not just for the abstract game, but for the full game as well. We verify our theory and show how imperfect recall can be used to trade a small increase in regret for a significant reduction in memory in three domains: die-roll poker, phantom tic-tac-toe, and Bluff. ",neil burch,,2012.0,,arXiv,Lanctot2012,True,,arXiv,Not available,No-Regret Learning in Extensive-Form Games with Imperfect Recall,59b99487d0e573566824e34e4f47d0a2,http://arxiv.org/abs/1205.0622v1 12967," Counterfactual Regret Minimization (CFR) is an efficient no-regret learning algorithm for decision problems modeled as extensive games. CFR's regret bounds depend on the requirement of perfect recall: players always remember information that was revealed to them and the order in which it was revealed. In games without perfect recall, however, CFR's guarantees do not apply. In this paper, we present the first regret bound for CFR when applied to a general class of games with imperfect recall. In addition, we show that CFR applied to any abstraction belonging to our general class results in a regret bound not just for the abstract game, but for the full game as well. We verify our theory and show how imperfect recall can be used to trade a small increase in regret for a significant reduction in memory in three domains: die-roll poker, phantom tic-tac-toe, and Bluff. ",martin zinkevich,,2012.0,,arXiv,Lanctot2012,True,,arXiv,Not available,No-Regret Learning in Extensive-Form Games with Imperfect Recall,59b99487d0e573566824e34e4f47d0a2,http://arxiv.org/abs/1205.0622v1 12968," Counterfactual Regret Minimization (CFR) is an efficient no-regret learning algorithm for decision problems modeled as extensive games. CFR's regret bounds depend on the requirement of perfect recall: players always remember information that was revealed to them and the order in which it was revealed. In games without perfect recall, however, CFR's guarantees do not apply. In this paper, we present the first regret bound for CFR when applied to a general class of games with imperfect recall. In addition, we show that CFR applied to any abstraction belonging to our general class results in a regret bound not just for the abstract game, but for the full game as well. We verify our theory and show how imperfect recall can be used to trade a small increase in regret for a significant reduction in memory in three domains: die-roll poker, phantom tic-tac-toe, and Bluff. ",michael bowling,,2012.0,,arXiv,Lanctot2012,True,,arXiv,Not available,No-Regret Learning in Extensive-Form Games with Imperfect Recall,59b99487d0e573566824e34e4f47d0a2,http://arxiv.org/abs/1205.0622v1 12969," Starting from a heuristic learning scheme for N-person games, we derive a new class of continuous-time learning dynamics consisting of a replicator-like drift adjusted by a penalty term that renders the boundary of the game's strategy space repelling. These penalty-regulated dynamics are equivalent to players keeping an exponentially discounted aggregate of their on-going payoffs and then using a smooth best response to pick an action based on these performance scores. Owing to this inherent duality, the proposed dynamics satisfy a variant of the folk theorem of evolutionary game theory and they converge to (arbitrarily precise) approximations of Nash equilibria in potential games. Motivated by applications to traffic engineering, we exploit this duality further to design a discrete-time, payoff-based learning algorithm which retains these convergence properties and only requires players to observe their in-game payoffs: moreover, the algorithm remains robust in the presence of stochastic perturbations and observation errors, and it does not require any synchronization between players. ",pierre coucheney,,2013.0,,arXiv,Coucheney2013,True,,arXiv,Not available,Penalty-regulated dynamics and robust learning procedures in games,380ba501bb5cc0d46a1a687b42d593a7,http://arxiv.org/abs/1303.2270v2 12970," Starting from a heuristic learning scheme for N-person games, we derive a new class of continuous-time learning dynamics consisting of a replicator-like drift adjusted by a penalty term that renders the boundary of the game's strategy space repelling. These penalty-regulated dynamics are equivalent to players keeping an exponentially discounted aggregate of their on-going payoffs and then using a smooth best response to pick an action based on these performance scores. Owing to this inherent duality, the proposed dynamics satisfy a variant of the folk theorem of evolutionary game theory and they converge to (arbitrarily precise) approximations of Nash equilibria in potential games. Motivated by applications to traffic engineering, we exploit this duality further to design a discrete-time, payoff-based learning algorithm which retains these convergence properties and only requires players to observe their in-game payoffs: moreover, the algorithm remains robust in the presence of stochastic perturbations and observation errors, and it does not require any synchronization between players. ",bruno gaujal,,2013.0,,arXiv,Coucheney2013,True,,arXiv,Not available,Penalty-regulated dynamics and robust learning procedures in games,380ba501bb5cc0d46a1a687b42d593a7,http://arxiv.org/abs/1303.2270v2 12971," Starting from a heuristic learning scheme for N-person games, we derive a new class of continuous-time learning dynamics consisting of a replicator-like drift adjusted by a penalty term that renders the boundary of the game's strategy space repelling. These penalty-regulated dynamics are equivalent to players keeping an exponentially discounted aggregate of their on-going payoffs and then using a smooth best response to pick an action based on these performance scores. Owing to this inherent duality, the proposed dynamics satisfy a variant of the folk theorem of evolutionary game theory and they converge to (arbitrarily precise) approximations of Nash equilibria in potential games. Motivated by applications to traffic engineering, we exploit this duality further to design a discrete-time, payoff-based learning algorithm which retains these convergence properties and only requires players to observe their in-game payoffs: moreover, the algorithm remains robust in the presence of stochastic perturbations and observation errors, and it does not require any synchronization between players. ",panayotis mertikopoulos,,2013.0,,arXiv,Coucheney2013,True,,arXiv,Not available,Penalty-regulated dynamics and robust learning procedures in games,380ba501bb5cc0d46a1a687b42d593a7,http://arxiv.org/abs/1303.2270v2 12972," We develop a constrained bimatrix game framework that can be used to model many practical problems in many disciplines, including jamming in packetized wireless networks. In contrast to the widely used zero-sum framework, in bimatrix games it is no longer required that the sum of the players' utilities to be zero or constant, thus, can be used to model a much larger class of jamming problems. Additionally, in contrast to the standard bimatrix games, in constrained bimatrix games the players' strategies must satisfy some linear constraint/inequality, consequently, not all strategies are feasible and the existence of the Nash equilibrium (NE) is not guaranteed anymore. We provide the necessary and sufficient conditions under which the existence of the Nash equilibrium is guaranteed, and show that the equilibrium pairs and the Nash equilibrium solution of the constrained game corresponds to the global maximum of a quadratic program. Finally, we use our game theoretic framework to find the optimal transmission and jamming strategies for a typical wireless link under power limited jamming. ",koorosh firouzbakht,,2015.0,10.1109/TCOMM.2015.2504085,"IEEE Transactions on Communications, Volume 64 , Issue 1 (2015)",Firouzbakht2015,True,,arXiv,Not available,Constrained Bimatrix Games in Wireless Communications,be05bfbbfb3a725f3a293d5c992f796d,http://arxiv.org/abs/1506.02890v1 12973," We develop a constrained bimatrix game framework that can be used to model many practical problems in many disciplines, including jamming in packetized wireless networks. In contrast to the widely used zero-sum framework, in bimatrix games it is no longer required that the sum of the players' utilities to be zero or constant, thus, can be used to model a much larger class of jamming problems. Additionally, in contrast to the standard bimatrix games, in constrained bimatrix games the players' strategies must satisfy some linear constraint/inequality, consequently, not all strategies are feasible and the existence of the Nash equilibrium (NE) is not guaranteed anymore. We provide the necessary and sufficient conditions under which the existence of the Nash equilibrium is guaranteed, and show that the equilibrium pairs and the Nash equilibrium solution of the constrained game corresponds to the global maximum of a quadratic program. Finally, we use our game theoretic framework to find the optimal transmission and jamming strategies for a typical wireless link under power limited jamming. ",guevara noubir,,2015.0,10.1109/TCOMM.2015.2504085,"IEEE Transactions on Communications, Volume 64 , Issue 1 (2015)",Firouzbakht2015,True,,arXiv,Not available,Constrained Bimatrix Games in Wireless Communications,be05bfbbfb3a725f3a293d5c992f796d,http://arxiv.org/abs/1506.02890v1 12974," Counterfactual Regret Minimization (CFR) is the most popular iterative algorithm for solving zero-sum imperfect-information games. Regret-Based Pruning (RBP) is an improvement that allows poorly-performing actions to be temporarily pruned, thus speeding up CFR. We introduce Total RBP, a new form of RBP that reduces the space requirements of CFR as actions are pruned. We prove that in zero-sum games it asymptotically prunes any action that is not part of a best response to some Nash equilibrium. This leads to provably faster convergence and lower space requirements. Experiments show that Total RBP results in an order of magnitude reduction in space, and the reduction factor increases with game size. ",tuomas sandholm,,2016.0,,arXiv,Brown2016,True,,arXiv,Not available,"Reduced Space and Faster Convergence in Imperfect-Information Games via Regret-Based Pruning",df965df732f14973977233fcf567ceb8,http://arxiv.org/abs/1609.03234v1 12975," We develop a constrained bimatrix game framework that can be used to model many practical problems in many disciplines, including jamming in packetized wireless networks. In contrast to the widely used zero-sum framework, in bimatrix games it is no longer required that the sum of the players' utilities to be zero or constant, thus, can be used to model a much larger class of jamming problems. Additionally, in contrast to the standard bimatrix games, in constrained bimatrix games the players' strategies must satisfy some linear constraint/inequality, consequently, not all strategies are feasible and the existence of the Nash equilibrium (NE) is not guaranteed anymore. We provide the necessary and sufficient conditions under which the existence of the Nash equilibrium is guaranteed, and show that the equilibrium pairs and the Nash equilibrium solution of the constrained game corresponds to the global maximum of a quadratic program. Finally, we use our game theoretic framework to find the optimal transmission and jamming strategies for a typical wireless link under power limited jamming. ",masoud salehi,,2015.0,10.1109/TCOMM.2015.2504085,"IEEE Transactions on Communications, Volume 64 , Issue 1 (2015)",Firouzbakht2015,True,,arXiv,Not available,Constrained Bimatrix Games in Wireless Communications,be05bfbbfb3a725f3a293d5c992f796d,http://arxiv.org/abs/1506.02890v1 12976," We study the strategic aspects of social influence in a society of agents linked by a trust network, introducing a new class of games called games of influence. A game of influence is an infinite repeated game with incomplete information in which, at each stage of interaction, an agent can make her opinions visible (public) or invisible (private) in order to influence other agents' opinions. The influence process is mediated by a trust network, as we assume that the opinion of a given agent is only affected by the opinions of those agents that she considers trustworthy (i.e., the agents in the trust network that are directly linked to her). Each agent is endowed with a goal, expressed in a suitable temporal language inspired from linear temporal logic (LTL). We show that games of influence provide a simple abstraction to explore the effects of the trust network structure on the agents' behaviour, by considering solution concepts from game-theory such as Nash equilibrium, weak dominance and winning strategies. ",umberto grandi,,2016.0,,arXiv,Grandi2016,True,,arXiv,Not available,Strategic disclosure of opinions on a social network,0b1a7f3790b76a2580ef027f253c0710,http://arxiv.org/abs/1602.02710v1 12977," We study the strategic aspects of social influence in a society of agents linked by a trust network, introducing a new class of games called games of influence. A game of influence is an infinite repeated game with incomplete information in which, at each stage of interaction, an agent can make her opinions visible (public) or invisible (private) in order to influence other agents' opinions. The influence process is mediated by a trust network, as we assume that the opinion of a given agent is only affected by the opinions of those agents that she considers trustworthy (i.e., the agents in the trust network that are directly linked to her). Each agent is endowed with a goal, expressed in a suitable temporal language inspired from linear temporal logic (LTL). We show that games of influence provide a simple abstraction to explore the effects of the trust network structure on the agents' behaviour, by considering solution concepts from game-theory such as Nash equilibrium, weak dominance and winning strategies. ",emiliano lorini,,2016.0,,arXiv,Grandi2016,True,,arXiv,Not available,Strategic disclosure of opinions on a social network,0b1a7f3790b76a2580ef027f253c0710,http://arxiv.org/abs/1602.02710v1 12978," We study the strategic aspects of social influence in a society of agents linked by a trust network, introducing a new class of games called games of influence. A game of influence is an infinite repeated game with incomplete information in which, at each stage of interaction, an agent can make her opinions visible (public) or invisible (private) in order to influence other agents' opinions. The influence process is mediated by a trust network, as we assume that the opinion of a given agent is only affected by the opinions of those agents that she considers trustworthy (i.e., the agents in the trust network that are directly linked to her). Each agent is endowed with a goal, expressed in a suitable temporal language inspired from linear temporal logic (LTL). We show that games of influence provide a simple abstraction to explore the effects of the trust network structure on the agents' behaviour, by considering solution concepts from game-theory such as Nash equilibrium, weak dominance and winning strategies. ",laurent perrussel,,2016.0,,arXiv,Grandi2016,True,,arXiv,Not available,Strategic disclosure of opinions on a social network,0b1a7f3790b76a2580ef027f253c0710,http://arxiv.org/abs/1602.02710v1 12979," We give a self contained introduction to a few quantum game protocols, starting with the quantum version of the two-player two-choice game of Prisoners dilemma, followed by a n-player generalization trough the quantum minority games, and finishing with a contribution towards a n-player m-choice generalization with a quantum version of a three-player Kolkata restaurant problem. We have omitted some technical details accompanying these protocols, and instead laid the focus on presenting some general aspects of the field as a whole. This review contains an introduction to the formalism of quantum information theory, as well as to important game theoretical concepts, and is aimed to work as an introduction suiting economists and game theorists with limited knowledge of quantum physics as well as to physicists with limited knowledge of game theory. ",puya sharif,,2012.0,,arXiv,Sharif2012,True,,arXiv,Not available,"An introduction to multi-player, multi-choice quantum games",3ae508821874a30ec5c8d921885b28f3,http://arxiv.org/abs/1204.0661v1 12980," We give a self contained introduction to a few quantum game protocols, starting with the quantum version of the two-player two-choice game of Prisoners dilemma, followed by a n-player generalization trough the quantum minority games, and finishing with a contribution towards a n-player m-choice generalization with a quantum version of a three-player Kolkata restaurant problem. We have omitted some technical details accompanying these protocols, and instead laid the focus on presenting some general aspects of the field as a whole. This review contains an introduction to the formalism of quantum information theory, as well as to important game theoretical concepts, and is aimed to work as an introduction suiting economists and game theorists with limited knowledge of quantum physics as well as to physicists with limited knowledge of game theory. ",hoshang heydari,,2012.0,,arXiv,Sharif2012,True,,arXiv,Not available,"An introduction to multi-player, multi-choice quantum games",3ae508821874a30ec5c8d921885b28f3,http://arxiv.org/abs/1204.0661v1 12981," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",sayan bhattacharya,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 12982," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",vincent conitzer,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 12983," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",kamesh munagala,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 12984," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",lirong xia,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 12985," We study pure coordination games where in every outcome, all players have identical payoffs, 'win' or 'lose'. We identify and discuss a range of 'purely rational principles' guiding the reasoning of rational players in such games and analyze which classes of coordination games can be solved by such players with no preplay communication or conventions. We observe that it is highly nontrivial to delineate a boundary between purely rational principles and other decision methods, such as conventions, for solving such coordination games. ",valentin goranko,,2017.0,,arXiv,Goranko2017,True,,arXiv,Not available,Rational coordination with no communication or conventions,ae588ecb23a0dfb42363900ed239faab,http://arxiv.org/abs/1706.07412v2 12986," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",he huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12987," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",yu-e sun,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12988," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",xiang-yang li,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12989," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",hongli xu,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12990," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",yousong zhou,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12991," Secondary spectrum auction is widely applied in wireless networks for mitigating the spectrum scarcity. In a realistic spectrum trading market, the requests from secondary users often specify the usage of a fixed spectrum frequency band in a certain geographical region and require a duration time in a fixed available time interval. Considering the selfish behaviors of secondary users, it is imperative to design a truthful auction which matches the available spectrums and requests of secondary users optimally. Unfortunately, existing designs either do not consider spectrum heterogeneity or ignore the differences of required time among secondary users. In this paper, we address this problem by investigating how to use auction mechanisms to allocate and price spectrum resources so that the social efficiency can be maximized. We begin by classifying the spectrums and requests from secondary users into different local markets which ensures there is no interference between local markets, and then we can focus on the auction in a single local market. We first design an optimal auction based on the Vickrey-Clarke-Groves (VCG) mechanism to maximize the social efficiency while enforcing truthfulness. To reduce the computational complexity, we further propose a truthful sub-optimal auction with polynomial time complexity, which yields an approximation factor 6+4\surd2. Our extensive simulation results using real spectrum availability data show that the social efficiency ratio of the sub-optimal auction is always above 70% compared with the optimal auction. ",liusheng huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,"Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks",8205d372cb547fac00848035dfd30fbb,http://arxiv.org/abs/1208.0144v1 12992," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",ning chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 12993," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",nick gravin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 12994," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",pinyan lu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 12995," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",george christodoulou,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 12996," We study pure coordination games where in every outcome, all players have identical payoffs, 'win' or 'lose'. We identify and discuss a range of 'purely rational principles' guiding the reasoning of rational players in such games and analyze which classes of coordination games can be solved by such players with no preplay communication or conventions. We observe that it is highly nontrivial to delineate a boundary between purely rational principles and other decision methods, such as conventions, for solving such coordination games. ",antti kuusisto,,2017.0,,arXiv,Goranko2017,True,,arXiv,Not available,Rational coordination with no communication or conventions,ae588ecb23a0dfb42363900ed239faab,http://arxiv.org/abs/1706.07412v2 12997," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",annamaria kovacs,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 12998," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",alkmini sgouritsa,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 12999," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",bo tang,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 13000," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",simina branzei,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 13001," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",clara forero,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 13002," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",kate larson,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 13003," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",peter miltersen,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 13004," We develop extensions to auction theory results that are useful in real life scenarios. 1. Since valuations are generally positive we first develop approximations using the log-normal distribution. This would be useful for many finance related auction settings since asset prices are usually non-negative. 2. We formulate a positive symmetric discrete distribution, which is likely to be followed by the total number of auction participants, and incorporate this into auction theory results. 3. We develop extensions when the valuations of the bidders are interdependent and incorporate all the results developed into a final combined realistic setting. 4. Our methods can be a practical tool for bidders and auction sellers to maximize their profits. The models developed here could be potentially useful for inventory estimation and for wholesale procurement of financial instruments and also non-financial commodities. All the propositions are new results and they refer to existing results which are stated as Lemmas. ",ravi kashyap,,2018.0,10.1016/j.rie.2018.09.001,arXiv,Kashyap2018,True,,arXiv,Not available,Auction Theory Extensions for Real Life Applications,782c5cfe7c66113e160469ab1e1f98de,http://arxiv.org/abs/1810.01736v1 13005," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",yuan liu,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13006," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",meixia tao,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13007," An online truthful budgeted matching problem is considered for a bipartite graph, where the right vertices are available ahead of time, and individual left vertices arrive sequentially. On arrival of a left vertex, its edge utilities (or weights) to all the right vertices and a corresponding cost (or bid) are revealed. If a left vertex is matched to any of the right vertices, then it has to be paid at least as much as its cost. The problem is to match each left vertex instantaneously and irrevocably to any one of the right vertices, if at all, to find the maximum weight matching that is truthful, under a payment budget constraint. Truthfulness condition requires that no left vertex has any incentive of misreporting its cost. Assuming that the vertices arrive in an uniformly random order (secretary model) with arbitrary utilities, a truthful algorithm is proposed that is $24\beta$-competitive (where $\beta$ is the ratio of the maximum and the minimum utility) and satisfies the payment budget constraint. Direct applications of this problem include crowdsourcing auctions, and matching wireless users to cooperative relays in device-to-device enabled cellular network. ",marceau coupechoux,,2016.0,,arXiv,Vaze2016,True,,arXiv,Not available,Online Budgeted Truthful Matching,eb95b7b49876d02b29bfaa6ebd382163,http://arxiv.org/abs/1606.00581v1 13008," We study pure coordination games where in every outcome, all players have identical payoffs, 'win' or 'lose'. We identify and discuss a range of 'purely rational principles' guiding the reasoning of rational players in such games and analyze which classes of coordination games can be solved by such players with no preplay communication or conventions. We observe that it is highly nontrivial to delineate a boundary between purely rational principles and other decision methods, such as conventions, for solving such coordination games. ",raine ronnholm,,2017.0,,arXiv,Goranko2017,True,,arXiv,Not available,Rational coordination with no communication or conventions,ae588ecb23a0dfb42363900ed239faab,http://arxiv.org/abs/1706.07412v2 13009," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",jianwei huang,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13010," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",avrim blum,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13011," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",yishay mansour,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13012," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",jamie morgenstern,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13013," A standard result from auction theory is that bidding truthfully in a second price auction is a weakly dominant strategy, or, in the language of digital advertising, 'the cost per mille (eCPM) is equal to the click through rate (CTR) times the cost per clicks (CPC)'. However, such assertion is incorrect if the buyers are subject to ROI constraints. More generally, several predictions derived by the traditional auction theory literature fail to apply. This is what I propose to discuss in this article. I formalize the notion of ROI constrained auctions and derive a Nash equilibrium for second price auctions. I then extend this result to any combination of first and second price payment rules and do an asymptotic analysis of the equilibrium as the number of bidders increases. Further I expose a revenue equivalence property, and finish with a proposal for a dynamic extension of the bidder ROI constrained optimization problem. ",benamin heymann,,2018.0,,arXiv,Heymann2018,True,,arXiv,Not available,ROI constrained Auctions,ea30776161bd25310cf171082853a0f9,http://arxiv.org/abs/1809.08837v1 13014," An overview of different variants of the submodular welfare maximization problem in combinatorial auctions. In particular, I studied the existing algorithmic and game theoretic results for submodular welfare maximization problem and its applications in other areas such as social networks. ",samira samadi,,2013.0,,arXiv,Samadi2013,True,,arXiv,Not available,Submodular Welfare Maximization,db065c3a2e22f4fea80bab840b6fad2b,http://arxiv.org/abs/1311.5603v1 13015," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",cristina fernandes,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 13016," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",carlos ferreira,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 13017," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",alvaro franco,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 13018," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",rafael schouery,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 13019," This paper deals with modeling of network's dynamic using evolutionary games approach. Today there are many different protocols for data transmission through the Internet, providing users with better or worse service. The process of choosing better protocol could be considered as a dynamic game with players (users), trying to maximize their payoffs (eg throughput). In this work we presented the model of network's dynamic using differential equations with discontinuous right side and proved existence and uniqueness of the solution, formulated payoff matrix for a network game and found conditions of equilibrium existence depending on loss sensitivity parameter. The results are illustrated by simulations ",oleksii ignatenko,,2017.0,,arXiv,Ignatenko2017,True,,arXiv,Not available,Evolutionary game of N competing AIMD connections,f25bf075d7ee84e1d26d5d4b1fd00f5f,http://arxiv.org/abs/1708.00239v1 13020," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",michael kearns,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 13021," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",lili dworkin,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 13022," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",alon eden,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 13023," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",michal feldman,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 13024," We study online auction settings in which agents arrive and depart dynamically in a random (secretary) order, and each agent's private type consists of the agent's arrival and departure times, value and budget. We consider multi-unit auctions with additive agents for the allocation of both divisible and indivisible items. For both settings, we devise truthful mechanisms that give a constant approximation with respect to the auctioneer's revenue, under a large market assumption. For divisible items, we devise in addition a truthful mechanism that gives a constant approximation with respect to the liquid welfare --- a natural efficiency measure for budgeted settings introduced by Dobzinski and Paes Leme [ICALP'14]. Our techniques provide high-level principles for transforming offline truthful mechanisms into online ones, with or without budget constraints. To the best of our knowledge, this is the first work that addresses the non-trivial challenge of combining online settings with budgeted agents. ",adi vardi,,2015.0,,arXiv,Eden2015,True,,arXiv,Not available,Truthful Secretaries with Budgets,204efc5eb8a6e24848ce31d94bf3994b,http://arxiv.org/abs/1504.03625v1 13025," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",mehryar mohri,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 13026," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",andres medina,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 13027," We study a central problem in Algorithmic Mechanism Design: constructing truthful mechanisms for welfare maximization in combinatorial auctions with submodular bidders. Dobzinski, Nisan, and Schapira provided the first mechanism that guarantees a non-trivial approximation ratio of $O(\log^2 m)$ [STOC'06], where $m$ is the number of items. This was subsequently improved to $O(\log m\log \log m)$ [Dobzinski, APPROX'07] and then to $O(\log m)$ [Krysta and Vocking, ICALP'12]. In this paper we develop the first mechanism that breaks the logarithmic barrier. Specifically, the mechanism provides an approximation ratio of $O(\sqrt {\log m})$. Similarly to previous constructions, our mechanism uses polynomially many value and demand queries, and in fact provides the same approximation ratio for the larger class of XOS (a.k.a. fractionally subadditive) valuations. We also develop a computationally efficient implementation of the mechanism for combinatorial auctions with budget additive bidders. Although in general computing a demand query is NP-hard for budget additive valuations, we observe that the specific form of demand queries that our mechanism uses can be efficiently computed when bidders are budget additive. ",shahar dobzinski,,2016.0,,arXiv,Dobzinski2016,True,,arXiv,Not available,"Breaking the Logarithmic Barrier for Truthful Combinatorial Auctions with Submodular Bidders",777803b9207fca0be5d5b05567edf0cb,http://arxiv.org/abs/1602.05914v2 13028," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",simina branzei,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13029," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",aris filos-ratsikas,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13030," This paper deals with modeling of network's dynamic using evolutionary games approach. Today there are many different protocols for data transmission through the Internet, providing users with better or worse service. The process of choosing better protocol could be considered as a dynamic game with players (users), trying to maximize their payoffs (eg throughput). In this work we presented the model of network's dynamic using differential equations with discontinuous right side and proved existence and uniqueness of the solution, formulated payoff matrix for a network game and found conditions of equilibrium existence depending on loss sensitivity parameter. The results are illustrated by simulations ",oleksandr synetskyi,,2017.0,,arXiv,Ignatenko2017,True,,arXiv,Not available,Evolutionary game of N competing AIMD connections,f25bf075d7ee84e1d26d5d4b1fd00f5f,http://arxiv.org/abs/1708.00239v1 13031," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",peter miltersen,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13032," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",yulong zeng,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13033," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",robert kleinberg,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 13034," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",bo waggoner,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 13035," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",e. weyl,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 13036," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",yu-e sun,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13037," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",he huang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13038," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",xiang-yang li,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13039," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",zhili chen,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13040," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",wei yang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13041," Selten's game is a kidnapping model where the probability of capturing the kidnapper is independent of whether the hostage has been released or executed. Most often, in view of the elevated sensitivities involved, authorities put greater effort and resources into capturing the kidnapper if the hostage has been executed, in contrast to the case when a ransom is paid to secure the hostage's release. In this paper, we study the asymmetric game when the probability of capturing the kidnapper depends on whether the hostage has been executed or not and find a new uniquely determined perfect equilibrium point in Selten's game. ",azhar iqbal,,2017.0,,"Royal Society Open Science, Vol. 4, Art. No. 171484 (2017)",Iqbal2017,True,,arXiv,Not available,Kidnapping Model: An Extension of Selten's Game,cae8d6d2a568453a6f9529cd1fdccc16,http://arxiv.org/abs/1709.07623v1 13042," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",hongli xu,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13043," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",liusheng huang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13044," The goal of an auction is to determine commodity prices such that all participants are perfectly happy. Such a solution is called a competitive equilibrium and does not exist in general. For this reason we are interested in solutions which are similar to a competitive equilibrium. The article introduces two relaxations of a competitive equilibrium for general auctions. Both relaxations determine one price per commodity by solving a difficult non-convex optimization problem. The first model is a mathematical program with equilibrium constraints (MPEC), which ensures that each participant is either perfectly happy or his bid is rejected. An exact algorithm and a heuristic are provided for this model. The second model is a relaxation of the first one and only ensures that no participant incurs a loss. In an optimal solution to the second model, no participant can be made better off without making another one worse off. ",johannes muller,,2013.0,,arXiv,Müller2013,True,,arXiv,Not available,Competitive Equilibrium Relaxations in General Auctions,717eceee956c9f6965a10ea07bc7d977,http://arxiv.org/abs/1307.2852v2 13045," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",paul duetting,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13046," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",felix fischer,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13047," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",david parkes,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13048," We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk-neutral. In contrast, studies in behavioral decision theory have shown that individuals often deviate from risk-neutral behavior while making decisions under uncertainty. In particular, the true probabilities associated with uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear fashion by the users, which then influence their decisions. In this paper, we investigate the effects of such behavioral probability weightings by the nodes on their optimal investment strategies and the resulting security risk profiles that arise at the Nash equilibria of interdependent network security games. We characterize graph topologies that achieve the largest and smallest worst case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium investments in Weakest Link and Best Shot games. ",ashish hota,,2015.0,10.1109/TCNS.2016.2600484,arXiv,Hota2015,True,,arXiv,Not available,"Interdependent Security Games on Networks under Behavioral Probability Weighting",f6bd270c745885d704f9ff76ffdb4dc4,http://arxiv.org/abs/1510.09106v3 13049," We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk-neutral. In contrast, studies in behavioral decision theory have shown that individuals often deviate from risk-neutral behavior while making decisions under uncertainty. In particular, the true probabilities associated with uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear fashion by the users, which then influence their decisions. In this paper, we investigate the effects of such behavioral probability weightings by the nodes on their optimal investment strategies and the resulting security risk profiles that arise at the Nash equilibria of interdependent network security games. We characterize graph topologies that achieve the largest and smallest worst case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium investments in Weakest Link and Best Shot games. ",shreyas sundaram,,2015.0,10.1109/TCNS.2016.2600484,arXiv,Hota2015,True,,arXiv,Not available,"Interdependent Security Games on Networks under Behavioral Probability Weighting",f6bd270c745885d704f9ff76ffdb4dc4,http://arxiv.org/abs/1510.09106v3 13050," We introduce a method based on the Public Goods Game for solving optimization tasks. In particular, we focus on the Traveling Salesman Problem, i.e. a NP-hard problem whose search space exponentially grows increasing the number of cities. The proposed method considers a population whose agents are provided with a random solution to the given problem. In doing so, agents interact by playing the Public Goods Game using the fitness of their solution as currency of the game. Notably, agents with better solutions provide higher contributions, while those with lower ones tend to imitate the solution of richer agents for increasing their fitness. Numerical simulations show that the proposed method allows to compute exact solutions, and suboptimal ones, in the considered search spaces. As result, beyond to propose a new heuristic for combinatorial optimization problems, our work aims to highlight the potentiality of evolutionary game theory beyond its current horizons. ",marco javarone,,2016.0,10.1140/epjb/e2017-80346-6,arXiv,Javarone2016,True,,arXiv,Not available,Solving Optimization Problems by the Public Goods Game,910c28f6249be97dfd9adb4ea68db1b5,http://arxiv.org/abs/1604.02929v2 13051," Absolute Universes of combinatorial games, as defined in a recent paper by the same authors, include many standard short normal- mis\`ere- and scoring-play monoids. In this note we show that the class is categorical, by extending Joyal's construction of arrows in normal-play games. Given $G$ and $H$ in an Absolute Universe $U$, we study instead the Left Provisonal Game $[G, H]$, which is a normal-play game, independently of the particular Absolute Universe, and find that $G\longrightarrow H$ (implying $G\succcurlyeq H$) corresponds to the set of winning strategies for Left playing second in $[G,H]$. By this we define the category ${\bf LNP(U)}$. ",urban larsson,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,When game comparison becomes play: Absolutely Categorical Game Theory,f55126d377c9cb0a107c795cfa66f097,http://arxiv.org/abs/1609.02764v1 13052," Selten's game is a kidnapping model where the probability of capturing the kidnapper is independent of whether the hostage has been released or executed. Most often, in view of the elevated sensitivities involved, authorities put greater effort and resources into capturing the kidnapper if the hostage has been executed, in contrast to the case when a ransom is paid to secure the hostage's release. In this paper, we study the asymmetric game when the probability of capturing the kidnapper depends on whether the hostage has been executed or not and find a new uniquely determined perfect equilibrium point in Selten's game. ",virginie masson,,2017.0,,"Royal Society Open Science, Vol. 4, Art. No. 171484 (2017)",Iqbal2017,True,,arXiv,Not available,Kidnapping Model: An Extension of Selten's Game,cae8d6d2a568453a6f9529cd1fdccc16,http://arxiv.org/abs/1709.07623v1 13053," Absolute Universes of combinatorial games, as defined in a recent paper by the same authors, include many standard short normal- mis\`ere- and scoring-play monoids. In this note we show that the class is categorical, by extending Joyal's construction of arrows in normal-play games. Given $G$ and $H$ in an Absolute Universe $U$, we study instead the Left Provisonal Game $[G, H]$, which is a normal-play game, independently of the particular Absolute Universe, and find that $G\longrightarrow H$ (implying $G\succcurlyeq H$) corresponds to the set of winning strategies for Left playing second in $[G,H]$. By this we define the category ${\bf LNP(U)}$. ",richard nowakowski,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,When game comparison becomes play: Absolutely Categorical Game Theory,f55126d377c9cb0a107c795cfa66f097,http://arxiv.org/abs/1609.02764v1 13054," Absolute Universes of combinatorial games, as defined in a recent paper by the same authors, include many standard short normal- mis\`ere- and scoring-play monoids. In this note we show that the class is categorical, by extending Joyal's construction of arrows in normal-play games. Given $G$ and $H$ in an Absolute Universe $U$, we study instead the Left Provisonal Game $[G, H]$, which is a normal-play game, independently of the particular Absolute Universe, and find that $G\longrightarrow H$ (implying $G\succcurlyeq H$) corresponds to the set of winning strategies for Left playing second in $[G,H]$. By this we define the category ${\bf LNP(U)}$. ",carlos santos,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,When game comparison becomes play: Absolutely Categorical Game Theory,f55126d377c9cb0a107c795cfa66f097,http://arxiv.org/abs/1609.02764v1 13055," We present a new game semantics for Martin-L\""of type theory (MLTT), our aim is to give a mathematical and intensional explanation of MLTT. Specifically, we propose a category with families of a novel variant of games, which induces a surjective and injective (when Id-types are excluded) interpretation of the intensional variant of MLTT equipped with unit-, empty-, N-, dependent product, dependent sum and Id-types as well as the cumulative hierarchy of universes for the first time in the literature (as far as we are aware), though the surjectivity is accomplished merely by an inductive definition of a certain class of games and strategies. Our games generalize the existing notion of games, and achieve an interpretation of dependent types and the hierarchy of universes in an intuitive yet mathematically precise manner, our strategies can be seen as algorithms underlying programs (or proofs) in MLTT. A more fine-grained interpretation of Id-types is left as future work. ",norihiro yamada,,2016.0,,arXiv,Yamada2016,True,,arXiv,Not available,Game Semantics for Martin-Löf Type Theory,eb10ebfeb066b3f22b9dee374e891e06,http://arxiv.org/abs/1610.01669v6 13056," Extensive games are tools largely used in economics to describe decision processes ofa community of agents. In this paper we propose a formal presentation based on theproof assistant COQ which focuses mostly on infinite extensive games and theircharacteristics. COQ proposes a feature called ""dependent types"", which meansthat the type of an object may depend on the type of its components. For instance,the set of choices or the set of utilities of an agent may depend on the agentherself. Using dependent types, we describe formally a very general class of gamesand strategy profiles, which corresponds somewhat to what game theorists are used to.We also discuss the notions of infiniteness in game theory and how this can beprecisely described. ",pierre lescanne,,2016.0,,arXiv,Lescanne2016,True,,arXiv,Not available,Dependent Types for Extensive Games,56914becbfabea111a228e10b3aa98ba,http://arxiv.org/abs/1611.06101v3 13057," This article presents a new game semantics for Martin-L\""of type theory (MLTT), in which each game is equipped with selected isomorphism strategies that represent (computational) proofs for (intensional) equality between strategies on the game. These isomorphism strategies interpret propositional equalities in MLTT. As a main result, we have obtained a first game semantics for MLTT that refutes the principle of uniqueness of identity proofs (UIP) and validates univalence axiom (UA) though it does not model non-trivial higher equalities. Categorically, our model forms a substructure of the classic groupoid model of MLTT by Hofmann and Streicher. Similarly to the path from the groupoid model to the $\omega$-groupoid model, we are planning to generalize the game semantics to give rise to an omega-groupoid structure to interpret non-trivial higher equalities in homotopy type theory (HoTT). ",norihiro yamada,,2017.0,,arXiv,Yamada2017,True,,arXiv,Not available,Game-theoretic Investigation of Intensional Equalities,a57644dad12694cd69dbb694cbb5c434,http://arxiv.org/abs/1703.02015v3 13058," No-regret learning has emerged as a powerful tool for solving extensive-form games. This was facilitated by the counterfactual-regret minimization (CFR) framework, which relies on the instantiation of regret minimizers for simplexes at each information set of the game. We use an instantiation of the CFR framework to develop algorithms for solving behaviorally-constrained (and, as a special case, perturbed in the Selten sense) extensive-form games, which allows us to compute approximate Nash equilibrium refinements. Nash equilibrium refinements are motivated by a major deficiency in Nash equilibrium: it provides virtually no guarantees on how it will play in parts of the game tree that are reached with zero probability. Refinements can mend this issue, but have not been adopted in practice, mostly due to a lack of scalable algorithms. We show that, compared to standard algorithms, our method finds solutions that have substantially better refinement properties, while enjoying a convergence rate that is comparable to that of state-of-the-art algorithms for Nash equilibrium computation both in theory and practice. ",gabriele farina,,2017.0,,arXiv,Farina2017,True,,arXiv,Not available,Regret Minimization in Behaviorally-Constrained Zero-Sum Games,5babe2c0fa2b5ef02f4a7f2209456adb,http://arxiv.org/abs/1711.03441v1 13059," No-regret learning has emerged as a powerful tool for solving extensive-form games. This was facilitated by the counterfactual-regret minimization (CFR) framework, which relies on the instantiation of regret minimizers for simplexes at each information set of the game. We use an instantiation of the CFR framework to develop algorithms for solving behaviorally-constrained (and, as a special case, perturbed in the Selten sense) extensive-form games, which allows us to compute approximate Nash equilibrium refinements. Nash equilibrium refinements are motivated by a major deficiency in Nash equilibrium: it provides virtually no guarantees on how it will play in parts of the game tree that are reached with zero probability. Refinements can mend this issue, but have not been adopted in practice, mostly due to a lack of scalable algorithms. We show that, compared to standard algorithms, our method finds solutions that have substantially better refinement properties, while enjoying a convergence rate that is comparable to that of state-of-the-art algorithms for Nash equilibrium computation both in theory and practice. ",christian kroer,,2017.0,,arXiv,Farina2017,True,,arXiv,Not available,Regret Minimization in Behaviorally-Constrained Zero-Sum Games,5babe2c0fa2b5ef02f4a7f2209456adb,http://arxiv.org/abs/1711.03441v1 13060," No-regret learning has emerged as a powerful tool for solving extensive-form games. This was facilitated by the counterfactual-regret minimization (CFR) framework, which relies on the instantiation of regret minimizers for simplexes at each information set of the game. We use an instantiation of the CFR framework to develop algorithms for solving behaviorally-constrained (and, as a special case, perturbed in the Selten sense) extensive-form games, which allows us to compute approximate Nash equilibrium refinements. Nash equilibrium refinements are motivated by a major deficiency in Nash equilibrium: it provides virtually no guarantees on how it will play in parts of the game tree that are reached with zero probability. Refinements can mend this issue, but have not been adopted in practice, mostly due to a lack of scalable algorithms. We show that, compared to standard algorithms, our method finds solutions that have substantially better refinement properties, while enjoying a convergence rate that is comparable to that of state-of-the-art algorithms for Nash equilibrium computation both in theory and practice. ",tuomas sandholm,,2017.0,,arXiv,Farina2017,True,,arXiv,Not available,Regret Minimization in Behaviorally-Constrained Zero-Sum Games,5babe2c0fa2b5ef02f4a7f2209456adb,http://arxiv.org/abs/1711.03441v1 13061," Parity games have important practical applications in formal verification and synthesis, especially to solve the model-checking problem of the modal mu-calculus. They are also interesting from the theory perspective, as they are widely believed to admit a polynomial solution, but so far no such algorithm is known. In recent years, a number of new algorithms and improvements to existing algorithms have been proposed. We implement a new and easy to extend tool Oink, which is a high-performance implementation of modern parity game algorithms. We further present a comprehensive empirical evaluation of modern parity game algorithms and solvers, both on real world benchmarks and randomly generated games. Our experiments show that our new tool Oink outperforms the current state-of-the-art. ",tom dijk,,2018.0,10.1007/978-3-319-89960-2_16,arXiv,Dijk2018,True,,arXiv,Not available,Oink: an Implementation and Evaluation of Modern Parity Game Solvers,798900f82efc45a6eab3c2de952cc059,http://arxiv.org/abs/1801.03859v4 13062," Parity games have important practical applications in formal verification and synthesis, especially to solve the model-checking problem of the modal mu-calculus. They are also interesting from the theory perspective, because they are widely believed to admit a polynomial solution, but so far no such algorithm is known. We propose a new algorithm to solve parity games based on learning tangles, which are strongly connected subgraphs for which one player has a strategy to win all cycles in the subgraph. We argue that tangles play a fundamental role in the prominent parity game solving algorithms. We show that tangle learning is competitive in practice and the fastest solver for large random games. ",tom dijk,,2018.0,10.1007/978-3-319-96142-2_14,arXiv,Dijk2018,True,,arXiv,Not available,Attracting Tangles to Solve Parity Games,3856d9f664503049d6864ac44b8372e9,http://arxiv.org/abs/1804.01023v2 13063," Selten's game is a kidnapping model where the probability of capturing the kidnapper is independent of whether the hostage has been released or executed. Most often, in view of the elevated sensitivities involved, authorities put greater effort and resources into capturing the kidnapper if the hostage has been executed, in contrast to the case when a ransom is paid to secure the hostage's release. In this paper, we study the asymmetric game when the probability of capturing the kidnapper depends on whether the hostage has been executed or not and find a new uniquely determined perfect equilibrium point in Selten's game. ",derek abbott,,2017.0,,"Royal Society Open Science, Vol. 4, Art. No. 171484 (2017)",Iqbal2017,True,,arXiv,Not available,Kidnapping Model: An Extension of Selten's Game,cae8d6d2a568453a6f9529cd1fdccc16,http://arxiv.org/abs/1709.07623v1 13064," We present a method of backward induction for computing approximate subgame perfect Nash equilibria of infinitely repeated games with discounted payoffs. This uses the selection monad transformer, combined with the searchable set monad viewed as a notion of 'topologically compact' nondeterminism, and a simple model of computable real numbers. This is the first application of Escard\'o and Oliva's theory of higher-order sequential games to games of imperfect information, in which (as well as its mathematical elegance) lazy evaluation does nontrivial work for us compared with a traditional game-theoretic analysis. Since a full theoretical understanding of this method is lacking (and appears to be very hard), we consider this an 'experimental' paper heavily inspired by theoretical ideas. We use the famous Iterated Prisoner's Dilemma as a worked example. ",jules hedges,,2018.0,10.4204/EPTCS.275.5,"EPTCS 275, 2018, pp. 35-52",Hedges2018,True,,arXiv,Not available,Backward Induction for Repeated Games,e163ba9755fa0d27a1eabf79c5482a35,http://arxiv.org/abs/1804.07074v2 13065," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",samson abramsky,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 13066," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",viktor winschel,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 13067," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",tad hogg,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 13068," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",pavithra harsha,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 13069," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",kay-yut chen,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 13070," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",m. babaioff,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 13071," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",n. nisan,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 13072," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",nikhil devanur,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 13073," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",zhiyi huang,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 13074," Playing a Parrondo's game with a qutrit is the subject of this paper. We show that a true quantum Parrondo's game can be played with a 3 state coin(qutrit) in a 1D quantum walk in contrast to the fact that playing a true Parrondo's game with a 2 state coin(qubit) in 1D quantum walk fails in the asymptotic limits. ",jishnu rajendran,,2017.0,10.1209/0295-5075/122/40004,"EPL (Euro Physics Letters) 122, 40004 (2018)",Rajendran2017,True,,arXiv,Not available,Playing a true Parrondo's game with a three state coin on a quantum walk,40c71948dbe621c8de4d05aa424321b7,http://arxiv.org/abs/1710.04033v2 13075," Traditionally, the Bayesian optimal auction design problem has been considered either when the bidder values are i.i.d, or when each bidder is individually identifiable via her value distribution. The latter is a reasonable approach when the bidders can be classified into a few categories, but there are many instances where the classification of bidders is a continuum. For example, the classification of the bidders may be based on their annual income, their propensity to buy an item based on past behavior, or in the case of ad auctions, the click through rate of their ads. We introduce an alternate model that captures this aspect, where bidders are a priori identical, but can be distinguished based (only) on some side information the auctioneer obtains at the time of the auction. We extend the sample complexity approach of Dhangwatnotai et al. and Cole and Roughgarden to this model and obtain almost matching upper and lower bounds. As an aside, we obtain a revenue monotonicity lemma which may be of independent interest. We also show how to use Empirical Risk Minimization techniques to improve the sample complexity bound of Cole and Roughgarden for the non-identical but independent value distribution case. ",christos-alexandros psomas,,2015.0,,arXiv,Devanur2015,True,,arXiv,Not available,The Sample Complexity of Auctions with Side Information,3fac15599949349478761b0414f938ab,http://arxiv.org/abs/1511.02296v4 13076," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",amy greenwald,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 13077," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",takehiro oyakawa,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 13078," Myerson derived a simple and elegant solution to the single-parameter revenue-maximization problem in his seminal work on optimal auction design assuming the usual model of quasi-linear utilities. In this paper, we consider a slight generalization of this usual model---from linear to convex ""perceived"" payments. This more general problem does not appear to admit a solution as simple and elegant as Myerson's. While some of Myerson's results extend to our setting, like his payment formula (suitably adjusted), others do not. For example, we observe that the solutions to the Bayesian and the robust (i.e., non-Bayesian) optimal auction design problems in the convex perceived payment setting do not coincide like they do in the case of linear payments. We therefore study the two problems in turn. We derive an upper and a heuristic lower bound on expected revenue in our setting. These bounds are easily computed pointwise, and yield monotonic allocation rules, so can be supported by Myerson payments (suitably adjusted). In this way, our bounds yield heuristics that approximate the optimal robust auction, assuming convex perceived payments. We close with experiments, the final set of which massages the output of one of the closed-form heuristics for the robust problem into an extremely fast, near-optimal heuristic solution to the Bayesian optimal auction design problem. ",vasilis syrgkanis,,2016.0,,arXiv,Greenwald2016,True,,arXiv,Not available,Optimal Auctions with Convex Perceived Payments,f505f2386f98a6f522bf96a11c6e7f54,http://arxiv.org/abs/1601.07163v1 13079," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",moshe babaioff,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 13080," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",yannai gonczarowski,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 13081," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",noam nisan,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 13082," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",divya padmanabhan,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 13083," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",satyanath bhat,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 13084," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",prabuchandran j.,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 13085," Playing a Parrondo's game with a qutrit is the subject of this paper. We show that a true quantum Parrondo's game can be played with a 3 state coin(qutrit) in a 1D quantum walk in contrast to the fact that playing a true Parrondo's game with a 2 state coin(qubit) in 1D quantum walk fails in the asymptotic limits. ",colin benjamin,,2017.0,10.1209/0295-5075/122/40004,"EPL (Euro Physics Letters) 122, 40004 (2018)",Rajendran2017,True,,arXiv,Not available,Playing a true Parrondo's game with a three state coin on a quantum walk,40c71948dbe621c8de4d05aa424321b7,http://arxiv.org/abs/1710.04033v2 13086," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",shirish shevade,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 13087," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",y. narahari,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 13088," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",xiaoru zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 13089," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",lin gao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 13090," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",bin cao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 13091," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",zhang li,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 13092," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",mengjing wang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 13093," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",zhe feng,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 13094," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",chara podimata,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 13095," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",vasilis syrgkanis,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 13096," We study pure Nash equilibria in games on graphs with an imperfect monitoring based on a public signal. In such games, deviations and players responsible for those deviations can be hard to detect and track. We propose a generic epistemic game abstraction, which conveniently allows to represent the knowledge of the players about these deviations, and give a characterization of Nash equilibria in terms of winning strategies in the abstraction. We then use the abstraction to develop algorithms for some payoff functions. ",patricia bouyer,,2017.0,,arXiv,Bouyer2017,True,,arXiv,Not available,Games on graphs with a public signal monitoring,88f5b126ef9df00c84aa801c85391591,http://arxiv.org/abs/1710.07163v2 13097," Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists to approximate large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders. ",hamidou tembine,,2014.0,,arXiv,Tembine2014,True,,arXiv,Not available,Non-Asymptotic Mean-Field Games,a974311a1f2e668db7edfb68e9a175f0,http://arxiv.org/abs/1404.1449v1 13098," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",azhar iqbal,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 13099," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",james chappell,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 13100," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",derek abbott,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 13101," We introduce and study strongly truthful mechanisms and their applications. We use strongly truthful mechanisms as a tool for implementation in undominated strategies for several problems,including the design of externality resistant auctions and a variant of multi-dimensional scheduling. ",amos fiat,,2012.0,,arXiv,Fiat2012,True,,arXiv,Not available,"Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms",8383b75de6d91d7ab56907c841dd386b,http://arxiv.org/abs/1208.3939v1 13102," We introduce and study strongly truthful mechanisms and their applications. We use strongly truthful mechanisms as a tool for implementation in undominated strategies for several problems,including the design of externality resistant auctions and a variant of multi-dimensional scheduling. ",anna karlin,,2012.0,,arXiv,Fiat2012,True,,arXiv,Not available,"Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms",8383b75de6d91d7ab56907c841dd386b,http://arxiv.org/abs/1208.3939v1 13103," We introduce and study strongly truthful mechanisms and their applications. We use strongly truthful mechanisms as a tool for implementation in undominated strategies for several problems,including the design of externality resistant auctions and a variant of multi-dimensional scheduling. ",elias koutsoupias,,2012.0,,arXiv,Fiat2012,True,,arXiv,Not available,"Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms",8383b75de6d91d7ab56907c841dd386b,http://arxiv.org/abs/1208.3939v1 13104," We introduce and study strongly truthful mechanisms and their applications. We use strongly truthful mechanisms as a tool for implementation in undominated strategies for several problems,including the design of externality resistant auctions and a variant of multi-dimensional scheduling. ",angelina vidali,,2012.0,,arXiv,Fiat2012,True,,arXiv,Not available,"Approaching Utopia: Strong Truthfulness and Externality-Resistant Mechanisms",8383b75de6d91d7ab56907c841dd386b,http://arxiv.org/abs/1208.3939v1 13105," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",binyi chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13106," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",tao qin,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13107," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",amos fiat,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 13108," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",tie-yan liu,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13109," We study mechanisms that use greedy allocation rules and pay-your-bid pricing to allocate resources subject to a matroid constraint. We show that all such mechanisms obtain a constant fraction of the optimal welfare at any equilibrium of bidder behavior, via a smoothness argument. This unifies numerous recent results on the price of anarchy of simple auctions. Our results extend to polymatroid and matching constraints, and we discuss extensions to more general matroid intersections. ",brendan lucier,,2015.0,,arXiv,Lucier2015,True,,arXiv,Not available,Greedy Algorithms make Efficient Mechanisms,0ad115c61354e9fb800e34ee8b4e48a7,http://arxiv.org/abs/1503.05608v1 13110," We study mechanisms that use greedy allocation rules and pay-your-bid pricing to allocate resources subject to a matroid constraint. We show that all such mechanisms obtain a constant fraction of the optimal welfare at any equilibrium of bidder behavior, via a smoothness argument. This unifies numerous recent results on the price of anarchy of simple auctions. Our results extend to polymatroid and matching constraints, and we discuss extensions to more general matroid intersections. ",vasilis syrgkanis,,2015.0,,arXiv,Lucier2015,True,,arXiv,Not available,Greedy Algorithms make Efficient Mechanisms,0ad115c61354e9fb800e34ee8b4e48a7,http://arxiv.org/abs/1503.05608v1 13111," We consider the problem of maximizing revenue when selling 2 items to a single buyer with known valuation distributions. Hart and Nisan showed that selling each item separately using the optimal Myerson's price, gains at least half of the revenue attainable by optimal auction for two items. We show that in case the items have different revenues when sold separately the bound can be tightened. ",ron kupfer,,2017.0,,arXiv,Kupfer2017,True,,arXiv,Not available,A Note on Approximate Revenue Maximization with Two Items,d2c3ad83709cfa65fe4064890a59bfb2,http://arxiv.org/abs/1712.03518v1 13112," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",marco caminati,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 13113," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",manfred kerber,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 13114," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",colin rowat,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 13115," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",anna osepayshvili,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 13116," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",michael wellman,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 13117," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",daniel reeves,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 13118," Very few exact solutions are known for the monopolist's $k$-item $n$-buyer maximum revenue problem with additive valuation in which $k, n >1$ and the buyers $i$ have independent private distributions $F^j_i$ on items $j$. In this paper we derive exact formulas for the maximum revenue when $k=2$ and $F^j_i$ are any IID distributions on support of size 2, for both the dominant-strategy (DIC) and the Bayesian (BIC) implementations. The formulas lead to the simple characterization that, the two implementations have identical maximum revenue if and only if selling-separately is optimal for the distribution. Our results also give the first demonstration, in this setting, of revenue gaps between the two implementations. For instance, if $k=n=2$ and $Pr\{X_F=1\}=Pr\{X_F=2\}=\frac{1}{2}$, then the maximum revenue in the Bayesian implementation exceeds that in the dominant-strategy by exactly $2\%$; the same gap exists for the continuous uniform distribution $X_F$ over $[a, a+1]\cup[2a, 2a+1]$ for all large $a$. ",andrew yao,,2016.0,,arXiv,Yao2016,True,,arXiv,Not available,"On Solutions for the Maximum Revenue Multi-item Auction under Dominant-Strategy and Bayesian Implementations",46451b5ec34ae75977e7152d35093a4e,http://arxiv.org/abs/1607.03685v1 13119," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",stefano leonardi,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 13120," Simultaneous ascending auctions present agents with the exposure problem: bidding to acquire a bundle risks the possibility of obtaining an undesired subset of the goods. Auction theory provides little guidance for dealing with this problem. We present a new family of decisiontheoretic bidding strategies that use probabilistic predictions of final prices. We focus on selfconfirming price distribution predictions, which by definition turn out to be correct when all agents bid decision-theoretically based on them. Bidding based on these is provably not optimal in general, but our experimental evidence indicates the strategy can be quite effective compared to other known methods. ",jeffrey mackie-mason,,2012.0,,arXiv,Osepayshvili2012,True,,arXiv,Not available,"Self-Confirming Price Prediction for Bidding in Simultaneous Ascending Auctions",d1adda72aafd640bf3ab748aff347116,http://arxiv.org/abs/1207.1400v1 13121," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",nikhil devanur,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 13122," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",jason hartline,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 13123," We consider the provision of an abstract service to single-dimensional agents. Our model includes position auctions, single-minded combinatorial auctions, and constrained matching markets. When the agents' values are drawn from a distribution, the Bayesian optimal mechanism is given by Myerson (1981) as a virtual-surplus optimizer. We develop a framework for prior-free mechanism design and analysis. A good mechanism in our framework approximates the optimal mechanism for the distribution if there is a distribution; moreover, when there is no distribution this mechanism still performs well. We define and characterize optimal envy-free outcomes in symmetric single-dimensional environments. Our characterization mirrors Myerson's theory. Furthermore, unlike in mechanism design where there is no point-wise optimal mechanism, there is always a point-wise optimal envy-free outcome. Envy-free outcomes and incentive-compatible mechanisms are similar in structure and performance. We therefore use the optimal envy-free revenue as a benchmark for measuring the performance of a prior-free mechanism. A good mechanism is one that approximates the envy free benchmark on any profile of agent values. We show that good mechanisms exist, and in particular, a natural generalization of the random sampling auction of Goldberg et al. (2001) is a constant approximation. ",qiqi yan,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Envy Freedom and Prior-free Mechanism Design,5c015878b4037aed32535ad15bb84f5a,http://arxiv.org/abs/1212.3741v1 13124," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",tansu alpcan,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 13125," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",holger boche,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 13126," Mechanisms such as auctions and pricing schemes are utilized to design strategic (noncooperative) games for networked systems. Although the participating players are selfish, these mechanisms ensure that the game outcome is optimal with respect to a global criterion (e.g. maximizing a social welfare function), preference-compatible, and strategy-proof, i.e. players have no reason to deceive the designer. The mechanism designer achieves these objectives by introducing specific rules and incentives to the players; in this case by adding resource prices to their utilities. In auction-based mechanisms, the mechanism designer explicitly allocates the resources based on bids of the participants in addition to setting prices. Alternatively, pricing mechanisms enforce global objectives only by charging the players for the resources they have utilized. In either setting, the player preferences represented by utility functions may be coupled or decoupled, i.e. they depend on other player's actions or only on player's own actions, respectively. The unified framework and its information structures are illustrated through multiple example resource allocation problems from wireless and wired networks. ",siddharth naik,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,A Unified Mechanism Design Framework for Networked Systems,7285e55b3f07c69b5ed88aa13160bfb5,http://arxiv.org/abs/1009.0377v1 13127," The repeated posted price auction is a game with two players: the seller and the buyer. This game consists of rounds, indexed by natural numbers $i=1,2,\dots$, and in each round the seller proposes to the buyer a unit of good (think of fish or a place for advertisement) with the price $Q_i$. Let the buyer's valuation of this good be $q\in \mathbb R_{>0}$, we call $q$ the {\it type} of the buyer. In each round the buyer has two options: accept the deal (and then we set $a_i=1$) or reject it (we set $a_i=0$). In this round, the buyer's {\it surplus} is $a_i(q-Q_i)$ and the seller's {\it revenue} is $a_iQ_i$. I propose a strategy $S$ for the seller and argue why the resulting revenue is the best that the seller can achieve among a reasonable class of strategies. ",nikita kalinin,,2018.0,,arXiv,Kalinin2018,True,,arXiv,Not available,"New mechanism for repeated posted price auction with a strategic buyer without discounting",47266e0997c460353507fbf94b060f96,http://arxiv.org/abs/1806.02661v1 13128," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",riccardo colini-baldeschi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13129," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",paul goldberg,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13130," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",jared saia,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 13131," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",bart keijzer,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13132," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",stefano leonardi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13133," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",tim roughgarden,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13134," Mechanism design for one-sided markets has been investigated for several decades in economics and in computer science. More recently, there has been an increased attention on mechanisms for two-sided markets, in which buyers and sellers act strategically. For two-sided markets, an impossibility result of Myerson and Satterthwaite states that no mechanism can simultaneously satisfy individual rationality (IR), incentive compatibility (IC), strong budget-balance (SBB), and be efficient. On the other hand, important applications to web advertisement, stock exchange, and frequency spectrum allocation, require us to consider two-sided combinatorial auctions in which buyers have preferences on subsets of items, and sellers may offer multiple heterogeneous items. No efficient mechanism was known so far for such two-sided combinatorial markets. This work provides the first IR, IC and SBB mechanisms that provides an O(1)-approximation to the optimal social welfare for two-sided markets. An initial construction yields such a mechanism, but exposes a conceptual problem in the traditional SBB notion. This leads us to define the stronger notion of direct trade strong budget balance (DSBB). We then proceed to design mechanisms that are IR, IC, DSBB, and again provide an O(1)-approximation to the optimal social welfare. Our mechanisms work for any number of buyers with XOS valuations - a class in between submodular and subadditive functions - and any number of sellers. We provide a mechanism that is dominant strategy incentive compatible (DSIC) if the sellers each have one item for sale, and one that is bayesian incentive compatible (BIC) if sellers hold multiple items and have additive valuations over them. Finally, we present a DSIC mechanism for the case that the valuation functions of all buyers and sellers are additive. ",stefano turchetta,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Approximately Efficient Two-Sided Combinatorial Auctions,4ae0f80ff03f8846ec3d70a25751d1a7,http://arxiv.org/abs/1611.05342v1 13135," In this paper, we study behavior of bidders in an experimental launch of a new advertising auction platform by Zillow, as Zillow switched from negotiated contracts to using auctions in several geographically isolated markets. A unique feature of this experiment is that the bidders in this market are real estate agents that bid on their own behalf, not using third-party intermediaries. To help bidders, Zillow also provided a recommendation tool that suggested a bid for each bidder. Our main focus in this paper is on the decisions of bidders whether or not to adopt the platform-provided bid recommendation. We observe that a significant proportion of bidders do not use the recommended bid. Using the bid history of the agents we infer their value, and compare the agents' regret with their actual bidding history with results they would have obtained following the recommendation. We find that for half of the agents not following the recommendation, the increased effort of experimenting with alternate bids results in increased regret, i.e., they get decreased net value out of the system. The proportion of agents not following the recommendation slowly declines as markets mature, but it remains large in most markets that we observe. We argue that the main reason for this phenomenon is the lack of trust in the platform-provided tool. Our work provides an empirical insight into possible design choices for auction-based online advertising platforms. While search advertising platforms (such as Google or Bing) allow bidders to submit bids on their own, many display advertising platforms (such as Facebook) optimize bids on bidders' behalf and eliminate the need for bids. Our empirical analysis shows that the latter approach is preferred for markets where bidders are individuals, who don't have access to third party tools, and who may question the fairness of platform-provided suggestions. ",pooya jalaly,,2017.0,,arXiv,Jalaly2017,True,,arXiv,Not available,Learning and Trust in Auction Markets,acc5361d6dba9a7a354a198039c86467,http://arxiv.org/abs/1703.10672v1 13136," In this paper, we study behavior of bidders in an experimental launch of a new advertising auction platform by Zillow, as Zillow switched from negotiated contracts to using auctions in several geographically isolated markets. A unique feature of this experiment is that the bidders in this market are real estate agents that bid on their own behalf, not using third-party intermediaries. To help bidders, Zillow also provided a recommendation tool that suggested a bid for each bidder. Our main focus in this paper is on the decisions of bidders whether or not to adopt the platform-provided bid recommendation. We observe that a significant proportion of bidders do not use the recommended bid. Using the bid history of the agents we infer their value, and compare the agents' regret with their actual bidding history with results they would have obtained following the recommendation. We find that for half of the agents not following the recommendation, the increased effort of experimenting with alternate bids results in increased regret, i.e., they get decreased net value out of the system. The proportion of agents not following the recommendation slowly declines as markets mature, but it remains large in most markets that we observe. We argue that the main reason for this phenomenon is the lack of trust in the platform-provided tool. Our work provides an empirical insight into possible design choices for auction-based online advertising platforms. While search advertising platforms (such as Google or Bing) allow bidders to submit bids on their own, many display advertising platforms (such as Facebook) optimize bids on bidders' behalf and eliminate the need for bids. Our empirical analysis shows that the latter approach is preferred for markets where bidders are individuals, who don't have access to third party tools, and who may question the fairness of platform-provided suggestions. ",denis nekipelov,,2017.0,,arXiv,Jalaly2017,True,,arXiv,Not available,Learning and Trust in Auction Markets,acc5361d6dba9a7a354a198039c86467,http://arxiv.org/abs/1703.10672v1 13137," In this paper, we study behavior of bidders in an experimental launch of a new advertising auction platform by Zillow, as Zillow switched from negotiated contracts to using auctions in several geographically isolated markets. A unique feature of this experiment is that the bidders in this market are real estate agents that bid on their own behalf, not using third-party intermediaries. To help bidders, Zillow also provided a recommendation tool that suggested a bid for each bidder. Our main focus in this paper is on the decisions of bidders whether or not to adopt the platform-provided bid recommendation. We observe that a significant proportion of bidders do not use the recommended bid. Using the bid history of the agents we infer their value, and compare the agents' regret with their actual bidding history with results they would have obtained following the recommendation. We find that for half of the agents not following the recommendation, the increased effort of experimenting with alternate bids results in increased regret, i.e., they get decreased net value out of the system. The proportion of agents not following the recommendation slowly declines as markets mature, but it remains large in most markets that we observe. We argue that the main reason for this phenomenon is the lack of trust in the platform-provided tool. Our work provides an empirical insight into possible design choices for auction-based online advertising platforms. While search advertising platforms (such as Google or Bing) allow bidders to submit bids on their own, many display advertising platforms (such as Facebook) optimize bids on bidders' behalf and eliminate the need for bids. Our empirical analysis shows that the latter approach is preferred for markets where bidders are individuals, who don't have access to third party tools, and who may question the fairness of platform-provided suggestions. ",eva tardos,,2017.0,,arXiv,Jalaly2017,True,,arXiv,Not available,Learning and Trust in Auction Markets,acc5361d6dba9a7a354a198039c86467,http://arxiv.org/abs/1703.10672v1 13138," The idea of this paper is an advanced game concept. This concept is expected to model non-monetary bilateral cooperations between self-interested agents. Such non-monetary cases are social cooperations like allocation of high level jobs or sexual relationships among humans. In a barter double auction, there is a big amount of agents. Every agent has a vector of parameters which specifies his demand and a vector which specifies his offer. Two agents can achieve a commitment through barter exchange. The subjective satisfaction level (a number between 0% and 100%) of an agent is as high as small is the distance between his demand and the accepted offer. This paper introduces some facets of this complex game concept. ",rustam tagiew,,2009.0,,arXiv,Tagiew2009,True,,arXiv,Not available,Towards Barter Double Auction as Model for Bilateral Social Cooperations,c981e51ee87f644962b38c95e56cff71,http://arxiv.org/abs/0905.3709v1 13139," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",michael wellman,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13140," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",eric sodomka,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13141," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",piotr sankowski,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 13142," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",amy greenwald,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13143," This paper has been withdrawn by the author. ",riccardo baldeschi,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 13144," This paper has been withdrawn by the author. ",stefano leonardi,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 13145," This paper has been withdrawn by the author. ",guido schaefer,,2011.0,,arXiv,Baldeschi2011,True,,arXiv,Not available,Multi-Unit Auction with Diminishing Marginal Valuations and Capacities,36ea3c99f284c1e4d0bb4cbd68375dcf,http://arxiv.org/abs/1108.6033v3 13146," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",sang jung,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 13147," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seung yu,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 13148," We study bidding and pricing competition between two spiteful mobile network operators (MNOs) with considering their existing spectrum holdings. Given asymmetric-valued spectrum blocks are auctioned off to them via a first-price sealed-bid auction, we investigate the interactions between two spiteful MNOs and users as a three-stage dynamic game and characterize the dynamic game's equilibria. We show an asymmetric pricing structure and different market share between two spiteful MNOs. Perhaps counter-intuitively, our results show that the MNO who acquires the less-valued spectrum block always lowers his service price despite providing double-speed LTE service to users. We also show that the MNO who acquires the high-valued spectrum block, despite charing a higher price, still achieves more market share than the other MNO. We further show that the competition between two MNOs leads to some loss of their revenues. By investigating a cross-over point at which the MNOs' profits are switched, it serves as the benchmark of practical auction designs. ",seong-lyun kim,,2013.0,,arXiv,Jung2013,True,,arXiv,Not available,"Asymmetric-valued Spectrum Auction and Competition in Wireless Broadband Services",853bf41e24e2a8012860aebabf51afd8,http://arxiv.org/abs/1307.7838v2 13149," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",mehrdad khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 13150," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",alhussein abouzeid,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 13151," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",gabriele farina,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 13152," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",j. bredin,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 13153," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",nicola gatti,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 13154," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",chenyang li,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 13155," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",mingyi hong,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 13156," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",randy cogill,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 13157," Sponsored search becomes an easy platform to match potential consumers' intent with merchants' advertising. Advertisers express their willingness to pay for each keyword in terms of bids to the search engine. When a user's query matches the keyword, the search engine evaluates the bids and allocates slots to the advertisers that are displayed along side the unpaid algorithmic search results. The advertiser only pays the search engine when its ad is clicked by the user and the price-per-click is determined by the bids of other competing advertisers. ",alfredo garcia,,2012.0,,arXiv,Li2012,True,,arXiv,Not available,An Adaptive Online Ad Auction Scoring Algorithm for Revenue Maximization,6f63c6ecc0dec5709c5b80510a40b171,http://arxiv.org/abs/1207.4701v1 13158," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",shahar dobzinski,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 13159," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",hu fu,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 13160," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",robert kleinberg,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 13161," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",gianluca brero,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 13162," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sebastien lahaie,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 13163," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",q. duong,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 13164," Iterative combinatorial auctions (CAs) are often used in multi-billion dollar domains like spectrum auctions, and speed of convergence is one of the crucial factors behind the choice of a specific design for practical applications. To achieve fast convergence, current CAs require careful tuning of the price update rule to balance convergence speed and allocative efficiency. Brero and Lahaie (2018) recently introduced a Bayesian iterative auction design for settings with single-minded bidders. The Bayesian approach allowed them to incorporate prior knowledge into the price update algorithm, reducing the number of rounds to convergence with minimal parameter tuning. In this paper, we generalize their work to settings with no restrictions on bidder valuations. We introduce a new Bayesian CA design for this general setting which uses Monte Carlo Expectation Maximization to update prices at each round of the auction. We evaluate our approach via simulations on CATS instances. Our results show that our Bayesian CA outperforms even a highly optimized benchmark in terms of clearing percentage and convergence speed. ",sven seuken,,2018.0,,arXiv,Brero2018,True,,arXiv,Not available,Fast Iterative Combinatorial Auctions via Bayesian Learning,698f5d90f27454349d6b7ebc6d9c5f2e,http://arxiv.org/abs/1809.05340v2 13165," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 13166," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 13167," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 13168," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",saeed alaei,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13169," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",hu fu,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13170," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",nima haghpanah,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13171," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",jason hartline,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13172," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",soheil ehsani,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 13173," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",mohammadtaghi hajiaghayi,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 13174," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",d. parkes,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 13175," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",thomas kesselheim,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 13176," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",sahil singla,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 13177," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",gagan aggarwal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 13178," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",s. muthukrishnan,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 13179," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",david pal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 13180," In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice. A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions. We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences. ",martin pal,,2008.0,,arXiv,Aggarwal2008,True,,arXiv,Not available,General Auction Mechanism for Search Advertising,a286ecd6c2c9dd4b6fbdd7b607cb3350,http://arxiv.org/abs/0807.1297v1 13181," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",eyal even-dar,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 13182," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",yishay mansour,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 13183," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",vahab mirrokni,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 13184," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",s. muthukrishnan,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 13185," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",michal feldman,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 13186," Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions. ",uri nadav,,2009.0,,arXiv,Even-dar2009,True,,arXiv,Not available,Bid Optimization in Broad-Match Ad auctions,fddd044784ae56f5bd06d2b879ec63a7,http://arxiv.org/abs/0901.3754v1 13187," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",vineet abhishek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13188," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",bruce hajek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13189," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",steven williams,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13190," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",m. babaioff,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 13191," With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue. ",n. nisan,,2011.0,10.1613/jair.1316,"Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004",Babaioff2011,True,,arXiv,Not available,Concurrent Auctions Across The Supply Chain,a9de7523ad1c47d61dc0ca713b0d5cbe,http://arxiv.org/abs/1107.0028v1 13192," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 13193," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",jan vondrak,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 13194," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",shahar dobzinski,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 13195," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",renato leme,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 13196," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",hu fu,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 13197," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",m. faqiry,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 13198," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",sanjoy das,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 13199," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",gagan goel,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 13200," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",chinmay karande,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 13201," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",lei wang,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 13202," Recent spectrum auctions in the United Kingdom, and some proposals for future auctions of spectrum in the United States, are based on preliminary price discovery rounds, followed by calculation of final prices for the winning buyers. For example, the prices could be the projection of Vikrey prices onto the core of reported prices. The use of Vikrey prices should lead to more straightforward bidding, but the projection reverses some of the incentive for bidders to report truthfully. Still, we conjecture that the price paid by a winning buyer increases no faster than the bid, as in a first price auction. It would be rather disturbing if the conjecture is false. The conjecture is established for a buyer interacting with disjoint groups of other buyers in a star network setting. It is also shown that for any core-selecting payment rule and any integer w greater than or equal to two, there is a market setting with w winning buyers such that the price paid by some winning buyer increases at least (1-1/w) times as fast as the price bid. ",vineet abhishek,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,On the Incentive to Deviate in Core Selecting Combinatorial Auctions,4b16f9d3475848175cc78db76d8b9138,http://arxiv.org/abs/1209.2131v1 13203," Recent spectrum auctions in the United Kingdom, and some proposals for future auctions of spectrum in the United States, are based on preliminary price discovery rounds, followed by calculation of final prices for the winning buyers. For example, the prices could be the projection of Vikrey prices onto the core of reported prices. The use of Vikrey prices should lead to more straightforward bidding, but the projection reverses some of the incentive for bidders to report truthfully. Still, we conjecture that the price paid by a winning buyer increases no faster than the bid, as in a first price auction. It would be rather disturbing if the conjecture is false. The conjecture is established for a buyer interacting with disjoint groups of other buyers in a star network setting. It is also shown that for any core-selecting payment rule and any integer w greater than or equal to two, there is a market setting with w winning buyers such that the price paid by some winning buyer increases at least (1-1/w) times as fast as the price bid. ",bruce hajek,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,On the Incentive to Deviate in Core Selecting Combinatorial Auctions,4b16f9d3475848175cc78db76d8b9138,http://arxiv.org/abs/1209.2131v1 13204," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",wenkui ding,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 13205," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tao wu,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 13206," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tao qin,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 13207," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",nick gravin,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 13208," The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation. ",tie-yan liu,,2013.0,,arXiv,Ding2013,True,,arXiv,Not available,Pure Price of Anarchy for Generalized Second Price Auction,888d14a291ca172734368475b7e23927,http://arxiv.org/abs/1305.5404v1 13209," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",yu-e sun,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13210," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",he huang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13211," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",xiang-yang li,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13212," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",zhili chen,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13213," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",wei yang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13214," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",hongli xu,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13215," In this work, we study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, our goal is to design truthful mechanisms that will either maximize the social efficiency or maximize the revenue of the primary user. As the optimal conflict-free spectrum allocation problem is NP-hard, in this work, we design near optimal spectrum allocation mechanisms separately based on the following techniques: derandomized allocation from integer programming formulation, its linear programming (LP) relaxation, and the dual of the LP. We theoretically prove that 1) our near optimal allocation methods are bid monotone, which implys truthful auction mechanisms; and 2) our near optimal allocation methods can achieve a social efficiency or a revenue that is at least $1-\frac{1}{e}$ times of the optimal respectively. At last, we conduct extensive simulations to study the performances (social efficiency, revenue) of the proposed methods, and the simulation results corroborate our theoretical analysis. ",liusheng huang,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets,a40b632d0c3044a28e31f8e1efec785f,http://arxiv.org/abs/1305.6390v1 13216," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",paul duetting,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13217," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",felix fischer,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13218," Simultaneous item auctions are simple procedures for allocating items to bidders with potentially complex preferences over different item sets. In a simultaneous auction, every bidder submits bids on all items simultaneously. The allocation and prices are then resolved for each item separately, based solely on the bids submitted on that item. Such procedures occur in practice (e.g. eBay) but are not truthful. We study the efficiency of Bayesian Nash equilibrium (BNE) outcomes of simultaneous first- and second-price auctions when bidders have complement-free (a.k.a. subadditive) valuations. We show that the expected social welfare of any BNE is at least 1/2 of the optimal social welfare in the case of first-price auctions, and at least 1/4 in the case of second-price auctions. These results improve upon the previously-known logarithmic bounds, which were established by [Hassidim, Kaplan, Mansour and Nisan '11] for first-price auctions and by [Bhawalkar and Roughgarden '11] for second-price auctions. ",brendan lucier,,2012.0,,arXiv,Feldman2012,True,,arXiv,Not available,Simultaneous Auctions are (almost) Efficient,42ba98785b3ff0843d89e8983e25dfc3,http://arxiv.org/abs/1209.4703v1 13219," Since economic mechanisms are often applied to very different instances of the same problem, it is desirable to identify mechanisms that work well in a wide range of circumstances. We pursue this goal for a position auction setting and specifically seek mechanisms that guarantee good outcomes under both complete and incomplete information. A variant of the generalized first-price mechanism with multi-dimensional bids turns out to be the only standard mechanism able to achieve this goal, even when types are one-dimensional. The fact that expressiveness beyond the type space is both necessary and sufficient for this kind of robustness provides an interesting counterpoint to previous work on position auctions that has highlighted the benefits of simplicity. From a technical perspective our results are interesting because they establish equilibrium existence for a multi-dimensional bid space, where standard techniques break down. The structure of the equilibrium bids moreover provides an intuitive explanation for why first-price payments may be able to support equilibria in a wider range of circumstances than second-price payments. ",david parkes,,2013.0,,arXiv,Duetting2013,True,,arXiv,Not available,Expressiveness and Robustness of First-Price Position Auctions,aed81ed9bcb24eb28e6597a4fe0f4573,http://arxiv.org/abs/1307.5216v1 13220," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",zhili chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13221," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",liusheng huang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13222," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",lu li,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13223," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",wei yang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13224," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",haibo miao,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13225," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",miaomiao tian,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13226," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",fei wang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 13227," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",he huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 13228," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",xiang-yang li,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 13229," Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome. ",zhiwen hu,,2016.0,,arXiv,Hu2016,True,,arXiv,Not available,"Caching as a Service: Small-cell Caching Mechanism Design for Service Providers",b5bdc93c08a0df3a20dc1c2b4eb1e2ab,http://arxiv.org/abs/1607.04894v1 13230," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",jamie morgenstern,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 13231," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",yu-e sun,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 13232," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",hongli xu,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 13233," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",liusheng huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 13234," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",kareem amin,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13235," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",afshin rostamizadeh,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13236," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",umar syed,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13239," One of the proposed solutions to the equilibrium selection problem for agents learning in repeated games is obtained via the notion of stochastic stability. Learning algorithms are perturbed so that the Markov chain underlying the learning dynamics is necessarily irreducible and yields a unique stable distribution. The stochastically stable distribution is the limit of these stable distributions as the perturbation rate tends to zero. We present the first exact algorithm for computing the stochastically stable distribution of a Markov chain. We use our algorithm to predict the long-term dynamics of simple learning algorithms in sample repeated games. ",john wicks,,2012.0,,arXiv,Wicks2012,True,,arXiv,Not available,"An Algorithm for Computing Stochastically Stable Distributions with Applications to Multiagent Learning in Repeated Games",3d66c8bf17a8cd16230a3b7337eb2744,http://arxiv.org/abs/1207.1424v1 13240," One of the proposed solutions to the equilibrium selection problem for agents learning in repeated games is obtained via the notion of stochastic stability. Learning algorithms are perturbed so that the Markov chain underlying the learning dynamics is necessarily irreducible and yields a unique stable distribution. The stochastically stable distribution is the limit of these stable distributions as the perturbation rate tends to zero. We present the first exact algorithm for computing the stochastically stable distribution of a Markov chain. We use our algorithm to predict the long-term dynamics of simple learning algorithms in sample repeated games. ",amy greenwald,,2012.0,,arXiv,Wicks2012,True,,arXiv,Not available,"An Algorithm for Computing Stochastically Stable Distributions with Applications to Multiagent Learning in Repeated Games",3d66c8bf17a8cd16230a3b7337eb2744,http://arxiv.org/abs/1207.1424v1 13241," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",tim roughgarden,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 13242," The Eisert et al. maximally entangled quantum game is studied within the framework of (elementary) group theory. It is shown that the game can be described in terms of real Hilbert space of states. It is also shown that the crucial properties of the maximally entangled case, like quaternionic structure and the existence, to any given strategy, the corresponding counterstrategy, result from the existence of large stability subgroup of initial state of the game. ",katarzyna bolonek-lason,,2012.0,10.1093/ptep/ptt050,arXiv,Bolonek-Lason2012,True,,arXiv,Not available,Some properties of maximally entangled ELW game,eb2293fc45281b820317dcc363205a31,http://arxiv.org/abs/1209.2556v2 13243," The Eisert et al. maximally entangled quantum game is studied within the framework of (elementary) group theory. It is shown that the game can be described in terms of real Hilbert space of states. It is also shown that the crucial properties of the maximally entangled case, like quaternionic structure and the existence, to any given strategy, the corresponding counterstrategy, result from the existence of large stability subgroup of initial state of the game. ",piotr kosinski,,2012.0,10.1093/ptep/ptt050,arXiv,Bolonek-Lason2012,True,,arXiv,Not available,Some properties of maximally entangled ELW game,eb2293fc45281b820317dcc363205a31,http://arxiv.org/abs/1209.2556v2 13244," In order to assess TV whitespace access scenarios, three oligopoly game models are considered and reformulated in terms of radio access: Cournot, Stackelberg, and Bertrand. Besides revisiting the relevance of Nash and Pareto equilibria, a new equilibrium concept, the joint Nash-Pareto equilibrium, is considered. An evolutionary game equilibria detection method is used. The analysis of the simulation results brings relevant insights on the issue of autonomy vs. regulation in emerging cognitive radio environments. ",ligia cremene,,2012.0,,arXiv,Cremene2012,True,,arXiv,Not available,Game Theoretical Modelling for Dynamic Spectrum Access in TV Whitespace,214f8126e561c874739b164e0f4a5f92,http://arxiv.org/abs/1209.5387v1 13245," In order to assess TV whitespace access scenarios, three oligopoly game models are considered and reformulated in terms of radio access: Cournot, Stackelberg, and Bertrand. Besides revisiting the relevance of Nash and Pareto equilibria, a new equilibrium concept, the joint Nash-Pareto equilibrium, is considered. An evolutionary game equilibria detection method is used. The analysis of the simulation results brings relevant insights on the issue of autonomy vs. regulation in emerging cognitive radio environments. ",d. dumitrescu,,2012.0,,arXiv,Cremene2012,True,,arXiv,Not available,Game Theoretical Modelling for Dynamic Spectrum Access in TV Whitespace,214f8126e561c874739b164e0f4a5f92,http://arxiv.org/abs/1209.5387v1 13246," In order to assess TV whitespace access scenarios, three oligopoly game models are considered and reformulated in terms of radio access: Cournot, Stackelberg, and Bertrand. Besides revisiting the relevance of Nash and Pareto equilibria, a new equilibrium concept, the joint Nash-Pareto equilibrium, is considered. An evolutionary game equilibria detection method is used. The analysis of the simulation results brings relevant insights on the issue of autonomy vs. regulation in emerging cognitive radio environments. ",reka nagy,,2012.0,,arXiv,Cremene2012,True,,arXiv,Not available,Game Theoretical Modelling for Dynamic Spectrum Access in TV Whitespace,214f8126e561c874739b164e0f4a5f92,http://arxiv.org/abs/1209.5387v1 13247," In order to assess TV whitespace access scenarios, three oligopoly game models are considered and reformulated in terms of radio access: Cournot, Stackelberg, and Bertrand. Besides revisiting the relevance of Nash and Pareto equilibria, a new equilibrium concept, the joint Nash-Pareto equilibrium, is considered. An evolutionary game equilibria detection method is used. The analysis of the simulation results brings relevant insights on the issue of autonomy vs. regulation in emerging cognitive radio environments. ",marcel cremene,,2012.0,,arXiv,Cremene2012,True,,arXiv,Not available,Game Theoretical Modelling for Dynamic Spectrum Access in TV Whitespace,214f8126e561c874739b164e0f4a5f92,http://arxiv.org/abs/1209.5387v1 13248," We introduce a new mean field kinetic model for systems of rational agents interacting in a game theoretical framework. This model is inspired from non-cooperative anonymous games with a continuum of players and Mean-Field Games. The large time behavior of the system is given by a macroscopic closure with a Nash equilibrium serving as the local thermodynamic equilibrium. An application of the presented theory to a social model (herding behavior) is discussed. ",pierre degond,,2012.0,,arXiv,Degond2012,True,,arXiv,Not available,"A Nash equilibrium macroscopic closure for kinetic models coupled with Mean-Field Games",188c247125be63c1a45defc7f5037b8c,http://arxiv.org/abs/1212.6130v1 13249," We introduce a new mean field kinetic model for systems of rational agents interacting in a game theoretical framework. This model is inspired from non-cooperative anonymous games with a continuum of players and Mean-Field Games. The large time behavior of the system is given by a macroscopic closure with a Nash equilibrium serving as the local thermodynamic equilibrium. An application of the presented theory to a social model (herding behavior) is discussed. ",jian-guo liu,,2012.0,,arXiv,Degond2012,True,,arXiv,Not available,"A Nash equilibrium macroscopic closure for kinetic models coupled with Mean-Field Games",188c247125be63c1a45defc7f5037b8c,http://arxiv.org/abs/1212.6130v1 13250," We introduce a new mean field kinetic model for systems of rational agents interacting in a game theoretical framework. This model is inspired from non-cooperative anonymous games with a continuum of players and Mean-Field Games. The large time behavior of the system is given by a macroscopic closure with a Nash equilibrium serving as the local thermodynamic equilibrium. An application of the presented theory to a social model (herding behavior) is discussed. ",christian ringhofer,,2012.0,,arXiv,Degond2012,True,,arXiv,Not available,"A Nash equilibrium macroscopic closure for kinetic models coupled with Mean-Field Games",188c247125be63c1a45defc7f5037b8c,http://arxiv.org/abs/1212.6130v1 13251," Distributed decision-makers are modeled as players in a game with two levels. High level decisions concern the game environment and determine the willingness of the players to form a coalition (or group). Low level decisions involve the actions to be implemented within the chosen environment. Coalition and action strategies are determined by probability distributions, which are updated using learning automata schemes. The payoffs are also probabilistic and there is uncertainty in the state vector since information is delayed. The goal is to reach equilibrium in both levels of decision making; the results show the conditions for instability, based on the age of information. ",edward billard,,2013.0,,arXiv,Billard2013,True,,arXiv,Not available,Learning in Multi-level Stochastic games with Delayed Information,efad2cf7761f5306c2f71d280e86b02d,http://arxiv.org/abs/1302.6790v1 13252," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",michael wellman,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13253," We introduce the notion of exchangeable equilibria of a symmetric bimatrix game, defined as those correlated equilibria in which players' strategy choices are conditionally independently and identically distributed given some hidden variable. We give several game-theoretic interpretations and a version of the ""revelation principle"". Geometrically, the set of exchangeable equilibria is convex and lies between the symmetric Nash equilibria and the symmetric correlated equilibria. Exchangeable equilibria can achieve higher expected utility than symmetric Nash equilibria. ",noah stein,,2013.0,,arXiv,Stein2013,True,,arXiv,Not available,"Exchangeable Equilibria, Part I: Symmetric Bimatrix Games",de4cb8d8b6069d3b17d3db69db67a804,http://arxiv.org/abs/1307.3586v3 13254," We introduce the notion of exchangeable equilibria of a symmetric bimatrix game, defined as those correlated equilibria in which players' strategy choices are conditionally independently and identically distributed given some hidden variable. We give several game-theoretic interpretations and a version of the ""revelation principle"". Geometrically, the set of exchangeable equilibria is convex and lies between the symmetric Nash equilibria and the symmetric correlated equilibria. Exchangeable equilibria can achieve higher expected utility than symmetric Nash equilibria. ",asuman ozdaglar,,2013.0,,arXiv,Stein2013,True,,arXiv,Not available,"Exchangeable Equilibria, Part I: Symmetric Bimatrix Games",de4cb8d8b6069d3b17d3db69db67a804,http://arxiv.org/abs/1307.3586v3 13255," We introduce the notion of exchangeable equilibria of a symmetric bimatrix game, defined as those correlated equilibria in which players' strategy choices are conditionally independently and identically distributed given some hidden variable. We give several game-theoretic interpretations and a version of the ""revelation principle"". Geometrically, the set of exchangeable equilibria is convex and lies between the symmetric Nash equilibria and the symmetric correlated equilibria. Exchangeable equilibria can achieve higher expected utility than symmetric Nash equilibria. ",pablo parrilo,,2013.0,,arXiv,Stein2013,True,,arXiv,Not available,"Exchangeable Equilibria, Part I: Symmetric Bimatrix Games",de4cb8d8b6069d3b17d3db69db67a804,http://arxiv.org/abs/1307.3586v3 13256," We introduce a new class of games where each player's aim is to randomise her strategic choices in order to affect the other players' expectations aside from her own. The way each player intends to exert this influence is expressed through a Boolean combination of polynomial equalities and inequalities with rational coefficients. We offer a logical representation of these games as well as a computational study of the existence of equilibria. ",lluis godo,,2014.0,10.4204/EPTCS.146.2,"EPTCS 146, 2014, pp. 9-15",Godo2014,True,,arXiv,Not available,Games for the Strategic Influence of Expectations,aa0500c6086709dbc97ae595d23c7cff,http://arxiv.org/abs/1404.0835v1 13257," We introduce a new class of games where each player's aim is to randomise her strategic choices in order to affect the other players' expectations aside from her own. The way each player intends to exert this influence is expressed through a Boolean combination of polynomial equalities and inequalities with rational coefficients. We offer a logical representation of these games as well as a computational study of the existence of equilibria. ",enrico marchioni,,2014.0,10.4204/EPTCS.146.2,"EPTCS 146, 2014, pp. 9-15",Godo2014,True,,arXiv,Not available,Games for the Strategic Influence of Expectations,aa0500c6086709dbc97ae595d23c7cff,http://arxiv.org/abs/1404.0835v1 13258," Exploiting the algebraic structure of the set of bimatrix games, a divide-and-conquer algorithm for finding Nash equilibria is proposed. The algorithm is fixed-parameter tractable with the size of the largest irreducible component of a game as parameter. An implementation of the algorithm is shown to yield a significant performance increase on inputs with small parameters. ",xiang jiang,,2014.0,10.4204/EPTCS.146.10,"EPTCS 146, 2014, pp. 75-81",Jiang2014,True,,arXiv,Not available,Efficient Decomposition of Bimatrix Games (Extended Abstract),2dfd04093400c8fbe05409ccad99f2b5,http://arxiv.org/abs/1404.0842v1 13259," Exploiting the algebraic structure of the set of bimatrix games, a divide-and-conquer algorithm for finding Nash equilibria is proposed. The algorithm is fixed-parameter tractable with the size of the largest irreducible component of a game as parameter. An implementation of the algorithm is shown to yield a significant performance increase on inputs with small parameters. ",arno pauly,,2014.0,10.4204/EPTCS.146.10,"EPTCS 146, 2014, pp. 75-81",Jiang2014,True,,arXiv,Not available,Efficient Decomposition of Bimatrix Games (Extended Abstract),2dfd04093400c8fbe05409ccad99f2b5,http://arxiv.org/abs/1404.0842v1 13260," In this paper we compare two solution concepts for general multicriteria zero-sum matrix games: minimax and Pareto-optimal security payoff vectors. We characterize the two criteria based on properties similar to the ones that have been used in the corresponding counterparts in the single criterion case, although they need to be complemented with two new consistency properties. Whereas in standard single criterion games minimax and optimal security payffs coincide, whenever we have multiple criteria these two solution concepts differ. We provide explanations for the common roots of these two concepts and highlight the intrinsic differences between them. ",justo puerto,,2014.0,,arXiv,Puerto2014,True,,arXiv,Not available,On two solution concepts in a class of multicriteria games,57294e0654f5297b2fac51ec7260981d,http://arxiv.org/abs/1405.3176v2 13261," In this paper we compare two solution concepts for general multicriteria zero-sum matrix games: minimax and Pareto-optimal security payoff vectors. We characterize the two criteria based on properties similar to the ones that have been used in the corresponding counterparts in the single criterion case, although they need to be complemented with two new consistency properties. Whereas in standard single criterion games minimax and optimal security payffs coincide, whenever we have multiple criteria these two solution concepts differ. We provide explanations for the common roots of these two concepts and highlight the intrinsic differences between them. ",federico perea,,2014.0,,arXiv,Puerto2014,True,,arXiv,Not available,On two solution concepts in a class of multicriteria games,57294e0654f5297b2fac51ec7260981d,http://arxiv.org/abs/1405.3176v2 13262," The $\varepsilon$-well-supported Nash equilibrium is a strong notion of approximation of a Nash equilibrium, where no player has an incentive greater than $\varepsilon$ to deviate from any of the pure strategies that she uses in her mixed strategy. The smallest constant $\varepsilon$ currently known for which there is a polynomial-time algorithm that computes an $\varepsilon$-well-supported Nash equilibrium in bimatrix games is slightly below $2/3$. In this paper we study this problem for symmetric bimatrix games and we provide a polynomial-time algorithm that gives a $(1/2+\delta)$-well-supported Nash equilibrium, for an arbitrarily small positive constant $\delta$. ",artur czumaj,,2014.0,,arXiv,Czumaj2014,True,,arXiv,Not available,Approximate well-supported Nash equilibria in symmetric bimatrix games,3cf72403b1ce8ed865cd96b1649f039f,http://arxiv.org/abs/1407.3004v1 13263," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",eric sodomka,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13264," The $\varepsilon$-well-supported Nash equilibrium is a strong notion of approximation of a Nash equilibrium, where no player has an incentive greater than $\varepsilon$ to deviate from any of the pure strategies that she uses in her mixed strategy. The smallest constant $\varepsilon$ currently known for which there is a polynomial-time algorithm that computes an $\varepsilon$-well-supported Nash equilibrium in bimatrix games is slightly below $2/3$. In this paper we study this problem for symmetric bimatrix games and we provide a polynomial-time algorithm that gives a $(1/2+\delta)$-well-supported Nash equilibrium, for an arbitrarily small positive constant $\delta$. ",michail fasoulakis,,2014.0,,arXiv,Czumaj2014,True,,arXiv,Not available,Approximate well-supported Nash equilibria in symmetric bimatrix games,3cf72403b1ce8ed865cd96b1649f039f,http://arxiv.org/abs/1407.3004v1 13265," The $\varepsilon$-well-supported Nash equilibrium is a strong notion of approximation of a Nash equilibrium, where no player has an incentive greater than $\varepsilon$ to deviate from any of the pure strategies that she uses in her mixed strategy. The smallest constant $\varepsilon$ currently known for which there is a polynomial-time algorithm that computes an $\varepsilon$-well-supported Nash equilibrium in bimatrix games is slightly below $2/3$. In this paper we study this problem for symmetric bimatrix games and we provide a polynomial-time algorithm that gives a $(1/2+\delta)$-well-supported Nash equilibrium, for an arbitrarily small positive constant $\delta$. ",marcin jurdzinski,,2014.0,,arXiv,Czumaj2014,True,,arXiv,Not available,Approximate well-supported Nash equilibria in symmetric bimatrix games,3cf72403b1ce8ed865cd96b1649f039f,http://arxiv.org/abs/1407.3004v1 13266," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",paul dutting,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13267," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",zhe feng,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13268," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",harikrishna narasimhan,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13269," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",david parkes,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13270," A double auction game with an infinite number of buyers and sellers is introduced. All sellers posses one unit of a good, all buyers desire to buy one unit. Each seller and each buyer has a private valuation of the good. The distribution of the valuations define supply and demand functions. One unit of the good is auctioned. At successive, discrete time instances, a player is randomly selected to make a bid (buyer) or an ask (seller). When the maximum of the bids becomes larger than the minimum of the asks, a transaction occurs and the auction is closed. The players have to choose the value of their bid or ask before the auction starts and use this value when they are selected. Assuming that the supply and demand functions are known, expected profits as functions of the strategies are derived, as well as expected transaction prices. It is shown that for linear supply and demand functions, there exists at most one Bayesian Nash equilibrium. Competitive behaviour is not an equilibrium of the game. For linear supply and demand functions, the sum of the expected profit of the sellers and the buyers is the same for the Bayesian Nash equilibrium and the market where players behave competitively. Connections are made with the ZI-C traders model and the $k$-double auction. ",matthijs ruijgrok,,2012.0,,arXiv,Ruijgrok2012,True,,arXiv,Not available,A single-item continuous double auction game,00db6b2be8334ad69ade5dc74e975d50,http://arxiv.org/abs/1210.5541v1 13271," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",gagan aggarwal,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 13272," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",s. muthukrishnan,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 13273," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",jon feldman,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 13274," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",amy greenwald,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 13275," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",e. piotrowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 13276," We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which are a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies. ",j. sladkowski,,2001.0,,arXiv,Piotrowski2001,True,,arXiv,Not available,Quantum English Auctions,1c4df410bda7bbb58fbd4d94bb69e557,http://arxiv.org/abs/quant-ph/0108017v1 13277," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",tim roughgarden,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 13278," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",vasilis syrgkanis,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 13279," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",eva tardos,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 13280," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",arupratan ray,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13281," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",debmalya mandal,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13282," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",y. narahari,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13283," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",avrim blum,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13284," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",yishay mansour,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13285," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",nikhil devanur,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 13286," Auction theory traditionally assumes that bidders' valuation distributions are known to the auctioneer, such as in the celebrated, revenue-optimal Myerson auction. However, this theory does not describe how the auctioneer comes to possess this information. Recently, Cole and Roughgarden [2014] showed that an approximation based on a finite sample of independent draws from each bidder's distribution is sufficient to produce a near-optimal auction. In this work, we consider the problem of learning bidders' valuation distributions from much weaker forms of observations. Specifically, we consider a setting where there is a repeated, sealed-bid auction with $n$ bidders, but all we observe for each round is who won, but not how much they bid or paid. We can also participate (i.e., submit a bid) ourselves, and observe when we win. From this information, our goal is to (approximately) recover the inherently recoverable part of the underlying bid distributions. We also consider extensions where different subsets of bidders participate in each round, and where bidders' valuations have a common-value component added to their independent private values. ",jamie morgenstern,,2014.0,,arXiv,Blum2014,True,,arXiv,Not available,Learning Valuation Distributions from Partial Observation,e507389ea3d41023de3e8a67ff04907b,http://arxiv.org/abs/1407.2855v1 13287," The Generalized Second Price auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction under various equilibrium concepts. In particular, we demonstrate that the Bayesian Price of Anarchy is at most $2(1-1/e)^{-1} \approx 3.16$, significantly improving upon previously known bounds. Our techniques are intuitively straightforward and extend in a number of ways. For one, our result extends to a bound on the performance of GSP at coarse correlated equilibria, which captures (for example) a repeated-auction setting in which agents apply regret-minimizing bidding strategies. In addition, our analysis is robust against the presence of byzantine agents who cannot be assumed to participate rationally. Additionally, we present tight bounds for the social welfare obtained at pure NE for the special case of an auction for 3 slots, and discuss potential methods for extending this analysis to an arbitrary number of slots. ",brendan lucier,,2010.0,,arXiv,Lucier2010,True,,arXiv,Not available,Improved Social Welfare Bounds for GSP at Equilibrium,9d5226b9c0cb03597ca7881d44193871,http://arxiv.org/abs/1011.3268v1 13288," The Generalized Second Price auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction under various equilibrium concepts. In particular, we demonstrate that the Bayesian Price of Anarchy is at most $2(1-1/e)^{-1} \approx 3.16$, significantly improving upon previously known bounds. Our techniques are intuitively straightforward and extend in a number of ways. For one, our result extends to a bound on the performance of GSP at coarse correlated equilibria, which captures (for example) a repeated-auction setting in which agents apply regret-minimizing bidding strategies. In addition, our analysis is robust against the presence of byzantine agents who cannot be assumed to participate rationally. Additionally, we present tight bounds for the social welfare obtained at pure NE for the special case of an auction for 3 slots, and discuss potential methods for extending this analysis to an arbitrary number of slots. ",renato leme,,2010.0,,arXiv,Lucier2010,True,,arXiv,Not available,Improved Social Welfare Bounds for GSP at Equilibrium,9d5226b9c0cb03597ca7881d44193871,http://arxiv.org/abs/1011.3268v1 13289," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",vineet abhishek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 13290," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",bruce hajek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 13291," DeMarzo et al. (2005) consider auctions in which bids are selected from a completely ordered family of securities whose values are tied to the resource being auctioned. The paper defines a notion of relative steepness of families of securities and shows that a steeper family provides greater expected revenue to the seller. Two assumptions are: the buyers are risk-neutral; the random variables through which values and signals of the buyers are realized are affiliated. We show that this revenue ranking holds for the second price auction in the case of risk-aversion. However, it does not hold if affiliation is relaxed to a less restrictive form of positive dependence, namely first order stochastic dominance (FOSD). We define the relative strong steepness of families of securities and show that it provides a necessary and sufficient condition for comparing two families in the FOSD case. All results extend to the English auction. ",steven williams,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,On Bidding with Securities: Risk Aversion and Positive Dependence,a8f7bbd11db52d55810f5232129161ed,http://arxiv.org/abs/1111.1453v5 13292," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",m. faqiry,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 13293," This paper investigates the problem of proportionally fair double sided energy auction involving buying and selling agents. The grid is assumed to be operating under islanded mode. A distributed auction algorithm that can be implemented by an aggregator, as well as a possible approach by which the agents may approximate price anticipation is considered. Equilibrium conditions arising due to price anticipation is analyzed. A modified auction to mitigate the resulting loss in efficiency due to such behavior is suggested. This modified auction allows the aggregate social welfare of the agents to be arbitrarily close to that attainable with price taking agents. Next, equilibrium conditions when the aggregator collects a surcharge price per unit of energy traded is examined. A biobjective optimization problem is identified that takes into account both the agents social welfare as well as the aggregator revenue from the surcharge. Results of extensive simulations, which corroborate the theoretical analysis, are reported. ",sanjoy das,,2016.0,,arXiv,Faqiry2016,True,,arXiv,Not available,Double-Sided Energy Auction Equilibrium Under Price Anticipation,914aea03648668dcdae3d324ce34d98e,http://arxiv.org/abs/1605.06564v1 13294," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",yuan liu,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13295," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",meixia tao,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13296," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",bach ha,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 13297," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",jianwei huang,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 13298," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",mona rahn,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 13299," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",guido schafer,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 13300," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",binyi chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13301," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",tao qin,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13302," We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue maximization problem, and finally propose the algorithms to approximate the optimal revenue or welfare. ",tie-yan liu,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,$K$-anonymous Signaling Scheme,c410ebf5f0e7a112a8e355f8a11e0649,http://arxiv.org/abs/1311.6638v2 13303," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",shahar dobzinski,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 13304," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",ami mor,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 13305," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",evdokia nikolova,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 13306," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",emmanouil pountourakis,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 13307," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",jason hartline,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 13308," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",ger yang,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 13309," A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper. The proposed protocol has three appealing characteristic: First, it offers conditional privacy-preservation: on the one hand, the bidder is anonymous to the public, on the other hand, only the collaboration of auctioneer and registration manager can reveal the true identity of a malicious bidder. Second, it does not require to maintain a black list which records the evicted malicious bidders. Finally, it is efficient: it saves the communication round complexity comparing with previously proposed solutions. ",hu xiong,,2010.0,,arXiv,Xiong2010,True,,arXiv,Not available,Privacy-Preserving English Auction Protocol with Round Efficiency,4e427502e1a9771c8e9d3d3468aeb6de,http://arxiv.org/abs/1010.5642v1 13310," A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper. The proposed protocol has three appealing characteristic: First, it offers conditional privacy-preservation: on the one hand, the bidder is anonymous to the public, on the other hand, only the collaboration of auctioneer and registration manager can reveal the true identity of a malicious bidder. Second, it does not require to maintain a black list which records the evicted malicious bidders. Finally, it is efficient: it saves the communication round complexity comparing with previously proposed solutions. ",zhong chen,,2010.0,,arXiv,Xiong2010,True,,arXiv,Not available,Privacy-Preserving English Auction Protocol with Round Efficiency,4e427502e1a9771c8e9d3d3468aeb6de,http://arxiv.org/abs/1010.5642v1 13311," There is only one technique for prior-free optimal mechanism design that generalizes beyond the structurally benevolent setting of digital goods. This technique uses random sampling to estimate the distribution of agent values and then employs the Bayesian optimal mechanism for this estimated distribution on the remaining players. Though quite general, even for digital goods, this random sampling auction has a complicated analysis and is known to be suboptimal. To overcome these issues we generalize the consensus technique from Goldberg and Hartline (2003) to structurally rich environments that include, e.g., single-minded combinatorial auctions. ",bach ha,,2011.0,,arXiv,Ha2011,True,,arXiv,Not available,"Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction",3f0b9ef6e941c471ce6a4044fc3364a4,http://arxiv.org/abs/1108.4744v1 13312," There is only one technique for prior-free optimal mechanism design that generalizes beyond the structurally benevolent setting of digital goods. This technique uses random sampling to estimate the distribution of agent values and then employs the Bayesian optimal mechanism for this estimated distribution on the remaining players. Though quite general, even for digital goods, this random sampling auction has a complicated analysis and is known to be suboptimal. To overcome these issues we generalize the consensus technique from Goldberg and Hartline (2003) to structurally rich environments that include, e.g., single-minded combinatorial auctions. ",jason hartline,,2011.0,,arXiv,Ha2011,True,,arXiv,Not available,"Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction",3f0b9ef6e941c471ce6a4044fc3364a4,http://arxiv.org/abs/1108.4744v1 13313," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",kareem amin,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 13314," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",michael kearns,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 13315," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",peter key,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 13316," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",anton schwaighofer,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 13317," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",amit daniely,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 13318," An overview of different variants of the submodular welfare maximization problem in combinatorial auctions. In particular, I studied the existing algorithmic and game theoretic results for submodular welfare maximization problem and its applications in other areas such as social networks. ",samira samadi,,2013.0,,arXiv,Samadi2013,True,,arXiv,Not available,Submodular Welfare Maximization,db065c3a2e22f4fea80bab840b6fad2b,http://arxiv.org/abs/1311.5603v1 13319," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",michael schapira,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 13320," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",gal shahaf,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 13321," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",alessandro chiesa,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 13322," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 13323," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. We analyze the social-welfare performance of the VCG mechanism, for unrestricted combinatorial auctions, when Knightian players that either (a) choose a regret-minimizing strategy, or (b) resort to regret minimization only to refine further their own sets of undominated strategies, if needed. We prove that this performance is very good. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Robustness from Regret Minimization,0ed5b35675c34f3177067de92d7e4b2e,http://arxiv.org/abs/1403.6409v2 13324," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",nicolas bousquet,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 13325," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",yang cai,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 13326," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",christoph hunkenschroder,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 13327," Since the 1990s spectrum auctions have been implemented world-wide. This has provided for a practical examination of an assortment of auction mechanisms and, amongst these, two simultaneous ascending price auctions have proved to be extremely successful. These are the simultaneous multiround ascending auction (SMRA) and the combinatorial clock auction (CCA). It has long been known that, for certain classes of valuation functions, the SMRA provides good theoretical guarantees on social welfare. However, no such guarantees were known for the CCA. In this paper, we show that CCA does provide strong guarantees on social welfare provided the price increment and stopping rule are well-chosen. This is very surprising in that the choice of price increment has been used primarily to adjust auction duration and the stopping rule has attracted little attention. The main result is a polylogarithmic approximation guarantee for social welfare when the maximum number of items demanded $\mathcal{C}$ by a bidder is fixed. Specifically, we show that either the revenue of the CCA is at least an $\Omega\Big(\frac{1}{\mathcal{C}^{2}\log n\log^2m}\Big)$-fraction of the optimal welfare or the welfare of the CCA is at least an $\Omega\Big(\frac{1}{\log n}\Big)$-fraction of the optimal welfare, where $n$ is the number of bidders and $m$ is the number of items. As a corollary, the welfare ratio -- the worst case ratio between the social welfare of the optimum allocation and the social welfare of the CCA allocation -- is at most $O(\mathcal{C}^2 \cdot \log n \cdot \log^2 m)$. We emphasize that this latter result requires no assumption on bidders valuation functions. Finally, we prove that such a dependence on $\mathcal{C}$ is necessary. In particular, we show that the welfare ratio of the CCA is at least $\Omega \Big(\mathcal{C} \cdot \frac{\log m}{\log \log m}\Big)$. ",adrian vetta,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,On the Economic Efficiency of the Combinatorial Clock Auction,f11c340123d20ec92b73425c8070b0f1,http://arxiv.org/abs/1507.06495v1 13328," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",haoran yu,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 13329," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",john byers,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 13330," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",george iosifidis,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 13331," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",jianwei huang,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 13332," Motivated by the recent efforts in extending LTE to the unlicensed spectrum, we propose a novel spectrum sharing framework for the coopetition (i.e., cooperation and competition) between LTE and Wi-Fi in the unlicensed band. Basically, the LTE network can choose to work in one of the two modes: in the competition mode, it randomly accesses an unlicensed channel, and interferes with the Wi-Fi access point using the same channel; in the cooperation mode, it delivers traffic for the Wi-Fi users in exchange for the exclusive access of the corresponding channel. Because the LTE network works in an interference-free manner in the cooperation mode, it can achieve a much larger data rate than that in the competition mode, which allows it to effectively serve both its own users and the Wi-Fi users. We design a second-price reverse auction mechanism, which enables the LTE provider and the Wi-Fi access point owners (APOs) to effectively negotiate the operation mode. Specifically, the LTE provider is the auctioneer (buyer), and the APOs are the bidders (sellers) who compete to sell their channel access opportunities to the LTE provider. In Stage I of the auction, the LTE provider announces a reserve rate. In Stage II of the auction, the APOs submit their bids. We show that the auction involves allocative externalities, i.e., the cooperation between the LTE provider and one APO benefits other APOs who are not directly involved in this cooperation. As a result, a particular APO's willingness to cooperate is affected by its belief about other APOs' willingness to cooperate. This makes our analysis much more challenging than that of the conventional second-price auction, where bidding truthfully is a weakly dominant strategy. We show that the APOs have a unique form of the equilibrium bidding strategies in Stage II, based on which we analyze the LTE provider's optimal reserve rate in Stage I. ",leandros tassiulas,,2016.0,,arXiv,Yu2016,True,,arXiv,Not available,Auction-Based Coopetition between LTE Unlicensed and Wi-Fi,d707ad5b9e46ddb2b374ecd859b35b2f,http://arxiv.org/abs/1609.01961v2 13333," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",wei chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13334," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",shang-hua teng,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13335," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",hanrui zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13336," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",shahar dobzinski,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 13337," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",jan vondrak,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 13338," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 13339," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 13340," Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome. ",zijie zheng,,2016.0,,arXiv,Hu2016,True,,arXiv,Not available,"Caching as a Service: Small-cell Caching Mechanism Design for Service Providers",b5bdc93c08a0df3a20dc1c2b4eb1e2ab,http://arxiv.org/abs/1607.04894v1 13341," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",michael mitzenmacher,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 13342," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 13346," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",renato leme,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 13347," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",martin pal,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 13348," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",sergei vassilvitskii,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 13349," We study probabilistic single-item second-price auctions where the item is characterized by a set of attributes. The auctioneer knows the actual instantiation of all the attributes, but he may choose to reveal only a subset of these attributes to the bidders. Our model is an abstraction of the following Ad auction scenario. The website (auctioneer) knows the demographic information of its impressions, and this information is in terms of a list of attributes (e.g., age, gender, country of location). The website may hide certain attributes from its advertisers (bidders) in order to create thicker market, which may lead to higher revenue. We study how to hide attributes in an optimal way. We show that it is NP-hard to solve for the optimal attribute hiding scheme. We then derive a polynomial-time solvable upper bound on the optimal revenue. Finally, we propose two heuristic-based attribute hiding schemes. Experiments show that revenue achieved by these schemes is close to the upper bound. ",mingyu guo,,2013.0,,arXiv,Guo2013,True,,arXiv,Not available,Revenue Maximization via Hiding Item Attributes,9b3ec8d006b47474d41b7e58db7c7adb,http://arxiv.org/abs/1302.5332v1 13350," We study probabilistic single-item second-price auctions where the item is characterized by a set of attributes. The auctioneer knows the actual instantiation of all the attributes, but he may choose to reveal only a subset of these attributes to the bidders. Our model is an abstraction of the following Ad auction scenario. The website (auctioneer) knows the demographic information of its impressions, and this information is in terms of a list of attributes (e.g., age, gender, country of location). The website may hide certain attributes from its advertisers (bidders) in order to create thicker market, which may lead to higher revenue. We study how to hide attributes in an optimal way. We show that it is NP-hard to solve for the optimal attribute hiding scheme. We then derive a polynomial-time solvable upper bound on the optimal revenue. Finally, we propose two heuristic-based attribute hiding schemes. Experiments show that revenue achieved by these schemes is close to the upper bound. ",argyrios deligkas,,2013.0,,arXiv,Guo2013,True,,arXiv,Not available,Revenue Maximization via Hiding Item Attributes,9b3ec8d006b47474d41b7e58db7c7adb,http://arxiv.org/abs/1302.5332v1 13351," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",hu fu,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 13352," Innovative auction methods can be exploited to increase profits, with Shubik's famous ""dollar auction"" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using ""pay-per-bid"" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play ""chicken"") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers. ",georgios zervas,,2010.0,,arXiv,Byers2010,True,,arXiv,Not available,Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank,10d4065b23fd50650464c5eb7f9d9d75,http://arxiv.org/abs/1001.0592v3 13353," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",nicole immolica,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 13354," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",brendan lucier,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 13355," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",philipp strack,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 13356," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",yutao jiao,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13357," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",ping wang,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13358," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",dusit niyato,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13359," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",mohammad alsheikh,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13360," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",shaohan feng,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13361," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",pinyan lu,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 13362," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",tao xiao,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 13363," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",e. sathiyamoorthy,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 13364," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",bernhard rumpe,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 13365," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",guido wimmel,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 13366," In a recent and ongoing work, Baldwin and Klemperer explored a connection between tropical geometry and economics. They gave a sufficient condition for the existence of competitive equilibrium in product-mix auctions of indivisible goods. This result, which we call the Unimodularity Theorem, can also be traced back to the work of Danilov, Koshevoy, and Murota in discrete convex analysis. We give a new proof of the Unimodularity Theorem via the classical unimodularity theorem in integer programming. We give a unified treatment of these results via tropical geometry and formulate a new sufficient condition for competitive equilibrium when there are only two types of product. Generalizations of our theorem in higher dimensions are equivalent to various forms of the Oda conjecture in algebraic geometry. ",ngoc tran,,2015.0,,arXiv,Tran2015,True,,arXiv,Not available,Product-Mix Auctions and Tropical Geometry,0ac60af28727ed7c03a4f526379a0973,http://arxiv.org/abs/1505.05737v4 13367," In a recent and ongoing work, Baldwin and Klemperer explored a connection between tropical geometry and economics. They gave a sufficient condition for the existence of competitive equilibrium in product-mix auctions of indivisible goods. This result, which we call the Unimodularity Theorem, can also be traced back to the work of Danilov, Koshevoy, and Murota in discrete convex analysis. We give a new proof of the Unimodularity Theorem via the classical unimodularity theorem in integer programming. We give a unified treatment of these results via tropical geometry and formulate a new sufficient condition for competitive equilibrium when there are only two types of product. Generalizations of our theorem in higher dimensions are equivalent to various forms of the Oda conjecture in algebraic geometry. ",josephine yu,,2015.0,,arXiv,Tran2015,True,,arXiv,Not available,Product-Mix Auctions and Tropical Geometry,0ac60af28727ed7c03a4f526379a0973,http://arxiv.org/abs/1505.05737v4 13368," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",shiva navabi,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 13369," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",ashutosh nayyar,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 13370," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",shih-tang su,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 13371," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",jacob abernethy,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 13372," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",grant schoenebeck,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 13373," This work presents a descending-price-auction algorithm to obtain the maximum market-clearing price vector (MCP) in unit-demand matching markets with m items by exploiting the combinatorial structure. With a shrewd choice of goods for which the prices are reduced in each step, the algorithm only uses the combinatorial structure, which avoids solving LPs and enjoys a strongly polynomial runtime of $O(m^4)$. Critical to the algorithm is determining the set of under-demanded goods for which we reduce the prices simultaneously in each step of the algorithm. This we accomplish by choosing the subset of goods that maximize a skewness function, which makes the bipartite graph series converges to the combinatorial structure at the maximum MCP in $O(m^2)$ steps. A graph coloring algorithm is proposed to find the set of goods with the maximal skewness value that yields $O(m^4)$ complexity. ",vijay subramanian,,2016.0,,arXiv,Su2016,True,,arXiv,Not available,A Descending Price Auction for Matching Markets,7b636ec6ec2bc345d040ae576d6173d6,http://arxiv.org/abs/1607.04710v2 13374," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",n. iyenger,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 13375," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",ruggiero cavallo,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 13376," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",prabhakar krishnamurthy,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 13377," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",maxim sviridenko,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 13378," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",christopher wilkens,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 13379," In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow model by Lawler and Martel, and enjoy various nice properties such as incentive compatibility of buyers, individual rationality, pareto optimality, strong budget balance. The first mechanism is a simple ""reduce-to-recover"" algorithm that reduces the market to be one-sided, applies the polyhedral clinching auction by Goel et al, and lifts the resulting allocation to the original two-sided market via polymatroidal network flow. The second mechanism is a two-sided generalization of the polyhedral clinching auction, which improves the first mechanism in terms of the fairness of revenue sharing on sellers. Both mechanisms are implemented by polymatroid algorithms. We demonstrate how our framework is applied to internet display ad auctions. ",hiroshi hirai,,2017.0,,arXiv,Hirai2017,True,,arXiv,Not available,Polyhedral Clinching Auctions for Two-sided Markets,99535a6173f46c3ada63fbc505ff7267,http://arxiv.org/abs/1708.04881v2 13380," In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow model by Lawler and Martel, and enjoy various nice properties such as incentive compatibility of buyers, individual rationality, pareto optimality, strong budget balance. The first mechanism is a simple ""reduce-to-recover"" algorithm that reduces the market to be one-sided, applies the polyhedral clinching auction by Goel et al, and lifts the resulting allocation to the original two-sided market via polymatroidal network flow. The second mechanism is a two-sided generalization of the polyhedral clinching auction, which improves the first mechanism in terms of the fairness of revenue sharing on sellers. Both mechanisms are implemented by polymatroid algorithms. We demonstrate how our framework is applied to internet display ad auctions. ",ryosuke sato,,2017.0,,arXiv,Hirai2017,True,,arXiv,Not available,Polyhedral Clinching Auctions for Two-sided Markets,99535a6173f46c3ada63fbc505ff7267,http://arxiv.org/abs/1708.04881v2 13381," We cast the problem of combinatorial auction design in a Bayesian framework in order to incorporate prior information into the auction process and minimize the number of rounds to convergence. We first develop a generative model of agent valuations and market prices such that clearing prices become maximum a posteriori estimates given observed agent valuations. This generative model then forms the basis of an auction process which alternates between refining estimates of agent valuations and computing candidate clearing prices. We provide an implementation of the auction using assumed density filtering to estimate valuations and expectation maximization to compute prices. An empirical evaluation over a range of valuation domains demonstrates that our Bayesian auction mechanism is highly competitive against the combinatorial clock auction in terms of rounds to convergence, even under the most favorable choices of price increment for this baseline. ",gianluca brero,,2017.0,,arXiv,Brero2017,True,,arXiv,Not available,A Bayesian Clearing Mechanism for Combinatorial Auctions,ccbfccfcdf6372291f6b0a4d93d7a968,http://arxiv.org/abs/1712.05291v1 13382," We cast the problem of combinatorial auction design in a Bayesian framework in order to incorporate prior information into the auction process and minimize the number of rounds to convergence. We first develop a generative model of agent valuations and market prices such that clearing prices become maximum a posteriori estimates given observed agent valuations. This generative model then forms the basis of an auction process which alternates between refining estimates of agent valuations and computing candidate clearing prices. We provide an implementation of the auction using assumed density filtering to estimate valuations and expectation maximization to compute prices. An empirical evaluation over a range of valuation domains demonstrates that our Bayesian auction mechanism is highly competitive against the combinatorial clock auction in terms of rounds to convergence, even under the most favorable choices of price increment for this baseline. ",sebastien lahaie,,2017.0,,arXiv,Brero2017,True,,arXiv,Not available,A Bayesian Clearing Mechanism for Combinatorial Auctions,ccbfccfcdf6372291f6b0a4d93d7a968,http://arxiv.org/abs/1712.05291v1 13383," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",lin ma,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 13384," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",ruiting zhou,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 13385," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",v. ramachandran,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 13386," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",zongpeng li,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 13387," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",shipra agrawal,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13388," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",constantinos daskalakis,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13389," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",vahab mirrokni,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13390," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",balasubramanian sivan,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13391," In another paper with the same name\cite{frame}, we proposed a new representation of Game Theory, but most results are given by specific examples and argument. In this paper, we try to prove the conclusions as far as we can, including a proof of equivalence between the new representation and the traditional Game Theory, and a proof of Classical Nash Theorem in the new representation. And it also gives manipulation definition of quantum game and a proof of the equivalence between this definition and the general abstract representation. A Quantum Nash Proposition is proposed but without a general proof. Then, some comparison between Nash Equilibrium (NE) and the pseudo-dynamical equilibrium (PDE) is discussed. At last, we investigate the possibility that whether such representation leads to truly Quantum Game, and whether such a new representation is helpful to Classical Game, as an answer to the questions in \cite{enk}. Some discussion on continuous-strategy games are also included. ",jinshan wu,,2004.0,,arXiv,Wu2004,True,,arXiv,Not available,A new mathematical representation of Game Theory II,d6a0575a4d7d63dc9db0e8a916c2c719,http://arxiv.org/abs/quant-ph/0405183v1 13392," We study a fingerprinting game in which the collusion channel is unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit value of a sequence of maxmin games with mutual information as the payoff function. However, these games generally do not admit saddle-point solutions and are very hard to solve numerically. Here under the so-called Boneh-Shaw marking assumption, we reformulate the capacity as the value of a single two-person zero-sum game, and show that it is achieved by a saddle-point solution. If the maximal coalition size is $k$ and the fingerprint alphabet is binary, we derive equations that can numerically solve the capacity game for arbitrary $k$. We also provide tight upper and lower bounds on the capacity. Finally, we discuss the asymptotic behavior of the fingerprinting game for large $k$ and practical implementation issues. ",yen-wei huang,,2009.0,10.1109/ISIT.2009.5205882,arXiv,Huang2009,True,,arXiv,Not available,"Saddle-point Solution of the Fingerprinting Capacity Game Under the Marking Assumption",691056646256ad06b58f0e8265a48ff4,http://arxiv.org/abs/0905.1375v1 13393," We study a fingerprinting game in which the collusion channel is unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit value of a sequence of maxmin games with mutual information as the payoff function. However, these games generally do not admit saddle-point solutions and are very hard to solve numerically. Here under the so-called Boneh-Shaw marking assumption, we reformulate the capacity as the value of a single two-person zero-sum game, and show that it is achieved by a saddle-point solution. If the maximal coalition size is $k$ and the fingerprint alphabet is binary, we derive equations that can numerically solve the capacity game for arbitrary $k$. We also provide tight upper and lower bounds on the capacity. Finally, we discuss the asymptotic behavior of the fingerprinting game for large $k$ and practical implementation issues. ",pierre moulin,,2009.0,10.1109/ISIT.2009.5205882,arXiv,Huang2009,True,,arXiv,Not available,"Saddle-point Solution of the Fingerprinting Capacity Game Under the Marking Assumption",691056646256ad06b58f0e8265a48ff4,http://arxiv.org/abs/0905.1375v1 13394," With evolutionary game theory, mathematicians, physicists and theoretical biologists usually show us beautiful figures of population dynamic patterns. 2x2 game (matching pennies game) is one of the classical cases. In this letter, we report our finding that, there exists a dynamical pattern, called as social spiral, in human subjects 2x2 experiment data. In a flow/velocity vector field method, we explore the data in the discrete lattices of the macro-level social strategy space in the games, and then above spiral pattern emergent. This finding hints that, there exists a macro-level order beyond the stochastic process in micro-level. We notice that, the vector pattern provides an interesting way to conceal evolutionary game theory models and experimental economics data. This lattice vector field method provides a novel way for models evaluating and experiment designing. ",zhijian wang,,2010.0,,arXiv,Wang2010,True,,arXiv,Not available,Social Spiral Pattern in Experimental 2x2 Games,73dd416a1d011d3b82e0f521751718aa,http://arxiv.org/abs/1009.3560v2 13395," This work lies in the fusion of experimental economics and data mining. It continues author's previous work on mining behaviour rules of human subjects from experimental data, where game-theoretic predictions partially fail to work. Game-theoretic predictions aka equilibria only tend to success with experienced subjects on specific games, what is rarely given. Apart from game theory, contemporary experimental economics offers a number of alternative models. In relevant literature, these models are always biased by psychological and near-psychological theories and are claimed to be proven by the data. This work introduces a data mining approach to the problem without using vast psychological background. Apart from determinism, no other biases are regarded. Two datasets from different human subject experiments are taken for evaluation. The first one is a repeated mixed strategy zero sum game and the second - repeated ultimatum game. As result, the way of mining deterministic regularities in human strategic behaviour is described and evaluated. As future work, the design of a new representation formalism is discussed. ",rustam tagiew,,2012.0,,"Experimental Economics and Machine Learning 2012, CEUR-WS Vol-870, urn:nbn:de:0074-870-0",Tagiew2012,True,,arXiv,Not available,Mining Determinism in Human Strategic Behavior,d035814d72d74aa8992a2f18f5128a87,http://arxiv.org/abs/1211.2399v1 13396," We perform a simulation-based analysis of keyword auctions modeled as one-shot games of incomplete information to study a series of mechanism design questions. Our first question addresses the degree to which incentive compatibility fails in generalized second-price (GSP) auctions. Our results suggest that sincere bidding in GSP auctions is a strikingly poor strategy and a poor predictor of equilibrium outcomes. We next show that the rank-by-revenue mechanism is welfare optimal, corroborating past results. Finally, we analyze profit as a function of auction mechanism under a series of alternative settings. Our conclusions coincide with those of Lahaie and Pennock [2007] when values and quality scores are strongly positively correlated: in such a case, rank-by-bid rules are clearly superior. We diverge, however, in showing that auctions that put little weight on quality scores almost universally dominate the pure rank-by-revenue scheme. ",yevgeniy vorobeychik,,2012.0,,arXiv,Vorobeychik2012,True,,arXiv,Not available,"Simulation-Based Game Theoretic Analysis of Keyword Auctions with Low-Dimensional Bidding Strategies",64e32e4b8a979d74cfdf4d780679e078,http://arxiv.org/abs/1205.2607v1 13397," This paper studies the mechanisms, implications, and potential applications of the recently discovered class of Zero Determinant (ZD) strategies in iterated 2x2 games. These strategies were reported to successfully extort pure economic maximizers, and to mischievously determine the set of feasible long-term payoffs in iterated Prisoners' Dilemma by enforcing linear constraints on both players' expected average scores. These results are generalized for all symmetric 2x2 games and a general Battle of the Sexes, exemplified by four common games. Additionally, a comparison to conventional strategies is made and typical ZD gameplay simulations are analyzed along with convergence speeds. Several response strategies are discussed, including a glance on how time preferences change previous results. Furthermore, a possibility of retaliation is presented: when maximin scores exceed the minimum symmetric payoff, it is possible to extort the extortioner. Finally, a summary of findings from evolutionary game theory shows that mischief is limited by its own malice. Nevertheless, this does not challenge the result that mindless economic maximization is subject to extortion: the study of ZD strategies reveals exciting new perspectives and opportunities in game theory, both evolutionary and classic. ",lars roemheld,,2013.0,,arXiv,Roemheld2013,True,,arXiv,Not available,"Evolutionary Extortion and Mischief: Zero Determinant strategies in iterated 2x2 games",85ff2c78f2c08b038d5480392d9c487c,http://arxiv.org/abs/1308.2576v1 13398," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",eugene asarin,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13399," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",julien cervelle,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13400," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",aldric degorre,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13401," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",catalin dima,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13402," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",florian horn,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13403," Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a-half players: Despot, Tribune and the non-deterministic People. Despot wants to make the set of possible People's behaviors as small as possible, while Tribune wants to make it as large as possible.An MMG is played by two players that alternately write matrices from some predefined finite sets. One wants to maximize the growth rate of the product, and the other to minimize it. We show that in general MMGs are undecidable in quite a strong sense.On the positive side, EGs correspond to a subclass of MMGs, and we prove that such MMGs and EGs are determined, and that the optimal strategies are simple. The complexity of solving such games is in NP\&coNP. ",victor kozyakin,,2015.0,,arXiv,Asarin2015,True,,arXiv,Not available,Entropy Games and Matrix Multiplication Games,8274bc03c5517e5a7a1ac9c6a2d215b5,http://arxiv.org/abs/1506.04885v3 13404," We study the class of potential games that are also graphical games with respect to a given graph $G$ of connections between the players. We show that, up to strategic equivalence, this class of games can be identified with the set of Markov random fields on $G$. From this characterization, and from the Hammersley-Clifford theorem, it follows that the potentials of such games can be decomposed to local potentials. We use this decomposition to strongly bound the number of strategy changes of a single player along a better response path. This result extends to generalized graphical potential games, which are played on infinite graphs. ",yakov babichenko,,2014.0,10.1016/j.jet.2016.03.010,"Journal of Economic Theory, Volume 163, May 2016, Pages 889-899",Babichenko2014,True,,arXiv,Not available,Graphical potential games,4f27b297cadf946451cb32994d5b6d04,http://arxiv.org/abs/1405.1481v2 13405," We study the class of potential games that are also graphical games with respect to a given graph $G$ of connections between the players. We show that, up to strategic equivalence, this class of games can be identified with the set of Markov random fields on $G$. From this characterization, and from the Hammersley-Clifford theorem, it follows that the potentials of such games can be decomposed to local potentials. We use this decomposition to strongly bound the number of strategy changes of a single player along a better response path. This result extends to generalized graphical potential games, which are played on infinite graphs. ",omer tamuz,,2014.0,10.1016/j.jet.2016.03.010,"Journal of Economic Theory, Volume 163, May 2016, Pages 889-899",Babichenko2014,True,,arXiv,Not available,Graphical potential games,4f27b297cadf946451cb32994d5b6d04,http://arxiv.org/abs/1405.1481v2 13406," This paper investigates the problem of database-assisted spectrum access in dynamic TV white spectrum networks, in which the active user set is varying. Since there is no central controller and information exchange, it encounters dynamic and incomplete information constraints. To solve this challenge, we formulate a state-based spectrum access game and a robust spectrum access game. It is proved that the two games are ordinal potential games with the (expected) aggregate weighted interference serving as the potential functions. A distributed learning algorithm is proposed to achieve the pure strategy Nash equilibrium (NE) of the games. It is shown that the best NE is almost the same with the optimal solution and the achievable throughput of the proposed learning algorithm is very close to the optimal one, which validates the effectiveness of the proposed game-theoretic solution. ",yuhua xu,,2015.0,10.1109/ACCESS.2015.2453266,arXiv,Xu2015,True,,arXiv,Not available,"Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution",3c87887ee0026ee2611cabbd18181e6c,http://arxiv.org/abs/1502.06669v2 13407," In this paper, we present the first approximation algorithms for the problem of designing revenue optimal Bayesian incentive compatible auctions when there are multiple (heterogeneous) items and when bidders can have arbitrary demand and budget constraints. Our mechanisms are surprisingly simple: We show that a sequential all-pay mechanism is a 4 approximation to the revenue of the optimal ex-interim truthful mechanism with discrete correlated type space for each bidder. We also show that a sequential posted price mechanism is a O(1) approximation to the revenue of the optimal ex-post truthful mechanism when the type space of each bidder is a product distribution that satisfies the standard hazard rate condition. We further show a logarithmic approximation when the hazard rate condition is removed, and complete the picture by showing that achieving a sub-logarithmic approximation, even for regular distributions and one bidder, requires pricing bundles of items. Our results are based on formulating novel LP relaxations for these problems, and developing generic rounding schemes from first principles. We believe this approach will be useful in other Bayesian mechanism design contexts. ",sayan bhattacharya,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Budget Constrained Auctions with Heterogeneous Items,67d5a7a22e02d456bc0f63f04bdad668,http://arxiv.org/abs/0907.4166v6 13408," This paper investigates the problem of database-assisted spectrum access in dynamic TV white spectrum networks, in which the active user set is varying. Since there is no central controller and information exchange, it encounters dynamic and incomplete information constraints. To solve this challenge, we formulate a state-based spectrum access game and a robust spectrum access game. It is proved that the two games are ordinal potential games with the (expected) aggregate weighted interference serving as the potential functions. A distributed learning algorithm is proposed to achieve the pure strategy Nash equilibrium (NE) of the games. It is shown that the best NE is almost the same with the optimal solution and the achievable throughput of the proposed learning algorithm is very close to the optimal one, which validates the effectiveness of the proposed game-theoretic solution. ",yitao xu,,2015.0,10.1109/ACCESS.2015.2453266,arXiv,Xu2015,True,,arXiv,Not available,"Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution",3c87887ee0026ee2611cabbd18181e6c,http://arxiv.org/abs/1502.06669v2 13409," This paper investigates the problem of database-assisted spectrum access in dynamic TV white spectrum networks, in which the active user set is varying. Since there is no central controller and information exchange, it encounters dynamic and incomplete information constraints. To solve this challenge, we formulate a state-based spectrum access game and a robust spectrum access game. It is proved that the two games are ordinal potential games with the (expected) aggregate weighted interference serving as the potential functions. A distributed learning algorithm is proposed to achieve the pure strategy Nash equilibrium (NE) of the games. It is shown that the best NE is almost the same with the optimal solution and the achievable throughput of the proposed learning algorithm is very close to the optimal one, which validates the effectiveness of the proposed game-theoretic solution. ",alagan anpalagan,,2015.0,10.1109/ACCESS.2015.2453266,arXiv,Xu2015,True,,arXiv,Not available,"Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution",3c87887ee0026ee2611cabbd18181e6c,http://arxiv.org/abs/1502.06669v2 13410," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",yuhua xu,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13411," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",chenggui wang,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13412," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",junhong chen,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13413," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",jinlong wang,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13414," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",yitao xu,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13415," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",qihui wu,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13416," In this letter, we investigate the problem of dynamic spectrum access for small cell networks, using a graphical game approach. Compared with existing studies, we take the features of different cell loads and local interference relationship into account. It is proved that the formulated spectrum access game is an exact potential game with the aggregate interference level as the potential function, and Nash equilibrium (NE) of the game corresponds to the global or local optima of the original optimization problem. A lower bound of the achievable aggregate interference level is rigorously derived. Finally, we propose an autonomous best response learning algorithm to converge towards its NE. It is shown that the proposed game-theoretic solution converges rapidly and its achievable performance is close to the optimum solution. ",alagan anpalagan,,2015.0,10.1109/TVT.2015.2508998,arXiv,Xu2015,True,,arXiv,Not available,"Load-aware Dynamic Spectrum Access for Small Cell Networks: A Graphical Game Approach",625e57b2e30e19e43fd39a759aadea8d,http://arxiv.org/abs/1502.06670v3 13417," Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cryptographic techniques and keys in wireless networks is proposed. In particular, the problem is formulated as a stochastic game in which a base station (BS), acting as a defender seeks to strategically change its cryptographic techniques and keys in an effort to deter an attacker that is trying to eavesdrop on the data. The game is shown to exhibit a single-controller property in which only one player, the defender, controls the state of the game. For this game, the existence and properties of the Nash equilibrium are studied, in the presence of a defense cost for using MTD. Then, a practical algorithm for deriving the equilibrium MTD strategies is derived. Simulation results show that the proposed game-theoretic MTD framework can significantly improve the overall utility of the defender, while enabling effective randomization over cryptographic techniques. ",abdelrahman eldosouky,,2016.0,10.1109/ICC.2016.7510985,arXiv,Eldosouky2016,True,,arXiv,Not available,Single Controller Stochastic Games for Optimized Moving Target Defense,d854da535db8dc7b7ccf172b9009b92a,http://arxiv.org/abs/1610.03906v1 13418," In this paper, we present the first approximation algorithms for the problem of designing revenue optimal Bayesian incentive compatible auctions when there are multiple (heterogeneous) items and when bidders can have arbitrary demand and budget constraints. Our mechanisms are surprisingly simple: We show that a sequential all-pay mechanism is a 4 approximation to the revenue of the optimal ex-interim truthful mechanism with discrete correlated type space for each bidder. We also show that a sequential posted price mechanism is a O(1) approximation to the revenue of the optimal ex-post truthful mechanism when the type space of each bidder is a product distribution that satisfies the standard hazard rate condition. We further show a logarithmic approximation when the hazard rate condition is removed, and complete the picture by showing that achieving a sub-logarithmic approximation, even for regular distributions and one bidder, requires pricing bundles of items. Our results are based on formulating novel LP relaxations for these problems, and developing generic rounding schemes from first principles. We believe this approach will be useful in other Bayesian mechanism design contexts. ",gagan goel,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Budget Constrained Auctions with Heterogeneous Items,67d5a7a22e02d456bc0f63f04bdad668,http://arxiv.org/abs/0907.4166v6 13419," Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cryptographic techniques and keys in wireless networks is proposed. In particular, the problem is formulated as a stochastic game in which a base station (BS), acting as a defender seeks to strategically change its cryptographic techniques and keys in an effort to deter an attacker that is trying to eavesdrop on the data. The game is shown to exhibit a single-controller property in which only one player, the defender, controls the state of the game. For this game, the existence and properties of the Nash equilibrium are studied, in the presence of a defense cost for using MTD. Then, a practical algorithm for deriving the equilibrium MTD strategies is derived. Simulation results show that the proposed game-theoretic MTD framework can significantly improve the overall utility of the defender, while enabling effective randomization over cryptographic techniques. ",walid saad,,2016.0,10.1109/ICC.2016.7510985,arXiv,Eldosouky2016,True,,arXiv,Not available,Single Controller Stochastic Games for Optimized Moving Target Defense,d854da535db8dc7b7ccf172b9009b92a,http://arxiv.org/abs/1610.03906v1 13420," Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cryptographic techniques and keys in wireless networks is proposed. In particular, the problem is formulated as a stochastic game in which a base station (BS), acting as a defender seeks to strategically change its cryptographic techniques and keys in an effort to deter an attacker that is trying to eavesdrop on the data. The game is shown to exhibit a single-controller property in which only one player, the defender, controls the state of the game. For this game, the existence and properties of the Nash equilibrium are studied, in the presence of a defense cost for using MTD. Then, a practical algorithm for deriving the equilibrium MTD strategies is derived. Simulation results show that the proposed game-theoretic MTD framework can significantly improve the overall utility of the defender, while enabling effective randomization over cryptographic techniques. ",dusit niyato,,2016.0,10.1109/ICC.2016.7510985,arXiv,Eldosouky2016,True,,arXiv,Not available,Single Controller Stochastic Games for Optimized Moving Target Defense,d854da535db8dc7b7ccf172b9009b92a,http://arxiv.org/abs/1610.03906v1 13421," The focus of the iWIGP workshop is the interrelation between interactions, games and protocols. How does computer science deal with nondeterministic interactions where the actions a system takes are not (completely) determined by the interactions the system is involved in? In computer science, nondeterministic interactions are usually described by protocols. However, these interactions can also be viewed as games. As to be expected, games have become an increasingly important modeling tool wherever nondeterministic interactions are involved -- from foundations in game semantics and reactive systems to applications in communication protocols and electronic business applications. The goal of this workshop has been to bring researchers from industry and academia together and to explore how a better understanding of the interrelation between interactions, games and protocols leads to better-designed and more reliable nondeterministic interacting systems. iWIGP 2011 was collocated with ETAPS 2011 in Saarbruecken, Germany. The programme consisted of three invited talks, by Kim Larsen, Marielle Stoelinga and Viktor Kuncak, and five refereed papers, selected by a strong programme committee of international reputation. The refereed papers are contained in this volume. ",johannes reich,,2011.0,10.4204/EPTCS.50,"EPTCS 50, 2011",Reich2011,True,,arXiv,Not available,"Proceedings International Workshop on Interactions, Games and Protocols",1df8b3851d3c5496c6133fd73c35c049,http://arxiv.org/abs/1102.3741v1 13422," The focus of the iWIGP workshop is the interrelation between interactions, games and protocols. How does computer science deal with nondeterministic interactions where the actions a system takes are not (completely) determined by the interactions the system is involved in? In computer science, nondeterministic interactions are usually described by protocols. However, these interactions can also be viewed as games. As to be expected, games have become an increasingly important modeling tool wherever nondeterministic interactions are involved -- from foundations in game semantics and reactive systems to applications in communication protocols and electronic business applications. The goal of this workshop has been to bring researchers from industry and academia together and to explore how a better understanding of the interrelation between interactions, games and protocols leads to better-designed and more reliable nondeterministic interacting systems. iWIGP 2011 was collocated with ETAPS 2011 in Saarbruecken, Germany. The programme consisted of three invited talks, by Kim Larsen, Marielle Stoelinga and Viktor Kuncak, and five refereed papers, selected by a strong programme committee of international reputation. The refereed papers are contained in this volume. ",bernd finkbeiner,,2011.0,10.4204/EPTCS.50,"EPTCS 50, 2011",Reich2011,True,,arXiv,Not available,"Proceedings International Workshop on Interactions, Games and Protocols",1df8b3851d3c5496c6133fd73c35c049,http://arxiv.org/abs/1102.3741v1 13423," We develop a new approach that computes approximate equilibrium strategies in Jotto, a popular word game. Jotto is an extremely large two-player game of imperfect information; its game tree has many orders of magnitude more states than games previously studied, including no-limit Texas hold 'em. To address the fact that the game is so large, we propose a novel strategy representation called oracular form, in which we do not explicitly represent a strategy, but rather appeal to an oracle that quickly outputs a sample move from the strategy's distribution. Our overall approach is based on an extension of the fictitious play algorithm to this oracular setting. We demonstrate the superiority of our computed strategies over the strategies computed by a benchmark algorithm, both in terms of head-to-head and worst-case performance. ",sam ganzfried,,2011.0,,arXiv,Ganzfried2011,True,,arXiv,Not available,Computing Strong Game-Theoretic Strategies in Jotto,d3db935a73e9883e414d96872d66eee4,http://arxiv.org/abs/1107.3342v3 13424," A notion of incentive for agents is introduced which leads to a very general notion of an equilibrium for a finite game. Sufficient conditions for the existence of these equilibria are given. Known existence theorems are shown to be corollaries to the main theorem of this paper. Furthermore, conditions for the existence of equilibria in certain symmetric regions for games are also given. From the notion of general equilibrium, a general family of game dynamics are derived. This family incorporates all canonical examples of game dynamics. A proof is given for the full generality of this system. ",dashiell fryer,,2012.0,,arXiv,Fryer2012,True,,arXiv,Not available,"On the Existence of General Equilibrium in Finite Games and General Game Dynamics",8d9c0f86a2cc65f8d1746f5be0b499a7,http://arxiv.org/abs/1201.2384v6 13425," Evolutionary dynamics provides an iconic relationship --- the periodic frequency of a game is determined by the payoff matrix of the game. This paper reports the first experimental evidence to demonstrate this relationship. Evidence comes from two populations randomly-matched $2\times2$ games with 12 different payoff matrix parameters. The directions, frequencies and changes in the radius of the cycles are measured definitively. The main finding is that the observed periodic frequencies of the persistent cycles are significantly different in games with different parameters. Two replicator dynamics, standard and adjusted, are employed as predictors for the periodic frequency. Interestingly, both of the models could infer the difference of the observed frequencies well. The experimental frequencies linearly, positively and significantly relate to the theoretical frequencies, but the adjusted model performs slightly better. ",bin xu,,2012.0,10.1140/epjb/e2014-31074-2,arXiv,Xu2012,True,,arXiv,Not available,"Periodic frequencies of the cycles in $2\times2$ games: evidence from experimental economics",ab7212214120ceba30dd903505650b3a,http://arxiv.org/abs/1208.6469v4 13426," Evolutionary dynamics provides an iconic relationship --- the periodic frequency of a game is determined by the payoff matrix of the game. This paper reports the first experimental evidence to demonstrate this relationship. Evidence comes from two populations randomly-matched $2\times2$ games with 12 different payoff matrix parameters. The directions, frequencies and changes in the radius of the cycles are measured definitively. The main finding is that the observed periodic frequencies of the persistent cycles are significantly different in games with different parameters. Two replicator dynamics, standard and adjusted, are employed as predictors for the periodic frequency. Interestingly, both of the models could infer the difference of the observed frequencies well. The experimental frequencies linearly, positively and significantly relate to the theoretical frequencies, but the adjusted model performs slightly better. ",shuang wang,,2012.0,10.1140/epjb/e2014-31074-2,arXiv,Xu2012,True,,arXiv,Not available,"Periodic frequencies of the cycles in $2\times2$ games: evidence from experimental economics",ab7212214120ceba30dd903505650b3a,http://arxiv.org/abs/1208.6469v4 13427," Evolutionary dynamics provides an iconic relationship --- the periodic frequency of a game is determined by the payoff matrix of the game. This paper reports the first experimental evidence to demonstrate this relationship. Evidence comes from two populations randomly-matched $2\times2$ games with 12 different payoff matrix parameters. The directions, frequencies and changes in the radius of the cycles are measured definitively. The main finding is that the observed periodic frequencies of the persistent cycles are significantly different in games with different parameters. Two replicator dynamics, standard and adjusted, are employed as predictors for the periodic frequency. Interestingly, both of the models could infer the difference of the observed frequencies well. The experimental frequencies linearly, positively and significantly relate to the theoretical frequencies, but the adjusted model performs slightly better. ",zhijian wang,,2012.0,10.1140/epjb/e2014-31074-2,arXiv,Xu2012,True,,arXiv,Not available,"Periodic frequencies of the cycles in $2\times2$ games: evidence from experimental economics",ab7212214120ceba30dd903505650b3a,http://arxiv.org/abs/1208.6469v4 13428," Parameterised Boolean Equation Systems (PBESs) are sequences of Boolean fixed point equations with data variables, used for, e.g., verification of modal mu-calculus formulae for process algebraic specifications with data. Solving a PBES is usually done by instantiation to a Parity Game and then solving the game. Practical game solvers exist, but the instantiation step is the bottleneck. We enhance the instantiation in two steps. First, we transform the PBES to a Parameterised Parity Game (PPG), a PBES with each equation either conjunctive or disjunctive. Then we use LTSmin, that offers transition caching, efficient storage of states and both distributed and symbolic state space generation, for generating the game graph. To that end we define a language module for LTSmin, consisting of an encoding of variables with parameters into state vectors, a grouped transition relation and a dependency matrix to indicate the dependencies between parts of the state vector and transition groups. Benchmarks on some large case studies, show that the method speeds up the instantiation significantly and decreases memory usage drastically. ",gijs kant,,2012.0,10.4204/EPTCS.99.7,"EPTCS 99, 2012, pp. 50-65",Kant2012,True,,arXiv,Not available,"Efficient Instantiation of Parameterised Boolean Equation Systems to Parity Games",90140d67731c85650ea37e6e5cd0f1d0,http://arxiv.org/abs/1210.6414v1 13429," In this paper, we present the first approximation algorithms for the problem of designing revenue optimal Bayesian incentive compatible auctions when there are multiple (heterogeneous) items and when bidders can have arbitrary demand and budget constraints. Our mechanisms are surprisingly simple: We show that a sequential all-pay mechanism is a 4 approximation to the revenue of the optimal ex-interim truthful mechanism with discrete correlated type space for each bidder. We also show that a sequential posted price mechanism is a O(1) approximation to the revenue of the optimal ex-post truthful mechanism when the type space of each bidder is a product distribution that satisfies the standard hazard rate condition. We further show a logarithmic approximation when the hazard rate condition is removed, and complete the picture by showing that achieving a sub-logarithmic approximation, even for regular distributions and one bidder, requires pricing bundles of items. Our results are based on formulating novel LP relaxations for these problems, and developing generic rounding schemes from first principles. We believe this approach will be useful in other Bayesian mechanism design contexts. ",sreenivas gollapudi,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Budget Constrained Auctions with Heterogeneous Items,67d5a7a22e02d456bc0f63f04bdad668,http://arxiv.org/abs/0907.4166v6 13430," Parameterised Boolean Equation Systems (PBESs) are sequences of Boolean fixed point equations with data variables, used for, e.g., verification of modal mu-calculus formulae for process algebraic specifications with data. Solving a PBES is usually done by instantiation to a Parity Game and then solving the game. Practical game solvers exist, but the instantiation step is the bottleneck. We enhance the instantiation in two steps. First, we transform the PBES to a Parameterised Parity Game (PPG), a PBES with each equation either conjunctive or disjunctive. Then we use LTSmin, that offers transition caching, efficient storage of states and both distributed and symbolic state space generation, for generating the game graph. To that end we define a language module for LTSmin, consisting of an encoding of variables with parameters into state vectors, a grouped transition relation and a dependency matrix to indicate the dependencies between parts of the state vector and transition groups. Benchmarks on some large case studies, show that the method speeds up the instantiation significantly and decreases memory usage drastically. ",jaco pol,,2012.0,10.4204/EPTCS.99.7,"EPTCS 99, 2012, pp. 50-65",Kant2012,True,,arXiv,Not available,"Efficient Instantiation of Parameterised Boolean Equation Systems to Parity Games",90140d67731c85650ea37e6e5cd0f1d0,http://arxiv.org/abs/1210.6414v1 13431," A multi-player competitive Dynkin stopping game is constructed. Each player can either exit the game for a fixed payoff, determined a priori, or stay and receive an adjusted payoff depending on the decision of other players. The single period case is shown to be ""weakly unilaterally competitive"". We present an explicit construction of the unique value at which Nash and optimal equilibria are attained. Multiple period generalisations are explored. The game has interpretations in economic and financial contexts, for example, as a consumption model with bounded resources. It also serves as a starting point to the construction of multi-person financial game options. In particular, the concept of optimal equilibria becomes pivotal in the pricing of the game options via super-replication. ",ivan guo,,2012.0,,arXiv,Guo2012,True,,arXiv,Not available,Unilaterally Competitive Multi-Player Stopping Games,880f101601a69f3d3a2898e1e9e6d091,http://arxiv.org/abs/1211.4113v1 13432," Stochastic games generalize Markov decision processes (MDPs) to a multiagent setting by allowing the state transitions to depend jointly on all player actions, and having rewards determined by multiplayer matrix games at each state. We consider the problem of computing Nash equilibria in stochastic games, the analogue of planning in MDPs. We begin by providing a generalization of finite-horizon value iteration that computes a Nash strategy for each player in generalsum stochastic games. The algorithm takes an arbitrary Nash selection function as input, which allows the translation of local choices between multiple Nash equilibria into the selection of a single global Nash equilibrium. Our main technical result is an algorithm for computing near-Nash equilibria in large or infinite state spaces. This algorithm builds on our finite-horizon value iteration algorithm, and adapts the sparse sampling methods of Kearns, Mansour and Ng (1999) to stochastic games. We conclude by descrbing a counterexample showing that infinite-horizon discounted value iteration, which was shown by shaplely to converge in the zero-sum case (a result we give extend slightly here), does not converge in the general-sum case. ",michael kearns,,2013.0,,arXiv,Kearns2013,True,,arXiv,Not available,Fast Planning in Stochastic Games,7a84e7cbce90aceb852e8f594d8208f8,http://arxiv.org/abs/1301.3867v1 13433," Stochastic games generalize Markov decision processes (MDPs) to a multiagent setting by allowing the state transitions to depend jointly on all player actions, and having rewards determined by multiplayer matrix games at each state. We consider the problem of computing Nash equilibria in stochastic games, the analogue of planning in MDPs. We begin by providing a generalization of finite-horizon value iteration that computes a Nash strategy for each player in generalsum stochastic games. The algorithm takes an arbitrary Nash selection function as input, which allows the translation of local choices between multiple Nash equilibria into the selection of a single global Nash equilibrium. Our main technical result is an algorithm for computing near-Nash equilibria in large or infinite state spaces. This algorithm builds on our finite-horizon value iteration algorithm, and adapts the sparse sampling methods of Kearns, Mansour and Ng (1999) to stochastic games. We conclude by descrbing a counterexample showing that infinite-horizon discounted value iteration, which was shown by shaplely to converge in the zero-sum case (a result we give extend slightly here), does not converge in the general-sum case. ",yishay mansour,,2013.0,,arXiv,Kearns2013,True,,arXiv,Not available,Fast Planning in Stochastic Games,7a84e7cbce90aceb852e8f594d8208f8,http://arxiv.org/abs/1301.3867v1 13434," Stochastic games generalize Markov decision processes (MDPs) to a multiagent setting by allowing the state transitions to depend jointly on all player actions, and having rewards determined by multiplayer matrix games at each state. We consider the problem of computing Nash equilibria in stochastic games, the analogue of planning in MDPs. We begin by providing a generalization of finite-horizon value iteration that computes a Nash strategy for each player in generalsum stochastic games. The algorithm takes an arbitrary Nash selection function as input, which allows the translation of local choices between multiple Nash equilibria into the selection of a single global Nash equilibrium. Our main technical result is an algorithm for computing near-Nash equilibria in large or infinite state spaces. This algorithm builds on our finite-horizon value iteration algorithm, and adapts the sparse sampling methods of Kearns, Mansour and Ng (1999) to stochastic games. We conclude by descrbing a counterexample showing that infinite-horizon discounted value iteration, which was shown by shaplely to converge in the zero-sum case (a result we give extend slightly here), does not converge in the general-sum case. ",satinder singh,,2013.0,,arXiv,Kearns2013,True,,arXiv,Not available,Fast Planning in Stochastic Games,7a84e7cbce90aceb852e8f594d8208f8,http://arxiv.org/abs/1301.3867v1 13435," In this paper we introduce novel algorithmic strategies for effciently playing two-player games in which the players have different or identical player roles. In the case of identical roles, the players compete for the same objective (that of winning the game). The case with different player roles assumes that one of the players asks questions in order to identify a secret pattern and the other one answers them. The purpose of the first player is to ask as few questions as possible (or that the questions and their number satisfy some previously known constraints) and the purpose of the secret player is to answer the questions in a way that will maximize the number of questions asked by the first player (or in a way which forces the first player to break the constraints of the game). We consider both previously known games (or extensions of theirs) and new types of games, introduced in this paper. ",mugurel andreica,,2013.0,,"Acta Universitatis Apulensis - Mathematics-Informatics, no. 25, pp. 77-97, 2011. (ISSN: 1582-5329)",Andreica2013,True,,arXiv,Not available,"Efficient Online Algorithmic Strategies for Several Two-Player Games with Different or Identical Player Roles",e084e83b93a04e793e513cc4a05f2680,http://arxiv.org/abs/1303.5803v1 13436," In this paper we introduce novel algorithmic strategies for effciently playing two-player games in which the players have different or identical player roles. In the case of identical roles, the players compete for the same objective (that of winning the game). The case with different player roles assumes that one of the players asks questions in order to identify a secret pattern and the other one answers them. The purpose of the first player is to ask as few questions as possible (or that the questions and their number satisfy some previously known constraints) and the purpose of the secret player is to answer the questions in a way that will maximize the number of questions asked by the first player (or in a way which forces the first player to break the constraints of the game). We consider both previously known games (or extensions of theirs) and new types of games, introduced in this paper. ",nicolae tapus,,2013.0,,"Acta Universitatis Apulensis - Mathematics-Informatics, no. 25, pp. 77-97, 2011. (ISSN: 1582-5329)",Andreica2013,True,,arXiv,Not available,"Efficient Online Algorithmic Strategies for Several Two-Player Games with Different or Identical Player Roles",e084e83b93a04e793e513cc4a05f2680,http://arxiv.org/abs/1303.5803v1 13437," We introduce the class of pay or play games, which captures scenarios in which each decision maker is faced with a choice between two actions: one with a fixed payoff and an- other with a payoff dependent on others' selected actions. This is, arguably, the simplest setting that models selection among certain and uncertain outcomes in a multi-agent system. We study the properties of equilibria in such games from both a game-theoretic perspective and a computational perspective. Our main positive result establishes the existence of a semi-strong equilibrium in every such game. We show that although simple, pay of play games contain a large variety of well-studied environments, e.g., vaccination games. We discuss the interesting implications of our results for these environments. ",sigal oren,,2013.0,,arXiv,Oren2013,True,,arXiv,Not available,Pay or Play,d60a2bca71f73516349ecad232e4c152,http://arxiv.org/abs/1309.6854v1 13438," We introduce the class of pay or play games, which captures scenarios in which each decision maker is faced with a choice between two actions: one with a fixed payoff and an- other with a payoff dependent on others' selected actions. This is, arguably, the simplest setting that models selection among certain and uncertain outcomes in a multi-agent system. We study the properties of equilibria in such games from both a game-theoretic perspective and a computational perspective. Our main positive result establishes the existence of a semi-strong equilibrium in every such game. We show that although simple, pay of play games contain a large variety of well-studied environments, e.g., vaccination games. We discuss the interesting implications of our results for these environments. ",michael schapira,,2013.0,,arXiv,Oren2013,True,,arXiv,Not available,Pay or Play,d60a2bca71f73516349ecad232e4c152,http://arxiv.org/abs/1309.6854v1 13439," We introduce the class of pay or play games, which captures scenarios in which each decision maker is faced with a choice between two actions: one with a fixed payoff and an- other with a payoff dependent on others' selected actions. This is, arguably, the simplest setting that models selection among certain and uncertain outcomes in a multi-agent system. We study the properties of equilibria in such games from both a game-theoretic perspective and a computational perspective. Our main positive result establishes the existence of a semi-strong equilibrium in every such game. We show that although simple, pay of play games contain a large variety of well-studied environments, e.g., vaccination games. We discuss the interesting implications of our results for these environments. ",moshe tennenholtz,,2013.0,,arXiv,Oren2013,True,,arXiv,Not available,Pay or Play,d60a2bca71f73516349ecad232e4c152,http://arxiv.org/abs/1309.6854v1 13440," In this paper, we present the first approximation algorithms for the problem of designing revenue optimal Bayesian incentive compatible auctions when there are multiple (heterogeneous) items and when bidders can have arbitrary demand and budget constraints. Our mechanisms are surprisingly simple: We show that a sequential all-pay mechanism is a 4 approximation to the revenue of the optimal ex-interim truthful mechanism with discrete correlated type space for each bidder. We also show that a sequential posted price mechanism is a O(1) approximation to the revenue of the optimal ex-post truthful mechanism when the type space of each bidder is a product distribution that satisfies the standard hazard rate condition. We further show a logarithmic approximation when the hazard rate condition is removed, and complete the picture by showing that achieving a sub-logarithmic approximation, even for regular distributions and one bidder, requires pricing bundles of items. Our results are based on formulating novel LP relaxations for these problems, and developing generic rounding schemes from first principles. We believe this approach will be useful in other Bayesian mechanism design contexts. ",kamesh munagala,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Budget Constrained Auctions with Heterogeneous Items,67d5a7a22e02d456bc0f63f04bdad668,http://arxiv.org/abs/0907.4166v6 13441," There are only a few learning algorithms applicable to stochastic dynamic teams and games which generalize Markov decision processes to decentralized stochastic control problems involving possibly self-interested decision makers. Learning in games is generally difficult because of the non-stationary environment in which each decision maker aims to learn its optimal decisions with minimal information in the presence of the other decision makers who are also learning. In stochastic dynamic games, learning is more challenging because, while learning, the decision makers alter the state of the system and hence the future cost. In this paper, we present decentralized Q-learning algorithms for stochastic games, and study their convergence for the weakly acyclic case which includes team problems as an important special case. The algorithm is decentralized in that each decision maker has access to only its local information, the state information, and the local cost realizations; furthermore, it is completely oblivious to the presence of other decision makers. We show that these algorithms converge to equilibrium policies almost surely in large classes of stochastic games. ",gurdal arslan,,2015.0,,arXiv,Arslan2015,True,,arXiv,Not available,Decentralized Q-Learning for Stochastic Teams and Games,5be51f4e4f0ac057d1fb8c3d16af1bb4,http://arxiv.org/abs/1506.07924v2 13442," There are only a few learning algorithms applicable to stochastic dynamic teams and games which generalize Markov decision processes to decentralized stochastic control problems involving possibly self-interested decision makers. Learning in games is generally difficult because of the non-stationary environment in which each decision maker aims to learn its optimal decisions with minimal information in the presence of the other decision makers who are also learning. In stochastic dynamic games, learning is more challenging because, while learning, the decision makers alter the state of the system and hence the future cost. In this paper, we present decentralized Q-learning algorithms for stochastic games, and study their convergence for the weakly acyclic case which includes team problems as an important special case. The algorithm is decentralized in that each decision maker has access to only its local information, the state information, and the local cost realizations; furthermore, it is completely oblivious to the presence of other decision makers. We show that these algorithms converge to equilibrium policies almost surely in large classes of stochastic games. ",serdar yuksel,,2015.0,,arXiv,Arslan2015,True,,arXiv,Not available,Decentralized Q-Learning for Stochastic Teams and Games,5be51f4e4f0ac057d1fb8c3d16af1bb4,http://arxiv.org/abs/1506.07924v2 13443," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",michal feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 13444," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",nick gravin,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 13445," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",brendan lucier,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 13448," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",shiva navabi,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 13449," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",ashutosh nayyar,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 13450," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",reihaneh hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 13451," Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome. ",tao wang,,2016.0,,arXiv,Hu2016,True,,arXiv,Not available,"Caching as a Service: Small-cell Caching Mechanism Design for Service Providers",b5bdc93c08a0df3a20dc1c2b4eb1e2ab,http://arxiv.org/abs/1607.04894v1 13452," Situations where a group of agents come together to jointly buy a resource that they individually cannot afford to buy are commonly observed in markets. For example in the US market for radio spectrum, a recent proposal invited small firms who would benefit from gaining additional access to spectrum to jointly submit bids for blocks of spectrum with the idea that its utilization could be shared. In such a scenario, the problem is to design a mechanism that truthfully elicits and aggregates the privately held preferences of these agents, and enables them to act as a single decision-making body in order to participate in the market. In this paper, we design a class of mechanisms called monotonic aggregation mechanisms that achieves this under a specific setting. We assume that the resource is being sold in a sealed-bid second-price auction that solicits bids for the entire resource. Our mechanism truthfully elicits utility functions from the buyers, prescribes a joint bid, and prescribes a division of the payment and the resource in the event that they win the resource in the auction. This mechanism further satisfies a popular notion of collusion-resistance known as coalition-strategyproofness. We give two explicit examples of this generic class for the case where the utility functions of the buyers are non-decreasing and concave. ",vijay kamble,,2014.0,,arXiv,Kamble2014,True,,arXiv,Not available,"Monotonic Preference Aggregation Mechanisms for Purchasing a Shareable Resource",a66c99af3de4f8f0b5c9cdcbb6b49bf9,http://arxiv.org/abs/1407.7594v3 13453," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",ali movaghar,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 13454," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",hamid hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 13455," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",hu fu,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 13456," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",chris liaw,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 13457," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",pinyan lu,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 13458," We consider a revenue optimizing seller selling a single item to a buyer, on whose private value the seller has a noisy signal. We show that, when the signal is kept private, arbitrarily more revenue could potentially be extracted than if the signal is leaked or revealed. We then show that, if the seller is not allowed to make payments to the buyer, the gap between the two is bounded by a multiplicative factor of 3, if the value distribution conditioning on each signal is regular. We give examples showing that both conditions are necessary for a constant bound to hold. We connect this scenario to multi-bidder single-item auctions where bidders' values are correlated. Similarly to the setting above, we show that the revenue of a Bayesian incentive compatible, ex post individually rational auction can be arbitrarily larger than that of a dominant strategy incentive compatible auction, whereas the two are no more than a factor of 5 apart if the auctioneer never pays the bidders and if each bidder's value conditioning on the others' is drawn according to a regular distribution. The upper bounds in both settings degrade gracefully when the distribution is a mixture of a small number of regular distributions. ",zhihao tang,,2017.0,,arXiv,Fu2017,True,,arXiv,Not available,The Value of Information Concealment,567ca3c27fc2e6ca18babacef11f187e,http://arxiv.org/abs/1707.05875v1 13459," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",yutao jiao,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 13460," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",ping wang,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 13461," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",dusit niyato,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 13462," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",zehui xiong,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 13463," Situations where a group of agents come together to jointly buy a resource that they individually cannot afford to buy are commonly observed in markets. For example in the US market for radio spectrum, a recent proposal invited small firms who would benefit from gaining additional access to spectrum to jointly submit bids for blocks of spectrum with the idea that its utilization could be shared. In such a scenario, the problem is to design a mechanism that truthfully elicits and aggregates the privately held preferences of these agents, and enables them to act as a single decision-making body in order to participate in the market. In this paper, we design a class of mechanisms called monotonic aggregation mechanisms that achieves this under a specific setting. We assume that the resource is being sold in a sealed-bid second-price auction that solicits bids for the entire resource. Our mechanism truthfully elicits utility functions from the buyers, prescribes a joint bid, and prescribes a division of the payment and the resource in the event that they win the resource in the auction. This mechanism further satisfies a popular notion of collusion-resistance known as coalition-strategyproofness. We give two explicit examples of this generic class for the case where the utility functions of the buyers are non-decreasing and concave. ",jean walrand,,2014.0,,arXiv,Kamble2014,True,,arXiv,Not available,"Monotonic Preference Aggregation Mechanisms for Purchasing a Shareable Resource",a66c99af3de4f8f0b5c9cdcbb6b49bf9,http://arxiv.org/abs/1407.7594v3 13464," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",dimitris fotakis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 13465," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",kyriakos lotidis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 13466," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",chara podimata,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 13471," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",arupratan ray,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13472," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",debmalya mandal,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13473," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",y. narahari,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 13474," This paper presents models for predicted click-through rates in position auctions that take into account two possibilities that are not normally considered---that the identities of ads shown in other positions may affect the probability that an ad in a particular position receives a click (externalities) and that some ads may be less adversely affected by being shown in a lower position than others (brand effects). We present a general axiomatic methodology for how click probabilities are affected by the qualities of the ads in the other positions, and illustrate that using these axioms will increase revenue as long as higher quality ads tend to be ranked ahead of lower quality ads. We also present appropriate algorithms for selecting the optimal allocation of ads when predicted click-through rates are governed by either the models of externalities or brand effects that we consider. Finally, we analyze the performance of a greedy algorithm of ranking the ads by their expected cost-per-1000-impressions bids when the true click-through rates are governed by our model of predicted click-through rates with brand effects and illustrate that such an algorithm will potentially cost as much as half of the total possible social welfare. ",patrick hummel,,2014.0,,arXiv,Hummel2014,True,,arXiv,Not available,Position Auctions with Externalities and Brand Effects,4d4216c234b6851916b712bcaab26c22,http://arxiv.org/abs/1409.4687v1 13475," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",yannai gonczarowski,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 13476," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",noam nisan,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 13477," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",amy greenwald,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 13478," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",takehiro oyakawa,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 13479," We investigate approximately optimal mechanisms in settings where bidders' utility functions are non-linear; specifically, convex, with respect to payments (such settings arise, for instance, in procurement auctions for energy). We provide constant factor approximation guarantees for mechanisms that are independent of bidders' private information (i.e., prior-free), and for mechanisms that rely to an increasing extent on that information (i.e., detail free). We also describe experiments, which show that for randomly drawn monotone hazard rate distributions, our mechanisms achieve at least 80\% of the optimal revenue, on average. Both our theoretical and experimental results show that in the convex payment setting, it is desirable to allocate across multiple bidders, rather than only to bidders with the highest (virtual) value, as in the traditional quasi-linear utility setting. ",vasilis syrgkanis,,2017.0,,arXiv,Greenwald2017,True,,arXiv,Not available,Simple vs Optimal Mechanisms in Auctions with Convex Payments,55b6b74b7453e4e8295dc41f50a048ca,http://arxiv.org/abs/1702.06062v2 13480," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",yutao jiao,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13481," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",ping wang,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13482," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",dusit niyato,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13483," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",mohammad alsheikh,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13484," A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data services is not well-studied. In this paper, we propose an auction-based big data market model. We first define the data cost and utility based on the impact of data size on the performance of big data analytics, e.g., machine learning algorithms. The big data services are considered as digital goods and uniquely characterized with ""unlimited supply"" compared to conventional goods which are limited. We therefore propose a Bayesian profit maximization auction which is truthful, rational, and computationally efficient. The optimal service price and data size are obtained by solving the profit maximization auction. Finally, experimental results on a real-world taxi trip dataset show that our big data market model and auction mechanism effectively solve the profit maximization problem of the service provider. ",shaohan feng,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,Profit Maximization Auction and Data Management in Big Data Markets,595a0baaeca5a78cc4c652370e0052e8,http://arxiv.org/abs/1704.01260v2 13485," This paper presents models for predicted click-through rates in position auctions that take into account two possibilities that are not normally considered---that the identities of ads shown in other positions may affect the probability that an ad in a particular position receives a click (externalities) and that some ads may be less adversely affected by being shown in a lower position than others (brand effects). We present a general axiomatic methodology for how click probabilities are affected by the qualities of the ads in the other positions, and illustrate that using these axioms will increase revenue as long as higher quality ads tend to be ranked ahead of lower quality ads. We also present appropriate algorithms for selecting the optimal allocation of ads when predicted click-through rates are governed by either the models of externalities or brand effects that we consider. Finally, we analyze the performance of a greedy algorithm of ranking the ads by their expected cost-per-1000-impressions bids when the true click-through rates are governed by our model of predicted click-through rates with brand effects and illustrate that such an algorithm will potentially cost as much as half of the total possible social welfare. ",r. mcafee,,2014.0,,arXiv,Hummel2014,True,,arXiv,Not available,Position Auctions with Externalities and Brand Effects,4d4216c234b6851916b712bcaab26c22,http://arxiv.org/abs/1409.4687v1 13486," The auction method developed by Bertsekas in the late 1970s is a relaxation technique for solving integer-valued assignment problems. It resembles a competitive bidding process, where unsatisfied persons (bidders) attempt to claim the objects (lots) offering the best value. By transforming integer-valued transport problems into assignment problems, the auction method can be extended to compute optimal transport solutions. We propose a more general auction method that can be applied directly to real-valued transport problems. We prove termination and provide a priori error bounds for the general auction method. Our numerical results indicate that the complexity of the general auction is roughly comparable to that of the original auction method, when the latter is applicable. ",j. iii,,2017.0,,arXiv,III2017,True,,arXiv,Not available,General auction method for real-valued optimal transport,06e279ce86df9db6c033328a82843f3e,http://arxiv.org/abs/1705.06379v1 13487," The auction method developed by Bertsekas in the late 1970s is a relaxation technique for solving integer-valued assignment problems. It resembles a competitive bidding process, where unsatisfied persons (bidders) attempt to claim the objects (lots) offering the best value. By transforming integer-valued transport problems into assignment problems, the auction method can be extended to compute optimal transport solutions. We propose a more general auction method that can be applied directly to real-valued transport problems. We prove termination and provide a priori error bounds for the general auction method. Our numerical results indicate that the complexity of the general auction is roughly comparable to that of the original auction method, when the latter is applicable. ",luca dieci,,2017.0,,arXiv,III2017,True,,arXiv,Not available,General auction method for real-valued optimal transport,06e279ce86df9db6c033328a82843f3e,http://arxiv.org/abs/1705.06379v1 13488," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",sebastien bubeck,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 13489," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",nikhil devanur,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 13490," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",zhiyi huang,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 13491," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",rad niazadeh,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 13492," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",orcun karaca,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 13493," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",pier sessa,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 13494," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",neil walton,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 13495," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",maryam kamgarpour,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 13496," The popular generalized second price (GSP) auction for sponsored search is built upon a separable model of click-through-rates that decomposes the likelihood of a click into the product of a ""slot effect"" and an ""advertiser effect"" --- if the first slot is twice as good as the second for some bidder, then it is twice as good for everyone. Though appealing in its simplicity, this model is quite suspect in practice. A wide variety of factors including externalities and budgets have been studied that can and do cause it to be violated. In this paper we adopt a view of GSP as an iterated second price auction (see, e.g., Milgrom 2010) and study how the most basic violation of separability --- position dependent, arbitrary public click-through-rates that do not decompose --- affects results from the foundational analysis of GSP (Varian 2007, Edelman et al. 2007). For the two-slot setting we prove that for arbitrary click-through-rates, for arbitrary bidder values, an efficient pure-strategy equilibrium always exists; however, without separability there always exist values such that the VCG outcome and payments cannot be realized by any bids, in equilibrium or otherwise. The separability assumption is therefore necessary in the two-slot case to match the payments of VCG but not for efficiency. We moreover show that without separability, generic existence of efficient equilibria is sensitive to the choice of tie-breaking rule, and when there are more than two slots, no (bid-independent) tie-breaking rule yields the positive result. In light of this we suggest alternative mechanisms that trade the simplicity of GSP for better equilibrium properties when there are three or more slots. ",ruggiero cavallo,,2014.0,,arXiv,Cavallo2014,True,,arXiv,Not available,GSP with General Independent Click-Through-Rates,2f96f7ff382853712a8a63341c995729,http://arxiv.org/abs/1410.3048v1 13497," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",li-hsing yen,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 13498," Auction has been used to allocate resources or tasks to processes, machines or other autonomous entities in distributed systems. When different bidders have different demands and valuations on different types of resources or tasks, the auction becomes a combinatorial auction (CA), for which finding an optimal auction result that maximizes total winning bid is NP-hard. Many time-efficient approximations to this problem work with a bid ranking function (BRF). However, existing approximations are all centralized and mostly for single-unit resource. In this paper, we propose the first decentralized CA schemes for multi-unit resources. It includes a BRF-based winner determination scheme that enables every agent to locally compute a critical bid value for her to win the CA and accordingly take her best response to other agent's win declaration. It also includes a critical-value-based pricing scheme for each winner to locally compute her payment. We analyze stabilization, correctness, and consistency properties of the proposed approach. Simulation results confirms that the proposed approach identifies exactly the same set of winners as the centralized counterpart regardless of initial bid setting, but at the cost of lower total winning bid and payment. ",guang-hong sun,,2018.0,,arXiv,Yen2018,True,,arXiv,Not available,Decentralized Combinatorial Auctions for Multi-Unit Resource Allocation,5738a98c6851ffdc83cd9508a9b957e1,http://arxiv.org/abs/1804.05635v1 13499," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",hedyeh beyhaghi,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 13500," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",negin golrezaei,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 13501," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",renato leme,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 13502," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",martin pal,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 13503," We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities. Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing. ",balasubramanian siva,,2018.0,,arXiv,Beyhaghi2018,True,,arXiv,Not available,"Improved Approximations for Free-Order Prophets and Second-Price Auctions",e8d183e5398a451d43f371e421ab35f6,http://arxiv.org/abs/1807.03435v1 13504," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",zhili chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13505," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",tianjiao ni,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13506," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",hong zhong,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13507," The popular generalized second price (GSP) auction for sponsored search is built upon a separable model of click-through-rates that decomposes the likelihood of a click into the product of a ""slot effect"" and an ""advertiser effect"" --- if the first slot is twice as good as the second for some bidder, then it is twice as good for everyone. Though appealing in its simplicity, this model is quite suspect in practice. A wide variety of factors including externalities and budgets have been studied that can and do cause it to be violated. In this paper we adopt a view of GSP as an iterated second price auction (see, e.g., Milgrom 2010) and study how the most basic violation of separability --- position dependent, arbitrary public click-through-rates that do not decompose --- affects results from the foundational analysis of GSP (Varian 2007, Edelman et al. 2007). For the two-slot setting we prove that for arbitrary click-through-rates, for arbitrary bidder values, an efficient pure-strategy equilibrium always exists; however, without separability there always exist values such that the VCG outcome and payments cannot be realized by any bids, in equilibrium or otherwise. The separability assumption is therefore necessary in the two-slot case to match the payments of VCG but not for efficiency. We moreover show that without separability, generic existence of efficient equilibria is sensitive to the choice of tie-breaking rule, and when there are more than two slots, no (bid-independent) tie-breaking rule yields the positive result. In light of this we suggest alternative mechanisms that trade the simplicity of GSP for better equilibrium properties when there are three or more slots. ",christopher wilkens,,2014.0,,arXiv,Cavallo2014,True,,arXiv,Not available,GSP with General Independent Click-Through-Rates,2f96f7ff382853712a8a63341c995729,http://arxiv.org/abs/1410.3048v1 13508," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",shun zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13509," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",jie cui,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13510," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 13511," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",tim roughgarden,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 13512," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",qiqi yan,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 13513," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",mark braverman,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 13514," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",jieming mao,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 13515," We consider the following communication problem: Alice and Bob each have some valuation functions $v_1(\cdot)$ and $v_2(\cdot)$ over subsets of $m$ items, and their goal is to partition the items into $S, \bar{S}$ in a way that maximizes the welfare, $v_1(S) + v_2(\bar{S})$. We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partition guaranteeing certain welfare, for binary XOS valuations. For interactive protocols with $poly(m)$ communication, a tight 3/4-approximation is known for both [Fei06,DS06]. For interactive protocols, the allocation problem is provably harder than the decision problem: any solution to the allocation problem implies a solution to the decision problem with one additional round and $\log m$ additional bits of communication via a trivial reduction. Surprisingly, the allocation problem is provably easier for simultaneous protocols. Specifically, we show: 1) There exists a simultaneous, randomized protocol with polynomial communication that selects a partition whose expected welfare is at least $3/4$ of the optimum. This matches the guarantee of the best interactive, randomized protocol with polynomial communication. 2) For all $\varepsilon > 0$, any simultaneous, randomized protocol that decides whether the welfare of the optimal partition is $\geq 1$ or $\leq 3/4 - 1/108+\varepsilon$ correctly with probability $> 1/2 + 1/ poly(m)$ requires exponential communication. This provides a separation between the attainable approximation guarantees via interactive ($3/4$) versus simultaneous ($\leq 3/4-1/108$) protocols with polynomial communication. In other words, this trivial reduction from decision to allocation problems provably requires the extra round of communication. ",s. weinberg,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,On Simultaneous Two-player Combinatorial Auctions,c78634fe7851312c775fd2199c378020,http://arxiv.org/abs/1704.03547v1 13516," We study the necessity of interaction for obtaining efficient allocations in subadditive combinatorial auctions. This problem was originally introduced by Dobzinski, Nisan, and Oren (STOC'14) as the following simple market scenario: $m$ items are to be allocated among $n$ bidders in a distributed setting where bidders valuations are private and hence communication is needed to obtain an efficient allocation. The communication happens in rounds: in each round, each bidder, simultaneously with others, broadcasts a message to all parties involved and the central planner computes an allocation solely based on the communicated messages. Dobzinski et.al. showed that no non-interactive ($1$-round) protocol with polynomial communication (in the number of items and bidders) can achieve approximation ratio better than $\Omega(m^{{1}/{4}})$, while for any $r \geq 1$, there exists $r$-round protocols that achieve $\widetilde{O}(r \cdot m^{{1}/{r+1}})$ approximation with polynomial communication; in particular, $O(\log{m})$ rounds of interaction suffice to obtain an (almost) efficient allocation. A natural question at this point is to identify the ""right"" level of interaction (i.e., number of rounds) necessary to obtain an efficient allocation. In this paper, we resolve this question by providing an almost tight round-approximation tradeoff for this problem: we show that for any $r \geq 1$, any $r$-round protocol that uses polynomial communication can only approximate the social welfare up to a factor of $\Omega(\frac{1}{r} \cdot m^{{1}/{2r+1}})$. This in particular implies that $\Omega(\frac{\log{m}}{\log\log{m}})$ rounds of interaction are necessary for obtaining any efficient allocation in these markets. Our work builds on the recent multi-party round-elimination technique of Alon, Nisan, Raz, and Weinstein (FOCS'15) and settles an open question posed by Dobzinski et.al. and Alon et. al. ",sepehr assadi,,2017.0,,arXiv,Assadi2017,True,,arXiv,Not available,Combinatorial Auctions Do Need Modest Interaction,83d69471545cd0d8f2cbce80698bd896,http://arxiv.org/abs/1705.01644v1 13517," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",ashwinkumar badanidiyuru,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 13518," Media publisher platforms often face an effectiveness-nuisance tradeoff: more annoying ads can be more effective for some advertisers because of their ability to attract attention, but after attracting viewers' attention, their nuisance to viewers can decrease engagement with the platform over time. With the rise of mobile technology and ad blockers, many platforms are becoming increasingly concerned about how to improve monetization through digital ads while improving viewer experience. We study an online ad auction mechanism that incorporates a charge for ad impact on user experience as a criterion for ad selection and pricing. Like a Pigovian tax, the charge causes advertisers to internalize the hidden cost of foregone future platform revenue due to ad impact on user experience. Over time, the mechanism provides an incentive for advertisers to develop ads that are effective while offering viewers a more pleasant experience. We show that adopting the mechanism can simultaneously benefit the publisher, advertisers, and viewers, even in the short term. Incorporating a charge for ad impact can increase expected advertiser profits if enough advertisers compete. A stronger effectiveness-nuisance tradeoff, meaning that ad effectiveness is more strongly associated with negative impact on user experience, increases the amount of competition required for the mechanism to benefit advertisers. The findings suggest that the mechanism can benefit the marketplace for ad slots that consistently attract many advertisers. ",valeria stourm,,2014.0,,arXiv,Stourm2014,True,,arXiv,Not available,Incorporating Hidden Costs of Annoying Ads in Display Auctions,5780b1f28a45b900f9ebb6b517aeda32,http://arxiv.org/abs/1411.0710v2 13519," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",kshipra bhawalkar,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 13520," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",haifeng xu,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 13522," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",marc abeille,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 13523," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",clement calauzenes,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 13524," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",noureddine karoui,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 13525," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",thomas nedelec,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 13526," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",vianney perchet,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 13527," We study revenue optimization pricing algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation. We show that, in the case when both the seller and the buyer have the same discounting in their cumulative utilities (revenue and surplus), there exist two optimal algorithms. The first one constantly offers the Myerson price, while the second pricing proposes a ""big deal"": pay for all goods in advance (at the first round) or get nothing. However, when there is an imbalance between the seller and the buyer in the patience to wait for utility, we find that the constant pricing, surprisingly, is no longer optimal. First, it is outperformed by the pricing algorithm ""big deal"", when the seller's discount rate is lower than the one of the buyer. Second, in the inverse case of a less patient buyer, we reduce the problem of finding an optimal algorithm to a multidimensional optimization problem (a multivariate analogue of the functional used to determine Myerson's price) that does not admit a closed form solution in general, but can be solved by numerical optimization techniques (e.g., gradient ones). We provide extensive analysis of numerically found optimal algorithms to demonstrate that they are non-trivial, may be non-consistent, and generate larger expected revenue than the constant pricing with the Myerson price. ",arsenii vanunts,,2018.0,,arXiv,Vanunts2018,True,,arXiv,Not available,Optimal Pricing in Repeated Posted-Price Auctions,77744b40b5e756238bf2b1efa37ac197,http://arxiv.org/abs/1805.02574v1 13528," We study revenue optimization pricing algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation. We show that, in the case when both the seller and the buyer have the same discounting in their cumulative utilities (revenue and surplus), there exist two optimal algorithms. The first one constantly offers the Myerson price, while the second pricing proposes a ""big deal"": pay for all goods in advance (at the first round) or get nothing. However, when there is an imbalance between the seller and the buyer in the patience to wait for utility, we find that the constant pricing, surprisingly, is no longer optimal. First, it is outperformed by the pricing algorithm ""big deal"", when the seller's discount rate is lower than the one of the buyer. Second, in the inverse case of a less patient buyer, we reduce the problem of finding an optimal algorithm to a multidimensional optimization problem (a multivariate analogue of the functional used to determine Myerson's price) that does not admit a closed form solution in general, but can be solved by numerical optimization techniques (e.g., gradient ones). We provide extensive analysis of numerically found optimal algorithms to demonstrate that they are non-trivial, may be non-consistent, and generate larger expected revenue than the constant pricing with the Myerson price. ",alexey drutsa,,2018.0,,arXiv,Vanunts2018,True,,arXiv,Not available,Optimal Pricing in Repeated Posted-Price Auctions,77744b40b5e756238bf2b1efa37ac197,http://arxiv.org/abs/1805.02574v1 13529," Media publisher platforms often face an effectiveness-nuisance tradeoff: more annoying ads can be more effective for some advertisers because of their ability to attract attention, but after attracting viewers' attention, their nuisance to viewers can decrease engagement with the platform over time. With the rise of mobile technology and ad blockers, many platforms are becoming increasingly concerned about how to improve monetization through digital ads while improving viewer experience. We study an online ad auction mechanism that incorporates a charge for ad impact on user experience as a criterion for ad selection and pricing. Like a Pigovian tax, the charge causes advertisers to internalize the hidden cost of foregone future platform revenue due to ad impact on user experience. Over time, the mechanism provides an incentive for advertisers to develop ads that are effective while offering viewers a more pleasant experience. We show that adopting the mechanism can simultaneously benefit the publisher, advertisers, and viewers, even in the short term. Incorporating a charge for ad impact can increase expected advertiser profits if enough advertisers compete. A stronger effectiveness-nuisance tradeoff, meaning that ad effectiveness is more strongly associated with negative impact on user experience, increases the amount of competition required for the mechanism to benefit advertisers. The findings suggest that the mechanism can benefit the marketplace for ad slots that consistently attract many advertisers. ",eric bax,,2014.0,,arXiv,Stourm2014,True,,arXiv,Not available,Incorporating Hidden Costs of Annoying Ads in Display Auctions,5780b1f28a45b900f9ebb6b517aeda32,http://arxiv.org/abs/1411.0710v2 13530," We consider the problem of designing revenue-optimal auctions for selling two items and bidders' valuations are independent among bidders but negatively correlated among items. In this paper, we obtain the closed-form optimal auction for this setting, by directly addressing the two difficulties above. In particular, the first difficulty is that when pointwise maximizing virtual surplus under multi-dimensional feasibility (i.e., the Border feasibility), (1) neither the optimal interim allocation is trivially monotone in the virtual value, (2) nor the virtual value is monotone in the bidder's type. As a result, the optimal interim allocations resulting from virtual surplus maximization no longer guarantees BIC. To address (1), we prove a generalization of Border's theorem and show that optimal interim allocation is indeed monotone in the virtual value. To address (2), we adapt Myerson's ironing procedure to this setting by redefining the (ironed) virtual value as a function of the lowest utility point. The second difficulty, perhaps a more challenging one, is that the lowest utility type in general is no longer at the endpoints of the type interval. To address this difficulty, we show by construction that there exist an allocation rule and an induced lowest utility type such that they form a solution of the virtual surplus maximization and in the meanwhile guarantees IIR. In the single bidder case, the optimal auction consists of a randomized bundle menu and a deterministic bundle menu; while in the multiple bidder case, the optimal auction is a randomization between two extreme mechanisms. The optimal solutions of our setting can be implemented by a Bayesian IC and IR auction, however, perhaps surprisingly, the revenue of this auction cannot be achieved by any (dominant-strategy) IC and IR auction. ",pingzhong tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Optimal Auctions for Negatively Correlated Items,c8ac3cd7a96dd7dc5defd2a0f21447bb,http://arxiv.org/abs/1603.00562v3 13531," We consider the problem of designing revenue-optimal auctions for selling two items and bidders' valuations are independent among bidders but negatively correlated among items. In this paper, we obtain the closed-form optimal auction for this setting, by directly addressing the two difficulties above. In particular, the first difficulty is that when pointwise maximizing virtual surplus under multi-dimensional feasibility (i.e., the Border feasibility), (1) neither the optimal interim allocation is trivially monotone in the virtual value, (2) nor the virtual value is monotone in the bidder's type. As a result, the optimal interim allocations resulting from virtual surplus maximization no longer guarantees BIC. To address (1), we prove a generalization of Border's theorem and show that optimal interim allocation is indeed monotone in the virtual value. To address (2), we adapt Myerson's ironing procedure to this setting by redefining the (ironed) virtual value as a function of the lowest utility point. The second difficulty, perhaps a more challenging one, is that the lowest utility type in general is no longer at the endpoints of the type interval. To address this difficulty, we show by construction that there exist an allocation rule and an induced lowest utility type such that they form a solution of the virtual surplus maximization and in the meanwhile guarantees IIR. In the single bidder case, the optimal auction consists of a randomized bundle menu and a deterministic bundle menu; while in the multiple bidder case, the optimal auction is a randomization between two extreme mechanisms. The optimal solutions of our setting can be implemented by a Bayesian IC and IR auction, however, perhaps surprisingly, the revenue of this auction cannot be achieved by any (dominant-strategy) IC and IR auction. ",zihe wang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Optimal Auctions for Negatively Correlated Items,c8ac3cd7a96dd7dc5defd2a0f21447bb,http://arxiv.org/abs/1603.00562v3 13532," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",jason hartline,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 13533," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",darrell hoy,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 13534," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",sam taggart,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 13535," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",jason hartline,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 13536," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",nicole immorlica,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 13537," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",mohammad khani,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 13538," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",brendan lucier,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 13539," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",rad niazadeh,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 13540," Traditional studies of combinatorial auctions often only consider linear constraints. The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. This paper studies the {\em complex-demand knapsack problem}, in which the demands are complex valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in alternating current (AC) electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known $\frac{1}{2}$-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case $\phi\in[0,\frac{\pi}{2}-\delta]$, and a truthful FPTAS, which {\it fully} optimizes the objective function but violates the capacity constraint by at most $(1+\epsilon)$, for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$, where $\phi$ is the maximum argument of any complex-valued demand and $\epsilon,\delta>0$ are arbitrarily small constants. We complement these results by showing that, unless P=NP, neither a PTAS for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$ nor any bi-criteria approximation algorithm with polynomial guarantees for the case when $\phi$ is arbitrarily close to $\pi$ (that is, when $\delta$ is arbitrarily close to $0$) can exist. ",chi-kin chau,,2015.0,10.1145/2955089,"ACM Transactions on Economics and Computation, Vol. 5, No. 1, Article 7, October, 2016",Chau2015,True,,arXiv,Not available,"Truthful Mechanisms for Combinatorial Allocation of Electric Power in Alternating Current Electric Systems for Smart Grid",f7ee02188485d364a2fc460d9cf7bc7d,http://arxiv.org/abs/1507.01762v3 13541," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",miroslav dudik,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13542," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",nika haghtalab,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13543," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",haipeng luo,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13544," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",robert schapire,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13545," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",vasilis syrgkanis,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13546," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",jennifer vaughan,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13547," We consider the sample complexity of revenue maximization for multiple bidders in unrestricted multi-dimensional settings. Specifically, we study the standard model of $n$ additive bidders whose values for $m$ heterogeneous items are drawn independently. For any such instance and any $\varepsilon>0$, we show that it is possible to learn an $\varepsilon$-Bayesian Incentive Compatible auction whose expected revenue is within $\varepsilon$ of the optimal $\varepsilon$-BIC auction from only polynomially many samples. Our approach is based on ideas that hold quite generally, and completely sidestep the difficulty of characterizing optimal (or near-optimal) auctions for these settings. Therefore, our results easily extend to general multi-dimensional settings, including valuations that aren't necessarily even subadditive, and arbitrary allocation constraints. For the cases of a single bidder and many goods, or a single parameter (good) and many bidders, our analysis yields exact incentive compatibility (and for the latter also computational efficiency). Although the single-parameter case is already well-understood, our corollary for this case extends slightly the state-of-the-art. ",yannai gonczarowski,,2018.0,,arXiv,Gonczarowski2018,True,,arXiv,Not available,"The Sample Complexity of Up-to-$\varepsilon$ Multi-Dimensional Revenue Maximization",c0e7e53eb429b744204185dda969eff4,http://arxiv.org/abs/1808.02458v1 13548," We consider the sample complexity of revenue maximization for multiple bidders in unrestricted multi-dimensional settings. Specifically, we study the standard model of $n$ additive bidders whose values for $m$ heterogeneous items are drawn independently. For any such instance and any $\varepsilon>0$, we show that it is possible to learn an $\varepsilon$-Bayesian Incentive Compatible auction whose expected revenue is within $\varepsilon$ of the optimal $\varepsilon$-BIC auction from only polynomially many samples. Our approach is based on ideas that hold quite generally, and completely sidestep the difficulty of characterizing optimal (or near-optimal) auctions for these settings. Therefore, our results easily extend to general multi-dimensional settings, including valuations that aren't necessarily even subadditive, and arbitrary allocation constraints. For the cases of a single bidder and many goods, or a single parameter (good) and many bidders, our analysis yields exact incentive compatibility (and for the latter also computational efficiency). Although the single-parameter case is already well-understood, our corollary for this case extends slightly the state-of-the-art. ",s. weinberg,,2018.0,,arXiv,Gonczarowski2018,True,,arXiv,Not available,"The Sample Complexity of Up-to-$\varepsilon$ Multi-Dimensional Revenue Maximization",c0e7e53eb429b744204185dda969eff4,http://arxiv.org/abs/1808.02458v1 13549," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",v. nadendla,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 13550," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",swastik brahma,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 13551," Traditional studies of combinatorial auctions often only consider linear constraints. The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. This paper studies the {\em complex-demand knapsack problem}, in which the demands are complex valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in alternating current (AC) electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known $\frac{1}{2}$-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case $\phi\in[0,\frac{\pi}{2}-\delta]$, and a truthful FPTAS, which {\it fully} optimizes the objective function but violates the capacity constraint by at most $(1+\epsilon)$, for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$, where $\phi$ is the maximum argument of any complex-valued demand and $\epsilon,\delta>0$ are arbitrarily small constants. We complement these results by showing that, unless P=NP, neither a PTAS for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$ nor any bi-criteria approximation algorithm with polynomial guarantees for the case when $\phi$ is arbitrarily close to $\pi$ (that is, when $\delta$ is arbitrarily close to $0$) can exist. ",khaled elbassioni,,2015.0,10.1145/2955089,"ACM Transactions on Economics and Computation, Vol. 5, No. 1, Article 7, October, 2016",Chau2015,True,,arXiv,Not available,"Truthful Mechanisms for Combinatorial Allocation of Electric Power in Alternating Current Electric Systems for Smart Grid",f7ee02188485d364a2fc460d9cf7bc7d,http://arxiv.org/abs/1507.01762v3 13552," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",pramod varshney,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 13553," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",saeed alaei,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 13554," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",hu fu,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 13555," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",nima haghpanah,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 13556," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",jason hartline,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 13557," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",azarakhsh malekian,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 13558," In this paper, we introduce a novel approach for reducing the $k$-item $n$-bidder auction with additive valuation to $k$-item $1$-bidder auctions. This approach, called the \emph{Best-Guess} reduction, can be applied to address several central questions in optimal revenue auction theory such as the power of randomization, and Bayesian versus dominant-strategy implementations. First, when the items have independent valuation distributions, we present a deterministic mechanism called {\it Deterministic Best-Guess} that yields at least a constant fraction of the optimal revenue by any randomized mechanism. Second, if all the $nk$ valuation random variables are independent, the optimal revenue achievable in {\it dominant strategy incentive compatibility} (DSIC) is shown to be at least a constant fraction of that achievable in {\it Bayesian incentive compatibility} (BIC). Third, when all the $nk$ values are identically distributed according to a common one-dimensional distribution $F$, the optimal revenue is shown to be expressible in the closed form $\Theta(k(r+\int_0^{mr} (1-F(x)^n) \ud x))$ where $r= sup_{x\geq 0} \, x(1 - F(x)^n)$ and $m=\lceil k/n\rceil$; this revenue is achievable by a simple mechanism called \emph{2nd-Price Bundling}. All our results apply to arbitrary distributions, regular or irregular. ",andrew yao,,2014.0,,arXiv,Yao2014,True,,arXiv,Not available,An n-to-1 Bidder Reduction for Multi-item Auctions and its Applications,b0e9c9a883abfec4cbe77abe92459297,http://arxiv.org/abs/1406.3278v3 13559," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",saeed alaei,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13560," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",hu fu,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13561," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",nima haghpanah,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13562," Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome. ",lingyang song,,2016.0,,arXiv,Hu2016,True,,arXiv,Not available,"Caching as a Service: Small-cell Caching Mechanism Design for Service Providers",b5bdc93c08a0df3a20dc1c2b4eb1e2ab,http://arxiv.org/abs/1607.04894v1 13563," Traditional studies of combinatorial auctions often only consider linear constraints. The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. This paper studies the {\em complex-demand knapsack problem}, in which the demands are complex valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in alternating current (AC) electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known $\frac{1}{2}$-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case $\phi\in[0,\frac{\pi}{2}-\delta]$, and a truthful FPTAS, which {\it fully} optimizes the objective function but violates the capacity constraint by at most $(1+\epsilon)$, for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$, where $\phi$ is the maximum argument of any complex-valued demand and $\epsilon,\delta>0$ are arbitrarily small constants. We complement these results by showing that, unless P=NP, neither a PTAS for the case $\phi\in(\frac{\pi}{2},\pi-\delta]$ nor any bi-criteria approximation algorithm with polynomial guarantees for the case when $\phi$ is arbitrarily close to $\pi$ (that is, when $\delta$ is arbitrarily close to $0$) can exist. ",majid khonji,,2015.0,10.1145/2955089,"ACM Transactions on Economics and Computation, Vol. 5, No. 1, Article 7, October, 2016",Chau2015,True,,arXiv,Not available,"Truthful Mechanisms for Combinatorial Allocation of Electric Power in Alternating Current Electric Systems for Smart Grid",f7ee02188485d364a2fc460d9cf7bc7d,http://arxiv.org/abs/1507.01762v3 13564," The intuition that profit is optimized by maximizing marginal revenue is a guiding principle in microeconomics. In the classical auction theory for agents with linear utility and single-dimensional preferences, Bulow and Roberts (1989) show that the optimal auction of Myerson (1981) is in fact optimizing marginal revenue. In particular Myerson's virtual values are exactly the derivative of an appropriate revenue curve. This paper considers mechanism design in environments where the agents have multi-dimensional and non-linear preferences. Understanding good auctions for these environments is considered to be the main challenge in Bayesian optimal mechanism design. In these environments maximizing marginal revenue may not be optimal and there is sometimes no direct way to implement the marginal revenue maximization. Our contributions are three fold: we characterize the settings for which marginal revenue maximization is optimal (by identifying an important condition that we call revenue linearity), we give simple procedures for implementing marginal revenue maximization in general, and we show that marginal revenue maximization is approximately optimal. Our approximation factor smoothly degrades in a term that quantifies how far the environment is from ideal (where marginal revenue maximization is optimal). Because the marginal revenue mechanism is optimal for single-dimensional agents, our generalization immediately approximately extends many results for single-dimensional agents. One of the biggest open questions in Bayesian algorithmic mechanism design is developing methodologies that are not brute-force in the size of the agent type space. Our methods identify a subproblem that, e.g., for unit-demand agents with values drawn from product distributions, enables approximation mechanisms that are polynomial in the dimension. ",jason hartline,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,The Simple Economics of Approximately Optimal Auctions,4cbd6af8f7893ef6b11f9729d69c7061,http://arxiv.org/abs/1206.3541v3 13565," With the recent growth in the size of cloud computing business, handling the interactions between customers and cloud providers has become more challenging. Auction theory has been proposed to model these interactions due to its simplicity and a good match with real-world scenarios. In this paper, we consider cloud of clouds networks (CCNs) with different types of servers along with customers with heterogeneous demands. For each CCN, a CCN manager is designated to handle the cloud resources. A comprehensive framework is introduced in which the process of resource gathering and allocation is addressed via two stages, where the first stage models the interactions between customers and CCN managers, and the second stage examines the interactions between CCN managers and private cloud providers (CPs). For the first stage, an options-based sequential auction (OBSA) is adapted to the examined market, which is capable of providing truthfulness as the dominant strategy and resolving the entrance time problem. An analytical foundation for OBSAs is presented and multiple performance metrics are derived. For the second stage, two parallel markets are assumed: flat-price and auction-based market. A theoretical framework for market analysis is provided and the bidding behavior of CCN managers is described. ",seyyedali hosseinalipour,,2018.0,,arXiv,Hosseinalipour2018,True,,arXiv,Not available,A Two-Stage Auction Mechanism for Cloud Resource Allocation,e6756a574be5d43a55091881d3add347,http://arxiv.org/abs/1807.04214v2 13566," With the recent growth in the size of cloud computing business, handling the interactions between customers and cloud providers has become more challenging. Auction theory has been proposed to model these interactions due to its simplicity and a good match with real-world scenarios. In this paper, we consider cloud of clouds networks (CCNs) with different types of servers along with customers with heterogeneous demands. For each CCN, a CCN manager is designated to handle the cloud resources. A comprehensive framework is introduced in which the process of resource gathering and allocation is addressed via two stages, where the first stage models the interactions between customers and CCN managers, and the second stage examines the interactions between CCN managers and private cloud providers (CPs). For the first stage, an options-based sequential auction (OBSA) is adapted to the examined market, which is capable of providing truthfulness as the dominant strategy and resolving the entrance time problem. An analytical foundation for OBSAs is presented and multiple performance metrics are derived. For the second stage, two parallel markets are assumed: flat-price and auction-based market. A theoretical framework for market analysis is provided and the bidding behavior of CCN managers is described. ",huaiyu dai,,2018.0,,arXiv,Hosseinalipour2018,True,,arXiv,Not available,A Two-Stage Auction Mechanism for Cloud Resource Allocation,e6756a574be5d43a55091881d3add347,http://arxiv.org/abs/1807.04214v2 13567," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",samson abramsky,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 13568," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",viktor winschel,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 13569," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",wei chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13570," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",shang-hua teng,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13571," We introduce two new ""degree of complementarity"" measures, which we refer to, respectively, as supermodular width and superadditive width. Both are formulated based on natural witnesses of complementarity. We show that both measures are robust by proving that they, respectively, characterize the gap of monotone set functions from being submodular and subadditive. Thus, they define two new hierarchies over monotone set functions, which we will refer to as Supermodular Width (SMW) hierarchy and Superadditive Width (SAW) hierarchy, with level 0 of the hierarchies resting exactly on submodular and subadditive functions, respectively. We present a comprehensive comparative analysis of the SMW hierarchy and the Supermodular Degree (SD) hierarchy, defined by Feige and Izsak. We prove that the SMW hierarchy is strictly more expressive than the SD hierarchy. We show that previous results regarding approximation guarantees for welfare and constrained maximization as well as regarding the Price of Anarchy (PoA) of simple auctions can be extended without any loss from the SD hierarchy to the SMW hierarchy. We also establish almost matching information-theoretical lower bounds. The combination of these approximation and hardness results illustrate that the SMW hierarchy provides an accurate characterization of ""near submodularity"" needed for maximization approximation. While SD and SMW hierarchies support nontrivial bounds on the PoA of simple auctions, we show that our SAW hierarchy seems to capture more intrinsic properties needed to realize the efficiency of simple auctions. So far, the SAW hierarchy provides the best dependency for the PoA of Single-bid Auction, and is nearly as competitive as the Maximum over Positive Hypergraphs (MPH) hierarchy for Simultaneous Item First Price Auction (SIA). We provide almost tight lower bounds for the PoA of both auctions with respect to the SAW hierarchy. ",hanrui zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity",68b3c0f7befc5ade30caf123a17f6bb6,http://arxiv.org/abs/1805.04436v1 13574," We study envy-free pricing mechanisms in matching markets with $m$ items and $n$ budget constrained buyers. Each buyer is interested in a subset of the items on sale, and she appraises at some single-value every item in her preference-set. Moreover, each buyer has a budget that constraints the maximum affordable payment, while she aims to obtain as many items as possible of her preference-set. Our goal is to compute an envy-free pricing allocation that maximizes the revenue, i.e., the total payment charged to the buyers. This pricing problem is hard to approximate better than $\Omega({\rm min} \{n,m\}^{1/2-\epsilon})$ for any $\epsilon>0$, unless $P=NP$. The hardness result is due to the presence of the matching constraints given that the simpler multi-unit case can be approximated up to a constant factor of $2$. The goal of this paper is to circumvent the hardness result by restricting ourselves to specific settings of valuations and budgets. Two particularly significant scenarios are: each buyer has a budget that is greater than her single-value valuation, and each buyer has a budget that is lower than her single-value valuation. Surprisingly, in both scenarios we are able to achieve a $1/4$-approximation to the optimal envy-free revenue. The algorithms utilize a novel version of the Ausebel ascending price auction. These results may suggest that, although it is difficult to approximate the optimal revenue in general, ascending price auctions could achieve relatively good revenue in most of the practical settings. ",riccardo colini-baldeschi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Revenue Maximizing Envy-Free Pricing in Matching Markets with Budgets,85b088d7ba235ae94468185717117032,http://arxiv.org/abs/1610.09221v1 13577," We present a number of models for the adword auctions used for pricing advertising slots on search engines such as Google, Yahoo! etc. We begin with a general problem formulation which allows the privately known valuation per click to be a function of both the identity of the advertiser and the slot. We present a compact characterization of the set of all deterministic incentive compatible direct mechanisms for this model. This new characterization allows us to conclude that there are incentive compatible mechanisms for this auction with a multi-dimensional type-space that are {\em not} affine maximizers. Next, we discuss two interesting special cases: slot independent valuation and slot independent valuation up to a privately known slot and zero thereafter. For both of these special cases, we characterize revenue maximizing and efficiency maximizing mechanisms and show that these mechanisms can be computed with a worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively, where $n$ is number of bidders and $m$ is number of slots. Next, we characterize optimal rank based allocation rules and propose a new mechanism that we call the customized rank based allocation. We report the results of a numerical study that compare the revenue and efficiency of the proposed mechanisms. The numerical results suggest that customized rank-based allocation rule is significantly superior to the rank-based allocation rules. ",garud iyengar,,2006.0,,arXiv,Iyengar2006,True,,arXiv,Not available,Characterizing Optimal Adword Auctions,57608a0f34400be41f0079a9da78cf9f,http://arxiv.org/abs/cs/0611063v1 13578," We present a number of models for the adword auctions used for pricing advertising slots on search engines such as Google, Yahoo! etc. We begin with a general problem formulation which allows the privately known valuation per click to be a function of both the identity of the advertiser and the slot. We present a compact characterization of the set of all deterministic incentive compatible direct mechanisms for this model. This new characterization allows us to conclude that there are incentive compatible mechanisms for this auction with a multi-dimensional type-space that are {\em not} affine maximizers. Next, we discuss two interesting special cases: slot independent valuation and slot independent valuation up to a privately known slot and zero thereafter. For both of these special cases, we characterize revenue maximizing and efficiency maximizing mechanisms and show that these mechanisms can be computed with a worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively, where $n$ is number of bidders and $m$ is number of slots. Next, we characterize optimal rank based allocation rules and propose a new mechanism that we call the customized rank based allocation. We report the results of a numerical study that compare the revenue and efficiency of the proposed mechanisms. The numerical results suggest that customized rank-based allocation rule is significantly superior to the rank-based allocation rules. ",anuj kumar,,2006.0,,arXiv,Iyengar2006,True,,arXiv,Not available,Characterizing Optimal Adword Auctions,57608a0f34400be41f0079a9da78cf9f,http://arxiv.org/abs/cs/0611063v1 13579," In normal version of combinatorial game theory, all games are invertible, whereas only the empty game is invertible in mis\`ere version. For this reason, several restricted universes were earlier considered for their study, in which more games are invertible. We here study combinatorial games in mis\`ere version, in particular universes where no player would like to pass their turn In these universes, we prove that having one extra condition makes all games become invertible. We then focus our attention on a specific quotient, called Q_Z, and show that all sums of universes whose quotient is Q_Z also have Q_Z as their quotient. ",gabriel renault,,2015.0,,arXiv,Renault2015,True,,arXiv,Not available,Invertibility modulo dead-ending no-P-universes,a6a5b541371bc2c329ccfb17a8a2952d,http://arxiv.org/abs/1509.01576v1 13580," We study a new class of games which generalizes congestion games and its bottleneck variant. We introduce congestion games with mixed objectives to model network scenarios in which players seek to optimize for latency and bandwidths alike. We characterize the existence of pure Nash equilibria (PNE) and the convergence of improvement dynamics. For games that do not possess PNE we give bounds on the approximation ratio of approximate pure Nash equilibria. ",matthias feldotto,,2016.0,10.1007/978-3-319-48749-6_47,arXiv,Feldotto2016,True,,arXiv,Not available,Congestion Games with Mixed Objectives,9e97915f7352d23afad9dc7f80437747,http://arxiv.org/abs/1607.05143v2 13581," We study a new class of games which generalizes congestion games and its bottleneck variant. We introduce congestion games with mixed objectives to model network scenarios in which players seek to optimize for latency and bandwidths alike. We characterize the existence of pure Nash equilibria (PNE) and the convergence of improvement dynamics. For games that do not possess PNE we give bounds on the approximation ratio of approximate pure Nash equilibria. ",lennart leder,,2016.0,10.1007/978-3-319-48749-6_47,arXiv,Feldotto2016,True,,arXiv,Not available,Congestion Games with Mixed Objectives,9e97915f7352d23afad9dc7f80437747,http://arxiv.org/abs/1607.05143v2 13582," We study a new class of games which generalizes congestion games and its bottleneck variant. We introduce congestion games with mixed objectives to model network scenarios in which players seek to optimize for latency and bandwidths alike. We characterize the existence of pure Nash equilibria (PNE) and the convergence of improvement dynamics. For games that do not possess PNE we give bounds on the approximation ratio of approximate pure Nash equilibria. ",alexander skopalik,,2016.0,10.1007/978-3-319-48749-6_47,arXiv,Feldotto2016,True,,arXiv,Not available,Congestion Games with Mixed Objectives,9e97915f7352d23afad9dc7f80437747,http://arxiv.org/abs/1607.05143v2 13583," Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a ""passive robber"". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study sequential and concurrent versions of the SCPR game. For both cases we prove the existence of value and optimal strategies and present algorithms for the computation of these. ",athanasios kehagias,,2016.0,,arXiv,Kehagias2016,True,,arXiv,Not available,Selfish Cops and Passive Robber: Qualitative Games,f21d84a9e064b9c9a1502d45e8c16a9e,http://arxiv.org/abs/1607.05434v2 13584," Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a ""passive robber"". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study sequential and concurrent versions of the SCPR game. For both cases we prove the existence of value and optimal strategies and present algorithms for the computation of these. ",georgios konstantinidis,,2016.0,,arXiv,Kehagias2016,True,,arXiv,Not available,Selfish Cops and Passive Robber: Qualitative Games,f21d84a9e064b9c9a1502d45e8c16a9e,http://arxiv.org/abs/1607.05434v2 13585," We study envy-free pricing mechanisms in matching markets with $m$ items and $n$ budget constrained buyers. Each buyer is interested in a subset of the items on sale, and she appraises at some single-value every item in her preference-set. Moreover, each buyer has a budget that constraints the maximum affordable payment, while she aims to obtain as many items as possible of her preference-set. Our goal is to compute an envy-free pricing allocation that maximizes the revenue, i.e., the total payment charged to the buyers. This pricing problem is hard to approximate better than $\Omega({\rm min} \{n,m\}^{1/2-\epsilon})$ for any $\epsilon>0$, unless $P=NP$. The hardness result is due to the presence of the matching constraints given that the simpler multi-unit case can be approximated up to a constant factor of $2$. The goal of this paper is to circumvent the hardness result by restricting ourselves to specific settings of valuations and budgets. Two particularly significant scenarios are: each buyer has a budget that is greater than her single-value valuation, and each buyer has a budget that is lower than her single-value valuation. Surprisingly, in both scenarios we are able to achieve a $1/4$-approximation to the optimal envy-free revenue. The algorithms utilize a novel version of the Ausebel ascending price auction. These results may suggest that, although it is difficult to approximate the optimal revenue in general, ascending price auctions could achieve relatively good revenue in most of the practical settings. ",stefano leonardi,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Revenue Maximizing Envy-Free Pricing in Matching Markets with Budgets,85b088d7ba235ae94468185717117032,http://arxiv.org/abs/1610.09221v1 13586," We show a communication complexity lower bound for finding a correlated equilibrium of a two-player game. More precisely, we define a two-player $N \times N$ game called the 2-cycle game and show that the randomized communication complexity of finding a 1/poly($N$)-approximate correlated equilibrium of the 2-cycle game is $\Omega(N)$. For small approximation values, this answers an open question of Babichenko and Rubinstein (STOC 2017). Our lower bound is obtained via a direct reduction from the unique set disjointness problem. ",anat ganor,,2017.0,,arXiv,Ganor2017,True,,arXiv,Not available,Communication Complexity of Correlated Equilibrium in Two-Player Games,1f8f280d91b6e6a28b0442b3e74f01ef,http://arxiv.org/abs/1704.01104v1 13587," We show a communication complexity lower bound for finding a correlated equilibrium of a two-player game. More precisely, we define a two-player $N \times N$ game called the 2-cycle game and show that the randomized communication complexity of finding a 1/poly($N$)-approximate correlated equilibrium of the 2-cycle game is $\Omega(N)$. For small approximation values, this answers an open question of Babichenko and Rubinstein (STOC 2017). Our lower bound is obtained via a direct reduction from the unique set disjointness problem. ",karthik s.,,2017.0,,arXiv,Ganor2017,True,,arXiv,Not available,Communication Complexity of Correlated Equilibrium in Two-Player Games,1f8f280d91b6e6a28b0442b3e74f01ef,http://arxiv.org/abs/1704.01104v1 13588," The Gibbard-Satterthwaite theorem implies the existence of voters, called manipulators, who can change the election outcome in their favour by voting strategically. When a given preference profile admits several such manipulators, voting becomes a game played by these voters, who have to reason strategically about each others' actions. To complicate the game even further, counter-manipulators may then try to counteract the actions of manipulators. Our voters are boundedly rational and do not think beyond manipulating or countermanipulating. We call these games Gibbard--Satterthwaite Games. In this paper we look for conditions that guarantee the existence of a Nash equilibria in pure strategies. ",umberto grandi,,2017.0,,arXiv,Grandi2017,True,,arXiv,Not available,Gibbard-Satterthwaite Games for k-Approval Voting Rules,ba4b7d09e9c20292c7981a53c4725f88,http://arxiv.org/abs/1707.05619v1 13589," The Gibbard-Satterthwaite theorem implies the existence of voters, called manipulators, who can change the election outcome in their favour by voting strategically. When a given preference profile admits several such manipulators, voting becomes a game played by these voters, who have to reason strategically about each others' actions. To complicate the game even further, counter-manipulators may then try to counteract the actions of manipulators. Our voters are boundedly rational and do not think beyond manipulating or countermanipulating. We call these games Gibbard--Satterthwaite Games. In this paper we look for conditions that guarantee the existence of a Nash equilibria in pure strategies. ",daniel hughes,,2017.0,,arXiv,Grandi2017,True,,arXiv,Not available,Gibbard-Satterthwaite Games for k-Approval Voting Rules,ba4b7d09e9c20292c7981a53c4725f88,http://arxiv.org/abs/1707.05619v1 13590," The Gibbard-Satterthwaite theorem implies the existence of voters, called manipulators, who can change the election outcome in their favour by voting strategically. When a given preference profile admits several such manipulators, voting becomes a game played by these voters, who have to reason strategically about each others' actions. To complicate the game even further, counter-manipulators may then try to counteract the actions of manipulators. Our voters are boundedly rational and do not think beyond manipulating or countermanipulating. We call these games Gibbard--Satterthwaite Games. In this paper we look for conditions that guarantee the existence of a Nash equilibria in pure strategies. ",francesca rossi,,2017.0,,arXiv,Grandi2017,True,,arXiv,Not available,Gibbard-Satterthwaite Games for k-Approval Voting Rules,ba4b7d09e9c20292c7981a53c4725f88,http://arxiv.org/abs/1707.05619v1 13591," The Gibbard-Satterthwaite theorem implies the existence of voters, called manipulators, who can change the election outcome in their favour by voting strategically. When a given preference profile admits several such manipulators, voting becomes a game played by these voters, who have to reason strategically about each others' actions. To complicate the game even further, counter-manipulators may then try to counteract the actions of manipulators. Our voters are boundedly rational and do not think beyond manipulating or countermanipulating. We call these games Gibbard--Satterthwaite Games. In this paper we look for conditions that guarantee the existence of a Nash equilibria in pure strategies. ",arkadii slinko,,2017.0,,arXiv,Grandi2017,True,,arXiv,Not available,Gibbard-Satterthwaite Games for k-Approval Voting Rules,ba4b7d09e9c20292c7981a53c4725f88,http://arxiv.org/abs/1707.05619v1 13592," Two new techniques are introduced into the theory of the domination game. The cutting lemma bounds the game domination number of a partially dominated graph with the game domination number of suitably modified partially dominated graph. The union lemma bounds the S-game domination number of a disjoint union of paths using appropriate weighting functions. Using these tools a conjecture asserting that the so-called three legged spiders are game domination critical graphs is proved. An extended cutting lemma is also derived and all game domination critical trees on 18, 19, and 20 vertices are listed. ",paul dorbec,,2018.0,,arXiv,Dorbec2018,True,,arXiv,Not available,Cutting Lemma and Union Lemma for the Domination Game,32052e380d2ca2b2f4bdf4d37b8087b2,http://arxiv.org/abs/1802.07713v1 13593," Two new techniques are introduced into the theory of the domination game. The cutting lemma bounds the game domination number of a partially dominated graph with the game domination number of suitably modified partially dominated graph. The union lemma bounds the S-game domination number of a disjoint union of paths using appropriate weighting functions. Using these tools a conjecture asserting that the so-called three legged spiders are game domination critical graphs is proved. An extended cutting lemma is also derived and all game domination critical trees on 18, 19, and 20 vertices are listed. ",michael henning,,2018.0,,arXiv,Dorbec2018,True,,arXiv,Not available,Cutting Lemma and Union Lemma for the Domination Game,32052e380d2ca2b2f4bdf4d37b8087b2,http://arxiv.org/abs/1802.07713v1 13594," Two new techniques are introduced into the theory of the domination game. The cutting lemma bounds the game domination number of a partially dominated graph with the game domination number of suitably modified partially dominated graph. The union lemma bounds the S-game domination number of a disjoint union of paths using appropriate weighting functions. Using these tools a conjecture asserting that the so-called three legged spiders are game domination critical graphs is proved. An extended cutting lemma is also derived and all game domination critical trees on 18, 19, and 20 vertices are listed. ",sandi klavzar,,2018.0,,arXiv,Dorbec2018,True,,arXiv,Not available,Cutting Lemma and Union Lemma for the Domination Game,32052e380d2ca2b2f4bdf4d37b8087b2,http://arxiv.org/abs/1802.07713v1 13595," Two new techniques are introduced into the theory of the domination game. The cutting lemma bounds the game domination number of a partially dominated graph with the game domination number of suitably modified partially dominated graph. The union lemma bounds the S-game domination number of a disjoint union of paths using appropriate weighting functions. Using these tools a conjecture asserting that the so-called three legged spiders are game domination critical graphs is proved. An extended cutting lemma is also derived and all game domination critical trees on 18, 19, and 20 vertices are listed. ",gasper kosmrlj,,2018.0,,arXiv,Dorbec2018,True,,arXiv,Not available,Cutting Lemma and Union Lemma for the Domination Game,32052e380d2ca2b2f4bdf4d37b8087b2,http://arxiv.org/abs/1802.07713v1 13596," We study envy-free pricing mechanisms in matching markets with $m$ items and $n$ budget constrained buyers. Each buyer is interested in a subset of the items on sale, and she appraises at some single-value every item in her preference-set. Moreover, each buyer has a budget that constraints the maximum affordable payment, while she aims to obtain as many items as possible of her preference-set. Our goal is to compute an envy-free pricing allocation that maximizes the revenue, i.e., the total payment charged to the buyers. This pricing problem is hard to approximate better than $\Omega({\rm min} \{n,m\}^{1/2-\epsilon})$ for any $\epsilon>0$, unless $P=NP$. The hardness result is due to the presence of the matching constraints given that the simpler multi-unit case can be approximated up to a constant factor of $2$. The goal of this paper is to circumvent the hardness result by restricting ourselves to specific settings of valuations and budgets. Two particularly significant scenarios are: each buyer has a budget that is greater than her single-value valuation, and each buyer has a budget that is lower than her single-value valuation. Surprisingly, in both scenarios we are able to achieve a $1/4$-approximation to the optimal envy-free revenue. The algorithms utilize a novel version of the Ausebel ascending price auction. These results may suggest that, although it is difficult to approximate the optimal revenue in general, ascending price auctions could achieve relatively good revenue in most of the practical settings. ",qiang zhang,,2016.0,,arXiv,Colini-Baldeschi2016,True,,arXiv,Not available,Revenue Maximizing Envy-Free Pricing in Matching Markets with Budgets,85b088d7ba235ae94468185717117032,http://arxiv.org/abs/1610.09221v1 13597," In this thesis, we survey techniques and results from the study of Complexity Theory and Games. We then apply these techniques to obtain new results for previously unstudied games. Our contributions in the games Hexiom, Cut the Rope, and Back to Bed may be helpful in further studies by exploiting structure common to several games. We also highlight some interesting paths for further study related to uncertainty that have yet to receive thorough study given their prevalence in today's games. ",diogo costa,,2018.0,,arXiv,Costa2018,True,,arXiv,Not available,Computational Complexity of Games and Puzzles,961c57218327bbe31b6bf076a15acda0,http://arxiv.org/abs/1807.04724v1 13598," In this short note we study a class of multi-player, turn-based games with deterministic state transitions and reachability / safety objectives (this class contains as special cases ""classic"" two-player reachability and safety games as well as multi-player ""stay--in-a-set"" and ""reach-a-set"" games). Quantitative and qualitative versions of the objectives are presented and for both cases we prove the existence of a deterministic and memoryless Nash equilibrium; the proof is short and simple, using only Fink's classic result about the existence of Nash equilibria for multi-player discounted stochastic games. ",athanasios kehagias,,2018.0,,arXiv,Kehagias2018,True,,arXiv,Not available,"A Note on the Nash Equilibria of Some Multi-Player Reachability / Safety Games",791a5eb63686faaaa5c2e37ec74980ac,http://arxiv.org/abs/1810.02194v1 13599," Game semantics has provided adequate models for a variety of programming languages, in which types are interpreted as two-player games and programs as strategies. Melli\`es (2018) suggested that such categories of games and strategies may be obtained as instances of a simple abstract construction on weak double categories. However, in the particular case of simple games, his construction slightly differs from the standard category. We refine the abstract construction using factorisation systems, and show that the new construction yields the standard category of simple games and strategies. Another perhaps surprising instance is Day's convolution monoidal structure on the category of presheaves over a strict monoidal category. ",clovis eberhart,,2018.0,,arXiv,Eberhart2018,True,,arXiv,Not available,Simple game semantics and Day convolution,39b317e5f6e09d1c90b150209d3fc1fa,http://arxiv.org/abs/1810.06991v1 13600," Game semantics has provided adequate models for a variety of programming languages, in which types are interpreted as two-player games and programs as strategies. Melli\`es (2018) suggested that such categories of games and strategies may be obtained as instances of a simple abstract construction on weak double categories. However, in the particular case of simple games, his construction slightly differs from the standard category. We refine the abstract construction using factorisation systems, and show that the new construction yields the standard category of simple games and strategies. Another perhaps surprising instance is Day's convolution monoidal structure on the category of presheaves over a strict monoidal category. ",tom hirschowitz,,2018.0,,arXiv,Eberhart2018,True,,arXiv,Not available,Simple game semantics and Day convolution,39b317e5f6e09d1c90b150209d3fc1fa,http://arxiv.org/abs/1810.06991v1 13601," Game semantics has provided adequate models for a variety of programming languages, in which types are interpreted as two-player games and programs as strategies. Melli\`es (2018) suggested that such categories of games and strategies may be obtained as instances of a simple abstract construction on weak double categories. However, in the particular case of simple games, his construction slightly differs from the standard category. We refine the abstract construction using factorisation systems, and show that the new construction yields the standard category of simple games and strategies. Another perhaps surprising instance is Day's convolution monoidal structure on the category of presheaves over a strict monoidal category. ",alexis laouar,,2018.0,,arXiv,Eberhart2018,True,,arXiv,Not available,Simple game semantics and Day convolution,39b317e5f6e09d1c90b150209d3fc1fa,http://arxiv.org/abs/1810.06991v1 13602," Game theory is a powerful analytical tool for modeling decision makers strategies, behaviors and interactions. Act and decisions of a decision maker can benefit or negatively impact other decision makers interests. Game theory has been broadly used in economics, politics and engineering field. For example, game theory can model decision making procedure of different companies competing with each other to maximize their profit. Here, we present a brief introduction of game theory formulation and its applications. The focus of the chapter is non-cooperative Stackelberg game model and its applications in solving power system related problems. These applications include but not limited to; expanding transmission network, improving power system reliability, containing market power in the electricity market, solving power system dispatch, executing demand response and allocating resource in a wireless system. Finally, this chapter elaborates on solving a game theory problem through an example. ",ali mohammadi,,2018.0,,arXiv,Mohammadi2018,True,,arXiv,Not available,"A comprehensive study of Game Theory applications for smart grids, demand side management programs, and transportation networks",6fca0fd2fdaa819e237ce893aee807c5,http://arxiv.org/abs/1804.10712v1 13603," Game theory is a powerful analytical tool for modeling decision makers strategies, behaviors and interactions. Act and decisions of a decision maker can benefit or negatively impact other decision makers interests. Game theory has been broadly used in economics, politics and engineering field. For example, game theory can model decision making procedure of different companies competing with each other to maximize their profit. Here, we present a brief introduction of game theory formulation and its applications. The focus of the chapter is non-cooperative Stackelberg game model and its applications in solving power system related problems. These applications include but not limited to; expanding transmission network, improving power system reliability, containing market power in the electricity market, solving power system dispatch, executing demand response and allocating resource in a wireless system. Finally, this chapter elaborates on solving a game theory problem through an example. ",sanaz rabinia,,2018.0,,arXiv,Mohammadi2018,True,,arXiv,Not available,"A comprehensive study of Game Theory applications for smart grids, demand side management programs, and transportation networks",6fca0fd2fdaa819e237ce893aee807c5,http://arxiv.org/abs/1804.10712v1 13604," We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-player zero-sum games, and (b) Bayesian network routing games. For Bayesian zero-sum games, when the principal seeks to maximize the equilibrium utility of a player, we show that it is NP-hard to obtain an additive FPTAS. Our hardness proof exploits duality and the equivalence of separation and optimization in a novel way. Further, we rule out an additive PTAS assuming planted clique hardness, which states that no polynomial time algorithm can recover a planted clique from an Erd\H{o}s-R\'enyi random graph. Complementing these, we obtain a PTAS for a structured class of zero-sum games (where obtaining an FPTAS is still NP-hard) when the payoff matrices obey a Lipschitz condition. Previous results ruled out an FPTAS assuming planted-clique hardness, and a PTAS only for implicit games with quasi-polynomial-size strategy sets. For Bayesian network routing games, wherein the principal seeks to minimize the average latency of the Nash flow, we show that it is NP-hard to obtain a (multiplicative) $(4/3 - \epsilon)$-approximation, even for linear latency functions. This is the optimal inapproximability result for linear latencies, since we show that full revelation achieves a $(4/3)$-approximation for linear latencies. ",umang bhaskar,,2015.0,,arXiv,Bhaskar2015,True,,arXiv,Not available,"Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games",a46b6e139394413e2a6e2eb2b054d925,http://arxiv.org/abs/1512.03543v2 13605," We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-player zero-sum games, and (b) Bayesian network routing games. For Bayesian zero-sum games, when the principal seeks to maximize the equilibrium utility of a player, we show that it is NP-hard to obtain an additive FPTAS. Our hardness proof exploits duality and the equivalence of separation and optimization in a novel way. Further, we rule out an additive PTAS assuming planted clique hardness, which states that no polynomial time algorithm can recover a planted clique from an Erd\H{o}s-R\'enyi random graph. Complementing these, we obtain a PTAS for a structured class of zero-sum games (where obtaining an FPTAS is still NP-hard) when the payoff matrices obey a Lipschitz condition. Previous results ruled out an FPTAS assuming planted-clique hardness, and a PTAS only for implicit games with quasi-polynomial-size strategy sets. For Bayesian network routing games, wherein the principal seeks to minimize the average latency of the Nash flow, we show that it is NP-hard to obtain a (multiplicative) $(4/3 - \epsilon)$-approximation, even for linear latency functions. This is the optimal inapproximability result for linear latencies, since we show that full revelation achieves a $(4/3)$-approximation for linear latencies. ",yu cheng,,2015.0,,arXiv,Bhaskar2015,True,,arXiv,Not available,"Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games",a46b6e139394413e2a6e2eb2b054d925,http://arxiv.org/abs/1512.03543v2 13606," We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-player zero-sum games, and (b) Bayesian network routing games. For Bayesian zero-sum games, when the principal seeks to maximize the equilibrium utility of a player, we show that it is NP-hard to obtain an additive FPTAS. Our hardness proof exploits duality and the equivalence of separation and optimization in a novel way. Further, we rule out an additive PTAS assuming planted clique hardness, which states that no polynomial time algorithm can recover a planted clique from an Erd\H{o}s-R\'enyi random graph. Complementing these, we obtain a PTAS for a structured class of zero-sum games (where obtaining an FPTAS is still NP-hard) when the payoff matrices obey a Lipschitz condition. Previous results ruled out an FPTAS assuming planted-clique hardness, and a PTAS only for implicit games with quasi-polynomial-size strategy sets. For Bayesian network routing games, wherein the principal seeks to minimize the average latency of the Nash flow, we show that it is NP-hard to obtain a (multiplicative) $(4/3 - \epsilon)$-approximation, even for linear latency functions. This is the optimal inapproximability result for linear latencies, since we show that full revelation achieves a $(4/3)$-approximation for linear latencies. ",young ko,,2015.0,,arXiv,Bhaskar2015,True,,arXiv,Not available,"Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games",a46b6e139394413e2a6e2eb2b054d925,http://arxiv.org/abs/1512.03543v2 13607," In combinatorial auctions, a designer must decide how to allocate a set of indivisible items amongst a set of bidders. Each bidder has a valuation function which gives the utility they obtain from any subset of the items. Our focus is specifically on welfare maximization, where the objective is to maximize the sum of valuations that the bidders place on the items that they were allocated (the valuation functions are assumed to be reported truthfully). We analyze an online problem in which the algorithm is not given the set of bidders in advance. Instead, the bidders are revealed sequentially in a uniformly random order, similarly to secretary problems. The algorithm must make an irrevocable decision about which items to allocate to the current bidder before the next one is revealed. When the valuation functions lie in the class $XOS$ (which includes submodular functions), we provide a black box reduction from offline to online optimization. Specifically, given an $\alpha$-approximation algorithm for offline welfare maximization, we show how to create a $(0.199 \alpha)$-approximation algorithm for the online problem. Our algorithm draws on connections to secretary problems; in fact, we show that the online welfare maximization problem itself can be viewed as a particular kind of secretary problem with nonuniform arrival order. ",shaddin dughmi,,2017.0,,arXiv,Dughmi2017,True,,arXiv,Not available,Combinatorial Auctions with Online XOS Bidders,801815dc9ebc22d70073cad9b9d09dbf,http://arxiv.org/abs/1703.03484v2 13608," We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-player zero-sum games, and (b) Bayesian network routing games. For Bayesian zero-sum games, when the principal seeks to maximize the equilibrium utility of a player, we show that it is NP-hard to obtain an additive FPTAS. Our hardness proof exploits duality and the equivalence of separation and optimization in a novel way. Further, we rule out an additive PTAS assuming planted clique hardness, which states that no polynomial time algorithm can recover a planted clique from an Erd\H{o}s-R\'enyi random graph. Complementing these, we obtain a PTAS for a structured class of zero-sum games (where obtaining an FPTAS is still NP-hard) when the payoff matrices obey a Lipschitz condition. Previous results ruled out an FPTAS assuming planted-clique hardness, and a PTAS only for implicit games with quasi-polynomial-size strategy sets. For Bayesian network routing games, wherein the principal seeks to minimize the average latency of the Nash flow, we show that it is NP-hard to obtain a (multiplicative) $(4/3 - \epsilon)$-approximation, even for linear latency functions. This is the optimal inapproximability result for linear latencies, since we show that full revelation achieves a $(4/3)$-approximation for linear latencies. ",chaitanya swamy,,2015.0,,arXiv,Bhaskar2015,True,,arXiv,Not available,"Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games",a46b6e139394413e2a6e2eb2b054d925,http://arxiv.org/abs/1512.03543v2 13609," In a mean-payoff parity game, one of the two players aims both to achieve a qualitative parity objective and to minimize a quantitative long-term average of payoffs (aka. mean payoff). The game is zero-sum and hence the aim of the other player is to either foil the parity objective or to maximize the mean payoff. Our main technical result is a pseudo-quasi-polynomial algorithm for solving mean-payoff parity games. All algorithms for the problem that have been developed for over a decade have a pseudo-polynomial and an exponential factors in their running times; in the running time of our algorithm the latter is replaced with a quasi-polynomial one. By the results of Chatterjee and Doyen (2012) and of Schewe, Weinert, and Zimmermann (2018), our main technical result implies that there are pseudo-quasi-polynomial algorithms for solving parity energy games and for solving parity games with weights. Our main conceptual contributions are the definitions of strategy decompositions for both players, and a notion of progress measures for mean-payoff parity games that generalizes both parity and energy progress measures. The former provides normal forms for and succinct representations of winning strategies, and the latter enables the application to mean-payoff parity games of the order-theoretic machinery that underpins a recent quasi-polynomial algorithm for solving parity games. ",laure daviaud,,2018.0,,arXiv,Daviaud2018,True,,arXiv,Not available,A pseudo-quasi-polynomial algorithm for solving mean-payoff parity games,45caa3cf0e999fcbf4050b2d8124896c,http://arxiv.org/abs/1803.04756v3 13610," In a mean-payoff parity game, one of the two players aims both to achieve a qualitative parity objective and to minimize a quantitative long-term average of payoffs (aka. mean payoff). The game is zero-sum and hence the aim of the other player is to either foil the parity objective or to maximize the mean payoff. Our main technical result is a pseudo-quasi-polynomial algorithm for solving mean-payoff parity games. All algorithms for the problem that have been developed for over a decade have a pseudo-polynomial and an exponential factors in their running times; in the running time of our algorithm the latter is replaced with a quasi-polynomial one. By the results of Chatterjee and Doyen (2012) and of Schewe, Weinert, and Zimmermann (2018), our main technical result implies that there are pseudo-quasi-polynomial algorithms for solving parity energy games and for solving parity games with weights. Our main conceptual contributions are the definitions of strategy decompositions for both players, and a notion of progress measures for mean-payoff parity games that generalizes both parity and energy progress measures. The former provides normal forms for and succinct representations of winning strategies, and the latter enables the application to mean-payoff parity games of the order-theoretic machinery that underpins a recent quasi-polynomial algorithm for solving parity games. ",marcin jurdzinski,,2018.0,,arXiv,Daviaud2018,True,,arXiv,Not available,A pseudo-quasi-polynomial algorithm for solving mean-payoff parity games,45caa3cf0e999fcbf4050b2d8124896c,http://arxiv.org/abs/1803.04756v3 13611," In a mean-payoff parity game, one of the two players aims both to achieve a qualitative parity objective and to minimize a quantitative long-term average of payoffs (aka. mean payoff). The game is zero-sum and hence the aim of the other player is to either foil the parity objective or to maximize the mean payoff. Our main technical result is a pseudo-quasi-polynomial algorithm for solving mean-payoff parity games. All algorithms for the problem that have been developed for over a decade have a pseudo-polynomial and an exponential factors in their running times; in the running time of our algorithm the latter is replaced with a quasi-polynomial one. By the results of Chatterjee and Doyen (2012) and of Schewe, Weinert, and Zimmermann (2018), our main technical result implies that there are pseudo-quasi-polynomial algorithms for solving parity energy games and for solving parity games with weights. Our main conceptual contributions are the definitions of strategy decompositions for both players, and a notion of progress measures for mean-payoff parity games that generalizes both parity and energy progress measures. The former provides normal forms for and succinct representations of winning strategies, and the latter enables the application to mean-payoff parity games of the order-theoretic machinery that underpins a recent quasi-polynomial algorithm for solving parity games. ",ranko lazic,,2018.0,,arXiv,Daviaud2018,True,,arXiv,Not available,A pseudo-quasi-polynomial algorithm for solving mean-payoff parity games,45caa3cf0e999fcbf4050b2d8124896c,http://arxiv.org/abs/1803.04756v3 13612," In 1953, Kuhn showed that every sequential game has a Nash equilibrium by showing that a procedure, named ``backward induction'' in game theory, yields a Nash equilibrium. It actually yields Nash equilibria that define a proper subclass of Nash equilibria. In 1965, Selten named this proper subclass subgame perfect equilibria. In game theory, payoffs are rewards usually granted at the end of a game. Although traditional game theory mainly focuses on real-valued payoffs that are implicitly ordered by the usual total order over the reals, works of Simon or Blackwell already involved partially ordered payoffs. This paper generalises the notion of sequential game by replacing real-valued payoff functions with abstract atomic objects, called outcomes, and by replacing the usual total order over the reals with arbitrary binary relations over outcomes, called preferences. This introduces a general abstract formalism where Nash equilibrium, subgame perfect equilibrium, and ``backward induction'' can still be defined. This paper proves that the following three propositions are equivalent: 1) Preferences over the outcomes are acyclic. 2) Every sequential game has a Nash equilibrium. 3) Every sequential game has a subgame perfect equilibrium. The result is fully computer-certified using Coq. Beside the additional guarantee of correctness, the activity of formalisation using Coq also helps clearly identify the useful definitions and the main articulations of the proof. ",stephane roux,,2007.0,,arXiv,Roux2007,True,,arXiv,Not available,"Acyclicity of Preferences, Nash Equilibria, and Subgame Perfect Equilibria: a Formal and Constructive Equivalence",1b50e06892c6d48b8ffb1c868fd917ef,http://arxiv.org/abs/0705.3316v1 13613," Poker is one of the most popular card games, whose rational investigation represents also one of the major challenges in several scientific areas, spanning from information theory and artificial intelligence to game theory and statistical physics. In principle, several variants of Poker can be identified, although all of them make use of money to make the challenge meaningful and, moreover, can be played in two different formats: tournament and cash game. An important issue when dealing with Poker is its classification, i.e., as a `skill game' or as gambling. Nowadays, its classification still represents an open question, having a long list of implications (e.g., legal and healthcare) that vary from country to country. In this study, we analyze Poker challenges, considering the cash game format, in terms of thermodynamics systems. Notably, we propose a framework to represent a cash game Poker challenge that, although based on a simplified scenario, allows both to obtain useful information for rounders (i.e., Poker players), and to evaluate the role of Poker room in this context. Finally, starting from a model based on thermodynamics, we show the evolution of a Poker challenge, making a direct connection with the probability theory underlying its dynamics and finding that, even if we consider these games as `skill games', to take a real profit from Poker is really hard. ",marco javarone,,2015.0,,arXiv,Javarone2015,True,,arXiv,Not available,Poker Cash Game: a Thermodynamic Description,167e5a85f332447620b0f5dbab71800c,http://arxiv.org/abs/1503.01418v1 13614," We present a formal treatment of the Crowd-Anticrowd theory of Minority Games played by a population of competing agents. This theory is built around a description of the crowding which arises within the game's strategy space. Earlier works have shown that this theory provides a simple, yet quantitatively accurate explanation of the time-averaged behavior of these multi-agent games. We also discuss the extent to which the Crowd-Anticrowd approach provides a useful tool for analyzing a wider class of Complex Systems. ",michael hart,,2002.0,,arXiv,Hart2002,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Minority Games,a117e77a509e59e7beba9ff35a071a96,http://arxiv.org/abs/cond-mat/0212088v2 13615," We present a formal treatment of the Crowd-Anticrowd theory of Minority Games played by a population of competing agents. This theory is built around a description of the crowding which arises within the game's strategy space. Earlier works have shown that this theory provides a simple, yet quantitatively accurate explanation of the time-averaged behavior of these multi-agent games. We also discuss the extent to which the Crowd-Anticrowd approach provides a useful tool for analyzing a wider class of Complex Systems. ",neil johnson,,2002.0,,arXiv,Hart2002,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Minority Games,a117e77a509e59e7beba9ff35a071a96,http://arxiv.org/abs/cond-mat/0212088v2 13616," The uniform distribution is an important counterexample in game theory as many of the canonical game dynamics have been shown not to converge to the equilibrium in certain cases. In particular none of the canonical game dynamics converge to the uniform distribution in a form of rock-paper-scissors where the amount an agent can lose is more than the agent can win, despite this fact, it is the unique Nash equilibrium. I will show that certain incentive dynamics are asymptotically stable at the uniform distribution when it is an incentive equilibrium. ",dashiell fryer,,2012.0,,arXiv,Fryer2012,True,,arXiv,Not available,The Uniform Distribution in Incentive Dynamics,b75c823a8fef48d844fb1bab3e80b046,http://arxiv.org/abs/1207.0037v1 13617," This volume contains the proceedings of the Seventh International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2016). The symposium took place in Catania, Italy, from the 14th to the 16th of September 2016. The proceedings of the symposium contain abstracts of the 3 invited talks and 21 full papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers cover algorithmic game theory, automata theory, synthesis, formal verification, and dynamic, modal and temporal logics. ",domenico cantone,,2016.0,10.4204/EPTCS.226,"EPTCS 226, 2016",Cantone2016,True,,arXiv,Not available,"Proceedings of the Seventh International Symposium on Games, Automata, Logics and Formal Verification",14a3ea33b46013488fac6bc458eae0e6,http://arxiv.org/abs/1609.03648v1 13618," In combinatorial auctions, a designer must decide how to allocate a set of indivisible items amongst a set of bidders. Each bidder has a valuation function which gives the utility they obtain from any subset of the items. Our focus is specifically on welfare maximization, where the objective is to maximize the sum of valuations that the bidders place on the items that they were allocated (the valuation functions are assumed to be reported truthfully). We analyze an online problem in which the algorithm is not given the set of bidders in advance. Instead, the bidders are revealed sequentially in a uniformly random order, similarly to secretary problems. The algorithm must make an irrevocable decision about which items to allocate to the current bidder before the next one is revealed. When the valuation functions lie in the class $XOS$ (which includes submodular functions), we provide a black box reduction from offline to online optimization. Specifically, given an $\alpha$-approximation algorithm for offline welfare maximization, we show how to create a $(0.199 \alpha)$-approximation algorithm for the online problem. Our algorithm draws on connections to secretary problems; in fact, we show that the online welfare maximization problem itself can be viewed as a particular kind of secretary problem with nonuniform arrival order. ",bryan wilder,,2017.0,,arXiv,Dughmi2017,True,,arXiv,Not available,Combinatorial Auctions with Online XOS Bidders,801815dc9ebc22d70073cad9b9d09dbf,http://arxiv.org/abs/1703.03484v2 13619," This volume contains the proceedings of the Seventh International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2016). The symposium took place in Catania, Italy, from the 14th to the 16th of September 2016. The proceedings of the symposium contain abstracts of the 3 invited talks and 21 full papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers cover algorithmic game theory, automata theory, synthesis, formal verification, and dynamic, modal and temporal logics. ",giorgio delzanno,,2016.0,10.4204/EPTCS.226,"EPTCS 226, 2016",Cantone2016,True,,arXiv,Not available,"Proceedings of the Seventh International Symposium on Games, Automata, Logics and Formal Verification",14a3ea33b46013488fac6bc458eae0e6,http://arxiv.org/abs/1609.03648v1 13620," Prisoner's Dilemma (PD) is a widely studied game that plays an important role in Game Theory. This paper aims at extending PD Tournaments to the case of infinite, finite or infinitesimal payoffs using Sergeyev's Infinity Computing (IC). By exploiting IC, we are able to show the limits of the classical approach to PD Tournaments analysis of the classical theory, extending both the sets of the feasible and numerically computable tournaments. In particular we provide a numerical computation of the exact outcome of a simple PD Tournament where one player meets every other an infinite number of times, for both its deterministic and stochastic formulations. ",lorenzo fiaschi,,2018.0,,"International Journal of Unconventional Computing, 2018",Fiaschi2018,True,,arXiv,Not available,"Numerical Asymptotic Results in Game Theory Using Sergeyev's Infinity Computing",44f1a0d69277fc3c5dd3a44112ab05f6,http://arxiv.org/abs/1808.00738v1 13621," Prisoner's Dilemma (PD) is a widely studied game that plays an important role in Game Theory. This paper aims at extending PD Tournaments to the case of infinite, finite or infinitesimal payoffs using Sergeyev's Infinity Computing (IC). By exploiting IC, we are able to show the limits of the classical approach to PD Tournaments analysis of the classical theory, extending both the sets of the feasible and numerically computable tournaments. In particular we provide a numerical computation of the exact outcome of a simple PD Tournament where one player meets every other an infinite number of times, for both its deterministic and stochastic formulations. ",marco cococcioni,,2018.0,,"International Journal of Unconventional Computing, 2018",Fiaschi2018,True,,arXiv,Not available,"Numerical Asymptotic Results in Game Theory Using Sergeyev's Infinity Computing",44f1a0d69277fc3c5dd3a44112ab05f6,http://arxiv.org/abs/1808.00738v1 13622," Cores of cooperative games are ubiquitous in information theory, and arise most frequently in the characterization of fundamental limits in various scenarios involving multiple users. Examples include classical settings in network information theory such as Slepian-Wolf source coding and multiple access channels, classical settings in statistics such as robust hypothesis testing, and new settings at the intersection of networking and statistics such as distributed estimation problems for sensor networks. Cooperative game theory allows one to understand aspects of all of these problems from a fresh and unifying perspective that treats users as players in a game, sometimes leading to new insights. At the heart of these analyses are fundamental dualities that have been long studied in the context of cooperative games; for information theoretic purposes, these are dualities between information inequalities on the one hand and properties of rate, capacity or other resource allocation regions on the other. ",mokshay madiman,,2008.0,10.1155/2008/318704,"EURASIP Journal on Wireless Communications and Networking, Volume 2008, Article ID 318704",Madiman2008,True,,arXiv,Not available,Cores of Cooperative Games in Information Theory,d55ea41426987d9f7f535cc82af483cb,http://arxiv.org/abs/0901.0062v1 13623," Multi-leader multi-follower games are a class of hierarchical games in which a collection of leaders compete in a Nash game constrained by the equilibrium conditions of another Nash game amongst the followers. The resulting equilibrium problem with equilibrium constraints is complicated by nonconvex agent problems and therefore providing tractable conditions for existence of global or even local equilibria for it has proved challenging. Consequently, much of the extant research on this topic is either model specific or relies on weaker notions of equilibria. We consider a modified formulation in which every leader is cognizant of the equilibrium constraints of all leaders. Equilibria of this modified game contain the equilibria, if any, of the original game. The new formulation has a constraint structure called shared constraints, and our main result shows that if the leader objectives admit a potential function, the global minimizers of the potential function over the shared constraint are equilibria of the modified formulation. We provide another existence result using fixed point theory that does not require potentiality. Additionally, local minima, B-stationary, and strong-stationary points of this minimization are shown to be local Nash equilibria, Nash B-stationary, and Nash strong-stationary points of the corresponding multi-leader multi-follower game. We demonstrate the relationship between variational equilibria associated with this modified shared-constraint game and equilibria of the original game from the standpoint of the multiplier sets and show how equilibria of the original formulation may be recovered. We note through several examples that such potential multi-leader multi-follower games capture a breadth of application problems of interest and demonstrate our findings on a multi-leader multi-follower Cournot game. ",ankur kulkarni,,2012.0,10.1007/s11228-014-0292-5,arXiv,Kulkarni2012,True,,arXiv,Not available,A Shared-Constraint Approach to Multi-leader Multi-follower Games,000b13adc3ec98e6131781c29ea9fb8f,http://arxiv.org/abs/1206.2968v3 13624," Multi-leader multi-follower games are a class of hierarchical games in which a collection of leaders compete in a Nash game constrained by the equilibrium conditions of another Nash game amongst the followers. The resulting equilibrium problem with equilibrium constraints is complicated by nonconvex agent problems and therefore providing tractable conditions for existence of global or even local equilibria for it has proved challenging. Consequently, much of the extant research on this topic is either model specific or relies on weaker notions of equilibria. We consider a modified formulation in which every leader is cognizant of the equilibrium constraints of all leaders. Equilibria of this modified game contain the equilibria, if any, of the original game. The new formulation has a constraint structure called shared constraints, and our main result shows that if the leader objectives admit a potential function, the global minimizers of the potential function over the shared constraint are equilibria of the modified formulation. We provide another existence result using fixed point theory that does not require potentiality. Additionally, local minima, B-stationary, and strong-stationary points of this minimization are shown to be local Nash equilibria, Nash B-stationary, and Nash strong-stationary points of the corresponding multi-leader multi-follower game. We demonstrate the relationship between variational equilibria associated with this modified shared-constraint game and equilibria of the original game from the standpoint of the multiplier sets and show how equilibria of the original formulation may be recovered. We note through several examples that such potential multi-leader multi-follower games capture a breadth of application problems of interest and demonstrate our findings on a multi-leader multi-follower Cournot game. ",uday shanbhag,,2012.0,10.1007/s11228-014-0292-5,arXiv,Kulkarni2012,True,,arXiv,Not available,A Shared-Constraint Approach to Multi-leader Multi-follower Games,000b13adc3ec98e6131781c29ea9fb8f,http://arxiv.org/abs/1206.2968v3 13625," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",simina branzei,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13626," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",aris filos-ratsikas,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13627," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",peter miltersen,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13628," Multi-unit auctions are a paradigmatic model, where a seller brings multiple units of a good, while several buyers bring monetary endowments. It is well known that Walrasian equilibria do not always exist in this model, however compelling relaxations such as (Walrasian) envy-free pricing do. In this paper we design an optimal envy-free mechanism for multi-unit auctions with budgets. When the market is even mildly competitive, the approximation ratios of this mechanism are small constants for both the revenue and welfare objectives, and in fact for welfare the approximation converges to 1 as the market becomes fully competitive. We also give an impossibility theorem, showing that truthfulness requires discarding resources and, in particular, is incompatible with (Pareto) efficiency. ",yulong zeng,,2016.0,,arXiv,Brânzei2016,True,,arXiv,Not available,Walrasian Pricing in Multi-unit Auctions,e8ca75007c5cb32db38001512f361730,http://arxiv.org/abs/1602.08719v7 13629," We study the necessity of interaction for obtaining efficient allocations in subadditive combinatorial auctions. This problem was originally introduced by Dobzinski, Nisan, and Oren (STOC'14) as the following simple market scenario: $m$ items are to be allocated among $n$ bidders in a distributed setting where bidders valuations are private and hence communication is needed to obtain an efficient allocation. The communication happens in rounds: in each round, each bidder, simultaneously with others, broadcasts a message to all parties involved and the central planner computes an allocation solely based on the communicated messages. Dobzinski et.al. showed that no non-interactive ($1$-round) protocol with polynomial communication (in the number of items and bidders) can achieve approximation ratio better than $\Omega(m^{{1}/{4}})$, while for any $r \geq 1$, there exists $r$-round protocols that achieve $\widetilde{O}(r \cdot m^{{1}/{r+1}})$ approximation with polynomial communication; in particular, $O(\log{m})$ rounds of interaction suffice to obtain an (almost) efficient allocation. A natural question at this point is to identify the ""right"" level of interaction (i.e., number of rounds) necessary to obtain an efficient allocation. In this paper, we resolve this question by providing an almost tight round-approximation tradeoff for this problem: we show that for any $r \geq 1$, any $r$-round protocol that uses polynomial communication can only approximate the social welfare up to a factor of $\Omega(\frac{1}{r} \cdot m^{{1}/{2r+1}})$. This in particular implies that $\Omega(\frac{\log{m}}{\log\log{m}})$ rounds of interaction are necessary for obtaining any efficient allocation in these markets. Our work builds on the recent multi-party round-elimination technique of Alon, Nisan, Raz, and Weinstein (FOCS'15) and settles an open question posed by Dobzinski et.al. and Alon et. al. ",sepehr assadi,,2017.0,,arXiv,Assadi2017,True,,arXiv,Not available,Combinatorial Auctions Do Need Modest Interaction,83d69471545cd0d8f2cbce80698bd896,http://arxiv.org/abs/1705.01644v1 13630," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",nianxia cao,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 13631," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",swastik brahma,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 13632," In this paper, we propose a crowdsourcing based framework for myopic target tracking by designing an incentive-compatible mechanism based optimal auction in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. For typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be transmitted from the sensors to the FC among the sensors. To accomplish the task, the FC conducts an auction by soliciting bids from the selfish sensors, which reflect how much they value their energy cost. Furthermore, the rationality and truthfulness of the sensors are guaranteed in our model. The final problem is formulated as a multiple-choice knapsack problem (MCKP), which is solved by the dynamic programming method in pseudo-polynomial time. Simulation results show the effectiveness of our proposed approach in terms of both the tracking performance and lifetime of the sensor network. ",pramod varshney,,2014.0,10.1109/TSP.2015.2398838,arXiv,Cao2014,True,,arXiv,Not available,Target Tracking via Crowdsourcing: A Mechanism Design Approach,5aa02564f151c75a3e073af623b2e559,http://arxiv.org/abs/1405.5543v1 13633," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",bernhard rumpe,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 13634," Among the existing E-Commerce applications, online auctions are the most influential ones. Their impact on trading in the B2B (business to business) as well as in the B2C (business to consumer) and C2C (consumer to consumer) areas will be inevitable. This article describes the architecture of a web-based realtime online auction system, together with the functional and technical requirements that evolved during the development process and heavily influenced the architecture. From the point of view of this real world case study, ways to minimize the development time and yet ensure a robust and flexible system are explained: combining standard software and self- developed components, reusing code wherever possible, and employing the eXtreme Programming approach and its test concepts. ",guido wimmel,,2014.0,,"Managing Information Technology in a Global Economy. Proceedings of IRMA International Conference, Toronto pp. 908-912, Idea Group Publishing, 2001",Rumpe2014,True,,arXiv,Not available,A Framework for Realtime Online Auctions,1044ee3ea6d0ce55ec913984f381faf1,http://arxiv.org/abs/1409.6592v1 13635," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",michal feldman,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 13636," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",brendan lucier,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 13637," We study correlated equilibria and coarse equilibria of simple first-price single-item auctions in the simplest auction model of full information. Nash equilibria are known to always yield full efficiency and a revenue that is at least the second-highest value. We prove that the same is true for all correlated equilibria, even those in which agents overbid -- i.e., bid above their values. Coarse equilibria, in contrast, may yield lower efficiency and revenue. We show that the revenue can be as low as 26% of the second-highest value in a coarse equilibrium, even if agents are assumed not to overbid, and this is tight. We also show that when players do not overbid, the worst-case bound on social welfare at coarse equilibrium improves from 63% of the highest value to 81%, and this bound is tight as well. ",noam nisan,,2016.0,,arXiv,Feldman2016,True,,arXiv,Not available,Correlated and Coarse equilibria of Single-item auctions,403d8d52143b9fe5068ab955516295f9,http://arxiv.org/abs/1601.07702v3 13638," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",shipra agrawal,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13639," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",constantinos daskalakis,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13640," We study revenue optimization learning algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation for a good and seeks to maximize his cumulative discounted surplus. For this setting, first, we propose a novel algorithm that never decreases offered prices and has a tight strategic regret bound in $\Theta(\log\log T)$ under some mild assumptions on the buyer surplus discounting. This result closes the open research question on the existence of a no-regret horizon-independent weakly consistent pricing. The proposed algorithm is inspired by our observation that a double decrease of offered prices in a weakly consistent algorithm is enough to cause a linear regret. This motivates us to construct a novel transformation that maps a right-consistent algorithm to a weakly consistent one that never decreases offered prices. Second, we outperform the previously known strategic regret upper bound of the algorithm PRRFES, where the improvement is achieved by means of a finer constant factor $C$ of the principal term $C\log\log T$ in this upper bound. Finally, we generalize results on strategic regret previously known for geometric discounting of the buyer's surplus to discounting of other types, namely: the optimality of the pricing PRRFES to the case of geometrically concave decreasing discounting; and linear lower bound on the strategic regret of a wide range of horizon-independent weakly consistent algorithms to the case of arbitrary discounts. ",alexey drutsa,,2017.0,,arXiv,Drutsa2017,True,,arXiv,Not available,"On consistency of optimal pricing algorithms in repeated posted-price auctions with strategic buyer",1b808b75210b37d16fdbaa4680f8bb44,http://arxiv.org/abs/1707.05101v2 13641," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",vahab mirrokni,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13642," We study revenue optimization in a repeated auction between a single seller and a single buyer. Traditionally, the design of repeated auctions requires strong modeling assumptions about the bidder behavior, such as it being myopic, infinite lookahead, or some specific form of learning behavior. Is it possible to design mechanisms which are simultaneously optimal against a multitude of possible buyer behaviors? We answer this question by designing a simple state-based mechanism that is simultaneously approximately optimal against a $k$-lookahead buyer for all $k$, a buyer who is a no-regret learner, and a buyer who is a policy-regret learner. Against each type of buyer our mechanism attains a constant fraction of the optimal revenue attainable against that type of buyer. We complement our positive results with almost tight impossibility results, showing that the revenue approximation tradeoffs achieved by our mechanism for different lookahead attitudes are near-optimal. ",balasubramanian sivan,,2018.0,,arXiv,Agrawal2018,True,,arXiv,Not available,Robust Repeated Auctions under Heterogeneous Buyer Behavior,0ef103b9cf196122c93a05969c629ffd,http://arxiv.org/abs/1803.00494v1 13643," We study the price of anarchy of mechanisms in the presence of risk-averse agents. Previous work has focused on agents with quasilinear utilities, possibly with a budget. Our model subsumes this as a special case but also captures that agents might be less sensitive to payments than in the risk-neutral model. We show that many positive price-of-anarchy results proved in the smoothness framework continue to hold in the more general risk-averse setting. A sufficient condition is that agents can never end up with negative quasilinear utility after playing an undominated strategy. This is true, e.g., for first-price and second-price auctions. For all-pay auctions, similar results do not hold: We show that there are Bayes-Nash equilibria with arbitrarily bad social welfare compared to the optimum. ",thomas kesselheim,,2018.0,,arXiv,Kesselheim2018,True,,arXiv,Not available,Price of Anarchy for Mechanisms with Risk-Averse Agents,ad484a322aaaa22a7888e231d66590dc,http://arxiv.org/abs/1804.09468v1 13644," We study the price of anarchy of mechanisms in the presence of risk-averse agents. Previous work has focused on agents with quasilinear utilities, possibly with a budget. Our model subsumes this as a special case but also captures that agents might be less sensitive to payments than in the risk-neutral model. We show that many positive price-of-anarchy results proved in the smoothness framework continue to hold in the more general risk-averse setting. A sufficient condition is that agents can never end up with negative quasilinear utility after playing an undominated strategy. This is true, e.g., for first-price and second-price auctions. For all-pay auctions, similar results do not hold: We show that there are Bayes-Nash equilibria with arbitrarily bad social welfare compared to the optimum. ",bojana kodric,,2018.0,,arXiv,Kesselheim2018,True,,arXiv,Not available,Price of Anarchy for Mechanisms with Risk-Averse Agents,ad484a322aaaa22a7888e231d66590dc,http://arxiv.org/abs/1804.09468v1 13645," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",yaonan jin,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 13646," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",pinyan lu,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 13647," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",qi qi,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 13648," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",zhihao tang,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 13649," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",tao xiao,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 13650," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",dinesh garg,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 13651," Formal models of games help us account for and predict behavior, leading to more robust and innovative designs. While the games research community has proposed many formalisms for both the ""game half"" (game models, game description languages) and the ""human half"" (player modeling) of a game experience, little attention has been paid to the interface between the two, particularly where it concerns the player expressing her intent toward the game. We describe an analytical and computational toolbox based on programming language theory to examine the phenomenon sitting between control schemes and game rules, which we identify as a distinct player intent language for each game. ",chris martens,,2017.0,,arXiv,Martens2017,True,,arXiv,Not available,Languages of Play: Towards semantic foundations for game interfaces,8576a4bab0e2503578a2c34be35242a7,http://arxiv.org/abs/1703.05410v1 13652," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",sourangshu bhattacharya,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 13653," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",s. sundararajan,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 13654," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",shirish shevade,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 13655," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jannik dreier,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 13656," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jean-guillaume dumas,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 13657," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",pascal lafourcade,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 13658," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ben roberts,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 13659," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",dinan gunawardena,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 13660," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ian kash,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 13661," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",peter key,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 13662," Formal models of games help us account for and predict behavior, leading to more robust and innovative designs. While the games research community has proposed many formalisms for both the ""game half"" (game models, game description languages) and the ""human half"" (player modeling) of a game experience, little attention has been paid to the interface between the two, particularly where it concerns the player expressing her intent toward the game. We describe an analytical and computational toolbox based on programming language theory to examine the phenomenon sitting between control schemes and game rules, which we identify as a distinct player intent language for each game. ",matthew hammer,,2017.0,,arXiv,Martens2017,True,,arXiv,Not available,Languages of Play: Towards semantic foundations for game interfaces,8576a4bab0e2503578a2c34be35242a7,http://arxiv.org/abs/1703.05410v1 13663," We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experience with items that are auctioned repeatedly over an infinite horizon. A central question here is understanding what natural restrictions on the environment permit the design of optimal mechanisms (note that even in the simpler static setting, optimal mechanisms are characterized only under certain restrictions). We provide a {\em structural characterization} of a natural ""separable: multi-armed bandit environment (where the evolution and incentive structure of the a-priori type is decoupled from the subsequent experience in a precise sense) where dynamic optimal mechanism design is possible. Here, we present the Virtual Index Mechanism, an optimal dynamic mechanism, which maximizes the (long term) {\em virtual surplus} using the classical Gittins algorithm. The mechanism optimally balances exploration and exploitation, taking incentives into account. ",sham kakade,,2010.0,,arXiv,Kakade2010,True,,arXiv,Not available,An Optimal Dynamic Mechanism for Multi-Armed Bandit Processes,a188a518fe470ba5d319fbd31b6ccdfe,http://arxiv.org/abs/1001.4598v2 13664," We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experience with items that are auctioned repeatedly over an infinite horizon. A central question here is understanding what natural restrictions on the environment permit the design of optimal mechanisms (note that even in the simpler static setting, optimal mechanisms are characterized only under certain restrictions). We provide a {\em structural characterization} of a natural ""separable: multi-armed bandit environment (where the evolution and incentive structure of the a-priori type is decoupled from the subsequent experience in a precise sense) where dynamic optimal mechanism design is possible. Here, we present the Virtual Index Mechanism, an optimal dynamic mechanism, which maximizes the (long term) {\em virtual surplus} using the classical Gittins algorithm. The mechanism optimally balances exploration and exploitation, taking incentives into account. ",ilan lobel,,2010.0,,arXiv,Kakade2010,True,,arXiv,Not available,An Optimal Dynamic Mechanism for Multi-Armed Bandit Processes,a188a518fe470ba5d319fbd31b6ccdfe,http://arxiv.org/abs/1001.4598v2 13665," We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experience with items that are auctioned repeatedly over an infinite horizon. A central question here is understanding what natural restrictions on the environment permit the design of optimal mechanisms (note that even in the simpler static setting, optimal mechanisms are characterized only under certain restrictions). We provide a {\em structural characterization} of a natural ""separable: multi-armed bandit environment (where the evolution and incentive structure of the a-priori type is decoupled from the subsequent experience in a precise sense) where dynamic optimal mechanism design is possible. Here, we present the Virtual Index Mechanism, an optimal dynamic mechanism, which maximizes the (long term) {\em virtual surplus} using the classical Gittins algorithm. The mechanism optimally balances exploration and exploitation, taking incentives into account. ",hamid nazerzadeh,,2010.0,,arXiv,Kakade2010,True,,arXiv,Not available,An Optimal Dynamic Mechanism for Multi-Armed Bandit Processes,a188a518fe470ba5d319fbd31b6ccdfe,http://arxiv.org/abs/1001.4598v2 13666," Ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each time the publisher contacts the exchange, the exchange ``calls out'' to solicit bids from ad networks. This aspect of soliciting bids introduces a novel aspect, in contrast to existing literature. This suggests developing a joint optimization framework which optimizes over the allocation and well as solicitation. We model this selective call out as an online recurrent Bayesian decision framework with bandwidth type constraints. We obtain natural algorithms with bounded performance guarantees for several natural optimization criteria. We show that these results hold under different call out constraint models, and different arrival processes. Interestingly, the paper shows that under MHR assumptions, the expected revenue of generalized second price auction with reserve is constant factor of the expected welfare. Also the analysis herein allow us prove adaptivity gap type results for the adwords problem. ",tanmoy chakraborty,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,Selective Call Out and Real Time Bidding,48b6f7276bfa253bcc560d7a096cee54,http://arxiv.org/abs/1002.3102v2 13667," Ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each time the publisher contacts the exchange, the exchange ``calls out'' to solicit bids from ad networks. This aspect of soliciting bids introduces a novel aspect, in contrast to existing literature. This suggests developing a joint optimization framework which optimizes over the allocation and well as solicitation. We model this selective call out as an online recurrent Bayesian decision framework with bandwidth type constraints. We obtain natural algorithms with bounded performance guarantees for several natural optimization criteria. We show that these results hold under different call out constraint models, and different arrival processes. Interestingly, the paper shows that under MHR assumptions, the expected revenue of generalized second price auction with reserve is constant factor of the expected welfare. Also the analysis herein allow us prove adaptivity gap type results for the adwords problem. ",eyal even-dar,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,Selective Call Out and Real Time Bidding,48b6f7276bfa253bcc560d7a096cee54,http://arxiv.org/abs/1002.3102v2 13668," Ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each time the publisher contacts the exchange, the exchange ``calls out'' to solicit bids from ad networks. This aspect of soliciting bids introduces a novel aspect, in contrast to existing literature. This suggests developing a joint optimization framework which optimizes over the allocation and well as solicitation. We model this selective call out as an online recurrent Bayesian decision framework with bandwidth type constraints. We obtain natural algorithms with bounded performance guarantees for several natural optimization criteria. We show that these results hold under different call out constraint models, and different arrival processes. Interestingly, the paper shows that under MHR assumptions, the expected revenue of generalized second price auction with reserve is constant factor of the expected welfare. Also the analysis herein allow us prove adaptivity gap type results for the adwords problem. ",sudipto guha,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,Selective Call Out and Real Time Bidding,48b6f7276bfa253bcc560d7a096cee54,http://arxiv.org/abs/1002.3102v2 13669," Ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each time the publisher contacts the exchange, the exchange ``calls out'' to solicit bids from ad networks. This aspect of soliciting bids introduces a novel aspect, in contrast to existing literature. This suggests developing a joint optimization framework which optimizes over the allocation and well as solicitation. We model this selective call out as an online recurrent Bayesian decision framework with bandwidth type constraints. We obtain natural algorithms with bounded performance guarantees for several natural optimization criteria. We show that these results hold under different call out constraint models, and different arrival processes. Interestingly, the paper shows that under MHR assumptions, the expected revenue of generalized second price auction with reserve is constant factor of the expected welfare. Also the analysis herein allow us prove adaptivity gap type results for the adwords problem. ",yishay mansour,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,Selective Call Out and Real Time Bidding,48b6f7276bfa253bcc560d7a096cee54,http://arxiv.org/abs/1002.3102v2 13670," Ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each time the publisher contacts the exchange, the exchange ``calls out'' to solicit bids from ad networks. This aspect of soliciting bids introduces a novel aspect, in contrast to existing literature. This suggests developing a joint optimization framework which optimizes over the allocation and well as solicitation. We model this selective call out as an online recurrent Bayesian decision framework with bandwidth type constraints. We obtain natural algorithms with bounded performance guarantees for several natural optimization criteria. We show that these results hold under different call out constraint models, and different arrival processes. Interestingly, the paper shows that under MHR assumptions, the expected revenue of generalized second price auction with reserve is constant factor of the expected welfare. Also the analysis herein allow us prove adaptivity gap type results for the adwords problem. ",s. muthukrishnan,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,Selective Call Out and Real Time Bidding,48b6f7276bfa253bcc560d7a096cee54,http://arxiv.org/abs/1002.3102v2 13671," There has been much recent work on the revenue-raising properties of truthful mechanisms for selling goods to selfish bidders. Typically the revenue of a mechanism is compared against a benchmark (such as, the maximum revenue obtainable by an omniscient seller selling at a fixed price to at least two customers), with a view to understanding how much lower the mechanism's revenue is than the benchmark, in the worst case. We study this issue in the context of {\em lotteries}, where the seller may sell a probability of winning an item. We are interested in two general issues. Firstly, we aim at using the true optimum revenue as benchmark for our auctions. Secondly, we study the extent to which the expressive power resulting from lotteries, helps to improve the worst-case ratio. We study this in the well-known context of {\em digital goods}, where the production cost is zero. We show that in this scenario, collusion-resistant lotteries (these are lotteries for which no coalition of bidders exchanging side payments has an advantage in lying) are as powerful as truthful ones. ",paul goldberg,,2011.0,,arXiv,Goldberg2011,True,,arXiv,Not available,Using Lotteries to Approximate the Optimal Revenue,4c8a0e6e5787e2885465810931c6ab25,http://arxiv.org/abs/1110.1980v2 13672," There has been much recent work on the revenue-raising properties of truthful mechanisms for selling goods to selfish bidders. Typically the revenue of a mechanism is compared against a benchmark (such as, the maximum revenue obtainable by an omniscient seller selling at a fixed price to at least two customers), with a view to understanding how much lower the mechanism's revenue is than the benchmark, in the worst case. We study this issue in the context of {\em lotteries}, where the seller may sell a probability of winning an item. We are interested in two general issues. Firstly, we aim at using the true optimum revenue as benchmark for our auctions. Secondly, we study the extent to which the expressive power resulting from lotteries, helps to improve the worst-case ratio. We study this in the well-known context of {\em digital goods}, where the production cost is zero. We show that in this scenario, collusion-resistant lotteries (these are lotteries for which no coalition of bidders exchanging side payments has an advantage in lying) are as powerful as truthful ones. ",carmine ventre,,2011.0,,arXiv,Goldberg2011,True,,arXiv,Not available,Using Lotteries to Approximate the Optimal Revenue,4c8a0e6e5787e2885465810931c6ab25,http://arxiv.org/abs/1110.1980v2 13673," Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome. ",xiaoming li,,2016.0,,arXiv,Hu2016,True,,arXiv,Not available,"Caching as a Service: Small-cell Caching Mechanism Design for Service Providers",b5bdc93c08a0df3a20dc1c2b4eb1e2ab,http://arxiv.org/abs/1607.04894v1 13674," By resorting to the vector space structure of finite games, skew-symmetric games (SSGs) are proposed and investigated as a natural subspace of finite games. First of all, for two player games, it is shown that the skew-symmetric games form an orthogonal complement of the symmetric games. Then for a general SSG its linear representation is given, which can be used to verify whether a finite game is skew-symmetric. Furthermore, some properties of SSGs are also obtained in the light of its vector subspace structure. Finally, a symmetry-based decomposition of finite games is proposed, which consists of three mutually orthogonal subspaces: symmetric subspace, skew-symmetric subspace and asymmetric subspace. An illustrative example is presented to demonstrate this decomposition. ",yaqi hao,,2017.0,,arXiv,Hao2017,True,,arXiv,Not available,On Skew-Symmetric Games,dd251b83b90bffa70675bda99c55872b,http://arxiv.org/abs/1712.02962v1 13675," We consider an auction of identical digital goods to customers whose valuations are drawn independently from known distributions. Myerson's classic result identifies the truthful mechanism that maximizes the seller's expected profit. Under the assumption that in small groups customers can learn each others' valuations, we show how Myerson's result can be improved to yield a higher payoff to the seller using a mechanism that offers groups of customers to buy bundles of items. ",elchanan mossel,,2012.0,,arXiv,Mossel2012,True,,arXiv,Not available,"Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit",9aeeb2673c1ac87de2399bec836986f7,http://arxiv.org/abs/1202.0969v2 13676," We consider an auction of identical digital goods to customers whose valuations are drawn independently from known distributions. Myerson's classic result identifies the truthful mechanism that maximizes the seller's expected profit. Under the assumption that in small groups customers can learn each others' valuations, we show how Myerson's result can be improved to yield a higher payoff to the seller using a mechanism that offers groups of customers to buy bundles of items. ",omer tamuz,,2012.0,,arXiv,Mossel2012,True,,arXiv,Not available,"Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit",9aeeb2673c1ac87de2399bec836986f7,http://arxiv.org/abs/1202.0969v2 13677," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",paul duetting,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13678," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",felix fischer,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13679," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",pitchayut jirapinyo,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13680," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",john lai,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13681," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",benjamin lubin,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13682," In mechanism design it is typical to impose incentive compatibility and then derive an optimal mechanism subject to this constraint. By replacing the incentive compatibility requirement with the goal of minimizing expected ex post regret, we are able to adapt statistical machine learning techniques to the design of payment rules. This computational approach to mechanism design is applicable to domains with multi-dimensional types and situations where computational efficiency is a concern. Specifically, given an outcome rule and access to a type distribution, we train a support vector machine with a special discriminant function structure such that it implicitly establishes a payment rule with desirable incentive properties. We discuss applications to a multi-minded combinatorial auction with a greedy winner-determination algorithm and to an assignment problem with egalitarian outcome rule. Experimental results demonstrate both that the construction produces payment rules with low ex post regret, and that penalizing classification errors is effective in preventing failures of ex post individual rationality. ",david parkes,,2012.0,,"Proceedings of the 13th ACM Conference on Electronic Commerce (EC '12), pages 477-494, 2012",Duetting2012,True,,arXiv,Not available,Payment Rules through Discriminant-Based Classifiers,e72b71ccf5bac783ec61cc195164ebae,http://arxiv.org/abs/1208.1184v1 13683," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",balasubramanian sivan,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 13684," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",vasilis syrgkanis,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 13685," By resorting to the vector space structure of finite games, skew-symmetric games (SSGs) are proposed and investigated as a natural subspace of finite games. First of all, for two player games, it is shown that the skew-symmetric games form an orthogonal complement of the symmetric games. Then for a general SSG its linear representation is given, which can be used to verify whether a finite game is skew-symmetric. Furthermore, some properties of SSGs are also obtained in the light of its vector subspace structure. Finally, a symmetry-based decomposition of finite games is proposed, which consists of three mutually orthogonal subspaces: symmetric subspace, skew-symmetric subspace and asymmetric subspace. An illustrative example is presented to demonstrate this decomposition. ",daizhan cheng,,2017.0,,arXiv,Hao2017,True,,arXiv,Not available,On Skew-Symmetric Games,dd251b83b90bffa70675bda99c55872b,http://arxiv.org/abs/1712.02962v1 13686," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",omer tamuz,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 13687," The ForMaRE project applies formal mathematical reasoning to economics. We seek to increase confidence in economics' theoretical results, to aid in discovering new results, and to foster interest in formal methods, i.e. computer-aided reasoning, within economics. To formal methods, we seek to contribute user experience feedback from new audiences, as well as new challenge problems. In the first project year, we continued earlier game theory studies but then focused on auctions, where we are building a toolbox of formalisations, and have started to study matching and financial risk. In parallel to conducting research that connects economics and formal methods, we organise events and provide infrastructure to connect both communities, from fostering mutual awareness to targeted matchmaking. These efforts extend beyond economics, towards generally enabling domain experts to use mechanised reasoning. ",christoph lange,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,The ForMaRE Project - Formal Mathematical Reasoning in Economics,c5b91032b0a772a34a4b40acd05c3e71,http://arxiv.org/abs/1303.4194v3 13688," The ForMaRE project applies formal mathematical reasoning to economics. We seek to increase confidence in economics' theoretical results, to aid in discovering new results, and to foster interest in formal methods, i.e. computer-aided reasoning, within economics. To formal methods, we seek to contribute user experience feedback from new audiences, as well as new challenge problems. In the first project year, we continued earlier game theory studies but then focused on auctions, where we are building a toolbox of formalisations, and have started to study matching and financial risk. In parallel to conducting research that connects economics and formal methods, we organise events and provide infrastructure to connect both communities, from fostering mutual awareness to targeted matchmaking. These efforts extend beyond economics, towards generally enabling domain experts to use mechanised reasoning. ",colin rowat,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,The ForMaRE Project - Formal Mathematical Reasoning in Economics,c5b91032b0a772a34a4b40acd05c3e71,http://arxiv.org/abs/1303.4194v3 13689," The ForMaRE project applies formal mathematical reasoning to economics. We seek to increase confidence in economics' theoretical results, to aid in discovering new results, and to foster interest in formal methods, i.e. computer-aided reasoning, within economics. To formal methods, we seek to contribute user experience feedback from new audiences, as well as new challenge problems. In the first project year, we continued earlier game theory studies but then focused on auctions, where we are building a toolbox of formalisations, and have started to study matching and financial risk. In parallel to conducting research that connects economics and formal methods, we organise events and provide infrastructure to connect both communities, from fostering mutual awareness to targeted matchmaking. These efforts extend beyond economics, towards generally enabling domain experts to use mechanised reasoning. ",manfred kerber,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,The ForMaRE Project - Formal Mathematical Reasoning in Economics,c5b91032b0a772a34a4b40acd05c3e71,http://arxiv.org/abs/1303.4194v3 13690," We consider the well known, and notoriously difficult, problem of a single revenue-maximizing seller selling two or more heterogeneous goods to a single buyer whose private values for the goods are drawn from a (possibly correlated) known distribution, and whose valuation is additive over the goods. We show that when there are two (or more) goods, _simple mechanisms_ -- such as selling the goods separately or as a bundle -- _may yield only a negligible fraction of the optimal revenue_. This resolves the open problem of Briest, Chawla, Kleinberg, and Weinberg (JET 2015) who prove the result for at least three goods in the related setup of a unit-demand buyer. We also introduce the menu size as a simple measure of the complexity of mechanisms, and show that the revenue may increase polynomially with _menu size_ and that no bounded menu size can ensure any positive fraction of the optimal revenue. The menu size also turns out to ""pin down"" the revenue properties of deterministic mechanisms. ",sergiu hart,,2013.0,,arXiv,Hart2013,True,,arXiv,Not available,"Selling Multiple Correlated Goods: Revenue Maximization and Menu-Size Complexity (old title: ""The Menu-Size Complexity of Auctions"")",26b610af615c7c72025173d60c61f9bb,http://arxiv.org/abs/1304.6116v3 13691," We consider the well known, and notoriously difficult, problem of a single revenue-maximizing seller selling two or more heterogeneous goods to a single buyer whose private values for the goods are drawn from a (possibly correlated) known distribution, and whose valuation is additive over the goods. We show that when there are two (or more) goods, _simple mechanisms_ -- such as selling the goods separately or as a bundle -- _may yield only a negligible fraction of the optimal revenue_. This resolves the open problem of Briest, Chawla, Kleinberg, and Weinberg (JET 2015) who prove the result for at least three goods in the related setup of a unit-demand buyer. We also introduce the menu size as a simple measure of the complexity of mechanisms, and show that the revenue may increase polynomially with _menu size_ and that no bounded menu size can ensure any positive fraction of the optimal revenue. The menu size also turns out to ""pin down"" the revenue properties of deterministic mechanisms. ",noam nisan,,2013.0,,arXiv,Hart2013,True,,arXiv,Not available,"Selling Multiple Correlated Goods: Revenue Maximization and Menu-Size Complexity (old title: ""The Menu-Size Complexity of Auctions"")",26b610af615c7c72025173d60c61f9bb,http://arxiv.org/abs/1304.6116v3 13692," In this paper, we consider the problem of incentive mechanism design for smart-phone crowd-sourcing. Each user participating in crowd-sourcing submits a set of tasks it can accomplish and its corresponding bid. The platform then selects the users and their payments to maximize its utility while ensuring truthfulness, individual rationality, profitability, and polynomial algorithm complexity. Both the offline and the online scenarios are considered, where in the offline case, all users submit their profiles simultaneously, while in the online case they do it sequentially, and the decision whether to accept or reject each user is done instantaneously with no revocation. The proposed algorithms for both the offline and the online case are shown to satisfy all the four desired properties of an efficient auction. Through extensive simulation, the performance of the offline and the online algorithm is also compared. ",ashwin subramanian,,2013.0,,arXiv,Subramanian2013,True,,arXiv,Not available,"Offline and Online Incentive Mechanism Design for Smart-phone Crowd-sourcing",66df89af0998cd4fc311be38d6560c13,http://arxiv.org/abs/1310.1746v1 13693," In this paper, we consider the problem of incentive mechanism design for smart-phone crowd-sourcing. Each user participating in crowd-sourcing submits a set of tasks it can accomplish and its corresponding bid. The platform then selects the users and their payments to maximize its utility while ensuring truthfulness, individual rationality, profitability, and polynomial algorithm complexity. Both the offline and the online scenarios are considered, where in the offline case, all users submit their profiles simultaneously, while in the online case they do it sequentially, and the decision whether to accept or reject each user is done instantaneously with no revocation. The proposed algorithms for both the offline and the online case are shown to satisfy all the four desired properties of an efficient auction. Through extensive simulation, the performance of the offline and the online algorithm is also compared. ",g kanth,,2013.0,,arXiv,Subramanian2013,True,,arXiv,Not available,"Offline and Online Incentive Mechanism Design for Smart-phone Crowd-sourcing",66df89af0998cd4fc311be38d6560c13,http://arxiv.org/abs/1310.1746v1 13694," In this paper, we consider the problem of incentive mechanism design for smart-phone crowd-sourcing. Each user participating in crowd-sourcing submits a set of tasks it can accomplish and its corresponding bid. The platform then selects the users and their payments to maximize its utility while ensuring truthfulness, individual rationality, profitability, and polynomial algorithm complexity. Both the offline and the online scenarios are considered, where in the offline case, all users submit their profiles simultaneously, while in the online case they do it sequentially, and the decision whether to accept or reject each user is done instantaneously with no revocation. The proposed algorithms for both the offline and the online case are shown to satisfy all the four desired properties of an efficient auction. Through extensive simulation, the performance of the offline and the online algorithm is also compared. ",rahul vaze,,2013.0,,arXiv,Subramanian2013,True,,arXiv,Not available,"Offline and Online Incentive Mechanism Design for Smart-phone Crowd-sourcing",66df89af0998cd4fc311be38d6560c13,http://arxiv.org/abs/1310.1746v1 13695," Crowd sensing is a new paradigm which leverages the ubiquity of sensor-equipped mobile devices to collect data. To achieve good quality for crowd sensing, incentive mechanisms are indispensable to attract more participants. Most of existing mechanisms focus on the expected utility prior to sensing, ignoring the risk of low quality solution and privacy leakage. Traditional incentive mechanisms such as the Vickrey-Clarke-Groves (VCG) mechanism and its variants are not applicable here. In this paper, to address these challenges, we propose a behavior based incentive mechanism for crowd sensing applications with budget constraints by applying sequential all-pay auctions in mobile social networks (MSNs), not only to consider the effects of extensive user participation, but also to maximize high quality of the context based sensing content submission for crowd sensing platform under the budget constraints, where users arrive in a sequential order. Through an extensive simulation, results indicate that incentive mechanisms in our proposed framework outperform the best existing solution. ",jiajun sun,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,"Behavior-Based online Incentive Mechanism for Crowd Sensing with Budget Constraints",333eba3d86b3ed633dabf3a86de98859,http://arxiv.org/abs/1310.5485v2 13696," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",logan crone,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 13697," This paper studies risk in the context of a stochastic auction designed to facilitate the integration of renewable generation in electricity markets. We model market participants who are risk averse, when their risk aversion is reflected through coherent risk measures. We uncover a closed form characterization of the optimal pre-commitment behaviour for a given real-time policy, with arbitrary risk aversion: when participants cannot trade risk, generators provide less pre-commitment than when participants are risk-neutral, alternatively, when participants trade a rich set of financial instruments, generators provide more pre-commitment than when they are risk-neutral. ",ryan cory-wright,,2018.0,,arXiv,Cory-Wright2018,True,,arXiv,Not available,"On stochastic auctions in risk-averse electricity markets with uncertain supply",c17da9f5eca4d650733aa11e78d03f23,http://arxiv.org/abs/1804.08815v2 13698," This paper studies risk in the context of a stochastic auction designed to facilitate the integration of renewable generation in electricity markets. We model market participants who are risk averse, when their risk aversion is reflected through coherent risk measures. We uncover a closed form characterization of the optimal pre-commitment behaviour for a given real-time policy, with arbitrary risk aversion: when participants cannot trade risk, generators provide less pre-commitment than when participants are risk-neutral, alternatively, when participants trade a rich set of financial instruments, generators provide more pre-commitment than when they are risk-neutral. ",golbon zakeri,,2018.0,,arXiv,Cory-Wright2018,True,,arXiv,Not available,"On stochastic auctions in risk-averse electricity markets with uncertain supply",c17da9f5eca4d650733aa11e78d03f23,http://arxiv.org/abs/1804.08815v2 13699," Consumer markets are quickly growing, creating the need to design new sales mechanisms. Here we introduce a new auction model for selling products in real time and without production limitations. Interested buyers continuously offer bids and if the price is 'right', the bid is accepted. The model exhibits self-organized criticality; it presents a critical price from which a bid is accepted with probability one, and avalanches of sales above this value are observed. We also discuss how to implement the model and consider the impact of information sharing on total income, as well as the impact of setting a base price. ",daniel fraiman,,2018.0,,arXiv,Fraiman2018,True,,arXiv,Not available,"Self-organized criticality auction model for selling products in real time",5bbc637d7c1af0db0c2388db8b1bfa17,http://arxiv.org/abs/1805.09763v2 13700," We report statistical regularities of the opening and closing auctions of French equities, focusing on the diffusive properties of the indicative auction price. Two mechanisms are at play as the auction end time nears: the typical price change magnitude decreases, favoring underdiffusion, while the rate of these events increases, potentially leading to overdiffusion. A third mechanism, caused by the strategic behavior of traders, is needed to produce nearly diffusive prices: waiting to submit buy orders until sell orders have decreased the indicative price and vice-versa. ",damien challet,,2018.0,,arXiv,Challet2018,True,,arXiv,Not available,"Strategic behaviour and indicative price diffusion in Paris Stock Exchange auctions",40019bea5bb551669c5e16af725e54fb,http://arxiv.org/abs/1807.00573v1 13701," The availability of large microarray data has led to a growing interest in biclustering methods in the past decade. Several algorithms have been proposed to identify subsets of genes and conditions according to different similarity measures and under varying constraints. In this paper we focus on the exclusive row biclustering problem for gene expression data sets, in which each row can only be a member of a single bicluster while columns can participate in multiple ones. This type of biclustering may be adequate, for example, for clustering groups of cancer patients where each patient (row) is expected to be carrying only a single type of cancer, while each cancer type is associated with multiple (and possibly overlapping) genes (columns). We present a novel method to identify these exclusive row biclusters through a combination of existing biclustering algorithms and combinatorial auction techniques. We devise an approach for tuning the threshold for our algorithm based on comparison to a null model in the spirit of the Gap statistic approach. We demonstrate our approach on both synthetic and real-world gene expression data and show its power in identifying large span non-overlapping rows sub matrices, while considering their unique nature. The Gap statistic approach succeeds in identifying appropriate thresholds in all our examples. ",amichai painsky,,2018.0,,arXiv,Painsky2018,True,,arXiv,Not available,"MSc Dissertation: Exclusive Row Biclustering for Gene Expression Using a Combinatorial Auction Approach",254235379f844a905aa27c1cc48d8ec1,http://arxiv.org/abs/1809.05077v2 13702," With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, crowdsourcing utilizing crowds of devices to facilitate large scale sensing tasks has gaining more and more research attention. Most of existing works either assume devices are willing to cooperate utilizing centralized mechanisms or design incentive algorithms using double auctions. Which is not practical to deal with the case when there is a lack of centralized controller for the former, and not suitable to the case when the seller device is also resource constrained for the later. In this paper, we propose a truthful incentive mechanism with combinatorial double auction for crowd sensing task assignment in device-to-device (D2D) clouds, where a single mobile device with intensive sensing task can hire a group of idle neighboring devices. With this new mechanism, time critical sensing tasks can be handled in time with a distributed nature. We prove that the proposed mechanism is truthful, individual rational, budget balance and computational efficient. Our simulation results demonstrate that combinatorial double auction mechanism gets a 26.3% and 15.8% gains in comparison to existing double auction scheme and the centralized maximum matching based algorithm respectively. ",yutong zhai,,2018.0,,arXiv,Zhai2018,True,,arXiv,Not available,"COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds",e8293e1aa197d7ffe64a649a6f7d04d0,http://arxiv.org/abs/1810.10697v1 13703," With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, crowdsourcing utilizing crowds of devices to facilitate large scale sensing tasks has gaining more and more research attention. Most of existing works either assume devices are willing to cooperate utilizing centralized mechanisms or design incentive algorithms using double auctions. Which is not practical to deal with the case when there is a lack of centralized controller for the former, and not suitable to the case when the seller device is also resource constrained for the later. In this paper, we propose a truthful incentive mechanism with combinatorial double auction for crowd sensing task assignment in device-to-device (D2D) clouds, where a single mobile device with intensive sensing task can hire a group of idle neighboring devices. With this new mechanism, time critical sensing tasks can be handled in time with a distributed nature. We prove that the proposed mechanism is truthful, individual rational, budget balance and computational efficient. Our simulation results demonstrate that combinatorial double auction mechanism gets a 26.3% and 15.8% gains in comparison to existing double auction scheme and the centralized maximum matching based algorithm respectively. ",liusheng huang,,2018.0,,arXiv,Zhai2018,True,,arXiv,Not available,"COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds",e8293e1aa197d7ffe64a649a6f7d04d0,http://arxiv.org/abs/1810.10697v1 13704," With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, crowdsourcing utilizing crowds of devices to facilitate large scale sensing tasks has gaining more and more research attention. Most of existing works either assume devices are willing to cooperate utilizing centralized mechanisms or design incentive algorithms using double auctions. Which is not practical to deal with the case when there is a lack of centralized controller for the former, and not suitable to the case when the seller device is also resource constrained for the later. In this paper, we propose a truthful incentive mechanism with combinatorial double auction for crowd sensing task assignment in device-to-device (D2D) clouds, where a single mobile device with intensive sensing task can hire a group of idle neighboring devices. With this new mechanism, time critical sensing tasks can be handled in time with a distributed nature. We prove that the proposed mechanism is truthful, individual rational, budget balance and computational efficient. Our simulation results demonstrate that combinatorial double auction mechanism gets a 26.3% and 15.8% gains in comparison to existing double auction scheme and the centralized maximum matching based algorithm respectively. ",long chen,,2018.0,,arXiv,Zhai2018,True,,arXiv,Not available,"COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds",e8293e1aa197d7ffe64a649a6f7d04d0,http://arxiv.org/abs/1810.10697v1 13705," With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, crowdsourcing utilizing crowds of devices to facilitate large scale sensing tasks has gaining more and more research attention. Most of existing works either assume devices are willing to cooperate utilizing centralized mechanisms or design incentive algorithms using double auctions. Which is not practical to deal with the case when there is a lack of centralized controller for the former, and not suitable to the case when the seller device is also resource constrained for the later. In this paper, we propose a truthful incentive mechanism with combinatorial double auction for crowd sensing task assignment in device-to-device (D2D) clouds, where a single mobile device with intensive sensing task can hire a group of idle neighboring devices. With this new mechanism, time critical sensing tasks can be handled in time with a distributed nature. We prove that the proposed mechanism is truthful, individual rational, budget balance and computational efficient. Our simulation results demonstrate that combinatorial double auction mechanism gets a 26.3% and 15.8% gains in comparison to existing double auction scheme and the centralized maximum matching based algorithm respectively. ",ning xiao,,2018.0,,arXiv,Zhai2018,True,,arXiv,Not available,"COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds",e8293e1aa197d7ffe64a649a6f7d04d0,http://arxiv.org/abs/1810.10697v1 13706," With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, crowdsourcing utilizing crowds of devices to facilitate large scale sensing tasks has gaining more and more research attention. Most of existing works either assume devices are willing to cooperate utilizing centralized mechanisms or design incentive algorithms using double auctions. Which is not practical to deal with the case when there is a lack of centralized controller for the former, and not suitable to the case when the seller device is also resource constrained for the later. In this paper, we propose a truthful incentive mechanism with combinatorial double auction for crowd sensing task assignment in device-to-device (D2D) clouds, where a single mobile device with intensive sensing task can hire a group of idle neighboring devices. With this new mechanism, time critical sensing tasks can be handled in time with a distributed nature. We prove that the proposed mechanism is truthful, individual rational, budget balance and computational efficient. Our simulation results demonstrate that combinatorial double auction mechanism gets a 26.3% and 15.8% gains in comparison to existing double auction scheme and the centralized maximum matching based algorithm respectively. ",yangyang geng,,2018.0,,arXiv,Zhai2018,True,,arXiv,Not available,"COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds",e8293e1aa197d7ffe64a649a6f7d04d0,http://arxiv.org/abs/1810.10697v1 13707," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",lior fishman,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 13708," We study new classes of games, called zero-sum equivalent games and zero-sum equivalent potential games, and prove decomposition theorems involving these classes of games. We say that two games are ""strategically equivalent"" if, for every player, the payoff differences between two strategies (holding other players' strategies fixed) are identical. A zero-sum equivalent game is a game that is strategically equivalent to a zero-sum game; a zero-sum equivalent potential game is a zero-sum equivalent game that is strategically equivalent to a common interest game. We also call a game ""normalized"" if the sum of one player's payoffs, given the other players' strategies, is always zero. We show that any normal form game can be uniquely decomposed into either (i) a zero-sum equivalent game and a normalized common interest game, or (ii) a zero-sum equivalent potential game, a normalized zero-sum game, and a normalized common interest game, each with distinctive equilibrium properties. For example, we show that two-player zero-sum equivalent games with finite strategy sets generically have a unique Nash equilibrium and that two-player zero-sum equivalent potential games with finite strategy sets generically have a strictly dominant Nash equilibrium. ",sung-ha hwang,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,"Strategic Decompositions of Normal Form Games: Zero-sum Games and Potential Games",346880354949f351b0cb54b7322a55dc,http://arxiv.org/abs/1602.06648v2 13709," We study new classes of games, called zero-sum equivalent games and zero-sum equivalent potential games, and prove decomposition theorems involving these classes of games. We say that two games are ""strategically equivalent"" if, for every player, the payoff differences between two strategies (holding other players' strategies fixed) are identical. A zero-sum equivalent game is a game that is strategically equivalent to a zero-sum game; a zero-sum equivalent potential game is a zero-sum equivalent game that is strategically equivalent to a common interest game. We also call a game ""normalized"" if the sum of one player's payoffs, given the other players' strategies, is always zero. We show that any normal form game can be uniquely decomposed into either (i) a zero-sum equivalent game and a normalized common interest game, or (ii) a zero-sum equivalent potential game, a normalized zero-sum game, and a normalized common interest game, each with distinctive equilibrium properties. For example, we show that two-player zero-sum equivalent games with finite strategy sets generically have a unique Nash equilibrium and that two-player zero-sum equivalent potential games with finite strategy sets generically have a strictly dominant Nash equilibrium. ",luc rey-bellet,,2016.0,,arXiv,Hwang2016,True,,arXiv,Not available,"Strategic Decompositions of Normal Form Games: Zero-sum Games and Potential Games",346880354949f351b0cb54b7322a55dc,http://arxiv.org/abs/1602.06648v2 13710," An abstraction of normal form games is proposed, called Feasibility/Desirability Games (or FD Games in short). FD Games can be seen from three points of view: as a new presentation of games in which Nash equilibria can be found, as choice models in microeconomics or as a model of evolution in games. ",pierre lescanne,,2009.0,,arXiv,Lescanne2009,True,,arXiv,Not available,"Feasibility/Desirability Games for Normal Form Games, Choice Models and Evolutionary Games",fb6e0d914e8a0bad0d7f29d2e021afec,http://arxiv.org/abs/0907.5469v1 13711," We present an algebraic framework for the analysis of combinatorial games. This framework embraces the classical theory of partizan games as well as a number of misere games, comply-constrain games, and card games that have been studied more recently. It focuses on the construction of the quotient monoid of a game, an idea that has been successively applied to several classes of games. ",johan wastlund,,2009.0,,arXiv,Wästlund2009,True,,arXiv,Not available,The strange algebra of combinatorial games,0423a63df35c558f6651b3f6da1d9b6d,http://arxiv.org/abs/0912.0448v1 13712," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",kristoffer hansen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 13713," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",michal koucky,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 13714," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",niels lauritzen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 13715," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",peter miltersen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 13716," Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games. ",elias tsigaridas,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Exact Algorithms for Solving Stochastic Games,95f0e6b3b18e21a266310c831406d9a1,http://arxiv.org/abs/1202.3898v1 13717," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",stephane roux,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 13718," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",stephen jackson,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 13719," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",pierre lescanne,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 13720," We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. Second we formally introduce and define the CP-games formalism. Then we sketch two `real-life' applications, namely a connection between CP games and gene regulation networks, and the use of CP games to formalize implied information in Chinese Wall security. We end with a study of a particular fixed-point construction over CP games and of the resulting existence of equilibria in possibly infinite games. ",rene vestergaard,,2008.0,,arXiv,Roux2008,True,,arXiv,Not available,Conversion/Preference Games,f093a4fd5d3d652cd58efbdc0ee961f8,http://arxiv.org/abs/0811.0071v1 13721," In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow model by Lawler and Martel, and enjoy various nice properties such as incentive compatibility of buyers, individual rationality, pareto optimality, strong budget balance. The first mechanism is a simple ""reduce-to-recover"" algorithm that reduces the market to be one-sided, applies the polyhedral clinching auction by Goel et al, and lifts the resulting allocation to the original two-sided market via polymatroidal network flow. The second mechanism is a two-sided generalization of the polyhedral clinching auction, which improves the first mechanism in terms of the fairness of revenue sharing on sellers. Both mechanisms are implemented by polymatroid algorithms. We demonstrate how our framework is applied to internet display ad auctions. ",hiroshi hirai,,2017.0,,arXiv,Hirai2017,True,,arXiv,Not available,Polyhedral Clinching Auctions for Two-sided Markets,99535a6173f46c3ada63fbc505ff7267,http://arxiv.org/abs/1708.04881v2 13722," In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow model by Lawler and Martel, and enjoy various nice properties such as incentive compatibility of buyers, individual rationality, pareto optimality, strong budget balance. The first mechanism is a simple ""reduce-to-recover"" algorithm that reduces the market to be one-sided, applies the polyhedral clinching auction by Goel et al, and lifts the resulting allocation to the original two-sided market via polymatroidal network flow. The second mechanism is a two-sided generalization of the polyhedral clinching auction, which improves the first mechanism in terms of the fairness of revenue sharing on sellers. Both mechanisms are implemented by polymatroid algorithms. We demonstrate how our framework is applied to internet display ad auctions. ",ryosuke sato,,2017.0,,arXiv,Hirai2017,True,,arXiv,Not available,Polyhedral Clinching Auctions for Two-sided Markets,99535a6173f46c3ada63fbc505ff7267,http://arxiv.org/abs/1708.04881v2 13723," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoad lewenberg,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 13724," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",omer lev,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 13725," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoram bachrach,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 13726," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",jeffrey rosenschein,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 13727," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",xuelin shi,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 13728," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",ke xu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 13729," Potential games, originally introduced in the early 1990's by Lloyd Shapley, the 2012 Nobel Laureate in Economics, and his colleague Dov Monderer, are a very important class of models in game theory. They have special properties such as the existence of Nash equilibria in pure strategies. This note introduces graphical versions of potential games. Special cases of graphical potential games have already found applicability in many areas of science and engineering beyond economics, including artificial intelligence, computer vision, and machine learning. They have been effectively applied to the study and solution of important real-world problems such as routing and congestion in networks, distributed resource allocation (e.g., public goods), and relaxation-labeling for image segmentation. Implicit use of graphical potential games goes back at least 40 years. Several classes of games considered standard in the literature, including coordination games, local interaction games, lattice games, congestion games, and party-affiliation games, are instances of graphical potential games. This note provides several characterizations of graphical potential games by leveraging well-known results from the literature on probabilistic graphical models. A major contribution of the work presented here that particularly distinguishes it from previous work is establishing that the convergence of certain type of game-playing rules implies that the agents/players must be embedded in some graphical potential game. ",luis ortiz,,2015.0,,arXiv,Ortiz2015,True,,arXiv,Not available,Graphical Potential Games,ee019ee69d2d814e5db9410fc82900a6,http://arxiv.org/abs/1505.01539v1 13730," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",jiangchuan liu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 13731," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",yong wang,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 13732," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",vineet abhishek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13733," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",bruce hajek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13734," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",steven williams,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 13735," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",evangelos markakis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 13736," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",orestis telelis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 13737," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",chen xu,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13738," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",lingyang song,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13739," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",zhu han,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13740," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",xinyang deng,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 13741," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",qun zhao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13742," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiaoli wang,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13743," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiang cheng,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13744," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",bingli jiao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 13745," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",zhiyi huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 13746," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",nikhil devanur,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 13747," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",david malec,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 13748," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",paul dutting,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13749," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",zhe feng,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13750," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",harikrishna narasimhan,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13751," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",yong deng,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 13752," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",david parkes,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 13753," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",shaddin dughmi,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 13754," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",li han,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 13755," We consider (approximate) revenue maximization in auctions where the distribution on input valuations is given via ""black box"" access to samples from the distribution. We observe that the number of samples required -- the sample complexity -- is tightly related to the representation complexity of an approximately revenue-maximizing auction. Our main results are upper bounds and an exponential lower bound on these complexities. ",noam nisan,,2014.0,,arXiv,Dughmi2014,True,,arXiv,Not available,Sampling and Representation Complexity of Revenue Maximization,dd5adcdf3ce41e3f41310be2e8c53d5f,http://arxiv.org/abs/1402.4535v2 13756," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",shahar dobzinski,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 13757," In this note we study the greedy algorithm for combinatorial auctions with submodular bidders. It is well known that this algorithm provides an approximation ratio of $2$ for every order of the items. We show that if the valuations are vertex cover functions and the order is random then the expected approximation ratio imrpoves to $\frac 7 4$. ",ami mor,,2015.0,,arXiv,Dobzinski2015,True,,arXiv,Not available,On the Greedy Algorithm for Combinatorial Auctions with a Random Order,e5095d400539346172e6ecf9712aa6d2,http://arxiv.org/abs/1502.02178v1 13758," Game theory is usually considered applied mathematics, but a few game-theoretic results, such as Borel determinacy, were developed by mathematicians for mathematics in a broad sense. These results usually state determinacy, i.e. the existence of a winning strategy in games that involve two players and two outcomes saying who wins. In a multi-outcome setting, the notion of winning strategy is irrelevant yet usually replaced faithfully with the notion of (pure) Nash equilibrium. This article shows that every determinacy result over an arbitrary game structure, e.g. a tree, is transferable into existence of multi-outcome (pure) Nash equilibrium over the same game structure. The equilibrium-transfer theorem requires cardinal or order-theoretic conditions on the strategy sets and the preferences, respectively, whereas counter-examples show that every requirement is relevant, albeit possibly improvable. When the outcomes are finitely many, the proof provides an algorithm computing a Nash equilibrium without significant complexity loss compared to the two-outcome case. As examples of application, this article generalises Borel determinacy, positional determinacy of parity games, and finite-memory determinacy of Muller games. ",stephane roux,,2012.0,,arXiv,Roux2012,True,,arXiv,Not available,From winning strategy to Nash equilibrium,8353cf4611cc96f7fc3d1bb0a5060832,http://arxiv.org/abs/1203.1866v4 13759," In this paper, the problem of optimized beam alignment for wearable device-to-device (D2D) communications over millimeter wave (mmW) frequencies is studied. In particular, a noncooperative game is formulated between wearable communication pairs that engage in D2D communications. In this game, wearable devices acting as transmitters autonomously select the directions of their beams so as to maximize the data rate to their receivers. To solve the game, an algorithm based on best response dynamics is proposed that allows the transmitters to reach a Nash equilibrium in a distributed manner. To further improve the performance of mmW D2D communications, a novel quantum game model is formulated to enable the wearable devices to exploit new quantum directions during their beam alignment so as to further enhance their data rate. Simulation results show that the proposed game-theoretic approach improves the performance, in terms of data rate, of about 75% compared to a uniform beam alignment. The results also show that the quantum game model can further yield up to 20% improvement in data rates, relative to the classical game approach. ",qianqian zhang,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"Quantum Game Theory for Beam Alignment in Millimeter Wave Device-to-Device Communications",4e60b6b0c34740edfbf4a8939b1550ca,http://arxiv.org/abs/1610.01982v1 13760," In this paper, the problem of optimized beam alignment for wearable device-to-device (D2D) communications over millimeter wave (mmW) frequencies is studied. In particular, a noncooperative game is formulated between wearable communication pairs that engage in D2D communications. In this game, wearable devices acting as transmitters autonomously select the directions of their beams so as to maximize the data rate to their receivers. To solve the game, an algorithm based on best response dynamics is proposed that allows the transmitters to reach a Nash equilibrium in a distributed manner. To further improve the performance of mmW D2D communications, a novel quantum game model is formulated to enable the wearable devices to exploit new quantum directions during their beam alignment so as to further enhance their data rate. Simulation results show that the proposed game-theoretic approach improves the performance, in terms of data rate, of about 75% compared to a uniform beam alignment. The results also show that the quantum game model can further yield up to 20% improvement in data rates, relative to the classical game approach. ",walid saad,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"Quantum Game Theory for Beam Alignment in Millimeter Wave Device-to-Device Communications",4e60b6b0c34740edfbf4a8939b1550ca,http://arxiv.org/abs/1610.01982v1 13761," In this paper, the problem of optimized beam alignment for wearable device-to-device (D2D) communications over millimeter wave (mmW) frequencies is studied. In particular, a noncooperative game is formulated between wearable communication pairs that engage in D2D communications. In this game, wearable devices acting as transmitters autonomously select the directions of their beams so as to maximize the data rate to their receivers. To solve the game, an algorithm based on best response dynamics is proposed that allows the transmitters to reach a Nash equilibrium in a distributed manner. To further improve the performance of mmW D2D communications, a novel quantum game model is formulated to enable the wearable devices to exploit new quantum directions during their beam alignment so as to further enhance their data rate. Simulation results show that the proposed game-theoretic approach improves the performance, in terms of data rate, of about 75% compared to a uniform beam alignment. The results also show that the quantum game model can further yield up to 20% improvement in data rates, relative to the classical game approach. ",mehdi bennis,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"Quantum Game Theory for Beam Alignment in Millimeter Wave Device-to-Device Communications",4e60b6b0c34740edfbf4a8939b1550ca,http://arxiv.org/abs/1610.01982v1 13762," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",qi liu,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 13763," In this paper, the problem of optimized beam alignment for wearable device-to-device (D2D) communications over millimeter wave (mmW) frequencies is studied. In particular, a noncooperative game is formulated between wearable communication pairs that engage in D2D communications. In this game, wearable devices acting as transmitters autonomously select the directions of their beams so as to maximize the data rate to their receivers. To solve the game, an algorithm based on best response dynamics is proposed that allows the transmitters to reach a Nash equilibrium in a distributed manner. To further improve the performance of mmW D2D communications, a novel quantum game model is formulated to enable the wearable devices to exploit new quantum directions during their beam alignment so as to further enhance their data rate. Simulation results show that the proposed game-theoretic approach improves the performance, in terms of data rate, of about 75% compared to a uniform beam alignment. The results also show that the quantum game model can further yield up to 20% improvement in data rates, relative to the classical game approach. ",merouane debbah,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"Quantum Game Theory for Beam Alignment in Millimeter Wave Device-to-Device Communications",4e60b6b0c34740edfbf4a8939b1550ca,http://arxiv.org/abs/1610.01982v1 13764," We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks. The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games. We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance. ",laura poplawski,,2008.0,,arXiv,Poplawski2008,True,,arXiv,Not available,"Preference Games and Personalized Equilibria, with Applications to Fractional BGP",82418dc094e8bc9a2081b1c1ba2a8f98,http://arxiv.org/abs/0812.0598v2 13765," We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks. The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games. We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance. ",rajmohan rajaraman,,2008.0,,arXiv,Poplawski2008,True,,arXiv,Not available,"Preference Games and Personalized Equilibria, with Applications to Fractional BGP",82418dc094e8bc9a2081b1c1ba2a8f98,http://arxiv.org/abs/0812.0598v2 13766," We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks. The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games. We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance. ",ravi sundaram,,2008.0,,arXiv,Poplawski2008,True,,arXiv,Not available,"Preference Games and Personalized Equilibria, with Applications to Fractional BGP",82418dc094e8bc9a2081b1c1ba2a8f98,http://arxiv.org/abs/0812.0598v2 13767," We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks. The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games. We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance. ",shang-hua teng,,2008.0,,arXiv,Poplawski2008,True,,arXiv,Not available,"Preference Games and Personalized Equilibria, with Applications to Fractional BGP",82418dc094e8bc9a2081b1c1ba2a8f98,http://arxiv.org/abs/0812.0598v2 13768," We consider the natural extension of two-player nonlocal games to an arbitrary number of players. An important question for such nonlocal games is their behavior under parallel repetition. For two-player nonlocal games, it is known that both the classical and the non-signaling value of any game converges to zero exponentially fast under parallel repetition, given that the game is non-trivial to start with (i.e., has classical/non-signaling value <1). Very recent results show similar behavior for the quantum value of a two-player game under parallel repetition. For nonlocal games with three or more players, very little is known up to present on their behavior under parallel repetition; this is true for the classical, the quantum and the non-signaling value. In this work, we show a parallel repetition theorem for the non-signaling value of a large class of multi-player games, for an arbitrary number of players. Our result applies to all multi-player games for which all possible combinations of questions have positive probability; this class in particular includes all free games, in which the questions to the players are chosen independently. Specifically, we prove that if the original game has a non-signaling value smaller than 1, then the non-signaling value of the $n$-fold parallel repetition is exponentially small in $n$. Our parallel repetition theorem for multi-player games is weaker than the known parallel repetition results for two-player games in that the rate at which the non-signaling value of the game decreases not only depends on the non-signaling value of the original game (and the number of possible responses), but on the complete description of the game. Nevertheless, we feel that our result is a first step towards a better understanding of the parallel repetition of nonlocal games with more than two players. ",harry buhrman,,2013.0,10.4230/LIPIcs.TQC.2014.24,"9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014), pages 24-35",Buhrman2013,True,,arXiv,Not available,On the Parallel Repetition of Multi-Player Games: The No-Signaling Case,c3b12801bbe85d0bd341053bdf083e5d,http://arxiv.org/abs/1312.7455v2 13769," We consider the natural extension of two-player nonlocal games to an arbitrary number of players. An important question for such nonlocal games is their behavior under parallel repetition. For two-player nonlocal games, it is known that both the classical and the non-signaling value of any game converges to zero exponentially fast under parallel repetition, given that the game is non-trivial to start with (i.e., has classical/non-signaling value <1). Very recent results show similar behavior for the quantum value of a two-player game under parallel repetition. For nonlocal games with three or more players, very little is known up to present on their behavior under parallel repetition; this is true for the classical, the quantum and the non-signaling value. In this work, we show a parallel repetition theorem for the non-signaling value of a large class of multi-player games, for an arbitrary number of players. Our result applies to all multi-player games for which all possible combinations of questions have positive probability; this class in particular includes all free games, in which the questions to the players are chosen independently. Specifically, we prove that if the original game has a non-signaling value smaller than 1, then the non-signaling value of the $n$-fold parallel repetition is exponentially small in $n$. Our parallel repetition theorem for multi-player games is weaker than the known parallel repetition results for two-player games in that the rate at which the non-signaling value of the game decreases not only depends on the non-signaling value of the original game (and the number of possible responses), but on the complete description of the game. Nevertheless, we feel that our result is a first step towards a better understanding of the parallel repetition of nonlocal games with more than two players. ",serge fehr,,2013.0,10.4230/LIPIcs.TQC.2014.24,"9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014), pages 24-35",Buhrman2013,True,,arXiv,Not available,On the Parallel Repetition of Multi-Player Games: The No-Signaling Case,c3b12801bbe85d0bd341053bdf083e5d,http://arxiv.org/abs/1312.7455v2 13770," We consider the natural extension of two-player nonlocal games to an arbitrary number of players. An important question for such nonlocal games is their behavior under parallel repetition. For two-player nonlocal games, it is known that both the classical and the non-signaling value of any game converges to zero exponentially fast under parallel repetition, given that the game is non-trivial to start with (i.e., has classical/non-signaling value <1). Very recent results show similar behavior for the quantum value of a two-player game under parallel repetition. For nonlocal games with three or more players, very little is known up to present on their behavior under parallel repetition; this is true for the classical, the quantum and the non-signaling value. In this work, we show a parallel repetition theorem for the non-signaling value of a large class of multi-player games, for an arbitrary number of players. Our result applies to all multi-player games for which all possible combinations of questions have positive probability; this class in particular includes all free games, in which the questions to the players are chosen independently. Specifically, we prove that if the original game has a non-signaling value smaller than 1, then the non-signaling value of the $n$-fold parallel repetition is exponentially small in $n$. Our parallel repetition theorem for multi-player games is weaker than the known parallel repetition results for two-player games in that the rate at which the non-signaling value of the game decreases not only depends on the non-signaling value of the original game (and the number of possible responses), but on the complete description of the game. Nevertheless, we feel that our result is a first step towards a better understanding of the parallel repetition of nonlocal games with more than two players. ",christian schaffner,,2013.0,10.4230/LIPIcs.TQC.2014.24,"9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014), pages 24-35",Buhrman2013,True,,arXiv,Not available,On the Parallel Repetition of Multi-Player Games: The No-Signaling Case,c3b12801bbe85d0bd341053bdf083e5d,http://arxiv.org/abs/1312.7455v2 13771," We prove two determinacy and decidability results about two-players stochastic reachability games with partial observation on both sides and finitely many states, signals and actions. ",nathalie bertrand,,2008.0,,arXiv,Bertrand2008,True,,arXiv,Not available,"Determinacy and Decidability of Reachability Games with Partial Observation on Both Sides",79a6139ade5e233f15f10bd82c77f155,http://arxiv.org/abs/0811.3975v1 13772," We prove two determinacy and decidability results about two-players stochastic reachability games with partial observation on both sides and finitely many states, signals and actions. ",blaise genest,,2008.0,,arXiv,Bertrand2008,True,,arXiv,Not available,"Determinacy and Decidability of Reachability Games with Partial Observation on Both Sides",79a6139ade5e233f15f10bd82c77f155,http://arxiv.org/abs/0811.3975v1 13773," Quantum game theory is a new interdisciplinary field between game theory and physical research. In this paper, we extend the classical inspection game into a quantum game version by quantizing the strategy space and importing entanglement between players. Our result shows that the quantum inspection game has various Nash equilibrium depending on the initial quantum state of the game. It is also shown that quantization can respectively help each player to increase his own payoff, yet fails to bring Pareto improvement for the collective payoff in the quantum inspection game. ",zhen wang,,2015.0,10.1140/epjb/e2016-70052-4,arXiv,Deng2015,True,,arXiv,Not available,A quantum extension to inspection game,e7a0062011061b6ec8f82c9e3c904c04,http://arxiv.org/abs/1507.07951v1 13774," We prove two determinacy and decidability results about two-players stochastic reachability games with partial observation on both sides and finitely many states, signals and actions. ",hugo gimbert,,2008.0,,arXiv,Bertrand2008,True,,arXiv,Not available,"Determinacy and Decidability of Reachability Games with Partial Observation on Both Sides",79a6139ade5e233f15f10bd82c77f155,http://arxiv.org/abs/0811.3975v1 13775," We prove that optimal strategies exist in every perfect-information stochastic game with finitely many states and actions and a tail winning condition. ",hugo gimbert,,2008.0,,arXiv,Gimbert2008,True,,arXiv,Not available,"Optimal Strategies in Perfect-Information Stochastic Games with Tail Winning Conditions",e764ffffa63a4d470703e3ed74761e82,http://arxiv.org/abs/0811.3978v2 13776," We prove that optimal strategies exist in every perfect-information stochastic game with finitely many states and actions and a tail winning condition. ",florian horn,,2008.0,,arXiv,Gimbert2008,True,,arXiv,Not available,"Optimal Strategies in Perfect-Information Stochastic Games with Tail Winning Conditions",e764ffffa63a4d470703e3ed74761e82,http://arxiv.org/abs/0811.3978v2 13777," We study the combinatorial two-player game Tron. We answer the extremal question on general graphs and also consider smaller graph classes. Bodlaender and Kloks conjectured in [2] PSPACE- completeness. We proof this conjecture. ",tillmann miltzow,,2011.0,,arXiv,Miltzow2011,True,,arXiv,Not available,"Tron, a combinatorial Game on abstract Graphs",963b0412179f8f421a52022d0b2d305b,http://arxiv.org/abs/1110.3211v1 13778," We show that the problem of finding an {\epsilon}-approximate Nash equilibrium in an anonymous game with seven pure strategies is complete in PPAD, when the approximation parameter {\epsilon} is exponentially small in the number of players. ",xi chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,On the Complexity of Nash Equilibria in Anonymous Games,91cc9738d1a423402bd6930539732676,http://arxiv.org/abs/1412.5681v1 13779," We show that the problem of finding an {\epsilon}-approximate Nash equilibrium in an anonymous game with seven pure strategies is complete in PPAD, when the approximation parameter {\epsilon} is exponentially small in the number of players. ",david durfee,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,On the Complexity of Nash Equilibria in Anonymous Games,91cc9738d1a423402bd6930539732676,http://arxiv.org/abs/1412.5681v1 13780," We show that the problem of finding an {\epsilon}-approximate Nash equilibrium in an anonymous game with seven pure strategies is complete in PPAD, when the approximation parameter {\epsilon} is exponentially small in the number of players. ",anthi orfanou,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,On the Complexity of Nash Equilibria in Anonymous Games,91cc9738d1a423402bd6930539732676,http://arxiv.org/abs/1412.5681v1 13781," We present a three player Bayesian game for which there is no epsilon equilibria in Borel measurable strategies for small enough epsilon, however there are non-measurable equilibria. ",robert simon,,2017.0,,arXiv,Simon2017,True,,arXiv,Not available,A Bayesian Game without epsilon equilibria,4d060cfbddd16295e120f7fb041b241a,http://arxiv.org/abs/1702.02090v1 13782," We present a three player Bayesian game for which there is no epsilon equilibria in Borel measurable strategies for small enough epsilon, however there are non-measurable equilibria. ",grzegorz tomkowicz,,2017.0,,arXiv,Simon2017,True,,arXiv,Not available,A Bayesian Game without epsilon equilibria,4d060cfbddd16295e120f7fb041b241a,http://arxiv.org/abs/1702.02090v1 13783," In this note, we show that for every simple game with n players the critical threshold value is at most n/4. This verifies the conjecture of Freixas and Kurz. ",kanstantsin pashkovich,,2018.0,,arXiv,Pashkovich2018,True,,arXiv,Not available,On Critical Threshold Value for Simple Games,c88558468543256d43e3045e62def024,http://arxiv.org/abs/1806.03170v2 13784," We consider the task of computing an approximation of a trembling hand perfect equilibrium for an n-player game in strategic form, n >= 3. We show that this task is complete for the complexity class FIXP_a. In particular, the task is polynomial time equivalent to the task of computing an approximation of a Nash equilibrium in strategic form games with three (or more) players. ",peter miltersen,,2014.0,,arXiv,Etessami2014,True,,arXiv,Not available,"The complexity of approximating a trembling hand perfect equilibrium of a multi-player game in strategic form",e405ed5721dac4b4c7328a4e711f0ec1,http://arxiv.org/abs/1408.1017v1 13785," We consider mechanism design and redesign for markets like Internet advertising where many frequent, small transactions are organized by a principal. Mechanisms for these markets rarely have truthtelling equilibria. We identify a family of winner-pays-bid mechanisms for such markets that exhibit three properties. First, equilibria in these mechanisms are simple. Second, the mechanisms' parameters are easily reoptimized from the bid data that the mechanism generates. Third, the performance of mechanisms in the family is near the optimal performance possible by any mechanism (not necessarily within the family). Our mechanisms are based on batching across multiple iterations of an auction environment, and our approximation bound is asymptotically optimal, with loss inversely proportional to the cube root of the number of iterations batched. Our analysis methods are of broader interest in mechanism design and, for example, we also use them to give new sample complexity bounds for mechanism design in general single-dimensional agent environments. ",jason hartline,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Non-Revelation Mechanism Design,0f62146f8e32f910489f506979116709,http://arxiv.org/abs/1608.01875v2 13786," This paper extends the theory of subset team games, a generalization of cooperative game theory requiring a payoff function that is defined for all subsets of players. This subset utility is used to define both altruistic and selfish contributions of a player to the team. We investigate properties of these games, and analyze the implications of altruism and selfishness for general situations, for prisoner's dilemma, and for a specific game with a Cobb-Douglas utility. ",elisha peterson,,2009.0,,arXiv,Peterson2009,True,,arXiv,Not available,Cooperation in Subset Team Games: Altruism and Selfishness,bf308965f8586ed86cb28b1e45ee4994,http://arxiv.org/abs/0907.2376v1 13787," We show that standard Bayesian games cannot represent the full spectrum of belief-dependent preferences. However, by introducing a fundamental distinction between intended and actual strategies, we remove this limitation. We define Bayesian games with intentions, generalizing both Bayesian games and psychological games, and prove that Nash equilibria in psychological games correspond to a special class of equilibria as defined in our setting. ",adam bjorndahl,,2016.0,10.4204/EPTCS.215.8,"EPTCS 215, 2016, pp. 99-113",Bjorndahl2016,True,,arXiv,Not available,Bayesian Games with Intentions,37813fedd445872312e8473ab114a817,http://arxiv.org/abs/1606.07519v1 13788," We show that standard Bayesian games cannot represent the full spectrum of belief-dependent preferences. However, by introducing a fundamental distinction between intended and actual strategies, we remove this limitation. We define Bayesian games with intentions, generalizing both Bayesian games and psychological games, and prove that Nash equilibria in psychological games correspond to a special class of equilibria as defined in our setting. ",joseph halpern,,2016.0,10.4204/EPTCS.215.8,"EPTCS 215, 2016, pp. 99-113",Bjorndahl2016,True,,arXiv,Not available,Bayesian Games with Intentions,37813fedd445872312e8473ab114a817,http://arxiv.org/abs/1606.07519v1 13789," We show that standard Bayesian games cannot represent the full spectrum of belief-dependent preferences. However, by introducing a fundamental distinction between intended and actual strategies, we remove this limitation. We define Bayesian games with intentions, generalizing both Bayesian games and psychological games, and prove that Nash equilibria in psychological games correspond to a special class of equilibria as defined in our setting. ",rafael pass,,2016.0,10.4204/EPTCS.215.8,"EPTCS 215, 2016, pp. 99-113",Bjorndahl2016,True,,arXiv,Not available,Bayesian Games with Intentions,37813fedd445872312e8473ab114a817,http://arxiv.org/abs/1606.07519v1 13790," The current state of the art in playing many important perfect information games, including Chess and Go, combines planning and deep reinforcement learning with self-play. We extend this approach to imperfect information games and present ExIt-OOS, a novel approach to playing imperfect information games within the Expert Iteration framework and inspired by AlphaZero. We use Online Outcome Sampling, an online search algorithm for imperfect information games in place of MCTS. While training online, our neural strategy is used to improve the accuracy of playouts in OOS, allowing a learning and planning feedback loop for imperfect information games. ",andy kitchen,,2018.0,,arXiv,Kitchen2018,True,,arXiv,Not available,ExIt-OOS: Towards Learning from Planning in Imperfect Information Games,59cadb1a2b65a5f848e5b5d36fcf6fd2,http://arxiv.org/abs/1808.10120v2 13791," The current state of the art in playing many important perfect information games, including Chess and Go, combines planning and deep reinforcement learning with self-play. We extend this approach to imperfect information games and present ExIt-OOS, a novel approach to playing imperfect information games within the Expert Iteration framework and inspired by AlphaZero. We use Online Outcome Sampling, an online search algorithm for imperfect information games in place of MCTS. While training online, our neural strategy is used to improve the accuracy of playouts in OOS, allowing a learning and planning feedback loop for imperfect information games. ",michela benedetti,,2018.0,,arXiv,Kitchen2018,True,,arXiv,Not available,ExIt-OOS: Towards Learning from Planning in Imperfect Information Games,59cadb1a2b65a5f848e5b5d36fcf6fd2,http://arxiv.org/abs/1808.10120v2 13792," We propose a generic game-based approach for test case generation. We set up a game between the tester and the System Under Test, in such a way that test cases correspond to game strategies, and the conformance relation ioco corresponds to alternating refinement. We show that different test assumptions from the literature can be easily incorporated, by slightly varying the moves in the games and their outcomes. In this way, our framework allows a wide plethora of game-theoretic techniques to be deployed for model based testing. ",petra bos,,2018.0,10.4204/EPTCS.277.9,"EPTCS 277, 2018, pp. 118-132",Bos2018,True,,arXiv,Not available,Tester versus Bug: A Generic Framework for Model-Based Testing via Games,9889f59b5fb6e69c3162f88bf5c49ab8,http://arxiv.org/abs/1809.03098v1 13793," We propose a generic game-based approach for test case generation. We set up a game between the tester and the System Under Test, in such a way that test cases correspond to game strategies, and the conformance relation ioco corresponds to alternating refinement. We show that different test assumptions from the literature can be easily incorporated, by slightly varying the moves in the games and their outcomes. In this way, our framework allows a wide plethora of game-theoretic techniques to be deployed for model based testing. ",marielle stoelinga,,2018.0,10.4204/EPTCS.277.9,"EPTCS 277, 2018, pp. 118-132",Bos2018,True,,arXiv,Not available,Tester versus Bug: A Generic Framework for Model-Based Testing via Games,9889f59b5fb6e69c3162f88bf5c49ab8,http://arxiv.org/abs/1809.03098v1 13794," This is an Open Access textbook on non-cooperative Game Theory with 165 solved exercises. ",giacomo bonanno,,2015.0,10.13140/RG.2.1.3369.7360,arXiv,Bonanno2015,True,,arXiv,Not available,Game Theory (Open Access textbook with 165 solved exercises),565dddbdd057c04ab18f83d8f5116b02,http://arxiv.org/abs/1512.06808v1 13795," In this paper I quantize the stag hunt game in the framework proposed by Marinatto and Weber which, is introduced to quantize the Battle of the Sexes game and gives a general quntization scheme of various game theories. Then I discuss the Nash equibilium solution in the cases of which starting strategies are taken in both non entangled state and entangled state and uncover the structure of Nash Equilibrium solutions and compare the case of the Battle of the Sexes game. Since the game has 4 parameters in the payoff matrix has rather rich structure than the Battle of the Sexes game with 3-parameters in the payoff matrix, the relations of the magnitude of these payoff values in Nash Equilibriums are much involuved. This structure is uncovered completly and it is found that the best strategy which give the maximal sum of the payoffs of both players strongly depends on the initial quntum state. As the bonus of the formulation the stag hunt game with four parameters we can discuss various types of symmetric games played by two players by using the latter formulation, i.e. Chicken game. As result some common properties are found between them and the stag hunt game. Lastly a little remark is made on Prisoner's Dillemma. ",norihito toyota,,2003.0,,arXiv,Toyota2003,True,,arXiv,Not available,Quantization of the stag hunt game and the Nash equilibrilum,8536fc145983afa1f9976e4efa298430,http://arxiv.org/abs/quant-ph/0307029v1 13796," We introduce two-level discounted games played by two players on a perfect-information stochastic game graph. The upper level game is a discounted game and the lower level game is an undiscounted reachability game. Two-level games model hierarchical and sequential decision making under uncertainty across different time scales. We show the existence of pure memoryless optimal strategies for both players and an ordered field property for such games. We show that if there is only one player (Markov decision processes), then the values can be computed in polynomial time. It follows that whether the value of a player is equal to a given rational constant in two-level discounted games can be decided in NP intersected coNP. We also give an alternate strategy improvement algorithm to compute the value. ",krishnendu chatterjee,,2010.0,10.4204/EPTCS.25.6,"EPTCS 25, 2010, pp. 22-29",Chatterjee2010,True,,arXiv,Not available,Discounting in Games across Time Scales,a6dcbfd9c67d5ccd9cbee1f10bbba1bb,http://arxiv.org/abs/1006.1403v1 13797," We introduce several methods of decomposition for two player normal form games. Viewing the set of all games as a vector space, we exhibit explicit orthonormal bases for the subspaces of potential games, zero-sum games, and their orthogonal complements which we call anti-potential games and anti-zero-sum games, respectively. Perhaps surprisingly, every anti-potential game comes either from the Rock-Paper-Scissors type games (in the case of symmetric games) or from the Matching Pennies type games (in the case of asymmetric games). Using these decompositions, we prove old (and some new) cycle criteria for potential and zero-sum games (as orthogonality relations between subspaces). We illustrate the usefulness of our decomposition by (a) analyzing the generalized Rock-Paper-Scissors game, (b) completely characterizing the set of all null-stable games, (c) providing a large class of strict stable games, (d) relating the game decomposition to the decomposition of vector fields for the replicator equations, (e) constructing Lyapunov functions for some replicator dynamics, and (f) constructing Zeeman games -games with an interior asymptotically stable Nash equilibrium and a pure strategy ESS. ",sung-ha hwang,,2011.0,,arXiv,Hwang2011,True,,arXiv,Not available,"Decompositions of two player games: potential, zero-sum, and stable games",99fcb9950abf8f9f1d8f2f7206c037bd,http://arxiv.org/abs/1106.3552v2 13798," We introduce two-level discounted games played by two players on a perfect-information stochastic game graph. The upper level game is a discounted game and the lower level game is an undiscounted reachability game. Two-level games model hierarchical and sequential decision making under uncertainty across different time scales. We show the existence of pure memoryless optimal strategies for both players and an ordered field property for such games. We show that if there is only one player (Markov decision processes), then the values can be computed in polynomial time. It follows that whether the value of a player is equal to a given rational constant in two-level discounted games can be decided in NP intersected coNP. We also give an alternate strategy improvement algorithm to compute the value. ",rupak majumdar,,2010.0,10.4204/EPTCS.25.6,"EPTCS 25, 2010, pp. 22-29",Chatterjee2010,True,,arXiv,Not available,Discounting in Games across Time Scales,a6dcbfd9c67d5ccd9cbee1f10bbba1bb,http://arxiv.org/abs/1006.1403v1 13799," Games on graphs provide a natural model for reactive non-terminating systems. In such games, the interaction of two players on an arena results in an infinite path that describes a run of the system. Different settings are used to model various open systems in computer science, as for instance turn-based or concurrent moves, and deterministic or stochastic transitions. In this paper, we are interested in turn-based games, and specifically in deterministic parity games and stochastic reachability games (also known as simple stochastic games). We present a simple, direct and efficient reduction from deterministic parity games to simple stochastic games: it yields an arena whose size is linear up to a logarithmic factor in size of the original arena. ",krishnendu chatterjee,,2011.0,10.4204/EPTCS.54.6,"EPTCS 54, 2011, pp. 74-86",Chatterjee2011,True,,arXiv,Not available,A reduction from parity games to simple stochastic games,fd826abdd23debc7aedf32e31e7492ea,http://arxiv.org/abs/1106.1232v1 13800," Games on graphs provide a natural model for reactive non-terminating systems. In such games, the interaction of two players on an arena results in an infinite path that describes a run of the system. Different settings are used to model various open systems in computer science, as for instance turn-based or concurrent moves, and deterministic or stochastic transitions. In this paper, we are interested in turn-based games, and specifically in deterministic parity games and stochastic reachability games (also known as simple stochastic games). We present a simple, direct and efficient reduction from deterministic parity games to simple stochastic games: it yields an arena whose size is linear up to a logarithmic factor in size of the original arena. ",nathanael fijalkow,,2011.0,10.4204/EPTCS.54.6,"EPTCS 54, 2011, pp. 74-86",Chatterjee2011,True,,arXiv,Not available,A reduction from parity games to simple stochastic games,fd826abdd23debc7aedf32e31e7492ea,http://arxiv.org/abs/1106.1232v1 13801," Definable zero-sum stochastic games involve a finite number of states and action sets, reward and transition functions that are definable in an o-minimal structure. Prominent examples of such games are finite, semi-algebraic or globally subanalytic stochastic games. We prove that the Shapley operator of any definable stochastic game with separable transition and reward functions is definable in the same structure. Definability in the same structure does not hold systematically: we provide a counterexample of a stochastic game with semi-algebraic data yielding a non semi-algebraic but globally subanalytic Shapley operator. Our definability results on Shapley operators are used to prove that any separable definable game has a uniform value; in the case of polynomially bounded structures we also provide convergence rates. Using an approximation procedure, we actually establish that general zero-sum games with separable definable transition functions have a uniform value. These results highlight the key role played by the tame structure of transition functions. As particular cases of our main results, we obtain that stochastic games with polynomial transitions, definable games with finite actions on one side, definable games with perfect information or switching controls have a uniform value. Applications to nonlinear maps arising in risk sensitive control and Perron-Frobenius theory are also given ",jerome bolte,,2013.0,10.1287/moor.2014.0666,arXiv,Bolte2013,True,,arXiv,Not available,Definable zero-sum stochastic games,29922968473a24b356de7f6c8a4205f1,http://arxiv.org/abs/1301.1967v2 13802," Definable zero-sum stochastic games involve a finite number of states and action sets, reward and transition functions that are definable in an o-minimal structure. Prominent examples of such games are finite, semi-algebraic or globally subanalytic stochastic games. We prove that the Shapley operator of any definable stochastic game with separable transition and reward functions is definable in the same structure. Definability in the same structure does not hold systematically: we provide a counterexample of a stochastic game with semi-algebraic data yielding a non semi-algebraic but globally subanalytic Shapley operator. Our definability results on Shapley operators are used to prove that any separable definable game has a uniform value; in the case of polynomially bounded structures we also provide convergence rates. Using an approximation procedure, we actually establish that general zero-sum games with separable definable transition functions have a uniform value. These results highlight the key role played by the tame structure of transition functions. As particular cases of our main results, we obtain that stochastic games with polynomial transitions, definable games with finite actions on one side, definable games with perfect information or switching controls have a uniform value. Applications to nonlinear maps arising in risk sensitive control and Perron-Frobenius theory are also given ",stephane gaubert,,2013.0,10.1287/moor.2014.0666,arXiv,Bolte2013,True,,arXiv,Not available,Definable zero-sum stochastic games,29922968473a24b356de7f6c8a4205f1,http://arxiv.org/abs/1301.1967v2 13803," Definable zero-sum stochastic games involve a finite number of states and action sets, reward and transition functions that are definable in an o-minimal structure. Prominent examples of such games are finite, semi-algebraic or globally subanalytic stochastic games. We prove that the Shapley operator of any definable stochastic game with separable transition and reward functions is definable in the same structure. Definability in the same structure does not hold systematically: we provide a counterexample of a stochastic game with semi-algebraic data yielding a non semi-algebraic but globally subanalytic Shapley operator. Our definability results on Shapley operators are used to prove that any separable definable game has a uniform value; in the case of polynomially bounded structures we also provide convergence rates. Using an approximation procedure, we actually establish that general zero-sum games with separable definable transition functions have a uniform value. These results highlight the key role played by the tame structure of transition functions. As particular cases of our main results, we obtain that stochastic games with polynomial transitions, definable games with finite actions on one side, definable games with perfect information or switching controls have a uniform value. Applications to nonlinear maps arising in risk sensitive control and Perron-Frobenius theory are also given ",guillaume vigeral,,2013.0,10.1287/moor.2014.0666,arXiv,Bolte2013,True,,arXiv,Not available,Definable zero-sum stochastic games,29922968473a24b356de7f6c8a4205f1,http://arxiv.org/abs/1301.1967v2 13804," It is known that there are uncoupled learning heuristics leading to Nash equilibrium in all finite games. Why should players use such learning heuristics and where could they come from? We show that there is no uncoupled learning heuristic leading to Nash equilibrium in all finite games that a player has an incentive to adopt, that would be evolutionary stable or that could ""learn itself"". Rather, a player has an incentive to strategically teach such a learning opponent in order secure at least the Stackelberg leader payoff. The impossibility result remains intact when restricted to the classes of generic games, two-player games, potential games, games with strategic complements or 2x2 games, in which learning is known to be ""nice"". More generally, it also applies to uncoupled learning heuristics leading to correlated equilibria, rationalizable outcomes, iterated admissible outcomes, or minimal curb sets. A possibility result restricted to ""strategically trivial"" games fails if some generic games outside this class are considered as well. ",burkhard schipper,,2015.0,,arXiv,Schipper2015,True,,arXiv,Not available,Strategic Teaching and Learning in Games,43393267f50f53d45e39c4d88fe6e1f8,http://arxiv.org/abs/1504.06341v1 13805," Dull, weak and nested solitaire games are important classes of parity games, capturing, among others, alternation-free mu-calculus and ECTL* model checking problems. These classes can be solved in polynomial time using dedicated algorithms. We investigate the complexity of Zielonka's Recursive algorithm for solving these special games, showing that the algorithm runs in O(d (n + m)) on weak games, and, somewhat surprisingly, that it requires exponential time to solve dull games and (nested) solitaire games. For the latter classes, we provide a family of games G, allowing us to establish a lower bound of 2^(n/3). We show that an optimisation of Zielonka's algorithm permits solving games from all three classes in polynomial time. Moreover, we show that there is a family of (non-special) games M that permits us to establish a lower bound of 2^(n/3), improving on the previous lower bound for the algorithm. ",maciej gazda,,2013.0,10.4204/EPTCS.119.4,"EPTCS 119, 2013, pp. 7-20",Gazda2013,True,,arXiv,Not available,"Zielonka's Recursive Algorithm: dull, weak and solitaire games and tighter bounds",c542899a9ef9d64d2b050e7c14039ef4,http://arxiv.org/abs/1307.4465v1 13806," Dull, weak and nested solitaire games are important classes of parity games, capturing, among others, alternation-free mu-calculus and ECTL* model checking problems. These classes can be solved in polynomial time using dedicated algorithms. We investigate the complexity of Zielonka's Recursive algorithm for solving these special games, showing that the algorithm runs in O(d (n + m)) on weak games, and, somewhat surprisingly, that it requires exponential time to solve dull games and (nested) solitaire games. For the latter classes, we provide a family of games G, allowing us to establish a lower bound of 2^(n/3). We show that an optimisation of Zielonka's algorithm permits solving games from all three classes in polynomial time. Moreover, we show that there is a family of (non-special) games M that permits us to establish a lower bound of 2^(n/3), improving on the previous lower bound for the algorithm. ",tim willemse,,2013.0,10.4204/EPTCS.119.4,"EPTCS 119, 2013, pp. 7-20",Gazda2013,True,,arXiv,Not available,"Zielonka's Recursive Algorithm: dull, weak and solitaire games and tighter bounds",c542899a9ef9d64d2b050e7c14039ef4,http://arxiv.org/abs/1307.4465v1 13807," Crowd sensing is a new paradigm which leverages a large number of sensor-equipped mobile phones to collect sensing data. To attract more participants to provide good quality, bidding mechanisms that solicit the Vickrey-Clarke-Groves (VCG) mechanism and its variants are natural fits for crowd sensing applications in mobile social networks. However, in practical continuous crowd sensing applications, where bids cannot be solicited and only posted pricing mechanisms can be implemented. Obviously, these mechanisms for continuous crowd sensing are not applicable. To tackle the issue, we propose a collection-behavior based multi-parameter posted pricing mechanism, not only to consider extensive user participating and sensing data submission quality under given budget constraints by applying all-pay auctions and posted pricing mechanisms, but also to maximize the coverage utilities by applying crowd aversion. Simulation results indicate that incentive mechanisms in our proposed framework outperform the best existing solution. ",jiajun sun,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,"Collection-behavior based Multi-parameter Posted Pricing Mechanism for Crowd Sensing",62420c1df16fe9ce42544e47d0a691ee,http://arxiv.org/abs/1310.5695v4 13808," We introduce several methods of decomposition for two player normal form games. Viewing the set of all games as a vector space, we exhibit explicit orthonormal bases for the subspaces of potential games, zero-sum games, and their orthogonal complements which we call anti-potential games and anti-zero-sum games, respectively. Perhaps surprisingly, every anti-potential game comes either from the Rock-Paper-Scissors type games (in the case of symmetric games) or from the Matching Pennies type games (in the case of asymmetric games). Using these decompositions, we prove old (and some new) cycle criteria for potential and zero-sum games (as orthogonality relations between subspaces). We illustrate the usefulness of our decomposition by (a) analyzing the generalized Rock-Paper-Scissors game, (b) completely characterizing the set of all null-stable games, (c) providing a large class of strict stable games, (d) relating the game decomposition to the decomposition of vector fields for the replicator equations, (e) constructing Lyapunov functions for some replicator dynamics, and (f) constructing Zeeman games -games with an interior asymptotically stable Nash equilibrium and a pure strategy ESS. ",luc rey-bellet,,2011.0,,arXiv,Hwang2011,True,,arXiv,Not available,"Decompositions of two player games: potential, zero-sum, and stable games",99fcb9950abf8f9f1d8f2f7206c037bd,http://arxiv.org/abs/1106.3552v2 13809," We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market size is $n$, then $r$ rounds of interaction (with logarithmic bandwidth) suffice to obtain an $n^{1/(r+1)}$-approximation to the optimal social welfare. In particular, this implies that such markets converge to a stable state (constant approximation) in time logarithmic in the market size. We obtain the first multi-round lower bound for this setup. We show that even if the allowable per-round bandwidth of each agent is $n^{\epsilon(r)}$, the approximation ratio of any $r$-round (randomized) protocol is no better than $\Omega(n^{1/5^{r+1}})$, implying an $\Omega(\log \log n)$ lower bound on the rate of convergence of the market to equilibrium. Our construction and technique may be of interest to round-communication tradeoffs in the more general setting of combinatorial auctions, for which the only known lower bound is for simultaneous ($r=1$) protocols [DNO14]. ",noga alon,,2015.0,,arXiv,Alon2015,True,,arXiv,Not available,Welfare Maximization with Limited Interaction,6271a2e8ef113bebb26dc9df65675bd7,http://arxiv.org/abs/1504.01780v1 13810," We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market size is $n$, then $r$ rounds of interaction (with logarithmic bandwidth) suffice to obtain an $n^{1/(r+1)}$-approximation to the optimal social welfare. In particular, this implies that such markets converge to a stable state (constant approximation) in time logarithmic in the market size. We obtain the first multi-round lower bound for this setup. We show that even if the allowable per-round bandwidth of each agent is $n^{\epsilon(r)}$, the approximation ratio of any $r$-round (randomized) protocol is no better than $\Omega(n^{1/5^{r+1}})$, implying an $\Omega(\log \log n)$ lower bound on the rate of convergence of the market to equilibrium. Our construction and technique may be of interest to round-communication tradeoffs in the more general setting of combinatorial auctions, for which the only known lower bound is for simultaneous ($r=1$) protocols [DNO14]. ",noam nisan,,2015.0,,arXiv,Alon2015,True,,arXiv,Not available,Welfare Maximization with Limited Interaction,6271a2e8ef113bebb26dc9df65675bd7,http://arxiv.org/abs/1504.01780v1 13811," We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market size is $n$, then $r$ rounds of interaction (with logarithmic bandwidth) suffice to obtain an $n^{1/(r+1)}$-approximation to the optimal social welfare. In particular, this implies that such markets converge to a stable state (constant approximation) in time logarithmic in the market size. We obtain the first multi-round lower bound for this setup. We show that even if the allowable per-round bandwidth of each agent is $n^{\epsilon(r)}$, the approximation ratio of any $r$-round (randomized) protocol is no better than $\Omega(n^{1/5^{r+1}})$, implying an $\Omega(\log \log n)$ lower bound on the rate of convergence of the market to equilibrium. Our construction and technique may be of interest to round-communication tradeoffs in the more general setting of combinatorial auctions, for which the only known lower bound is for simultaneous ($r=1$) protocols [DNO14]. ",ran raz,,2015.0,,arXiv,Alon2015,True,,arXiv,Not available,Welfare Maximization with Limited Interaction,6271a2e8ef113bebb26dc9df65675bd7,http://arxiv.org/abs/1504.01780v1 13812," We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market size is $n$, then $r$ rounds of interaction (with logarithmic bandwidth) suffice to obtain an $n^{1/(r+1)}$-approximation to the optimal social welfare. In particular, this implies that such markets converge to a stable state (constant approximation) in time logarithmic in the market size. We obtain the first multi-round lower bound for this setup. We show that even if the allowable per-round bandwidth of each agent is $n^{\epsilon(r)}$, the approximation ratio of any $r$-round (randomized) protocol is no better than $\Omega(n^{1/5^{r+1}})$, implying an $\Omega(\log \log n)$ lower bound on the rate of convergence of the market to equilibrium. Our construction and technique may be of interest to round-communication tradeoffs in the more general setting of combinatorial auctions, for which the only known lower bound is for simultaneous ($r=1$) protocols [DNO14]. ",omri weinstein,,2015.0,,arXiv,Alon2015,True,,arXiv,Not available,Welfare Maximization with Limited Interaction,6271a2e8ef113bebb26dc9df65675bd7,http://arxiv.org/abs/1504.01780v1 13813," In targeted online advertising, advertisers look for maximizing campaign performance under delivery constraint within budget schedule. Most of the advertisers typically prefer to impose the delivery constraint to spend budget smoothly over the time in order to reach a wider range of audiences and have a sustainable impact. Since lots of impressions are traded through public auctions for online advertising today, the liquidity makes price elasticity and bid landscape between demand and supply change quite dynamically. Therefore, it is challenging to perform smooth pacing control and maximize campaign performance simultaneously. In this paper, we propose a smart pacing approach in which the delivery pace of each campaign is learned from both offline and online data to achieve smooth delivery and optimal performance goals. The implementation of the proposed approach in a real DSP system is also presented. Experimental evaluations on both real online ad campaigns and offline simulations show that our approach can effectively improve campaign performance and achieve delivery goals. ",jian xu,,2015.0,10.1145/2783258.2788615,arXiv,Xu2015,True,,arXiv,Not available,Smart Pacing for Effective Online Ad Campaign Optimization,9cb0c04aa041de1e154565c98fc86c78,http://arxiv.org/abs/1506.05851v1 13814," In targeted online advertising, advertisers look for maximizing campaign performance under delivery constraint within budget schedule. Most of the advertisers typically prefer to impose the delivery constraint to spend budget smoothly over the time in order to reach a wider range of audiences and have a sustainable impact. Since lots of impressions are traded through public auctions for online advertising today, the liquidity makes price elasticity and bid landscape between demand and supply change quite dynamically. Therefore, it is challenging to perform smooth pacing control and maximize campaign performance simultaneously. In this paper, we propose a smart pacing approach in which the delivery pace of each campaign is learned from both offline and online data to achieve smooth delivery and optimal performance goals. The implementation of the proposed approach in a real DSP system is also presented. Experimental evaluations on both real online ad campaigns and offline simulations show that our approach can effectively improve campaign performance and achieve delivery goals. ",kuang-chih lee,,2015.0,10.1145/2783258.2788615,arXiv,Xu2015,True,,arXiv,Not available,Smart Pacing for Effective Online Ad Campaign Optimization,9cb0c04aa041de1e154565c98fc86c78,http://arxiv.org/abs/1506.05851v1 13815," In targeted online advertising, advertisers look for maximizing campaign performance under delivery constraint within budget schedule. Most of the advertisers typically prefer to impose the delivery constraint to spend budget smoothly over the time in order to reach a wider range of audiences and have a sustainable impact. Since lots of impressions are traded through public auctions for online advertising today, the liquidity makes price elasticity and bid landscape between demand and supply change quite dynamically. Therefore, it is challenging to perform smooth pacing control and maximize campaign performance simultaneously. In this paper, we propose a smart pacing approach in which the delivery pace of each campaign is learned from both offline and online data to achieve smooth delivery and optimal performance goals. The implementation of the proposed approach in a real DSP system is also presented. Experimental evaluations on both real online ad campaigns and offline simulations show that our approach can effectively improve campaign performance and achieve delivery goals. ",wentong li,,2015.0,10.1145/2783258.2788615,arXiv,Xu2015,True,,arXiv,Not available,Smart Pacing for Effective Online Ad Campaign Optimization,9cb0c04aa041de1e154565c98fc86c78,http://arxiv.org/abs/1506.05851v1 13816," In targeted online advertising, advertisers look for maximizing campaign performance under delivery constraint within budget schedule. Most of the advertisers typically prefer to impose the delivery constraint to spend budget smoothly over the time in order to reach a wider range of audiences and have a sustainable impact. Since lots of impressions are traded through public auctions for online advertising today, the liquidity makes price elasticity and bid landscape between demand and supply change quite dynamically. Therefore, it is challenging to perform smooth pacing control and maximize campaign performance simultaneously. In this paper, we propose a smart pacing approach in which the delivery pace of each campaign is learned from both offline and online data to achieve smooth delivery and optimal performance goals. The implementation of the proposed approach in a real DSP system is also presented. Experimental evaluations on both real online ad campaigns and offline simulations show that our approach can effectively improve campaign performance and achieve delivery goals. ",hang qi,,2015.0,10.1145/2783258.2788615,arXiv,Xu2015,True,,arXiv,Not available,Smart Pacing for Effective Online Ad Campaign Optimization,9cb0c04aa041de1e154565c98fc86c78,http://arxiv.org/abs/1506.05851v1 13817," In targeted online advertising, advertisers look for maximizing campaign performance under delivery constraint within budget schedule. Most of the advertisers typically prefer to impose the delivery constraint to spend budget smoothly over the time in order to reach a wider range of audiences and have a sustainable impact. Since lots of impressions are traded through public auctions for online advertising today, the liquidity makes price elasticity and bid landscape between demand and supply change quite dynamically. Therefore, it is challenging to perform smooth pacing control and maximize campaign performance simultaneously. In this paper, we propose a smart pacing approach in which the delivery pace of each campaign is learned from both offline and online data to achieve smooth delivery and optimal performance goals. The implementation of the proposed approach in a real DSP system is also presented. Experimental evaluations on both real online ad campaigns and offline simulations show that our approach can effectively improve campaign performance and achieve delivery goals. ",quan lu,,2015.0,10.1145/2783258.2788615,arXiv,Xu2015,True,,arXiv,Not available,Smart Pacing for Effective Online Ad Campaign Optimization,9cb0c04aa041de1e154565c98fc86c78,http://arxiv.org/abs/1506.05851v1 13818," Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of the pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori. On the contrary, we focus on a more real scenario where users arrive one by one online in a random order. We model the problem as an online auction in which the users submit their private types to the crowdsourcer over time, and the crowdsourcer aims to select a subset of users before a specified deadline for maximizing the total value of the services provided by selected users under a budget constraint. We design two online mechanisms, OMZ and OMG, satisfying the computational efficiency, individual rationality, budget feasibility, truthfulness, consumer sovereignty and constant competitiveness under the zero arrival-departure interval case and a more general case, respectively. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our online mechanisms. ",dong zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,"OMG: How Much Should I Pay Bob in Truthful Online Mobile Crowdsourced Sensing?",d80ad998e5e139111f855d9e5e6b2868,http://arxiv.org/abs/1306.5677v1 13819," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",neil ghani,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 13820," Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of the pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori. On the contrary, we focus on a more real scenario where users arrive one by one online in a random order. We model the problem as an online auction in which the users submit their private types to the crowdsourcer over time, and the crowdsourcer aims to select a subset of users before a specified deadline for maximizing the total value of the services provided by selected users under a budget constraint. We design two online mechanisms, OMZ and OMG, satisfying the computational efficiency, individual rationality, budget feasibility, truthfulness, consumer sovereignty and constant competitiveness under the zero arrival-departure interval case and a more general case, respectively. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our online mechanisms. ",xiang-yang li,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,"OMG: How Much Should I Pay Bob in Truthful Online Mobile Crowdsourced Sensing?",d80ad998e5e139111f855d9e5e6b2868,http://arxiv.org/abs/1306.5677v1 13821," Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of the pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori. On the contrary, we focus on a more real scenario where users arrive one by one online in a random order. We model the problem as an online auction in which the users submit their private types to the crowdsourcer over time, and the crowdsourcer aims to select a subset of users before a specified deadline for maximizing the total value of the services provided by selected users under a budget constraint. We design two online mechanisms, OMZ and OMG, satisfying the computational efficiency, individual rationality, budget feasibility, truthfulness, consumer sovereignty and constant competitiveness under the zero arrival-departure interval case and a more general case, respectively. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our online mechanisms. ",huadong ma,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,"OMG: How Much Should I Pay Bob in Truthful Online Mobile Crowdsourced Sensing?",d80ad998e5e139111f855d9e5e6b2868,http://arxiv.org/abs/1306.5677v1 13822," With proper management, Autonomous Mobility-on-Demand (AMoD) systems have great potential to satisfy the transport demands of urban populations by providing safe, convenient, and affordable ridesharing services. Meanwhile, such systems can substantially decrease private car ownership and use, and thus significantly reduce traffic congestion, energy consumption, and carbon emissions. To achieve this objective, an AMoD system requires private information about the demand from passengers. However, due to self-interestedness, passengers are unlikely to cooperate with the service providers in this regard. Therefore, an online mechanism is desirable if it incentivizes passengers to truthfully report their actual demand. For the purpose of promoting ridesharing, we hereby introduce a posted-price, integrated online ridesharing mechanism (IORS) that satisfies desirable properties such as ex-post incentive compatibility, individual rationality, and budget-balance. Numerical results indicate the competitiveness of IORS compared with two benchmarks, namely the optimal assignment and an offline, auction-based mechanism. ",wen shen,,2016.0,,"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI 2016) pp. 475-481",Shen2016,True,,arXiv,Not available,"An Online Mechanism for Ridesharing in Autonomous Mobility-on-Demand Systems",d04b7e7d82f0ec69917524d5f4a86748,http://arxiv.org/abs/1603.02208v3 13823," With proper management, Autonomous Mobility-on-Demand (AMoD) systems have great potential to satisfy the transport demands of urban populations by providing safe, convenient, and affordable ridesharing services. Meanwhile, such systems can substantially decrease private car ownership and use, and thus significantly reduce traffic congestion, energy consumption, and carbon emissions. To achieve this objective, an AMoD system requires private information about the demand from passengers. However, due to self-interestedness, passengers are unlikely to cooperate with the service providers in this regard. Therefore, an online mechanism is desirable if it incentivizes passengers to truthfully report their actual demand. For the purpose of promoting ridesharing, we hereby introduce a posted-price, integrated online ridesharing mechanism (IORS) that satisfies desirable properties such as ex-post incentive compatibility, individual rationality, and budget-balance. Numerical results indicate the competitiveness of IORS compared with two benchmarks, namely the optimal assignment and an offline, auction-based mechanism. ",cristina lopes,,2016.0,,"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI 2016) pp. 475-481",Shen2016,True,,arXiv,Not available,"An Online Mechanism for Ridesharing in Autonomous Mobility-on-Demand Systems",d04b7e7d82f0ec69917524d5f4a86748,http://arxiv.org/abs/1603.02208v3 13824," With proper management, Autonomous Mobility-on-Demand (AMoD) systems have great potential to satisfy the transport demands of urban populations by providing safe, convenient, and affordable ridesharing services. Meanwhile, such systems can substantially decrease private car ownership and use, and thus significantly reduce traffic congestion, energy consumption, and carbon emissions. To achieve this objective, an AMoD system requires private information about the demand from passengers. However, due to self-interestedness, passengers are unlikely to cooperate with the service providers in this regard. Therefore, an online mechanism is desirable if it incentivizes passengers to truthfully report their actual demand. For the purpose of promoting ridesharing, we hereby introduce a posted-price, integrated online ridesharing mechanism (IORS) that satisfies desirable properties such as ex-post incentive compatibility, individual rationality, and budget-balance. Numerical results indicate the competitiveness of IORS compared with two benchmarks, namely the optimal assignment and an offline, auction-based mechanism. ",jacob crandall,,2016.0,,"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI 2016) pp. 475-481",Shen2016,True,,arXiv,Not available,"An Online Mechanism for Ridesharing in Autonomous Mobility-on-Demand Systems",d04b7e7d82f0ec69917524d5f4a86748,http://arxiv.org/abs/1603.02208v3 13825," We provide a characterization of revenue-optimal dynamic mechanisms in settings where a monopolist sells k items over k periods to a buyer who realizes his value for item i in the beginning of period i. We require that the mechanism satisfies a strong individual rationality constraint, requiring that the stage utility of each agent be positive during each period. We show that the optimum mechanism can be computed by solving a nested sequence of static (single-period) mechanisms that optimize a tradeoff between the surplus of the allocation and the buyer's utility. We also provide a simple dynamic mechanism that obtains at least half of the optimal revenue. The mechanism either ignores history and posts the optimal monopoly price in each period, or allocates with a probability that is independent of the current report of the agent and is based only on previous reports. Our characterization extends to multi-agent auctions. We also formulate a discounted infinite horizon version of the problem, where we study the performance of ""Markov mechanisms."" ",itai ashlagi,,2016.0,,arXiv,Ashlagi2016,True,,arXiv,Not available,Sequential Mechanisms with ex-post Participation Guarantees,185738a68eb2aa67a0c00bb27713d348,http://arxiv.org/abs/1603.07229v2 13826," We provide a characterization of revenue-optimal dynamic mechanisms in settings where a monopolist sells k items over k periods to a buyer who realizes his value for item i in the beginning of period i. We require that the mechanism satisfies a strong individual rationality constraint, requiring that the stage utility of each agent be positive during each period. We show that the optimum mechanism can be computed by solving a nested sequence of static (single-period) mechanisms that optimize a tradeoff between the surplus of the allocation and the buyer's utility. We also provide a simple dynamic mechanism that obtains at least half of the optimal revenue. The mechanism either ignores history and posts the optimal monopoly price in each period, or allocates with a probability that is independent of the current report of the agent and is based only on previous reports. Our characterization extends to multi-agent auctions. We also formulate a discounted infinite horizon version of the problem, where we study the performance of ""Markov mechanisms."" ",constantinos daskalakis,,2016.0,,arXiv,Ashlagi2016,True,,arXiv,Not available,Sequential Mechanisms with ex-post Participation Guarantees,185738a68eb2aa67a0c00bb27713d348,http://arxiv.org/abs/1603.07229v2 13827," We provide a characterization of revenue-optimal dynamic mechanisms in settings where a monopolist sells k items over k periods to a buyer who realizes his value for item i in the beginning of period i. We require that the mechanism satisfies a strong individual rationality constraint, requiring that the stage utility of each agent be positive during each period. We show that the optimum mechanism can be computed by solving a nested sequence of static (single-period) mechanisms that optimize a tradeoff between the surplus of the allocation and the buyer's utility. We also provide a simple dynamic mechanism that obtains at least half of the optimal revenue. The mechanism either ignores history and posts the optimal monopoly price in each period, or allocates with a probability that is independent of the current report of the agent and is based only on previous reports. Our characterization extends to multi-agent auctions. We also formulate a discounted infinite horizon version of the problem, where we study the performance of ""Markov mechanisms."" ",nima haghpanah,,2016.0,,arXiv,Ashlagi2016,True,,arXiv,Not available,Sequential Mechanisms with ex-post Participation Guarantees,185738a68eb2aa67a0c00bb27713d348,http://arxiv.org/abs/1603.07229v2 13828," Very recently, Hartline and Lucier studied single-parameter mechanism design problems in the Bayesian setting. They proposed a black-box reduction that converted Bayesian approximation algorithms into Bayesian-Incentive-Compatible (BIC) mechanisms while preserving social welfare. It remains a major open question if one can find similar reduction in the more important multi-parameter setting. In this paper, we give positive answer to this question when the prior distribution has finite and small support. We propose a black-box reduction for designing BIC multi-parameter mechanisms. The reduction converts any algorithm into an eps-BIC mechanism with only marginal loss in social welfare. As a result, for combinatorial auctions with sub-additive agents we get an eps-BIC mechanism that achieves constant approximation. ",xiaohui bei,,2010.0,,arXiv,Bei2010,True,,arXiv,Not available,Bayesian Incentive Compatibility via Fractional Assignments,5b4fe535454b9a8b070756030ecad864,http://arxiv.org/abs/1005.4244v4 13829," Very recently, Hartline and Lucier studied single-parameter mechanism design problems in the Bayesian setting. They proposed a black-box reduction that converted Bayesian approximation algorithms into Bayesian-Incentive-Compatible (BIC) mechanisms while preserving social welfare. It remains a major open question if one can find similar reduction in the more important multi-parameter setting. In this paper, we give positive answer to this question when the prior distribution has finite and small support. We propose a black-box reduction for designing BIC multi-parameter mechanisms. The reduction converts any algorithm into an eps-BIC mechanism with only marginal loss in social welfare. As a result, for combinatorial auctions with sub-additive agents we get an eps-BIC mechanism that achieves constant approximation. ",zhiyi huang,,2010.0,,arXiv,Bei2010,True,,arXiv,Not available,Bayesian Incentive Compatibility via Fractional Assignments,5b4fe535454b9a8b070756030ecad864,http://arxiv.org/abs/1005.4244v4 13830," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",jules hedges,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 13831," We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without compromising users' privacy. Since users' costs and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model this correlation by assuming that a user's unknown sensitive data determines a distribution from a set of publicly known distributions and a user's cost is drawn from that distribution. We propose a stronger model of privacy preserving mechanism where users are compensated whenever they reveal information about their data to the mechanism. In this model, we design a Bayesian incentive compatible and privacy preserving mechanism that guarantees accuracy and protects the privacy of both cost and data. ",lisa fleischer,,2012.0,,arXiv,Fleischer2012,True,,arXiv,Not available,"Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data",c1c09adbb5a4eb5ffbd50c2e61f1b72c,http://arxiv.org/abs/1204.4031v1 13832," We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without compromising users' privacy. Since users' costs and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model this correlation by assuming that a user's unknown sensitive data determines a distribution from a set of publicly known distributions and a user's cost is drawn from that distribution. We propose a stronger model of privacy preserving mechanism where users are compensated whenever they reveal information about their data to the mechanism. In this model, we design a Bayesian incentive compatible and privacy preserving mechanism that guarantees accuracy and protects the privacy of both cost and data. ",yu-han lyu,,2012.0,,arXiv,Fleischer2012,True,,arXiv,Not available,"Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data",c1c09adbb5a4eb5ffbd50c2e61f1b72c,http://arxiv.org/abs/1204.4031v1 13833," We present algorithms for implementing local spectrum redistribution in wireless networks using a mechanism design approach. For example, in single-hop request scheduling, secondary users are modeled as rational agents that have private utility when getting assigned a channel for successful transmission. We present a rather simple algorithmic technique that allows to turn existing and future approximation algorithms and heuristics into truthful mechanisms for a large variety of networking problems. In contrast to previous work, our approach works for virtually all known interference models in the literature, including the physical model of interference based on SINR. It allows to address single-hop and multi-hop scheduling, routing, and even more general assignment and allocation problems. Our mechanisms are randomized and represent the first universally-truthful mechanisms for these problems with rigorous worst-case guarantees on the solution quality. In this way, our mechanisms can be used to obtain guaranteed solution quality even with risk-averse or risk-seeking bidders, for which existing approaches fail. ",martin hoefer,,2013.0,,arXiv,Hoefer2013,True,,arXiv,Not available,Universally Truthful Secondary Spectrum Auctions,fbc40f59b400cd6a68118e9c2a95cd19,http://arxiv.org/abs/1305.2350v1 13834," We present algorithms for implementing local spectrum redistribution in wireless networks using a mechanism design approach. For example, in single-hop request scheduling, secondary users are modeled as rational agents that have private utility when getting assigned a channel for successful transmission. We present a rather simple algorithmic technique that allows to turn existing and future approximation algorithms and heuristics into truthful mechanisms for a large variety of networking problems. In contrast to previous work, our approach works for virtually all known interference models in the literature, including the physical model of interference based on SINR. It allows to address single-hop and multi-hop scheduling, routing, and even more general assignment and allocation problems. Our mechanisms are randomized and represent the first universally-truthful mechanisms for these problems with rigorous worst-case guarantees on the solution quality. In this way, our mechanisms can be used to obtain guaranteed solution quality even with risk-averse or risk-seeking bidders, for which existing approaches fail. ",thomas kesselheim,,2013.0,,arXiv,Hoefer2013,True,,arXiv,Not available,Universally Truthful Secondary Spectrum Auctions,fbc40f59b400cd6a68118e9c2a95cd19,http://arxiv.org/abs/1305.2350v1 13835," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",kareem amin,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13836," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",afshin rostamizadeh,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13837," Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term revenue. We define the natural notion of strategic regret --- the lost revenue as measured against a truthful (non-strategic) buyer. We present seller algorithms that are no-(strategic)-regret when the buyer discounts her future surplus --- i.e. the buyer prefers showing advertisements to users sooner rather than later. We also give a lower bound on strategic regret that increases as the buyer's discounting weakens and shows, in particular, that any seller algorithm will suffer linear strategic regret if there is no discounting. ",umar syed,,2013.0,,arXiv,Amin2013,True,,arXiv,Not available,Learning Prices for Repeated Auctions with Strategic Buyers,cbabe7e45514c5fcdca1ed529f18ec88,http://arxiv.org/abs/1311.6838v1 13838," In settings where full incentive-compatibility is not available, such as core-constraint combinatorial auctions and budget-balanced combinatorial exchanges, we may wish to design mechanisms that are as incentive-compatible as possible. This paper offers a new characterization of approximate incentive-compatibility by casting the pricing problem as a meta-game between the center and the participating agents. Through a suitable set of simplifications, we describe the equilibrium of this game as a variational problem. We use this to characterize the space of optimal prices, enabling closed-form solutions in restricted cases, and numerically-determined prices in the general case. We offer theory motivating this approach, and numerical experiments showing its application. ",benjamin lubin,,2015.0,,arXiv,Lubin2015,True,,arXiv,Not available,Games and Meta-Games: Pricing Rules for Combinatorial Mechanisms,8eda734471a1abf5b64efbf8aa7cad1a,http://arxiv.org/abs/1503.06244v1 13839," Consider concurrent, infinite duration, two-player win/lose games played on graphs. If the winning condition satisfies some simple requirement, the existence of Player 1 winning (finite-memory) strategies is equivalent to the existence of winning (finite-memory) strategies in finitely many derived one-player games. Several classical winning conditions satisfy this simple requirement. Under an additional requirement on the winning condition, the non-existence of Player 1 winning strategies from all vertices is equivalent to the existence of Player 2 stochastic strategies winning almost surely from all vertices. Only few classical winning conditions satisfy this additional requirement, but a fairness variant of o ",stephane roux,,2018.0,,arXiv,Roux2018,True,,arXiv,Not available,Concurrent games and semi-random determinacy,2a2b7ec10d4b5f92a362032350ce6066,http://arxiv.org/abs/1804.10896v1 13840," Following the extension of the classic Rock-Paper-Scissors game of size 3 to Rock-Paper-Scissors-Lizard-Spock of size 5, we consider further extensions to larger odd numbers. Such extensions are modeled by directed graphs called tournaments. The games we will consider are regular tournaments where each strategy beats and is beaten by exactly half of the alternatives. While the theory of tournaments has been well studied, these games, i.e. regular tournaments, have special properties which we consider here. In the process we introduce a number of constructions for such games. ",ethan akin,,2018.0,,arXiv,Akin2018,True,,arXiv,Not available,"Rock, Paper, Scissors, Etc - The Theory of Regular Tournaments",dfcb01fed9d8a6d8b28660b34045f8ce,http://arxiv.org/abs/1806.11241v1 13841," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",viktor winschel,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 13842," The mean field games system is a coupled pair of nonlinear partial differential equations arising in differential game theory, as a limit as the number of agents tends to infinity. We prove existence and uniqueness theorems for time-dependent mean field games with Sobolev data. Many works in the literature assume additive separability of the Hamiltonian, as well as further structure such as convexity and monotonicity of the resulting components. Problems arising in practice, however, may not have this separable structure; we therefore consider the non-separable problem. For our existence and uniqueness results, we introduce new smallness constraints which simultaneously consider the size of the time horizon, the size of the data, and the strength of the coupling in the system. ",david ambrose,,2018.0,,arXiv,Ambrose2018,True,,arXiv,Not available,Existence theory for non-separable mean field games in Sobolev spaces,a8bf4c3e188fac99f978dc2c1400e2e2,http://arxiv.org/abs/1807.02223v1 13843," We study competition between wireless devices with incomplete information about their opponents. We model such interactions as Bayesian interference games. Each wireless device selects a power profile over the entire available bandwidth to maximize its data rate. Such competitive models represent situations in which several wireless devices share spectrum without any central authority or coordinated protocol. In contrast to games where devices have complete information about their opponents, we consider scenarios where the devices are unaware of the interference they cause to other devices. Such games, which are modeled as Bayesian games, can exhibit significantly different equilibria. We first consider a simple scenario of simultaneous move games, where we show that the unique Bayes-Nash equilibrium is where both devices spread their power equally across the entire bandwidth. We then extend this model to a two-tiered spectrum sharing case where users act sequentially. Here one of the devices, called the primary user, is the owner of the spectrum and it selects its power profile first. The second device (called the secondary user) then responds by choosing a power profile to maximize its Shannon capacity. In such sequential move games, we show that there exist equilibria in which the primary user obtains a higher data rate by using only a part of the bandwidth. In a repeated Bayesian interference game, we show the existence of reputation effects: an informed primary user can bluff to prevent spectrum usage by a secondary user who suffers from lack of information about the channel gains. The resulting equilibrium can be highly inefficient, suggesting that competitive spectrum sharing is highly suboptimal. ",sachin adlakha,,2007.0,,arXiv,Adlakha2007,True,,arXiv,Not available,Competition in Wireless Systems via Bayesian Interference Games,7acd56c8710b8fd63b3cfd18dc4e6866,http://arxiv.org/abs/0709.0516v1 13844," We study competition between wireless devices with incomplete information about their opponents. We model such interactions as Bayesian interference games. Each wireless device selects a power profile over the entire available bandwidth to maximize its data rate. Such competitive models represent situations in which several wireless devices share spectrum without any central authority or coordinated protocol. In contrast to games where devices have complete information about their opponents, we consider scenarios where the devices are unaware of the interference they cause to other devices. Such games, which are modeled as Bayesian games, can exhibit significantly different equilibria. We first consider a simple scenario of simultaneous move games, where we show that the unique Bayes-Nash equilibrium is where both devices spread their power equally across the entire bandwidth. We then extend this model to a two-tiered spectrum sharing case where users act sequentially. Here one of the devices, called the primary user, is the owner of the spectrum and it selects its power profile first. The second device (called the secondary user) then responds by choosing a power profile to maximize its Shannon capacity. In such sequential move games, we show that there exist equilibria in which the primary user obtains a higher data rate by using only a part of the bandwidth. In a repeated Bayesian interference game, we show the existence of reputation effects: an informed primary user can bluff to prevent spectrum usage by a secondary user who suffers from lack of information about the channel gains. The resulting equilibrium can be highly inefficient, suggesting that competitive spectrum sharing is highly suboptimal. ",ramesh johari,,2007.0,,arXiv,Adlakha2007,True,,arXiv,Not available,Competition in Wireless Systems via Bayesian Interference Games,7acd56c8710b8fd63b3cfd18dc4e6866,http://arxiv.org/abs/0709.0516v1 13845," We study competition between wireless devices with incomplete information about their opponents. We model such interactions as Bayesian interference games. Each wireless device selects a power profile over the entire available bandwidth to maximize its data rate. Such competitive models represent situations in which several wireless devices share spectrum without any central authority or coordinated protocol. In contrast to games where devices have complete information about their opponents, we consider scenarios where the devices are unaware of the interference they cause to other devices. Such games, which are modeled as Bayesian games, can exhibit significantly different equilibria. We first consider a simple scenario of simultaneous move games, where we show that the unique Bayes-Nash equilibrium is where both devices spread their power equally across the entire bandwidth. We then extend this model to a two-tiered spectrum sharing case where users act sequentially. Here one of the devices, called the primary user, is the owner of the spectrum and it selects its power profile first. The second device (called the secondary user) then responds by choosing a power profile to maximize its Shannon capacity. In such sequential move games, we show that there exist equilibria in which the primary user obtains a higher data rate by using only a part of the bandwidth. In a repeated Bayesian interference game, we show the existence of reputation effects: an informed primary user can bluff to prevent spectrum usage by a secondary user who suffers from lack of information about the channel gains. The resulting equilibrium can be highly inefficient, suggesting that competitive spectrum sharing is highly suboptimal. ",andrea goldsmith,,2007.0,,arXiv,Adlakha2007,True,,arXiv,Not available,Competition in Wireless Systems via Bayesian Interference Games,7acd56c8710b8fd63b3cfd18dc4e6866,http://arxiv.org/abs/0709.0516v1 13846," We study the convergence time of the best response dynamics in player-specific singleton congestion games. It is well known that this dynamics can cycle, although from every state a short sequence of best responses to a Nash equilibrium exists. Thus, the random best response dynamics, which selects the next player to play a best response uniformly at random, terminates in a Nash equilibrium with probability one. In this paper, we are interested in the expected number of best responses until the random best response dynamics terminates. As a first step towards this goal, we consider games in which each player can choose between only two resources. These games have a natural representation as (multi-)graphs by identifying nodes with resources and edges with players. For the class of games that can be represented as trees, we show that the best-response dynamics cannot cycle and that it terminates after O(n^2) steps where n denotes the number of resources. For the class of games represented as cycles, we show that the best response dynamics can cycle. However, we also show that the random best response dynamics terminates after O(n^2) steps in expectation. Additionally, we conjecture that in general player-specific singleton congestion games there exists no polynomial upper bound on the expected number of steps until the random best response dynamics terminates. We support our conjecture by presenting a family of games for which simulations indicate a super-polynomial convergence time. ",heiner ackermann,,2008.0,,arXiv,Ackermann2008,True,,arXiv,Not available,"On the Convergence Time of the Best Response Dynamics in Player-specific Congestion Games",1697d2a4c099b00cc3db4fe0a8deb5de,http://arxiv.org/abs/0805.1130v1 13847," We study the convergence time of the best response dynamics in player-specific singleton congestion games. It is well known that this dynamics can cycle, although from every state a short sequence of best responses to a Nash equilibrium exists. Thus, the random best response dynamics, which selects the next player to play a best response uniformly at random, terminates in a Nash equilibrium with probability one. In this paper, we are interested in the expected number of best responses until the random best response dynamics terminates. As a first step towards this goal, we consider games in which each player can choose between only two resources. These games have a natural representation as (multi-)graphs by identifying nodes with resources and edges with players. For the class of games that can be represented as trees, we show that the best-response dynamics cannot cycle and that it terminates after O(n^2) steps where n denotes the number of resources. For the class of games represented as cycles, we show that the best response dynamics can cycle. However, we also show that the random best response dynamics terminates after O(n^2) steps in expectation. Additionally, we conjecture that in general player-specific singleton congestion games there exists no polynomial upper bound on the expected number of steps until the random best response dynamics terminates. We support our conjecture by presenting a family of games for which simulations indicate a super-polynomial convergence time. ",heiko roeglin,,2008.0,,arXiv,Ackermann2008,True,,arXiv,Not available,"On the Convergence Time of the Best Response Dynamics in Player-specific Congestion Games",1697d2a4c099b00cc3db4fe0a8deb5de,http://arxiv.org/abs/0805.1130v1 13848," We consider two-player zero-sum games on graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a) partial-observation (both players have partial view of the game); (b) one-sided complete-observation (one player has complete observation); and (c) complete-observation (both players have complete view of the game). On the basis of mode of interaction we have the following classification: (a) concurrent (both players interact simultaneously); and (b) turn-based (both players interact in turn). The two sources of randomness in these games are randomness in transition function and randomness in strategies. In general, randomized strategies are more powerful than deterministic strategies, and randomness in transitions gives more general classes of games. In this work we present a complete characterization for the classes of games where randomness is not helpful in: (a) the transition function probabilistic transition can be simulated by deterministic transition); and (b) strategies (pure strategies are as powerful as randomized strategies). As consequence of our characterization we obtain new undecidability results for these games. ",krishnendu chatterjee,,2010.0,10.1007/978-3-642-15155-2_23,arXiv,Chatterjee2010,True,,arXiv,Not available,Randomness for Free,2a2fbf2d71ae2c48425076a954494f58,http://arxiv.org/abs/1006.0673v3 13849," We consider two-player zero-sum games on graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a) partial-observation (both players have partial view of the game); (b) one-sided complete-observation (one player has complete observation); and (c) complete-observation (both players have complete view of the game). On the basis of mode of interaction we have the following classification: (a) concurrent (both players interact simultaneously); and (b) turn-based (both players interact in turn). The two sources of randomness in these games are randomness in transition function and randomness in strategies. In general, randomized strategies are more powerful than deterministic strategies, and randomness in transitions gives more general classes of games. In this work we present a complete characterization for the classes of games where randomness is not helpful in: (a) the transition function probabilistic transition can be simulated by deterministic transition); and (b) strategies (pure strategies are as powerful as randomized strategies). As consequence of our characterization we obtain new undecidability results for these games. ",laurent doyen,,2010.0,10.1007/978-3-642-15155-2_23,arXiv,Chatterjee2010,True,,arXiv,Not available,Randomness for Free,2a2fbf2d71ae2c48425076a954494f58,http://arxiv.org/abs/1006.0673v3 13850," We consider two-player zero-sum games on graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a) partial-observation (both players have partial view of the game); (b) one-sided complete-observation (one player has complete observation); and (c) complete-observation (both players have complete view of the game). On the basis of mode of interaction we have the following classification: (a) concurrent (both players interact simultaneously); and (b) turn-based (both players interact in turn). The two sources of randomness in these games are randomness in transition function and randomness in strategies. In general, randomized strategies are more powerful than deterministic strategies, and randomness in transitions gives more general classes of games. In this work we present a complete characterization for the classes of games where randomness is not helpful in: (a) the transition function probabilistic transition can be simulated by deterministic transition); and (b) strategies (pure strategies are as powerful as randomized strategies). As consequence of our characterization we obtain new undecidability results for these games. ",hugo gimbert,,2010.0,10.1007/978-3-642-15155-2_23,arXiv,Chatterjee2010,True,,arXiv,Not available,Randomness for Free,2a2fbf2d71ae2c48425076a954494f58,http://arxiv.org/abs/1006.0673v3 13851," We consider two-player zero-sum games on graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a) partial-observation (both players have partial view of the game); (b) one-sided complete-observation (one player has complete observation); and (c) complete-observation (both players have complete view of the game). On the basis of mode of interaction we have the following classification: (a) concurrent (both players interact simultaneously); and (b) turn-based (both players interact in turn). The two sources of randomness in these games are randomness in transition function and randomness in strategies. In general, randomized strategies are more powerful than deterministic strategies, and randomness in transitions gives more general classes of games. In this work we present a complete characterization for the classes of games where randomness is not helpful in: (a) the transition function probabilistic transition can be simulated by deterministic transition); and (b) strategies (pure strategies are as powerful as randomized strategies). As consequence of our characterization we obtain new undecidability results for these games. ",thomas henzinger,,2010.0,10.1007/978-3-642-15155-2_23,arXiv,Chatterjee2010,True,,arXiv,Not available,Randomness for Free,2a2fbf2d71ae2c48425076a954494f58,http://arxiv.org/abs/1006.0673v3 13852," We introduce open games as a compositional foundation of economic game theory. A compositional approach potentially allows methods of game theory and theoretical computer science to be applied to large-scale economic models for which standard economic tools are not practical. An open game represents a game played relative to an arbitrary environment and to this end we introduce the concept of coutility, which is the utility generated by an open game and returned to its environment. Open games are the morphisms of a symmetric monoidal category and can therefore be composed by categorical composition into sequential move games and by monoidal products into simultaneous move games. Open games can be represented by string diagrams which provide an intuitive but formal visualisation of the information flows. We show that a variety of games can be faithfully represented as open games in the sense of having the same Nash equilibria and off-equilibrium best responses. ",philipp zahn,,2016.0,,arXiv,Ghani2016,True,,arXiv,Not available,Compositional game theory,df5449347f469e2ba639cb0c38e37ccf,http://arxiv.org/abs/1603.04641v3 13853," In this paper, we formulate an evolutionarymultiple access control game with continuousvariable actions and coupled constraints. We characterize equilibria of the game and show that the pure equilibria are Pareto optimal and also resilient to deviations by coalitions of any size, i.e., they are strong equilibria. We use the concepts of price of anarchy and strong price of anarchy to study the performance of the system. The paper also addresses how to select one specific equilibrium solution using the concepts of normalized equilibrium and evolutionarily stable strategies. We examine the long-run behavior of these strategies under several classes of evolutionary game dynamics, such as Brown-von Neumann-Nash dynamics, Smith dynamics and replicator dynamics. In addition, we examine correlated equilibrium for the single-receiver model. Correlated strategies are based on signaling structures before making decisions on rates. We then focus on evolutionary games for hybrid additive white Gaussian noise multiple access channel with multiple users and multiple receivers, where each user chooses a rate and splits it over the receivers. Users have coupled constraints determined by the capacity regions. Building upon the static game, we formulate a system of hybrid evolutionary game dynamics using G-function dynamics and Smith dynamics on rate control and channel selection, respectively. We show that the evolving game has an equilibrium and illustrate these dynamics with numerical examples. ",quanyan zhu,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,Evolutionary Games for Multiple Access Control,5c0001132caa1664576e467e7e0e2459,http://arxiv.org/abs/1103.2496v1 13854," In this paper, we formulate an evolutionarymultiple access control game with continuousvariable actions and coupled constraints. We characterize equilibria of the game and show that the pure equilibria are Pareto optimal and also resilient to deviations by coalitions of any size, i.e., they are strong equilibria. We use the concepts of price of anarchy and strong price of anarchy to study the performance of the system. The paper also addresses how to select one specific equilibrium solution using the concepts of normalized equilibrium and evolutionarily stable strategies. We examine the long-run behavior of these strategies under several classes of evolutionary game dynamics, such as Brown-von Neumann-Nash dynamics, Smith dynamics and replicator dynamics. In addition, we examine correlated equilibrium for the single-receiver model. Correlated strategies are based on signaling structures before making decisions on rates. We then focus on evolutionary games for hybrid additive white Gaussian noise multiple access channel with multiple users and multiple receivers, where each user chooses a rate and splits it over the receivers. Users have coupled constraints determined by the capacity regions. Building upon the static game, we formulate a system of hybrid evolutionary game dynamics using G-function dynamics and Smith dynamics on rate control and channel selection, respectively. We show that the evolving game has an equilibrium and illustrate these dynamics with numerical examples. ",hamidou tembine,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,Evolutionary Games for Multiple Access Control,5c0001132caa1664576e467e7e0e2459,http://arxiv.org/abs/1103.2496v1 13855," In this paper, we formulate an evolutionarymultiple access control game with continuousvariable actions and coupled constraints. We characterize equilibria of the game and show that the pure equilibria are Pareto optimal and also resilient to deviations by coalitions of any size, i.e., they are strong equilibria. We use the concepts of price of anarchy and strong price of anarchy to study the performance of the system. The paper also addresses how to select one specific equilibrium solution using the concepts of normalized equilibrium and evolutionarily stable strategies. We examine the long-run behavior of these strategies under several classes of evolutionary game dynamics, such as Brown-von Neumann-Nash dynamics, Smith dynamics and replicator dynamics. In addition, we examine correlated equilibrium for the single-receiver model. Correlated strategies are based on signaling structures before making decisions on rates. We then focus on evolutionary games for hybrid additive white Gaussian noise multiple access channel with multiple users and multiple receivers, where each user chooses a rate and splits it over the receivers. Users have coupled constraints determined by the capacity regions. Building upon the static game, we formulate a system of hybrid evolutionary game dynamics using G-function dynamics and Smith dynamics on rate control and channel selection, respectively. We show that the evolving game has an equilibrium and illustrate these dynamics with numerical examples. ",tamer basar,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,Evolutionary Games for Multiple Access Control,5c0001132caa1664576e467e7e0e2459,http://arxiv.org/abs/1103.2496v1 13856," We study in depth the class of games with opacity condition, which are two-player games with imperfect information in which one of the players only has imperfect information, and where the winning condition relies on the information he has along the play. Those games are relevant for security aspects of computing systems: a play is opaque whenever the player who has imperfect information never ""knows"" for sure that the current position is one of the distinguished ""secret"" positions. We study the problems of deciding the existence of a winning strategy for each player, and we call them the opacity-violate problem and the opacity-guarantee problem. Focusing on the player with perfect information is new in the field of games with imperfect-information because when considering classical winning conditions it amounts to solving the underlying perfect-information game. We establish the EXPTIME-completeness of both above-mentioned problems, showing that our winning condition brings a gap of complexity for the player with perfect information, and we exhibit the relevant opacity-verify problem, which noticeably generalizes approaches considered in the literature for opacity analysis in discrete-event systems. In the case of blindfold games, this problem relates to the two initial ones, yielding the determinacy of blindfold games with opacity condition and the PSPACE-completeness of the three problems. ",bastien maubert,,2011.0,10.4204/EPTCS.54.7,"EPTCS 54, 2011, pp. 87-101",Maubert2011,True,,arXiv,Not available,Opacity Issues in Games with Imperfect Information,1cc0dd8271775016da76a784680a3e29,http://arxiv.org/abs/1106.1233v1 13857," We study in depth the class of games with opacity condition, which are two-player games with imperfect information in which one of the players only has imperfect information, and where the winning condition relies on the information he has along the play. Those games are relevant for security aspects of computing systems: a play is opaque whenever the player who has imperfect information never ""knows"" for sure that the current position is one of the distinguished ""secret"" positions. We study the problems of deciding the existence of a winning strategy for each player, and we call them the opacity-violate problem and the opacity-guarantee problem. Focusing on the player with perfect information is new in the field of games with imperfect-information because when considering classical winning conditions it amounts to solving the underlying perfect-information game. We establish the EXPTIME-completeness of both above-mentioned problems, showing that our winning condition brings a gap of complexity for the player with perfect information, and we exhibit the relevant opacity-verify problem, which noticeably generalizes approaches considered in the literature for opacity analysis in discrete-event systems. In the case of blindfold games, this problem relates to the two initial ones, yielding the determinacy of blindfold games with opacity condition and the PSPACE-completeness of the three problems. ",sophie pinchinat,,2011.0,10.4204/EPTCS.54.7,"EPTCS 54, 2011, pp. 87-101",Maubert2011,True,,arXiv,Not available,Opacity Issues in Games with Imperfect Information,1cc0dd8271775016da76a784680a3e29,http://arxiv.org/abs/1106.1233v1 13858," We study in depth the class of games with opacity condition, which are two-player games with imperfect information in which one of the players only has imperfect information, and where the winning condition relies on the information he has along the play. Those games are relevant for security aspects of computing systems: a play is opaque whenever the player who has imperfect information never ""knows"" for sure that the current position is one of the distinguished ""secret"" positions. We study the problems of deciding the existence of a winning strategy for each player, and we call them the opacity-violate problem and the opacity-guarantee problem. Focusing on the player with perfect information is new in the field of games with imperfect-information because when considering classical winning conditions it amounts to solving the underlying perfect-information game. We establish the EXPTIME-completeness of both above-mentioned problems, showing that our winning condition brings a gap of complexity for the player with perfect information, and we exhibit the relevant opacity-verify problem, which noticeably generalizes approaches considered in the literature for opacity analysis in discrete-event systems. In the case of blindfold games, this problem relates to the two initial ones, yielding the determinacy of blindfold games with opacity condition and the PSPACE-completeness of the three problems. ",laura bozzelli,,2011.0,10.4204/EPTCS.54.7,"EPTCS 54, 2011, pp. 87-101",Maubert2011,True,,arXiv,Not available,Opacity Issues in Games with Imperfect Information,1cc0dd8271775016da76a784680a3e29,http://arxiv.org/abs/1106.1233v1 13859," We consider two-player stochastic games played on a finite state space for an infinite number of rounds. The games are concurrent: in each round, the two players (player 1 and player 2) choose their moves independently and simultaneously; the current state and the two moves determine a probability distribution over the successor states. We also consider the important special case of turn-based stochastic games where players make moves in turns, rather than concurrently. We study concurrent games with \omega-regular winning conditions specified as parity objectives. The value for player 1 for a parity objective is the maximal probability with which the player can guarantee the satisfaction of the objective against all strategies of the opponent. We study the problem of continuity and robustness of the value function in concurrent and turn-based stochastic parity gameswith respect to imprecision in the transition probabilities. We present quantitative bounds on the difference of the value function (in terms of the imprecision of the transition probabilities) and show the value continuity for structurally equivalent concurrent games (two games are structurally equivalent if the support of the transition function is same and the probabilities differ). We also show robustness of optimal strategies for structurally equivalent turn-based stochastic parity games. Finally we show that the value continuity property breaks without the structurally equivalent assumption (even for Markov chains) and show that our quantitative bound is asymptotically optimal. Hence our results are tight (the assumption is both necessary and sufficient) and optimal (our quantitative bound is asymptotically optimal). ",krishnendu chatterjee,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,Robustness of Structurally Equivalent Concurrent Parity Games,a9081cd5679680eb6d467f99b488a90f,http://arxiv.org/abs/1107.2009v2 13860," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",gabriele farina,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 13861," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",nicola gatti,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 13862," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",zhili chen,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 13863," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",erich graedel,,2006.0,,arXiv,Graedel2006,True,,arXiv,Not available,Postinal Determinacy of Games with Infinitely Many Priorities,ce6650a5254159cd89375e1a066375b4,http://arxiv.org/abs/cs/0610034v2 13864," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",he huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 13865," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",liusheng huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 13866," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",bart keijzer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 13867," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",evangelos markakis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 13868," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",guido schafer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 13869," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",orestis telelis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 13870," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",sicco verwer,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 13871," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",yingqian zhang,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 13872," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",qing ye,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 13873," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",zheng wen,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 13874," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",igor walukiewicz,,2006.0,,arXiv,Graedel2006,True,,arXiv,Not available,Postinal Determinacy of Games with Infinitely Many Priorities,ce6650a5254159cd89375e1a066375b4,http://arxiv.org/abs/cs/0610034v2 13875," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",eric bax,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 13876," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",james li,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 13877," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",yossi azar,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 13878," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",michal feldman,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 13879," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",nick gravin,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 13880," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",alan roytman,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 13881," We are interested in the problem of optimal commitments in rank-and-bid based auctions, a general class of auctions that include first price and all-pay auctions as special cases. Our main contribution is a novel approach to solve for optimal commitment in this class of auctions, for any continuous type distributions. Applying our approach, we are able to solve optimal commitments for first-price and all-pay auctions in closed-form for fairly general distribution settings. The optimal commitments functions in these auctions reveal two surprisingly opposite insights: in the optimal commitment, the leader bids passively when he has a low type. We interpret this as a credible way to alleviate competition and to collude. In sharp contrast, when his type is high enough, the leader sometimes would go so far as to bid above his own value. We interpret this as a credible way to threat. Combing both insights, we show via concrete examples that the leader is indeed willing to do so to secure more utility when his type is in the middle. Our main approach consists of a series of nontrivial innovations. In particular we put forward a concept called equal-bid function that connects both players' strategies, as well as a concept called equal-utility curve that smooths any leader strategy into a continuous and differentiable strategy. We believe these techniques and insights are general and can be applied to similar problems. ",zihe wang,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Optimal commitments in auctions with incomplete information,2f2b09ab15b4b8f398c8af863281cad1,http://arxiv.org/abs/1502.07431v1 13882," We are interested in the problem of optimal commitments in rank-and-bid based auctions, a general class of auctions that include first price and all-pay auctions as special cases. Our main contribution is a novel approach to solve for optimal commitment in this class of auctions, for any continuous type distributions. Applying our approach, we are able to solve optimal commitments for first-price and all-pay auctions in closed-form for fairly general distribution settings. The optimal commitments functions in these auctions reveal two surprisingly opposite insights: in the optimal commitment, the leader bids passively when he has a low type. We interpret this as a credible way to alleviate competition and to collude. In sharp contrast, when his type is high enough, the leader sometimes would go so far as to bid above his own value. We interpret this as a credible way to threat. Combing both insights, we show via concrete examples that the leader is indeed willing to do so to secure more utility when his type is in the middle. Our main approach consists of a series of nontrivial innovations. In particular we put forward a concept called equal-bid function that connects both players' strategies, as well as a concept called equal-utility curve that smooths any leader strategy into a continuous and differentiable strategy. We believe these techniques and insights are general and can be applied to similar problems. ",pingzhong tang,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Optimal commitments in auctions with incomplete information,2f2b09ab15b4b8f398c8af863281cad1,http://arxiv.org/abs/1502.07431v1 13883," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",jing chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 13884," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",bo li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 13885," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",erich graedel,,2006.0,10.2168/LMCS-2(4:6)2006,"Logical Methods in Computer Science, Volume 2, Issue 4 (November 3, 2006) lmcs:2242",Graedel2006,True,,arXiv,Not available,Positional Determinacy of Games with Infinitely Many Priorities,1a617bb2e2d376fb38e6ec667b9dabaf,http://arxiv.org/abs/cs/0610035v2 13886," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",yingkai li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 13887," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",pinyan lu,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 13888," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",gang bai,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 13889," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",zhihui xie,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 13890," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",liang wang,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 13891," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",vasilis syrgkanis,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 13892," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",elie tamer,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 13893," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",juba ziani,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 13894," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",xiaojun feng,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 13895," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",peng lin,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 13896," We consider mechanism design and redesign for markets like Internet advertising where many frequent, small transactions are organized by a principal. Mechanisms for these markets rarely have truthtelling equilibria. We identify a family of winner-pays-bid mechanisms for such markets that exhibit three properties. First, equilibria in these mechanisms are simple. Second, the mechanisms' parameters are easily reoptimized from the bid data that the mechanism generates. Third, the performance of mechanisms in the family is near the optimal performance possible by any mechanism (not necessarily within the family). Our mechanisms are based on batching across multiple iterations of an auction environment, and our approximation bound is asymptotically optimal, with loss inversely proportional to the cube root of the number of iterations batched. Our analysis methods are of broader interest in mechanism design and, for example, we also use them to give new sample complexity bounds for mechanism design in general single-dimensional agent environments. ",samuel taggart,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Non-Revelation Mechanism Design,0f62146f8e32f910489f506979116709,http://arxiv.org/abs/1608.01875v2 13897," We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs. ",igor walukiewicz,,2006.0,10.2168/LMCS-2(4:6)2006,"Logical Methods in Computer Science, Volume 2, Issue 4 (November 3, 2006) lmcs:2242",Graedel2006,True,,arXiv,Not available,Positional Determinacy of Games with Infinitely Many Priorities,1a617bb2e2d376fb38e6ec667b9dabaf,http://arxiv.org/abs/cs/0610035v2 13898," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",qian zhang,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 13899," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",yagil engel,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 13900," We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions. ",michael wellman,,2014.0,10.1613/jair.3002,"Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010",Engel2014,True,,arXiv,Not available,Multiattribute Auctions Based on Generalized Additive Independence,656401d1d0b1fd0c836b2afea8a52d17,http://arxiv.org/abs/1401.3844v1 13901," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",zhili chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13902," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",tianjiao ni,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13903," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",hong zhong,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13904," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",shun zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13905," Spectrum auction is an effective approach to improving spectrum utilization, by leasing idle spectrum from primary users to secondary users. Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions. In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare Maximization (DDSM). Specifically, we design the mechanism by employing the exponential mechanism to select clearing prices for the double spectrum auction with probabilities exponentially proportional to the related social welfare values, and then improve the mechanism in several aspects like the designs of the auction algorithm, the utility function and the buyer grouping algorithm. Through theoretical analysis, we prove that DDSM achieves differential privacy, approximate truthfulness, approximate social welfare maximization. Extensive experimental evaluations show that DDSM achieves a good performance in term of social welfare. ",jie cui,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization",b470c3bfeb6f1ace87a05077a3fb4754,http://arxiv.org/abs/1810.07873v1 13906," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",chonho lee,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 13907," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",ping wang,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 13908," Learning theories emphasize the importance of intrinsic and extrinsic motivators in curricula, and games are a promising way to provide both while constructing the game and presenting or sharing it in public or with a community. New technologies and the emerging mobile gaming sector further the case that learning should be promoted everywhere and anytime. What seems to be a promising opportunity for all pupils to learn coding in an entertaining way raises the question of whether such game based concepts also help to fix the gender gap of women in IT related fields. Gender differences are already present in secondary schools. These are the years where first career choices but also low levels of participation in technical subjects occur. To address this gender bias, a goal of the European project No One Left Behind (NOLB) was to integrate Pocket Code, an app developed by Catrobat, a free open source non-profit project at the University of Technology in Graz/Austria, into different school subjects, thus making coding more accessible and attractive to female pupils. During the period of this project (2015-2017), teachers were supported to guide their pupils in the learning processes by constructing ideas and realizing them through game design. For this paper an analysis of submitted programs according to their game design has been performed. In detail, the evaluation considered formal game elements, gaming structures, and used graphics, as well as Pocket Code specific aspects. The programs analysis showed commonly used design patterns by genders and suggests preferred game design characteristics of female teenagers. This analysis helps to build a more creative and inclusive Game Development-Based Learning (GDBL) environment that provides room for self-expression and inspires by building on intrinsic and extrinsic motivators by constructing personal experiences. ",bernadette spieler,,2018.0,,European Conference of Game-based Learning 2018,Spieler2018,True,,arXiv,Not available,"Game Development-Based Learning Experience: Gender Differences in Game Design",9f399346f487442171f4197315adca5b,http://arxiv.org/abs/1805.04457v2 13909," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",dusit niyato,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 13910," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",miroslav dudik,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13911," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",nika haghtalab,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13912," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",haipeng luo,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13913," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",robert schapire,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13914," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",vasilis syrgkanis,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13915," We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Follow-the-Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by Hazan and Koren, who showed that oracle-efficient algorithms do not exist in general and asked whether one can identify properties under which oracle-efficient online learning may be possible. Our auction-design framework considers an auctioneer learning an optimal auction for a sequence of adversarially selected valuations with the goal of achieving revenue that is almost as good as the optimal auction in hindsight, among a class of auctions. We give oracle-efficient learning results for: (1) VCG auctions with bidder-specific reserves in single-parameter settings, (2) envy-free item pricing in multi-item auctions, and (3) s-level auctions of Morgenstern and Roughgarden for single-item settings. The last result leads to an approximation of the overall optimal Myerson auction when bidders' valuations are drawn according to a fast-mixing Markov process, extending prior work that only gave such guarantees for the i.i.d. setting. Finally, we derive various extensions, including: (1) oracle-efficient algorithms for the contextual learning setting in which the learner has access to side information (such as bidder demographics), (2) learning with approximate oracles such as those based on Maximal-in-Range algorithms, and (3) no-regret bidding in simultaneous auctions, resolving an open problem of Daskalakis and Syrgkanis. ",jennifer vaughan,,2016.0,,arXiv,Dudík2016,True,,arXiv,Not available,Oracle-Efficient Online Learning and Auction Design,2251472b7430baacd08a308738851490,http://arxiv.org/abs/1611.01688v2 13916," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",michal feldman,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 13917," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",reshef meir,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 13918," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",moshe tennenholtz,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 13919," Learning theories emphasize the importance of intrinsic and extrinsic motivators in curricula, and games are a promising way to provide both while constructing the game and presenting or sharing it in public or with a community. New technologies and the emerging mobile gaming sector further the case that learning should be promoted everywhere and anytime. What seems to be a promising opportunity for all pupils to learn coding in an entertaining way raises the question of whether such game based concepts also help to fix the gender gap of women in IT related fields. Gender differences are already present in secondary schools. These are the years where first career choices but also low levels of participation in technical subjects occur. To address this gender bias, a goal of the European project No One Left Behind (NOLB) was to integrate Pocket Code, an app developed by Catrobat, a free open source non-profit project at the University of Technology in Graz/Austria, into different school subjects, thus making coding more accessible and attractive to female pupils. During the period of this project (2015-2017), teachers were supported to guide their pupils in the learning processes by constructing ideas and realizing them through game design. For this paper an analysis of submitted programs according to their game design has been performed. In detail, the evaluation considered formal game elements, gaming structures, and used graphics, as well as Pocket Code specific aspects. The programs analysis showed commonly used design patterns by genders and suggests preferred game design characteristics of female teenagers. This analysis helps to build a more creative and inclusive Game Development-Based Learning (GDBL) environment that provides room for self-expression and inspires by building on intrinsic and extrinsic motivators by constructing personal experiences. ",wolfgang slany,,2018.0,,European Conference of Game-based Learning 2018,Spieler2018,True,,arXiv,Not available,"Game Development-Based Learning Experience: Gender Differences in Game Design",9f399346f487442171f4197315adca5b,http://arxiv.org/abs/1805.04457v2 13920," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",ilan adler,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 13921," We consider a generalization of the $k$-flow set system auction where the set to be procured by a customer corresponds to a feasible solution to a linear programming problem where the coefficient matrix and right-hand-side together constitute a totally unimodular matrix. Our results generalize and strengthen bounds identified for several benchmarks, which form a crucial component in the study of frugality ratios of truthful auction mechanisms. ",dorit hochbaum,,2011.0,,arXiv,Adler2011,True,,arXiv,Not available,Benchmark Problems for Totally Unimodular Set System Auction,33a19068ff144aac7c0feee0a7907d05,http://arxiv.org/abs/1102.3499v1 13922," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 13923," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",allan borodin,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 13924," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",eric bax,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 13925," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",james li,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 13926," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",zheng wen,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 13927," We study the social efficiency of several well-known mechanisms for the allocation of a set of available (advertising) positions to a set of competing budget-constrained users (advertisers). Specifically, we focus on the Generalized Second Price auction (GSP), the Vickrey-Clarke-Groves mechanism (VCG) and the Expressive Generalized First Price auction (EGFP). Using the liquid welfare as our efficiency benchmark, we prove a tight bound of 2 on the liquid price of anarchy and stability of these mechanisms for pure Nash equilibria. ",alexandros voudouris,,2018.0,,arXiv,Voudouris2018,True,,arXiv,Not available,A note on the efficiency of position mechanisms with budget constraints,d3f6504f26c4c8bce31c687da6891293,http://arxiv.org/abs/1804.09649v1 13928," Recent work has addressed the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions so as to maximize revenue, most of which assume that pricing is done via a first-price auction. This does not realistically model the Generalized Second Price (GSP) auction used in practice, in which bidders pay the next-highest bid for keywords that they are allocated. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor, even when the bids are small compared to the budgets. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This contrasts with the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a result on the performance of the ""Ranking"" algorithm for online bipartite matching. ",yossi azar,,2008.0,,arXiv,Azar2008,True,,arXiv,Not available,Thinking Twice about Second-Price Ad Auctions,7a14e1f93e86345000fe0a4681d2c1a0,http://arxiv.org/abs/0809.1895v1 13929," Recent work has addressed the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions so as to maximize revenue, most of which assume that pricing is done via a first-price auction. This does not realistically model the Generalized Second Price (GSP) auction used in practice, in which bidders pay the next-highest bid for keywords that they are allocated. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor, even when the bids are small compared to the budgets. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This contrasts with the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a result on the performance of the ""Ranking"" algorithm for online bipartite matching. ",benjamin birnbaum,,2008.0,,arXiv,Azar2008,True,,arXiv,Not available,Thinking Twice about Second-Price Ad Auctions,7a14e1f93e86345000fe0a4681d2c1a0,http://arxiv.org/abs/0809.1895v1 13930," The notion of optimality naturally arises in many areas of applied mathematics and computer science concerned with decision making. Here we consider this notion in the context of three formalisms used for different purposes in reasoning about multi-agent systems: strategic games, CP-nets, and soft constraints. To relate the notions of optimality in these formalisms we introduce a natural qualitative modification of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of such games. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. Then, we relate the notion of optimality used in the area of soft constraints to that used in a generalization of strategic games, called graphical games. In particular we prove that for a natural class of soft constraints that includes weighted constraints every optimal solution is both a Nash equilibrium and Pareto efficient joint strategy. For a natural mapping in the other direction we show that Pareto efficient joint strategies coincide with the optimal solutions of soft constraints. ",krzysztof apt,,2007.0,,arXiv,Apt2007,True,,arXiv,Not available,"Comparing the notions of optimality in CP-nets, strategic games and soft constraints",2ed82e9f25cbe32d11666ad43f1fb959,http://arxiv.org/abs/0711.2909v2 13931," Recent work has addressed the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions so as to maximize revenue, most of which assume that pricing is done via a first-price auction. This does not realistically model the Generalized Second Price (GSP) auction used in practice, in which bidders pay the next-highest bid for keywords that they are allocated. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor, even when the bids are small compared to the budgets. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This contrasts with the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a result on the performance of the ""Ranking"" algorithm for online bipartite matching. ",anna karlin,,2008.0,,arXiv,Azar2008,True,,arXiv,Not available,Thinking Twice about Second-Price Ad Auctions,7a14e1f93e86345000fe0a4681d2c1a0,http://arxiv.org/abs/0809.1895v1 13932," Recent work has addressed the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions so as to maximize revenue, most of which assume that pricing is done via a first-price auction. This does not realistically model the Generalized Second Price (GSP) auction used in practice, in which bidders pay the next-highest bid for keywords that they are allocated. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor, even when the bids are small compared to the budgets. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This contrasts with the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a result on the performance of the ""Ranking"" algorithm for online bipartite matching. ",c. nguyen,,2008.0,,arXiv,Azar2008,True,,arXiv,Not available,Thinking Twice about Second-Price Ad Auctions,7a14e1f93e86345000fe0a4681d2c1a0,http://arxiv.org/abs/0809.1895v1 13933," The proliferation of portable devices (PDAs, smartphones, digital multimedia players, and so forth) allows mobile users to carry around a pool of computing, storage and communication resources. Sharing these resources with other users (""Digital Organisms"" -- DOs) opens the door to novel interesting scenarios, where people trade resources to allow the execution, anytime and anywhere, of applications that require a mix of capabilities. In this paper we present a fully distributed approach for resource sharing among multiple devices owned by different mobile users. Our scheme enables DOs to trade computing/networking facilities through an auction-based mechanism, without the need of a central control. We use a set of numerical experiments to compare our approach with an optimal (centralized) allocation strategy that, given the set of resource demands and offers, maximizes the number of matches. Results confirm the effectiveness of our approach since it produces a fair allocation of resources with low computational cost, providing DOs with the means to form an altruistic digital ecosystem. ",moreno marzolla,,2011.0,10.1109/Mobilware.2013.16,arXiv,Marzolla2011,True,,arXiv,Not available,Auction-Based Resource Allocation in Digital Ecosystems,50757bb13279bd62832412d21513a19f,http://arxiv.org/abs/1109.0397v2 13934," The proliferation of portable devices (PDAs, smartphones, digital multimedia players, and so forth) allows mobile users to carry around a pool of computing, storage and communication resources. Sharing these resources with other users (""Digital Organisms"" -- DOs) opens the door to novel interesting scenarios, where people trade resources to allow the execution, anytime and anywhere, of applications that require a mix of capabilities. In this paper we present a fully distributed approach for resource sharing among multiple devices owned by different mobile users. Our scheme enables DOs to trade computing/networking facilities through an auction-based mechanism, without the need of a central control. We use a set of numerical experiments to compare our approach with an optimal (centralized) allocation strategy that, given the set of resource demands and offers, maximizes the number of matches. Results confirm the effectiveness of our approach since it produces a fair allocation of resources with low computational cost, providing DOs with the means to form an altruistic digital ecosystem. ",stefano ferretti,,2011.0,10.1109/Mobilware.2013.16,arXiv,Marzolla2011,True,,arXiv,Not available,Auction-Based Resource Allocation in Digital Ecosystems,50757bb13279bd62832412d21513a19f,http://arxiv.org/abs/1109.0397v2 13935," The proliferation of portable devices (PDAs, smartphones, digital multimedia players, and so forth) allows mobile users to carry around a pool of computing, storage and communication resources. Sharing these resources with other users (""Digital Organisms"" -- DOs) opens the door to novel interesting scenarios, where people trade resources to allow the execution, anytime and anywhere, of applications that require a mix of capabilities. In this paper we present a fully distributed approach for resource sharing among multiple devices owned by different mobile users. Our scheme enables DOs to trade computing/networking facilities through an auction-based mechanism, without the need of a central control. We use a set of numerical experiments to compare our approach with an optimal (centralized) allocation strategy that, given the set of resource demands and offers, maximizes the number of matches. Results confirm the effectiveness of our approach since it produces a fair allocation of resources with low computational cost, providing DOs with the means to form an altruistic digital ecosystem. ",gabriele d'angelo,,2011.0,10.1109/Mobilware.2013.16,arXiv,Marzolla2011,True,,arXiv,Not available,Auction-Based Resource Allocation in Digital Ecosystems,50757bb13279bd62832412d21513a19f,http://arxiv.org/abs/1109.0397v2 13936," In practical machine learning systems, graph based data representation has been widely used in various learning paradigms, ranging from unsupervised clustering to supervised classification. Besides those applications with natural graph or network structure data, such as social network analysis and relational learning, many other applications often involve a critical step in converting data vectors to an adjacency graph. In particular, a sparse subgraph extracted from the original graph is often required due to both theoretic and practical needs. Previous study clearly shows that the performance of different learning algorithms, e.g., clustering and classification, benefits from such sparse subgraphs with balanced node connectivity. However, the existing graph construction methods are either computationally expensive or with unsatisfactory performance. In this paper, we utilize a scalable method called auction algorithm and its parallel extension to recover a sparse yet nearly balanced subgraph with significantly reduced computational cost. Empirical study and comparison with the state-ofart approaches clearly demonstrate the superiority of the proposed method in both efficiency and accuracy. ",jun wang,,2012.0,,arXiv,Wang2012,True,,arXiv,Not available,Fast Graph Construction Using Auction Algorithm,c78c5df7be8a8cdf78c5bb8aee563a98,http://arxiv.org/abs/1210.4917v1 13937," In practical machine learning systems, graph based data representation has been widely used in various learning paradigms, ranging from unsupervised clustering to supervised classification. Besides those applications with natural graph or network structure data, such as social network analysis and relational learning, many other applications often involve a critical step in converting data vectors to an adjacency graph. In particular, a sparse subgraph extracted from the original graph is often required due to both theoretic and practical needs. Previous study clearly shows that the performance of different learning algorithms, e.g., clustering and classification, benefits from such sparse subgraphs with balanced node connectivity. However, the existing graph construction methods are either computationally expensive or with unsatisfactory performance. In this paper, we utilize a scalable method called auction algorithm and its parallel extension to recover a sparse yet nearly balanced subgraph with significantly reduced computational cost. Empirical study and comparison with the state-ofart approaches clearly demonstrate the superiority of the proposed method in both efficiency and accuracy. ",yinglong xia,,2012.0,,arXiv,Wang2012,True,,arXiv,Not available,Fast Graph Construction Using Auction Algorithm,c78c5df7be8a8cdf78c5bb8aee563a98,http://arxiv.org/abs/1210.4917v1 13938," We study how to enable auctions in the big data context to solve many upcoming data-based decision problems in the near future. We consider the characteristics of the big data including, but not limited to, velocity, volume, variety, and veracity, and we believe any auction mechanism design in the future should take the following factors into consideration: 1) generality (variety); 2) efficiency and scalability (velocity and volume); 3) truthfulness and verifiability (veracity). In this paper, we propose a privacy-preserving construction for auction mechanism design in the big data, which prevents adversaries from learning unnecessary information except those implied in the valid output of the auction. More specifically, we considered one of the most general form of the auction (to deal with the variety), and greatly improved the the efficiency and scalability by approximating the NP-hard problems and avoiding the design based on garbled circuits (to deal with velocity and volume), and finally prevented stakeholders from lying to each other for their own benefit (to deal with the veracity). We achieve these by introducing a novel privacy-preserving winner determination algorithm and a novel payment mechanism. Additionally, we further employ a blind signature scheme as a building block to let bidders verify the authenticity of their payment reported by the auctioneer. The comparison with peer work shows that we improve the asymptotic performance of peer works' overhead from the exponential growth to a linear growth and from linear growth to a logarithmic growth, which greatly improves the scalability. ",taeho jung,,2013.0,10.1109/INFCOMW.2015.7179380,"2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 173-178",Jung2013,True,,arXiv,Not available,Enabling Privacy-preserving Auctions in Big Data,9a5a3eeba947ca609922ad885b4fd9bf,http://arxiv.org/abs/1308.6202v2 13939," We study how to enable auctions in the big data context to solve many upcoming data-based decision problems in the near future. We consider the characteristics of the big data including, but not limited to, velocity, volume, variety, and veracity, and we believe any auction mechanism design in the future should take the following factors into consideration: 1) generality (variety); 2) efficiency and scalability (velocity and volume); 3) truthfulness and verifiability (veracity). In this paper, we propose a privacy-preserving construction for auction mechanism design in the big data, which prevents adversaries from learning unnecessary information except those implied in the valid output of the auction. More specifically, we considered one of the most general form of the auction (to deal with the variety), and greatly improved the the efficiency and scalability by approximating the NP-hard problems and avoiding the design based on garbled circuits (to deal with velocity and volume), and finally prevented stakeholders from lying to each other for their own benefit (to deal with the veracity). We achieve these by introducing a novel privacy-preserving winner determination algorithm and a novel payment mechanism. Additionally, we further employ a blind signature scheme as a building block to let bidders verify the authenticity of their payment reported by the auctioneer. The comparison with peer work shows that we improve the asymptotic performance of peer works' overhead from the exponential growth to a linear growth and from linear growth to a logarithmic growth, which greatly improves the scalability. ",xiang-yang li,,2013.0,10.1109/INFCOMW.2015.7179380,"2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 173-178",Jung2013,True,,arXiv,Not available,Enabling Privacy-preserving Auctions in Big Data,9a5a3eeba947ca609922ad885b4fd9bf,http://arxiv.org/abs/1308.6202v2 13940," We consider the problem of building up trust in a network of online auctions by software agents. This requires agents to have a deeper understanding of auction mechanisms and be able to verify desirable properties of a given mechanism. We have shown how these mechanisms can be formalised as semantic web services in OWL-S, a good enough expressive machine-readable formalism enabling software agents, to discover, invoke, and execute a web service. We have also used abstract interpretation to translate the auction's specifications from OWL-S, based on description logic, to COQ, based on typed lambda calculus, in order to enable automatic verification of desirable properties of the auction by the software agents. For this language translation, we have discussed the syntactic transformation as well as the semantics connections between both concrete and abstract domains. This work contributes to the implementation of the vision of agent-mediated e-commerce systems. ",wei bai,,2014.0,10.4204/EPTCS.147.9,"EPTCS 147, 2014, pp. 123-132",Bai2014,True,,arXiv,Not available,Enabling Automatic Certification of Online Auctions,dad32405f53872f3555af568071688d8,http://arxiv.org/abs/1404.0854v1 13941," The notion of optimality naturally arises in many areas of applied mathematics and computer science concerned with decision making. Here we consider this notion in the context of three formalisms used for different purposes in reasoning about multi-agent systems: strategic games, CP-nets, and soft constraints. To relate the notions of optimality in these formalisms we introduce a natural qualitative modification of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of such games. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. Then, we relate the notion of optimality used in the area of soft constraints to that used in a generalization of strategic games, called graphical games. In particular we prove that for a natural class of soft constraints that includes weighted constraints every optimal solution is both a Nash equilibrium and Pareto efficient joint strategy. For a natural mapping in the other direction we show that Pareto efficient joint strategies coincide with the optimal solutions of soft constraints. ",francesca rossi,,2007.0,,arXiv,Apt2007,True,,arXiv,Not available,"Comparing the notions of optimality in CP-nets, strategic games and soft constraints",2ed82e9f25cbe32d11666ad43f1fb959,http://arxiv.org/abs/0711.2909v2 13942," We consider the problem of building up trust in a network of online auctions by software agents. This requires agents to have a deeper understanding of auction mechanisms and be able to verify desirable properties of a given mechanism. We have shown how these mechanisms can be formalised as semantic web services in OWL-S, a good enough expressive machine-readable formalism enabling software agents, to discover, invoke, and execute a web service. We have also used abstract interpretation to translate the auction's specifications from OWL-S, based on description logic, to COQ, based on typed lambda calculus, in order to enable automatic verification of desirable properties of the auction by the software agents. For this language translation, we have discussed the syntactic transformation as well as the semantics connections between both concrete and abstract domains. This work contributes to the implementation of the vision of agent-mediated e-commerce systems. ",emmanuel tadjouddine,,2014.0,10.4204/EPTCS.147.9,"EPTCS 147, 2014, pp. 123-132",Bai2014,True,,arXiv,Not available,Enabling Automatic Certification of Online Auctions,dad32405f53872f3555af568071688d8,http://arxiv.org/abs/1404.0854v1 13943," We consider the problem of building up trust in a network of online auctions by software agents. This requires agents to have a deeper understanding of auction mechanisms and be able to verify desirable properties of a given mechanism. We have shown how these mechanisms can be formalised as semantic web services in OWL-S, a good enough expressive machine-readable formalism enabling software agents, to discover, invoke, and execute a web service. We have also used abstract interpretation to translate the auction's specifications from OWL-S, based on description logic, to COQ, based on typed lambda calculus, in order to enable automatic verification of desirable properties of the auction by the software agents. For this language translation, we have discussed the syntactic transformation as well as the semantics connections between both concrete and abstract domains. This work contributes to the implementation of the vision of agent-mediated e-commerce systems. ",yu guo,,2014.0,10.4204/EPTCS.147.9,"EPTCS 147, 2014, pp. 123-132",Bai2014,True,,arXiv,Not available,Enabling Automatic Certification of Online Auctions,dad32405f53872f3555af568071688d8,http://arxiv.org/abs/1404.0854v1 13944," We propose a semiparametric method to estimate the density of private values in first-price auctions. Specifically, we model private values through a set of conditional moment restrictions and use a two-step procedure. In the first step we recover a sample of pseudo private values using Local Polynomial Estimator. In the second step we use a GMM procedure to estimate the parameter(s) of interest. We show that the proposed semiparametric estimator is consistent, has an asymptotic normal distribution, and attains the parametric (""root-n"") rate of convergence. ",gaurab aryal,,2014.0,,arXiv,Aryal2014,True,,arXiv,Not available,Semiparametric Estimation of First-Price Auction Models,70c64a58aea2ce807389e349ae86d287,http://arxiv.org/abs/1407.7140v4 13945," We propose a semiparametric method to estimate the density of private values in first-price auctions. Specifically, we model private values through a set of conditional moment restrictions and use a two-step procedure. In the first step we recover a sample of pseudo private values using Local Polynomial Estimator. In the second step we use a GMM procedure to estimate the parameter(s) of interest. We show that the proposed semiparametric estimator is consistent, has an asymptotic normal distribution, and attains the parametric (""root-n"") rate of convergence. ",maria gabrielli,,2014.0,,arXiv,Aryal2014,True,,arXiv,Not available,Semiparametric Estimation of First-Price Auction Models,70c64a58aea2ce807389e349ae86d287,http://arxiv.org/abs/1407.7140v4 13946," We propose a semiparametric method to estimate the density of private values in first-price auctions. Specifically, we model private values through a set of conditional moment restrictions and use a two-step procedure. In the first step we recover a sample of pseudo private values using Local Polynomial Estimator. In the second step we use a GMM procedure to estimate the parameter(s) of interest. We show that the proposed semiparametric estimator is consistent, has an asymptotic normal distribution, and attains the parametric (""root-n"") rate of convergence. ",quang vuong,,2014.0,,arXiv,Aryal2014,True,,arXiv,Not available,Semiparametric Estimation of First-Price Auction Models,70c64a58aea2ce807389e349ae86d287,http://arxiv.org/abs/1407.7140v4 13947," Let $\mathbb{F}_p$ be the finite field of prime order $p$. For any function $f \colon \mathbb{F}_p{}^n \to \mathbb{F}_p$, there exists a unique polynomial over $\mathbb{F}_p$ having degree at most $p-1$ with respect to each variable which coincides with $f$. We call it the minimal polynomial of $f$. It is in general a non-trivial task to find a concrete expression of the minimal polynomial of a given function, which has only been worked out for limited classes of functions in the literature. In this paper, we study minimal polynomial expressions of several functions that are closely related to some practically important procedures such as auction and voting. ",shizuo kaji,,2017.0,,arXiv,Kaji2017,True,,arXiv,Not available,Polynomial expressions of $p$-ary auction functions,492ebf26faf9adf58efc2ee655d25ca3,http://arxiv.org/abs/1703.07930v1 13948," Let $\mathbb{F}_p$ be the finite field of prime order $p$. For any function $f \colon \mathbb{F}_p{}^n \to \mathbb{F}_p$, there exists a unique polynomial over $\mathbb{F}_p$ having degree at most $p-1$ with respect to each variable which coincides with $f$. We call it the minimal polynomial of $f$. It is in general a non-trivial task to find a concrete expression of the minimal polynomial of a given function, which has only been worked out for limited classes of functions in the literature. In this paper, we study minimal polynomial expressions of several functions that are closely related to some practically important procedures such as auction and voting. ",toshiaki maeno,,2017.0,,arXiv,Kaji2017,True,,arXiv,Not available,Polynomial expressions of $p$-ary auction functions,492ebf26faf9adf58efc2ee655d25ca3,http://arxiv.org/abs/1703.07930v1 13949," Let $\mathbb{F}_p$ be the finite field of prime order $p$. For any function $f \colon \mathbb{F}_p{}^n \to \mathbb{F}_p$, there exists a unique polynomial over $\mathbb{F}_p$ having degree at most $p-1$ with respect to each variable which coincides with $f$. We call it the minimal polynomial of $f$. It is in general a non-trivial task to find a concrete expression of the minimal polynomial of a given function, which has only been worked out for limited classes of functions in the literature. In this paper, we study minimal polynomial expressions of several functions that are closely related to some practically important procedures such as auction and voting. ",koji nuida,,2017.0,,arXiv,Kaji2017,True,,arXiv,Not available,Polynomial expressions of $p$-ary auction functions,492ebf26faf9adf58efc2ee655d25ca3,http://arxiv.org/abs/1703.07930v1 13950," Let $\mathbb{F}_p$ be the finite field of prime order $p$. For any function $f \colon \mathbb{F}_p{}^n \to \mathbb{F}_p$, there exists a unique polynomial over $\mathbb{F}_p$ having degree at most $p-1$ with respect to each variable which coincides with $f$. We call it the minimal polynomial of $f$. It is in general a non-trivial task to find a concrete expression of the minimal polynomial of a given function, which has only been worked out for limited classes of functions in the literature. In this paper, we study minimal polynomial expressions of several functions that are closely related to some practically important procedures such as auction and voting. ",yasuhide numata,,2017.0,,arXiv,Kaji2017,True,,arXiv,Not available,Polynomial expressions of $p$-ary auction functions,492ebf26faf9adf58efc2ee655d25ca3,http://arxiv.org/abs/1703.07930v1 13951," With the explosive growth of wireless data, the sheer size of the mobile traffic is challenging the capacity of current wireless systems. To tackle this challenge, mobile edge caching has emerged as a promising paradigm recently, in which the service providers (SPs) prefetch some popular contents in advance and cache them locally at the network edge. When requested, those locally cached contents can be directly delivered to users with low latency, thus alleviating the traffic load over backhaul channels during peak hours and enhancing the quality-of-experience (QoE) of users simultaneously. Due to the limited available cache space, it makes sense for the SP to cache the most profitable contents. Nevertheless, users' true valuations of contents are their private knowledge, which is unknown to the SP in general. This information asymmetry poses a significant challenge for effective caching at the SP side. Further, the cached contents can be delivered with different quality, which needs to be chosen judiciously to balance delivery costs and user satisfaction. To tackle these difficulties, in this paper, we propose an optimal auction mechanism from the perspective of the SP. In the auction, the SP determines the cache space allocation over contents and user payments based on the users' (possibly untruthful) reports of their valuations so that the SP's expected revenue is maximized. The advocated mechanism is designed to elicit true valuations from the users (incentive compatibility) and to incentivize user participation (individual rationality). In addition, we devise a computationally efficient method for calculating the optimal cache space allocation and user payments. We further examine the optimal choice of the content delivery quality for the case with a large number of users and derive a closed-form solution to compute the optimal delivery quality. ",xuanyu cao,,2017.0,,arXiv,Cao2017,True,,arXiv,Not available,Mobile Edge Caching: An Optimal Auction Approach,28e9dd3fe44cfed75129777d50d2aa1e,http://arxiv.org/abs/1712.03336v1 13952," The notion of optimality naturally arises in many areas of applied mathematics and computer science concerned with decision making. Here we consider this notion in the context of three formalisms used for different purposes in reasoning about multi-agent systems: strategic games, CP-nets, and soft constraints. To relate the notions of optimality in these formalisms we introduce a natural qualitative modification of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of such games. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. Then, we relate the notion of optimality used in the area of soft constraints to that used in a generalization of strategic games, called graphical games. In particular we prove that for a natural class of soft constraints that includes weighted constraints every optimal solution is both a Nash equilibrium and Pareto efficient joint strategy. For a natural mapping in the other direction we show that Pareto efficient joint strategies coincide with the optimal solutions of soft constraints. ",kristen venable,,2007.0,,arXiv,Apt2007,True,,arXiv,Not available,"Comparing the notions of optimality in CP-nets, strategic games and soft constraints",2ed82e9f25cbe32d11666ad43f1fb959,http://arxiv.org/abs/0711.2909v2 13953," With the explosive growth of wireless data, the sheer size of the mobile traffic is challenging the capacity of current wireless systems. To tackle this challenge, mobile edge caching has emerged as a promising paradigm recently, in which the service providers (SPs) prefetch some popular contents in advance and cache them locally at the network edge. When requested, those locally cached contents can be directly delivered to users with low latency, thus alleviating the traffic load over backhaul channels during peak hours and enhancing the quality-of-experience (QoE) of users simultaneously. Due to the limited available cache space, it makes sense for the SP to cache the most profitable contents. Nevertheless, users' true valuations of contents are their private knowledge, which is unknown to the SP in general. This information asymmetry poses a significant challenge for effective caching at the SP side. Further, the cached contents can be delivered with different quality, which needs to be chosen judiciously to balance delivery costs and user satisfaction. To tackle these difficulties, in this paper, we propose an optimal auction mechanism from the perspective of the SP. In the auction, the SP determines the cache space allocation over contents and user payments based on the users' (possibly untruthful) reports of their valuations so that the SP's expected revenue is maximized. The advocated mechanism is designed to elicit true valuations from the users (incentive compatibility) and to incentivize user participation (individual rationality). In addition, we devise a computationally efficient method for calculating the optimal cache space allocation and user payments. We further examine the optimal choice of the content delivery quality for the case with a large number of users and derive a closed-form solution to compute the optimal delivery quality. ",junshan zhang,,2017.0,,arXiv,Cao2017,True,,arXiv,Not available,Mobile Edge Caching: An Optimal Auction Approach,28e9dd3fe44cfed75129777d50d2aa1e,http://arxiv.org/abs/1712.03336v1 13954," With the explosive growth of wireless data, the sheer size of the mobile traffic is challenging the capacity of current wireless systems. To tackle this challenge, mobile edge caching has emerged as a promising paradigm recently, in which the service providers (SPs) prefetch some popular contents in advance and cache them locally at the network edge. When requested, those locally cached contents can be directly delivered to users with low latency, thus alleviating the traffic load over backhaul channels during peak hours and enhancing the quality-of-experience (QoE) of users simultaneously. Due to the limited available cache space, it makes sense for the SP to cache the most profitable contents. Nevertheless, users' true valuations of contents are their private knowledge, which is unknown to the SP in general. This information asymmetry poses a significant challenge for effective caching at the SP side. Further, the cached contents can be delivered with different quality, which needs to be chosen judiciously to balance delivery costs and user satisfaction. To tackle these difficulties, in this paper, we propose an optimal auction mechanism from the perspective of the SP. In the auction, the SP determines the cache space allocation over contents and user payments based on the users' (possibly untruthful) reports of their valuations so that the SP's expected revenue is maximized. The advocated mechanism is designed to elicit true valuations from the users (incentive compatibility) and to incentivize user participation (individual rationality). In addition, we devise a computationally efficient method for calculating the optimal cache space allocation and user payments. We further examine the optimal choice of the content delivery quality for the case with a large number of users and derive a closed-form solution to compute the optimal delivery quality. ",h. poor,,2017.0,,arXiv,Cao2017,True,,arXiv,Not available,Mobile Edge Caching: An Optimal Auction Approach,28e9dd3fe44cfed75129777d50d2aa1e,http://arxiv.org/abs/1712.03336v1 13955," This paper establishes an interesting link between $k$th price auctions and Catalan numbers by showing that for distributions that have linear density, the bid function at any symmetric, increasing equilibrium of a $k$th price auction with $k\geq 3$ can be represented as a finite series of $k-2$ terms whose $\ell$th term involves the $\ell$th Catalan number. Using an integral representation of Catalan numbers, together with some classical combinatorial identities, we derive the closed form of the unique symmetric, increasing equilibrium of a $k$th price auction for a non-uniform distribution. ",abdel-hameed nawar,,2018.0,,arXiv,Nawar2018,True,,arXiv,Not available,$k$th price auctions and Catalan numbers,f4dace485aeb82d36bb3bfcaf46f6326,http://arxiv.org/abs/1808.05996v1 13956," This paper establishes an interesting link between $k$th price auctions and Catalan numbers by showing that for distributions that have linear density, the bid function at any symmetric, increasing equilibrium of a $k$th price auction with $k\geq 3$ can be represented as a finite series of $k-2$ terms whose $\ell$th term involves the $\ell$th Catalan number. Using an integral representation of Catalan numbers, together with some classical combinatorial identities, we derive the closed form of the unique symmetric, increasing equilibrium of a $k$th price auction for a non-uniform distribution. ",debapriya sen,,2018.0,,arXiv,Nawar2018,True,,arXiv,Not available,$k$th price auctions and Catalan numbers,f4dace485aeb82d36bb3bfcaf46f6326,http://arxiv.org/abs/1808.05996v1 13957," Although shill bidding is a common auction fraud, it is however very tough to detect. Due to the unavailability and lack of training data, in this study, we build a high-quality labeled shill bidding dataset based on recently collected auctions from eBay. Labeling shill biding instances with multidimensional features is a critical phase for the fraud classification task. For this purpose, we introduce a new approach to systematically label the fraud data with the help of the hierarchical clustering CURE that returns remarkable results as illustrated in the experiments. ",ahmad alzahrani,,2018.0,10.6084/m9.figshare.6993308,arXiv,Alzahrani2018,True,,arXiv,Not available,Clustering and Labelling Auction Fraud Data,6194673342206ba97b19804ed6235b25,http://arxiv.org/abs/1808.07288v1 13958," Although shill bidding is a common auction fraud, it is however very tough to detect. Due to the unavailability and lack of training data, in this study, we build a high-quality labeled shill bidding dataset based on recently collected auctions from eBay. Labeling shill biding instances with multidimensional features is a critical phase for the fraud classification task. For this purpose, we introduce a new approach to systematically label the fraud data with the help of the hierarchical clustering CURE that returns remarkable results as illustrated in the experiments. ",samira sadaoui,,2018.0,10.6084/m9.figshare.6993308,arXiv,Alzahrani2018,True,,arXiv,Not available,Clustering and Labelling Auction Fraud Data,6194673342206ba97b19804ed6235b25,http://arxiv.org/abs/1808.07288v1 13959," In this study, we present a simple stochastic order-book model for investors' swarm behaviors seen in the continuous double auction mechanism, which is employed by major global exchanges. Our study shows a characteristic called ""fat tail"" is seen in the data obtained from our model that incorporates the investors' swarm behaviors. Our model captures two swarm behaviors: one is investors' behavior to follow a trend in the historical price movement, and another is investors' behavior to send orders that contradict a trend in the historical price movement. In order to capture the features of influence by the swarm behaviors, from price data derived from our simulations using these models, we analyzed the price movement range, that is, how much the price is moved when it is continuously moved in a single direction. Depending on the type of swarm behavior, we saw a difference in the cumulative frequency distribution of this price movement range. In particular, for the model of investors who followed a trend in the historical price movement, we saw the power law in the tail of the cumulative frequency distribution of this price movement range. In addition, we analyzed the shape of the tail of the cumulative frequency distribution. The result demonstrated that one of the reasons the trend following of price occurs is that orders temporarily swarm on the order book in accordance with past price trends. ",shingo ichiki,,2014.0,10.1016/j.physa.2014.11.016,arXiv,Ichiki2014,True,,arXiv,Not available,"Simple Stochastic Order-Book Model of Swarm Behavior in Continuous Double Auction",be68e14c28487ad245eb70232f5811c1,http://arxiv.org/abs/1411.2215v1 13960," In this study, we present a simple stochastic order-book model for investors' swarm behaviors seen in the continuous double auction mechanism, which is employed by major global exchanges. Our study shows a characteristic called ""fat tail"" is seen in the data obtained from our model that incorporates the investors' swarm behaviors. Our model captures two swarm behaviors: one is investors' behavior to follow a trend in the historical price movement, and another is investors' behavior to send orders that contradict a trend in the historical price movement. In order to capture the features of influence by the swarm behaviors, from price data derived from our simulations using these models, we analyzed the price movement range, that is, how much the price is moved when it is continuously moved in a single direction. Depending on the type of swarm behavior, we saw a difference in the cumulative frequency distribution of this price movement range. In particular, for the model of investors who followed a trend in the historical price movement, we saw the power law in the tail of the cumulative frequency distribution of this price movement range. In addition, we analyzed the shape of the tail of the cumulative frequency distribution. The result demonstrated that one of the reasons the trend following of price occurs is that orders temporarily swarm on the order book in accordance with past price trends. ",katsuhiro nishinari,,2014.0,10.1016/j.physa.2014.11.016,arXiv,Ichiki2014,True,,arXiv,Not available,"Simple Stochastic Order-Book Model of Swarm Behavior in Continuous Double Auction",be68e14c28487ad245eb70232f5811c1,http://arxiv.org/abs/1411.2215v1 13961," In a unified framework we study equilibrium in the presence of an insider having information on the signal of the firm value, which is naturally connected to the fundamental price of the firm related asset. The fundamental value itself is announced at a future random (stopping) time. We consider two cases. First when the release time of information is known to the insider and then when it is unknown also to her. Allowing for very general dynamics, we study the structure of the insider's optimal strategies in equilibrium and we discuss market efficiency. In particular, we show that in the case the insider knows the information release time, the market is fully efficient. In the case the insider does not know this random time, we see that there is an equilibrium with no full efficiency, but where the sensitivity of prices is decreasing in time according with the probability that the announcement time is greater than the current time. In other words, the prices become more and more stable as the announcement approaches. ",jose corcuera,,2014.0,,arXiv,Corcuera2014,True,,arXiv,Not available,"A continuous auction model with insiders and random time of information release",cb9f5fa369fd548b4876786c222a3d6d,http://arxiv.org/abs/1411.2835v3 13962," In a unified framework we study equilibrium in the presence of an insider having information on the signal of the firm value, which is naturally connected to the fundamental price of the firm related asset. The fundamental value itself is announced at a future random (stopping) time. We consider two cases. First when the release time of information is known to the insider and then when it is unknown also to her. Allowing for very general dynamics, we study the structure of the insider's optimal strategies in equilibrium and we discuss market efficiency. In particular, we show that in the case the insider knows the information release time, the market is fully efficient. In the case the insider does not know this random time, we see that there is an equilibrium with no full efficiency, but where the sensitivity of prices is decreasing in time according with the probability that the announcement time is greater than the current time. In other words, the prices become more and more stable as the announcement approaches. ",giulia nunno,,2014.0,,arXiv,Corcuera2014,True,,arXiv,Not available,"A continuous auction model with insiders and random time of information release",cb9f5fa369fd548b4876786c222a3d6d,http://arxiv.org/abs/1411.2835v3 13963," It has been well recognized that channel state information (CSI) feedback is of great importance for dowlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual mobile station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in the network level. To this end, in this paper, we propose an alternative approach to investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through linear precoder. Specifically, we first present a non-cooperative feedback-rate control game (NFC), in which each MS selects the feedback rate to maximize its performance in a distributed way. To improve efficiency from a social optimum point of view, we then introduce pricing, called the non-cooperative feedback-rate control game with price (NFCP). The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate. The existence of the Nash equilibrium of such games is investigated, and two types of feedback protocols (FDMA and CSMA) are studied. Simulation results show that by adjusting the pricing factor, the distributed NFCP game results in close optimal performance compared with that of the centralized scheme. ",lingyang song,,2011.0,10.1109/JSAC.2012.120117,arXiv,Song2011,True,,arXiv,Not available,"Non-cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks",c2d52074c5a996c4134345d68ae966b5,http://arxiv.org/abs/1111.7101v1 13964," In a unified framework we study equilibrium in the presence of an insider having information on the signal of the firm value, which is naturally connected to the fundamental price of the firm related asset. The fundamental value itself is announced at a future random (stopping) time. We consider two cases. First when the release time of information is known to the insider and then when it is unknown also to her. Allowing for very general dynamics, we study the structure of the insider's optimal strategies in equilibrium and we discuss market efficiency. In particular, we show that in the case the insider knows the information release time, the market is fully efficient. In the case the insider does not know this random time, we see that there is an equilibrium with no full efficiency, but where the sensitivity of prices is decreasing in time according with the probability that the announcement time is greater than the current time. In other words, the prices become more and more stable as the announcement approaches. ",gergely farkas,,2014.0,,arXiv,Corcuera2014,True,,arXiv,Not available,"A continuous auction model with insiders and random time of information release",cb9f5fa369fd548b4876786c222a3d6d,http://arxiv.org/abs/1411.2835v3 13965," In a unified framework we study equilibrium in the presence of an insider having information on the signal of the firm value, which is naturally connected to the fundamental price of the firm related asset. The fundamental value itself is announced at a future random (stopping) time. We consider two cases. First when the release time of information is known to the insider and then when it is unknown also to her. Allowing for very general dynamics, we study the structure of the insider's optimal strategies in equilibrium and we discuss market efficiency. In particular, we show that in the case the insider knows the information release time, the market is fully efficient. In the case the insider does not know this random time, we see that there is an equilibrium with no full efficiency, but where the sensitivity of prices is decreasing in time according with the probability that the announcement time is greater than the current time. In other words, the prices become more and more stable as the announcement approaches. ",bernt oksendal,,2014.0,,arXiv,Corcuera2014,True,,arXiv,Not available,"A continuous auction model with insiders and random time of information release",cb9f5fa369fd548b4876786c222a3d6d,http://arxiv.org/abs/1411.2835v3 13966," We examine the problem of clearing day-ahead electricity market auctions where each bidder, whether a producer or consumer, can specify a minimum profit or maximum payment condition constraining the acceptance of a set of bid curves spanning multiple time periods in locations connected through a transmission network with linear constraints. Such types of conditions are for example considered in the Spanish and Portuguese day-ahead markets. This helps describing the recovery of start-up costs of a power plant, or analogously for a large consumer, utility reduced by a constant term. A new market model is proposed with a corresponding MILP formulation for uniform locational price day-ahead auctions, handling bids with a minimum profit or maximum payment condition in a uniform and computationally-efficient way. An exact decomposition procedure with sparse strengthened Benders cuts derived from the MILP formulation is also proposed. The MILP formulation and the decomposition procedure are similar to computationally-efficient approaches previously proposed to handle so-called block bids according to European market rules, though the clearing conditions could appear different at first sight. Both solving approaches are also valid to deal with both kinds of bids simultaneously, as block bids with a minimum acceptance ratio, generalizing fully indivisible block bids, are but a special case of the MP bids introduced here. We argue in favour of the MP bids by comparing them to previous models for minimum profit conditions proposed in the academic literature, and to the model for minimum income conditions used by the Spanish power exchange OMIE. ",mehdi madani,,2015.0,,arXiv,Madani2015,True,,arXiv,Not available,"Revisiting minimum profit conditions in uniform price day-ahead electricity auctions",599a5340d0a901ba7c1f8844a90791c5,http://arxiv.org/abs/1508.07967v4 13967," We examine the problem of clearing day-ahead electricity market auctions where each bidder, whether a producer or consumer, can specify a minimum profit or maximum payment condition constraining the acceptance of a set of bid curves spanning multiple time periods in locations connected through a transmission network with linear constraints. Such types of conditions are for example considered in the Spanish and Portuguese day-ahead markets. This helps describing the recovery of start-up costs of a power plant, or analogously for a large consumer, utility reduced by a constant term. A new market model is proposed with a corresponding MILP formulation for uniform locational price day-ahead auctions, handling bids with a minimum profit or maximum payment condition in a uniform and computationally-efficient way. An exact decomposition procedure with sparse strengthened Benders cuts derived from the MILP formulation is also proposed. The MILP formulation and the decomposition procedure are similar to computationally-efficient approaches previously proposed to handle so-called block bids according to European market rules, though the clearing conditions could appear different at first sight. Both solving approaches are also valid to deal with both kinds of bids simultaneously, as block bids with a minimum acceptance ratio, generalizing fully indivisible block bids, are but a special case of the MP bids introduced here. We argue in favour of the MP bids by comparing them to previous models for minimum profit conditions proposed in the academic literature, and to the model for minimum income conditions used by the Spanish power exchange OMIE. ",mathieu vyve,,2015.0,,arXiv,Madani2015,True,,arXiv,Not available,"Revisiting minimum profit conditions in uniform price day-ahead electricity auctions",599a5340d0a901ba7c1f8844a90791c5,http://arxiv.org/abs/1508.07967v4 13968," Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. ",aleksandra aloric,,2015.0,10.1371/journal.pone.0154606,arXiv,Aloric2015,True,,arXiv,Not available,"Emergence of Cooperative Long-term Market Loyalty in Double Auction Markets",5feb143f94852bac58dd3405ddc9540b,http://arxiv.org/abs/1510.07927v2 13969," Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. ",peter sollich,,2015.0,10.1371/journal.pone.0154606,arXiv,Aloric2015,True,,arXiv,Not available,"Emergence of Cooperative Long-term Market Loyalty in Double Auction Markets",5feb143f94852bac58dd3405ddc9540b,http://arxiv.org/abs/1510.07927v2 13970," Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. ",peter mcburney,,2015.0,10.1371/journal.pone.0154606,arXiv,Aloric2015,True,,arXiv,Not available,"Emergence of Cooperative Long-term Market Loyalty in Double Auction Markets",5feb143f94852bac58dd3405ddc9540b,http://arxiv.org/abs/1510.07927v2 13971," Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. ",tobias galla,,2015.0,10.1371/journal.pone.0154606,arXiv,Aloric2015,True,,arXiv,Not available,"Emergence of Cooperative Long-term Market Loyalty in Double Auction Markets",5feb143f94852bac58dd3405ddc9540b,http://arxiv.org/abs/1510.07927v2 13972," The multi-tiered concept of Internet of Things (IoT) devices, cloudlets and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage and communications resources to the users. To this end, this paper proposes a new hierarchical model by introducing the concept of field, shallow, and deep cloudlets where the cloudlet tier itself is designed in three hierarchical levels based on the principle of LTE-Advanced backhaul network. Accordingly, we explore a two time scale approach in which the computing resources are offered in an auction-based profit maximization manner and then the communications resources are allocated to satisfy the users' QoS. ",abbas kiani,,2016.0,10.1109/JIOT.2017.2750030,"IEEE Internet of Things Journal, vol. 4, no. 6, pp. 2082-2091, Dec. 2017",Kiani2016,True,,arXiv,Not available,"Towards Hierarchical Mobile Edge Computing: An Auction-Based Profit Maximization Approach",75a695fcdfd62b188bd688bdbe804b09,http://arxiv.org/abs/1612.00122v1 13973," The multi-tiered concept of Internet of Things (IoT) devices, cloudlets and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage and communications resources to the users. To this end, this paper proposes a new hierarchical model by introducing the concept of field, shallow, and deep cloudlets where the cloudlet tier itself is designed in three hierarchical levels based on the principle of LTE-Advanced backhaul network. Accordingly, we explore a two time scale approach in which the computing resources are offered in an auction-based profit maximization manner and then the communications resources are allocated to satisfy the users' QoS. ",nirwan ansari,,2016.0,10.1109/JIOT.2017.2750030,"IEEE Internet of Things Journal, vol. 4, no. 6, pp. 2082-2091, Dec. 2017",Kiani2016,True,,arXiv,Not available,"Towards Hierarchical Mobile Edge Computing: An Auction-Based Profit Maximization Approach",75a695fcdfd62b188bd688bdbe804b09,http://arxiv.org/abs/1612.00122v1 13974," It has been well recognized that channel state information (CSI) feedback is of great importance for dowlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual mobile station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in the network level. To this end, in this paper, we propose an alternative approach to investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through linear precoder. Specifically, we first present a non-cooperative feedback-rate control game (NFC), in which each MS selects the feedback rate to maximize its performance in a distributed way. To improve efficiency from a social optimum point of view, we then introduce pricing, called the non-cooperative feedback-rate control game with price (NFCP). The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate. The existence of the Nash equilibrium of such games is investigated, and two types of feedback protocols (FDMA and CSMA) are studied. Simulation results show that by adjusting the pricing factor, the distributed NFCP game results in close optimal performance compared with that of the centralized scheme. ",zhu han,,2011.0,10.1109/JSAC.2012.120117,arXiv,Song2011,True,,arXiv,Not available,"Non-cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks",c2d52074c5a996c4134345d68ae966b5,http://arxiv.org/abs/1111.7101v1 13975," A feasible, secure and collusion-attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multi-party circular quantum key agreement. In the proposed protocol, the set of all ($n$) bidders is grouped in to $l$ subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All $n$ bidders and auctioneer initiate one round of communication, and each of them prepares $l$ copies of a $\left(r-1\right)$-partite entangled state (one for each sub-circle), where $r=\frac{n}{l}+1$. The efficiency and security\textcolor{blue}{{} }of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in $l$, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability is shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier. ",rishi sharma,,2016.0,10.1007/s11128-017-1620-0,"Quantum Inf. Process. 16, 169 (2017)",Sharma2016,True,,arXiv,Not available,"Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement",0e851cbd3a3cdf6652ac5855258ac727,http://arxiv.org/abs/1612.08844v1 13976," A feasible, secure and collusion-attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multi-party circular quantum key agreement. In the proposed protocol, the set of all ($n$) bidders is grouped in to $l$ subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All $n$ bidders and auctioneer initiate one round of communication, and each of them prepares $l$ copies of a $\left(r-1\right)$-partite entangled state (one for each sub-circle), where $r=\frac{n}{l}+1$. The efficiency and security\textcolor{blue}{{} }of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in $l$, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability is shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier. ",kishore thapliyal,,2016.0,10.1007/s11128-017-1620-0,"Quantum Inf. Process. 16, 169 (2017)",Sharma2016,True,,arXiv,Not available,"Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement",0e851cbd3a3cdf6652ac5855258ac727,http://arxiv.org/abs/1612.08844v1 13977," A feasible, secure and collusion-attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multi-party circular quantum key agreement. In the proposed protocol, the set of all ($n$) bidders is grouped in to $l$ subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All $n$ bidders and auctioneer initiate one round of communication, and each of them prepares $l$ copies of a $\left(r-1\right)$-partite entangled state (one for each sub-circle), where $r=\frac{n}{l}+1$. The efficiency and security\textcolor{blue}{{} }of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in $l$, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability is shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier. ",anirban pathak,,2016.0,10.1007/s11128-017-1620-0,"Quantum Inf. Process. 16, 169 (2017)",Sharma2016,True,,arXiv,Not available,"Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement",0e851cbd3a3cdf6652ac5855258ac727,http://arxiv.org/abs/1612.08844v1 13978," In Chinese societies, superstition is of paramount importance, and vehicle license plates with desirable numbers can fetch very high prices in auctions. Unlike other valuable items, license plates are not allocated an estimated price before auction. I propose that the task of predicting plate prices can be viewed as a natural language processing (NLP) task, as the value depends on the meaning of each individual character on the plate and its semantics. I construct a deep recurrent neural network (RNN) to predict the prices of vehicle license plates in Hong Kong, based on the characters on a plate. I demonstrate the importance of having a deep network and of retraining. Evaluated on 13 years of historical auction prices, the deep RNN outperforms previous models by a significant margin. ",vinci chow,,2017.0,,arXiv,Chow2017,True,,arXiv,Not available,"Predicting Auction Price of Vehicle License Plate with Deep Recurrent Neural Network",8f18668f29f34b8e4ed76d7acfe4d150,http://arxiv.org/abs/1701.08711v3 13979," Real-time optimization of traffic flow addresses important practical problems: reducing a driver's wasted time, improving city-wide efficiency, reducing gas emissions and improving air quality. Much of the current research in traffic-light optimization relies on extending the capabilities of traffic lights to either communicate with each other or communicate with vehicles. However, before such capabilities become ubiquitous, opportunities exist to improve traffic lights by being more responsive to current traffic situations within the current, already deployed, infrastructure. In this paper, we introduce a traffic light controller that employs bidding within micro-auctions to efficiently incorporate traffic sensor information; no other outside sources of information are assumed. We train and test traffic light controllers on large-scale data collected from opted-in Android cell-phone users over a period of several months in Mountain View, California and the River North neighborhood of Chicago, Illinois. The learned auction-based controllers surpass (in both the relevant metrics of road-capacity and mean travel time) the currently deployed lights, optimized static-program lights, and longer-term planning approaches, in both cities, measured using real user driving data. ",shumeet baluja,,2017.0,,arXiv,Baluja2017,True,,arXiv,Not available,"Traffic Lights with Auction-Based Controllers: Algorithms and Real-World Data",34dc913208fb791f4a977e8e99b00b3b,http://arxiv.org/abs/1702.01205v1 13980," Real-time optimization of traffic flow addresses important practical problems: reducing a driver's wasted time, improving city-wide efficiency, reducing gas emissions and improving air quality. Much of the current research in traffic-light optimization relies on extending the capabilities of traffic lights to either communicate with each other or communicate with vehicles. However, before such capabilities become ubiquitous, opportunities exist to improve traffic lights by being more responsive to current traffic situations within the current, already deployed, infrastructure. In this paper, we introduce a traffic light controller that employs bidding within micro-auctions to efficiently incorporate traffic sensor information; no other outside sources of information are assumed. We train and test traffic light controllers on large-scale data collected from opted-in Android cell-phone users over a period of several months in Mountain View, California and the River North neighborhood of Chicago, Illinois. The learned auction-based controllers surpass (in both the relevant metrics of road-capacity and mean travel time) the currently deployed lights, optimized static-program lights, and longer-term planning approaches, in both cities, measured using real user driving data. ",michele covell,,2017.0,,arXiv,Baluja2017,True,,arXiv,Not available,"Traffic Lights with Auction-Based Controllers: Algorithms and Real-World Data",34dc913208fb791f4a977e8e99b00b3b,http://arxiv.org/abs/1702.01205v1 13981," Real-time optimization of traffic flow addresses important practical problems: reducing a driver's wasted time, improving city-wide efficiency, reducing gas emissions and improving air quality. Much of the current research in traffic-light optimization relies on extending the capabilities of traffic lights to either communicate with each other or communicate with vehicles. However, before such capabilities become ubiquitous, opportunities exist to improve traffic lights by being more responsive to current traffic situations within the current, already deployed, infrastructure. In this paper, we introduce a traffic light controller that employs bidding within micro-auctions to efficiently incorporate traffic sensor information; no other outside sources of information are assumed. We train and test traffic light controllers on large-scale data collected from opted-in Android cell-phone users over a period of several months in Mountain View, California and the River North neighborhood of Chicago, Illinois. The learned auction-based controllers surpass (in both the relevant metrics of road-capacity and mean travel time) the currently deployed lights, optimized static-program lights, and longer-term planning approaches, in both cities, measured using real user driving data. ",rahul sukthankar,,2017.0,,arXiv,Baluja2017,True,,arXiv,Not available,"Traffic Lights with Auction-Based Controllers: Algorithms and Real-World Data",34dc913208fb791f4a977e8e99b00b3b,http://arxiv.org/abs/1702.01205v1 13982," In heterogeneous cellular network, task scheduling for computation offloading is one of the biggest challenges. Most works focus on alleviating heavy burden of macro base stations by moving the computation tasks on macro-cell user equipment (MUE) to remote cloud or small-cell base stations. But the selfishness of network users is seldom considered. Motivated by the cloud edge computing, this paper provides incentive for task transfer from macro cell users to small cell base stations. The proposed incentive scheme utilizes small cell user equipment to provide relay service. The problem of computation offloading is modelled as a two-stage auction, in which the remote MUEs with common social character can form a group and then buy the computation resource of small-cell base stations with the relay of small cell user equipment. A two-stage auction scheme named TARCO is contributed to maximize utilities for both sellers and buyers in the network. The truthful, individual rationality and budget balance of the TARCO are also proved in this paper. In addition, two algorithms are proposed to further refine TARCO on the social welfare of the network. Extensive simulation results demonstrate that, TARCO is better than random algorithm by about 104.90% in terms of average utility of MUEs, while the performance of TARCO is further improved up to 28.75% and 17.06% by the proposed two algorithms, respectively. ",long chen,,2017.0,10.1109/TSC.2018.2792024,"IEEE Transactions on Services Computing, 2018",Chen2017,True,,arXiv,Not available,"TARCO: Two-Stage Auction for D2D Relay Aided Computation Resource Allocation in Hetnet",233435fa4e92079369395b7f29be9033,http://arxiv.org/abs/1711.03660v1 13983," In heterogeneous cellular network, task scheduling for computation offloading is one of the biggest challenges. Most works focus on alleviating heavy burden of macro base stations by moving the computation tasks on macro-cell user equipment (MUE) to remote cloud or small-cell base stations. But the selfishness of network users is seldom considered. Motivated by the cloud edge computing, this paper provides incentive for task transfer from macro cell users to small cell base stations. The proposed incentive scheme utilizes small cell user equipment to provide relay service. The problem of computation offloading is modelled as a two-stage auction, in which the remote MUEs with common social character can form a group and then buy the computation resource of small-cell base stations with the relay of small cell user equipment. A two-stage auction scheme named TARCO is contributed to maximize utilities for both sellers and buyers in the network. The truthful, individual rationality and budget balance of the TARCO are also proved in this paper. In addition, two algorithms are proposed to further refine TARCO on the social welfare of the network. Extensive simulation results demonstrate that, TARCO is better than random algorithm by about 104.90% in terms of average utility of MUEs, while the performance of TARCO is further improved up to 28.75% and 17.06% by the proposed two algorithms, respectively. ",jigang wu,,2017.0,10.1109/TSC.2018.2792024,"IEEE Transactions on Services Computing, 2018",Chen2017,True,,arXiv,Not available,"TARCO: Two-Stage Auction for D2D Relay Aided Computation Resource Allocation in Hetnet",233435fa4e92079369395b7f29be9033,http://arxiv.org/abs/1711.03660v1 13984," In heterogeneous cellular network, task scheduling for computation offloading is one of the biggest challenges. Most works focus on alleviating heavy burden of macro base stations by moving the computation tasks on macro-cell user equipment (MUE) to remote cloud or small-cell base stations. But the selfishness of network users is seldom considered. Motivated by the cloud edge computing, this paper provides incentive for task transfer from macro cell users to small cell base stations. The proposed incentive scheme utilizes small cell user equipment to provide relay service. The problem of computation offloading is modelled as a two-stage auction, in which the remote MUEs with common social character can form a group and then buy the computation resource of small-cell base stations with the relay of small cell user equipment. A two-stage auction scheme named TARCO is contributed to maximize utilities for both sellers and buyers in the network. The truthful, individual rationality and budget balance of the TARCO are also proved in this paper. In addition, two algorithms are proposed to further refine TARCO on the social welfare of the network. Extensive simulation results demonstrate that, TARCO is better than random algorithm by about 104.90% in terms of average utility of MUEs, while the performance of TARCO is further improved up to 28.75% and 17.06% by the proposed two algorithms, respectively. ",xinxiang zhang,,2017.0,10.1109/TSC.2018.2792024,"IEEE Transactions on Services Computing, 2018",Chen2017,True,,arXiv,Not available,"TARCO: Two-Stage Auction for D2D Relay Aided Computation Resource Allocation in Hetnet",233435fa4e92079369395b7f29be9033,http://arxiv.org/abs/1711.03660v1 13985," It has been well recognized that channel state information (CSI) feedback is of great importance for dowlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual mobile station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in the network level. To this end, in this paper, we propose an alternative approach to investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through linear precoder. Specifically, we first present a non-cooperative feedback-rate control game (NFC), in which each MS selects the feedback rate to maximize its performance in a distributed way. To improve efficiency from a social optimum point of view, we then introduce pricing, called the non-cooperative feedback-rate control game with price (NFCP). The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate. The existence of the Nash equilibrium of such games is investigated, and two types of feedback protocols (FDMA and CSMA) are studied. Simulation results show that by adjusting the pricing factor, the distributed NFCP game results in close optimal performance compared with that of the centralized scheme. ",zhongshan zhang,,2011.0,10.1109/JSAC.2012.120117,arXiv,Song2011,True,,arXiv,Not available,"Non-cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks",c2d52074c5a996c4134345d68ae966b5,http://arxiv.org/abs/1111.7101v1 13986," In this paper a new mathematical model is proposed for task scheduling and resource allocation in Grid systems. In this novel model, load balancing, starvation prevention and failing strategies are stated as the constraints and the solution is restricted with a predefined quality of service for users with different priorities. These strategies are defined by resource providers based on the amount of submitted jobs to Grid. To solve the proposed model, a modern approximate Auction-based algorithm is developed and it is implemented as a prototype of Grid simulator namely Multi-S-Grid. The results are illustrated on 18 different large-scale Grid systems with different random capabilities and different users. The outcomes reveal the reasonable performance of the proposed Auction-based algorithm to solve Grid system optimization models. ",arash gahrouei,,2018.0,,arXiv,Gahrouei2018,True,,arXiv,Not available,"Auction-based approximate algorithm for Grid system scheduling under resource provider strategies",f673764b105c506fde0256b759ef5bbf,http://arxiv.org/abs/1803.04385v1 13987," In this paper a new mathematical model is proposed for task scheduling and resource allocation in Grid systems. In this novel model, load balancing, starvation prevention and failing strategies are stated as the constraints and the solution is restricted with a predefined quality of service for users with different priorities. These strategies are defined by resource providers based on the amount of submitted jobs to Grid. To solve the proposed model, a modern approximate Auction-based algorithm is developed and it is implemented as a prototype of Grid simulator namely Multi-S-Grid. The results are illustrated on 18 different large-scale Grid systems with different random capabilities and different users. The outcomes reveal the reasonable performance of the proposed Auction-based algorithm to solve Grid system optimization models. ",mehdi ghatee,,2018.0,,arXiv,Gahrouei2018,True,,arXiv,Not available,"Auction-based approximate algorithm for Grid system scheduling under resource provider strategies",f673764b105c506fde0256b759ef5bbf,http://arxiv.org/abs/1803.04385v1 13988," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",ahmed abdelhadi,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 13989," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",haya shajaiah,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 13990," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",charles clancy,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 13991," Empirical game-theoretic analysis (EGTA) has recently been applied successfully to analyze the behavior of large numbers of competing traders in a continuous double auction market. Multiagent simulation methods like EGTA are useful for studying complex strategic environments like a stock market, where it is not feasible to solve analytically for the rational behavior of each agent. A weakness of simulation-based methods in strategic settings, however, is that it is typically impossible to prove that the strategy profile assigned to the simulated agents is stable, as in a Nash equilibrium. I propose using reinforcement learning to analyze the regret of supposed Nash-equilibrium strategy profiles found by EGTA. I have developed a new library of reinforcement learning tools, which I have integrated into an extended version of the market simulator from our prior work. I provide evidence for the effectiveness of our library methods, both on a suite of benchmark problems from the literature, and on non-equilibrium strategy profiles in our market environment. Finally, I use our new reinforcement learning tools to provide evidence that the equilibria found by EGTA in our recent continuous double auction study are likely to have only negligible regret, even with respect to an extended strategy space. ",mason wright,,2016.0,,arXiv,Wright2016,True,,arXiv,Not available,"Using Reinforcement Learning to Validate Empirical Game-Theoretic Analysis: A Continuous Double Auction Study",94c650ee22363db4f127a6d972e21b38,http://arxiv.org/abs/1604.06710v1 13992," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",weiran shen,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13993," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",binghui peng,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13994," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",hanpeng liu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13995," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",michael zhang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13996," It has been well recognized that channel state information (CSI) feedback is of great importance for dowlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual mobile station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in the network level. To this end, in this paper, we propose an alternative approach to investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through linear precoder. Specifically, we first present a non-cooperative feedback-rate control game (NFC), in which each MS selects the feedback rate to maximize its performance in a distributed way. To improve efficiency from a social optimum point of view, we then introduce pricing, called the non-cooperative feedback-rate control game with price (NFCP). The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate. The existence of the Nash equilibrium of such games is investigated, and two types of feedback protocols (FDMA and CSMA) are studied. Simulation results show that by adjusting the pricing factor, the distributed NFCP game results in close optimal performance compared with that of the centralized scheme. ",bingli jiao,,2011.0,10.1109/JSAC.2012.120117,arXiv,Song2011,True,,arXiv,Not available,"Non-cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks",c2d52074c5a996c4134345d68ae966b5,http://arxiv.org/abs/1111.7101v1 13997," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",ruohan qian,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13998," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",yan hong,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 13999," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zhi guo,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14000," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zongyao ding,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14001," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pengjun lu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14002," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pingzhong tang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14003," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",ian gemp,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 14004," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",sridhar mahadevan,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 14005," We consider a general class of Bayesian Games where each players utility depends on his type (possibly multidimensional) and on the strategy profile and where players' types are distributed independently. We show that if their full information version for any fixed instance of the type profile is a smooth game then the Price of Anarchy bound implied by the smoothness property, carries over to the Bayes-Nash Price of Anarchy. We show how some proofs from the literature (item bidding auctions, greedy auctions) can be cast as smoothness proofs or be simplified using smoothness. For first price item bidding with fractionally subadditive bidders we actually manage to improve by much the existing result \cite{Hassidim2011a} from 4 to $\frac{e}{e-1}\approx 1.58$. This also shows a very interesting separation between first and second price item bidding since second price item bidding has PoA at least 2 even under complete information. For a larger class of Bayesian Games where the strategy space of a player also changes with his type we are able to show that a slightly stronger definition of smoothness also implies a Bayes-Nash PoA bound. We show how weighted congestion games actually satisfy this stronger definition of smoothness. This allows us to show that the inefficiency bounds of weighted congestion games known in the literature carry over to incomplete versions where the weights of the players are private information. We also show how an incomplete version of a natural class of monotone valid utility games, called effort market games are universally $(1,1)$-smooth. Hence, we show that incomplete versions of effort market games where the abilities of the players and their budgets are private information has Bayes-Nash PoA at most 2. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Games and the Smoothness Framework,700362cb9ca621778a3fbe870ce57db6,http://arxiv.org/abs/1203.5155v1 14006," We introduce a new sample complexity measure, which we refer to as split-sample growth rate. For any hypothesis $H$ and for any sample $S$ of size $m$, the split-sample growth rate $\hat{\tau}_H(m)$ counts how many different hypotheses can empirical risk minimization output on any sub-sample of $S$ of size $m/2$. We show that the expected generalization error is upper bounded by $O\left(\sqrt{\frac{\log(\hat{\tau}_H(2m))}{m}}\right)$. Our result is enabled by a strengthening of the Rademacher complexity analysis of the expected generalization error. We show that this sample complexity measure, greatly simplifies the analysis of the sample complexity of optimal auction design, for many auction classes studied in the literature. Their sample complexity can be derived solely by noticing that in these auction classes, ERM on any sample or sub-sample will pick parameters that are equal to one of the points in the sample. ",vasilis syrgkanis,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,"A Sample Complexity Measure with Applications to Learning Optimal Auctions",f2815595a5693bfca8ece62506201cec,http://arxiv.org/abs/1704.02598v2 14007," The optimal pricing problem is a fundamental problem that arises in combinatorial auctions. Suppose that there is one seller who has indivisible items and multiple buyers who want to purchase a combination of the items. The seller wants to sell his items for the highest possible prices, and each buyer wants to maximize his utility (i.e., valuation minus payment) as long as his payment does not exceed his budget. The optimal pricing problem seeks a price of each item and an assignment of items to buyers such that every buyer achieves the maximum utility under the prices. The goal of the problem is to maximize the total payment from buyers. In this paper, we consider the case that the valuations are submodular. We show that the problem is computationally hard even if there exists only one buyer. Then we propose approximation algorithms for the unlimited budget case. We also extend the algorithm for the limited budget case when there exists one buyer and multiple buyers collaborate with each other. ",takanori maehara,,2016.0,,arXiv,Maehara2016,True,,arXiv,Not available,Optimal Pricing for Submodular Valuations with Bounded Curvature,e4d17dcf5b3a2032ef314f88a682efed,http://arxiv.org/abs/1611.07605v1 14008," Multi-dimensional mean-payoff and energy games provide the mathematical foundation for the quantitative study of reactive systems, and play a central role in the emerging quantitative theory of verification and synthesis. In this work, we study the strategy synthesis problem for games with such multi-dimensional objectives along with a parity condition, a canonical way to express $\omega$-regular conditions. While in general, the winning strategies in such games may require infinite memory, for synthesis the most relevant problem is the construction of a finite-memory winning strategy (if one exists). Our main contributions are as follows. First, we show a tight exponential bound (matching upper and lower bounds) on the memory required for finite-memory winning strategies in both multi-dimensional mean-payoff and energy games along with parity objectives. This significantly improves the triple exponential upper bound for multi energy games (without parity) that could be derived from results in literature for games on VASS (vector addition systems with states). Second, we present an optimal symbolic and incremental algorithm to compute a finite-memory winning strategy (if one exists) in such games. Finally, we give a complete characterization of when finite memory of strategies can be traded off for randomness. In particular, we show that for one-dimension mean-payoff parity games, randomized memoryless strategies are as powerful as their pure finite-memory counterparts. ",krishnendu chatterjee,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Synthesis for Multi-dimensional Quantitative Objectives,56a61b731c08fd265bd83e7e33db635d,http://arxiv.org/abs/1201.5073v5 14009," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",yiding feng,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 14010," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",jason hartline,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 14011," In settings where full incentive-compatibility is not available, such as core-constraint combinatorial auctions and budget-balanced combinatorial exchanges, we may wish to design mechanisms that are as incentive-compatible as possible. This paper offers a new characterization of approximate incentive-compatibility by casting the pricing problem as a meta-game between the center and the participating agents. Through a suitable set of simplifications, we describe the equilibrium of this game as a variational problem. We use this to characterize the space of optimal prices, enabling closed-form solutions in restricted cases, and numerically-determined prices in the general case. We offer theory motivating this approach, and numerical experiments showing its application. ",benjamin lubin,,2015.0,,arXiv,Lubin2015,True,,arXiv,Not available,Games and Meta-Games: Pricing Rules for Combinatorial Mechanisms,8eda734471a1abf5b64efbf8aa7cad1a,http://arxiv.org/abs/1503.06244v1 14014," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",devansh dikshit,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 14015," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",y. narahari,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 14016," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",daniel neider,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 14017," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",roman rabinovich,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 14018," We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions. ",martin zimmermann,,2012.0,10.4204/EPTCS.96.13,"EPTCS 96, 2012, pp. 169-182",Neider2012,True,,arXiv,Not available,Down the Borel Hierarchy: Solving Muller Games via Safety Games,9f85394de7aa423a7a72c993acdf553c,http://arxiv.org/abs/1210.2457v1 14019," Multi-dimensional mean-payoff and energy games provide the mathematical foundation for the quantitative study of reactive systems, and play a central role in the emerging quantitative theory of verification and synthesis. In this work, we study the strategy synthesis problem for games with such multi-dimensional objectives along with a parity condition, a canonical way to express $\omega$-regular conditions. While in general, the winning strategies in such games may require infinite memory, for synthesis the most relevant problem is the construction of a finite-memory winning strategy (if one exists). Our main contributions are as follows. First, we show a tight exponential bound (matching upper and lower bounds) on the memory required for finite-memory winning strategies in both multi-dimensional mean-payoff and energy games along with parity objectives. This significantly improves the triple exponential upper bound for multi energy games (without parity) that could be derived from results in literature for games on VASS (vector addition systems with states). Second, we present an optimal symbolic and incremental algorithm to compute a finite-memory winning strategy (if one exists) in such games. Finally, we give a complete characterization of when finite memory of strategies can be traded off for randomness. In particular, we show that for one-dimension mean-payoff parity games, randomized memoryless strategies are as powerful as their pure finite-memory counterparts. ",mickael randour,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Synthesis for Multi-dimensional Quantitative Objectives,56a61b731c08fd265bd83e7e33db635d,http://arxiv.org/abs/1201.5073v5 14020," We study two-player zero-sum games over infinite-state graphs with boundedness conditions. Our first contribution is about the strategy complexity, i.e the memory required for winning strategies: we prove that over general infinite-state graphs, memoryless strategies are sufficient for finitary B\""uchi games, and finite-memory suffices for finitary parity games. We then study pushdown boundedness games, with two contributions. First we prove a collapse result for pushdown omega B games, implying the decidability of solving these games. Second we consider pushdown games with finitary parity along with stack boundedness conditions, and show that solving these games is EXPTIME-complete. ",krishnendu chatterjee,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Infinite-state games with finitary conditions,a2f4a20556f9aa17e8865d987d61f2e4,http://arxiv.org/abs/1301.2661v2 14021," We study two-player zero-sum games over infinite-state graphs with boundedness conditions. Our first contribution is about the strategy complexity, i.e the memory required for winning strategies: we prove that over general infinite-state graphs, memoryless strategies are sufficient for finitary B\""uchi games, and finite-memory suffices for finitary parity games. We then study pushdown boundedness games, with two contributions. First we prove a collapse result for pushdown omega B games, implying the decidability of solving these games. Second we consider pushdown games with finitary parity along with stack boundedness conditions, and show that solving these games is EXPTIME-complete. ",nathanael fijalkow,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Infinite-state games with finitary conditions,a2f4a20556f9aa17e8865d987d61f2e4,http://arxiv.org/abs/1301.2661v2 14022," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",peter duersch,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 14023," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",joerg oechssler,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 14024," We characterize the class of symmetric two-player games in which tit-for-tat cannot be beaten even by very sophisticated opponents in a repeated game. It turns out to be the class of exact potential games. More generally, there is a class of simple imitation rules that includes tit-for-tat but also imitate-the-best and imitate-if-better. Every decision rule in this class is essentially unbeatable in exact potential games. Our results apply to many interesting games including all symmetric 2x2 games, and standard examples of Cournot duopoly, price competition, public goods games, common pool resource games, and minimum effort coordination games. ",burkhard schipper,,2013.0,,arXiv,Duersch2013,True,,arXiv,Not available,When is tit-for-tat unbeatable?,5f87750c8a6b04c51e03e6435bb1a168,http://arxiv.org/abs/1301.5683v1 14025," The concept of dimension in simple games was introduced as a measure of the remoteness of a given game from a weighted game. Taylor and Zwicker (1993) demonstrated that the dimension of a simple game can grow exponentially in the number of players. However, the problem of worst-case growth of the dimension in complete games was left open. Freixas and Puente (2008) showed that complete games of arbitrary dimension exist and, in particular, their examples demonstrate that the worst-case growth of dimension in complete games is at least linear. In this paper, using a novel technique of Kurz and Napel (2016), we demonstrate that the worst-case growth of dimension in complete simple games is exponential in the number of players. ",liam o'dwyer,,2016.0,,arXiv,O'Dwyer2016,True,,arXiv,Not available,Growth of Dimension in Complete Simple Games,e754e01e214da83fa5dffd3ba143b268,http://arxiv.org/abs/1605.05114v1 14026," The concept of dimension in simple games was introduced as a measure of the remoteness of a given game from a weighted game. Taylor and Zwicker (1993) demonstrated that the dimension of a simple game can grow exponentially in the number of players. However, the problem of worst-case growth of the dimension in complete games was left open. Freixas and Puente (2008) showed that complete games of arbitrary dimension exist and, in particular, their examples demonstrate that the worst-case growth of dimension in complete games is at least linear. In this paper, using a novel technique of Kurz and Napel (2016), we demonstrate that the worst-case growth of dimension in complete simple games is exponential in the number of players. ",arkadii slinko,,2016.0,,arXiv,O'Dwyer2016,True,,arXiv,Not available,Growth of Dimension in Complete Simple Games,e754e01e214da83fa5dffd3ba143b268,http://arxiv.org/abs/1605.05114v1 14027," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",jason hartline,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 14028," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",vasilis syrgkanis,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 14029," Recent price-of-anarchy analyses of games of complete information suggest that coarse correlated equilibria, which characterize outcomes resulting from no-regret learning dynamics, have near-optimal welfare. This work provides two main technical results that lift this conclusion to games of incomplete information, a.k.a., Bayesian games. First, near-optimal welfare in Bayesian games follows directly from the smoothness-based proof of near-optimal welfare in the same game when the private information is public. Second, no-regret learning dynamics converge to Bayesian coarse correlated equilibrium in these incomplete information games. These results are enabled by interpretation of a Bayesian game as a stochastic game of complete information. ",eva tardos,,2015.0,,arXiv,Hartline2015,True,,arXiv,Not available,No-Regret Learning in Bayesian Games,77a24f67e8f3df370b9922648a5f383a,http://arxiv.org/abs/1507.00418v2 14030," Multi-dimensional mean-payoff and energy games provide the mathematical foundation for the quantitative study of reactive systems, and play a central role in the emerging quantitative theory of verification and synthesis. In this work, we study the strategy synthesis problem for games with such multi-dimensional objectives along with a parity condition, a canonical way to express $\omega$-regular conditions. While in general, the winning strategies in such games may require infinite memory, for synthesis the most relevant problem is the construction of a finite-memory winning strategy (if one exists). Our main contributions are as follows. First, we show a tight exponential bound (matching upper and lower bounds) on the memory required for finite-memory winning strategies in both multi-dimensional mean-payoff and energy games along with parity objectives. This significantly improves the triple exponential upper bound for multi energy games (without parity) that could be derived from results in literature for games on VASS (vector addition systems with states). Second, we present an optimal symbolic and incremental algorithm to compute a finite-memory winning strategy (if one exists) in such games. Finally, we give a complete characterization of when finite memory of strategies can be traded off for randomness. In particular, we show that for one-dimension mean-payoff parity games, randomized memoryless strategies are as powerful as their pure finite-memory counterparts. ",jean-francois raskin,,2012.0,,arXiv,Chatterjee2012,True,,arXiv,Not available,Strategy Synthesis for Multi-dimensional Quantitative Objectives,56a61b731c08fd265bd83e7e33db635d,http://arxiv.org/abs/1201.5073v5 14031," Formal models of games help us account for and predict behavior, leading to more robust and innovative designs. While the games research community has proposed many formalisms for both the ""game half"" (game models, game description languages) and the ""human half"" (player modeling) of a game experience, little attention has been paid to the interface between the two, particularly where it concerns the player expressing her intent toward the game. We describe an analytical and computational toolbox based on programming language theory to examine the phenomenon sitting between control schemes and game rules, which we identify as a distinct player intent language for each game. ",chris martens,,2017.0,,arXiv,Martens2017,True,,arXiv,Not available,Languages of Play: Towards semantic foundations for game interfaces,8576a4bab0e2503578a2c34be35242a7,http://arxiv.org/abs/1703.05410v1 14032," Formal models of games help us account for and predict behavior, leading to more robust and innovative designs. While the games research community has proposed many formalisms for both the ""game half"" (game models, game description languages) and the ""human half"" (player modeling) of a game experience, little attention has been paid to the interface between the two, particularly where it concerns the player expressing her intent toward the game. We describe an analytical and computational toolbox based on programming language theory to examine the phenomenon sitting between control schemes and game rules, which we identify as a distinct player intent language for each game. ",matthew hammer,,2017.0,,arXiv,Martens2017,True,,arXiv,Not available,Languages of Play: Towards semantic foundations for game interfaces,8576a4bab0e2503578a2c34be35242a7,http://arxiv.org/abs/1703.05410v1 14033," By resorting to the vector space structure of finite games, skew-symmetric games (SSGs) are proposed and investigated as a natural subspace of finite games. First of all, for two player games, it is shown that the skew-symmetric games form an orthogonal complement of the symmetric games. Then for a general SSG its linear representation is given, which can be used to verify whether a finite game is skew-symmetric. Furthermore, some properties of SSGs are also obtained in the light of its vector subspace structure. Finally, a symmetry-based decomposition of finite games is proposed, which consists of three mutually orthogonal subspaces: symmetric subspace, skew-symmetric subspace and asymmetric subspace. An illustrative example is presented to demonstrate this decomposition. ",yaqi hao,,2017.0,,arXiv,Hao2017,True,,arXiv,Not available,On Skew-Symmetric Games,dd251b83b90bffa70675bda99c55872b,http://arxiv.org/abs/1712.02962v1 14034," By resorting to the vector space structure of finite games, skew-symmetric games (SSGs) are proposed and investigated as a natural subspace of finite games. First of all, for two player games, it is shown that the skew-symmetric games form an orthogonal complement of the symmetric games. Then for a general SSG its linear representation is given, which can be used to verify whether a finite game is skew-symmetric. Furthermore, some properties of SSGs are also obtained in the light of its vector subspace structure. Finally, a symmetry-based decomposition of finite games is proposed, which consists of three mutually orthogonal subspaces: symmetric subspace, skew-symmetric subspace and asymmetric subspace. An illustrative example is presented to demonstrate this decomposition. ",daizhan cheng,,2017.0,,arXiv,Hao2017,True,,arXiv,Not available,On Skew-Symmetric Games,dd251b83b90bffa70675bda99c55872b,http://arxiv.org/abs/1712.02962v1 14035," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",s. muhammad,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14036," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",a. tavakoli,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14037," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",m. kurant,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14038," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",m. pawlowski,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14039," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",m. zukowski,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14040," Quantum methods allow to reduce communication complexity of some computational tasks, with several separated partners, beyond classical constraints. Nevertheless, experimental demonstrations of this fact are thus far limited to some abstract problems, far away from real-life tasks. We show here, and demonstrate experimentally, that the power of reduction of communication complexity can be harnessed to gain advantage in famous, immensely popular, card game - Bridge. The essence of a winning strategy in Bridge is efficient communication between the partners. The rules of the game allow only specific form of communication, of a very low complexity (effectively one has a strong limitations on number of exchanged bits). Surprisingly, our quantum technique is not violating the existing rules of the game (as there is no increase in information flow). We show that our quantum Bridge auction corresponds to a biased nonlocal Clauser-Horne-Shimony-Holt (CHSH) game, which is equivalent to a $2\to 1$ quantum random access code. Thus our experiment is also a realization of such protocols. However, this correspondence is not full which enables the Bridge players to have efficient strategies regardless of the quality of their detectors. ",m. bourennane,,2014.0,,"Phys. Rev. X 4, 021047 (2014)",Muhammad2014,True,,arXiv,Not available,Quantum bidding in Bridge,3ea080205d34558acc728b99d82677e5,http://arxiv.org/abs/1403.4280v1 14041," We consider zero-sum stochastic games with finite state and action spaces, perfect information, mean payoff criteria, without any irreducibility assumption on the Markov chains associated to strategies (multichain games). The value of such a game can be characterized by a system of nonlinear equations, involving the mean payoff vector and an auxiliary vector (relative value or bias). We develop here a policy iteration algorithm for zero-sum stochastic games with mean payoff, following an idea of two of the authors (Cochet-Terrasson and Gaubert, C. R. Math. Acad. Sci. Paris, 2006). The algorithm relies on a notion of nonlinear spectral projection (Akian and Gaubert, Nonlinear Analysis TMA, 2003), which is analogous to the notion of reduction of super-harmonic functions in linear potential theory. To avoid cycling, at each degenerate iteration (in which the mean payoff vector is not improved), the new relative value is obtained by reducing the earlier one. We show that the sequence of values and relative values satisfies a lexicographical monotonicity property, which implies that the algorithm does terminate. We illustrate the algorithm by a mean-payoff version of Richman games (stochastic tug-of-war or discrete infinity Laplacian type equation), in which degenerate iterations are frequent. We report numerical experiments on large scale instances, arising from the latter games, as well as from monotone discretizations of a mean-payoff pursuit-evasion deterministic differential game. ",marianne akian,,2012.0,,arXiv,Akian2012,True,,arXiv,Not available,"Policy iteration algorithm for zero-sum multichain stochastic games with mean payoff and perfect information",8d41599989946fbff8b34a86da025f8c,http://arxiv.org/abs/1208.0446v1 14042," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",logan crone,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 14043," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",lior fishman,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 14044," Schmidt's game, and other similar intersection games have played an important role in recent years in applications to number theory, dynamics, and Diophantine approximation theory. These games are real games, that is, games in which the players make moves from a complete separable metric space. The determinacy of these games trivially follows from the axiom of determinacy for real games, $\mathsf{AD}_\mathbb{R}$, which is a much stronger axiom than that asserting all integer games are determined, $\mathsf{AD}$. One of our main results is a general theorem which under the hypothesis $\mathsf{AD}$ implies the determinacy of intersection games which have a property allowing strategies to be simplified. In particular, we show that Schmidt's $(\alpha,\beta,\rho)$ game on $\mathbb{R}$ is determined from $\mathsf{AD}$ alone, but on $\mathbb{R}^n$ for $n \geq 3$ we show that $\mathsf{AD}$ does not imply the determinacy of this game. We also prove several other results specifically related to the determinacy of Schmidt's game. These results highlight the obstacles in obtaining the determinacy of Schmidt's game from $\mathsf{AD}$. ",stephen jackson,,2017.0,,arXiv,Crone2017,True,,arXiv,Not available,Determinacy of Schmidt's Game and Other Intersection Games,27d0cf7445af21f5943d952aa9e13a9b,http://arxiv.org/abs/1712.01227v1 14045," Potential games, originally introduced in the early 1990's by Lloyd Shapley, the 2012 Nobel Laureate in Economics, and his colleague Dov Monderer, are a very important class of models in game theory. They have special properties such as the existence of Nash equilibria in pure strategies. This note introduces graphical versions of potential games. Special cases of graphical potential games have already found applicability in many areas of science and engineering beyond economics, including artificial intelligence, computer vision, and machine learning. They have been effectively applied to the study and solution of important real-world problems such as routing and congestion in networks, distributed resource allocation (e.g., public goods), and relaxation-labeling for image segmentation. Implicit use of graphical potential games goes back at least 40 years. Several classes of games considered standard in the literature, including coordination games, local interaction games, lattice games, congestion games, and party-affiliation games, are instances of graphical potential games. This note provides several characterizations of graphical potential games by leveraging well-known results from the literature on probabilistic graphical models. A major contribution of the work presented here that particularly distinguishes it from previous work is establishing that the convergence of certain type of game-playing rules implies that the agents/players must be embedded in some graphical potential game. ",luis ortiz,,2015.0,,arXiv,Ortiz2015,True,,arXiv,Not available,Graphical Potential Games,ee019ee69d2d814e5db9410fc82900a6,http://arxiv.org/abs/1505.01539v1 14046," Statistical properties of order-driven double-auction markets with Bid-Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called {\it Madhavan-Richardson-Roomans model} (MRR for short) to simulate the stochastic process of the price-change in empirical data sets (say, EUR/JPY or USD/JPY exchange rates) in which the Bid-Ask spread fluctuates in time. We find that the MRR theory apparently fails to simulate so much as the qualitative behaviour ('non-monotonic' behaviour) of the response function $R(l)$ ($l$ denotes the difference of times at which the response function is evaluated) calculated from the data. Especially, we confirm that the stochastic nature of the Bid-Ask spread causes apparent deviations from a linear relationship between the $R(l)$ and the auto-correlation function $C(l)$, namely, $R(l) \propto -C(l)$. To make the microscopic model of double-auction markets having stochastic Bid-Ask spread, we use the minority game with a finite market history length and find numerically that appropriate extension of the game shows quite similar behaviour of the response function to the empirical evidence. We also reveal that the minority game modeling with the adaptive ('annealed') look-up table reproduces the non-linear relationship $R(l) \propto -f(C(l))$ ($f(x)$ stands for a non-linear function leading to '$\lambda$-shapes') more effectively than the fixed (`quenched') look-up table does. ",takero ibuki,,2010.0,,arXiv,Ibuki2010,True,,arXiv,Not available,"Response of double-auction markets to instantaneous Selling-Buying signals with stochastic Bid-Ask spread",52046c998f5409364604f07bf8d99a5f,http://arxiv.org/abs/1011.0748v2 14047," Statistical properties of order-driven double-auction markets with Bid-Ask spread are investigated through the dynamical quantities such as response function. We first attempt to utilize the so-called {\it Madhavan-Richardson-Roomans model} (MRR for short) to simulate the stochastic process of the price-change in empirical data sets (say, EUR/JPY or USD/JPY exchange rates) in which the Bid-Ask spread fluctuates in time. We find that the MRR theory apparently fails to simulate so much as the qualitative behaviour ('non-monotonic' behaviour) of the response function $R(l)$ ($l$ denotes the difference of times at which the response function is evaluated) calculated from the data. Especially, we confirm that the stochastic nature of the Bid-Ask spread causes apparent deviations from a linear relationship between the $R(l)$ and the auto-correlation function $C(l)$, namely, $R(l) \propto -C(l)$. To make the microscopic model of double-auction markets having stochastic Bid-Ask spread, we use the minority game with a finite market history length and find numerically that appropriate extension of the game shows quite similar behaviour of the response function to the empirical evidence. We also reveal that the minority game modeling with the adaptive ('annealed') look-up table reproduces the non-linear relationship $R(l) \propto -f(C(l))$ ($f(x)$ stands for a non-linear function leading to '$\lambda$-shapes') more effectively than the fixed (`quenched') look-up table does. ",jun-ichi inoue,,2010.0,,arXiv,Ibuki2010,True,,arXiv,Not available,"Response of double-auction markets to instantaneous Selling-Buying signals with stochastic Bid-Ask spread",52046c998f5409364604f07bf8d99a5f,http://arxiv.org/abs/1011.0748v2 14050," We are interested in mechanisms that maximize social welfare. In [1] this problem was studied for multi-unit auctions with unit demand bidders and for the public project problem, and in each case social welfare undominated mechanisms in the class of feasible and incentive compatible mechanisms were identified. One way to improve upon these optimality results is by allowing the players to move sequentially. With this in mind, we study here sequential versions of two feasible Groves mechanisms used for single item auctions: the Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of dominant strategies in this sequential setting, we focus on a weaker concept of an optimal strategy. For each mechanism we introduce natural optimal strategies and observe that in each mechanism these strategies exhibit different behaviour. However, we then show that among all optimal strategies, the one we introduce for each mechanism maximizes the social welfare when each player follows it. The resulting social welfare can be larger than the one obtained in the simultaneous setting. Finally, we show that, when interpreting both mechanisms as simultaneous ones, the vectors of the proposed strategies form a Pareto optimal Nash equilibrium in the class of optimal strategies. ",krzysztof apt,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Optimal Strategies in Sequential Bidding,e18adb79026055821f79d7dbf67256e4,http://arxiv.org/abs/0810.3182v1 14051," We are interested in mechanisms that maximize social welfare. In [1] this problem was studied for multi-unit auctions with unit demand bidders and for the public project problem, and in each case social welfare undominated mechanisms in the class of feasible and incentive compatible mechanisms were identified. One way to improve upon these optimality results is by allowing the players to move sequentially. With this in mind, we study here sequential versions of two feasible Groves mechanisms used for single item auctions: the Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of dominant strategies in this sequential setting, we focus on a weaker concept of an optimal strategy. For each mechanism we introduce natural optimal strategies and observe that in each mechanism these strategies exhibit different behaviour. However, we then show that among all optimal strategies, the one we introduce for each mechanism maximizes the social welfare when each player follows it. The resulting social welfare can be larger than the one obtained in the simultaneous setting. Finally, we show that, when interpreting both mechanisms as simultaneous ones, the vectors of the proposed strategies form a Pareto optimal Nash equilibrium in the class of optimal strategies. ",vangelis markakis,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Optimal Strategies in Sequential Bidding,e18adb79026055821f79d7dbf67256e4,http://arxiv.org/abs/0810.3182v1 14052," We consider zero-sum stochastic games with finite state and action spaces, perfect information, mean payoff criteria, without any irreducibility assumption on the Markov chains associated to strategies (multichain games). The value of such a game can be characterized by a system of nonlinear equations, involving the mean payoff vector and an auxiliary vector (relative value or bias). We develop here a policy iteration algorithm for zero-sum stochastic games with mean payoff, following an idea of two of the authors (Cochet-Terrasson and Gaubert, C. R. Math. Acad. Sci. Paris, 2006). The algorithm relies on a notion of nonlinear spectral projection (Akian and Gaubert, Nonlinear Analysis TMA, 2003), which is analogous to the notion of reduction of super-harmonic functions in linear potential theory. To avoid cycling, at each degenerate iteration (in which the mean payoff vector is not improved), the new relative value is obtained by reducing the earlier one. We show that the sequence of values and relative values satisfies a lexicographical monotonicity property, which implies that the algorithm does terminate. We illustrate the algorithm by a mean-payoff version of Richman games (stochastic tug-of-war or discrete infinity Laplacian type equation), in which degenerate iterations are frequent. We report numerical experiments on large scale instances, arising from the latter games, as well as from monotone discretizations of a mean-payoff pursuit-evasion deterministic differential game. ",jean cochet-terrasson,,2012.0,,arXiv,Akian2012,True,,arXiv,Not available,"Policy iteration algorithm for zero-sum multichain stochastic games with mean payoff and perfect information",8d41599989946fbff8b34a86da025f8c,http://arxiv.org/abs/1208.0446v1 14053," We study truthful auctions for secondary spectrum usage in wireless networks. In this scenario, n communication requests need to be allocated to k available channels that are subject to interference and noise. We present the first truthful mechanisms for secondary spectrum auctions with symmetric or submodular valuations. Our approach to model interference uses an edge-weighted conflict graph, and our algorithms provide asymptotically almost optimal approximation bounds for conflict graphs with a small inductive independence number rho << n. This approach covers a large variety of interference models such as, e.g., the protocol model or the recently popular physical model of interference. For unweighted conflict graphs and symmetric valuations we use LP-rounding to obtain $O(\rho)$-approximate mechanisms; for weighted conflict graphs we get a factor of O(rho (log n + log k)). For submodular users we combine the convex rounding framework of Dughmi et al [STOC 2011] with randomized meta-rounding to obtain O(rho)-approximate mechanisms for matroid-rank-sum valuations; for weighted conflict graphs we can fully drop the dependence on k to get O(rho log n). We conclude with promising initialresults for deterministically truthful mechanisms that allow approximation factors based on rho. ",martin hoefer,,2011.0,,arXiv,Hoefer2011,True,,arXiv,Not available,Secondary Spectrum Auctions for Symmetric and Submodular Bidders,c82911fff994966dad5c21372af49011,http://arxiv.org/abs/1110.5753v1 14054," We study truthful auctions for secondary spectrum usage in wireless networks. In this scenario, n communication requests need to be allocated to k available channels that are subject to interference and noise. We present the first truthful mechanisms for secondary spectrum auctions with symmetric or submodular valuations. Our approach to model interference uses an edge-weighted conflict graph, and our algorithms provide asymptotically almost optimal approximation bounds for conflict graphs with a small inductive independence number rho << n. This approach covers a large variety of interference models such as, e.g., the protocol model or the recently popular physical model of interference. For unweighted conflict graphs and symmetric valuations we use LP-rounding to obtain $O(\rho)$-approximate mechanisms; for weighted conflict graphs we get a factor of O(rho (log n + log k)). For submodular users we combine the convex rounding framework of Dughmi et al [STOC 2011] with randomized meta-rounding to obtain O(rho)-approximate mechanisms for matroid-rank-sum valuations; for weighted conflict graphs we can fully drop the dependence on k to get O(rho log n). We conclude with promising initialresults for deterministically truthful mechanisms that allow approximation factors based on rho. ",thomas kesselheim,,2011.0,,arXiv,Hoefer2011,True,,arXiv,Not available,Secondary Spectrum Auctions for Symmetric and Submodular Bidders,c82911fff994966dad5c21372af49011,http://arxiv.org/abs/1110.5753v1 14055," Emek et al. presented a model of probabilistic single-item second price auctions where an auctioneer who is informed about the type of an item for sale, broadcasts a signal about this type to uninformed bidders. They proved that finding the optimal (for the purpose of generating revenue) {\em pure} signaling scheme is strongly NP-hard. In contrast, we prove that finding the optimal {\em mixed} signaling scheme can be done in polynomial time using linear programming. For the proof, we show that the problem is strongly related to a problem of optimally bundling divisible goods for auctioning. We also prove that a mixed signaling scheme can in some cases generate twice as much revenue as the best pure signaling scheme and we prove a generally applicable lower bound on the revenue generated by the best mixed signaling scheme. ",peter miltersen,,2012.0,,arXiv,Miltersen2012,True,,arXiv,Not available,"Send Mixed Signals -- Earn More, Work Less",7b313c269e5871f1b8c7943eb1f6cd69,http://arxiv.org/abs/1202.1483v1 14056," Emek et al. presented a model of probabilistic single-item second price auctions where an auctioneer who is informed about the type of an item for sale, broadcasts a signal about this type to uninformed bidders. They proved that finding the optimal (for the purpose of generating revenue) {\em pure} signaling scheme is strongly NP-hard. In contrast, we prove that finding the optimal {\em mixed} signaling scheme can be done in polynomial time using linear programming. For the proof, we show that the problem is strongly related to a problem of optimally bundling divisible goods for auctioning. We also prove that a mixed signaling scheme can in some cases generate twice as much revenue as the best pure signaling scheme and we prove a generally applicable lower bound on the revenue generated by the best mixed signaling scheme. ",or sheffet,,2012.0,,arXiv,Miltersen2012,True,,arXiv,Not available,"Send Mixed Signals -- Earn More, Work Less",7b313c269e5871f1b8c7943eb1f6cd69,http://arxiv.org/abs/1202.1483v1 14057," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",yang cai,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 14058," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",zhiyi huang,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 14059," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",sha hua,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14060," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",xuejun zhuo,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14061," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",shivendra panwar,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14062," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jannik dreier,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 14063," We consider zero-sum stochastic games with finite state and action spaces, perfect information, mean payoff criteria, without any irreducibility assumption on the Markov chains associated to strategies (multichain games). The value of such a game can be characterized by a system of nonlinear equations, involving the mean payoff vector and an auxiliary vector (relative value or bias). We develop here a policy iteration algorithm for zero-sum stochastic games with mean payoff, following an idea of two of the authors (Cochet-Terrasson and Gaubert, C. R. Math. Acad. Sci. Paris, 2006). The algorithm relies on a notion of nonlinear spectral projection (Akian and Gaubert, Nonlinear Analysis TMA, 2003), which is analogous to the notion of reduction of super-harmonic functions in linear potential theory. To avoid cycling, at each degenerate iteration (in which the mean payoff vector is not improved), the new relative value is obtained by reducing the earlier one. We show that the sequence of values and relative values satisfies a lexicographical monotonicity property, which implies that the algorithm does terminate. We illustrate the algorithm by a mean-payoff version of Richman games (stochastic tug-of-war or discrete infinity Laplacian type equation), in which degenerate iterations are frequent. We report numerical experiments on large scale instances, arising from the latter games, as well as from monotone discretizations of a mean-payoff pursuit-evasion deterministic differential game. ",sylvie detournay,,2012.0,,arXiv,Akian2012,True,,arXiv,Not available,"Policy iteration algorithm for zero-sum multichain stochastic games with mean payoff and perfect information",8d41599989946fbff8b34a86da025f8c,http://arxiv.org/abs/1208.0446v1 14064," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jean-guillaume dumas,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 14065," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",pascal lafourcade,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 14066," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",jinzhong niu,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 14067," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",simon parsons,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 14068," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ben roberts,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 14069," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",dinan gunawardena,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 14070," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ian kash,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 14071," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",peter key,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 14072," In this paper, we introduce a framework of new mathematical representation of Game Theory, including static classical game and static quantum game. The idea is to find a set of base vectors in every single-player strategy space and to define their inner product so as to form them as a Hilbert space, and then form a Hilbert space of system state. Basic ideas, concepts and formulas in Game Theory have been reexpressed in such a space of system state. This space provides more possible strategies than traditional classical game and traditional quantum game. So besides those two games, more games have been defined in different strategy spaces. All the games have been unified in the new representation and their relation has been discussed. General Nash Equilibrium for all the games has been proposed but without a general proof of the existence. Besides the theoretical description, ideas and technics from Statistical Physics, such as Kinetics Equation and Thermal Equilibrium can be easily incorporated into Game Theory through such a representation. This incorporation gives an endogenous method for refinement of Equilibrium State and some hits to simplify the calculation of Equilibrium State. The more privileges of this new representation depends on further application on more theoretical and real games. Here, almost all ideas and conclusions are shown by examples and argument, while, we wish, lately, we can give mathematical proof for most results. ",jinshan wu,,2004.0,,arXiv,Wu2004,True,,arXiv,Not available,"A new mathematical representation of Game Theory, I",76a3f8861c0545b55a18c4bf167babd4,http://arxiv.org/abs/quant-ph/0404159v5 14073," Coalitional voting games appear in different forms in multi-agent systems, social choice and threshold logic. In this paper, the complexity of comparison of influence between players in coalitional voting games is characterized. The possible representations of simple games considered are simple games represented by winning coalitions, minimal winning coalitions, weighted voting game or a multiple weighted voting game. The influence of players is gauged from the viewpoint of basic player types, desirability relations and classical power indices such as Shapley-Shubik index, Banzhaf index, Holler index, Deegan-Packel index and Chow parameters. Among other results, it is shown that for a simple game represented by minimal winning coalitions, although it is easy to verify whether a player has zero or one voting power, computing the Banzhaf value of the player is #P-complete. Moreover, it is proved that multiple weighted voting games are the only representations for which it is NP-hard to verify whether the game is linear or not. For a simple game with a set W^m of minimal winning coalitions and n players, a O(n.|W^m|+(n^2)log(n)) algorithm is presented which returns `no' if the game is non-linear and returns the strict desirability ordering otherwise. The complexity of transforming simple games into compact representations is also examined. ",haris aziz,,2008.0,,arXiv,Aziz2008,True,,arXiv,Not available,Complexity of comparison of influence of players in simple games,207480cc121ed23e378f132290fb008d,http://arxiv.org/abs/0809.0519v1 14074," We consider zero-sum stochastic games with finite state and action spaces, perfect information, mean payoff criteria, without any irreducibility assumption on the Markov chains associated to strategies (multichain games). The value of such a game can be characterized by a system of nonlinear equations, involving the mean payoff vector and an auxiliary vector (relative value or bias). We develop here a policy iteration algorithm for zero-sum stochastic games with mean payoff, following an idea of two of the authors (Cochet-Terrasson and Gaubert, C. R. Math. Acad. Sci. Paris, 2006). The algorithm relies on a notion of nonlinear spectral projection (Akian and Gaubert, Nonlinear Analysis TMA, 2003), which is analogous to the notion of reduction of super-harmonic functions in linear potential theory. To avoid cycling, at each degenerate iteration (in which the mean payoff vector is not improved), the new relative value is obtained by reducing the earlier one. We show that the sequence of values and relative values satisfies a lexicographical monotonicity property, which implies that the algorithm does terminate. We illustrate the algorithm by a mean-payoff version of Richman games (stochastic tug-of-war or discrete infinity Laplacian type equation), in which degenerate iterations are frequent. We report numerical experiments on large scale instances, arising from the latter games, as well as from monotone discretizations of a mean-payoff pursuit-evasion deterministic differential game. ",stephane gaubert,,2012.0,,arXiv,Akian2012,True,,arXiv,Not available,"Policy iteration algorithm for zero-sum multichain stochastic games with mean payoff and perfect information",8d41599989946fbff8b34a86da025f8c,http://arxiv.org/abs/1208.0446v1 14075," This paper contributes to the program of numerical characterisation and classification of simple games outlined in the classical monograph of von Neumann and Morgenstern (1944). One of the most fundamental questions of this program is what makes a simple game a weighted majority game. The necessary and sufficient conditions that guarantee weightedness were obtained by Elgot (1961) and refined by Taylor and Zwicker (1992). If a simple game does not have weights, then rough weights may serve as a reasonable substitute (see their use in Taylor and Zwicker, 1992). A simple game is roughly weighted if there exists a system of weights and a threshold such that all coalitions whose combined weight is above the threshold are winning and all coalitions whose combined weight is below the threshold are losing and a tie-breaking is needed to classify the coalitions whose combined weight is exactly the threshold. Not all simple games are roughly weighted, and the class of projective games is a prime example. In this paper we give necessary and sufficient conditions for a simple game to have rough weights. We define two functions f(n) and g(n) that measure the deviation of a simple game from a weighted majority game and roughly weighted majority game, respectively. We formulate known results in terms of lower and upper bounds for these functions and improve those bounds. We also investigate rough weightedness of simle games with a small number of players. ",t. gvozdeva,,2009.0,,arXiv,Gvozdeva2009,True,,arXiv,Not available,Weighted and Roughly Weighted Simple Games,46c499eca0c52130c134e93f6cf70307,http://arxiv.org/abs/0912.5364v1 14076," This paper contributes to the program of numerical characterisation and classification of simple games outlined in the classical monograph of von Neumann and Morgenstern (1944). One of the most fundamental questions of this program is what makes a simple game a weighted majority game. The necessary and sufficient conditions that guarantee weightedness were obtained by Elgot (1961) and refined by Taylor and Zwicker (1992). If a simple game does not have weights, then rough weights may serve as a reasonable substitute (see their use in Taylor and Zwicker, 1992). A simple game is roughly weighted if there exists a system of weights and a threshold such that all coalitions whose combined weight is above the threshold are winning and all coalitions whose combined weight is below the threshold are losing and a tie-breaking is needed to classify the coalitions whose combined weight is exactly the threshold. Not all simple games are roughly weighted, and the class of projective games is a prime example. In this paper we give necessary and sufficient conditions for a simple game to have rough weights. We define two functions f(n) and g(n) that measure the deviation of a simple game from a weighted majority game and roughly weighted majority game, respectively. We formulate known results in terms of lower and upper bounds for these functions and improve those bounds. We also investigate rough weightedness of simle games with a small number of players. ",a. slinko,,2009.0,,arXiv,Gvozdeva2009,True,,arXiv,Not available,Weighted and Roughly Weighted Simple Games,46c499eca0c52130c134e93f6cf70307,http://arxiv.org/abs/0912.5364v1 14077," Determining a Nash equilibrium in a $2$-player non-zero sum game is known to be PPAD-hard (Chen and Deng (2006), Chen, Deng and Teng (2009)). The problem, even when restricted to win-lose bimatrix games, remains PPAD-hard (Abbott, Kane and Valiant (2005)). However, there do exist polynomial time tractable classes of win-lose bimatrix games - such as, very sparse games (Codenotti, Leoncini and Resta (2006)) and planar games (Addario-Berry, Olver and Vetta (2007)). We extend the results in the latter work to $K_{3,3}$ minor-free games and a subclass of $K_5$ minor-free games. Both these classes of games strictly contain planar games. Further, we sharpen the upper bound to unambiguous logspace, a small complexity class contained well within polynomial time. Apart from these classes of games, our results also extend to a class of games that contain both $K_{3,3}$ and $K_5$ as minors, thereby covering a large and non-trivial class of win-lose bimatrix games. For this class, we prove an upper bound of nondeterministic logspace, again a small complexity class within polynomial time. Our techniques are primarily graph theoretic and use structural characterizations of the considered minor-closed families. ",samir datta,,2010.0,,arXiv,Datta2010,True,,arXiv,Not available,Some Tractable Win-Lose Games,ab69b66bb101ca0e3c451c4d67c4acc8,http://arxiv.org/abs/1010.5951v2 14078," Determining a Nash equilibrium in a $2$-player non-zero sum game is known to be PPAD-hard (Chen and Deng (2006), Chen, Deng and Teng (2009)). The problem, even when restricted to win-lose bimatrix games, remains PPAD-hard (Abbott, Kane and Valiant (2005)). However, there do exist polynomial time tractable classes of win-lose bimatrix games - such as, very sparse games (Codenotti, Leoncini and Resta (2006)) and planar games (Addario-Berry, Olver and Vetta (2007)). We extend the results in the latter work to $K_{3,3}$ minor-free games and a subclass of $K_5$ minor-free games. Both these classes of games strictly contain planar games. Further, we sharpen the upper bound to unambiguous logspace, a small complexity class contained well within polynomial time. Apart from these classes of games, our results also extend to a class of games that contain both $K_{3,3}$ and $K_5$ as minors, thereby covering a large and non-trivial class of win-lose bimatrix games. For this class, we prove an upper bound of nondeterministic logspace, again a small complexity class within polynomial time. Our techniques are primarily graph theoretic and use structural characterizations of the considered minor-closed families. ",nagarajan krishnamurthy,,2010.0,,arXiv,Datta2010,True,,arXiv,Not available,Some Tractable Win-Lose Games,ab69b66bb101ca0e3c451c4d67c4acc8,http://arxiv.org/abs/1010.5951v2 14079," The rank of a bimatrix game (A,B) is defined as rank(A+B). Computing a Nash equilibrium (NE) of a rank-$0$, i.e., zero-sum game is equivalent to linear programming (von Neumann'28, Dantzig'51). In 2005, Kannan and Theobald gave an FPTAS for constant rank games, and asked if there exists a polynomial time algorithm to compute an exact NE. Adsul et al. (2011) answered this question affirmatively for rank-$1$ games, leaving rank-2 and beyond unresolved. In this paper we show that NE computation in games with rank $\ge 3$, is PPAD-hard, settling a decade long open problem. Interestingly, this is the first instance that a problem with an FPTAS turns out to be PPAD-hard. Our reduction bypasses graphical games and game gadgets, and provides a simpler proof of PPAD-hardness for NE computation in bimatrix games. In addition, we get: * An equivalence between 2D-Linear-FIXP and PPAD, improving a result by Etessami and Yannakakis (2007) on equivalence between Linear-FIXP and PPAD. * NE computation in a bimatrix game with convex set of Nash equilibria is as hard as solving a simple stochastic game. * Computing a symmetric NE of a symmetric bimatrix game with rank $\ge 6$ is PPAD-hard. * Computing a (1/poly(n))-approximate fixed-point of a (Linear-FIXP) piecewise-linear function is PPAD-hard. The status of rank-$2$ games remains unresolved. ",ruta mehta,,2014.0,,arXiv,Mehta2014,True,,arXiv,Not available,Constant Rank Bimatrix Games are PPAD-hard,54bec21279252ce891f9625280fc0f2e,http://arxiv.org/abs/1402.3350v2 14080," In this dissertation, we analyze the computational properties of game-theoretic centrality measures. The key idea behind game-theoretic approach to network analysis is to treat nodes as players in a cooperative game, where the value of each coalition of nodes is determined by certain graph properties. Next, the centrality of any individual node is determined by a chosen game-theoretic solution concept (notably, the Shapley value) in the same way as the payoff of a player in a cooperative game. On one hand, the advantage of game-theoretic centrality measures is that nodes are ranked not only according to their individual roles but also according to how they contribute to the role played by all possible subsets of nodes. On the other hand, the disadvantage is that the game-theoretic solution concepts are typically computationally challenging. The main contribution of this dissertation is that we show that a wide variety of game-theoretic solution concepts on networks can be computed in polynomial time. Our focus is on centralities based on the Shapley value and its various extensions, such as the Semivalues and Coalitional Semivalues. Furthermore, we prove #P-hardness of computing the Shapley value in connectivity games and propose an algorithm to compute it. Finally, we analyse computational properties of generalized version of cooperative games in which order of player matters. We propose a new representation for such games, called generalized marginal contribution networks, that allows for polynomial computation in the size of the representation of two dedicated extensions of the Shapley value to this class of games. ",piotr szczepanski,,2015.0,,arXiv,Szczepański2015,True,,arXiv,Not available,Fast Algorithms for Game-Theoretic Centrality Measures,7765c1fc27b1c16f5bf9344f31513ffe,http://arxiv.org/abs/1512.01764v1 14081," Two-player games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turn-based games the players alternate turns in moving the token. We study the {\em bidding} mode of moving the token, which, to the best of our knowledge, has never been studied in infinite-duration games. Both players have separate {\em budgets}, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called {\em Richman games} \cite{LLPU96,LLPSU99}. There, a central question is the existence and computation of {\em threshold} budgets; namely, a value $t \in [0,1]$ such that if \PO's budget exceeds $t$, he can win the game, and if \PT's budget exceeds $1-t$, he can win the game. We focus on parity games and mean-payoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategy-complexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for mean-payoff bidding games. ",guy avni,,2017.0,,arXiv,Avni2017,True,,arXiv,Not available,Infinite-Duration Bidding Games,f0d17edafe23a34dcc68b6dac5781d75,http://arxiv.org/abs/1705.01433v2 14082," Two-player games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turn-based games the players alternate turns in moving the token. We study the {\em bidding} mode of moving the token, which, to the best of our knowledge, has never been studied in infinite-duration games. Both players have separate {\em budgets}, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called {\em Richman games} \cite{LLPU96,LLPSU99}. There, a central question is the existence and computation of {\em threshold} budgets; namely, a value $t \in [0,1]$ such that if \PO's budget exceeds $t$, he can win the game, and if \PT's budget exceeds $1-t$, he can win the game. We focus on parity games and mean-payoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategy-complexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for mean-payoff bidding games. ",thomas henzinger,,2017.0,,arXiv,Avni2017,True,,arXiv,Not available,Infinite-Duration Bidding Games,f0d17edafe23a34dcc68b6dac5781d75,http://arxiv.org/abs/1705.01433v2 14083," Two-player games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turn-based games the players alternate turns in moving the token. We study the {\em bidding} mode of moving the token, which, to the best of our knowledge, has never been studied in infinite-duration games. Both players have separate {\em budgets}, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called {\em Richman games} \cite{LLPU96,LLPSU99}. There, a central question is the existence and computation of {\em threshold} budgets; namely, a value $t \in [0,1]$ such that if \PO's budget exceeds $t$, he can win the game, and if \PT's budget exceeds $1-t$, he can win the game. We focus on parity games and mean-payoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategy-complexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for mean-payoff bidding games. ",ventsislav chonev,,2017.0,,arXiv,Avni2017,True,,arXiv,Not available,Infinite-Duration Bidding Games,f0d17edafe23a34dcc68b6dac5781d75,http://arxiv.org/abs/1705.01433v2 14084," After defining a pure-action profile in a nonatomic aggregative game, where players have specific compact convex pure-action sets and nonsmooth convex cost functions, as a square-integrable function, we characterize a Wardrop equilibrium as a solution to an infinite-dimensional generalized variational inequality. We show the existence of Wardrop equilibrium and variational Wardrop equilibrium, a concept of equilibrium adapted to the presence of coupling constraints, in monotone nonatomic aggregative games. The uniqueness of (variational) Wardrop equilibrium is proved for strictly or aggregatively strictly monotone nonatomic aggregative games. We then show that, for a sequence of finite-player aggregative games with aggregative constraints, if the players' pure-action sets converge to those of a strongly (resp. aggregatively strongly) monotone nonatomic aggregative game, and the aggregative constraints in the finite-player games converge to the aggregative constraint of the nonatomic game, then a sequence of so-called variational Nash equilibria in these finite-player games converge to the variational Wardrop equilibrium in pure-action profile (resp. aggregate-action profile). In particular, it allows the construction of an auxiliary sequence of games with finite-dimensional equilibria to approximate the infinite-dimensional equilibrium in such a nonatomic game. Finally, we show how to construct auxiliary finite-player games for two general classes of nonatomic games. ",paulin jacquot,,2018.0,,arXiv,Jacquot2018,True,,arXiv,Not available,"Nonsmooth Aggregative Games with Coupling Constraints and Infinitely Many Classes of Players",c8d876fe9173aa51dd3747f71bd9e9ef,http://arxiv.org/abs/1806.06230v1 14085," A noncooperative game theoretical approach for analysing opportunistic spectrum access (OSA) in cognitive radio (CR) environments is proposed. New concepts from game theory are applied to spectrum access analysis in order to extract rules of behaviour for an emerging environment. In order to assess OSA scenarios of CRs, two oligopoly game models are reformulated in terms of resource access: Cournot and Stackelberg games. Five CR scenes are analysed: simultaneous access of unlicensed users (commons regime) with symmetric and asymmetric costs, with and without bandwidth constraints and sequential access (licensed against unlicensed). Several equilibrium concepts are studied as game solutions: Nash, Pareto and the joint NashPareto equilibrium. The latter captures a game situation where players are non-homogeneous users, exhibiting different types of rationality, Nash and Pareto. This enables a more realistic modelling of interactions on a CR scene. An evolutionary game equilibrium detection method is used. The Nash equilibrium indicates the maximum number of channels a CR may access without decreasing its payoff. The Pareto equilibrium describes a larger range of payoffs, capturing unbalanced as well as equitable solutions. The analysis of the Stackelberg modelling shows that payoffs are maximised for all users if the incumbents are Nash oriented and the new entrants are Pareto driven. ",ligia cremene,,2012.0,10.1049/iet-com.2011.0712,arXiv,Cremene2012,True,,arXiv,Not available,"Analysis of Cognitive Radio Scenes Based on Non-cooperative Game Theoretical Modelling",b30b362af502cf74227ef5937f2978e5,http://arxiv.org/abs/1209.5013v2 14086," After defining a pure-action profile in a nonatomic aggregative game, where players have specific compact convex pure-action sets and nonsmooth convex cost functions, as a square-integrable function, we characterize a Wardrop equilibrium as a solution to an infinite-dimensional generalized variational inequality. We show the existence of Wardrop equilibrium and variational Wardrop equilibrium, a concept of equilibrium adapted to the presence of coupling constraints, in monotone nonatomic aggregative games. The uniqueness of (variational) Wardrop equilibrium is proved for strictly or aggregatively strictly monotone nonatomic aggregative games. We then show that, for a sequence of finite-player aggregative games with aggregative constraints, if the players' pure-action sets converge to those of a strongly (resp. aggregatively strongly) monotone nonatomic aggregative game, and the aggregative constraints in the finite-player games converge to the aggregative constraint of the nonatomic game, then a sequence of so-called variational Nash equilibria in these finite-player games converge to the variational Wardrop equilibrium in pure-action profile (resp. aggregate-action profile). In particular, it allows the construction of an auxiliary sequence of games with finite-dimensional equilibria to approximate the infinite-dimensional equilibrium in such a nonatomic game. Finally, we show how to construct auxiliary finite-player games for two general classes of nonatomic games. ",cheng wan,,2018.0,,arXiv,Jacquot2018,True,,arXiv,Not available,"Nonsmooth Aggregative Games with Coupling Constraints and Infinitely Many Classes of Players",c8d876fe9173aa51dd3747f71bd9e9ef,http://arxiv.org/abs/1806.06230v1 14087," We survey recent developments in the theory of impartial combinatorial games in misere play, focusing on how the Sprague-Grundy theory of normal-play impartial games generalizes to misere play via the indistinguishability quotient construction. ",thane plambeck,,2006.0,,arXiv,Plambeck2006,True,,arXiv,Not available,Advances in losing,2bda01c837535f98a0c2b16f58eb6540,http://arxiv.org/abs/math/0603027v1 14088," This note, suitable for a lecture in an advanced undergraduate or basic graduate course on the economic theory of networks, exposits basic ideas of linear best-response games and their equilibria. ",benjamin golub,,2018.0,,arXiv,Golub2018,True,,arXiv,Not available,Introduction to Network Games with Linear Best Responses,92c578c3799bfa3d08fa8178eb00a586,http://arxiv.org/abs/1806.00566v1 14089," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",mehrdad khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 14090," Small operators who take part in secondary wireless spectrum markets typically have strict budget limits. In this paper, we study the bidding problem of a budget constrained operator in repeated secondary spectrum auctions. In existing truthful auctions, truthful bidding is the optimal strategy of a bidder. However, budget limits impact bidding behaviors and make bidding decisions complicated, since bidders may behave differently to avoid running out of money. We formulate the problem as a dynamic auction game between operators, where knowledge of other operators is limited due to the distributed nature of wireless networks/markets. We first present a Markov Decision Process (MDP) formulation of the problem and characterize the optimal bidding strategy of an operator, provided that opponents' bids are i.i.d. Next, we generalize the formulation to a Markov game that, in conjunction with model-free reinforcement learning approaches, enables an operator to make inferences about its opponents based on local observations. Finally, we present a fully distributed learning-based bidding algorithm which relies only on local information. Our numerical results show that our proposed learning-based bidding results in a better utility than truthful bidding. ",alhussein abouzeid,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,"Optimal Bidding in Repeated Wireless Spectrum Auctions with Budget Constraints",4e867f28f32c87012be067a57c6e0069,http://arxiv.org/abs/1608.07357v1 14091," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",yakov babichenko,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 14092," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",shahar dobzinski,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 14093," We study the following communication variant of local search. There is some fixed, commonly known graph $G$. Alice holds $f_A$ and Bob holds $f_B$, both are functions that specify a value for each vertex. The goal is to find a local maximum of $f_A+f_B$ with respect to $G$, i.e., a vertex $v$ for which $(f_A+f_B)(v)\geq (f_A+f_B)(u)$ for every neighbor $u$ of $v$. Our main result is that finding a local maximum requires polynomial (in the number of vertices) bits of communication. The result holds for the following families of graphs: three dimensional grids, hypercubes, odd graphs, and degree 4 graphs. Moreover, we provide an \emph{optimal} communication bound of $\Omega(\sqrt{N})$ for the hypercube, and for a constant dimensional greed, where $N$ is the number of vertices in the graph. We provide applications of our main result in two domains, exact potential games and combinatorial auctions. First, we show that finding a pure Nash equilibrium in $2$-player $N$-action exact potential games requires polynomial (in $N$) communication. We also show that finding a pure Nash equilibrium in $n$-player $2$-action exact potential games requires exponential (in $n$) communication. The second domain that we consider is combinatorial auctions, in which we prove that finding a local maximum in combinatorial auctions requires exponential (in the number of items) communication even when the valuations are submodular. Each one of the results demonstrates an exponential separation between the non-deterministic communication complexity and the randomized communication complexity of a total search problem. ",noam nisan,,2018.0,,arXiv,Babichenko2018,True,,arXiv,Not available,The Communication Complexity of Local Search,a137896aabaace2bf4794572afda55fb,http://arxiv.org/abs/1804.02676v2 14094," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",michael wellman,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 14095," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",lu hong,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 14096," A noncooperative game theoretical approach for analysing opportunistic spectrum access (OSA) in cognitive radio (CR) environments is proposed. New concepts from game theory are applied to spectrum access analysis in order to extract rules of behaviour for an emerging environment. In order to assess OSA scenarios of CRs, two oligopoly game models are reformulated in terms of resource access: Cournot and Stackelberg games. Five CR scenes are analysed: simultaneous access of unlicensed users (commons regime) with symmetric and asymmetric costs, with and without bandwidth constraints and sequential access (licensed against unlicensed). Several equilibrium concepts are studied as game solutions: Nash, Pareto and the joint NashPareto equilibrium. The latter captures a game situation where players are non-homogeneous users, exhibiting different types of rationality, Nash and Pareto. This enables a more realistic modelling of interactions on a CR scene. An evolutionary game equilibrium detection method is used. The Nash equilibrium indicates the maximum number of channels a CR may access without decreasing its payoff. The Pareto equilibrium describes a larger range of payoffs, capturing unbalanced as well as equitable solutions. The analysis of the Stackelberg modelling shows that payoffs are maximised for all users if the incumbents are Nash oriented and the new entrants are Pareto driven. ",dumitru dumitrescu,,2012.0,10.1049/iet-com.2011.0712,arXiv,Cremene2012,True,,arXiv,Not available,"Analysis of Cognitive Radio Scenes Based on Non-cooperative Game Theoretical Modelling",b30b362af502cf74227ef5937f2978e5,http://arxiv.org/abs/1209.5013v2 14097," Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals correspond to interpretations of available information. We show that the difference between these formulations can be sharply cast in terms of causal dependence structure, and employ graphical models to illustrate the distinguishing characteristics. The graphical representation supports inferences about signal patterns in the interpreted framework, and suggests how results based on the generated model can be extended to more general situations. Specific insights about bidding games in classical auction mechanisms derive from qualitative graphical models. ",scott page,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information",8f0683861e7012491ff940139b9a54b2,http://arxiv.org/abs/1202.3768v1 14098," Escalation is the fact that in a game (for instance in an auction), the agents play forever. The $0,1$-game is an extremely simple infinite game with intelligent agents in which escalation arises. It shows at the light of research on cognitive psychology the difference between intelligence (algorithmic mind) and rationality (algorithmic and reflective mind) in decision processes. It also shows that depending on the point of view (inside or outside) the rationality of the agent may change which is proposed to be called the principle of relativity. ",pierre lescanne,,2015.0,,arXiv,Lescanne2015,True,,arXiv,Not available,Intelligent escalation and the principle of relativity,e9fb90171d17cba57c9c48729b5075dd,http://arxiv.org/abs/1505.07212v1 14099," We consider a general class of Bayesian Games where each players utility depends on his type (possibly multidimensional) and on the strategy profile and where players' types are distributed independently. We show that if their full information version for any fixed instance of the type profile is a smooth game then the Price of Anarchy bound implied by the smoothness property, carries over to the Bayes-Nash Price of Anarchy. We show how some proofs from the literature (item bidding auctions, greedy auctions) can be cast as smoothness proofs or be simplified using smoothness. For first price item bidding with fractionally subadditive bidders we actually manage to improve by much the existing result \cite{Hassidim2011a} from 4 to $\frac{e}{e-1}\approx 1.58$. This also shows a very interesting separation between first and second price item bidding since second price item bidding has PoA at least 2 even under complete information. For a larger class of Bayesian Games where the strategy space of a player also changes with his type we are able to show that a slightly stronger definition of smoothness also implies a Bayes-Nash PoA bound. We show how weighted congestion games actually satisfy this stronger definition of smoothness. This allows us to show that the inefficiency bounds of weighted congestion games known in the literature carry over to incomplete versions where the weights of the players are private information. We also show how an incomplete version of a natural class of monotone valid utility games, called effort market games are universally $(1,1)$-smooth. Hence, we show that incomplete versions of effort market games where the abilities of the players and their budgets are private information has Bayes-Nash PoA at most 2. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Games and the Smoothness Framework,700362cb9ca621778a3fbe870ce57db6,http://arxiv.org/abs/1203.5155v1 14100," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",jianwei huang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 14101," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",zhu han,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 14102," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",mung chiang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 14103," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",h. poor,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 14104," We study mechanisms that use greedy allocation rules and pay-your-bid pricing to allocate resources subject to a matroid constraint. We show that all such mechanisms obtain a constant fraction of the optimal welfare at any equilibrium of bidder behavior, via a smoothness argument. This unifies numerous recent results on the price of anarchy of simple auctions. Our results extend to polymatroid and matching constraints, and we discuss extensions to more general matroid intersections. ",brendan lucier,,2015.0,,arXiv,Lucier2015,True,,arXiv,Not available,Greedy Algorithms make Efficient Mechanisms,0ad115c61354e9fb800e34ee8b4e48a7,http://arxiv.org/abs/1503.05608v1 14105," We study mechanisms that use greedy allocation rules and pay-your-bid pricing to allocate resources subject to a matroid constraint. We show that all such mechanisms obtain a constant fraction of the optimal welfare at any equilibrium of bidder behavior, via a smoothness argument. This unifies numerous recent results on the price of anarchy of simple auctions. Our results extend to polymatroid and matching constraints, and we discuss extensions to more general matroid intersections. ",vasilis syrgkanis,,2015.0,,arXiv,Lucier2015,True,,arXiv,Not available,Greedy Algorithms make Efficient Mechanisms,0ad115c61354e9fb800e34ee8b4e48a7,http://arxiv.org/abs/1503.05608v1 14106," We consider the problem of maximizing revenue when selling 2 items to a single buyer with known valuation distributions. Hart and Nisan showed that selling each item separately using the optimal Myerson's price, gains at least half of the revenue attainable by optimal auction for two items. We show that in case the items have different revenues when sold separately the bound can be tightened. ",ron kupfer,,2017.0,,arXiv,Kupfer2017,True,,arXiv,Not available,A Note on Approximate Revenue Maximization with Two Items,d2c3ad83709cfa65fe4064890a59bfb2,http://arxiv.org/abs/1712.03518v1 14107," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP inter coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",patricia bouyer,,2015.0,10.4204/EPTCS.193.1,"EPTCS 193, 2015, pp. 1-15",Bouyer2015,True,,arXiv,Not available,Average-energy games,941f7925df02d252441a88a290d348d4,http://arxiv.org/abs/1509.07205v1 14108," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",azhar iqbal,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 14109," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",james chappell,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 14110," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",derek abbott,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 14111," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 14112," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 14113," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",milan bradonjic,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 14114," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 14115," Engagement in educational games, a recently popular academic topic, has been shown to increase learning performance, as well as a number of attitudinal factors, such as intrinsic interest and motivation. However, there is a lack of research on how games can be designed to promote engagement. This mixed methods case study aimed to discover effective game elements for promoting 17-18 year old high school students' engagement with an educational game. Using within-case and cross-case analyses and triangulated data, 10 elements emerged and were categorized into the constructs of story, gameplay, and atmosphere. Examples and connections to the literature for each element are reported. Findings implicate that educational game design for both learning and engagement is composed of educational-game specific elements, game design for solely engagement is similar for both educational and entertainment games, and a gap on educational game design technique instead of theory should be addressed to further benefit educational game development. ",angela he,,2017.0,,arXiv,He2017,True,,arXiv,Not available,Educational game design: game elements for promoting engagement,95d2a8b285d52303777e3f6f2b97f217,http://arxiv.org/abs/1709.09931v1 14116," Maybe an event can't be modeled completely through on game but there is more chance with several games. With emphasis on players' rationality, we present new properties of strategic games, which result in production of other games. Here, a new attitude to modeling will be presented in game theory as dynamic system of strategic games and its some applications such as analysis of the clash between the United States and Iran in Iraq will be provided. In this system with emphasis on players' rationality, the relationship between strategic games and explicitly the dynamics present in interactions among players will be examined. In addition, we introduce a new game called trickery game. This game shows a good reason for the cunning of some people in everyday life. Cooperation is a hallmark of human society. In many cases, our study provides a mechanism to move towards cooperation between players. ",madjid gordji,,2018.0,10.22075/IJNAA.2017.12774.1657,"Eshaghi, M. and Askari, G., 2017. Dynamic system of strategic games. International Journal of Nonlinear Analysis and Applications",Gordji2018,True,,arXiv,Not available,Dynamic system of strategic games,0e855d83a0743c430eb82f4ac9025715,http://arxiv.org/abs/1801.05280v1 14117," Maybe an event can't be modeled completely through on game but there is more chance with several games. With emphasis on players' rationality, we present new properties of strategic games, which result in production of other games. Here, a new attitude to modeling will be presented in game theory as dynamic system of strategic games and its some applications such as analysis of the clash between the United States and Iran in Iraq will be provided. In this system with emphasis on players' rationality, the relationship between strategic games and explicitly the dynamics present in interactions among players will be examined. In addition, we introduce a new game called trickery game. This game shows a good reason for the cunning of some people in everyday life. Cooperation is a hallmark of human society. In many cases, our study provides a mechanism to move towards cooperation between players. ",gholamreza askari,,2018.0,10.22075/IJNAA.2017.12774.1657,"Eshaghi, M. and Askari, G., 2017. Dynamic system of strategic games. International Journal of Nonlinear Analysis and Applications",Gordji2018,True,,arXiv,Not available,Dynamic system of strategic games,0e855d83a0743c430eb82f4ac9025715,http://arxiv.org/abs/1801.05280v1 14118," The optimal pricing problem is a fundamental problem that arises in combinatorial auctions. Suppose that there is one seller who has indivisible items and multiple buyers who want to purchase a combination of the items. The seller wants to sell his items for the highest possible prices, and each buyer wants to maximize his utility (i.e., valuation minus payment) as long as his payment does not exceed his budget. The optimal pricing problem seeks a price of each item and an assignment of items to buyers such that every buyer achieves the maximum utility under the prices. The goal of the problem is to maximize the total payment from buyers. In this paper, we consider the case that the valuations are submodular. We show that the problem is computationally hard even if there exists only one buyer. Then we propose approximation algorithms for the unlimited budget case. We also extend the algorithm for the limited budget case when there exists one buyer and multiple buyers collaborate with each other. ",yasushi kawase,,2016.0,,arXiv,Maehara2016,True,,arXiv,Not available,Optimal Pricing for Submodular Valuations with Bounded Curvature,e4d17dcf5b3a2032ef314f88a682efed,http://arxiv.org/abs/1611.07605v1 14119," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP inter coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",nicolas markey,,2015.0,10.4204/EPTCS.193.1,"EPTCS 193, 2015, pp. 1-15",Bouyer2015,True,,arXiv,Not available,Average-energy games,941f7925df02d252441a88a290d348d4,http://arxiv.org/abs/1509.07205v1 14120," A new representation of Game Theory is developed in this paper. State of players is represented by a density matrix, and payoff function is a set of hermitian operators, which when applied onto the density matrix give the payoff of players. By this formulism, a new way to find the equilibria of games is given by generalizing the thermodynamical evolutionary process leading to equilibrium in Statistical Mechanics. And in this formulism, when quantum objects instead of classical objects are used as the objects in the game, it's naturally leads to the so-called Quantum Game Theory, but with a slight difference in the definition of strategy state of players: the probability distribution is replaced with a density matrix. Further more, both games of correlated and independent players can be reached in this single framework, while traditionally, they are treated separately by Non-cooperative Game Theory and Coalitional Game Theory. Because of the density matrix is used as state of players, besides classical correlated strategy, quantum entangled states can also be used as strategies, which is an entanglement of strategies between players, and it is different with the entanglement of objects' states as in the so-called Quantum Game Theory. At last, in the form of density matrix, a class of quantum games, where the payoff matrixes are commutative, can be reduced into classical games. In this sense, it will put the classical game as a special case of our quantum game. ",jinshan wu,,2005.0,,arXiv,Wu2005,True,,arXiv,Not available,Hamiltotian Formalism of Game Theory,ecf850ad428c87996709235541844b53,http://arxiv.org/abs/quant-ph/0501088v4 14121," We provide a classification of symmetric three-player games with two strategies and investigate evolutionary and asymptotic stability (in the replicator dynamics) of their Nash equilibria. We discuss similarities and differences between two-player and multi-player games. In particular, we construct examples which exhibit a novel behavior not found in two-player games. ",maciej bukowski,,2004.0,,arXiv,Bukowski2004,True,,arXiv,Not available,Evolutionary and asymptotic stability in symmetric multi-player games,b2ce42d95ad9e7624fdcd19e22336cc3,http://arxiv.org/abs/q-bio/0409028v1 14122," We provide a classification of symmetric three-player games with two strategies and investigate evolutionary and asymptotic stability (in the replicator dynamics) of their Nash equilibria. We discuss similarities and differences between two-player and multi-player games. In particular, we construct examples which exhibit a novel behavior not found in two-player games. ",jacek miekisz,,2004.0,,arXiv,Bukowski2004,True,,arXiv,Not available,Evolutionary and asymptotic stability in symmetric multi-player games,b2ce42d95ad9e7624fdcd19e22336cc3,http://arxiv.org/abs/q-bio/0409028v1 14123," In this paper we study the N-player nonzero-sum Dynkin game ($N\geq 3$) in continuous time, which is a non-cooperative game where the strategies are stopping times. We show that the game has a Nash equilibrium point for general payoff processes. ",hamadene said,,2011.0,,arXiv,Said2011,True,,arXiv,Not available,The Multi-player Nonzero-sum Dynkin Game in Continuous Time,15a6da23e2958e82e0b5aa9f59485b81,http://arxiv.org/abs/1110.5889v1 14124," In this paper we study the N-player nonzero-sum Dynkin game ($N\geq 3$) in continuous time, which is a non-cooperative game where the strategies are stopping times. We show that the game has a Nash equilibrium point for general payoff processes. ",hassani mohammed,,2011.0,,arXiv,Said2011,True,,arXiv,Not available,The Multi-player Nonzero-sum Dynkin Game in Continuous Time,15a6da23e2958e82e0b5aa9f59485b81,http://arxiv.org/abs/1110.5889v1 14125," We give an example of a zero-sum stochastic game with four states, compact action sets for each player, and continuous payoff and transition functions, such that the discounted value does not converge as the discount factor tends to 0, and the value of the n-stage game does not converge as n goes to infinity. ",guillaume vigeral,,2013.0,10.1007/s13235-013-0073-z,"Dynamic Games and Applications 3, 2 (2013) 172-186",Vigeral2013,True,,arXiv,Not available,"A Zero-Sum Stochastic Game with Compact Action Sets and no Asymptotic Value",10909fd150c29fdaad77bda666f540ac,http://arxiv.org/abs/1301.4540v1 14126," We prove that to find optimal positional strategies for stochastic mean payoff games when the value of every state of the game is known, in general, is as hard as solving such games tout court. This answers a question posed by Daniel Andersson and Peter Bro Miltersen. ",marcello mamino,,2015.0,,arXiv,Mamino2015,True,,arXiv,Not available,Strategy Recovery for Stochastic Mean Payoff Games,d905419407fbf1f9d957cbe698ae829e,http://arxiv.org/abs/1506.04641v1 14127," We present a Monte Carlo algorithm for efficiently finding near optimal moves and bids in the game of Bidding Hex. The algorithm is based on the recent solution of Random-Turn Hex by Peres, Schramm, Sheffield, and Wilson together with Richman's work connecting random-turn games to bidding games. ",sam payne,,2008.0,,"Games of No Chance 4, MSRI Publications 63 (2015), 207-214",Payne2008,True,,arXiv,Not available,Artificial intelligence for Bidding Hex,94161acbd43a75318c7b06f62c003c62,http://arxiv.org/abs/0812.3677v1 14128," We present a Monte Carlo algorithm for efficiently finding near optimal moves and bids in the game of Bidding Hex. The algorithm is based on the recent solution of Random-Turn Hex by Peres, Schramm, Sheffield, and Wilson together with Richman's work connecting random-turn games to bidding games. ",elina robeva,,2008.0,,"Games of No Chance 4, MSRI Publications 63 (2015), 207-214",Payne2008,True,,arXiv,Not available,Artificial intelligence for Bidding Hex,94161acbd43a75318c7b06f62c003c62,http://arxiv.org/abs/0812.3677v1 14129," We prove that finding an epsilon-Nash equilibrium in a succinctly representable game with many players is PPAD-hard for constant epsilon. Our proof uses succinct games, i.e. games whose payoff function is represented by a circuit. Our techniques build on a recent query complexity lower bound by Babichenko. ",aviad rubinstein,,2014.0,,arXiv,Rubinstein2014,True,,arXiv,Not available,Computational Complexity of Approximate Nash Equilibrium in Large Games,2bf67cc8b08101975470e4685205781c,http://arxiv.org/abs/1405.0524v3 14130," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP inter coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",mickael randour,,2015.0,10.4204/EPTCS.193.1,"EPTCS 193, 2015, pp. 1-15",Bouyer2015,True,,arXiv,Not available,Average-energy games,941f7925df02d252441a88a290d348d4,http://arxiv.org/abs/1509.07205v1 14131," We consider discrete time partially observable zero-sum stochastic game with average payoff criterion. We study the game using an equivalent completely observable game. We show that the game has a value and also we come up with a pair of optimal strategies for both the players. ",subhamay saha,,2014.0,,arXiv,Saha2014,True,,arXiv,Not available,Zero-Sum Stochastic Games with Partial Information and Average Payoff,9e0e30e8e2926f72667b7b55c6d57de6,http://arxiv.org/abs/1409.4030v1 14134," Recently developed toy models for the mean-field games of corruption and botnet defence in cyber-security with three or four states of agents are extended to a more general mean-field-game model with $2d$ states, $d\in \N$. In order to tackle new technical difficulties arising from a larger state-space we introduce new asymptotic regimes, namely small discount and small interaction asymptotics. Moreover, the link between stationary and time-dependent solutions is established rigorously leading to a performance of the turnpike theory in a mean-field-game setting. ",vassili kolokoltsov,,2016.0,,arXiv,Kolokoltsov2016,True,,arXiv,Not available,Corruption and botnet defense: a mean field game approach,e6be4efb4e3a435a9d234488f901fa6d,http://arxiv.org/abs/1607.07350v1 14135," Recently developed toy models for the mean-field games of corruption and botnet defence in cyber-security with three or four states of agents are extended to a more general mean-field-game model with $2d$ states, $d\in \N$. In order to tackle new technical difficulties arising from a larger state-space we introduce new asymptotic regimes, namely small discount and small interaction asymptotics. Moreover, the link between stationary and time-dependent solutions is established rigorously leading to a performance of the turnpike theory in a mean-field-game setting. ",oleg malafeyev,,2016.0,,arXiv,Kolokoltsov2016,True,,arXiv,Not available,Corruption and botnet defense: a mean field game approach,e6be4efb4e3a435a9d234488f901fa6d,http://arxiv.org/abs/1607.07350v1 14136," We study an impartial game introduced by Anderson and Harary. This game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for generalized dihedral groups, which are of the form $\operatorname{Dih}(A)= \mathbb{Z}_2 \ltimes A$ for a finite abelian group $A$. ",bret benesh,,2016.0,,"Australas. J. Combinatorics 68(3), 2017 (http://ajc.maths.uq.edu.au)",Benesh2016,True,,arXiv,Not available,Impartial achievement games for generating generalized dihedral groups,a7d6d1fcccd81fd39b1b8cde5e7b515f,http://arxiv.org/abs/1608.00259v2 14137," We study an impartial game introduced by Anderson and Harary. This game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for generalized dihedral groups, which are of the form $\operatorname{Dih}(A)= \mathbb{Z}_2 \ltimes A$ for a finite abelian group $A$. ",dana ernst,,2016.0,,"Australas. J. Combinatorics 68(3), 2017 (http://ajc.maths.uq.edu.au)",Benesh2016,True,,arXiv,Not available,Impartial achievement games for generating generalized dihedral groups,a7d6d1fcccd81fd39b1b8cde5e7b515f,http://arxiv.org/abs/1608.00259v2 14138," We study an impartial game introduced by Anderson and Harary. This game is played by two players who alternately choose previously-unselected elements of a finite group. The first player who builds a generating set from the jointly-selected elements wins. We determine the nim-numbers of this game for generalized dihedral groups, which are of the form $\operatorname{Dih}(A)= \mathbb{Z}_2 \ltimes A$ for a finite abelian group $A$. ",nandor sieben,,2016.0,,"Australas. J. Combinatorics 68(3), 2017 (http://ajc.maths.uq.edu.au)",Benesh2016,True,,arXiv,Not available,Impartial achievement games for generating generalized dihedral groups,a7d6d1fcccd81fd39b1b8cde5e7b515f,http://arxiv.org/abs/1608.00259v2 14139," This paper presents a new solution concept for multiplayer stochastic games, namely, acceptable strategy profiles. For each player $i$ and state $s$ in a stochastic game, let $w_i(s)$ be a real number. A strategy profile is \emph{$w$-acceptable}, where $w=(w_i(s))$, if the discounted payoff to each player $i$ at every initial state $s$ is at least $w_i(s)$, provided the discount factor of the players is sufficiently close to 1. Our goal is to provide simple strategy profiles that are $w$-acceptable for payoff vectors $w$ in which all coordinates are high. ",eilon solan,,2016.0,,arXiv,Solan2016,True,,arXiv,Not available,Acceptable Strategy Profiles in Stochastic Games,e0c5b286253f1091d192e9a909461ed0,http://arxiv.org/abs/1608.05272v1 14140," The present survey aims at presenting the current machine learning techniques employed in security games domains. Specifically, we focused on papers and works developed by the Teamcore of University of Southern California, which deepened different directions in this field. After a brief introduction on Stackelberg Security Games (SSGs) and the poaching setting, the rest of the work presents how to model a boundedly rational attacker taking into account her human behavior, then describes how to face the problem of having attacker's payoffs not defined and how to estimate them and, finally, presents how online learning techniques have been exploited to learn a model of the attacker. ",giuseppe nittis,,2016.0,,arXiv,Nittis2016,True,,arXiv,Not available,Machine Learning Techniques for Stackelberg Security Games: a Survey,a7d019f58183f47093117ba51f691d3d,http://arxiv.org/abs/1609.09341v1 14141," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP inter coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",kim larsen,,2015.0,10.4204/EPTCS.193.1,"EPTCS 193, 2015, pp. 1-15",Bouyer2015,True,,arXiv,Not available,Average-energy games,941f7925df02d252441a88a290d348d4,http://arxiv.org/abs/1509.07205v1 14142," The present survey aims at presenting the current machine learning techniques employed in security games domains. Specifically, we focused on papers and works developed by the Teamcore of University of Southern California, which deepened different directions in this field. After a brief introduction on Stackelberg Security Games (SSGs) and the poaching setting, the rest of the work presents how to model a boundedly rational attacker taking into account her human behavior, then describes how to face the problem of having attacker's payoffs not defined and how to estimate them and, finally, presents how online learning techniques have been exploited to learn a model of the attacker. ",francesco trovo,,2016.0,,arXiv,Nittis2016,True,,arXiv,Not available,Machine Learning Techniques for Stackelberg Security Games: a Survey,a7d019f58183f47093117ba51f691d3d,http://arxiv.org/abs/1609.09341v1 14143," We present a protocol that transforms any quantum multi-prover interactive proof into a nonlocal game in which questions consist of logarithmic number of bits and answers of constant number of bits. As a corollary, this proves that the promise problem corresponding to the approximation of the nonlocal value to inverse polynomial accuracy is complete for QMIP*, and therefore NEXP-hard. This establishes that nonlocal games are provably harder than classical games without any complexity theory assumptions. Our result also indicates that gap amplification for nonlocal games may be impossible in general and provides a negative evidence for the possibility of the gap amplification approach to the multi-prover variant of the quantum PCP conjecture. ",zhengfeng ji,,2016.0,,arXiv,Ji2016,True,,arXiv,Not available,Compression of Quantum Multi-Prover Interactive Proofs,3da7069d321d43f5220f2cbd3e7600ee,http://arxiv.org/abs/1610.03133v1 14144," We examine the problem of the existence of optimal deterministic stationary strategiesintwo-players antagonistic (zero-sum) perfect information stochastic games with finitely many states and actions.We show that the existenceof such strategies follows from the existence of optimal deterministic stationarystrategies for some derived one-player games.Thus we reducethe problem from two-player to one-player games (Markov decisionproblems), where usually it is much easier to tackle.The reduction is very general, it holds not only for all possible payoff mappings but alsoin more a general situations whereplayers' preferences are not expressed by payoffs. ",hugo gimbert,,2016.0,,arXiv,Gimbert2016,True,,arXiv,Not available,"Pure and Stationary Optimal Strategies in Perfect-Information Stochastic Games with Global Preferences",3182d4258a66645e60fa62dbc1391e25,http://arxiv.org/abs/1611.08487v1 14145," We examine the problem of the existence of optimal deterministic stationary strategiesintwo-players antagonistic (zero-sum) perfect information stochastic games with finitely many states and actions.We show that the existenceof such strategies follows from the existence of optimal deterministic stationarystrategies for some derived one-player games.Thus we reducethe problem from two-player to one-player games (Markov decisionproblems), where usually it is much easier to tackle.The reduction is very general, it holds not only for all possible payoff mappings but alsoin more a general situations whereplayers' preferences are not expressed by payoffs. ",wieslaw zielonka,,2016.0,,arXiv,Gimbert2016,True,,arXiv,Not available,"Pure and Stationary Optimal Strategies in Perfect-Information Stochastic Games with Global Preferences",3182d4258a66645e60fa62dbc1391e25,http://arxiv.org/abs/1611.08487v1 14146," We consider an inventory competition game between two firms. The question we address is this: If players do not know the opponent's action and opponent's utility function can they learn to play the Nash policy in a repeated game by observing their own sales? In this work it is proven that by means of Maximum A Posteriori (MAP) estimation, players can learn the Nash policy. It is proven that players' actions and beliefs do converge to the Nash equilibrium. ",mohsen rakhshan,,2016.0,,arXiv,Rakhshan2016,True,,arXiv,Not available,Maximum a posteriori learning in demand competition games,7878aa4adbb1c8b4f5548b17ff3bb167,http://arxiv.org/abs/1611.10270v1 14147," Game theory research on the snowdrift game has showed that gradual evolution of the continuously varying level of cooperation in joint enterprises can demonstrate evolutionary merging as well as evolutionary branching. However, little is known about the consequences of changes in diversity at the cooperation level. In the present study I consider effects of costly rewards on the continuous snowdrift game. I show that not evolutionary merging but evolutionary branching can promote the emergence of pool reward, which can then enhance social welfare. ",tatsuya sasaki,,2016.0,,arXiv,Sasaki2016,True,,arXiv,Not available,"Evolution of cooperation and costly incentives in the continuous snowdrift game",84cb871414f651af87e1604ce533f9d7,http://arxiv.org/abs/1612.08886v1 14148," We propose a framework based on Network Formation Game for self-organization in the Internet of Things (IoT), in which heterogeneous and multi-interface nodes are modeled as self-interested agents who individually decide on establishment and severance of links to other agents. Through analysis of the static game, we formally confirm the emergence of realistic topologies from our model, and analytically establish the criteria that lead to stable multi-hop network structures. ",vahid behzadan,,2017.0,,arXiv,Behzadan2017,True,,arXiv,Not available,"A Game-Theoretic Model for Analysis and Design of Self-Organization Mechanisms in IoT",7c30754cf989cccdb397c68f9d054459,http://arxiv.org/abs/1701.04562v1 14149," We propose a framework based on Network Formation Game for self-organization in the Internet of Things (IoT), in which heterogeneous and multi-interface nodes are modeled as self-interested agents who individually decide on establishment and severance of links to other agents. Through analysis of the static game, we formally confirm the emergence of realistic topologies from our model, and analytically establish the criteria that lead to stable multi-hop network structures. ",banafsheh rekabdar,,2017.0,,arXiv,Behzadan2017,True,,arXiv,Not available,"A Game-Theoretic Model for Analysis and Design of Self-Organization Mechanisms in IoT",7c30754cf989cccdb397c68f9d054459,http://arxiv.org/abs/1701.04562v1 14150," Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objective. Our main results are as follows: (a) exponential memory is necessary and sufficient for winning strategies in energy parity games; (b) the problem of deciding the winner in energy parity games can be solved in NP \cap coNP; and (c) we give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is polynomially equivalent to the problem of deciding the winner in mean-payoff parity games, while optimal strategies may require infinite memory in mean-payoff parity games. As a consequence we obtain a conceptually simple algorithm to solve mean-payoff parity games. ",krishnendu chatterjee,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Energy Parity Games,f78f4db9fa6d62bd65bf6d7c942a58bd,http://arxiv.org/abs/1001.5183v4 14151," Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objective. Our main results are as follows: (a) exponential memory is necessary and sufficient for winning strategies in energy parity games; (b) the problem of deciding the winner in energy parity games can be solved in NP \cap coNP; and (c) we give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is polynomially equivalent to the problem of deciding the winner in mean-payoff parity games, while optimal strategies may require infinite memory in mean-payoff parity games. As a consequence we obtain a conceptually simple algorithm to solve mean-payoff parity games. ",laurent doyen,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Energy Parity Games,f78f4db9fa6d62bd65bf6d7c942a58bd,http://arxiv.org/abs/1001.5183v4 14152," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP inter coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",simon laursen,,2015.0,10.4204/EPTCS.193.1,"EPTCS 193, 2015, pp. 1-15",Bouyer2015,True,,arXiv,Not available,Average-energy games,941f7925df02d252441a88a290d348d4,http://arxiv.org/abs/1509.07205v1 14153," We present a new model of incomplete information games without private information in which the players use a distributionally robust optimization approach to cope with the payoff uncertainty. With some specific restrictions, we show that our ""Distributionally Robust Game"" constitutes a true generalization of three popular finite games. These are the Complete Information Games, Bayesian Games and Robust Games. Subsequently, we prove that the set of equilibria of an arbitrary distributionally robust game with specified ambiguity set can be computed as the component-wise projection of the solution set of a multi-linear system of equations and inequalities. For special cases of such games we show equivalence to complete information finite games (Nash Games) with the same number of players and same action spaces. Thus, when our game falls within these special cases one can simply solve the corresponding Nash Game. Finally, we demonstrate the applicability of our new model of games and highlight its importance. ",nicolas loizou,,2016.0,10.5220/0005753301860196,arXiv,Loizou2016,True,,arXiv,Not available,Distributionally Robust Games with Risk-averse Players,d2ccb37137357b659190074e1801af95,http://arxiv.org/abs/1610.00651v1 14154," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",sven schewe,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 14155," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",alexander weinert,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 14156," Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: the quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labelled with a non-negative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight exponential bounds for the memory he needs to win the game. Naturally, the antagonist may need need infinite memory to win. Finally, we present tight bounds on the quality of winning strategies for the protagonist. ",martin zimmermann,,2018.0,,arXiv,Schewe2018,True,,arXiv,Not available,Parity Games with Weights,2120e850ac8a8870f4472437d9a45746,http://arxiv.org/abs/1804.06168v1 14157," Finite objects and more specifically finite games are formalized using induction, whereas infinite objects are formalized using coinduction. In this article, after an introduction to the concept of coinduction, we revisit on infinite (discrete) extensive games the basic notions of game theory. Among others, we introduce a definition of Nash equilibrium and a notion of subgame perfect equilibrium for infinite games. We use those concepts to analyze well known infinite games, like the dollar auction game and the centipede game and we show that human behaviors that are often considered as illogic are perfectly rational, if one admits that human agents reason coinductively. ",pierre lescanne,,2009.0,,arXiv,Lescanne2009,True,,arXiv,Not available,Deconstruction of Infinite Extensive Games using coinduction,ccf86866e80e854f111e86bd599b02d7,http://arxiv.org/abs/0904.3528v2 14158," Traditional game theory assumes that the players in the game are aware of the rules of the game. However, in practice, often the players are unaware or have only partial knowledge about the game they are playing. They may also have knowledge that other players have only partial knowledge of the game they are playing, which they can try to exploit. We present a novel mathematical formulation of such games. We make use of Kripke semantics, which are a way to keep track of what different players know and do not know about the world. We propose a notion of equilibrium for such games, and show that equilibrium always exists. ",manoj gopalkrishnan,,2014.0,,arXiv,Gopalkrishnan2014,True,,arXiv,Not available,Playing games in an uncertain world,3224d8c5e314fc5c0810f8edb8497a63,http://arxiv.org/abs/1402.4570v1 14159," Traditional game theory assumes that the players in the game are aware of the rules of the game. However, in practice, often the players are unaware or have only partial knowledge about the game they are playing. They may also have knowledge that other players have only partial knowledge of the game they are playing, which they can try to exploit. We present a novel mathematical formulation of such games. We make use of Kripke semantics, which are a way to keep track of what different players know and do not know about the world. We propose a notion of equilibrium for such games, and show that equilibrium always exists. ",girish varma,,2014.0,,arXiv,Gopalkrishnan2014,True,,arXiv,Not available,Playing games in an uncertain world,3224d8c5e314fc5c0810f8edb8497a63,http://arxiv.org/abs/1402.4570v1 14160," Compositional Game Theory is a new, recently introduced model of economic games based upon the computer science idea of compositionality. In it, complex and irregular games can be built up from smaller and simpler games, and the equilibria of these complex games can be defined recursively from the equilibria of their simpler subgames. This paper extends the model by providing a final coalgebra semantics for infinite games. In the course of this, we introduce a new operator on games to model the economic concept of subgame perfection. ",neil ghani,,2017.0,,arXiv,Ghani2017,True,,arXiv,Not available,A Compositional Treatment of Iterated Open Games,71ee4e84f0712dcd1c92eca28d8fbd17,http://arxiv.org/abs/1711.07968v1 14161," Compositional Game Theory is a new, recently introduced model of economic games based upon the computer science idea of compositionality. In it, complex and irregular games can be built up from smaller and simpler games, and the equilibria of these complex games can be defined recursively from the equilibria of their simpler subgames. This paper extends the model by providing a final coalgebra semantics for infinite games. In the course of this, we introduce a new operator on games to model the economic concept of subgame perfection. ",clemens kupke,,2017.0,,arXiv,Ghani2017,True,,arXiv,Not available,A Compositional Treatment of Iterated Open Games,71ee4e84f0712dcd1c92eca28d8fbd17,http://arxiv.org/abs/1711.07968v1 14162," Compositional Game Theory is a new, recently introduced model of economic games based upon the computer science idea of compositionality. In it, complex and irregular games can be built up from smaller and simpler games, and the equilibria of these complex games can be defined recursively from the equilibria of their simpler subgames. This paper extends the model by providing a final coalgebra semantics for infinite games. In the course of this, we introduce a new operator on games to model the economic concept of subgame perfection. ",alasdair lambert,,2017.0,,arXiv,Ghani2017,True,,arXiv,Not available,A Compositional Treatment of Iterated Open Games,71ee4e84f0712dcd1c92eca28d8fbd17,http://arxiv.org/abs/1711.07968v1 14163," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP $\cap$ coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",patricia bouyer,,2015.0,,arXiv,Bouyer2015,True,,arXiv,Not available,Average-energy games (full version),1cbecdf59bd57c3263b5e9ceee9b9ab3,http://arxiv.org/abs/1512.08106v3 14164," Compositional Game Theory is a new, recently introduced model of economic games based upon the computer science idea of compositionality. In it, complex and irregular games can be built up from smaller and simpler games, and the equilibria of these complex games can be defined recursively from the equilibria of their simpler subgames. This paper extends the model by providing a final coalgebra semantics for infinite games. In the course of this, we introduce a new operator on games to model the economic concept of subgame perfection. ",fredrik forsberg,,2017.0,,arXiv,Ghani2017,True,,arXiv,Not available,A Compositional Treatment of Iterated Open Games,71ee4e84f0712dcd1c92eca28d8fbd17,http://arxiv.org/abs/1711.07968v1 14165," We study algorithms for solving Subtraction games, which sometimes are referred to as one-heap Nim games. We describe a quantum algorithm which is applicable to any game on DAG, and show that its query compexity for solving an arbitrary Subtraction game of $n$ stones is $O(n^{3/2}\log n)$. The best known deterministic algorithms for solving such games are based on the dynamic programming approach. We show that this approach is asymptotically optimal and that classical query complexity for solving a Subtraction game is generally $\Theta(n^2)$. This paper perhaps is the first explicit ""quantum"" contribution to algorithmic game theory. ",kamil khadiev,,2018.0,,arXiv,Khadiev2018,True,,arXiv,Not available,On the Complexity of Solving Subtraction Games,877ea460fc714faac85d78787f1edad6,http://arxiv.org/abs/1808.03494v1 14166," We study algorithms for solving Subtraction games, which sometimes are referred to as one-heap Nim games. We describe a quantum algorithm which is applicable to any game on DAG, and show that its query compexity for solving an arbitrary Subtraction game of $n$ stones is $O(n^{3/2}\log n)$. The best known deterministic algorithms for solving such games are based on the dynamic programming approach. We show that this approach is asymptotically optimal and that classical query complexity for solving a Subtraction game is generally $\Theta(n^2)$. This paper perhaps is the first explicit ""quantum"" contribution to algorithmic game theory. ",dmitry kravchenko,,2018.0,,arXiv,Khadiev2018,True,,arXiv,Not available,On the Complexity of Solving Subtraction Games,877ea460fc714faac85d78787f1edad6,http://arxiv.org/abs/1808.03494v1 14167," Here we present a ground-breaking new postulate for game theory. The first part of this postulate contains the axiomatic observation that all games are created by a designer, whether they are: e.g., (dynamic/static) or (stationary/non-stationary) or (sequential/one-shot) non-cooperative games, and importantly, whether or not they are intended to represent a non-cooperative Stackelberg game, they can be mapped to a Stackelberg game. I.e., the game designer is the leader who is totally rational and honest, and the followers are mapped to the players of the designed game. If now the game designer, or ""the leader"" in the Stackelberg context, adopts a pure strategy, we postulate the following second part following from axiomatic observation of ultimate game leadership, where empirical insight leads to the second part of this postulate. Importantly, implementing a non-cooperative Stackelberg game, with a very honest and rational leader results in social optimality for all players (followers), assuming pure strategy across all followers and leader, and that the leader is totally rational, honest, and is able to achieve a minimum amount of competency in leading this game, with any finite number of iterations of leading this finite game. ",jie dong,,2015.0,,arXiv,Dong2015,True,,arXiv,Not available,"The Application of Non-Cooperative Stackelberg Game Theory in Behavioral Science: Social Optimality with any Number of Players",b6ee8edb21189ff7f381f94d3fa723e8,http://arxiv.org/abs/1506.00012v1 14168," Here we present a ground-breaking new postulate for game theory. The first part of this postulate contains the axiomatic observation that all games are created by a designer, whether they are: e.g., (dynamic/static) or (stationary/non-stationary) or (sequential/one-shot) non-cooperative games, and importantly, whether or not they are intended to represent a non-cooperative Stackelberg game, they can be mapped to a Stackelberg game. I.e., the game designer is the leader who is totally rational and honest, and the followers are mapped to the players of the designed game. If now the game designer, or ""the leader"" in the Stackelberg context, adopts a pure strategy, we postulate the following second part following from axiomatic observation of ultimate game leadership, where empirical insight leads to the second part of this postulate. Importantly, implementing a non-cooperative Stackelberg game, with a very honest and rational leader results in social optimality for all players (followers), assuming pure strategy across all followers and leader, and that the leader is totally rational, honest, and is able to achieve a minimum amount of competency in leading this game, with any finite number of iterations of leading this finite game. ",nicole sawyer,,2015.0,,arXiv,Dong2015,True,,arXiv,Not available,"The Application of Non-Cooperative Stackelberg Game Theory in Behavioral Science: Social Optimality with any Number of Players",b6ee8edb21189ff7f381f94d3fa723e8,http://arxiv.org/abs/1506.00012v1 14169," Here we present a ground-breaking new postulate for game theory. The first part of this postulate contains the axiomatic observation that all games are created by a designer, whether they are: e.g., (dynamic/static) or (stationary/non-stationary) or (sequential/one-shot) non-cooperative games, and importantly, whether or not they are intended to represent a non-cooperative Stackelberg game, they can be mapped to a Stackelberg game. I.e., the game designer is the leader who is totally rational and honest, and the followers are mapped to the players of the designed game. If now the game designer, or ""the leader"" in the Stackelberg context, adopts a pure strategy, we postulate the following second part following from axiomatic observation of ultimate game leadership, where empirical insight leads to the second part of this postulate. Importantly, implementing a non-cooperative Stackelberg game, with a very honest and rational leader results in social optimality for all players (followers), assuming pure strategy across all followers and leader, and that the leader is totally rational, honest, and is able to achieve a minimum amount of competency in leading this game, with any finite number of iterations of leading this finite game. ",david smith,,2015.0,,arXiv,Dong2015,True,,arXiv,Not available,"The Application of Non-Cooperative Stackelberg Game Theory in Behavioral Science: Social Optimality with any Number of Players",b6ee8edb21189ff7f381f94d3fa723e8,http://arxiv.org/abs/1506.00012v1 14170," This paper provides a tutorial overview of game theoretic techniques used for communication over frequency selective interference channels. We discuss both competitive and cooperative techniques. Keywords: Game theory, competitive games, cooperative games, Nash Equilibrium, Nash bargaining solution, Generalized Nash games, Spectrum optimization, distributed coordination, interference channel, multiple access channel, iterative water-filling. ",amir leshem,,2009.0,10.1109/MSP.2009.933372,"IEEE Signal Processing Magazine. Special issue on applications of game theory in signal processing and communications. Volume 26, Issue 4, pages 28-40. Sep. 2009",Leshem2009,True,,arXiv,Not available,"Game theory and the frequency selective interference channel - A tutorial",1c25edc9f17a550238eb38912f881fbd,http://arxiv.org/abs/0903.2174v1 14171," This paper provides a tutorial overview of game theoretic techniques used for communication over frequency selective interference channels. We discuss both competitive and cooperative techniques. Keywords: Game theory, competitive games, cooperative games, Nash Equilibrium, Nash bargaining solution, Generalized Nash games, Spectrum optimization, distributed coordination, interference channel, multiple access channel, iterative water-filling. ",ephi zehavi,,2009.0,10.1109/MSP.2009.933372,"IEEE Signal Processing Magazine. Special issue on applications of game theory in signal processing and communications. Volume 26, Issue 4, pages 28-40. Sep. 2009",Leshem2009,True,,arXiv,Not available,"Game theory and the frequency selective interference channel - A tutorial",1c25edc9f17a550238eb38912f881fbd,http://arxiv.org/abs/0903.2174v1 14172," We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games. ",athanasios kehagias,,2014.0,,arXiv,Kehagias2014,True,,arXiv,Not available,"Cops and Robbers, Game Theory and Zermelo's Early Results",022e6862c41e7ae963adbca123f33733,http://arxiv.org/abs/1407.1647v1 14173," We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games. ",georgios konstantinidis,,2014.0,,arXiv,Kehagias2014,True,,arXiv,Not available,"Cops and Robbers, Game Theory and Zermelo's Early Results",022e6862c41e7ae963adbca123f33733,http://arxiv.org/abs/1407.1647v1 14174," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP $\cap$ coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",nicolas markey,,2015.0,,arXiv,Bouyer2015,True,,arXiv,Not available,Average-energy games (full version),1cbecdf59bd57c3263b5e9ceee9b9ab3,http://arxiv.org/abs/1512.08106v3 14175," The well-known Braess paradox in congestion games states that adding an additional road to a transportation network may increase the total travel time, and consequently decrease the overall efficiency. Motivated by this, this paper presents a paradox in a similar spirit emerging from another distributed resource allocation game on networks, namely the power allocation game between countries developed in \cite{allocation}. The paradox is that by having additional friends may actually decrease a country's total welfare in equilibrium. Conditions for this paradox to occur as well as some price of anarchy results are also derived. ",yuke li,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,The Power Allocation Game on A Network: A Paradox,50db6af5a9eaf62b17212bf2150c4d82,http://arxiv.org/abs/1802.03669v1 14176," The well-known Braess paradox in congestion games states that adding an additional road to a transportation network may increase the total travel time, and consequently decrease the overall efficiency. Motivated by this, this paper presents a paradox in a similar spirit emerging from another distributed resource allocation game on networks, namely the power allocation game between countries developed in \cite{allocation}. The paradox is that by having additional friends may actually decrease a country's total welfare in equilibrium. Conditions for this paradox to occur as well as some price of anarchy results are also derived. ",a. morse,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,The Power Allocation Game on A Network: A Paradox,50db6af5a9eaf62b17212bf2150c4d82,http://arxiv.org/abs/1802.03669v1 14177," Models in Multicriteria Decision Analysis (MCDA) can be analyzed by means of an importance index and an interaction index for every group of criteria. We consider first discrete models in MCDA, without further restriction, which amounts to considering multichoice games, that is, cooperative games with several levels of participation. We propose and axiomatize an interaction index for multichoice games. In a second part, we consider the continuous case, supposing that the continuous model is obtained from a discrete one by means of the Choquet integral. ",mustapha ridaoui,,2018.0,,arXiv,Ridaoui2018,True,,arXiv,Not available,An interaction index for multichoice games,5997eb62ba35646f4e04c8dde9b34ce8,http://arxiv.org/abs/1803.07541v1 14178," Models in Multicriteria Decision Analysis (MCDA) can be analyzed by means of an importance index and an interaction index for every group of criteria. We consider first discrete models in MCDA, without further restriction, which amounts to considering multichoice games, that is, cooperative games with several levels of participation. We propose and axiomatize an interaction index for multichoice games. In a second part, we consider the continuous case, supposing that the continuous model is obtained from a discrete one by means of the Choquet integral. ",michel grabisch,,2018.0,,arXiv,Ridaoui2018,True,,arXiv,Not available,An interaction index for multichoice games,5997eb62ba35646f4e04c8dde9b34ce8,http://arxiv.org/abs/1803.07541v1 14179," Models in Multicriteria Decision Analysis (MCDA) can be analyzed by means of an importance index and an interaction index for every group of criteria. We consider first discrete models in MCDA, without further restriction, which amounts to considering multichoice games, that is, cooperative games with several levels of participation. We propose and axiomatize an interaction index for multichoice games. In a second part, we consider the continuous case, supposing that the continuous model is obtained from a discrete one by means of the Choquet integral. ",christophe labreuche,,2018.0,,arXiv,Ridaoui2018,True,,arXiv,Not available,An interaction index for multichoice games,5997eb62ba35646f4e04c8dde9b34ce8,http://arxiv.org/abs/1803.07541v1 14180," Game-theoretical approach to the analysis of parallel algorithms is proposed. The approach is based on presentation of the parallel computing as a congestion game. In the game processes compete for resources such as core of a central processing unit and a communication subsystem. There are players, resources and payoffs (time delays) of players which depend on resources usage. Comparative analysis of various optimality principles in the proposed model may be performed. ",o. malafeyev,,2018.0,,arXiv,Malafeyev2018,True,,arXiv,Not available,Parallel computing as a congestion game,a4a4264439f5b9ce7b822fc0b1f3dc11,http://arxiv.org/abs/1804.08856v1 14181," Game-theoretical approach to the analysis of parallel algorithms is proposed. The approach is based on presentation of the parallel computing as a congestion game. In the game processes compete for resources such as core of a central processing unit and a communication subsystem. There are players, resources and payoffs (time delays) of players which depend on resources usage. Comparative analysis of various optimality principles in the proposed model may be performed. ",s. nemnyugin,,2018.0,,arXiv,Malafeyev2018,True,,arXiv,Not available,Parallel computing as a congestion game,a4a4264439f5b9ce7b822fc0b1f3dc11,http://arxiv.org/abs/1804.08856v1 14182," The quantum Nash equilibrium in the thermodynamic limit is studied for games like quantum Prisoner's dilemma and the quantum game of chicken. A phase transition is seen in both games as a function of the entanglement in the game. We observe that for maximal entanglement irrespective of the classical payoffs, a majority of players choose Quantum strategy over Defect in the thermodynamic limit. ",shubhayan sarkar,,2018.0,,arXiv,Sarkar2018,True,,arXiv,Not available,Quantum Nash equilibrium in the thermodynamic limit,1c72d0014cf767a6d3c8edcb8ef0e814,http://arxiv.org/abs/1806.07343v1 14183," The quantum Nash equilibrium in the thermodynamic limit is studied for games like quantum Prisoner's dilemma and the quantum game of chicken. A phase transition is seen in both games as a function of the entanglement in the game. We observe that for maximal entanglement irrespective of the classical payoffs, a majority of players choose Quantum strategy over Defect in the thermodynamic limit. ",colin benjamin,,2018.0,,arXiv,Sarkar2018,True,,arXiv,Not available,Quantum Nash equilibrium in the thermodynamic limit,1c72d0014cf767a6d3c8edcb8ef0e814,http://arxiv.org/abs/1806.07343v1 14184," In categorical compositional semantics of natural language one studies functors from a category of grammatical derivations (such as a Lambek pregroup) to a semantic category (such as real vector spaces). We compositionally build game-theoretic semantics of sentences by taking the semantic category to be the category whose morphisms are open games. This requires some modifications to the grammar category to compensate for the failure of open games to form a compact closed category. We illustrate the theory using simple examples of Wittgenstein's language-games. ",jules hedges,,2018.0,10.4204/EPTCS.283.7,"EPTCS 283, 2018, pp. 89-102",Hedges2018,True,,arXiv,Not available,Towards Functorial Language-Games,f8b31f2be577a9ab12d806b4934dac4b,http://arxiv.org/abs/1807.07828v2 14185," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP $\cap$ coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",mickael randour,,2015.0,,arXiv,Bouyer2015,True,,arXiv,Not available,Average-energy games (full version),1cbecdf59bd57c3263b5e9ceee9b9ab3,http://arxiv.org/abs/1512.08106v3 14186," In categorical compositional semantics of natural language one studies functors from a category of grammatical derivations (such as a Lambek pregroup) to a semantic category (such as real vector spaces). We compositionally build game-theoretic semantics of sentences by taking the semantic category to be the category whose morphisms are open games. This requires some modifications to the grammar category to compensate for the failure of open games to form a compact closed category. We illustrate the theory using simple examples of Wittgenstein's language-games. ",martha lewis,,2018.0,10.4204/EPTCS.283.7,"EPTCS 283, 2018, pp. 89-102",Hedges2018,True,,arXiv,Not available,Towards Functorial Language-Games,f8b31f2be577a9ab12d806b4934dac4b,http://arxiv.org/abs/1807.07828v2 14187," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",erik demaine,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14188," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",hiro ito,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14189," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",stefan langerman,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14190," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",jayson lynch,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14191," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",mikhail rudoy,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14192," Cookie Clicker is a popular online incremental game where the goal of the game is to generate as many cookies as possible. In the game you start with an initial cookie generation rate, and you can use cookies as currency to purchase various items that increase your cookie generation rate. In this paper, we analyze strategies for playing Cookie Clicker optimally. While simple to state, the game gives rise to interesting analysis involving ideas from NP-hardness, approximation algorithms, and dynamic programming. ",kai xiao,,2018.0,,arXiv,Demaine2018,True,,arXiv,Not available,Cookie Clicker,65124c4583b01bec54ceef77f93899c4,http://arxiv.org/abs/1808.07540v1 14193," Game theory is the mathematical framework for analyzing strategic interactions in conflict and competition situations. In recent years quantum game theory has earned the attention of physicists, and has emerged as a branch of quantum information theory [1]. With the aid of entanglement and linear superposition of strategies, quantum games are shown to yield signifcant advantage over their classical counterparts. In this paper we explore optimal and equilibrium solutions to quantum minority games. Initial states with different level of entanglement are investigated. Focus will be on 4 and 6 player games with some N-player generalizations. ",puya sharif,,2011.0,10.1063/1.3567477,"Proc. AQT, Volume 1327, AIP(2011), 477-481",Sharif2011,True,,arXiv,Not available,Strategies and payoffs in quantum minority games,207f294efe2cf68f051adc6affa0bb5d,http://arxiv.org/abs/1110.0645v2 14194," Game theory is the mathematical framework for analyzing strategic interactions in conflict and competition situations. In recent years quantum game theory has earned the attention of physicists, and has emerged as a branch of quantum information theory [1]. With the aid of entanglement and linear superposition of strategies, quantum games are shown to yield signifcant advantage over their classical counterparts. In this paper we explore optimal and equilibrium solutions to quantum minority games. Initial states with different level of entanglement are investigated. Focus will be on 4 and 6 player games with some N-player generalizations. ",hoshang heydari,,2011.0,10.1063/1.3567477,"Proc. AQT, Volume 1327, AIP(2011), 477-481",Sharif2011,True,,arXiv,Not available,Strategies and payoffs in quantum minority games,207f294efe2cf68f051adc6affa0bb5d,http://arxiv.org/abs/1110.0645v2 14195," The class of algorithmically computable simple games (i) includes the class of games that have finite carriers and (ii) is included in the class of games that have finite winning coalitions. This paper characterizes computable games, strengthens the earlier result that computable games violate anonymity, and gives examples showing that the above inclusions are strict. It also extends Nakamura's theorem about the nonemptyness of the core and shows that computable games have a finite Nakamura number, implying that the number of alternatives that the players can deal with rationally is restricted. ",masahiro kumabe,,2007.0,10.1016/j.jmateco.2007.05.012,"Journal of Mathematical Economics, Volume 44, Issues 3-4, February 2008, Pages 348-366",Kumabe2007,True,,arXiv,Not available,"Computability of simple games: A characterization and application to the core",f048c6bb130a06160dca00e82e1ac23e,http://arxiv.org/abs/0705.3227v2 14196," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP $\cap$ coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",kim larsen,,2015.0,,arXiv,Bouyer2015,True,,arXiv,Not available,Average-energy games (full version),1cbecdf59bd57c3263b5e9ceee9b9ab3,http://arxiv.org/abs/1512.08106v3 14197," The class of algorithmically computable simple games (i) includes the class of games that have finite carriers and (ii) is included in the class of games that have finite winning coalitions. This paper characterizes computable games, strengthens the earlier result that computable games violate anonymity, and gives examples showing that the above inclusions are strict. It also extends Nakamura's theorem about the nonemptyness of the core and shows that computable games have a finite Nakamura number, implying that the number of alternatives that the players can deal with rationally is restricted. ",h. mihara,,2007.0,10.1016/j.jmateco.2007.05.012,"Journal of Mathematical Economics, Volume 44, Issues 3-4, February 2008, Pages 348-366",Kumabe2007,True,,arXiv,Not available,"Computability of simple games: A characterization and application to the core",f048c6bb130a06160dca00e82e1ac23e,http://arxiv.org/abs/0705.3227v2 14198," We investigate quantitative extensions of modal logic and the modal mu-calculus, and study the question whether the tight connection between logic and games can be lifted from the qualitative logics to their quantitative counterparts. It turns out that, if the quantitative mu-calculus is defined in an appropriate way respecting the duality properties between the logical operators, then its model checking problem can indeed be characterised by a quantitative variant of parity games. However, these quantitative games have quite different properties than their classical counterparts, in particular they are, in general, not positionally determined. The correspondence between the logic and the games goes both ways: the value of a formula on a quantitative transition system coincides with the value of the associated quantitative game, and conversely, the values of quantitative parity games are definable in the quantitative mu-calculus. ",diana fischer,,2008.0,,"Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)",Fischer2008,True,,arXiv,Not available,Model Checking Games for the Quantitative mu-Calculus,09006b47a0d4f8b0c0b308a019b0f0bf,http://arxiv.org/abs/0802.2871v1 14199," We investigate quantitative extensions of modal logic and the modal mu-calculus, and study the question whether the tight connection between logic and games can be lifted from the qualitative logics to their quantitative counterparts. It turns out that, if the quantitative mu-calculus is defined in an appropriate way respecting the duality properties between the logical operators, then its model checking problem can indeed be characterised by a quantitative variant of parity games. However, these quantitative games have quite different properties than their classical counterparts, in particular they are, in general, not positionally determined. The correspondence between the logic and the games goes both ways: the value of a formula on a quantitative transition system coincides with the value of the associated quantitative game, and conversely, the values of quantitative parity games are definable in the quantitative mu-calculus. ",erich gradel,,2008.0,,"Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)",Fischer2008,True,,arXiv,Not available,Model Checking Games for the Quantitative mu-Calculus,09006b47a0d4f8b0c0b308a019b0f0bf,http://arxiv.org/abs/0802.2871v1 14200," We investigate quantitative extensions of modal logic and the modal mu-calculus, and study the question whether the tight connection between logic and games can be lifted from the qualitative logics to their quantitative counterparts. It turns out that, if the quantitative mu-calculus is defined in an appropriate way respecting the duality properties between the logical operators, then its model checking problem can indeed be characterised by a quantitative variant of parity games. However, these quantitative games have quite different properties than their classical counterparts, in particular they are, in general, not positionally determined. The correspondence between the logic and the games goes both ways: the value of a formula on a quantitative transition system coincides with the value of the associated quantitative game, and conversely, the values of quantitative parity games are definable in the quantitative mu-calculus. ",lukasz kaiser,,2008.0,,"Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)",Fischer2008,True,,arXiv,Not available,Model Checking Games for the Quantitative mu-Calculus,09006b47a0d4f8b0c0b308a019b0f0bf,http://arxiv.org/abs/0802.2871v1 14201," The classical algorithm for solving B\""uchi games requires time $O(n\cdot m)$ for game graphs with $n$ states and $m$ edges. For game graphs with constant outdegree, the best known algorithm has running time $O(n^2/\log n)$. We present two new algorithms for B\""uchi games. First, we give an algorithm that performs at most $O(m)$ more work than the classical algorithm, but runs in time O(n) on infinitely many graphs of constant outdegree on which the classical algorithm requires time $O(n^2)$. Second, we give an algorithm with running time $O(n\cdot m\cdot\log\delta(n)/\log n)$, where $1\le\delta(n)\le n$ is the outdegree of the game graph. Note that this algorithm performs asymptotically better than the classical algorithm if $\delta(n)=O(\log n)$. ",krishnendu chatterjee,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Algorithms for Büchi Games,80d57f1b77d1ddf0fcb929332cb27443,http://arxiv.org/abs/0805.2620v1 14202," The classical algorithm for solving B\""uchi games requires time $O(n\cdot m)$ for game graphs with $n$ states and $m$ edges. For game graphs with constant outdegree, the best known algorithm has running time $O(n^2/\log n)$. We present two new algorithms for B\""uchi games. First, we give an algorithm that performs at most $O(m)$ more work than the classical algorithm, but runs in time O(n) on infinitely many graphs of constant outdegree on which the classical algorithm requires time $O(n^2)$. Second, we give an algorithm with running time $O(n\cdot m\cdot\log\delta(n)/\log n)$, where $1\le\delta(n)\le n$ is the outdegree of the game graph. Note that this algorithm performs asymptotically better than the classical algorithm if $\delta(n)=O(\log n)$. ",thomas henzinger,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Algorithms for Büchi Games,80d57f1b77d1ddf0fcb929332cb27443,http://arxiv.org/abs/0805.2620v1 14203," The classical algorithm for solving B\""uchi games requires time $O(n\cdot m)$ for game graphs with $n$ states and $m$ edges. For game graphs with constant outdegree, the best known algorithm has running time $O(n^2/\log n)$. We present two new algorithms for B\""uchi games. First, we give an algorithm that performs at most $O(m)$ more work than the classical algorithm, but runs in time O(n) on infinitely many graphs of constant outdegree on which the classical algorithm requires time $O(n^2)$. Second, we give an algorithm with running time $O(n\cdot m\cdot\log\delta(n)/\log n)$, where $1\le\delta(n)\le n$ is the outdegree of the game graph. Note that this algorithm performs asymptotically better than the classical algorithm if $\delta(n)=O(\log n)$. ",nir piterman,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Algorithms for Büchi Games,80d57f1b77d1ddf0fcb929332cb27443,http://arxiv.org/abs/0805.2620v1 14204," Paradox of choice occurs when permitting new strategies to some players yields lower payoffs for all players in the new equilibrium via a sequence of individually rational actions. We consider social network games. In these games the payoff of each player increases when other players choose the same strategy. The definition of games on social networks was introduced by K. Apt and S. Simon. In an article written jointly with E. Markakis, they considered four types of paradox of choice in such games and gave examples of three of them. The existence of paradoxical networks of the fourth type was proven only in a weakened form. The existence of so-called vulnerable networks in the strong sense remained an open question. In the present paper we solve this open question by introducing a construction, called a cascade, and use it to provide uniform examples for all four definitions of paradoxical networks. ",m. raskin,,2016.0,,arXiv,Raskin2016,True,,arXiv,Not available,Paradoxical examples of social networks games with product choice,250bc58c046a34595418efb5180d48ec,http://arxiv.org/abs/1608.08859v1 14205," Paradox of choice occurs when permitting new strategies to some players yields lower payoffs for all players in the new equilibrium via a sequence of individually rational actions. We consider social network games. In these games the payoff of each player increases when other players choose the same strategy. The definition of games on social networks was introduced by K. Apt and S. Simon. In an article written jointly with E. Markakis, they considered four types of paradox of choice in such games and gave examples of three of them. The existence of paradoxical networks of the fourth type was proven only in a weakened form. The existence of so-called vulnerable networks in the strong sense remained an open question. In the present paper we solve this open question by introducing a construction, called a cascade, and use it to provide uniform examples for all four definitions of paradoxical networks. ",n. nikitenkov,,2016.0,,arXiv,Raskin2016,True,,arXiv,Not available,Paradoxical examples of social networks games with product choice,250bc58c046a34595418efb5180d48ec,http://arxiv.org/abs/1608.08859v1 14206," Decision making in modern large-scale and complex systems such as communication networks, smart electricity grids, and cyber-physical systems motivate novel game-theoretic approaches. This paper investigates big strategic (non-cooperative) games where a finite number of individual players each have a large number of continuous decision variables and input data points. Such high-dimensional decision spaces and big data sets lead to computational challenges, relating to efforts in non-linear optimization scaling up to large systems of variables. In addition to these computational challenges, real-world players often have limited information about their preference parameters due to the prohibitive cost of identifying them or due to operating in dynamic online settings. The challenge of limited information is exacerbated in high dimensions and big data sets. Motivated by both computational and information limitations that constrain the direct solution of big strategic games, our investigation centers around reductions using linear transformations such as random projection methods and their effect on Nash equilibrium solutions. Specific analytical results are presented for quadratic games and approximations. In addition, an adversarial learning game is presented where random projection and sampling schemes are investigated. ",tansu alpcan,,2016.0,,arXiv,Alpcan2016,True,,arXiv,Not available,Large-Scale Strategic Games and Adversarial Machine Learning,6a69dcea850037a2cf861048ff1c5441,http://arxiv.org/abs/1609.06438v1 14207," Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP $\cap$ coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements. ",simon laursen,,2015.0,,arXiv,Bouyer2015,True,,arXiv,Not available,Average-energy games (full version),1cbecdf59bd57c3263b5e9ceee9b9ab3,http://arxiv.org/abs/1512.08106v3 14208," Decision making in modern large-scale and complex systems such as communication networks, smart electricity grids, and cyber-physical systems motivate novel game-theoretic approaches. This paper investigates big strategic (non-cooperative) games where a finite number of individual players each have a large number of continuous decision variables and input data points. Such high-dimensional decision spaces and big data sets lead to computational challenges, relating to efforts in non-linear optimization scaling up to large systems of variables. In addition to these computational challenges, real-world players often have limited information about their preference parameters due to the prohibitive cost of identifying them or due to operating in dynamic online settings. The challenge of limited information is exacerbated in high dimensions and big data sets. Motivated by both computational and information limitations that constrain the direct solution of big strategic games, our investigation centers around reductions using linear transformations such as random projection methods and their effect on Nash equilibrium solutions. Specific analytical results are presented for quadratic games and approximations. In addition, an adversarial learning game is presented where random projection and sampling schemes are investigated. ",benjamin rubinstein,,2016.0,,arXiv,Alpcan2016,True,,arXiv,Not available,Large-Scale Strategic Games and Adversarial Machine Learning,6a69dcea850037a2cf861048ff1c5441,http://arxiv.org/abs/1609.06438v1 14209," Decision making in modern large-scale and complex systems such as communication networks, smart electricity grids, and cyber-physical systems motivate novel game-theoretic approaches. This paper investigates big strategic (non-cooperative) games where a finite number of individual players each have a large number of continuous decision variables and input data points. Such high-dimensional decision spaces and big data sets lead to computational challenges, relating to efforts in non-linear optimization scaling up to large systems of variables. In addition to these computational challenges, real-world players often have limited information about their preference parameters due to the prohibitive cost of identifying them or due to operating in dynamic online settings. The challenge of limited information is exacerbated in high dimensions and big data sets. Motivated by both computational and information limitations that constrain the direct solution of big strategic games, our investigation centers around reductions using linear transformations such as random projection methods and their effect on Nash equilibrium solutions. Specific analytical results are presented for quadratic games and approximations. In addition, an adversarial learning game is presented where random projection and sampling schemes are investigated. ",christopher leckie,,2016.0,,arXiv,Alpcan2016,True,,arXiv,Not available,Large-Scale Strategic Games and Adversarial Machine Learning,6a69dcea850037a2cf861048ff1c5441,http://arxiv.org/abs/1609.06438v1 14210," We investigate the problem of equilibrium computation for ""large"" $n$-player games. Large games have a Lipschitz-type property that no single player's utility is greatly affected by any other individual player's actions. In this paper, we mostly focus on the case where any change of strategy by a player causes other players' payoffs to change by at most $\frac{1}{n}$. We study algorithms having query access to the game's payoff function, aiming to find $\epsilon$-Nash equilibria. We seek algorithms that obtain $\epsilon$ as small as possible, in time polynomial in $n$. Our main result is a randomised algorithm that achieves $\epsilon$ approaching $\frac{1}{8}$ for 2-strategy games in a {\em completely uncoupled} setting, where each player observes her own payoff to a query, and adjusts her behaviour independently of other players' payoffs/actions. $O(\log n)$ rounds/queries are required. We also show how to obtain a slight improvement over $\frac{1}{8}$, by introducing a small amount of communication between the players. Finally, we give extension of our results to large games with more than two strategies per player, and alternative largeness parameters. ",paul goldberg,,2016.0,,arXiv,Goldberg2016,True,,arXiv,Not available,"Logarithmic Query Complexity for Approximate Nash Computation in Large Games",19094b9e5c8bff48dcb4eaa6421a44b7,http://arxiv.org/abs/1610.08906v1 14211," We investigate the problem of equilibrium computation for ""large"" $n$-player games. Large games have a Lipschitz-type property that no single player's utility is greatly affected by any other individual player's actions. In this paper, we mostly focus on the case where any change of strategy by a player causes other players' payoffs to change by at most $\frac{1}{n}$. We study algorithms having query access to the game's payoff function, aiming to find $\epsilon$-Nash equilibria. We seek algorithms that obtain $\epsilon$ as small as possible, in time polynomial in $n$. Our main result is a randomised algorithm that achieves $\epsilon$ approaching $\frac{1}{8}$ for 2-strategy games in a {\em completely uncoupled} setting, where each player observes her own payoff to a query, and adjusts her behaviour independently of other players' payoffs/actions. $O(\log n)$ rounds/queries are required. We also show how to obtain a slight improvement over $\frac{1}{8}$, by introducing a small amount of communication between the players. Finally, we give extension of our results to large games with more than two strategies per player, and alternative largeness parameters. ",francisco marmolejo-cossio,,2016.0,,arXiv,Goldberg2016,True,,arXiv,Not available,"Logarithmic Query Complexity for Approximate Nash Computation in Large Games",19094b9e5c8bff48dcb4eaa6421a44b7,http://arxiv.org/abs/1610.08906v1 14212," We investigate the problem of equilibrium computation for ""large"" $n$-player games. Large games have a Lipschitz-type property that no single player's utility is greatly affected by any other individual player's actions. In this paper, we mostly focus on the case where any change of strategy by a player causes other players' payoffs to change by at most $\frac{1}{n}$. We study algorithms having query access to the game's payoff function, aiming to find $\epsilon$-Nash equilibria. We seek algorithms that obtain $\epsilon$ as small as possible, in time polynomial in $n$. Our main result is a randomised algorithm that achieves $\epsilon$ approaching $\frac{1}{8}$ for 2-strategy games in a {\em completely uncoupled} setting, where each player observes her own payoff to a query, and adjusts her behaviour independently of other players' payoffs/actions. $O(\log n)$ rounds/queries are required. We also show how to obtain a slight improvement over $\frac{1}{8}$, by introducing a small amount of communication between the players. Finally, we give extension of our results to large games with more than two strategies per player, and alternative largeness parameters. ",zhiwei wu,,2016.0,,arXiv,Goldberg2016,True,,arXiv,Not available,"Logarithmic Query Complexity for Approximate Nash Computation in Large Games",19094b9e5c8bff48dcb4eaa6421a44b7,http://arxiv.org/abs/1610.08906v1 14213," The concept of an evolutionarily stable strategy (ESS), introduced by Smith and Price, is a refinement of Nash equilibrium in 2-player symmetric games in order to explain counter-intuitive natural phenomena, whose existence is not guaranteed in every game. The problem of deciding whether a game possesses an ESS has been shown to be $\Sigma_{2}^{P}$-complete by Conitzer using the preceding important work by Etessami and Lochbihler. The latter, among other results, proved that deciding the existence of ESS is both NP-hard and coNP-hard. In this paper we introduce a ""reduction robustness"" notion and we show that deciding the existence of an ESS remains coNP-hard for a wide range of games even if we arbitrarily perturb within some intervals the payoff values of the game under consideration. In contrast, ESS exist almost surely for large games with random and independent payoffs chosen from the same distribution. ",themistoklis melissourgos,,2017.0,,arXiv,Melissourgos2017,True,,arXiv,Not available,"Existence of Evolutionarily Stable Strategies Remains Hard to Decide for a Wide Range of Payoff Values",6db532d94027cf166634a0fd208d9f67,http://arxiv.org/abs/1701.08108v1 14214," The concept of an evolutionarily stable strategy (ESS), introduced by Smith and Price, is a refinement of Nash equilibrium in 2-player symmetric games in order to explain counter-intuitive natural phenomena, whose existence is not guaranteed in every game. The problem of deciding whether a game possesses an ESS has been shown to be $\Sigma_{2}^{P}$-complete by Conitzer using the preceding important work by Etessami and Lochbihler. The latter, among other results, proved that deciding the existence of ESS is both NP-hard and coNP-hard. In this paper we introduce a ""reduction robustness"" notion and we show that deciding the existence of an ESS remains coNP-hard for a wide range of games even if we arbitrarily perturb within some intervals the payoff values of the game under consideration. In contrast, ESS exist almost surely for large games with random and independent payoffs chosen from the same distribution. ",paul spirakis,,2017.0,,arXiv,Melissourgos2017,True,,arXiv,Not available,"Existence of Evolutionarily Stable Strategies Remains Hard to Decide for a Wide Range of Payoff Values",6db532d94027cf166634a0fd208d9f67,http://arxiv.org/abs/1701.08108v1 14215," We study 2-player turn-based perfect-information stochastic games with countably infinite state space. The players aim at maximizing/minimizing the probability of a given event (i.e., measurable set of infinite plays), such as reachability, B\""uchi, omega-regular or more general objectives. These games are known to be weakly determined, i.e., they have value. However, strong determinacy of threshold objectives (given by an event and a threshold $c \in [0,1]$) was open in many cases: is it always the case that the maximizer or the minimizer has a winning strategy, i.e., one that enforces, against all strategies of the other player, that the objective is satisfied with probability $\ge c$ (resp. $< c$)? We show that almost-sure objectives (where $c=1$) are strongly determined. This vastly generalizes a previous result on finite games with almost-sure tail objectives. On the other hand we show that $\ge 1/2$ (co-)B\""uchi objectives are not strongly determined, not even if the game is finitely branching. Moreover, for almost-sure reachability and almost-sure B\""uchi objectives in finitely branching games, we strengthen strong determinacy by showing that one of the players must have a memoryless deterministic (MD) winning strategy. ",stefan kiefer,,2017.0,,LICS 2017,Kiefer2017,True,,arXiv,Not available,On Strong Determinacy of Countable Stochastic Games,2f9e0a503a12c0a4d60f1932afd4763d,http://arxiv.org/abs/1704.05003v1 14216," We study 2-player turn-based perfect-information stochastic games with countably infinite state space. The players aim at maximizing/minimizing the probability of a given event (i.e., measurable set of infinite plays), such as reachability, B\""uchi, omega-regular or more general objectives. These games are known to be weakly determined, i.e., they have value. However, strong determinacy of threshold objectives (given by an event and a threshold $c \in [0,1]$) was open in many cases: is it always the case that the maximizer or the minimizer has a winning strategy, i.e., one that enforces, against all strategies of the other player, that the objective is satisfied with probability $\ge c$ (resp. $< c$)? We show that almost-sure objectives (where $c=1$) are strongly determined. This vastly generalizes a previous result on finite games with almost-sure tail objectives. On the other hand we show that $\ge 1/2$ (co-)B\""uchi objectives are not strongly determined, not even if the game is finitely branching. Moreover, for almost-sure reachability and almost-sure B\""uchi objectives in finitely branching games, we strengthen strong determinacy by showing that one of the players must have a memoryless deterministic (MD) winning strategy. ",richard mayr,,2017.0,,LICS 2017,Kiefer2017,True,,arXiv,Not available,On Strong Determinacy of Countable Stochastic Games,2f9e0a503a12c0a4d60f1932afd4763d,http://arxiv.org/abs/1704.05003v1 14217," We study 2-player turn-based perfect-information stochastic games with countably infinite state space. The players aim at maximizing/minimizing the probability of a given event (i.e., measurable set of infinite plays), such as reachability, B\""uchi, omega-regular or more general objectives. These games are known to be weakly determined, i.e., they have value. However, strong determinacy of threshold objectives (given by an event and a threshold $c \in [0,1]$) was open in many cases: is it always the case that the maximizer or the minimizer has a winning strategy, i.e., one that enforces, against all strategies of the other player, that the objective is satisfied with probability $\ge c$ (resp. $< c$)? We show that almost-sure objectives (where $c=1$) are strongly determined. This vastly generalizes a previous result on finite games with almost-sure tail objectives. On the other hand we show that $\ge 1/2$ (co-)B\""uchi objectives are not strongly determined, not even if the game is finitely branching. Moreover, for almost-sure reachability and almost-sure B\""uchi objectives in finitely branching games, we strengthen strong determinacy by showing that one of the players must have a memoryless deterministic (MD) winning strategy. ",mahsa shirmohammadi,,2017.0,,LICS 2017,Kiefer2017,True,,arXiv,Not available,On Strong Determinacy of Countable Stochastic Games,2f9e0a503a12c0a4d60f1932afd4763d,http://arxiv.org/abs/1704.05003v1 14218," We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. While several results have been obtained on these games recently, decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) remained open; in particular, so far there was no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the density of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions. ",patricia bouyer,,2016.0,,arXiv,Bouyer2016,True,,arXiv,Not available,Bounding Average-energy Games,12cd3045bec01173a10578470b35d0d7,http://arxiv.org/abs/1610.07858v3 14219," We study 2-player turn-based perfect-information stochastic games with countably infinite state space. The players aim at maximizing/minimizing the probability of a given event (i.e., measurable set of infinite plays), such as reachability, B\""uchi, omega-regular or more general objectives. These games are known to be weakly determined, i.e., they have value. However, strong determinacy of threshold objectives (given by an event and a threshold $c \in [0,1]$) was open in many cases: is it always the case that the maximizer or the minimizer has a winning strategy, i.e., one that enforces, against all strategies of the other player, that the objective is satisfied with probability $\ge c$ (resp. $< c$)? We show that almost-sure objectives (where $c=1$) are strongly determined. This vastly generalizes a previous result on finite games with almost-sure tail objectives. On the other hand we show that $\ge 1/2$ (co-)B\""uchi objectives are not strongly determined, not even if the game is finitely branching. Moreover, for almost-sure reachability and almost-sure B\""uchi objectives in finitely branching games, we strengthen strong determinacy by showing that one of the players must have a memoryless deterministic (MD) winning strategy. ",dominik wojtczak,,2017.0,,LICS 2017,Kiefer2017,True,,arXiv,Not available,On Strong Determinacy of Countable Stochastic Games,2f9e0a503a12c0a4d60f1932afd4763d,http://arxiv.org/abs/1704.05003v1 14220," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",haris aziz,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14221," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",florian brandl,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14222," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",felix brandt,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14223," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",paul harrenstein,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14224," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",martin olsen,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14225," The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core. ",dominik peters,,2017.0,,arXiv,Aziz2017,True,,arXiv,Not available,Fractional Hedonic Games,5db1861b3961999efa91fffb22cf66eb,http://arxiv.org/abs/1705.10116v1 14226," The off-switch game is a game theoretic model of a highly intelligent robot interacting with a human. In the original paper by Hadfield-Menell et al. (2016), the analysis is not fully game-theoretic as the human is modelled as an irrational player, and the robot's best action is only calculated under unrealistic normality and soft-max assumptions. In this paper, we make the analysis fully game theoretic, by modelling the human as a rational player with a random utility function. As a consequence, we are able to easily calculate the robot's best action for arbitrary belief and irrationality assumptions. ",tobias wangberg,,2017.0,,"Artificial General Intelligence: 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings, pages 167-177",Wängberg2017,True,,arXiv,Not available,A Game-Theoretic Analysis of the Off-Switch Game,67f92c3a8577197e802daf275d56a298,http://arxiv.org/abs/1708.03871v1 14227," The off-switch game is a game theoretic model of a highly intelligent robot interacting with a human. In the original paper by Hadfield-Menell et al. (2016), the analysis is not fully game-theoretic as the human is modelled as an irrational player, and the robot's best action is only calculated under unrealistic normality and soft-max assumptions. In this paper, we make the analysis fully game theoretic, by modelling the human as a rational player with a random utility function. As a consequence, we are able to easily calculate the robot's best action for arbitrary belief and irrationality assumptions. ",mikael boors,,2017.0,,"Artificial General Intelligence: 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings, pages 167-177",Wängberg2017,True,,arXiv,Not available,A Game-Theoretic Analysis of the Off-Switch Game,67f92c3a8577197e802daf275d56a298,http://arxiv.org/abs/1708.03871v1 14228," The off-switch game is a game theoretic model of a highly intelligent robot interacting with a human. In the original paper by Hadfield-Menell et al. (2016), the analysis is not fully game-theoretic as the human is modelled as an irrational player, and the robot's best action is only calculated under unrealistic normality and soft-max assumptions. In this paper, we make the analysis fully game theoretic, by modelling the human as a rational player with a random utility function. As a consequence, we are able to easily calculate the robot's best action for arbitrary belief and irrationality assumptions. ",elliot catt,,2017.0,,"Artificial General Intelligence: 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings, pages 167-177",Wängberg2017,True,,arXiv,Not available,A Game-Theoretic Analysis of the Off-Switch Game,67f92c3a8577197e802daf275d56a298,http://arxiv.org/abs/1708.03871v1 14229," The optimal pricing problem is a fundamental problem that arises in combinatorial auctions. Suppose that there is one seller who has indivisible items and multiple buyers who want to purchase a combination of the items. The seller wants to sell his items for the highest possible prices, and each buyer wants to maximize his utility (i.e., valuation minus payment) as long as his payment does not exceed his budget. The optimal pricing problem seeks a price of each item and an assignment of items to buyers such that every buyer achieves the maximum utility under the prices. The goal of the problem is to maximize the total payment from buyers. In this paper, we consider the case that the valuations are submodular. We show that the problem is computationally hard even if there exists only one buyer. Then we propose approximation algorithms for the unlimited budget case. We also extend the algorithm for the limited budget case when there exists one buyer and multiple buyers collaborate with each other. ",hanna sumita,,2016.0,,arXiv,Maehara2016,True,,arXiv,Not available,Optimal Pricing for Submodular Valuations with Bounded Curvature,e4d17dcf5b3a2032ef314f88a682efed,http://arxiv.org/abs/1611.07605v1 14230," We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. While several results have been obtained on these games recently, decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) remained open; in particular, so far there was no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the density of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions. ",piotr hofman,,2016.0,,arXiv,Bouyer2016,True,,arXiv,Not available,Bounding Average-energy Games,12cd3045bec01173a10578470b35d0d7,http://arxiv.org/abs/1610.07858v3 14231," The off-switch game is a game theoretic model of a highly intelligent robot interacting with a human. In the original paper by Hadfield-Menell et al. (2016), the analysis is not fully game-theoretic as the human is modelled as an irrational player, and the robot's best action is only calculated under unrealistic normality and soft-max assumptions. In this paper, we make the analysis fully game theoretic, by modelling the human as a rational player with a random utility function. As a consequence, we are able to easily calculate the robot's best action for arbitrary belief and irrationality assumptions. ",tom everitt,,2017.0,,"Artificial General Intelligence: 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings, pages 167-177",Wängberg2017,True,,arXiv,Not available,A Game-Theoretic Analysis of the Off-Switch Game,67f92c3a8577197e802daf275d56a298,http://arxiv.org/abs/1708.03871v1 14232," The off-switch game is a game theoretic model of a highly intelligent robot interacting with a human. In the original paper by Hadfield-Menell et al. (2016), the analysis is not fully game-theoretic as the human is modelled as an irrational player, and the robot's best action is only calculated under unrealistic normality and soft-max assumptions. In this paper, we make the analysis fully game theoretic, by modelling the human as a rational player with a random utility function. As a consequence, we are able to easily calculate the robot's best action for arbitrary belief and irrationality assumptions. ",marcus hutter,,2017.0,,"Artificial General Intelligence: 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings, pages 167-177",Wängberg2017,True,,arXiv,Not available,A Game-Theoretic Analysis of the Off-Switch Game,67f92c3a8577197e802daf275d56a298,http://arxiv.org/abs/1708.03871v1 14233," We consider N-player non-zero sum games played on finite trees (i.e., sequential games), in which the players have the right to repeatedly update their respective strategies (for instance, to improve the outcome wrt to the current strategy profile). This generates a dynamics in the game which may eventually stabilise to a Nash Equilibrium (as with Kukushkin's lazy improvement), and we argue that it is interesting to study the conditions that guarantee such a dynamics to terminate. We build on the works of Le Roux and Pauly who have studied extensively one such dynamics, namely the Lazy Improvement Dynamics. We extend these works by first defining a turn-based dynamics, proving that it terminates on subgame perfect equilibria, and showing that several variants do not terminate. Second, we define a variant of Kukushkin's lazy improvement where the players may now form coalitions to change strategies. We show how properties of the players' preferences on the outcomes affect the termination of this dynamics, and we thereby characterise classes of games where it always terminates (in particular two-player games). ",thomas brihaye,,2017.0,10.4204/EPTCS.256.10,"EPTCS 256, 2017, pp. 136-150",Brihaye2017,True,,arXiv,Not available,Dynamics and Coalitions in Sequential Games,a2e086a4bff5b2f4d1513494ca82807c,http://arxiv.org/abs/1709.02100v1 14234," We consider N-player non-zero sum games played on finite trees (i.e., sequential games), in which the players have the right to repeatedly update their respective strategies (for instance, to improve the outcome wrt to the current strategy profile). This generates a dynamics in the game which may eventually stabilise to a Nash Equilibrium (as with Kukushkin's lazy improvement), and we argue that it is interesting to study the conditions that guarantee such a dynamics to terminate. We build on the works of Le Roux and Pauly who have studied extensively one such dynamics, namely the Lazy Improvement Dynamics. We extend these works by first defining a turn-based dynamics, proving that it terminates on subgame perfect equilibria, and showing that several variants do not terminate. Second, we define a variant of Kukushkin's lazy improvement where the players may now form coalitions to change strategies. We show how properties of the players' preferences on the outcomes affect the termination of this dynamics, and we thereby characterise classes of games where it always terminates (in particular two-player games). ",gilles geeraerts,,2017.0,10.4204/EPTCS.256.10,"EPTCS 256, 2017, pp. 136-150",Brihaye2017,True,,arXiv,Not available,Dynamics and Coalitions in Sequential Games,a2e086a4bff5b2f4d1513494ca82807c,http://arxiv.org/abs/1709.02100v1 14235," We consider N-player non-zero sum games played on finite trees (i.e., sequential games), in which the players have the right to repeatedly update their respective strategies (for instance, to improve the outcome wrt to the current strategy profile). This generates a dynamics in the game which may eventually stabilise to a Nash Equilibrium (as with Kukushkin's lazy improvement), and we argue that it is interesting to study the conditions that guarantee such a dynamics to terminate. We build on the works of Le Roux and Pauly who have studied extensively one such dynamics, namely the Lazy Improvement Dynamics. We extend these works by first defining a turn-based dynamics, proving that it terminates on subgame perfect equilibria, and showing that several variants do not terminate. Second, we define a variant of Kukushkin's lazy improvement where the players may now form coalitions to change strategies. We show how properties of the players' preferences on the outcomes affect the termination of this dynamics, and we thereby characterise classes of games where it always terminates (in particular two-player games). ",marion hallet,,2017.0,10.4204/EPTCS.256.10,"EPTCS 256, 2017, pp. 136-150",Brihaye2017,True,,arXiv,Not available,Dynamics and Coalitions in Sequential Games,a2e086a4bff5b2f4d1513494ca82807c,http://arxiv.org/abs/1709.02100v1 14236," We consider N-player non-zero sum games played on finite trees (i.e., sequential games), in which the players have the right to repeatedly update their respective strategies (for instance, to improve the outcome wrt to the current strategy profile). This generates a dynamics in the game which may eventually stabilise to a Nash Equilibrium (as with Kukushkin's lazy improvement), and we argue that it is interesting to study the conditions that guarantee such a dynamics to terminate. We build on the works of Le Roux and Pauly who have studied extensively one such dynamics, namely the Lazy Improvement Dynamics. We extend these works by first defining a turn-based dynamics, proving that it terminates on subgame perfect equilibria, and showing that several variants do not terminate. Second, we define a variant of Kukushkin's lazy improvement where the players may now form coalitions to change strategies. We show how properties of the players' preferences on the outcomes affect the termination of this dynamics, and we thereby characterise classes of games where it always terminates (in particular two-player games). ",stephane roux,,2017.0,10.4204/EPTCS.256.10,"EPTCS 256, 2017, pp. 136-150",Brihaye2017,True,,arXiv,Not available,Dynamics and Coalitions in Sequential Games,a2e086a4bff5b2f4d1513494ca82807c,http://arxiv.org/abs/1709.02100v1 14237," We show that a cooperative game may be decomposed into a sum of component games, one for each player, using the combinatorial Hodge decomposition on a graph. This decomposition is shown to satisfy certain efficiency, null-player, symmetry, and linearity properties. Consequently, we obtain a new characterization of the classical Shapley value as the value of the grand coalition in each player's component game. We also relate this decomposition to a least-squares problem involving inessential games (in a similar spirit to previous work on least-squares and minimum-norm solution concepts) and to the graph Laplacian. Finally, we generalize this approach to games with weights and/or constraints on coalition formation. ",ari stern,,2017.0,,arXiv,Stern2017,True,,arXiv,Not available,Hodge decomposition and the Shapley value of a cooperative game,234702246d4142047dfcaa8d09ca5de6,http://arxiv.org/abs/1709.08318v2 14238," We show that a cooperative game may be decomposed into a sum of component games, one for each player, using the combinatorial Hodge decomposition on a graph. This decomposition is shown to satisfy certain efficiency, null-player, symmetry, and linearity properties. Consequently, we obtain a new characterization of the classical Shapley value as the value of the grand coalition in each player's component game. We also relate this decomposition to a least-squares problem involving inessential games (in a similar spirit to previous work on least-squares and minimum-norm solution concepts) and to the graph Laplacian. Finally, we generalize this approach to games with weights and/or constraints on coalition formation. ",alexander tettenhorst,,2017.0,,arXiv,Stern2017,True,,arXiv,Not available,Hodge decomposition and the Shapley value of a cooperative game,234702246d4142047dfcaa8d09ca5de6,http://arxiv.org/abs/1709.08318v2 14239," We provide, to the best of our knowledge, the first computational study of extensive-form adversarial team games. These games are sequential, zero-sum games in which a team of players, sharing the same utility function, faces an adversary. We define three different scenarios according to the communication capabilities of the team. In the first, the teammates can communicate and correlate their actions both before and during the play. In the second, they can only communicate before the play. In the third, no communication is possible at all. We define the most suitable solution concepts, and we study the inefficiency caused by partial or null communication, showing that the inefficiency can be arbitrarily large in the size of the game tree. Furthermore, we study the computational complexity of the equilibrium-finding problem in the three scenarios mentioned above, and we provide, for each of the three scenarios, an exact algorithm. Finally, we empirically evaluate the scalability of the algorithms in random games and the inefficiency caused by partial or null communication. ",andrea celli,,2017.0,,arXiv,Celli2017,True,,arXiv,Not available,Computational Results for Extensive-Form Adversarial Team Games,d3248c53b587f9f9f00c6aeef81d533f,http://arxiv.org/abs/1711.06930v1 14240," We provide, to the best of our knowledge, the first computational study of extensive-form adversarial team games. These games are sequential, zero-sum games in which a team of players, sharing the same utility function, faces an adversary. We define three different scenarios according to the communication capabilities of the team. In the first, the teammates can communicate and correlate their actions both before and during the play. In the second, they can only communicate before the play. In the third, no communication is possible at all. We define the most suitable solution concepts, and we study the inefficiency caused by partial or null communication, showing that the inefficiency can be arbitrarily large in the size of the game tree. Furthermore, we study the computational complexity of the equilibrium-finding problem in the three scenarios mentioned above, and we provide, for each of the three scenarios, an exact algorithm. Finally, we empirically evaluate the scalability of the algorithms in random games and the inefficiency caused by partial or null communication. ",nicola gatti,,2017.0,,arXiv,Celli2017,True,,arXiv,Not available,Computational Results for Extensive-Form Adversarial Team Games,d3248c53b587f9f9f00c6aeef81d533f,http://arxiv.org/abs/1711.06930v1 14241," We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. While several results have been obtained on these games recently, decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) remained open; in particular, so far there was no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the density of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions. ",nicolas markey,,2016.0,,arXiv,Bouyer2016,True,,arXiv,Not available,Bounding Average-energy Games,12cd3045bec01173a10578470b35d0d7,http://arxiv.org/abs/1610.07858v3 14242," Finding optimal solutions for multi-unit combinatorial auctions is a hard problem and finding approximations to the optimal solution is also hard. We investigate the use of Branch-and-Bound techniques: they require both a way to bound from above the value of the best allocation and a good criterion to decide which bids are to be tried first. Different methods for efficiently bounding from above the value of the best allocation are considered. Theoretical original results characterize the best approximation ratio and the ordering criterion that provides it. We suggest to use this criterion. ",rica gonen,,2002.0,,"Second ACM Conference on Electronic Commerce (EC'00) Minneapolis, Minnesota, October 2000, pp. 13-20",Gonen2002,True,,arXiv,Not available,"Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and Bound Heuristics",78d13f08b1f1cd8a7c60eb9bbe02f304,http://arxiv.org/abs/cs/0202032v1 14243," Finding optimal solutions for multi-unit combinatorial auctions is a hard problem and finding approximations to the optimal solution is also hard. We investigate the use of Branch-and-Bound techniques: they require both a way to bound from above the value of the best allocation and a good criterion to decide which bids are to be tried first. Different methods for efficiently bounding from above the value of the best allocation are considered. Theoretical original results characterize the best approximation ratio and the ordering criterion that provides it. We suggest to use this criterion. ",daniel lehmann,,2002.0,,"Second ACM Conference on Electronic Commerce (EC'00) Minneapolis, Minnesota, October 2000, pp. 13-20",Gonen2002,True,,arXiv,Not available,"Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and Bound Heuristics",78d13f08b1f1cd8a7c60eb9bbe02f304,http://arxiv.org/abs/cs/0202032v1 14244," The planner wants to give k identical, indivisible objects to the top k valuation agents at zero costs. Each agent knows her own valuation of the object and whether it is among the top k. Modify the (k+1)st-price sealed-bid auction by introducing a small participation fee and the option not to participate in it. This simple mechanism implements the desired outcome in iteratively undominated strategies. Moreover, no pair of agents can profitably deviate from the equilibrium by coordinating their strategies or bribing each other. ",h. mihara,,2011.0,10.1111/j.1468-5876.2011.00543.x,arXiv,Mihara2011,True,,arXiv,Not available,The second-price auction solves King Solomon's dilemma,913a86f7346e6815c2a1563d4bf6cce4,http://arxiv.org/abs/1107.0433v1 14245," There is only one technique for prior-free optimal mechanism design that generalizes beyond the structurally benevolent setting of digital goods. This technique uses random sampling to estimate the distribution of agent values and then employs the Bayesian optimal mechanism for this estimated distribution on the remaining players. Though quite general, even for digital goods, this random sampling auction has a complicated analysis and is known to be suboptimal. To overcome these issues we generalize the consensus technique from Goldberg and Hartline (2003) to structurally rich environments that include, e.g., single-minded combinatorial auctions. ",bach ha,,2011.0,,arXiv,Ha2011,True,,arXiv,Not available,"Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction",3f0b9ef6e941c471ce6a4044fc3364a4,http://arxiv.org/abs/1108.4744v1 14246," There is only one technique for prior-free optimal mechanism design that generalizes beyond the structurally benevolent setting of digital goods. This technique uses random sampling to estimate the distribution of agent values and then employs the Bayesian optimal mechanism for this estimated distribution on the remaining players. Though quite general, even for digital goods, this random sampling auction has a complicated analysis and is known to be suboptimal. To overcome these issues we generalize the consensus technique from Goldberg and Hartline (2003) to structurally rich environments that include, e.g., single-minded combinatorial auctions. ",jason hartline,,2011.0,,arXiv,Ha2011,True,,arXiv,Not available,"Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction",3f0b9ef6e941c471ce6a4044fc3364a4,http://arxiv.org/abs/1108.4744v1 14247," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14248," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",tim roughgarden,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14249," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",jan vondrak,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14250," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",qiqi yan,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14251," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",kareem amin,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 14252," We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. While several results have been obtained on these games recently, decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) remained open; in particular, so far there was no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the density of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions. ",mickael randour,,2016.0,,arXiv,Bouyer2016,True,,arXiv,Not available,Bounding Average-energy Games,12cd3045bec01173a10578470b35d0d7,http://arxiv.org/abs/1610.07858v3 14253," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",michael kearns,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 14254," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",peter key,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 14255," We consider the budget optimization problem faced by an advertiser participating in repeated sponsored search auctions, seeking to maximize the number of clicks attained under that budget. We cast the budget optimization problem as a Markov Decision Process (MDP) with censored observations, and propose a learning algorithm based on the wellknown Kaplan-Meier or product-limit estimator. We validate the performance of this algorithm by comparing it to several others on a large set of search auction data from Microsoft adCenter, demonstrating fast convergence to optimal performance. ",anton schwaighofer,,2012.0,,arXiv,Amin2012,True,,arXiv,Not available,Budget Optimization for Sponsored Search: Censored Learning in MDPs,bd697966366d009336d18045285843ca,http://arxiv.org/abs/1210.4847v1 14256," The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave wireless access networks is investigated. The problem is posed as a multiassignment optimisation problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to design an efficient algorithm by a combination of auction algorithms. The solution algorithm exploits the network optimization structure of the problem, and thus is much more powerful than computationally intensive general-purpose solvers. Theoretical and numerical results evince numerous properties, such as optimality, convergence, and scalability in comparison to existing approaches. ",george athanasiou,,2013.0,,arXiv,Athanasiou2013,True,,arXiv,Not available,"Auction-based Resource Allocation in MillimeterWave Wireless Access Networks",85630bd216f33eea3eacbd480dc6f2bc,http://arxiv.org/abs/1304.1981v1 14257," The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave wireless access networks is investigated. The problem is posed as a multiassignment optimisation problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to design an efficient algorithm by a combination of auction algorithms. The solution algorithm exploits the network optimization structure of the problem, and thus is much more powerful than computationally intensive general-purpose solvers. Theoretical and numerical results evince numerous properties, such as optimality, convergence, and scalability in comparison to existing approaches. ",pradeep weeraddana,,2013.0,,arXiv,Athanasiou2013,True,,arXiv,Not available,"Auction-based Resource Allocation in MillimeterWave Wireless Access Networks",85630bd216f33eea3eacbd480dc6f2bc,http://arxiv.org/abs/1304.1981v1 14258," The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave wireless access networks is investigated. The problem is posed as a multiassignment optimisation problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to design an efficient algorithm by a combination of auction algorithms. The solution algorithm exploits the network optimization structure of the problem, and thus is much more powerful than computationally intensive general-purpose solvers. Theoretical and numerical results evince numerous properties, such as optimality, convergence, and scalability in comparison to existing approaches. ",carlo fischione,,2013.0,,arXiv,Athanasiou2013,True,,arXiv,Not available,"Auction-based Resource Allocation in MillimeterWave Wireless Access Networks",85630bd216f33eea3eacbd480dc6f2bc,http://arxiv.org/abs/1304.1981v1 14259," We show an auction-based algorithm to compute market equilibrium prices in a production model, where consumers purchase items under separable nonlinear utility concave functions which satisfy W.G.S(Weak Gross Substitutes); producers produce items with multiple linear production constraints. Our algorithm differs from previous approaches in that the prices are allowed to both increase and decrease to handle changes in the production. This provides a t^atonnement style algorithm which converges and provides a PTAS. The algorithm can also be extended to arbitrary convex production regions and the Arrow-Debreu model. The convergence is dependent on the behavior of the marginal utility of the concave function. ",junghwan shin,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Auction Algorithm for Production Models,7672f4505a9d6aef4a069a4208a04401,http://arxiv.org/abs/1304.4618v1 14260," We show an auction-based algorithm to compute market equilibrium prices in a production model, where consumers purchase items under separable nonlinear utility concave functions which satisfy W.G.S(Weak Gross Substitutes); producers produce items with multiple linear production constraints. Our algorithm differs from previous approaches in that the prices are allowed to both increase and decrease to handle changes in the production. This provides a t^atonnement style algorithm which converges and provides a PTAS. The algorithm can also be extended to arbitrary convex production regions and the Arrow-Debreu model. The convergence is dependent on the behavior of the marginal utility of the concave function. ",sanjiv kapoor,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Auction Algorithm for Production Models,7672f4505a9d6aef4a069a4208a04401,http://arxiv.org/abs/1304.4618v1 14261," We present an incentive-compatible polynomial-time approximation scheme for multi-unit auctions with general k-minded player valuations. The mechanism fully optimizes over an appropriately chosen sub-range of possible allocations and then uses VCG payments over this sub-range. We show that obtaining a fully polynomial-time incentive-compatible approximation scheme, at least using VCG payments, is NP-hard. For the case of valuations given by black boxes, we give a polynomial-time incentive-compatible 2-approximation mechanism and show that no better is possible, at least using VCG payments. ",shahar dobzinski,,2014.0,10.1613/jair.2950,"Journal Of Artificial Intelligence Research, Volume 37, pages 85-98, 2010",Dobzinski2014,True,,arXiv,Not available,Mechanisms for Multi-Unit Auctions,cf080ba6363a7b0c8d3c6aba5ffa52f0,http://arxiv.org/abs/1401.3834v1 14262," We present an incentive-compatible polynomial-time approximation scheme for multi-unit auctions with general k-minded player valuations. The mechanism fully optimizes over an appropriately chosen sub-range of possible allocations and then uses VCG payments over this sub-range. We show that obtaining a fully polynomial-time incentive-compatible approximation scheme, at least using VCG payments, is NP-hard. For the case of valuations given by black boxes, we give a polynomial-time incentive-compatible 2-approximation mechanism and show that no better is possible, at least using VCG payments. ",noam nisan,,2014.0,10.1613/jair.2950,"Journal Of Artificial Intelligence Research, Volume 37, pages 85-98, 2010",Dobzinski2014,True,,arXiv,Not available,Mechanisms for Multi-Unit Auctions,cf080ba6363a7b0c8d3c6aba5ffa52f0,http://arxiv.org/abs/1401.3834v1 14263," We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. While several results have been obtained on these games recently, decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) remained open; in particular, so far there was no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the density of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions. ",martin zimmermann,,2016.0,,arXiv,Bouyer2016,True,,arXiv,Not available,Bounding Average-energy Games,12cd3045bec01173a10578470b35d0d7,http://arxiv.org/abs/1610.07858v3 14264," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",amit daniely,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 14265," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",michael schapira,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 14266," Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms. ",gal shahaf,,2014.0,,arXiv,Daniely2014,True,,arXiv,Not available,"Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension",32a2406575233fa7c0d742cea24e2539,http://arxiv.org/abs/1412.6265v2 14267," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",alessandro chiesa,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 14268," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",silvio micali,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 14269," We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically. ",zeyuan zhu,,2011.0,,arXiv,Chiesa2011,True,,arXiv,Not available,Knightian Auctions,d4f14156b8ff18ba22a45697d64d0021,http://arxiv.org/abs/1112.1147v1 14270," The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good mechanisms for risk-averse sellers. As is standard in the economics literature, we model the risk-aversion of a seller by endowing the seller with a monotone concave utility function. We then seek robust mechanisms that are approximately optimal for all sellers, no matter what their levels of risk-aversion are. We have two main results for multi-unit auctions with unit-demand bidders whose valuations are drawn i.i.d. from a regular distribution. First, we identify a posted-price mechanism called the Hedge mechanism, which gives a universal constant factor approximation; we also show for the unlimited supply case that this mechanism is in a sense the best possible. Second, we show that the VCG mechanism gives a universal constant factor approximation when the number of bidders is even only a small multiple of the number of items. Along the way we point out that Myerson's characterization of the optimal mechanisms fails to extend to utility-maximization for risk-averse sellers, and establish interesting properties of regular distributions and monotone hazard rate distributions. ",mukund sundararajan,,2010.0,,arXiv,Sundararajan2010,True,,arXiv,Not available,Robust Mechanisms for Risk-Averse Sellers,0f6d10b1ba37fe407afe2c59cd726946,http://arxiv.org/abs/1002.2477v2 14271," The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good mechanisms for risk-averse sellers. As is standard in the economics literature, we model the risk-aversion of a seller by endowing the seller with a monotone concave utility function. We then seek robust mechanisms that are approximately optimal for all sellers, no matter what their levels of risk-aversion are. We have two main results for multi-unit auctions with unit-demand bidders whose valuations are drawn i.i.d. from a regular distribution. First, we identify a posted-price mechanism called the Hedge mechanism, which gives a universal constant factor approximation; we also show for the unlimited supply case that this mechanism is in a sense the best possible. Second, we show that the VCG mechanism gives a universal constant factor approximation when the number of bidders is even only a small multiple of the number of items. Along the way we point out that Myerson's characterization of the optimal mechanisms fails to extend to utility-maximization for risk-averse sellers, and establish interesting properties of regular distributions and monotone hazard rate distributions. ",qiqi yan,,2010.0,,arXiv,Sundararajan2010,True,,arXiv,Not available,Robust Mechanisms for Risk-Averse Sellers,0f6d10b1ba37fe407afe2c59cd726946,http://arxiv.org/abs/1002.2477v2 14272," We show that every universally truthful randomized mechanism for combinatorial auctions with submodular valuations that provides $m^{\frac 1 2 -\epsilon}$ approximation to the social welfare and uses value queries only must use exponentially many value queries, where $m$ is the number of items. In contrast, ignoring incentives there exist constant ratio approximation algorithms for this problem. Our approach is based on a novel \emph{direct hardness} approach and completely skips the notoriously hard characterization step. The characterization step was the main obstacle for proving impossibility results in algorithmic mechanism design so far. We demonstrate two additional applications of our new technique: (1) an impossibility result for universally-truthful polynomial time flexible combinatorial public projects and (2) an impossibility result for truthful-in-expectation mechanisms for exact combinatorial public projects. The latter is the first result that bounds the power of polynomial-time truthful in expectation mechanisms in any setting. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,"An Impossibility Result for Truthful Combinatorial Auctions with Submodular Valuations",7e9ecaa1f1f50026b1d7005550cc840e,http://arxiv.org/abs/1011.1830v1 14273," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 14274," Although the definition of what empathetic preferences exactly are is still evolving, there is a general consensus in the psychology, science and engineering communities that the evolution toward players' behaviors in interactive decision-making problems will be accompanied by the exploitation of their empathy, sympathy, compassion, antipathy, spitefulness, selfishness, altruism, and self-abnegating states in the payoffs. In this article, we study one-shot bimatrix games from a psychological game theory viewpoint. A new empathetic payoff model is calculated to fit empirical observations and both pure and mixed equilibria are investigated. For a realized empathy structure, the bimatrix game is categorized among four generic class of games. Number of interesting results are derived. A notable level of involvement can be observed in the empathetic one-shot game compared the non-empathetic one and this holds even for games with dominated strategies. Partial altruism can help in breaking symmetry, in reducing payoff-inequality and in selecting social welfare and more efficient outcomes. By contrast, partial spite and self-abnegating may worsen payoff equity. Empathetic evolutionary game dynamics are introduced to capture the resulting empathetic evolutionarily stable strategies under wide range of revision protocols including Brown-von Neumann-Nash, Smith, imitation, replicator, and hybrid dynamics. Finally, mutual support and Berge solution are investigated and their connection with empathetic preferences are established. We show that pure altruism is logically inconsistent, only by balancing it with some partial selfishness does it create a consistent psychology. ",brian powers,,2017.0,,arXiv,Powers2017,True,,arXiv,Not available,Empathy in Bimatrix Games,00aa82114e776f6ee410f836d6966389,http://arxiv.org/abs/1708.01910v1 14275," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",hu fu,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 14276," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",robert kleinberg,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 14277," In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main ideas behind our techniques are to use randomization and various schemes to escrow reputations scores until appropriate external events occur. Depending on the degree of utility and privacy needed, these external techniques could depend on the number and type of reputation scores collected. Moreover, if additional privacy protection is needed, then random sampling can be used with respect reputation scores in such a way that reputation aggregates remain useful, but individual reputation scores are probabilistically hidden from users. Finally, we show that if privacy is also desired with respect to the the reputation aggregator, then we can use zero-knowledge proofs for reputation comparisons. ",michael goodrich,,2011.0,,arXiv,Goodrich2011,True,,arXiv,Not available,"Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions",5c1cb68b65a402f6ed0e06a32e998f1e,http://arxiv.org/abs/1102.4602v2 14278," In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main ideas behind our techniques are to use randomization and various schemes to escrow reputations scores until appropriate external events occur. Depending on the degree of utility and privacy needed, these external techniques could depend on the number and type of reputation scores collected. Moreover, if additional privacy protection is needed, then random sampling can be used with respect reputation scores in such a way that reputation aggregates remain useful, but individual reputation scores are probabilistically hidden from users. Finally, we show that if privacy is also desired with respect to the the reputation aggregator, then we can use zero-knowledge proofs for reputation comparisons. ",florian kerschbaum,,2011.0,,arXiv,Goodrich2011,True,,arXiv,Not available,"Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions",5c1cb68b65a402f6ed0e06a32e998f1e,http://arxiv.org/abs/1102.4602v2 14279," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",pranav dandekar,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 14280," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",nadia fawaz,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 14281," We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Motivated by recommender systems, the statistic we consider is a linear predictor function with publicly known weights. The statistic can be viewed as a prediction of the unknown data of a new individual, based on the data of individuals in the database. We formalize the trade-off between privacy and accuracy in this setting, and show that a simple class of estimates achieves an order-optimal trade-off. It thus suffices to focus on auction mechanisms that output such estimates. We use this observation to design a truthful, individually rational, proportional-purchase mechanism under a fixed budget constraint. We show that our mechanism is 5-approximate in terms of accuracy compared to the optimal mechanism, and that no truthful mechanism can achieve a $2-\varepsilon$ approximation, for any $\varepsilon > 0$. ",stratis ioannidis,,2011.0,,arXiv,Dandekar2011,True,,arXiv,Not available,Privacy Auctions for Recommender Systems,7c15a28288f7a06997fe783b991be25a,http://arxiv.org/abs/1111.2885v2 14282," In this paper, we study spectrum allocation mechanisms in hierarchical multi-layer markets which are expected to proliferate in the near future based on the current spectrum policy reform proposals. We consider a setting where a state agency sells spectrum channels to Primary Operators (POs) who subsequently resell them to Secondary Operators (SOs) through auctions. We show that these hierarchical markets do not result in a socially efficient spectrum allocation which is aimed by the agency, due to lack of coordination among the entities in different layers and the inherently selfish revenue-maximizing strategy of POs. In order to reconcile these opposing objectives, we propose an incentive mechanism which aligns the strategy and the actions of the POs with the objective of the agency, and thus leads to system performance improvement in terms of social welfare. This pricing-based scheme constitutes a method for hierarchical market regulation. A basic component of the proposed incentive mechanism is a novel auction scheme which enables POs to allocate their spectrum by balancing their derived revenue and the welfare of the SOs. ",george iosifidis,,2011.0,,arXiv,Iosifidis2011,True,,arXiv,Not available,Incentive Mechanisms for Hierarchical Spectrum Markets,2e8bacf21181b0f245069a900b57264b,http://arxiv.org/abs/1111.4350v3 14283," In this paper, we study spectrum allocation mechanisms in hierarchical multi-layer markets which are expected to proliferate in the near future based on the current spectrum policy reform proposals. We consider a setting where a state agency sells spectrum channels to Primary Operators (POs) who subsequently resell them to Secondary Operators (SOs) through auctions. We show that these hierarchical markets do not result in a socially efficient spectrum allocation which is aimed by the agency, due to lack of coordination among the entities in different layers and the inherently selfish revenue-maximizing strategy of POs. In order to reconcile these opposing objectives, we propose an incentive mechanism which aligns the strategy and the actions of the POs with the objective of the agency, and thus leads to system performance improvement in terms of social welfare. This pricing-based scheme constitutes a method for hierarchical market regulation. A basic component of the proposed incentive mechanism is a novel auction scheme which enables POs to allocate their spectrum by balancing their derived revenue and the welfare of the SOs. ",anil chorppath,,2011.0,,arXiv,Iosifidis2011,True,,arXiv,Not available,Incentive Mechanisms for Hierarchical Spectrum Markets,2e8bacf21181b0f245069a900b57264b,http://arxiv.org/abs/1111.4350v3 14284," In this paper, we study spectrum allocation mechanisms in hierarchical multi-layer markets which are expected to proliferate in the near future based on the current spectrum policy reform proposals. We consider a setting where a state agency sells spectrum channels to Primary Operators (POs) who subsequently resell them to Secondary Operators (SOs) through auctions. We show that these hierarchical markets do not result in a socially efficient spectrum allocation which is aimed by the agency, due to lack of coordination among the entities in different layers and the inherently selfish revenue-maximizing strategy of POs. In order to reconcile these opposing objectives, we propose an incentive mechanism which aligns the strategy and the actions of the POs with the objective of the agency, and thus leads to system performance improvement in terms of social welfare. This pricing-based scheme constitutes a method for hierarchical market regulation. A basic component of the proposed incentive mechanism is a novel auction scheme which enables POs to allocate their spectrum by balancing their derived revenue and the welfare of the SOs. ",tansu alpcan,,2011.0,,arXiv,Iosifidis2011,True,,arXiv,Not available,Incentive Mechanisms for Hierarchical Spectrum Markets,2e8bacf21181b0f245069a900b57264b,http://arxiv.org/abs/1111.4350v3 14285," Although the definition of what empathetic preferences exactly are is still evolving, there is a general consensus in the psychology, science and engineering communities that the evolution toward players' behaviors in interactive decision-making problems will be accompanied by the exploitation of their empathy, sympathy, compassion, antipathy, spitefulness, selfishness, altruism, and self-abnegating states in the payoffs. In this article, we study one-shot bimatrix games from a psychological game theory viewpoint. A new empathetic payoff model is calculated to fit empirical observations and both pure and mixed equilibria are investigated. For a realized empathy structure, the bimatrix game is categorized among four generic class of games. Number of interesting results are derived. A notable level of involvement can be observed in the empathetic one-shot game compared the non-empathetic one and this holds even for games with dominated strategies. Partial altruism can help in breaking symmetry, in reducing payoff-inequality and in selecting social welfare and more efficient outcomes. By contrast, partial spite and self-abnegating may worsen payoff equity. Empathetic evolutionary game dynamics are introduced to capture the resulting empathetic evolutionarily stable strategies under wide range of revision protocols including Brown-von Neumann-Nash, Smith, imitation, replicator, and hybrid dynamics. Finally, mutual support and Berge solution are investigated and their connection with empathetic preferences are established. We show that pure altruism is logically inconsistent, only by balancing it with some partial selfishness does it create a consistent psychology. ",michalis smyrnakis,,2017.0,,arXiv,Powers2017,True,,arXiv,Not available,Empathy in Bimatrix Games,00aa82114e776f6ee410f836d6966389,http://arxiv.org/abs/1708.01910v1 14286," In this paper, we study spectrum allocation mechanisms in hierarchical multi-layer markets which are expected to proliferate in the near future based on the current spectrum policy reform proposals. We consider a setting where a state agency sells spectrum channels to Primary Operators (POs) who subsequently resell them to Secondary Operators (SOs) through auctions. We show that these hierarchical markets do not result in a socially efficient spectrum allocation which is aimed by the agency, due to lack of coordination among the entities in different layers and the inherently selfish revenue-maximizing strategy of POs. In order to reconcile these opposing objectives, we propose an incentive mechanism which aligns the strategy and the actions of the POs with the objective of the agency, and thus leads to system performance improvement in terms of social welfare. This pricing-based scheme constitutes a method for hierarchical market regulation. A basic component of the proposed incentive mechanism is a novel auction scheme which enables POs to allocate their spectrum by balancing their derived revenue and the welfare of the SOs. ",iordanis koutsopoulos,,2011.0,,arXiv,Iosifidis2011,True,,arXiv,Not available,Incentive Mechanisms for Hierarchical Spectrum Markets,2e8bacf21181b0f245069a900b57264b,http://arxiv.org/abs/1111.4350v3 14287," We consider an environment where sellers compete over buyers. All sellers are a-priori identical and strategically signal buyers about the product they sell. In a setting motivated by on-line advertising in display ad exchanges, where firms use second price auctions, a firm's strategy is a decision about its signaling scheme for a stream of goods (e.g. user impressions), and a buyer's strategy is a selection among the firms. In this setting, a single seller will typically provide partial information and consequently a product may be allocated inefficiently. Intuitively, competition among sellers may induce sellers to provide more information in order to attract buyers and thus increase efficiency. Surprisingly, we show that such a competition among firms may yield significant loss in consumers' social welfare with respect to the monopolistic setting. Although we also show that in some cases the competitive setting yields gain in social welfare, we provide a tight bound on that gain, which is shown to be small in respect to the above possible loss. Our model is tightly connected with the literature on bundling in auctions. ",gleb polevoy,,2012.0,,arXiv,Polevoy2012,True,,arXiv,Not available,Signalling Competition and Social Welfare (Working Paper),d1af699ff04bd5dfe0586f351971305e,http://arxiv.org/abs/1203.6610v1 14288," We consider an environment where sellers compete over buyers. All sellers are a-priori identical and strategically signal buyers about the product they sell. In a setting motivated by on-line advertising in display ad exchanges, where firms use second price auctions, a firm's strategy is a decision about its signaling scheme for a stream of goods (e.g. user impressions), and a buyer's strategy is a selection among the firms. In this setting, a single seller will typically provide partial information and consequently a product may be allocated inefficiently. Intuitively, competition among sellers may induce sellers to provide more information in order to attract buyers and thus increase efficiency. Surprisingly, we show that such a competition among firms may yield significant loss in consumers' social welfare with respect to the monopolistic setting. Although we also show that in some cases the competitive setting yields gain in social welfare, we provide a tight bound on that gain, which is shown to be small in respect to the above possible loss. Our model is tightly connected with the literature on bundling in auctions. ",rann smorodinsky,,2012.0,,arXiv,Polevoy2012,True,,arXiv,Not available,Signalling Competition and Social Welfare (Working Paper),d1af699ff04bd5dfe0586f351971305e,http://arxiv.org/abs/1203.6610v1 14289," We consider an environment where sellers compete over buyers. All sellers are a-priori identical and strategically signal buyers about the product they sell. In a setting motivated by on-line advertising in display ad exchanges, where firms use second price auctions, a firm's strategy is a decision about its signaling scheme for a stream of goods (e.g. user impressions), and a buyer's strategy is a selection among the firms. In this setting, a single seller will typically provide partial information and consequently a product may be allocated inefficiently. Intuitively, competition among sellers may induce sellers to provide more information in order to attract buyers and thus increase efficiency. Surprisingly, we show that such a competition among firms may yield significant loss in consumers' social welfare with respect to the monopolistic setting. Although we also show that in some cases the competitive setting yields gain in social welfare, we provide a tight bound on that gain, which is shown to be small in respect to the above possible loss. Our model is tightly connected with the literature on bundling in auctions. ",moshe tennenholtz,,2012.0,,arXiv,Polevoy2012,True,,arXiv,Not available,Signalling Competition and Social Welfare (Working Paper),d1af699ff04bd5dfe0586f351971305e,http://arxiv.org/abs/1203.6610v1 14290," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",dinesh garg,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 14291," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",sourangshu bhattacharya,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 14292," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",s. sundararajan,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 14293," We consider the problem of Probably Approximate Correct (PAC) learning of a binary classifier from noisy labeled examples acquired from multiple annotators (each characterized by a respective classification noise rate). First, we consider the complete information scenario, where the learner knows the noise rates of all the annotators. For this scenario, we derive sample complexity bound for the Minimum Disagreement Algorithm (MDA) on the number of labeled examples to be obtained from each annotator. Next, we consider the incomplete information scenario, where each annotator is strategic and holds the respective noise rate as a private information. For this scenario, we design a cost optimal procurement auction mechanism along the lines of Myerson's optimal auction design framework in a non-trivial manner. This mechanism satisfies incentive compatibility property, thereby facilitating the learner to elicit true noise rates of all the annotators. ",shirish shevade,,2012.0,,arXiv,Garg2012,True,,arXiv,Not available,"Mechanism Design for Cost Optimal PAC Learning in the Presence of Strategic Noisy Annotators",a854b56e82e589ea48b438d2c64c5721,http://arxiv.org/abs/1210.4859v1 14294," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",hiromitsu hattori,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 14295," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",makoto yokoo,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 14296," Although the definition of what empathetic preferences exactly are is still evolving, there is a general consensus in the psychology, science and engineering communities that the evolution toward players' behaviors in interactive decision-making problems will be accompanied by the exploitation of their empathy, sympathy, compassion, antipathy, spitefulness, selfishness, altruism, and self-abnegating states in the payoffs. In this article, we study one-shot bimatrix games from a psychological game theory viewpoint. A new empathetic payoff model is calculated to fit empirical observations and both pure and mixed equilibria are investigated. For a realized empathy structure, the bimatrix game is categorized among four generic class of games. Number of interesting results are derived. A notable level of involvement can be observed in the empathetic one-shot game compared the non-empathetic one and this holds even for games with dominated strategies. Partial altruism can help in breaking symmetry, in reducing payoff-inequality and in selecting social welfare and more efficient outcomes. By contrast, partial spite and self-abnegating may worsen payoff equity. Empathetic evolutionary game dynamics are introduced to capture the resulting empathetic evolutionarily stable strategies under wide range of revision protocols including Brown-von Neumann-Nash, Smith, imitation, replicator, and hybrid dynamics. Finally, mutual support and Berge solution are investigated and their connection with empathetic preferences are established. We show that pure altruism is logically inconsistent, only by balancing it with some partial selfishness does it create a consistent psychology. ",hamidou tembine,,2017.0,,arXiv,Powers2017,True,,arXiv,Not available,Empathy in Bimatrix Games,00aa82114e776f6ee410f836d6966389,http://arxiv.org/abs/1708.01910v1 14297," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",yuko sakurai,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 14298," In this paper, we develop a new method for finding an optimal biddingstrategy in sequential auctions, using a dynamic programming technique. Theexisting method assumes that the utility of a user is represented in anadditive form. Thus, the remaining endowment of money must be explicitlyrepresented in each state, and the calculation of the optimal biddingstrategy becomes time-consuming when the initial endowment of money mbecomes large.In this paper, we develop a new problem formalization that avoids explicitlyrepresenting the remaining endowment, by assuming the utility of a user canbe represented in a quasi-linear form, and representing the payment as astate-transition cost. Experimental evaluations show that we can obtainmore than an m-fold speed-up in the computation time. Furthermore, we havedeveloped a method for obtaining a semi-optimal bidding strategy underbudget constraints, and have experimentally confirmed the efficacy of thismethod. ",toramatsu shintani,,2013.0,,arXiv,Hattori2013,True,,arXiv,Not available,"A Dynamic Programming Model for Determining Bidding Strategies in Sequential Auctions: Quasi-linear Utility and Budget Constraints",9d2ca91e000cb34acf03db84784ee82d,http://arxiv.org/abs/1301.2276v1 14299," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",craig boutilier,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 14300," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",moises goldszmidt,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 14301," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",bikash sabata,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 14302," We study repeated games where players use an exponential learning scheme in order to adapt to an ever-changing environment. If the game's payoffs are subject to random perturbations, this scheme leads to a new stochastic version of the replicator dynamics that is quite different from the ""aggregate shocks"" approach of evolutionary game theory. Irrespective of the perturbations' magnitude, we find that strategies which are dominated (even iteratively) eventually become extinct and that the game's strict Nash equilibria are stochastically asymptotically stable. We complement our analysis by illustrating these results in the case of congestion games. ",panayotis mertikopoulos,,2009.0,10.1214/09-AAP651,"Annals of Applied Probability 2010, Vol. 20, No. 4, 1359-1388",Mertikopoulos2009,True,,arXiv,Not available,"The emergence of rational behavior in the presence of stochastic perturbations",1ab4930b457ee24367b14015e61a9055,http://arxiv.org/abs/0906.2094v2 14303," We study repeated games where players use an exponential learning scheme in order to adapt to an ever-changing environment. If the game's payoffs are subject to random perturbations, this scheme leads to a new stochastic version of the replicator dynamics that is quite different from the ""aggregate shocks"" approach of evolutionary game theory. Irrespective of the perturbations' magnitude, we find that strategies which are dominated (even iteratively) eventually become extinct and that the game's strict Nash equilibria are stochastically asymptotically stable. We complement our analysis by illustrating these results in the case of congestion games. ",aris moustakas,,2009.0,10.1214/09-AAP651,"Annals of Applied Probability 2010, Vol. 20, No. 4, 1359-1388",Mertikopoulos2009,True,,arXiv,Not available,"The emergence of rational behavior in the presence of stochastic perturbations",1ab4930b457ee24367b14015e61a9055,http://arxiv.org/abs/0906.2094v2 14304," In this paper, we present an approach for fault-tolerant synthesis by combining predefined patterns for fault-tolerance with algorithmic game solving. A non-fault-tolerant system, together with the relevant fault hypothesis and fault-tolerant mechanism templates in a pool are translated into a distributed game, and we perform an incomplete search of strategies to cope with undecidability. The result of the game is translated back to executable code concretizing fault-tolerant mechanisms using constraint solving. The overall approach is implemented to a prototype tool chain and is illustrated using examples. ",chih-hong cheng,,2010.0,,arXiv,Cheng2010,True,,arXiv,Not available,"A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems",0250ff4f87b6393c5e3f124d0d34616c,http://arxiv.org/abs/1011.0268v1 14305," In this paper, we present an approach for fault-tolerant synthesis by combining predefined patterns for fault-tolerance with algorithmic game solving. A non-fault-tolerant system, together with the relevant fault hypothesis and fault-tolerant mechanism templates in a pool are translated into a distributed game, and we perform an incomplete search of strategies to cope with undecidability. The result of the game is translated back to executable code concretizing fault-tolerant mechanisms using constraint solving. The overall approach is implemented to a prototype tool chain and is illustrated using examples. ",harald ruess,,2010.0,,arXiv,Cheng2010,True,,arXiv,Not available,"A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems",0250ff4f87b6393c5e3f124d0d34616c,http://arxiv.org/abs/1011.0268v1 14306," In this paper, we present an approach for fault-tolerant synthesis by combining predefined patterns for fault-tolerance with algorithmic game solving. A non-fault-tolerant system, together with the relevant fault hypothesis and fault-tolerant mechanism templates in a pool are translated into a distributed game, and we perform an incomplete search of strategies to cope with undecidability. The result of the game is translated back to executable code concretizing fault-tolerant mechanisms using constraint solving. The overall approach is implemented to a prototype tool chain and is illustrated using examples. ",alois knoll,,2010.0,,arXiv,Cheng2010,True,,arXiv,Not available,"A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems",0250ff4f87b6393c5e3f124d0d34616c,http://arxiv.org/abs/1011.0268v1 14307," The fog radio access network (F-RAN) is a promising paradigm for the fifth generation wireless communication systems to provide high spectral efficiency and energy efficiency. Characterizing users to select an appropriate communication mode among fog access point (F-AP), and device-to-device (D2D) in F-RANs is critical for performance optimization. Using evolutionary game theory, we investigate the dynamics of user access mode selection in F-RANs. Specifically, the competition among groups of potential users space is formulated as a dynamic evolutionary game, and the evolutionary equilibrium is the solution to this game. Stochastic geometry tool is used to derive the proposals' payoff expressions for both F-AP and D2D users by taking into account the different nodes locations, cache sizes as well as the delay cost. The analytical results obtained from the game model are evaluated via simulations, which show that the evolutionary game based access mode selection algorithm can reach a much higher payoff than the max rate based algorithm. ",shi yan,,2017.0,,arXiv,Yan2017,True,,arXiv,Not available,"An Evolutionary Game for User Access Mode Selection in Fog Radio Access Networks",ea1d0919e5c79d7b8df4cf948e4fdbee,http://arxiv.org/abs/1709.05288v1 14308," In this paper, we present an approach for fault-tolerant synthesis by combining predefined patterns for fault-tolerance with algorithmic game solving. A non-fault-tolerant system, together with the relevant fault hypothesis and fault-tolerant mechanism templates in a pool are translated into a distributed game, and we perform an incomplete search of strategies to cope with undecidability. The result of the game is translated back to executable code concretizing fault-tolerant mechanisms using constraint solving. The overall approach is implemented to a prototype tool chain and is illustrated using examples. ",christian buckl,,2010.0,,arXiv,Cheng2010,True,,arXiv,Not available,"A Game-theoretic Approach for Synthesizing Fault-Tolerant Embedded Systems",0250ff4f87b6393c5e3f124d0d34616c,http://arxiv.org/abs/1011.0268v1 14309," Learning algorithms are essential for the applications of game theory in a networking environment. In dynamic and decentralized settings where the traffic, topology and channel states may vary over time and the communication between agents is impractical, it is important to formulate and study games of incomplete information and fully distributed learning algorithms which for each agent requires a minimal amount of information regarding the remaining agents. In this paper, we address this major challenge and introduce heterogeneous learning schemes in which each agent adopts a distinct learning pattern in the context of games with incomplete information. We use stochastic approximation techniques to show that the heterogeneous learning schemes can be studied in terms of their deterministic ordinary differential equation (ODE) counterparts. Depending on the learning rates of the players, these ODEs could be different from the standard replicator dynamics, (myopic) best response (BR) dynamics, logit dynamics, and fictitious play dynamics. We apply the results to a class of security games in which the attacker and the defender adopt different learning schemes due to differences in their rationality levels and the information they acquire. ",quanyan zhu,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,"Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete Information",0964596cb46380aa71c2a9cdfcb09d9f,http://arxiv.org/abs/1103.2491v1 14310," Learning algorithms are essential for the applications of game theory in a networking environment. In dynamic and decentralized settings where the traffic, topology and channel states may vary over time and the communication between agents is impractical, it is important to formulate and study games of incomplete information and fully distributed learning algorithms which for each agent requires a minimal amount of information regarding the remaining agents. In this paper, we address this major challenge and introduce heterogeneous learning schemes in which each agent adopts a distinct learning pattern in the context of games with incomplete information. We use stochastic approximation techniques to show that the heterogeneous learning schemes can be studied in terms of their deterministic ordinary differential equation (ODE) counterparts. Depending on the learning rates of the players, these ODEs could be different from the standard replicator dynamics, (myopic) best response (BR) dynamics, logit dynamics, and fictitious play dynamics. We apply the results to a class of security games in which the attacker and the defender adopt different learning schemes due to differences in their rationality levels and the information they acquire. ",hamidou tembine,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,"Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete Information",0964596cb46380aa71c2a9cdfcb09d9f,http://arxiv.org/abs/1103.2491v1 14311," Learning algorithms are essential for the applications of game theory in a networking environment. In dynamic and decentralized settings where the traffic, topology and channel states may vary over time and the communication between agents is impractical, it is important to formulate and study games of incomplete information and fully distributed learning algorithms which for each agent requires a minimal amount of information regarding the remaining agents. In this paper, we address this major challenge and introduce heterogeneous learning schemes in which each agent adopts a distinct learning pattern in the context of games with incomplete information. We use stochastic approximation techniques to show that the heterogeneous learning schemes can be studied in terms of their deterministic ordinary differential equation (ODE) counterparts. Depending on the learning rates of the players, these ODEs could be different from the standard replicator dynamics, (myopic) best response (BR) dynamics, logit dynamics, and fictitious play dynamics. We apply the results to a class of security games in which the attacker and the defender adopt different learning schemes due to differences in their rationality levels and the information they acquire. ",tamer basar,,2011.0,,arXiv,Zhu2011,True,,arXiv,Not available,"Heterogeneous Learning in Zero-Sum Stochastic Games with Incomplete Information",0964596cb46380aa71c2a9cdfcb09d9f,http://arxiv.org/abs/1103.2491v1 14312," Notion of strategy in game theory is static and presumably constructed before the game play. The static, pre-determined notion of strategies falls short analyzing perfect information games. Because, we, people, do not strategize as such even in perfect information games - largely because we are not logically omniscient, and we have limited computational power and bounded memory. In this paper, we focus on what we call move updates where some moves become unavailable during the game. Our goal here is to present a formal framework for move based strategy restrictions extending strategy logic which was introduced by Ramanujam and Simon. In this paper, we present a dynamic version of strategy logic, prove its completeness and decidability along with the decidability of the strategy logic which was an open problem so far. We also present an analysis of centipede by using our logic. ",can baskent,,2011.0,,arXiv,Baskent2011,True,,arXiv,Not available,A Logic for Strategy Updates,5e2fbf368f22b113353ca06a09ed9116,http://arxiv.org/abs/1107.4931v1 14313," Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. Predicates on the initial configurations that can be computed by such protocols have been characterized as semi-linear predicates. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. We investigate under which conditions population protocols, or more generally pairwise interaction rules, correspond to games. We show that restricting to asymetric games is not really a restric- tion: all predicates computable by protocols can actually be computed by protocols corresponding to games, i.e. any semi-linear predicate can be computed by a Pavlovian population multi-protocol. ",olivier bournez,,2011.0,,arXiv,Bournez2011,True,,arXiv,Not available,Asymetric Pavlovian Populations,6fe89e8bf8075ac2977f9a17de78dbf6,http://arxiv.org/abs/1109.4433v1 14314," Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. Predicates on the initial configurations that can be computed by such protocols have been characterized as semi-linear predicates. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. We investigate under which conditions population protocols, or more generally pairwise interaction rules, correspond to games. We show that restricting to asymetric games is not really a restric- tion: all predicates computable by protocols can actually be computed by protocols corresponding to games, i.e. any semi-linear predicate can be computed by a Pavlovian population multi-protocol. ",jeremie chalopin,,2011.0,,arXiv,Bournez2011,True,,arXiv,Not available,Asymetric Pavlovian Populations,6fe89e8bf8075ac2977f9a17de78dbf6,http://arxiv.org/abs/1109.4433v1 14315," Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. Predicates on the initial configurations that can be computed by such protocols have been characterized as semi-linear predicates. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. We investigate under which conditions population protocols, or more generally pairwise interaction rules, correspond to games. We show that restricting to asymetric games is not really a restric- tion: all predicates computable by protocols can actually be computed by protocols corresponding to games, i.e. any semi-linear predicate can be computed by a Pavlovian population multi-protocol. ",johanne cohen,,2011.0,,arXiv,Bournez2011,True,,arXiv,Not available,Asymetric Pavlovian Populations,6fe89e8bf8075ac2977f9a17de78dbf6,http://arxiv.org/abs/1109.4433v1 14316," Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. Predicates on the initial configurations that can be computed by such protocols have been characterized as semi-linear predicates. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. We investigate under which conditions population protocols, or more generally pairwise interaction rules, correspond to games. We show that restricting to asymetric games is not really a restric- tion: all predicates computable by protocols can actually be computed by protocols corresponding to games, i.e. any semi-linear predicate can be computed by a Pavlovian population multi-protocol. ",xavier koegler,,2011.0,,arXiv,Bournez2011,True,,arXiv,Not available,Asymetric Pavlovian Populations,6fe89e8bf8075ac2977f9a17de78dbf6,http://arxiv.org/abs/1109.4433v1 14317," Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. Predicates on the initial configurations that can be computed by such protocols have been characterized as semi-linear predicates. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. We investigate under which conditions population protocols, or more generally pairwise interaction rules, correspond to games. We show that restricting to asymetric games is not really a restric- tion: all predicates computable by protocols can actually be computed by protocols corresponding to games, i.e. any semi-linear predicate can be computed by a Pavlovian population multi-protocol. ",mikael rabie,,2011.0,,arXiv,Bournez2011,True,,arXiv,Not available,Asymetric Pavlovian Populations,6fe89e8bf8075ac2977f9a17de78dbf6,http://arxiv.org/abs/1109.4433v1 14318," The fog radio access network (F-RAN) is a promising paradigm for the fifth generation wireless communication systems to provide high spectral efficiency and energy efficiency. Characterizing users to select an appropriate communication mode among fog access point (F-AP), and device-to-device (D2D) in F-RANs is critical for performance optimization. Using evolutionary game theory, we investigate the dynamics of user access mode selection in F-RANs. Specifically, the competition among groups of potential users space is formulated as a dynamic evolutionary game, and the evolutionary equilibrium is the solution to this game. Stochastic geometry tool is used to derive the proposals' payoff expressions for both F-AP and D2D users by taking into account the different nodes locations, cache sizes as well as the delay cost. The analytical results obtained from the game model are evaluated via simulations, which show that the evolutionary game based access mode selection algorithm can reach a much higher payoff than the max rate based algorithm. ",mugen peng,,2017.0,,arXiv,Yan2017,True,,arXiv,Not available,"An Evolutionary Game for User Access Mode Selection in Fog Radio Access Networks",ea1d0919e5c79d7b8df4cf948e4fdbee,http://arxiv.org/abs/1709.05288v1 14319," Computing the winning set for B{\""u}chi objectives in alternating games on graphs is a central problem in computer aided verification with a large number of applications. The long standing best known upper bound for solving the problem is $\tilde{O}(n \cdot m)$, where $n$ is the number of vertices and $m$ is the number of edges in the graph. We are the first to break the $\tilde{O}(n\cdot m)$ bound by presenting a new technique that reduces the running time to $O(n^2)$. This bound also leads to an $O(n^2)$ algorithm time for computing the set of almost-sure winning vertices in alternating games with probabilistic transitions (improving an earlier bound of $\tilde{O}(n\cdot m)$) and in concurrent graph games with constant actions (improving an earlier bound of $O(n^3)$). We also show that the same technique can be used to compute the maximal end-component decomposition of a graph in time $O(n^2)$. Finally, we show how to maintain the winning set for B{\""u}chi objectives in alternating games under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per operation. This is the first dynamic algorithm for this problem. ",krishnendu chatterjee,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,An O(n^2) Time Algorithm for Alternating Büchi Games,67d4bf466454415a1879e559205fb7a3,http://arxiv.org/abs/1109.5018v1 14320," Computing the winning set for B{\""u}chi objectives in alternating games on graphs is a central problem in computer aided verification with a large number of applications. The long standing best known upper bound for solving the problem is $\tilde{O}(n \cdot m)$, where $n$ is the number of vertices and $m$ is the number of edges in the graph. We are the first to break the $\tilde{O}(n\cdot m)$ bound by presenting a new technique that reduces the running time to $O(n^2)$. This bound also leads to an $O(n^2)$ algorithm time for computing the set of almost-sure winning vertices in alternating games with probabilistic transitions (improving an earlier bound of $\tilde{O}(n\cdot m)$) and in concurrent graph games with constant actions (improving an earlier bound of $O(n^3)$). We also show that the same technique can be used to compute the maximal end-component decomposition of a graph in time $O(n^2)$. Finally, we show how to maintain the winning set for B{\""u}chi objectives in alternating games under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per operation. This is the first dynamic algorithm for this problem. ",monika henzinger,,2011.0,,arXiv,Chatterjee2011,True,,arXiv,Not available,An O(n^2) Time Algorithm for Alternating Büchi Games,67d4bf466454415a1879e559205fb7a3,http://arxiv.org/abs/1109.5018v1 14321," The most important factors which contribute to the efficiency of game-theoretical algorithms are time and game complexity. In this study, we have offered an elegant method to deal with high complexity of game theoretic multi-objective clustering methods in large-sized data sets. Here, we have developed a method which selects a subset of strategies from strategies profile for each player. In this case, the size of payoff matrices reduces significantly which has a remarkable impact on time complexity. Therefore, practical problems with more data are tractable with less computational complexity. Although strategies set may grow with increasing the number of data points, the presented model of strategy selection reduces the strategy space, considerably, where clusters are subdivided into several sub-clusters in each local game. The remarkable results demonstrate the efficiency of the presented approach in reducing computational complexity of the problem of concern. ",mahsa badami,,2012.0,,arXiv,Badami2012,True,,arXiv,Not available,"A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory",74795bb7bcaf96a280e94561899efc51,http://arxiv.org/abs/1208.3432v1 14322," The most important factors which contribute to the efficiency of game-theoretical algorithms are time and game complexity. In this study, we have offered an elegant method to deal with high complexity of game theoretic multi-objective clustering methods in large-sized data sets. Here, we have developed a method which selects a subset of strategies from strategies profile for each player. In this case, the size of payoff matrices reduces significantly which has a remarkable impact on time complexity. Therefore, practical problems with more data are tractable with less computational complexity. Although strategies set may grow with increasing the number of data points, the presented model of strategy selection reduces the strategy space, considerably, where clusters are subdivided into several sub-clusters in each local game. The remarkable results demonstrate the efficiency of the presented approach in reducing computational complexity of the problem of concern. ",ali hamzeh,,2012.0,,arXiv,Badami2012,True,,arXiv,Not available,"A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory",74795bb7bcaf96a280e94561899efc51,http://arxiv.org/abs/1208.3432v1 14323," The most important factors which contribute to the efficiency of game-theoretical algorithms are time and game complexity. In this study, we have offered an elegant method to deal with high complexity of game theoretic multi-objective clustering methods in large-sized data sets. Here, we have developed a method which selects a subset of strategies from strategies profile for each player. In this case, the size of payoff matrices reduces significantly which has a remarkable impact on time complexity. Therefore, practical problems with more data are tractable with less computational complexity. Although strategies set may grow with increasing the number of data points, the presented model of strategy selection reduces the strategy space, considerably, where clusters are subdivided into several sub-clusters in each local game. The remarkable results demonstrate the efficiency of the presented approach in reducing computational complexity of the problem of concern. ",sattar hashemi,,2012.0,,arXiv,Badami2012,True,,arXiv,Not available,"A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory",74795bb7bcaf96a280e94561899efc51,http://arxiv.org/abs/1208.3432v1 14324," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",samson abramsky,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 14325," We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations. Certain strategy profiles are proved to be subgame perfect equilibria using a novel proof principle of predicate coinduction. We characterize all subgame perfect equilibria for the dollar auction game. The economically interesting feature is that in order to prove these results we do not need to rely on continuity assumptions on the payoffs which amount to discounting the future. In particular, we prove a form of one-deviation principle without any such assumptions. This suggests that coalgebra supports a more adequate treatment of infinite-horizon models in game theory and economics. ",viktor winschel,,2012.0,10.1017/S0960129515000365,arXiv,Abramsky2012,True,,arXiv,Not available,"Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting",e2c8edde647c743534b9050377c55476,http://arxiv.org/abs/1210.4537v3 14326," We unify standard frameworks for approachability both in full or partial monitoring by defining a new abstract game, called the ""purely informative game"", where the outcome at each stage is the maximal information players can obtain, represented as some probability measure. Objectives of players can be rewritten as the convergence (to some given set) of sequences of averages of these probability measures. We obtain new results extending the approachability theory developed by Blackwell moreover this new abstract framework enables us to characterize approachable sets with, as usual, a remarkably simple and clear reformulation for convex sets. Translated into the original games, those results become the first necessary and sufficient condition under which an arbitrary set is approachable and they cover and extend previous known results for convex sets. We also investigate a specific class of games where, thanks to some unusual definition of averages and convexity, we again obtain a complete characterization of approachable sets along with rates of convergence. ",vianney perchet,,2013.0,,arXiv,Perchet2013,True,,arXiv,Not available,"On an unified framework for approachability in games with or without signals",e93f391814cb0d5ee83dbe1bb8e91ccd,http://arxiv.org/abs/1301.3609v1 14327," We unify standard frameworks for approachability both in full or partial monitoring by defining a new abstract game, called the ""purely informative game"", where the outcome at each stage is the maximal information players can obtain, represented as some probability measure. Objectives of players can be rewritten as the convergence (to some given set) of sequences of averages of these probability measures. We obtain new results extending the approachability theory developed by Blackwell moreover this new abstract framework enables us to characterize approachable sets with, as usual, a remarkably simple and clear reformulation for convex sets. Translated into the original games, those results become the first necessary and sufficient condition under which an arbitrary set is approachable and they cover and extend previous known results for convex sets. We also investigate a specific class of games where, thanks to some unusual definition of averages and convexity, we again obtain a complete characterization of approachable sets along with rates of convergence. ",marc quincampoix,,2013.0,,arXiv,Perchet2013,True,,arXiv,Not available,"On an unified framework for approachability in games with or without signals",e93f391814cb0d5ee83dbe1bb8e91ccd,http://arxiv.org/abs/1301.3609v1 14328," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. For $\omega$-regular winning conditions it is known that such games can be solved in doubly-exponential time and that doubly-exponential lookahead is sufficient. We improve upon both results by giving an exponential time algorithm and an exponential upper bound on the necessary lookahead. This is complemented by showing EXPTIME-hardness of the solution problem and tight exponential lower bounds on the lookahead. Both lower bounds already hold for safety conditions. Furthermore, solving delay games with reachability conditions is shown to be PSPACE-complete. This is a corrected version of the paper https://arxiv.org/abs/1412.3701v4 published originally on August 26, 2016. ",felix klein,,2014.0,10.2168/LMCS-12(3:4)2016,"Logical Methods in Computer Science, Volume 12, Issue 3 (April 27, 2017) lmcs:2011",Klein2014,True,,arXiv,Not available,How Much Lookahead is Needed to Win Infinite Games?,09917283342fade5209964484974901a,http://arxiv.org/abs/1412.3701v5 14329," The fog radio access network (F-RAN) is a promising paradigm for the fifth generation wireless communication systems to provide high spectral efficiency and energy efficiency. Characterizing users to select an appropriate communication mode among fog access point (F-AP), and device-to-device (D2D) in F-RANs is critical for performance optimization. Using evolutionary game theory, we investigate the dynamics of user access mode selection in F-RANs. Specifically, the competition among groups of potential users space is formulated as a dynamic evolutionary game, and the evolutionary equilibrium is the solution to this game. Stochastic geometry tool is used to derive the proposals' payoff expressions for both F-AP and D2D users by taking into account the different nodes locations, cache sizes as well as the delay cost. The analytical results obtained from the game model are evaluated via simulations, which show that the evolutionary game based access mode selection algorithm can reach a much higher payoff than the max rate based algorithm. ",munzali abana,,2017.0,,arXiv,Yan2017,True,,arXiv,Not available,"An Evolutionary Game for User Access Mode Selection in Fog Radio Access Networks",ea1d0919e5c79d7b8df4cf948e4fdbee,http://arxiv.org/abs/1709.05288v1 14330," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. For $\omega$-regular winning conditions it is known that such games can be solved in doubly-exponential time and that doubly-exponential lookahead is sufficient. We improve upon both results by giving an exponential time algorithm and an exponential upper bound on the necessary lookahead. This is complemented by showing EXPTIME-hardness of the solution problem and tight exponential lower bounds on the lookahead. Both lower bounds already hold for safety conditions. Furthermore, solving delay games with reachability conditions is shown to be PSPACE-complete. This is a corrected version of the paper https://arxiv.org/abs/1412.3701v4 published originally on August 26, 2016. ",martin zimmermann,,2014.0,10.2168/LMCS-12(3:4)2016,"Logical Methods in Computer Science, Volume 12, Issue 3 (April 27, 2017) lmcs:2011",Klein2014,True,,arXiv,Not available,How Much Lookahead is Needed to Win Infinite Games?,09917283342fade5209964484974901a,http://arxiv.org/abs/1412.3701v5 14331," In the literature of game theory, the information sets of extensive form games have different interpretations, which may lead to confusions and paradoxical cases. We argue that the problem lies in the mix-up of two interpretations of the extensive form game structures: game rules or game runs which do not always coincide. In this paper, we try to separate and connect these two views by proposing a dynamic epistemic framework in which we can compute the runs step by step from the game rules plus the given assumptions of the players. We propose a modal logic to describe players' knowledge and its change during the plays, and provide a complete axiomatization. We also show that, under certain conditions, the mix-up of the rules and the runs is not harmful due to the structural similarity of the two. ",kai li,,2015.0,,arXiv,Li2015,True,,arXiv,Not available,"From rules to runs: A dynamic epistemic take on imperfect information games",633382d5bc11e5d088d91f377b707d75,http://arxiv.org/abs/1512.02078v1 14332," In the literature of game theory, the information sets of extensive form games have different interpretations, which may lead to confusions and paradoxical cases. We argue that the problem lies in the mix-up of two interpretations of the extensive form game structures: game rules or game runs which do not always coincide. In this paper, we try to separate and connect these two views by proposing a dynamic epistemic framework in which we can compute the runs step by step from the game rules plus the given assumptions of the players. We propose a modal logic to describe players' knowledge and its change during the plays, and provide a complete axiomatization. We also show that, under certain conditions, the mix-up of the rules and the runs is not harmful due to the structural similarity of the two. ",yanjing wang,,2015.0,,arXiv,Li2015,True,,arXiv,Not available,"From rules to runs: A dynamic epistemic take on imperfect information games",633382d5bc11e5d088d91f377b707d75,http://arxiv.org/abs/1512.02078v1 14333," A generalized model of games is proposed, in which cooperative games and non-cooperative games are special cases. Some games that are neither cooperative nor non-cooperative can be expressed and analyzed. The model is based on relationships and supposed relationships between players. A relationship is a numerical value that denotes how one player cares for the payoffs of another player, while a supposed relationship is another numerical value that denotes a player's belief about the relationship between two players. The players choose their strategies by taking into consideration not only the material payoffs but also relationships and their change. Two games, a prisoners' dilemma and a repeated ultimatum game, are analyzed as examples of application of this model. ",jiawei li,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Interdependent Relationships in Game Theory: A Generalized Model,e95fe25baadc0b921c09e5f61ee56feb,http://arxiv.org/abs/1601.00176v2 14334," In imperfect-information games, the optimal strategy in a subgame may depend on the strategy in other, unreached subgames. Thus a subgame cannot be solved in isolation and must instead consider the strategy for the entire game as a whole, unlike perfect-information games. Nevertheless, it is possible to first approximate a solution for the whole game and then improve it by solving individual subgames. This is referred to as subgame solving. We introduce subgame-solving techniques that outperform prior methods both in theory and practice. We also show how to adapt them, and past subgame-solving techniques, to respond to opponent actions that are outside the original action abstraction; this significantly outperforms the prior state-of-the-art approach, action translation. Finally, we show that subgame solving can be repeated as the game progresses down the game tree, leading to far lower exploitability. These techniques were a key component of Libratus, the first AI to defeat top humans in heads-up no-limit Texas hold'em poker. ",noam brown,,2017.0,,arXiv,Brown2017,True,,arXiv,Not available,Safe and Nested Subgame Solving for Imperfect-Information Games,8e0a28492ce39b7deb265dcce3bf5c30,http://arxiv.org/abs/1705.02955v3 14335," In imperfect-information games, the optimal strategy in a subgame may depend on the strategy in other, unreached subgames. Thus a subgame cannot be solved in isolation and must instead consider the strategy for the entire game as a whole, unlike perfect-information games. Nevertheless, it is possible to first approximate a solution for the whole game and then improve it by solving individual subgames. This is referred to as subgame solving. We introduce subgame-solving techniques that outperform prior methods both in theory and practice. We also show how to adapt them, and past subgame-solving techniques, to respond to opponent actions that are outside the original action abstraction; this significantly outperforms the prior state-of-the-art approach, action translation. Finally, we show that subgame solving can be repeated as the game progresses down the game tree, leading to far lower exploitability. These techniques were a key component of Libratus, the first AI to defeat top humans in heads-up no-limit Texas hold'em poker. ",tuomas sandholm,,2017.0,,arXiv,Brown2017,True,,arXiv,Not available,Safe and Nested Subgame Solving for Imperfect-Information Games,8e0a28492ce39b7deb265dcce3bf5c30,http://arxiv.org/abs/1705.02955v3 14336," Classical game theory addresses decision problems in multi-agent environment where one rational agent's decision affects other agents' payoffs. Game theory has widespread application in economic, social and biological sciences. In recent years quantum versions of classical games have been proposed and studied. In this paper, we consider a quantum version of the classical Barro-Gordon game which captures the problem of time inconsistency in monetary economics. Such time inconsistency refers to the temptation of weak policy maker to implement high inflation when the public expects low inflation. The inconsistency arises when the public punishes the weak policy maker in the next cycle. We first present a quantum version of the Barro-Gordon game. Next, we show that in a particular case of the quantum game, time-consistent Nash equilibrium could be achieved when public expects low inflation, thus resolving the game. ",ali samadi,,2017.0,10.1016/j.physa.2017.07.029,Physica A 489 (2018) 94 - 101,Samadi2017,True,,arXiv,Not available,Quantum Barro--Gordon Game in Monetary Economics,cbf1609bbc17ed5c940aeef1592f4601,http://arxiv.org/abs/1708.05689v1 14337," Classical game theory addresses decision problems in multi-agent environment where one rational agent's decision affects other agents' payoffs. Game theory has widespread application in economic, social and biological sciences. In recent years quantum versions of classical games have been proposed and studied. In this paper, we consider a quantum version of the classical Barro-Gordon game which captures the problem of time inconsistency in monetary economics. Such time inconsistency refers to the temptation of weak policy maker to implement high inflation when the public expects low inflation. The inconsistency arises when the public punishes the weak policy maker in the next cycle. We first present a quantum version of the Barro-Gordon game. Next, we show that in a particular case of the quantum game, time-consistent Nash equilibrium could be achieved when public expects low inflation, thus resolving the game. ",afshin montakhab,,2017.0,10.1016/j.physa.2017.07.029,Physica A 489 (2018) 94 - 101,Samadi2017,True,,arXiv,Not available,Quantum Barro--Gordon Game in Monetary Economics,cbf1609bbc17ed5c940aeef1592f4601,http://arxiv.org/abs/1708.05689v1 14338," Classical game theory addresses decision problems in multi-agent environment where one rational agent's decision affects other agents' payoffs. Game theory has widespread application in economic, social and biological sciences. In recent years quantum versions of classical games have been proposed and studied. In this paper, we consider a quantum version of the classical Barro-Gordon game which captures the problem of time inconsistency in monetary economics. Such time inconsistency refers to the temptation of weak policy maker to implement high inflation when the public expects low inflation. The inconsistency arises when the public punishes the weak policy maker in the next cycle. We first present a quantum version of the Barro-Gordon game. Next, we show that in a particular case of the quantum game, time-consistent Nash equilibrium could be achieved when public expects low inflation, thus resolving the game. ",hussein marzban,,2017.0,10.1016/j.physa.2017.07.029,Physica A 489 (2018) 94 - 101,Samadi2017,True,,arXiv,Not available,Quantum Barro--Gordon Game in Monetary Economics,cbf1609bbc17ed5c940aeef1592f4601,http://arxiv.org/abs/1708.05689v1 14339," Classical game theory addresses decision problems in multi-agent environment where one rational agent's decision affects other agents' payoffs. Game theory has widespread application in economic, social and biological sciences. In recent years quantum versions of classical games have been proposed and studied. In this paper, we consider a quantum version of the classical Barro-Gordon game which captures the problem of time inconsistency in monetary economics. Such time inconsistency refers to the temptation of weak policy maker to implement high inflation when the public expects low inflation. The inconsistency arises when the public punishes the weak policy maker in the next cycle. We first present a quantum version of the Barro-Gordon game. Next, we show that in a particular case of the quantum game, time-consistent Nash equilibrium could be achieved when public expects low inflation, thus resolving the game. ",sakine owjimehr,,2017.0,10.1016/j.physa.2017.07.029,Physica A 489 (2018) 94 - 101,Samadi2017,True,,arXiv,Not available,Quantum Barro--Gordon Game in Monetary Economics,cbf1609bbc17ed5c940aeef1592f4601,http://arxiv.org/abs/1708.05689v1 14340," The optimal pricing problem is a fundamental problem that arises in combinatorial auctions. Suppose that there is one seller who has indivisible items and multiple buyers who want to purchase a combination of the items. The seller wants to sell his items for the highest possible prices, and each buyer wants to maximize his utility (i.e., valuation minus payment) as long as his payment does not exceed his budget. The optimal pricing problem seeks a price of each item and an assignment of items to buyers such that every buyer achieves the maximum utility under the prices. The goal of the problem is to maximize the total payment from buyers. In this paper, we consider the case that the valuations are submodular. We show that the problem is computationally hard even if there exists only one buyer. Then we propose approximation algorithms for the unlimited budget case. We also extend the algorithm for the limited budget case when there exists one buyer and multiple buyers collaborate with each other. ",katsuya tono,,2016.0,,arXiv,Maehara2016,True,,arXiv,Not available,Optimal Pricing for Submodular Valuations with Bounded Curvature,e4d17dcf5b3a2032ef314f88a682efed,http://arxiv.org/abs/1611.07605v1 14341," The fog radio access network (F-RAN) is a promising paradigm for the fifth generation wireless communication systems to provide high spectral efficiency and energy efficiency. Characterizing users to select an appropriate communication mode among fog access point (F-AP), and device-to-device (D2D) in F-RANs is critical for performance optimization. Using evolutionary game theory, we investigate the dynamics of user access mode selection in F-RANs. Specifically, the competition among groups of potential users space is formulated as a dynamic evolutionary game, and the evolutionary equilibrium is the solution to this game. Stochastic geometry tool is used to derive the proposals' payoff expressions for both F-AP and D2D users by taking into account the different nodes locations, cache sizes as well as the delay cost. The analytical results obtained from the game model are evaluated via simulations, which show that the evolutionary game based access mode selection algorithm can reach a much higher payoff than the max rate based algorithm. ",wenbo wang,,2017.0,,arXiv,Yan2017,True,,arXiv,Not available,"An Evolutionary Game for User Access Mode Selection in Fog Radio Access Networks",ea1d0919e5c79d7b8df4cf948e4fdbee,http://arxiv.org/abs/1709.05288v1 14342," Game theory is the study of tractable games which may be used to model more complex systems. Board games, video games and sports, however, are intractable by design, so ""ludological"" theories about these games as complex phenomena should be grounded in empiricism. A first ""ludometric"" concern is the empirical measurement of the amount of luck in various games. We argue against a narrow view of luck which includes only factors outside any player's control, and advocate for a holistic definition of luck as complementary to the variation in effective skill within a population of players. We introduce two metrics for luck in a game for a given population - one information theoretical, and one Bayesian, and discuss the estimation of these metrics using sparse, high-dimensional regression techniques. Finally, we apply these techniques to compare the amount of luck between various professional sports, between Chess and Go, and between two hobby board games: Race for the Galaxy and Seasons. ",daniel gilbert,,2018.0,,arXiv,Gilbert2018,True,,arXiv,Not available,"Ludometrics: Luck, and How to Measure It",0a050c0e8f12b5e08982eed4f7178cf9,http://arxiv.org/abs/1811.00673v1 14343," Game theory is the study of tractable games which may be used to model more complex systems. Board games, video games and sports, however, are intractable by design, so ""ludological"" theories about these games as complex phenomena should be grounded in empiricism. A first ""ludometric"" concern is the empirical measurement of the amount of luck in various games. We argue against a narrow view of luck which includes only factors outside any player's control, and advocate for a holistic definition of luck as complementary to the variation in effective skill within a population of players. We introduce two metrics for luck in a game for a given population - one information theoretical, and one Bayesian, and discuss the estimation of these metrics using sparse, high-dimensional regression techniques. Finally, we apply these techniques to compare the amount of luck between various professional sports, between Chess and Go, and between two hobby board games: Race for the Galaxy and Seasons. ",martin wells,,2018.0,,arXiv,Gilbert2018,True,,arXiv,Not available,"Ludometrics: Luck, and How to Measure It",0a050c0e8f12b5e08982eed4f7178cf9,http://arxiv.org/abs/1811.00673v1 14344," Studying continuous time counterpart of some discrete time dynamics is now a standard and fruitful technique, as some properties hold in both setups. In game theory, this is usually done by considering differential games on Euclidean spaces. This allows to infer properties on the convergence of values of a repeated game, to deal with the various concepts of approachability, etc. In this paper, we introduce a specific but quite abstract differential game defined on the Wasserstein space of probability distributions and we prove the existence of its value. Going back to the discrete time dynamics, we derive results on weak approachability with partial monitoring: we prove that any set satisfying a suitable compatibility condition is either weakly approachable or weakly excludable. We also obtain that the value for differential games with nonanticipative strategies is the same that those defined with a new concept of strategies very suitable to make links with repeated games. ",vianney perchet,,2018.0,,arXiv,Perchet2018,True,,arXiv,Not available,"A differential game on Wasserstein space. Application to weak approachability with partial monitoring",2f4009257718de8a68fd967c480925c9,http://arxiv.org/abs/1811.04575v1 14345," Studying continuous time counterpart of some discrete time dynamics is now a standard and fruitful technique, as some properties hold in both setups. In game theory, this is usually done by considering differential games on Euclidean spaces. This allows to infer properties on the convergence of values of a repeated game, to deal with the various concepts of approachability, etc. In this paper, we introduce a specific but quite abstract differential game defined on the Wasserstein space of probability distributions and we prove the existence of its value. Going back to the discrete time dynamics, we derive results on weak approachability with partial monitoring: we prove that any set satisfying a suitable compatibility condition is either weakly approachable or weakly excludable. We also obtain that the value for differential games with nonanticipative strategies is the same that those defined with a new concept of strategies very suitable to make links with repeated games. ",marc quincampoix,,2018.0,,arXiv,Perchet2018,True,,arXiv,Not available,"A differential game on Wasserstein space. Application to weak approachability with partial monitoring",2f4009257718de8a68fd967c480925c9,http://arxiv.org/abs/1811.04575v1 14346," We present BL-WoLF, a framework for learnability in repeated zero-sum games where the cost of learning is measured by the losses the learning agent accrues (rather than the number of rounds). The game is adversarially chosen from some family that the learner knows. The opponent knows the game and the learner's learning strategy. The learner tries to either not accrue losses, or to quickly learn about the game so as to avoid future losses (this is consistent with the Win or Learn Fast (WoLF) principle; BL stands for ``bounded loss''). Our framework allows for both probabilistic and approximate learning. The resultant notion of {\em BL-WoLF}-learnability can be applied to any class of games, and allows us to measure the inherent disadvantage to a player that does not know which game in the class it is in. We present {\em guaranteed BL-WoLF-learnability} results for families of games with deterministic payoffs and families of games with stochastic payoffs. We demonstrate that these families are {\em guaranteed approximately BL-WoLF-learnable} with lower cost. We then demonstrate families of games (both stochastic and deterministic) that are not guaranteed BL-WoLF-learnable. We show that those families, nevertheless, are {\em BL-WoLF-learnable}. To prove these results, we use a key lemma which we derive. ",vincent conitzer,,2003.0,,"In Proceedings of the 20th International Conference on Machine Learning (ICML-03), Washington, DC, USA, 2003",Conitzer2003,True,,arXiv,Not available,BL-WoLF: A Framework For Loss-Bounded Learnability In Zero-Sum Games,8bd492d2a688990a398cc0ee15798548,http://arxiv.org/abs/cs/0307006v1 14347," We present BL-WoLF, a framework for learnability in repeated zero-sum games where the cost of learning is measured by the losses the learning agent accrues (rather than the number of rounds). The game is adversarially chosen from some family that the learner knows. The opponent knows the game and the learner's learning strategy. The learner tries to either not accrue losses, or to quickly learn about the game so as to avoid future losses (this is consistent with the Win or Learn Fast (WoLF) principle; BL stands for ``bounded loss''). Our framework allows for both probabilistic and approximate learning. The resultant notion of {\em BL-WoLF}-learnability can be applied to any class of games, and allows us to measure the inherent disadvantage to a player that does not know which game in the class it is in. We present {\em guaranteed BL-WoLF-learnability} results for families of games with deterministic payoffs and families of games with stochastic payoffs. We demonstrate that these families are {\em guaranteed approximately BL-WoLF-learnable} with lower cost. We then demonstrate families of games (both stochastic and deterministic) that are not guaranteed BL-WoLF-learnable. We show that those families, nevertheless, are {\em BL-WoLF-learnable}. To prove these results, we use a key lemma which we derive. ",tuomas sandholm,,2003.0,,"In Proceedings of the 20th International Conference on Machine Learning (ICML-03), Washington, DC, USA, 2003",Conitzer2003,True,,arXiv,Not available,BL-WoLF: A Framework For Loss-Bounded Learnability In Zero-Sum Games,8bd492d2a688990a398cc0ee15798548,http://arxiv.org/abs/cs/0307006v1 14348," Two important metrics for measuring the quality of routing paths are the maximum edge congestion $C$ and maximum path length $D$. Here, we study bicriteria in routing games where each player $i$ selfishly selects a path that simultaneously minimizes its maximum edge congestion $C_i$ and path length $D_i$. We study the stability and price of anarchy of two bicriteria games: - {\em Max games}, where the social cost is $\max(C,D)$ and the player cost is $\max(C_i, D_i)$. We prove that max games are stable and convergent under best-response dynamics, and that the price of anarchy is bounded above by the maximum path length in the players' strategy sets. We also show that this bound is tight in worst-case scenarios. - {\em Sum games}, where the social cost is $C+D$ and the player cost is $C_i+D_i$. For sum games, we first show the negative result that there are game instances that have no Nash-equilibria. Therefore, we examine an approximate game called the {\em sum-bucket game} that is always convergent (and therefore stable). We show that the price of anarchy in sum-bucket games is bounded above by $C^* \cdot D^* / (C^* + D^*)$ (with a poly-log factor), where $C^*$ and $D^*$ are the optimal coordinated congestion and path length. Thus, the sum-bucket game has typically superior price of anarchy bounds than the max game. In fact, when either $C^*$ or $D^*$ is small (e.g. constant) the social cost of the Nash-equilibria is very close to the coordinated optimal $C^* + D^*$ (within a poly-log factor). We also show that the price of anarchy bound is tight for cases where both $C^*$ and $D^*$ are large. ",costas busch,,2008.0,,arXiv,Busch2008,True,,arXiv,Not available,Bicretieria Optimization in Routing Games,26876e1c48d964e85ae3e45f3c57bdfd,http://arxiv.org/abs/0801.4851v1 14349," Two important metrics for measuring the quality of routing paths are the maximum edge congestion $C$ and maximum path length $D$. Here, we study bicriteria in routing games where each player $i$ selfishly selects a path that simultaneously minimizes its maximum edge congestion $C_i$ and path length $D_i$. We study the stability and price of anarchy of two bicriteria games: - {\em Max games}, where the social cost is $\max(C,D)$ and the player cost is $\max(C_i, D_i)$. We prove that max games are stable and convergent under best-response dynamics, and that the price of anarchy is bounded above by the maximum path length in the players' strategy sets. We also show that this bound is tight in worst-case scenarios. - {\em Sum games}, where the social cost is $C+D$ and the player cost is $C_i+D_i$. For sum games, we first show the negative result that there are game instances that have no Nash-equilibria. Therefore, we examine an approximate game called the {\em sum-bucket game} that is always convergent (and therefore stable). We show that the price of anarchy in sum-bucket games is bounded above by $C^* \cdot D^* / (C^* + D^*)$ (with a poly-log factor), where $C^*$ and $D^*$ are the optimal coordinated congestion and path length. Thus, the sum-bucket game has typically superior price of anarchy bounds than the max game. In fact, when either $C^*$ or $D^*$ is small (e.g. constant) the social cost of the Nash-equilibria is very close to the coordinated optimal $C^* + D^*$ (within a poly-log factor). We also show that the price of anarchy bound is tight for cases where both $C^*$ and $D^*$ are large. ",rajgopal kannan,,2008.0,,arXiv,Busch2008,True,,arXiv,Not available,Bicretieria Optimization in Routing Games,26876e1c48d964e85ae3e45f3c57bdfd,http://arxiv.org/abs/0801.4851v1 14350," This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. In particular, we assume agents optimize a linear combination of personal delay of a strategy and the resulting increase in social cost. Our model can be embedded in the framework of congestion games with player-specific latency functions. Stable states are the Nash equilibria of these games, and we examine their existence and the convergence of sequential best-response dynamics. Previous work shows that for symmetric singleton games with convex delays Nash equilibria are guaranteed to exist. For concave delay functions we observe that there are games without Nash equilibria and provide a polynomial time algorithm to decide existence for symmetric singleton games with arbitrary delay functions. Our algorithm can be extended to compute best and worst Nash equilibria if they exist. For more general congestion games existence becomes NP-hard to decide, even for symmetric network games with quadratic delay functions. Perhaps surprisingly, if all delay functions are linear, then there is always a Nash equilibrium in any congestion game with altruists and any better-response dynamics converges. In addition to these results for uncoordinated dynamics, we consider a scenario in which a central altruistic institution can motivate agents to act altruistically. We provide constructive and hardness results for finding the minimum number of altruists to stabilize an optimal congestion profile and more general mechanisms to incentivize agents to adopt favorable behavior. ",martin hoefer,,2008.0,,arXiv,Hoefer2008,True,,arXiv,Not available,Altruism in Atomic Congestion Games,135d52c35d4a7474493a52764603cf7e,http://arxiv.org/abs/0807.2011v2 14351," This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. In particular, we assume agents optimize a linear combination of personal delay of a strategy and the resulting increase in social cost. Our model can be embedded in the framework of congestion games with player-specific latency functions. Stable states are the Nash equilibria of these games, and we examine their existence and the convergence of sequential best-response dynamics. Previous work shows that for symmetric singleton games with convex delays Nash equilibria are guaranteed to exist. For concave delay functions we observe that there are games without Nash equilibria and provide a polynomial time algorithm to decide existence for symmetric singleton games with arbitrary delay functions. Our algorithm can be extended to compute best and worst Nash equilibria if they exist. For more general congestion games existence becomes NP-hard to decide, even for symmetric network games with quadratic delay functions. Perhaps surprisingly, if all delay functions are linear, then there is always a Nash equilibrium in any congestion game with altruists and any better-response dynamics converges. In addition to these results for uncoordinated dynamics, we consider a scenario in which a central altruistic institution can motivate agents to act altruistically. We provide constructive and hardness results for finding the minimum number of altruists to stabilize an optimal congestion profile and more general mechanisms to incentivize agents to adopt favorable behavior. ",alexander skopalik,,2008.0,,arXiv,Hoefer2008,True,,arXiv,Not available,Altruism in Atomic Congestion Games,135d52c35d4a7474493a52764603cf7e,http://arxiv.org/abs/0807.2011v2 14352," This short note is a conceptual prologue to the series of articles devoted to the analysis of interrelations between the representation theory (especially, its inverse problems) and the control and games theory. ",d. juriev,,1998.0,,arXiv,Juriev1998,True,,arXiv,Not available,Interactive games and representation theory,f5bec5cc01aa387c49924b4f9afb1105,http://arxiv.org/abs/math/9803020v2 14353," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player~1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. Our result is significant because the strategy improvement algorithm provides, for the first time, a way to approximate the value of a concurrent safety game from below. Since a value iteration algorithm, or a strategy improvement algorithm for reachability games, can be used to approximate the same value from above, the combination of both algorithms yields a method for computing a converging sequence of upper and lower bounds for the values of concurrent reachability and safety games. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",krishnendu chatterjee,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,"Termination Criteria for Solving Concurrent Safety and Reachability Games",eae8e825bca4e7076985abf1e78f3632,http://arxiv.org/abs/0809.4017v1 14354," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player~1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. Our result is significant because the strategy improvement algorithm provides, for the first time, a way to approximate the value of a concurrent safety game from below. Since a value iteration algorithm, or a strategy improvement algorithm for reachability games, can be used to approximate the same value from above, the combination of both algorithms yields a method for computing a converging sequence of upper and lower bounds for the values of concurrent reachability and safety games. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",luca alfaro,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,"Termination Criteria for Solving Concurrent Safety and Reachability Games",eae8e825bca4e7076985abf1e78f3632,http://arxiv.org/abs/0809.4017v1 14355," We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective to stay forever in a given set of states, and its dual, the reachability objective to reach a given set of states. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player~1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. Our result is significant because the strategy improvement algorithm provides, for the first time, a way to approximate the value of a concurrent safety game from below. Since a value iteration algorithm, or a strategy improvement algorithm for reachability games, can be used to approximate the same value from above, the combination of both algorithms yields a method for computing a converging sequence of upper and lower bounds for the values of concurrent reachability and safety games. Previous methods could approximate the values of these games only from one direction, and as no rates of convergence are known, they did not provide a practical way to solve these games. ",thomas henzinger,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,"Termination Criteria for Solving Concurrent Safety and Reachability Games",eae8e825bca4e7076985abf1e78f3632,http://arxiv.org/abs/0809.4017v1 14356," In this work we present a detailed analysis using the Markov chain theory of some versions of the truel game in which three players try to eliminate each other in a series of one-to-one competitions, using the rules of the game. Besides reproducing some known expressions for the winning probability of each player, including the equilibrium points, we give expressions for the actual distribution of winners in a truel competition. ",r. toral,,2005.0,10.1063/1.2008603,arXiv,Toral2005,True,,arXiv,Not available,Distribution of winners in truel games,aedaf3661129ac7c013bc090e0f08d92,http://arxiv.org/abs/cond-mat/0505388v1 14357," In this work we present a detailed analysis using the Markov chain theory of some versions of the truel game in which three players try to eliminate each other in a series of one-to-one competitions, using the rules of the game. Besides reproducing some known expressions for the winning probability of each player, including the equilibrium points, we give expressions for the actual distribution of winners in a truel competition. ",p. amengual,,2005.0,10.1063/1.2008603,arXiv,Toral2005,True,,arXiv,Not available,Distribution of winners in truel games,aedaf3661129ac7c013bc090e0f08d92,http://arxiv.org/abs/cond-mat/0505388v1 14358," In order to better understand reasoning involved in analyzing infinite games in extensive form, we performed experiments in the proof assistant Coq that are reported here. ",pierre lescanne,,2008.0,,arXiv,Lescanne2008,True,,arXiv,Not available,(Mechanical) Reasoning on Infinite Extensive Games,acd7341b16de7bc3971e291714af12f7,http://arxiv.org/abs/0805.1798v4 14359," We consider the computational complexity of the question whether a certain strategy can be removed from a game by means of iterated elimination of dominated strategies. In particular, we study the influence of different definitions of domination and of the number of different payoff values. In addition, the consequence of restriction to constant-sum games is shown. ",arno pauly,,2009.0,,arXiv,Pauly2009,True,,arXiv,Not available,The Complexity of Iterated Strategy Elimination,6f1fff21c499ed1fc61185c3366a282a,http://arxiv.org/abs/0910.5107v2 14360," We propose an algorithm for computing approximate Nash equilibria of partially observable games using Monte-Carlo tree search based on recent bandit methods. We obtain experimental results for the game of phantom tic-tac-toe, showing that strong strategies can be efficiently computed by our algorithm. ",david auger,,2011.0,,arXiv,Auger2011,True,,arXiv,Not available,Multiple Tree for Partially Observable Monte-Carlo Tree Search,71f2257dfaefb278571c83a83397795f,http://arxiv.org/abs/1102.1580v1 14361," Using Sperner's lemma for modified partition of a simplex we will constructively prove the existence of a Nash equilibrium in a finite strategic game with sequentially locally non-constant payoff functions. We follow the Bishop style constructive mathematics. ",yasuhito tanaka,,2011.0,,arXiv,Tanaka2011,True,,arXiv,Not available,"Constructive proof of the existence of Nash Equilibrium in a finite strategic game with sequentially locally non-constant payoff functions by Sperner's lemma",0dddabca864956ccabf39eb616ff51b4,http://arxiv.org/abs/1103.1980v3 14362," We examine the history of cake cutting mechanisms and discuss the efficiency of their allocations. In the case of piecewise uniform preferences, we define a game that in the presence of strategic agents has equilibria that are not dominated by the allocations of any mechanism. We identify that the equilibria of this game coincide with the allocations of an existing cake cutting mechanism. ",egor ianovski,,2012.0,,arXiv,Ianovski2012,True,,arXiv,Not available,Cake Cutting Mechanisms,9e8fd9fe230a3db57f1df4f3a238ab21,http://arxiv.org/abs/1203.0100v2 14363," We introduce a misere quotient semigroup construction in impartial combinatorial game theory, and argue that it is the long-sought natural generalization of the normal-play Sprague-Grundy theory to misere play. Along the way, we illustrate how to use the theory to describe complete analyses of two wild taking and breaking games. ",thane plambeck,,2005.0,,"INTEGERS: Electronic Journal of Combinatorial Number Theory 5 (2005) #G05",Plambeck2005,True,,arXiv,Not available,Taming the wild in impartial combinatorial games,f43c9be81ae6ad3a8358736d1115ab89,http://arxiv.org/abs/math/0501315v2 14364," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",avinatan hassidim,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 14365," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",haim kaplan,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 14366," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",yishay mansour,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 14367," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",noam nisan,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 14368," We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only. ",josep diaz,,2014.0,,arXiv,Díaz2014,True,,arXiv,Not available,"Optimizing the Social Cost of Congestion Games by Imposing Variable Delays",6988ba6454bef0b048df894919f38eec,http://arxiv.org/abs/1406.5153v1 14369," We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only. ",ioannis giotis,,2014.0,,arXiv,Díaz2014,True,,arXiv,Not available,"Optimizing the Social Cost of Congestion Games by Imposing Variable Delays",6988ba6454bef0b048df894919f38eec,http://arxiv.org/abs/1406.5153v1 14370," We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only. ",lefteris kirousis,,2014.0,,arXiv,Díaz2014,True,,arXiv,Not available,"Optimizing the Social Cost of Congestion Games by Imposing Variable Delays",6988ba6454bef0b048df894919f38eec,http://arxiv.org/abs/1406.5153v1 14371," We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only. ",yiannis mourtos,,2014.0,,arXiv,Díaz2014,True,,arXiv,Not available,"Optimizing the Social Cost of Congestion Games by Imposing Variable Delays",6988ba6454bef0b048df894919f38eec,http://arxiv.org/abs/1406.5153v1 14372," We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only. ",maria serna,,2014.0,,arXiv,Díaz2014,True,,arXiv,Not available,"Optimizing the Social Cost of Congestion Games by Imposing Variable Delays",6988ba6454bef0b048df894919f38eec,http://arxiv.org/abs/1406.5153v1 14373," The game of Antonim is a variant of the game Nim, with the additional rule that heaps are not allowed to be the same size. A winning strategy for three heap Antonim has been solved. We will discuss the solution to three-heap Antonim and generalize this theory to an arbitrary number of heaps. ",zachary silbernick,,2015.0,,arXiv,Silbernick2015,True,,arXiv,Not available,A Winning Strategy for the Game of Antonim,8c8b0e1745b810c3ad90ec33f16db269,http://arxiv.org/abs/1506.01042v1 14374," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The paper presents the history, basic ideas and recent development in quantum game theory. On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. ",e. piotrowski,,2003.0,,arXiv,Piotrowski2003,True,,arXiv,Not available,The next stage: quantum game theory,b9f784c82e660b9b64a096ecf4231158,http://arxiv.org/abs/quant-ph/0308027v1 14375," The game of Antonim is a variant of the game Nim, with the additional rule that heaps are not allowed to be the same size. A winning strategy for three heap Antonim has been solved. We will discuss the solution to three-heap Antonim and generalize this theory to an arbitrary number of heaps. ",robert campbell,,2015.0,,arXiv,Silbernick2015,True,,arXiv,Not available,A Winning Strategy for the Game of Antonim,8c8b0e1745b810c3ad90ec33f16db269,http://arxiv.org/abs/1506.01042v1 14376," We have investigated the security game under non-additive utility functions. ",sinong wang,,2016.0,,arXiv,Wang2016,True,,arXiv,Not available,Non-additive Security Games,247dab00812b0cd7bb64f4769226ad0a,http://arxiv.org/abs/1603.00749v5 14377," We have investigated the security game under non-additive utility functions. ",fang liu,,2016.0,,arXiv,Wang2016,True,,arXiv,Not available,Non-additive Security Games,247dab00812b0cd7bb64f4769226ad0a,http://arxiv.org/abs/1603.00749v5 14378," We have investigated the security game under non-additive utility functions. ",ness shroff,,2016.0,,arXiv,Wang2016,True,,arXiv,Not available,Non-additive Security Games,247dab00812b0cd7bb64f4769226ad0a,http://arxiv.org/abs/1603.00749v5 14379," This paper studies an environment of simultaneous, separate, first-price auctions for complementary goods. Agents observe private values of each good before making bids, and the complementarity between goods is explicitly incorporated in their utility. For simplicity, a model is presented with two first-price auctions and two bidders. We show that a monotone pure-strategy Bayesian Nash Equilibrium exists in the environment. ",wiroy shin,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Simultaneous auctions for complementary goods,878b4680f06c7892ffefd2adfbc511d7,http://arxiv.org/abs/1312.2641v1 14380," One of the Multi-Agent Systems that is widely used by various government agencies, buyers and sellers in a market economy, in such a manner so as to attain optimized resource allocation, is the Combinatorial Auctioning System (CAS). We study another important aspect of resource allocations in CAS, namely fairness. We present two important notions of fairness in CAS, extended fairness and basic fairness. We give an algorithm that works by incorporating a metric to ensure fairness in a CAS that uses the Vickrey-Clark-Groves (VCG) mechanism, and uses an algorithm of Sandholm to achieve optimality. Mathematical formulations are given to represent measures of extended fairness and basic fairness. ",megha saini,,2008.0,,arXiv,Saini2008,True,,arXiv,Not available,Fairness in Combinatorial Auctioning Systems,f2441e23af3cf4578ae1d5d947fe8bd1,http://arxiv.org/abs/0809.2168v1 14381," One of the Multi-Agent Systems that is widely used by various government agencies, buyers and sellers in a market economy, in such a manner so as to attain optimized resource allocation, is the Combinatorial Auctioning System (CAS). We study another important aspect of resource allocations in CAS, namely fairness. We present two important notions of fairness in CAS, extended fairness and basic fairness. We give an algorithm that works by incorporating a metric to ensure fairness in a CAS that uses the Vickrey-Clark-Groves (VCG) mechanism, and uses an algorithm of Sandholm to achieve optimality. Mathematical formulations are given to represent measures of extended fairness and basic fairness. ",shrisha rao,,2008.0,,arXiv,Saini2008,True,,arXiv,Not available,Fairness in Combinatorial Auctioning Systems,f2441e23af3cf4578ae1d5d947fe8bd1,http://arxiv.org/abs/0809.2168v1 14382," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",shaddin dughmi,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 14383," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",nicole immorlica,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 14384," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",aaron roth,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 14385," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The paper presents the history, basic ideas and recent development in quantum game theory. On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. ",j. sladkowski,,2003.0,,arXiv,Piotrowski2003,True,,arXiv,Not available,The next stage: quantum game theory,b9f784c82e660b9b64a096ecf4231158,http://arxiv.org/abs/quant-ph/0308027v1 14386," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",l. blumrosen,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 14387," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",n. nisan,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 14388," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",i. segal,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 14389," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",oren ben-zwi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 14390," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ron lavi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 14391," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ilan newman,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 14392," We show an auction-based algorithm to compute market equilibrium prices in a production model, where consumers purchase items under separable nonlinear utility concave functions which satisfy W.G.S(Weak Gross Substitutes); producers produce items with multiple linear production constraints. Our algorithm differs from previous approaches in that the prices are allowed to both increase and decrease to handle changes in the production. This provides a t^atonnement style algorithm which converges and provides a PTAS. The algorithm can also be extended to arbitrary convex production regions and the Arrow-Debreu model. The convergence is dependent on the behavior of the marginal utility of the concave function. ",junghwan shin,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Auction Algorithm for Production Models,7672f4505a9d6aef4a069a4208a04401,http://arxiv.org/abs/1304.4618v1 14393," We show an auction-based algorithm to compute market equilibrium prices in a production model, where consumers purchase items under separable nonlinear utility concave functions which satisfy W.G.S(Weak Gross Substitutes); producers produce items with multiple linear production constraints. Our algorithm differs from previous approaches in that the prices are allowed to both increase and decrease to handle changes in the production. This provides a t^atonnement style algorithm which converges and provides a PTAS. The algorithm can also be extended to arbitrary convex production regions and the Arrow-Debreu model. The convergence is dependent on the behavior of the marginal utility of the concave function. ",sanjiv kapoor,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Auction Algorithm for Production Models,7672f4505a9d6aef4a069a4208a04401,http://arxiv.org/abs/1304.4618v1 14394," We present an incentive-compatible polynomial-time approximation scheme for multi-unit auctions with general k-minded player valuations. The mechanism fully optimizes over an appropriately chosen sub-range of possible allocations and then uses VCG payments over this sub-range. We show that obtaining a fully polynomial-time incentive-compatible approximation scheme, at least using VCG payments, is NP-hard. For the case of valuations given by black boxes, we give a polynomial-time incentive-compatible 2-approximation mechanism and show that no better is possible, at least using VCG payments. ",shahar dobzinski,,2014.0,10.1613/jair.2950,"Journal Of Artificial Intelligence Research, Volume 37, pages 85-98, 2010",Dobzinski2014,True,,arXiv,Not available,Mechanisms for Multi-Unit Auctions,cf080ba6363a7b0c8d3c6aba5ffa52f0,http://arxiv.org/abs/1401.3834v1 14395," We present an incentive-compatible polynomial-time approximation scheme for multi-unit auctions with general k-minded player valuations. The mechanism fully optimizes over an appropriately chosen sub-range of possible allocations and then uses VCG payments over this sub-range. We show that obtaining a fully polynomial-time incentive-compatible approximation scheme, at least using VCG payments, is NP-hard. For the case of valuations given by black boxes, we give a polynomial-time incentive-compatible 2-approximation mechanism and show that no better is possible, at least using VCG payments. ",noam nisan,,2014.0,10.1613/jair.2950,"Journal Of Artificial Intelligence Research, Volume 37, pages 85-98, 2010",Dobzinski2014,True,,arXiv,Not available,Mechanisms for Multi-Unit Auctions,cf080ba6363a7b0c8d3c6aba5ffa52f0,http://arxiv.org/abs/1401.3834v1 14396," We consider structural and algorithmic questions related to the Nash dynamics of weighted congestion games. In weighted congestion games with linear latency functions, the existence of (pure Nash) equilibria is guaranteed by potential function arguments. Unfortunately, this proof of existence is inefficient and computing equilibria is such games is a {\sf PLS}-hard problem. The situation gets worse when superlinear latency functions come into play; in this case, the Nash dynamics of the game may contain cycles and equilibria may not even exist. Given these obstacles, we consider approximate equilibria as alternative solution concepts. Do such equilibria exist? And if so, can we compute them efficiently? We provide positive answers to both questions for weighted congestion games with polynomial latency functions by exploiting an ""approximation"" of such games by a new class of potential games that we call $\Psi$-games. This allows us to show that these games have $d!$-approximate equilibria, where $d$ is the maximum degree of the latency functions. Our main technical contribution is an efficient algorithm for computing O(1)-approximate equilibria when $d$ is a constant. For games with linear latency functions, the approximation guarantee is $\frac{3+\sqrt{5}}{2}+O(\gamma)$ for arbitrarily small $\gamma>0$; for latency functions with maximum degree $d\geq 2$, it is $d^{2d+o(d)}$. The running time is polynomial in the number of bits in the representation of the game and $1/\gamma$. As a byproduct of our techniques, we also show the following structural statement for weighted congestion games with polynomial latency functions of maximum degree $d\geq 2$: polynomially-long sequences of best-response moves from any initial state to a $d^{O(d^2)}$-approximate equilibrium exist and can be efficiently identified in such games as long as $d$ is constant. ",ioannis caragiannis,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure",ebd6d002297b833c7258e50d3bf71630,http://arxiv.org/abs/1107.2248v2 14397," Online auctions are among the most influential e-business applications. Their impact on trading for businesses, as well as consumers, is both remarkable and inevitable. There have been considerable efforts in setting up market places, but, with respects to market volume, online trading is still in its early stages. This chapter discusses the benefits of the concept of Internet marketplaces, with the highest impact on pricing strategies, namely, the conduction of online business auctions. We discuss their benefits, problems and possible solutions. In addition, we sketch actions for suppliers to achieve a better strategic position in the upcoming Internet market places. ",bernhard rumpe,,2014.0,,"Managing E-Commerce and Mobile Computing Technologies IRM Press, 2003",Rumpe2014,True,,arXiv,Not available,E-Business Experiences with Online Auctions,788717a26f25d81a06f4c70a792226ac,http://arxiv.org/abs/1409.6559v1 14398," We study the problem of designing optimal auctions under restrictions on the set of permissible allocations. In addition to allowing us to restrict to deterministic mechanisms, we can also indirectly model non-additive valuations. We prove a strong duality result, extending a result due to Daskalakis et al. [2015], that guarantees the existence of a certificate of optimality for optimal restricted mechanisms. As a corollary of our result, we provide a new characterization of the set of allocations that the optimal mechanism may actually use. To illustrate our result we find and certify optimal mechanisms for four settings where previous frameworks do not apply, and provide new economic intuition about some of the tools that have previously been used to find optimal mechanisms. ",ian kash,,2016.0,,arXiv,Kash2016,True,,arXiv,Not available,Optimal Auctions with Restricted Allocations,7cf59cd335a5df245037f886e818e726,http://arxiv.org/abs/1606.01610v1 14399," We study the problem of designing optimal auctions under restrictions on the set of permissible allocations. In addition to allowing us to restrict to deterministic mechanisms, we can also indirectly model non-additive valuations. We prove a strong duality result, extending a result due to Daskalakis et al. [2015], that guarantees the existence of a certificate of optimality for optimal restricted mechanisms. As a corollary of our result, we provide a new characterization of the set of allocations that the optimal mechanism may actually use. To illustrate our result we find and certify optimal mechanisms for four settings where previous frameworks do not apply, and provide new economic intuition about some of the tools that have previously been used to find optimal mechanisms. ",rafael frongillo,,2016.0,,arXiv,Kash2016,True,,arXiv,Not available,Optimal Auctions with Restricted Allocations,7cf59cd335a5df245037f886e818e726,http://arxiv.org/abs/1606.01610v1 14400," Consider the problem of allocating goods to buyers through an auction. An auction is efficient if the resulting allocation maximizes total welfare, conditional on the information available. If buyers have private values, the Vickrey-Groves-Clarke mechanism is efficient. If buyers have common values and a buyer's information can be summarized as a one-dimensional signal, Dasgupta and Maskin present an efficient auction. We construct an efficient auction mechanism in case buyer information is multidimensional, for a restricted class of valuation functions, and we prove which of the assumptions made are necessary for the existence of an efficient mechanism. ",andrei ciupan,,2018.0,,arXiv,Ciupan2018,True,,arXiv,Not available,Efficient Auctions With Common Values,bfcb250d2a768f4e13c9f3223858143f,http://arxiv.org/abs/1805.08568v1 14401," In this paper, we introduce malicious Bayesian congestion games as an extension to congestion games where players might act in a malicious way. In such a game each player has two types. Either the player is a rational player seeking to minimize her own delay, or - with a certain probability - the player is malicious in which case her only goal is to disturb the other players as much as possible. We show that such games do in general not possess a Bayesian Nash equilibrium in pure strategies (i.e. a pure Bayesian Nash equilibrium). Moreover, given a game, we show that it is NP-complete to decide whether it admits a pure Bayesian Nash equilibrium. This result even holds when resource latency functions are linear, each player is malicious with the same probability, and all strategy sets consist of singleton sets. For a slightly more restricted class of malicious Bayesian congestion games, we provide easy checkable properties that are necessary and sufficient for the existence of a pure Bayesian Nash equilibrium. In the second part of the paper we study the impact of the malicious types on the overall performance of the system (i.e. the social cost). To measure this impact, we use the Price of Malice. We provide (tight) bounds on the Price of Malice for an interesting class of malicious Bayesian congestion games. Moreover, we show that for certain congestion games the advent of malicious types can also be beneficial to the system in the sense that the social cost of the worst case equilibrium decreases. We provide a tight bound on the maximum factor by which this happens. ",martin gairing,,2008.0,,arXiv,Gairing2008,True,,arXiv,Not available,Malicious Bayesian Congestion Games,54c4105f6d4681aee415166a8014539c,http://arxiv.org/abs/0805.2421v2 14402," We study a class of stochastic dynamic games that exhibit strategic complementarities between players; formally, in the games we consider, the payoff of a player has increasing differences between her own state and the empirical distribution of the states of other players. Such games can be used to model a diverse set of applications, including network security models, recommender systems, and dynamic search in markets. Stochastic games are generally difficult to analyze, and these difficulties are only exacerbated when the number of players is large (as might be the case in the preceding examples). We consider an approximation methodology called mean field equilibrium to study these games. In such an equilibrium, each player reacts to only the long run average state of other players. We find necessary conditions for the existence of a mean field equilibrium in such games. Furthermore, as a simple consequence of this existence theorem, we obtain several natural monotonicity properties. We show that there exist a ""largest"" and a ""smallest"" equilibrium among all those where the equilibrium strategy used by a player is nondecreasing, and we also show that players converge to each of these equilibria via natural myopic learning dynamics; as we argue, these dynamics are more reasonable than the standard best response dynamics. We also provide sensitivity results, where we quantify how the equilibria of such games move in response to changes in parameters of the game (e.g., the introduction of incentives to players). ",sachin adlakha,,2010.0,,arXiv,Adlakha2010,True,,arXiv,Not available,Mean Field Equilibrium in Dynamic Games with Complementarities,43ba4bf233a18a59f24dd7f03a65f51b,http://arxiv.org/abs/1011.5677v1 14403," We study a class of stochastic dynamic games that exhibit strategic complementarities between players; formally, in the games we consider, the payoff of a player has increasing differences between her own state and the empirical distribution of the states of other players. Such games can be used to model a diverse set of applications, including network security models, recommender systems, and dynamic search in markets. Stochastic games are generally difficult to analyze, and these difficulties are only exacerbated when the number of players is large (as might be the case in the preceding examples). We consider an approximation methodology called mean field equilibrium to study these games. In such an equilibrium, each player reacts to only the long run average state of other players. We find necessary conditions for the existence of a mean field equilibrium in such games. Furthermore, as a simple consequence of this existence theorem, we obtain several natural monotonicity properties. We show that there exist a ""largest"" and a ""smallest"" equilibrium among all those where the equilibrium strategy used by a player is nondecreasing, and we also show that players converge to each of these equilibria via natural myopic learning dynamics; as we argue, these dynamics are more reasonable than the standard best response dynamics. We also provide sensitivity results, where we quantify how the equilibria of such games move in response to changes in parameters of the game (e.g., the introduction of incentives to players). ",ramesh johari,,2010.0,,arXiv,Adlakha2010,True,,arXiv,Not available,Mean Field Equilibrium in Dynamic Games with Complementarities,43ba4bf233a18a59f24dd7f03a65f51b,http://arxiv.org/abs/1011.5677v1 14404," Many online marketplaces enjoy great success. Buyers and sellers in successful markets carry out cooperative transactions even if they do not know each other in advance and a moral hazard exists. An indispensable component that enables cooperation in such social dilemma situations is the reputation system. Under the reputation system, a buyer can avoid transacting with a seller with a bad reputation. A transaction in online marketplaces is better modeled by the trust game than other social dilemma games, including the donation game and the prisoner's dilemma. In addition, most individuals participate mostly as buyers or sellers; each individual does not play the two roles with equal probability. Although the reputation mechanism is known to be able to remove the moral hazard in games with asymmetric roles, competition between different strategies and population dynamics of such a game are not sufficiently understood. On the other hand, existing models of reputation-based cooperation, also known as indirect reciprocity, are based on the symmetric donation game. We analyze the trust game with two fixed roles, where trustees (i.e., sellers) but not investors (i.e., buyers) possess reputation scores. We study the equilibria and the replicator dynamics of the game. We show that the reputation mechanism enables cooperation between unacquainted buyers and sellers under fairly generous conditions, even when such a cooperative equilibrium coexists with an asocial equilibrium in which buyers do not buy and sellers cheat. In addition, we show that not many buyers may care about the seller's reputation under cooperative equilibrium. Buyers' trusting behavior and sellers' reputation-driven cooperative behavior coevolve to alleviate the social dilemma. ",naoki masuda,,2011.0,10.1371/journal.pone.0044169,"PLoS ONE, 7(9), e44169 (2012)",Masuda2011,True,,arXiv,Not available,Coevolution of trustful buyers and cooperative sellers in the trust game,1e366fd8dd20a90615f673e0e58c364a,http://arxiv.org/abs/1103.2648v2 14405," Many online marketplaces enjoy great success. Buyers and sellers in successful markets carry out cooperative transactions even if they do not know each other in advance and a moral hazard exists. An indispensable component that enables cooperation in such social dilemma situations is the reputation system. Under the reputation system, a buyer can avoid transacting with a seller with a bad reputation. A transaction in online marketplaces is better modeled by the trust game than other social dilemma games, including the donation game and the prisoner's dilemma. In addition, most individuals participate mostly as buyers or sellers; each individual does not play the two roles with equal probability. Although the reputation mechanism is known to be able to remove the moral hazard in games with asymmetric roles, competition between different strategies and population dynamics of such a game are not sufficiently understood. On the other hand, existing models of reputation-based cooperation, also known as indirect reciprocity, are based on the symmetric donation game. We analyze the trust game with two fixed roles, where trustees (i.e., sellers) but not investors (i.e., buyers) possess reputation scores. We study the equilibria and the replicator dynamics of the game. We show that the reputation mechanism enables cooperation between unacquainted buyers and sellers under fairly generous conditions, even when such a cooperative equilibrium coexists with an asocial equilibrium in which buyers do not buy and sellers cheat. In addition, we show that not many buyers may care about the seller's reputation under cooperative equilibrium. Buyers' trusting behavior and sellers' reputation-driven cooperative behavior coevolve to alleviate the social dilemma. ",mitsuhiro nakamura,,2011.0,10.1371/journal.pone.0044169,"PLoS ONE, 7(9), e44169 (2012)",Masuda2011,True,,arXiv,Not available,Coevolution of trustful buyers and cooperative sellers in the trust game,1e366fd8dd20a90615f673e0e58c364a,http://arxiv.org/abs/1103.2648v2 14406," Logit Dynamics [Blume, Games and Economic Behavior, 1993] are randomized best response dynamics for strategic games: at every time step a player is selected uniformly at random and she chooses a new strategy according to a probability distribution biased toward strategies promising higher payoffs. This process defines an ergodic Markov chain, over the set of strategy profiles of the game, whose unique stationary distribution is the long-term equilibrium concept for the game. However, when the mixing time of the chain is large (e.g., exponential in the number of players), the stationary distribution loses its appeal as equilibrium concept, and the transient phase of the Markov chain becomes important. It can happen that the chain is ""metastable"", i.e., on a time-scale shorter than the mixing time, it stays close to some probability distribution over the state space, while in a time-scale multiple of the mixing time it jumps from one distribution to another. In this paper we give a quantitative definition of ""metastable probability distributions"" for a Markov chain and we study the metastability of the logit dynamics for some classes of coordination games. We first consider a pure $n$-player coordination game that highlights the distinctive features of our metastability notion based on distributions. Then, we study coordination games on the clique without a risk-dominant strategy (which are equivalent to the well-known Glauber dynamics for the Curie-Weiss model) and coordination games on a ring (both with and without risk-dominant strategy). ",vincenzo auletta,,2011.0,,arXiv,Auletta2011,True,,arXiv,Not available,Metastability of Logit Dynamics for Coordination Games,016715ae4e93b56d71c2ce296488a1ff,http://arxiv.org/abs/1107.4537v4 14407," We consider structural and algorithmic questions related to the Nash dynamics of weighted congestion games. In weighted congestion games with linear latency functions, the existence of (pure Nash) equilibria is guaranteed by potential function arguments. Unfortunately, this proof of existence is inefficient and computing equilibria is such games is a {\sf PLS}-hard problem. The situation gets worse when superlinear latency functions come into play; in this case, the Nash dynamics of the game may contain cycles and equilibria may not even exist. Given these obstacles, we consider approximate equilibria as alternative solution concepts. Do such equilibria exist? And if so, can we compute them efficiently? We provide positive answers to both questions for weighted congestion games with polynomial latency functions by exploiting an ""approximation"" of such games by a new class of potential games that we call $\Psi$-games. This allows us to show that these games have $d!$-approximate equilibria, where $d$ is the maximum degree of the latency functions. Our main technical contribution is an efficient algorithm for computing O(1)-approximate equilibria when $d$ is a constant. For games with linear latency functions, the approximation guarantee is $\frac{3+\sqrt{5}}{2}+O(\gamma)$ for arbitrarily small $\gamma>0$; for latency functions with maximum degree $d\geq 2$, it is $d^{2d+o(d)}$. The running time is polynomial in the number of bits in the representation of the game and $1/\gamma$. As a byproduct of our techniques, we also show the following structural statement for weighted congestion games with polynomial latency functions of maximum degree $d\geq 2$: polynomially-long sequences of best-response moves from any initial state to a $d^{O(d^2)}$-approximate equilibrium exist and can be efficiently identified in such games as long as $d$ is constant. ",angelo fanelli,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure",ebd6d002297b833c7258e50d3bf71630,http://arxiv.org/abs/1107.2248v2 14408," Logit Dynamics [Blume, Games and Economic Behavior, 1993] are randomized best response dynamics for strategic games: at every time step a player is selected uniformly at random and she chooses a new strategy according to a probability distribution biased toward strategies promising higher payoffs. This process defines an ergodic Markov chain, over the set of strategy profiles of the game, whose unique stationary distribution is the long-term equilibrium concept for the game. However, when the mixing time of the chain is large (e.g., exponential in the number of players), the stationary distribution loses its appeal as equilibrium concept, and the transient phase of the Markov chain becomes important. It can happen that the chain is ""metastable"", i.e., on a time-scale shorter than the mixing time, it stays close to some probability distribution over the state space, while in a time-scale multiple of the mixing time it jumps from one distribution to another. In this paper we give a quantitative definition of ""metastable probability distributions"" for a Markov chain and we study the metastability of the logit dynamics for some classes of coordination games. We first consider a pure $n$-player coordination game that highlights the distinctive features of our metastability notion based on distributions. Then, we study coordination games on the clique without a risk-dominant strategy (which are equivalent to the well-known Glauber dynamics for the Curie-Weiss model) and coordination games on a ring (both with and without risk-dominant strategy). ",diodato ferraioli,,2011.0,,arXiv,Auletta2011,True,,arXiv,Not available,Metastability of Logit Dynamics for Coordination Games,016715ae4e93b56d71c2ce296488a1ff,http://arxiv.org/abs/1107.4537v4 14409," Logit Dynamics [Blume, Games and Economic Behavior, 1993] are randomized best response dynamics for strategic games: at every time step a player is selected uniformly at random and she chooses a new strategy according to a probability distribution biased toward strategies promising higher payoffs. This process defines an ergodic Markov chain, over the set of strategy profiles of the game, whose unique stationary distribution is the long-term equilibrium concept for the game. However, when the mixing time of the chain is large (e.g., exponential in the number of players), the stationary distribution loses its appeal as equilibrium concept, and the transient phase of the Markov chain becomes important. It can happen that the chain is ""metastable"", i.e., on a time-scale shorter than the mixing time, it stays close to some probability distribution over the state space, while in a time-scale multiple of the mixing time it jumps from one distribution to another. In this paper we give a quantitative definition of ""metastable probability distributions"" for a Markov chain and we study the metastability of the logit dynamics for some classes of coordination games. We first consider a pure $n$-player coordination game that highlights the distinctive features of our metastability notion based on distributions. Then, we study coordination games on the clique without a risk-dominant strategy (which are equivalent to the well-known Glauber dynamics for the Curie-Weiss model) and coordination games on a ring (both with and without risk-dominant strategy). ",francesco pasquale,,2011.0,,arXiv,Auletta2011,True,,arXiv,Not available,Metastability of Logit Dynamics for Coordination Games,016715ae4e93b56d71c2ce296488a1ff,http://arxiv.org/abs/1107.4537v4 14410," Logit Dynamics [Blume, Games and Economic Behavior, 1993] are randomized best response dynamics for strategic games: at every time step a player is selected uniformly at random and she chooses a new strategy according to a probability distribution biased toward strategies promising higher payoffs. This process defines an ergodic Markov chain, over the set of strategy profiles of the game, whose unique stationary distribution is the long-term equilibrium concept for the game. However, when the mixing time of the chain is large (e.g., exponential in the number of players), the stationary distribution loses its appeal as equilibrium concept, and the transient phase of the Markov chain becomes important. It can happen that the chain is ""metastable"", i.e., on a time-scale shorter than the mixing time, it stays close to some probability distribution over the state space, while in a time-scale multiple of the mixing time it jumps from one distribution to another. In this paper we give a quantitative definition of ""metastable probability distributions"" for a Markov chain and we study the metastability of the logit dynamics for some classes of coordination games. We first consider a pure $n$-player coordination game that highlights the distinctive features of our metastability notion based on distributions. Then, we study coordination games on the clique without a risk-dominant strategy (which are equivalent to the well-known Glauber dynamics for the Curie-Weiss model) and coordination games on a ring (both with and without risk-dominant strategy). ",giuseppe persiano,,2011.0,,arXiv,Auletta2011,True,,arXiv,Not available,Metastability of Logit Dynamics for Coordination Games,016715ae4e93b56d71c2ce296488a1ff,http://arxiv.org/abs/1107.4537v4 14411," We consider the problem of distributed convergence to efficient outcomes in coordination games through dynamics based on aspiration learning. Under aspiration learning, a player continues to play an action as long as the rewards received exceed a specified aspiration level. Here, the aspiration level is a fading memory average of past rewards, and these levels also are subject to occasional random perturbations. A player becomes dissatisfied whenever a received reward is less than the aspiration level, in which case the player experiments with a probability proportional to the degree of dissatisfaction. Our first contribution is the characterization of the asymptotic behavior of the induced Markov chain of the iterated process in terms of an equivalent finite-state Markov chain. We then characterize explicitly the behavior of the proposed aspiration learning in a generalized version of coordination games, examples of which include network formation and common-pool games. In particular, we show that in generic coordination games the frequency at which an efficient action profile is played can be made arbitrarily large. Although convergence to efficient outcomes is desirable, in several coordination games, such as common-pool games, attainability of fair outcomes, i.e., sequences of plays at which players experience highly rewarding returns with the same frequency, might also be of special interest. To this end, we demonstrate through analysis and simulations that aspiration learning also establishes fair outcomes in all symmetric coordination games, including common-pool games. ",georgios chasparis,,2011.0,,arXiv,Chasparis2011,True,,arXiv,Not available,Aspiration Learning in Coordination Games,505945dc87c9d6a9669887aa9da1b345,http://arxiv.org/abs/1110.4412v1 14412," We consider the problem of distributed convergence to efficient outcomes in coordination games through dynamics based on aspiration learning. Under aspiration learning, a player continues to play an action as long as the rewards received exceed a specified aspiration level. Here, the aspiration level is a fading memory average of past rewards, and these levels also are subject to occasional random perturbations. A player becomes dissatisfied whenever a received reward is less than the aspiration level, in which case the player experiments with a probability proportional to the degree of dissatisfaction. Our first contribution is the characterization of the asymptotic behavior of the induced Markov chain of the iterated process in terms of an equivalent finite-state Markov chain. We then characterize explicitly the behavior of the proposed aspiration learning in a generalized version of coordination games, examples of which include network formation and common-pool games. In particular, we show that in generic coordination games the frequency at which an efficient action profile is played can be made arbitrarily large. Although convergence to efficient outcomes is desirable, in several coordination games, such as common-pool games, attainability of fair outcomes, i.e., sequences of plays at which players experience highly rewarding returns with the same frequency, might also be of special interest. To this end, we demonstrate through analysis and simulations that aspiration learning also establishes fair outcomes in all symmetric coordination games, including common-pool games. ",ari arapostathis,,2011.0,,arXiv,Chasparis2011,True,,arXiv,Not available,Aspiration Learning in Coordination Games,505945dc87c9d6a9669887aa9da1b345,http://arxiv.org/abs/1110.4412v1 14413," We consider the problem of distributed convergence to efficient outcomes in coordination games through dynamics based on aspiration learning. Under aspiration learning, a player continues to play an action as long as the rewards received exceed a specified aspiration level. Here, the aspiration level is a fading memory average of past rewards, and these levels also are subject to occasional random perturbations. A player becomes dissatisfied whenever a received reward is less than the aspiration level, in which case the player experiments with a probability proportional to the degree of dissatisfaction. Our first contribution is the characterization of the asymptotic behavior of the induced Markov chain of the iterated process in terms of an equivalent finite-state Markov chain. We then characterize explicitly the behavior of the proposed aspiration learning in a generalized version of coordination games, examples of which include network formation and common-pool games. In particular, we show that in generic coordination games the frequency at which an efficient action profile is played can be made arbitrarily large. Although convergence to efficient outcomes is desirable, in several coordination games, such as common-pool games, attainability of fair outcomes, i.e., sequences of plays at which players experience highly rewarding returns with the same frequency, might also be of special interest. To this end, we demonstrate through analysis and simulations that aspiration learning also establishes fair outcomes in all symmetric coordination games, including common-pool games. ",jeff shamma,,2011.0,,arXiv,Chasparis2011,True,,arXiv,Not available,Aspiration Learning in Coordination Games,505945dc87c9d6a9669887aa9da1b345,http://arxiv.org/abs/1110.4412v1 14414," We consider a general class of Bayesian Games where each players utility depends on his type (possibly multidimensional) and on the strategy profile and where players' types are distributed independently. We show that if their full information version for any fixed instance of the type profile is a smooth game then the Price of Anarchy bound implied by the smoothness property, carries over to the Bayes-Nash Price of Anarchy. We show how some proofs from the literature (item bidding auctions, greedy auctions) can be cast as smoothness proofs or be simplified using smoothness. For first price item bidding with fractionally subadditive bidders we actually manage to improve by much the existing result \cite{Hassidim2011a} from 4 to $\frac{e}{e-1}\approx 1.58$. This also shows a very interesting separation between first and second price item bidding since second price item bidding has PoA at least 2 even under complete information. For a larger class of Bayesian Games where the strategy space of a player also changes with his type we are able to show that a slightly stronger definition of smoothness also implies a Bayes-Nash PoA bound. We show how weighted congestion games actually satisfy this stronger definition of smoothness. This allows us to show that the inefficiency bounds of weighted congestion games known in the literature carry over to incomplete versions where the weights of the players are private information. We also show how an incomplete version of a natural class of monotone valid utility games, called effort market games are universally $(1,1)$-smooth. Hence, we show that incomplete versions of effort market games where the abilities of the players and their budgets are private information has Bayes-Nash PoA at most 2. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Games and the Smoothness Framework,700362cb9ca621778a3fbe870ce57db6,http://arxiv.org/abs/1203.5155v1 14415," We consider two classes of constrained finite state-action stochastic games. First, we consider a two player nonzero sum single controller constrained stochastic game with both average and discounted cost criterion. We consider the same type of constraints as in [1], i.e., player 1 has subscription based constraints and player 2, who controls the transition probabilities, has realization based constraints which can also depend on the strategies of player 1. Next, we consider a N -player nonzero sum constrained stochastic game with independent state processes where each player has average cost criterion as discussed in [2]. We show that the stationary Nash equilibria of both classes of constrained games, which exists under strong Slater and irreducibility conditions [3], [2], has one to one correspondence with global minima of certain mathematical programs. In the single controller game if the constraints of player 2 do not depend on the strategies of the player 1, then the mathematical program reduces to the non-convex quadratic program. In two player independent state processes stochastic game if the constraints of a player do not depend on the strategies of another player, then the mathematical program reduces to a non-convex quadratic program. Computational algorithms for finding global minima of non-convex quadratic program exist [4], [5] and hence, one can compute Nash equilibria of these constrained stochastic games. Our results generalize some existing results for zero sum games [1], [6], [7]. ",vikas singh,,2012.0,,arXiv,Singh2012,True,,arXiv,Not available,"A mathematical programming based characterization of Nash equilibria of some constrained stochastic games",16c470a025e837cfc19ccf53e9cc331a,http://arxiv.org/abs/1206.1672v1 14416," We consider two classes of constrained finite state-action stochastic games. First, we consider a two player nonzero sum single controller constrained stochastic game with both average and discounted cost criterion. We consider the same type of constraints as in [1], i.e., player 1 has subscription based constraints and player 2, who controls the transition probabilities, has realization based constraints which can also depend on the strategies of player 1. Next, we consider a N -player nonzero sum constrained stochastic game with independent state processes where each player has average cost criterion as discussed in [2]. We show that the stationary Nash equilibria of both classes of constrained games, which exists under strong Slater and irreducibility conditions [3], [2], has one to one correspondence with global minima of certain mathematical programs. In the single controller game if the constraints of player 2 do not depend on the strategies of the player 1, then the mathematical program reduces to the non-convex quadratic program. In two player independent state processes stochastic game if the constraints of a player do not depend on the strategies of another player, then the mathematical program reduces to a non-convex quadratic program. Computational algorithms for finding global minima of non-convex quadratic program exist [4], [5] and hence, one can compute Nash equilibria of these constrained stochastic games. Our results generalize some existing results for zero sum games [1], [6], [7]. ",n. hemachandra,,2012.0,,arXiv,Singh2012,True,,arXiv,Not available,"A mathematical programming based characterization of Nash equilibria of some constrained stochastic games",16c470a025e837cfc19ccf53e9cc331a,http://arxiv.org/abs/1206.1672v1 14417," The AB game is a two-player game, where the codemaker has to choose a secret code and the codebreaker has to guess it in as few questions as possible. It is a variant of the famous Mastermind game, with the only difference that all pegs in both, the secret and the questions must have distinct colors. In this work, we consider the Generalized AB game, where for given arbitrary numbers $p$, $c$ with $p \le c$ the secret code consists of $p$ pegs each having one of $c$ colors and the answer consists only of a number of black and white pegs. There the number of black pegs equals the number of pegs matching in the corresponding question and the secret in position and color, and the number of white pegs equals the additional number of pegs matching in the corresponding question and the secret only in color. We consider also a variant of the Generalized AB game, where the information of white pegs is omitted. This variant is called Generalized Black-peg AB game. Let $\ab(p,c)$ and $\abb(p,c)$ be the worst case number of questions for Generalized AB game and Generalized Black-peg AB game, respectively. Combining a computer program with theoretical considerations, we confirm known exact values of $\ab(2,c)$ and $\ab(3,c)$ and prove tight bounds for $\ab(4,c)$. Furthermore, we present exact values for $\abb(2,c)$ and $\abb(3,c)$ and tight bounds for $\abb(4,c)$. ",gerold jager,,2013.0,10.1016/j.dam.2014.10.032,"Discrete Applied Mathematics 184 (2015), pp. 20-31",Jäger2013,True,,arXiv,Not available,"The Worst Case Number of Questions in Generalized AB Game with and without White-peg Answers",586d06d0e3786bd7ff86f7b7eab3d03f,http://arxiv.org/abs/1306.1713v1 14418," We consider structural and algorithmic questions related to the Nash dynamics of weighted congestion games. In weighted congestion games with linear latency functions, the existence of (pure Nash) equilibria is guaranteed by potential function arguments. Unfortunately, this proof of existence is inefficient and computing equilibria is such games is a {\sf PLS}-hard problem. The situation gets worse when superlinear latency functions come into play; in this case, the Nash dynamics of the game may contain cycles and equilibria may not even exist. Given these obstacles, we consider approximate equilibria as alternative solution concepts. Do such equilibria exist? And if so, can we compute them efficiently? We provide positive answers to both questions for weighted congestion games with polynomial latency functions by exploiting an ""approximation"" of such games by a new class of potential games that we call $\Psi$-games. This allows us to show that these games have $d!$-approximate equilibria, where $d$ is the maximum degree of the latency functions. Our main technical contribution is an efficient algorithm for computing O(1)-approximate equilibria when $d$ is a constant. For games with linear latency functions, the approximation guarantee is $\frac{3+\sqrt{5}}{2}+O(\gamma)$ for arbitrarily small $\gamma>0$; for latency functions with maximum degree $d\geq 2$, it is $d^{2d+o(d)}$. The running time is polynomial in the number of bits in the representation of the game and $1/\gamma$. As a byproduct of our techniques, we also show the following structural statement for weighted congestion games with polynomial latency functions of maximum degree $d\geq 2$: polynomially-long sequences of best-response moves from any initial state to a $d^{O(d^2)}$-approximate equilibrium exist and can be efficiently identified in such games as long as $d$ is constant. ",nick gravin,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure",ebd6d002297b833c7258e50d3bf71630,http://arxiv.org/abs/1107.2248v2 14419," The AB game is a two-player game, where the codemaker has to choose a secret code and the codebreaker has to guess it in as few questions as possible. It is a variant of the famous Mastermind game, with the only difference that all pegs in both, the secret and the questions must have distinct colors. In this work, we consider the Generalized AB game, where for given arbitrary numbers $p$, $c$ with $p \le c$ the secret code consists of $p$ pegs each having one of $c$ colors and the answer consists only of a number of black and white pegs. There the number of black pegs equals the number of pegs matching in the corresponding question and the secret in position and color, and the number of white pegs equals the additional number of pegs matching in the corresponding question and the secret only in color. We consider also a variant of the Generalized AB game, where the information of white pegs is omitted. This variant is called Generalized Black-peg AB game. Let $\ab(p,c)$ and $\abb(p,c)$ be the worst case number of questions for Generalized AB game and Generalized Black-peg AB game, respectively. Combining a computer program with theoretical considerations, we confirm known exact values of $\ab(2,c)$ and $\ab(3,c)$ and prove tight bounds for $\ab(4,c)$. Furthermore, we present exact values for $\abb(2,c)$ and $\abb(3,c)$ and tight bounds for $\abb(4,c)$. ",marcin peczarski,,2013.0,10.1016/j.dam.2014.10.032,"Discrete Applied Mathematics 184 (2015), pp. 20-31",Jäger2013,True,,arXiv,Not available,"The Worst Case Number of Questions in Generalized AB Game with and without White-peg Answers",586d06d0e3786bd7ff86f7b7eab3d03f,http://arxiv.org/abs/1306.1713v1 14420," We consider games of strategic substitutes and strategic complements on networks. We introduce two different evolutionary dynamics in order to refine their multiplicity of equilibria, and we analyse the system through a mean field approach. We find that for the best-shot game, taken as a model for substitutes, a replicator-like dynamics does not lead to Nash equilibria, whereas it leads to unique equilibria (full cooperation or full defection, depending on the initial condition and the game parameter) for complements, represented by a coordination game. On the other hand, when the dynamics becomes more cognitively demanding in the form of a best response evolution, predictions are always Nash equilibria (at least when individuals are fully rational): For the best-shot game we find equilibria with a definite value of the fraction of contributors, whereas for the coordination game symmetric equilibria arise only for low or high initial fractions of cooperators. We also extend our study by considering complex heterogeneous topologies, and show that the nature of the selected equilibria does not change for the best-shot game. However for coordination games we reveal an important difference, namely that on infinitely large scale-free networks cooperation arises for any value of the incentive to cooperate. ",giulio cimini,,2014.0,10.1155/2017/7259032,Complexity 2017:7259032 (2017),Cimini2014,True,,arXiv,Not available,"Evolutionary network games: equilibria from imitation and best-response dynamics",02f2f9701e8a61e6aeff5d9bebd91b43,http://arxiv.org/abs/1403.1131v3 14421," Facility location games have been a topic of major interest in economics, operations research and computer science, starting from the seminal work by Hotelling. In the classical pure location Hotelling game businesses compete for maximizing customer attraction by strategically locating their facilities, assuming no price competition, while customers are attracted to their closest facilities. Surprisingly, very little rigorous work has been presented on multi-unit facility location games, where the classical pure location Hotelling games are extended to contexts where each player is to locate several facilities. In this paper we present two major contributions to the study of multi-unit pure location Hotelling games. In the first part of this paper we deal with the two-player multi-unit setting, and fully characterize its equilibria. In the second part of this paper we deal with multi-unit facility location games, with $N\geq 3$ players; our main result in this part is the full characterization of the settings where pure strategy equilibria exist. Our results also extend classical results on necessary and sufficient conditions for a strategy profile to be in equilibrium in a pure location (single-unit) Hotelling game to multi-unit pure location games. ",omer ben-porat,,2016.0,,arXiv,Ben-Porat2016,True,,arXiv,Not available,Multi-Unit Facility Location Games,2f523b63741ed8e66de265fb26b73cde,http://arxiv.org/abs/1602.03655v4 14422," Facility location games have been a topic of major interest in economics, operations research and computer science, starting from the seminal work by Hotelling. In the classical pure location Hotelling game businesses compete for maximizing customer attraction by strategically locating their facilities, assuming no price competition, while customers are attracted to their closest facilities. Surprisingly, very little rigorous work has been presented on multi-unit facility location games, where the classical pure location Hotelling games are extended to contexts where each player is to locate several facilities. In this paper we present two major contributions to the study of multi-unit pure location Hotelling games. In the first part of this paper we deal with the two-player multi-unit setting, and fully characterize its equilibria. In the second part of this paper we deal with multi-unit facility location games, with $N\geq 3$ players; our main result in this part is the full characterization of the settings where pure strategy equilibria exist. Our results also extend classical results on necessary and sufficient conditions for a strategy profile to be in equilibrium in a pure location (single-unit) Hotelling game to multi-unit pure location games. ",moshe tennenholtz,,2016.0,,arXiv,Ben-Porat2016,True,,arXiv,Not available,Multi-Unit Facility Location Games,2f523b63741ed8e66de265fb26b73cde,http://arxiv.org/abs/1602.03655v4 14423," With deeper study of the Game Theory, some conditions of Prisoner's Dilemma is no longer suitable of games in real life. So we try to develop a new model-Villager's Dilemma which has more realistic conditions to stimulate the process of game. It is emphasize that Prisoner's Dilemma is an exception which is lack of universality and the importance of rules in the game. And it puts forward that to let the rule maker take part in the game and specifies game players can stop the game as they like. This essay describes the basic model, the villager's dilemma (VD) and put some extended use of it, and points out the importance of rules and the effect it has on the result of the game. It briefly describes the disadvantage of Prisoner's Dilemma and advantage Villager's Dilemma has. It summarizes the premise and scope of application of Villager's Dilemma, and provides theory foundation for making rules for game and forecast of the future of the game. ",beihang he,,2009.0,,arXiv,He2009,True,,arXiv,Not available,Villager's dilemma,cb19ba3bef36e36f0e50e080e61fc157,http://arxiv.org/abs/0903.0126v1 14424," The classical, complete-information two-player games assume that the problem data (in particular the payoff matrix) is known exactly by both players. In a now famous result, Nash has shown that any such game has an equilibrium in mixed strategies. This result was later extended to a class of incomplete-information two-player games by Harsanyi, who assumed that the payoff matrix is not known exactly but rather represents a random variable that is governed by a probability distribution known to both players. In 2006, Bertsimas and Aghassi proposed a new class of distribution-free two-player games where the payoff matrix is only known to belong to a given uncertainty set. This model relaxes the distributional assumptions of Harsanyi's Bayesian games, and it gives rise to an alternative distribution-free equilibrium concept. In this thesis we present a new model of incomplete information games without private information in which the players use a distributionally robust optimization approach to cope with the payoff uncertainty. With some specific restrictions, we show that our ""Distributionally Robust Game"" constitutes a true generalization of the three aforementioned finite games (Nash games, Bayesian Games and Robust Games). Subsequently, we prove that the set of equilibria of an arbitrary distributionally robust game with specified ambiguity set can be computed as the component-wise projection of the solution set of a multi-linear system of equations and inequalities. Finally, we demonstrate the applicability of our new model of games and highlight its importance. ",nicolas loizou,,2015.0,,arXiv,Loizou2015,True,,arXiv,Not available,Distributionally Robust Game Theory,d3a69424b0a54dc4cdefa6674a6f2af0,http://arxiv.org/abs/1512.03253v1 14425," Effect of replacing the classical game object with a quantum object is analyzed. We find this replacement requires a throughout reformation of the framework of Game Theory. If we use density matrix to represent strategy state of players, they are full-structured density matrices with off-diagonal elements for the new games, while reduced diagonal density matrix will be enough for the traditional games on classical objects. In such formalism, the payoff function of every player becomes Hermitian Operator acting on the density matrix. Therefore, the new game looks really like Quantum Mechanics while the traditional game becomes Classical Mechanics. ",jinshan wu,,2005.0,,arXiv,Wu2005,True,,arXiv,Not available,Theory of Games on Quantum Objects,d6afa2fd31991f1741dac56546792477,http://arxiv.org/abs/quant-ph/0503094v2 14426," Coordination and cooperation are among the most important issues of game theory. Recently, the attention turned to game theory on graphs and social networks. Encouraged by interesting results obtained in quantum evolutionary game analysis, we study cooperative Parrondo's games in a quantum setup. The game is modeled using multidimensional quantum random walks with biased coins. We use the GHZ and W entangled states as the initial state of the coins. Our analysis shows than an apparent paradox in cooperative quantum games and some interesting phenomena can be observed. ",lukasz pawela,,2012.0,10.1016/j.physd.2013.04.010,arXiv,Pawela2012,True,,arXiv,Not available,Cooperative quantum Parrondo's games,47a27d79ed320baf2aa266f4c7166a1a,http://arxiv.org/abs/1207.6954v2 14427," Coordination and cooperation are among the most important issues of game theory. Recently, the attention turned to game theory on graphs and social networks. Encouraged by interesting results obtained in quantum evolutionary game analysis, we study cooperative Parrondo's games in a quantum setup. The game is modeled using multidimensional quantum random walks with biased coins. We use the GHZ and W entangled states as the initial state of the coins. Our analysis shows than an apparent paradox in cooperative quantum games and some interesting phenomena can be observed. ",jan sladkowski,,2012.0,10.1016/j.physd.2013.04.010,arXiv,Pawela2012,True,,arXiv,Not available,Cooperative quantum Parrondo's games,47a27d79ed320baf2aa266f4c7166a1a,http://arxiv.org/abs/1207.6954v2 14428," Much progress has been made in misere game theory using the technique of restricted misere play, where games can be considered equivalent inside a restricted set of games without being equal in general. This paper provides a survey of recent results in this area, including two particularly interesting properties of restricted misere games: (1) a game can have an additive inverse that is not its negative, and (2) a position can be reversible through an end (a game with Left but not Right options, or vice versa). These properties are not possible in normal play and general misere play, respectively. Related open problems are discussed. ",rebecca milley,,2016.0,,arXiv,Milley2016,True,,arXiv,Not available,A survey of partizan misere game theory,ae7e788eea783fb666d7b97e53dba85c,http://arxiv.org/abs/1606.07362v1 14429," We consider structural and algorithmic questions related to the Nash dynamics of weighted congestion games. In weighted congestion games with linear latency functions, the existence of (pure Nash) equilibria is guaranteed by potential function arguments. Unfortunately, this proof of existence is inefficient and computing equilibria is such games is a {\sf PLS}-hard problem. The situation gets worse when superlinear latency functions come into play; in this case, the Nash dynamics of the game may contain cycles and equilibria may not even exist. Given these obstacles, we consider approximate equilibria as alternative solution concepts. Do such equilibria exist? And if so, can we compute them efficiently? We provide positive answers to both questions for weighted congestion games with polynomial latency functions by exploiting an ""approximation"" of such games by a new class of potential games that we call $\Psi$-games. This allows us to show that these games have $d!$-approximate equilibria, where $d$ is the maximum degree of the latency functions. Our main technical contribution is an efficient algorithm for computing O(1)-approximate equilibria when $d$ is a constant. For games with linear latency functions, the approximation guarantee is $\frac{3+\sqrt{5}}{2}+O(\gamma)$ for arbitrarily small $\gamma>0$; for latency functions with maximum degree $d\geq 2$, it is $d^{2d+o(d)}$. The running time is polynomial in the number of bits in the representation of the game and $1/\gamma$. As a byproduct of our techniques, we also show the following structural statement for weighted congestion games with polynomial latency functions of maximum degree $d\geq 2$: polynomially-long sequences of best-response moves from any initial state to a $d^{O(d^2)}$-approximate equilibrium exist and can be efficiently identified in such games as long as $d$ is constant. ",alexander skopalik,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure",ebd6d002297b833c7258e50d3bf71630,http://arxiv.org/abs/1107.2248v2 14430," Much progress has been made in misere game theory using the technique of restricted misere play, where games can be considered equivalent inside a restricted set of games without being equal in general. This paper provides a survey of recent results in this area, including two particularly interesting properties of restricted misere games: (1) a game can have an additive inverse that is not its negative, and (2) a position can be reversible through an end (a game with Left but not Right options, or vice versa). These properties are not possible in normal play and general misere play, respectively. Related open problems are discussed. ",gabriel renault,,2016.0,,arXiv,Milley2016,True,,arXiv,Not available,A survey of partizan misere game theory,ae7e788eea783fb666d7b97e53dba85c,http://arxiv.org/abs/1606.07362v1 14431," Cooperative interval game is a cooperative game in which every coalition gets assigned some closed real interval. This models uncertainty about how much the members of a coalition get for cooperating together. In this paper we study convexity, core and the Shapley value of games with interval uncertainty. Our motivation to do so is twofold. First, we want to capture which properties are preserved when we generalize concepts from classical cooperative game theory to interval games. Second, since these generalizations can be done in different ways, mainly with regard to the resulting level of uncertainty, we try to compare them and show their relation to each other. ",jan bok,,2018.0,,arXiv,Bok2018,True,,arXiv,Not available,On convexity and solution concepts in cooperative interval games,904a9e4be7a71c0c208a556c3b809d0d,http://arxiv.org/abs/1811.04063v1 14432," Quantum games have proposed a new point of view for the solution of the classical problems and dilemmas in game theory. Certain quantization relationships can be proposed with the objective that a game can be generalized into a quantum domain where the linear superposition of actions is allowed. This quantization let us describe and solution problems originated by conflicting or cooperative behaviors among the members of a system from the point of view of quantum mechanical interactions. This leads us to interesting aspects which only can be observed through the quantization of a game like the possibility of the entanglement between players, the definition of a socioeconomical temperature in a system, the collective welfare principle,the analysis of a game through elements of quantum information theory and the globalization process. The relationships between quantum mechanics and game theory are also studied and its shown how although both systems analyzed are described through two theories apparently different (quantum mechanics and game theory) both are analogous and thus exactly equivalents. ",esteban hidalgo,,2008.0,,arXiv,Hidalgo2008,True,,arXiv,Not available,"Quantum Games and the Relationships between Quantum Mechanics and Game Theory",b60e01ca8da576229c1d7d4bc83f100d,http://arxiv.org/abs/0803.0292v2 14433," The Shahshahani geometry of evolutionary game theory is realized as the information geometry of the simplex, deriving from the Fisher information metric of the manifold of categorical probability distributions. Some essential concepts in evolutionary game theory are realized information-theoretically. Results are extended to the Lotka-Volterra equation and to multiple population systems. ",marc harper,,2009.0,,arXiv,Harper2009,True,,arXiv,Not available,Information Geometry and Evolutionary Game Theory,283f677f76b57862a6820d6b54f2862c,http://arxiv.org/abs/0911.1383v1 14434," Except for special classes of games, there is no systematic framework for analyzing the dynamical properties of multi-agent strategic interactions. Potential games are one such special but restrictive class of games that allow for tractable dynamic analysis. Intuitively, games that are ""close"" to a potential game should share similar properties. In this paper, we formalize and develop this idea by quantifying to what extent the dynamic features of potential games extend to ""near-potential"" games. We study convergence of three commonly studied classes of adaptive dynamics: discrete-time better/best response, logit response, and discrete-time fictitious play dynamics. For better/best response dynamics, we focus on the evolution of the sequence of pure strategy profiles and show that this sequence converges to a (pure) approximate equilibrium set, whose size is a function of the ""distance"" from a close potential game. We then study logit response dynamics and provide a characterization of the stationary distribution of this update rule in terms of the distance of the game from a close potential game and the corresponding potential function. We further show that the stochastically stable strategy profiles are pure approximate equilibria. Finally, we turn attention to fictitious play, and establish that the sequence of empirical frequencies of player actions converges to a neighborhood of (mixed) equilibria of the game, where the size of the neighborhood increases with distance of the game to a potential game. Thus, our results suggest that games that are close to a potential game inherit the dynamical properties of potential games. Since a close potential game to a given game can be found by solving a convex optimization problem, our approach also provides a systematic framework for studying convergence behavior of adaptive learning dynamics in arbitrary finite strategic form games. ",ozan candogan,,2011.0,,arXiv,Candogan2011,True,,arXiv,Not available,Dynamics in Near-Potential Games,05e5a82bf509faa6b9596105d831a46f,http://arxiv.org/abs/1107.4386v1 14435," Except for special classes of games, there is no systematic framework for analyzing the dynamical properties of multi-agent strategic interactions. Potential games are one such special but restrictive class of games that allow for tractable dynamic analysis. Intuitively, games that are ""close"" to a potential game should share similar properties. In this paper, we formalize and develop this idea by quantifying to what extent the dynamic features of potential games extend to ""near-potential"" games. We study convergence of three commonly studied classes of adaptive dynamics: discrete-time better/best response, logit response, and discrete-time fictitious play dynamics. For better/best response dynamics, we focus on the evolution of the sequence of pure strategy profiles and show that this sequence converges to a (pure) approximate equilibrium set, whose size is a function of the ""distance"" from a close potential game. We then study logit response dynamics and provide a characterization of the stationary distribution of this update rule in terms of the distance of the game from a close potential game and the corresponding potential function. We further show that the stochastically stable strategy profiles are pure approximate equilibria. Finally, we turn attention to fictitious play, and establish that the sequence of empirical frequencies of player actions converges to a neighborhood of (mixed) equilibria of the game, where the size of the neighborhood increases with distance of the game to a potential game. Thus, our results suggest that games that are close to a potential game inherit the dynamical properties of potential games. Since a close potential game to a given game can be found by solving a convex optimization problem, our approach also provides a systematic framework for studying convergence behavior of adaptive learning dynamics in arbitrary finite strategic form games. ",asuman ozdaglar,,2011.0,,arXiv,Candogan2011,True,,arXiv,Not available,Dynamics in Near-Potential Games,05e5a82bf509faa6b9596105d831a46f,http://arxiv.org/abs/1107.4386v1 14436," Except for special classes of games, there is no systematic framework for analyzing the dynamical properties of multi-agent strategic interactions. Potential games are one such special but restrictive class of games that allow for tractable dynamic analysis. Intuitively, games that are ""close"" to a potential game should share similar properties. In this paper, we formalize and develop this idea by quantifying to what extent the dynamic features of potential games extend to ""near-potential"" games. We study convergence of three commonly studied classes of adaptive dynamics: discrete-time better/best response, logit response, and discrete-time fictitious play dynamics. For better/best response dynamics, we focus on the evolution of the sequence of pure strategy profiles and show that this sequence converges to a (pure) approximate equilibrium set, whose size is a function of the ""distance"" from a close potential game. We then study logit response dynamics and provide a characterization of the stationary distribution of this update rule in terms of the distance of the game from a close potential game and the corresponding potential function. We further show that the stochastically stable strategy profiles are pure approximate equilibria. Finally, we turn attention to fictitious play, and establish that the sequence of empirical frequencies of player actions converges to a neighborhood of (mixed) equilibria of the game, where the size of the neighborhood increases with distance of the game to a potential game. Thus, our results suggest that games that are close to a potential game inherit the dynamical properties of potential games. Since a close potential game to a given game can be found by solving a convex optimization problem, our approach also provides a systematic framework for studying convergence behavior of adaptive learning dynamics in arbitrary finite strategic form games. ",pablo parrilo,,2011.0,,arXiv,Candogan2011,True,,arXiv,Not available,Dynamics in Near-Potential Games,05e5a82bf509faa6b9596105d831a46f,http://arxiv.org/abs/1107.4386v1 14437," We consider an application of the mathematical formalism of quantum mechanics (QM) outside physics, namely, to game theory. We present a simple game between macroscopic players, say Alice and Bob (or in a more complex form - Alice, Bob and Cecilia), which can be represented in the quantum-like (QL) way -- by using a complex probability amplitude (game's ``wave function'') and noncommutative operators. The crucial point is that games under consideration are so called extensive form games. Here the order of actions of players is important, such a game can be represented by the tree of actions. The QL probabilistic behavior of players is a consequence of incomplete information which is available to e.g. Bob about the previous action of Alice. In general one could not construct a classical probability space underlying a QL-game. This can happen even in a QL-game with two players. In a QL-game with three players Bell's inequality can be violated. The most natural probabilistic description is given by so called contextual probability theory completed by the frequency definition of probability. ",andrei khrennikov,,2007.0,10.1063/1.2752012,"J. Math. Phys., 48, 072107 (2007)",Khrennikov2007,True,,arXiv,Not available,Quantum-like Representation of Extensive Form Games: Wine Testing Game,2098f176ff2e0ceb2de629da4322feb4,http://arxiv.org/abs/0705.1260v1 14438," The notions of captured/lost vertices and dead edges in the Shannon game (Shannon switching game on nodes) are examined using graph theory. Simple methods are presented for identifying some dead edges and some captured sets of vertices, thus simplifying the (computationally hard) problem of analyzing the game. ",andrew steane,,2012.0,,arXiv,Steane2012,True,,arXiv,Not available,"Threat, support and dead edges in the Shannon game",5e2d2a670b3e0b189b2c690c88d28176,http://arxiv.org/abs/1210.7985v1 14439," If a game has a unique Nash equilibrium, then this equilibrium is arguably the solution of the game from the refinement's literature point of view. However, it might be that for almost all initial conditions, all strategies in the support of this equilibrium are eliminated by the replicator dynamics and the best-reply dynamics. ",yannick viossat,,2012.0,,arXiv,Viossat2012,True,,arXiv,Not available,Game Dynamics and Nash Equilibria,b1293dcc0148ff6e9f08433399e2f65a,http://arxiv.org/abs/1211.5329v1 14440," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",piotr gnacinski,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14441," In a transshipment game, supply chain agents cooperate to transship surplus products. This note studies the effect of size of transshipment coalitions on the optimal production/order quantities. It characterizes these quantities for transshipment games with identical newsvendors and normally distributed market demands. It also gives a closed form formula for equal allocation in their cores. ",behzad hezarkhani,,2013.0,,arXiv,Hezarkhani2013,True,,arXiv,Not available,On Transshipment Games with Identical Newsvendors,76f5702484b70e21c771b5e03a743f49,http://arxiv.org/abs/1303.5934v1 14442," In a transshipment game, supply chain agents cooperate to transship surplus products. This note studies the effect of size of transshipment coalitions on the optimal production/order quantities. It characterizes these quantities for transshipment games with identical newsvendors and normally distributed market demands. It also gives a closed form formula for equal allocation in their cores. ",wieslaw kubiak,,2013.0,,arXiv,Hezarkhani2013,True,,arXiv,Not available,On Transshipment Games with Identical Newsvendors,76f5702484b70e21c771b5e03a743f49,http://arxiv.org/abs/1303.5934v1 14443," In a transshipment game, supply chain agents cooperate to transship surplus products. This note studies the effect of size of transshipment coalitions on the optimal production/order quantities. It characterizes these quantities for transshipment games with identical newsvendors and normally distributed market demands. It also gives a closed form formula for equal allocation in their cores. ",bruce hartman,,2013.0,,arXiv,Hezarkhani2013,True,,arXiv,Not available,On Transshipment Games with Identical Newsvendors,76f5702484b70e21c771b5e03a743f49,http://arxiv.org/abs/1303.5934v1 14444," The game-theoretic version of Kolmogorov's strong law of large numbers says that Skeptic has a strategy forcing the statement of the law in a game of prediction involving Reality, Forecaster, and Skeptic. This note describes a simple matching strategy for Reality. ",vladimir vovk,,2013.0,,arXiv,Vovk2013,True,,arXiv,Not available,"Kolmogorov's strong law of large numbers in game-theoretic probability: Reality's side",d0a98b85fc53046820ef0cd2dae2fae5,http://arxiv.org/abs/1304.1074v1 14445," In a multi-objective game, each agent individually evaluates each overall action-profile on multiple objectives. I generalize the price of anarchy to multi-objective games and provide a polynomial-time algorithm to assess it. This work asserts that policies on tobacco promote a higher economic efficiency. ",anisse ismaili,,2015.0,,arXiv,Ismaili2015,True,,arXiv,Not available,Efficiency in Multi-objective Games,e6fd1a123ef35cecf6fbe981743ced4d,http://arxiv.org/abs/1506.04251v2 14446," We show that the following problem is EXP-complete: given a rational v and a two player, zero-sum Boolean game G determine whether the value of G is at least v. The proof is via a translation of the proof of the same result for Boolean circuit games in Feigenbaum et al. (1995). ",egor ianovski,,2014.0,,arXiv,Ianovski2014,True,,arXiv,Not available,DValue for Boolean games is EXP-complete,4af7a011499df0ac50279a38ffe133b4,http://arxiv.org/abs/1403.7428v1 14447," This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players. ",sascha kurz,,2016.0,,arXiv,Kurz2016,True,,arXiv,Not available,Dimension and codimension of simple games,d467fefa71b3541ac41c47df6c82eca5,http://arxiv.org/abs/1602.04328v1 14448," This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players. ",xavier molinero,,2016.0,,arXiv,Kurz2016,True,,arXiv,Not available,Dimension and codimension of simple games,d467fefa71b3541ac41c47df6c82eca5,http://arxiv.org/abs/1602.04328v1 14449," This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players. ",martin olsen,,2016.0,,arXiv,Kurz2016,True,,arXiv,Not available,Dimension and codimension of simple games,d467fefa71b3541ac41c47df6c82eca5,http://arxiv.org/abs/1602.04328v1 14450," This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players. ",maria serna,,2016.0,,arXiv,Kurz2016,True,,arXiv,Not available,Dimension and codimension of simple games,d467fefa71b3541ac41c47df6c82eca5,http://arxiv.org/abs/1602.04328v1 14451," The optimal pricing problem is a fundamental problem that arises in combinatorial auctions. Suppose that there is one seller who has indivisible items and multiple buyers who want to purchase a combination of the items. The seller wants to sell his items for the highest possible prices, and each buyer wants to maximize his utility (i.e., valuation minus payment) as long as his payment does not exceed his budget. The optimal pricing problem seeks a price of each item and an assignment of items to buyers such that every buyer achieves the maximum utility under the prices. The goal of the problem is to maximize the total payment from buyers. In this paper, we consider the case that the valuations are submodular. We show that the problem is computationally hard even if there exists only one buyer. Then we propose approximation algorithms for the unlimited budget case. We also extend the algorithm for the limited budget case when there exists one buyer and multiple buyers collaborate with each other. ",ken-ichi kawarabayashi,,2016.0,,arXiv,Maehara2016,True,,arXiv,Not available,Optimal Pricing for Submodular Valuations with Bounded Curvature,e4d17dcf5b3a2032ef314f88a682efed,http://arxiv.org/abs/1611.07605v1 14452," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",monika rosicka,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14453," In this paper we survey the computational time complexity of assorted simple stochastic game problems, and we give an overview of the best known algorithms associated with each problem. ",jonas dieckelmann,,2007.0,,arXiv,Dieckelmann2007,True,,arXiv,Not available,The Complexity of Simple Stochastic Games,5f77233edde34f7a2e207be406984325,http://arxiv.org/abs/0704.2779v1 14454," An population-centric analysis for a version of the p-beauty contest game is given for the two-player, finite population, and infinite population cases. Winning strategies are characterized in terms of iterative thinking relative to the population. To win the game one needs to iterate more times than the ambient population, but not too many more times depending on the population size and the value of p. ",marc harper,,2010.0,,arXiv,Harper2010,True,,arXiv,Not available,A Population-centric Approach to the Beauty Contest Game,f9ae761e10e1d135e2b8196cd6dd547b,http://arxiv.org/abs/1005.1311v2 14455," Exploiting the algebraic structure of the set of bimatrix games, a divide-and-conquer algorithm for finding Nash equilibria is proposed. The algorithm is fixed-parameter tractable with the size of the largest irreducible component of a game as parameter. An implementation of the algorithm is shown to yield a significant performance increase on inputs with small parameters. ",xiang jiang,,2012.0,,arXiv,Jiang2012,True,,arXiv,Not available,Efficient Decomposition of Bimatrix Games,1f311e62e7284192c1363f0b7b5b5895,http://arxiv.org/abs/1212.6355v1 14456," Exploiting the algebraic structure of the set of bimatrix games, a divide-and-conquer algorithm for finding Nash equilibria is proposed. The algorithm is fixed-parameter tractable with the size of the largest irreducible component of a game as parameter. An implementation of the algorithm is shown to yield a significant performance increase on inputs with small parameters. ",arno pauly,,2012.0,,arXiv,Jiang2012,True,,arXiv,Not available,Efficient Decomposition of Bimatrix Games,1f311e62e7284192c1363f0b7b5b5895,http://arxiv.org/abs/1212.6355v1 14457," We show that every universally truthful randomized mechanism for combinatorial auctions with submodular valuations that provides $m^{\frac 1 2 -\epsilon}$ approximation to the social welfare and uses value queries only must use exponentially many value queries, where $m$ is the number of items. In contrast, ignoring incentives there exist constant ratio approximation algorithms for this problem. Our approach is based on a novel \emph{direct hardness} approach and completely skips the notoriously hard characterization step. The characterization step was the main obstacle for proving impossibility results in algorithmic mechanism design so far. We demonstrate two additional applications of our new technique: (1) an impossibility result for universally-truthful polynomial time flexible combinatorial public projects and (2) an impossibility result for truthful-in-expectation mechanisms for exact combinatorial public projects. The latter is the first result that bounds the power of polynomial-time truthful in expectation mechanisms in any setting. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,"An Impossibility Result for Truthful Combinatorial Auctions with Submodular Valuations",7e9ecaa1f1f50026b1d7005550cc840e,http://arxiv.org/abs/1011.1830v1 14458," We study truthful auctions for secondary spectrum usage in wireless networks. In this scenario, n communication requests need to be allocated to k available channels that are subject to interference and noise. We present the first truthful mechanisms for secondary spectrum auctions with symmetric or submodular valuations. Our approach to model interference uses an edge-weighted conflict graph, and our algorithms provide asymptotically almost optimal approximation bounds for conflict graphs with a small inductive independence number rho << n. This approach covers a large variety of interference models such as, e.g., the protocol model or the recently popular physical model of interference. For unweighted conflict graphs and symmetric valuations we use LP-rounding to obtain $O(\rho)$-approximate mechanisms; for weighted conflict graphs we get a factor of O(rho (log n + log k)). For submodular users we combine the convex rounding framework of Dughmi et al [STOC 2011] with randomized meta-rounding to obtain O(rho)-approximate mechanisms for matroid-rank-sum valuations; for weighted conflict graphs we can fully drop the dependence on k to get O(rho log n). We conclude with promising initialresults for deterministically truthful mechanisms that allow approximation factors based on rho. ",martin hoefer,,2011.0,,arXiv,Hoefer2011,True,,arXiv,Not available,Secondary Spectrum Auctions for Symmetric and Submodular Bidders,c82911fff994966dad5c21372af49011,http://arxiv.org/abs/1110.5753v1 14459," We study truthful auctions for secondary spectrum usage in wireless networks. In this scenario, n communication requests need to be allocated to k available channels that are subject to interference and noise. We present the first truthful mechanisms for secondary spectrum auctions with symmetric or submodular valuations. Our approach to model interference uses an edge-weighted conflict graph, and our algorithms provide asymptotically almost optimal approximation bounds for conflict graphs with a small inductive independence number rho << n. This approach covers a large variety of interference models such as, e.g., the protocol model or the recently popular physical model of interference. For unweighted conflict graphs and symmetric valuations we use LP-rounding to obtain $O(\rho)$-approximate mechanisms; for weighted conflict graphs we get a factor of O(rho (log n + log k)). For submodular users we combine the convex rounding framework of Dughmi et al [STOC 2011] with randomized meta-rounding to obtain O(rho)-approximate mechanisms for matroid-rank-sum valuations; for weighted conflict graphs we can fully drop the dependence on k to get O(rho log n). We conclude with promising initialresults for deterministically truthful mechanisms that allow approximation factors based on rho. ",thomas kesselheim,,2011.0,,arXiv,Hoefer2011,True,,arXiv,Not available,Secondary Spectrum Auctions for Symmetric and Submodular Bidders,c82911fff994966dad5c21372af49011,http://arxiv.org/abs/1110.5753v1 14460," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",j. bredin,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 14461," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",q. duong,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 14462," In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a resource or a task, is bought and sold by multiple buyers and sellers that arrive and depart over time. Our algorithm, Chain, provides the first framework that allows a truthful dynamic double auction (DA) to be constructed from a truthful, single-period (i.e. static) double-auction rule. The pricing and matching method of the Chain construction is unique amongst dynamic-auction rules that adopt the same building block. We examine experimentally the allocative efficiency of Chain when instantiated on various single-period rules, including the canonical McAfee double-auction rule. For a baseline we also consider non-truthful double auctions populated with zero-intelligence plus""-style learning agents. Chain-based auctions perform well in comparison with other schemes, especially as arrival intensity falls and agent valuations become more volatile. ",d. parkes,,2011.0,10.1613/jair.2303,"Journal Of Artificial Intelligence Research, Volume 30, pages 133-179, 2007",Bredin2011,True,,arXiv,Not available,Chain: A Dynamic Double Auction Framework for Matching Patient Agents,aa6614d64c126bb7532be476682f709a,http://arxiv.org/abs/1111.0046v1 14463," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",ravishankar ramanathan,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14464," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",shahar dobzinski,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 14465," One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems. ",jan vondrak,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,The Computational Complexity of Truthfulness in Combinatorial Auctions,4770702fe893efdcab55bf35f66ea656,http://arxiv.org/abs/1202.2789v1 14466," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",balasubramanian sivan,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 14467," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",vasilis syrgkanis,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 14468," We obtain revenue guarantees for the simple pricing mechanism of a single posted price, in terms of a natural parameter of the distribution of buyers' valuations. Our revenue guarantee applies to the single item n buyers setting, with values drawn from an arbitrary joint distribution. Specifically, we show that a single price drawn from the distribution of the maximum valuation Vmax = max {V_1, V_2, ...,V_n} achieves a revenue of at least a 1/e fraction of the geometric expecation of Vmax. This generic bound is a measure of how revenue improves/degrades as a function of the concentration/spread of Vmax. We further show that in absence of buyers' valuation distributions, recruiting an additional set of identical bidders will yield a similar guarantee on revenue. Finally, our bound also gives a measure of the extent to which one can simultaneously approximate welfare and revenue in terms of the concentration/spread of Vmax. ",omer tamuz,,2012.0,10.1007/978-3-642-35311-6_42,"Internet and Network Economics, Lecture Notes in Computer Science, 2012, Volume 7695, pp 526-531",Sivan2012,True,,arXiv,Not available,Lower Bounds on Revenue of Approximately Optimal Auctions,4174b55a892a6d25b0b293f3c05e786b,http://arxiv.org/abs/1210.0275v1 14469," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",sha hua,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14470," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",xuejun zhuo,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14471," As cellular operators are suffering from a data explosion problem, and users are consequently experiencing poor data services, the introduction of femtocells offers a cost-effective way to mitigate this problem. Femtocells enable larger network capacity by increasing spatial reuse of the spectrum and shortening the distance to the users. Existing work has shown that open access femtocells, which allow unregistered macro users to connect, are efficient in reducing inter-cell interference and offloading traffic. However, a major obstacle constraining the potential capability of femtocells and open access is the lack of incentives for privately-owned femtocells to serve unregistered users. Hence in this paper, we propose a Vickrey-Clarke-Groves (VCG) auction based incentive framework for accessing such selfish femtocells. We consider two scenarios: One scenario involves a single macro user and another scenario has multiple macro users. We design auction schemes for both scenarios and show analytically that our schemes are truthful and have low computational complexity. Extensive simulations validate these properties and show huge performance improvement to the macro users. ",shivendra panwar,,2012.0,,arXiv,Hua2012,True,,arXiv,Not available,A Truthful Auction based Incentive Framework for Femtocell Access,f124c71617b2e35376d593cb894eb49e,http://arxiv.org/abs/1210.5012v2 14472," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",jian zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 14473," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",chuan wu,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 14474," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",karol horodecki,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14475," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",zongpeng li,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 14476," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",enrico gerding,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 14477," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",rajdeep dash,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 14478," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",andrew byde,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 14479," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",nicholas jennings,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 14480," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",mehryar mohri,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 14481," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",andres medina,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 14482," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",jacob abernethy,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14483," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",sebastien lahaie,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14484," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",matus telgarsky,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14485," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",michal horodecki,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14486," We define the class of ""simple recursive games"". A simple recursive game is defined as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving simple recursive games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem. ",daniel andersson,,2007.0,,arXiv,Andersson2007,True,,arXiv,Not available,Simple Recursive Games,252fd53d5bc030d7ecb7db8670c4c7c1,http://arxiv.org/abs/0711.1055v1 14487," We define the class of ""simple recursive games"". A simple recursive game is defined as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving simple recursive games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem. ",kristoffer hansen,,2007.0,,arXiv,Andersson2007,True,,arXiv,Not available,Simple Recursive Games,252fd53d5bc030d7ecb7db8670c4c7c1,http://arxiv.org/abs/0711.1055v1 14488," We define the class of ""simple recursive games"". A simple recursive game is defined as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving simple recursive games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem. ",peter miltersen,,2007.0,,arXiv,Andersson2007,True,,arXiv,Not available,Simple Recursive Games,252fd53d5bc030d7ecb7db8670c4c7c1,http://arxiv.org/abs/0711.1055v1 14489," We define the class of ""simple recursive games"". A simple recursive game is defined as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving simple recursive games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem. ",troels sorensen,,2007.0,,arXiv,Andersson2007,True,,arXiv,Not available,Simple Recursive Games,252fd53d5bc030d7ecb7db8670c4c7c1,http://arxiv.org/abs/0711.1055v1 14490," Stochastic games are an important class of problems that generalize Markov decision processes to game theoretic scenarios. We consider finite state two-player zero-sum stochastic games over an infinite time horizon with discounted rewards. The players are assumed to have infinite strategy spaces and the payoffs are assumed to be polynomials. In this paper we restrict our attention to a special class of games for which the single-controller assumption holds. It is shown that minimax equilibria and optimal strategies for such games may be obtained via semidefinite programming. ",parikshit shah,,2008.0,,arXiv,Shah2008,True,,arXiv,Not available,Polynomial stochastic games via sum of squares optimization,528401b80eb82a59a89a1c7430bb1c86,http://arxiv.org/abs/0806.2469v1 14491," Stochastic games are an important class of problems that generalize Markov decision processes to game theoretic scenarios. We consider finite state two-player zero-sum stochastic games over an infinite time horizon with discounted rewards. The players are assumed to have infinite strategy spaces and the payoffs are assumed to be polynomials. In this paper we restrict our attention to a special class of games for which the single-controller assumption holds. It is shown that minimax equilibria and optimal strategies for such games may be obtained via semidefinite programming. ",pablo parrilo,,2008.0,,arXiv,Shah2008,True,,arXiv,Not available,Polynomial stochastic games via sum of squares optimization,528401b80eb82a59a89a1c7430bb1c86,http://arxiv.org/abs/0806.2469v1 14492," We show that for many classes of symmetric two-player games, the simple decision rule ""imitate-the-best"" can hardly be beaten by any other decision rule. We provide necessary and sufficient conditions for imitation to be unbeatable and show that it can only be beaten by much in games that are of the rock-scissors-paper variety. Thus, in many interesting examples, like 2x2 games, Cournot duopoly, price competition, rent seeking, public goods games, common pool resource games, minimum effort coordination games, arms race, search, bargaining, etc., imitation cannot be beaten by much even by a very clever opponent. ",peter duersch,,2010.0,10.1016/j.geb.2012.05.002,arXiv,Duersch2010,True,,arXiv,Not available,Unbeatable Imitation,eda653fafec7365f3e293ec056eebeff,http://arxiv.org/abs/1003.4274v1 14493," We show that for many classes of symmetric two-player games, the simple decision rule ""imitate-the-best"" can hardly be beaten by any other decision rule. We provide necessary and sufficient conditions for imitation to be unbeatable and show that it can only be beaten by much in games that are of the rock-scissors-paper variety. Thus, in many interesting examples, like 2x2 games, Cournot duopoly, price competition, rent seeking, public goods games, common pool resource games, minimum effort coordination games, arms race, search, bargaining, etc., imitation cannot be beaten by much even by a very clever opponent. ",joerg oechssler,,2010.0,10.1016/j.geb.2012.05.002,arXiv,Duersch2010,True,,arXiv,Not available,Unbeatable Imitation,eda653fafec7365f3e293ec056eebeff,http://arxiv.org/abs/1003.4274v1 14494," We show that for many classes of symmetric two-player games, the simple decision rule ""imitate-the-best"" can hardly be beaten by any other decision rule. We provide necessary and sufficient conditions for imitation to be unbeatable and show that it can only be beaten by much in games that are of the rock-scissors-paper variety. Thus, in many interesting examples, like 2x2 games, Cournot duopoly, price competition, rent seeking, public goods games, common pool resource games, minimum effort coordination games, arms race, search, bargaining, etc., imitation cannot be beaten by much even by a very clever opponent. ",burkhard schipper,,2010.0,10.1016/j.geb.2012.05.002,arXiv,Duersch2010,True,,arXiv,Not available,Unbeatable Imitation,eda653fafec7365f3e293ec056eebeff,http://arxiv.org/abs/1003.4274v1 14495," We extend recent analyses of stochastic effects in game dynamical learning to cases of multi-player games, and to games defined on networked structures. By means of an expansion in the noise strength we consider the weak-noise limit, and present an analytical computation of spectral properties of fluctuations in multi-player public good games. This extends existing work on two-player games. In particular we show that coherent cycles may emerge driven by noise in the adaptation dynamics. These phenomena are not too dissimilar from cyclic strategy switching observed in experiments of behavioural game theory. ",alex bladon,,2011.0,10.1103/PhysRevE.84.041132,"Phys. Rev. E 84, 041132 (2011)",Bladon2011,True,,arXiv,Not available,Learning to play public good games,dee9647616b4e45461c06b478b0da072,http://arxiv.org/abs/1107.0878v1 14496," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",pawel horodecki,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14497," We extend recent analyses of stochastic effects in game dynamical learning to cases of multi-player games, and to games defined on networked structures. By means of an expansion in the noise strength we consider the weak-noise limit, and present an analytical computation of spectral properties of fluctuations in multi-player public good games. This extends existing work on two-player games. In particular we show that coherent cycles may emerge driven by noise in the adaptation dynamics. These phenomena are not too dissimilar from cyclic strategy switching observed in experiments of behavioural game theory. ",tobias galla,,2011.0,10.1103/PhysRevE.84.041132,"Phys. Rev. E 84, 041132 (2011)",Bladon2011,True,,arXiv,Not available,Learning to play public good games,dee9647616b4e45461c06b478b0da072,http://arxiv.org/abs/1107.0878v1 14498," This thesis will be discussing scoring play combinatorial games and looking at the general structure of these games under different operators. I will also be looking at the Sprague-Grundy values for scoring play impartial games, and demonstrating that there is an easily computable function that will solve a large range of octal games easily. I will also be demonstrating that my theory can readily be applied to the scoring play game of Go and can lead to a much greater understanding of the game. ",fraser stewart,,2012.0,,arXiv,Stewart2012,True,,arXiv,Not available,Scoring Play Combinatorial Games,50a7072e5fff05cf0f3f805d2988c1c2,http://arxiv.org/abs/1202.4652v1 14499," We continue the investigation of finite-duration variants of infinite-duration games by extending known results for games played on finite graphs to those played on infinite ones. In particular, we establish an equivalence between pushdown parity games and a finite-duration variant. This allows us to determine the winner of a pushdown parity game by solving a reachability game on a finite tree. ",wladimir fridman,,2012.0,10.4204/EPTCS.96.14,"EPTCS 96, 2012, pp. 183-196",Fridman2012,True,,arXiv,Not available,Playing Pushdown Parity Games in a Hurry,61dbb1019ff7376cbae00a00b5cbeaee,http://arxiv.org/abs/1210.2458v1 14500," We continue the investigation of finite-duration variants of infinite-duration games by extending known results for games played on finite graphs to those played on infinite ones. In particular, we establish an equivalence between pushdown parity games and a finite-duration variant. This allows us to determine the winner of a pushdown parity game by solving a reachability game on a finite tree. ",martin zimmermann,,2012.0,10.4204/EPTCS.96.14,"EPTCS 96, 2012, pp. 183-196",Fridman2012,True,,arXiv,Not available,Playing Pushdown Parity Games in a Hurry,61dbb1019ff7376cbae00a00b5cbeaee,http://arxiv.org/abs/1210.2458v1 14501," Iqbal and Toor [Phys. Rev. A {\bf 65}, 022306 (2002)] and [Commun. Theor. Phys. {\bf 42}, 335 (2004)] generalized the Marinatto-Weber quantum scheme for $2 \times 2$ games in order to study bimatrix games of $3 \times 3$ dimension, in particular the Rock-Paper-Scissors game. In our paper we show that Iqbal and Toor's generalization exhibits certain undesirable property that can considerably influence the game result. To support our argumentation, in the further part of the paper we construct the protocol corresponding to the MW concept for any finite bimatrix game that is free from the fault. ",piotr frackiewicz,,2013.0,10.5506/APhysPolB.44.29,Acta Physica Polonica B 44 (2013) 29,Frackiewicz2013,True,,arXiv,Not available,"A comment on the generalization of the Marinatto-Weber quantum game scheme",f0550444395b17bd6903feccf968a25d,http://arxiv.org/abs/1303.4019v1 14502," I introduce cooperative product games (CPGs), a cooperative game where every player has a weight, and the value of a coalition is the product of the weights of the players in the coalition. I only look at games where the weights are at least $2$. I show that no player in such a game can be a dummy. I show that the game is convex, and therefore always has a non-empty core. I provide a simple method for finding a payoff vector in the core. ",david rosales,,2014.0,,arXiv,Rosales2014,True,,arXiv,Not available,Cooperative Product Games,97986f8a73cd79e9d9d95f13992122f5,http://arxiv.org/abs/1401.8144v1 14503," In this paper we describe an approach to resolve strategic games in which players can assume different types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player's odds. To achieve that we use Markov games combined with hidden Markov model. We discuss a hypothetical example of a tennis game whose solution can be applied to any game with similar characteristics. ",mario benevides,,2014.0,10.4204/EPTCS.144.6,"EPTCS 144, 2014, pp. 73-84",Benevides2014,True,,arXiv,Not available,Using HMM in Strategic Games,8ed8890452bc9e82a6dd6653648ea5b0,http://arxiv.org/abs/1404.0086v1 14504," In this paper we describe an approach to resolve strategic games in which players can assume different types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player's odds. To achieve that we use Markov games combined with hidden Markov model. We discuss a hypothetical example of a tennis game whose solution can be applied to any game with similar characteristics. ",isaque lima,,2014.0,10.4204/EPTCS.144.6,"EPTCS 144, 2014, pp. 73-84",Benevides2014,True,,arXiv,Not available,Using HMM in Strategic Games,8ed8890452bc9e82a6dd6653648ea5b0,http://arxiv.org/abs/1404.0086v1 14505," In this paper we describe an approach to resolve strategic games in which players can assume different types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player's odds. To achieve that we use Markov games combined with hidden Markov model. We discuss a hypothetical example of a tennis game whose solution can be applied to any game with similar characteristics. ",rafael nader,,2014.0,10.4204/EPTCS.144.6,"EPTCS 144, 2014, pp. 73-84",Benevides2014,True,,arXiv,Not available,Using HMM in Strategic Games,8ed8890452bc9e82a6dd6653648ea5b0,http://arxiv.org/abs/1404.0086v1 14506," In this paper we describe an approach to resolve strategic games in which players can assume different types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player's odds. To achieve that we use Markov games combined with hidden Markov model. We discuss a hypothetical example of a tennis game whose solution can be applied to any game with similar characteristics. ",pedro rougemont,,2014.0,10.4204/EPTCS.144.6,"EPTCS 144, 2014, pp. 73-84",Benevides2014,True,,arXiv,Not available,Using HMM in Strategic Games,8ed8890452bc9e82a6dd6653648ea5b0,http://arxiv.org/abs/1404.0086v1 14507," We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph"" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lov\'{a}sz theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions. ",simone severini,,2015.0,,"New J. Phys. 18, 045020 (2016)",Gnaciński2015,True,,arXiv,Not available,"Linear game non-contextuality and Bell inequalities - a graph-theoretic approach",65b97dc0c3174a570454425d4f6b1527,http://arxiv.org/abs/1511.05415v1 14508," Robot game is a two-player vector addition game played on the integer lattice $\mathbb{Z}^n$. Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game. One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin. The problem is to decide whether or not Eve has a winning strategy. In this paper we prove undecidability of the robot game in dimension two answering the question formulated by Doyen and Rabinovich in 2011 and closing the gap between undecidable and decidable cases. ",reino niskanen,,2016.0,,arXiv,Niskanen2016,True,,arXiv,Not available,Undecidability of Two-dimensional Robot Games,1279d7f1439ee2a8855561e7203f4142,http://arxiv.org/abs/1604.08779v1 14509," Robot game is a two-player vector addition game played on the integer lattice $\mathbb{Z}^n$. Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game. One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin. The problem is to decide whether or not Eve has a winning strategy. In this paper we prove undecidability of the robot game in dimension two answering the question formulated by Doyen and Rabinovich in 2011 and closing the gap between undecidable and decidable cases. ",igor potapov,,2016.0,,arXiv,Niskanen2016,True,,arXiv,Not available,Undecidability of Two-dimensional Robot Games,1279d7f1439ee2a8855561e7203f4142,http://arxiv.org/abs/1604.08779v1 14510," Robot game is a two-player vector addition game played on the integer lattice $\mathbb{Z}^n$. Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game. One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin. The problem is to decide whether or not Eve has a winning strategy. In this paper we prove undecidability of the robot game in dimension two answering the question formulated by Doyen and Rabinovich in 2011 and closing the gap between undecidable and decidable cases. ",julien reichert,,2016.0,,arXiv,Niskanen2016,True,,arXiv,Not available,Undecidability of Two-dimensional Robot Games,1279d7f1439ee2a8855561e7203f4142,http://arxiv.org/abs/1604.08779v1 14511," An extension of the WHILE-language is developed for programming game-theoretic mechanisms involving multiple agents. Examples of such mechanisms include auctions, voting procedures, and negotiation protocols. A structured operational semantics is provided in terms of extensive games of almost perfect information. Hoare-style partial correctness assertions are proposed to reason about the correctness of these mechanisms, where correctness is interpreted as the existence of a subgame perfect equilibrium. Using an extensional approach to pre- and postconditions, we show that an extension of Hoare's original calculus is sound and complete for reasoning about subgame perfect equilibria in game-theoretic mechanisms. ",marc pauly,,2002.0,,arXiv,Pauly2002,True,,arXiv,Not available,Programming and Verifying Subgame Perfect Mechanisms,f8b7afa0e431db1d7f91e1009f67d470,http://arxiv.org/abs/cs/0211002v2 14512," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",satinder singh,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 14513," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",michael kearns,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 14514," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",yishay mansour,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 14515," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",wayes tushar,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14516," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",chau yuen,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14517," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",hamed mohsenian-rad,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14518," We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial (""noisy"") knowledge of the system, where the capacity of the agent to know the system and compute her best move is measured by the inverse of the parameter beta. In particular, we prove nearly tight bounds for potential games and games with dominant strategies. Our results show that, for potential games, the mixing time is upper and lower bounded by an exponential in the inverse of the noise and in the maximum potential difference. Instead, for games with dominant strategies, the mixing time cannot grow arbitrarily with the inverse of the noise. Finally, we refine our analysis for a subclass of potential games called graphical coordination games, a class of games that have been previously studied in Physics and, more recently, in Computer Science in the context of diffusion of new technologies. We give evidence that the mixing time of the logit dynamics for these games strongly depends on the structure of the underlying graph. We prove that the mixing time of the logit dynamics for these games can be upper bounded by a function that is exponential in the cutwidth of the underlying graph and in the inverse of noise. Moreover, we consider two specific and popular network topologies, the clique and the ring. For games played on a clique we prove an almost matching lower bound on the mixing time of the logit dynamics that is exponential in the inverse of the noise and in the maximum potential difference, while for games played on a ring we prove that the time of convergence of the logit dynamics to its stationary distribution is significantly shorter. ",vincenzo auletta,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Convergence to Equilibrium of Logit Dynamics for Strategic Games,bf38c4031d4547fe0309d92604998a24,http://arxiv.org/abs/1212.1884v2 14519," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",tapan saha,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14520," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",h. poor,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14521," Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes. ",kristin wood,,2018.0,10.1109/MSP.2018.2818327,"IEEE Signal Processing Magazine, 2018",Tushar2018,True,,arXiv,Not available,"Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches",2677691595580719980728d23494198b,http://arxiv.org/abs/1804.00962v1 14522," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",jon feldman,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14523," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",s. muthukrishnan,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14524," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",martin pal,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14525," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",cliff stein,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14526," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",shahar dobzinski,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 14527," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",hu fu,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 14528," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",robert kleinberg,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 14529," We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial (""noisy"") knowledge of the system, where the capacity of the agent to know the system and compute her best move is measured by the inverse of the parameter beta. In particular, we prove nearly tight bounds for potential games and games with dominant strategies. Our results show that, for potential games, the mixing time is upper and lower bounded by an exponential in the inverse of the noise and in the maximum potential difference. Instead, for games with dominant strategies, the mixing time cannot grow arbitrarily with the inverse of the noise. Finally, we refine our analysis for a subclass of potential games called graphical coordination games, a class of games that have been previously studied in Physics and, more recently, in Computer Science in the context of diffusion of new technologies. We give evidence that the mixing time of the logit dynamics for these games strongly depends on the structure of the underlying graph. We prove that the mixing time of the logit dynamics for these games can be upper bounded by a function that is exponential in the cutwidth of the underlying graph and in the inverse of noise. Moreover, we consider two specific and popular network topologies, the clique and the ring. For games played on a clique we prove an almost matching lower bound on the mixing time of the logit dynamics that is exponential in the inverse of the noise and in the maximum potential difference, while for games played on a ring we prove that the time of convergence of the logit dynamics to its stationary distribution is significantly shorter. ",diodato ferraioli,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Convergence to Equilibrium of Logit Dynamics for Strategic Games,bf38c4031d4547fe0309d92604998a24,http://arxiv.org/abs/1212.1884v2 14530," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",darrell hoy,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 14531," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",denis nekipelov,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 14532," Analysis of efficiency of outcomes in game theoretic settings has been a main item of study at the intersection of economics and computer science. The notion of the price of anarchy takes a worst-case stance to efficiency analysis, considering instance independent guarantees of efficiency. We propose a data-dependent analog of the price of anarchy that refines this worst-case assuming access to samples of strategic behavior. We focus on auction settings, where the latter is non-trivial due to the private information held by participants. Our approach to bounding the efficiency from data is robust to statistical errors and mis-specification. Unlike traditional econometrics, which seek to learn the private information of players from observed behavior and then analyze properties of the outcome, we directly quantify the inefficiency without going through the private information. We apply our approach to datasets from a sponsored search auction system and find empirical results that are a significant improvement over bounds from worst-case analysis. ",vasilis syrgkanis,,2015.0,,arXiv,Hoy2015,True,,arXiv,Not available,Efficiency Guarantees from Data,5ee5ff500625976c0c865419629f8325,http://arxiv.org/abs/1505.00437v7 14533," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yu wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14534," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jiayi liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14535," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yuxiang liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14536," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jun hao,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14537," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yang he,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14538," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jinghe hu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14539," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",weipeng yan,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14540," We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial (""noisy"") knowledge of the system, where the capacity of the agent to know the system and compute her best move is measured by the inverse of the parameter beta. In particular, we prove nearly tight bounds for potential games and games with dominant strategies. Our results show that, for potential games, the mixing time is upper and lower bounded by an exponential in the inverse of the noise and in the maximum potential difference. Instead, for games with dominant strategies, the mixing time cannot grow arbitrarily with the inverse of the noise. Finally, we refine our analysis for a subclass of potential games called graphical coordination games, a class of games that have been previously studied in Physics and, more recently, in Computer Science in the context of diffusion of new technologies. We give evidence that the mixing time of the logit dynamics for these games strongly depends on the structure of the underlying graph. We prove that the mixing time of the logit dynamics for these games can be upper bounded by a function that is exponential in the cutwidth of the underlying graph and in the inverse of noise. Moreover, we consider two specific and popular network topologies, the clique and the ring. For games played on a clique we prove an almost matching lower bound on the mixing time of the logit dynamics that is exponential in the inverse of the noise and in the maximum potential difference, while for games played on a ring we prove that the time of convergence of the logit dynamics to its stationary distribution is significantly shorter. ",francesco pasquale,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Convergence to Equilibrium of Logit Dynamics for Strategic Games,bf38c4031d4547fe0309d92604998a24,http://arxiv.org/abs/1212.1884v2 14541," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",mantian li,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 14542," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",darrell hoy,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 14543," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",sam taggart,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 14544," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",zihe wang,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 14545," This paper concerns the analysis of the Shapley value in matching games. Matching games constitute a fundamental class of cooperative games which help understand and model auctions and assignments. In a matching game, the value of a coalition of vertices is the weight of the maximum size matching in the subgraph induced by the coalition. The Shapley value is one of the most important solution concepts in cooperative game theory. After establishing some general insights, we show that the Shapley value of matching games can be computed in polynomial time for some special cases: graphs with maximum degree two, and graphs that have a small modular decomposition into cliques or cocliques (complete k-partite graphs are a notable special case of this). The latter result extends to various other well-known classes of graph-based cooperative games. We continue by showing that computing the Shapley value of unweighted matching games is #P-complete in general. Finally, a fully polynomial-time randomized approximation scheme (FPRAS) is presented. This FPRAS can be considered the best positive result conceivable, in view of the #P-completeness result. ",haris aziz,,2013.0,,arXiv,Aziz2013,True,,arXiv,Not available,Shapley Meets Shapley,ec90407984943cde5ed59f589b5b9853,http://arxiv.org/abs/1307.0332v1 14546," This paper concerns the analysis of the Shapley value in matching games. Matching games constitute a fundamental class of cooperative games which help understand and model auctions and assignments. In a matching game, the value of a coalition of vertices is the weight of the maximum size matching in the subgraph induced by the coalition. The Shapley value is one of the most important solution concepts in cooperative game theory. After establishing some general insights, we show that the Shapley value of matching games can be computed in polynomial time for some special cases: graphs with maximum degree two, and graphs that have a small modular decomposition into cliques or cocliques (complete k-partite graphs are a notable special case of this). The latter result extends to various other well-known classes of graph-based cooperative games. We continue by showing that computing the Shapley value of unweighted matching games is #P-complete in general. Finally, a fully polynomial-time randomized approximation scheme (FPRAS) is presented. This FPRAS can be considered the best positive result conceivable, in view of the #P-completeness result. ",bart keijzer,,2013.0,,arXiv,Aziz2013,True,,arXiv,Not available,Shapley Meets Shapley,ec90407984943cde5ed59f589b5b9853,http://arxiv.org/abs/1307.0332v1 14547," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",denis nekipelov,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 14548," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",vasilis syrgkanis,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 14549," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",eva tardos,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 14550," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",paul dutting,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 14551," We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial (""noisy"") knowledge of the system, where the capacity of the agent to know the system and compute her best move is measured by the inverse of the parameter beta. In particular, we prove nearly tight bounds for potential games and games with dominant strategies. Our results show that, for potential games, the mixing time is upper and lower bounded by an exponential in the inverse of the noise and in the maximum potential difference. Instead, for games with dominant strategies, the mixing time cannot grow arbitrarily with the inverse of the noise. Finally, we refine our analysis for a subclass of potential games called graphical coordination games, a class of games that have been previously studied in Physics and, more recently, in Computer Science in the context of diffusion of new technologies. We give evidence that the mixing time of the logit dynamics for these games strongly depends on the structure of the underlying graph. We prove that the mixing time of the logit dynamics for these games can be upper bounded by a function that is exponential in the cutwidth of the underlying graph and in the inverse of noise. Moreover, we consider two specific and popular network topologies, the clique and the ring. For games played on a clique we prove an almost matching lower bound on the mixing time of the logit dynamics that is exponential in the inverse of the noise and in the maximum potential difference, while for games played on a ring we prove that the time of convergence of the logit dynamics to its stationary distribution is significantly shorter. ",paolo penna,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Convergence to Equilibrium of Logit Dynamics for Strategic Games,bf38c4031d4547fe0309d92604998a24,http://arxiv.org/abs/1212.1884v2 14552," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",felix fischer,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 14553," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",david parkes,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 14554," We study combinatorial auctions for the secondary spectrum market. In this market, short-term licenses shall be given to wireless nodes for communication in their local neighborhood. In contrast to the primary market, channels can be assigned to multiple bidders, provided that the corresponding devices are well separated such that the interference is sufficiently low. Interference conflicts are described in terms of a conflict graph in which the nodes represent the bidders and the edges represent conflicts such that the feasible allocations for a channel correspond to the independent sets in the conflict graph. In this paper, we suggest a novel LP formulation for combinatorial auctions with conflict graph using a non-standard graph parameter, the so-called inductive independence number. Taking into account this parameter enables us to bypass the well-known lower bound of \Omega(n^{1-\epsilon}) on the approximability of independent set in general graphs with n nodes (bidders). We achieve significantly better approximation results by showing that interference constraints for wireless networks yield conflict graphs with bounded inductive independence number. Our framework covers various established models of wireless communication, e.g., the protocol or the physical model. For the protocol model, we achieve an O(\sqrt{k})-approximation, where k is the number of available channels. For the more realistic physical model, we achieve an O(\sqrt{k} \log^2 n) approximation based on edge-weighted conflict graphs. Combining our approach with the the LP-based framework of Lavi and Swamy, we obtain incentive compatible mechanisms for general bidders with arbitrary valuations on bundles of channels specified in terms of demand oracles. ",martin hoefer,,2010.0,,arXiv,Hoefer2010,True,,arXiv,Not available,Approximation Algorithms for Secondary Spectrum Auctions,b88a4054a6bfacbf0a6ef730cb404ee3,http://arxiv.org/abs/1007.5032v3 14555," We study combinatorial auctions for the secondary spectrum market. In this market, short-term licenses shall be given to wireless nodes for communication in their local neighborhood. In contrast to the primary market, channels can be assigned to multiple bidders, provided that the corresponding devices are well separated such that the interference is sufficiently low. Interference conflicts are described in terms of a conflict graph in which the nodes represent the bidders and the edges represent conflicts such that the feasible allocations for a channel correspond to the independent sets in the conflict graph. In this paper, we suggest a novel LP formulation for combinatorial auctions with conflict graph using a non-standard graph parameter, the so-called inductive independence number. Taking into account this parameter enables us to bypass the well-known lower bound of \Omega(n^{1-\epsilon}) on the approximability of independent set in general graphs with n nodes (bidders). We achieve significantly better approximation results by showing that interference constraints for wireless networks yield conflict graphs with bounded inductive independence number. Our framework covers various established models of wireless communication, e.g., the protocol or the physical model. For the protocol model, we achieve an O(\sqrt{k})-approximation, where k is the number of available channels. For the more realistic physical model, we achieve an O(\sqrt{k} \log^2 n) approximation based on edge-weighted conflict graphs. Combining our approach with the the LP-based framework of Lavi and Swamy, we obtain incentive compatible mechanisms for general bidders with arbitrary valuations on bundles of channels specified in terms of demand oracles. ",thomas kesselheim,,2010.0,,arXiv,Hoefer2010,True,,arXiv,Not available,Approximation Algorithms for Secondary Spectrum Auctions,b88a4054a6bfacbf0a6ef730cb404ee3,http://arxiv.org/abs/1007.5032v3 14556," We study combinatorial auctions for the secondary spectrum market. In this market, short-term licenses shall be given to wireless nodes for communication in their local neighborhood. In contrast to the primary market, channels can be assigned to multiple bidders, provided that the corresponding devices are well separated such that the interference is sufficiently low. Interference conflicts are described in terms of a conflict graph in which the nodes represent the bidders and the edges represent conflicts such that the feasible allocations for a channel correspond to the independent sets in the conflict graph. In this paper, we suggest a novel LP formulation for combinatorial auctions with conflict graph using a non-standard graph parameter, the so-called inductive independence number. Taking into account this parameter enables us to bypass the well-known lower bound of \Omega(n^{1-\epsilon}) on the approximability of independent set in general graphs with n nodes (bidders). We achieve significantly better approximation results by showing that interference constraints for wireless networks yield conflict graphs with bounded inductive independence number. Our framework covers various established models of wireless communication, e.g., the protocol or the physical model. For the protocol model, we achieve an O(\sqrt{k})-approximation, where k is the number of available channels. For the more realistic physical model, we achieve an O(\sqrt{k} \log^2 n) approximation based on edge-weighted conflict graphs. Combining our approach with the the LP-based framework of Lavi and Swamy, we obtain incentive compatible mechanisms for general bidders with arbitrary valuations on bundles of channels specified in terms of demand oracles. ",berthold vocking,,2010.0,,arXiv,Hoefer2010,True,,arXiv,Not available,Approximation Algorithms for Secondary Spectrum Auctions,b88a4054a6bfacbf0a6ef730cb404ee3,http://arxiv.org/abs/1007.5032v3 14557," We provide a reduction from revenue maximization to welfare maximization in multi-dimensional Bayesian auctions with arbitrary (possibly combinatorial) feasibility constraints and independent bidders with arbitrary (possibly combinatorial) demand constraints, appropriately extending Myerson's result to this setting. We also show that every feasible Bayesian auction can be implemented as a distribution over virtual VCG allocation rules. A virtual VCG allocation rule has the following simple form: Every bidder's type t_i is transformed into a virtual type f_i(t_i), via a bidder-specific function. Then, the allocation maximizing virtual welfare is chosen. Using this characterization, we show how to find and run the revenue-optimal auction given only black box access to an implementation of the VCG allocation rule. We generalize this result to arbitrarily correlated bidders, introducing the notion of a second-order VCG allocation rule. We obtain our reduction from revenue to welfare optimization via two algorithmic results on reduced forms in settings with arbitrary feasibility and demand constraints. First, we provide a separation oracle for determining feasibility of a reduced form. Second, we provide a geometric algorithm to decompose any feasible reduced form into a distribution over virtual VCG allocation rules. In addition, we show how to execute both algorithms given only black box access to an implementation of the VCG allocation rule. Our results are computationally efficient for all multi-dimensional settings where the bidders are additive. In this case, our mechanisms run in time polynomial in the total number of bidder types, but not type profiles. For generic correlated distributions, this is the natural description complexity of the problem. The runtime can be further improved to poly(#items, #bidders) in item-symmetric settings by making use of recent techniques. ",yang cai,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,"Optimal Multi-Dimensional Mechanism Design: Reducing Revenue to Welfare Maximization",b15f83612924732b43d4566aae96c0f5,http://arxiv.org/abs/1207.5518v1 14558," We provide a reduction from revenue maximization to welfare maximization in multi-dimensional Bayesian auctions with arbitrary (possibly combinatorial) feasibility constraints and independent bidders with arbitrary (possibly combinatorial) demand constraints, appropriately extending Myerson's result to this setting. We also show that every feasible Bayesian auction can be implemented as a distribution over virtual VCG allocation rules. A virtual VCG allocation rule has the following simple form: Every bidder's type t_i is transformed into a virtual type f_i(t_i), via a bidder-specific function. Then, the allocation maximizing virtual welfare is chosen. Using this characterization, we show how to find and run the revenue-optimal auction given only black box access to an implementation of the VCG allocation rule. We generalize this result to arbitrarily correlated bidders, introducing the notion of a second-order VCG allocation rule. We obtain our reduction from revenue to welfare optimization via two algorithmic results on reduced forms in settings with arbitrary feasibility and demand constraints. First, we provide a separation oracle for determining feasibility of a reduced form. Second, we provide a geometric algorithm to decompose any feasible reduced form into a distribution over virtual VCG allocation rules. In addition, we show how to execute both algorithms given only black box access to an implementation of the VCG allocation rule. Our results are computationally efficient for all multi-dimensional settings where the bidders are additive. In this case, our mechanisms run in time polynomial in the total number of bidder types, but not type profiles. For generic correlated distributions, this is the natural description complexity of the problem. The runtime can be further improved to poly(#items, #bidders) in item-symmetric settings by making use of recent techniques. ",constantinos daskalakis,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,"Optimal Multi-Dimensional Mechanism Design: Reducing Revenue to Welfare Maximization",b15f83612924732b43d4566aae96c0f5,http://arxiv.org/abs/1207.5518v1 14559," We provide a reduction from revenue maximization to welfare maximization in multi-dimensional Bayesian auctions with arbitrary (possibly combinatorial) feasibility constraints and independent bidders with arbitrary (possibly combinatorial) demand constraints, appropriately extending Myerson's result to this setting. We also show that every feasible Bayesian auction can be implemented as a distribution over virtual VCG allocation rules. A virtual VCG allocation rule has the following simple form: Every bidder's type t_i is transformed into a virtual type f_i(t_i), via a bidder-specific function. Then, the allocation maximizing virtual welfare is chosen. Using this characterization, we show how to find and run the revenue-optimal auction given only black box access to an implementation of the VCG allocation rule. We generalize this result to arbitrarily correlated bidders, introducing the notion of a second-order VCG allocation rule. We obtain our reduction from revenue to welfare optimization via two algorithmic results on reduced forms in settings with arbitrary feasibility and demand constraints. First, we provide a separation oracle for determining feasibility of a reduced form. Second, we provide a geometric algorithm to decompose any feasible reduced form into a distribution over virtual VCG allocation rules. In addition, we show how to execute both algorithms given only black box access to an implementation of the VCG allocation rule. Our results are computationally efficient for all multi-dimensional settings where the bidders are additive. In this case, our mechanisms run in time polynomial in the total number of bidder types, but not type profiles. For generic correlated distributions, this is the natural description complexity of the problem. The runtime can be further improved to poly(#items, #bidders) in item-symmetric settings by making use of recent techniques. ",s. weinberg,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,"Optimal Multi-Dimensional Mechanism Design: Reducing Revenue to Welfare Maximization",b15f83612924732b43d4566aae96c0f5,http://arxiv.org/abs/1207.5518v1 14560," We introduce a dynamic mechanism design problem in which the designer wants to offer for sale an item to an agent, and another item to the same agent at some point in the future. The agent's joint distribution of valuations for the two items is known, and the agent knows the valuation for the current item (but not for the one in the future). The designer seeks to maximize expected revenue, and the auction must be deterministic, truthful, and ex post individually rational. The optimum mechanism involves a protocol whereby the seller elicits the buyer's current valuation, and based on the bid makes two take-it-or-leave-it offers, one for now and one for the future. We show that finding the optimum deterministic mechanism in this situation - arguably the simplest meaningful dynamic mechanism design problem imaginable - is NP-hard. We also prove several positive results, among them a polynomial linear programming-based algorithm for the optimum randomized auction (even for many bidders and periods), and we show strong separations in revenue between non-adaptive, adaptive, and randomized auctions, even when the valuations in the two periods are uncorrelated. Finally, for the same problem in an environment in which contracts cannot be enforced, and thus perfection of equilibrium is necessary, we show that the optimum randomized mechanism requires multiple rounds of cheap talk-like interactions. ",christos papadimitriou,,2014.0,,arXiv,Papadimitriou2014,True,,arXiv,Not available,On the Complexity of Dynamic Mechanism Design,21d454ea296afa22ac520a643c66e3e8,http://arxiv.org/abs/1407.5373v2 14561," We introduce a dynamic mechanism design problem in which the designer wants to offer for sale an item to an agent, and another item to the same agent at some point in the future. The agent's joint distribution of valuations for the two items is known, and the agent knows the valuation for the current item (but not for the one in the future). The designer seeks to maximize expected revenue, and the auction must be deterministic, truthful, and ex post individually rational. The optimum mechanism involves a protocol whereby the seller elicits the buyer's current valuation, and based on the bid makes two take-it-or-leave-it offers, one for now and one for the future. We show that finding the optimum deterministic mechanism in this situation - arguably the simplest meaningful dynamic mechanism design problem imaginable - is NP-hard. We also prove several positive results, among them a polynomial linear programming-based algorithm for the optimum randomized auction (even for many bidders and periods), and we show strong separations in revenue between non-adaptive, adaptive, and randomized auctions, even when the valuations in the two periods are uncorrelated. Finally, for the same problem in an environment in which contracts cannot be enforced, and thus perfection of equilibrium is necessary, we show that the optimum randomized mechanism requires multiple rounds of cheap talk-like interactions. ",george pierrakos,,2014.0,,arXiv,Papadimitriou2014,True,,arXiv,Not available,On the Complexity of Dynamic Mechanism Design,21d454ea296afa22ac520a643c66e3e8,http://arxiv.org/abs/1407.5373v2 14562," Delay games are two-player games of infinite duration in which one player may delay her moves to obtain a lookahead on her opponent's moves. We consider delay games with winning conditions expressed in weak monadic second order logic with the unbounding quantifier, which is able to express (un)boundedness properties. We show that it is decidable whether the delaying player has a winning strategy using bounded lookahead and give a doubly-exponential upper bound on the necessary lookahead. In contrast, we show that bounded lookahead is not always sufficient to win such a game. ",martin zimmermann,,2014.0,,arXiv,Zimmermann2014,True,,arXiv,Not available,Delay Games with WMSO+U Winning Conditions,9ee69d96b443b217b249976dbb1b16e4,http://arxiv.org/abs/1412.3978v4 14563," We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial (""noisy"") knowledge of the system, where the capacity of the agent to know the system and compute her best move is measured by the inverse of the parameter beta. In particular, we prove nearly tight bounds for potential games and games with dominant strategies. Our results show that, for potential games, the mixing time is upper and lower bounded by an exponential in the inverse of the noise and in the maximum potential difference. Instead, for games with dominant strategies, the mixing time cannot grow arbitrarily with the inverse of the noise. Finally, we refine our analysis for a subclass of potential games called graphical coordination games, a class of games that have been previously studied in Physics and, more recently, in Computer Science in the context of diffusion of new technologies. We give evidence that the mixing time of the logit dynamics for these games strongly depends on the structure of the underlying graph. We prove that the mixing time of the logit dynamics for these games can be upper bounded by a function that is exponential in the cutwidth of the underlying graph and in the inverse of noise. Moreover, we consider two specific and popular network topologies, the clique and the ring. For games played on a clique we prove an almost matching lower bound on the mixing time of the logit dynamics that is exponential in the inverse of the noise and in the maximum potential difference, while for games played on a ring we prove that the time of convergence of the logit dynamics to its stationary distribution is significantly shorter. ",giuseppe persiano,,2012.0,,arXiv,Auletta2012,True,,arXiv,Not available,Convergence to Equilibrium of Logit Dynamics for Strategic Games,bf38c4031d4547fe0309d92604998a24,http://arxiv.org/abs/1212.1884v2 14564," We introduce a dynamic mechanism design problem in which the designer wants to offer for sale an item to an agent, and another item to the same agent at some point in the future. The agent's joint distribution of valuations for the two items is known, and the agent knows the valuation for the current item (but not for the one in the future). The designer seeks to maximize expected revenue, and the auction must be deterministic, truthful, and ex post individually rational. The optimum mechanism involves a protocol whereby the seller elicits the buyer's current valuation, and based on the bid makes two take-it-or-leave-it offers, one for now and one for the future. We show that finding the optimum deterministic mechanism in this situation - arguably the simplest meaningful dynamic mechanism design problem imaginable - is NP-hard. We also prove several positive results, among them a polynomial linear programming-based algorithm for the optimum randomized auction (even for many bidders and periods), and we show strong separations in revenue between non-adaptive, adaptive, and randomized auctions, even when the valuations in the two periods are uncorrelated. Finally, for the same problem in an environment in which contracts cannot be enforced, and thus perfection of equilibrium is necessary, we show that the optimum randomized mechanism requires multiple rounds of cheap talk-like interactions. ",christos-alexandros psomas,,2014.0,,arXiv,Papadimitriou2014,True,,arXiv,Not available,On the Complexity of Dynamic Mechanism Design,21d454ea296afa22ac520a643c66e3e8,http://arxiv.org/abs/1407.5373v2 14565," We introduce a dynamic mechanism design problem in which the designer wants to offer for sale an item to an agent, and another item to the same agent at some point in the future. The agent's joint distribution of valuations for the two items is known, and the agent knows the valuation for the current item (but not for the one in the future). The designer seeks to maximize expected revenue, and the auction must be deterministic, truthful, and ex post individually rational. The optimum mechanism involves a protocol whereby the seller elicits the buyer's current valuation, and based on the bid makes two take-it-or-leave-it offers, one for now and one for the future. We show that finding the optimum deterministic mechanism in this situation - arguably the simplest meaningful dynamic mechanism design problem imaginable - is NP-hard. We also prove several positive results, among them a polynomial linear programming-based algorithm for the optimum randomized auction (even for many bidders and periods), and we show strong separations in revenue between non-adaptive, adaptive, and randomized auctions, even when the valuations in the two periods are uncorrelated. Finally, for the same problem in an environment in which contracts cannot be enforced, and thus perfection of equilibrium is necessary, we show that the optimum randomized mechanism requires multiple rounds of cheap talk-like interactions. ",aviad rubinstein,,2014.0,,arXiv,Papadimitriou2014,True,,arXiv,Not available,On the Complexity of Dynamic Mechanism Design,21d454ea296afa22ac520a643c66e3e8,http://arxiv.org/abs/1407.5373v2 14566," In multi-hop secondary networks, bidding strategies for spectrum auction, route selection and relaying incentives should be jointly considered to establish multi-hop communication. In this paper, a framework for joint resource bidding and tipping is developed where users iteratively revise their strategies, which include bidding and incentivizing relays, to achieve their Quality of Service (QoS) requirements. A bidding language is designed to generalize secondary users' heterogeneous demands for multiple resources and willingness to pay. Then, group partitioning-based auction mechanisms are presented to exploit the heterogeneity of SU demands in multi-hop secondary networks. These mechanisms include primary operator (PO) strategies based on static and dynamic partition schemes combined with new payment mechanisms to obtain high revenue and fairly allocate the resources. The proposed auction schemes stimulate the participation of SUs and provide high revenue for the PO while maximizing the social welfare. Besides, they satisfy the properties of truthfulness, individual rationality and computational tractability. Simulation results have shown that for highly demanding users the static group scheme achieves 150% more winners and 3 times higher revenue for the PO compared to a scheme without grouping. For lowly demanding users, the PO may keep similar revenue with the dynamic scheme by lowering 50% the price per channel as the number of winners will increase proportionally. ",beatriz lorenzo,,2016.0,10.1109/TCCN.2016.2604838,arXiv,Lorenzo2016,True,,arXiv,Not available,"Joint Resource Bidding and Tipping Strategies in Multi-hop Cognitive Networks",4eba247fe51b24b7a210973046c9d7c3,http://arxiv.org/abs/1610.02826v1 14567," In multi-hop secondary networks, bidding strategies for spectrum auction, route selection and relaying incentives should be jointly considered to establish multi-hop communication. In this paper, a framework for joint resource bidding and tipping is developed where users iteratively revise their strategies, which include bidding and incentivizing relays, to achieve their Quality of Service (QoS) requirements. A bidding language is designed to generalize secondary users' heterogeneous demands for multiple resources and willingness to pay. Then, group partitioning-based auction mechanisms are presented to exploit the heterogeneity of SU demands in multi-hop secondary networks. These mechanisms include primary operator (PO) strategies based on static and dynamic partition schemes combined with new payment mechanisms to obtain high revenue and fairly allocate the resources. The proposed auction schemes stimulate the participation of SUs and provide high revenue for the PO while maximizing the social welfare. Besides, they satisfy the properties of truthfulness, individual rationality and computational tractability. Simulation results have shown that for highly demanding users the static group scheme achieves 150% more winners and 3 times higher revenue for the PO compared to a scheme without grouping. For lowly demanding users, the PO may keep similar revenue with the dynamic scheme by lowering 50% the price per channel as the number of winners will increase proportionally. ",ivana kovacevic,,2016.0,10.1109/TCCN.2016.2604838,arXiv,Lorenzo2016,True,,arXiv,Not available,"Joint Resource Bidding and Tipping Strategies in Multi-hop Cognitive Networks",4eba247fe51b24b7a210973046c9d7c3,http://arxiv.org/abs/1610.02826v1 14568," In multi-hop secondary networks, bidding strategies for spectrum auction, route selection and relaying incentives should be jointly considered to establish multi-hop communication. In this paper, a framework for joint resource bidding and tipping is developed where users iteratively revise their strategies, which include bidding and incentivizing relays, to achieve their Quality of Service (QoS) requirements. A bidding language is designed to generalize secondary users' heterogeneous demands for multiple resources and willingness to pay. Then, group partitioning-based auction mechanisms are presented to exploit the heterogeneity of SU demands in multi-hop secondary networks. These mechanisms include primary operator (PO) strategies based on static and dynamic partition schemes combined with new payment mechanisms to obtain high revenue and fairly allocate the resources. The proposed auction schemes stimulate the participation of SUs and provide high revenue for the PO while maximizing the social welfare. Besides, they satisfy the properties of truthfulness, individual rationality and computational tractability. Simulation results have shown that for highly demanding users the static group scheme achieves 150% more winners and 3 times higher revenue for the PO compared to a scheme without grouping. For lowly demanding users, the PO may keep similar revenue with the dynamic scheme by lowering 50% the price per channel as the number of winners will increase proportionally. ",ana peleteiro,,2016.0,10.1109/TCCN.2016.2604838,arXiv,Lorenzo2016,True,,arXiv,Not available,"Joint Resource Bidding and Tipping Strategies in Multi-hop Cognitive Networks",4eba247fe51b24b7a210973046c9d7c3,http://arxiv.org/abs/1610.02826v1 14569," In multi-hop secondary networks, bidding strategies for spectrum auction, route selection and relaying incentives should be jointly considered to establish multi-hop communication. In this paper, a framework for joint resource bidding and tipping is developed where users iteratively revise their strategies, which include bidding and incentivizing relays, to achieve their Quality of Service (QoS) requirements. A bidding language is designed to generalize secondary users' heterogeneous demands for multiple resources and willingness to pay. Then, group partitioning-based auction mechanisms are presented to exploit the heterogeneity of SU demands in multi-hop secondary networks. These mechanisms include primary operator (PO) strategies based on static and dynamic partition schemes combined with new payment mechanisms to obtain high revenue and fairly allocate the resources. The proposed auction schemes stimulate the participation of SUs and provide high revenue for the PO while maximizing the social welfare. Besides, they satisfy the properties of truthfulness, individual rationality and computational tractability. Simulation results have shown that for highly demanding users the static group scheme achieves 150% more winners and 3 times higher revenue for the PO compared to a scheme without grouping. For lowly demanding users, the PO may keep similar revenue with the dynamic scheme by lowering 50% the price per channel as the number of winners will increase proportionally. ",francisco gonzalez-castano,,2016.0,10.1109/TCCN.2016.2604838,arXiv,Lorenzo2016,True,,arXiv,Not available,"Joint Resource Bidding and Tipping Strategies in Multi-hop Cognitive Networks",4eba247fe51b24b7a210973046c9d7c3,http://arxiv.org/abs/1610.02826v1 14570," In multi-hop secondary networks, bidding strategies for spectrum auction, route selection and relaying incentives should be jointly considered to establish multi-hop communication. In this paper, a framework for joint resource bidding and tipping is developed where users iteratively revise their strategies, which include bidding and incentivizing relays, to achieve their Quality of Service (QoS) requirements. A bidding language is designed to generalize secondary users' heterogeneous demands for multiple resources and willingness to pay. Then, group partitioning-based auction mechanisms are presented to exploit the heterogeneity of SU demands in multi-hop secondary networks. These mechanisms include primary operator (PO) strategies based on static and dynamic partition schemes combined with new payment mechanisms to obtain high revenue and fairly allocate the resources. The proposed auction schemes stimulate the participation of SUs and provide high revenue for the PO while maximizing the social welfare. Besides, they satisfy the properties of truthfulness, individual rationality and computational tractability. Simulation results have shown that for highly demanding users the static group scheme achieves 150% more winners and 3 times higher revenue for the PO compared to a scheme without grouping. For lowly demanding users, the PO may keep similar revenue with the dynamic scheme by lowering 50% the price per channel as the number of winners will increase proportionally. ",juan burguillo,,2016.0,10.1109/TCCN.2016.2604838,arXiv,Lorenzo2016,True,,arXiv,Not available,"Joint Resource Bidding and Tipping Strategies in Multi-hop Cognitive Networks",4eba247fe51b24b7a210973046c9d7c3,http://arxiv.org/abs/1610.02826v1 14571," On-demand resource provisioning in cloud computing provides tailor-made resource packages (typically in the form of VMs) to meet users' demands. Public clouds nowadays provide more and more elaborated types of VMs, but have yet to offer the most flexible dynamic VM assembly, which is partly due to the lack of a mature mechanism for pricing tailor-made VMs on the spot. This work proposes an efficient randomized auction mechanism based on a novel application of smoothed analysis and randomized reduction, for dynamic VM provisioning and pricing in geo-distributed cloud data centers. This auction, to the best of our knowledge, is the first one in literature that achieves (i) truthfulness in expectation, (ii) polynomial running time in expectation, and (iii) $(1-\epsilon)$-optimal social welfare in expectation for resource allocation, where $\epsilon$ can be arbitrarily close to 0. Our mechanism consists of three modules: (1) an exact algorithm to solve the NP-hard social welfare maximization problem, which runs in polynomial time in expectation, (2) a perturbation-based randomized resource allocation scheme which produces a VM provisioning solution that is $(1-\epsilon)$-optimal, and (3) an auction mechanism that applies the perturbation-based scheme for dynamic VM provisioning and prices the customized VMs using a randomized VCG payment, with a guarantee in truthfulness in expectation. We validate the efficacy of the mechanism through careful theoretical analysis and trace-driven simulations. ",xiaoxi zhang,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"A Truthful $(1-ε)$-Optimal Mechanism for On-demand Cloud Resource Provisioning",324518445c6d8bf9a8097777c2b6fbf6,http://arxiv.org/abs/1611.07619v1 14572," On-demand resource provisioning in cloud computing provides tailor-made resource packages (typically in the form of VMs) to meet users' demands. Public clouds nowadays provide more and more elaborated types of VMs, but have yet to offer the most flexible dynamic VM assembly, which is partly due to the lack of a mature mechanism for pricing tailor-made VMs on the spot. This work proposes an efficient randomized auction mechanism based on a novel application of smoothed analysis and randomized reduction, for dynamic VM provisioning and pricing in geo-distributed cloud data centers. This auction, to the best of our knowledge, is the first one in literature that achieves (i) truthfulness in expectation, (ii) polynomial running time in expectation, and (iii) $(1-\epsilon)$-optimal social welfare in expectation for resource allocation, where $\epsilon$ can be arbitrarily close to 0. Our mechanism consists of three modules: (1) an exact algorithm to solve the NP-hard social welfare maximization problem, which runs in polynomial time in expectation, (2) a perturbation-based randomized resource allocation scheme which produces a VM provisioning solution that is $(1-\epsilon)$-optimal, and (3) an auction mechanism that applies the perturbation-based scheme for dynamic VM provisioning and prices the customized VMs using a randomized VCG payment, with a guarantee in truthfulness in expectation. We validate the efficacy of the mechanism through careful theoretical analysis and trace-driven simulations. ",chuan wu,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"A Truthful $(1-ε)$-Optimal Mechanism for On-demand Cloud Resource Provisioning",324518445c6d8bf9a8097777c2b6fbf6,http://arxiv.org/abs/1611.07619v1 14573," On-demand resource provisioning in cloud computing provides tailor-made resource packages (typically in the form of VMs) to meet users' demands. Public clouds nowadays provide more and more elaborated types of VMs, but have yet to offer the most flexible dynamic VM assembly, which is partly due to the lack of a mature mechanism for pricing tailor-made VMs on the spot. This work proposes an efficient randomized auction mechanism based on a novel application of smoothed analysis and randomized reduction, for dynamic VM provisioning and pricing in geo-distributed cloud data centers. This auction, to the best of our knowledge, is the first one in literature that achieves (i) truthfulness in expectation, (ii) polynomial running time in expectation, and (iii) $(1-\epsilon)$-optimal social welfare in expectation for resource allocation, where $\epsilon$ can be arbitrarily close to 0. Our mechanism consists of three modules: (1) an exact algorithm to solve the NP-hard social welfare maximization problem, which runs in polynomial time in expectation, (2) a perturbation-based randomized resource allocation scheme which produces a VM provisioning solution that is $(1-\epsilon)$-optimal, and (3) an auction mechanism that applies the perturbation-based scheme for dynamic VM provisioning and prices the customized VMs using a randomized VCG payment, with a guarantee in truthfulness in expectation. We validate the efficacy of the mechanism through careful theoretical analysis and trace-driven simulations. ",zongpeng li,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"A Truthful $(1-ε)$-Optimal Mechanism for On-demand Cloud Resource Provisioning",324518445c6d8bf9a8097777c2b6fbf6,http://arxiv.org/abs/1611.07619v1 14574," There is currently an intersection in the research of game theory and cryptography. Generally speaking, there are two aspects to this partnership. First there is the application of game theory to cryptography. Yet, the purpose of this paper is to focus on the second aspect, the converse of the first, the application of cryptography to game theory. Chiefly, there exist a branch of non-cooperative games which have a correlated equilibrium as their solution. These equilibria tend to be superior to the conventional Nash equilibria. The primary condition for a correlated equilibrium is the presence of a mediator within the game. This is simply a neutral and mutually trusted entity. It is the role of the mediator to make recommendations in terms of strategy profiles to all players, who then act (supposedly) on this advice. Each party privately provides the mediator with the necessary information, and the referee responds privately with their optimized strategy set. However, there seem to be a multitude of situations in which no mediator could exist. Thus, games modeling these sorts of cases could not use these entities as tools for analysis. Yet, if these equilibria are in the best interest of players, it would be rational to construct a machine, or protocol, to calculate them. Of course, this machine would need to satisfy some standard for secure transmission between a player and itself. The requirement that no third party could detect either the input or strategy profile would need to be satisfied by this scheme. Here is the synthesis of cryptography into game theory; analyzing the ability of the players to construct a protocol which can be used successfully in the place of a mediator. ",thomas meyer,,2009.0,,arXiv,Meyer2009,True,,arXiv,Not available,Cryptographic Implications for Artificially Mediated Games,d51c2fbd6b6d27e40de57815b3e87c3a,http://arxiv.org/abs/1001.0054v1 14575," On-demand resource provisioning in cloud computing provides tailor-made resource packages (typically in the form of VMs) to meet users' demands. Public clouds nowadays provide more and more elaborated types of VMs, but have yet to offer the most flexible dynamic VM assembly, which is partly due to the lack of a mature mechanism for pricing tailor-made VMs on the spot. This work proposes an efficient randomized auction mechanism based on a novel application of smoothed analysis and randomized reduction, for dynamic VM provisioning and pricing in geo-distributed cloud data centers. This auction, to the best of our knowledge, is the first one in literature that achieves (i) truthfulness in expectation, (ii) polynomial running time in expectation, and (iii) $(1-\epsilon)$-optimal social welfare in expectation for resource allocation, where $\epsilon$ can be arbitrarily close to 0. Our mechanism consists of three modules: (1) an exact algorithm to solve the NP-hard social welfare maximization problem, which runs in polynomial time in expectation, (2) a perturbation-based randomized resource allocation scheme which produces a VM provisioning solution that is $(1-\epsilon)$-optimal, and (3) an auction mechanism that applies the perturbation-based scheme for dynamic VM provisioning and prices the customized VMs using a randomized VCG payment, with a guarantee in truthfulness in expectation. We validate the efficacy of the mechanism through careful theoretical analysis and trace-driven simulations. ",francis lau,,2016.0,,arXiv,Zhang2016,True,,arXiv,Not available,"A Truthful $(1-ε)$-Optimal Mechanism for On-demand Cloud Resource Provisioning",324518445c6d8bf9a8097777c2b6fbf6,http://arxiv.org/abs/1611.07619v1 14576," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",haifeng zhang,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14577," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",weinan zhang,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14578," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",yifei rong,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14579," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",kan ren,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14580," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",wenxin li,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14581," In this paper, we deal with the uncertainty of bidding for display advertising. Similar to the financial market trading, real-time bidding (RTB) based display advertising employs an auction mechanism to automate the impression level media buying; and running a campaign is no different than an investment of acquiring new customers in return for obtaining additional converted sales. Thus, how to optimally bid on an ad impression to drive the profit and return-on-investment becomes essential. However, the large randomness of the user behaviors and the cost uncertainty caused by the auction competition may result in a significant risk from the campaign performance estimation. In this paper, we explicitly model the uncertainty of user click-through rate estimation and auction competition to capture the risk. We borrow an idea from finance and derive the value at risk for each ad display opportunity. Our formulation results in two risk-aware bidding strategies that penalize risky ad impressions and focus more on the ones with higher expected return and lower risk. The empirical study on real-world data demonstrates the effectiveness of our proposed risk-aware bidding strategies: yielding profit gains of 15.4% in offline experiments and up to 17.5% in an online A/B test on a commercial RTB platform over the widely applied bidding strategies. ",jun wang,,2017.0,10.1145/3018661.3018701,arXiv,Zhang2017,True,,arXiv,Not available,Managing Risk of Bidding in Display Advertising,283d6e5ad323064260ff9191a8e0c5b1,http://arxiv.org/abs/1701.02433v2 14582," We study a class of procurement auctions with a budget constraint, where an auctioneer is interested in buying resources or services from a set of agents. Ideally, the auctioneer would like to select a subset of the resources so as to maximize his valuation function, without exceeding a given budget. As the resources are owned by strategic agents however, our overall goal is to design mechanisms that are truthful, budget-feasible, and obtain a good approximation to the optimal value. Budget-feasibility creates additional challenges, making several approaches inapplicable in this setting. Previous results on budget-feasible mechanisms have considered mostly monotone valuation functions. In this work, we mainly focus on symmetric submodular valuations, a prominent class of non-monotone submodular functions that includes cut functions. We begin first with a purely algorithmic result, obtaining a $\frac{2e}{e-1}$-approximation for maximizing symmetric submodular functions under a budget constraint. We view this as a standalone result of independent interest, as it is the best known factor achieved by a deterministic algorithm. We then proceed to propose truthful, budget feasible mechanisms (both deterministic and randomized), paying particular attention on the Budgeted Max Cut problem. Our results significantly improve the known approximation ratios for these objectives, while establishing polynomial running time for cases where only exponential mechanisms were known. At the heart of our approach lies an appropriate combination of local search algorithms with results for monotone submodular valuations, applied to the derived local optima. ",georgios amanatidis,,2017.0,,arXiv,Amanatidis2017,True,,arXiv,Not available,On Budget-Feasible Mechanism Design for Symmetric Submodular Objectives,f87bb1d50cbf9974abdd88803818174d,http://arxiv.org/abs/1704.06901v2 14583," We study a class of procurement auctions with a budget constraint, where an auctioneer is interested in buying resources or services from a set of agents. Ideally, the auctioneer would like to select a subset of the resources so as to maximize his valuation function, without exceeding a given budget. As the resources are owned by strategic agents however, our overall goal is to design mechanisms that are truthful, budget-feasible, and obtain a good approximation to the optimal value. Budget-feasibility creates additional challenges, making several approaches inapplicable in this setting. Previous results on budget-feasible mechanisms have considered mostly monotone valuation functions. In this work, we mainly focus on symmetric submodular valuations, a prominent class of non-monotone submodular functions that includes cut functions. We begin first with a purely algorithmic result, obtaining a $\frac{2e}{e-1}$-approximation for maximizing symmetric submodular functions under a budget constraint. We view this as a standalone result of independent interest, as it is the best known factor achieved by a deterministic algorithm. We then proceed to propose truthful, budget feasible mechanisms (both deterministic and randomized), paying particular attention on the Budgeted Max Cut problem. Our results significantly improve the known approximation ratios for these objectives, while establishing polynomial running time for cases where only exponential mechanisms were known. At the heart of our approach lies an appropriate combination of local search algorithms with results for monotone submodular valuations, applied to the derived local optima. ",georgios birmpas,,2017.0,,arXiv,Amanatidis2017,True,,arXiv,Not available,On Budget-Feasible Mechanism Design for Symmetric Submodular Objectives,f87bb1d50cbf9974abdd88803818174d,http://arxiv.org/abs/1704.06901v2 14584," We study a class of procurement auctions with a budget constraint, where an auctioneer is interested in buying resources or services from a set of agents. Ideally, the auctioneer would like to select a subset of the resources so as to maximize his valuation function, without exceeding a given budget. As the resources are owned by strategic agents however, our overall goal is to design mechanisms that are truthful, budget-feasible, and obtain a good approximation to the optimal value. Budget-feasibility creates additional challenges, making several approaches inapplicable in this setting. Previous results on budget-feasible mechanisms have considered mostly monotone valuation functions. In this work, we mainly focus on symmetric submodular valuations, a prominent class of non-monotone submodular functions that includes cut functions. We begin first with a purely algorithmic result, obtaining a $\frac{2e}{e-1}$-approximation for maximizing symmetric submodular functions under a budget constraint. We view this as a standalone result of independent interest, as it is the best known factor achieved by a deterministic algorithm. We then proceed to propose truthful, budget feasible mechanisms (both deterministic and randomized), paying particular attention on the Budgeted Max Cut problem. Our results significantly improve the known approximation ratios for these objectives, while establishing polynomial running time for cases where only exponential mechanisms were known. At the heart of our approach lies an appropriate combination of local search algorithms with results for monotone submodular valuations, applied to the derived local optima. ",evangelos markakis,,2017.0,,arXiv,Amanatidis2017,True,,arXiv,Not available,On Budget-Feasible Mechanism Design for Symmetric Submodular Objectives,f87bb1d50cbf9974abdd88803818174d,http://arxiv.org/abs/1704.06901v2 14585," We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided among the participants. Potential contracts and their surplus are represented by weighted edges in our bipartite network. Each agent in the market is additionally limited by a capacity representing the number of contracts which he or she may undertake. When all agents are limited to just one contract each, prior research applied natural generalizations of the Nash bargaining solution to the networked setting, defined the new solution concepts of stable and balanced, and characterized the resulting bargaining outcomes. We simplify and generalize these results to a setting in which participants in only one side of the market are limited to one contract each. The heart of our results uses a linear-programming formulation to establish a novel connection between well-studied cooperative game theory concepts (such as core and prekernel) and the solution concepts of stable and balanced defined for the bargaining games. This immediately implies one can take advantage of the results and algorithms in cooperative game theory to reproduce results such as those of Azar et al. [1] and Kleinberg and Tardos [29] and also generalize them to our setting. The cooperative-game-theoretic connection also inspires us to refine our solution space using standard solution concepts from that literature such as nucleolus and lexicographic kernel. The nucleolus is particularly attractive as it is unique, always exists, and is supported by experimental data in the network bargaining literature. Guided by algorithms from cooperative game theory, we show how to compute the nucleolus by pruning and iteratively solving a natural linear-programming formulation. ",mohammadhossein bateni,,2010.0,,arXiv,Bateni2010,True,,arXiv,Not available,The cooperative game theory foundations of network bargaining games,8db87f332027cabeae7cfbf01703dba6,http://arxiv.org/abs/1004.4317v1 14587," We study the menu complexity of optimal and approximately-optimal auctions in the context of the ""FedEx"" problem, a so-called ""one-and-a-half-dimensional"" setting where a single bidder has both a value and a deadline for receiving an [FGKK16]. The menu complexity of an auction is equal to the number of distinct (allocation, price) pairs that a bidder might receive [HN13]. We show the following when the bidder has $n$ possible deadlines: - Exponential menu complexity is necessary to be exactly optimal: There exist instances where the optimal mechanism has menu complexity is $2^n-1$. This matches exactly the upper bound provided by Fiat et al.'s algorithm, and resolves one of their open questions [FGKK16]. - Fully polynomial menu complexity is necessary and sufficient for approximation: For all instances, there exists a mechanism guaranteeing a multiplicative (1-\epsilon)-approximation to the optimal revenue with menu complexity $O(n^{3/2}\sqrt{\frac{\min\{n/\epsilon,\ln(v_{\max})\}}{\epsilon}}) = O(n^2/\epsilon)$, where $v_{\max}$ denotes the largest value in the support of integral distributions. - There exist instances where any mechanism guaranteeing a multiplicative $(1-O(1/n^2))$-approximation to the optimal revenue requires menu complexity $\Omega(n^2)$. Our main technique is the polygon approximation of concave functions [Rote19], and our results here should be of independent interest. We further show how our techniques can be used to resolve an open question of [DW17] on the menu complexity of optimal auctions for a budget-constrained buyer. ",raghuvansh saxena,,2017.0,,arXiv,Saxena2017,True,,arXiv,Not available,"The menu complexity of ""one-and-a-half-dimensional"" mechanism design",87b208b518a073ce0b5a6c3c71df4097,http://arxiv.org/abs/1711.02165v1 14588," We study the menu complexity of optimal and approximately-optimal auctions in the context of the ""FedEx"" problem, a so-called ""one-and-a-half-dimensional"" setting where a single bidder has both a value and a deadline for receiving an [FGKK16]. The menu complexity of an auction is equal to the number of distinct (allocation, price) pairs that a bidder might receive [HN13]. We show the following when the bidder has $n$ possible deadlines: - Exponential menu complexity is necessary to be exactly optimal: There exist instances where the optimal mechanism has menu complexity is $2^n-1$. This matches exactly the upper bound provided by Fiat et al.'s algorithm, and resolves one of their open questions [FGKK16]. - Fully polynomial menu complexity is necessary and sufficient for approximation: For all instances, there exists a mechanism guaranteeing a multiplicative (1-\epsilon)-approximation to the optimal revenue with menu complexity $O(n^{3/2}\sqrt{\frac{\min\{n/\epsilon,\ln(v_{\max})\}}{\epsilon}}) = O(n^2/\epsilon)$, where $v_{\max}$ denotes the largest value in the support of integral distributions. - There exist instances where any mechanism guaranteeing a multiplicative $(1-O(1/n^2))$-approximation to the optimal revenue requires menu complexity $\Omega(n^2)$. Our main technique is the polygon approximation of concave functions [Rote19], and our results here should be of independent interest. We further show how our techniques can be used to resolve an open question of [DW17] on the menu complexity of optimal auctions for a budget-constrained buyer. ",ariel schvartzman,,2017.0,,arXiv,Saxena2017,True,,arXiv,Not available,"The menu complexity of ""one-and-a-half-dimensional"" mechanism design",87b208b518a073ce0b5a6c3c71df4097,http://arxiv.org/abs/1711.02165v1 14589," We study the menu complexity of optimal and approximately-optimal auctions in the context of the ""FedEx"" problem, a so-called ""one-and-a-half-dimensional"" setting where a single bidder has both a value and a deadline for receiving an [FGKK16]. The menu complexity of an auction is equal to the number of distinct (allocation, price) pairs that a bidder might receive [HN13]. We show the following when the bidder has $n$ possible deadlines: - Exponential menu complexity is necessary to be exactly optimal: There exist instances where the optimal mechanism has menu complexity is $2^n-1$. This matches exactly the upper bound provided by Fiat et al.'s algorithm, and resolves one of their open questions [FGKK16]. - Fully polynomial menu complexity is necessary and sufficient for approximation: For all instances, there exists a mechanism guaranteeing a multiplicative (1-\epsilon)-approximation to the optimal revenue with menu complexity $O(n^{3/2}\sqrt{\frac{\min\{n/\epsilon,\ln(v_{\max})\}}{\epsilon}}) = O(n^2/\epsilon)$, where $v_{\max}$ denotes the largest value in the support of integral distributions. - There exist instances where any mechanism guaranteeing a multiplicative $(1-O(1/n^2))$-approximation to the optimal revenue requires menu complexity $\Omega(n^2)$. Our main technique is the polygon approximation of concave functions [Rote19], and our results here should be of independent interest. We further show how our techniques can be used to resolve an open question of [DW17] on the menu complexity of optimal auctions for a budget-constrained buyer. ",s. weinberg,,2017.0,,arXiv,Saxena2017,True,,arXiv,Not available,"The menu complexity of ""one-and-a-half-dimensional"" mechanism design",87b208b518a073ce0b5a6c3c71df4097,http://arxiv.org/abs/1711.02165v1 14590," In this paper, we model the various wireless users in a cognitive radio network as a collection of selfish, autonomous agents that strategically interact in order to acquire the dynamically available spectrum opportunities. Our main focus is on developing solutions for wireless users to successfully compete with each other for the limited and time-varying spectrum opportunities, given the experienced dynamics in the wireless network. We categorize these dynamics into two types: one is the disturbance due to the environment (e.g. wireless channel conditions, source traffic characteristics, etc.) and the other is the impact caused by competing users. To analyze the interactions among users given the environment disturbance, we propose a general stochastic framework for modeling how the competition among users for spectrum opportunities evolves over time. At each stage of the dynamic resource allocation, a central spectrum moderator auctions the available resources and the users strategically bid for the required resources. The joint bid actions affect the resource allocation and hence, the rewards and future strategies of all users. Based on the observed resource allocation and corresponding rewards from previous allocations, we propose a best response learning algorithm that can be deployed by wireless users to improve their bidding policy at each stage. The simulation results show that by deploying the proposed best response learning algorithm, the wireless users can significantly improve their own performance in terms of both the packet loss rate and the incurred cost for the used resources. ",fangwen fu,,2007.0,,arXiv,Fu2007,True,,arXiv,Not available,Learning for Dynamic Bidding in Cognitive Radio Resources,6260844339cbdbaffbadd54ecb1cd62f,http://arxiv.org/abs/0709.2446v1 14591," In this paper, we model the various wireless users in a cognitive radio network as a collection of selfish, autonomous agents that strategically interact in order to acquire the dynamically available spectrum opportunities. Our main focus is on developing solutions for wireless users to successfully compete with each other for the limited and time-varying spectrum opportunities, given the experienced dynamics in the wireless network. We categorize these dynamics into two types: one is the disturbance due to the environment (e.g. wireless channel conditions, source traffic characteristics, etc.) and the other is the impact caused by competing users. To analyze the interactions among users given the environment disturbance, we propose a general stochastic framework for modeling how the competition among users for spectrum opportunities evolves over time. At each stage of the dynamic resource allocation, a central spectrum moderator auctions the available resources and the users strategically bid for the required resources. The joint bid actions affect the resource allocation and hence, the rewards and future strategies of all users. Based on the observed resource allocation and corresponding rewards from previous allocations, we propose a best response learning algorithm that can be deployed by wireless users to improve their bidding policy at each stage. The simulation results show that by deploying the proposed best response learning algorithm, the wireless users can significantly improve their own performance in terms of both the packet loss rate and the incurred cost for the used resources. ",mihaela schaar,,2007.0,,arXiv,Fu2007,True,,arXiv,Not available,Learning for Dynamic Bidding in Cognitive Radio Resources,6260844339cbdbaffbadd54ecb1cd62f,http://arxiv.org/abs/0709.2446v1 14592," We focus on a permutation betting market under parimutuel call auction model where traders bet on the final ranking of n candidates. We present a Proportional Betting mechanism for this market. Our mechanism allows the traders to bet on any subset of the n x n 'candidate-rank' pairs, and rewards them proportionally to the number of pairs that appear in the final outcome. We show that market organizer's decision problem for this mechanism can be formulated as a convex program of polynomial size. More importantly, the formulation yields a set of n x n unique marginal prices that are sufficient to price the bets in this mechanism, and are computable in polynomial-time. The marginal prices reflect the traders' beliefs about the marginal distributions over outcomes. We also propose techniques to compute the joint distribution over n! permutations from these marginal distributions. We show that using a maximum entropy criterion, we can obtain a concise parametric form (with only n x n parameters) for the joint distribution which is defined over an exponentially large state space. We then present an approximation algorithm for computing the parameters of this distribution. In fact, the algorithm addresses the generic problem of finding the maximum entropy distribution over permutations that has a given mean, and may be of independent interest. ",shipra agrawal,,2008.0,,arXiv,Agrawal2008,True,,arXiv,Not available,Parimutuel Betting on Permutations,c6a1c40636a1df3bf2c66a339dcee8ed,http://arxiv.org/abs/0804.2288v1 14593," We focus on a permutation betting market under parimutuel call auction model where traders bet on the final ranking of n candidates. We present a Proportional Betting mechanism for this market. Our mechanism allows the traders to bet on any subset of the n x n 'candidate-rank' pairs, and rewards them proportionally to the number of pairs that appear in the final outcome. We show that market organizer's decision problem for this mechanism can be formulated as a convex program of polynomial size. More importantly, the formulation yields a set of n x n unique marginal prices that are sufficient to price the bets in this mechanism, and are computable in polynomial-time. The marginal prices reflect the traders' beliefs about the marginal distributions over outcomes. We also propose techniques to compute the joint distribution over n! permutations from these marginal distributions. We show that using a maximum entropy criterion, we can obtain a concise parametric form (with only n x n parameters) for the joint distribution which is defined over an exponentially large state space. We then present an approximation algorithm for computing the parameters of this distribution. In fact, the algorithm addresses the generic problem of finding the maximum entropy distribution over permutations that has a given mean, and may be of independent interest. ",zizhuo wang,,2008.0,,arXiv,Agrawal2008,True,,arXiv,Not available,Parimutuel Betting on Permutations,c6a1c40636a1df3bf2c66a339dcee8ed,http://arxiv.org/abs/0804.2288v1 14594," We focus on a permutation betting market under parimutuel call auction model where traders bet on the final ranking of n candidates. We present a Proportional Betting mechanism for this market. Our mechanism allows the traders to bet on any subset of the n x n 'candidate-rank' pairs, and rewards them proportionally to the number of pairs that appear in the final outcome. We show that market organizer's decision problem for this mechanism can be formulated as a convex program of polynomial size. More importantly, the formulation yields a set of n x n unique marginal prices that are sufficient to price the bets in this mechanism, and are computable in polynomial-time. The marginal prices reflect the traders' beliefs about the marginal distributions over outcomes. We also propose techniques to compute the joint distribution over n! permutations from these marginal distributions. We show that using a maximum entropy criterion, we can obtain a concise parametric form (with only n x n parameters) for the joint distribution which is defined over an exponentially large state space. We then present an approximation algorithm for computing the parameters of this distribution. In fact, the algorithm addresses the generic problem of finding the maximum entropy distribution over permutations that has a given mean, and may be of independent interest. ",yinyu ye,,2008.0,,arXiv,Agrawal2008,True,,arXiv,Not available,Parimutuel Betting on Permutations,c6a1c40636a1df3bf2c66a339dcee8ed,http://arxiv.org/abs/0804.2288v1 14595," Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders arrive sequentially and report which slots they are interested in. The seller must decide immediately whether or not to grant a reservation. Our model allows a seller to accept reservations, but possibly cancel the allocations later and pay the bidder a cancellation compensation (bump payment). Our main result is an online mechanism to derive prices and bump payments that is efficient to implement. This mechanism has many desirable properties. It is individually rational; winners have an incentive to be honest and bidding one's true value dominates any lower bid. Our mechanism's efficiency is within a constant fraction of the a posteriori optimally efficient solution. Its revenue is within a constant fraction of the a posteriori revenue of the Vickrey-Clarke-Groves mechanism. Our results make no assumptions about the order of arrival of bids or the value distribution of bidders and still hold if the items for sale are elements of a matroid, a more general setting than slot allocation. ",florin constantin,,2008.0,,arXiv,Constantin2008,True,,arXiv,Not available,Online Ad Slotting With Cancellations,7b554b6f6162c211c52dc8a78d42bbf5,http://arxiv.org/abs/0805.1213v1 14596," We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided among the participants. Potential contracts and their surplus are represented by weighted edges in our bipartite network. Each agent in the market is additionally limited by a capacity representing the number of contracts which he or she may undertake. When all agents are limited to just one contract each, prior research applied natural generalizations of the Nash bargaining solution to the networked setting, defined the new solution concepts of stable and balanced, and characterized the resulting bargaining outcomes. We simplify and generalize these results to a setting in which participants in only one side of the market are limited to one contract each. The heart of our results uses a linear-programming formulation to establish a novel connection between well-studied cooperative game theory concepts (such as core and prekernel) and the solution concepts of stable and balanced defined for the bargaining games. This immediately implies one can take advantage of the results and algorithms in cooperative game theory to reproduce results such as those of Azar et al. [1] and Kleinberg and Tardos [29] and also generalize them to our setting. The cooperative-game-theoretic connection also inspires us to refine our solution space using standard solution concepts from that literature such as nucleolus and lexicographic kernel. The nucleolus is particularly attractive as it is unique, always exists, and is supported by experimental data in the network bargaining literature. Guided by algorithms from cooperative game theory, we show how to compute the nucleolus by pruning and iteratively solving a natural linear-programming formulation. ",mohammadtaghi hajiaghayi,,2010.0,,arXiv,Bateni2010,True,,arXiv,Not available,The cooperative game theory foundations of network bargaining games,8db87f332027cabeae7cfbf01703dba6,http://arxiv.org/abs/1004.4317v1 14597," Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders arrive sequentially and report which slots they are interested in. The seller must decide immediately whether or not to grant a reservation. Our model allows a seller to accept reservations, but possibly cancel the allocations later and pay the bidder a cancellation compensation (bump payment). Our main result is an online mechanism to derive prices and bump payments that is efficient to implement. This mechanism has many desirable properties. It is individually rational; winners have an incentive to be honest and bidding one's true value dominates any lower bid. Our mechanism's efficiency is within a constant fraction of the a posteriori optimally efficient solution. Its revenue is within a constant fraction of the a posteriori revenue of the Vickrey-Clarke-Groves mechanism. Our results make no assumptions about the order of arrival of bids or the value distribution of bidders and still hold if the items for sale are elements of a matroid, a more general setting than slot allocation. ",jon feldman,,2008.0,,arXiv,Constantin2008,True,,arXiv,Not available,Online Ad Slotting With Cancellations,7b554b6f6162c211c52dc8a78d42bbf5,http://arxiv.org/abs/0805.1213v1 14598," Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders arrive sequentially and report which slots they are interested in. The seller must decide immediately whether or not to grant a reservation. Our model allows a seller to accept reservations, but possibly cancel the allocations later and pay the bidder a cancellation compensation (bump payment). Our main result is an online mechanism to derive prices and bump payments that is efficient to implement. This mechanism has many desirable properties. It is individually rational; winners have an incentive to be honest and bidding one's true value dominates any lower bid. Our mechanism's efficiency is within a constant fraction of the a posteriori optimally efficient solution. Its revenue is within a constant fraction of the a posteriori revenue of the Vickrey-Clarke-Groves mechanism. Our results make no assumptions about the order of arrival of bids or the value distribution of bidders and still hold if the items for sale are elements of a matroid, a more general setting than slot allocation. ",s. muthukrishnan,,2008.0,,arXiv,Constantin2008,True,,arXiv,Not available,Online Ad Slotting With Cancellations,7b554b6f6162c211c52dc8a78d42bbf5,http://arxiv.org/abs/0805.1213v1 14599," Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders arrive sequentially and report which slots they are interested in. The seller must decide immediately whether or not to grant a reservation. Our model allows a seller to accept reservations, but possibly cancel the allocations later and pay the bidder a cancellation compensation (bump payment). Our main result is an online mechanism to derive prices and bump payments that is efficient to implement. This mechanism has many desirable properties. It is individually rational; winners have an incentive to be honest and bidding one's true value dominates any lower bid. Our mechanism's efficiency is within a constant fraction of the a posteriori optimally efficient solution. Its revenue is within a constant fraction of the a posteriori revenue of the Vickrey-Clarke-Groves mechanism. Our results make no assumptions about the order of arrival of bids or the value distribution of bidders and still hold if the items for sale are elements of a matroid, a more general setting than slot allocation. ",martin pal,,2008.0,,arXiv,Constantin2008,True,,arXiv,Not available,Online Ad Slotting With Cancellations,7b554b6f6162c211c52dc8a78d42bbf5,http://arxiv.org/abs/0805.1213v1 14600," A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents' valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents' total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class. ",krzysztof apt,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Welfare Undominated Groves Mechanisms,bc9b84fcf7794b764a9db27db147e759,http://arxiv.org/abs/0810.2865v1 14601," A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents' valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents' total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class. ",vincent conitzer,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Welfare Undominated Groves Mechanisms,bc9b84fcf7794b764a9db27db147e759,http://arxiv.org/abs/0810.2865v1 14602," A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents' valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents' total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class. ",mingyu guo,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Welfare Undominated Groves Mechanisms,bc9b84fcf7794b764a9db27db147e759,http://arxiv.org/abs/0810.2865v1 14603," A common objective in mechanism design is to choose the outcome (for example, allocation of resources) that maximizes the sum of the agents' valuations, without introducing incentives for agents to misreport their preferences. The class of Groves mechanisms achieves this; however, these mechanisms require the agents to make payments, thereby reducing the agents' total welfare. In this paper we introduce a measure for comparing two mechanisms with respect to the final welfare they generate. This measure induces a partial order on mechanisms and we study the question of finding minimal elements with respect to this partial order. In particular, we say a non-deficit Groves mechanism is welfare undominated if there exists no other non-deficit Groves mechanism that always has a smaller or equal sum of payments. We focus on two domains: (i) auctions with multiple identical units and unit-demand bidders, and (ii) mechanisms for public project problems. In the first domain we analytically characterize all welfare undominated Groves mechanisms that are anonymous and have linear payment functions, by showing that the family of optimal-in-expectation linear redistribution mechanisms, which were introduced in [6] and include the Bailey-Cavallo mechanism [1,2], coincides with the family of welfare undominated Groves mechanisms that are anonymous and linear in the setting we study. In the second domain we show that the classic VCG (Clarke) mechanism is welfare undominated for the class of public project problems with equal participation costs, but is not undominated for a more general class. ",evangelos markakis,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Welfare Undominated Groves Mechanisms,bc9b84fcf7794b764a9db27db147e759,http://arxiv.org/abs/0810.2865v1 14604," We study \emph{combinatorial procurement auctions}, where a buyer with a valuation function $v$ and budget $B$ wishes to buy a set of items. Each item $i$ has a cost $c_i$ and the buyer is interested in a set $S$ that maximizes $v(S)$ subject to $\Sigma_{i\in S}c_i\leq B$. Special cases of combinatorial procurement auctions are classical problems from submodular optimization. In particular, when the costs are all equal (\emph{cardinality constraint}), a classic result by Nemhauser et al shows that the greedy algorithm provides an $\frac e {e-1}$ approximation. Motivated by many papers that utilize demand queries to elicit the preferences of agents in economic settings, we develop algorithms that guarantee improved approximation ratios in the presence of demand oracles. We are able to break the $\frac e {e-1}$ barrier: we present algorithms that use only polynomially many demand queries and have approximation ratios of $\frac 9 8+\epsilon$ for the general problem and $\frac 9 8$ for maximization subject to a cardinality constraint. We also consider the more general class of subadditive valuations. We present algorithms that obtain an approximation ratio of $2+\epsilon$ for the general problem and 2 for maximization subject to a cardinality constraint. We guarantee these approximation ratios even when the valuations are non-monotone. We show that these ratios are essentially optimal, in the sense that for any constant $\epsilon>0$, obtaining an approximation ratio of $2-\epsilon$ requires exponentially many demand queries. ",ashwinkumar badanidiyuru,,2011.0,,arXiv,Badanidiyuru2011,True,,arXiv,Not available,Optimization with Demand Oracles,996ebcdb604a791f0e4c45cb1a687b9e,http://arxiv.org/abs/1107.2869v1 14605," We study \emph{combinatorial procurement auctions}, where a buyer with a valuation function $v$ and budget $B$ wishes to buy a set of items. Each item $i$ has a cost $c_i$ and the buyer is interested in a set $S$ that maximizes $v(S)$ subject to $\Sigma_{i\in S}c_i\leq B$. Special cases of combinatorial procurement auctions are classical problems from submodular optimization. In particular, when the costs are all equal (\emph{cardinality constraint}), a classic result by Nemhauser et al shows that the greedy algorithm provides an $\frac e {e-1}$ approximation. Motivated by many papers that utilize demand queries to elicit the preferences of agents in economic settings, we develop algorithms that guarantee improved approximation ratios in the presence of demand oracles. We are able to break the $\frac e {e-1}$ barrier: we present algorithms that use only polynomially many demand queries and have approximation ratios of $\frac 9 8+\epsilon$ for the general problem and $\frac 9 8$ for maximization subject to a cardinality constraint. We also consider the more general class of subadditive valuations. We present algorithms that obtain an approximation ratio of $2+\epsilon$ for the general problem and 2 for maximization subject to a cardinality constraint. We guarantee these approximation ratios even when the valuations are non-monotone. We show that these ratios are essentially optimal, in the sense that for any constant $\epsilon>0$, obtaining an approximation ratio of $2-\epsilon$ requires exponentially many demand queries. ",shahar dobzinski,,2011.0,,arXiv,Badanidiyuru2011,True,,arXiv,Not available,Optimization with Demand Oracles,996ebcdb604a791f0e4c45cb1a687b9e,http://arxiv.org/abs/1107.2869v1 14606," We study \emph{combinatorial procurement auctions}, where a buyer with a valuation function $v$ and budget $B$ wishes to buy a set of items. Each item $i$ has a cost $c_i$ and the buyer is interested in a set $S$ that maximizes $v(S)$ subject to $\Sigma_{i\in S}c_i\leq B$. Special cases of combinatorial procurement auctions are classical problems from submodular optimization. In particular, when the costs are all equal (\emph{cardinality constraint}), a classic result by Nemhauser et al shows that the greedy algorithm provides an $\frac e {e-1}$ approximation. Motivated by many papers that utilize demand queries to elicit the preferences of agents in economic settings, we develop algorithms that guarantee improved approximation ratios in the presence of demand oracles. We are able to break the $\frac e {e-1}$ barrier: we present algorithms that use only polynomially many demand queries and have approximation ratios of $\frac 9 8+\epsilon$ for the general problem and $\frac 9 8$ for maximization subject to a cardinality constraint. We also consider the more general class of subadditive valuations. We present algorithms that obtain an approximation ratio of $2+\epsilon$ for the general problem and 2 for maximization subject to a cardinality constraint. We guarantee these approximation ratios even when the valuations are non-monotone. We show that these ratios are essentially optimal, in the sense that for any constant $\epsilon>0$, obtaining an approximation ratio of $2-\epsilon$ requires exponentially many demand queries. ",sigal oren,,2011.0,,arXiv,Badanidiyuru2011,True,,arXiv,Not available,Optimization with Demand Oracles,996ebcdb604a791f0e4c45cb1a687b9e,http://arxiv.org/abs/1107.2869v1 14607," We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided among the participants. Potential contracts and their surplus are represented by weighted edges in our bipartite network. Each agent in the market is additionally limited by a capacity representing the number of contracts which he or she may undertake. When all agents are limited to just one contract each, prior research applied natural generalizations of the Nash bargaining solution to the networked setting, defined the new solution concepts of stable and balanced, and characterized the resulting bargaining outcomes. We simplify and generalize these results to a setting in which participants in only one side of the market are limited to one contract each. The heart of our results uses a linear-programming formulation to establish a novel connection between well-studied cooperative game theory concepts (such as core and prekernel) and the solution concepts of stable and balanced defined for the bargaining games. This immediately implies one can take advantage of the results and algorithms in cooperative game theory to reproduce results such as those of Azar et al. [1] and Kleinberg and Tardos [29] and also generalize them to our setting. The cooperative-game-theoretic connection also inspires us to refine our solution space using standard solution concepts from that literature such as nucleolus and lexicographic kernel. The nucleolus is particularly attractive as it is unique, always exists, and is supported by experimental data in the network bargaining literature. Guided by algorithms from cooperative game theory, we show how to compute the nucleolus by pruning and iteratively solving a natural linear-programming formulation. ",nicole immorlica,,2010.0,,arXiv,Bateni2010,True,,arXiv,Not available,The cooperative game theory foundations of network bargaining games,8db87f332027cabeae7cfbf01703dba6,http://arxiv.org/abs/1004.4317v1 14608," Combinatorial Auctions are a central problem in Algorithmic Mechanism Design: pricing and allocating goods to buyers with complex preferences in order to maximize some desired objective (e.g., social welfare, revenue, or profit). The problem has been well-studied in the case of limited supply (one copy of each item), and in the case of digital goods (the seller can produce additional copies at no cost). Yet in the case of resources---oil, labor, computing cycles, etc.---neither of these abstractions is just right: additional supplies of these resources can be found, but at increasing difficulty (marginal cost) as resources are depleted. In this work, we initiate the study of the algorithmic mechanism design problem of combinatorial pricing under increasing marginal cost. The goal is to sell these goods to buyers with unknown and arbitrary combinatorial valuation functions to maximize either the social welfare, or the seller's profit; specifically we focus on the setting of \emph{posted item prices} with buyers arriving online. We give algorithms that achieve {\em constant factor} approximations for a class of natural cost functions---linear, low-degree polynomial, logarithmic---and that give logarithmic approximations for more general increasing marginal cost functions (along with a necessary additive loss). We show that these bounds are essentially best possible for these settings. ",avrim blum,,2011.0,,arXiv,Blum2011,True,,arXiv,Not available,Welfare and Profit Maximization with Production Costs,a29cb34d961153cc92e37086219a046a,http://arxiv.org/abs/1110.4992v1 14609," Combinatorial Auctions are a central problem in Algorithmic Mechanism Design: pricing and allocating goods to buyers with complex preferences in order to maximize some desired objective (e.g., social welfare, revenue, or profit). The problem has been well-studied in the case of limited supply (one copy of each item), and in the case of digital goods (the seller can produce additional copies at no cost). Yet in the case of resources---oil, labor, computing cycles, etc.---neither of these abstractions is just right: additional supplies of these resources can be found, but at increasing difficulty (marginal cost) as resources are depleted. In this work, we initiate the study of the algorithmic mechanism design problem of combinatorial pricing under increasing marginal cost. The goal is to sell these goods to buyers with unknown and arbitrary combinatorial valuation functions to maximize either the social welfare, or the seller's profit; specifically we focus on the setting of \emph{posted item prices} with buyers arriving online. We give algorithms that achieve {\em constant factor} approximations for a class of natural cost functions---linear, low-degree polynomial, logarithmic---and that give logarithmic approximations for more general increasing marginal cost functions (along with a necessary additive loss). We show that these bounds are essentially best possible for these settings. ",anupam gupta,,2011.0,,arXiv,Blum2011,True,,arXiv,Not available,Welfare and Profit Maximization with Production Costs,a29cb34d961153cc92e37086219a046a,http://arxiv.org/abs/1110.4992v1 14610," Combinatorial Auctions are a central problem in Algorithmic Mechanism Design: pricing and allocating goods to buyers with complex preferences in order to maximize some desired objective (e.g., social welfare, revenue, or profit). The problem has been well-studied in the case of limited supply (one copy of each item), and in the case of digital goods (the seller can produce additional copies at no cost). Yet in the case of resources---oil, labor, computing cycles, etc.---neither of these abstractions is just right: additional supplies of these resources can be found, but at increasing difficulty (marginal cost) as resources are depleted. In this work, we initiate the study of the algorithmic mechanism design problem of combinatorial pricing under increasing marginal cost. The goal is to sell these goods to buyers with unknown and arbitrary combinatorial valuation functions to maximize either the social welfare, or the seller's profit; specifically we focus on the setting of \emph{posted item prices} with buyers arriving online. We give algorithms that achieve {\em constant factor} approximations for a class of natural cost functions---linear, low-degree polynomial, logarithmic---and that give logarithmic approximations for more general increasing marginal cost functions (along with a necessary additive loss). We show that these bounds are essentially best possible for these settings. ",yishay mansour,,2011.0,,arXiv,Blum2011,True,,arXiv,Not available,Welfare and Profit Maximization with Production Costs,a29cb34d961153cc92e37086219a046a,http://arxiv.org/abs/1110.4992v1 14611," Combinatorial Auctions are a central problem in Algorithmic Mechanism Design: pricing and allocating goods to buyers with complex preferences in order to maximize some desired objective (e.g., social welfare, revenue, or profit). The problem has been well-studied in the case of limited supply (one copy of each item), and in the case of digital goods (the seller can produce additional copies at no cost). Yet in the case of resources---oil, labor, computing cycles, etc.---neither of these abstractions is just right: additional supplies of these resources can be found, but at increasing difficulty (marginal cost) as resources are depleted. In this work, we initiate the study of the algorithmic mechanism design problem of combinatorial pricing under increasing marginal cost. The goal is to sell these goods to buyers with unknown and arbitrary combinatorial valuation functions to maximize either the social welfare, or the seller's profit; specifically we focus on the setting of \emph{posted item prices} with buyers arriving online. We give algorithms that achieve {\em constant factor} approximations for a class of natural cost functions---linear, low-degree polynomial, logarithmic---and that give logarithmic approximations for more general increasing marginal cost functions (along with a necessary additive loss). We show that these bounds are essentially best possible for these settings. ",ankit sharma,,2011.0,,arXiv,Blum2011,True,,arXiv,Not available,Welfare and Profit Maximization with Production Costs,a29cb34d961153cc92e37086219a046a,http://arxiv.org/abs/1110.4992v1 14612," How does one allocate a collection of resources to a set of strategic agents in a fair and efficient manner without using money? For in many scenarios it is not feasible to use money to compensate agents for otherwise unsatisfactory outcomes. This paper studies this question, looking at both fairness and efficiency measures. We employ the proportionally fair solution, which is a well-known fairness concept for money-free settings. But although finding a proportionally fair solution is computationally tractable, it cannot be implemented in a truthful fashion. Consequently, we seek approximate solutions. We give several truthful mechanisms which achieve proportional fairness in an approximate sense. We use a strong notion of approximation, requiring the mechanism to give each agent a good approximation of its proportionally fair utility. In particular, one of our mechanisms provides a better and better approximation factor as the minimum demand for every good increases. A motivating example is provided by the massive privatization auction in the Czech republic in the early 90s. With regard to efficiency, prior work has shown a lower bound of 0.5 on the approximation factor of any swap-dictatorial mechanism approximating a social welfare measure even for the two agents and multiple goods case. We surpass this lower bound by designing a non-swap-dictatorial mechanism for this case. Interestingly, the new mechanism builds on the notion of proportional fairness. ",richard cole,,2012.0,,arXiv,Cole2012,True,,arXiv,Not available,"Truthfulness, Proportional Fairness, and Efficiency",3674450af0d789c6866b2f0bfcabb338,http://arxiv.org/abs/1203.4627v2 14613," How does one allocate a collection of resources to a set of strategic agents in a fair and efficient manner without using money? For in many scenarios it is not feasible to use money to compensate agents for otherwise unsatisfactory outcomes. This paper studies this question, looking at both fairness and efficiency measures. We employ the proportionally fair solution, which is a well-known fairness concept for money-free settings. But although finding a proportionally fair solution is computationally tractable, it cannot be implemented in a truthful fashion. Consequently, we seek approximate solutions. We give several truthful mechanisms which achieve proportional fairness in an approximate sense. We use a strong notion of approximation, requiring the mechanism to give each agent a good approximation of its proportionally fair utility. In particular, one of our mechanisms provides a better and better approximation factor as the minimum demand for every good increases. A motivating example is provided by the massive privatization auction in the Czech republic in the early 90s. With regard to efficiency, prior work has shown a lower bound of 0.5 on the approximation factor of any swap-dictatorial mechanism approximating a social welfare measure even for the two agents and multiple goods case. We surpass this lower bound by designing a non-swap-dictatorial mechanism for this case. Interestingly, the new mechanism builds on the notion of proportional fairness. ",vasilis gkatzelis,,2012.0,,arXiv,Cole2012,True,,arXiv,Not available,"Truthfulness, Proportional Fairness, and Efficiency",3674450af0d789c6866b2f0bfcabb338,http://arxiv.org/abs/1203.4627v2 14614," How does one allocate a collection of resources to a set of strategic agents in a fair and efficient manner without using money? For in many scenarios it is not feasible to use money to compensate agents for otherwise unsatisfactory outcomes. This paper studies this question, looking at both fairness and efficiency measures. We employ the proportionally fair solution, which is a well-known fairness concept for money-free settings. But although finding a proportionally fair solution is computationally tractable, it cannot be implemented in a truthful fashion. Consequently, we seek approximate solutions. We give several truthful mechanisms which achieve proportional fairness in an approximate sense. We use a strong notion of approximation, requiring the mechanism to give each agent a good approximation of its proportionally fair utility. In particular, one of our mechanisms provides a better and better approximation factor as the minimum demand for every good increases. A motivating example is provided by the massive privatization auction in the Czech republic in the early 90s. With regard to efficiency, prior work has shown a lower bound of 0.5 on the approximation factor of any swap-dictatorial mechanism approximating a social welfare measure even for the two agents and multiple goods case. We surpass this lower bound by designing a non-swap-dictatorial mechanism for this case. Interestingly, the new mechanism builds on the notion of proportional fairness. ",gagan goel,,2012.0,,arXiv,Cole2012,True,,arXiv,Not available,"Truthfulness, Proportional Fairness, and Efficiency",3674450af0d789c6866b2f0bfcabb338,http://arxiv.org/abs/1203.4627v2 14615," Crowd sensing is a new paradigm which leverages the pervasive smartphones to efficiently collect sensing data, enabling numerous novel applications. To achieve good service quality for a crowd sensing application, incentive mechanisms are indispensable to attract more user participation. Most of existing mechanisms only apply for the offline scenario, where the system has full information about the users' sensing profiles, i.e., a set of locations or mobility as well as the type of smartphones used, and their true costs. On the contrary, we focus on a more real scenario where users with their own privacy concerns arrive one by one online in a random order. We model the problem as a privacy-respecting online auction in which users are willing to negotiate access to certain private information and submit their sensing profiles satisfying privacy concerns to the platform (the provider of crowd sensing applications) over time, and the platform aims to the total total value of the services provided by selected users under a budget constraint. We then design two online mechanisms for a budgeted crowd sensing application, satisfying the computational efficiency, individual rationality, budget feasibility, truthfulness, consumer sovereignty, constant competitiveness and privacy concerns. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our online mechanisms. ",jiajun sun,,2013.0,,arXiv,Sun2013,True,,arXiv,Not available,"How Much Should I Pay for Privacy Concerns in Truthful Online Crowd Sensing?",7c7638ef542f5c6f14108dd28de48982,http://arxiv.org/abs/1310.7452v5 14616," The real-time bidding (RTB), aka programmatic buying, has recently become the fastest growing area in online advertising. Instead of bulking buying and inventory-centric buying, RTB mimics stock exchanges and utilises computer algorithms to automatically buy and sell ads in real-time; It uses per impression context and targets the ads to specific people based on data about them, and hence dramatically increases the effectiveness of display advertising. In this paper, we provide an empirical analysis and measurement of a production ad exchange. Using the data sampled from both demand and supply side, we aim to provide first-hand insights into the emerging new impression selling infrastructure and its bidding behaviours, and help identifying research and design issues in such systems. From our study, we observed that periodic patterns occur in various statistics including impressions, clicks, bids, and conversion rates (both post-view and post-click), which suggest time-dependent models would be appropriate for capturing the repeated patterns in RTB. We also found that despite the claimed second price auction, the first price payment in fact is accounted for 55.4% of total cost due to the arrangement of the soft floor price. As such, we argue that the setting of soft floor price in the current RTB systems puts advertisers in a less favourable position. Furthermore, our analysis on the conversation rates shows that the current bidding strategy is far less optimal, indicating the significant needs for optimisation algorithms incorporating the facts such as the temporal behaviours, the frequency and recency of the ad displays, which have not been well considered in the past. ",shuai yuan,,2013.0,,arXiv,Yuan2013,True,,arXiv,Not available,Real-time Bidding for Online Advertising: Measurement and Analysis,e3077419c9b17a88212e1dabd9814e1f,http://arxiv.org/abs/1306.6542v1 14617," The real-time bidding (RTB), aka programmatic buying, has recently become the fastest growing area in online advertising. Instead of bulking buying and inventory-centric buying, RTB mimics stock exchanges and utilises computer algorithms to automatically buy and sell ads in real-time; It uses per impression context and targets the ads to specific people based on data about them, and hence dramatically increases the effectiveness of display advertising. In this paper, we provide an empirical analysis and measurement of a production ad exchange. Using the data sampled from both demand and supply side, we aim to provide first-hand insights into the emerging new impression selling infrastructure and its bidding behaviours, and help identifying research and design issues in such systems. From our study, we observed that periodic patterns occur in various statistics including impressions, clicks, bids, and conversion rates (both post-view and post-click), which suggest time-dependent models would be appropriate for capturing the repeated patterns in RTB. We also found that despite the claimed second price auction, the first price payment in fact is accounted for 55.4% of total cost due to the arrangement of the soft floor price. As such, we argue that the setting of soft floor price in the current RTB systems puts advertisers in a less favourable position. Furthermore, our analysis on the conversation rates shows that the current bidding strategy is far less optimal, indicating the significant needs for optimisation algorithms incorporating the facts such as the temporal behaviours, the frequency and recency of the ad displays, which have not been well considered in the past. ",jun wang,,2013.0,,arXiv,Yuan2013,True,,arXiv,Not available,Real-time Bidding for Online Advertising: Measurement and Analysis,e3077419c9b17a88212e1dabd9814e1f,http://arxiv.org/abs/1306.6542v1 14618," We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided among the participants. Potential contracts and their surplus are represented by weighted edges in our bipartite network. Each agent in the market is additionally limited by a capacity representing the number of contracts which he or she may undertake. When all agents are limited to just one contract each, prior research applied natural generalizations of the Nash bargaining solution to the networked setting, defined the new solution concepts of stable and balanced, and characterized the resulting bargaining outcomes. We simplify and generalize these results to a setting in which participants in only one side of the market are limited to one contract each. The heart of our results uses a linear-programming formulation to establish a novel connection between well-studied cooperative game theory concepts (such as core and prekernel) and the solution concepts of stable and balanced defined for the bargaining games. This immediately implies one can take advantage of the results and algorithms in cooperative game theory to reproduce results such as those of Azar et al. [1] and Kleinberg and Tardos [29] and also generalize them to our setting. The cooperative-game-theoretic connection also inspires us to refine our solution space using standard solution concepts from that literature such as nucleolus and lexicographic kernel. The nucleolus is particularly attractive as it is unique, always exists, and is supported by experimental data in the network bargaining literature. Guided by algorithms from cooperative game theory, we show how to compute the nucleolus by pruning and iteratively solving a natural linear-programming formulation. ",hamid mahini,,2010.0,,arXiv,Bateni2010,True,,arXiv,Not available,The cooperative game theory foundations of network bargaining games,8db87f332027cabeae7cfbf01703dba6,http://arxiv.org/abs/1004.4317v1 14619," The real-time bidding (RTB), aka programmatic buying, has recently become the fastest growing area in online advertising. Instead of bulking buying and inventory-centric buying, RTB mimics stock exchanges and utilises computer algorithms to automatically buy and sell ads in real-time; It uses per impression context and targets the ads to specific people based on data about them, and hence dramatically increases the effectiveness of display advertising. In this paper, we provide an empirical analysis and measurement of a production ad exchange. Using the data sampled from both demand and supply side, we aim to provide first-hand insights into the emerging new impression selling infrastructure and its bidding behaviours, and help identifying research and design issues in such systems. From our study, we observed that periodic patterns occur in various statistics including impressions, clicks, bids, and conversion rates (both post-view and post-click), which suggest time-dependent models would be appropriate for capturing the repeated patterns in RTB. We also found that despite the claimed second price auction, the first price payment in fact is accounted for 55.4% of total cost due to the arrangement of the soft floor price. As such, we argue that the setting of soft floor price in the current RTB systems puts advertisers in a less favourable position. Furthermore, our analysis on the conversation rates shows that the current bidding strategy is far less optimal, indicating the significant needs for optimisation algorithms incorporating the facts such as the temporal behaviours, the frequency and recency of the ad displays, which have not been well considered in the past. ",xiaoxue zhao,,2013.0,,arXiv,Yuan2013,True,,arXiv,Not available,Real-time Bidding for Online Advertising: Measurement and Analysis,e3077419c9b17a88212e1dabd9814e1f,http://arxiv.org/abs/1306.6542v1 14620," Scrip, or artificial currency, is a useful tool for designing systems that are robust to selfish behavior by users. However, it also introduces problems for a system designer, such as how the amount of money in the system should be set. In this paper, the effect of varying the total amount of money in a scrip system on efficiency (i.e., social welfare---the total utility of all the agents in the system) is analyzed, and it is shown that by maintaining the appropriate ratio between the total amount of money and the number of agents, efficiency is maximized. This ratio can be found by increasing the money supply to just below the point that the system would experience a ""monetary crash,"" where money is sufficiently devalued that no agent is willing to perform a service. The implications of the presence of altruists, hoarders, sybils, and collusion on the performance of the system are examined. Approaches are discussed to identify the strategies and types of agents. ",ian kash,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,"Optimizing Scrip Systems: Crashes, Altruists, Hoarders, Sybils and Collusion",bff29a9c5e5ae7263772127a7f33eaf9,http://arxiv.org/abs/1204.3494v1 14621," Scrip, or artificial currency, is a useful tool for designing systems that are robust to selfish behavior by users. However, it also introduces problems for a system designer, such as how the amount of money in the system should be set. In this paper, the effect of varying the total amount of money in a scrip system on efficiency (i.e., social welfare---the total utility of all the agents in the system) is analyzed, and it is shown that by maintaining the appropriate ratio between the total amount of money and the number of agents, efficiency is maximized. This ratio can be found by increasing the money supply to just below the point that the system would experience a ""monetary crash,"" where money is sufficiently devalued that no agent is willing to perform a service. The implications of the presence of altruists, hoarders, sybils, and collusion on the performance of the system are examined. Approaches are discussed to identify the strategies and types of agents. ",eric friedman,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,"Optimizing Scrip Systems: Crashes, Altruists, Hoarders, Sybils and Collusion",bff29a9c5e5ae7263772127a7f33eaf9,http://arxiv.org/abs/1204.3494v1 14622," Scrip, or artificial currency, is a useful tool for designing systems that are robust to selfish behavior by users. However, it also introduces problems for a system designer, such as how the amount of money in the system should be set. In this paper, the effect of varying the total amount of money in a scrip system on efficiency (i.e., social welfare---the total utility of all the agents in the system) is analyzed, and it is shown that by maintaining the appropriate ratio between the total amount of money and the number of agents, efficiency is maximized. This ratio can be found by increasing the money supply to just below the point that the system would experience a ""monetary crash,"" where money is sufficiently devalued that no agent is willing to perform a service. The implications of the presence of altruists, hoarders, sybils, and collusion on the performance of the system are examined. Approaches are discussed to identify the strategies and types of agents. ",joseph halpern,,2012.0,,arXiv,Kash2012,True,,arXiv,Not available,"Optimizing Scrip Systems: Crashes, Altruists, Hoarders, Sybils and Collusion",bff29a9c5e5ae7263772127a7f33eaf9,http://arxiv.org/abs/1204.3494v1 14623," A simple and general formulation of the quantum game theory is presented, accommodating all possible strategies in the Hilbert space for the first time. The theory is solvable for the two strategy quantum game, which is shown to be equivalent to a family of classical games supplemented by quantum interference. Our formulation gives a clear perspective to understand why and how quantum strategies outmaneuver classical strategies. It also reveals novel aspects of quantum games such as the stone-scissor-paper phase sub-game and the fluctuation-induced moderation. ",taksu cheon,,2005.0,10.1016/j.physleta.2005.08.066,Physics Letters A 348 (2006) 147-152,Cheon2005,True,,arXiv,Not available,Classical and Quantum Contents of Solvable Game Theory on Hilbert Space,9427ef82fe07dacaead70e6fc573bded,http://arxiv.org/abs/quant-ph/0503233v2 14624," A simple and general formulation of the quantum game theory is presented, accommodating all possible strategies in the Hilbert space for the first time. The theory is solvable for the two strategy quantum game, which is shown to be equivalent to a family of classical games supplemented by quantum interference. Our formulation gives a clear perspective to understand why and how quantum strategies outmaneuver classical strategies. It also reveals novel aspects of quantum games such as the stone-scissor-paper phase sub-game and the fluctuation-induced moderation. ",izumi tsutsui,,2005.0,10.1016/j.physleta.2005.08.066,Physics Letters A 348 (2006) 147-152,Cheon2005,True,,arXiv,Not available,Classical and Quantum Contents of Solvable Game Theory on Hilbert Space,9427ef82fe07dacaead70e6fc573bded,http://arxiv.org/abs/quant-ph/0503233v2 14625," Attention to the very physical aspects of information characterizes the current research in quantum computation, quantum cryptography and quantum communication. In most of the cases quantum description of the system provides advantages over the classical approach. Game theory, the study of decision making in conflict situation has already been extended to the quantum domain. We would like to review the latest development in quantum game theory that is relevant to information processing. We will begin by illustrating the general idea of a quantum game and methods of gaining an advantage over ""classical opponent"". Then we review the most important game theoretical aspects of quantum information processing. On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. The idea of quantum artificial intelligence is explained. ",edward piotrowski,,2005.0,,arXiv,Piotrowski2005,True,,arXiv,Not available,Quantum Games and Programmable Quantum Systems,962b8510e0edf478f4ce1578c532b762,http://arxiv.org/abs/quant-ph/0504010v2 14626," Attention to the very physical aspects of information characterizes the current research in quantum computation, quantum cryptography and quantum communication. In most of the cases quantum description of the system provides advantages over the classical approach. Game theory, the study of decision making in conflict situation has already been extended to the quantum domain. We would like to review the latest development in quantum game theory that is relevant to information processing. We will begin by illustrating the general idea of a quantum game and methods of gaining an advantage over ""classical opponent"". Then we review the most important game theoretical aspects of quantum information processing. On grounds of the discussed material, we reason about possible future development of quantum game theory and its impact on information processing and the emerging information society. The idea of quantum artificial intelligence is explained. ",jan sladkowski,,2005.0,,arXiv,Piotrowski2005,True,,arXiv,Not available,Quantum Games and Programmable Quantum Systems,962b8510e0edf478f4ce1578c532b762,http://arxiv.org/abs/quant-ph/0504010v2 14627," We present a novel formulation of quantum game theory based on the Schmidt decomposition, which has the merit that the entanglement of quantum strategies is manifestly quantified. We apply this formulation to 2-player, 2-strategy symmetric games and obtain a complete set of quantum Nash equilibria. Apart from those available with the maximal entanglement, these quantum Nash equilibria are extensions of the Nash equilibria in classical game theory. The phase structure of the equilibria is determined for all values of entanglement, and thereby the possibility of resolving the dilemmas by entanglement in the game of Chicken, the Battle of the Sexes, the Prisoners' Dilemma, and the Stag Hunt, is examined. We find that entanglement transforms these dilemmas with each other but cannot resolve them, except in the Stag Hunt game where the dilemma can be alleviated to a certain degree. ",tsubasa ichikawa,,2007.0,10.1088/1751-8113/41/13/135303,"Journal of Physics A: Mathematical and Theoretical 41 (2008) 135303 (29p)",Ichikawa2007,True,,arXiv,Not available,Quantum Game Theory Based on the Schmidt Decomposition,09a93d804275bcb36058f3468a985e3a,http://arxiv.org/abs/quant-ph/0702167v2 14628," We present a novel formulation of quantum game theory based on the Schmidt decomposition, which has the merit that the entanglement of quantum strategies is manifestly quantified. We apply this formulation to 2-player, 2-strategy symmetric games and obtain a complete set of quantum Nash equilibria. Apart from those available with the maximal entanglement, these quantum Nash equilibria are extensions of the Nash equilibria in classical game theory. The phase structure of the equilibria is determined for all values of entanglement, and thereby the possibility of resolving the dilemmas by entanglement in the game of Chicken, the Battle of the Sexes, the Prisoners' Dilemma, and the Stag Hunt, is examined. We find that entanglement transforms these dilemmas with each other but cannot resolve them, except in the Stag Hunt game where the dilemma can be alleviated to a certain degree. ",izumi tsutsui,,2007.0,10.1088/1751-8113/41/13/135303,"Journal of Physics A: Mathematical and Theoretical 41 (2008) 135303 (29p)",Ichikawa2007,True,,arXiv,Not available,Quantum Game Theory Based on the Schmidt Decomposition,09a93d804275bcb36058f3468a985e3a,http://arxiv.org/abs/quant-ph/0702167v2 14629," In this paper we introduce a qualitative decision and game theory based on belief (B) and desire (D) rules. We show that a group of agents acts as if it is maximizing achieved joint goals. ",mehdi dastani,,2002.0,,"Proceedings of NMR02, Toulouse, 2002",Dastani2002,True,,arXiv,Not available,What is a Joint Goal? Games with Beliefs and Defeasible Desires,0d3c861f970c5eb06648d148ee46df41,http://arxiv.org/abs/cs/0207022v1 14630," We present a novel formulation of quantum game theory based on the Schmidt decomposition, which has the merit that the entanglement of quantum strategies is manifestly quantified. We apply this formulation to 2-player, 2-strategy symmetric games and obtain a complete set of quantum Nash equilibria. Apart from those available with the maximal entanglement, these quantum Nash equilibria are extensions of the Nash equilibria in classical game theory. The phase structure of the equilibria is determined for all values of entanglement, and thereby the possibility of resolving the dilemmas by entanglement in the game of Chicken, the Battle of the Sexes, the Prisoners' Dilemma, and the Stag Hunt, is examined. We find that entanglement transforms these dilemmas with each other but cannot resolve them, except in the Stag Hunt game where the dilemma can be alleviated to a certain degree. ",taksu cheon,,2007.0,10.1088/1751-8113/41/13/135303,"Journal of Physics A: Mathematical and Theoretical 41 (2008) 135303 (29p)",Ichikawa2007,True,,arXiv,Not available,Quantum Game Theory Based on the Schmidt Decomposition,09a93d804275bcb36058f3468a985e3a,http://arxiv.org/abs/quant-ph/0702167v2 14631," In this paper the issue of energy efficiency in CDMA wireless data networks is addressed through a game theoretic approach. Building on a recent paper by the first two authors, wherein a non-cooperative game for spreading-code optimization, power control, and receiver design has been proposed to maximize the ratio of data throughput to transmit power for each active user, a stochastic algorithm is here described to perform adaptive implementation of the said non-cooperative game. The proposed solution is based on a combination of RLS-type and LMS-type adaptations, and makes use of readily available measurements. Simulation results show that its performance approaches with satisfactory accuracy that of the non-adaptive game, which requires a much larger amount of prior information. ",stefano buzzi,,2007.0,,arXiv,Buzzi2007,True,,arXiv,Not available,"A stochastic non-cooperative game for energy efficiency in wireless data networks",da153af83e08b5fafd33c55a9753f785,http://arxiv.org/abs/0705.3013v1 14632," In this paper the issue of energy efficiency in CDMA wireless data networks is addressed through a game theoretic approach. Building on a recent paper by the first two authors, wherein a non-cooperative game for spreading-code optimization, power control, and receiver design has been proposed to maximize the ratio of data throughput to transmit power for each active user, a stochastic algorithm is here described to perform adaptive implementation of the said non-cooperative game. The proposed solution is based on a combination of RLS-type and LMS-type adaptations, and makes use of readily available measurements. Simulation results show that its performance approaches with satisfactory accuracy that of the non-adaptive game, which requires a much larger amount of prior information. ",h. poor,,2007.0,,arXiv,Buzzi2007,True,,arXiv,Not available,"A stochastic non-cooperative game for energy efficiency in wireless data networks",da153af83e08b5fafd33c55a9753f785,http://arxiv.org/abs/0705.3013v1 14633," In this paper the issue of energy efficiency in CDMA wireless data networks is addressed through a game theoretic approach. Building on a recent paper by the first two authors, wherein a non-cooperative game for spreading-code optimization, power control, and receiver design has been proposed to maximize the ratio of data throughput to transmit power for each active user, a stochastic algorithm is here described to perform adaptive implementation of the said non-cooperative game. The proposed solution is based on a combination of RLS-type and LMS-type adaptations, and makes use of readily available measurements. Simulation results show that its performance approaches with satisfactory accuracy that of the non-adaptive game, which requires a much larger amount of prior information. ",daniela saturnino,,2007.0,,arXiv,Buzzi2007,True,,arXiv,Not available,"A stochastic non-cooperative game for energy efficiency in wireless data networks",da153af83e08b5fafd33c55a9753f785,http://arxiv.org/abs/0705.3013v1 14634," Game Theory has been frequently applied in biological research since 1970s. While the key idea of Game Theory is Nash Equilibrium, it is critical to understand and figure out the payoff matrix in order to calculate Nash Equilibrium. In this paper we present a dynamic programming implemented method to compute 2x2 non-cooperative finite resource allocation game's payoff matrix. We assume in one population there exists two types of individuals, aggressive and non-aggressive and each individual has equal and finite resource. The strength of individual could be described by a function of resource consumption in discrete development stages. Each individual undergoes logistic growth hence we divide the development into three stages: initialization, quasilinear growth and termination. We first discuss the theoretical frame of how to dynamic programming to calculate payoff matrix then give three numerical examples representing three different types of aggressive individuals and calculate the payoff matrix for each of them respectively. Based on the numerical payoff matrix we further investigate the evolutionary stable strategies (ESS) of the games. ",chen shi,,2009.0,,arXiv,Shi2009,True,,arXiv,Not available,"A Dynamic Programming Implemented 2x2 non-cooperative Game Theory Model for ESS Analysis",bd08ad2ac896015727a4f54f98f2346a,http://arxiv.org/abs/0904.4298v1 14635," Game Theory has been frequently applied in biological research since 1970s. While the key idea of Game Theory is Nash Equilibrium, it is critical to understand and figure out the payoff matrix in order to calculate Nash Equilibrium. In this paper we present a dynamic programming implemented method to compute 2x2 non-cooperative finite resource allocation game's payoff matrix. We assume in one population there exists two types of individuals, aggressive and non-aggressive and each individual has equal and finite resource. The strength of individual could be described by a function of resource consumption in discrete development stages. Each individual undergoes logistic growth hence we divide the development into three stages: initialization, quasilinear growth and termination. We first discuss the theoretical frame of how to dynamic programming to calculate payoff matrix then give three numerical examples representing three different types of aggressive individuals and calculate the payoff matrix for each of them respectively. Based on the numerical payoff matrix we further investigate the evolutionary stable strategies (ESS) of the games. ",fang yuan,,2009.0,,arXiv,Shi2009,True,,arXiv,Not available,"A Dynamic Programming Implemented 2x2 non-cooperative Game Theory Model for ESS Analysis",bd08ad2ac896015727a4f54f98f2346a,http://arxiv.org/abs/0904.4298v1 14636," We exhibit the rich structure of the set of correlated equilibria by analyzing the simplest of polynomial games: the mixed extension of matching pennies. We show that while the correlated equilibrium set is convex and compact, the structure of its extreme points can be quite complicated. In finite games the ratio of extreme correlated to extreme Nash equilibria can be greater than exponential in the size of the strategy spaces. In polynomial games there can exist extreme correlated equilibria which are not finitely supported; we construct a large family of examples using techniques from ergodic theory. We show that in general the set of correlated equilibrium distributions of a polynomial game cannot be described by conditions on finitely many moments (means, covariances, etc.), in marked contrast to the set of Nash equilibria which is always expressible in terms of finitely many moments. ",noah stein,,2010.0,10.1007/s00182-010-0267-1,"International Journal of Game Theory, Volume 40, Number 4, 749-767, 2011",Stein2010,True,,arXiv,Not available,"Structure of Extreme Correlated Equilibria: a Zero-Sum Example and its Implications",14da92982897a1a7d58c589ac71ac236,http://arxiv.org/abs/1002.0035v2 14637," We exhibit the rich structure of the set of correlated equilibria by analyzing the simplest of polynomial games: the mixed extension of matching pennies. We show that while the correlated equilibrium set is convex and compact, the structure of its extreme points can be quite complicated. In finite games the ratio of extreme correlated to extreme Nash equilibria can be greater than exponential in the size of the strategy spaces. In polynomial games there can exist extreme correlated equilibria which are not finitely supported; we construct a large family of examples using techniques from ergodic theory. We show that in general the set of correlated equilibrium distributions of a polynomial game cannot be described by conditions on finitely many moments (means, covariances, etc.), in marked contrast to the set of Nash equilibria which is always expressible in terms of finitely many moments. ",asuman ozdaglar,,2010.0,10.1007/s00182-010-0267-1,"International Journal of Game Theory, Volume 40, Number 4, 749-767, 2011",Stein2010,True,,arXiv,Not available,"Structure of Extreme Correlated Equilibria: a Zero-Sum Example and its Implications",14da92982897a1a7d58c589ac71ac236,http://arxiv.org/abs/1002.0035v2 14638," We exhibit the rich structure of the set of correlated equilibria by analyzing the simplest of polynomial games: the mixed extension of matching pennies. We show that while the correlated equilibrium set is convex and compact, the structure of its extreme points can be quite complicated. In finite games the ratio of extreme correlated to extreme Nash equilibria can be greater than exponential in the size of the strategy spaces. In polynomial games there can exist extreme correlated equilibria which are not finitely supported; we construct a large family of examples using techniques from ergodic theory. We show that in general the set of correlated equilibrium distributions of a polynomial game cannot be described by conditions on finitely many moments (means, covariances, etc.), in marked contrast to the set of Nash equilibria which is always expressible in terms of finitely many moments. ",pablo parrilo,,2010.0,10.1007/s00182-010-0267-1,"International Journal of Game Theory, Volume 40, Number 4, 749-767, 2011",Stein2010,True,,arXiv,Not available,"Structure of Extreme Correlated Equilibria: a Zero-Sum Example and its Implications",14da92982897a1a7d58c589ac71ac236,http://arxiv.org/abs/1002.0035v2 14639," The discrepancy method is widely used to find lower bounds for communication complexity of XOR games. It is well known that these bounds can be far from optimal. In this context Disjointness is usually mentioned as a case where the method fails to give good bounds, because the increment of the value of the game is linear (rather than exponential) in the number of communicated bits. We show in this paper the existence of XOR games where the discrepancy method yields bounds as poor as one desires. Indeed, we show the existence of such games with any previously prescribed value. To prove this result we apply the theory of p-summing operators, a central topic in Banach space theory. We show in the paper other applications of this theory to the study of the communication complexity of XOR games. ",c. palazuelos,,2010.0,,arXiv,Palazuelos2010,True,,arXiv,Not available,The communication complexity of XOR games via summing operators,5a166b9c4c569fbe4ebf2c177d601594,http://arxiv.org/abs/1004.2882v1 14640," In this paper we introduce a qualitative decision and game theory based on belief (B) and desire (D) rules. We show that a group of agents acts as if it is maximizing achieved joint goals. ",leendert torre,,2002.0,,"Proceedings of NMR02, Toulouse, 2002",Dastani2002,True,,arXiv,Not available,What is a Joint Goal? Games with Beliefs and Defeasible Desires,0d3c861f970c5eb06648d148ee46df41,http://arxiv.org/abs/cs/0207022v1 14641," The discrepancy method is widely used to find lower bounds for communication complexity of XOR games. It is well known that these bounds can be far from optimal. In this context Disjointness is usually mentioned as a case where the method fails to give good bounds, because the increment of the value of the game is linear (rather than exponential) in the number of communicated bits. We show in this paper the existence of XOR games where the discrepancy method yields bounds as poor as one desires. Indeed, we show the existence of such games with any previously prescribed value. To prove this result we apply the theory of p-summing operators, a central topic in Banach space theory. We show in the paper other applications of this theory to the study of the communication complexity of XOR games. ",d. perez-garcia,,2010.0,,arXiv,Palazuelos2010,True,,arXiv,Not available,The communication complexity of XOR games via summing operators,5a166b9c4c569fbe4ebf2c177d601594,http://arxiv.org/abs/1004.2882v1 14642," The discrepancy method is widely used to find lower bounds for communication complexity of XOR games. It is well known that these bounds can be far from optimal. In this context Disjointness is usually mentioned as a case where the method fails to give good bounds, because the increment of the value of the game is linear (rather than exponential) in the number of communicated bits. We show in this paper the existence of XOR games where the discrepancy method yields bounds as poor as one desires. Indeed, we show the existence of such games with any previously prescribed value. To prove this result we apply the theory of p-summing operators, a central topic in Banach space theory. We show in the paper other applications of this theory to the study of the communication complexity of XOR games. ",i. villanueva,,2010.0,,arXiv,Palazuelos2010,True,,arXiv,Not available,The communication complexity of XOR games via summing operators,5a166b9c4c569fbe4ebf2c177d601594,http://arxiv.org/abs/1004.2882v1 14643," Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-channel game, it is shown that convergence in mixed strategies might lead to cycles of action profiles which lead to individual spectral efficiencies (SE) which are worse than the SE at the worst NE in mixed and pure strategies. Finally, exploiting the fact that the CS problem is a PG and an aggregation game, we present a method to implement FP with local information and minimum feedback. ",s. perlaza,,2010.0,,arXiv,Perlaza2010,True,,arXiv,Not available,On the Fictitious Play and Channel Selection Games,8bd893bcc0ad07397e46753c2fd20385,http://arxiv.org/abs/1009.5026v1 14644," Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-channel game, it is shown that convergence in mixed strategies might lead to cycles of action profiles which lead to individual spectral efficiencies (SE) which are worse than the SE at the worst NE in mixed and pure strategies. Finally, exploiting the fact that the CS problem is a PG and an aggregation game, we present a method to implement FP with local information and minimum feedback. ",h. tembine,,2010.0,,arXiv,Perlaza2010,True,,arXiv,Not available,On the Fictitious Play and Channel Selection Games,8bd893bcc0ad07397e46753c2fd20385,http://arxiv.org/abs/1009.5026v1 14645," Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-channel game, it is shown that convergence in mixed strategies might lead to cycles of action profiles which lead to individual spectral efficiencies (SE) which are worse than the SE at the worst NE in mixed and pure strategies. Finally, exploiting the fact that the CS problem is a PG and an aggregation game, we present a method to implement FP with local information and minimum feedback. ",s. lasaulce,,2010.0,,arXiv,Perlaza2010,True,,arXiv,Not available,On the Fictitious Play and Channel Selection Games,8bd893bcc0ad07397e46753c2fd20385,http://arxiv.org/abs/1009.5026v1 14646," Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-channel game, it is shown that convergence in mixed strategies might lead to cycles of action profiles which lead to individual spectral efficiencies (SE) which are worse than the SE at the worst NE in mixed and pure strategies. Finally, exploiting the fact that the CS problem is a PG and an aggregation game, we present a method to implement FP with local information and minimum feedback. ",v. quintero-florez,,2010.0,,arXiv,Perlaza2010,True,,arXiv,Not available,On the Fictitious Play and Channel Selection Games,8bd893bcc0ad07397e46753c2fd20385,http://arxiv.org/abs/1009.5026v1 14647," We study the problem of super-replication for game options under proportional transaction costs. We consider a multidimensional continuous time model, in which the discounted stock price process satisfies the conditional full support property. We show that the super-replication price is the cheapest cost of a trivial super-replication strategy. This result is an extension of previous papers (see [3] and [7]) which considered only European options. In these papers the authors showed that with the presence of proportional transaction costs the super--replication price of a European option is given in terms of the concave envelope of the payoff function. In the present work we prove that for game options the super-replication price is given by a game variant analog of the standard concave envelope term. The treatment of game options is more complicated and requires additional tools. We combine the theory of consistent price systems together with the theory of extended weak convergence which was developed in [1]. The second theory is essential in dealing with hedging which involves stopping times, like in the case of game options. ",yan dolinsky,,2011.0,,arXiv,Dolinsky2011,True,,arXiv,Not available,Hedging of Game Options With the Presence of Transaction Costs,2634f3106c0a0bd592f359f193d1f09d,http://arxiv.org/abs/1103.1165v3 14648," This paper studies multi-user communication systems with two groups of users: leaders which possess system information, and followers which have no system information using the formulation of Stackelberg games. In such games, the leaders play and choose their actions based on their information about the system and the followers choose their actions myopically according to their observations of the aggregate impact of other users. However, obtaining the exact value of these parameters is not practical in communication systems. To study the effect of uncertainty and preserve the players' utilities in these conditions, we introduce a robust equilibrium for Stackelberg games. In this framework, the leaders' information and the followers' observations are uncertain parameters, and the leaders and the followers choose their actions by solving the worst-case robust optimizations. We show that the followers' uncertain parameters always increase the leaders' utilities and decrease the followers' utilities. Conversely, the leaders' uncertain information reduces the leaders' utilities and increases the followers' utilities. We illustrate our theoretical results with the numerical results obtained based on the power control games in the interference channels. ",saeedeh parsaeefard,,2011.0,,arXiv,parsaeefard2011,True,,arXiv,Not available,Robust Stackelberg game in communication systems,3e851cc67730f146494b35922eb5ef08,http://arxiv.org/abs/1108.5025v1 14649," This paper studies multi-user communication systems with two groups of users: leaders which possess system information, and followers which have no system information using the formulation of Stackelberg games. In such games, the leaders play and choose their actions based on their information about the system and the followers choose their actions myopically according to their observations of the aggregate impact of other users. However, obtaining the exact value of these parameters is not practical in communication systems. To study the effect of uncertainty and preserve the players' utilities in these conditions, we introduce a robust equilibrium for Stackelberg games. In this framework, the leaders' information and the followers' observations are uncertain parameters, and the leaders and the followers choose their actions by solving the worst-case robust optimizations. We show that the followers' uncertain parameters always increase the leaders' utilities and decrease the followers' utilities. Conversely, the leaders' uncertain information reduces the leaders' utilities and increases the followers' utilities. We illustrate our theoretical results with the numerical results obtained based on the power control games in the interference channels. ",mihaela schaar,,2011.0,,arXiv,parsaeefard2011,True,,arXiv,Not available,Robust Stackelberg game in communication systems,3e851cc67730f146494b35922eb5ef08,http://arxiv.org/abs/1108.5025v1 14650," This paper studies multi-user communication systems with two groups of users: leaders which possess system information, and followers which have no system information using the formulation of Stackelberg games. In such games, the leaders play and choose their actions based on their information about the system and the followers choose their actions myopically according to their observations of the aggregate impact of other users. However, obtaining the exact value of these parameters is not practical in communication systems. To study the effect of uncertainty and preserve the players' utilities in these conditions, we introduce a robust equilibrium for Stackelberg games. In this framework, the leaders' information and the followers' observations are uncertain parameters, and the leaders and the followers choose their actions by solving the worst-case robust optimizations. We show that the followers' uncertain parameters always increase the leaders' utilities and decrease the followers' utilities. Conversely, the leaders' uncertain information reduces the leaders' utilities and increases the followers' utilities. We illustrate our theoretical results with the numerical results obtained based on the power control games in the interference channels. ",ahmad sharafat,,2011.0,,arXiv,parsaeefard2011,True,,arXiv,Not available,Robust Stackelberg game in communication systems,3e851cc67730f146494b35922eb5ef08,http://arxiv.org/abs/1108.5025v1 14651," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",mohammad alavijeh,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 14652," This paper presents the research on the interdisciplinary research infrastructure for understanding human reasoning in game-theoretic terms. Strategic reasoning is considered to impact human decision making in social, economical and competitive interactions. The provided introduction explains and connects concepts from AI, game theory and psychology. First result is a concept of interdisciplinary game description language as a part of the focused interdisciplinary research infrastructure. The need of this domain-specific language is motivated and is aimed to accelerate the current developments. As second result, the paper provides a summary of ongoing research and its significance. ",rustam tagiew,,2011.0,,arXiv,Tagiew2011,True,,arXiv,Not available,"If more than Analytical Modeling is Needed to Predict Real Agents' Strategic Interaction",fd16b3bfc02f3f86b1081e45b2b6255d,http://arxiv.org/abs/1105.0558v1 14653," This paper provides effective methods for the polyhedral formulation of impartial finite combinatorial games as lattice games. Given a rational strategy for a lattice game, a polynomial time algorithm is presented to decide (i) whether a given position is a winning position, and to find a move to a winning position, if not; and (ii) to decide whether two given positions are congruent, in the sense of mis\`ere quotient theory. The methods are based on the theory of short rational generating functions. ",alan guo,,2011.0,,arXiv,Guo2011,True,,arXiv,Not available,Algorithms for lattice games,668dc921b94250d74a35a86dca1eb672,http://arxiv.org/abs/1105.5413v1 14654," This paper provides effective methods for the polyhedral formulation of impartial finite combinatorial games as lattice games. Given a rational strategy for a lattice game, a polynomial time algorithm is presented to decide (i) whether a given position is a winning position, and to find a move to a winning position, if not; and (ii) to decide whether two given positions are congruent, in the sense of mis\`ere quotient theory. The methods are based on the theory of short rational generating functions. ",ezra miller,,2011.0,,arXiv,Guo2011,True,,arXiv,Not available,Algorithms for lattice games,668dc921b94250d74a35a86dca1eb672,http://arxiv.org/abs/1105.5413v1 14655," As we show by using notions of equilibrium in infinite sequential games, crashes or financial escalations are rational for economic or environmental agents, who have a vision of an infinite world. This contradicts a picture of a self-regulating, wise and pacific economic world. In other words, in this context, equilibrium is not synonymous of stability. We try to draw, from this statement, methodological consequences and new ways of thinking, especially in economic game theory. Among those new paths, coinduction is the basis of our reasoning in infinite games. ",pierre lescanne,,2011.0,,arXiv,Lescanne2011,True,,arXiv,Not available,Les crashs sont rationnels,1cc048fcf574deff845e2a2d33aa2076,http://arxiv.org/abs/1111.7299v5 14656," In this paper we revisit the regular-language representation of game semantics of second-order recursion free Idealized Algol with infinite data types. By using symbolic values instead of concrete ones we generalize the standard notion of regular-language and automata representations to that of corresponding symbolic representations. In this way terms with infinite data types, such as integers, can be expressed as finite symbolic-automata although the standard automata interpretation is infinite. Moreover, significant reductions of the state space of game semantics models are obtained. This enables efficient verification of terms, which is illustrated with several examples. ",aleksandar dimovski,,2012.0,10.4204/EPTCS.96.8,"EPTCS 96, 2012, pp. 99-112",Dimovski2012,True,,arXiv,Not available,Symbolic Representation of Algorithmic Game Semantics,ab81208eef04400031df9e2acac3614d,http://arxiv.org/abs/1210.2454v1 14657," Awale games have become widely recognized across the world, for their innovative strategies and techniques which were used in evolving the agents (player) and have produced interesting results under various conditions. This paper will compare the results of the two major machine learning techniques by reviewing their performance when using minimax, endgame database, a combination of both techniques or other techniques, and will determine which are the best techniques. ",o. randle,,2013.0,,"International Journal of Game Theory and Technology (IJGTT), Vol.1, No.1, June 2013",Randle2013,True,,arXiv,Not available,"A Comparism of the Performance of Supervised and Unsupervised Machine Learning Techniques in evolving Awale/Mancala/Ayo Game Player",535dfba0ab37de2cc0fc40a554222364,http://arxiv.org/abs/1309.1543v1 14658," Awale games have become widely recognized across the world, for their innovative strategies and techniques which were used in evolving the agents (player) and have produced interesting results under various conditions. This paper will compare the results of the two major machine learning techniques by reviewing their performance when using minimax, endgame database, a combination of both techniques or other techniques, and will determine which are the best techniques. ",o. ogunduyile,,2013.0,,"International Journal of Game Theory and Technology (IJGTT), Vol.1, No.1, June 2013",Randle2013,True,,arXiv,Not available,"A Comparism of the Performance of Supervised and Unsupervised Machine Learning Techniques in evolving Awale/Mancala/Ayo Game Player",535dfba0ab37de2cc0fc40a554222364,http://arxiv.org/abs/1309.1543v1 14659," Awale games have become widely recognized across the world, for their innovative strategies and techniques which were used in evolving the agents (player) and have produced interesting results under various conditions. This paper will compare the results of the two major machine learning techniques by reviewing their performance when using minimax, endgame database, a combination of both techniques or other techniques, and will determine which are the best techniques. ",t. zuva,,2013.0,,"International Journal of Game Theory and Technology (IJGTT), Vol.1, No.1, June 2013",Randle2013,True,,arXiv,Not available,"A Comparism of the Performance of Supervised and Unsupervised Machine Learning Techniques in evolving Awale/Mancala/Ayo Game Player",535dfba0ab37de2cc0fc40a554222364,http://arxiv.org/abs/1309.1543v1 14660," Awale games have become widely recognized across the world, for their innovative strategies and techniques which were used in evolving the agents (player) and have produced interesting results under various conditions. This paper will compare the results of the two major machine learning techniques by reviewing their performance when using minimax, endgame database, a combination of both techniques or other techniques, and will determine which are the best techniques. ",n. fashola,,2013.0,,"International Journal of Game Theory and Technology (IJGTT), Vol.1, No.1, June 2013",Randle2013,True,,arXiv,Not available,"A Comparism of the Performance of Supervised and Unsupervised Machine Learning Techniques in evolving Awale/Mancala/Ayo Game Player",535dfba0ab37de2cc0fc40a554222364,http://arxiv.org/abs/1309.1543v1 14661," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",yogesh anbalagan,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14662," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",behrouz maham,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 14663," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",hao huang,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14664," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",shachar lovett,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14665," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",sergey norin,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14666," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",adrian vetta,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14667," We prove that for any constant $k$ and any $\epsilon<1$, there exist bimatrix win-lose games for which every $\epsilon$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $\epsilon$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers. ",hehui wu,,2015.0,,arXiv,Anbalagan2015,True,,arXiv,Not available,Large Supports are required for Well-Supported Nash Equilibria,222203669d050fb64deff6ddf7308f3b,http://arxiv.org/abs/1504.03602v1 14668," By using laboratory experimental data, we test the uncertainty of social strategy transitions in various competing environments of fixed paired two-person constant sum $2 \times 2$ games. It firstly shows that, the distributions of social strategy transitions are not erratic but obey the principle of the maximum entropy (MaxEnt). This finding indicates that human subject social systems and natural systems could have wider common backgrounds. ",bin xu,,2012.0,10.1016/j.rinp.2012.09.002,arXiv,Xu2012,True,,arXiv,Not available,"Test MaxEnt in Social Strategy Transitions with Experimental Two-Person Constant Sum 2$\times$2 Games",3cc8af74fea3959bd0f78dd5cf6c3861,http://arxiv.org/abs/1207.0752v2 14669," By using laboratory experimental data, we test the uncertainty of social strategy transitions in various competing environments of fixed paired two-person constant sum $2 \times 2$ games. It firstly shows that, the distributions of social strategy transitions are not erratic but obey the principle of the maximum entropy (MaxEnt). This finding indicates that human subject social systems and natural systems could have wider common backgrounds. ",zhijian wang,,2012.0,10.1016/j.rinp.2012.09.002,arXiv,Xu2012,True,,arXiv,Not available,"Test MaxEnt in Social Strategy Transitions with Experimental Two-Person Constant Sum 2$\times$2 Games",3cc8af74fea3959bd0f78dd5cf6c3861,http://arxiv.org/abs/1207.0752v2 14670," Motivated by cost of computation in game theory, we explore how changing the utilities of players (changing their complexity costs) affects the outcome of a game. We show that even if we improve a player's utility in every action profile, his payoff in equilibrium might be lower than in the equilibrium before the change. We provide some conditions on games that are sufficient to ensure this does not occur. We then show how this counter-intuitive phenomenon can explain real life phenomena such as free riding, and why this might cause people to give signals indicating that they are not as good as they really are. ",lior seeman,,2013.0,,arXiv,Seeman2013,True,,arXiv,Not available,I'd Rather Stay Stupid: The Advantage of Having Low Utility,67ba061214bded3a3574e149c7baf323,http://arxiv.org/abs/1312.4187v1 14671," Nash equilibrium is a solution concept in non-strictly competitive, non-cooperative game theory that finds applications in various scientific and engineering disciplines. A non-strictly competitive, non-cooperative game model is presented here for two qubit quantum computations that allows for the characterization of Nash equilibrium in these computations via the inner product of their state space. Nash equilibrium outcomes are optimal under given constraints and therefore offer a game-theoretic measure of constrained optimization of two qubit quantum computations. ",faisal khan,,2014.0,10.1007/s11128-015-0945-9,arXiv,Khan2014,True,,arXiv,Not available,Dominant Strategies in Two Qubit Quantum Computations,a264e68daa1f80fad1a167f5d674ab1e,http://arxiv.org/abs/1410.0940v2 14672," This paper is devoted to Nash equilibrium for games in capacities. Such games with payoff expressed by Choquet integral were considered by Kozhan and Zarichnyi (Nash equilibria for games in capacities, Econ. Theory {\bf 35} (2008) 321--331) and existence of Nash equilibrium was proved. We also consider games in capacities but with expected payoff expressed by Sugeno integral. We prove existence of Nash equilibrium using categorical methods and abstract convexity theory. ",taras radul,,2015.0,,arXiv,Radul2015,True,,arXiv,Not available,Nash equilibrium with Sugeno payoff,b0bf4f111b93886e2714f0f2247569fd,http://arxiv.org/abs/1502.07259v2 14673," According to evolutionary game theory, cooperation in public goods games is eliminated by free-riders, yet in nature, cooperation is ubiquitous. Artificial models resolve this contradiction via the mechanism of network reciprocity. However, existing research only addresses pre-existing networks and does not specifically consider their origins. Further, much work has focused on scale-free networks and so pre-supposes attachment mechanisms which may not exist in nature. We present a coevolutionary model of public goods games in networks, growing by random attachment, from small founding populations of simple agents. The model demonstrates the emergence of cooperation in moderately heterogeneous networks, regardless of original founders' behaviour, and absent higher cognitive abilities such as recognition or memory. It may thus illustrate a more general mechanism for the evolution of cooperation, from early origins, in minimally cognitive organisms. It is the first example of a model explaining cooperation in public goods games on growing networks. ",steve miller,,2016.0,,arXiv,Miller2016,True,,arXiv,Not available,"The emergence of cooperation in public goods games on randomly growing dynamic networks",4eeffbc4f47215072edcb6ef2e06bcde,http://arxiv.org/abs/1603.05829v2 14674," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",zhu han,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 14675," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",renato leme,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 14676," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",vasilis syrgkanis,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 14677," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",eva tardos,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 14678," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",sumanth sudeendra,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14679," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",megha saini,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14680," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",shrisha rao,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14684," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",jamie morgenstern,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 14685," One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. %providing the security defense is also of great importance. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic stochastic cognitive radio network consisting of several selfish secondary users and a malicious user. In this model, each secondary user participates in an auction and wish to use the unjammed spectrum, and the malicious user aims at jamming a channel by corrupting the communication link. A truthful auction mechanism is designed among the secondary users. Furthermore, a zero-sum game is formulated between the set of secondary users and the malicious user. This joint problem is then cast as a randomized two-level auctions in which the first auction allocates the vacant channels, and then the second one assigns the remaining unallocated channels. We have also changed this solution to a trustful distributed scheme. Simulation results show that the distributed algorithm can achieve a performance that is close to the centralized algorithm, without the added overhead and complexity. ",walid saad,,2016.0,,arXiv,Alavijeh2016,True,,arXiv,Not available,"Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks",6d55af43a0a8f2eb9bec7f2ac8cafd3e,http://arxiv.org/abs/1611.08681v1 14686," We present a general framework for proving polynomial sample complexity bounds for the problem of learning from samples the best auction in a class of ""simple"" auctions. Our framework captures all of the most prominent examples of ""simple"" auctions, including anonymous and non-anonymous item and bundle pricings, with either a single or multiple buyers. The technique we propose is to break the analysis of auctions into two natural pieces. First, one shows that the set of allocation rules have large amounts of structure; second, fixing an allocation on a sample, one shows that the set of auctions agreeing with this allocation on that sample have revenue functions with low dimensionality. Our results effectively imply that whenever it's possible to compute a near-optimal simple auction with a known prior, it is also possible to compute such an auction with an unknown prior (given a polynomial number of samples). ",tim roughgarden,,2016.0,,arXiv,Morgenstern2016,True,,arXiv,Not available,Learning Simple Auctions,6b529141923c2bf3550dc5930c79f0a7,http://arxiv.org/abs/1604.03171v1 14687," We present a number of models for the adword auctions used for pricing advertising slots on search engines such as Google, Yahoo! etc. We begin with a general problem formulation which allows the privately known valuation per click to be a function of both the identity of the advertiser and the slot. We present a compact characterization of the set of all deterministic incentive compatible direct mechanisms for this model. This new characterization allows us to conclude that there are incentive compatible mechanisms for this auction with a multi-dimensional type-space that are {\em not} affine maximizers. Next, we discuss two interesting special cases: slot independent valuation and slot independent valuation up to a privately known slot and zero thereafter. For both of these special cases, we characterize revenue maximizing and efficiency maximizing mechanisms and show that these mechanisms can be computed with a worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively, where $n$ is number of bidders and $m$ is number of slots. Next, we characterize optimal rank based allocation rules and propose a new mechanism that we call the customized rank based allocation. We report the results of a numerical study that compare the revenue and efficiency of the proposed mechanisms. The numerical results suggest that customized rank-based allocation rule is significantly superior to the rank-based allocation rules. ",garud iyengar,,2006.0,,arXiv,Iyengar2006,True,,arXiv,Not available,Characterizing Optimal Adword Auctions,57608a0f34400be41f0079a9da78cf9f,http://arxiv.org/abs/cs/0611063v1 14688," We present a number of models for the adword auctions used for pricing advertising slots on search engines such as Google, Yahoo! etc. We begin with a general problem formulation which allows the privately known valuation per click to be a function of both the identity of the advertiser and the slot. We present a compact characterization of the set of all deterministic incentive compatible direct mechanisms for this model. This new characterization allows us to conclude that there are incentive compatible mechanisms for this auction with a multi-dimensional type-space that are {\em not} affine maximizers. Next, we discuss two interesting special cases: slot independent valuation and slot independent valuation up to a privately known slot and zero thereafter. For both of these special cases, we characterize revenue maximizing and efficiency maximizing mechanisms and show that these mechanisms can be computed with a worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively, where $n$ is number of bidders and $m$ is number of slots. Next, we characterize optimal rank based allocation rules and propose a new mechanism that we call the customized rank based allocation. We report the results of a numerical study that compare the revenue and efficiency of the proposed mechanisms. The numerical results suggest that customized rank-based allocation rule is significantly superior to the rank-based allocation rules. ",anuj kumar,,2006.0,,arXiv,Iyengar2006,True,,arXiv,Not available,Characterizing Optimal Adword Auctions,57608a0f34400be41f0079a9da78cf9f,http://arxiv.org/abs/cs/0611063v1 14689," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",ashish goel,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 14690," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",kamesh munagala,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 14691," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",moshe babaioff,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 14692," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",liad blumrosen,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 14693," We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and the seller must make the allocation and payment decisions online with the goal of maximizing social welfare. We consider two models of unknown supply: the adversarial supply model, in which the mechanism must produce a welfare guarantee for any arbitrary supply, and the stochastic supply model, in which supply is drawn from a distribution known to the mechanism, and the mechanism need only provide a welfare guarantee in expectation. Our main result is a separation between these two models. We show that all truthful mechanisms, even randomized, achieve a diminishing fraction of the optimal social welfare (namely, no better than a Omega(loglog n) approximation) in the adversarial setting. In sharp contrast, in the stochastic model, under a standard monotone hazard-rate condition, we present a truthful mechanism that achieves a constant approximation. We show that the monotone hazard rate condition is necessary, and also characterize a natural subclass of truthful mechanisms in our setting, the set of online-envy-free mechanisms. All of the mechanisms we present fall into this class, and we prove almost optimal lower bounds for such mechanisms. Since auctions with unknown supply are regularly run in many online-advertising settings, our main results emphasize the importance of considering distributional information in the design of auctions in such environments. ",aaron roth,,2009.0,,arXiv,Babaioff2009,True,,arXiv,Not available,Auctions with Online Supply,a15196e3579537c78d0fa52f444b079a,http://arxiv.org/abs/0905.3429v1 14694," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",dimitris fotakis,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 14695," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",piotr krysta,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 14696," Finding optimal solutions for multi-unit combinatorial auctions is a hard problem and finding approximations to the optimal solution is also hard. We investigate the use of Branch-and-Bound techniques: they require both a way to bound from above the value of the best allocation and a good criterion to decide which bids are to be tried first. Different methods for efficiently bounding from above the value of the best allocation are considered. Theoretical original results characterize the best approximation ratio and the ordering criterion that provides it. We suggest to use this criterion. ",rica gonen,,2002.0,,"Second ACM Conference on Electronic Commerce (EC'00) Minneapolis, Minnesota, October 2000, pp. 13-20",Gonen2002,True,,arXiv,Not available,"Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and Bound Heuristics",78d13f08b1f1cd8a7c60eb9bbe02f304,http://arxiv.org/abs/cs/0202032v1 14697," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",carmine ventre,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 14698," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",ning chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 14699," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",nick gravin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 14700," We study the design of truthful auctions for selling identical items in unlimited supply (e.g., digital goods) to n unit demand buyers. This classic problem stands out from profit-maximizing auction design literature as it requires no probabilistic assumptions on buyers' valuations and employs the framework of competitive analysis. Our objective is to optimize the worst-case performance of an auction, measured by the ratio between a given benchmark and revenue generated by the auction. We establish a sufficient and necessary condition that characterizes competitive ratios for all monotone benchmarks. The characterization identifies the worst-case distribution of instances and reveals intrinsic relations between competitive ratios and benchmarks in the competitive analysis. With the characterization at hand, we show optimal competitive auctions for two natural benchmarks. The most well-studied benchmark $\mathcal{F}^{(2)}(\cdot)$ measures the envy-free optimal revenue where at least two buyers win. Goldberg et al. [13] showed a sequence of lower bounds on the competitive ratio for each number of buyers n. They conjectured that all these bounds are tight. We show that optimal competitive auctions match these bounds. Thus, we confirm the conjecture and settle a central open problem in the design of digital goods auctions. As one more application we examine another economically meaningful benchmark, which measures the optimal revenue across all limited-supply Vickrey auctions. We identify the optimal competitive ratios to be $(\frac{n}{n-1})^{n-1}-1$ for each number of buyers n, that is $e-1$ as $n$ approaches infinity. ",pinyan lu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Optimal Competitive Auctions,76f9f67ce3a38457aa67d83524650b9b,http://arxiv.org/abs/1401.0880v1 14701," We initiate the study of markets for private data, though the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a theory of privacy as a commodity is missing. In this paper, we propose to build such a theory. Specifically, we consider a setting in which a data analyst wishes to buy information from a population from which he can estimate some statistic. The analyst wishes to obtain an accurate estimate cheaply. On the other hand, the owners of the private data experience some cost for their loss of privacy, and must be compensated for this loss. Agents are selfish, and wish to maximize their profit, so our goal is to design truthful mechanisms. Our main result is that such auctions can naturally be viewed and optimally solved as variants of multi-unit procurement auctions. Based on this result, we derive auctions for two natural settings which are optimal up to small constant factors: 1. In the setting in which the data analyst has a fixed accuracy goal, we show that an application of the classic Vickrey auction achieves the analyst's accuracy goal while minimizing his total payment. 2. In the setting in which the data analyst has a fixed budget, we give a mechanism which maximizes the accuracy of the resulting estimate while guaranteeing that the resulting sum payments do not exceed the analysts budget. In both cases, our comparison class is the set of envy-free mechanisms, which correspond to the natural class of fixed-price mechanisms in our setting. In both of these results, we ignore the privacy cost due to possible correlations between an individuals private data and his valuation for privacy itself. We then show that generically, no individually rational mechanism can compensate individuals for the privacy loss incurred due to their reported valuations for privacy. ",arpita ghosh,,2010.0,,arXiv,Ghosh2010,True,,arXiv,Not available,Selling Privacy at Auction,2080cb49b8371524a02d80f9b3c973c9,http://arxiv.org/abs/1011.1375v4 14702," We initiate the study of markets for private data, though the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a theory of privacy as a commodity is missing. In this paper, we propose to build such a theory. Specifically, we consider a setting in which a data analyst wishes to buy information from a population from which he can estimate some statistic. The analyst wishes to obtain an accurate estimate cheaply. On the other hand, the owners of the private data experience some cost for their loss of privacy, and must be compensated for this loss. Agents are selfish, and wish to maximize their profit, so our goal is to design truthful mechanisms. Our main result is that such auctions can naturally be viewed and optimally solved as variants of multi-unit procurement auctions. Based on this result, we derive auctions for two natural settings which are optimal up to small constant factors: 1. In the setting in which the data analyst has a fixed accuracy goal, we show that an application of the classic Vickrey auction achieves the analyst's accuracy goal while minimizing his total payment. 2. In the setting in which the data analyst has a fixed budget, we give a mechanism which maximizes the accuracy of the resulting estimate while guaranteeing that the resulting sum payments do not exceed the analysts budget. In both cases, our comparison class is the set of envy-free mechanisms, which correspond to the natural class of fixed-price mechanisms in our setting. In both of these results, we ignore the privacy cost due to possible correlations between an individuals private data and his valuation for privacy itself. We then show that generically, no individually rational mechanism can compensate individuals for the privacy loss incurred due to their reported valuations for privacy. ",aaron roth,,2010.0,,arXiv,Ghosh2010,True,,arXiv,Not available,Selling Privacy at Auction,2080cb49b8371524a02d80f9b3c973c9,http://arxiv.org/abs/1011.1375v4 14703," In this work we consider selling items using a sequential first price auction mechanism. We generalize the assumption of conservative bidding to extensive form games (henceforth optimistic conservative bidding), and show that for both linear and unit demand valuations, the only pure subgame perfect equilibrium where buyers are bidding in an optimistic conservative manner is the minimal Walrasian equilibrium. In addition, we show examples where without the requirement of conservative bidding, subgame perfect equilibria can admit a variety of unlikely predictions, including high price of anarchy and low revenue in markets composed of additive bidders, equilibria which elicit all the surplus as revenue, and more. We also show that the order in which the items are sold can influence the outcome. ",avinatan hassidim,,2015.0,,arXiv,Hassidim2015,True,,arXiv,Not available,Optimistic-Conservative Bidding in Sequential Auctions,c6fd86a7cc35a673c38000c2d9da43f4,http://arxiv.org/abs/1501.07687v1 14704," In this work we consider selling items using a sequential first price auction mechanism. We generalize the assumption of conservative bidding to extensive form games (henceforth optimistic conservative bidding), and show that for both linear and unit demand valuations, the only pure subgame perfect equilibrium where buyers are bidding in an optimistic conservative manner is the minimal Walrasian equilibrium. In addition, we show examples where without the requirement of conservative bidding, subgame perfect equilibria can admit a variety of unlikely predictions, including high price of anarchy and low revenue in markets composed of additive bidders, equilibria which elicit all the surplus as revenue, and more. We also show that the order in which the items are sold can influence the outcome. ",yishay mansour,,2015.0,,arXiv,Hassidim2015,True,,arXiv,Not available,Optimistic-Conservative Bidding in Sequential Auctions,c6fd86a7cc35a673c38000c2d9da43f4,http://arxiv.org/abs/1501.07687v1 14705," A double auction game with an infinite number of buyers and sellers is introduced. All sellers posses one unit of a good, all buyers desire to buy one unit. Each seller and each buyer has a private valuation of the good. The distribution of the valuations define supply and demand functions. One unit of the good is auctioned. At successive, discrete time instances, a player is randomly selected to make a bid (buyer) or an ask (seller). When the maximum of the bids becomes larger than the minimum of the asks, a transaction occurs and the auction is closed. The players have to choose the value of their bid or ask before the auction starts and use this value when they are selected. Assuming that the supply and demand functions are known, expected profits as functions of the strategies are derived, as well as expected transaction prices. It is shown that for linear supply and demand functions, there exists at most one Bayesian Nash equilibrium. Competitive behaviour is not an equilibrium of the game. For linear supply and demand functions, the sum of the expected profit of the sellers and the buyers is the same for the Bayesian Nash equilibrium and the market where players behave competitively. Connections are made with the ZI-C traders model and the $k$-double auction. ",matthijs ruijgrok,,2012.0,,arXiv,Ruijgrok2012,True,,arXiv,Not available,A single-item continuous double auction game,00db6b2be8334ad69ade5dc74e975d50,http://arxiv.org/abs/1210.5541v1 14706," We introduce a novel characterization of all Walrasian price vectors in terms of forbidden over- and under demanded sets for monotone gross substitute combinatorial auctions. For ascending and descending auctions we suggest a universal framework for finding the minimum or maximum Walrasian price vectors for monotone gross substitute combinatorial auctions. An ascending (descending) auction is guaranteed to find the minimum (maximum) Walrasian if and only if it follows the suggested framework. ",oren ben-zwi,,2016.0,,arXiv,Ben-Zwi2016,True,,arXiv,Not available,Walrasian's Characterization and a Universal Ascending Auction,5240bf4f1cd8dffe3cb81174390cd88e,http://arxiv.org/abs/1605.03826v1 14707," Finding optimal solutions for multi-unit combinatorial auctions is a hard problem and finding approximations to the optimal solution is also hard. We investigate the use of Branch-and-Bound techniques: they require both a way to bound from above the value of the best allocation and a good criterion to decide which bids are to be tried first. Different methods for efficiently bounding from above the value of the best allocation are considered. Theoretical original results characterize the best approximation ratio and the ordering criterion that provides it. We suggest to use this criterion. ",daniel lehmann,,2002.0,,"Second ACM Conference on Electronic Commerce (EC'00) Minneapolis, Minnesota, October 2000, pp. 13-20",Gonen2002,True,,arXiv,Not available,"Optimal Solutions for Multi-Unit Combinatorial Auctions: Branch and Bound Heuristics",78d13f08b1f1cd8a7c60eb9bbe02f304,http://arxiv.org/abs/cs/0202032v1 14708," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",benny lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 14709," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",daniel lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 14710," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",noam nisan,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 14711," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",daniel lehmann,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 14712," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",liadan o'callaghan,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 14713," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",yoav shoham,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 14714," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",jon feldman,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14715," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",s. muthukrishnan,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14716," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",martin pal,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14717," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",cliff stein,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 14718," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",e. sathiyamoorthy,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 14719," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoad lewenberg,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 14720," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",omer lev,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 14721," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoram bachrach,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 14722," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",jeffrey rosenschein,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 14723," The recent online platforms propose multiple items for bidding. The state of the art, however, is limited to the analysis of one item auction without resubmission. In this paper we study multi-item lowest unique bid auctions (LUBA) with resubmission in discrete bid spaces under budget constraints. We show that the game does not have pure Bayes-Nash equilibria (except in very special cases). However, at least one mixed Bayes-Nash equilibria exists for arbitrary number of bidders and items. The equilibrium is explicitly computed for two-bidder setup with resubmission possibilities. In the general setting we propose a distributed strategic learning algorithm to approximate equilibria. Computer simulations indicate that the error quickly decays in few number of steps. When the number of bidders per item follows a Poisson distribution, it is shown that the seller can get a non-negligible revenue on several items, and hence making a partial revelation of the true value of the items. Finally, the attitude of the bidders towards the risk is considered. In contrast to risk-neutral agents who bids very small values, the cumulative distribution and the bidding support of risk-sensitive agents are more distributed. ",yida xu,,2017.0,,arXiv,Xu2017,True,,arXiv,Not available,Lowest Unique Bid Auctions with Resubmission Opportunities,c2d9aef1cb3b60f9442813d172d41d7d,http://arxiv.org/abs/1702.08794v1 14724," The recent online platforms propose multiple items for bidding. The state of the art, however, is limited to the analysis of one item auction without resubmission. In this paper we study multi-item lowest unique bid auctions (LUBA) with resubmission in discrete bid spaces under budget constraints. We show that the game does not have pure Bayes-Nash equilibria (except in very special cases). However, at least one mixed Bayes-Nash equilibria exists for arbitrary number of bidders and items. The equilibrium is explicitly computed for two-bidder setup with resubmission possibilities. In the general setting we propose a distributed strategic learning algorithm to approximate equilibria. Computer simulations indicate that the error quickly decays in few number of steps. When the number of bidders per item follows a Poisson distribution, it is shown that the seller can get a non-negligible revenue on several items, and hence making a partial revelation of the true value of the items. Finally, the attitude of the bidders towards the risk is considered. In contrast to risk-neutral agents who bids very small values, the cumulative distribution and the bidding support of risk-sensitive agents are more distributed. ",hamidou tembine,,2017.0,,arXiv,Xu2017,True,,arXiv,Not available,Lowest Unique Bid Auctions with Resubmission Opportunities,c2d9aef1cb3b60f9442813d172d41d7d,http://arxiv.org/abs/1702.08794v1 14725," Group-buying auction has become a popular marketing strategy in the last decade. In this paper, a stochastic model is developed for an inventory system subjects to demands from group-buying auctions. The model discussed here takes into the account of the costs of inventory, transportation, dispatching and re-order as well as the penalty cost of non-successful auctions. Since a new cycle begins whenever there is a replenishment of products, the long-run average costs of the model can be obtained by using the renewal theory. A closed form solution of the optimal replenishment quantity is also derived. ",allen tai,,2012.0,,arXiv,Tai2012,True,,arXiv,Not available,An inventory model for group-buying auction,ffe5bb0a189b9f28af95ff3a5c606568,http://arxiv.org/abs/1212.3541v1 14726," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",christos papadimitriou,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 14727," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",george pierrakos,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 14728," We explore the computational complexity of computing pure Nash equilibria for a new class of strategic games called integer programming games with difference of piecewise linear convex payoffs. Integer programming games are games where players' action sets are integer points inside of polytopes. Using recent results from the study of short rational generating functions for encoding sets of integer points pioneered by Alexander Barvinok, we present efficient algorithms for enumerating all pure Nash equilibria, and other computations of interest, such as the pure price of anarchy, and pure threat point, when the dimension and number of ""convex"" linear pieces in the payoff functions are fixed. Sequential games where a leader is followed by competing followers (a Stackelberg--Nash setting) are also considered. ",matthias koppe,,2008.0,10.1287/opre.1110.0964,"Operations Research 59 (2011), no. 6, 1445-1460",Köppe2008,True,,arXiv,Not available,Rational Generating Functions and Integer Programming Games,a25b2d1128a7934fd06cac75d286e0bc,http://arxiv.org/abs/0809.0689v1 14729," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",n. iyenger,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 14730," We explore the computational complexity of computing pure Nash equilibria for a new class of strategic games called integer programming games with difference of piecewise linear convex payoffs. Integer programming games are games where players' action sets are integer points inside of polytopes. Using recent results from the study of short rational generating functions for encoding sets of integer points pioneered by Alexander Barvinok, we present efficient algorithms for enumerating all pure Nash equilibria, and other computations of interest, such as the pure price of anarchy, and pure threat point, when the dimension and number of ""convex"" linear pieces in the payoff functions are fixed. Sequential games where a leader is followed by competing followers (a Stackelberg--Nash setting) are also considered. ",christopher ryan,,2008.0,10.1287/opre.1110.0964,"Operations Research 59 (2011), no. 6, 1445-1460",Köppe2008,True,,arXiv,Not available,Rational Generating Functions and Integer Programming Games,a25b2d1128a7934fd06cac75d286e0bc,http://arxiv.org/abs/0809.0689v1 14731," We explore the computational complexity of computing pure Nash equilibria for a new class of strategic games called integer programming games with difference of piecewise linear convex payoffs. Integer programming games are games where players' action sets are integer points inside of polytopes. Using recent results from the study of short rational generating functions for encoding sets of integer points pioneered by Alexander Barvinok, we present efficient algorithms for enumerating all pure Nash equilibria, and other computations of interest, such as the pure price of anarchy, and pure threat point, when the dimension and number of ""convex"" linear pieces in the payoff functions are fixed. Sequential games where a leader is followed by competing followers (a Stackelberg--Nash setting) are also considered. ",maurice queyranne,,2008.0,10.1287/opre.1110.0964,"Operations Research 59 (2011), no. 6, 1445-1460",Köppe2008,True,,arXiv,Not available,Rational Generating Functions and Integer Programming Games,a25b2d1128a7934fd06cac75d286e0bc,http://arxiv.org/abs/0809.0689v1 14732," The task of managing general game playing in a multi-agent system is the problem addressed in this paper. It is considered to be done by an agent. There are many reasons for constructing such an agent, called general game management agent. This agent manages strategic interactions between other agents - players, natural or also artificial. The agent records the interaction for further benchmarking and analysis. He can also be used for a kind of restricted communications. His behavior is defined by a game description written in a logic-based language. The language, we present for this application, is more expressive than the language GDL, which is already used for such purposes. Our language can represent imperfect information and time dependent elements of a game. Time dependent elements like delays and timeouts are of crucial importance for interactions between players with bounded processing power like humans. We provide examples to show the feasibility of our approach. A way for game theoretical solving of an interaction description in our language is considered as future work. ",rustam tagiew,,2009.0,,arXiv,Tagiew2009,True,,arXiv,Not available,General Game Management Agent,4a56474f00e4c82052bfca54a567f8b0,http://arxiv.org/abs/0903.0353v1 14733," While it is known that shared quantum entanglement can offer improved solutions to a number of purely cooperative tasks for groups of remote agents, controversy remains regarding the legitimacy of quantum games in a competitive setting--in particular, whether they offer any advantage beyond what is achievable using classical resources. We construct a competitive game between four players based on the minority game where the maximal Nash-equilibrium payoff when played with the appropriate quantum resource is greater than that obtainable by classical means, assuming a local hidden variable model. The game is constructed in a manner analogous to a Bell inequality. This result is important in confirming the legitimacy of quantum games. ",charles hill,,2009.0,10.1016/j.physleta.2010.07.010,Phys. Lett. A 374 (2010) 3619-3624,Hill2009,True,,arXiv,Not available,"A competitive game whose maximal Nash-equilibrium payoff requires quantum resources for its achievement",ff8078cd8cf8d587eda43d52ff318095,http://arxiv.org/abs/0908.4373v2 14734," While it is known that shared quantum entanglement can offer improved solutions to a number of purely cooperative tasks for groups of remote agents, controversy remains regarding the legitimacy of quantum games in a competitive setting--in particular, whether they offer any advantage beyond what is achievable using classical resources. We construct a competitive game between four players based on the minority game where the maximal Nash-equilibrium payoff when played with the appropriate quantum resource is greater than that obtainable by classical means, assuming a local hidden variable model. The game is constructed in a manner analogous to a Bell inequality. This result is important in confirming the legitimacy of quantum games. ",adrian flitney,,2009.0,10.1016/j.physleta.2010.07.010,Phys. Lett. A 374 (2010) 3619-3624,Hill2009,True,,arXiv,Not available,"A competitive game whose maximal Nash-equilibrium payoff requires quantum resources for its achievement",ff8078cd8cf8d587eda43d52ff318095,http://arxiv.org/abs/0908.4373v2 14735," While it is known that shared quantum entanglement can offer improved solutions to a number of purely cooperative tasks for groups of remote agents, controversy remains regarding the legitimacy of quantum games in a competitive setting--in particular, whether they offer any advantage beyond what is achievable using classical resources. We construct a competitive game between four players based on the minority game where the maximal Nash-equilibrium payoff when played with the appropriate quantum resource is greater than that obtainable by classical means, assuming a local hidden variable model. The game is constructed in a manner analogous to a Bell inequality. This result is important in confirming the legitimacy of quantum games. ",nicolas menicucci,,2009.0,10.1016/j.physleta.2010.07.010,Phys. Lett. A 374 (2010) 3619-3624,Hill2009,True,,arXiv,Not available,"A competitive game whose maximal Nash-equilibrium payoff requires quantum resources for its achievement",ff8078cd8cf8d587eda43d52ff318095,http://arxiv.org/abs/0908.4373v2 14736," In this note we consider the following problem to study the effect of malicious players on the social optimum in load balancing games: Consider two players SOC and MAL controlling (1-f) and f fraction of the flow in a load balancing game. SOC tries to minimize the total cost faced by her players while MAL tries to maximize the same. If the latencies are linear, we show that this 2-player zero-sum game has a pure strategy Nash equilibrium. Moreover, we show that one of the optimal strategies for MAL is to play selfishly: let the f fraction of the flow be sent as when the flow was controlled by infinitesimal players playing selfishly and reaching a Nash equilibrium. This shows that a malicious player cannot cause more harm in this game than a set of selfish agents. We also introduce the notion of Cost of Malice - the ratio of the cost faced by SOC at equilibrium to (1-f)OPT, where OPT is the social optimum minimizing the cost of all the players. In linear load balancing games we bound the cost of malice by (1+f/2). ",deeparnab chakrabarty,,2009.0,,arXiv,Chakrabarty2009,True,,arXiv,Not available,"The Effect of Malice on the Social Optimum in Linear Load Balancing Games",5f68f40803bcd38d3e86c3c4a95dde74,http://arxiv.org/abs/0910.2655v2 14737," In this note we consider the following problem to study the effect of malicious players on the social optimum in load balancing games: Consider two players SOC and MAL controlling (1-f) and f fraction of the flow in a load balancing game. SOC tries to minimize the total cost faced by her players while MAL tries to maximize the same. If the latencies are linear, we show that this 2-player zero-sum game has a pure strategy Nash equilibrium. Moreover, we show that one of the optimal strategies for MAL is to play selfishly: let the f fraction of the flow be sent as when the flow was controlled by infinitesimal players playing selfishly and reaching a Nash equilibrium. This shows that a malicious player cannot cause more harm in this game than a set of selfish agents. We also introduce the notion of Cost of Malice - the ratio of the cost faced by SOC at equilibrium to (1-f)OPT, where OPT is the social optimum minimizing the cost of all the players. In linear load balancing games we bound the cost of malice by (1+f/2). ",chinmay karande,,2009.0,,arXiv,Chakrabarty2009,True,,arXiv,Not available,"The Effect of Malice on the Social Optimum in Linear Load Balancing Games",5f68f40803bcd38d3e86c3c4a95dde74,http://arxiv.org/abs/0910.2655v2 14738," In this note we consider the following problem to study the effect of malicious players on the social optimum in load balancing games: Consider two players SOC and MAL controlling (1-f) and f fraction of the flow in a load balancing game. SOC tries to minimize the total cost faced by her players while MAL tries to maximize the same. If the latencies are linear, we show that this 2-player zero-sum game has a pure strategy Nash equilibrium. Moreover, we show that one of the optimal strategies for MAL is to play selfishly: let the f fraction of the flow be sent as when the flow was controlled by infinitesimal players playing selfishly and reaching a Nash equilibrium. This shows that a malicious player cannot cause more harm in this game than a set of selfish agents. We also introduce the notion of Cost of Malice - the ratio of the cost faced by SOC at equilibrium to (1-f)OPT, where OPT is the social optimum minimizing the cost of all the players. In linear load balancing games we bound the cost of malice by (1+f/2). ",ashish sangwan,,2009.0,,arXiv,Chakrabarty2009,True,,arXiv,Not available,"The Effect of Malice on the Social Optimum in Linear Load Balancing Games",5f68f40803bcd38d3e86c3c4a95dde74,http://arxiv.org/abs/0910.2655v2 14739," We study bottleneck routing games where the social cost is determined by the worst congestion on any edge in the network. Bottleneck games have been studied in the literature by having the player's utility costs to be determined by the worst congested edge in their paths. However, the Nash equilibria of such games are inefficient since the price of anarchy can be very high with respect to the parameters of the game. In order to obtain smaller price of anarchy we explore {\em exponential bottleneck games} where the utility costs of the players are exponential functions on the congestion of the edges in their paths. We find that exponential bottleneck games are very efficient giving a poly-log bound on the price of anarchy: O(log L log |E|), where L is the largest path length in the players strategy sets and E is the set of edges in the graph. ",rajgopal kannan,,2009.0,,arXiv,Kannan2009,True,,arXiv,Not available,The Impact of Exponential Utility Costs in Bottleneck Routing Games,8f7c14ace3acd17c416cee318800a2aa,http://arxiv.org/abs/0911.4150v1 14740," This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison between the performance of the auctions system with and without the agent methodology is done with good results ",v. ramachandran,,2010.0,,"International Journal of Network Security & Its Applications 1.3 (2009) 15-31",Sathiyamoorthy2010,True,,arXiv,Not available,"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions",01a1063d6ebc4de6dba0500daf027ecb,http://arxiv.org/abs/1004.0765v1 14741," We study bottleneck routing games where the social cost is determined by the worst congestion on any edge in the network. Bottleneck games have been studied in the literature by having the player's utility costs to be determined by the worst congested edge in their paths. However, the Nash equilibria of such games are inefficient since the price of anarchy can be very high with respect to the parameters of the game. In order to obtain smaller price of anarchy we explore {\em exponential bottleneck games} where the utility costs of the players are exponential functions on the congestion of the edges in their paths. We find that exponential bottleneck games are very efficient giving a poly-log bound on the price of anarchy: O(log L log |E|), where L is the largest path length in the players strategy sets and E is the set of edges in the graph. ",costas busch,,2009.0,,arXiv,Kannan2009,True,,arXiv,Not available,The Impact of Exponential Utility Costs in Bottleneck Routing Games,8f7c14ace3acd17c416cee318800a2aa,http://arxiv.org/abs/0911.4150v1 14742," We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations. However, when the game is played over a communication network, there are several practical issues that need to be taken into account: First, the players may make random decision errors from time to time. Second, the players' observations of each other's previous actions may be incorrect. The players will try to compensate for these errors based on the information they have. We examine convergence property of the game in such scenarios, and establish convergence to the equilibrium point under some mild assumptions when both players are restricted to two actions. ",kien nguyen,,2010.0,,arXiv,Nguyen2010,True,,arXiv,Not available,Security Games with Decision and Observation Errors,73affe2646beb32326a8b18c8b8fe0b1,http://arxiv.org/abs/1003.2767v1 14743," We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations. However, when the game is played over a communication network, there are several practical issues that need to be taken into account: First, the players may make random decision errors from time to time. Second, the players' observations of each other's previous actions may be incorrect. The players will try to compensate for these errors based on the information they have. We examine convergence property of the game in such scenarios, and establish convergence to the equilibrium point under some mild assumptions when both players are restricted to two actions. ",tansu alpcan,,2010.0,,arXiv,Nguyen2010,True,,arXiv,Not available,Security Games with Decision and Observation Errors,73affe2646beb32326a8b18c8b8fe0b1,http://arxiv.org/abs/1003.2767v1 14744," We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations. However, when the game is played over a communication network, there are several practical issues that need to be taken into account: First, the players may make random decision errors from time to time. Second, the players' observations of each other's previous actions may be incorrect. The players will try to compensate for these errors based on the information they have. We examine convergence property of the game in such scenarios, and establish convergence to the equilibrium point under some mild assumptions when both players are restricted to two actions. ",tamer basar,,2010.0,,arXiv,Nguyen2010,True,,arXiv,Not available,Security Games with Decision and Observation Errors,73affe2646beb32326a8b18c8b8fe0b1,http://arxiv.org/abs/1003.2767v1 14745," In this paper we consider strategic cost sharing games with so-called arbitrary sharing based on various combinatorial optimization problems, such as vertex and set cover, facility location, and network design problems. We concentrate on the existence and computational complexity of strong equilibria, in which no coalition can improve the cost of each of its members. Our main result reveals a connection between strong equilibrium in strategic games and the core in traditional coalitional cost sharing games studied in economics. For set cover and facility location games this results in a tight characterization of the existence of strong equilibrium using the integrality gap of suitable linear programming formulations. Furthermore, it allows to derive all existing results for strong equilibria in network design cost sharing games with arbitrary sharing via a unified approach. In addition, we are able to show that in general the strong price of anarchy is always 1. This should be contrasted with the price of anarchy of \Theta(n) for Nash equilibria. Finally, we indicate that the LP-approach can also be used to compute near-optimal and near-stable approximate strong equilibria. ",martin hoefer,,2010.0,,arXiv,Hoefer2010,True,,arXiv,Not available,Strategic Cooperation in Cost Sharing Games,31108353b03946cff0d8d74cc4c3eb2f,http://arxiv.org/abs/1003.3131v1 14746," We introduce a new class of games called the networked common goods game (NCGG), which generalizes the well-known common goods game. We focus on a fairly general subclass of the game where each agent's utility functions are the same across all goods the agent is entitled to and satisfy certain natural properties (diminishing return and smoothness). We give a comprehensive set of technical results listed as follows. * We show the optimization problem faced by a single agent can be solved efficiently in this subclass. The discrete version of the problem is however NP-hard but admits an fully polynomial time approximation scheme (FPTAS). * We show uniqueness results of pure strategy Nash equilibrium of NCGG, and that the equilibrium is fully characterized by the structure of the network and independent of the choices and combinations of agent utility functions. * We show NCGG is a potential game, and give an implementation of best/better response Nash dynamics that lead to fast convergence to an $\epsilon$-approximate pure strategy Nash equilibrium. * Lastly, we show the price of anarchy of NCGG can be as large as $\Omega(n^{1-\epsilon})$ (for any $\epsilon>0$), which means selfish behavior in NCGG can lead to extremely inefficient social outcomes. ",jinsong tan,,2010.0,10.1007/978-3-642-17461-2_26,arXiv,Tan2010,True,,arXiv,Not available,The Networked Common Goods Game,c137701d422a7fab349d7e5d5c17edf7,http://arxiv.org/abs/1004.1578v1 14747," Mafia (also called Werewolf) is a party game. The participants are divided into two competing groups: citizens and a mafia. The objective is to eliminate the opponent group. The game consists of two consecutive phases (day and night) and a certain set of actions (e.g. lynching during day). The mafia members have additional powers (knowing each other, killing during night) whereas the citizens are more numerous. We propose a simple mathematical model of the game, which is essentially a pure death process with discrete time. We find the closed-form solutions for the mafia winning-chance, w(n,m), as well as for the evolution of the game. Moreover, we investigate the discrete properties of results, as well as their continuous-time approximations. It turns out that a relatively small number of the mafia members, i.e. proportional to the square root of the total number of players, gives equal winning-chance for both groups. Furthermore, the game strongly depends on the parity of the total number of players. ",piotr migdal,,2010.0,,arXiv,Migdał2010,True,,arXiv,Not available,A mathematical model of the Mafia game,6a2aeee15fd954450de36828c4b00550,http://arxiv.org/abs/1009.1031v3 14748," We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number/weight of transitions blocked by the strategy. Using a translation into mean-payoff parity games, we prove that the problem of computing (the permissiveness of) a most permissive winning strategy is in NP intersected coNP. Along the way, we provide a new study of mean-payoff parity games. In particular, we prove that the opponent player has a memoryless optimal strategy and give a new algorithm for solving these games. ",patricia bouyer,,2011.0,10.1007/978-3-642-24372-1_11,arXiv,Bouyer2011,True,,arXiv,Not available,"Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited",20ce432e51a80c0ddea0d94d07788ac6,http://arxiv.org/abs/1102.3615v2 14749," We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number/weight of transitions blocked by the strategy. Using a translation into mean-payoff parity games, we prove that the problem of computing (the permissiveness of) a most permissive winning strategy is in NP intersected coNP. Along the way, we provide a new study of mean-payoff parity games. In particular, we prove that the opponent player has a memoryless optimal strategy and give a new algorithm for solving these games. ",nicolas markey,,2011.0,10.1007/978-3-642-24372-1_11,arXiv,Bouyer2011,True,,arXiv,Not available,"Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited",20ce432e51a80c0ddea0d94d07788ac6,http://arxiv.org/abs/1102.3615v2 14750," We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number/weight of transitions blocked by the strategy. Using a translation into mean-payoff parity games, we prove that the problem of computing (the permissiveness of) a most permissive winning strategy is in NP intersected coNP. Along the way, we provide a new study of mean-payoff parity games. In particular, we prove that the opponent player has a memoryless optimal strategy and give a new algorithm for solving these games. ",jorg olschewski,,2011.0,10.1007/978-3-642-24372-1_11,arXiv,Bouyer2011,True,,arXiv,Not available,"Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited",20ce432e51a80c0ddea0d94d07788ac6,http://arxiv.org/abs/1102.3615v2 14751," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14752," We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number/weight of transitions blocked by the strategy. Using a translation into mean-payoff parity games, we prove that the problem of computing (the permissiveness of) a most permissive winning strategy is in NP intersected coNP. Along the way, we provide a new study of mean-payoff parity games. In particular, we prove that the opponent player has a memoryless optimal strategy and give a new algorithm for solving these games. ",michael ummels,,2011.0,10.1007/978-3-642-24372-1_11,arXiv,Bouyer2011,True,,arXiv,Not available,"Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited",20ce432e51a80c0ddea0d94d07788ac6,http://arxiv.org/abs/1102.3615v2 14753," Given a bimatrix game, the associated leadership or commitment games are defined as the games at which one player, the leader, commits to a (possibly mixed) strategy and the other player, the follower, chooses his strategy after having observed the irrevocable commitment of the leader. Based on a result by von Stengel and Zamir [2010], the notions of commitment value and commitment optimal strategies for each player are discussed as a possible solution concept. It is shown that in non-degenerate bimatrix games (a) pure commitment optimal strategies together with the follower's best response constitute Nash equilibria, and (b) strategies that participate in a completely mixed Nash equilibrium are strictly worse than commitment optimal strategies, provided they are not matrix game optimal. For various classes of bimatrix games that generalize zero sum games, the relationship between the maximin value of the leader's payoff matrix, the Nash equilibrium payoff and the commitment optimal value is discussed. For the Traveler's Dilemma, the commitment optimal strategy and commitment value for the leader are evaluated and seem more acceptable as a solution than the unique Nash equilibrium. Finally, the relationship between commitment optimal strategies and Nash equilibria in $2 \times 2$ bimatrix games is thoroughly examined and in addition, necessary and sufficient conditions for the follower to be worse off at the equilibrium of the leadership game than at any Nash equilibrium of the simultaneous move game are provided. ",stefanos leonardos,,2016.0,,arXiv,Leonardos2016,True,,arXiv,Not available,"On the commitment value and commitment optimal strategies in bimatrix games",87eaec80dca8d977f1a7f6a148935118,http://arxiv.org/abs/1612.08888v1 14754," Given a bimatrix game, the associated leadership or commitment games are defined as the games at which one player, the leader, commits to a (possibly mixed) strategy and the other player, the follower, chooses his strategy after having observed the irrevocable commitment of the leader. Based on a result by von Stengel and Zamir [2010], the notions of commitment value and commitment optimal strategies for each player are discussed as a possible solution concept. It is shown that in non-degenerate bimatrix games (a) pure commitment optimal strategies together with the follower's best response constitute Nash equilibria, and (b) strategies that participate in a completely mixed Nash equilibrium are strictly worse than commitment optimal strategies, provided they are not matrix game optimal. For various classes of bimatrix games that generalize zero sum games, the relationship between the maximin value of the leader's payoff matrix, the Nash equilibrium payoff and the commitment optimal value is discussed. For the Traveler's Dilemma, the commitment optimal strategy and commitment value for the leader are evaluated and seem more acceptable as a solution than the unique Nash equilibrium. Finally, the relationship between commitment optimal strategies and Nash equilibria in $2 \times 2$ bimatrix games is thoroughly examined and in addition, necessary and sufficient conditions for the follower to be worse off at the equilibrium of the leadership game than at any Nash equilibrium of the simultaneous move game are provided. ",costis melolidakis,,2016.0,,arXiv,Leonardos2016,True,,arXiv,Not available,"On the commitment value and commitment optimal strategies in bimatrix games",87eaec80dca8d977f1a7f6a148935118,http://arxiv.org/abs/1612.08888v1 14755," Extensive-form games are an important model of finite sequential interaction between players. The size of the extensive-form representation is, however, often prohibitive and it is the most common cause preventing deployment of game-theoretic solution concepts to real-world scenarios. The state-of-the-art approach to solve this issue is the information abstraction methodology. The majority of existing information abstraction approaches create abstracted games where players remember all their actions and all the information they obtained in the abstracted game -- a property denoted as a perfect recall. Remembering all the actions, however, causes the number of decision points of the player (and hence also the size of his strategy) to grow exponentially with the number of actions taken in the past. On the other hand, relaxing the perfect recall requirement (resulting in so-called imperfect recall abstractions) can significantly increase the computational complexity of solving the resulting abstracted game. In this work, we introduce two domain-independent algorithms FPIRA and CFR+IRA which are able to start with an arbitrary imperfect recall abstraction of the solved two-player zero-sum perfect recall extensive-form game. The algorithms simultaneously solve the abstracted game, detect the missing information causing problems and return it to the players. This process is repeated until provable convergence to the desired approximation of the Nash equilibrium of the original game. We experimentally demonstrate that even when the algorithms start with trivial coarse imperfect recall abstraction, they are capable of approximating Nash equilibrium of large games using abstraction with as little as 0.9% of information sets of the original game. ",jiri cermak,,2018.0,,arXiv,Cermak2018,True,,arXiv,Not available,"Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games",4426153b66fce5592809a3717e633d7f,http://arxiv.org/abs/1803.05392v1 14756," Extensive-form games are an important model of finite sequential interaction between players. The size of the extensive-form representation is, however, often prohibitive and it is the most common cause preventing deployment of game-theoretic solution concepts to real-world scenarios. The state-of-the-art approach to solve this issue is the information abstraction methodology. The majority of existing information abstraction approaches create abstracted games where players remember all their actions and all the information they obtained in the abstracted game -- a property denoted as a perfect recall. Remembering all the actions, however, causes the number of decision points of the player (and hence also the size of his strategy) to grow exponentially with the number of actions taken in the past. On the other hand, relaxing the perfect recall requirement (resulting in so-called imperfect recall abstractions) can significantly increase the computational complexity of solving the resulting abstracted game. In this work, we introduce two domain-independent algorithms FPIRA and CFR+IRA which are able to start with an arbitrary imperfect recall abstraction of the solved two-player zero-sum perfect recall extensive-form game. The algorithms simultaneously solve the abstracted game, detect the missing information causing problems and return it to the players. This process is repeated until provable convergence to the desired approximation of the Nash equilibrium of the original game. We experimentally demonstrate that even when the algorithms start with trivial coarse imperfect recall abstraction, they are capable of approximating Nash equilibrium of large games using abstraction with as little as 0.9% of information sets of the original game. ",viliam lisy,,2018.0,,arXiv,Cermak2018,True,,arXiv,Not available,"Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games",4426153b66fce5592809a3717e633d7f,http://arxiv.org/abs/1803.05392v1 14757," Extensive-form games are an important model of finite sequential interaction between players. The size of the extensive-form representation is, however, often prohibitive and it is the most common cause preventing deployment of game-theoretic solution concepts to real-world scenarios. The state-of-the-art approach to solve this issue is the information abstraction methodology. The majority of existing information abstraction approaches create abstracted games where players remember all their actions and all the information they obtained in the abstracted game -- a property denoted as a perfect recall. Remembering all the actions, however, causes the number of decision points of the player (and hence also the size of his strategy) to grow exponentially with the number of actions taken in the past. On the other hand, relaxing the perfect recall requirement (resulting in so-called imperfect recall abstractions) can significantly increase the computational complexity of solving the resulting abstracted game. In this work, we introduce two domain-independent algorithms FPIRA and CFR+IRA which are able to start with an arbitrary imperfect recall abstraction of the solved two-player zero-sum perfect recall extensive-form game. The algorithms simultaneously solve the abstracted game, detect the missing information causing problems and return it to the players. This process is repeated until provable convergence to the desired approximation of the Nash equilibrium of the original game. We experimentally demonstrate that even when the algorithms start with trivial coarse imperfect recall abstraction, they are capable of approximating Nash equilibrium of large games using abstraction with as little as 0.9% of information sets of the original game. ",branislav bosansky,,2018.0,,arXiv,Cermak2018,True,,arXiv,Not available,"Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games",4426153b66fce5592809a3717e633d7f,http://arxiv.org/abs/1803.05392v1 14758," Hannan consistency, or no external regret, is a key concept for learning in games. An action selection algorithm is Hannan consistent (HC), if its performance is eventually as good as selecting the best fixed action in hindsight. If both players in a zero-sum normal form game use a Hannan consistent algorithm, their average behavior converges to a Nash equilibrium of the game. A similar result is known about extensive form games, but the played strategies need to be Hannan consistent with respect to counterfactual values, which are often difficult to obtain. We study zero-sum extensive form games with simultaneous moves, but otherwise perfect information. These games generalize normal form games and they are a special case of extensive form games. We study whether applying HC algorithms in each decision point of a these games directly to the observed payoffs leads to convergence to a Nash equilibrium. This learning process corresponds to a class of Monte Carlo Tree Search algorithms, which are popular for playing simultaneous move games, but do not have any known performance guarantees. We show that using HC algorithms directly on the observed payoffs is not sufficient to guarantee the convergence. With an additional averaging over joint actions, the convergence is guaranteed, but empirically slower. We further define an additional property of HC algorithms, which is sufficient to guarantee the convergence without the averaging and we empirically show that commonly used HC algorithms have this property. ",vojtech kovarik,,2018.0,,arXiv,Kovařík2018,True,,arXiv,Not available,"Analysis of Hannan Consistent Selection for Monte Carlo Tree Search in Simultaneous Move Games",c0a2d94d09ae8d41c5c90c77df4f06e2,http://arxiv.org/abs/1804.09045v1 14759," Hannan consistency, or no external regret, is a key concept for learning in games. An action selection algorithm is Hannan consistent (HC), if its performance is eventually as good as selecting the best fixed action in hindsight. If both players in a zero-sum normal form game use a Hannan consistent algorithm, their average behavior converges to a Nash equilibrium of the game. A similar result is known about extensive form games, but the played strategies need to be Hannan consistent with respect to counterfactual values, which are often difficult to obtain. We study zero-sum extensive form games with simultaneous moves, but otherwise perfect information. These games generalize normal form games and they are a special case of extensive form games. We study whether applying HC algorithms in each decision point of a these games directly to the observed payoffs leads to convergence to a Nash equilibrium. This learning process corresponds to a class of Monte Carlo Tree Search algorithms, which are popular for playing simultaneous move games, but do not have any known performance guarantees. We show that using HC algorithms directly on the observed payoffs is not sufficient to guarantee the convergence. With an additional averaging over joint actions, the convergence is guaranteed, but empirically slower. We further define an additional property of HC algorithms, which is sufficient to guarantee the convergence without the averaging and we empirically show that commonly used HC algorithms have this property. ",viliam lisy,,2018.0,,arXiv,Kovařík2018,True,,arXiv,Not available,"Analysis of Hannan Consistent Selection for Monte Carlo Tree Search in Simultaneous Move Games",c0a2d94d09ae8d41c5c90c77df4f06e2,http://arxiv.org/abs/1804.09045v1 14760," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of $2^N$ into a set $\mathcal{L}$ of losing coalitions $L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W},L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are known as weighted voting games. Freixas and Kurz (IJGT, 2014) conjectured that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$. We confirm this conjecture for two complementary cases, namely when all minimal winning coalitions have size $3$ and when no minimal winning coalition has size $3$. As a general bound we prove that $\alpha\leq \frac{2}{7}n$ for every simple game $(N,v)$. For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size 2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",frits hof,,2018.0,10.1007/978-3-319-99660-8_7,arXiv,Hof2018,True,,arXiv,Not available,Simple Games versus Weighted Voting Games,b71e3a370b5ab01d754db8aabf8b27d5,http://arxiv.org/abs/1805.02192v1 14761," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of $2^N$ into a set $\mathcal{L}$ of losing coalitions $L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W},L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are known as weighted voting games. Freixas and Kurz (IJGT, 2014) conjectured that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$. We confirm this conjecture for two complementary cases, namely when all minimal winning coalitions have size $3$ and when no minimal winning coalition has size $3$. As a general bound we prove that $\alpha\leq \frac{2}{7}n$ for every simple game $(N,v)$. For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size 2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",walter kern,,2018.0,10.1007/978-3-319-99660-8_7,arXiv,Hof2018,True,,arXiv,Not available,Simple Games versus Weighted Voting Games,b71e3a370b5ab01d754db8aabf8b27d5,http://arxiv.org/abs/1805.02192v1 14762," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",tim roughgarden,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14763," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of $2^N$ into a set $\mathcal{L}$ of losing coalitions $L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W},L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are known as weighted voting games. Freixas and Kurz (IJGT, 2014) conjectured that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$. We confirm this conjecture for two complementary cases, namely when all minimal winning coalitions have size $3$ and when no minimal winning coalition has size $3$. As a general bound we prove that $\alpha\leq \frac{2}{7}n$ for every simple game $(N,v)$. For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size 2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",sascha kurz,,2018.0,10.1007/978-3-319-99660-8_7,arXiv,Hof2018,True,,arXiv,Not available,Simple Games versus Weighted Voting Games,b71e3a370b5ab01d754db8aabf8b27d5,http://arxiv.org/abs/1805.02192v1 14764," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of $2^N$ into a set $\mathcal{L}$ of losing coalitions $L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W},L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are known as weighted voting games. Freixas and Kurz (IJGT, 2014) conjectured that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$. We confirm this conjecture for two complementary cases, namely when all minimal winning coalitions have size $3$ and when no minimal winning coalition has size $3$. As a general bound we prove that $\alpha\leq \frac{2}{7}n$ for every simple game $(N,v)$. For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size 2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",daniel paulusma,,2018.0,10.1007/978-3-319-99660-8_7,arXiv,Hof2018,True,,arXiv,Not available,Simple Games versus Weighted Voting Games,b71e3a370b5ab01d754db8aabf8b27d5,http://arxiv.org/abs/1805.02192v1 14765," Although recent work in AI has made great progress in solving large, zero-sum, extensive-form games, the underlying assumption in most past work is that the parameters of the game itself are known to the agents. This paper deals with the relatively under-explored but equally important ""inverse"" setting, where the parameters of the underlying game are not known to all agents, but must be learned through observations. We propose a differentiable, end-to-end learning framework for addressing this task. In particular, we consider a regularized version of the game, equivalent to a particular form of quantal response equilibrium, and develop 1) a primal-dual Newton method for finding such equilibrium points in both normal and extensive form games; and 2) a backpropagation method that lets us analytically compute gradients of all relevant game parameters through the solution itself. This ultimately lets us learn the game by training in an end-to-end fashion, effectively by integrating a ""differentiable game solver"" into the loop of larger deep network architectures. We demonstrate the effectiveness of the learning method in several settings including poker and security game tasks. ",chun ling,,2018.0,,arXiv,Ling2018,True,,arXiv,Not available,"What game are we playing? End-to-end learning in normal and extensive form games",fadbbbd4f344c1745ee1d4fc867033e8,http://arxiv.org/abs/1805.02777v2 14766," Although recent work in AI has made great progress in solving large, zero-sum, extensive-form games, the underlying assumption in most past work is that the parameters of the game itself are known to the agents. This paper deals with the relatively under-explored but equally important ""inverse"" setting, where the parameters of the underlying game are not known to all agents, but must be learned through observations. We propose a differentiable, end-to-end learning framework for addressing this task. In particular, we consider a regularized version of the game, equivalent to a particular form of quantal response equilibrium, and develop 1) a primal-dual Newton method for finding such equilibrium points in both normal and extensive form games; and 2) a backpropagation method that lets us analytically compute gradients of all relevant game parameters through the solution itself. This ultimately lets us learn the game by training in an end-to-end fashion, effectively by integrating a ""differentiable game solver"" into the loop of larger deep network architectures. We demonstrate the effectiveness of the learning method in several settings including poker and security game tasks. ",fei fang,,2018.0,,arXiv,Ling2018,True,,arXiv,Not available,"What game are we playing? End-to-end learning in normal and extensive form games",fadbbbd4f344c1745ee1d4fc867033e8,http://arxiv.org/abs/1805.02777v2 14767," Although recent work in AI has made great progress in solving large, zero-sum, extensive-form games, the underlying assumption in most past work is that the parameters of the game itself are known to the agents. This paper deals with the relatively under-explored but equally important ""inverse"" setting, where the parameters of the underlying game are not known to all agents, but must be learned through observations. We propose a differentiable, end-to-end learning framework for addressing this task. In particular, we consider a regularized version of the game, equivalent to a particular form of quantal response equilibrium, and develop 1) a primal-dual Newton method for finding such equilibrium points in both normal and extensive form games; and 2) a backpropagation method that lets us analytically compute gradients of all relevant game parameters through the solution itself. This ultimately lets us learn the game by training in an end-to-end fashion, effectively by integrating a ""differentiable game solver"" into the loop of larger deep network architectures. We demonstrate the effectiveness of the learning method in several settings including poker and security game tasks. ",j. kolter,,2018.0,,arXiv,Ling2018,True,,arXiv,Not available,"What game are we playing? End-to-end learning in normal and extensive form games",fadbbbd4f344c1745ee1d4fc867033e8,http://arxiv.org/abs/1805.02777v2 14768," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-c.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs, Schloss Dagstuhl - LZI. To appear. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",veronique bruyere,,2016.0,10.4204/EPTCS.226.10,"EPTCS 226, 2016, pp. 135-148",Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds",2fdad247e474cc35627e4d1427831da4,http://arxiv.org/abs/1606.01831v2 14769," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-c.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs, Schloss Dagstuhl - LZI. To appear. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",quentin hautem,,2016.0,10.4204/EPTCS.226.10,"EPTCS 226, 2016, pp. 135-148",Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds",2fdad247e474cc35627e4d1427831da4,http://arxiv.org/abs/1606.01831v2 14770," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-c.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs, Schloss Dagstuhl - LZI. To appear. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",mickael randour,,2016.0,10.4204/EPTCS.226.10,"EPTCS 226, 2016, pp. 135-148",Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds",2fdad247e474cc35627e4d1427831da4,http://arxiv.org/abs/1606.01831v2 14771," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-C.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs 62, pp. 31:1-31:17, Schloss Dagstuhl - LZI. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",veronique bruyere,,2016.0,,arXiv,Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds (Full Version)",641c6d90acca06f343cba5dad2a389cb,http://arxiv.org/abs/1609.05952v1 14772," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-C.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs 62, pp. 31:1-31:17, Schloss Dagstuhl - LZI. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",quentin hautem,,2016.0,,arXiv,Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds (Full Version)",641c6d90acca06f343cba5dad2a389cb,http://arxiv.org/abs/1609.05952v1 14773," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",jan vondrak,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14774," Classical objectives in two-player zero-sum games played on graphs often deal with limit behaviors of infinite plays: e.g., mean-payoff and total-payoff in the quantitative setting, or parity in the qualitative one (a canonical way to encode omega-regular properties). Those objectives offer powerful abstraction mechanisms and often yield nice properties such as memoryless determinacy. However, their very nature provides no guarantee on time bounds within which something good can be witnessed. In this work, we consider two approaches toward inclusion of time bounds in parity games. The first one, parity-response games, is based on the notion of finitary parity games [CHH09] and parity games with costs [FZ14,WZ16]. The second one, window parity games, is inspired by window mean-payoff games [CDRR15]. We compare the two approaches and show that while they prove to be equivalent in some contexts, window parity games offer a more tractable alternative when the time bound is given as a parameter (P-c. vs. PSPACE-C.). In particular, it provides a conservative approximation of parity games computable in polynomial time. Furthermore, we extend both approaches to the multi-dimension setting. We give the full picture for both types of games with regard to complexity and memory bounds. [CHH09] K. Chatterjee, T.A. Henzinger, F. Horn (2009): Finitary winning in omega-regular games. ACM Trans. Comput. Log. 11(1). [FZ14] N. Fijalkow, M. Zimmermann (2014): Parity and Streett Games with Costs. LMCS 10(2). [WZ16] A. Weinert, M. Zimmermann (2016): Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs. Proc. of CSL, LIPIcs 62, pp. 31:1-31:17, Schloss Dagstuhl - LZI. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, J.-F. Raskin (2015): Looking at mean-payoff and total-payoff through windows. Information and Computation 242, pp. 25-52. ",mickael randour,,2016.0,,arXiv,Bruyère2016,True,,arXiv,Not available,"Window Parity Games: An Alternative Approach Toward Parity Games with Time Bounds (Full Version)",641c6d90acca06f343cba5dad2a389cb,http://arxiv.org/abs/1609.05952v1 14775," We propose a new hierarchical approach to understand the complexity of the open problem of computing a Nash equilibrium in a bimatrix game. Specifically, we investigate a hierarchy of bimatrix games $(A,B)$ which results from restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For every fixed $k$, this class strictly generalizes the class of zero-sum games, but is a very special case of general bimatrix games. We show that even for $k=1$ the set of Nash equilibria of these games can consist of an arbitrarily large number of connected components. While the question of exact polynomial time algorithms to find a Nash equilibrium remains open for games of fixed rank, we can provide polynomial time algorithms for finding an $\epsilon$-approximation. ",ravi kannan,,2005.0,,arXiv,Kannan2005,True,,arXiv,Not available,Games of fixed rank: A hierarchy of bimatrix games,c612764898d686b44dc3d69d2bf91a86,http://arxiv.org/abs/cs/0511021v1 14776," We propose a new hierarchical approach to understand the complexity of the open problem of computing a Nash equilibrium in a bimatrix game. Specifically, we investigate a hierarchy of bimatrix games $(A,B)$ which results from restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For every fixed $k$, this class strictly generalizes the class of zero-sum games, but is a very special case of general bimatrix games. We show that even for $k=1$ the set of Nash equilibria of these games can consist of an arbitrarily large number of connected components. While the question of exact polynomial time algorithms to find a Nash equilibrium remains open for games of fixed rank, we can provide polynomial time algorithms for finding an $\epsilon$-approximation. ",thorsten theobald,,2005.0,,arXiv,Kannan2005,True,,arXiv,Not available,Games of fixed rank: A hierarchy of bimatrix games,c612764898d686b44dc3d69d2bf91a86,http://arxiv.org/abs/cs/0511021v1 14777," Several notions of game enjoy a Nash-like notion of equilibrium without guarantee of existence. There are different ways of weakening a definition of Nash-like equilibrium in order to guarantee the existence of a weakened equilibrium. Nash's approach to the problem for strategic games is probabilistic, \textit{i.e.} continuous, and static. CP and BR approaches for CP and BR games are discrete and dynamic. This paper proposes an approach that lies between those two different approaches: a discrete and static approach. multi strategic games are introduced as a formalism that is able to express both sequential and simultaneous decision-making, which promises a good modelling power. multi strategic games are a generalisation of strategic games and sequential graph games that still enjoys a Cartesian product structure, \textit{i.e.} where agent actually choose their strategies. A pre-fixed point result allows guaranteeing existence of discrete and non deterministic equilibria. On the one hand, these equilibria can be computed with polynomial (low) complexity. On the other hand, they are effective in terms of recommendation, as shown by a numerical example. ",stephane roux,,2007.0,,arXiv,Roux2007,True,,arXiv,Not available,Discrete Nondeterminism and Nash Equilibria for Strategy-Based Games,b9e3ceabd2bf0c92be675869797711cf,http://arxiv.org/abs/0712.1519v1 14778," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer. ",justin brunelle,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: Metacognitive Training Through Gaming in iSTART,15cf427e85bcde233e46275f4ce9893a,http://arxiv.org/abs/1009.2204v1 14779," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer. ",irwin levinstein,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: Metacognitive Training Through Gaming in iSTART,15cf427e85bcde233e46275f4ce9893a,http://arxiv.org/abs/1009.2204v1 14780," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer. ",chutima boonthum,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: Metacognitive Training Through Gaming in iSTART,15cf427e85bcde233e46275f4ce9893a,http://arxiv.org/abs/1009.2204v1 14781," The call auction is a widely used trading mechanism, especially during the opening and closing periods of financial markets. In this paper, we study a standard call auction problem where orders are submitted according to Poisson processes, with random prices distributed according to a general distribution, and may be cancelled at any time. We compute the analytical expressions of the distributions of the traded volume, of the lower and upper bounds of the clearing prices, and of the price range of these possible clearing prices of the call auction. Using results from the theory of order statistics and a theorem on the limit of sequences of random variables with independent random indices, we derive the weak limits of all these distributions. In this setting, traded volume and bounds of the clearing prices are found to be asymptotically normal, while the clearing price range is asymptotically exponential. All the parameters of these distributions are explicitly derived as functions of the parameters of the incoming orders' flows. ",ioane toke,,2014.0,,arXiv,Toke2014,True,,arXiv,Not available,Exact and asymptotic solutions of the call auction problem,a8c1fd06545ba8acb94fe635d3abcba7,http://arxiv.org/abs/1407.4512v2 14782," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",yanru zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 14783," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",lingyang song,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 14784," According to evolutionary game theory, cooperation in public goods games is eliminated by free-riders, yet in nature, cooperation is ubiquitous. Artificial models resolve this contradiction via the mechanism of network reciprocity. However, existing research only addresses pre-existing networks and does not specifically consider their origins. Further, much work has focused on scale-free networks and so pre-supposes attachment mechanisms which may not exist in nature. We present a coevolutionary model of public goods games in networks, growing by random attachment, from small founding populations of simple agents. The model demonstrates the emergence of cooperation in moderately heterogeneous networks, regardless of original founders' behaviour, and absent higher cognitive abilities such as recognition or memory. It may thus illustrate a more general mechanism for the evolution of cooperation, from early origins, in minimally cognitive organisms. It is the first example of a model explaining cooperation in public goods games on growing networks. ",joshua knowles,,2016.0,,arXiv,Miller2016,True,,arXiv,Not available,"The emergence of cooperation in public goods games on randomly growing dynamic networks",4eeffbc4f47215072edcb6ef2e06bcde,http://arxiv.org/abs/1603.05829v2 14785," This manuscript presents an alternative implementation of the truthful-in-expectation mechanism of Dughmi, Roughgarden and Yan for combinatorial auctions with weighted-matroid-rank-sum valuations. The new implementation uses only value queries and is approximately truthful-in-expectation, in the sense that by reporting truthfully each agent maximizes his utility within a multiplicative 1-o(1) factor. It still provides an optimal (1-1/e-o(1))-approximation in social welfare. We achieve this by first presenting an approximately maximal-in-distributional-range allocation rule and then showing a black-box transformation to an approximately truthful-in-expectation mechanism. ",qiqi yan,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"An approximately truthful-in-expectation mechanism for combinatorial auctions using value queries",36852ed239e6ecbb2c86d8f484ea78b4,http://arxiv.org/abs/1109.1053v1 14786," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",miao pan,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 14787," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",zaher dawy,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 14788," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",zhu han,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 14789," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",anders drachen,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 14790," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",joseph riley,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 14791," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",shawna baskin,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 14792," The in-game economies of massively multi-player online games (MMOGs) are complex systems that have to be carefully designed and managed. This paper presents the results of an analysis of auction house data from the MMOG Glitch, across a 14 month time period, the entire lifetime of the game. The data comprise almost 3 million data points, over 20,000 unique players and more than 650 products. Furthermore, an interactive visualization, based on Sankey flow diagrams, is presented which shows the proportion of the different clusters across each time bin, as well as the flow of players between clusters. The diagram allows evaluation of migration of players between clusters as a function of time, as well as churn analysis. The presented work provides a template analysis and visualization model for progression-based or temporal-based analysis of player behavior broadly applicable to games. ",diego klabjan,,2016.0,,"Entertainment Computing, Vol. 5, No. 4, 2014, p. 219-232",Drachen2016,True,,arXiv,Not available,"Going Out of Business: Auction House Behavior in the Massively Multi-Player Online Game",077333e7ad44fb9149b171daf022e38a,http://arxiv.org/abs/1603.07610v1 14793," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",wayes tushar,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14794," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",bo chai,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14795," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",chau yuen,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14796," We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with a known distribution of valuations. We show that a tight lower bound on the seller's expected revenue is $1/e$ times the geometric expectation of the buyer's valuation, and that this bound is uniquely achieved for the equal revenue distribution. We show also that when the valuation's expectation and geometric expectation are close, then the seller's expected revenue is close to the expected valuation. ",omer tamuz,,2012.0,10.1016/j.orl.2013.05.011,"Operations Research Letters, 2013, Volume 41, Issue 5, Pages 474--476",Tamuz2012,True,,arXiv,Not available,A lower bound on seller revenue in single buyer monopoly auctions,954a0ec6ed24fa018aca695167e8594b,http://arxiv.org/abs/1204.5551v2 14797," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",shisheng huang,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14798," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",david smith,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14799," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",h. poor,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14800," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",zaiyue yang,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 14801," The tremendous increase in mobile data traffic coupled with fierce competition in wireless industry brings about spectrum scarcity and bandwidth fragmentation. This inevitably results in asymmetric-valued LTE spectrum allocation that stems from different timing for twice improvement in capacity between competing operators, given spectrum allocations today. This motivates us to study the economic effects of asymmetric-valued LTE spectrum allocation. In this paper, we formulate the interactions between operators and users as a hierarchical dynamic game framework, where two spiteful operators simultaneously make spectrum acquisition decisions in the upper-level first-price sealed-bid auction game, and dynamic pricing decisions in the lower-level differential game, taking into account user subscription dynamics. Using backward induction, we derive the equilibrium of the entire game under mild conditions. Through analytical and numerical results, we verify our studies by comparing the latest result of LTE spectrum auction in South Korea, which serves as the benchmark of asymmetric-valued LTE spectrum auction designs. ",sang jung,,2015.0,,arXiv,Jung2015,True,,arXiv,Not available,"Bidding, Pricing, and User Subscription Dynamics in Asymmetric-valued Korean LTE Spectrum Auction: A Hierarchical Dynamic Game Approach",9c965bb8137a65191576a01422f63664,http://arxiv.org/abs/1507.00379v1 14802," The tremendous increase in mobile data traffic coupled with fierce competition in wireless industry brings about spectrum scarcity and bandwidth fragmentation. This inevitably results in asymmetric-valued LTE spectrum allocation that stems from different timing for twice improvement in capacity between competing operators, given spectrum allocations today. This motivates us to study the economic effects of asymmetric-valued LTE spectrum allocation. In this paper, we formulate the interactions between operators and users as a hierarchical dynamic game framework, where two spiteful operators simultaneously make spectrum acquisition decisions in the upper-level first-price sealed-bid auction game, and dynamic pricing decisions in the lower-level differential game, taking into account user subscription dynamics. Using backward induction, we derive the equilibrium of the entire game under mild conditions. Through analytical and numerical results, we verify our studies by comparing the latest result of LTE spectrum auction in South Korea, which serves as the benchmark of asymmetric-valued LTE spectrum auction designs. ",seong-lyun kim,,2015.0,,arXiv,Jung2015,True,,arXiv,Not available,"Bidding, Pricing, and User Subscription Dynamics in Asymmetric-valued Korean LTE Spectrum Auction: A Hierarchical Dynamic Game Approach",9c965bb8137a65191576a01422f63664,http://arxiv.org/abs/1507.00379v1 14803," When faced with the question of how to represent properties in a formal proof system any user has to make design decisions. We have proved three of the theorems from Maskin's 2004 survey article on Auction Theory using the Isabelle/HOL system, and we have produced verified code for combinatorial Vickrey auctions. A fundamental question in this was how to represent some basic concepts: since set theory is available inside Isabelle/HOL, when introducing new definitions there is often the issue of balancing the amount of set-theoretical objects and of objects expressed using entities which are more typical of higher order logic such as functions or lists. Likewise, a user has often to answer the question whether to use a constructive or a non-constructive definition. Such decisions have consequences for the proof development and the usability of the formalization. For instance, sets are usually closer to the representation that economists would use and recognize, while the other objects are closer to the extraction of computational content. In this paper we give examples of the advantages and disadvantages for these approaches and their relationships. In addition, we present the corresponding Isabelle library of definitions and theorems, most prominently those dealing with relations and quotients. ",marco caminati,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,"Set Theory or Higher Order Logic to Represent Auction Concepts in Isabelle?",03812a9144e2d7552cec6bcea1c5ae30,http://arxiv.org/abs/1406.0774v1 14804," When faced with the question of how to represent properties in a formal proof system any user has to make design decisions. We have proved three of the theorems from Maskin's 2004 survey article on Auction Theory using the Isabelle/HOL system, and we have produced verified code for combinatorial Vickrey auctions. A fundamental question in this was how to represent some basic concepts: since set theory is available inside Isabelle/HOL, when introducing new definitions there is often the issue of balancing the amount of set-theoretical objects and of objects expressed using entities which are more typical of higher order logic such as functions or lists. Likewise, a user has often to answer the question whether to use a constructive or a non-constructive definition. Such decisions have consequences for the proof development and the usability of the formalization. For instance, sets are usually closer to the representation that economists would use and recognize, while the other objects are closer to the extraction of computational content. In this paper we give examples of the advantages and disadvantages for these approaches and their relationships. In addition, we present the corresponding Isabelle library of definitions and theorems, most prominently those dealing with relations and quotients. ",manfred kerber,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,"Set Theory or Higher Order Logic to Represent Auction Concepts in Isabelle?",03812a9144e2d7552cec6bcea1c5ae30,http://arxiv.org/abs/1406.0774v1 14805," When faced with the question of how to represent properties in a formal proof system any user has to make design decisions. We have proved three of the theorems from Maskin's 2004 survey article on Auction Theory using the Isabelle/HOL system, and we have produced verified code for combinatorial Vickrey auctions. A fundamental question in this was how to represent some basic concepts: since set theory is available inside Isabelle/HOL, when introducing new definitions there is often the issue of balancing the amount of set-theoretical objects and of objects expressed using entities which are more typical of higher order logic such as functions or lists. Likewise, a user has often to answer the question whether to use a constructive or a non-constructive definition. Such decisions have consequences for the proof development and the usability of the formalization. For instance, sets are usually closer to the representation that economists would use and recognize, while the other objects are closer to the extraction of computational content. In this paper we give examples of the advantages and disadvantages for these approaches and their relationships. In addition, we present the corresponding Isabelle library of definitions and theorems, most prominently those dealing with relations and quotients. ",christoph lange,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,"Set Theory or Higher Order Logic to Represent Auction Concepts in Isabelle?",03812a9144e2d7552cec6bcea1c5ae30,http://arxiv.org/abs/1406.0774v1 14806," When faced with the question of how to represent properties in a formal proof system any user has to make design decisions. We have proved three of the theorems from Maskin's 2004 survey article on Auction Theory using the Isabelle/HOL system, and we have produced verified code for combinatorial Vickrey auctions. A fundamental question in this was how to represent some basic concepts: since set theory is available inside Isabelle/HOL, when introducing new definitions there is often the issue of balancing the amount of set-theoretical objects and of objects expressed using entities which are more typical of higher order logic such as functions or lists. Likewise, a user has often to answer the question whether to use a constructive or a non-constructive definition. Such decisions have consequences for the proof development and the usability of the formalization. For instance, sets are usually closer to the representation that economists would use and recognize, while the other objects are closer to the extraction of computational content. In this paper we give examples of the advantages and disadvantages for these approaches and their relationships. In addition, we present the corresponding Isabelle library of definitions and theorems, most prominently those dealing with relations and quotients. ",colin rowat,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,"Set Theory or Higher Order Logic to Represent Auction Concepts in Isabelle?",03812a9144e2d7552cec6bcea1c5ae30,http://arxiv.org/abs/1406.0774v1 14807," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",neil newman,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 14808," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",jianwei huang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 14809," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",zhu han,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 14810," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",mung chiang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 14811," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",h. poor,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 14812," It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of- Service (QoS) is achievable via direct transmission. An incentivebased auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object secondprice auction is studied for cooperative partner selection in singlecarrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users. ",amitav mukherjee,,2010.0,,arXiv,Mukherjee2010,True,,arXiv,Not available,"General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks",89577886668403404475f52b4d21fdee,http://arxiv.org/abs/1008.3199v1 14813," It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of- Service (QoS) is achievable via direct transmission. An incentivebased auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object secondprice auction is studied for cooperative partner selection in singlecarrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are drawn to min-max fairness at the network level. The proposed strategies for partner selection in self-configuring cooperative wireless networks are shown to be robust under conditions of uncertainty in the number of users requesting cooperation, as well as minimal topology and channel link information available to individual users. ",hyuck kwon,,2010.0,,arXiv,Mukherjee2010,True,,arXiv,Not available,"General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks",89577886668403404475f52b4d21fdee,http://arxiv.org/abs/1008.3199v1 14814," We propose a distributed bidding-aided Matern carrier sense multiple access (CSMA) policy for device-to-device (D2D) content distribution. The network is composed of D2D receivers and potential D2D transmitters, i.e., transmitters are turned on or off by the scheduling algorithm. Each D2D receiver determines the value of its request, by bidding on the set of potential transmitters in its communication range. Given a medium access probability, a fraction of the potential transmitters are jointly scheduled, i.e., turned on, determined jointly by the auction policy and the power control scheme. The bidding-aided scheduling algorithm exploits (i) the local demand distribution, (ii) spatial distribution of D2D node locations, and (iii) the cache configurations of the potential transmitters. We contrast the performance of the bidding-aided CSMA policy with other well-known CSMA schemes that do not take into account (i)-(iii), demonstrate that our algorithm achieves a higher spectral efficiency in terms of the number of bits transmitted per unit time per unit bandwidth per user. The gain becomes even more visible under randomized configurations and requests rather than more skewed placement configurations and deterministic demand distributions. ",derya malak,,2017.0,,arXiv,Malak2017,True,,arXiv,Not available,"A Distributed Auction Policy for User Association in Device-to-Device Caching Networks",e6a4c326e8a7508e911d935e45262d27,http://arxiv.org/abs/1710.05063v1 14815," We propose a distributed bidding-aided Matern carrier sense multiple access (CSMA) policy for device-to-device (D2D) content distribution. The network is composed of D2D receivers and potential D2D transmitters, i.e., transmitters are turned on or off by the scheduling algorithm. Each D2D receiver determines the value of its request, by bidding on the set of potential transmitters in its communication range. Given a medium access probability, a fraction of the potential transmitters are jointly scheduled, i.e., turned on, determined jointly by the auction policy and the power control scheme. The bidding-aided scheduling algorithm exploits (i) the local demand distribution, (ii) spatial distribution of D2D node locations, and (iii) the cache configurations of the potential transmitters. We contrast the performance of the bidding-aided CSMA policy with other well-known CSMA schemes that do not take into account (i)-(iii), demonstrate that our algorithm achieves a higher spectral efficiency in terms of the number of bits transmitted per unit time per unit bandwidth per user. The gain becomes even more visible under randomized configurations and requests rather than more skewed placement configurations and deterministic demand distributions. ",mazin al-shalash,,2017.0,,arXiv,Malak2017,True,,arXiv,Not available,"A Distributed Auction Policy for User Association in Device-to-Device Caching Networks",e6a4c326e8a7508e911d935e45262d27,http://arxiv.org/abs/1710.05063v1 14816," We propose a distributed bidding-aided Matern carrier sense multiple access (CSMA) policy for device-to-device (D2D) content distribution. The network is composed of D2D receivers and potential D2D transmitters, i.e., transmitters are turned on or off by the scheduling algorithm. Each D2D receiver determines the value of its request, by bidding on the set of potential transmitters in its communication range. Given a medium access probability, a fraction of the potential transmitters are jointly scheduled, i.e., turned on, determined jointly by the auction policy and the power control scheme. The bidding-aided scheduling algorithm exploits (i) the local demand distribution, (ii) spatial distribution of D2D node locations, and (iii) the cache configurations of the potential transmitters. We contrast the performance of the bidding-aided CSMA policy with other well-known CSMA schemes that do not take into account (i)-(iii), demonstrate that our algorithm achieves a higher spectral efficiency in terms of the number of bits transmitted per unit time per unit bandwidth per user. The gain becomes even more visible under randomized configurations and requests rather than more skewed placement configurations and deterministic demand distributions. ",jeffrey andrews,,2017.0,,arXiv,Malak2017,True,,arXiv,Not available,"A Distributed Auction Policy for User Association in Device-to-Device Caching Networks",e6a4c326e8a7508e911d935e45262d27,http://arxiv.org/abs/1710.05063v1 14817," Second-price auctions with reserve play a critical role for modern search engine and popular online sites since the revenue of these companies often directly de- pends on the outcome of such auctions. The choice of the reserve price is the main mechanism through which the auction revenue can be influenced in these electronic markets. We cast the problem of selecting the reserve price to optimize revenue as a learning problem and present a full theoretical analysis dealing with the complex properties of the corresponding loss function. We further give novel algorithms for solving this problem and report the results of several experiments in both synthetic and real data demonstrating their effectiveness. ",mehryar mohri,,2013.0,,arXiv,Mohri2013,True,,arXiv,Not available,"Learning Theory and Algorithms for Revenue Optimization in Second-Price Auctions with Reserve",065e83e802149e3e0fbaa26ec9a44084,http://arxiv.org/abs/1310.5665v3 14818," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",kevin leyton-brown,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 14819," Second-price auctions with reserve play a critical role for modern search engine and popular online sites since the revenue of these companies often directly de- pends on the outcome of such auctions. The choice of the reserve price is the main mechanism through which the auction revenue can be influenced in these electronic markets. We cast the problem of selecting the reserve price to optimize revenue as a learning problem and present a full theoretical analysis dealing with the complex properties of the corresponding loss function. We further give novel algorithms for solving this problem and report the results of several experiments in both synthetic and real data demonstrating their effectiveness. ",andres medina,,2013.0,,arXiv,Mohri2013,True,,arXiv,Not available,"Learning Theory and Algorithms for Revenue Optimization in Second-Price Auctions with Reserve",065e83e802149e3e0fbaa26ec9a44084,http://arxiv.org/abs/1310.5665v3 14820," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",weiran shen,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14821," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",binghui peng,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14822," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",hanpeng liu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14823," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",michael zhang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14824," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",ruohan qian,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14825," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",yan hong,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14826," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zhi guo,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14827," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",zongyao ding,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14828," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pengjun lu,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14829," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",paul milgrom,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 14830," In this study, we apply reinforcement learning techniques and propose what we call reinforcement mechanism design to tackle the dynamic pricing problem in sponsored search auctions. In contrast to previous game-theoretical approaches that heavily rely on rationality and common knowledge among the bidders, we take a data-driven approach, and try to learn, over repeated interactions, the set of optimal reserve prices. We implement our approach within the current sponsored search framework of a major search engine: we first train a buyer behavior model, via a real bidding data set, that accurately predicts bids given information that bidders are aware of, including the game parameters disclosed by the search engine, as well as the bidders' KPI data from previous rounds. We then put forward a reinforcement/MDP (Markov Decision Process) based algorithm that optimizes reserve prices over time, in a GSP-like auction. Our simulations demonstrate that our framework outperforms static optimization strategies including the ones that are currently in use, as well as several other dynamic ones. ",pingzhong tang,,2017.0,,arXiv,Shen2017,True,,arXiv,Not available,"Reinforcement Mechanism Design, with Applications to Dynamic Pricing in Sponsored Search Auctions",711e594f27ae747cd004e478546b6bf9,http://arxiv.org/abs/1711.10279v1 14831," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",yu cheng,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 14832," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",ho cheung,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 14833," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",shaddin dughmi,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 14834," Strategic interactions often take place in an environment rife with uncertainty. As a result, the equilibrium of a game is intimately related to the information available to its players. The \emph{signaling problem} abstracts the task faced by an informed ""market maker"", who must choose how to reveal information in order to effect a desirable equilibrium. In this paper, we consider two fundamental signaling problems: one for abstract normal form games, and the other for single item auctions. For the former, we consider an abstract class of objective functions which includes the social welfare and weighted combinations of players' utilities, and for the latter we restrict our attention to the social welfare objective and to signaling schemes which are constrained in the number of signals used. For both problems, we design approximation algorithms for the signaling problem which run in quasi-polynomial time under various conditions, extending and complementing the results of various recent works on the topic. Underlying each of our results is a ""meshing scheme"" which effectively overcomes the ""curse of dimensionality"" and discretizes the space of ""essentially different"" posterior beliefs -- in the sense of inducing ""essentially different"" equilibria. This is combined with an algorithm for optimally assembling a signaling scheme as a convex combination of such beliefs. For the normal form game setting, the meshing scheme leads to a convex partition of the space of posterior beliefs and this assembly procedure is reduced to a linear program, and in the auction setting the assembly procedure is reduced to submodular function maximization. ",shanghua teng,,2014.0,,arXiv,Cheng2014,True,,arXiv,Not available,Signaling in Quasipolynomial time,cce186842a91e4bc9da6eb30e32fe570,http://arxiv.org/abs/1410.3033v1 14835," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",srinivas reddy,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 14836," In this paper, we examine the price dynamics of on-line art auctions of modern Indian art using functional data analysis. The purpose here is not just to understand what determines the final prices of art objects, but also the price movement during the entire auction. We identify several factors, such as artist characteristics (established or emerging artist; prior sales history), art characteristics (size; painting medium--canvas or paper), competition characteristics (current number of bidders; current number of bids) and auction design characteristics (opening bid; position of the lot in the auction), that explain the dynamics of price movement in an on-line art auction. We find that the effects on price vary over the duration of the auction, with some of these effects being stronger at the beginning of the auction (such as the opening bid and historical prices realized). In some cases, the rate of change in prices (velocity) increases at the end of the auction (for canvas paintings and paintings by established artists). Our analysis suggests that the opening bid is positively related to on-line auction price levels of art at the beginning of the auction, but its effect declines toward the end of the auction. The order in which the lots appear in an art auction is negatively related to the current price level, with this relationship decreasing toward the end of the auction. This implies that lots that appear earlier have higher current prices during the early part of the auction, but that effect diminishes by the end of the auction. Established artists show a positive relationship with the price level at the beginning of the auction. Reputation or popularity of the artists and their investment potential as assessed by previous history of sales are positively related to the price levels at the beginning of the auction. The medium (canvas or paper) of the painting does not show any relationship with art auction price levels, but the size of the painting is negatively related to the current price during the early part of the auction. Important implications for auction design are drawn from the analysis. ",mayukh dass,,2006.0,10.1214/088342306000000196,"Statistical Science 2006, Vol. 21, No. 2, 179-193",Reddy2006,True,,arXiv,Not available,Modeling On-Line Art Auction Dynamics Using Functional Data Analysis,79ba52013ee00d79ad732270d3c309c8,http://arxiv.org/abs/math/0609292v1 14837," We consider an auction of identical digital goods to customers whose valuations are drawn independently from known distributions. Myerson's classic result identifies the truthful mechanism that maximizes the seller's expected profit. Under the assumption that in small groups customers can learn each others' valuations, we show how Myerson's result can be improved to yield a higher payoff to the seller using a mechanism that offers groups of customers to buy bundles of items. ",elchanan mossel,,2012.0,,arXiv,Mossel2012,True,,arXiv,Not available,"Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit",9aeeb2673c1ac87de2399bec836986f7,http://arxiv.org/abs/1202.0969v2 14838," We consider an auction of identical digital goods to customers whose valuations are drawn independently from known distributions. Myerson's classic result identifies the truthful mechanism that maximizes the seller's expected profit. Under the assumption that in small groups customers can learn each others' valuations, we show how Myerson's result can be improved to yield a higher payoff to the seller using a mechanism that offers groups of customers to buy bundles of items. ",omer tamuz,,2012.0,,arXiv,Mossel2012,True,,arXiv,Not available,"Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit",9aeeb2673c1ac87de2399bec836986f7,http://arxiv.org/abs/1202.0969v2 14839," We are interested in mechanisms that maximize social welfare. In [1] this problem was studied for multi-unit auctions with unit demand bidders and for the public project problem, and in each case social welfare undominated mechanisms in the class of feasible and incentive compatible mechanisms were identified. One way to improve upon these optimality results is by allowing the players to move sequentially. With this in mind, we study here sequential versions of two feasible Groves mechanisms used for single item auctions: the Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of dominant strategies in this sequential setting, we focus on a weaker concept of an optimal strategy. For each mechanism we introduce natural optimal strategies and observe that in each mechanism these strategies exhibit different behaviour. However, we then show that among all optimal strategies, the one we introduce for each mechanism maximizes the social welfare when each player follows it. The resulting social welfare can be larger than the one obtained in the simultaneous setting. Finally, we show that, when interpreting both mechanisms as simultaneous ones, the vectors of the proposed strategies form a Pareto optimal Nash equilibrium in the class of optimal strategies. ",krzysztof apt,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Optimal Strategies in Sequential Bidding,e18adb79026055821f79d7dbf67256e4,http://arxiv.org/abs/0810.3182v1 14840," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",ilya segal,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 14841," We are interested in mechanisms that maximize social welfare. In [1] this problem was studied for multi-unit auctions with unit demand bidders and for the public project problem, and in each case social welfare undominated mechanisms in the class of feasible and incentive compatible mechanisms were identified. One way to improve upon these optimality results is by allowing the players to move sequentially. With this in mind, we study here sequential versions of two feasible Groves mechanisms used for single item auctions: the Vickrey auction and the Bailey-Cavallo mechanism. Because of the absence of dominant strategies in this sequential setting, we focus on a weaker concept of an optimal strategy. For each mechanism we introduce natural optimal strategies and observe that in each mechanism these strategies exhibit different behaviour. However, we then show that among all optimal strategies, the one we introduce for each mechanism maximizes the social welfare when each player follows it. The resulting social welfare can be larger than the one obtained in the simultaneous setting. Finally, we show that, when interpreting both mechanisms as simultaneous ones, the vectors of the proposed strategies form a Pareto optimal Nash equilibrium in the class of optimal strategies. ",vangelis markakis,,2008.0,,arXiv,Apt2008,True,,arXiv,Not available,Optimal Strategies in Sequential Bidding,e18adb79026055821f79d7dbf67256e4,http://arxiv.org/abs/0810.3182v1 14842," To support a freight carrier in a combinatorial transport auction, we proposes an exact and two heuristic strategies for bidding on subsets of requests. The exact bidding strategy is based on the concept of elementary request combinations. We show that it is sufficient and necessary for a carrier to bid on each elementary request combination in order to guarantee the same result as bidding on each element of the powerset of the set of tendered requests. Both heuristic bidding strategies identify promising request combinations. For this, pairwise synergies based on saving values as well as the capacitated p-median problem are used. The bidding strategies are evaluated by a computational study that simulates an auction. It is based on 174 benchmark instances and therefore easily extendable by other researchers. On average, the two heuristic strategies achieve 91 percent and 81 percent of the available sales potential while generating 36 and only 4 percent of the bundle bids of the exact strategy. Therefore, the proposed bidding strategies help a carrier to increase her chance to win and at the same time reduce the computational burden to participate in a combinatorial transport auction. ",tobias buer,,2014.0,,arXiv,Buer2014,True,,arXiv,Not available,"An exact and two heuristic strategies for truthful bidding in combinatorial transport auctions",611aeda8ce911008ee60fe78da5674a8,http://arxiv.org/abs/1406.1928v1 14843," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",gagan goel,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14844," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",chinmay karande,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14845," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",lei wang,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14846," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",michal feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 14847," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",nick gravin,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 14848," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",brendan lucier,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 14849," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",dimitris fotakis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 14850," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",kyriakos lotidis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 14851," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",xuelin shi,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 14852," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",chara podimata,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 14853," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",ilias diakonikolas,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 14854," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",christos papadimitriou,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 14855," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",george pierrakos,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 14856," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",yaron singer,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 14857," Finite objects and more specifically finite games are formalized using induction, whereas infinite objects are formalized using coinduction. In this article, after an introduction to the concept of coinduction, we revisit on infinite (discrete) extensive games the basic notions of game theory. Among others, we introduce a definition of Nash equilibrium and a notion of subgame perfect equilibrium for infinite games. We use those concepts to analyze well known infinite games, like the dollar auction game and the centipede game and we show that human behaviors that are often considered as illogic are perfectly rational, if one admits that human agents reason coinductively. ",pierre lescanne,,2009.0,,arXiv,Lescanne2009,True,,arXiv,Not available,Deconstruction of Infinite Extensive Games using coinduction,ccf86866e80e854f111e86bd599b02d7,http://arxiv.org/abs/0904.3528v2 14858," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",nikhil devanur,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 14859," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",jamie morgenstern,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 14860," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",vasilis syrgkanis,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 14861," In markets such as digital advertising auctions, bidders want to maximize value rather than payoff. This is different to the utility functions typically assumed in auction theory and leads to different strategies and outcomes. We refer to bidders who maximize value as value bidders. While simple single-object auction formats are truthful, standard multi-object auction formats allow for manipulation. It is straightforward to show that there cannot be a truthful and revenue-maximizing deterministic auction mechanism with value bidders and general valuations. Approximation has been used as a means to achieve truthfulness, and we study which approximation ratios we can get from truthful approximation mechanisms. We show that the approximation ratio that can be achieved with a deterministic and truthful approximation mechanism with $n$ bidders and $m$ items cannot be higher than 1/n for general valuations. For randomized approximation mechanisms there is a framework with a ratio of O(sqrt(m)). We provide better ratios for environments with restricted valuations. ",salman fadaei,,2016.0,,arXiv,Fadaei2016,True,,arXiv,Not available,Truthfulness with Value-Maximizing Bidders,9b2959340a681131f1d07765e8cddd6f,http://arxiv.org/abs/1607.03821v1 14862," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",ke xu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 14863," In markets such as digital advertising auctions, bidders want to maximize value rather than payoff. This is different to the utility functions typically assumed in auction theory and leads to different strategies and outcomes. We refer to bidders who maximize value as value bidders. While simple single-object auction formats are truthful, standard multi-object auction formats allow for manipulation. It is straightforward to show that there cannot be a truthful and revenue-maximizing deterministic auction mechanism with value bidders and general valuations. Approximation has been used as a means to achieve truthfulness, and we study which approximation ratios we can get from truthful approximation mechanisms. We show that the approximation ratio that can be achieved with a deterministic and truthful approximation mechanism with $n$ bidders and $m$ items cannot be higher than 1/n for general valuations. For randomized approximation mechanisms there is a framework with a ratio of O(sqrt(m)). We provide better ratios for environments with restricted valuations. ",martin bichler,,2016.0,,arXiv,Fadaei2016,True,,arXiv,Not available,Truthfulness with Value-Maximizing Bidders,9b2959340a681131f1d07765e8cddd6f,http://arxiv.org/abs/1607.03821v1 14864," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",michael menz,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 14865," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",justin wang,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 14866," In an all-pay auction, only one bidder wins but all bidders must pay the auctioneer. All-pay bidding games arise from attaching a similar bidding structure to traditional combinatorial games to determine which player moves next. In contrast to the established theory of single-pay bidding games, optimal play involves choosing bids from some probability distribution that will guarantee a minimum probability of winning. In this manner, all-pay bidding games wed the underlying concepts of economic and combinatorial games. We present several results on the structures of optimal strategies in these games. We then give a fast algorithm for computing such strategies for a large class of all-pay bidding games. The methods presented provide a framework for further development of the theory of all-pay bidding games. ",jiyang xie,,2015.0,,arXiv,Menz2015,True,,arXiv,Not available,Discrete All-Pay Bidding Games,3da394d4c7bd5b87bc49943620f05e51,http://arxiv.org/abs/1504.02799v2 14867," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 14868," We exhibit incentive compatible multi-unit auctions that are not affine maximizers (i.e., are not of the VCG family) and yet approximate the social welfare to within a factor of $1+\epsilon$. For the case of two-item two-bidder auctions we show that these auctions, termed Triage auctions, are the only scalable ones that give an approximation factor better than 2. ""Scalable"" means that the allocation does not depend on the units in which the valuations are measured. We deduce from this that any scalable computationally-efficient incentive-compatible auction for $m$ items and $n \ge 2$ bidders cannot approximate the social welfare to within a factor better than 2. This is in contrast to arbitrarily good approximations that can be reached under computational constraints alone, and in contrast to the fact that the optimal social welfare can be obtained under incentive constraints alone. ",noam nisan,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Multi-Unit Auctions: Beyond Roberts,13a3033855297018acebedb629814098,http://arxiv.org/abs/1004.1449v2 14869," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",balasubramanian sivan,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 14870," The classic result of Bulow and Klemperer \cite{BK96} says that in a single-item auction recruiting one more bidder and running the Vickrey auction achieves a higher revenue than the optimal auction's revenue on the original set of bidders, when values are drawn i.i.d. from a regular distribution. We give a version of Bulow and Klemperer's result in settings where bidders' values are drawn from non-i.i.d. irregular distributions. We do this by modeling irregular distributions as some convex combination of regular distributions. The regular distributions that constitute the irregular distribution correspond to different population groups in the bidder population. Drawing a bidder from this collection of population groups is equivalent to drawing from some convex combination of these regular distributions. We show that recruiting one extra bidder from each underlying population group and running the Vickrey auction gives at least half of the optimal auction's revenue on the original set of bidders. ",vasilis syrgkanis,,2013.0,,arXiv,Sivan2013,True,,arXiv,Not available,Vickrey Auctions for Irregular Distributions,4f9fd02a8f9e7ad9e4d8ae805554f1db,http://arxiv.org/abs/1306.4022v2 14871," We study the design of mechanisms in combinatorial auction domains. We focus on settings where the auction is repeated, motivated by auctions for licenses or advertising space. We consider models of agent behaviour in which they either apply common learning techniques to minimize the regret of their bidding strategies, or apply short-sighted best-response strategies. We ask: when can a black-box approximation algorithm for the base auction problem be converted into a mechanism that approximately preserves the original algorithm's approximation factor on average over many iterations? We present a general reduction for a broad class of algorithms when agents minimize external regret. We also present a new mechanism for the combinatorial auction problem that attains an $O(\sqrt{m})$ approximation on average when agents apply best-response dynamics. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions,bbb3a99cbd2817e6316e772ef5d192bd,http://arxiv.org/abs/0909.5677v1 14873," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",jiangchuan liu,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 14878," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",ruggiero cavallo,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 14879," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",prabhakar krishnamurthy,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 14880," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",maxim sviridenko,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 14881," The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise different complications because they fundamentally change the way prices are computed. In this paper we report on our efforts to redesign a search ad selling system from the ground up in this new context, proposing a mechanism that optimizes an entire slate of ads globally and computes prices that achieve properties analogous to those held by GSP in the original, simpler setting of uniform ads. A careful algorithmic coupling of allocation-optimization and pricing-computation allows our auction to operate within the strict timing constraints inherent in real-time ad auctions. We report performance results of the auction in Yahoo's Gemini Search platform. ",christopher wilkens,,2017.0,,arXiv,Cavallo2017,True,,arXiv,Not available,Sponsored Search Auctions with Rich Ads,0767700d7f87270f80d664f3c9d905a8,http://arxiv.org/abs/1701.05948v1 14882," The Competition Complexity of an auction measures how much competition is needed for the revenue of a simple auction to surpass the optimal revenue. A classic result from auction theory by Bulow and Klemperer [9], states that the Competition Complexity of VCG, in the case of n i.i.d. buyers and a single item, is 1, i.e., it is better to recruit one extra buyer and run a second price auction than to learn exactly the buyers' underlying distribution and run the revenue-maximizing auction tailored to this distribution. In this paper we study the Competition Complexity of dynamic auctions. Consider the following setting: a monopolist is auctioning off m items in m consecutive stages to n interested buyers. A buyer realizes her value for item k in the beginning of stage k. We prove that the Competition Complexity of dynamic auctions is at most 3n, and at least linear in n, even when the buyers' values are correlated across stages, under a monotone hazard rate assumption on the stage (marginal) distributions. We also prove results on the number of additional buyers necessary for VCG at every stage to be an {\alpha}-approximation of the optimal revenue; we term this number the {\alpha}-approximate Competition Complexity. As a corollary we provide the first results on prior-independent dynamic auctions. This is, to the best of our knowledge, the first non-trivial positive guarantees for simple ex-post IR dynamic auctions for correlated stages. A key step towards proving bounds on the Competition Complexity is getting a good benchmark/upper bound to the optimal revenue. To this end, we extend the recent duality framework of Cai et al. [12] to dynamic settings. As an aside to our approach we obtain a revenue non-monotonicity lemma for dynamic auctions, which may be of independent interest. ",siqi liu,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,On the Competition Complexity of Dynamic Mechanism Design,f090611655a52bf487c4460a9a64d7d0,http://arxiv.org/abs/1709.07955v2 14883," The Competition Complexity of an auction measures how much competition is needed for the revenue of a simple auction to surpass the optimal revenue. A classic result from auction theory by Bulow and Klemperer [9], states that the Competition Complexity of VCG, in the case of n i.i.d. buyers and a single item, is 1, i.e., it is better to recruit one extra buyer and run a second price auction than to learn exactly the buyers' underlying distribution and run the revenue-maximizing auction tailored to this distribution. In this paper we study the Competition Complexity of dynamic auctions. Consider the following setting: a monopolist is auctioning off m items in m consecutive stages to n interested buyers. A buyer realizes her value for item k in the beginning of stage k. We prove that the Competition Complexity of dynamic auctions is at most 3n, and at least linear in n, even when the buyers' values are correlated across stages, under a monotone hazard rate assumption on the stage (marginal) distributions. We also prove results on the number of additional buyers necessary for VCG at every stage to be an {\alpha}-approximation of the optimal revenue; we term this number the {\alpha}-approximate Competition Complexity. As a corollary we provide the first results on prior-independent dynamic auctions. This is, to the best of our knowledge, the first non-trivial positive guarantees for simple ex-post IR dynamic auctions for correlated stages. A key step towards proving bounds on the Competition Complexity is getting a good benchmark/upper bound to the optimal revenue. To this end, we extend the recent duality framework of Cai et al. [12] to dynamic settings. As an aside to our approach we obtain a revenue non-monotonicity lemma for dynamic auctions, which may be of independent interest. ",christos-alexandros psomas,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,On the Competition Complexity of Dynamic Mechanism Design,f090611655a52bf487c4460a9a64d7d0,http://arxiv.org/abs/1709.07955v2 14884," Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most effective method for allocation of resources, especially double auction is more efficient and flexible for it enables buyers and sellers to enter bids and offers simultaneously. In this paper we bring up an electronic auction platform for cloud, and a cloud Continuous Double Auction (CDA) mechanism is formulated to match orders and facilitate trading based on the platform. Some evaluating criteria are defined to analyze the efficiency of markets and strategies. Furthermore, the selection of bidding strategies for the auction plays a very important role for each player to maximize its own profit, so we developed a novel bidding strategy for cloud CDA, BH-strategy, which is a two-stage game bidding strategy. At last we designed three simulation scenarios to compare the performance of our strategy with other dominating bidding strategies and proved that BH-strategy has better performance on surpluses, successful transactions and market efficiency. In addition, we discussed that our cloud CDA mechanism is feasible for cloud computing resource allocation. ",yong wang,,2013.0,,arXiv,Shi2013,True,,arXiv,Not available,"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets",8ff0c7d4bff26ec0a0cd1a4db4825724,http://arxiv.org/abs/1307.6066v1 14885," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",maja rudolph,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 14886," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",joseph ellis,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 14887," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",david blei,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 14888," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",yang cai,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 14889," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",constantinos daskalakis,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 14890," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",s. weinberg,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 14891," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",jonathan weed,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 14892," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",vianney perchet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 14893," Motivated by online advertising auctions, we consider repeated Vickrey auctions where goods of unknown value are sold sequentially and bidders only learn (potentially noisy) information about a good's value once it is purchased. We adopt an online learning approach with bandit feedback to model this problem and derive bidding strategies for two models: stochastic and adversarial. In the stochastic model, the observed values of the goods are random variables centered around the true value of the good. In this case, logarithmic regret is achievable when competing against well behaved adversaries. In the adversarial model, the goods need not be identical and we simply compare our performance against that of the best fixed bid in hindsight. We show that sublinear regret is also achievable in this case and prove matching minimax lower bounds. To our knowledge, this is the first complete set of strategies for bidders participating in auctions of this type. ",philippe rigollet,,2015.0,,arXiv,Weed2015,True,,arXiv,Not available,Online learning in repeated auctions,5233ef9afd1a80aeda35ab9fdcdf6847,http://arxiv.org/abs/1511.05720v1 14894," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",jacob abernethy,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14895," We consider the task of computing an approximation of a trembling hand perfect equilibrium for an n-player game in strategic form, n >= 3. We show that this task is complete for the complexity class FIXP_a. In particular, the task is polynomial time equivalent to the task of computing an approximation of a Nash equilibrium in strategic form games with three (or more) players. ",troels sorensen,,2014.0,,arXiv,Etessami2014,True,,arXiv,Not available,"The complexity of approximating a trembling hand perfect equilibrium of a multi-player game in strategic form",e405ed5721dac4b4c7328a4e711f0ec1,http://arxiv.org/abs/1408.1017v1 14896," Lurking is a complex user-behavioral phenomenon that occurs in all large-scale online communities and social networks. It generally refers to the behavior characterizing users that benefit from the information produced by others in the community without actively contributing back to the production of social content. The amount and evolution of lurkers may strongly affect an online social environment, therefore understanding the lurking dynamics and identifying strategies to curb this trend are relevant problems. In this regard, we introduce the Lurker Game, i.e., a model for analyzing the transitions from a lurking to a non-lurking (i.e., active) user role, and vice versa, in terms of evolutionary game theory. We evaluate the proposed Lurker Game by arranging agents on complex networks and analyzing the system evolution, seeking relations between the network topology and the final equilibrium of the game. Results suggest that the Lurker Game is suitable to model the lurking dynamics, showing how the adoption of rewarding mechanisms combined with the modeling of hypothetical heterogeneity of users' interests may lead users in an online community towards a cooperative behavior. ",marco javarone,,2016.0,,arXiv,Javarone2016,True,,arXiv,Not available,Modeling Evolutionary Dynamics of Lurking in Social Networks,5843c065624f16e8d4546b0487a3f7ef,http://arxiv.org/abs/1605.06368v1 14897," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",christoph lange,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14898," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",sebastien lahaie,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14899," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",matus telgarsky,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 14900," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",renato leme,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 14901," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",martin pal,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 14902," We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the winner, and then apply reserve prices; in the eager version we first discard the bidders not meeting their reserves, and then determine the winner among the rest. We show that the two versions have dramatically different properties: lazy reserves are easy to optimize, and A/B test in production, whereas eager reserves always lead to higher welfare, but their optimization is NP-complete, and naive A/B testing will lead to incorrect conclusions. Despite their different characteristics, we show that the overall revenue for the two scenarios is always within a factor of 2 of each other, even in the presence of correlated bids. Moreover, we prove that the eager auction dominates the lazy auction on revenue whenever the bidders are independent or symmetric. We complement our theoretical results with simulations on real world data that show that even suboptimally set eager reserve prices are preferred from a revenue standpoint. ",sergei vassilvitskii,,2016.0,,arXiv,Leme2016,True,,arXiv,Not available,A Field Guide to Personalized Reserve Prices,17d33a59f625bcdbdebdc4b135121ece,http://arxiv.org/abs/1602.07720v1 14903," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",guillaume basse,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 14904," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",hossein soufiani,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 14905," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",diane lambert,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 14906," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",sumanth sudeendra,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14907," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",megha saini,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14908," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",marco caminati,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14909," The market economy deals with many interacting agents such as buyers and sellers who are autonomous intelligent agents pursuing their own interests. One such multi-agent system (MAS) that plays an important role in auctions is the combinatorial auctioning system (CAS). We use this framework to define our concept of fairness in terms of what we call as ""basic fairness"" and ""extended fairness"". The assumptions of quasilinear preferences and dominant strategies are taken into consideration while explaining fairness. We give an algorithm to ensure fairness in a CAS using a Generalized Vickrey Auction (GVA). We use an algorithm of Sandholm to achieve optimality. Basic and extended fairness are then analyzed according to the dominant strategy solution concept. ",shrisha rao,,2010.0,,arXiv,Sudeendra2010,True,,arXiv,Not available,Fairness in Combinatorial Auctions,f48e47d4bf6f6612c478e4361b0675d8,http://arxiv.org/abs/1005.4774v1 14910," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",gagan goel,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14911," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",chinmay karande,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14912," We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent $i$ for a set $S$ of items can be expressed as $v_if(S)$, where $v_i$ is a private single parameter of the agent, and the function $f$ is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set $S$ of ad-slots, $f(S)$ is, say, the number of {\em unique} viewers reached by the ad, and $v_i$ is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any $\alpha$-approximation non-truthful algorithm ($\alpha \leq 1$) for this problem into $\Omega(\frac{\alpha}{\log{n}})$ and $\Omega(\alpha)$-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively. ",lei wang,,2010.0,10.1007/978-3-642-16170-4_21,arXiv,Goel2010,True,,arXiv,Not available,Single Parameter Combinatorial Auctions with Partially Public Valuations,e15d34e19c2d7fe001be9cab09f02ee5,http://arxiv.org/abs/1007.3539v1 14913," Recent spectrum auctions in the United Kingdom, and some proposals for future auctions of spectrum in the United States, are based on preliminary price discovery rounds, followed by calculation of final prices for the winning buyers. For example, the prices could be the projection of Vikrey prices onto the core of reported prices. The use of Vikrey prices should lead to more straightforward bidding, but the projection reverses some of the incentive for bidders to report truthfully. Still, we conjecture that the price paid by a winning buyer increases no faster than the bid, as in a first price auction. It would be rather disturbing if the conjecture is false. The conjecture is established for a buyer interacting with disjoint groups of other buyers in a star network setting. It is also shown that for any core-selecting payment rule and any integer w greater than or equal to two, there is a market setting with w winning buyers such that the price paid by some winning buyer increases at least (1-1/w) times as fast as the price bid. ",vineet abhishek,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,On the Incentive to Deviate in Core Selecting Combinatorial Auctions,4b16f9d3475848175cc78db76d8b9138,http://arxiv.org/abs/1209.2131v1 14914," Recent spectrum auctions in the United Kingdom, and some proposals for future auctions of spectrum in the United States, are based on preliminary price discovery rounds, followed by calculation of final prices for the winning buyers. For example, the prices could be the projection of Vikrey prices onto the core of reported prices. The use of Vikrey prices should lead to more straightforward bidding, but the projection reverses some of the incentive for bidders to report truthfully. Still, we conjecture that the price paid by a winning buyer increases no faster than the bid, as in a first price auction. It would be rather disturbing if the conjecture is false. The conjecture is established for a buyer interacting with disjoint groups of other buyers in a star network setting. It is also shown that for any core-selecting payment rule and any integer w greater than or equal to two, there is a market setting with w winning buyers such that the price paid by some winning buyer increases at least (1-1/w) times as fast as the price bid. ",bruce hajek,,2012.0,,arXiv,Abhishek2012,True,,arXiv,Not available,On the Incentive to Deviate in Core Selecting Combinatorial Auctions,4b16f9d3475848175cc78db76d8b9138,http://arxiv.org/abs/1209.2131v1 14915," We study probabilistic single-item second-price auctions where the item is characterized by a set of attributes. The auctioneer knows the actual instantiation of all the attributes, but he may choose to reveal only a subset of these attributes to the bidders. Our model is an abstraction of the following Ad auction scenario. The website (auctioneer) knows the demographic information of its impressions, and this information is in terms of a list of attributes (e.g., age, gender, country of location). The website may hide certain attributes from its advertisers (bidders) in order to create thicker market, which may lead to higher revenue. We study how to hide attributes in an optimal way. We show that it is NP-hard to solve for the optimal attribute hiding scheme. We then derive a polynomial-time solvable upper bound on the optimal revenue. Finally, we propose two heuristic-based attribute hiding schemes. Experiments show that revenue achieved by these schemes is close to the upper bound. ",mingyu guo,,2013.0,,arXiv,Guo2013,True,,arXiv,Not available,Revenue Maximization via Hiding Item Attributes,9b3ec8d006b47474d41b7e58db7c7adb,http://arxiv.org/abs/1302.5332v1 14916," We study probabilistic single-item second-price auctions where the item is characterized by a set of attributes. The auctioneer knows the actual instantiation of all the attributes, but he may choose to reveal only a subset of these attributes to the bidders. Our model is an abstraction of the following Ad auction scenario. The website (auctioneer) knows the demographic information of its impressions, and this information is in terms of a list of attributes (e.g., age, gender, country of location). The website may hide certain attributes from its advertisers (bidders) in order to create thicker market, which may lead to higher revenue. We study how to hide attributes in an optimal way. We show that it is NP-hard to solve for the optimal attribute hiding scheme. We then derive a polynomial-time solvable upper bound on the optimal revenue. Finally, we propose two heuristic-based attribute hiding schemes. Experiments show that revenue achieved by these schemes is close to the upper bound. ",argyrios deligkas,,2013.0,,arXiv,Guo2013,True,,arXiv,Not available,Revenue Maximization via Hiding Item Attributes,9b3ec8d006b47474d41b7e58db7c7adb,http://arxiv.org/abs/1302.5332v1 14917," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 14918," Recently, a randomized mechanism has been discovered [Dughmi, Roughgarden and Yan; STOC'11] for combinatorial auctions that is truthful in expectation and guarantees a (1-1/e)-approximation to the optimal social welfare when players have coverage valuations. This approximation ratio is the best possible even for non-truthful algorithms, assuming $P \neq NP$. Given the recent sequence of negative results for combinatorial auctions under more restrictive notions of incentive compatibility, this development raises a natural question: Are truthful-in-expectation mechanisms compatible with polynomial-time approximation in a way that deterministic or universally truthful mechanisms are not? In particular, can polynomial-time truthful-in-expectation mechanisms guarantee a near-optimal approximation ratio for more general variants of combinatorial auctions? We prove that this is not the case. Specifically, the result of Dughmi, Roughgarden and Yan cannot be extended to combinatorial auctions with submodular valuations in the value oracle model. (Absent strategic considerations, a (1-1/e)-approximation is still achievable in this setting.) More precisely, we prove that there is a constant \gamma>0 such that there is no randomized mechanism that is truthful-in-expectation--- or even approximately truthful-in-expectation --- and guarantees an m^{-\gamma}-approximation to the optimal social welfare for combinatorial auctions with submodular valuations in the value oracle model. We also prove an analogous result for the flexible combinatorial public projects (CPP) problem. Both our results present an unexpected separation between coverage functions and submodular functions, which does not occur for these problems without strategic considerations. ",jan vondrak,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,Limitations of randomized mechanisms for combinatorial auctions,6f485dbf7fe6f0ce3ceb4576646f7582,http://arxiv.org/abs/1109.1055v1 14919," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",manfred kerber,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14920," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",shahar dobzinski,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 14921," In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting. ",renato leme,,2013.0,,arXiv,Dobzinski2013,True,,arXiv,Not available,Efficiency Guarantees in Auctions with Budgets,b5a892bdad277be9b84d2e706fd41a5b,http://arxiv.org/abs/1304.7048v1 14922," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",sicco verwer,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 14923," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",yingqian zhang,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 14924," In a sequential auction with multiple bidding agents, it is highly challenging to determine the ordering of the items to sell in order to maximize the revenue due to the fact that the autonomy and private information of the agents heavily influence the outcome of the auction. The main contribution of this paper is two-fold. First, we demonstrate how to apply machine learning techniques to solve the optimal ordering problem in sequential auctions. We learn regression models from historical auctions, which are subsequently used to predict the expected value of orderings for new auctions. Given the learned models, we propose two types of optimization methods: a black-box best-first search approach, and a novel white-box approach that maps learned models to integer linear programs (ILP) which can then be solved by any ILP-solver. Although the studied auction design problem is hard, our proposed optimization methods obtain good orderings with high revenues. Our second main contribution is the insight that the internal structure of regression models can be efficiently evaluated inside an ILP solver for optimization purposes. To this end, we provide efficient encodings of regression trees and linear regression models as ILP constraints. This new way of using learned models for optimization is promising. As the experimental results show, it significantly outperforms the black-box best-first search in nearly all settings. ",qing ye,,2014.0,10.1016/j.artint.2015.05.004,arXiv,Verwer2014,True,,arXiv,Not available,Learning optimization models in the presence of unknown relations,e83349c42e65666aa957691dd3bd5512,http://arxiv.org/abs/1401.1061v2 14925," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",deepan palguna,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 14926," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",david love,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 14927," Auctions have been proposed as a way to provide economic incentives for primary users to dynamically allocate unused spectrum to other users in need of it. Previously proposed schemes do not take into account the fact that the power constraints of users might prevent them from transmitting their bid prices to the auctioneer with high precision and that transmitted bid prices must travel through a noisy channel. These schemes also have very high overheads which cannot be accommodated in wireless standards. We propose auction schemes where a central clearing authority auctions spectrum to users who bid for it, while taking into account quantization of prices, overheads in bid revelation, and noise in the channel explicitly. Our schemes are closely related to channel output feedback problems and, specifically, to the technique of posterior matching. We consider several scenarios where the objective of the clearing authority is to award spectrum to the bidders who value spectrum the most. We prove theoretically that this objective is asymptotically attained by our scheme when the bidders are non-strategic with constant bids. We propose separate schemes to make strategic users reveal their private values truthfully, to auction multiple sub-channels among strategic users, and to track slowly time-varying bid prices. Our simulations illustrate the optimality of our schemes for constant bid prices, and also demonstrate the effectiveness of our tracking algorithm for slowly time-varying bids. ",ilya pollak,,2014.0,,arXiv,Palguna2014,True,,arXiv,Not available,Secondary Spectrum Auctions for Markets with Communication Constraints,4b000aa3092d030f8b1895f175e904a3,http://arxiv.org/abs/1412.7250v1 14928," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",riccardo colini-baldeschi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 14929," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",monika henzinger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 14930," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",till mossakowski,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14931," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",stefano leonardi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 14932," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",martin starnberger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 14933," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",yossi azar,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 14934," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",michal feldman,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 14935," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",nick gravin,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 14936," Incorporating budget constraints into the analysis of auctions has become increasingly important, as they model practical settings more accurately. The social welfare function, which is the standard measure of efficiency in auctions, is inadequate for settings with budgets, since there may be a large disconnect between the value a bidder derives from obtaining an item and what can be liquidated from her. The Liquid Welfare objective function has been suggested as a natural alternative for settings with budgets. Simple auctions, like simultaneous item auctions, are evaluated by their performance at equilibrium using the Price of Anarchy (PoA) measure -- the ratio of the objective function value of the optimal outcome to the worst equilibrium. Accordingly, we evaluate the performance of simultaneous item auctions in budgeted settings by the Liquid Price of Anarchy (LPoA) measure -- the ratio of the optimal Liquid Welfare to the Liquid Welfare obtained in the worst equilibrium. Our main result is that the LPoA for mixed Nash equilibria is bounded by a constant when bidders are additive and items can be divided into sufficiently many discrete parts. Our proofs are robust, and can be extended to achieve similar bounds for simultaneous second price auctions as well as Bayesian Nash equilibria. For pure Nash equilibria, we establish tight bounds on the LPoA for the larger class of fractionally-subadditive valuations. To derive our results, we develop a new technique in which some bidders deviate (surprisingly) toward a non-optimal solution. In particular, this technique does not fit into the smoothness framework. ",alan roytman,,2015.0,,arXiv,Azar2015,True,,arXiv,Not available,Liquid Price of Anarchy,8f88b492426c368b428e13a756e63fdf,http://arxiv.org/abs/1511.01132v1 14937," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",wei chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14938," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",di he,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14939," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tie-yan liu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14940," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tao qin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14941," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",colin rowat,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14942," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",yixin tao,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14943," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",liwei wang,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 14944," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",gagan goel,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 14945," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",vahab mirrokni,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 14946," Constraints on agent's ability to pay play a major role in auction design for any setting where the magnitude of financial transactions is sufficiently large. Those constraints have been traditionally modeled in mechanism design as \emph{hard budget}, i.e., mechanism is not allowed to charge agents more than a certain amount. Yet, real auction systems (such as Google AdWords) allow more sophisticated constraints on agents' ability to pay, such as \emph{average budgets}. In this work, we investigate the design of Pareto optimal and incentive compatible auctions for agents with \emph{constrained quasi-linear utilities}, which captures more realistic models of liquidity constraints that the agents may have. Our result applies to a very general class of allocation constraints known as polymatroidal environments, encompassing many settings of interest such as multi-unit auctions, matching markets, video-on-demand and advertisement systems. Our design is based Ausubel's \emph{clinching framework}. Incentive compatibility and feasibility with respect to ability-to-pay constraints are direct consequences of the clinching framework. Pareto-optimality, on the other hand, is considerably more challenging, since the no-trade condition that characterizes it depends not only on whether agents have their budgets exhausted or not, but also on prices {at} which the goods are allocated. In order to get a handle on those prices, we introduce novel concepts of dropping prices and saturation. These concepts lead to our main structural result which is a characterization of the tight sets in the clinching auction outcome and its relation to dropping prices. ",renato leme,,2014.0,,arXiv,Goel2014,True,,arXiv,Not available,Clinching Auctions Beyond Hard Budget Constraints,81ff4d6b8aa70d6816a717105eb0104e,http://arxiv.org/abs/1404.5000v1 14947," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",yoram bachrach,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 14948," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",sofia ceppi,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 14949," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",ian kash,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 14950," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",peter key,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 14951," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",david kurokawa,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 14952," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",makarius wenzel,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14953," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",satyanath bhat,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 14954," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",shweta jain,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 14955," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",sujit gujar,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 14956," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",y. narahari,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 14957," This paper presents a new lower bound for the discrete strategy improvement algorithm for solving parity games due to Voege and Jurdziski. First, we informally show which structures are difficult to solve for the algorithm. Second, we outline a family of games of quadratic size on which the algorithm requires exponentially many strategy iterations, answering in the negative the long-standing question whether this algorithm runs in polynomial time. Additionally we note that the same family of games can be used to prove a similar result w.r.t. the strategy improvement variant by Schewe. ",oliver friedmann,,2009.0,,arXiv,Friedmann2009,True,,arXiv,Not available,"A Super-Polynomial Lower Bound for the Parity Game Strategy Improvement Algorithm as We Know it",de48ca678c038389fea4cc850eeae9fd,http://arxiv.org/abs/0901.2731v1 14958," We study the problem of computing all Nash equilibria of a subclass of finite normal form games. With algebraic characterization of the games, we present a method for computing all its Nash equilibria. Further, we present a method for deciding membership to the class of games with its related results. An appendix, containing an example to show working of each of the presented methods, concludes the work. ",samaresh chatterji,,2010.0,,arXiv,Chatterji2010,True,,arXiv,Not available,Some Algebraic Properties of a Subclass of Finite Normal Form Games,27868ed862a9733497722ce9b07ce417,http://arxiv.org/abs/1001.4887v1 14959," We study the problem of computing all Nash equilibria of a subclass of finite normal form games. With algebraic characterization of the games, we present a method for computing all its Nash equilibria. Further, we present a method for deciding membership to the class of games with its related results. An appendix, containing an example to show working of each of the presented methods, concludes the work. ",ratnik gandhi,,2010.0,,arXiv,Chatterji2010,True,,arXiv,Not available,Some Algebraic Properties of a Subclass of Finite Normal Form Games,27868ed862a9733497722ce9b07ce417,http://arxiv.org/abs/1001.4887v1 14960," We study strategy improvement algorithms for mean-payoff and parity games. We describe a structural property of these games, and we show that these structures can affect the behaviour of strategy improvement. We show how awareness of these structures can be used to accelerate strategy improvement algorithms. We call our algorithms non-oblivious because they remember properties of the game that they have discovered in previous iterations. We show that non-oblivious strategy improvement algorithms perform well on examples that are known to be hard for oblivious strategy improvement. Hence, we argue that previous strategy improvement algorithms fail because they ignore the structural properties of the game that they are solving. ",john fearnley,,2010.0,10.1007/978-3-642-17511-4_13,arXiv,Fearnley2010,True,,arXiv,Not available,Non-oblivious Strategy Improvement,c4a085a35db33e8246390a578eb2970a,http://arxiv.org/abs/1003.2976v1 14961," This work studies the following question: can plays in a Muller game be stopped after a finite number of moves and a winner be declared. A criterion to do this is sound if Player 0 wins an infinite-duration Muller game if and only if she wins the finite-duration version. A sound criterion is presented that stops a play after at most 3^n moves, where n is the size of the arena. This improves the bound (n!+1)^n obtained by McNaughton and the bound n!+1 derived from a reduction to parity games. ",john fearnley,,2010.0,10.4204/EPTCS.25.15,"EPTCS 25, 2010, pp. 146-161",Fearnley2010,True,,arXiv,Not available,Playing Muller Games in a Hurry,66d500474f0348239279e53285aeeb27,http://arxiv.org/abs/1006.1410v1 14962," This work studies the following question: can plays in a Muller game be stopped after a finite number of moves and a winner be declared. A criterion to do this is sound if Player 0 wins an infinite-duration Muller game if and only if she wins the finite-duration version. A sound criterion is presented that stops a play after at most 3^n moves, where n is the size of the arena. This improves the bound (n!+1)^n obtained by McNaughton and the bound n!+1 derived from a reduction to parity games. ",martin zimmermann,,2010.0,10.4204/EPTCS.25.15,"EPTCS 25, 2010, pp. 146-161",Fearnley2010,True,,arXiv,Not available,Playing Muller Games in a Hurry,66d500474f0348239279e53285aeeb27,http://arxiv.org/abs/1006.1410v1 14963," Novel auction schemes are constantly being designed. Their design has significant consequences for the allocation of goods and the revenues generated. But how to tell whether a new design has the desired properties, such as efficiency, i.e. allocating goods to those bidders who value them most? We say: by formal, machine-checked proofs. We investigated the suitability of the Isabelle, Theorema, Mizar, and Hets/CASL/TPTP theorem provers for reproducing a key result of auction theory: Vickrey's 1961 theorem on the properties of second-price auctions. Based on our formalisation experience, taking an auction designer's perspective, we give recommendations on what system to use for formalising auctions, and outline further steps towards a complete auction theory toolbox. ",wolfgang windsteiger,,2013.0,,arXiv,Lange2013,True,,arXiv,Not available,"A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory",1edd2b6b3a96912b80929fe5411df086,http://arxiv.org/abs/1303.4193v3 14964," We study the computation of Nash equilibria in a two-player normal form game from the perspective of parameterized complexity. Recent results proved hardness for a number of variants, when parameterized by the support size. We complement those results, by identifying three cases in which the problem becomes fixed-parameter tractable. These cases occur in the previously studied settings of sparse games and unbalanced games as well as in the newly considered case of locally bounded treewidth games that generalizes both these two cases. ",danny hermelin,,2010.0,,arXiv,Hermelin2010,True,,arXiv,Not available,Parameterized Two-Player Nash Equilibrium,7d41e7ff1770e02a91a6f726276139a2,http://arxiv.org/abs/1006.2063v1 14965," We study the computation of Nash equilibria in a two-player normal form game from the perspective of parameterized complexity. Recent results proved hardness for a number of variants, when parameterized by the support size. We complement those results, by identifying three cases in which the problem becomes fixed-parameter tractable. These cases occur in the previously studied settings of sparse games and unbalanced games as well as in the newly considered case of locally bounded treewidth games that generalizes both these two cases. ",chien-chung huang,,2010.0,,arXiv,Hermelin2010,True,,arXiv,Not available,Parameterized Two-Player Nash Equilibrium,7d41e7ff1770e02a91a6f726276139a2,http://arxiv.org/abs/1006.2063v1 14966," We study the computation of Nash equilibria in a two-player normal form game from the perspective of parameterized complexity. Recent results proved hardness for a number of variants, when parameterized by the support size. We complement those results, by identifying three cases in which the problem becomes fixed-parameter tractable. These cases occur in the previously studied settings of sparse games and unbalanced games as well as in the newly considered case of locally bounded treewidth games that generalizes both these two cases. ",stefan kratsch,,2010.0,,arXiv,Hermelin2010,True,,arXiv,Not available,Parameterized Two-Player Nash Equilibrium,7d41e7ff1770e02a91a6f726276139a2,http://arxiv.org/abs/1006.2063v1 14967," We study the computation of Nash equilibria in a two-player normal form game from the perspective of parameterized complexity. Recent results proved hardness for a number of variants, when parameterized by the support size. We complement those results, by identifying three cases in which the problem becomes fixed-parameter tractable. These cases occur in the previously studied settings of sparse games and unbalanced games as well as in the newly considered case of locally bounded treewidth games that generalizes both these two cases. ",magnus wahlstrom,,2010.0,,arXiv,Hermelin2010,True,,arXiv,Not available,Parameterized Two-Player Nash Equilibrium,7d41e7ff1770e02a91a6f726276139a2,http://arxiv.org/abs/1006.2063v1 14968," We extend the study of the complexity of finding an $\eps$-approximate Nash equilibrium in congestion games from the case of positive delay functions to delays of arbitrary sign. We first prove that in symmetric games with $\alpha$-bounded jump the $\eps$-Nash dynamic converges in polynomial time when all delay functions are negative, similarly to the case of positive delays. We then establish a hardness result for symmetric games with $\alpha$-bounded jump and with arbitrary delay functions: in that case finding an $\eps$-Nash equilibrium becomes $\PLS$-complete. ",frederic magniez,,2011.0,,arXiv,Magniez2011,True,,arXiv,Not available,"The complexity of approximate Nash equilibrium in congestion games with negative delays",403bc1ee0d4d89537c614512f9dcac01,http://arxiv.org/abs/1102.1161v1 14969," We extend the study of the complexity of finding an $\eps$-approximate Nash equilibrium in congestion games from the case of positive delay functions to delays of arbitrary sign. We first prove that in symmetric games with $\alpha$-bounded jump the $\eps$-Nash dynamic converges in polynomial time when all delay functions are negative, similarly to the case of positive delays. We then establish a hardness result for symmetric games with $\alpha$-bounded jump and with arbitrary delay functions: in that case finding an $\eps$-Nash equilibrium becomes $\PLS$-complete. ",michel rougemont,,2011.0,,arXiv,Magniez2011,True,,arXiv,Not available,"The complexity of approximate Nash equilibrium in congestion games with negative delays",403bc1ee0d4d89537c614512f9dcac01,http://arxiv.org/abs/1102.1161v1 14970," We extend the study of the complexity of finding an $\eps$-approximate Nash equilibrium in congestion games from the case of positive delay functions to delays of arbitrary sign. We first prove that in symmetric games with $\alpha$-bounded jump the $\eps$-Nash dynamic converges in polynomial time when all delay functions are negative, similarly to the case of positive delays. We then establish a hardness result for symmetric games with $\alpha$-bounded jump and with arbitrary delay functions: in that case finding an $\eps$-Nash equilibrium becomes $\PLS$-complete. ",miklos santha,,2011.0,,arXiv,Magniez2011,True,,arXiv,Not available,"The complexity of approximate Nash equilibrium in congestion games with negative delays",403bc1ee0d4d89537c614512f9dcac01,http://arxiv.org/abs/1102.1161v1 14971," We extend the study of the complexity of finding an $\eps$-approximate Nash equilibrium in congestion games from the case of positive delay functions to delays of arbitrary sign. We first prove that in symmetric games with $\alpha$-bounded jump the $\eps$-Nash dynamic converges in polynomial time when all delay functions are negative, similarly to the case of positive delays. We then establish a hardness result for symmetric games with $\alpha$-bounded jump and with arbitrary delay functions: in that case finding an $\eps$-Nash equilibrium becomes $\PLS$-complete. ",xavier zeitoun,,2011.0,,arXiv,Magniez2011,True,,arXiv,Not available,"The complexity of approximate Nash equilibrium in congestion games with negative delays",403bc1ee0d4d89537c614512f9dcac01,http://arxiv.org/abs/1102.1161v1 14972," Classify simple games into sixteen ""types"" in terms of the four conventional axioms: monotonicity, properness, strongness, and nonweakness. Further classify them into sixty-four classes in terms of finiteness (existence of a finite carrier) and algorithmic computability. For each such class, we either show that it is empty or give an example of a game belonging to it. We observe that if a type contains an infinite game, then it contains both computable ones and noncomputable ones. This strongly suggests that computability is logically, as well as conceptually, unrelated to the conventional axioms. ",masahiro kumabe,,2011.0,10.1016/j.jmateco.2010.12.003,Journal of Mathematical Economics 47 (2011) 150-158,Kumabe2011,True,,arXiv,Not available,"Computability of simple games: A complete investigation of the sixty-four possibilities",8a2a1f731de4130eab35f4097dc7d2a4,http://arxiv.org/abs/1102.4037v1 14973," Classify simple games into sixteen ""types"" in terms of the four conventional axioms: monotonicity, properness, strongness, and nonweakness. Further classify them into sixty-four classes in terms of finiteness (existence of a finite carrier) and algorithmic computability. For each such class, we either show that it is empty or give an example of a game belonging to it. We observe that if a type contains an infinite game, then it contains both computable ones and noncomputable ones. This strongly suggests that computability is logically, as well as conceptually, unrelated to the conventional axioms. ",h. mihara,,2011.0,10.1016/j.jmateco.2010.12.003,Journal of Mathematical Economics 47 (2011) 150-158,Kumabe2011,True,,arXiv,Not available,"Computability of simple games: A complete investigation of the sixty-four possibilities",8a2a1f731de4130eab35f4097dc7d2a4,http://arxiv.org/abs/1102.4037v1 14974," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",yuan liu,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 14975," The Lipschitz constant of a finite normal-form game is the maximal change in some player's payoff when a single opponent changes his strategy. We prove that games with small Lipschitz constant admit pure {\epsilon}-equilibria, and pinpoint the maximal Lipschitz constant that is sufficient to imply existence of pure {\epsilon}-equilibrium as a function of the number of players in the game and the number of strategies of each player. Our proofs use the probabilistic method. ",yaron azrieli,,2011.0,10.1287/moor.1120.0557,Mathematics of Operations Research May 2013 vol. 38,Azrieli2011,True,,arXiv,Not available,Lipschitz Games,43335d6ece604749c9aa22ed395e432b,http://arxiv.org/abs/1107.1520v2 14976," The Lipschitz constant of a finite normal-form game is the maximal change in some player's payoff when a single opponent changes his strategy. We prove that games with small Lipschitz constant admit pure {\epsilon}-equilibria, and pinpoint the maximal Lipschitz constant that is sufficient to imply existence of pure {\epsilon}-equilibrium as a function of the number of players in the game and the number of strategies of each player. Our proofs use the probabilistic method. ",eran shmaya,,2011.0,10.1287/moor.1120.0557,Mathematics of Operations Research May 2013 vol. 38,Azrieli2011,True,,arXiv,Not available,Lipschitz Games,43335d6ece604749c9aa22ed395e432b,http://arxiv.org/abs/1107.1520v2 14977," In a biased weak $(a,b)$ polyform achievement game, the maker and the breaker alternately mark $a,b$ previously unmarked cells on an infinite board, respectively. The maker's goal is to mark a set of cells congruent to a polyform. The breaker tries to prevent the maker from achieving this goal. A winning maker strategy for the $(a,b)$ game can be built from winning strategies for games involving fewer marks for the maker and the breaker. A new type of breaker strategy called the priority strategy is introduced. The winners are determined for all $(a,b)$ pairs for polyiamonds and polyominoes up to size four. ",ian norris,,2011.0,,arXiv,Norris2011,True,,arXiv,Not available,Biased Weak Polyform Achievement Games,bdb0e5e8de4f7be046353a36b80ca733,http://arxiv.org/abs/1107.1878v1 14978," In a biased weak $(a,b)$ polyform achievement game, the maker and the breaker alternately mark $a,b$ previously unmarked cells on an infinite board, respectively. The maker's goal is to mark a set of cells congruent to a polyform. The breaker tries to prevent the maker from achieving this goal. A winning maker strategy for the $(a,b)$ game can be built from winning strategies for games involving fewer marks for the maker and the breaker. A new type of breaker strategy called the priority strategy is introduced. The winners are determined for all $(a,b)$ pairs for polyiamonds and polyominoes up to size four. ",nandor sieben,,2011.0,,arXiv,Norris2011,True,,arXiv,Not available,Biased Weak Polyform Achievement Games,bdb0e5e8de4f7be046353a36b80ca733,http://arxiv.org/abs/1107.1878v1 14979," We analyze the core of a cooperative Cournot game. We assume that when contemplating a deviation, the members of a coalition assign positive probability over all possible coalition structures that the non-members can form. We show that when the number of firms in the market is sufficiently large then the core of the underlying cooperative game is non-empty. Moreover, we show that the core of our game is a subset of the \gamma - core. ",paraskevas lekeas,,2011.0,,arXiv,Lekeas2011,True,,arXiv,Not available,Cooperative oligopoly games: a probabilistic approach,3a2f6e0b7f98e7c676e7614b1cb50d02,http://arxiv.org/abs/1107.3197v1 14980," We analyze the core of a cooperative Cournot game. We assume that when contemplating a deviation, the members of a coalition assign positive probability over all possible coalition structures that the non-members can form. We show that when the number of firms in the market is sufficiently large then the core of the underlying cooperative game is non-empty. Moreover, we show that the core of our game is a subset of the \gamma - core. ",giorgos stamatopoulos,,2011.0,,arXiv,Lekeas2011,True,,arXiv,Not available,Cooperative oligopoly games: a probabilistic approach,3a2f6e0b7f98e7c676e7614b1cb50d02,http://arxiv.org/abs/1107.3197v1 14981," We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $\epsilon$, let us call a stochastic game $\epsilon$-ergodic, if its values from any two initial positions differ by at most $\epsilon$. The proposed new algorithm outputs for every $\epsilon>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the values from any initial positions are within an $\epsilon$-range, or identifies two initial positions $u$ and $v$ and corresponding stationary strategies for the players proving that the game values starting from $u$ and $v$ are at least $\epsilon/24$ apart. In particular, the above result shows that if a stochastic game is $\epsilon$-ergodic, then there are stationary strategies for the players proving $24\epsilon$-ergodicity. This result strengthens and provides a constructive version of an existential result by Vrieze (1980) claiming that if a stochastic game is $0$-ergodic, then there are $\epsilon$-optimal stationary strategies for every $\epsilon > 0$. The suggested algorithm is based on a potential transformation technique that changes the range of local values at all positions without changing the normal form of the game. ",endre boros,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Potential Reduction Algorithm for Two-person Zero-sum Mean Payoff Stochastic Games",79d25f1768bb54dca2cad4e71de1632b,http://arxiv.org/abs/1508.03455v1 14982," We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $\epsilon$, let us call a stochastic game $\epsilon$-ergodic, if its values from any two initial positions differ by at most $\epsilon$. The proposed new algorithm outputs for every $\epsilon>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the values from any initial positions are within an $\epsilon$-range, or identifies two initial positions $u$ and $v$ and corresponding stationary strategies for the players proving that the game values starting from $u$ and $v$ are at least $\epsilon/24$ apart. In particular, the above result shows that if a stochastic game is $\epsilon$-ergodic, then there are stationary strategies for the players proving $24\epsilon$-ergodicity. This result strengthens and provides a constructive version of an existential result by Vrieze (1980) claiming that if a stochastic game is $0$-ergodic, then there are $\epsilon$-optimal stationary strategies for every $\epsilon > 0$. The suggested algorithm is based on a potential transformation technique that changes the range of local values at all positions without changing the normal form of the game. ",khaled elbassioni,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Potential Reduction Algorithm for Two-person Zero-sum Mean Payoff Stochastic Games",79d25f1768bb54dca2cad4e71de1632b,http://arxiv.org/abs/1508.03455v1 14983," We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $\epsilon$, let us call a stochastic game $\epsilon$-ergodic, if its values from any two initial positions differ by at most $\epsilon$. The proposed new algorithm outputs for every $\epsilon>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the values from any initial positions are within an $\epsilon$-range, or identifies two initial positions $u$ and $v$ and corresponding stationary strategies for the players proving that the game values starting from $u$ and $v$ are at least $\epsilon/24$ apart. In particular, the above result shows that if a stochastic game is $\epsilon$-ergodic, then there are stationary strategies for the players proving $24\epsilon$-ergodicity. This result strengthens and provides a constructive version of an existential result by Vrieze (1980) claiming that if a stochastic game is $0$-ergodic, then there are $\epsilon$-optimal stationary strategies for every $\epsilon > 0$. The suggested algorithm is based on a potential transformation technique that changes the range of local values at all positions without changing the normal form of the game. ",vladimir gurvich,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Potential Reduction Algorithm for Two-person Zero-sum Mean Payoff Stochastic Games",79d25f1768bb54dca2cad4e71de1632b,http://arxiv.org/abs/1508.03455v1 14984," We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $\epsilon$, let us call a stochastic game $\epsilon$-ergodic, if its values from any two initial positions differ by at most $\epsilon$. The proposed new algorithm outputs for every $\epsilon>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the values from any initial positions are within an $\epsilon$-range, or identifies two initial positions $u$ and $v$ and corresponding stationary strategies for the players proving that the game values starting from $u$ and $v$ are at least $\epsilon/24$ apart. In particular, the above result shows that if a stochastic game is $\epsilon$-ergodic, then there are stationary strategies for the players proving $24\epsilon$-ergodicity. This result strengthens and provides a constructive version of an existential result by Vrieze (1980) claiming that if a stochastic game is $0$-ergodic, then there are $\epsilon$-optimal stationary strategies for every $\epsilon > 0$. The suggested algorithm is based on a potential transformation technique that changes the range of local values at all positions without changing the normal form of the game. ",kazuhisa makino,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Potential Reduction Algorithm for Two-person Zero-sum Mean Payoff Stochastic Games",79d25f1768bb54dca2cad4e71de1632b,http://arxiv.org/abs/1508.03455v1 14985," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",meixia tao,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 14986," A recently introduced concept of ""cooperative equilibrium"", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed ""Pareto solvable"" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We show that games in this class possess a unique pure cooperative equilibrium. Furthermore, for the Ultimatum Game, this notion appears to be strongly correlated with a suitably defined variant of the Dictator Game. We support this observation with the results of a behavioural experiment conducted using Amazon Mechanical Turk, which demonstrates that our approach allows for making statistically precise predictions of average behaviour in such settings. ",valerio capraro,,2015.0,,arXiv,Capraro2015,True,,arXiv,Not available,Cooperative Equilibrium beyond Social Dilemmas: Pareto Solvable Games,3786f428f4bed7afc11ba6438a546f34,http://arxiv.org/abs/1509.07599v1 14987," A recently introduced concept of ""cooperative equilibrium"", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed ""Pareto solvable"" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We show that games in this class possess a unique pure cooperative equilibrium. Furthermore, for the Ultimatum Game, this notion appears to be strongly correlated with a suitably defined variant of the Dictator Game. We support this observation with the results of a behavioural experiment conducted using Amazon Mechanical Turk, which demonstrates that our approach allows for making statistically precise predictions of average behaviour in such settings. ",maria polukarov,,2015.0,,arXiv,Capraro2015,True,,arXiv,Not available,Cooperative Equilibrium beyond Social Dilemmas: Pareto Solvable Games,3786f428f4bed7afc11ba6438a546f34,http://arxiv.org/abs/1509.07599v1 14988," A recently introduced concept of ""cooperative equilibrium"", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed ""Pareto solvable"" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We show that games in this class possess a unique pure cooperative equilibrium. Furthermore, for the Ultimatum Game, this notion appears to be strongly correlated with a suitably defined variant of the Dictator Game. We support this observation with the results of a behavioural experiment conducted using Amazon Mechanical Turk, which demonstrates that our approach allows for making statistically precise predictions of average behaviour in such settings. ",matteo venanzi,,2015.0,,arXiv,Capraro2015,True,,arXiv,Not available,Cooperative Equilibrium beyond Social Dilemmas: Pareto Solvable Games,3786f428f4bed7afc11ba6438a546f34,http://arxiv.org/abs/1509.07599v1 14989," A recently introduced concept of ""cooperative equilibrium"", based on the assumption that players have a natural attitude to cooperation, has been proven a powerful tool in predicting human behaviour in social dilemmas. In this paper, we extend this idea to more general game models, termed ""Pareto solvable"" games, which in particular include the Nash Bargaining Problem and the Ultimatum Game. We show that games in this class possess a unique pure cooperative equilibrium. Furthermore, for the Ultimatum Game, this notion appears to be strongly correlated with a suitably defined variant of the Dictator Game. We support this observation with the results of a behavioural experiment conducted using Amazon Mechanical Turk, which demonstrates that our approach allows for making statistically precise predictions of average behaviour in such settings. ",nicholas jennings,,2015.0,,arXiv,Capraro2015,True,,arXiv,Not available,Cooperative Equilibrium beyond Social Dilemmas: Pareto Solvable Games,3786f428f4bed7afc11ba6438a546f34,http://arxiv.org/abs/1509.07599v1 14990," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",arup roy,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14991," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",amit mukherjee,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14992," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",tamal guha,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14993," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",sibasish ghosh,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14994," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",some bhattacharya,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14995," Interesting connection has been established between two apparently unrelated concepts, namely, quantum nonlocality and Bayesian game theory. It has been shown that nonlocal correlations in the form of advice can outperform classical equilibrium strategies in common interest Bayesian games and also in conflicting interest games. However, classical equilibrium strategies can be of two types, fair and unfair. Whereas in fair equilibrium payoffs of different players are same, in unfair case they differ. Advantage of nonlocal correlation has been demonstrated over fair strategies. In this work we show that quantum strategies can outperform even the unfair classical equilibrium strategies. For this purpose we consider a class of two players games which as a special case includes the conflicting game proposed in [Phys. Rev. Lett. 114, 020401 (2015)]. These games can have both fair and unfair classical equilibria and also can have only unfair ones. We provide a simple analytic characterization of the nonlocal correlations that are advantageous over the classical equilibrium strategies in these games. ",manik banik,,2016.0,10.1103/PhysRevA.94.032120,"Phys. Rev. A 94, 032120 (2016)",Roy2016,True,,arXiv,Not available,Nonlocal correlations: Fair and Unfair Strategies in Bayesian Game,dc3d4ef4bdcd22bb01cfd3a4e6de1b1e,http://arxiv.org/abs/1601.02349v3 14996," This paper studies a wireless network where multiple users cooperate with each other to improve the overall network performance. Our goal is to design an optimal distributed power allocation algorithm that enables user cooperation, in particular, to guide each user on the decision of transmission mode selection and relay selection. Our algorithm has the nice interpretation of an auction mechanism with multiple auctioneers and multiple bidders. Specifically, in our proposed framework, each user acts as both an auctioneer (seller) and a bidder (buyer). Each auctioneer determines its trading price and allocates power to bidders, and each bidder chooses the demand from each auctioneer. By following the proposed distributed algorithm, each user determines how much power to reserve for its own transmission, how much power to purchase from other users, and how much power to contribute for relaying the signals of others. We derive the optimal bidding and pricing strategies that maximize the weighted sum rates of the users. Extensive simulations are carried out to verify our proposed approach. ",jianwei huang,,2012.0,10.1109/TWC.2012.121112.112284,arXiv,Liu2012,True,,arXiv,Not available,"An Auction Approach to Distributed Power Allocation for Multiuser Cooperative Networks",a4a980a9c39db12814df61c9cf1956cc,http://arxiv.org/abs/1210.4749v1 14997," We study the strategic considerations of miners participating in the bitcoin's protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a block) which will end up in the path of the tree that is adopted by all. Since the miners can hide newly mined nodes, they play a game with incomplete information. Here we consider two simplified forms of this game in which the miners have complete information. In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine. In the second more complicated game, when a block is mined it is announced immediately, but it may not be released so that other miners cannot continue mining from it. A miner not only decides which blocks to mine, but also when to release blocks to other miners. In both games, we show that when the computational power of each miner is relatively small, their best response matches the expected behavior of the bitcoin designer. However, when the computational power of a miner is large, he deviates from the expected behavior, and other Nash equilibria arise. ",aggelos kiayias,,2016.0,,arXiv,Kiayias2016,True,,arXiv,Not available,Blockchain Mining Games,bb7300a69a36927e0db3d3979abff253,http://arxiv.org/abs/1607.02420v1 14998," We study the strategic considerations of miners participating in the bitcoin's protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a block) which will end up in the path of the tree that is adopted by all. Since the miners can hide newly mined nodes, they play a game with incomplete information. Here we consider two simplified forms of this game in which the miners have complete information. In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine. In the second more complicated game, when a block is mined it is announced immediately, but it may not be released so that other miners cannot continue mining from it. A miner not only decides which blocks to mine, but also when to release blocks to other miners. In both games, we show that when the computational power of each miner is relatively small, their best response matches the expected behavior of the bitcoin designer. However, when the computational power of a miner is large, he deviates from the expected behavior, and other Nash equilibria arise. ",elias koutsoupias,,2016.0,,arXiv,Kiayias2016,True,,arXiv,Not available,Blockchain Mining Games,bb7300a69a36927e0db3d3979abff253,http://arxiv.org/abs/1607.02420v1 14999," We study the strategic considerations of miners participating in the bitcoin's protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a block) which will end up in the path of the tree that is adopted by all. Since the miners can hide newly mined nodes, they play a game with incomplete information. Here we consider two simplified forms of this game in which the miners have complete information. In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine. In the second more complicated game, when a block is mined it is announced immediately, but it may not be released so that other miners cannot continue mining from it. A miner not only decides which blocks to mine, but also when to release blocks to other miners. In both games, we show that when the computational power of each miner is relatively small, their best response matches the expected behavior of the bitcoin designer. However, when the computational power of a miner is large, he deviates from the expected behavior, and other Nash equilibria arise. ",maria kyropoulou,,2016.0,,arXiv,Kiayias2016,True,,arXiv,Not available,Blockchain Mining Games,bb7300a69a36927e0db3d3979abff253,http://arxiv.org/abs/1607.02420v1 15000," We study the strategic considerations of miners participating in the bitcoin's protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree of blocks, and they are paid when they create a node (mine a block) which will end up in the path of the tree that is adopted by all. Since the miners can hide newly mined nodes, they play a game with incomplete information. Here we consider two simplified forms of this game in which the miners have complete information. In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine. In the second more complicated game, when a block is mined it is announced immediately, but it may not be released so that other miners cannot continue mining from it. A miner not only decides which blocks to mine, but also when to release blocks to other miners. In both games, we show that when the computational power of each miner is relatively small, their best response matches the expected behavior of the bitcoin designer. However, when the computational power of a miner is large, he deviates from the expected behavior, and other Nash equilibria arise. ",yiannis tselekounis,,2016.0,,arXiv,Kiayias2016,True,,arXiv,Not available,Blockchain Mining Games,bb7300a69a36927e0db3d3979abff253,http://arxiv.org/abs/1607.02420v1 15001," Topological fixpoint logics are a family of logics that admits topological models and where the fixpoint operators are defined with respect to the topological interpretations. Here we consider a topological fixpoint logic for relational structures based on Stone spaces, where the fixpoint operators are interpreted via clopen sets. We develop a game-theoretic semantics for this logic. First we introduce games characterising clopen fixpoints of monotone operators on Stone spaces. These fixpoint games allow us to characterise the semantics for our topological fixpoint logic using a two-player graph game. Adequacy of this game is the main result of our paper. Finally, we define bisimulations for the topological structures under consideration and use our game semantics to prove that the truth of a formula of our topological fixpoint logic is bisimulation-invariant. ",nick bezhanishvili,,2016.0,10.4204/EPTCS.226.4,"EPTCS 226, 2016, pp. 46-60",Bezhanishvili2016,True,,arXiv,Not available,Games for Topological Fixpoint Logic,0bb36524aa2fc1057d5bcc0b4ee2920c,http://arxiv.org/abs/1609.04088v1 15002," Topological fixpoint logics are a family of logics that admits topological models and where the fixpoint operators are defined with respect to the topological interpretations. Here we consider a topological fixpoint logic for relational structures based on Stone spaces, where the fixpoint operators are interpreted via clopen sets. We develop a game-theoretic semantics for this logic. First we introduce games characterising clopen fixpoints of monotone operators on Stone spaces. These fixpoint games allow us to characterise the semantics for our topological fixpoint logic using a two-player graph game. Adequacy of this game is the main result of our paper. Finally, we define bisimulations for the topological structures under consideration and use our game semantics to prove that the truth of a formula of our topological fixpoint logic is bisimulation-invariant. ",clemens kupke,,2016.0,10.4204/EPTCS.226.4,"EPTCS 226, 2016, pp. 46-60",Bezhanishvili2016,True,,arXiv,Not available,Games for Topological Fixpoint Logic,0bb36524aa2fc1057d5bcc0b4ee2920c,http://arxiv.org/abs/1609.04088v1 15003," In population games, a large population of players, modeled as a continuum, is divided into subpopulations, and the fitness or payoff of each subpopulation depends on the overall population composition. Evolutionary dynamics describe how the population composition changes in response to the fitness levels, resulting in a closed-loop feedback system. Recent work established a connection between passivity theory and certain classes of population games, namely so-called ""stable games"". In particular, it was shown that a combination of stable games and (an analogue of) passive evolutionary dynamics results in stable convergence to Nash equilibrium. This paper considers the converse question of necessary conditions for evolutionary dynamics to exhibit stable behaviors for all generalized stable games. Here, generalization refers to ""higher order"" games where the population payoffs may be a dynamic function of the population state. Using methods from robust control analysis, we show that if an evolutionary dynamic does not satisfy a passivity property, then it is possible to construct a generalized stable game that results in instability. The results are illustrated on selected evolutionary dynamics with particular attention to replicator dynamics, which are also shown to be lossless, a special class of passive systems. ",m. mabrok,,2016.0,,arXiv,Mabrok2016,True,,arXiv,Not available,"Passivity Analysis of Higher Order Evolutionary Dynamics and Population Games",d69c1de1a1a33a86adf35516d627a243,http://arxiv.org/abs/1609.04952v1 15004," In population games, a large population of players, modeled as a continuum, is divided into subpopulations, and the fitness or payoff of each subpopulation depends on the overall population composition. Evolutionary dynamics describe how the population composition changes in response to the fitness levels, resulting in a closed-loop feedback system. Recent work established a connection between passivity theory and certain classes of population games, namely so-called ""stable games"". In particular, it was shown that a combination of stable games and (an analogue of) passive evolutionary dynamics results in stable convergence to Nash equilibrium. This paper considers the converse question of necessary conditions for evolutionary dynamics to exhibit stable behaviors for all generalized stable games. Here, generalization refers to ""higher order"" games where the population payoffs may be a dynamic function of the population state. Using methods from robust control analysis, we show that if an evolutionary dynamic does not satisfy a passivity property, then it is possible to construct a generalized stable game that results in instability. The results are illustrated on selected evolutionary dynamics with particular attention to replicator dynamics, which are also shown to be lossless, a special class of passive systems. ",jeff shamma,,2016.0,,arXiv,Mabrok2016,True,,arXiv,Not available,"Passivity Analysis of Higher Order Evolutionary Dynamics and Population Games",d69c1de1a1a33a86adf35516d627a243,http://arxiv.org/abs/1609.04952v1 15005," Consider a situation with $n$ agents or players where some of the players form a coalition with a certain collective objective. Simple games are used to model systems that can decide whether coalitions are successful (winning) or not (losing). A simple game can be viewed as a monotone boolean function. The dimension of a simple game is the smallest positive integer $d$ such that the simple game can be expressed as the intersection of $d$ threshold functions where each threshold function uses a threshold and $n$ weights. Taylor and Zwicker have shown that $d$ is bounded from above by the number of maximal losing coalitions. We present two new upper bounds both containing the Taylor/Zwicker-bound as a special case. The Taylor/Zwicker-bound imply an upper bound of ${n \choose n/2}$. We improve this upper bound significantly by showing constructively that $d$ is bounded from above by the cardinality of any binary covering code with length $n$ and covering radius $1$. This result supplements a recent result where Olsen et al. showed how to construct simple games with dimension $|C|$ for any binary constant weight SECDED code $C$ with length $n$. Our result represents a major step in the attempt to close the dimensionality gap for simple games. ",martin olsen,,2016.0,,arXiv,Olsen2016,True,,arXiv,Not available,On Covering Codes and Upper Bounds for the Dimension of Simple Games,257a316919527338ea9e1c6b1f652468,http://arxiv.org/abs/1609.04960v1 15006," The goal of the paper is to develop the theory of finite state mean field games with major and minor players when the state space of the game is finite. We introduce the finite player games and derive a mean field game formulation in the limit when the number of minor players tends to infinity. In this limit, we prove that the value functions of the optimization problems are viscosity solutions of PIDEs of the HJB type, and we construct the best responses for both types of players. From there, we prove existence of Nash equilibria under reasonable assumptions. Finally we prove that a form of propagation of chaos holds in the present context and use this result to prove existence of approximate Nash equilibria for the finite player games from the solutions of the mean field games. this vindicate our formulation of the mean field game problem. ",rene carmona,,2016.0,,arXiv,Carmona2016,True,,arXiv,Not available,Finite State Mean Field Games with Major and Minor Players,2adcbe5875634b766efcb389a4786c43,http://arxiv.org/abs/1610.05408v1 15007," Lurking is a complex user-behavioral phenomenon that occurs in all large-scale online communities and social networks. It generally refers to the behavior characterizing users that benefit from the information produced by others in the community without actively contributing back to the production of social content. The amount and evolution of lurkers may strongly affect an online social environment, therefore understanding the lurking dynamics and identifying strategies to curb this trend are relevant problems. In this regard, we introduce the Lurker Game, i.e., a model for analyzing the transitions from a lurking to a non-lurking (i.e., active) user role, and vice versa, in terms of evolutionary game theory. We evaluate the proposed Lurker Game by arranging agents on complex networks and analyzing the system evolution, seeking relations between the network topology and the final equilibrium of the game. Results suggest that the Lurker Game is suitable to model the lurking dynamics, showing how the adoption of rewarding mechanisms combined with the modeling of hypothetical heterogeneity of users' interests may lead users in an online community towards a cooperative behavior. ",roberto interdonato,,2016.0,,arXiv,Javarone2016,True,,arXiv,Not available,Modeling Evolutionary Dynamics of Lurking in Social Networks,5843c065624f16e8d4546b0487a3f7ef,http://arxiv.org/abs/1605.06368v1 15008," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",yiding feng,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 15009," The goal of the paper is to develop the theory of finite state mean field games with major and minor players when the state space of the game is finite. We introduce the finite player games and derive a mean field game formulation in the limit when the number of minor players tends to infinity. In this limit, we prove that the value functions of the optimization problems are viscosity solutions of PIDEs of the HJB type, and we construct the best responses for both types of players. From there, we prove existence of Nash equilibria under reasonable assumptions. Finally we prove that a form of propagation of chaos holds in the present context and use this result to prove existence of approximate Nash equilibria for the finite player games from the solutions of the mean field games. this vindicate our formulation of the mean field game problem. ",peiqi wang,,2016.0,,arXiv,Carmona2016,True,,arXiv,Not available,Finite State Mean Field Games with Major and Minor Players,2adcbe5875634b766efcb389a4786c43,http://arxiv.org/abs/1610.05408v1 15010," In this paper, we propose a Quantum variation of combinatorial games, generalizing the Quantum Tic-Tac-Toe proposed by Allan Goff. A combinatorial game is a two-player game with no chance and no hidden information, such as Go or Chess. In this paper, we consider the possibility of playing superpositions of moves in such games. We propose different rulesets depending on when superposed moves should be played, and prove that all these rulesets may lead similar games to different outcomes. We then consider Quantum variations of the game of Nim. We conclude with some discussion on the relative interest of the different rulesets. ",paul dorbec,,2017.0,,"Quantum Physics and Logic, Jul 2017, Nijmegen, Netherlands. 266, pp.237 - 248, 2018",Dorbec2017,True,,arXiv,Not available,Toward Quantum Combinatorial Games,b0577532f305cfc022f9551d86bc87d1,http://arxiv.org/abs/1701.02193v2 15011," In this paper, we propose a Quantum variation of combinatorial games, generalizing the Quantum Tic-Tac-Toe proposed by Allan Goff. A combinatorial game is a two-player game with no chance and no hidden information, such as Go or Chess. In this paper, we consider the possibility of playing superpositions of moves in such games. We propose different rulesets depending on when superposed moves should be played, and prove that all these rulesets may lead similar games to different outcomes. We then consider Quantum variations of the game of Nim. We conclude with some discussion on the relative interest of the different rulesets. ",mehdi mhalla,,2017.0,,"Quantum Physics and Logic, Jul 2017, Nijmegen, Netherlands. 266, pp.237 - 248, 2018",Dorbec2017,True,,arXiv,Not available,Toward Quantum Combinatorial Games,b0577532f305cfc022f9551d86bc87d1,http://arxiv.org/abs/1701.02193v2 15012," We study a static game played by a finite number of agents, in which agents are assigned independent and identically distributed random types and each agent minimizes its objective function by choosing from a set of admissible actions that depends on its type. The game is anonymous in the sense that the objective function of each agent depends on the actions of other agents only through the empirical distribution of their type-action pairs. We study the asymptotic behavior of Nash equilibria, as the number of agents tends to infinity, first by deriving laws of large numbers characterizes almost sure limit points of Nash equilibria in terms of so-called Cournot-Nash equilibria of an associated nonatomic game. Our main results are large deviation principles that characterize the probability of rare Nash equilibria and associated conditional limit theorems describing the behavior of equilibria conditioned on a rare event. The results cover situations when neither the finite-player game nor the associated nonatomic game has a unique equilibrium. In addition, we study the asymptotic behavior of the price of anarchy, complementing existing worst-case bounds with new probabilistic bounds in the context of congestion games, which are used to model traffic routing in networks. ",daniel lacker,,2017.0,,arXiv,Lacker2017,True,,arXiv,Not available,Rare Nash Equilibria and the Price of Anarchy in Large Static Games,1caa3d9838c1aac43c25e87e65ec060e,http://arxiv.org/abs/1702.02113v1 15013," We study a static game played by a finite number of agents, in which agents are assigned independent and identically distributed random types and each agent minimizes its objective function by choosing from a set of admissible actions that depends on its type. The game is anonymous in the sense that the objective function of each agent depends on the actions of other agents only through the empirical distribution of their type-action pairs. We study the asymptotic behavior of Nash equilibria, as the number of agents tends to infinity, first by deriving laws of large numbers characterizes almost sure limit points of Nash equilibria in terms of so-called Cournot-Nash equilibria of an associated nonatomic game. Our main results are large deviation principles that characterize the probability of rare Nash equilibria and associated conditional limit theorems describing the behavior of equilibria conditioned on a rare event. The results cover situations when neither the finite-player game nor the associated nonatomic game has a unique equilibrium. In addition, we study the asymptotic behavior of the price of anarchy, complementing existing worst-case bounds with new probabilistic bounds in the context of congestion games, which are used to model traffic routing in networks. ",kavita ramanan,,2017.0,,arXiv,Lacker2017,True,,arXiv,Not available,Rare Nash Equilibria and the Price of Anarchy in Large Static Games,1caa3d9838c1aac43c25e87e65ec060e,http://arxiv.org/abs/1702.02113v1 15014," Standard game theory assumes that the structure of the game is common knowledge among players. We relax this assumption by considering extensive games where agents may be unaware of the complete structure of the game. In particular, they may not be aware of moves that they and other agents can make. We show how such games can be represented; the key idea is to describe the game from the point of view of every agent at every node of the game tree. We provide a generalization of Nash equilibrium and show that every game with awareness has a generalized Nash equilibrium. Finally, we extend these results to games with awareness of unawareness, where a player i may be aware that a player j can make moves that i is not aware of, and to subjective games, where payers may have no common knowledge regarding the actual game and their beliefs are incompatible with a common prior. ",joseph halpern,,2007.0,,arXiv,Halpern2007,True,,arXiv,Not available,Extensive Games with Possibly Unaware Players,f4d1358c15f411cd39d1cec402c1e4ee,http://arxiv.org/abs/0704.2014v1 15015," Standard game theory assumes that the structure of the game is common knowledge among players. We relax this assumption by considering extensive games where agents may be unaware of the complete structure of the game. In particular, they may not be aware of moves that they and other agents can make. We show how such games can be represented; the key idea is to describe the game from the point of view of every agent at every node of the game tree. We provide a generalization of Nash equilibrium and show that every game with awareness has a generalized Nash equilibrium. Finally, we extend these results to games with awareness of unawareness, where a player i may be aware that a player j can make moves that i is not aware of, and to subjective games, where payers may have no common knowledge regarding the actual game and their beliefs are incompatible with a common prior. ",leandro rego,,2007.0,,arXiv,Halpern2007,True,,arXiv,Not available,Extensive Games with Possibly Unaware Players,f4d1358c15f411cd39d1cec402c1e4ee,http://arxiv.org/abs/0704.2014v1 15016," Game Theory studies situations in which multiple agents having conflicting objectives have to reach a collective decision. The question of a compact representation language for agents utility function is of crucial importance since the classical representation of a $n$-players game is given by a $n$-dimensional matrix of exponential size for each player. In this paper we use the framework of Constraint Games in which CSP are used to represent utilities. Constraint Programming --including global constraints-- allows to easily give a compact and elegant model to many useful games. Constraint Games come in two flavors: Constraint Satisfaction Games and Constraint Optimization Games, the first one using satisfaction to define boolean utilities. In addition to multimatrix games, it is also possible to model more complex games where hard constraints forbid certain situations. In this paper we study complete search techniques and show that our solver using the compact representation of Constraint Games is faster than the classical game solver Gambit by one to two orders of magnitude. ",thi-van-anh nguyen,,2014.0,,arXiv,Nguyen2014,True,,arXiv,Not available,A Complete Solver for Constraint Games,71e61f38126d4aef86c61b9ef0586f1f,http://arxiv.org/abs/1404.4502v2 15017," Game Theory studies situations in which multiple agents having conflicting objectives have to reach a collective decision. The question of a compact representation language for agents utility function is of crucial importance since the classical representation of a $n$-players game is given by a $n$-dimensional matrix of exponential size for each player. In this paper we use the framework of Constraint Games in which CSP are used to represent utilities. Constraint Programming --including global constraints-- allows to easily give a compact and elegant model to many useful games. Constraint Games come in two flavors: Constraint Satisfaction Games and Constraint Optimization Games, the first one using satisfaction to define boolean utilities. In addition to multimatrix games, it is also possible to model more complex games where hard constraints forbid certain situations. In this paper we study complete search techniques and show that our solver using the compact representation of Constraint Games is faster than the classical game solver Gambit by one to two orders of magnitude. ",arnaud lallouet,,2014.0,,arXiv,Nguyen2014,True,,arXiv,Not available,A Complete Solver for Constraint Games,71e61f38126d4aef86c61b9ef0586f1f,http://arxiv.org/abs/1404.4502v2 15018," A Nash equilibrium has become important solution concept for analyzing the decision making in Game theory. In this paper, we consider the problem of computing Nash equilibria of a subclass of generic finite normal form games. We define ""rational payoff irrational equilibria games"" to be the games with all rational payoffs and all irrational equilibria. We present a purely algebraic method for computing all Nash equilibria of these games that uses knowledge of Galois groups. Some results, showing properties of the class of games, and an example to show working of the method concludes the paper. ",samaresh chatterji,,2010.0,,arXiv,Chatterji2010,True,,arXiv,Not available,"An Algebraic Approach for Computing Equilibria of a Subclass of Finite Normal Form Games",0d0351ddd7c303fa653dd68c89ffe1f7,http://arxiv.org/abs/1005.5507v1 15019," This paper considers prior-independent mechanism design, namely identifying a single mechanism that has near optimal performance on every prior distribution. We show that mechanisms with truthtelling equilibria, a.k.a., revelation mechanisms, do not always give optimal prior-independent mechanisms and we define the revelation gap to quantify the non-optimality of revelation mechanisms. This study suggests that it is important to develop a theory for the design of non-revelation mechanisms. Our analysis focuses on welfare maximization in single-item auctions for agents with budgets and a natural regularity assumption on their distribution of values. The all-pay auction (a non-revelation mechanism) is the Bayesian optimal mechanism; as it is prior-independent it is also the prior-independent optimal mechanism (a 1-approximation). We prove a lower bound on the prior-independent approximation of revelation mechanisms of 1.013 and that the clinching auction (a revelation mechanism) is a prior-independent $e \approx 2.714$ approximation. Thus the revelation gap for single-item welfare maximization with public budget agents is in $[1.013, e]$. Some of our analyses extend to the revenue objective, position environments, and irregular distributions. ",jason hartline,,2018.0,,arXiv,Feng2018,True,,arXiv,Not available,"An End-to-end Argument in Mechanism Design (Prior-independent Auctions for Budgeted Agents)",337b3a5ebb4b74dc1df3022296399841,http://arxiv.org/abs/1804.01977v2 15020," A Nash equilibrium has become important solution concept for analyzing the decision making in Game theory. In this paper, we consider the problem of computing Nash equilibria of a subclass of generic finite normal form games. We define ""rational payoff irrational equilibria games"" to be the games with all rational payoffs and all irrational equilibria. We present a purely algebraic method for computing all Nash equilibria of these games that uses knowledge of Galois groups. Some results, showing properties of the class of games, and an example to show working of the method concludes the paper. ",ratnik gandhi,,2010.0,,arXiv,Chatterji2010,True,,arXiv,Not available,"An Algebraic Approach for Computing Equilibria of a Subclass of Finite Normal Form Games",0d0351ddd7c303fa653dd68c89ffe1f7,http://arxiv.org/abs/1005.5507v1 15021," We consider infinite-state Attacker-Defender games with reachability objectives. The results of the paper are twofold. Firstly we prove a new language-theoretic result for weighted automata on infinite words and show its encoding into the framework of Attacker-Defender games. Secondly we use this novel concept to prove undecidability for checking existence of a winning strategy in several low-dimensional mathematical games including vector reachability games, word games and braid games. ",vesa halava,,2014.0,,arXiv,Halava2014,True,,arXiv,Not available,"Weighted automata on infinite words in the context of Attacker-Defender games",213839fe149fd068e9f44c1a9f775c76,http://arxiv.org/abs/1411.4796v3 15022," We consider infinite-state Attacker-Defender games with reachability objectives. The results of the paper are twofold. Firstly we prove a new language-theoretic result for weighted automata on infinite words and show its encoding into the framework of Attacker-Defender games. Secondly we use this novel concept to prove undecidability for checking existence of a winning strategy in several low-dimensional mathematical games including vector reachability games, word games and braid games. ",tero harju,,2014.0,,arXiv,Halava2014,True,,arXiv,Not available,"Weighted automata on infinite words in the context of Attacker-Defender games",213839fe149fd068e9f44c1a9f775c76,http://arxiv.org/abs/1411.4796v3 15023," We consider infinite-state Attacker-Defender games with reachability objectives. The results of the paper are twofold. Firstly we prove a new language-theoretic result for weighted automata on infinite words and show its encoding into the framework of Attacker-Defender games. Secondly we use this novel concept to prove undecidability for checking existence of a winning strategy in several low-dimensional mathematical games including vector reachability games, word games and braid games. ",reino niskanen,,2014.0,,arXiv,Halava2014,True,,arXiv,Not available,"Weighted automata on infinite words in the context of Attacker-Defender games",213839fe149fd068e9f44c1a9f775c76,http://arxiv.org/abs/1411.4796v3 15024," We consider infinite-state Attacker-Defender games with reachability objectives. The results of the paper are twofold. Firstly we prove a new language-theoretic result for weighted automata on infinite words and show its encoding into the framework of Attacker-Defender games. Secondly we use this novel concept to prove undecidability for checking existence of a winning strategy in several low-dimensional mathematical games including vector reachability games, word games and braid games. ",igor potapov,,2014.0,,arXiv,Halava2014,True,,arXiv,Not available,"Weighted automata on infinite words in the context of Attacker-Defender games",213839fe149fd068e9f44c1a9f775c76,http://arxiv.org/abs/1411.4796v3 15025," The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris. ",endre boros,,2017.0,,arXiv,Boros2017,True,,arXiv,Not available,Tetris Hypergraphs and Combinations of Impartial Games,2581a80377f29818600a69e23436655b,http://arxiv.org/abs/1701.02819v1 15026," The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris. ",vladimir gurvich,,2017.0,,arXiv,Boros2017,True,,arXiv,Not available,Tetris Hypergraphs and Combinations of Impartial Games,2581a80377f29818600a69e23436655b,http://arxiv.org/abs/1701.02819v1 15027," The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris. ",nhan ho,,2017.0,,arXiv,Boros2017,True,,arXiv,Not available,Tetris Hypergraphs and Combinations of Impartial Games,2581a80377f29818600a69e23436655b,http://arxiv.org/abs/1701.02819v1 15028," The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris. ",kazuhisa makino,,2017.0,,arXiv,Boros2017,True,,arXiv,Not available,Tetris Hypergraphs and Combinations of Impartial Games,2581a80377f29818600a69e23436655b,http://arxiv.org/abs/1701.02819v1 15029," The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris. ",peter mursic,,2017.0,,arXiv,Boros2017,True,,arXiv,Not available,Tetris Hypergraphs and Combinations of Impartial Games,2581a80377f29818600a69e23436655b,http://arxiv.org/abs/1701.02819v1 15030," Weighted timed games are played by two players on a timed automaton equipped with weights: one player wants to minimise the accumulated weight while reaching a target, while the other has an opposite objective. Used in a reactive synthesis perspective, this quantitative extension of timed games allows one to measure the quality of controllers. Weighted timed games are notoriously difficult and quickly undecidable, even when restricted to non-negative weights. Decidability results exist for subclasses of one-clock games, and for a subclass with non-negative weights defined by a semantical restriction on the weights of cycles. In this work, we introduce the class of divergent weighted timed games as a generalisation of this semantical restriction to arbitrary weights. We show how to compute their optimal value, yielding the first decidable class of weighted timed games with negative weights and an arbitrary number of clocks. In addition, we prove that divergence can be decided in polynomial space. Last, we prove that for untimed games, this restriction yields a class of games for which the value can be computed in polynomial time. ",damien busatto-gaston,,2017.0,,arXiv,Busatto-Gaston2017,True,,arXiv,Not available,Optimal Reachability in Divergent Weighted Timed Games,bb5f32f0244b3d07df8346c761bd0afd,http://arxiv.org/abs/1701.03716v2 15031," Games with unawareness model strategic situations in which players' perceptions about the game are limited. They take into account the fact that the players may be unaware of some of the strategies available to them or their opponents as well as the players may have a restricted view about the number of players participating in the game. The aim of the research is to introduce this notion into theory of quantum games. We shall focus on PQ Penny Flip game introduced by D. Meyer. We shall formalize the previous results and consider other cases of unawareness in the game. ",piotr frackiewicz,,2018.0,10.3390/e20080555,arXiv,Frackiewicz2018,True,,arXiv,Not available,Quantum Penny Flip game with unawareness,affd86866ba90f7038fc8b87f9aaef9e,http://arxiv.org/abs/1806.03090v1 15032," The focus of this essay is a rigorous treatment of infinite games. An infinite game is defined as a play consisting of a fixed number of players whose sequence of moves is repeated, or iterated ad infinitum. Each sequence corresponds to a single iteration of the play, where there are an infinite amount of iterations. There are two distinct concepts within this broad definition which encompass all infinite games: the strong infinite game and the weak infinite game. Both differ in terms of imputations. The strong infinite game has a uniqueness qualification in that all moves must differ to the extent that no imputation (these occur at the end of any given iteration) may ever be the same. Conversely, there is no such qualification in a weak infinite game, any payout may equal another. Another property shared by strong and weak infinite games (apart from their fulfilling the criterion of an infinite game) is the fact that both consist of a countably infinite amount of moves. Therefore all infinite games have a countably infinite number of turns; the set of all infinite games is composed of each strong and weak infinite game. This result has a very important consequence: the ordinality of turns. That is, the moves of an infinite game have an order or structure which they adhere to. It is this structure which provides any future development or game theoretical analysis of these sorts of games with the necessary foundation. ",thomas meyer,,2009.0,,arXiv,Meyer2009,True,,arXiv,Not available,The Cardinality of Infinite Games,c9cc0a11e4806d6491f7e98b903f4145,http://arxiv.org/abs/0912.5524v2 15033," The Massive Ordnance Penetrator(MOP) has been developed to destroy deeply buried nuclear components by controlled release from a B2 or B52 airplane. This type of release must be cockpit software controlled by the Tactical Optimal Strategy Game(TOSG) Protocol to optimally determine the war game aspects of the dueling from other countries' MOP releases, and the depth at which the MOP explosions can occur for maximal safety and risk concerns. The TOSG Protocol characteristics of games of strategy, games of optimal strategy and tactical games are defined initially by the game of strategy as a certain series of events, each of which must have a finite number of distinct results. The outcome of a game of strategy, in some cases, depends on chance. All other events depend on the free decision of the players. A game has a solution if there exist two strategies, which become optimal strategies when each mathematically attains the value of the game. The TOSG Protocol war game tactical problem for a class of games can be mathematically modeled as a combat between two airplanes, each carrying a MOP as the specification of the accuracy of the firing machinery and the total amount of ammunition that each plane carries. This silent duel occurs, because each MOP bomber is unable to determine the number of times its opponent has missed. The TOSG Protocol realizes a game theory solution of the tactical optimal strategy game utilizing the theory of games of timing, games of pursuit, games of time lag, games of sequence, games of maneuvering, games of search, games of positioning and games of aiming and evasion. ",dr. niznik,,2014.0,10.7321/jscse.v3.n3.72,"The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, 2013, pp.474-480",Niznik2014,True,,arXiv,Not available,"The Tactical Optimal Strategy Game (TOSG) Protocol Cockpit Software Control For Massive Ordnance Penetrator Release",ce13db12ac644625b728674c1622a68c,http://arxiv.org/abs/1402.1545v1 15034," The following four classes of computational problems are equivalent: solving matrix games, solving linear programs, best $l^{\infty}$ linear approximation, best $l^1$ linear approximation. ",l. vaserstein,,2006.0,,arXiv,Vaserstein2006,True,,arXiv,Not available,"Matrix Games, Linear Programming, and Linear Approximation",798e23585e2fe2d84288c6c7a5fdd0a3,http://arxiv.org/abs/cs/0609056v1 15035," A summary of work on distributed games and strategies done within the first three years of the ERC project ECSYM is presented. ",glynn winskel,,2016.0,,arXiv,Winskel2016,True,,arXiv,Not available,Distributed Games and Strategies,0d59f93df6a495d574b8eaf97fc01291,http://arxiv.org/abs/1607.03760v1 15036," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 15037," We study the problem of characterizing revenue optimal auctions for single-minded buyers. Each buyer is interested only in a specific bundle of items and has a value for the same. Both his bundle and its value are his private information. The bundles that buyers are interested in and their corresponding values are assumed to be realized from known probability distributions independent across the buyers. We identify revenue optimal auctions with a simple structure, if the conditional distribution of any buyer's valuation is nondecreasing, in the hazard rates ordering of probability distributions, as a function of the bundle the buyer is interested in. The revenue optimal auction is given by the solution of a maximum weight independent set problem. We provide a novel graphical construction of the weights and highlight important properties of the resulting auction. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Revenue Optimal Auction for Single-Minded Buyers,d95c404a35ae66006fbb3ae89c5dbe71,http://arxiv.org/abs/1005.1059v2 15038," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",shuchi chawla,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15039," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",jason hartline,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15040," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",denis nekipelov,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15041," Weighted timed games are played by two players on a timed automaton equipped with weights: one player wants to minimise the accumulated weight while reaching a target, while the other has an opposite objective. Used in a reactive synthesis perspective, this quantitative extension of timed games allows one to measure the quality of controllers. Weighted timed games are notoriously difficult and quickly undecidable, even when restricted to non-negative weights. Decidability results exist for subclasses of one-clock games, and for a subclass with non-negative weights defined by a semantical restriction on the weights of cycles. In this work, we introduce the class of divergent weighted timed games as a generalisation of this semantical restriction to arbitrary weights. We show how to compute their optimal value, yielding the first decidable class of weighted timed games with negative weights and an arbitrary number of clocks. In addition, we prove that divergence can be decided in polynomial space. Last, we prove that for untimed games, this restriction yields a class of games for which the value can be computed in polynomial time. ",benjamin monmege,,2017.0,,arXiv,Busatto-Gaston2017,True,,arXiv,Not available,Optimal Reachability in Divergent Weighted Timed Games,bb5f32f0244b3d07df8346c761bd0afd,http://arxiv.org/abs/1701.03716v2 15042," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",yannai gonczarowski,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 15043," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",noam nisan,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 15044," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",yuval emek,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 15045," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",michal feldman,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 15046," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",iftah gamzu,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 15047," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",renato leme,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 15048," Signaling is an important topic in the study of asymmetric information in economic settings. In particular, the transparency of information available to a seller in an auction setting is a question of major interest. We introduce the study of signaling when conducting a second price auction of a probabilistic good whose actual instantiation is known to the auctioneer but not to the bidders. This framework can be used to model impressions selling in display advertising. We study the problem of computing a signaling scheme that maximizes the auctioneer's revenue in a Bayesian setting. While the general case is proved to be computationally hard, several cases of interest are shown to be polynomially solvable. In addition, we establish a tight bound on the minimum number of signals required to implement an optimal signaling scheme and show that at least half of the maximum social welfare can be preserved within such a scheme. ",moshe tennenholtz,,2012.0,,arXiv,Emek2012,True,,arXiv,Not available,Signaling Schemes for Revenue Maximization,946041dc6c81df57d768031b1b59efbf,http://arxiv.org/abs/1202.1590v2 15049," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",saeed alaei,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 15050," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",azarakhsh malekian,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 15051," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",aravind srinivasan,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 15052," Weighted timed games are played by two players on a timed automaton equipped with weights: one player wants to minimise the accumulated weight while reaching a target, while the other has an opposite objective. Used in a reactive synthesis perspective, this quantitative extension of timed games allows one to measure the quality of controllers. Weighted timed games are notoriously difficult and quickly undecidable, even when restricted to non-negative weights. Decidability results exist for subclasses of one-clock games, and for a subclass with non-negative weights defined by a semantical restriction on the weights of cycles. In this work, we introduce the class of divergent weighted timed games as a generalisation of this semantical restriction to arbitrary weights. We show how to compute their optimal value, yielding the first decidable class of weighted timed games with negative weights and an arbitrary number of clocks. In addition, we prove that divergence can be decided in polynomial space. Last, we prove that for untimed games, this restriction yields a class of games for which the value can be computed in polynomial time. ",pierre-alain reynier,,2017.0,,arXiv,Busatto-Gaston2017,True,,arXiv,Not available,Optimal Reachability in Divergent Weighted Timed Games,bb5f32f0244b3d07df8346c761bd0afd,http://arxiv.org/abs/1701.03716v2 15053," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",hu fu,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 15054," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",nima haghpanah,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 15055," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",jason hartline,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 15056," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",robert kleinberg,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 15057," An auction house cannot generally provide the optimal auction technology to every client. Instead it provides one or several auction technologies, and clients select the most appropriate one. For example, eBay provides ascending auctions and ""buy-it-now"" pricing. For each client the offered technology may not be optimal, but it would be too costly for clients to create their own. We call these mechanisms, which emphasize generality rather than optimality, platform mechanisms. A platform mechanism will be adopted by a client if its performance exceeds that of the client's outside option, e.g., hiring (at a cost) a consultant to design the optimal mechanism. We ask two related questions. First, for what costs of the outside option will the platform be universally adopted? Second, what is the structure of good platform mechanisms? We answer these questions using a novel prior-free analysis framework in which we seek mechanisms that are approximately optimal for every prior. ",jason hartline,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Optimal Platform Design,410dfb425ffbd37b30b1a2725a9da250,http://arxiv.org/abs/1412.8518v1 15058," An auction house cannot generally provide the optimal auction technology to every client. Instead it provides one or several auction technologies, and clients select the most appropriate one. For example, eBay provides ascending auctions and ""buy-it-now"" pricing. For each client the offered technology may not be optimal, but it would be too costly for clients to create their own. We call these mechanisms, which emphasize generality rather than optimality, platform mechanisms. A platform mechanism will be adopted by a client if its performance exceeds that of the client's outside option, e.g., hiring (at a cost) a consultant to design the optimal mechanism. We ask two related questions. First, for what costs of the outside option will the platform be universally adopted? Second, what is the structure of good platform mechanisms? We answer these questions using a novel prior-free analysis framework in which we seek mechanisms that are approximately optimal for every prior. ",tim roughgarden,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Optimal Platform Design,410dfb425ffbd37b30b1a2725a9da250,http://arxiv.org/abs/1412.8518v1 15059," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 15060," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 15063," Using semi-tensor product of matrices, the structures of several kinds of symmetric games are investigated via the linear representation of symmetric group in the structure vector of games as its representation space. First of all, the symmetry, described as the action of symmetric group on payoff functions, is converted into the product of permutation matrices with structure vectors of payoff functions. Using the linear representation of the symmetric group in structure vectors, the algebraic conditions for the ordinary, weighted, renaming and name-irrelevant symmetries are obtained respectively as the invariance under the corresponding linear representations. Secondly, using the linear representations the relationship between symmetric games and potential games is investigated. This part is mainly focused on Boolean games. An alternative proof is given to show that ordinary, renaming and weighted symmetric Boolean games are also potential ones under our framework. The corresponding potential functions are also obtained. Finally, an example is given to show that some other Boolean games could also be potential games. ",daizhan cheng,,2017.0,,arXiv,Cheng2017,True,,arXiv,Not available,Linear Representation of Symmetric Games,e5c4bde802b8661a2cb8a78724778a3f,http://arxiv.org/abs/1701.06807v2 15065," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",jason hartline,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 15066," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",nicole immorlica,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 15067," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",mohammad khani,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 15068," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",brendan lucier,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 15069," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",rad niazadeh,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 15070," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",anand bhalgat,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 15071," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",sreenivas gollapudi,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 15072," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",kamesh munagala,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 15073," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",h. mcmahan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 15074," Using semi-tensor product of matrices, the structures of several kinds of symmetric games are investigated via the linear representation of symmetric group in the structure vector of games as its representation space. First of all, the symmetry, described as the action of symmetric group on payoff functions, is converted into the product of permutation matrices with structure vectors of payoff functions. Using the linear representation of the symmetric group in structure vectors, the algebraic conditions for the ordinary, weighted, renaming and name-irrelevant symmetries are obtained respectively as the invariance under the corresponding linear representations. Secondly, using the linear representations the relationship between symmetric games and potential games is investigated. This part is mainly focused on Boolean games. An alternative proof is given to show that ordinary, renaming and weighted symmetric Boolean games are also potential ones under our framework. The corresponding potential functions are also obtained. Finally, an example is given to show that some other Boolean games could also be potential games. ",ting liu,,2017.0,,arXiv,Cheng2017,True,,arXiv,Not available,Linear Representation of Symmetric Games,e5c4bde802b8661a2cb8a78724778a3f,http://arxiv.org/abs/1701.06807v2 15075," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",omkar muralidharan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 15076," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",enrico gerding,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 15077," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",rajdeep dash,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 15078," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",andrew byde,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 15079," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",nicholas jennings,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 15080," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",he huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 15081," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",xiang-yang li,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 15082," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",yu-e sun,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 15083," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",hongli xu,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 15084," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",liusheng huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 15085," The paper studies fictitious play (FP) learning dynamics in continuous time. It is shown that in almost every potential game, and for almost every initial condition, the rate of convergence of FP is exponential. In particular, the paper focuses on studying the behavior of FP in potential games in which all equilibria of the game are regular, as introduced by Harsanyi. Such games are referred to as regular potential games. Recently it has been shown that almost all potential games (in the sense of the Lebesgue measure) are regular. In this paper it is shown that in any regular potential game (and hence, in almost every potential game), FP converges to the set of Nash equilibria at an exponential rate from almost every initial condition. ",brian swenson,,2017.0,,arXiv,Swenson2017,True,,arXiv,Not available,"On the Exponential Rate of Convergence of Fictitious Play in Potential Games",2fabb0595be244ff8e84112cbcbada3c,http://arxiv.org/abs/1707.08055v1 15086," The auction method developed by Bertsekas in the late 1970s is a relaxation technique for solving integer-valued assignment problems. It resembles a competitive bidding process, where unsatisfied persons (bidders) attempt to claim the objects (lots) offering the best value. By transforming integer-valued transport problems into assignment problems, the auction method can be extended to compute optimal transport solutions. We propose a more general auction method that can be applied directly to real-valued transport problems. We prove termination and provide a priori error bounds for the general auction method. Our numerical results indicate that the complexity of the general auction is roughly comparable to that of the original auction method, when the latter is applicable. ",j. iii,,2017.0,,arXiv,III2017,True,,arXiv,Not available,General auction method for real-valued optimal transport,06e279ce86df9db6c033328a82843f3e,http://arxiv.org/abs/1705.06379v1 15087," The auction method developed by Bertsekas in the late 1970s is a relaxation technique for solving integer-valued assignment problems. It resembles a competitive bidding process, where unsatisfied persons (bidders) attempt to claim the objects (lots) offering the best value. By transforming integer-valued transport problems into assignment problems, the auction method can be extended to compute optimal transport solutions. We propose a more general auction method that can be applied directly to real-valued transport problems. We prove termination and provide a priori error bounds for the general auction method. Our numerical results indicate that the complexity of the general auction is roughly comparable to that of the original auction method, when the latter is applicable. ",luca dieci,,2017.0,,arXiv,III2017,True,,arXiv,Not available,General auction method for real-valued optimal transport,06e279ce86df9db6c033328a82843f3e,http://arxiv.org/abs/1705.06379v1 15088," We cast the problem of combinatorial auction design in a Bayesian framework in order to incorporate prior information into the auction process and minimize the number of rounds to convergence. We first develop a generative model of agent valuations and market prices such that clearing prices become maximum a posteriori estimates given observed agent valuations. This generative model then forms the basis of an auction process which alternates between refining estimates of agent valuations and computing candidate clearing prices. We provide an implementation of the auction using assumed density filtering to estimate valuations and expectation maximization to compute prices. An empirical evaluation over a range of valuation domains demonstrates that our Bayesian auction mechanism is highly competitive against the combinatorial clock auction in terms of rounds to convergence, even under the most favorable choices of price increment for this baseline. ",gianluca brero,,2017.0,,arXiv,Brero2017,True,,arXiv,Not available,A Bayesian Clearing Mechanism for Combinatorial Auctions,ccbfccfcdf6372291f6b0a4d93d7a968,http://arxiv.org/abs/1712.05291v1 15089," We cast the problem of combinatorial auction design in a Bayesian framework in order to incorporate prior information into the auction process and minimize the number of rounds to convergence. We first develop a generative model of agent valuations and market prices such that clearing prices become maximum a posteriori estimates given observed agent valuations. This generative model then forms the basis of an auction process which alternates between refining estimates of agent valuations and computing candidate clearing prices. We provide an implementation of the auction using assumed density filtering to estimate valuations and expectation maximization to compute prices. An empirical evaluation over a range of valuation domains demonstrates that our Bayesian auction mechanism is highly competitive against the combinatorial clock auction in terms of rounds to convergence, even under the most favorable choices of price increment for this baseline. ",sebastien lahaie,,2017.0,,arXiv,Brero2017,True,,arXiv,Not available,A Bayesian Clearing Mechanism for Combinatorial Auctions,ccbfccfcdf6372291f6b0a4d93d7a968,http://arxiv.org/abs/1712.05291v1 15090," An online auction waterfall for an ad impression may contain auctions that are unlikely to result in a winning bid. Instead of always running through the full auction sequence, one could reduce the transaction cost by predicting and skipping these auctions. In this paper, we derive the auction abort rule that maximizes the net income of the waterfall under certain conditions, knowing only the publisher tag of the current auction and the ad request context. The net income is defined as the payoff (revenue) minus the transaction cost. We translate the abort rule into a purity measure and propose a corresponding split criterion for a decision tree. Training and testing on randomly sampled data indicate that the abort decision tree performs better than the full waterfall and the abort rule that makes use of only the publisher tag feature. When the transaction cost is higher, the cost saving, and thus net income gain, is higher for either abort decision rule. ",michael ting,,2018.0,,arXiv,Ting2018,True,,arXiv,Not available,"Maximizing net income of the auction waterfall with an abort decision tree",e3c2079403b60b2f84e29c4402faba64,http://arxiv.org/abs/1809.01245v1 15091," An online auction waterfall for an ad impression may contain auctions that are unlikely to result in a winning bid. Instead of always running through the full auction sequence, one could reduce the transaction cost by predicting and skipping these auctions. In this paper, we derive the auction abort rule that maximizes the net income of the waterfall under certain conditions, knowing only the publisher tag of the current auction and the ad request context. The net income is defined as the payoff (revenue) minus the transaction cost. We translate the abort rule into a purity measure and propose a corresponding split criterion for a decision tree. Training and testing on randomly sampled data indicate that the abort decision tree performs better than the full waterfall and the abort rule that makes use of only the publisher tag feature. When the transaction cost is higher, the cost saving, and thus net income gain, is higher for either abort decision rule. ",nicolas grislain,,2018.0,,arXiv,Ting2018,True,,arXiv,Not available,"Maximizing net income of the auction waterfall with an abort decision tree",e3c2079403b60b2f84e29c4402faba64,http://arxiv.org/abs/1809.01245v1 15092," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",jinzhong niu,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 15093," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",simon parsons,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 15094," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",jason hartline,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 15095," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",darrell hoy,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 15096," The paper studies fictitious play (FP) learning dynamics in continuous time. It is shown that in almost every potential game, and for almost every initial condition, the rate of convergence of FP is exponential. In particular, the paper focuses on studying the behavior of FP in potential games in which all equilibria of the game are regular, as introduced by Harsanyi. Such games are referred to as regular potential games. Recently it has been shown that almost all potential games (in the sense of the Lebesgue measure) are regular. In this paper it is shown that in any regular potential game (and hence, in almost every potential game), FP converges to the set of Nash equilibria at an exponential rate from almost every initial condition. ",soummya kar,,2017.0,,arXiv,Swenson2017,True,,arXiv,Not available,"On the Exponential Rate of Convergence of Fictitious Play in Potential Games",2fabb0595be244ff8e84112cbcbada3c,http://arxiv.org/abs/1707.08055v1 15097," This paper develops tools for welfare and revenue analyses of Bayes-Nash equilibria in asymmetric auctions with single-dimensional agents. We employ these tools to derive price of anarchy results for social welfare and revenue. Our approach separates the standard smoothness framework into two distinct parts, isolating the analysis common to any auction from the analysis specific to a given auction. The first part relates a bidder's contribution to welfare in equilibrium to their contribution to welfare in the optimal auction using the price the bidder faces for additional allocation. Intuitively, either an agent's utility and hence contribution to welfare is high, or the price she has to pay for additional allocation is high relative to her value. We call this condition value covering; it holds in every Bayes-Nash equilibrium of any auction. The second part, revenue covering, relates the prices bidders face for additional allocation to the revenue of the auction, using an auction's rules and feasibility constraints. Combining the two parts gives approximation results to the optimal welfare, and, under the right conditions, the optimal revenue. In mechanisms with reserve prices, our welfare results show approximation with respect to the optimal mechanism with the same reserves. As a center-piece result, we analyze the single-item first-price auction with individual monopoly reserves. When each distribution satisfies a regularity condition the auction's revenue is at least a $2e/(e-1) \approx 3.16$ approximation to the revenue of the optimal auction. We also give bounds for matroid auctions with first-price or all-pay semantics, and the generalized first-price position auction. Finally, we give an extension theorem for simultaneous composition, i.e., when multiple auctions are run simultaneously, with single-valued, unit-demand agents. ",sam taggart,,2014.0,,arXiv,Hartline2014,True,,arXiv,Not available,Price of Anarchy for Auction Revenue,6b23ba5b6289ca042dfc4c540eec947f,http://arxiv.org/abs/1404.5943v4 15098," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",nicola gatti,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 15099," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",alessandro lazaric,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 15100," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",marco rocco,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 15101," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",francesco trovo,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 15102," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",renato leme,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 15103," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",vasilis syrgkanis,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 15104," In many settings agents participate in multiple different auctions that are not necessarily implemented simultaneously. Future opportunities affect strategic considerations of the players in each auction, introducing externalities. Motivated by this consideration, we study a setting of a market of buyers and sellers, where each seller holds one item, bidders have combinatorial valuations and sellers hold item auctions sequentially. Our results are qualitatively different from those of simultaneous auctions, proving that simultaneity is a crucial aspect of previous work. We prove that if sellers hold sequential first price auctions then for unit-demand bidders (matching market) every subgame perfect equilibrium achieves at least half of the optimal social welfare, while for submodular bidders or when second price auctions are used, the social welfare can be arbitrarily worse than the optimal. We also show that a first price sequential auction for buying or selling a base of a matroid is always efficient, and implements the VCG outcome. An important tool in our analysis is studying first and second price auctions with externalities (bidders have valuations for each possible winner outcome), which can be of independent interest. We show that a Pure Nash Equilibrium always exists in a first price auction with externalities. ",eva tardos,,2011.0,,arXiv,Leme2011,True,,arXiv,Not available,Sequential Auctions and Externalities,b8d48030e96211437bd8e2ba0fc1ca27,http://arxiv.org/abs/1108.2452v2 15107," Equilibrium notions for games with unawareness in the literature cannot be interpreted as steady-states of a learning process because players may discover novel actions during play. In this sense, many games with unawareness are ""self-destroying"" as a player's representation of the game must change after playing it once. We define discovery processes where at each state there is an extensive-form game with unawareness that together with the players' play determines the transition to possibly another extensive-form games with unawareness in which players are now aware of actions that they have previously discovered. A discovery process is rationalizable if players play extensive-form rationalizable strategies in each game with unawareness. We show that for any game with unawareness there is a rationalizable discovery process that leads to a self-confirming game that possesses an extensive-form rationalizable self-confirming equilibrium. This notion of equilibrium can be interpreted as steady-state of a learning and discovery process. ",burkhard schipper,,2017.0,10.4204/EPTCS.251.35,"EPTCS 251, 2017, pp. 470-488",Schipper2017,True,,arXiv,Not available,"Self-confirming Games: Unawareness, Discovery, and Equilibrium",90c77d281855bf09966a9270075f8b87,http://arxiv.org/abs/1707.08761v1 15109," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",michal feldman,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15110," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",nicole immorlica,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15111," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",brendan lucier,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15112," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",tim roughgarden,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15113," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",vasilis syrgkanis,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15114," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",zhili chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15115," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",liusheng huang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15116," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",lu li,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15117," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",wei yang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15118," Lurking is a complex user-behavioral phenomenon that occurs in all large-scale online communities and social networks. It generally refers to the behavior characterizing users that benefit from the information produced by others in the community without actively contributing back to the production of social content. The amount and evolution of lurkers may strongly affect an online social environment, therefore understanding the lurking dynamics and identifying strategies to curb this trend are relevant problems. In this regard, we introduce the Lurker Game, i.e., a model for analyzing the transitions from a lurking to a non-lurking (i.e., active) user role, and vice versa, in terms of evolutionary game theory. We evaluate the proposed Lurker Game by arranging agents on complex networks and analyzing the system evolution, seeking relations between the network topology and the final equilibrium of the game. Results suggest that the Lurker Game is suitable to model the lurking dynamics, showing how the adoption of rewarding mechanisms combined with the modeling of hypothetical heterogeneity of users' interests may lead users in an online community towards a cooperative behavior. ",andrea tagarelli,,2016.0,,arXiv,Javarone2016,True,,arXiv,Not available,Modeling Evolutionary Dynamics of Lurking in Social Networks,5843c065624f16e8d4546b0487a3f7ef,http://arxiv.org/abs/1605.06368v1 15119," The efficiency of a game is typically quantified by the price of anarchy (PoA), defined as the worst ratio of the objective function value of an equilibrium --- solution of the game --- and that of an optimal outcome. Given the tremendous impact of tools from mathematical programming in the design of algorithms and the similarity of the price of anarchy and different measures such as the approximation and competitive ratios, it is intriguing to develop a duality-based method to characterize the efficiency of games. In the paper, we present an approach based on linear programming duality to study the efficiency of games. We show that the approach provides a general recipe to analyze the efficiency of games and also to derive concepts leading to improvements. The approach is particularly appropriate to bound the PoA. Specifically, in our approach the dual programs naturally lead to competitive PoA bounds that are (almost) optimal for several classes of games. The approach indeed captures the smoothness framework and also some current non-smooth techniques/concepts. We show the applicability to the wide variety of games and environments, from congestion games to Bayesian welfare, from full-information settings to incomplete-information ones. ",nguyen thang,,2017.0,,arXiv,Thang2017,True,,arXiv,Not available,Game Efficiency through Linear Programming Duality,b9cafe4e661cc3cf326fd5bf80ac0574,http://arxiv.org/abs/1708.06499v1 15120," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",haibo miao,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15121," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",miaomiao tian,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15122," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",fei wang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15123," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",nikhil devanur,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 15124," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",jamie morgenstern,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 15125," We introduce draft auctions, which is a sequential auction format where at each iteration players bid for the right to buy items at a fixed price. We show that draft auctions offer an exponential improvement in social welfare at equilibrium over sequential item auctions where predetermined items are auctioned at each time step. Specifically, we show that for any subadditive valuation the social welfare at equilibrium is an $O(\log^2(m))$-approximation to the optimal social welfare, where $m$ is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Bayes-Nash equilibria and for no-regret learning outcomes, via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations, extend with a small degradation, to subadditive valuations, the largest complement-free class of valuations. Variants of draft auctions have been used in practice and have been experimentally shown to outperform other auctions. Our results provide a theoretical justification. ",vasilis syrgkanis,,2013.0,,arXiv,Devanur2013,True,,arXiv,Not available,Draft Auctions,380d3c69086211827fccfef7162716b7,http://arxiv.org/abs/1311.2820v1 15126," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",nikhil devanur,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 15127," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",bach ha,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 15128," We consider prior-free auctions for revenue and welfare maximization when agents have a common budget. The abstract environments we consider are ones where there is a downward-closed and symmetric feasibility constraint on the probabilities of service of the agents. These environments include position auctions where slots with decreasing click-through rates are auctioned to advertisers. We generalize and characterize the envy-free benchmark from Hartline and Yan (2011) to settings with budgets and characterize the optimal envy-free outcomes for both welfare and revenue. We give prior-free mechanisms that approximate these benchmarks. A building block in our mechanism is a clinching auction for position auction environments. This auction is a generalization of the multi-unit clinching auction of Dobzinski et al. (2008) and a special case of the polyhedral clinching auction of Goel et al. (2012). For welfare maximization, we show that this clinching auction is a good approximation to the envy-free optimal welfare for position auction environments. For profit maximization, we generalize the random sampling profit extraction auction from Fiat et al. (2002) for digital goods to give a 10.0-approximation to the envy-free optimal revenue in symmetric, downward-closed environments. The profit maximization question is of interest even without budgets and our mechanism is a 7.5-approximation which improving on the 30.4 bound of Ha and Hartline (2012). ",jason hartline,,2012.0,,arXiv,Devanur2012,True,,arXiv,Not available,Prior-free Auctions for Budgeted Agents,1665e22c83208c6dfc9a251343d94288,http://arxiv.org/abs/1212.5766v1 15129," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",christos papadimitriou,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 15130," The study of strategic behavior in large scale networks via standard game theoretical methods is a challenging, if not intractable, task. In this paper, we propose a way to approximate games played over networks of increasing size, by using the graph limiting concept of graphon. To this end, we introduce the new class of graphon games for populations of infinite size. As a first contribution, we investigate properties of the Nash equilibrium of this newly defined class of games, including existence, uniqueness and comparative statics. As a second contribution, we illustrate how graphon games can be used to approximate strategic behavior in large but finite network games by assuming that the network is randomly drawn according to the graphon and we derive precise bounds for the distance between graphon and sampled network game equilibria in terms of the population size. Finally, we derive a closed form expression for the Nash equilibrium of linear quadratic graphon games and we illustrate its relation to Bonacich centrality. ",francesca parise,,2018.0,,arXiv,Parise2018,True,,arXiv,Not available,Graphon games,451691ea6a9d70f47038cbacb4a75597,http://arxiv.org/abs/1802.00080v3 15131," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",george pierrakos,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 15132," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",oren ben-zwi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15133," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ron lavi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15134," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ilan newman,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15135," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",neil newman,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15136," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",kevin leyton-brown,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15137," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",paul milgrom,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15138," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",ilya segal,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15139," Consider the problem of allocating goods to buyers through an auction. An auction is efficient if the resulting allocation maximizes total welfare, conditional on the information available. If buyers have private values, the Vickrey-Groves-Clarke mechanism is efficient. If buyers have common values and a buyer's information can be summarized as a one-dimensional signal, Dasgupta and Maskin present an efficient auction. We construct an efficient auction mechanism in case buyer information is multidimensional, for a restricted class of valuation functions, and we prove which of the assumptions made are necessary for the existence of an efficient mechanism. ",andrei ciupan,,2018.0,,arXiv,Ciupan2018,True,,arXiv,Not available,Efficient Auctions With Common Values,bfcb250d2a768f4e13c9f3223858143f,http://arxiv.org/abs/1805.08568v1 15140," We modify the concept of quantum strategic game to make it useful for extensive form games. We prove that our modification allows to consider the normal representation of any finite extensive game using the fundamental concepts of quantum information. The Selten's Horse game and the general form of two-stage extensive game with perfect information are studied to illustrate a potential application of our idea. In both examples we use Eisert-Wilkens-Lewenstein approach as well as Marinatto-Weber approach to quantization of games. ",piotr frackiewicz,,2011.0,,arXiv,Frackiewicz2011,True,,arXiv,Not available,Quantum information approach to normal representation of extensive games,b2167e1097d747201251a5db75c52ee0,http://arxiv.org/abs/1107.3245v2 15141," The study of strategic behavior in large scale networks via standard game theoretical methods is a challenging, if not intractable, task. In this paper, we propose a way to approximate games played over networks of increasing size, by using the graph limiting concept of graphon. To this end, we introduce the new class of graphon games for populations of infinite size. As a first contribution, we investigate properties of the Nash equilibrium of this newly defined class of games, including existence, uniqueness and comparative statics. As a second contribution, we illustrate how graphon games can be used to approximate strategic behavior in large but finite network games by assuming that the network is randomly drawn according to the graphon and we derive precise bounds for the distance between graphon and sampled network game equilibria in terms of the population size. Finally, we derive a closed form expression for the Nash equilibrium of linear quadratic graphon games and we illustrate its relation to Bonacich centrality. ",asuman ozdaglar,,2018.0,,arXiv,Parise2018,True,,arXiv,Not available,Graphon games,451691ea6a9d70f47038cbacb4a75597,http://arxiv.org/abs/1802.00080v3 15142," We prove NP-hardness results for five of Nintendo's largest video game franchises: Mario, Donkey Kong, Legend of Zelda, Metroid, and Pokemon. Our results apply to generalized versions of Super Mario Bros. 1-3, The Lost Levels, and Super Mario World; Donkey Kong Country 1-3; all Legend of Zelda games; all Metroid games; and all Pokemon role-playing games. In addition, we prove PSPACE-completeness of the Donkey Kong Country games and several Legend of Zelda games. ",greg aloupis,,2012.0,,arXiv,Aloupis2012,True,,arXiv,Not available,Classic Nintendo Games are (Computationally) Hard,c98f74b2fab925b51c39cab969b30756,http://arxiv.org/abs/1203.1895v3 15143," We prove NP-hardness results for five of Nintendo's largest video game franchises: Mario, Donkey Kong, Legend of Zelda, Metroid, and Pokemon. Our results apply to generalized versions of Super Mario Bros. 1-3, The Lost Levels, and Super Mario World; Donkey Kong Country 1-3; all Legend of Zelda games; all Metroid games; and all Pokemon role-playing games. In addition, we prove PSPACE-completeness of the Donkey Kong Country games and several Legend of Zelda games. ",erik demaine,,2012.0,,arXiv,Aloupis2012,True,,arXiv,Not available,Classic Nintendo Games are (Computationally) Hard,c98f74b2fab925b51c39cab969b30756,http://arxiv.org/abs/1203.1895v3 15144," We prove NP-hardness results for five of Nintendo's largest video game franchises: Mario, Donkey Kong, Legend of Zelda, Metroid, and Pokemon. Our results apply to generalized versions of Super Mario Bros. 1-3, The Lost Levels, and Super Mario World; Donkey Kong Country 1-3; all Legend of Zelda games; all Metroid games; and all Pokemon role-playing games. In addition, we prove PSPACE-completeness of the Donkey Kong Country games and several Legend of Zelda games. ",alan guo,,2012.0,,arXiv,Aloupis2012,True,,arXiv,Not available,Classic Nintendo Games are (Computationally) Hard,c98f74b2fab925b51c39cab969b30756,http://arxiv.org/abs/1203.1895v3 15145," We prove NP-hardness results for five of Nintendo's largest video game franchises: Mario, Donkey Kong, Legend of Zelda, Metroid, and Pokemon. Our results apply to generalized versions of Super Mario Bros. 1-3, The Lost Levels, and Super Mario World; Donkey Kong Country 1-3; all Legend of Zelda games; all Metroid games; and all Pokemon role-playing games. In addition, we prove PSPACE-completeness of the Donkey Kong Country games and several Legend of Zelda games. ",giovanni viglietta,,2012.0,,arXiv,Aloupis2012,True,,arXiv,Not available,Classic Nintendo Games are (Computationally) Hard,c98f74b2fab925b51c39cab969b30756,http://arxiv.org/abs/1203.1895v3 15146," Potential games form a class of non-cooperative games where unilateral improvement dynamics are guaranteed to converge in many practical cases. The potential game approach has been applied to a wide range of wireless network problems, particularly to a variety of channel assignment problems. In this paper, the properties of potential games are introduced, and games in wireless networks that have been proven to be potential games are comprehensively discussed. ",koji yamamoto,,2015.0,10.1587/transcom.E98.B.1804,"IEICE Transactions on Communications, vol. E98-B, no. 9, pp. 1804-1823, Sept. 2015",Yamamoto2015,True,,arXiv,Not available,A Comprehensive Survey of Potential Game Approaches to Wireless Networks,3dea3721edc27f81ca445305d0faa834,http://arxiv.org/abs/1506.07942v1 15147," In this work, we design the game semantics for timed equivalences and preorders of timed processes. The timed games corresponding to the various timed relations form a hierarchy. These games are similar to Stirling's bisimulation games. If it is the case that the existence of a winning strategy for the defender in a game ${\cal G}_1$ implies that there exists a winning strategy for the defender in another game ${\cal G}_2$, then the relation that corresponds to ${\cal G}_1$ is stronger than the relation corresponding to ${\cal G}_2$. The game hierarchy also throws light into several timed relations that are not considered in this paper. ",shibashis guha,,2012.0,,arXiv,Guha2012,True,,arXiv,Not available,Game Characterizations of Timed Relations for Timed Automata Processes,debef53bcf7e7ea2dcceacd63a4aa154,http://arxiv.org/abs/1206.6565v1 15148," In this work, we design the game semantics for timed equivalences and preorders of timed processes. The timed games corresponding to the various timed relations form a hierarchy. These games are similar to Stirling's bisimulation games. If it is the case that the existence of a winning strategy for the defender in a game ${\cal G}_1$ implies that there exists a winning strategy for the defender in another game ${\cal G}_2$, then the relation that corresponds to ${\cal G}_1$ is stronger than the relation corresponding to ${\cal G}_2$. The game hierarchy also throws light into several timed relations that are not considered in this paper. ",shankara krishna,,2012.0,,arXiv,Guha2012,True,,arXiv,Not available,Game Characterizations of Timed Relations for Timed Automata Processes,debef53bcf7e7ea2dcceacd63a4aa154,http://arxiv.org/abs/1206.6565v1 15149," We study the biased $(1:b)$ Maker--Breaker positional games, played on the edge set of the complete graph on $n$ vertices, $K_n$. Given Breaker's bias $b$, possibly depending on $n$, we determine the bounds for the minimal number of moves, depending on $b$, in which Maker can win in each of the two standard graph games, the Perfect Matching game and the Hamilton Cycle game. ",mirjana mikalacki,,2016.0,,"Discrete Mathematics & Theoretical Computer Science, vol. 20 no. 2, Graph Theory (October 8, 2018) dmtcs:4874",Mikalački2016,True,,arXiv,Not available,Fast strategies in biased Maker--Breaker games,55edd28d0df1af7c961575236d6b0e30,http://arxiv.org/abs/1602.04985v5 15150," We study the biased $(1:b)$ Maker--Breaker positional games, played on the edge set of the complete graph on $n$ vertices, $K_n$. Given Breaker's bias $b$, possibly depending on $n$, we determine the bounds for the minimal number of moves, depending on $b$, in which Maker can win in each of the two standard graph games, the Perfect Matching game and the Hamilton Cycle game. ",milos stojakovic,,2016.0,,"Discrete Mathematics & Theoretical Computer Science, vol. 20 no. 2, Graph Theory (October 8, 2018) dmtcs:4874",Mikalački2016,True,,arXiv,Not available,Fast strategies in biased Maker--Breaker games,55edd28d0df1af7c961575236d6b0e30,http://arxiv.org/abs/1602.04985v5 15151," 2.5 player parity games combine the challenges posed by 2.5 player reachability games and the qualitative analysis of parity games. These two types of problems are best approached with different types of algorithms: strategy improvement algorithms for 2.5 player reachability games and recursive algorithms for the qualitative analysis of parity games. We present a method that - in contrast to existing techniques - tackles both aspects with the best suited approach and works exclusively on the 2.5 player game itself. The resulting technique is powerful enough to handle games with several million states. ",ernst hahn,,2016.0,,arXiv,Hahn2016,True,,arXiv,Not available,"Synthesising Strategy Improvement and Recursive Algorithms for Solving 2.5 Player Parity Games",d49bbba692747b0a9d83dada03d3b24d,http://arxiv.org/abs/1607.01474v1 15152," We introduce a stochastic learning process called the dampened gradient approximation process. While learning models have almost exclusively focused on finite games, in this paper we design a learning process for games with continuous action sets. It is payoff-based and thus requires from players no sophistication and no knowledge of the game. We show that despite such limited information, players will converge to Nash in large classes of games. In particular, convergence to a Nash equilibrium which is stable is guaranteed in all games with strategic complements as well as in concave games; convergence to Nash often occurs in all locally ordinal potential games; convergence to a stable Nash occurs with positive probability in all games with isolated equilibria. ",sebastian bervoets,,2018.0,,arXiv,Bervoets2018,True,,arXiv,Not available,Learning with minimal information in continuous games,bc59162eb57062d5cb94e7a6335752e3,http://arxiv.org/abs/1806.11506v1 15153," 2.5 player parity games combine the challenges posed by 2.5 player reachability games and the qualitative analysis of parity games. These two types of problems are best approached with different types of algorithms: strategy improvement algorithms for 2.5 player reachability games and recursive algorithms for the qualitative analysis of parity games. We present a method that - in contrast to existing techniques - tackles both aspects with the best suited approach and works exclusively on the 2.5 player game itself. The resulting technique is powerful enough to handle games with several million states. ",sven schewe,,2016.0,,arXiv,Hahn2016,True,,arXiv,Not available,"Synthesising Strategy Improvement and Recursive Algorithms for Solving 2.5 Player Parity Games",d49bbba692747b0a9d83dada03d3b24d,http://arxiv.org/abs/1607.01474v1 15154," 2.5 player parity games combine the challenges posed by 2.5 player reachability games and the qualitative analysis of parity games. These two types of problems are best approached with different types of algorithms: strategy improvement algorithms for 2.5 player reachability games and recursive algorithms for the qualitative analysis of parity games. We present a method that - in contrast to existing techniques - tackles both aspects with the best suited approach and works exclusively on the 2.5 player game itself. The resulting technique is powerful enough to handle games with several million states. ",andrea turrini,,2016.0,,arXiv,Hahn2016,True,,arXiv,Not available,"Synthesising Strategy Improvement and Recursive Algorithms for Solving 2.5 Player Parity Games",d49bbba692747b0a9d83dada03d3b24d,http://arxiv.org/abs/1607.01474v1 15155," 2.5 player parity games combine the challenges posed by 2.5 player reachability games and the qualitative analysis of parity games. These two types of problems are best approached with different types of algorithms: strategy improvement algorithms for 2.5 player reachability games and recursive algorithms for the qualitative analysis of parity games. We present a method that - in contrast to existing techniques - tackles both aspects with the best suited approach and works exclusively on the 2.5 player game itself. The resulting technique is powerful enough to handle games with several million states. ",lijun zhang,,2016.0,,arXiv,Hahn2016,True,,arXiv,Not available,"Synthesising Strategy Improvement and Recursive Algorithms for Solving 2.5 Player Parity Games",d49bbba692747b0a9d83dada03d3b24d,http://arxiv.org/abs/1607.01474v1 15156," Game semantics is a rich and successful class of denotational models for programming languages. Most game models feature a rather intuitive setup, yet surprisingly difficult proofs of such basic results as associativity of composition of strategies. We set out to unify these models into a basic abstract framework for game semantics, game settings. Our main contribution is the generic construction, for any game setting, of a category of games and strategies. Furthermore, we extend the framework to deal with innocence, and prove that innocent strategies form a subcategory. We finally show that our constructions cover many concrete cases, mainly among the early models and the very recent sheaf-based ones. ",clovis eberhart,,2017.0,,arXiv,Eberhart2017,True,,arXiv,Not available,What's in a game? A theory of game models,972d50f94040ec37ce7eaf2569d9bea3,http://arxiv.org/abs/1711.10860v1 15157," Game semantics is a rich and successful class of denotational models for programming languages. Most game models feature a rather intuitive setup, yet surprisingly difficult proofs of such basic results as associativity of composition of strategies. We set out to unify these models into a basic abstract framework for game semantics, game settings. Our main contribution is the generic construction, for any game setting, of a category of games and strategies. Furthermore, we extend the framework to deal with innocence, and prove that innocent strategies form a subcategory. We finally show that our constructions cover many concrete cases, mainly among the early models and the very recent sheaf-based ones. ",tom hirschowitz,,2017.0,,arXiv,Eberhart2017,True,,arXiv,Not available,What's in a game? A theory of game models,972d50f94040ec37ce7eaf2569d9bea3,http://arxiv.org/abs/1711.10860v1 15158," Combinatorial two-player games have recently been applied to knot theory. Examples of this include the Knotting-Unknotting Game and the Region Unknotting Game, both of which are played on knot shadows. These are turn-based games played by two players, where each player has a separate goal to achieve in order to win the game. In this paper, we introduce the Linking-Unlinking Game which is played on two-component link shadows. We then present winning strategies for the Linking-Unlinking Game played on all shadows of two-component rational tangle closures and played on a large family of general two-component link shadows. ",adam giambrone,,2018.0,,arXiv,Giambrone2018,True,,arXiv,Not available,The Linking-Unlinking Game,a8688f4a35d1c921d996afc165fe2d84,http://arxiv.org/abs/1807.11026v1 15159," Combinatorial two-player games have recently been applied to knot theory. Examples of this include the Knotting-Unknotting Game and the Region Unknotting Game, both of which are played on knot shadows. These are turn-based games played by two players, where each player has a separate goal to achieve in order to win the game. In this paper, we introduce the Linking-Unlinking Game which is played on two-component link shadows. We then present winning strategies for the Linking-Unlinking Game played on all shadows of two-component rational tangle closures and played on a large family of general two-component link shadows. ",jake murphy,,2018.0,,arXiv,Giambrone2018,True,,arXiv,Not available,The Linking-Unlinking Game,a8688f4a35d1c921d996afc165fe2d84,http://arxiv.org/abs/1807.11026v1 15160," In this paper we introduce a novel flow representation for finite games in strategic form. This representation allows us to develop a canonical direct sum decomposition of an arbitrary game into three components, which we refer to as the potential, harmonic and nonstrategic components. We analyze natural classes of games that are induced by this decomposition, and in particular, focus on games with no harmonic component and games with no potential component. We show that the first class corresponds to the well-known potential games. We refer to the second class of games as harmonic games, and study the structural and equilibrium properties of this new class of games. Intuitively, the potential component of a game captures interactions that can equivalently be represented as a common interest game, while the harmonic part represents the conflicts between the interests of the players. We make this intuition precise, by studying the properties of these two classes, and show that indeed they have quite distinct and remarkable characteristics. For instance, while finite potential games always have pure Nash equilibria, harmonic games generically never do. Moreover, we show that the nonstrategic component does not affect the equilibria of a game, but plays a fundamental role in their efficiency properties, thus decoupling the location of equilibria and their payoff-related properties. Exploiting the properties of the decomposition framework, we obtain explicit expressions for the projections of games onto the subspaces of potential and harmonic games. This enables an extension of the properties of potential and harmonic games to ""nearby"" games. We exemplify this point by showing that the set of approximate equilibria of an arbitrary game can be characterized through the equilibria of its projection onto the set of potential games. ",ozan candogan,,2010.0,10.1287/moor.1110.0500,"Mathematics of Operations Research, Vol. 36, No. 3, pp. 474-503, 2011",Candogan2010,True,,arXiv,Not available,Flows and Decompositions of Games: Harmonic and Potential Games,de6b7dae0c559e74c8ada16c5de72b5a,http://arxiv.org/abs/1005.2405v2 15161," In this paper we introduce a novel flow representation for finite games in strategic form. This representation allows us to develop a canonical direct sum decomposition of an arbitrary game into three components, which we refer to as the potential, harmonic and nonstrategic components. We analyze natural classes of games that are induced by this decomposition, and in particular, focus on games with no harmonic component and games with no potential component. We show that the first class corresponds to the well-known potential games. We refer to the second class of games as harmonic games, and study the structural and equilibrium properties of this new class of games. Intuitively, the potential component of a game captures interactions that can equivalently be represented as a common interest game, while the harmonic part represents the conflicts between the interests of the players. We make this intuition precise, by studying the properties of these two classes, and show that indeed they have quite distinct and remarkable characteristics. For instance, while finite potential games always have pure Nash equilibria, harmonic games generically never do. Moreover, we show that the nonstrategic component does not affect the equilibria of a game, but plays a fundamental role in their efficiency properties, thus decoupling the location of equilibria and their payoff-related properties. Exploiting the properties of the decomposition framework, we obtain explicit expressions for the projections of games onto the subspaces of potential and harmonic games. This enables an extension of the properties of potential and harmonic games to ""nearby"" games. We exemplify this point by showing that the set of approximate equilibria of an arbitrary game can be characterized through the equilibria of its projection onto the set of potential games. ",ishai menache,,2010.0,10.1287/moor.1110.0500,"Mathematics of Operations Research, Vol. 36, No. 3, pp. 474-503, 2011",Candogan2010,True,,arXiv,Not available,Flows and Decompositions of Games: Harmonic and Potential Games,de6b7dae0c559e74c8ada16c5de72b5a,http://arxiv.org/abs/1005.2405v2 15162," In this paper we introduce a novel flow representation for finite games in strategic form. This representation allows us to develop a canonical direct sum decomposition of an arbitrary game into three components, which we refer to as the potential, harmonic and nonstrategic components. We analyze natural classes of games that are induced by this decomposition, and in particular, focus on games with no harmonic component and games with no potential component. We show that the first class corresponds to the well-known potential games. We refer to the second class of games as harmonic games, and study the structural and equilibrium properties of this new class of games. Intuitively, the potential component of a game captures interactions that can equivalently be represented as a common interest game, while the harmonic part represents the conflicts between the interests of the players. We make this intuition precise, by studying the properties of these two classes, and show that indeed they have quite distinct and remarkable characteristics. For instance, while finite potential games always have pure Nash equilibria, harmonic games generically never do. Moreover, we show that the nonstrategic component does not affect the equilibria of a game, but plays a fundamental role in their efficiency properties, thus decoupling the location of equilibria and their payoff-related properties. Exploiting the properties of the decomposition framework, we obtain explicit expressions for the projections of games onto the subspaces of potential and harmonic games. This enables an extension of the properties of potential and harmonic games to ""nearby"" games. We exemplify this point by showing that the set of approximate equilibria of an arbitrary game can be characterized through the equilibria of its projection onto the set of potential games. ",asuman ozdaglar,,2010.0,10.1287/moor.1110.0500,"Mathematics of Operations Research, Vol. 36, No. 3, pp. 474-503, 2011",Candogan2010,True,,arXiv,Not available,Flows and Decompositions of Games: Harmonic and Potential Games,de6b7dae0c559e74c8ada16c5de72b5a,http://arxiv.org/abs/1005.2405v2 15163," We introduce a stochastic learning process called the dampened gradient approximation process. While learning models have almost exclusively focused on finite games, in this paper we design a learning process for games with continuous action sets. It is payoff-based and thus requires from players no sophistication and no knowledge of the game. We show that despite such limited information, players will converge to Nash in large classes of games. In particular, convergence to a Nash equilibrium which is stable is guaranteed in all games with strategic complements as well as in concave games; convergence to Nash often occurs in all locally ordinal potential games; convergence to a stable Nash occurs with positive probability in all games with isolated equilibria. ",mario bravo,,2018.0,,arXiv,Bervoets2018,True,,arXiv,Not available,Learning with minimal information in continuous games,bc59162eb57062d5cb94e7a6335752e3,http://arxiv.org/abs/1806.11506v1 15164," In this paper we introduce a novel flow representation for finite games in strategic form. This representation allows us to develop a canonical direct sum decomposition of an arbitrary game into three components, which we refer to as the potential, harmonic and nonstrategic components. We analyze natural classes of games that are induced by this decomposition, and in particular, focus on games with no harmonic component and games with no potential component. We show that the first class corresponds to the well-known potential games. We refer to the second class of games as harmonic games, and study the structural and equilibrium properties of this new class of games. Intuitively, the potential component of a game captures interactions that can equivalently be represented as a common interest game, while the harmonic part represents the conflicts between the interests of the players. We make this intuition precise, by studying the properties of these two classes, and show that indeed they have quite distinct and remarkable characteristics. For instance, while finite potential games always have pure Nash equilibria, harmonic games generically never do. Moreover, we show that the nonstrategic component does not affect the equilibria of a game, but plays a fundamental role in their efficiency properties, thus decoupling the location of equilibria and their payoff-related properties. Exploiting the properties of the decomposition framework, we obtain explicit expressions for the projections of games onto the subspaces of potential and harmonic games. This enables an extension of the properties of potential and harmonic games to ""nearby"" games. We exemplify this point by showing that the set of approximate equilibria of an arbitrary game can be characterized through the equilibria of its projection onto the set of potential games. ",pablo parrilo,,2010.0,10.1287/moor.1110.0500,"Mathematics of Operations Research, Vol. 36, No. 3, pp. 474-503, 2011",Candogan2010,True,,arXiv,Not available,Flows and Decompositions of Games: Harmonic and Potential Games,de6b7dae0c559e74c8ada16c5de72b5a,http://arxiv.org/abs/1005.2405v2 15165," Extensive-form games constitute the standard representation scheme for games with a temporal component. But do all extensive-form games correspond to protocols that we can implement in the real world? We often rule out games with imperfect recall, which prescribe that an agent forget something that she knew before. In this paper, we show that even some games with perfect recall can be problematic to implement. Specifically, we show that if the agents have a sense of time passing (say, access to a clock), then some extensive-form games can no longer be implemented; no matter how we attempt to time the game, some information will leak to the agents that they are not supposed to have. We say such a game is not exactly timeable. We provide easy-to-check necessary and sufficient conditions for a game to be exactly timeable. Most of the technical depth of the paper concerns how to approximately time games, which we show can always be done, though it may require large amounts of time. Specifically, we show that for some games the time required to approximately implement the game grows as a power tower of height proportional to the number of players and with a parameter that measures the precision of the approximation at the top of the power tower. In practice, that makes the games untimeable. Besides the conceptual contribution to game theory, we believe our methodology can have applications to preventing information leakage in security protocols. ",sune jakobsen,,2015.0,,arXiv,Jakobsen2015,True,,arXiv,Not available,Timeability of Extensive-Form Games,97353d73fd9b9abb133773fbd5551440,http://arxiv.org/abs/1502.03430v1 15166," Extensive-form games constitute the standard representation scheme for games with a temporal component. But do all extensive-form games correspond to protocols that we can implement in the real world? We often rule out games with imperfect recall, which prescribe that an agent forget something that she knew before. In this paper, we show that even some games with perfect recall can be problematic to implement. Specifically, we show that if the agents have a sense of time passing (say, access to a clock), then some extensive-form games can no longer be implemented; no matter how we attempt to time the game, some information will leak to the agents that they are not supposed to have. We say such a game is not exactly timeable. We provide easy-to-check necessary and sufficient conditions for a game to be exactly timeable. Most of the technical depth of the paper concerns how to approximately time games, which we show can always be done, though it may require large amounts of time. Specifically, we show that for some games the time required to approximately implement the game grows as a power tower of height proportional to the number of players and with a parameter that measures the precision of the approximation at the top of the power tower. In practice, that makes the games untimeable. Besides the conceptual contribution to game theory, we believe our methodology can have applications to preventing information leakage in security protocols. ",troels sorensen,,2015.0,,arXiv,Jakobsen2015,True,,arXiv,Not available,Timeability of Extensive-Form Games,97353d73fd9b9abb133773fbd5551440,http://arxiv.org/abs/1502.03430v1 15167," Extensive-form games constitute the standard representation scheme for games with a temporal component. But do all extensive-form games correspond to protocols that we can implement in the real world? We often rule out games with imperfect recall, which prescribe that an agent forget something that she knew before. In this paper, we show that even some games with perfect recall can be problematic to implement. Specifically, we show that if the agents have a sense of time passing (say, access to a clock), then some extensive-form games can no longer be implemented; no matter how we attempt to time the game, some information will leak to the agents that they are not supposed to have. We say such a game is not exactly timeable. We provide easy-to-check necessary and sufficient conditions for a game to be exactly timeable. Most of the technical depth of the paper concerns how to approximately time games, which we show can always be done, though it may require large amounts of time. Specifically, we show that for some games the time required to approximately implement the game grows as a power tower of height proportional to the number of players and with a parameter that measures the precision of the approximation at the top of the power tower. In practice, that makes the games untimeable. Besides the conceptual contribution to game theory, we believe our methodology can have applications to preventing information leakage in security protocols. ",vincent conitzer,,2015.0,,arXiv,Jakobsen2015,True,,arXiv,Not available,Timeability of Extensive-Form Games,97353d73fd9b9abb133773fbd5551440,http://arxiv.org/abs/1502.03430v1 15168," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",michael kearns,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 15169," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",lili dworkin,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 15170," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",dan marinescu,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 15171," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",ashkan paya,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 15172," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",john morrison,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 15173," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",maja rudolph,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 15174," We introduce a stochastic learning process called the dampened gradient approximation process. While learning models have almost exclusively focused on finite games, in this paper we design a learning process for games with continuous action sets. It is payoff-based and thus requires from players no sophistication and no knowledge of the game. We show that despite such limited information, players will converge to Nash in large classes of games. In particular, convergence to a Nash equilibrium which is stable is guaranteed in all games with strategic complements as well as in concave games; convergence to Nash often occurs in all locally ordinal potential games; convergence to a stable Nash occurs with positive probability in all games with isolated equilibria. ",mathieu faure,,2018.0,,arXiv,Bervoets2018,True,,arXiv,Not available,Learning with minimal information in continuous games,bc59162eb57062d5cb94e7a6335752e3,http://arxiv.org/abs/1806.11506v1 15175," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",joseph ellis,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 15176," Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than a reserve price set too low. To address this we develop objective variables, a new framework for combining probabilistic modeling with optimal decision-making. Objective variables are ""hallucinated observations"" that transform the revenue maximization task into a regularized maximum likelihood estimation problem, which we solve with an EM algorithm. This framework enables a variety of prediction mechanisms to set the reserve price. As examples, we study objective variable methods with regression, kernelized regression, and neural networks on simulated and real data. Our methods outperform previous approaches both in terms of scalability and profit. ",david blei,,2015.0,,arXiv,Rudolph2015,True,,arXiv,Not available,"Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve",32bae8f7fdd861c826c0926cced68546,http://arxiv.org/abs/1506.07504v1 15177," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",yang cai,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 15178," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",constantinos daskalakis,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 15179," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",s. weinberg,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 15180," We study a central problem in Algorithmic Mechanism Design: constructing truthful mechanisms for welfare maximization in combinatorial auctions with submodular bidders. Dobzinski, Nisan, and Schapira provided the first mechanism that guarantees a non-trivial approximation ratio of $O(\log^2 m)$ [STOC'06], where $m$ is the number of items. This was subsequently improved to $O(\log m\log \log m)$ [Dobzinski, APPROX'07] and then to $O(\log m)$ [Krysta and Vocking, ICALP'12]. In this paper we develop the first mechanism that breaks the logarithmic barrier. Specifically, the mechanism provides an approximation ratio of $O(\sqrt {\log m})$. Similarly to previous constructions, our mechanism uses polynomially many value and demand queries, and in fact provides the same approximation ratio for the larger class of XOS (a.k.a. fractionally subadditive) valuations. We also develop a computationally efficient implementation of the mechanism for combinatorial auctions with budget additive bidders. Although in general computing a demand query is NP-hard for budget additive valuations, we observe that the specific form of demand queries that our mechanism uses can be efficiently computed when bidders are budget additive. ",shahar dobzinski,,2016.0,,arXiv,Dobzinski2016,True,,arXiv,Not available,"Breaking the Logarithmic Barrier for Truthful Combinatorial Auctions with Submodular Bidders",777803b9207fca0be5d5b05567edf0cb,http://arxiv.org/abs/1602.05914v2 15181," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",guillaume basse,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 15182," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",hossein soufiani,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 15183," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",diane lambert,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 15184," We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without compromising users' privacy. Since users' costs and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model this correlation by assuming that a user's unknown sensitive data determines a distribution from a set of publicly known distributions and a user's cost is drawn from that distribution. We propose a stronger model of privacy preserving mechanism where users are compensated whenever they reveal information about their data to the mechanism. In this model, we design a Bayesian incentive compatible and privacy preserving mechanism that guarantees accuracy and protects the privacy of both cost and data. ",lisa fleischer,,2012.0,,arXiv,Fleischer2012,True,,arXiv,Not available,"Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data",c1c09adbb5a4eb5ffbd50c2e61f1b72c,http://arxiv.org/abs/1204.4031v1 15185," We consider a formulation of a non zero-sum n players game by an n+1 players zero-sum game. We suppose the existence of the n+1-th player in addition to n players in the main game, and virtual subsidies to the n players which is provided by the n+1-th player. Its strategic variable affects only the subsidies, and does not affect choice of strategies by the n players in the main game. His objective function is the opposite of the sum of the payoffs of the n players. We will show 1) The minimax theorem by Sion (Sion(1958)) implies the existence of Nash equilibrium in the n players non zero-sum game. 2) The maximin strategy of each player in {1, 2, \dots, n} with the minimax strategy of the n+1-th player is equivalent to the Nash equilibrium strategy of the n players non zero-sum game. 3) The existence of Nash equilibrium in the n players non zero-sum game implies Sion's minimax theorem for pairs of each of the n players and the n+1-th player. ",yasuhito tanaka,,2018.0,,arXiv,Tanaka2018,True,,arXiv,Not available,On zero-sum game formulation of non zero-sum game,473ab78478f9c4c24cbde60739da21c2,http://arxiv.org/abs/1809.02984v1 15186," We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without compromising users' privacy. Since users' costs and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model this correlation by assuming that a user's unknown sensitive data determines a distribution from a set of publicly known distributions and a user's cost is drawn from that distribution. We propose a stronger model of privacy preserving mechanism where users are compensated whenever they reveal information about their data to the mechanism. In this model, we design a Bayesian incentive compatible and privacy preserving mechanism that guarantees accuracy and protects the privacy of both cost and data. ",yu-han lyu,,2012.0,,arXiv,Fleischer2012,True,,arXiv,Not available,"Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data",c1c09adbb5a4eb5ffbd50c2e61f1b72c,http://arxiv.org/abs/1204.4031v1 15187," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",xiaojun feng,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 15188," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",peng lin,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 15189," In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability. ",qian zhang,,2014.0,,arXiv,Feng2014,True,,arXiv,Not available,"FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction",e09fb7f6efdca59f5b765bcffba8bba2,http://arxiv.org/abs/1404.2348v1 15190," Future wireless networks are expected to be highly heterogeneous with the co-existence of macrocells and small cells as well as provide support for device-to-device (D2D) communication. In such muti-tier heterogeneous systems centralized radio resource allocation and interference management schemes will not be scalable. In this work, we propose an auction-based distributed solution to allocate radio resources in a muti-tier heterogeneous network. We provide the bound of achievable data rate and show that the complexity of the proposed scheme is linear with number of transmitter nodes and the available resources. The signaling issues (e.g., information exchange over control channels) for the proposed distributed solution is also discussed. Numerical results show the effectiveness of proposed solution in comparison with a centralized resource allocation scheme. ",monowar hasan,,2015.0,,arXiv,Hasan2015,True,,arXiv,Not available,"Distributed Resource Allocation in D2D-Enabled Multi-tier Cellular Networks: An Auction Approach",9193cb40d367d8593d69cb2780d79489,http://arxiv.org/abs/1501.04199v2 15191," Future wireless networks are expected to be highly heterogeneous with the co-existence of macrocells and small cells as well as provide support for device-to-device (D2D) communication. In such muti-tier heterogeneous systems centralized radio resource allocation and interference management schemes will not be scalable. In this work, we propose an auction-based distributed solution to allocate radio resources in a muti-tier heterogeneous network. We provide the bound of achievable data rate and show that the complexity of the proposed scheme is linear with number of transmitter nodes and the available resources. The signaling issues (e.g., information exchange over control channels) for the proposed distributed solution is also discussed. Numerical results show the effectiveness of proposed solution in comparison with a centralized resource allocation scheme. ",ekram hossain,,2015.0,,arXiv,Hasan2015,True,,arXiv,Not available,"Distributed Resource Allocation in D2D-Enabled Multi-tier Cellular Networks: An Auction Approach",9193cb40d367d8593d69cb2780d79489,http://arxiv.org/abs/1501.04199v2 15192," A smart city provides its people with high standard of living through advanced technologies and transport is one of the major foci. With the advent of autonomous vehicles (AVs), an AV-based public transportation system has been proposed recently, which is capable of providing new forms of transportation services with high efficiency, high flexibility, and low cost. For the benefit of passengers, multitenancy can increase market competition leading to lower service charge and higher quality of service. In this paper, we study the pricing issue of the multi-tenant AV public transportation system and three types of services are defined. The pricing process for each service type is modeled as a combinatorial auction, in which the service providers, as bidders, compete for offering transportation services. The winners of the auction are determined through an integer linear program. To prevent the bidders from raising their bids for higher returns, we propose a strategy-proof Vickrey-Clarke-Groves-based charging mechanism, which can maximize the social welfare, to settle the final charges for the customers. We perform extensive simulations to verify the analytical results and evaluate the performance of the charging mechanism. ",albert lam,,2015.0,10.1109/TITS.2015.2490800,arXiv,Lam2015,True,,arXiv,Not available,"Combinatorial Auction-Based Pricing for Multi-tenant Autonomous Vehicle Public Transportation System",b5ac0a9ed472667c860e254dbe19c5e1,http://arxiv.org/abs/1503.01425v2 15193," We present a game semantics for intuitionistic type theory. Specifically, we propose categories with families of a new variant of games and strategies for both extensional and intensional variants of the type theory with dependent function, dependent pair, and identity types as well as universes. Our games and strategies generalize the existing notion of games and strategies and achieve an interpretation of dependent types and the hierarchy of universes in an intuitive manner. We believe that it is a significant step towards a computational and intensional interpretation of the type theory. ",norihiro yamada,,2016.0,,arXiv,Yamada2016,True,,arXiv,Not available,Game-theoretic Interpretation of Intuitionistic Type Theory,a1e037d41832721ac9bf930936c1ce11,http://arxiv.org/abs/1601.05336v10 15194," The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory. ",quanyan zhu,,2018.0,10.1145/3243734.3264421,arXiv,Zhu2018,True,,arXiv,Not available,Game Theory Meets Network Security: A Tutorial at ACM CCS,0d571b47531092f63e48c457055c5ac8,http://arxiv.org/abs/1808.08066v1 15195," The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory. ",stefan rass,,2018.0,10.1145/3243734.3264421,arXiv,Zhu2018,True,,arXiv,Not available,Game Theory Meets Network Security: A Tutorial at ACM CCS,0d571b47531092f63e48c457055c5ac8,http://arxiv.org/abs/1808.08066v1 15196," Counterfactual Regret Minimization (CFR) is the leading algorithm for solving large imperfect-information games. It iteratively traverses the game tree in order to converge to a Nash equilibrium. In order to deal with extremely large games, CFR typically uses domain-specific heuristics to simplify the target game in a process known as abstraction. This simplified game is solved with tabular CFR, and its solution is mapped back to the full game. This paper introduces Deep Counterfactual Regret Minimization (Deep CFR), a form of CFR that obviates the need for abstraction by instead using deep neural networks to approximate the behavior of CFR in the full game. We show that Deep CFR is principled and achieves strong performance in the benchmark game of heads-up no-limit Texas hold'em poker. This is the first successful use of function approximation in CFR for large games. ",noam brown,,2018.0,,arXiv,Brown2018,True,,arXiv,Not available,Deep Counterfactual Regret Minimization,a723a0d6f05b6ba0ad7767e1ec07a62f,http://arxiv.org/abs/1811.00164v1 15197," The principle of open determinacy for class games---two-player games of perfect information with plays of length $\omega$, where the moves are chosen from a possibly proper class, such as games on the ordinals---is not provable in Zermelo-Fraenkel set theory ZFC or G\""odel-Bernays set theory GBC, if these theories are consistent, because provably in ZFC there is a definable open proper class game with no definable winning strategy. In fact, the principle of open determinacy and even merely clopen determinacy for class games implies Con(ZFC) and iterated instances Con(Con(ZFC)) and more, because it implies that there is a satisfaction class for first-order truth and indeed a transfinite tower of truth predicates for iterated truth-about-truth, relative to any class parameter. This is perhaps explained, in light of the Tarskian recursive definition of truth, by the more general fact that the principle of clopen determinacy is exactly equivalent over GBC to the principle of elementary transfinite recursion ETR over well-founded class relations. Meanwhile, the principle of open determinacy for class games is provable in the stronger theory GBC+$\Pi^1_1$-comprehension, a proper fragment of Kelley-Morse set theory KM. ",victoria gitman,,2015.0,,arXiv,Gitman2015,True,,arXiv,Not available,Open determinacy for class games,6cc8b068e326c01983c41943ca9a9669,http://arxiv.org/abs/1509.01099v2 15198," The principle of open determinacy for class games---two-player games of perfect information with plays of length $\omega$, where the moves are chosen from a possibly proper class, such as games on the ordinals---is not provable in Zermelo-Fraenkel set theory ZFC or G\""odel-Bernays set theory GBC, if these theories are consistent, because provably in ZFC there is a definable open proper class game with no definable winning strategy. In fact, the principle of open determinacy and even merely clopen determinacy for class games implies Con(ZFC) and iterated instances Con(Con(ZFC)) and more, because it implies that there is a satisfaction class for first-order truth and indeed a transfinite tower of truth predicates for iterated truth-about-truth, relative to any class parameter. This is perhaps explained, in light of the Tarskian recursive definition of truth, by the more general fact that the principle of clopen determinacy is exactly equivalent over GBC to the principle of elementary transfinite recursion ETR over well-founded class relations. Meanwhile, the principle of open determinacy for class games is provable in the stronger theory GBC+$\Pi^1_1$-comprehension, a proper fragment of Kelley-Morse set theory KM. ",joel hamkins,,2015.0,,arXiv,Gitman2015,True,,arXiv,Not available,Open determinacy for class games,6cc8b068e326c01983c41943ca9a9669,http://arxiv.org/abs/1509.01099v2 15199," We present a dynamical theory of a multi-agent market game, the so-called Minority Game (MG), based on crowds and anticrowds. The time-averaged version of the dynamical equations provides a quantitatively accurate, yet intuitively simple, explanation for the variation of the standard deviation (`volatility') in MG-like games. We demonstrate this for the basic MG, and the MG with stochastic strategies. The time-dependent equations themselves reproduce the essential dynamics of the MG. ",m. hart,,2000.0,10.1007/s100510170237,arXiv,Hart2000,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Market Games,432a32b597d367f88de670f46ecfc646,http://arxiv.org/abs/cond-mat/0008385v1 15200," We present a dynamical theory of a multi-agent market game, the so-called Minority Game (MG), based on crowds and anticrowds. The time-averaged version of the dynamical equations provides a quantitatively accurate, yet intuitively simple, explanation for the variation of the standard deviation (`volatility') in MG-like games. We demonstrate this for the basic MG, and the MG with stochastic strategies. The time-dependent equations themselves reproduce the essential dynamics of the MG. ",p. jefferies,,2000.0,10.1007/s100510170237,arXiv,Hart2000,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Market Games,432a32b597d367f88de670f46ecfc646,http://arxiv.org/abs/cond-mat/0008385v1 15201," We present a dynamical theory of a multi-agent market game, the so-called Minority Game (MG), based on crowds and anticrowds. The time-averaged version of the dynamical equations provides a quantitatively accurate, yet intuitively simple, explanation for the variation of the standard deviation (`volatility') in MG-like games. We demonstrate this for the basic MG, and the MG with stochastic strategies. The time-dependent equations themselves reproduce the essential dynamics of the MG. ",p. hui,,2000.0,10.1007/s100510170237,arXiv,Hart2000,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Market Games,432a32b597d367f88de670f46ecfc646,http://arxiv.org/abs/cond-mat/0008385v1 15202," We present a dynamical theory of a multi-agent market game, the so-called Minority Game (MG), based on crowds and anticrowds. The time-averaged version of the dynamical equations provides a quantitatively accurate, yet intuitively simple, explanation for the variation of the standard deviation (`volatility') in MG-like games. We demonstrate this for the basic MG, and the MG with stochastic strategies. The time-dependent equations themselves reproduce the essential dynamics of the MG. ",n. johnson,,2000.0,10.1007/s100510170237,arXiv,Hart2000,True,,arXiv,Not available,Crowd-Anticrowd Theory of Multi-Agent Market Games,432a32b597d367f88de670f46ecfc646,http://arxiv.org/abs/cond-mat/0008385v1 15203," This dissertation highlights connections between the fields of neural networks, game theory and time series generation. The concept of antipredictability is explained, and the properties of time series that are antipredictable for several prototypical prediction algorithms (neural networks, Boolean funtions etc.) are studied. The Minority Game provides a framework in which antipredictability arises naturally. Several variations of the MG are introduced and compared, including extensions to more than two choices, and the properties of the generated time series are analysed. A learning algorithm is presented by which a neural network can find a good mixed strategy in zero-sum matrix games. In a certain limit, this algorithm is a stochastic variation of the ""fictitious play"" learning algorithm. ",richard metzler,,2002.0,,arXiv,Metzler2002,True,,arXiv,Not available,"Neural Networks, Game Theory and Time Series Generation",724b3b096b00d1dfb71216cbea1a11d9,http://arxiv.org/abs/cond-mat/0212486v1 15204," Quantum game theory is a recently developing field of physical research. In this paper, we investigate quantum games in a systematic way. With the famous instance of the Prisoner's Dilemma, we present the fascinating properties of quantum games in different conditions, i.e. different number of the players, different strategic space of the players and different amount of the entanglement involved. ",jiangfeng du,,2003.0,,"Fluctuation and Noise Letters, Vol. 2, No. 4 (2002) R189",Du2003,True,,arXiv,Not available,Playing Prisoner's Dilemma with Quantum Rules,1b7312e49d29f9a6c77b637dd160d755,http://arxiv.org/abs/quant-ph/0301042v2 15205," Quantum game theory is a recently developing field of physical research. In this paper, we investigate quantum games in a systematic way. With the famous instance of the Prisoner's Dilemma, we present the fascinating properties of quantum games in different conditions, i.e. different number of the players, different strategic space of the players and different amount of the entanglement involved. ",xiaodong xu,,2003.0,,"Fluctuation and Noise Letters, Vol. 2, No. 4 (2002) R189",Du2003,True,,arXiv,Not available,Playing Prisoner's Dilemma with Quantum Rules,1b7312e49d29f9a6c77b637dd160d755,http://arxiv.org/abs/quant-ph/0301042v2 15206," Quantum game theory is a recently developing field of physical research. In this paper, we investigate quantum games in a systematic way. With the famous instance of the Prisoner's Dilemma, we present the fascinating properties of quantum games in different conditions, i.e. different number of the players, different strategic space of the players and different amount of the entanglement involved. ",hui li,,2003.0,,"Fluctuation and Noise Letters, Vol. 2, No. 4 (2002) R189",Du2003,True,,arXiv,Not available,Playing Prisoner's Dilemma with Quantum Rules,1b7312e49d29f9a6c77b637dd160d755,http://arxiv.org/abs/quant-ph/0301042v2 15207," Counterfactual Regret Minimization (CFR) is the leading algorithm for solving large imperfect-information games. It iteratively traverses the game tree in order to converge to a Nash equilibrium. In order to deal with extremely large games, CFR typically uses domain-specific heuristics to simplify the target game in a process known as abstraction. This simplified game is solved with tabular CFR, and its solution is mapped back to the full game. This paper introduces Deep Counterfactual Regret Minimization (Deep CFR), a form of CFR that obviates the need for abstraction by instead using deep neural networks to approximate the behavior of CFR in the full game. We show that Deep CFR is principled and achieves strong performance in the benchmark game of heads-up no-limit Texas hold'em poker. This is the first successful use of function approximation in CFR for large games. ",adam lerer,,2018.0,,arXiv,Brown2018,True,,arXiv,Not available,Deep Counterfactual Regret Minimization,a723a0d6f05b6ba0ad7767e1ec07a62f,http://arxiv.org/abs/1811.00164v1 15208," Quantum game theory is a recently developing field of physical research. In this paper, we investigate quantum games in a systematic way. With the famous instance of the Prisoner's Dilemma, we present the fascinating properties of quantum games in different conditions, i.e. different number of the players, different strategic space of the players and different amount of the entanglement involved. ",xianyi zhou,,2003.0,,"Fluctuation and Noise Letters, Vol. 2, No. 4 (2002) R189",Du2003,True,,arXiv,Not available,Playing Prisoner's Dilemma with Quantum Rules,1b7312e49d29f9a6c77b637dd160d755,http://arxiv.org/abs/quant-ph/0301042v2 15209," Quantum game theory is a recently developing field of physical research. In this paper, we investigate quantum games in a systematic way. With the famous instance of the Prisoner's Dilemma, we present the fascinating properties of quantum games in different conditions, i.e. different number of the players, different strategic space of the players and different amount of the entanglement involved. ",rongdian han,,2003.0,,"Fluctuation and Noise Letters, Vol. 2, No. 4 (2002) R189",Du2003,True,,arXiv,Not available,Playing Prisoner's Dilemma with Quantum Rules,1b7312e49d29f9a6c77b637dd160d755,http://arxiv.org/abs/quant-ph/0301042v2 15210," Quantum Game Theory provides us with new tools for practising games and some other risk related enterprices like, for example, gambling. The two party gambling protocol presented by Goldenberg {\it et al} is one of the simplest yet still hard to implement applications of Quantum Game Theory. We propose potential physical realisation of the quantum gambling protocol with use of three mesoscopic ring qubits. We point out problems in implementation of such game. ",ireneusz pakula,,2006.0,10.1002/pssb.200674643,arXiv,Pakula2006,True,,arXiv,Not available,Quantum gambling using mesoscopic ring qubits,6b266606b14c2ba81ad690b7bbc15511,http://arxiv.org/abs/quant-ph/0610037v2 15211," Most of atoms and molecule found in nature are capable of evolving towards and staying at their ground states, the lowest energy states. This paper offers a global optimization approach to understand the ground state as the equilibrium point of an $n$-player game under cooperation. With the same approach, Nash equilibrium can be viewed as the equilibrium point under competition. The former can offer higher payoffs and stability of game playing than the later. It is truly an inspiration from nature for us to build societies for quality and stability under cooperation rather than competition. ",xiaofei huang,,2010.0,,arXiv,Huang2010,True,,arXiv,Not available,Equilibrium Point in Quantum Physics and its Inspiration to Game Theory,0b03723b38566dab02f896fb68098da9,http://arxiv.org/abs/1004.2210v1 15212," In [Van Benthem 2007] the concept of a public announcement is used to study the effect of the iterated elimination of strictly dominated strategies. We offer a simple generalisation of this approach to cover arbitrary strategic games and many optimality notions. We distinguish between announcements of optimality and announcements of rationality. ",krzysztof apt,,2010.0,,arXiv,Apt2010,True,,arXiv,Not available,Public Announcements in Strategic Games with Arbitrary Strategy Sets,a1e4bfd06fefaa3f9781b8099aa17168,http://arxiv.org/abs/1012.5173v1 15213," In [Van Benthem 2007] the concept of a public announcement is used to study the effect of the iterated elimination of strictly dominated strategies. We offer a simple generalisation of this approach to cover arbitrary strategic games and many optimality notions. We distinguish between announcements of optimality and announcements of rationality. ",jonathan zvesper,,2010.0,,arXiv,Apt2010,True,,arXiv,Not available,Public Announcements in Strategic Games with Arbitrary Strategy Sets,a1e4bfd06fefaa3f9781b8099aa17168,http://arxiv.org/abs/1012.5173v1 15214," We address a central (and classical) issue in the theory of infinite games: the reduction of the memory size that is needed to implement winning strategies in regular infinite games (i.e., controllers that ensure correct behavior against actions of the environment, when the specification is a regular omega-language). We propose an approach which attacks this problem before the construction of a strategy, by first reducing the game graph that is obtained from the specification. For the cases of specifications represented by ""request-response""-requirements and general ""fairness"" conditions, we show that an exponential gain in the size of memory is possible. ",marcus gelderie,,2011.0,10.4204/EPTCS.50.4,"EPTCS 50, 2011, pp. 46-60",Gelderie2011,True,,arXiv,Not available,Memory Reduction via Delayed Simulation,02c969098601b9f9fd0258a1f062f47a,http://arxiv.org/abs/1102.4120v1 15215," We address a central (and classical) issue in the theory of infinite games: the reduction of the memory size that is needed to implement winning strategies in regular infinite games (i.e., controllers that ensure correct behavior against actions of the environment, when the specification is a regular omega-language). We propose an approach which attacks this problem before the construction of a strategy, by first reducing the game graph that is obtained from the specification. For the cases of specifications represented by ""request-response""-requirements and general ""fairness"" conditions, we show that an exponential gain in the size of memory is possible. ",michael holtmann,,2011.0,10.4204/EPTCS.50.4,"EPTCS 50, 2011, pp. 46-60",Gelderie2011,True,,arXiv,Not available,Memory Reduction via Delayed Simulation,02c969098601b9f9fd0258a1f062f47a,http://arxiv.org/abs/1102.4120v1 15216," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",simina branzei,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 15217," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",clara forero,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 15218," Counterfactual Regret Minimization (CFR) is the leading algorithm for solving large imperfect-information games. It iteratively traverses the game tree in order to converge to a Nash equilibrium. In order to deal with extremely large games, CFR typically uses domain-specific heuristics to simplify the target game in a process known as abstraction. This simplified game is solved with tabular CFR, and its solution is mapped back to the full game. This paper introduces Deep Counterfactual Regret Minimization (Deep CFR), a form of CFR that obviates the need for abstraction by instead using deep neural networks to approximate the behavior of CFR in the full game. We show that Deep CFR is principled and achieves strong performance in the benchmark game of heads-up no-limit Texas hold'em poker. This is the first successful use of function approximation in CFR for large games. ",sam gross,,2018.0,,arXiv,Brown2018,True,,arXiv,Not available,Deep Counterfactual Regret Minimization,a723a0d6f05b6ba0ad7767e1ec07a62f,http://arxiv.org/abs/1811.00164v1 15219," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",kate larson,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 15220," Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket, and the players can bid by placing tickets in the basket(s) corresponding to the item(s) they are trying to win. After all the players have placed their tickets, a ticket is drawn at random from each basket and the item is given to the owner of the winning ticket. While a player is never guaranteed to win an item, they can improve their chances of getting it by increasing the number of tickets for that item. In this paper we investigate the existence of pure Nash equilibria in both the continuous and discrete settings. When the players have continuous budgets, we show that a pure Nash equilibrium may not exist for asymmetric games when some valuations are zero. In that case we prove that the auctioneer can stabilize the game by placing his own ticket in each basket. On the other hand, when all the valuations are strictly positive, a pure Nash equilibrium is guaranteed to exist, and the equilibrium strategies are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural and more closely models the version of the auction held in practice. ",peter miltersen,,2012.0,,arXiv,Brânzei2012,True,,arXiv,Not available,Equilibria of Chinese Auctions,1e6675040e4fbeaa2151384f5cba2abe,http://arxiv.org/abs/1208.0296v2 15221," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",mayank manjrekar,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15222," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",vinod ramaswamy,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15223," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",vamseedhar raja,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15224," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",srinivas shakkottai,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15225," In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal is to understand how much data is necessary and sufficient to guarantee near-optimal expected revenue. Our basic model is a single-item auction in which bidders' valuations are drawn independently from unknown and non-identical distributions. The seller is given $m$ samples from each of these distributions ""for free"" and chooses an auction to run on a fresh sample. How large does m need to be, as a function of the number k of bidders and eps > 0, so that a (1 - eps)-approximation of the optimal revenue is achievable? We prove that, under standard tail conditions on the underlying distributions, m = poly(k, 1/eps) samples are necessary and sufficient. Our lower bound stands in contrast to many recent results on simple and prior-independent auctions and fundamentally involves the interplay between bidder competition, non-identical distributions, and a very close (but still constant) approximation of the optimal revenue. It effectively shows that the only way to achieve a sufficiently good constant approximation of the optimal revenue is through a detailed understanding of bidders' valuation distributions. Our upper bound is constructive and applies in particular to a variant of the empirical Myerson auction, the natural auction that runs the revenue-maximizing auction with respect to the empirical distributions of the samples. Our sample complexity lower bound depends on the set of allowable distributions, and to capture this we introduce alpha-strongly regular distributions, which interpolate between the well-studied classes of regular (alpha = 0) and MHR (alpha = 1) distributions. We give evidence that this definition is of independent interest. ",richard cole,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,The Sample Complexity of Revenue Maximization,6636073d85b9e2eb193303a366a2f239,http://arxiv.org/abs/1502.00963v2 15226," In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal is to understand how much data is necessary and sufficient to guarantee near-optimal expected revenue. Our basic model is a single-item auction in which bidders' valuations are drawn independently from unknown and non-identical distributions. The seller is given $m$ samples from each of these distributions ""for free"" and chooses an auction to run on a fresh sample. How large does m need to be, as a function of the number k of bidders and eps > 0, so that a (1 - eps)-approximation of the optimal revenue is achievable? We prove that, under standard tail conditions on the underlying distributions, m = poly(k, 1/eps) samples are necessary and sufficient. Our lower bound stands in contrast to many recent results on simple and prior-independent auctions and fundamentally involves the interplay between bidder competition, non-identical distributions, and a very close (but still constant) approximation of the optimal revenue. It effectively shows that the only way to achieve a sufficiently good constant approximation of the optimal revenue is through a detailed understanding of bidders' valuation distributions. Our upper bound is constructive and applies in particular to a variant of the empirical Myerson auction, the natural auction that runs the revenue-maximizing auction with respect to the empirical distributions of the samples. Our sample complexity lower bound depends on the set of allowable distributions, and to capture this we introduce alpha-strongly regular distributions, which interpolate between the well-studied classes of regular (alpha = 0) and MHR (alpha = 1) distributions. We give evidence that this definition is of independent interest. ",tim roughgarden,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,The Sample Complexity of Revenue Maximization,6636073d85b9e2eb193303a366a2f239,http://arxiv.org/abs/1502.00963v2 15227," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",gregoire jauvion,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15228," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",nicolas grislain,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15229," Two-player, turn-based, stochastic games with reachability conditions are considered, where the maximizer has no information (he is blind) and is restricted to deterministic strategies whereas the minimizer is perfectly informed. We ask the question of whether the game has maxmin 1, in other words we ask whether for all $\epsilon>0$ there exists a deterministic strategy for the (blind) maximizer such that against all the strategies of the minimizer, it is possible to reach the set of final states with probability larger than $1-\epsilon$. This problem is undecidable in general, but we define a class of games, called leaktight half-blind games where the problem becomes decidable. We also show that mixed strategies in general are stronger for both players and that optimal strategies for the minimizer might require infinite-memory. ",edon kelmendi,,2016.0,,arXiv,Kelmendi2016,True,,arXiv,Not available,Deciding Maxmin Reachability in Half-Blind Stochastic Games,168d3dcb54bac2c7e40d224469060ac3,http://arxiv.org/abs/1605.07753v1 15230," Counterfactual Regret Minimization (CFR) is the leading algorithm for solving large imperfect-information games. It iteratively traverses the game tree in order to converge to a Nash equilibrium. In order to deal with extremely large games, CFR typically uses domain-specific heuristics to simplify the target game in a process known as abstraction. This simplified game is solved with tabular CFR, and its solution is mapped back to the full game. This paper introduces Deep Counterfactual Regret Minimization (Deep CFR), a form of CFR that obviates the need for abstraction by instead using deep neural networks to approximate the behavior of CFR in the full game. We show that Deep CFR is principled and achieves strong performance in the benchmark game of heads-up no-limit Texas hold'em poker. This is the first successful use of function approximation in CFR for large games. ",tuomas sandholm,,2018.0,,arXiv,Brown2018,True,,arXiv,Not available,Deep Counterfactual Regret Minimization,a723a0d6f05b6ba0ad7767e1ec07a62f,http://arxiv.org/abs/1811.00164v1 15231," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",pascal dkengne,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15232," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",aurelien garivier,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15233," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",sebastien gerchinovitz,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15234," In the standard formulation of mechanism design, a key assumption is that the designer has reliable information and technology to determine a prior distribution on types of the agents. In the meanwhile, as pointed out by the Wilson's Principle, a mechanism should reply as little as possible on the accuracy of prior type distribution. In this paper, we put forward a model to formalize and quantify this statement. In our model, each agent has a type distribution. In addition, the agent can commit to a fake distribution and bids consistently and credibly with respect to the fake distribution (i.e., plays Bayes equilibrium under the fake distributions). We study the equilibria of the induced distribution-committing games in several well-known mechanisms. Our results can be summarized as follows: (1) the game induced by Myerson's auction under our model is strategically equivalent to the first price auction under the standard model. As a consequence, they are revenue-equivalent as well. (2) the second-price auction yields weakly better revenue than several reserve-based and virtual-value-based auctions, under our fake distribution model. These results echo the recent literature on prior-independent mechanism design. ",pingzhong tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,How to manipulate truthful prior-dependent mechanisms?,585f28ae137d7fb2663881355ead7c4b,http://arxiv.org/abs/1606.02409v2 15235," In the standard formulation of mechanism design, a key assumption is that the designer has reliable information and technology to determine a prior distribution on types of the agents. In the meanwhile, as pointed out by the Wilson's Principle, a mechanism should reply as little as possible on the accuracy of prior type distribution. In this paper, we put forward a model to formalize and quantify this statement. In our model, each agent has a type distribution. In addition, the agent can commit to a fake distribution and bids consistently and credibly with respect to the fake distribution (i.e., plays Bayes equilibrium under the fake distributions). We study the equilibria of the induced distribution-committing games in several well-known mechanisms. Our results can be summarized as follows: (1) the game induced by Myerson's auction under our model is strategically equivalent to the first price auction under the standard model. As a consequence, they are revenue-equivalent as well. (2) the second-price auction yields weakly better revenue than several reserve-based and virtual-value-based auctions, under our fake distribution model. These results echo the recent literature on prior-independent mechanism design. ",yulong zeng,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,How to manipulate truthful prior-dependent mechanisms?,585f28ae137d7fb2663881355ead7c4b,http://arxiv.org/abs/1606.02409v2 15236," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",vincent conitzer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 15237," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",christian kroer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 15238," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",eric sodomka,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 15239," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",nicolas stier-moses,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 15240," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",sudhir singh,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 15241," The numbers game is a one-player game played on a finite simple graph with certain ``amplitudes'' assigned to its edges and with an initial assignment of real numbers to its nodes. The moves of the game successively transform the numbers at the nodes using the amplitudes in a certain way. This game and its interactions with Coxeter/Weyl group theory and Lie theory have been studied by many authors. In particular, Eriksson connects certain geometric representations of Coxeter groups with games on graphs with certain real number amplitudes. Games played on such graphs are ``E-games.'' Here we investigate various finiteness aspects of E-game play: We extend Eriksson's work relating moves of the game to reduced decompositions of elements of a Coxeter group naturally associated to the game graph. We use Stembridge's theory of fully commutative Coxeter group elements to classify what we call here the ``adjacency-free'' initial positions for finite E-games. We characterize when the positive roots for certain geometric representations of finite Coxeter groups can be obtained from E-game play. Finally, we provide a new Dynkin diagram classification result of E-game graphs meeting a certain finiteness requirement. ",robert donnelly,,2007.0,,arXiv,Donnelly2007,True,,arXiv,Not available,Eriksson's numbers game and finite Coxeter groups,0254981265580210426b4256c6bf5d2b,http://arxiv.org/abs/0710.0173v1 15242," We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer. ",vwani roychowdhury,,2008.0,,arXiv,Singh2008,True,,arXiv,Not available,To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?,310967face50e38d3e597c0e155c0162,http://arxiv.org/abs/0802.1957v2 15243," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",ian gemp,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 15244," Algorithmic game theory (AGT) focuses on the design and analysis of algorithms for interacting agents, with interactions rigorously formalized within the framework of games. Results from AGT find applications in domains such as online bidding auctions for web advertisements and network routing protocols. Monotone games are games where agent strategies naturally converge to an equilibrium state. Previous results in AGT have been obtained for convex, socially-convex, or smooth games, but not monotone games. Our primary theoretical contributions are defining the monotone game setting and its extension to the online setting, a new notion of regret for this setting, and accompanying algorithms that achieve sub-linear regret. We demonstrate the utility of online monotone game theory on a variety of problem domains including variational inequalities, reinforcement learning, and generative adversarial networks. ",sridhar mahadevan,,2017.0,,arXiv,Gemp2017,True,,arXiv,Not available,Online Monotone Games,90e47414c01b85a6c15c8f78a864b04f,http://arxiv.org/abs/1710.07328v1 15245," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",bach ha,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 15246," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",jason hartline,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 15247," Under the incentive-compatible Vickrey-Clarke-Groves mechanism, coalitions of participants can influence the auction outcome to obtain higher collective profit. These manipulations were proven to be eliminated if and only if the market objective is supermodular. Nevertheless, several auctions do not satisfy the stringent conditions for supermodularity. These auctions include electricity markets, which are the main motivation of our study. To characterize nonsupermodular functions, we introduce the supermodularity ratio and the weak supermodularity. We show that these concepts provide us with tight bounds on the profitability of collusion and shill bidding. We then derive an analytical lower bound on the supermodularity ratio. Our results are verified with case studies based on the IEEE test systems. ",orcun karaca,,2018.0,,arXiv,Karaca2018,True,,arXiv,Not available,Exploiting Weak Supermodularity for Coalition-Proof Mechanisms,c8770724c2aaca0075643544bc5b4288,http://arxiv.org/abs/1803.11030v1 15248," Under the incentive-compatible Vickrey-Clarke-Groves mechanism, coalitions of participants can influence the auction outcome to obtain higher collective profit. These manipulations were proven to be eliminated if and only if the market objective is supermodular. Nevertheless, several auctions do not satisfy the stringent conditions for supermodularity. These auctions include electricity markets, which are the main motivation of our study. To characterize nonsupermodular functions, we introduce the supermodularity ratio and the weak supermodularity. We show that these concepts provide us with tight bounds on the profitability of collusion and shill bidding. We then derive an analytical lower bound on the supermodularity ratio. Our results are verified with case studies based on the IEEE test systems. ",maryam kamgarpour,,2018.0,,arXiv,Karaca2018,True,,arXiv,Not available,Exploiting Weak Supermodularity for Coalition-Proof Mechanisms,c8770724c2aaca0075643544bc5b4288,http://arxiv.org/abs/1803.11030v1 15249," Two-player games have had a long and fruitful history of applications stretching across the social, biological, and physical sciences. Most applications of two-player games assume synchronous decisions or moves even when the games are iterated. But different strategies may emerge as preferred when the decisions or moves are sequential, or the games are iterated. Zero-determinant strategies developed by Press and Dyson are a new class of strategies that have been developed for synchronous two-player games, most notably the iterated prisoner's dilemma. Here we apply the Press-Dyson analysis to sequential or asynchronous two-player games. We focus on the asynchronous prisoner's dilemma. As a first application of the Press-Dyson analysis of the asynchronous prisoner's dilemma, tit-for-tat is shown to be an efficient defense against extortionate zero-determinant strategies. Nice strategies like tit-for-tat are also shown to lead to Pareto optimal payoffs for both players in repeated prisoner's dilemma. ",robert young,,2017.0,,arXiv,Young2017,True,,arXiv,Not available,"Press-Dyson Analysis of Asynchronous, Sequential Prisoner's Dilemma",08bfe1466d387af467297998ec76f5e5,http://arxiv.org/abs/1712.05048v1 15250," We provide a compositional coalgebraic semantics for strategic games. In our framework, like in the semantics of functional programming languages, coalgebras represent the observable behaviour of systems derived from the behaviour of the parts over an unobservable state space. We use coalgebras to describe and program stage games, finitely and potentially infinitely repeated hierarchical or parallel games with imperfect and incomplete information based on deterministic, non-deterministic or probabilistic decisions of learning agents in possibly endogenous networks. Our framework is compositional in that arbitrarily complex network of games can be composed. The coalgebraic approach allows to represent self-referential or reflexive structures like institutional dynamics, strategic network formation from within the network, belief formation, learning agents or other self-referential phenomena that characterise complex social systems of cognitive agents. And finally our games represent directly runnable code in functional programming languages that can also be analysed by sophisticated verification and logical tools of software engineering. ",achim blumensath,,2017.0,,arXiv,Blumensath2017,True,,arXiv,Not available,A Compositional Coalgebraic Semantics of Strategic Games,d0081419a2e148d8c36799e5fc38fe0f,http://arxiv.org/abs/1712.08381v1 15251," We provide a compositional coalgebraic semantics for strategic games. In our framework, like in the semantics of functional programming languages, coalgebras represent the observable behaviour of systems derived from the behaviour of the parts over an unobservable state space. We use coalgebras to describe and program stage games, finitely and potentially infinitely repeated hierarchical or parallel games with imperfect and incomplete information based on deterministic, non-deterministic or probabilistic decisions of learning agents in possibly endogenous networks. Our framework is compositional in that arbitrarily complex network of games can be composed. The coalgebraic approach allows to represent self-referential or reflexive structures like institutional dynamics, strategic network formation from within the network, belief formation, learning agents or other self-referential phenomena that characterise complex social systems of cognitive agents. And finally our games represent directly runnable code in functional programming languages that can also be analysed by sophisticated verification and logical tools of software engineering. ",viktor winschel,,2017.0,,arXiv,Blumensath2017,True,,arXiv,Not available,A Compositional Coalgebraic Semantics of Strategic Games,d0081419a2e148d8c36799e5fc38fe0f,http://arxiv.org/abs/1712.08381v1 15252," In recent years, RTB(Real Time Bidding) becomes a popular online advertisement trading method. During the auction, each DSP(Demand Side Platform) is supposed to evaluate current opportunity and respond with an ad and corresponding bid price. It's essential for DSP to find an optimal ad selection and bid price determination strategy which maximizes revenue or performance under budget and ROI(Return On Investment) constraints in P4P(Pay For Performance) or P4U(Pay For Usage) mode. We solve this problem by 1) formalizing the DSP problem as a constrained optimization problem, 2) proposing the augmented MMKP(Multi-choice Multi-dimensional Knapsack Problem) with general solution, 3) and demonstrating the DSP problem is a special case of the augmented MMKP and deriving specialized strategy. Our strategy is verified through simulation and outperforms state-of-the-art strategies in real application. To the best of our knowledge, our solution is the first dual based DSP bidding framework that is derived from strict second price auction assumption and generally applicable to the multiple ads scenario with various objectives and constraints. ",huahui liu,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,Dual Based DSP Bidding Strategy and its Application,62c6fcb3dd34b936928b45de26d2f57f,http://arxiv.org/abs/1705.09416v2 15253," The $n$-player Hotelling game calls for each player to choose a point on the line segment, so as to maximize the size of his Voronoi cell. This paper studies fault-tolerant versions of the Hotelling game. Two fault models are studied: line faults and player faults. The first model assumes that the environment is prone to failure: with some probability, a disconnection occurs at a random point on the line, splitting it into two separate segments and modifying each player's Voronoi cell accordingly. A complete characterization of the Nash equilibria of this variant is provided for every $n$. Additionally, a one to one correspondence is shown between equilibria of this variant and of the Hotelling game with no faults. The second fault model assumes the players are prone to failure: each player is removed from the game with i.i.d. probability, changing the payoffs of the remaining players accordingly. It is shown that for $n \geq 3$ this variant of the game has no Nash equilibria. ",chen avin,,2018.0,,arXiv,Avin2018,True,,arXiv,Not available,Fault-Tolerant Hotelling Games,b5c41a66cfdc83c1a6395dc7ba9077d1,http://arxiv.org/abs/1801.04669v1 15254," The $n$-player Hotelling game calls for each player to choose a point on the line segment, so as to maximize the size of his Voronoi cell. This paper studies fault-tolerant versions of the Hotelling game. Two fault models are studied: line faults and player faults. The first model assumes that the environment is prone to failure: with some probability, a disconnection occurs at a random point on the line, splitting it into two separate segments and modifying each player's Voronoi cell accordingly. A complete characterization of the Nash equilibria of this variant is provided for every $n$. Additionally, a one to one correspondence is shown between equilibria of this variant and of the Hotelling game with no faults. The second fault model assumes the players are prone to failure: each player is removed from the game with i.i.d. probability, changing the payoffs of the remaining players accordingly. It is shown that for $n \geq 3$ this variant of the game has no Nash equilibria. ",avi cohen,,2018.0,,arXiv,Avin2018,True,,arXiv,Not available,Fault-Tolerant Hotelling Games,b5c41a66cfdc83c1a6395dc7ba9077d1,http://arxiv.org/abs/1801.04669v1 15255," The $n$-player Hotelling game calls for each player to choose a point on the line segment, so as to maximize the size of his Voronoi cell. This paper studies fault-tolerant versions of the Hotelling game. Two fault models are studied: line faults and player faults. The first model assumes that the environment is prone to failure: with some probability, a disconnection occurs at a random point on the line, splitting it into two separate segments and modifying each player's Voronoi cell accordingly. A complete characterization of the Nash equilibria of this variant is provided for every $n$. Additionally, a one to one correspondence is shown between equilibria of this variant and of the Hotelling game with no faults. The second fault model assumes the players are prone to failure: each player is removed from the game with i.i.d. probability, changing the payoffs of the remaining players accordingly. It is shown that for $n \geq 3$ this variant of the game has no Nash equilibria. ",zvi lotker,,2018.0,,arXiv,Avin2018,True,,arXiv,Not available,Fault-Tolerant Hotelling Games,b5c41a66cfdc83c1a6395dc7ba9077d1,http://arxiv.org/abs/1801.04669v1 15256," The $n$-player Hotelling game calls for each player to choose a point on the line segment, so as to maximize the size of his Voronoi cell. This paper studies fault-tolerant versions of the Hotelling game. Two fault models are studied: line faults and player faults. The first model assumes that the environment is prone to failure: with some probability, a disconnection occurs at a random point on the line, splitting it into two separate segments and modifying each player's Voronoi cell accordingly. A complete characterization of the Nash equilibria of this variant is provided for every $n$. Additionally, a one to one correspondence is shown between equilibria of this variant and of the Hotelling game with no faults. The second fault model assumes the players are prone to failure: each player is removed from the game with i.i.d. probability, changing the payoffs of the remaining players accordingly. It is shown that for $n \geq 3$ this variant of the game has no Nash equilibria. ",david peleg,,2018.0,,arXiv,Avin2018,True,,arXiv,Not available,Fault-Tolerant Hotelling Games,b5c41a66cfdc83c1a6395dc7ba9077d1,http://arxiv.org/abs/1801.04669v1 15257," Smart metering infrastructure allows for two-way communication and power transfer. Based on this promising technology, we propose a demand-side management (DSM) scheme for a residential neighbourhood of prosumers. Its core is a discrete time dynamic game to schedule individually owned home energy storage. The system model includes an advanced battery model, local generation of renewable energy, and forecasting errors for demand and generation. We derive a closed-form solution for the best-response problem of a player and construct an iterative algorithm to solve the game. Empirical analysis shows exponential convergence towards the Nash equilibrium. A comparison to a DSM scheme with a static game, reveals the advantages of the dynamic game approach. We provide an extensive analysis on the influence of the forecasting error on the outcome of the game. A key result demonstrates that our approach is robust even in the worst-case scenario. This grants considerable gains for the utility company organising the DSM scheme and its participants. ",matthias pilz,,2018.0,,arXiv,Pilz2018,True,,arXiv,Not available,"A Dynamic Game Approach for Demand-Side Management: Scheduling Energy Storage with Forecasting Errors",443c640c45c6c5c93ca95c0b369b1491,http://arxiv.org/abs/1802.00355v2 15258," Smart metering infrastructure allows for two-way communication and power transfer. Based on this promising technology, we propose a demand-side management (DSM) scheme for a residential neighbourhood of prosumers. Its core is a discrete time dynamic game to schedule individually owned home energy storage. The system model includes an advanced battery model, local generation of renewable energy, and forecasting errors for demand and generation. We derive a closed-form solution for the best-response problem of a player and construct an iterative algorithm to solve the game. Empirical analysis shows exponential convergence towards the Nash equilibrium. A comparison to a DSM scheme with a static game, reveals the advantages of the dynamic game approach. We provide an extensive analysis on the influence of the forecasting error on the outcome of the game. A key result demonstrates that our approach is robust even in the worst-case scenario. This grants considerable gains for the utility company organising the DSM scheme and its participants. ",luluwah al-fagih,,2018.0,,arXiv,Pilz2018,True,,arXiv,Not available,"A Dynamic Game Approach for Demand-Side Management: Scheduling Energy Storage with Forecasting Errors",443c640c45c6c5c93ca95c0b369b1491,http://arxiv.org/abs/1802.00355v2 15259," In this paper, we introduce a game-theoretical formulation for a specific form of collaborative industrial relations called ""Industrial Symbiotic Relation (ISR) games"" and provide a formal framework to model, verify, and support collaboration decisions in this new class of two-person operational games. ISR games are formalized as cooperative cost-allocation games with the aim to allocate the total ISR-related operational cost to involved industrial firms in a fair and stable manner by taking into account their contribution to the total traditional ISR-related cost. We tailor two types of allocation mechanisms using which firms can implement cost allocations that result in a collaboration that satisfies the fairness and stability properties. Moreover, while industries receive a particular ISR proposal, our introduced methodology is applicable as a managerial decision support to systematically verify the quality of the ISR in question. This is achievable by analyzing if the implemented allocation mechanism is a stable/fair allocation. ",vahid yazdanpanah,,2018.0,,arXiv,Yazdanpanah2018,True,,arXiv,Not available,Industrial Symbiotic Relations as Cooperative Games,3b1a8845ed21b43e2734224b23c84bdf,http://arxiv.org/abs/1802.01167v1 15260," In this paper, we introduce a game-theoretical formulation for a specific form of collaborative industrial relations called ""Industrial Symbiotic Relation (ISR) games"" and provide a formal framework to model, verify, and support collaboration decisions in this new class of two-person operational games. ISR games are formalized as cooperative cost-allocation games with the aim to allocate the total ISR-related operational cost to involved industrial firms in a fair and stable manner by taking into account their contribution to the total traditional ISR-related cost. We tailor two types of allocation mechanisms using which firms can implement cost allocations that result in a collaboration that satisfies the fairness and stability properties. Moreover, while industries receive a particular ISR proposal, our introduced methodology is applicable as a managerial decision support to systematically verify the quality of the ISR in question. This is achievable by analyzing if the implemented allocation mechanism is a stable/fair allocation. ",devrim yazan,,2018.0,,arXiv,Yazdanpanah2018,True,,arXiv,Not available,Industrial Symbiotic Relations as Cooperative Games,3b1a8845ed21b43e2734224b23c84bdf,http://arxiv.org/abs/1802.01167v1 15261," Two-player stochastic games are games with two 2 players and a randomised entity called ""nature"". A natural question to ask in this framework is the existence of strategies that ensure that an event happens with probability 1 (almost-sure strategies). In the case of Markov decision processes, when the event 2 of interest is given as a parity condition, we can replace the ""nature"" by two more players that play according to the rules of what is known as Banach-Mazur game [1]. In this paper we continue this research program by extending the above result to two-player stochastic parity games. As in the paper [1], the basic idea is that, under the correct hypothesis, we can replace the randomised player with two players playing a Banach-Mazur game. This requires a few technical observations, and a non trivial proof, that this paper sets out to do. ",youssouf oualhadj,,2018.0,,arXiv,Oualhadj2018,True,,arXiv,Not available,Banach-Mazur Parity Games and Almost-sure Winning Strategies,9a108d8400b59783c721993eb7afdaaf,http://arxiv.org/abs/1806.10025v1 15262," Two-player stochastic games are games with two 2 players and a randomised entity called ""nature"". A natural question to ask in this framework is the existence of strategies that ensure that an event happens with probability 1 (almost-sure strategies). In the case of Markov decision processes, when the event 2 of interest is given as a parity condition, we can replace the ""nature"" by two more players that play according to the rules of what is known as Banach-Mazur game [1]. In this paper we continue this research program by extending the above result to two-player stochastic parity games. As in the paper [1], the basic idea is that, under the correct hypothesis, we can replace the randomised player with two players playing a Banach-Mazur game. This requires a few technical observations, and a non trivial proof, that this paper sets out to do. ",leo tible,,2018.0,,arXiv,Oualhadj2018,True,,arXiv,Not available,Banach-Mazur Parity Games and Almost-sure Winning Strategies,9a108d8400b59783c721993eb7afdaaf,http://arxiv.org/abs/1806.10025v1 15263," In recent years, RTB(Real Time Bidding) becomes a popular online advertisement trading method. During the auction, each DSP(Demand Side Platform) is supposed to evaluate current opportunity and respond with an ad and corresponding bid price. It's essential for DSP to find an optimal ad selection and bid price determination strategy which maximizes revenue or performance under budget and ROI(Return On Investment) constraints in P4P(Pay For Performance) or P4U(Pay For Usage) mode. We solve this problem by 1) formalizing the DSP problem as a constrained optimization problem, 2) proposing the augmented MMKP(Multi-choice Multi-dimensional Knapsack Problem) with general solution, 3) and demonstrating the DSP problem is a special case of the augmented MMKP and deriving specialized strategy. Our strategy is verified through simulation and outperforms state-of-the-art strategies in real application. To the best of our knowledge, our solution is the first dual based DSP bidding framework that is derived from strict second price auction assumption and generally applicable to the multiple ads scenario with various objectives and constraints. ",mingrui zhu,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,Dual Based DSP Bidding Strategy and its Application,62c6fcb3dd34b936928b45de26d2f57f,http://arxiv.org/abs/1705.09416v2 15264," Two-player stochastic games are games with two 2 players and a randomised entity called ""nature"". A natural question to ask in this framework is the existence of strategies that ensure that an event happens with probability 1 (almost-sure strategies). In the case of Markov decision processes, when the event 2 of interest is given as a parity condition, we can replace the ""nature"" by two more players that play according to the rules of what is known as Banach-Mazur game [1]. In this paper we continue this research program by extending the above result to two-player stochastic parity games. As in the paper [1], the basic idea is that, under the correct hypothesis, we can replace the randomised player with two players playing a Banach-Mazur game. This requires a few technical observations, and a non trivial proof, that this paper sets out to do. ",daniele varacca,,2018.0,,arXiv,Oualhadj2018,True,,arXiv,Not available,Banach-Mazur Parity Games and Almost-sure Winning Strategies,9a108d8400b59783c721993eb7afdaaf,http://arxiv.org/abs/1806.10025v1 15265," In this paper, we compute $\epsilon$-approximate Nash equilibria in atomic splittable polymatroid congestion games with convex Lipschitz continuous cost functions. The main approach relies on computing a pure Nash equilibrium for an associated integrally-splittable congestion game, where players can only split their demand in integral multiples of a common packet size. It is known that one can compute pure Nash equilibria for integrally-splittable congestion games within a running time that is pseudo-polynomial in the aggregated demand of the players. As the main contribution of this paper, we decide for every $\epsilon>0$, a packet size $k_{\epsilon}$ and prove that the associated $k_{\epsilon}$-splittable Nash equilibrium is an $\epsilon$-approximate Nash equilibrium for the original game. We further show that our result applies to multimarket oligopolies with decreasing, concave Lipschitz continuous price functions and quadratic production costs: there is a polynomial time transformation to atomic splittable polymatroid congestion games implying that we can compute $\epsilon$-approximate Cournot-Nash equilibria within pseudo-polynomial time. ",tobias harks,,2018.0,,arXiv,Harks2018,True,,arXiv,Not available,"Computing Equilibria in Atomic Splittable Polymatroid Congestion Games with Convex Costs",2e4143df25de154ec3dd4a9b14915c83,http://arxiv.org/abs/1808.04712v1 15266," In this paper, we compute $\epsilon$-approximate Nash equilibria in atomic splittable polymatroid congestion games with convex Lipschitz continuous cost functions. The main approach relies on computing a pure Nash equilibrium for an associated integrally-splittable congestion game, where players can only split their demand in integral multiples of a common packet size. It is known that one can compute pure Nash equilibria for integrally-splittable congestion games within a running time that is pseudo-polynomial in the aggregated demand of the players. As the main contribution of this paper, we decide for every $\epsilon>0$, a packet size $k_{\epsilon}$ and prove that the associated $k_{\epsilon}$-splittable Nash equilibrium is an $\epsilon$-approximate Nash equilibrium for the original game. We further show that our result applies to multimarket oligopolies with decreasing, concave Lipschitz continuous price functions and quadratic production costs: there is a polynomial time transformation to atomic splittable polymatroid congestion games implying that we can compute $\epsilon$-approximate Cournot-Nash equilibria within pseudo-polynomial time. ",veerle timmermans,,2018.0,,arXiv,Harks2018,True,,arXiv,Not available,"Computing Equilibria in Atomic Splittable Polymatroid Congestion Games with Convex Costs",2e4143df25de154ec3dd4a9b14915c83,http://arxiv.org/abs/1808.04712v1 15267," Synthesis of finite-state controllers from high-level specifications in multi-agent systems can be reduced to solving multi-player concurrent games over finite graphs. The complexity of solving such games with qualitative objectives for agents, such as reaching a target set, is well understood resulting in tools with applications in robotics. In this paper, we introduce quantitative concurrent graph games, where transitions have separate costs for different agents, and each agent attempts to reach its target set while minimizing its own cost along the path. In this model, a solution to the game corresponds to a set of strategies, one per agent, that forms a Nash equilibrium. We study the problem of computing the set of all Pareto-optimal Nash equilibria, and give a comprehensive analysis of its complexity and related problems such as the price of stability and the price of anarchy. In particular, while checking the existence of a Nash equilibrium is NP-complete in general, with multiple parameters contributing to the computational hardness separately, two-player games with bounded costs on individual transitions admit a polynomial-time solution. ",shaull almagor,,2018.0,,arXiv,Almagor2018,True,,arXiv,Not available,Equilibria in Quantitative Concurrent Games,1f3897bf85c5721f8177cde9cc89f4c2,http://arxiv.org/abs/1809.10503v1 15268," Synthesis of finite-state controllers from high-level specifications in multi-agent systems can be reduced to solving multi-player concurrent games over finite graphs. The complexity of solving such games with qualitative objectives for agents, such as reaching a target set, is well understood resulting in tools with applications in robotics. In this paper, we introduce quantitative concurrent graph games, where transitions have separate costs for different agents, and each agent attempts to reach its target set while minimizing its own cost along the path. In this model, a solution to the game corresponds to a set of strategies, one per agent, that forms a Nash equilibrium. We study the problem of computing the set of all Pareto-optimal Nash equilibria, and give a comprehensive analysis of its complexity and related problems such as the price of stability and the price of anarchy. In particular, while checking the existence of a Nash equilibrium is NP-complete in general, with multiple parameters contributing to the computational hardness separately, two-player games with bounded costs on individual transitions admit a polynomial-time solution. ",rajeev alur,,2018.0,,arXiv,Almagor2018,True,,arXiv,Not available,Equilibria in Quantitative Concurrent Games,1f3897bf85c5721f8177cde9cc89f4c2,http://arxiv.org/abs/1809.10503v1 15269," Synthesis of finite-state controllers from high-level specifications in multi-agent systems can be reduced to solving multi-player concurrent games over finite graphs. The complexity of solving such games with qualitative objectives for agents, such as reaching a target set, is well understood resulting in tools with applications in robotics. In this paper, we introduce quantitative concurrent graph games, where transitions have separate costs for different agents, and each agent attempts to reach its target set while minimizing its own cost along the path. In this model, a solution to the game corresponds to a set of strategies, one per agent, that forms a Nash equilibrium. We study the problem of computing the set of all Pareto-optimal Nash equilibria, and give a comprehensive analysis of its complexity and related problems such as the price of stability and the price of anarchy. In particular, while checking the existence of a Nash equilibrium is NP-complete in general, with multiple parameters contributing to the computational hardness separately, two-player games with bounded costs on individual transitions admit a polynomial-time solution. ",suguman bansal,,2018.0,,arXiv,Almagor2018,True,,arXiv,Not available,Equilibria in Quantitative Concurrent Games,1f3897bf85c5721f8177cde9cc89f4c2,http://arxiv.org/abs/1809.10503v1 15270," We develop a macro-model of information retrieval process using Game Theory as a mathematical theory of conflicts. We represent the participants of the Information Retrieval process as a game of two abstract players. The first player is the `intellectual crowd' of users of search engines, the second is a community of information retrieval systems. In order to apply Game Theory, we treat search log data as Nash equilibrium strategies and solve the inverse problem of finding appropriate payoff functions. For that, we suggest a particular model, which we call Alpha model. Within this model, we suggest a method, called shifting, which makes it possible to partially control the behavior of massive users. This Note is addressed to researchers in both game theory (providing a new class of real life problems) and information retrieval, for whom we present new techniques to control the IR environment. ",george parfionov,,2009.0,,arXiv,Parfionov2009,True,,arXiv,Not available,Memento Ludi: Information Retrieval from a Game-Theoretic Perspective,4664d6c5e69d99ca5a1a0c7da7b1bbe6,http://arxiv.org/abs/0905.3356v1 15271," We develop a macro-model of information retrieval process using Game Theory as a mathematical theory of conflicts. We represent the participants of the Information Retrieval process as a game of two abstract players. The first player is the `intellectual crowd' of users of search engines, the second is a community of information retrieval systems. In order to apply Game Theory, we treat search log data as Nash equilibrium strategies and solve the inverse problem of finding appropriate payoff functions. For that, we suggest a particular model, which we call Alpha model. Within this model, we suggest a method, called shifting, which makes it possible to partially control the behavior of massive users. This Note is addressed to researchers in both game theory (providing a new class of real life problems) and information retrieval, for whom we present new techniques to control the IR environment. ",roman zapatrin,,2009.0,,arXiv,Parfionov2009,True,,arXiv,Not available,Memento Ludi: Information Retrieval from a Game-Theoretic Perspective,4664d6c5e69d99ca5a1a0c7da7b1bbe6,http://arxiv.org/abs/0905.3356v1 15272," In this tutorial, the basics of game theory are introduced along with an overview of its most recent and emerging applications in signal processing. One of the main features of this contribution is to gather in a single paper some fundamental game-theoretic notions and tools which, over the past few years, have become widely spread over a large number of papers. In particular, both strategic-form and coalition-form games are described in details while the key connections and differences between them are outlined. Moreover, a particular attention is also devoted to clarify the connections between strategic-form games and distributed optimization and learning algorithms. Beyond an introduction to the basic concepts and main solution approaches, several carefully designed examples are provided to allow a better understanding of how to apply the described tools. ",giacomo bacci,,2015.0,,arXiv,Bacci2015,True,,arXiv,Not available,Game Theory for Signal Processing in Networks,3976eb9796b52af8aae0879da7bae849,http://arxiv.org/abs/1506.00982v3 15273," In this tutorial, the basics of game theory are introduced along with an overview of its most recent and emerging applications in signal processing. One of the main features of this contribution is to gather in a single paper some fundamental game-theoretic notions and tools which, over the past few years, have become widely spread over a large number of papers. In particular, both strategic-form and coalition-form games are described in details while the key connections and differences between them are outlined. Moreover, a particular attention is also devoted to clarify the connections between strategic-form games and distributed optimization and learning algorithms. Beyond an introduction to the basic concepts and main solution approaches, several carefully designed examples are provided to allow a better understanding of how to apply the described tools. ",samson lasaulce,,2015.0,,arXiv,Bacci2015,True,,arXiv,Not available,Game Theory for Signal Processing in Networks,3976eb9796b52af8aae0879da7bae849,http://arxiv.org/abs/1506.00982v3 15274," In recent years, RTB(Real Time Bidding) becomes a popular online advertisement trading method. During the auction, each DSP(Demand Side Platform) is supposed to evaluate current opportunity and respond with an ad and corresponding bid price. It's essential for DSP to find an optimal ad selection and bid price determination strategy which maximizes revenue or performance under budget and ROI(Return On Investment) constraints in P4P(Pay For Performance) or P4U(Pay For Usage) mode. We solve this problem by 1) formalizing the DSP problem as a constrained optimization problem, 2) proposing the augmented MMKP(Multi-choice Multi-dimensional Knapsack Problem) with general solution, 3) and demonstrating the DSP problem is a special case of the augmented MMKP and deriving specialized strategy. Our strategy is verified through simulation and outperforms state-of-the-art strategies in real application. To the best of our knowledge, our solution is the first dual based DSP bidding framework that is derived from strict second price auction assumption and generally applicable to the multiple ads scenario with various objectives and constraints. ",xiaonan meng,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,Dual Based DSP Bidding Strategy and its Application,62c6fcb3dd34b936928b45de26d2f57f,http://arxiv.org/abs/1705.09416v2 15275," In this tutorial, the basics of game theory are introduced along with an overview of its most recent and emerging applications in signal processing. One of the main features of this contribution is to gather in a single paper some fundamental game-theoretic notions and tools which, over the past few years, have become widely spread over a large number of papers. In particular, both strategic-form and coalition-form games are described in details while the key connections and differences between them are outlined. Moreover, a particular attention is also devoted to clarify the connections between strategic-form games and distributed optimization and learning algorithms. Beyond an introduction to the basic concepts and main solution approaches, several carefully designed examples are provided to allow a better understanding of how to apply the described tools. ",walid saad,,2015.0,,arXiv,Bacci2015,True,,arXiv,Not available,Game Theory for Signal Processing in Networks,3976eb9796b52af8aae0879da7bae849,http://arxiv.org/abs/1506.00982v3 15276," In this tutorial, the basics of game theory are introduced along with an overview of its most recent and emerging applications in signal processing. One of the main features of this contribution is to gather in a single paper some fundamental game-theoretic notions and tools which, over the past few years, have become widely spread over a large number of papers. In particular, both strategic-form and coalition-form games are described in details while the key connections and differences between them are outlined. Moreover, a particular attention is also devoted to clarify the connections between strategic-form games and distributed optimization and learning algorithms. Beyond an introduction to the basic concepts and main solution approaches, several carefully designed examples are provided to allow a better understanding of how to apply the described tools. ",luca sanguinetti,,2015.0,,arXiv,Bacci2015,True,,arXiv,Not available,Game Theory for Signal Processing in Networks,3976eb9796b52af8aae0879da7bae849,http://arxiv.org/abs/1506.00982v3 15277," For revenue and welfare maximization in single-dimensional Bayesian settings, Chawla et al. (STOC10) recently showed that sequential posted-price mechanisms (SPMs), though simple in form, can perform surprisingly well compared to the optimal mechanisms. In this paper, we give a theoretical explanation of this fact, based on a connection to the notion of correlation gap. Loosely speaking, for auction environments with matroid constraints, we can relate the performance of a mechanism to the expectation of a monotone submodular function over a random set. This random set corresponds to the winner set for the optimal mechanism, which is highly correlated, and corresponds to certain demand set for SPMs, which is independent. The notion of correlation gap of Agrawal et al.\ (SODA10) quantifies how much we {}""lose"" in the expectation of the function by ignoring correlation in the random set, and hence bounds our loss in using certain SPM instead of the optimal mechanism. Furthermore, the correlation gap of a monotone and submodular function is known to be small, and it follows that certain SPM can approximate the optimal mechanism by a good constant factor. Exploiting this connection, we give tight analysis of a greedy-based SPM of Chawla et al.\ for several environments. In particular, we show that it gives an $e/(e-1)$-approximation for matroid environments, gives asymptotically a $1/(1-1/\sqrt{2\pi k})$-approximation for the important sub-case of $k$-unit auctions, and gives a $(p+1)$-approximation for environments with $p$-independent set system constraints. ",qiqi yan,,2010.0,,arXiv,Yan2010,True,,arXiv,Not available,Mechanism Design via Correlation Gap,a58fa7349a8b14da0946bee88645aff0,http://arxiv.org/abs/1008.1843v2 15278," For Bayesian combinatorial auctions, we present a general framework for approximately reducing the mechanism design problem for multiple buyers to single buyer sub-problems. Our framework can be applied to any setting which roughly satisfies the following assumptions: (i) buyers' types must be distributed independently (not necessarily identically), (ii) objective function must be linearly separable over the buyers, and (iii) except for the supply constraints, there should be no other inter-buyer constraints. Our framework is general in the sense that it makes no explicit assumption about buyers' valuations, type distributions, and single buyer constraints (e.g., budget, incentive compatibility, etc). We present two generic multi buyer mechanisms which use single buyer mechanisms as black boxes; if an $\alpha$-approximate single buyer mechanism can be constructed for each buyer, and if no buyer requires more than $\frac{1}{k}$ of all units of each item, then our generic multi buyer mechanisms are $\gamma_k\alpha$-approximation of the optimal multi buyer mechanism, where $\gamma_k$ is a constant which is at least $1-\frac{1}{\sqrt{k+3}}$. Observe that $\gamma_k$ is at least 1/2 (for $k=1$) and approaches 1 as $k \to \infty$. As a byproduct of our construction, we present a generalization of prophet inequalities. Furthermore, as applications of our framework, we present multi buyer mechanisms with improved approximation factor for several settings from the literature. ",saeed alaei,,2011.0,,arXiv,Alaei2011,True,,arXiv,Not available,"Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers",7550aef5decfb04112daa0b811f87a11,http://arxiv.org/abs/1106.0961v4 15279," We present a new type of monotone submodular functions: \emph{multi-peak submodular functions}. Roughly speaking, given a family of sets $\cF$, we construct a monotone submodular function $f$ with a high value $f(S)$ for every set $S \in {\cF}$ (a ""peak""), and a low value on every set that does not intersect significantly any set in $\cF$. We use this construction to show that a better than $(1-\frac{1}{2e})$-approximation ($\simeq 0.816$) for welfare maximization in combinatorial auctions with submodular valuations is (1) impossible in the communication model, (2) NP-hard in the computational model where valuations are given explicitly. Establishing a constant approximation hardness for this problem in the communication model was a long-standing open question. The valuations we construct for the hardness result in the computational model depend only on a constant number of items, and hence the result holds even if the players can answer arbitrary queries about their valuation, including demand queries. We also study two other related problems that received some attention recently: max-min allocation (for which we also get hardness of $(1-\frac 1 {2e}+\epsilon)$-approximation, in both models), and combinatorial public projects (for which we prove hardness of $(3/4+\epsilon)$-approximation in the communication model, and hardness of $(1 -\frac 1 e+\epsilon)$-approximation in the computational model, using constant size valuations). ",shahar dobzinski,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,"On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations",d7bc87239ff25b2f54ac6328826430bf,http://arxiv.org/abs/1202.2792v1 15280," We present a new type of monotone submodular functions: \emph{multi-peak submodular functions}. Roughly speaking, given a family of sets $\cF$, we construct a monotone submodular function $f$ with a high value $f(S)$ for every set $S \in {\cF}$ (a ""peak""), and a low value on every set that does not intersect significantly any set in $\cF$. We use this construction to show that a better than $(1-\frac{1}{2e})$-approximation ($\simeq 0.816$) for welfare maximization in combinatorial auctions with submodular valuations is (1) impossible in the communication model, (2) NP-hard in the computational model where valuations are given explicitly. Establishing a constant approximation hardness for this problem in the communication model was a long-standing open question. The valuations we construct for the hardness result in the computational model depend only on a constant number of items, and hence the result holds even if the players can answer arbitrary queries about their valuation, including demand queries. We also study two other related problems that received some attention recently: max-min allocation (for which we also get hardness of $(1-\frac 1 {2e}+\epsilon)$-approximation, in both models), and combinatorial public projects (for which we prove hardness of $(3/4+\epsilon)$-approximation in the communication model, and hardness of $(1 -\frac 1 e+\epsilon)$-approximation in the computational model, using constant size valuations). ",jan vondrak,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,"On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations",d7bc87239ff25b2f54ac6328826430bf,http://arxiv.org/abs/1202.2792v1 15285," In recent years, RTB(Real Time Bidding) becomes a popular online advertisement trading method. During the auction, each DSP(Demand Side Platform) is supposed to evaluate current opportunity and respond with an ad and corresponding bid price. It's essential for DSP to find an optimal ad selection and bid price determination strategy which maximizes revenue or performance under budget and ROI(Return On Investment) constraints in P4P(Pay For Performance) or P4U(Pay For Usage) mode. We solve this problem by 1) formalizing the DSP problem as a constrained optimization problem, 2) proposing the augmented MMKP(Multi-choice Multi-dimensional Knapsack Problem) with general solution, 3) and demonstrating the DSP problem is a special case of the augmented MMKP and deriving specialized strategy. Our strategy is verified through simulation and outperforms state-of-the-art strategies in real application. To the best of our knowledge, our solution is the first dual based DSP bidding framework that is derived from strict second price auction assumption and generally applicable to the multiple ads scenario with various objectives and constraints. ",yi hu,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,Dual Based DSP Bidding Strategy and its Application,62c6fcb3dd34b936928b45de26d2f57f,http://arxiv.org/abs/1705.09416v2 15287," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",dimitris fotakis,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 15288," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",piotr krysta,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 15289," Algorithmic Mechanism Design attempts to marry computation and incentives, mainly by leveraging monetary transfers between designer and selfish agents involved. This is principally because in absence of money, very little can be done to enforce truthfulness. However, in certain applications, money is unavailable, morally unacceptable or might simply be at odds with the objective of the mechanism. For example, in Combinatorial Auctions (CAs), the paradigmatic problem of the area, we aim at solutions of maximum social welfare but still charge the society to ensure truthfulness. Additionally, truthfulness of CAs is poorly understood already in the case in which bidders happen to be interested in only two different sets of goods. We focus on the design of incentive-compatible CAs without money in the general setting of $k$-minded bidders. We trade monetary transfers with the observation that the mechanism can detect certain lies of the bidders: i.e., we study truthful CAs with verification and without money. We prove a characterization of truthful mechanisms, which makes an interesting parallel with the well-understood case of CAs with money for single-minded bidders. We then give a host of upper bounds on the approximation ratio obtained by either deterministic or randomized truthful mechanisms when the sets and valuations are private knowledge of the bidders. (Most of these mechanisms run in polynomial time and return solutions with (nearly) best possible approximation guarantees.) We complement these positive results with a number of lower bounds (some of which are essentially tight) that hold in the easier case of public sets. We thus provide an almost complete picture of truthfully approximating CAs in this general setting with multi-dimensional bidders. ",carmine ventre,,2013.0,,arXiv,Fotakis2013,True,,arXiv,Not available,Combinatorial Auctions without Money,836ad259b0149dc83fed98bcefa0e774,http://arxiv.org/abs/1310.0177v1 15290," Among the many challenges of integrating renewable energy sources into the existing power grid, is the challenge of integrating renewable energy generators into the power systems economy. Electricity markets currently are run in a way that participating generators must supply contracted amounts. And yet, renewable energy generators such as wind power generators cannot supply contracted amounts with certainty. Thus, alternative market architectures must be considered where there are aggregator entities who participate in the electricity market by buying power from the renewable energy generators, and assuming risk of any shortfall from contracted amounts. In this paper, we propose auction mechanisms that can be used by the aggregators for procuring stochastic resources, such as wind power. The nature of stochastic resources is different from classical resources in that such a resource is only available stochastically. The distribution of the generation is private information, and the system objective is to truthfully elicit such information. We introduce a variant of the VCG mechanism for this problem. We also propose a non-VCG mechanism with a contracted-payment-plus-penalty payoff structure. We generalize the basic mechanisms in various ways. We then consider the setting where there are two classes of players to demonstrate the difficulty of auction design in such scenarios. We also consider an alternative architecture where the generators need to fulfill any shortfall from the contracted amount by buying from the spot market. ",wenyuan tang,,2012.0,,arXiv,Tang2012,True,,arXiv,Not available,"Mechanism Designs for Stochastic Resources for Renewable Energy Integration",3dfb506432e9b7411439518b15dfdf06,http://arxiv.org/abs/1206.1903v1 15291," Among the many challenges of integrating renewable energy sources into the existing power grid, is the challenge of integrating renewable energy generators into the power systems economy. Electricity markets currently are run in a way that participating generators must supply contracted amounts. And yet, renewable energy generators such as wind power generators cannot supply contracted amounts with certainty. Thus, alternative market architectures must be considered where there are aggregator entities who participate in the electricity market by buying power from the renewable energy generators, and assuming risk of any shortfall from contracted amounts. In this paper, we propose auction mechanisms that can be used by the aggregators for procuring stochastic resources, such as wind power. The nature of stochastic resources is different from classical resources in that such a resource is only available stochastically. The distribution of the generation is private information, and the system objective is to truthfully elicit such information. We introduce a variant of the VCG mechanism for this problem. We also propose a non-VCG mechanism with a contracted-payment-plus-penalty payoff structure. We generalize the basic mechanisms in various ways. We then consider the setting where there are two classes of players to demonstrate the difficulty of auction design in such scenarios. We also consider an alternative architecture where the generators need to fulfill any shortfall from the contracted amount by buying from the spot market. ",rahul jain,,2012.0,,arXiv,Tang2012,True,,arXiv,Not available,"Mechanism Designs for Stochastic Resources for Renewable Energy Integration",3dfb506432e9b7411439518b15dfdf06,http://arxiv.org/abs/1206.1903v1 15292," Traditional studies of combinatorial auctions often only consider linear constraints (by which the demands for certain goods are limited by the corresponding supplies). The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. Yu and Chau [AAMAS 13'] introduced the complex-demand knapsack problem, in which the demands are complex-valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in AC electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known 1/2-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case phi in [0,pi/2-delta], and a truthful FPTAS, which fully optimizes the objective function but violates the capacity constraint by at most (1+epsilon), for the case phi in (pi/2,pi-delta], where phi is the maximum angle between any two complex-valued demands and epsilon,delta>0 are arbitrarily small constants. ",chi-kin chau,,2014.0,,arXiv,Chau2014,True,,arXiv,Not available,Truthful Mechanisms for Combinatorial AC Electric Power Allocation,53aa70576753555d5551c69517485d9f,http://arxiv.org/abs/1403.3907v4 15293," Traditional studies of combinatorial auctions often only consider linear constraints (by which the demands for certain goods are limited by the corresponding supplies). The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. Yu and Chau [AAMAS 13'] introduced the complex-demand knapsack problem, in which the demands are complex-valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in AC electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known 1/2-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case phi in [0,pi/2-delta], and a truthful FPTAS, which fully optimizes the objective function but violates the capacity constraint by at most (1+epsilon), for the case phi in (pi/2,pi-delta], where phi is the maximum angle between any two complex-valued demands and epsilon,delta>0 are arbitrarily small constants. ",khaled elbassioni,,2014.0,,arXiv,Chau2014,True,,arXiv,Not available,Truthful Mechanisms for Combinatorial AC Electric Power Allocation,53aa70576753555d5551c69517485d9f,http://arxiv.org/abs/1403.3907v4 15294," Traditional studies of combinatorial auctions often only consider linear constraints (by which the demands for certain goods are limited by the corresponding supplies). The rise of smart grid presents a new class of auctions, characterized by quadratic constraints. Yu and Chau [AAMAS 13'] introduced the complex-demand knapsack problem, in which the demands are complex-valued and the capacity of supplies is described by the magnitude of total complex-valued demand. This naturally captures the power constraints in AC electric systems. In this paper, we provide a more complete study and generalize the problem to the multi-minded version, beyond the previously known 1/2-approximation algorithm for only a subclass of the problem. More precisely, we give a truthful PTAS for the case phi in [0,pi/2-delta], and a truthful FPTAS, which fully optimizes the objective function but violates the capacity constraint by at most (1+epsilon), for the case phi in (pi/2,pi-delta], where phi is the maximum angle between any two complex-valued demands and epsilon,delta>0 are arbitrarily small constants. ",majid khonji,,2014.0,,arXiv,Chau2014,True,,arXiv,Not available,Truthful Mechanisms for Combinatorial AC Electric Power Allocation,53aa70576753555d5551c69517485d9f,http://arxiv.org/abs/1403.3907v4 15295," Virtualization has been seen as one of the main evolution trends in the forthcoming fifth generation (5G) cellular networks which enables the decoupling of infrastructure from the services it provides. In this case, the roles of infrastructure providers (InPs) and mobile virtual network operators (MVNOs) can be logically separated and the resources (e.g., subchannels, power, and antennas) of a base station owned by an InP can be transparently shared by multiple MVNOs, while each MVNO virtually owns the entire BS. Naturally, the issue of resource allocation arises. In particular, the InP is required to abstract the physical resources into isolated slices for each MVNO who then allocates the resources within the slice to its subscribed users. In this paper, we aim to address this two-level hierarchical resource allocation problem while satisfying the requirements of efficient resource allocation, strict inter-slice isolation, and the ability of intra-slice customization. To this end, we design a hierarchical combinatorial auction mechanism, based on which a truthful and sub-efficient resource allocation framework is provided. Specifically, winner determination problems (WDPs) are formulated for the InP and MVNOs, and computationally tractable algorithms are proposed to solve these WDPs. Also, pricing schemes are designed to ensure incentive compatibility. The designed mechanism can achieve social efficiency in each level even if each party involved acts selfishly. Numerical results show the effectiveness of the proposed scheme. ",kun zhu,,2015.0,,arXiv,Zhu2015,True,,arXiv,Not available,"Virtualization of 5G Cellular Networks as a Hierarchical Combinatorial Auction",ccc273bf99037d30aff4e7f1c3ff132b,http://arxiv.org/abs/1511.08256v1 15296," In recent years, RTB(Real Time Bidding) becomes a popular online advertisement trading method. During the auction, each DSP(Demand Side Platform) is supposed to evaluate current opportunity and respond with an ad and corresponding bid price. It's essential for DSP to find an optimal ad selection and bid price determination strategy which maximizes revenue or performance under budget and ROI(Return On Investment) constraints in P4P(Pay For Performance) or P4U(Pay For Usage) mode. We solve this problem by 1) formalizing the DSP problem as a constrained optimization problem, 2) proposing the augmented MMKP(Multi-choice Multi-dimensional Knapsack Problem) with general solution, 3) and demonstrating the DSP problem is a special case of the augmented MMKP and deriving specialized strategy. Our strategy is verified through simulation and outperforms state-of-the-art strategies in real application. To the best of our knowledge, our solution is the first dual based DSP bidding framework that is derived from strict second price auction assumption and generally applicable to the multiple ads scenario with various objectives and constraints. ",hao wang,,2017.0,,arXiv,Liu2017,True,,arXiv,Not available,Dual Based DSP Bidding Strategy and its Application,62c6fcb3dd34b936928b45de26d2f57f,http://arxiv.org/abs/1705.09416v2 15297," Virtualization has been seen as one of the main evolution trends in the forthcoming fifth generation (5G) cellular networks which enables the decoupling of infrastructure from the services it provides. In this case, the roles of infrastructure providers (InPs) and mobile virtual network operators (MVNOs) can be logically separated and the resources (e.g., subchannels, power, and antennas) of a base station owned by an InP can be transparently shared by multiple MVNOs, while each MVNO virtually owns the entire BS. Naturally, the issue of resource allocation arises. In particular, the InP is required to abstract the physical resources into isolated slices for each MVNO who then allocates the resources within the slice to its subscribed users. In this paper, we aim to address this two-level hierarchical resource allocation problem while satisfying the requirements of efficient resource allocation, strict inter-slice isolation, and the ability of intra-slice customization. To this end, we design a hierarchical combinatorial auction mechanism, based on which a truthful and sub-efficient resource allocation framework is provided. Specifically, winner determination problems (WDPs) are formulated for the InP and MVNOs, and computationally tractable algorithms are proposed to solve these WDPs. Also, pricing schemes are designed to ensure incentive compatibility. The designed mechanism can achieve social efficiency in each level even if each party involved acts selfishly. Numerical results show the effectiveness of the proposed scheme. ",ekram hossain,,2015.0,,arXiv,Zhu2015,True,,arXiv,Not available,"Virtualization of 5G Cellular Networks as a Hierarchical Combinatorial Auction",ccc273bf99037d30aff4e7f1c3ff132b,http://arxiv.org/abs/1511.08256v1 15298," Many algorithms that are originally designed without explicitly considering incentive properties are later combined with simple pricing rules and used as mechanisms. The resulting mechanisms are often natural and simple to understand. But how good are these algorithms as mechanisms? Truthful reporting of valuations is typically not a dominant strategy (certainly not with a pay-your-bid, first-price rule, but it is likely not a good strategy even with a critical value, or second-price style rule either). Our goal is to show that a wide class of approximation algorithms yields this way mechanisms with low Price of Anarchy. The seminal result of Lucier and Borodin [SODA 2010] shows that combining a greedy algorithm that is an $\alpha$-approximation algorithm with a pay-your-bid payment rule yields a mechanism whose Price of Anarchy is $O(\alpha)$. In this paper we significantly extend the class of algorithms for which such a result is available by showing that this close connection between approximation ratio on the one hand and Price of Anarchy on the other also holds for the design principle of relaxation and rounding provided that the relaxation is smooth and the rounding is oblivious. We demonstrate the far-reaching consequences of our result by showing its implications for sparse packing integer programs, such as multi-unit auctions and generalized matching, for the maximum traveling salesman problem, for combinatorial auctions, and for single source unsplittable flow problems. In all these problems our approach leads to novel simple, near-optimal mechanisms whose Price of Anarchy either matches or beats the performance guarantees of known mechanisms. ",paul dutting,,2015.0,,arXiv,Dütting2015,True,,arXiv,Not available,Algorithms as Mechanisms: The Price of Anarchy of Relax-and-Round,391cf610e06070cd699a7c0acbb5f2ba,http://arxiv.org/abs/1511.09208v1 15299," Many algorithms that are originally designed without explicitly considering incentive properties are later combined with simple pricing rules and used as mechanisms. The resulting mechanisms are often natural and simple to understand. But how good are these algorithms as mechanisms? Truthful reporting of valuations is typically not a dominant strategy (certainly not with a pay-your-bid, first-price rule, but it is likely not a good strategy even with a critical value, or second-price style rule either). Our goal is to show that a wide class of approximation algorithms yields this way mechanisms with low Price of Anarchy. The seminal result of Lucier and Borodin [SODA 2010] shows that combining a greedy algorithm that is an $\alpha$-approximation algorithm with a pay-your-bid payment rule yields a mechanism whose Price of Anarchy is $O(\alpha)$. In this paper we significantly extend the class of algorithms for which such a result is available by showing that this close connection between approximation ratio on the one hand and Price of Anarchy on the other also holds for the design principle of relaxation and rounding provided that the relaxation is smooth and the rounding is oblivious. We demonstrate the far-reaching consequences of our result by showing its implications for sparse packing integer programs, such as multi-unit auctions and generalized matching, for the maximum traveling salesman problem, for combinatorial auctions, and for single source unsplittable flow problems. In all these problems our approach leads to novel simple, near-optimal mechanisms whose Price of Anarchy either matches or beats the performance guarantees of known mechanisms. ",thomas kesselheim,,2015.0,,arXiv,Dütting2015,True,,arXiv,Not available,Algorithms as Mechanisms: The Price of Anarchy of Relax-and-Round,391cf610e06070cd699a7c0acbb5f2ba,http://arxiv.org/abs/1511.09208v1 15300," Many algorithms that are originally designed without explicitly considering incentive properties are later combined with simple pricing rules and used as mechanisms. The resulting mechanisms are often natural and simple to understand. But how good are these algorithms as mechanisms? Truthful reporting of valuations is typically not a dominant strategy (certainly not with a pay-your-bid, first-price rule, but it is likely not a good strategy even with a critical value, or second-price style rule either). Our goal is to show that a wide class of approximation algorithms yields this way mechanisms with low Price of Anarchy. The seminal result of Lucier and Borodin [SODA 2010] shows that combining a greedy algorithm that is an $\alpha$-approximation algorithm with a pay-your-bid payment rule yields a mechanism whose Price of Anarchy is $O(\alpha)$. In this paper we significantly extend the class of algorithms for which such a result is available by showing that this close connection between approximation ratio on the one hand and Price of Anarchy on the other also holds for the design principle of relaxation and rounding provided that the relaxation is smooth and the rounding is oblivious. We demonstrate the far-reaching consequences of our result by showing its implications for sparse packing integer programs, such as multi-unit auctions and generalized matching, for the maximum traveling salesman problem, for combinatorial auctions, and for single source unsplittable flow problems. In all these problems our approach leads to novel simple, near-optimal mechanisms whose Price of Anarchy either matches or beats the performance guarantees of known mechanisms. ",eva tardos,,2015.0,,arXiv,Dütting2015,True,,arXiv,Not available,Algorithms as Mechanisms: The Price of Anarchy of Relax-and-Round,391cf610e06070cd699a7c0acbb5f2ba,http://arxiv.org/abs/1511.09208v1 15301," Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns' key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign's ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance. ",weinan zhang,,2016.0,10.1145/2835776.2835843,arXiv,Zhang2016,True,,arXiv,Not available,Feedback Control of Real-Time Display Advertising,d0ec7d36bb79d32141b99621b22880e3,http://arxiv.org/abs/1603.01055v1 15302," Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns' key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign's ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance. ",yifei rong,,2016.0,10.1145/2835776.2835843,arXiv,Zhang2016,True,,arXiv,Not available,Feedback Control of Real-Time Display Advertising,d0ec7d36bb79d32141b99621b22880e3,http://arxiv.org/abs/1603.01055v1 15303," Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns' key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign's ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance. ",jun wang,,2016.0,10.1145/2835776.2835843,arXiv,Zhang2016,True,,arXiv,Not available,Feedback Control of Real-Time Display Advertising,d0ec7d36bb79d32141b99621b22880e3,http://arxiv.org/abs/1603.01055v1 15304," Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns' key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign's ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance. ",tianchi zhu,,2016.0,10.1145/2835776.2835843,arXiv,Zhang2016,True,,arXiv,Not available,Feedback Control of Real-Time Display Advertising,d0ec7d36bb79d32141b99621b22880e3,http://arxiv.org/abs/1603.01055v1 15305," Real-Time Bidding (RTB) is revolutionising display advertising by facilitating per-impression auctions to buy ad impressions as they are being generated. Being able to use impression-level data, such as user cookies, encourages user behaviour targeting, and hence has significantly improved the effectiveness of ad campaigns. However, a fundamental drawback of RTB is its instability because the bid decision is made per impression and there are enormous fluctuations in campaigns' key performance indicators (KPIs). As such, advertisers face great difficulty in controlling their campaign performance against the associated costs. In this paper, we propose a feedback control mechanism for RTB which helps advertisers dynamically adjust the bids to effectively control the KPIs, e.g., the auction winning ratio and the effective cost per click. We further formulate an optimisation framework to show that the proposed feedback control mechanism also has the ability of optimising campaign performance. By settling the effective cost per click at an optimal reference value, the number of campaign's ad clicks can be maximised with the budget constraint. Our empirical study based on real-world data verifies the effectiveness and robustness of our RTB control system in various situations. The proposed feedback control mechanism has also been deployed on a commercial RTB platform and the online test has shown its success in generating controllable advertising performance. ",xiaofan wang,,2016.0,10.1145/2835776.2835843,arXiv,Zhang2016,True,,arXiv,Not available,Feedback Control of Real-Time Display Advertising,d0ec7d36bb79d32141b99621b22880e3,http://arxiv.org/abs/1603.01055v1 15306," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",brendan lucier,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 15307," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",sebastien bubeck,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 15308," We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm. ",allan borodin,,2009.0,,arXiv,Lucier2009,True,,arXiv,Not available,Price of Anarchy for Greedy Auctions,def5707856fe837896222751ea1b7d1a,http://arxiv.org/abs/0909.0892v2 15309," Online auctions are among the most influential e-business applications. Their impact on trading for businesses, as well as consumers, is both remarkable and inevitable. There have been considerable efforts in setting up market places, but, with respects to market volume, online trading is still in its early stages. This chapter discusses the benefits of the concept of Internet marketplaces, with the highest impact on pricing strategies, namely, the conduction of online business auctions. We discuss their benefits, problems and possible solutions. In addition, we sketch actions for suppliers to achieve a better strategic position in the upcoming Internet market places. ",bernhard rumpe,,2014.0,,"Managing E-Commerce and Mobile Computing Technologies IRM Press, 2003",Rumpe2014,True,,arXiv,Not available,E-Business Experiences with Online Auctions,788717a26f25d81a06f4c70a792226ac,http://arxiv.org/abs/1409.6559v1 15310," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",eric bax,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 15311," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",james li,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 15312," In quasi-proportional auctions, the allocation is shared among bidders in proportion to their weighted bids. The auctioneer selects a bid weight function, and bidders know the weight function when they bid. In this note, we analyze how weight functions that are exponential in the bid affect bidder behavior. We show that exponential weight functions have a pure-strategy Nash equilibrium, we characterize bids at an equilibrium, and we compare it to an equilibrium for power weight functions. ",zheng wen,,2015.0,,arXiv,Bax2015,True,,arXiv,Not available,Exponential Weight Functions for Quasi-Proportional Auctions,0b182f42d6578d1ea71d57a6083483e4,http://arxiv.org/abs/1509.01314v1 15313," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",erel segal-halevi,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 15314," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",avinatan hassidim,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 15315," In a seminal paper, McAfee (1992) presented a truthful mechanism for double auctions, attaining asymptotically-optimal gain-from-trade without any prior information on the valuations of the traders. McAfee's mechanism handles single-parametric agents, allowing each seller to sell a single unit and each buyer to buy a single unit. This paper presents a double-auction mechanism that handles multi-parametric agents and allows multiple units per trader, as long as the valuation functions of all traders have decreasing marginal returns. The mechanism is prior-free, ex-post individually-rational, dominant-strategy truthful and strongly-budget-balanced. Its gain-from-trade approaches the optimum when the market size is sufficiently large. ",yonatan aumann,,2017.0,,arXiv,Segal-Halevi2017,True,,arXiv,Not available,MUDA: A Truthful Multi-Unit Double-Auction Mechanism,bc4b470442f52332a983b7cb2833549f,http://arxiv.org/abs/1712.06848v1 15316," Under the incentive-compatible Vickrey-Clarke-Groves mechanism, coalitions of participants can influence the auction outcome to obtain higher collective profit. These manipulations were proven to be eliminated if and only if the market objective is supermodular. Nevertheless, several auctions do not satisfy the stringent conditions for supermodularity. These auctions include electricity markets, which are the main motivation of our study. To characterize nonsupermodular functions, we introduce the supermodularity ratio and the weak supermodularity. We show that these concepts provide us with tight bounds on the profitability of collusion and shill bidding. We then derive an analytical lower bound on the supermodularity ratio. Our results are verified with case studies based on the IEEE test systems. ",orcun karaca,,2018.0,,arXiv,Karaca2018,True,,arXiv,Not available,Exploiting Weak Supermodularity for Coalition-Proof Mechanisms,c8770724c2aaca0075643544bc5b4288,http://arxiv.org/abs/1803.11030v1 15317," Under the incentive-compatible Vickrey-Clarke-Groves mechanism, coalitions of participants can influence the auction outcome to obtain higher collective profit. These manipulations were proven to be eliminated if and only if the market objective is supermodular. Nevertheless, several auctions do not satisfy the stringent conditions for supermodularity. These auctions include electricity markets, which are the main motivation of our study. To characterize nonsupermodular functions, we introduce the supermodularity ratio and the weak supermodularity. We show that these concepts provide us with tight bounds on the profitability of collusion and shill bidding. We then derive an analytical lower bound on the supermodularity ratio. Our results are verified with case studies based on the IEEE test systems. ",maryam kamgarpour,,2018.0,,arXiv,Karaca2018,True,,arXiv,Not available,Exploiting Weak Supermodularity for Coalition-Proof Mechanisms,c8770724c2aaca0075643544bc5b4288,http://arxiv.org/abs/1803.11030v1 15318," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",nikhil devanur,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 15319," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",vasilis syrgkanis,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 15320," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",elie tamer,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 15321," Given a sample of bids from independent auctions, this paper examines the question of inference on auction fundamentals (e.g. valuation distributions, welfare measures) under weak assumptions on information structure. The question is important as it allows us to learn about the valuation distribution in a robust way, i.e., without assuming that a particular information structure holds across observations. We leverage the recent contributions of \cite{Bergemann2013} in the robust mechanism design literature that exploit the link between Bayesian Correlated Equilibria and Bayesian Nash Equilibria in incomplete information games to construct an econometrics framework for learning about auction fundamentals using observed data on bids. We showcase our construction of identified sets in private value and common value auctions. Our approach for constructing these sets inherits the computational simplicity of solving for correlated equilibria: checking whether a particular valuation distribution belongs to the identified set is as simple as determining whether a {\it linear} program is feasible. A similar linear program can be used to construct the identified set on various welfare measures and counterfactual objects. For inference and to summarize statistical uncertainty, we propose novel finite sample methods using tail inequalities that are used to construct confidence regions on sets. We also highlight methods based on Bayesian bootstrap and subsampling. A set of Monte Carlo experiments show adequate finite sample properties of our inference procedures. We illustrate our methods using data from OCS auctions. ",juba ziani,,2017.0,,arXiv,Syrgkanis2017,True,,arXiv,Not available,Inference on Auctions with Weak Assumptions on Information,a1014bfd74231a6010e701bcce0fd4ff,http://arxiv.org/abs/1710.03830v2 15322," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",tim roughgarden,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 15323," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",vasilis syrgkanis,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 15324," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",eva tardos,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 15325," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",avinatan hassidim,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 15326," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",haim kaplan,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 15327," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",yishay mansour,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 15328," We consider a simple simultaneous first price auction for multiple items in a complete information setting. Our goal is to completely characterize the mixed equilibria in this setting, for a simple, yet highly interesting, {\tt AND}-{\tt OR} game, where one agent is single minded and the other is unit demand. ",noam nisan,,2012.0,,arXiv,Hassidim2012,True,,arXiv,Not available,The AND-OR game: Equilibrium Characterization (Working Paper),533b1db755b64546534c803e8ca234e8,http://arxiv.org/abs/1210.1757v1 15329," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",zhiyi huang,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 15330," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",mona rahn,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 15331," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",guido schafer,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 15332," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",shuchi chawla,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 15333," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",jason hartline,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 15334," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",denis nekipelov,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 15335," Consider a setting where selfish agents are to be assigned to coalitions or projects from a fixed set P. Each project k is characterized by a valuation function; v_k(S) is the value generated by a set S of agents working on project k. We study the following classic problem in this setting: ""how should the agents divide the value that they collectively create?"". One traditional approach in cooperative game theory is to study core stability with the implicit assumption that there are infinite copies of one project, and agents can partition themselves into any number of coalitions. In contrast, we consider a model with a finite number of non-identical projects; this makes computing both high-welfare solutions and core payments highly non-trivial. The main contribution of this paper is a black-box mechanism that reduces the problem of computing a near-optimal core stable solution to the purely algorithmic problem of welfare maximization; we apply this to compute an approximately core stable solution that extracts one-fourth of the optimal social welfare for the class of subadditive valuations. We also show much stronger results for several popular sub-classes: anonymous, fractionally subadditive, and submodular valuations, as well as provide new approximation algorithms for welfare maximization with anonymous functions. Finally, we establish a connection between our setting and the well-studied simultaneous auctions with item bidding; we adapt our results to compute approximate pure Nash equilibria for these auctions. ",elliot anshelevich,,2015.0,,arXiv,Anshelevich2015,True,,arXiv,Not available,Computing Stable Coalitions: Approximation Algorithms for Reward Sharing,64026768db396989b534d673da46369f,http://arxiv.org/abs/1508.06781v1 15336," Consider a setting where selfish agents are to be assigned to coalitions or projects from a fixed set P. Each project k is characterized by a valuation function; v_k(S) is the value generated by a set S of agents working on project k. We study the following classic problem in this setting: ""how should the agents divide the value that they collectively create?"". One traditional approach in cooperative game theory is to study core stability with the implicit assumption that there are infinite copies of one project, and agents can partition themselves into any number of coalitions. In contrast, we consider a model with a finite number of non-identical projects; this makes computing both high-welfare solutions and core payments highly non-trivial. The main contribution of this paper is a black-box mechanism that reduces the problem of computing a near-optimal core stable solution to the purely algorithmic problem of welfare maximization; we apply this to compute an approximately core stable solution that extracts one-fourth of the optimal social welfare for the class of subadditive valuations. We also show much stronger results for several popular sub-classes: anonymous, fractionally subadditive, and submodular valuations, as well as provide new approximation algorithms for welfare maximization with anonymous functions. Finally, we establish a connection between our setting and the well-studied simultaneous auctions with item bidding; we adapt our results to compute approximate pure Nash equilibria for these auctions. ",shreyas sekar,,2015.0,,arXiv,Anshelevich2015,True,,arXiv,Not available,Computing Stable Coalitions: Approximation Algorithms for Reward Sharing,64026768db396989b534d673da46369f,http://arxiv.org/abs/1508.06781v1 15337," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",yu cheng,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15338," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",ho cheung,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15339," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",shaddin dughmi,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15340," Two-player, turn-based, stochastic games with reachability conditions are considered, where the maximizer has no information (he is blind) and is restricted to deterministic strategies whereas the minimizer is perfectly informed. We ask the question of whether the game has maxmin 1, in other words we ask whether for all $\epsilon>0$ there exists a deterministic strategy for the (blind) maximizer such that against all the strategies of the minimizer, it is possible to reach the set of final states with probability larger than $1-\epsilon$. This problem is undecidable in general, but we define a class of games, called leaktight half-blind games where the problem becomes decidable. We also show that mixed strategies in general are stronger for both players and that optimal strategies for the minimizer might require infinite-memory. ",hugo gimbert,,2016.0,,arXiv,Kelmendi2016,True,,arXiv,Not available,Deciding Maxmin Reachability in Half-Blind Stochastic Games,168d3dcb54bac2c7e40d224469060ac3,http://arxiv.org/abs/1605.07753v1 15341," We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when comparing to a benchmark that requires a lower bound on the market share. These results are obtained by generalizing the classical learning from experts and multi-armed bandit problems to their multi-scale versions. In this version, the reward of each action is in a different range, and the regret w.r.t. a given action scales with its own range, rather than the maximum range. ",rad niazadeh,,2017.0,,arXiv,Bubeck2017,True,,arXiv,Not available,Multi-scale Online Learning and its Applications to Online Auctions,9669dcf3ee796ff5173721bedd61d1d2,http://arxiv.org/abs/1705.09700v2 15342," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",ehsan emamjomeh-zadeh,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15343," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",li han,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15344," We pose and study a fundamental algorithmic problem which we term mixture selection, arising as a building block in a number of game-theoretic applications: Given a function $g$ from the $n$-dimensional hypercube to the bounded interval $[-1,1]$, and an $n \times m$ matrix $A$ with bounded entries, maximize $g(Ax)$ over $x$ in the $m$-dimensional simplex. This problem arises naturally when one seeks to design a lottery over items for sale in an auction, or craft the posterior beliefs for agents in a Bayesian game through the provision of information (a.k.a. signaling). We present an approximation algorithm for this problem when $g$ simultaneously satisfies two smoothness properties: Lipschitz continuity with respect to the $L^\infty$ norm, and noise stability. The latter notion, which we define and cater to our setting, controls the degree to which low-probability errors in the inputs of $g$ can impact its output. When $g$ is both $O(1)$-Lipschitz continuous and $O(1)$-stable, we obtain an (additive) PTAS for mixture selection. We also show that neither assumption suffices by itself for an additive PTAS, and both assumptions together do not suffice for an additive FPTAS. We apply our algorithm to different game-theoretic applications from mechanism design and optimal signaling. We make progress on a number of open problems suggested in prior work by easily reducing them to mixture selection: we resolve an important special case of the small-menu lottery design problem posed by Dughmi, Han, and Nisan; we resolve the problem of revenue-maximizing signaling in Bayesian second-price auctions posed by Emek et al. and Miltersen and Sheffet; we design a quasipolynomial-time approximation scheme for the optimal signaling problem in normal form games suggested by Dughmi; and we design an approximation algorithm for the optimal signaling problem in the voting model of Alonso and C\^{a}mara. ",shang-hua teng,,2015.0,,arXiv,Cheng2015,True,,arXiv,Not available,"Mixture Selection, Mechanism Design, and Signaling",b150b67fba1348a0d0ceeb67e2f849aa,http://arxiv.org/abs/1508.03679v1 15345," We introduce the notion of Local Computation Mechanism Design - designing game theoretic mechanisms which run in polylogarithmic time and space. Local computation mechanisms reply to each query in polylogarithmic time and space, and the replies to different queries are consistent with the same global feasible solution. In addition, the computation of the payments is also done in polylogarithmic time and space. Furthermore, the mechanisms need to maintain incentive compatibility with respect to the allocation and payments. We present local computation mechanisms for a variety of classical game-theoretical problems: 1. stable matching, 2. job scheduling, 3. combinatorial auctions for unit-demand and k-minded bidders, and 4. the housing allocation problem. For stable matching, some of our techniques may have general implications. Specifically, we show that when the men's preference lists are bounded, we can achieve an arbitrarily good approximation to the stable matching within a fixed number of iterations of the Gale-Shapley algorithm. ",avinatan hassidim,,2013.0,,arXiv,Hassidim2013,True,,arXiv,Not available,Local computation mechanism design,c060b190689acaad44d716cbdf87d62e,http://arxiv.org/abs/1311.3939v2 15346," We introduce the notion of Local Computation Mechanism Design - designing game theoretic mechanisms which run in polylogarithmic time and space. Local computation mechanisms reply to each query in polylogarithmic time and space, and the replies to different queries are consistent with the same global feasible solution. In addition, the computation of the payments is also done in polylogarithmic time and space. Furthermore, the mechanisms need to maintain incentive compatibility with respect to the allocation and payments. We present local computation mechanisms for a variety of classical game-theoretical problems: 1. stable matching, 2. job scheduling, 3. combinatorial auctions for unit-demand and k-minded bidders, and 4. the housing allocation problem. For stable matching, some of our techniques may have general implications. Specifically, we show that when the men's preference lists are bounded, we can achieve an arbitrarily good approximation to the stable matching within a fixed number of iterations of the Gale-Shapley algorithm. ",yishay mansour,,2013.0,,arXiv,Hassidim2013,True,,arXiv,Not available,Local computation mechanism design,c060b190689acaad44d716cbdf87d62e,http://arxiv.org/abs/1311.3939v2 15347," We introduce the notion of Local Computation Mechanism Design - designing game theoretic mechanisms which run in polylogarithmic time and space. Local computation mechanisms reply to each query in polylogarithmic time and space, and the replies to different queries are consistent with the same global feasible solution. In addition, the computation of the payments is also done in polylogarithmic time and space. Furthermore, the mechanisms need to maintain incentive compatibility with respect to the allocation and payments. We present local computation mechanisms for a variety of classical game-theoretical problems: 1. stable matching, 2. job scheduling, 3. combinatorial auctions for unit-demand and k-minded bidders, and 4. the housing allocation problem. For stable matching, some of our techniques may have general implications. Specifically, we show that when the men's preference lists are bounded, we can achieve an arbitrarily good approximation to the stable matching within a fixed number of iterations of the Gale-Shapley algorithm. ",shai vardi,,2013.0,,arXiv,Hassidim2013,True,,arXiv,Not available,Local computation mechanism design,c060b190689acaad44d716cbdf87d62e,http://arxiv.org/abs/1311.3939v2 15348," Selfish behaviors are common in self-organized Mobile Ad hoc Networks (MANETs) where nodes belong to different authorities. Since cooperation of nodes is essential for routing protocols, various methods have been proposed to stimulate cooperation among selfish nodes. In order to provide sufficient incentives, most of these methods pay nodes a premium over their actual costs of participation. However, they lead to considerably large overpayments. Moreover, existing methods ignore mobility of nodes, for simplicity. However, owing to the mobile nature of MANETs, this assumption seems unrealistic. In this paper, we propose an optimal game theoretical framework to ensure the proper cooperation in mobility aware routing for MANETs. The proposed method is based on the multi-dimensional optimal auctions which allows us to consider path durations, in addition to the route costs. Path duration is a metric that best reflects changes in topology caused by mobility of nodes and, it is widely used in mobility aware routing protocols. Furthermore, the proposed mechanism is optimal in that it minimizes the total expected payments. We provide theoretical analysis to support our claims. In addition, simulation results show significant improvements in terms of payments compared to the most popular existing methods. ",mehrdad khaledi,,2014.0,,arXiv,Khaledi2014,True,,arXiv,Not available,"An Optimal Game Theoretical Framework for Mobility Aware Routing in Mobile Ad hoc Networks",43d871ff8b7b72b5804312c1c813a000,http://arxiv.org/abs/1407.7464v1 15349," Selfish behaviors are common in self-organized Mobile Ad hoc Networks (MANETs) where nodes belong to different authorities. Since cooperation of nodes is essential for routing protocols, various methods have been proposed to stimulate cooperation among selfish nodes. In order to provide sufficient incentives, most of these methods pay nodes a premium over their actual costs of participation. However, they lead to considerably large overpayments. Moreover, existing methods ignore mobility of nodes, for simplicity. However, owing to the mobile nature of MANETs, this assumption seems unrealistic. In this paper, we propose an optimal game theoretical framework to ensure the proper cooperation in mobility aware routing for MANETs. The proposed method is based on the multi-dimensional optimal auctions which allows us to consider path durations, in addition to the route costs. Path duration is a metric that best reflects changes in topology caused by mobility of nodes and, it is widely used in mobility aware routing protocols. Furthermore, the proposed mechanism is optimal in that it minimizes the total expected payments. We provide theoretical analysis to support our claims. In addition, simulation results show significant improvements in terms of payments compared to the most popular existing methods. ",mojgan khaledi,,2014.0,,arXiv,Khaledi2014,True,,arXiv,Not available,"An Optimal Game Theoretical Framework for Mobility Aware Routing in Mobile Ad hoc Networks",43d871ff8b7b72b5804312c1c813a000,http://arxiv.org/abs/1407.7464v1 15350," Selfish behaviors are common in self-organized Mobile Ad hoc Networks (MANETs) where nodes belong to different authorities. Since cooperation of nodes is essential for routing protocols, various methods have been proposed to stimulate cooperation among selfish nodes. In order to provide sufficient incentives, most of these methods pay nodes a premium over their actual costs of participation. However, they lead to considerably large overpayments. Moreover, existing methods ignore mobility of nodes, for simplicity. However, owing to the mobile nature of MANETs, this assumption seems unrealistic. In this paper, we propose an optimal game theoretical framework to ensure the proper cooperation in mobility aware routing for MANETs. The proposed method is based on the multi-dimensional optimal auctions which allows us to consider path durations, in addition to the route costs. Path duration is a metric that best reflects changes in topology caused by mobility of nodes and, it is widely used in mobility aware routing protocols. Furthermore, the proposed mechanism is optimal in that it minimizes the total expected payments. We provide theoretical analysis to support our claims. In addition, simulation results show significant improvements in terms of payments compared to the most popular existing methods. ",hamidreza rabiee,,2014.0,,arXiv,Khaledi2014,True,,arXiv,Not available,"An Optimal Game Theoretical Framework for Mobility Aware Routing in Mobile Ad hoc Networks",43d871ff8b7b72b5804312c1c813a000,http://arxiv.org/abs/1407.7464v1 15351," We study the distribution of strategies in a large game that models how agents choose among different double auction markets. We classify the possible mean field Nash equilibria, which include potentially segregated states where an agent population can split into subpopulations adopting different strategies. As the game is aggregative, the actual equilibrium strategy distributions remain undetermined, however. We therefore compare with the results of Experience-Weighted Attraction (EWA) learning, which at long times leads to Nash equilibria in the appropriate limits of large intensity of choice, low noise (long agent memory) and perfect imputation of missing scores (fictitious play). The learning dynamics breaks the indeterminacy of the Nash equilibria. Non-trivially, depending on how the relevant limits are taken, more than one type of equilibrium can be selected. These include the standard homogeneous mixed and heterogeneous pure states, but also \emph{heterogeneous mixed} states where different agents play different strategies that are not all pure. The analysis of the EWA learning involves Fokker-Planck modeling combined with large deviation methods. The theoretical results are confirmed by multi-agent simulations. ",robin nicole,,2017.0,10.1371/journal.pone.0196577,arXiv,Nicole2017,True,,arXiv,Not available,"Dynamical selection of Nash equilibria using Experience Weighted Attraction Learning: emergence of heterogeneous mixed equilibria",39e2ee83bd5661bcbcb797cfa8d06716,http://arxiv.org/abs/1706.09763v1 15352," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",vikash singh,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15353," We study the distribution of strategies in a large game that models how agents choose among different double auction markets. We classify the possible mean field Nash equilibria, which include potentially segregated states where an agent population can split into subpopulations adopting different strategies. As the game is aggregative, the actual equilibrium strategy distributions remain undetermined, however. We therefore compare with the results of Experience-Weighted Attraction (EWA) learning, which at long times leads to Nash equilibria in the appropriate limits of large intensity of choice, low noise (long agent memory) and perfect imputation of missing scores (fictitious play). The learning dynamics breaks the indeterminacy of the Nash equilibria. Non-trivially, depending on how the relevant limits are taken, more than one type of equilibrium can be selected. These include the standard homogeneous mixed and heterogeneous pure states, but also \emph{heterogeneous mixed} states where different agents play different strategies that are not all pure. The analysis of the EWA learning involves Fokker-Planck modeling combined with large deviation methods. The theoretical results are confirmed by multi-agent simulations. ",peter sollich,,2017.0,10.1371/journal.pone.0196577,arXiv,Nicole2017,True,,arXiv,Not available,"Dynamical selection of Nash equilibria using Experience Weighted Attraction Learning: emergence of heterogeneous mixed equilibria",39e2ee83bd5661bcbcb797cfa8d06716,http://arxiv.org/abs/1706.09763v1 15354," In a combinatorial auction with item bidding, agents participate in multiple single-item second-price auctions at once. As some items might be substitutes, agents need to strategize in order to maximize their utilities. A number of results indicate that high welfare can be achieved this way, giving bounds on the welfare at equilibrium. Recently, however, criticism has been raised that equilibria are hard to compute and therefore unlikely to be attained. In this paper, we take a different perspective. We study simple best-response dynamics. That is, agents are activated one after the other and each activated agent updates his strategy myopically to a best response against the other agents' current strategies. Often these dynamics may take exponentially long before they converge or they may not converge at all. However, as we show, convergence is not even necessary for good welfare guarantees. Given that agents' bid updates are aggressive enough but not too aggressive, the game will remain in states of good welfare after each agent has updated his bid at least once. In more detail, we show that if agents have fractionally subadditive valuations, natural dynamics reach and remain in a state that provides a $1/3$ approximation to the optimal welfare after each agent has updated his bid at least once. For subadditive valuations, we can guarantee an $\Omega(1/\log m)$ approximation in case of $m$ items that applies after each agent has updated his bid at least once and at any point after that. The latter bound is complemented by a negative result, showing that no kind of best-response dynamics can guarantee more than an $o(\log \log m/\log m)$ fraction of the optimal social welfare. ",paul dutting,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Best-Response Dynamics in Combinatorial Auctions with Item Bidding,b212d14063aab71ccc19013f6cae3c28,http://arxiv.org/abs/1607.04149v2 15355," In a combinatorial auction with item bidding, agents participate in multiple single-item second-price auctions at once. As some items might be substitutes, agents need to strategize in order to maximize their utilities. A number of results indicate that high welfare can be achieved this way, giving bounds on the welfare at equilibrium. Recently, however, criticism has been raised that equilibria are hard to compute and therefore unlikely to be attained. In this paper, we take a different perspective. We study simple best-response dynamics. That is, agents are activated one after the other and each activated agent updates his strategy myopically to a best response against the other agents' current strategies. Often these dynamics may take exponentially long before they converge or they may not converge at all. However, as we show, convergence is not even necessary for good welfare guarantees. Given that agents' bid updates are aggressive enough but not too aggressive, the game will remain in states of good welfare after each agent has updated his bid at least once. In more detail, we show that if agents have fractionally subadditive valuations, natural dynamics reach and remain in a state that provides a $1/3$ approximation to the optimal welfare after each agent has updated his bid at least once. For subadditive valuations, we can guarantee an $\Omega(1/\log m)$ approximation in case of $m$ items that applies after each agent has updated his bid at least once and at any point after that. The latter bound is complemented by a negative result, showing that no kind of best-response dynamics can guarantee more than an $o(\log \log m/\log m)$ fraction of the optimal social welfare. ",thomas kesselheim,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Best-Response Dynamics in Combinatorial Auctions with Item Bidding,b212d14063aab71ccc19013f6cae3c28,http://arxiv.org/abs/1607.04149v2 15356," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",jianwei huang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 15357," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",zhu han,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 15358," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",mung chiang,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 15359," Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation. ",h. poor,,2007.0,10.1109/GLOCOM.2007.912,arXiv,Huang2007,True,,arXiv,Not available,"Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks",31dce1b42774e56729c87360366ad7f5,http://arxiv.org/abs/0708.0648v1 15360," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",wayes tushar,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15361," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",bo chai,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15362," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",chau yuen,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15363," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",sajal mukhopadhyay,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15364," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",shisheng huang,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15365," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",david smith,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15366," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",h. poor,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15367," This paper studies the solution of joint energy storage (ES) ownership sharing between multiple shared facility controllers (SFCs) and those dwelling in a residential community. The main objective is to enable the residential units (RUs) to decide on the fraction of their ES capacity that they want to share with the SFCs of the community in order to assist them storing electricity, e.g., for fulfilling the demand of various shared facilities. To this end, a modified auction-based mechanism is designed that captures the interaction between the SFCs and the RUs so as to determine the auction price and the allocation of ES shared by the RUs that governs the proposed joint ES ownership. The fraction of the capacity of the storage that each RU decides to put into the market to share with the SFCs and the auction price are determined by a noncooperative Stackelberg game formulated between the RUs and the auctioneer. It is shown that the proposed auction possesses the incentive compatibility and the individual rationality properties, which are leveraged via the unique Stackelberg equilibrium (SE) solution of the game. Numerical experiments are provided to confirm the effectiveness of the proposed scheme. ",zaiyue yang,,2015.0,,arXiv,Tushar2015,True,,arXiv,Not available,Energy Storage Sharing in Smart Grid: A Modified Auction Based Approach,0a75b42ca766c0ec0146ceb09cb0a86a,http://arxiv.org/abs/1512.07700v1 15368," This paper reconsiders the problem of the absent-minded driver who must choose between alternatives with different payoff with imperfect recall and varying degrees of knowledge of the system. The classical absent-minded driver problem represents the case with limited information and it has bearing on the general area of communication and learning, social choice, mechanism design, auctions, theories of knowledge, belief, and rational agency. Within the framework of extensive games, this problem has applications to many artificial intelligence scenarios. It is obvious that the performance of the agent improves as information available increases. It is shown that a non-uniform assignment strategy for successive choices does better than a fixed probability strategy. We consider both classical and quantum approaches to the problem. We argue that the superior performance of quantum decisions with access to entanglement cannot be fairly compared to a classical algorithm. If the cognitive systems of agents are taken to have access to quantum resources, or have a quantum mechanical basis, then that can be leveraged into superior performance. ",subhash kak,,2017.0,,arXiv,Kak2017,True,,arXiv,Not available,The Absent-Minded Driver Problem Redux,ea81f92c80e0855fb5dbd4f83679a897,http://arxiv.org/abs/1702.05778v1 15369," In this paper, we propose a general method for testing inequality restrictions on nonparametric functions. Our framework includes many nonparametric testing problems in a unified framework, with a number of possible applications in auction models, game theoretic models, wage inequality, and revealed preferences. Our test involves a one-sided version of $L_{p}$ functionals of kernel-type estimators $(1\leq p <\infty )$ and is easy to implement in general, mainly due to its recourse to the bootstrap method. The bootstrap procedure is based on nonparametric bootstrap applied to kernel-based test statistics, with estimated ""contact sets."" We provide regularity conditions under which the bootstrap test is asymptotically valid uniformly over a large class of distributions, including the cases that the limiting distribution of the test statistic is degenerate. Our bootstrap test is shown to exhibit good power properties in Monte Carlo experiments, and we provide a general form of the local power function. As an illustration, we consider testing implications from auction theory, provide primitive conditions for our test, and demonstrate its usefulness by applying our test to real data. We supplement this example with the second empirical illustration in the context of wage inequality. ",sokbae lee,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,Testing for a General Class of Functional Inequalities,ba4de259bbd5aabe29d97a30e364552c,http://arxiv.org/abs/1311.1595v4 15370," In this paper, we propose a general method for testing inequality restrictions on nonparametric functions. Our framework includes many nonparametric testing problems in a unified framework, with a number of possible applications in auction models, game theoretic models, wage inequality, and revealed preferences. Our test involves a one-sided version of $L_{p}$ functionals of kernel-type estimators $(1\leq p <\infty )$ and is easy to implement in general, mainly due to its recourse to the bootstrap method. The bootstrap procedure is based on nonparametric bootstrap applied to kernel-based test statistics, with estimated ""contact sets."" We provide regularity conditions under which the bootstrap test is asymptotically valid uniformly over a large class of distributions, including the cases that the limiting distribution of the test statistic is degenerate. Our bootstrap test is shown to exhibit good power properties in Monte Carlo experiments, and we provide a general form of the local power function. As an illustration, we consider testing implications from auction theory, provide primitive conditions for our test, and demonstrate its usefulness by applying our test to real data. We supplement this example with the second empirical illustration in the context of wage inequality. ",kyungchul song,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,Testing for a General Class of Functional Inequalities,ba4de259bbd5aabe29d97a30e364552c,http://arxiv.org/abs/1311.1595v4 15371," In this paper, we propose a general method for testing inequality restrictions on nonparametric functions. Our framework includes many nonparametric testing problems in a unified framework, with a number of possible applications in auction models, game theoretic models, wage inequality, and revealed preferences. Our test involves a one-sided version of $L_{p}$ functionals of kernel-type estimators $(1\leq p <\infty )$ and is easy to implement in general, mainly due to its recourse to the bootstrap method. The bootstrap procedure is based on nonparametric bootstrap applied to kernel-based test statistics, with estimated ""contact sets."" We provide regularity conditions under which the bootstrap test is asymptotically valid uniformly over a large class of distributions, including the cases that the limiting distribution of the test statistic is degenerate. Our bootstrap test is shown to exhibit good power properties in Monte Carlo experiments, and we provide a general form of the local power function. As an illustration, we consider testing implications from auction theory, provide primitive conditions for our test, and demonstrate its usefulness by applying our test to real data. We supplement this example with the second empirical illustration in the context of wage inequality. ",yoon-jae whang,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,Testing for a General Class of Functional Inequalities,ba4de259bbd5aabe29d97a30e364552c,http://arxiv.org/abs/1311.1595v4 15372," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",honggang zhang,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 15373," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",benyuan liu,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 15374," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",fatos xhafa,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15375," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",hengky susanto,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 15376," We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces. ",guoliang xue,,2015.0,,arXiv,Zhang2015,True,,arXiv,Not available,"Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service",95afa8d750cd3bb0cb33750890e7e632,http://arxiv.org/abs/1503.06819v1 15377," Very few exact solutions are known for the monopolist's $k$-item $n$-buyer maximum revenue problem with additive valuation in which $k, n >1$ and the buyers $i$ have independent private distributions $F^j_i$ on items $j$. In this paper we derive exact formulas for the maximum revenue when $k=2$ and $F^j_i$ are any IID distributions on support of size 2, for both the dominant-strategy (DIC) and the Bayesian (BIC) implementations. The formulas lead to the simple characterization that, the two implementations have identical maximum revenue if and only if selling-separately is optimal for the distribution. Our results also give the first demonstration, in this setting, of revenue gaps between the two implementations. For instance, if $k=n=2$ and $Pr\{X_F=1\}=Pr\{X_F=2\}=\frac{1}{2}$, then the maximum revenue in the Bayesian implementation exceeds that in the dominant-strategy by exactly $2\%$; the same gap exists for the continuous uniform distribution $X_F$ over $[a, a+1]\cup[2a, 2a+1]$ for all large $a$. ",andrew yao,,2016.0,,arXiv,Yao2016,True,,arXiv,Not available,"On Solutions for the Maximum Revenue Multi-item Auction under Dominant-Strategy and Bayesian Implementations",46451b5ec34ae75977e7152d35093a4e,http://arxiv.org/abs/1607.03685v1 15378," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",reihaneh hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 15379," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",ali movaghar,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 15380," In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich and the poor participants. This paper proposes a multi-dimensional fairness combinatorial double auction (MDFCDA) model which strikes a balance between the revenue and the fairness among participants. We solve a winner determination problem (WDP) through integer programming which incorporates the fairness attribute based on the history of participants which is stored in a repository. Our evaluation results show that the proposed model increases the willingness of participants to take part in the next auction rounds. Moreover, the average percentage of resource utilization is increased. ",hamid hassanzadeh,,2016.0,,arXiv,Hassanzadeh2016,True,,arXiv,Not available,"A Multi-Dimensional Fairness Combinatorial Double-Sided Auction Model in Cloud Environment",2d03989c0abb1f624d6ed5f9ea291686,http://arxiv.org/abs/1608.05315v2 15381," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",sevi baltaoglu,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 15382," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",lang tong,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 15383," We study the online learning problem of a bidder who participates in repeated auctions. With the goal of maximizing his T-period payoff, the bidder determines the optimal allocation of his budget among his bids for $K$ goods at each period. As a bidding strategy, we propose a polynomial-time algorithm, inspired by the dynamic programming approach to the knapsack problem. The proposed algorithm, referred to as dynamic programming on discrete set (DPDS), achieves a regret order of $O(\sqrt{T\log{T}})$. By showing that the regret is lower bounded by $\Omega(\sqrt{T})$ for any strategy, we conclude that DPDS is order optimal up to a $\sqrt{\log{T}}$ term. We evaluate the performance of DPDS empirically in the context of virtual trading in wholesale electricity markets by using historical data from the New York market. Empirical results show that DPDS consistently outperforms benchmark heuristic methods that are derived from machine learning and online learning approaches. ",qing zhao,,2017.0,,arXiv,Baltaoglu2017,True,,arXiv,Not available,"Online Learning of Optimal Bidding Strategy in Repeated Multi-Commodity Auctions",640bbd31233e7294b2c6fcaa31519976,http://arxiv.org/abs/1703.02567v5 15384," The question of the minimum menu-size for approximate (i.e., up-to-$\varepsilon$) Bayesian revenue maximization when selling two goods to an additive risk-neutral quasilinear buyer was introduced by Hart and Nisan (2013), who give an upper bound of $O(\frac{1}{\varepsilon^4})$ for this problem. Using the optimal-transport duality framework of Daskalakis et al. (2013, 2015), we derive the first lower bound for this problem - of $\Omega(\frac{1}{\sqrt[4]{\varepsilon}})$, even when the values for the two goods are drawn i.i.d. from ""nice"" distributions, establishing how to reason about approximately optimal mechanisms via this duality framework. This bound implies, for any fixed number of goods, a tight bound of $\Theta(\log\frac{1}{\varepsilon})$ on the minimum deterministic communication complexity guaranteed to suffice for running some approximately revenue-maximizing mechanism, thereby completely resolving this problem. As a secondary result, we show that under standard economic assumptions on distributions, the above upper bound of Hart and Nisan (2013) can be strengthened to $O(\frac{1}{\varepsilon^2})$. ",yannai gonczarowski,,2017.0,,arXiv,Gonczarowski2017,True,,arXiv,Not available,"Bounding the Menu-Size of Approximately Optimal Auctions via Optimal-Transport Duality",e3f58022422ecfc2a296e38decdc183f,http://arxiv.org/abs/1708.08907v4 15385," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",lin ma,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 15386," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",yutao jiao,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 15387," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",ping wang,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 15388," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",dusit niyato,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 15389," Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider. ",zehui xiong,,2017.0,,arXiv,Jiao2017,True,,arXiv,Not available,"Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain",9d2af6e8d84d2894a1a9edd291e72f6a,http://arxiv.org/abs/1710.10595v2 15390," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",vikash singh,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15391," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",sajal mukhopadhyay,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15392," During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients. ",fatos xhafa,,2018.0,,arXiv,Singh2018,True,,arXiv,Not available,"Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare",5c14531e5beac0c6c9badd0bc8ee00e9,http://arxiv.org/abs/1801.04544v1 15393," An online auction waterfall for an ad impression may contain auctions that are unlikely to result in a winning bid. Instead of always running through the full auction sequence, one could reduce the transaction cost by predicting and skipping these auctions. In this paper, we derive the auction abort rule that maximizes the net income of the waterfall under certain conditions, knowing only the publisher tag of the current auction and the ad request context. The net income is defined as the payoff (revenue) minus the transaction cost. We translate the abort rule into a purity measure and propose a corresponding split criterion for a decision tree. Training and testing on randomly sampled data indicate that the abort decision tree performs better than the full waterfall and the abort rule that makes use of only the publisher tag feature. When the transaction cost is higher, the cost saving, and thus net income gain, is higher for either abort decision rule. ",michael ting,,2018.0,,arXiv,Ting2018,True,,arXiv,Not available,"Maximizing net income of the auction waterfall with an abort decision tree",e3c2079403b60b2f84e29c4402faba64,http://arxiv.org/abs/1809.01245v1 15394," An online auction waterfall for an ad impression may contain auctions that are unlikely to result in a winning bid. Instead of always running through the full auction sequence, one could reduce the transaction cost by predicting and skipping these auctions. In this paper, we derive the auction abort rule that maximizes the net income of the waterfall under certain conditions, knowing only the publisher tag of the current auction and the ad request context. The net income is defined as the payoff (revenue) minus the transaction cost. We translate the abort rule into a purity measure and propose a corresponding split criterion for a decision tree. Training and testing on randomly sampled data indicate that the abort decision tree performs better than the full waterfall and the abort rule that makes use of only the publisher tag feature. When the transaction cost is higher, the cost saving, and thus net income gain, is higher for either abort decision rule. ",nicolas grislain,,2018.0,,arXiv,Ting2018,True,,arXiv,Not available,"Maximizing net income of the auction waterfall with an abort decision tree",e3c2079403b60b2f84e29c4402faba64,http://arxiv.org/abs/1809.01245v1 15395," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",dimitris fotakis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 15396," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",ruiting zhou,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 15397," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",kyriakos lotidis,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 15398," We study incentive compatible mechanisms for Combinatorial Auctions where the bidders have submodular (or XOS) valuations and are budget-constrained. Our objective is to maximize the \emph{Liquid Welfare}, a notion of efficiency for budget-constrained bidders introduced by Dobzinski and Leme (2014). We show that some of the best known truthful mechanisms that approximate the Social Welfare for Combinatorial Auctions with submodular bidders through demand query oracles can be adapted so that they retain truthfulness and achieve asymptotically the same approximation guarantees for the Liquid Welfare. More specifically, for the problem of optimizing the Liquid Welfare in Combinatorial Auctions with submodular bidders, we obtain a universally truthful randomized $O(\log m)$-approximate mechanism, where $m$ is the number of items, by adapting the mechanism of Krysta and V\""ocking (2012). Additionally, motivated by large market assumptions often used in mechanism design, we introduce a notion of competitive markets and show that in such markets, Liquid Welfare can be approximated within a constant factor by a randomized universally truthful mechanism. Finally, in the Bayesian setting, we obtain a truthful $O(1)$-approximate mechanism for the case where bidder valuations are generated as independent samples from a known distribution, by adapting the results of Feldman et al. (2014). ",chara podimata,,2018.0,,arXiv,Fotakis2018,True,,arXiv,Not available,"A Bridge between Liquid and Social Welfare in Combinatorial Auctions with Submodular Bidders",051162ff0c481c4bc965ac5d8827bf1b,http://arxiv.org/abs/1809.01803v1 15399," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",v. nadendla,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 15400," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",swastik brahma,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 15401," In this paper, we propose a novel sealed-bid auction framework to address the problem of dynamic spectrum allocation in cognitive radio (CR) networks. We design an optimal auction mechanism that maximizes the moderator's expected utility, when the spectrum is not available with certainty. We assume that the moderator employs collaborative spectrum sensing in order to make a reliable inference about spectrum availability. Due to the presence of a collision cost whenever the moderator makes an erroneous inference, and a sensing cost at each CR, we investigate feasibility conditions that guarantee a non-negative utility at the moderator. We present tight theoretical-bounds on instantaneous network throughput and also show that our algorithm provides maximum throughput if the CRs have i.i.d. valuations. Since the moderator fuses CRs' sensing decisions to obtain a global inference regarding spectrum availability, we propose a novel strategy-proof fusion rule that encourages the CRs to simultaneously reveal truthful sensing decisions, along with truthful valuations to the moderator. Numerical examples are also presented to provide insights into the performance of the proposed auction under different scenarios. ",pramod varshney,,2014.0,,arXiv,Nadendla2014,True,,arXiv,Not available,"Optimal Spectrum Auction Design with Two-Dimensional Truthful Revelations under Uncertain Spectrum Availability",eee5e7764b6c260a006bc52c63aff366,http://arxiv.org/abs/1403.6807v3 15402," We present algorithms for implementing local spectrum redistribution in wireless networks using a mechanism design approach. For example, in single-hop request scheduling, secondary users are modeled as rational agents that have private utility when getting assigned a channel for successful transmission. We present a rather simple algorithmic technique that allows to turn existing and future approximation algorithms and heuristics into truthful mechanisms for a large variety of networking problems. In contrast to previous work, our approach works for virtually all known interference models in the literature, including the physical model of interference based on SINR. It allows to address single-hop and multi-hop scheduling, routing, and even more general assignment and allocation problems. Our mechanisms are randomized and represent the first universally-truthful mechanisms for these problems with rigorous worst-case guarantees on the solution quality. In this way, our mechanisms can be used to obtain guaranteed solution quality even with risk-averse or risk-seeking bidders, for which existing approaches fail. ",martin hoefer,,2013.0,,arXiv,Hoefer2013,True,,arXiv,Not available,Universally Truthful Secondary Spectrum Auctions,fbc40f59b400cd6a68118e9c2a95cd19,http://arxiv.org/abs/1305.2350v1 15403," We present algorithms for implementing local spectrum redistribution in wireless networks using a mechanism design approach. For example, in single-hop request scheduling, secondary users are modeled as rational agents that have private utility when getting assigned a channel for successful transmission. We present a rather simple algorithmic technique that allows to turn existing and future approximation algorithms and heuristics into truthful mechanisms for a large variety of networking problems. In contrast to previous work, our approach works for virtually all known interference models in the literature, including the physical model of interference based on SINR. It allows to address single-hop and multi-hop scheduling, routing, and even more general assignment and allocation problems. Our mechanisms are randomized and represent the first universally-truthful mechanisms for these problems with rigorous worst-case guarantees on the solution quality. In this way, our mechanisms can be used to obtain guaranteed solution quality even with risk-averse or risk-seeking bidders, for which existing approaches fail. ",thomas kesselheim,,2013.0,,arXiv,Hoefer2013,True,,arXiv,Not available,Universally Truthful Secondary Spectrum Auctions,fbc40f59b400cd6a68118e9c2a95cd19,http://arxiv.org/abs/1305.2350v1 15404," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",michal feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 15405," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",nick gravin,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 15406," We study anonymous posted price mechanisms for combinatorial auctions in a Bayesian framework. In a posted price mechanism, item prices are posted, then the consumers approach the seller sequentially in an arbitrary order, each purchasing her favorite bundle from among the unsold items at the posted prices. These mechanisms are simple, transparent and trivially dominant strategy incentive compatible (DSIC). We show that when agent preferences are fractionally subadditive (which includes all submodular functions), there always exist prices that, in expectation, obtain at least half of the optimal welfare. Our result is constructive: given black-box access to a combinatorial auction algorithm A, sample access to the prior distribution, and appropriate query access to the sampled valuations, one can compute, in polytime, prices that guarantee at least half of the expected welfare of A. As a corollary, we obtain the first polytime (in n and m) constant-factor DSIC mechanism for Bayesian submodular combinatorial auctions, given access to demand query oracles. Our results also extend to valuations with complements, where the approximation factor degrades linearly with the level of complementarity. ",brendan lucier,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Combinatorial Auctions via Posted Prices,5d2ada4eb1d7f1f687fa0549edb91ab5,http://arxiv.org/abs/1411.4916v1 15407," Cloud containers represent a new, light-weight alternative to virtual machines in cloud computing. A user job may be described by a container graph that specifies the resource profile of each container and container dependence relations. This work is the first in the cloud computing literature that designs efficient market mechanisms for container based cloud jobs. Our design targets simultaneously incentive compatibility, computational efficiency, and economic efficiency. It further adapts the idea of batch online optimization into the paradigm of mechanism design, leveraging agile creation of cloud containers and exploiting delay tolerance of elastic cloud jobs. The new and classic techniques we employ include: (i) compact exponential optimization for expressing and handling non-traditional constraints that arise from container dependence and job deadlines; (ii) the primal-dual schema for designing efficient approximation algorithms for social welfare maximization; and (iii) posted price mechanisms for batch decision making and truthful payment design. Theoretical analysis and trace-driven empirical evaluation verify the efficacy of our container auction algorithms. ",zongpeng li,,2018.0,,arXiv,Ma2018,True,,arXiv,Not available,Batch Auction Design For Cloud Container Services,c101240a3f4c8bd39e9bf27b1a3f13ec,http://arxiv.org/abs/1801.05896v1 15413," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",shuchi chawla,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15414," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",jason hartline,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15415," For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper combines auction theoretic modeling with the A/B testing framework to develop methodology for A/B testing auctions. The accuracy of our method %, assuming the auction is directly comparable to ideal A/B testing where there is no interference between A and B. Our results are based on an extension and improved analysis of the inference method of Chawla et al. (2014). ",denis nekipelov,,2016.0,,arXiv,Chawla2016,True,,arXiv,Not available,A/B Testing of Auctions,d8e19ad154b919f00b723d9771cd9b56,http://arxiv.org/abs/1606.00908v1 15418," We study the price of anarchy of mechanisms in the presence of risk-averse agents. Previous work has focused on agents with quasilinear utilities, possibly with a budget. Our model subsumes this as a special case but also captures that agents might be less sensitive to payments than in the risk-neutral model. We show that many positive price-of-anarchy results proved in the smoothness framework continue to hold in the more general risk-averse setting. A sufficient condition is that agents can never end up with negative quasilinear utility after playing an undominated strategy. This is true, e.g., for first-price and second-price auctions. For all-pay auctions, similar results do not hold: We show that there are Bayes-Nash equilibria with arbitrarily bad social welfare compared to the optimum. ",thomas kesselheim,,2018.0,,arXiv,Kesselheim2018,True,,arXiv,Not available,Price of Anarchy for Mechanisms with Risk-Averse Agents,ad484a322aaaa22a7888e231d66590dc,http://arxiv.org/abs/1804.09468v1 15420," Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group seems to be much easier to implement. Simulations involving humans have already been performed. We will focus on problems related to combinatorial auctions and technical assumptions that are made. Quantum approach offers at least two important developments. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of agent's activity could in principle be guaranteed. Then we point out some key problem that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for experimental realization in the near future. We conclude by describing potential customers, estimating the potential market size and possible timing. ",e. piotrowski,,2007.0,10.1016/j.physa.2008.02.071,arXiv,Piotrowski2007,True,,arXiv,Not available,Quantum Auctions: Facts and Myths,9b0ea8dc27e625617206a0c9d0b751c6,http://arxiv.org/abs/0709.4096v1 15421," Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group seems to be much easier to implement. Simulations involving humans have already been performed. We will focus on problems related to combinatorial auctions and technical assumptions that are made. Quantum approach offers at least two important developments. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of agent's activity could in principle be guaranteed. Then we point out some key problem that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for experimental realization in the near future. We conclude by describing potential customers, estimating the potential market size and possible timing. ",j. sladkowski,,2007.0,10.1016/j.physa.2008.02.071,arXiv,Piotrowski2007,True,,arXiv,Not available,Quantum Auctions: Facts and Myths,9b0ea8dc27e625617206a0c9d0b751c6,http://arxiv.org/abs/0709.4096v1 15422," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",paul dutting,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 15423," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",zhe feng,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 15424," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",harikrishna narasimhan,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 15425," Designing an auction that maximizes expected revenue is an intricate task. Indeed, as of today--despite major efforts and impressive progress over the past few years--only the single-item case is fully understood. In this work, we initiate the exploration of the use of tools from deep learning on this topic. The design objective is revenue optimal, dominant-strategy incentive compatible auctions. We show that multi-layer neural networks can learn almost-optimal auctions for settings for which there are analytical solutions, such as Myerson's auction for a single item, Manelli and Vincent's mechanism for a single bidder with additive preferences over two items, or Yao's auction for two additive bidders with binary support distributions and multiple items, even if no prior knowledge about the form of optimal auctions is encoded in the network and the only feedback during training is revenue and regret. We further show how characterization results, even rather implicit ones such as Rochet's characterization through induced utilities and their gradients, can be leveraged to obtain more precise fits to the optimal design. We conclude by demonstrating the potential of deep learning for deriving optimal auctions with high revenue for poorly understood problems. ",david parkes,,2017.0,,arXiv,Dütting2017,True,,arXiv,Not available,Optimal Auctions through Deep Learning,41493402f4d735604484265879a25844,http://arxiv.org/abs/1706.03459v2 15426," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",jing chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 15427," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",bo li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 15428," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",yingkai li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 15429," We study the price of anarchy of mechanisms in the presence of risk-averse agents. Previous work has focused on agents with quasilinear utilities, possibly with a budget. Our model subsumes this as a special case but also captures that agents might be less sensitive to payments than in the risk-neutral model. We show that many positive price-of-anarchy results proved in the smoothness framework continue to hold in the more general risk-averse setting. A sufficient condition is that agents can never end up with negative quasilinear utility after playing an undominated strategy. This is true, e.g., for first-price and second-price auctions. For all-pay auctions, similar results do not hold: We show that there are Bayes-Nash equilibria with arbitrarily bad social welfare compared to the optimum. ",bojana kodric,,2018.0,,arXiv,Kesselheim2018,True,,arXiv,Not available,Price of Anarchy for Mechanisms with Risk-Averse Agents,ad484a322aaaa22a7888e231d66590dc,http://arxiv.org/abs/1804.09468v1 15430," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",pinyan lu,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 15431," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",ittai abraham,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 15432," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",moshe babaioff,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 15433," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",shaddin dughmi,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 15434," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",tim roughgarden,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 15435," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",tad hogg,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 15436," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",pavithra harsha,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 15437," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",kay-yut chen,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 15438," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",jon feldman,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 15439," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",s. muthukrishnan,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 15440," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",zhiyi huang,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 15441," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",martin pal,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 15442," Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem. ",cliff stein,,2006.0,,arXiv,Feldman2006,True,,arXiv,Not available,Budget Optimization in Search-Based Advertising Auctions,547f4085e706d22b100e42353c30102c,http://arxiv.org/abs/cs/0612052v1 15443," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",mayank manjrekar,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15444," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",vinod ramaswamy,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15445," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",vamseedhar raja,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15446," We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE. ",srinivas shakkottai,,2013.0,,arXiv,Manjrekar2013,True,,arXiv,Not available,A Mean Field Game Approach to Scheduling in Cellular Systems,799632a3b1ee87b3d3e94418520945b0,http://arxiv.org/abs/1309.1220v2 15447," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",shahar dobzinski,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 15448," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",hu fu,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 15449," We study combinatorial auctions where each item is sold separately but simultaneously via a second price auction. We ask whether it is possible to efficiently compute in this game a pure Nash equilibrium with social welfare close to the optimal one. We show that when the valuations of the bidders are submodular, in many interesting settings (e.g., constant number of bidders, budget additive bidders) computing an equilibrium with good welfare is essentially as easy as computing, completely ignoring incentives issues, an allocation with good welfare. On the other hand, for subadditive valuations, we show that computing an equilibrium requires exponential communication. Finally, for XOS (a.k.a. fractionally subadditive) valuations, we show that if there exists an efficient algorithm that finds an equilibrium, it must use techniques that are very different from our current ones. ",robert kleinberg,,2014.0,,arXiv,Dobzinski2014,True,,arXiv,Not available,On the Complexity of Computing an Equilibrium in Combinatorial Auctions,02ff0ff126eab821460da6bfcb0b3285,http://arxiv.org/abs/1404.2041v2 15450," The recent online platforms propose multiple items for bidding. The state of the art, however, is limited to the analysis of one item auction without resubmission. In this paper we study multi-item lowest unique bid auctions (LUBA) with resubmission in discrete bid spaces under budget constraints. We show that the game does not have pure Bayes-Nash equilibria (except in very special cases). However, at least one mixed Bayes-Nash equilibria exists for arbitrary number of bidders and items. The equilibrium is explicitly computed for two-bidder setup with resubmission possibilities. In the general setting we propose a distributed strategic learning algorithm to approximate equilibria. Computer simulations indicate that the error quickly decays in few number of steps. When the number of bidders per item follows a Poisson distribution, it is shown that the seller can get a non-negligible revenue on several items, and hence making a partial revelation of the true value of the items. Finally, the attitude of the bidders towards the risk is considered. In contrast to risk-neutral agents who bids very small values, the cumulative distribution and the bidding support of risk-sensitive agents are more distributed. ",yida xu,,2017.0,,arXiv,Xu2017,True,,arXiv,Not available,Lowest Unique Bid Auctions with Resubmission Opportunities,c2d9aef1cb3b60f9442813d172d41d7d,http://arxiv.org/abs/1702.08794v1 15451," Distributed adaptive filtering has been considered as an effective approach for data processing and estimation over distributed networks. Most existing distributed adaptive filtering algorithms focus on designing different information diffusion rules, regardless of the nature evolutionary characteristic of a distributed network. In this paper, we study the adaptive network from the game theoretic perspective and formulate the distributed adaptive filtering problem as a graphical evolutionary game. With the proposed formulation, the nodes in the network are regarded as players and the local combiner of estimation information from different neighbors is regarded as different strategies selection. We show that this graphical evolutionary game framework is very general and can unify the existing adaptive network algorithms. Based on this framework, as examples, we further propose two error-aware adaptive filtering algorithms. Moreover, we use graphical evolutionary game theory to analyze the information diffusion process over the adaptive networks and evolutionarily stable strategy of the system. Finally, simulation results are shown to verify the effectiveness of our analysis and proposed methods. ",chunxiao jiang,,2012.0,10.1109/TSP.2013.2280444,arXiv,Jiang2012,True,,arXiv,Not available,"Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View",82e18e62ceb309db96f05e5f39bad84c,http://arxiv.org/abs/1212.1245v2 15452," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",jinyan liu,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 15453," The recent online platforms propose multiple items for bidding. The state of the art, however, is limited to the analysis of one item auction without resubmission. In this paper we study multi-item lowest unique bid auctions (LUBA) with resubmission in discrete bid spaces under budget constraints. We show that the game does not have pure Bayes-Nash equilibria (except in very special cases). However, at least one mixed Bayes-Nash equilibria exists for arbitrary number of bidders and items. The equilibrium is explicitly computed for two-bidder setup with resubmission possibilities. In the general setting we propose a distributed strategic learning algorithm to approximate equilibria. Computer simulations indicate that the error quickly decays in few number of steps. When the number of bidders per item follows a Poisson distribution, it is shown that the seller can get a non-negligible revenue on several items, and hence making a partial revelation of the true value of the items. Finally, the attitude of the bidders towards the risk is considered. In contrast to risk-neutral agents who bids very small values, the cumulative distribution and the bidding support of risk-sensitive agents are more distributed. ",hamidou tembine,,2017.0,,arXiv,Xu2017,True,,arXiv,Not available,Lowest Unique Bid Auctions with Resubmission Opportunities,c2d9aef1cb3b60f9442813d172d41d7d,http://arxiv.org/abs/1702.08794v1 15454," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yu wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15455," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jiayi liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15456," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yuxiang liu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15457," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jun hao,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15458," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",yang he,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15459," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",jinghe hu,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15460," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",weipeng yan,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15461," We present LADDER, the first deep reinforcement learning agent that can successfully learn control policies for large-scale real-world problems directly from raw inputs composed of high-level semantic information. The agent is based on an asynchronous stochastic variant of DQN (Deep Q Network) named DASQN. The inputs of the agent are plain-text descriptions of states of a game of incomplete information, i.e. real-time large scale online auctions, and the rewards are auction profits of very large scale. We apply the agent to an essential portion of JD's online RTB (real-time bidding) advertising business and find that it easily beats the former state-of-the-art bidding policy that had been carefully engineered and calibrated by human experts: during JD.com's June 18th anniversary sale, the agent increased the company's ads revenue from the portion by more than 50%, while the advertisers' ROI (return on investment) also improved significantly. ",mantian li,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"LADDER: A Human-Level Bidding Agent for Large-Scale Real-Time Online Auctions",aaf3354f1bd8126077ecca99e5198826,http://arxiv.org/abs/1708.05565v2 15462," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",darrell hoy,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 15463," We consider the problem of learning optimal reserve price in repeated auctions against non-myopic bidders, who may bid strategically in order to gain in future rounds even if the single-round auctions are truthful. Previous algorithms, e.g., empirical pricing, do not provide non-trivial regret rounds in this setting in general. We introduce algorithms that obtain small regret against non-myopic bidders either when the market is large, i.e., no bidder appears in a constant fraction of the rounds, or when the bidders are impatient, i.e., they discount future utility by some factor mildly bounded away from one. Our approach carefully controls what information is revealed to each bidder, and builds on techniques from differentially private online learning as well as the recent line of works on jointly differentially private algorithms. ",xiangning wang,,2018.0,,arXiv,Huang2018,True,,arXiv,Not available,Learning Optimal Reserve Price against Non-myopic Bidders,a463cbd450742e4b28fb71b4bd6bb7a1,http://arxiv.org/abs/1804.11060v1 15464," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",sam taggart,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 15465," This paper proves that the welfare of the first price auction in Bayes-Nash equilibrium is at least a $.743$-fraction of the welfare of the optimal mechanism assuming agents' values are independently distributed. The previous best bound was $1-1/e \approx .63$, derived in Syrgkanis and Tardos (2013) using smoothness, the standard technique for reasoning about welfare of games in equilibrium. In the worst known example (from Hartline et al. (2014)), the first price auction achieves a $\approx .869$-fraction of the optimal welfare, far better than the theoretical guarantee. Despite this large gap, it was unclear whether the $1-1/e \approx .63$ bound was tight. We prove that it is not. Our analysis eschews smoothness, and instead uses the independence assumption on agents' value distributions to give a more careful accounting of the welfare contribution of agents who win despite not having the highest value. ",zihe wang,,2018.0,,arXiv,Hoy2018,True,,arXiv,Not available,An Improved Welfare Guarantee for First Price Auctions,7798db03f160c537231705ee27693b98,http://arxiv.org/abs/1803.06707v1 15466," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",moran feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15467," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",moshe tennenholtz,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15468," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",omri weinstein,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15469," The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity as a Fundamental Metric for Mechanism Design in the Information Economy",57ba0b7a7fef925511ef08b188aee970,http://arxiv.org/abs/0711.1569v1 15470," The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity as a Fundamental Metric for Mechanism Design in the Information Economy",57ba0b7a7fef925511ef08b188aee970,http://arxiv.org/abs/0711.1569v1 15471," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",thodoris lykouris,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15472," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",vasilis syrgkanis,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15473," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",eva tardos,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15474," We present a two stage auction mechanism that renewable generators (or aggregators) could use to allocate renewable energy among LSEs. The auction is conducted day- ahead. LSEs submit bids specifying their valuation per unit, as well as their real-time fulfillment costs in case of shortfall in generation. We present an allocation rule and a de-allocation rule that maximizes expected social welfare. Since the LSEs are strategic and may not report their private valuations and costs truthfully, we design a two-part payment, one made in Stage 1, before renewable energy generation level W is realized, and another determined later to be paid as compensation to those LSEs that have to be de-allocated in case of a shortfall. We proposes a two-stage Stochastic VCG mechanism which we prove is incentive compatible in expectation (expected payoff maximizing bidders will bid truthfully), individually rational in expectation (expected payoff of all participants is non-negative) and is also efficient. To the best of our knowledge, this is the first such two-stage mechanism for selling random goods. ",nathan dahlin,,2018.0,,arXiv,Dahlin2018,True,,arXiv,Not available,A Two Stage Mechanism For Selling Random Power,3d8df50c6dce2480454120dbcd699ed3,http://arxiv.org/abs/1809.09873v2 15475," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",sriram somanchi,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 15476," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",chaitanya nittala,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 15477," In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers. ",narahari yadati,,2009.0,,arXiv,Somanchi2009,True,,arXiv,Not available,"A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory",26fd28176d7bb8b5e3ef62c5917d4fd3,http://arxiv.org/abs/0906.4764v2 15478," In markets such as digital advertising auctions, bidders want to maximize value rather than payoff. This is different to the utility functions typically assumed in auction theory and leads to different strategies and outcomes. We refer to bidders who maximize value as value bidders. While simple single-object auction formats are truthful, standard multi-object auction formats allow for manipulation. It is straightforward to show that there cannot be a truthful and revenue-maximizing deterministic auction mechanism with value bidders and general valuations. Approximation has been used as a means to achieve truthfulness, and we study which approximation ratios we can get from truthful approximation mechanisms. We show that the approximation ratio that can be achieved with a deterministic and truthful approximation mechanism with $n$ bidders and $m$ items cannot be higher than 1/n for general valuations. For randomized approximation mechanisms there is a framework with a ratio of O(sqrt(m)). We provide better ratios for environments with restricted valuations. ",salman fadaei,,2016.0,,arXiv,Fadaei2016,True,,arXiv,Not available,Truthfulness with Value-Maximizing Bidders,9b2959340a681131f1d07765e8cddd6f,http://arxiv.org/abs/1607.03821v1 15479," In markets such as digital advertising auctions, bidders want to maximize value rather than payoff. This is different to the utility functions typically assumed in auction theory and leads to different strategies and outcomes. We refer to bidders who maximize value as value bidders. While simple single-object auction formats are truthful, standard multi-object auction formats allow for manipulation. It is straightforward to show that there cannot be a truthful and revenue-maximizing deterministic auction mechanism with value bidders and general valuations. Approximation has been used as a means to achieve truthfulness, and we study which approximation ratios we can get from truthful approximation mechanisms. We show that the approximation ratio that can be achieved with a deterministic and truthful approximation mechanism with $n$ bidders and $m$ items cannot be higher than 1/n for general valuations. For randomized approximation mechanisms there is a framework with a ratio of O(sqrt(m)). We provide better ratios for environments with restricted valuations. ",martin bichler,,2016.0,,arXiv,Fadaei2016,True,,arXiv,Not available,Truthfulness with Value-Maximizing Bidders,9b2959340a681131f1d07765e8cddd6f,http://arxiv.org/abs/1607.03821v1 15480," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",evdokia nikolova,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 15481," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",emmanouil pountourakis,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 15482," One of the most celebrated results in mechanism design is Myerson's characterization of the revenue optimal auction for selling a single item. However, this result relies heavily on the assumption that buyers are indifferent to risk. In this paper we investigate the case where the buyers are risk-loving, i.e. they prefer gambling to being rewarded deterministically. We use the standard model for risk from expected utility theory, where risk-loving behavior is represented by a convex utility function. We focus our attention on the special case of exponential utility functions. We characterize the optimal auction and show that randomization can be used to extract more revenue than when buyers are risk-neutral. Most importantly, we show that the optimal auction is simple: the optimal revenue can be extracted using a randomized take-it-or-leave-it price for a single buyer and using a loser-pay auction, a variant of the all-pay auction, for multiple buyers. Finally, we show that these results no longer hold for convex utility functions beyond exponential. ",ger yang,,2018.0,,arXiv,Nikolova2018,True,,arXiv,Not available,Optimal Mechanism Design with Risk-loving Agents,6f8a0df0dcf3b1874a18805406a16979,http://arxiv.org/abs/1810.02758v1 15483," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",constantinos daskalakis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 15484," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",vasilis syrgkanis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 15485," We present a two stage auction mechanism that renewable generators (or aggregators) could use to allocate renewable energy among LSEs. The auction is conducted day- ahead. LSEs submit bids specifying their valuation per unit, as well as their real-time fulfillment costs in case of shortfall in generation. We present an allocation rule and a de-allocation rule that maximizes expected social welfare. Since the LSEs are strategic and may not report their private valuations and costs truthfully, we design a two-part payment, one made in Stage 1, before renewable energy generation level W is realized, and another determined later to be paid as compensation to those LSEs that have to be de-allocated in case of a shortfall. We proposes a two-stage Stochastic VCG mechanism which we prove is incentive compatible in expectation (expected payoff maximizing bidders will bid truthfully), individually rational in expectation (expected payoff of all participants is non-negative) and is also efficient. To the best of our knowledge, this is the first such two-stage mechanism for selling random goods. ",rahul jain,,2018.0,,arXiv,Dahlin2018,True,,arXiv,Not available,A Two Stage Mechanism For Selling Random Power,3d8df50c6dce2480454120dbcd699ed3,http://arxiv.org/abs/1809.09873v2 15486," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",zhili chen,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 15487," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",he huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 15488," We design a framework for truthful double multi-channel spectrum auctions where each seller (or buyer) can sell (or buy) multiple spectrum channels based on their individual needs. Open, market-based spectrum trading motivates existing spectrum owners (as sellers) to lease their selected idle spectrum channels to new spectrum users (as buyers) who need the spectrum desperately. The most significant requirement is how to make the auction economic-robust (truthful in particular) while enabling spectrum reuse to improve spectrum utilization. Additionally, in practice, both sellers and buyers would require to trade multiple channels at one time, while guaranteeing their individual profitability. Unfortunately, none of the existing designs can meet all these requirements simultaneously. We address these requirements by proposing True-MCSA, a framework for truthful double multi-channel spectrum auctions. True-MCSA takes as input any reusability-driven spectrum allocation algorithm, introduces novel virtual buyer group (VBG) splitting and bidding algorithms, and applies a winner determination and pricing mechanism to achieve truthfulness and other economic properties while improving spectrum utilization and successfully dealing with multi-channel requests from both buyers and sellers. Our results show that the auction efficiency is impacted by the economic factors with efficiency degradations within 30%, under different experimental settings. Furthermore, the experimental results indicate that we can improve the auction efficiency by choosing a proper bidding algorithm and using a base bid. True-MCSA makes an important contribution on enabling spectrum reuse to improve auction efficiency in multi-channel cases. ",liusheng huang,,2012.0,,arXiv,Chen2012,True,,arXiv,Not available,"True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions",6442af262a1cc916908f2672987a435e,http://arxiv.org/abs/1208.0407v1 15489," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",bart keijzer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 15490," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",evangelos markakis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 15491," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",guido schafer,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 15492," We study two standard multi-unit auction formats for allocating multiple units of a single good to multi-demand bidders. The first one is the Discriminatory Auction, which charges every winner his winning bids. The second is the Uniform Price Auction, which determines a uniform price to be paid per unit. Variants of both formats find applications ranging from the allocation of state bonds to investors, to online sales over the internet, facilitated by popular online brokers. For these formats, we consider two bidding interfaces: (i) standard bidding, which is most prevalent in the scientific literature, and (ii) uniform bidding, which is more popular in practice. In this work, we evaluate the economic inefficiency of both multi-unit auction formats for both bidding interfaces, by means of upper and lower bounds on the Price of Anarchy for pure Nash equilibria and mixed Bayes-Nash equilibria. Our developments improve significantly upon bounds that have been obtained recently in [Markakis, Telelis, ToCS 2014] and [Syrgkanis, Tardos, STOC 2013] for submodular valuation functions. Moreover, we consider for the first time bidders with subadditive valuation functions for these auction formats. Our results signify that these auctions are nearly efficient, which provides further justification for their use in practice. ",orestis telelis,,2013.0,,arXiv,Keijzer2013,True,,arXiv,Not available,On the Inefficiency of Standard Multi-Unit Auctions,b5b053cbaaea27b00ea1182db8ce1e81,http://arxiv.org/abs/1303.1646v3 15493," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",zheng wen,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 15494," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",eric bax,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 15495," In quasi-proportional auctions, each bidder receives a fraction of the allocation equal to the weight of their bid divided by the sum of weights of all bids, where each bid's weight is determined by a weight function. We study the relationship between the weight function, bidders' private values, number of bidders, and the seller's revenue in equilibrium. It has been shown that if one bidder has a much higher private value than the others, then a nearly flat weight function maximizes revenue. Essentially, threatening the bidder who has the highest valuation with having to share the allocation maximizes the revenue. We show that as bidder private values approach parity, steeper weight functions maximize revenue by making the quasi-proportional auction more like a winner-take-all auction. We also show that steeper weight functions maximize revenue as the number of bidders increases. For flatter weight functions, there is known to be a unique pure-strategy Nash equilibrium. We show that a pure-strategy Nash equilibrium also exists for steeper weight functions, and we give lower bounds for bids at an equilibrium. For a special case that includes the two-bidder auction, we show that the pure-strategy Nash equilibrium is unique, and we show how to compute the revenue at equilibrium. We also show that selecting a weight function based on private value ratios and number of bidders is necessary for a quasi-proportional auction to produce more revenue than a second-price auction. ",james li,,2015.0,,arXiv,Wen2015,True,,arXiv,Not available,Revenue-Maximizing Mechanism Design for Quasi-Proportional Auctions,6fbb9e9401a7ae13488a2ee355942c54,http://arxiv.org/abs/1504.08333v2 15496," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",yaonan jin,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 15497," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",michal feldman,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 15498," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",ophir friedler,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 15499," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",jamie morgenstern,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 15500," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",guy reiner,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 15501," Many auction settings implicitly or explicitly require that bidders are treated equally ex-ante. This may be because discrimination is philosophically or legally impermissible, or because it is practically difficult to implement or impossible to enforce. We study so-called {\em anonymous} auctions to understand the revenue tradeoffs and to develop simple anonymous auctions that are approximately optimal. We consider digital goods settings and show that the optimal anonymous, dominant strategy incentive compatible auction has an intuitive structure --- imagine that bidders are randomly permuted before the auction, then infer a posterior belief about bidder i's valuation from the values of other bidders and set a posted price that maximizes revenue given this posterior. We prove that no anonymous mechanism can guarantee an approximation better than O(n) to the optimal revenue in the worst case (or O(log n) for regular distributions) and that even posted price mechanisms match those guarantees. Understanding that the real power of anonymous mechanisms comes when the auctioneer can infer the bidder identities accurately, we show a tight O(k) approximation guarantee when each bidder can be confused with at most k ""higher types"". Moreover, we introduce a simple mechanism based on n target prices that is asymptotically optimal and build on this mechanism to extend our results to m-unit auctions and sponsored search. ",christos tzamos,,2014.0,,arXiv,Tzamos2014,True,,arXiv,Not available,The Value of Knowing Your Enemy,96386a0fadb1e4af86d74327b4dcc867,http://arxiv.org/abs/1411.1379v1 15502," Many auction settings implicitly or explicitly require that bidders are treated equally ex-ante. This may be because discrimination is philosophically or legally impermissible, or because it is practically difficult to implement or impossible to enforce. We study so-called {\em anonymous} auctions to understand the revenue tradeoffs and to develop simple anonymous auctions that are approximately optimal. We consider digital goods settings and show that the optimal anonymous, dominant strategy incentive compatible auction has an intuitive structure --- imagine that bidders are randomly permuted before the auction, then infer a posterior belief about bidder i's valuation from the values of other bidders and set a posted price that maximizes revenue given this posterior. We prove that no anonymous mechanism can guarantee an approximation better than O(n) to the optimal revenue in the worst case (or O(log n) for regular distributions) and that even posted price mechanisms match those guarantees. Understanding that the real power of anonymous mechanisms comes when the auctioneer can infer the bidder identities accurately, we show a tight O(k) approximation guarantee when each bidder can be confused with at most k ""higher types"". Moreover, we introduce a simple mechanism based on n target prices that is asymptotically optimal and build on this mechanism to extend our results to m-unit auctions and sponsored search. ",christopher wilkens,,2014.0,,arXiv,Tzamos2014,True,,arXiv,Not available,The Value of Knowing Your Enemy,96386a0fadb1e4af86d74327b4dcc867,http://arxiv.org/abs/1411.1379v1 15503," We are interested in the problem of optimal commitments in rank-and-bid based auctions, a general class of auctions that include first price and all-pay auctions as special cases. Our main contribution is a novel approach to solve for optimal commitment in this class of auctions, for any continuous type distributions. Applying our approach, we are able to solve optimal commitments for first-price and all-pay auctions in closed-form for fairly general distribution settings. The optimal commitments functions in these auctions reveal two surprisingly opposite insights: in the optimal commitment, the leader bids passively when he has a low type. We interpret this as a credible way to alleviate competition and to collude. In sharp contrast, when his type is high enough, the leader sometimes would go so far as to bid above his own value. We interpret this as a credible way to threat. Combing both insights, we show via concrete examples that the leader is indeed willing to do so to secure more utility when his type is in the middle. Our main approach consists of a series of nontrivial innovations. In particular we put forward a concept called equal-bid function that connects both players' strategies, as well as a concept called equal-utility curve that smooths any leader strategy into a continuous and differentiable strategy. We believe these techniques and insights are general and can be applied to similar problems. ",zihe wang,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Optimal commitments in auctions with incomplete information,2f2b09ab15b4b8f398c8af863281cad1,http://arxiv.org/abs/1502.07431v1 15504," We are interested in the problem of optimal commitments in rank-and-bid based auctions, a general class of auctions that include first price and all-pay auctions as special cases. Our main contribution is a novel approach to solve for optimal commitment in this class of auctions, for any continuous type distributions. Applying our approach, we are able to solve optimal commitments for first-price and all-pay auctions in closed-form for fairly general distribution settings. The optimal commitments functions in these auctions reveal two surprisingly opposite insights: in the optimal commitment, the leader bids passively when he has a low type. We interpret this as a credible way to alleviate competition and to collude. In sharp contrast, when his type is high enough, the leader sometimes would go so far as to bid above his own value. We interpret this as a credible way to threat. Combing both insights, we show via concrete examples that the leader is indeed willing to do so to secure more utility when his type is in the middle. Our main approach consists of a series of nontrivial innovations. In particular we put forward a concept called equal-bid function that connects both players' strategies, as well as a concept called equal-utility curve that smooths any leader strategy into a continuous and differentiable strategy. We believe these techniques and insights are general and can be applied to similar problems. ",pingzhong tang,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Optimal commitments in auctions with incomplete information,2f2b09ab15b4b8f398c8af863281cad1,http://arxiv.org/abs/1502.07431v1 15505," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",ashwinkumar badanidiyuru,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 15506," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",kshipra bhawalkar,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 15507," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",pinyan lu,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 15508," Modern ad auctions allow advertisers to target more specific segments of the user population. Unfortunately, this is not always in the best interest of the ad platform. In this paper, we examine the following basic question in the context of second-price ad auctions: how should an ad platform optimally reveal information about the ad opportunity to the advertisers in order to maximize revenue? We consider a model in which bidders' valuations depend on a random state of the ad opportunity. Different from previous work, we focus on a more practical, and challenging, situation where the space of possible realizations of ad opportunities is extremely large. We thus focus on developing algorithms whose running time is independent of the number of ad opportunity realizations. We examine the auctioneer's algorithmic question of designing the optimal signaling scheme. When the auctioneer is restricted to send a public signal to all bidders, we focus on a well-motivated Bayesian valuation setting in which the auctioneer and bidders both have private information, and present two main results: 1. we exhibit a characterization result regarding approximately optimal schemes and prove that any constant-approximate public signaling scheme must use exponentially many signals; 2. we present a ""simple"" public signaling scheme that serves as a constant approximation under mild assumptions. We then initiate an exploration on the power of being able to send different signals privately to different bidders. Here we examine a basic setting where the auctioneer knows bidders' valuations, and exhibit a polynomial-time private scheme that extracts almost full surplus even in the worst Bayes Nash equilibrium. This illustrates the surprising power of private signaling schemes in extracting revenue. ",haifeng xu,,2017.0,,arXiv,Badanidiyuru2017,True,,arXiv,Not available,Targeting and Signaling in Ad Auctions,ce53985ef44e8f7597644bb2b4521244,http://arxiv.org/abs/1708.00611v2 15509," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",darrell hoy,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 15510," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",kamal jain,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 15511," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",christopher wilkens,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 15512," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",i. hafalir,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 15513," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",r. ravi,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 15514," Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium. ",a. sayedi,,2009.0,,arXiv,Hafalir2009,True,,arXiv,Not available,Multi-unit Auctions with Budget Constraints,e26fbe5a285493b4df9919d2b37a72d4,http://arxiv.org/abs/0903.1450v2 15515," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",hu fu,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 15516," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",jason hartline,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 15517," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",darrell hoy,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 15518," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",qi qi,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 15519," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",bach ha,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 15520," We give an auction for downward-closed environments that generalizes the random sampling profit extraction auction for digital goods of Fiat et al. (2002). The mechanism divides the agents in to a market and a sample using a biased coin and attempts to extract the optimal revenue from the sample from the market. The latter step is done with the downward-closed profit extractor of Ha and Hartline (2012). The auction is a 11-approximation to the envyfree benchmark in downward-closed permutation environments. This is an improvement on the previously best known results of 12.5 for matroid and 30.4 for downward-closed permutation environments that are due to Devanur et al. (2012) and Ha and Hartline (2012), respectively. ",jason hartline,,2012.0,,arXiv,Ha2012,True,,arXiv,Not available,The Biased Sampling Profit Extraction Auction,9fef379a94cb1bd91a9b48576087e3f3,http://arxiv.org/abs/1206.4955v1 15521," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",elias koutsoupias,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 15522," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",stefano leonardi,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 15523," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",tim roughgarden,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 15524," Finite objects and more specifically finite games are formalized using induction, whereas infinite objects are formalized using coinduction. In this article, after an introduction to the concept of coinduction, we revisit on infinite (discrete) extensive games the basic notions of game theory. Among others, we introduce a definition of Nash equilibrium and a notion of subgame perfect equilibrium for infinite games. We use those concepts to analyze well known infinite games, like the dollar auction game and the centipede game and we show that human behaviors that are often considered as illogic are perfectly rational, if one admits that human agents reason coinductively. ",pierre lescanne,,2009.0,,arXiv,Lescanne2009,True,,arXiv,Not available,Deconstruction of Infinite Extensive Games using coinduction,ccf86866e80e854f111e86bd599b02d7,http://arxiv.org/abs/0904.3528v2 15525," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",maria-florina balcan,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 15526," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",tuomas sandholm,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 15527," The design of revenue-maximizing combinatorial auctions, i.e. multi-item auctions over bundles of goods, is one of the most fundamental problems in computational economics, unsolved even for two bidders and two items for sale. In the traditional economic models, it is assumed that the bidders' valuations are drawn from an underlying distribution and that the auction designer has perfect knowledge of this distribution. Despite this strong and oftentimes unrealistic assumption, it is remarkable that the revenue-maximizing combinatorial auction remains unknown. In recent years, automated mechanism design has emerged as one of the most practical and promising approaches to designing high-revenue combinatorial auctions. The most scalable automated mechanism design algorithms take as input samples from the bidders' valuation distribution and then search for a high-revenue auction in a rich auction class. In this work, we provide the first sample complexity analysis for the standard hierarchy of deterministic combinatorial auction classes used in automated mechanism design. In particular, we provide tight sample complexity bounds on the number of samples needed to guarantee that the empirical revenue of the designed mechanism on the samples is close to its expected revenue on the underlying, unknown distribution over bidder valuations, for each of the auction classes in the hierarchy. In addition to helping set automated mechanism design on firm foundations, our results also push the boundaries of learning theory. In particular, the hypothesis functions used in our contexts are defined through multi-stage combinatorial optimization procedures, rather than simple decision boundaries, as are common in machine learning. ",ellen vitercik,,2016.0,,arXiv,Balcan2016,True,,arXiv,Not available,Sample Complexity of Automated Mechanism Design,d1ca9839631987ec6d2b881737cd0dca,http://arxiv.org/abs/1606.04145v1 15528," After experimentation with other designs, the major search engines converged on the weighted, generalized second-price auction (wGSP) for selling keyword advertisements. Notably, this convergence occurred before position auctions were well understood (or, indeed, widely studied) theoretically. While much progress has been made since, theoretical analysis is still not able to settle the question of why search engines found wGSP preferable to other position auctions. We approach this question in a new way, adopting a new analytical paradigm we dub ""computational mechanism analysis."" By sampling position auction games from a given distribution, encoding them in a computationally efficient representation language, computing their Nash equilibria, and then calculating economic quantities of interest, we can quantitatively answer questions that theoretical methods have not. We considered seven widely studied valuation models from the literature and three position auction variants (generalized first price, unweighted generalized second price, and wGSP). We found that wGSP consistently showed the best ads of any position auction, measured both by social welfare and by relevance (expected number of clicks). Even in models where wGSP was already known to have bad worse-case efficiency, we found that it almost always performed well on average. In contrast, we found that revenue was extremely variable across auction mechanisms, and was highly sensitive to equilibrium selection, the preference model, and the valuation distribution. ",david thompson,,2014.0,,arXiv,Thompson2014,True,,arXiv,Not available,Computational Analysis of Perfect-Information Position Auctions,f3a38c36eed541cde0a0c52c6d2ed0bb,http://arxiv.org/abs/1408.0703v1 15529," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",zhihao tang,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 15530," After experimentation with other designs, the major search engines converged on the weighted, generalized second-price auction (wGSP) for selling keyword advertisements. Notably, this convergence occurred before position auctions were well understood (or, indeed, widely studied) theoretically. While much progress has been made since, theoretical analysis is still not able to settle the question of why search engines found wGSP preferable to other position auctions. We approach this question in a new way, adopting a new analytical paradigm we dub ""computational mechanism analysis."" By sampling position auction games from a given distribution, encoding them in a computationally efficient representation language, computing their Nash equilibria, and then calculating economic quantities of interest, we can quantitatively answer questions that theoretical methods have not. We considered seven widely studied valuation models from the literature and three position auction variants (generalized first price, unweighted generalized second price, and wGSP). We found that wGSP consistently showed the best ads of any position auction, measured both by social welfare and by relevance (expected number of clicks). Even in models where wGSP was already known to have bad worse-case efficiency, we found that it almost always performed well on average. In contrast, we found that revenue was extremely variable across auction mechanisms, and was highly sensitive to equilibrium selection, the preference model, and the valuation distribution. ",kevin leyton-brown,,2014.0,,arXiv,Thompson2014,True,,arXiv,Not available,Computational Analysis of Perfect-Information Position Auctions,f3a38c36eed541cde0a0c52c6d2ed0bb,http://arxiv.org/abs/1408.0703v1 15534," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",di he,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 15535," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",wei chen,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 15536," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",liwei wang,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 15537," Sponsored search is an important monetization channel for search engines, in which an auction mechanism is used to select the ads shown to users and determine the prices charged from advertisers. There have been several pieces of work in the literature that investigate how to design an auction mechanism in order to optimize the revenue of the search engine. However, due to some unrealistic assumptions used, the practical values of these studies are not very clear. In this paper, we propose a novel \emph{game-theoretic machine learning} approach, which naturally combines machine learning and game theory, and learns the auction mechanism using a bilevel optimization framework. In particular, we first learn a Markov model from historical data to describe how advertisers change their bids in response to an auction mechanism, and then for any given auction mechanism, we use the learnt model to predict its corresponding future bid sequences. Next we learn the auction mechanism through empirical revenue maximization on the predicted bid sequences. We show that the empirical revenue will converge when the prediction period approaches infinity, and a Genetic Programming algorithm can effectively optimize this empirical revenue. Our experiments indicate that the proposed approach is able to produce a much more effective auction mechanism than several baselines. ",tie-yan liu,,2014.0,,arXiv,He2014,True,,arXiv,Not available,"A Game-theoretic Machine Learning Approach for Revenue Maximization in Sponsored Search",189538307ca2be05b3fbb83093869248,http://arxiv.org/abs/1406.0728v2 15538," This article introduces differential hybrid games, which combine differential games with hybrid games. In both kinds of games, two players interact with continuous dynamics. The difference is that hybrid games also provide all the features of hybrid systems and discrete games, but only deterministic differential equations. Differential games, instead, provide differential equations with continuous-time game input by both players, but not the luxury of hybrid games, such as mode switches and discrete-time or alternating adversarial interaction. This article augments differential game logic with modalities for the combined dynamics of differential hybrid games. It shows how hybrid games subsume differential games and introduces differential game invariants and differential game variants for proving properties of differential games inductively. ",andre platzer,,2015.0,10.1145/3091123,"ACM Transactions on Computational Logic 18(3), pages 19:1-19:44, 2017",Platzer2015,True,,arXiv,Not available,Differential Hybrid Games,cdfe5c5bffc813d2ff0bb9e690530d18,http://arxiv.org/abs/1507.04943v3 15539," Subtraction games is a class of combinatorial games. It was solved since the Sprague-Grundy Theory was put forward. This paper described a new algorithm for subtraction games. The new algorithm can find win or lost positions in subtraction games. In addition, it is much simpler than Sprague-Grundy Theory in one pile of the games. ",guanglei he,,2012.0,,arXiv,He2012,True,,arXiv,Not available,A New Algorithm for the Subtraction Games,aa3120e9378b2ffa1eda7e8c2f2ea4bd,http://arxiv.org/abs/1208.3832v2 15540," We consider two canonical Bayesian mechanism design settings. In the single-item setting, we prove tight approximation ratio for anonymous pricing: compared with Myerson Auction, it extracts at least $\frac{1}{2.62}$-fraction of revenue; there is a matching lower-bound example. In the unit-demand single-buyer setting, we prove tight approximation ratio between the simplest and optimal deterministic mechanisms: in terms of revenue, uniform pricing admits a $2.62$-approximation of item pricing; we further validate the tightness of this ratio. These results settle two open problems asked in~\cite{H13,CD15,AHNPY15,L17,JLTX18}. As an implication, in the single-item setting: we improve the approximation ratio of the second-price auction with anonymous reserve to $2.62$, which breaks the state-of-the-art upper bound of $e \approx 2.72$. ",tao xiao,,2018.0,,arXiv,Jin2018,True,,arXiv,Not available,Tight Approximation Ratio of Anonymous Pricing,c48a204045ce0807eb20a5cfb8499dd9,http://arxiv.org/abs/1811.00763v1 15541," Subtraction games is a class of combinatorial games. It was solved since the Sprague-Grundy Theory was put forward. This paper described a new algorithm for subtraction games. The new algorithm can find win or lost positions in subtraction games. In addition, it is much simpler than Sprague-Grundy Theory in one pile of the games. ",zhihui qin,,2012.0,,arXiv,He2012,True,,arXiv,Not available,A New Algorithm for the Subtraction Games,aa3120e9378b2ffa1eda7e8c2f2ea4bd,http://arxiv.org/abs/1208.3832v2 15542," This book summarizes ongoing research introducing probability space isomorphic mappings into the strategy spaces of game theory. This approach is motivated by discrepancies between probability theory and game theory when applied to the same strategic situation. In particular, probability theory and game theory can disagree on calculated values of the Fisher information, the log likelihood function, entropy gradients, the rank and Jacobian of variable transforms, and even the dimensionality and volume of the underlying probability parameter spaces. These differences arise as probability theory employs structure preserving isomorphic mappings when constructing strategy spaces to analyze games. In contrast, game theory uses weaker mappings which change some of the properties of the underlying probability distributions within the mixed strategy space. Here, we explore how using strong isomorphic mappings to define game strategy spaces can alter rational outcomes in simple games . Specific example games considered are the chain store paradox, the trust game, the ultimatum game, the public goods game, the centipede game, and the iterated prisoner's dilemma. In general, our approach provides rational outcomes which are consistent with observed human play and might thereby resolve some of the paradoxes of game theory. ",michael gagen,,2013.0,,arXiv,Gagen2013,True,,arXiv,Not available,Isomorphic Strategy Spaces in Game Theory,6fca6c24cb4404d8bd8e689594bbd1f4,http://arxiv.org/abs/1304.5620v1 15543," We begin by reviewing and proving the basic facts of combinatorial game theory. We then consider scoring games (also known as Milnor games or positional games), focusing on the ""fixed-length"" games for which all sequences of play terminate after the same number of moves. The theory of fixed-length scoring games is shown to have properties similar to the theory of loopy combinatorial games, with operations similar to onsides and offsides. We give a complete description of the structure of fixed-length scoring games in terms of the class of short partizan games. We also consider fixed-length scoring games taking values in the two-element boolean algebra, and classify these games up to indistinguishability. We then apply these results to analyze some positions in the knotting-unknotting game of Pechenik, Townsend, Henrich, MacNaughton, and Silversmith. ",will johnson,,2011.0,,arXiv,Johnson2011,True,,arXiv,Not available,"Combinatorial Game Theory, Well-Tempered Scoring Games, and a Knot Game",1e5500b393b2ebadb9b67993b5c71d77,http://arxiv.org/abs/1107.5092v1 15544," This is the study of game comparison in \emph{combinatorial game spaces}, and their sub-spaces, called \emph{universes} of games. The concept of a combinatorial game space allows for a general framework, which includes many standard classes of terminating games. In an \emph{absolute} universe, it is shown that the comparison of two games need only include followers of the two and atomic games instead of all games. This leads to a constructive game comparison for studied absolute universes (e.g. Milnor, Conway, Ettinger, Siegel, Milley and Renault). On the way, we introduce the dicot \emph{kernel} of a game space, and show how to construct infinitely many absolute universes, by extending specifically the mis\`ere kernel. ",urban larsson,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,Absolute Combinatorial Game Theory,3a9a5487778424aec823de0bdd5b1f80,http://arxiv.org/abs/1606.01975v1 15545," This is the study of game comparison in \emph{combinatorial game spaces}, and their sub-spaces, called \emph{universes} of games. The concept of a combinatorial game space allows for a general framework, which includes many standard classes of terminating games. In an \emph{absolute} universe, it is shown that the comparison of two games need only include followers of the two and atomic games instead of all games. This leads to a constructive game comparison for studied absolute universes (e.g. Milnor, Conway, Ettinger, Siegel, Milley and Renault). On the way, we introduce the dicot \emph{kernel} of a game space, and show how to construct infinitely many absolute universes, by extending specifically the mis\`ere kernel. ",richard nowakowski,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,Absolute Combinatorial Game Theory,3a9a5487778424aec823de0bdd5b1f80,http://arxiv.org/abs/1606.01975v1 15546," This is the study of game comparison in \emph{combinatorial game spaces}, and their sub-spaces, called \emph{universes} of games. The concept of a combinatorial game space allows for a general framework, which includes many standard classes of terminating games. In an \emph{absolute} universe, it is shown that the comparison of two games need only include followers of the two and atomic games instead of all games. This leads to a constructive game comparison for studied absolute universes (e.g. Milnor, Conway, Ettinger, Siegel, Milley and Renault). On the way, we introduce the dicot \emph{kernel} of a game space, and show how to construct infinitely many absolute universes, by extending specifically the mis\`ere kernel. ",carlos santos,,2016.0,,arXiv,Larsson2016,True,,arXiv,Not available,Absolute Combinatorial Game Theory,3a9a5487778424aec823de0bdd5b1f80,http://arxiv.org/abs/1606.01975v1 15547," The aim of this paper is to bring together the notions of quantum game and game isomorphism. The work is intended as an attempt to introduce a new criterion for quantum game schemes. The generally accepted requirement forces a quantum scheme to generate the classical game in a particular case. Now, given a quantum game scheme and two isomorphic classical games, we additionally require the resulting quantum games to be isomorphic as well. We are concerned with the Eisert-Wilkens-Lewenstein quantum game scheme and the strong isomorphism between games in strategic form. ",piotr frackiewicz,,2017.0,10.1155/2016/4180864,"Advances in Mathematical Physics Vol. 2016, Article ID 4180864",Frackiewicz2017,True,,arXiv,Not available,Strong isomorphism in Eisert-Wilkens-Lewenstein type quantum games,896470a94e26941666bd7ee10463c7ea,http://arxiv.org/abs/1701.05633v1 15548," Our purpose is to focus attention on a new criterion for quantum schemes by bringing together the notions of quantum game and game isomorphism. A quantum game scheme is required to generate the classical game as a special case. Now, given a quantum game scheme and two isomorphic classical games, we additionally require the resulting quantum games to be isomorphic as well. We show how this isomorphism condition influences the players' strategy sets. We are concerned with the Marinatto-Weber type quantum game scheme and the strong isomorphism between games in strategic form. ",piotr frackiewicz,,2017.0,,arXiv,Frąckiewicz2017,True,,arXiv,Not available,Strong isomorphism in Marinatto-Weber type quantum games,f5f915462331f55df006755d7f310a82,http://arxiv.org/abs/1701.06100v1 15549," In this paper, we will be proving mathematically that scoring play combinatorial game theory covers all combinatorial games. That is, there is a sub-set of scoring play games that are identical to the set of normal play games, and a different sub-set that is identical to the set of mis\`ere play games. This proves conclusively, that scoring play combinatorial game theory is a complete theory for combinatorial games, and that every combinatorial game, regardless of the rule-set, can be analysed using scoring play combinatorial game theory. ",fraser stewart,,2013.0,,arXiv,Stewart2013,True,,arXiv,Not available,Tame and Wild Scoring Play Games,26da9830cec63234b59cdcf3987ea55f,http://arxiv.org/abs/1303.4275v1 15550," We consider the class of ""well-tempered"" integer-valued scoring games, which have the property that the parity of the length of the game is independent of the line of play. We consider disjunctive sums of these games, and develop a theory for them analogous to the standard theory of disjunctive sums of normal-play partizan games. We show that the monoid of well-tempered scoring games modulo indistinguishability is cancellative but not a group, and we describe its structure in terms of the group of normal-play partizan games. We also classify Boolean-valued well-tempered scoring games, showing that there are exactly seventy, up to equivalence. ",will johnson,,2011.0,,arXiv,Johnson2011,True,,arXiv,Not available,The Combinatorial Game Theory of Well-Tempered Scoring Games,df03a63e91e11bd6ccdd7f6203cc2285,http://arxiv.org/abs/1112.3610v1 15551," In the Bitcoin system, miners are incentivized to join the system and validate transactions through fees paid by the users. A simple ""pay your bid"" auction has been employed to determine the transaction fees. Recently, Lavi, Sattath and Zohar [LSZ17] proposed an alternative fee design, called the monopolistic price (MP) mechanism, aimed at improving the revenue for the miners. Although MP is not strictly incentive compatible (IC), they studied how close to IC the mechanism is for iid distributions, and conjectured that it is nearly IC asymptotically based on extensive simulations and some analysis. In this paper, we prove that the MP mechanism is nearly incentive compatible for any iid distribution as the number of users grows large. This holds true with respect to other attacks such as splitting bids. We also prove a conjecture in [LSZ17] that MP dominates the RSOP auction in revenue (originally defined in Goldberg et al. [GHKSW06] for digital goods). These results lend support to MP as a Bitcoin fee design candidate. Additionally, we explore some possible intrinsic correlations between incentive compatibility and revenue in general. ",andrew yao,,2018.0,,arXiv,Yao2018,True,,arXiv,Not available,An Incentive Analysis of some Bitcoin Fee Designs,a9c4846bdcc13120b469b3f6d86008c8,http://arxiv.org/abs/1811.02351v3 15552," In {\em set-system auctions}, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The buyer's goal is to hire a team and pay as little as possible. Recently, Karlin, Kempe and Tamir introduced a new definition of {\em frugality ratio} for this setting. Informally, the frugality ratio is the ratio of the total payment of a mechanism to perceived fair cost. In this paper, we study this together with alternative notions of fair cost, and how the resulting frugality ratios relate to each other for various kinds of set systems. We propose a new truthful polynomial-time auction for the vertex cover problem (where the feasible sets correspond to the vertex covers of a given graph), based on the {\em local ratio} algorithm of Bar-Yehuda and Even. The mechanism guarantees to find a winning set whose cost is at most twice the optimal. In this situation, even though it is NP-hard to find a lowest-cost feasible set, we show that {\em local optimality} of a solution can be used to derive frugality bounds that are within a constant factor of best possible. To prove this result, we use our alternative notions of frugality via a bootstrapping technique, which may be of independent interest. ",edith elkind,,2006.0,,arXiv,Elkind2006,True,,arXiv,Not available,Frugality ratios and improved truthful mechanisms for vertex cover,ca32526560af60bc6bfef95880ca3cf3,http://arxiv.org/abs/cs/0606044v4 15553," In {\em set-system auctions}, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The buyer's goal is to hire a team and pay as little as possible. Recently, Karlin, Kempe and Tamir introduced a new definition of {\em frugality ratio} for this setting. Informally, the frugality ratio is the ratio of the total payment of a mechanism to perceived fair cost. In this paper, we study this together with alternative notions of fair cost, and how the resulting frugality ratios relate to each other for various kinds of set systems. We propose a new truthful polynomial-time auction for the vertex cover problem (where the feasible sets correspond to the vertex covers of a given graph), based on the {\em local ratio} algorithm of Bar-Yehuda and Even. The mechanism guarantees to find a winning set whose cost is at most twice the optimal. In this situation, even though it is NP-hard to find a lowest-cost feasible set, we show that {\em local optimality} of a solution can be used to derive frugality bounds that are within a constant factor of best possible. To prove this result, we use our alternative notions of frugality via a bootstrapping technique, which may be of independent interest. ",leslie goldberg,,2006.0,,arXiv,Elkind2006,True,,arXiv,Not available,Frugality ratios and improved truthful mechanisms for vertex cover,ca32526560af60bc6bfef95880ca3cf3,http://arxiv.org/abs/cs/0606044v4 15554," In {\em set-system auctions}, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The buyer's goal is to hire a team and pay as little as possible. Recently, Karlin, Kempe and Tamir introduced a new definition of {\em frugality ratio} for this setting. Informally, the frugality ratio is the ratio of the total payment of a mechanism to perceived fair cost. In this paper, we study this together with alternative notions of fair cost, and how the resulting frugality ratios relate to each other for various kinds of set systems. We propose a new truthful polynomial-time auction for the vertex cover problem (where the feasible sets correspond to the vertex covers of a given graph), based on the {\em local ratio} algorithm of Bar-Yehuda and Even. The mechanism guarantees to find a winning set whose cost is at most twice the optimal. In this situation, even though it is NP-hard to find a lowest-cost feasible set, we show that {\em local optimality} of a solution can be used to derive frugality bounds that are within a constant factor of best possible. To prove this result, we use our alternative notions of frugality via a bootstrapping technique, which may be of independent interest. ",paul goldberg,,2006.0,,arXiv,Elkind2006,True,,arXiv,Not available,Frugality ratios and improved truthful mechanisms for vertex cover,ca32526560af60bc6bfef95880ca3cf3,http://arxiv.org/abs/cs/0606044v4 15555," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",christos papadimitriou,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 15556," We revisit the problem of designing the profit-maximizing single-item auction, solved by Myerson in his seminal paper for the case in which bidder valuations are independently distributed. We focus on general joint distributions, seeking the optimal deterministic incentive compatible auction. We give a geometric characterization of the optimal auction, resulting in a duality theorem and an efficient algorithm for finding the optimal deterministic auction in the two-bidder case and an NP-completeness result for three or more bidders. ",george pierrakos,,2010.0,,arXiv,Papadimitriou2010,True,,arXiv,Not available,Optimal Deterministic Auctions with Correlated Priors,db1175e91dfe98358499c521cd759744,http://arxiv.org/abs/1011.1279v2 15557," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",oren ben-zwi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15558," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ron lavi,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15559," We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in a Walrasian equilibrium. ",ilan newman,,2013.0,,arXiv,Ben-Zwi2013,True,,arXiv,Not available,Ascending auctions and Walrasian equilibrium,9f23d76155d1304eeffa6fb5291fb90a,http://arxiv.org/abs/1301.1153v3 15560," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",neil newman,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15561," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",kevin leyton-brown,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15562," Distributed adaptive filtering has been considered as an effective approach for data processing and estimation over distributed networks. Most existing distributed adaptive filtering algorithms focus on designing different information diffusion rules, regardless of the nature evolutionary characteristic of a distributed network. In this paper, we study the adaptive network from the game theoretic perspective and formulate the distributed adaptive filtering problem as a graphical evolutionary game. With the proposed formulation, the nodes in the network are regarded as players and the local combiner of estimation information from different neighbors is regarded as different strategies selection. We show that this graphical evolutionary game framework is very general and can unify the existing adaptive network algorithms. Based on this framework, as examples, we further propose two error-aware adaptive filtering algorithms. Moreover, we use graphical evolutionary game theory to analyze the information diffusion process over the adaptive networks and evolutionarily stable strategy of the system. Finally, simulation results are shown to verify the effectiveness of our analysis and proposed methods. ",yan chen,,2012.0,10.1109/TSP.2013.2280444,arXiv,Jiang2012,True,,arXiv,Not available,"Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View",82e18e62ceb309db96f05e5f39bad84c,http://arxiv.org/abs/1212.1245v2 15563," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",yanru zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 15564," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",paul milgrom,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15565," We investigate the economic outcomes that result under simulated bidder behavior in a model of the FCC's reverse auction for radio spectrum. In our simulations, limiting our notion of efficiency to the reverse auction in isolation, the reverse clock auction achieves very efficient solutions, the FCC's scoring rule greatly reduces the total payments to TV broadcasters at the cost of some efficiency, and using a poor feasibility checker can have grave consequences both in terms of the auction's cost and efficiency. ",ilya segal,,2017.0,,arXiv,Newman2017,True,,arXiv,Not available,"Assessing Economic Outcomes in Simulated Reverse Clock Auctions for Radio Spectrum",ecd81eda6a13b468cb0625b11d80a790,http://arxiv.org/abs/1706.04324v1 15566," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",zhili chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15567," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",liusheng huang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15568," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",lu li,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15569," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",wei yang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15570," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",haibo miao,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15571," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",miaomiao tian,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15572," Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible. ",fei wang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions,513817c47fac4d50aed016bdac9c844d,http://arxiv.org/abs/1307.7433v1 15573," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",sujit gujar,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 15574," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",lingyang song,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 15575," The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility. ",y narahari,,2009.0,,arXiv,Gujar2009,True,,arXiv,Not available,"An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders",a24e9bf27e5428df2fc30ad888ee90f5,http://arxiv.org/abs/0902.0524v3 15576," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",ning chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 15577," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",nick gravin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 15578," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",pinyan lu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 15579," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",michal feldman,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15580," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",nicole immorlica,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15581," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",brendan lucier,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15582," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",tim roughgarden,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15583," Game-theoretic models relevant for computer science applications usually feature a large number of players. The goal of this paper is to develop an analytical framework for bounding the price of anarchy in such models. We demonstrate the wide applicability of our framework through instantiations for several well-studied models, including simultaneous single-item auctions, greedy combinatorial auctions, and routing games. In all cases, we identify conditions under which the POA of large games is much better than that of worst-case instances. Our results also give new senses in which simple auctions can perform almost as well as optimal ones in realistic settings. ",vasilis syrgkanis,,2015.0,,arXiv,Feldman2015,True,,arXiv,Not available,The Price of Anarchy in Large Games,cc2d5e36e476d9dec9f804d721f93269,http://arxiv.org/abs/1503.04755v2 15584," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",darrell hoy,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 15585," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",miao pan,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 15586," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",kamal jain,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 15587," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",christopher wilkens,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 15588," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",jamie morgenstern,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 15589," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",tim roughgarden,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 15590," This paper describes a study of agent bidding strategies, assuming combinatorial valuations for complementary and substitutable goods, in three auction environments: sequential auctions, simultaneous auctions, and the Trading Agent Competition (TAC) Classic hotel auction design, a hybrid of sequential and simultaneous auctions. The problem of bidding in sequential auctions is formulated as an MDP, and it is argued that expected marginal utility bidding is the optimal bidding policy. The problem of bidding in simultaneous auctions is formulated as a stochastic program, and it is shown by example that marginal utility bidding is not an optimal bidding policy, even in deterministic settings. Two alternative methods of approximating a solution to this stochastic program are presented: the first method, which relies on expected values, is optimal in deterministic environments; the second method, which samples the nondeterministic environment, is asymptotically optimal as the number of samples tends to infinity. Finally, experiments with these various bidding policies are described in the TAC Classic setting. ",amy greenwald,,2012.0,,arXiv,Greenwald2012,True,,arXiv,Not available,Bidding under Uncertainty: Theory and Experiments,dbd48c8c55e316a5932a641d9c4b28f5,http://arxiv.org/abs/1207.4108v1 15591," This paper describes a study of agent bidding strategies, assuming combinatorial valuations for complementary and substitutable goods, in three auction environments: sequential auctions, simultaneous auctions, and the Trading Agent Competition (TAC) Classic hotel auction design, a hybrid of sequential and simultaneous auctions. The problem of bidding in sequential auctions is formulated as an MDP, and it is argued that expected marginal utility bidding is the optimal bidding policy. The problem of bidding in simultaneous auctions is formulated as a stochastic program, and it is shown by example that marginal utility bidding is not an optimal bidding policy, even in deterministic settings. Two alternative methods of approximating a solution to this stochastic program are presented: the first method, which relies on expected values, is optimal in deterministic environments; the second method, which samples the nondeterministic environment, is asymptotically optimal as the number of samples tends to infinity. Finally, experiments with these various bidding policies are described in the TAC Classic setting. ",justin boyan,,2012.0,,arXiv,Greenwald2012,True,,arXiv,Not available,Bidding under Uncertainty: Theory and Experiments,dbd48c8c55e316a5932a641d9c4b28f5,http://arxiv.org/abs/1207.4108v1 15592," Quitting games are one of the simplest stochastic games in which at any stage each player has only two possible actions, continue and quit. The game ends as soon as at least one player chooses to quit. The players then receive a payoff, which depends on the set of players that did choose to quit. If the game never ends, the payoff to each player is zero. For analysis of quitting games the so called one-step games are used. Important properties of the expected payoff and of equilibria in one-step games are stated. Furthermore some relations between equilibria in one-step games and equilibria in quitting games are considered. This analysis of the structure of quitting games and the related one-step games should provide a basis for an implementation of an algorithm that detect equilibria in Quitting Games. ",katharina fischer,,2011.0,,arXiv,Fischer2011,True,,arXiv,Not available,Equilibria in Quitting Games - Basics,eb10ab1d723f44795bfd6a2106e89d32,http://arxiv.org/abs/1101.2337v1 15593," Gamification is an emerging design principle for information systems where game design elements are applied to non-game contexts. IS researchers have suggested that the IS discipline must study this area but there are other applications such as serious games, and simulations that also use games in non-game contexts. Specifically, the management field has been using games and simulations for years and these applications are now being supported by information systems. We propose in this paper that we must think beyond gamification, towards other uses of games in non-gaming contexts, which we call purposeful gaming. In this paper we identify how the IS discipline can adapt to purposeful gaming. Specifically, we show how IT artifacts, IS design, and IS theories can be used in the purposeful gaming area. We also provide three conceptual dimensions of purposeful gaming that can aid IS practitioners and researchers to classify and understand purposeful games. ",kafui monu,,2013.0,,arXiv,Monu2013,True,,arXiv,Not available,"Beyond Gamification: Implications of Purposeful Games for the Information Systems Discipline",1cf22989551f94adb803f45cdbf4273b,http://arxiv.org/abs/1308.1042v1 15594," Gamification is an emerging design principle for information systems where game design elements are applied to non-game contexts. IS researchers have suggested that the IS discipline must study this area but there are other applications such as serious games, and simulations that also use games in non-game contexts. Specifically, the management field has been using games and simulations for years and these applications are now being supported by information systems. We propose in this paper that we must think beyond gamification, towards other uses of games in non-gaming contexts, which we call purposeful gaming. In this paper we identify how the IS discipline can adapt to purposeful gaming. Specifically, we show how IT artifacts, IS design, and IS theories can be used in the purposeful gaming area. We also provide three conceptual dimensions of purposeful gaming that can aid IS practitioners and researchers to classify and understand purposeful games. ",paul ralph,,2013.0,,arXiv,Monu2013,True,,arXiv,Not available,"Beyond Gamification: Implications of Purposeful Games for the Information Systems Discipline",1cf22989551f94adb803f45cdbf4273b,http://arxiv.org/abs/1308.1042v1 15595," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",mona rahn,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 15596," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",zaher dawy,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 15597," We introduce a new class of games, called social contribution games (SCGs), where each player's individual cost is equal to the cost he induces on society because of his presence. Our results reveal that SCGs constitute useful abstractions of altruistic games when it comes to the analysis of the robust price of anarchy. We first show that SCGs are altruism-independently smooth, i.e., the robust price of anarchy of these games remains the same under arbitrary altruistic extensions. We then devise a general reduction technique that enables us to reduce the problem of establishing smoothness for an altruistic extension of a base game to a corresponding SCG. Our reduction applies whenever the base game relates to a canonical SCG by satisfying a simple social contribution boundedness property. As it turns out, several well-known games satisfy this property and are thus amenable to our reduction technique. Examples include min-sum scheduling games, congestion games, second price auctions and valid utility games. Using our technique, we derive mostly tight bounds on the robust price of anarchy of their altruistic extensions. For the majority of the mentioned game classes, the results extend to the more differentiated friendship setting. As we show, our reduction technique covers this model if the base game satisfies three additional natural properties. ",guido schafer,,2013.0,,arXiv,Rahn2013,True,,arXiv,Not available,Bounding the Inefficiency of Altruism Through Social Contribution Games,4c24aad216959f9b0c63da01ffad5c9d,http://arxiv.org/abs/1308.2497v1 15598," We define solution concepts appropriate for computationally bounded players playing a fixed finite game. To do so, we need to define what it means for a \emph{computational game}, which is a sequence of games that get larger in some appropriate sense, to represent a single finite underlying extensive-form game. Roughly speaking, we require all the games in the sequence to have essentially the same structure as the underlying game, except that two histories that are indistinguishable (i.e., in the same information set) in the underlying game may correspond to histories that are only computationally indistinguishable in the computational game. We define a computational version of both Nash equilibrium and sequential equilibrium for computational games, and show that every Nash (resp., sequential) equilibrium in the underlying game corresponds to a computational Nash (resp., sequential) equilibrium in the computational game. One advantage of our approach is that if a cryptographic protocol represents an abstract game, then we can analyze its strategic behavior in the abstract game, and thus separate the cryptographic analysis of the protocol from the strategic analysis. ",joseph halpern,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,Computational Extensive-Form Games,86b14748243e4c47341d79f9c6f0ec67,http://arxiv.org/abs/1506.03030v1 15599," We define solution concepts appropriate for computationally bounded players playing a fixed finite game. To do so, we need to define what it means for a \emph{computational game}, which is a sequence of games that get larger in some appropriate sense, to represent a single finite underlying extensive-form game. Roughly speaking, we require all the games in the sequence to have essentially the same structure as the underlying game, except that two histories that are indistinguishable (i.e., in the same information set) in the underlying game may correspond to histories that are only computationally indistinguishable in the computational game. We define a computational version of both Nash equilibrium and sequential equilibrium for computational games, and show that every Nash (resp., sequential) equilibrium in the underlying game corresponds to a computational Nash (resp., sequential) equilibrium in the computational game. One advantage of our approach is that if a cryptographic protocol represents an abstract game, then we can analyze its strategic behavior in the abstract game, and thus separate the cryptographic analysis of the protocol from the strategic analysis. ",rafael pass,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,Computational Extensive-Form Games,86b14748243e4c47341d79f9c6f0ec67,http://arxiv.org/abs/1506.03030v1 15600," We define solution concepts appropriate for computationally bounded players playing a fixed finite game. To do so, we need to define what it means for a \emph{computational game}, which is a sequence of games that get larger in some appropriate sense, to represent a single finite underlying extensive-form game. Roughly speaking, we require all the games in the sequence to have essentially the same structure as the underlying game, except that two histories that are indistinguishable (i.e., in the same information set) in the underlying game may correspond to histories that are only computationally indistinguishable in the computational game. We define a computational version of both Nash equilibrium and sequential equilibrium for computational games, and show that every Nash (resp., sequential) equilibrium in the underlying game corresponds to a computational Nash (resp., sequential) equilibrium in the computational game. One advantage of our approach is that if a cryptographic protocol represents an abstract game, then we can analyze its strategic behavior in the abstract game, and thus separate the cryptographic analysis of the protocol from the strategic analysis. ",lior seeman,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,Computational Extensive-Form Games,86b14748243e4c47341d79f9c6f0ec67,http://arxiv.org/abs/1506.03030v1 15601," We introduce quantitative reductions, a novel technique for structuring the space of quantitative games and solving them that does not rely on a reduction to qualitative games. We show that such reductions exhibit the same desirable properties as their qualitative counterparts and additionally retain the optimality of solutions. Moreover, we introduce vertex-ranked games as a general-purpose target for quantitative reductions and show how to solve them. In such games, the value of a play is determined only by a qualitative winning condition and a ranking of the vertices. We provide quantitative reductions of quantitative request-response games to vertex-ranked games, thus showing ExpTime-completeness of solving the former games. Moreover, we reduce quantitative Muller games to vertex-ranked games, yielding a new proof of ExpTime-membership of the problem of solving the former games. Furthermore, we exhibit the usefulness and flexibility of vertex-ranked games by showing how to use such games to compute fault-resilient strategies for safety specifications. This work lays the foundation for a general study of fault-resilient strategies for more complex winning conditions. ",alexander weinert,,2017.0,,arXiv,Weinert2017,True,,arXiv,Not available,Quantitative Reductions and Vertex-Ranked Infinite Games (Full Version),78f8b41067db135039250d783ba9d9ba,http://arxiv.org/abs/1704.00904v2 15602," Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers. ",walid saad,,2009.0,10.1109/MSP.2009.000000,arXiv,Saad2009,True,,arXiv,Not available,Coalitional Game Theory for Communication Networks: A Tutorial,e00c3b73edf0eed38f40d18f4322fb7b,http://arxiv.org/abs/0905.4057v1 15603," Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers. ",zhu han,,2009.0,10.1109/MSP.2009.000000,arXiv,Saad2009,True,,arXiv,Not available,Coalitional Game Theory for Communication Networks: A Tutorial,e00c3b73edf0eed38f40d18f4322fb7b,http://arxiv.org/abs/0905.4057v1 15604," Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers. ",merouane debbah,,2009.0,10.1109/MSP.2009.000000,arXiv,Saad2009,True,,arXiv,Not available,Coalitional Game Theory for Communication Networks: A Tutorial,e00c3b73edf0eed38f40d18f4322fb7b,http://arxiv.org/abs/0905.4057v1 15605," Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers. ",are hjorungnes,,2009.0,10.1109/MSP.2009.000000,arXiv,Saad2009,True,,arXiv,Not available,Coalitional Game Theory for Communication Networks: A Tutorial,e00c3b73edf0eed38f40d18f4322fb7b,http://arxiv.org/abs/0905.4057v1 15606," Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study the behavior and interactions of the nodes in future communication networks. In this context, this tutorial introduces the concepts of cooperative game theory, namely coalitional games, and their potential applications in communication and wireless networks. For this purpose, we classify coalitional games into three categories: Canonical coalitional games, coalition formation games, and coalitional graph games. This new classification represents an application-oriented approach for understanding and analyzing coalitional games. For each class of coalitional games, we present the fundamental components, introduce the key properties, mathematical techniques, and solution concepts, and describe the methodologies for applying these games in several applications drawn from the state-of-the-art research in communications. In a nutshell, this article constitutes a unified treatment of coalitional game theory tailored to the demands of communications and network engineers. ",tamer basar,,2009.0,10.1109/MSP.2009.000000,arXiv,Saad2009,True,,arXiv,Not available,Coalitional Game Theory for Communication Networks: A Tutorial,e00c3b73edf0eed38f40d18f4322fb7b,http://arxiv.org/abs/0905.4057v1 15607," In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential ""buyers"", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present. ",zhu han,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard",d68750d1c38b256023e439b85a54cb6b,http://arxiv.org/abs/1709.08317v1 15608," Traditionally social sciences are interested in structuring people in multiple groups based on their individual preferences. This pa- per suggests an approach to this problem in the framework of a non- cooperative game theory. Definition of a suggested finite game includes a family of nested simultaneous non-cooperative finite games with intra- and inter-coalition externalities. In this family, games differ by the size of maximum coalition, partitions and by coalition structure formation rules. A result of every game consists of partition of players into coalitions and a payoff? profiles for every player. Every game in the family has an equilibrium in mixed strategies with possibly more than one coalition. The results of the game differ from those conventionally discussed in cooperative game theory, e.g. the Shapley value, strong Nash, coalition-proof equilibrium, core, kernel, nucleolus. We discuss the following applications of the new game: cooperation as an allocation in one coalition, Bayesian games, stochastic games and construction of a non-cooperative criterion of coalition structure stability for studying focal points. ",dmitry levando,,2017.0,,arXiv,Levando2017,True,,arXiv,Not available,Formation of coalition structures as a non-cooperative game,e3015e55cd3638adbbe6db35e7c38fb6,http://arxiv.org/abs/1702.06922v2 15609," From the standpoint of game theory, dominoes is a game that has not received much attention (specially the variety known as draw). It is usually thought that this game is already solved, given general results in game theory. However, the determination of equilibria is not feasible for the general case because of the well known problem of node explosion in the tree expressing the game. We propose a new model based in limited forecast as a kind of bounded rationality for dynamic alternate games. ",eduardo espinosa-avila,,2013.0,,arXiv,Espinosa-Avila2013,True,,arXiv,Not available,Bounded rationality in a dynamic alternate game,519f158fabb1f6d3e9028b1a78353ca7,http://arxiv.org/abs/1310.6411v1 15610," From the standpoint of game theory, dominoes is a game that has not received much attention (specially the variety known as draw). It is usually thought that this game is already solved, given general results in game theory. However, the determination of equilibria is not feasible for the general case because of the well known problem of node explosion in the tree expressing the game. We propose a new model based in limited forecast as a kind of bounded rationality for dynamic alternate games. ",francisco hernandez-quiroz,,2013.0,,arXiv,Espinosa-Avila2013,True,,arXiv,Not available,Bounded rationality in a dynamic alternate game,519f158fabb1f6d3e9028b1a78353ca7,http://arxiv.org/abs/1310.6411v1 15611," The game theory techniques are used to find the equilibrium of a market. Game theory refers to the ways in which strategic interactions among economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. The oligopolistic market structures are taken and how game theory applies to them is explained. ",marx boopathi,,2012.0,,http://www.ijascse.in/publications-2012--2,Boopathi2012,True,,arXiv,Not available,Game Theory in Oligopoly,1796476aeaf3ce28c63cfef35feb0691,http://arxiv.org/abs/1210.6197v1 15612," Motivated by the sequence form formulation of Koller et al. (GEB'96), this paper defines {\em bilinear games}, and proposes efficient algorithms for its rank based subclasses. Bilinear games are two-player non-cooperative single-shot games with compact polytopal strategy sets and two payoff matrices (A,B) such that when (x,y) is the played strategy profile, the payoffs of the players are xAy and xBy respectively. We show that bilinear games are very general and capture many interesting classes of games like bimatrix games, two player Bayesian games, polymatrix games, two-player extensive form games with perfect recall etc. as special cases, and hence are hard to solve in general. Existence of a (symmetric) Nash equilibrium for (symmetric) bilinear games follow directly from the known results. For a given bilinear game, we define its {\em Best Response Polytopes} (BRPs) and characterize the set of Nash equilibria as {\em fully-labeled} pairs in the BRPs. We consider a rank based hierarchy of bilinear games, where rank of a game (A,B) is defined as rank(A+B). In this paper, we give polynomial time algorithms to compute Nash equilibrium for special classes of bilinear games: (i) Rank-1 games (i.e., rank(A+B)=1). (ii) FPTAS for constant rank games (i.e., rank(A+B) is constant). (iii) When rank(A) or rank(B) is constant. This improves the results by Lipton et al. (EC'03) and Kannan et al. (ET'09), for bimatrix games with low rank matrices. ",jugal garg,,2011.0,,arXiv,Garg2011,True,,arXiv,Not available,Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses,049a3de0c1ce337d2582dc38a21004bc,http://arxiv.org/abs/1109.6182v1 15613," Motivated by the sequence form formulation of Koller et al. (GEB'96), this paper defines {\em bilinear games}, and proposes efficient algorithms for its rank based subclasses. Bilinear games are two-player non-cooperative single-shot games with compact polytopal strategy sets and two payoff matrices (A,B) such that when (x,y) is the played strategy profile, the payoffs of the players are xAy and xBy respectively. We show that bilinear games are very general and capture many interesting classes of games like bimatrix games, two player Bayesian games, polymatrix games, two-player extensive form games with perfect recall etc. as special cases, and hence are hard to solve in general. Existence of a (symmetric) Nash equilibrium for (symmetric) bilinear games follow directly from the known results. For a given bilinear game, we define its {\em Best Response Polytopes} (BRPs) and characterize the set of Nash equilibria as {\em fully-labeled} pairs in the BRPs. We consider a rank based hierarchy of bilinear games, where rank of a game (A,B) is defined as rank(A+B). In this paper, we give polynomial time algorithms to compute Nash equilibrium for special classes of bilinear games: (i) Rank-1 games (i.e., rank(A+B)=1). (ii) FPTAS for constant rank games (i.e., rank(A+B) is constant). (iii) When rank(A) or rank(B) is constant. This improves the results by Lipton et al. (EC'03) and Kannan et al. (ET'09), for bimatrix games with low rank matrices. ",albert jiang,,2011.0,,arXiv,Garg2011,True,,arXiv,Not available,Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses,049a3de0c1ce337d2582dc38a21004bc,http://arxiv.org/abs/1109.6182v1 15614," Motivated by the sequence form formulation of Koller et al. (GEB'96), this paper defines {\em bilinear games}, and proposes efficient algorithms for its rank based subclasses. Bilinear games are two-player non-cooperative single-shot games with compact polytopal strategy sets and two payoff matrices (A,B) such that when (x,y) is the played strategy profile, the payoffs of the players are xAy and xBy respectively. We show that bilinear games are very general and capture many interesting classes of games like bimatrix games, two player Bayesian games, polymatrix games, two-player extensive form games with perfect recall etc. as special cases, and hence are hard to solve in general. Existence of a (symmetric) Nash equilibrium for (symmetric) bilinear games follow directly from the known results. For a given bilinear game, we define its {\em Best Response Polytopes} (BRPs) and characterize the set of Nash equilibria as {\em fully-labeled} pairs in the BRPs. We consider a rank based hierarchy of bilinear games, where rank of a game (A,B) is defined as rank(A+B). In this paper, we give polynomial time algorithms to compute Nash equilibrium for special classes of bilinear games: (i) Rank-1 games (i.e., rank(A+B)=1). (ii) FPTAS for constant rank games (i.e., rank(A+B) is constant). (iii) When rank(A) or rank(B) is constant. This improves the results by Lipton et al. (EC'03) and Kannan et al. (ET'09), for bimatrix games with low rank matrices. ",ruta mehta,,2011.0,,arXiv,Garg2011,True,,arXiv,Not available,Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses,049a3de0c1ce337d2582dc38a21004bc,http://arxiv.org/abs/1109.6182v1 15615," In this paper, we introduce a novel approach for reducing the $k$-item $n$-bidder auction with additive valuation to $k$-item $1$-bidder auctions. This approach, called the \emph{Best-Guess} reduction, can be applied to address several central questions in optimal revenue auction theory such as the power of randomization, and Bayesian versus dominant-strategy implementations. First, when the items have independent valuation distributions, we present a deterministic mechanism called {\it Deterministic Best-Guess} that yields at least a constant fraction of the optimal revenue by any randomized mechanism. Second, if all the $nk$ valuation random variables are independent, the optimal revenue achievable in {\it dominant strategy incentive compatibility} (DSIC) is shown to be at least a constant fraction of that achievable in {\it Bayesian incentive compatibility} (BIC). Third, when all the $nk$ values are identically distributed according to a common one-dimensional distribution $F$, the optimal revenue is shown to be expressible in the closed form $\Theta(k(r+\int_0^{mr} (1-F(x)^n) \ud x))$ where $r= sup_{x\geq 0} \, x(1 - F(x)^n)$ and $m=\lceil k/n\rceil$; this revenue is achievable by a simple mechanism called \emph{2nd-Price Bundling}. All our results apply to arbitrary distributions, regular or irregular. ",andrew yao,,2014.0,,arXiv,Yao2014,True,,arXiv,Not available,An n-to-1 Bidder Reduction for Multi-item Auctions and its Applications,b0e9c9a883abfec4cbe77abe92459297,http://arxiv.org/abs/1406.3278v3 15616," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",kevin leyton-brown,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 15617," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",moshe tennenholtz,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 15618," The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity as a Fundamental Metric for Mechanism Design in the Information Economy",57ba0b7a7fef925511ef08b188aee970,http://arxiv.org/abs/0711.1569v1 15619," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",navin bhat,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 15620," We consider the question of whether collusion among bidders (a ""bidding ring"") can be supported in equilibrium of unrepeated first-price auctions. Unlike previous work on the topic such as that by McAfee and McMillan [1992] and Marshall and Marx [2007], we do not assume that non-colluding agents have perfect knowledge about the number of colluding agents whose bids are suppressed by the bidding ring, and indeed even allow for the existence of multiple cartels. Furthermore, while we treat the association of bidders with bidding rings as exogenous, we allow bidders to make strategic decisions about whether to join bidding rings when invited. We identify a bidding ring protocol that results in an efficient allocation in Bayes{Nash equilibrium, under which non-colluding agents bid straightforwardly, and colluding agents join bidding rings when invited and truthfully declare their valuations to the ring center. We show that bidding rings benefit ring centers and all agents, both members and non-members of bidding rings, at the auctioneer's expense. The techniques we introduce in this paper may also be useful for reasoning about other problems in which agents have asymmetric information about a setting. ",yoav shoham,,2002.0,,arXiv,Leyton-Brown2002,True,,arXiv,Not available,"Collusion in Unrepeated, First-Price Auctions with an Uncertain Number of Participants",7d387f0c0ca170efcf1cdab76ee8b21b,http://arxiv.org/abs/cs/0201017v2 15621," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",gagan aggarwal,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 15622," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",s. muthukrishnan,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 15623," Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study ""prefix position auctions"" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an ""envy-free"" or ""symmetric"" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions. ",jon feldman,,2006.0,,arXiv,Aggarwal2006,True,,arXiv,Not available,Bidding to the Top: VCG and Equilibria of Position-Based Auctions,b1b063757993ed3b95360e68e3126732,http://arxiv.org/abs/cs/0607117v1 15624," The bi-objective winner determination problem (2WDP-SC) of a combinatorial procurement auction for transport contracts is characterized by a set B of bundle bids, with each bundle bid b in B consisting of a bidding carrier c_b, a bid price p_b, and a set tau_b transport contracts which is a subset of the set T of tendered transport contracts. Additionally, the transport quality q_{t,c_b} is given which is expected to be realized when a transport contract t is executed by a carrier c_b. The task of the auctioneer is to find a set X of winning bids (X subset B), such that each transport contract is part of at least one winning bid, the total procurement costs are minimized, and the total transport quality is maximized. This article presents a metaheuristic approach for the 2WDP-SC which integrates the greedy randomized adaptive search procedure with a two-stage candidate component selection procedure, large neighborhood search, and self-adaptive parameter setting in order to find a competitive set of non-dominated solutions. The heuristic outperforms all existing approaches. For seven small benchmark instances, the heuristic is the sole approach that finds all Pareto-optimal solutions. For 28 out of 30 large instances, none of the existing approaches is able to compute a solution that dominates a solution found by the proposed heuristic. ",tobias buer,,2012.0,10.1016/j.cor.2013.04.004,"Computers & Operations Research 41 (2014), 208-220",Buer2012,True,,arXiv,Not available,"A Pareto-metaheuristic for a bi-objective winner determination problem in a combinatorial reverse auction",db2db698ee71be3c52a6c6d693607f2e,http://arxiv.org/abs/1201.4342v2 15625," The bi-objective winner determination problem (2WDP-SC) of a combinatorial procurement auction for transport contracts is characterized by a set B of bundle bids, with each bundle bid b in B consisting of a bidding carrier c_b, a bid price p_b, and a set tau_b transport contracts which is a subset of the set T of tendered transport contracts. Additionally, the transport quality q_{t,c_b} is given which is expected to be realized when a transport contract t is executed by a carrier c_b. The task of the auctioneer is to find a set X of winning bids (X subset B), such that each transport contract is part of at least one winning bid, the total procurement costs are minimized, and the total transport quality is maximized. This article presents a metaheuristic approach for the 2WDP-SC which integrates the greedy randomized adaptive search procedure with a two-stage candidate component selection procedure, large neighborhood search, and self-adaptive parameter setting in order to find a competitive set of non-dominated solutions. The heuristic outperforms all existing approaches. For seven small benchmark instances, the heuristic is the sole approach that finds all Pareto-optimal solutions. For 28 out of 30 large instances, none of the existing approaches is able to compute a solution that dominates a solution found by the proposed heuristic. ",herbert kopfer,,2012.0,10.1016/j.cor.2013.04.004,"Computers & Operations Research 41 (2014), 208-220",Buer2012,True,,arXiv,Not available,"A Pareto-metaheuristic for a bi-objective winner determination problem in a combinatorial reverse auction",db2db698ee71be3c52a6c6d693607f2e,http://arxiv.org/abs/1201.4342v2 15626," We present a new type of monotone submodular functions: \emph{multi-peak submodular functions}. Roughly speaking, given a family of sets $\cF$, we construct a monotone submodular function $f$ with a high value $f(S)$ for every set $S \in {\cF}$ (a ""peak""), and a low value on every set that does not intersect significantly any set in $\cF$. We use this construction to show that a better than $(1-\frac{1}{2e})$-approximation ($\simeq 0.816$) for welfare maximization in combinatorial auctions with submodular valuations is (1) impossible in the communication model, (2) NP-hard in the computational model where valuations are given explicitly. Establishing a constant approximation hardness for this problem in the communication model was a long-standing open question. The valuations we construct for the hardness result in the computational model depend only on a constant number of items, and hence the result holds even if the players can answer arbitrary queries about their valuation, including demand queries. We also study two other related problems that received some attention recently: max-min allocation (for which we also get hardness of $(1-\frac 1 {2e}+\epsilon)$-approximation, in both models), and combinatorial public projects (for which we prove hardness of $(3/4+\epsilon)$-approximation in the communication model, and hardness of $(1 -\frac 1 e+\epsilon)$-approximation in the computational model, using constant size valuations). ",shahar dobzinski,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,"On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations",d7bc87239ff25b2f54ac6328826430bf,http://arxiv.org/abs/1202.2792v1 15627," We present a new type of monotone submodular functions: \emph{multi-peak submodular functions}. Roughly speaking, given a family of sets $\cF$, we construct a monotone submodular function $f$ with a high value $f(S)$ for every set $S \in {\cF}$ (a ""peak""), and a low value on every set that does not intersect significantly any set in $\cF$. We use this construction to show that a better than $(1-\frac{1}{2e})$-approximation ($\simeq 0.816$) for welfare maximization in combinatorial auctions with submodular valuations is (1) impossible in the communication model, (2) NP-hard in the computational model where valuations are given explicitly. Establishing a constant approximation hardness for this problem in the communication model was a long-standing open question. The valuations we construct for the hardness result in the computational model depend only on a constant number of items, and hence the result holds even if the players can answer arbitrary queries about their valuation, including demand queries. We also study two other related problems that received some attention recently: max-min allocation (for which we also get hardness of $(1-\frac 1 {2e}+\epsilon)$-approximation, in both models), and combinatorial public projects (for which we prove hardness of $(3/4+\epsilon)$-approximation in the communication model, and hardness of $(1 -\frac 1 e+\epsilon)$-approximation in the computational model, using constant size valuations). ",jan vondrak,,2012.0,,arXiv,Dobzinski2012,True,,arXiv,Not available,"On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations",d7bc87239ff25b2f54ac6328826430bf,http://arxiv.org/abs/1202.2792v1 15628," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",george christodoulou,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 15629," The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,"Capacity as a Fundamental Metric for Mechanism Design in the Information Economy",57ba0b7a7fef925511ef08b188aee970,http://arxiv.org/abs/0711.1569v1 15630," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",annamaria kovacs,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 15631," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",alkmini sgouritsa,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 15632," We study the Price of Anarchy of simultaneous first-price auctions for buyers with submodular and subadditive valuations. The current best upper bounds for the Bayesian Price of Anarchy of these auctions are e/(e-1) [Syrgkanis and Tardos 2013] and 2 [Feldman et al. 2013], respectively. We provide matching lower bounds for both cases even for the case of full information and for mixed Nash equilibria via an explicit construction. We present an alternative proof of the upper bound of e/(e-1) for first-price auctions with fractionally subadditive valuations which reveals the worst-case price distribution, that is used as a building block for the matching lower bound construction. We generalize our results to a general class of item bidding auctions that we call bid-dependent auctions (including first-price auctions and all-pay auctions) where the winner is always the highest bidder and each bidder's payment depends only on his own bid. Finally, we apply our techniques to discriminatory price multi-unit auctions. We complement the results of [de Keijzer et al. 2013] for the case of subadditive valuations, by providing a matching lower bound of 2. For the case of submodular valuations, we provide a lower bound of 1.109. For the same class of valuations, we were able to reproduce the upper bound of e/(e-1) using our non-smooth approach. ",bo tang,,2013.0,,arXiv,Christodoulou2013,True,,arXiv,Not available,"Tight Bounds for the Price of Anarchy of Simultaneous First Price Auctions",d63eed1ac82b5d665751b5bd2483ebe6,http://arxiv.org/abs/1312.2371v3 15633," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",satyanath bhat,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 15634," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",shweta jain,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 15635," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",sujit gujar,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 15636," We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational. ",y. narahari,,2015.0,,arXiv,Bhat2015,True,,arXiv,Not available,"An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement",d327513c4a11c1bdd31780a6aec706e4,http://arxiv.org/abs/1502.06934v2 15637," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",ahmed abdelhadi,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 15638," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",haya shajaiah,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 15639," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",charles clancy,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 15640," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",moran feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15641," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",nicolas bousquet,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 15642," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",yang cai,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 15643," The simultaneous multiple-round auction (SMRA) and the combinatorial clock auction (CCA) are the two primary mechanisms used to sell bandwidth. Under truthful bidding, the SMRA is known to output a Walrasian equilibrium that maximizes social welfare provided the bidder valuation functions satisfy the gross substitutes property. Recently, it was shown that the combinatorial clock auction (CCA) provides good welfare guarantees for general classes of valuation functions. This motivates the question of whether similar welfare guarantees hold for the SMRA in the case of general valuation functions. We show the answer is no. But we prove that good welfare guarantees still arise if the degree of complementarities in the bidder valuations are bounded. In particular, if bidder valuations functions are $\alpha$-near-submodular then, under truthful bidding, the SMRA has a welfare ratio (the worst case ratio between the social welfare of the optimal allocation and the auction allocation) of at most $(1+\alpha)$. The special case of submodular valuations, namely $\alpha=1$, and produces individually rational solutions. However, for $\alpha>1$, this is a bicriteria guarantee, to obtain good welfare under truthful bidding requires relaxing individual rationality. Finally, we examine what strategies are required to ensure individual rationality in the SMRA with general valuation functions. First, we provide a weak characterization, namely \emph{secure bidding}, for individual rationality. We then show that if the bidders use a profit-maximizing secure bidding strategy the welfare ratio is at most $1+\alpha$. Consequently, by bidding securely, it is possible to obtain the same welfare guarantees as truthful bidding without the loss of individual rationality. ",adrian vetta,,2015.0,,arXiv,Bousquet2015,True,,arXiv,Not available,"Welfare and Rationality Guarantees for the Simultaneous Multiple-Round Ascending Auction",f556a02f5280e0e0e5ba1d42c574303d,http://arxiv.org/abs/1510.00295v1 15644," We study revenue optimization learning algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation for a good and seeks to maximize his cumulative discounted surplus. For this setting, first, we propose a novel algorithm that never decreases offered prices and has a tight strategic regret bound in $\Theta(\log\log T)$ under some mild assumptions on the buyer surplus discounting. This result closes the open research question on the existence of a no-regret horizon-independent weakly consistent pricing. The proposed algorithm is inspired by our observation that a double decrease of offered prices in a weakly consistent algorithm is enough to cause a linear regret. This motivates us to construct a novel transformation that maps a right-consistent algorithm to a weakly consistent one that never decreases offered prices. Second, we outperform the previously known strategic regret upper bound of the algorithm PRRFES, where the improvement is achieved by means of a finer constant factor $C$ of the principal term $C\log\log T$ in this upper bound. Finally, we generalize results on strategic regret previously known for geometric discounting of the buyer's surplus to discounting of other types, namely: the optimality of the pricing PRRFES to the case of geometrically concave decreasing discounting; and linear lower bound on the strategic regret of a wide range of horizon-independent weakly consistent algorithms to the case of arbitrary discounts. ",alexey drutsa,,2017.0,,arXiv,Drutsa2017,True,,arXiv,Not available,"On consistency of optimal pricing algorithms in repeated posted-price auctions with strategic buyer",1b808b75210b37d16fdbaa4680f8bb44,http://arxiv.org/abs/1707.05101v2 15645," We consider the problem of designing revenue-optimal auctions for selling two items and bidders' valuations are independent among bidders but negatively correlated among items. In this paper, we obtain the closed-form optimal auction for this setting, by directly addressing the two difficulties above. In particular, the first difficulty is that when pointwise maximizing virtual surplus under multi-dimensional feasibility (i.e., the Border feasibility), (1) neither the optimal interim allocation is trivially monotone in the virtual value, (2) nor the virtual value is monotone in the bidder's type. As a result, the optimal interim allocations resulting from virtual surplus maximization no longer guarantees BIC. To address (1), we prove a generalization of Border's theorem and show that optimal interim allocation is indeed monotone in the virtual value. To address (2), we adapt Myerson's ironing procedure to this setting by redefining the (ironed) virtual value as a function of the lowest utility point. The second difficulty, perhaps a more challenging one, is that the lowest utility type in general is no longer at the endpoints of the type interval. To address this difficulty, we show by construction that there exist an allocation rule and an induced lowest utility type such that they form a solution of the virtual surplus maximization and in the meanwhile guarantees IIR. In the single bidder case, the optimal auction consists of a randomized bundle menu and a deterministic bundle menu; while in the multiple bidder case, the optimal auction is a randomization between two extreme mechanisms. The optimal solutions of our setting can be implemented by a Bayesian IC and IR auction, however, perhaps surprisingly, the revenue of this auction cannot be achieved by any (dominant-strategy) IC and IR auction. ",pingzhong tang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Optimal Auctions for Negatively Correlated Items,c8ac3cd7a96dd7dc5defd2a0f21447bb,http://arxiv.org/abs/1603.00562v3 15646," We consider the problem of designing revenue-optimal auctions for selling two items and bidders' valuations are independent among bidders but negatively correlated among items. In this paper, we obtain the closed-form optimal auction for this setting, by directly addressing the two difficulties above. In particular, the first difficulty is that when pointwise maximizing virtual surplus under multi-dimensional feasibility (i.e., the Border feasibility), (1) neither the optimal interim allocation is trivially monotone in the virtual value, (2) nor the virtual value is monotone in the bidder's type. As a result, the optimal interim allocations resulting from virtual surplus maximization no longer guarantees BIC. To address (1), we prove a generalization of Border's theorem and show that optimal interim allocation is indeed monotone in the virtual value. To address (2), we adapt Myerson's ironing procedure to this setting by redefining the (ironed) virtual value as a function of the lowest utility point. The second difficulty, perhaps a more challenging one, is that the lowest utility type in general is no longer at the endpoints of the type interval. To address this difficulty, we show by construction that there exist an allocation rule and an induced lowest utility type such that they form a solution of the virtual surplus maximization and in the meanwhile guarantees IIR. In the single bidder case, the optimal auction consists of a randomized bundle menu and a deterministic bundle menu; while in the multiple bidder case, the optimal auction is a randomization between two extreme mechanisms. The optimal solutions of our setting can be implemented by a Bayesian IC and IR auction, however, perhaps surprisingly, the revenue of this auction cannot be achieved by any (dominant-strategy) IC and IR auction. ",zihe wang,,2016.0,,arXiv,Tang2016,True,,arXiv,Not available,Optimal Auctions for Negatively Correlated Items,c8ac3cd7a96dd7dc5defd2a0f21447bb,http://arxiv.org/abs/1603.00562v3 15647," In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal is to understand how much data is necessary and sufficient to guarantee near-optimal expected revenue. Our basic model is a single-item auction in which bidders' valuations are drawn independently from unknown and non-identical distributions. The seller is given $m$ samples from each of these distributions ""for free"" and chooses an auction to run on a fresh sample. How large does m need to be, as a function of the number k of bidders and eps > 0, so that a (1 - eps)-approximation of the optimal revenue is achievable? We prove that, under standard tail conditions on the underlying distributions, m = poly(k, 1/eps) samples are necessary and sufficient. Our lower bound stands in contrast to many recent results on simple and prior-independent auctions and fundamentally involves the interplay between bidder competition, non-identical distributions, and a very close (but still constant) approximation of the optimal revenue. It effectively shows that the only way to achieve a sufficiently good constant approximation of the optimal revenue is through a detailed understanding of bidders' valuation distributions. Our upper bound is constructive and applies in particular to a variant of the empirical Myerson auction, the natural auction that runs the revenue-maximizing auction with respect to the empirical distributions of the samples. Our sample complexity lower bound depends on the set of allowable distributions, and to capture this we introduce alpha-strongly regular distributions, which interpolate between the well-studied classes of regular (alpha = 0) and MHR (alpha = 1) distributions. We give evidence that this definition is of independent interest. ",richard cole,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,The Sample Complexity of Revenue Maximization,6636073d85b9e2eb193303a366a2f239,http://arxiv.org/abs/1502.00963v2 15648," In the design and analysis of revenue-maximizing auctions, auction performance is typically measured with respect to a prior distribution over inputs. The most obvious source for such a distribution is past data. The goal is to understand how much data is necessary and sufficient to guarantee near-optimal expected revenue. Our basic model is a single-item auction in which bidders' valuations are drawn independently from unknown and non-identical distributions. The seller is given $m$ samples from each of these distributions ""for free"" and chooses an auction to run on a fresh sample. How large does m need to be, as a function of the number k of bidders and eps > 0, so that a (1 - eps)-approximation of the optimal revenue is achievable? We prove that, under standard tail conditions on the underlying distributions, m = poly(k, 1/eps) samples are necessary and sufficient. Our lower bound stands in contrast to many recent results on simple and prior-independent auctions and fundamentally involves the interplay between bidder competition, non-identical distributions, and a very close (but still constant) approximation of the optimal revenue. It effectively shows that the only way to achieve a sufficiently good constant approximation of the optimal revenue is through a detailed understanding of bidders' valuation distributions. Our upper bound is constructive and applies in particular to a variant of the empirical Myerson auction, the natural auction that runs the revenue-maximizing auction with respect to the empirical distributions of the samples. Our sample complexity lower bound depends on the set of allowable distributions, and to capture this we introduce alpha-strongly regular distributions, which interpolate between the well-studied classes of regular (alpha = 0) and MHR (alpha = 1) distributions. We give evidence that this definition is of independent interest. ",tim roughgarden,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,The Sample Complexity of Revenue Maximization,6636073d85b9e2eb193303a366a2f239,http://arxiv.org/abs/1502.00963v2 15649," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",gregoire jauvion,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15650," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",nicolas grislain,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15651," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",moshe tennenholtz,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15652," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",pascal dkengne,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15653," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",aurelien garivier,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15654," Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide. ",sebastien gerchinovitz,,2018.0,10.1145/3219819.3219917,"The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Aug 2018, London, United Kingdom",Jauvion2018,True,,arXiv,Not available,Optimization of a SSP's Header Bidding Strategy using Thompson Sampling,e3730f614b49189032992039b995eaba,http://arxiv.org/abs/1807.03299v1 15655," We address the equilibrium concept of a reverse auction game so that no one can enhance the individual payoff by a unilateral change when all the others follow a certain strategy. In this approach the combinatorial possibilities to consider become very much involved even for a small number of players, which has hindered a precise analysis in previous works. We here present a systematic way to reach the solution for a general number of players, and show that this game is an example of conflict between the group and the individual interests. ",seung baek,,2010.0,10.1142/S0219477510000071,"Fluctuation and Noise Letters, 9:1, pp. 61-68 (2010)",Baek2010,True,,arXiv,Not available,Equilibrium solution to the lowest unique positive integer game,d4c58181d36866f7e28e092a07265217,http://arxiv.org/abs/1001.1065v1 15656," We address the equilibrium concept of a reverse auction game so that no one can enhance the individual payoff by a unilateral change when all the others follow a certain strategy. In this approach the combinatorial possibilities to consider become very much involved even for a small number of players, which has hindered a precise analysis in previous works. We here present a systematic way to reach the solution for a general number of players, and show that this game is an example of conflict between the group and the individual interests. ",sebastian bernhardsson,,2010.0,10.1142/S0219477510000071,"Fluctuation and Noise Letters, 9:1, pp. 61-68 (2010)",Baek2010,True,,arXiv,Not available,Equilibrium solution to the lowest unique positive integer game,d4c58181d36866f7e28e092a07265217,http://arxiv.org/abs/1001.1065v1 15657," Escalation is the fact that in a game (for instance an auction), the agents play forever. It is not necessary to consider complex examples to establish its rationality. In particular, the $0,1$-game is an extremely simple infinite game in which escalation arises naturally and rationally. In some sense, it can be considered as the paradigm of escalation. Through an example of economic games, we show the benefit economics can take of coinduction. ",pierre lescanne,,2013.0,,"Dans CALCO 2013 - 5th Conference on Algebra and Coalgebra in Computer Science, CALCO 2013, Warsaw : Poland (2013)",Lescanne2013,True,,arXiv,Not available,A simple case of rationality of escalation,f5031be006a4e4f9f06ef0bb27e7aea2,http://arxiv.org/abs/1306.2284v1 15658," This paper concerns the analysis of the Shapley value in matching games. Matching games constitute a fundamental class of cooperative games which help understand and model auctions and assignments. In a matching game, the value of a coalition of vertices is the weight of the maximum size matching in the subgraph induced by the coalition. The Shapley value is one of the most important solution concepts in cooperative game theory. After establishing some general insights, we show that the Shapley value of matching games can be computed in polynomial time for some special cases: graphs with maximum degree two, and graphs that have a small modular decomposition into cliques or cocliques (complete k-partite graphs are a notable special case of this). The latter result extends to various other well-known classes of graph-based cooperative games. We continue by showing that computing the Shapley value of unweighted matching games is #P-complete in general. Finally, a fully polynomial-time randomized approximation scheme (FPRAS) is presented. This FPRAS can be considered the best positive result conceivable, in view of the #P-completeness result. ",haris aziz,,2013.0,,arXiv,Aziz2013,True,,arXiv,Not available,Shapley Meets Shapley,ec90407984943cde5ed59f589b5b9853,http://arxiv.org/abs/1307.0332v1 15659," This paper concerns the analysis of the Shapley value in matching games. Matching games constitute a fundamental class of cooperative games which help understand and model auctions and assignments. In a matching game, the value of a coalition of vertices is the weight of the maximum size matching in the subgraph induced by the coalition. The Shapley value is one of the most important solution concepts in cooperative game theory. After establishing some general insights, we show that the Shapley value of matching games can be computed in polynomial time for some special cases: graphs with maximum degree two, and graphs that have a small modular decomposition into cliques or cocliques (complete k-partite graphs are a notable special case of this). The latter result extends to various other well-known classes of graph-based cooperative games. We continue by showing that computing the Shapley value of unweighted matching games is #P-complete in general. Finally, a fully polynomial-time randomized approximation scheme (FPRAS) is presented. This FPRAS can be considered the best positive result conceivable, in view of the #P-completeness result. ",bart keijzer,,2013.0,,arXiv,Aziz2013,True,,arXiv,Not available,Shapley Meets Shapley,ec90407984943cde5ed59f589b5b9853,http://arxiv.org/abs/1307.0332v1 15660," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",benny lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 15661," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",daniel lehmann,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 15662," A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party ""mediators""), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be ""local"", then there is an efficient algorithm that finds a near-optimal ($5$-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer. ",omri weinstein,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Distributed Signaling Games,7c5249afbcf11d61b13dbad601cb2942,http://arxiv.org/abs/1404.2861v2 15663," In most of microeconomic theory, consumers are assumed to exhibit decreasing marginal utilities. This paper considers combinatorial auctions among such submodular buyers. The valuations of such buyers are placed within a hierarchy of valuations that exhibit no complementarities, a hierarchy that includes also OR and XOR combinations of singleton valuations, and valuations satisfying the gross substitutes property. Those last valuations are shown to form a zero-measure subset of the submodular valuations that have positive measure. While we show that the allocation problem among submodular valuations is NP-hard, we present an efficient greedy 2-approximation algorithm for this case and generalize it to the case of limited complementarities. No such approximation algorithm exists in a setting allowing for arbitrary complementarities. Some results about strategic aspects of combinatorial auctions among players with decreasing marginal utilities are also presented. ",noam nisan,,2002.0,10.1016/j.geb2005.02.006,"Games and Economic Behavior, Vol 55/2 May 2006 pp 270-296",Lehmann2002,True,,arXiv,Not available,Combinatorial Auctions with Decreasing Marginal Utilities,263b31c14dda834c8e1f1ae63ed1fcad,http://arxiv.org/abs/cs/0202015v2 15664," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",simone pigolotti,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 15665," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",sebastian bernhardsson,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 15666," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",jeppe juul,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 15667," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",gorm galster,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 15668," In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game. ",pierpaolo vivo,,2011.0,10.1103/PhysRevLett.108.088701,"Phys. Rev. Lett. 108, 088701 (2012)",Pigolotti2011,True,,arXiv,Not available,"Equilibrium strategy and population-size effects in lowest unique bid auctions",dfbd9865c5c9c9bd4d3ae018f2944b80,http://arxiv.org/abs/1105.0819v3 15669," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",denis nekipelov,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 15670," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",vasilis syrgkanis,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 15671," The main goal of this paper is to develop a theory of inference of player valuations from observed data in the generalized second price auction without relying on the Nash equilibrium assumption. Existing work in Economics on inferring agent values from data relies on the assumption that all participant strategies are best responses of the observed play of other players, i.e. they constitute a Nash equilibrium. In this paper, we show how to perform inference relying on a weaker assumption instead: assuming that players are using some form of no-regret learning. Learning outcomes emerged in recent years as an attractive alternative to Nash equilibrium in analyzing game outcomes, modeling players who haven't reached a stable equilibrium, but rather use algorithmic learning, aiming to learn the best way to play from previous observations. In this paper we show how to infer values of players who use algorithmic learning strategies. Such inference is an important first step before we move to testing any learning theoretic behavioral model on auction data. We apply our techniques to a dataset from Microsoft's sponsored search ad auction system. ",eva tardos,,2015.0,,arXiv,Nekipelov2015,True,,arXiv,Not available,Econometrics for Learning Agents,497f70463b87bb5600337e63bd34d62e,http://arxiv.org/abs/1505.00720v1 15672," Optimal mechanism design enjoys a beautiful and well-developed theory, and also a number of killer applications. Rules of thumb produced by the field influence everything from how governments sell wireless spectrum licenses to how the major search engines auction off online advertising. There are, however, some basic problems for which the traditional optimal mechanism design approach is ill-suited --- either because it makes overly strong assumptions, or because it advocates overly complex designs. The thesis of this paper is that approximately optimal mechanisms allow us to reason about fundamental questions that seem out of reach of the traditional theory. This survey has three main parts. The first part describes the approximately optimal mechanism design paradigm --- how it works, and what we aim to learn by applying it. The second and third parts of the survey cover two case studies, where we instantiate the general design paradigm to investigate two basic questions. In the first example, we consider revenue maximization in a single-item auction with heterogeneous bidders. Our goal is to understand if complexity --- in the sense of detailed distributional knowledge --- is an essential feature of good auctions for this problem, or alternatively if there are simpler auctions that are near-optimal. The second example considers welfare maximization with multiple items. Our goal here is similar in spirit: when is complexity --- in the form of high-dimensional bid spaces --- an essential feature of every auction that guarantees reasonable welfare? Are there interesting cases where low-dimensional bid spaces suffice? ",tim roughgarden,,2014.0,,arXiv,Roughgarden2014,True,,arXiv,Not available,"Approximately Optimal Mechanism Design: Motivation, Examples, and Lessons Learned",a0416c1e42a873d0eeb16ec41013ddc1,http://arxiv.org/abs/1406.6773v1 15673," Distributed adaptive filtering has been considered as an effective approach for data processing and estimation over distributed networks. Most existing distributed adaptive filtering algorithms focus on designing different information diffusion rules, regardless of the nature evolutionary characteristic of a distributed network. In this paper, we study the adaptive network from the game theoretic perspective and formulate the distributed adaptive filtering problem as a graphical evolutionary game. With the proposed formulation, the nodes in the network are regarded as players and the local combiner of estimation information from different neighbors is regarded as different strategies selection. We show that this graphical evolutionary game framework is very general and can unify the existing adaptive network algorithms. Based on this framework, as examples, we further propose two error-aware adaptive filtering algorithms. Moreover, we use graphical evolutionary game theory to analyze the information diffusion process over the adaptive networks and evolutionarily stable strategy of the system. Finally, simulation results are shown to verify the effectiveness of our analysis and proposed methods. ",k. liu,,2012.0,10.1109/TSP.2013.2280444,arXiv,Jiang2012,True,,arXiv,Not available,"Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View",82e18e62ceb309db96f05e5f39bad84c,http://arxiv.org/abs/1212.1245v2 15674," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",riccardo colini-baldeschi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 15679," Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions --- lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Levy flight search strategies in their exploration of ""bid space"". The Levy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. ",filippo radicchi,,2011.0,10.1371/journal.pone.0029910,"PloS ONE 7, e29910 (2012)",Radicchi2011,True,,arXiv,Not available,"Rationality, irrationality and escalating behavior in lowest unique bid auctions",5aa8dba60c75142055f7991de6a770fc,http://arxiv.org/abs/1105.0469v2 15680," Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions --- lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Levy flight search strategies in their exploration of ""bid space"". The Levy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. ",andrea baronchelli,,2011.0,10.1371/journal.pone.0029910,"PloS ONE 7, e29910 (2012)",Radicchi2011,True,,arXiv,Not available,"Rationality, irrationality and escalating behavior in lowest unique bid auctions",5aa8dba60c75142055f7991de6a770fc,http://arxiv.org/abs/1105.0469v2 15681," Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions --- lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Levy flight search strategies in their exploration of ""bid space"". The Levy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. ",luis amaral,,2011.0,10.1371/journal.pone.0029910,"PloS ONE 7, e29910 (2012)",Radicchi2011,True,,arXiv,Not available,"Rationality, irrationality and escalating behavior in lowest unique bid auctions",5aa8dba60c75142055f7991de6a770fc,http://arxiv.org/abs/1105.0469v2 15682," We investigate revenue maximization problems in auctions for dynamic spectrum access. We consider the frequency division and spread spectrum methods of dynamic spectrum sharing. In the frequency division method, a primary spectrum user allocates portions of spectrum to different secondary users. In the spread spectrum method, the primary user allocates transmission powers to each secondary user. In both cases, we assume that a secondary user's utility function is linear in the rate it can achieve by using the available spectrum/power. Assuming strategic users, we present incentive compatible, individually rational and revenue-maximizing mechanisms for the two scenarios. ",ali kakhbod,,2011.0,,arXiv,Kakhbod2011,True,,arXiv,Not available,Revenue Maximization in Spectrum Auctions for Dynamic Spectrum Access,346126c9cd0c50a4868af86eee50ed2d,http://arxiv.org/abs/1105.5743v1 15683," We investigate revenue maximization problems in auctions for dynamic spectrum access. We consider the frequency division and spread spectrum methods of dynamic spectrum sharing. In the frequency division method, a primary spectrum user allocates portions of spectrum to different secondary users. In the spread spectrum method, the primary user allocates transmission powers to each secondary user. In both cases, we assume that a secondary user's utility function is linear in the rate it can achieve by using the available spectrum/power. Assuming strategic users, we present incentive compatible, individually rational and revenue-maximizing mechanisms for the two scenarios. ",ashutosh nayyar,,2011.0,,arXiv,Kakhbod2011,True,,arXiv,Not available,Revenue Maximization in Spectrum Auctions for Dynamic Spectrum Access,346126c9cd0c50a4868af86eee50ed2d,http://arxiv.org/abs/1105.5743v1 15684," We investigate revenue maximization problems in auctions for dynamic spectrum access. We consider the frequency division and spread spectrum methods of dynamic spectrum sharing. In the frequency division method, a primary spectrum user allocates portions of spectrum to different secondary users. In the spread spectrum method, the primary user allocates transmission powers to each secondary user. In both cases, we assume that a secondary user's utility function is linear in the rate it can achieve by using the available spectrum/power. Assuming strategic users, we present incentive compatible, individually rational and revenue-maximizing mechanisms for the two scenarios. ",demosthenis teneketzis,,2011.0,,arXiv,Kakhbod2011,True,,arXiv,Not available,Revenue Maximization in Spectrum Auctions for Dynamic Spectrum Access,346126c9cd0c50a4868af86eee50ed2d,http://arxiv.org/abs/1105.5743v1 15685," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",monika henzinger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 15686," The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions without revelation of the bids received, third parties and complex communications. ",t. srinath,,2011.0,10.5121/ijitcs.2011.1401,"International Journal of Information Technology Convergence and Services (IJITCS) Vol.1, No.4, August 2011",Srinath2011,True,,arXiv,Not available,Anonymity and verifiability in multi-attribute reverse auction,20bc1f96dd7c24a776cb44143fa0b6b3,http://arxiv.org/abs/1109.0359v1 15687," The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions without revelation of the bids received, third parties and complex communications. ",mahendra singh,,2011.0,10.5121/ijitcs.2011.1401,"International Journal of Information Technology Convergence and Services (IJITCS) Vol.1, No.4, August 2011",Srinath2011,True,,arXiv,Not available,Anonymity and verifiability in multi-attribute reverse auction,20bc1f96dd7c24a776cb44143fa0b6b3,http://arxiv.org/abs/1109.0359v1 15688," The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions without revelation of the bids received, third parties and complex communications. ",alwyn pais,,2011.0,10.5121/ijitcs.2011.1401,"International Journal of Information Technology Convergence and Services (IJITCS) Vol.1, No.4, August 2011",Srinath2011,True,,arXiv,Not available,Anonymity and verifiability in multi-attribute reverse auction,20bc1f96dd7c24a776cb44143fa0b6b3,http://arxiv.org/abs/1109.0359v1 15689," We show how a retailer can estimate the optimal price of a new product using observed transaction prices from online second-price auction experiments. For this purpose we propose a Bayesian P\'olya tree approach which, given the limited nature of the data, requires a specially tailored implementation. Avoiding the need for a priori parametric assumptions, the P\'olya tree approach allows for flexible inference of the valuation distribution, leading to more robust estimation of optimal price than competing parametric approaches. In collaboration with an online jewelry retailer, we illustrate how our methodology can be combined with managerial prior knowledge to estimate the profit maximizing price of a new jewelry product. ",edward george,,2012.0,10.1214/11-AOAS503,"Annals of Applied Statistics 2012, Vol. 6, No. 1, 55-82",George2012,True,,arXiv,Not available,"Optimal pricing using online auction experiments: A Pólya tree approach",cee1d916896214abea54684dc3780aca,http://arxiv.org/abs/1203.3653v1 15690," We show how a retailer can estimate the optimal price of a new product using observed transaction prices from online second-price auction experiments. For this purpose we propose a Bayesian P\'olya tree approach which, given the limited nature of the data, requires a specially tailored implementation. Avoiding the need for a priori parametric assumptions, the P\'olya tree approach allows for flexible inference of the valuation distribution, leading to more robust estimation of optimal price than competing parametric approaches. In collaboration with an online jewelry retailer, we illustrate how our methodology can be combined with managerial prior knowledge to estimate the profit maximizing price of a new jewelry product. ",sam hui,,2012.0,10.1214/11-AOAS503,"Annals of Applied Statistics 2012, Vol. 6, No. 1, 55-82",George2012,True,,arXiv,Not available,"Optimal pricing using online auction experiments: A Pólya tree approach",cee1d916896214abea54684dc3780aca,http://arxiv.org/abs/1203.3653v1 15691," We analyze empirical data from the internet auction site Aukro.cz. The time series of activity shows truncated fractal structure on scales from about 1 minute to about 1 day. The distribution of waiting times as well as the distribution of number of auctions within fixed interval is a power law, with exponents $1.5$ and $3$, respectively. Possible implications for the modeling of stock-market fluctuations are briefly discussed. ",frantisek slanina,,2014.0,10.1142/S0219525912500531,"Advances in Complex Systems Vol. 15, (2012) 1250053",Slanina2014,True,,arXiv,Not available,Complex temporal structure of activity in on-line electronic auctions,cb46b461ebf686097e4dfa3c1e399331,http://arxiv.org/abs/1401.2860v1 15692," We study the identification and estimation of first-price auction models where bidders have ambiguity about the valuation distribution and their preferences are represented by maxmin expected utility. When entry is exogenous, the distribution and ambiguity structure are nonparametrically identified, separately from risk aversion (CRRA). We propose a flexible Bayesian method based on Bernstein polynomials. Monte Carlo experiments show that our method estimates parameters precisely, and chooses reserve prices with (nearly) optimal revenues, whether there is ambiguity or not. Furthermore, if the model is misspecified -- incorrectly assuming no ambiguity among bidders -- it may induce estimation bias with a substantial revenue loss. ",gaurab aryal,,2015.0,,arXiv,Aryal2015,True,,arXiv,Not available,Empirical Relevance of Ambiguity in First Price Auction Models,c83f67ca8526dde359a848c02de2d6c0,http://arxiv.org/abs/1504.02516v1 15693," We study the identification and estimation of first-price auction models where bidders have ambiguity about the valuation distribution and their preferences are represented by maxmin expected utility. When entry is exogenous, the distribution and ambiguity structure are nonparametrically identified, separately from risk aversion (CRRA). We propose a flexible Bayesian method based on Bernstein polynomials. Monte Carlo experiments show that our method estimates parameters precisely, and chooses reserve prices with (nearly) optimal revenues, whether there is ambiguity or not. Furthermore, if the model is misspecified -- incorrectly assuming no ambiguity among bidders -- it may induce estimation bias with a substantial revenue loss. ",dong-hyuk kim,,2015.0,,arXiv,Aryal2015,True,,arXiv,Not available,Empirical Relevance of Ambiguity in First Price Auction Models,c83f67ca8526dde359a848c02de2d6c0,http://arxiv.org/abs/1504.02516v1 15694," We derive valuations of a portfolio of financial instruments from a securities lending perspective, under different assumptions, and show a weighting scheme that converges to the true valuation. This valuation can be useful either to derive a bidding strategy for an exclusive auction or to design an appropriate auction mechanism, depending on which side of the fence a participant sits (whether the interest is to procure the rights to use a portfolio for making stock loans such as for a lending desk, or, to obtain additional revenue from a portfolio such as from the point of view of a long only asset management firm). Lastly, we run simulations to establish numerical examples for the set of valuations and for various bidding strategies corresponding to different auction settings. ",ravi kashyap,,2016.0,,arXiv,Kashyap2016,True,,arXiv,Not available,Securities Lending Strategies: Exclusive Valuations and Auction Bids,00ec0286d7e09bed76a18da703d56c47,http://arxiv.org/abs/1603.00987v6 15695," One of the most challenging problems in computational advertising is the prediction of click-through and conversion rates for bidding in online advertising auctions. An unaddressed problem in previous approaches is the existence of highly non-uniform misprediction costs. While for model evaluation these costs have been taken into account through recently proposed business-aware offline metrics -- such as the Utility metric which measures the impact on advertiser profit -- this is not the case when training the models themselves. In this paper, to bridge the gap, we formally analyze the relationship between optimizing the Utility metric and the log loss, which is considered as one of the state-of-the-art approaches in conversion modeling. Our analysis motivates the idea of weighting the log loss with the business value of the predicted outcome. We present and analyze a new cost weighting scheme and show that significant gains in offline and online performance can be achieved. ",flavian vasile,,2016.0,,arXiv,Vasile2016,True,,arXiv,Not available,"Cost-sensitive Learning for Utility Optimization in Online Advertising Auctions",945aa0df0d2960a8471f63bdf0f75864,http://arxiv.org/abs/1603.03713v3 15696," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",stefano leonardi,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 15697," One of the most challenging problems in computational advertising is the prediction of click-through and conversion rates for bidding in online advertising auctions. An unaddressed problem in previous approaches is the existence of highly non-uniform misprediction costs. While for model evaluation these costs have been taken into account through recently proposed business-aware offline metrics -- such as the Utility metric which measures the impact on advertiser profit -- this is not the case when training the models themselves. In this paper, to bridge the gap, we formally analyze the relationship between optimizing the Utility metric and the log loss, which is considered as one of the state-of-the-art approaches in conversion modeling. Our analysis motivates the idea of weighting the log loss with the business value of the predicted outcome. We present and analyze a new cost weighting scheme and show that significant gains in offline and online performance can be achieved. ",damien lefortier,,2016.0,,arXiv,Vasile2016,True,,arXiv,Not available,"Cost-sensitive Learning for Utility Optimization in Online Advertising Auctions",945aa0df0d2960a8471f63bdf0f75864,http://arxiv.org/abs/1603.03713v3 15698," One of the most challenging problems in computational advertising is the prediction of click-through and conversion rates for bidding in online advertising auctions. An unaddressed problem in previous approaches is the existence of highly non-uniform misprediction costs. While for model evaluation these costs have been taken into account through recently proposed business-aware offline metrics -- such as the Utility metric which measures the impact on advertiser profit -- this is not the case when training the models themselves. In this paper, to bridge the gap, we formally analyze the relationship between optimizing the Utility metric and the log loss, which is considered as one of the state-of-the-art approaches in conversion modeling. Our analysis motivates the idea of weighting the log loss with the business value of the predicted outcome. We present and analyze a new cost weighting scheme and show that significant gains in offline and online performance can be achieved. ",olivier chapelle,,2016.0,,arXiv,Vasile2016,True,,arXiv,Not available,"Cost-sensitive Learning for Utility Optimization in Online Advertising Auctions",945aa0df0d2960a8471f63bdf0f75864,http://arxiv.org/abs/1603.03713v3 15699," The three traditional cloud delivery models -- IaaS, PaaS, and SaaS -- constrain access to cloud resources by hiding their raw functionality and forcing us to use them indirectly via a restricted set of actions. Can we introduce a new delivery model, and, at the same time, support improved security, a higher degree of assurance, find relatively simple solutions to the hard cloud resource management problems, eliminate some of the inefficiencies related to resource virtualization, allow the assembly of clouds of clouds, and, last but not least, minimize the number of interoperability standards? We sketch a self-organizing architecture for very large compute clouds composed of many-core processors and heterogeneous coprocessors. We discuss how self-organization will address each of the challenges described above. The approach is {\em bid-centric}. The system of heterogeneous cloud resources is dynamically, and autonomically, configured to bid to meet the needs identified in a high-level task or service specification. When the task is completed, or the service is retired, the resources are released for subsequent reuse. Our approach mimics the process followed by individual researchers who, in response to a call for proposals released by a funding agency, organize themselves in groups of various sizes and specialities. If the bid is successful, then the group carries out the proposed work and releases the results. After the work is completed, individual researchers in the group disperse, possibly joining other groups or submitting individual bids in response to other proposals. Similar protocols are common to other human activities such as procurement management. ",dan marinescu,,2013.0,,arXiv,Marinescu2013,True,,arXiv,Not available,An Auction-driven Self-organizing Cloud Delivery Model,6d215143b28bd741f0b92892fb90f9b7,http://arxiv.org/abs/1312.2998v1 15700," The three traditional cloud delivery models -- IaaS, PaaS, and SaaS -- constrain access to cloud resources by hiding their raw functionality and forcing us to use them indirectly via a restricted set of actions. Can we introduce a new delivery model, and, at the same time, support improved security, a higher degree of assurance, find relatively simple solutions to the hard cloud resource management problems, eliminate some of the inefficiencies related to resource virtualization, allow the assembly of clouds of clouds, and, last but not least, minimize the number of interoperability standards? We sketch a self-organizing architecture for very large compute clouds composed of many-core processors and heterogeneous coprocessors. We discuss how self-organization will address each of the challenges described above. The approach is {\em bid-centric}. The system of heterogeneous cloud resources is dynamically, and autonomically, configured to bid to meet the needs identified in a high-level task or service specification. When the task is completed, or the service is retired, the resources are released for subsequent reuse. Our approach mimics the process followed by individual researchers who, in response to a call for proposals released by a funding agency, organize themselves in groups of various sizes and specialities. If the bid is successful, then the group carries out the proposed work and releases the results. After the work is completed, individual researchers in the group disperse, possibly joining other groups or submitting individual bids in response to other proposals. Similar protocols are common to other human activities such as procurement management. ",ashkan paya,,2013.0,,arXiv,Marinescu2013,True,,arXiv,Not available,An Auction-driven Self-organizing Cloud Delivery Model,6d215143b28bd741f0b92892fb90f9b7,http://arxiv.org/abs/1312.2998v1 15701," The three traditional cloud delivery models -- IaaS, PaaS, and SaaS -- constrain access to cloud resources by hiding their raw functionality and forcing us to use them indirectly via a restricted set of actions. Can we introduce a new delivery model, and, at the same time, support improved security, a higher degree of assurance, find relatively simple solutions to the hard cloud resource management problems, eliminate some of the inefficiencies related to resource virtualization, allow the assembly of clouds of clouds, and, last but not least, minimize the number of interoperability standards? We sketch a self-organizing architecture for very large compute clouds composed of many-core processors and heterogeneous coprocessors. We discuss how self-organization will address each of the challenges described above. The approach is {\em bid-centric}. The system of heterogeneous cloud resources is dynamically, and autonomically, configured to bid to meet the needs identified in a high-level task or service specification. When the task is completed, or the service is retired, the resources are released for subsequent reuse. Our approach mimics the process followed by individual researchers who, in response to a call for proposals released by a funding agency, organize themselves in groups of various sizes and specialities. If the bid is successful, then the group carries out the proposed work and releases the results. After the work is completed, individual researchers in the group disperse, possibly joining other groups or submitting individual bids in response to other proposals. Similar protocols are common to other human activities such as procurement management. ",john morrison,,2013.0,,arXiv,Marinescu2013,True,,arXiv,Not available,An Auction-driven Self-organizing Cloud Delivery Model,6d215143b28bd741f0b92892fb90f9b7,http://arxiv.org/abs/1312.2998v1 15702," The three traditional cloud delivery models -- IaaS, PaaS, and SaaS -- constrain access to cloud resources by hiding their raw functionality and forcing us to use them indirectly via a restricted set of actions. Can we introduce a new delivery model, and, at the same time, support improved security, a higher degree of assurance, find relatively simple solutions to the hard cloud resource management problems, eliminate some of the inefficiencies related to resource virtualization, allow the assembly of clouds of clouds, and, last but not least, minimize the number of interoperability standards? We sketch a self-organizing architecture for very large compute clouds composed of many-core processors and heterogeneous coprocessors. We discuss how self-organization will address each of the challenges described above. The approach is {\em bid-centric}. The system of heterogeneous cloud resources is dynamically, and autonomically, configured to bid to meet the needs identified in a high-level task or service specification. When the task is completed, or the service is retired, the resources are released for subsequent reuse. Our approach mimics the process followed by individual researchers who, in response to a call for proposals released by a funding agency, organize themselves in groups of various sizes and specialities. If the bid is successful, then the group carries out the proposed work and releases the results. After the work is completed, individual researchers in the group disperse, possibly joining other groups or submitting individual bids in response to other proposals. Similar protocols are common to other human activities such as procurement management. ",philip healy,,2013.0,,arXiv,Marinescu2013,True,,arXiv,Not available,An Auction-driven Self-organizing Cloud Delivery Model,6d215143b28bd741f0b92892fb90f9b7,http://arxiv.org/abs/1312.2998v1 15703," When applied to the same game, probability theory and game theory can disagree on calculated values of the Fisher information, the log likelihood function, entropy gradients, the rank and Jacobian of variable transforms, and even the dimensionality and volume of the underlying probability parameter spaces. These differences arise as probability theory employs structure preserving isomorphic mappings when constructing strategy spaces to analyze games. In contrast, game theory uses weaker mappings which change some of the properties of the underlying probability distributions within the mixed strategy space. In this paper, we explore how using strong isomorphic mappings to define game strategy spaces can alter rational outcomes in simple games, and might resolve some of the paradoxes of game theory. ",michael gagen,,2012.0,,arXiv,Gagen2012,True,,arXiv,Not available,Using strong isomorphisms to construct game strategy spaces,bc30ad201e6a0b42f0000b85418d08b4,http://arxiv.org/abs/1208.3976v1 15704," This paper presents a monoidal category whose morphisms are games (in the sense of game theory, not game semantics) and an associated diagrammatic language. The two basic operations of a monoidal category, namely categorical composition and tensor product, correspond roughly to sequential and simultaneous composition of games. This leads to a compositional theory in which we can reason about properties of games in terms of corresponding properties of the component parts. In particular, we give a definition of Nash equilibrium which is recursive on the causal structure of the game. The key technical idea in this paper is the use of continuation passing style for reasoning about the future consequences of players' choices, closely based on applications of selection functions in game theory. Additionally, the clean categorical foundation gives many opportunities for generalisation, for example to learning agents. ",jules hedges,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,String diagrams for game theory,0366c29c21a7e2f45339b17808ec7f90,http://arxiv.org/abs/1503.06072v1 15705," We consider combinatorial avoidance and achievement games based on graph Ramsey theory: The players take turns in coloring still uncolored edges of a graph G, each player being assigned a distinct color, choosing one edge per move. In avoidance games, completing a monochromatic subgraph isomorphic to another graph A leads to immediate defeat or is forbidden and the first player that cannot move loses. In the avoidance+ variants, both players are free to choose more than one edge per move. In achievement games, the first player that completes a monochromatic subgraph isomorphic to A wins. Erdos & Selfridge (1973) were the first to identify some tractable subcases of these games, followed by a large number of further studies. We complete these investigations by settling the complexity of all unrestricted cases: We prove that general graph Ramsey avoidance, avoidance+, and achievement games and several variants thereof are PSPACE-complete. We ultra-strongly solve some nontrivial instances of graph Ramsey avoidance games that are based on symmetric binary Ramsey numbers and provide strong evidence that all other cases based on symmetric binary Ramsey numbers are effectively intractable. Keywords: combinatorial games, graph Ramsey theory, Ramsey game, PSPACE-completeness, complexity, edge coloring, winning strategy, achievement game, avoidance game, the game of Sim, Polya's enumeration formula, probabilistic counting, machine learning, heuristics, Java applet ",wolfgang slany,,1999.0,,arXiv,Slany1999,True,,arXiv,Not available,Graph Ramsey games,aa8d2a15177cc350dc6461f58e2534f8,http://arxiv.org/abs/cs/9911004v1 15706," The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game their randomness might be insufficient if the game is played many times. In this work, we ask whether randomness is necessary for equilibria to exist in finitely repeated games. We show that for a large class of games containing arbitrary two-player zero-sum games, approximate Nash equilibria of the $n$-stage repeated version of the game exist if and only if both players have $\Omega(n)$ random bits. In contrast, we show that there exists a class of games for which no equilibrium exists in pure strategies, yet the $n$-stage repeated version of the game has an exact Nash equilibrium in which each player uses only a constant number of random bits. When the players are assumed to be computationally bounded, if cryptographic pseudorandom generators (or, equivalently, one-way functions) exist, then the players can base their strategies on ""random-like"" sequences derived from only a small number of truly random bits. We show that, in contrast, in repeated two-player zero-sum games, if pseudorandom generators \emph{do not} exist, then $\Omega(n)$ random bits remain necessary for equilibria to exist. ",pavel hubacek,,2015.0,,arXiv,Hubáček2015,True,,arXiv,Not available,When Can Limited Randomness Be Used in Repeated Games?,7291c2bed7e12afe66621ae1b5959d30,http://arxiv.org/abs/1507.01191v1 15707," In a sponsored search auction the advertisement slots on a search result page are generally ordered by click-through rate. Bidders have a valuation, which is usually assumed to be linear in the click-through rate, a budget constraint, and receive at most one slot per search result page (round). We study multi-round sponsored search auctions, where the different rounds are linked through the budget constraints of the bidders and the valuation of a bidder for all rounds is the sum of the valuations for the individual rounds. All mechanisms published so far either study one-round sponsored search auctions or the setting where every round has only one slot and all slots have the same click-through rate, which is identical to a multi-item auction. This paper contains the following three results: (1) We give the first mechanism for the multi-round sponsored search problem where different slots have different click-through rates. Our mechanism is incentive compatible in expectation, individually rational in expectation, Pareto optimal in expectation, and also ex-post Pareto optimal for each realized outcome. (2) Additionally we study the combinatorial setting, where each bidder is only interested in a subset of the rounds. We give a deterministic, incentive compatible, individually rational, and Pareto optimal mechanism for the setting where all slots have the same click-through rate. (3) We present an impossibility result for auctions where bidders have diminishing marginal valuations. Specifically, we show that even for the multi-unit (one slot per round) setting there is no incentive compatible, individually rational, and Pareto optimal mechanism for private diminishing marginal valuations and public budgets. ",martin starnberger,,2011.0,,arXiv,Colini-Baldeschi2011,True,,arXiv,Not available,On Multiple Round Sponsored Search Auctions with Budgets,617a7b237cce397f3e57168175fb515e,http://arxiv.org/abs/1112.6361v1 15708," The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game their randomness might be insufficient if the game is played many times. In this work, we ask whether randomness is necessary for equilibria to exist in finitely repeated games. We show that for a large class of games containing arbitrary two-player zero-sum games, approximate Nash equilibria of the $n$-stage repeated version of the game exist if and only if both players have $\Omega(n)$ random bits. In contrast, we show that there exists a class of games for which no equilibrium exists in pure strategies, yet the $n$-stage repeated version of the game has an exact Nash equilibrium in which each player uses only a constant number of random bits. When the players are assumed to be computationally bounded, if cryptographic pseudorandom generators (or, equivalently, one-way functions) exist, then the players can base their strategies on ""random-like"" sequences derived from only a small number of truly random bits. We show that, in contrast, in repeated two-player zero-sum games, if pseudorandom generators \emph{do not} exist, then $\Omega(n)$ random bits remain necessary for equilibria to exist. ",moni naor,,2015.0,,arXiv,Hubáček2015,True,,arXiv,Not available,When Can Limited Randomness Be Used in Repeated Games?,7291c2bed7e12afe66621ae1b5959d30,http://arxiv.org/abs/1507.01191v1 15709," The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game their randomness might be insufficient if the game is played many times. In this work, we ask whether randomness is necessary for equilibria to exist in finitely repeated games. We show that for a large class of games containing arbitrary two-player zero-sum games, approximate Nash equilibria of the $n$-stage repeated version of the game exist if and only if both players have $\Omega(n)$ random bits. In contrast, we show that there exists a class of games for which no equilibrium exists in pure strategies, yet the $n$-stage repeated version of the game has an exact Nash equilibrium in which each player uses only a constant number of random bits. When the players are assumed to be computationally bounded, if cryptographic pseudorandom generators (or, equivalently, one-way functions) exist, then the players can base their strategies on ""random-like"" sequences derived from only a small number of truly random bits. We show that, in contrast, in repeated two-player zero-sum games, if pseudorandom generators \emph{do not} exist, then $\Omega(n)$ random bits remain necessary for equilibria to exist. ",jonathan ullman,,2015.0,,arXiv,Hubáček2015,True,,arXiv,Not available,When Can Limited Randomness Be Used in Repeated Games?,7291c2bed7e12afe66621ae1b5959d30,http://arxiv.org/abs/1507.01191v1 15710," In an investigation of the applications of Combinatorial Game Theory to chess, we construct novel mutual Zugzwang positions, explain an otherwise mysterious pawn endgame from ""A Guide to Chess Endings"" (Euwe and Hooper), show positions containing non-integer values (fractions, switches, tinies, and loopy games), and pose open problems concerning the values that may be realized by positions on either standard or nonstandard chessboards. ",noam elkies,,1999.0,,"Pages 135-150 of ""Games of No Choice"" (Proceedings of 7/94 MSRI conference on combinatorial games), MSRI Publ. #29 (1996) via Cambridge U. Press",Elkies1999,True,,arXiv,Not available,On numbers and endgames: Combinatorial game theory in chess endgames,d36468d1e2b3b47c88c77b62e5ce2685,http://arxiv.org/abs/math/9905198v1 15711," This article uses data from two experimental studies of two-person Prisoner's Dilemma games [1, 2] and compares the data with the theoretic predictions calculated with the use of a quantum game theoretical method. The experimental findings of the cooperation percentage Cp indicate a strong connectivity with the properties of a novel function (N), which depends on the payoff parameters of the game and the entanglement parameter . A classification scheme depending on four quantum cooperation indicators is developed to describe cooperation in real two-person games. The quantum indicators lead to results, that are at least as good as the cooperation predictions derived from classical game theory. ",matthias hanauske,,2007.0,,arXiv,Hanauske2007,True,,arXiv,Not available,Experimental Validation of Quantum Game Theory,13f8aaca081ef3b8623df30e40527251,http://arxiv.org/abs/0707.3068v1 15712," This article uses data from two experimental studies of two-person Prisoner's Dilemma games [1, 2] and compares the data with the theoretic predictions calculated with the use of a quantum game theoretical method. The experimental findings of the cooperation percentage Cp indicate a strong connectivity with the properties of a novel function (N), which depends on the payoff parameters of the game and the entanglement parameter . A classification scheme depending on four quantum cooperation indicators is developed to describe cooperation in real two-person games. The quantum indicators lead to results, that are at least as good as the cooperation predictions derived from classical game theory. ",steffen bernius,,2007.0,,arXiv,Hanauske2007,True,,arXiv,Not available,Experimental Validation of Quantum Game Theory,13f8aaca081ef3b8623df30e40527251,http://arxiv.org/abs/0707.3068v1 15713," This article uses data from two experimental studies of two-person Prisoner's Dilemma games [1, 2] and compares the data with the theoretic predictions calculated with the use of a quantum game theoretical method. The experimental findings of the cooperation percentage Cp indicate a strong connectivity with the properties of a novel function (N), which depends on the payoff parameters of the game and the entanglement parameter . A classification scheme depending on four quantum cooperation indicators is developed to describe cooperation in real two-person games. The quantum indicators lead to results, that are at least as good as the cooperation predictions derived from classical game theory. ",wolfgang koenig,,2007.0,,arXiv,Hanauske2007,True,,arXiv,Not available,Experimental Validation of Quantum Game Theory,13f8aaca081ef3b8623df30e40527251,http://arxiv.org/abs/0707.3068v1 15714," This article uses data from two experimental studies of two-person Prisoner's Dilemma games [1, 2] and compares the data with the theoretic predictions calculated with the use of a quantum game theoretical method. The experimental findings of the cooperation percentage Cp indicate a strong connectivity with the properties of a novel function (N), which depends on the payoff parameters of the game and the entanglement parameter . A classification scheme depending on four quantum cooperation indicators is developed to describe cooperation in real two-person games. The quantum indicators lead to results, that are at least as good as the cooperation predictions derived from classical game theory. ",berndt dugall,,2007.0,,arXiv,Hanauske2007,True,,arXiv,Not available,Experimental Validation of Quantum Game Theory,13f8aaca081ef3b8623df30e40527251,http://arxiv.org/abs/0707.3068v1 15715," This is a short introduction to the subject of strategic games. We focus on the concepts of best response, Nash equilibrium, strict and weak dominance, and mixed strategies, and study the relation between these concepts in the context of the iterated elimination of strategies. Also, we discuss some variants of the original definition of a strategic game. Finally, we introduce the basics of mechanism design and use pre-Bayesian games to explain it. ",krzysztof apt,,2011.0,,arXiv,Apt2011,True,,arXiv,Not available,A Primer on Strategic Games,a7c076673faf0d249c9eff56791571f7,http://arxiv.org/abs/1102.0203v1 15716," Iterated admissibility is a well-known and important concept in classical game theory, e.g. to determine rational behaviors in multi-player matrix games. As recently shown by Berwanger, this concept can be soundly extended to infinite games played on graphs with omega-regular objectives. In this paper, we study the algorithmic properties of this concept for such games. We settle the exact complexity of natural decision problems on the set of strategies that survive iterated elimination of dominated strategies. As a byproduct of our construction, we obtain automata which recognize all the possible outcomes of such strategies. ",romain brenguier,,2013.0,,arXiv,Brenguier2013,True,,arXiv,Not available,The Complexity of Admissibility in Omega-Regular Games,1ce0a3a2f23c05ba8f36ea113bcb1e54,http://arxiv.org/abs/1304.1682v3 15717," Iterated admissibility is a well-known and important concept in classical game theory, e.g. to determine rational behaviors in multi-player matrix games. As recently shown by Berwanger, this concept can be soundly extended to infinite games played on graphs with omega-regular objectives. In this paper, we study the algorithmic properties of this concept for such games. We settle the exact complexity of natural decision problems on the set of strategies that survive iterated elimination of dominated strategies. As a byproduct of our construction, we obtain automata which recognize all the possible outcomes of such strategies. ",jean-francois raskin,,2013.0,,arXiv,Brenguier2013,True,,arXiv,Not available,The Complexity of Admissibility in Omega-Regular Games,1ce0a3a2f23c05ba8f36ea113bcb1e54,http://arxiv.org/abs/1304.1682v3 15718," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",alessandro chiesa,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 15719," Iterated admissibility is a well-known and important concept in classical game theory, e.g. to determine rational behaviors in multi-player matrix games. As recently shown by Berwanger, this concept can be soundly extended to infinite games played on graphs with omega-regular objectives. In this paper, we study the algorithmic properties of this concept for such games. We settle the exact complexity of natural decision problems on the set of strategies that survive iterated elimination of dominated strategies. As a byproduct of our construction, we obtain automata which recognize all the possible outcomes of such strategies. ",mathieu sassolas,,2013.0,,arXiv,Brenguier2013,True,,arXiv,Not available,The Complexity of Admissibility in Omega-Regular Games,1ce0a3a2f23c05ba8f36ea113bcb1e54,http://arxiv.org/abs/1304.1682v3 15720," In recent work, semantic games of independence-friendly logic were studied in strategic form in terms of (mixed strategy) Nash equilibria. The class of strategic games of independence-friendly logic is contained in the class of win-loss, zero-sum two-player games. In this note we draw on the theory of linear programming to develop tools to analyze the value of such games. We give two applications of these tools to independence-friendly logic under the so-called equilibrium semantics. ",merlijn sevenster,,2014.0,,arXiv,Sevenster2014,True,,arXiv,Not available,"Linear Programming Tools for Analyzing Strategic Games of Independence-Friendly Logic and Applications",76a593f6439aad753ce5a37df2ec95ae,http://arxiv.org/abs/1401.4927v1 15721," Schmidt's game is a powerful tool for studying properties of certain sets which arise in Diophantine approximation theory, number theory, and dynamics. Recently, many new results have been proven using this game. In this paper we address determinacy and indeterminacy questions regarding Schmidt's game and its variations, as well as more general games played on complete metric spaces (e.g. fractals). We show that except for certain exceptional cases, these games are undetermined on Bernstein sets. ",lior fishman,,2013.0,10.1017/S0004972714000069,"Bull. Aust. Math. Soc. 90 (2014), 339-351",Fishman2013,True,,arXiv,Not available,Determinacy and indeterminacy of games played on complete metric spaces,45a0ec92e05b4c9a9fc5e36b6af41bf7,http://arxiv.org/abs/1307.3951v1 15722," Schmidt's game is a powerful tool for studying properties of certain sets which arise in Diophantine approximation theory, number theory, and dynamics. Recently, many new results have been proven using this game. In this paper we address determinacy and indeterminacy questions regarding Schmidt's game and its variations, as well as more general games played on complete metric spaces (e.g. fractals). We show that except for certain exceptional cases, these games are undetermined on Bernstein sets. ",tue ly,,2013.0,10.1017/S0004972714000069,"Bull. Aust. Math. Soc. 90 (2014), 339-351",Fishman2013,True,,arXiv,Not available,Determinacy and indeterminacy of games played on complete metric spaces,45a0ec92e05b4c9a9fc5e36b6af41bf7,http://arxiv.org/abs/1307.3951v1 15723," Schmidt's game is a powerful tool for studying properties of certain sets which arise in Diophantine approximation theory, number theory, and dynamics. Recently, many new results have been proven using this game. In this paper we address determinacy and indeterminacy questions regarding Schmidt's game and its variations, as well as more general games played on complete metric spaces (e.g. fractals). We show that except for certain exceptional cases, these games are undetermined on Bernstein sets. ",david simmons,,2013.0,10.1017/S0004972714000069,"Bull. Aust. Math. Soc. 90 (2014), 339-351",Fishman2013,True,,arXiv,Not available,Determinacy and indeterminacy of games played on complete metric spaces,45a0ec92e05b4c9a9fc5e36b6af41bf7,http://arxiv.org/abs/1307.3951v1 15724," In this work, we proposed a new $N$-person game in which the players can bet on two options, for example represented by two boxers. Some of the players have privileged information about the boxers and part of them can provide this information to uninformed players. However, this information may be true if the informed player is altruist or false if he is selfish. So, in this game, the players are divided in three categories: informed and altruist players, informed and selfish players, and uninformed players. By considering the matchings ($N/2$ distinct pairs of randomly chosen players) and that the payoff of the winning group follows aspects captured from two important games, the public goods game and minority game, we showed quantitatively and qualitatively how the altruism can impact on the privileged information. We localized analytically the regions of positive payoffs which were corroborated by numerical simulations performed for all values of information and altruism densities given that we know the information level of the informed players. Finally, in an evolutionary version of the game ,we showed that the gain of the informed players can get worse if we adopted the following procedure: the players increase their investment for situations of positive payoffs, and decrease their investment when negative payoffs occur. ",roberto silva,,2017.0,10.1016/j.physa.2018.02.209,arXiv,Silva2017,True,,arXiv,Not available,"When and how much the altruism impacts your privileged information? Proposing a new paradigm in game theory: The boxers game",8a2f68fa2bbe08da6f08c80be2f37ad6,http://arxiv.org/abs/1712.00070v2 15725," In this work, we proposed a new $N$-person game in which the players can bet on two options, for example represented by two boxers. Some of the players have privileged information about the boxers and part of them can provide this information to uninformed players. However, this information may be true if the informed player is altruist or false if he is selfish. So, in this game, the players are divided in three categories: informed and altruist players, informed and selfish players, and uninformed players. By considering the matchings ($N/2$ distinct pairs of randomly chosen players) and that the payoff of the winning group follows aspects captured from two important games, the public goods game and minority game, we showed quantitatively and qualitatively how the altruism can impact on the privileged information. We localized analytically the regions of positive payoffs which were corroborated by numerical simulations performed for all values of information and altruism densities given that we know the information level of the informed players. Finally, in an evolutionary version of the game ,we showed that the gain of the informed players can get worse if we adopted the following procedure: the players increase their investment for situations of positive payoffs, and decrease their investment when negative payoffs occur. ",henrique fernandes,,2017.0,10.1016/j.physa.2018.02.209,arXiv,Silva2017,True,,arXiv,Not available,"When and how much the altruism impacts your privileged information? Proposing a new paradigm in game theory: The boxers game",8a2f68fa2bbe08da6f08c80be2f37ad6,http://arxiv.org/abs/1712.00070v2 15726," Subtraction games are played with one or more heaps of tokens, with players taking turns removing from a single heap a number of tokens belonging to a specified subtraction set; the last player to move wins. We describe how to compute the set of winning heap sizes in single-heap subtraction games (for an input consisting of the subtraction set and maximum heap size $n$), in time $\tilde O(n)$, where the $\tilde O$ elides logarithmic factors. For multi-heap games, the optimal game play is determined by the nim-value of each heap; we describe how to compute the nim-values of all heaps of size up to~$n$ in time $\tilde O(mn)$, where $m$ is the maximum nim-value occurring among these heap sizes. These time bounds improve naive dynamic programming algorithms with time $O(n|S|)$, because $m\le|S|$ for all such games. We apply these results to the game of subtract-a-square, whose set of winning positions is a maximal square-difference-free set of a type studied in number theory in connection with the Furstenberg-S\'ark\""ozy theorem. We provide experimental evidence that, for this game, the set of winning positions has a density comparable to that of the densest known square-difference-free sets, and has a modular structure related to the known constructions for these dense sets. Additionally, this game's nim-values are (experimentally) significantly smaller than the size of its subtraction set, implying that our algorithm achieves a polynomial speedup over dynamic programming. ",david eppstein,,2018.0,,arXiv,Eppstein2018,True,,arXiv,Not available,Faster Evaluation of Subtraction Games,0111196c0d44d6ac3cd09a3132fb9ca0,http://arxiv.org/abs/1804.06515v1 15727," We introduce a way to parameterize automata and games on finite graphs with natural numbers. The parameters are accessed essentially by allowing counting down from the parameter value to 0 and branching depending on whether 0 has been reached. The main technical result is that in games, a player can win for some values of the parameters at all, if she can win for some values below an exponential bound. For many winning conditions, this implies decidability of any statements about a player being able to win with arbitrary quantification over the parameter values. While the result seems broadly applicable, a specific motivation comes from the study of chains of strategies in games. Chains of games were recently suggested as a means to define a rationality notion based on dominance that works well with quantitative games by Bassett, Jecker, P., Raskin and Van den Boogard. From the main result of this paper, we obtain generalizations of their decidability results with much simpler proofs. As both a core technical notion in the proof of the main result, and as a notion of potential independent interest, we look at boolean functions defined via graph game forms. Graph game forms have properties akin to monotone circuits, albeit are more concise. We raise some open questions regarding how concise they are exactly, which have a flavour similar to circuit complexity. Answers to these questions could improve the bounds in the main theorem. ",arno pauly,,2018.0,10.4204/EPTCS.277.3,"EPTCS 277, 2018, pp. 30-42",Pauly2018,True,,arXiv,Not available,Parameterized Games and Parameterized Automata,95b5548a11c43a8b4d0534374f697efb,http://arxiv.org/abs/1809.03093v1 15728," Combinatorial game theory (CGT), as introduced by Berlekamp, Conway and Guy, involves two players who move alternately in a perfect information, zero-sum game, and there are no chance devices. Also the games have the finite descent property (every game terminates in a finite number of moves). The two players are usually called Left and Right. The games often break up into components and the players must choose one of the components in which to play. One main aim of CGT is to analyze the components individually (rather than analyzing the sum as a whole) then use this information to analyze the sum. In this paper, the players move simultaneously in a combinatorial game. Three sums are considered which are defined by the termination rules: (i) one component does not have a simultaneous move; (ii) no component has a simultaneous move; (iii) one player has no move in any component. These are combined with a winning convention which is either: (i) based on which player has moves remaining; or (ii) the greatest score. In each combination, we show that equality of games induces an equivalence relation and the equivalence classes are partially ordered. Also, where possible, given games $A$ and $B$, we give checks to determine if Left prefers to replace $A$ by $B$ in a sum. ",melissa huggan,,2018.0,,arXiv,Huggan2018,True,,arXiv,Not available,Simultaneous Combinatorial Game Theory,aa8cff14b7a8be20a51054164b41994c,http://arxiv.org/abs/1810.02870v1 15729," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 15730," Combinatorial game theory (CGT), as introduced by Berlekamp, Conway and Guy, involves two players who move alternately in a perfect information, zero-sum game, and there are no chance devices. Also the games have the finite descent property (every game terminates in a finite number of moves). The two players are usually called Left and Right. The games often break up into components and the players must choose one of the components in which to play. One main aim of CGT is to analyze the components individually (rather than analyzing the sum as a whole) then use this information to analyze the sum. In this paper, the players move simultaneously in a combinatorial game. Three sums are considered which are defined by the termination rules: (i) one component does not have a simultaneous move; (ii) no component has a simultaneous move; (iii) one player has no move in any component. These are combined with a winning convention which is either: (i) based on which player has moves remaining; or (ii) the greatest score. In each combination, we show that equality of games induces an equivalence relation and the equivalence classes are partially ordered. Also, where possible, given games $A$ and $B$, we give checks to determine if Left prefers to replace $A$ by $B$ in a sum. ",richard nowakowski,,2018.0,,arXiv,Huggan2018,True,,arXiv,Not available,Simultaneous Combinatorial Game Theory,aa8cff14b7a8be20a51054164b41994c,http://arxiv.org/abs/1810.02870v1 15731," Combinatorial game theory (CGT), as introduced by Berlekamp, Conway and Guy, involves two players who move alternately in a perfect information, zero-sum game, and there are no chance devices. Also the games have the finite descent property (every game terminates in a finite number of moves). The two players are usually called Left and Right. The games often break up into components and the players must choose one of the components in which to play. One main aim of CGT is to analyze the components individually (rather than analyzing the sum as a whole) then use this information to analyze the sum. In this paper, the players move simultaneously in a combinatorial game. Three sums are considered which are defined by the termination rules: (i) one component does not have a simultaneous move; (ii) no component has a simultaneous move; (iii) one player has no move in any component. These are combined with a winning convention which is either: (i) based on which player has moves remaining; or (ii) the greatest score. In each combination, we show that equality of games induces an equivalence relation and the equivalence classes are partially ordered. Also, where possible, given games $A$ and $B$, we give checks to determine if Left prefers to replace $A$ by $B$ in a sum. ",paul ottaway,,2018.0,,arXiv,Huggan2018,True,,arXiv,Not available,Simultaneous Combinatorial Game Theory,aa8cff14b7a8be20a51054164b41994c,http://arxiv.org/abs/1810.02870v1 15732," Wireless communications with unmanned aerial vehicles (UAVs) offer a promising solution to provide cost-effective wireless connectivity and extend coverage. In recent years, the area of wireless communications for UAV system design and optimization has been receiving enormous attention from the research community. However, there are still existing challenges that are far from solved. To cope with those challenges, researchers have been exploring the applicability of game-theoretic approaches. This paper surveys the existing game-theoretic solutions and presents a number of novel solutions which are designed to optimize energy consumption, enhance network coverage, and improve connectivity in wireless communications with UAVs. We present main game components and the elements they represent in wireless communications with UAVs first and then give a classification of the current used game-theoretic approaches. We identify main problems in wireless communications with UAVs in which game theory has been used to find solutions. We provide a case to show the merits of applying game theory in wireless communication with UAVs. Finally, we discuss shortcomings of the traditional game-theoretic approaches and propose mean field game (MFG) as an appropriate method for solving novel technical problems in massive UAVs networks. ",mbazingwa mkiramweni,,2018.0,,arXiv,Mkiramweni2018,True,,arXiv,Not available,"Game-Theoretic Approaches for Wireless Communications with Unmanned Aerial Vehicles",be9924e83713c0435487ff73c6f3ddc2,http://arxiv.org/abs/1810.07379v1 15733," Wireless communications with unmanned aerial vehicles (UAVs) offer a promising solution to provide cost-effective wireless connectivity and extend coverage. In recent years, the area of wireless communications for UAV system design and optimization has been receiving enormous attention from the research community. However, there are still existing challenges that are far from solved. To cope with those challenges, researchers have been exploring the applicability of game-theoretic approaches. This paper surveys the existing game-theoretic solutions and presents a number of novel solutions which are designed to optimize energy consumption, enhance network coverage, and improve connectivity in wireless communications with UAVs. We present main game components and the elements they represent in wireless communications with UAVs first and then give a classification of the current used game-theoretic approaches. We identify main problems in wireless communications with UAVs in which game theory has been used to find solutions. We provide a case to show the merits of applying game theory in wireless communication with UAVs. Finally, we discuss shortcomings of the traditional game-theoretic approaches and propose mean field game (MFG) as an appropriate method for solving novel technical problems in massive UAVs networks. ",chungang yang,,2018.0,,arXiv,Mkiramweni2018,True,,arXiv,Not available,"Game-Theoretic Approaches for Wireless Communications with Unmanned Aerial Vehicles",be9924e83713c0435487ff73c6f3ddc2,http://arxiv.org/abs/1810.07379v1 15734," Wireless communications with unmanned aerial vehicles (UAVs) offer a promising solution to provide cost-effective wireless connectivity and extend coverage. In recent years, the area of wireless communications for UAV system design and optimization has been receiving enormous attention from the research community. However, there are still existing challenges that are far from solved. To cope with those challenges, researchers have been exploring the applicability of game-theoretic approaches. This paper surveys the existing game-theoretic solutions and presents a number of novel solutions which are designed to optimize energy consumption, enhance network coverage, and improve connectivity in wireless communications with UAVs. We present main game components and the elements they represent in wireless communications with UAVs first and then give a classification of the current used game-theoretic approaches. We identify main problems in wireless communications with UAVs in which game theory has been used to find solutions. We provide a case to show the merits of applying game theory in wireless communication with UAVs. Finally, we discuss shortcomings of the traditional game-theoretic approaches and propose mean field game (MFG) as an appropriate method for solving novel technical problems in massive UAVs networks. ",jiandong li,,2018.0,,arXiv,Mkiramweni2018,True,,arXiv,Not available,"Game-Theoretic Approaches for Wireless Communications with Unmanned Aerial Vehicles",be9924e83713c0435487ff73c6f3ddc2,http://arxiv.org/abs/1810.07379v1 15735," Wireless communications with unmanned aerial vehicles (UAVs) offer a promising solution to provide cost-effective wireless connectivity and extend coverage. In recent years, the area of wireless communications for UAV system design and optimization has been receiving enormous attention from the research community. However, there are still existing challenges that are far from solved. To cope with those challenges, researchers have been exploring the applicability of game-theoretic approaches. This paper surveys the existing game-theoretic solutions and presents a number of novel solutions which are designed to optimize energy consumption, enhance network coverage, and improve connectivity in wireless communications with UAVs. We present main game components and the elements they represent in wireless communications with UAVs first and then give a classification of the current used game-theoretic approaches. We identify main problems in wireless communications with UAVs in which game theory has been used to find solutions. We provide a case to show the merits of applying game theory in wireless communication with UAVs. Finally, we discuss shortcomings of the traditional game-theoretic approaches and propose mean field game (MFG) as an appropriate method for solving novel technical problems in massive UAVs networks. ",zhu han,,2018.0,,arXiv,Mkiramweni2018,True,,arXiv,Not available,"Game-Theoretic Approaches for Wireless Communications with Unmanned Aerial Vehicles",be9924e83713c0435487ff73c6f3ddc2,http://arxiv.org/abs/1810.07379v1 15736," In Parrondo's games, the apparently paradoxical situation occurs where individually losing games combine to win. The basic formulation and definitions of Parrondo's games are described in Harmer et al.. These games have recently gained considerable attention as they are physically motivated and have been related to physical systems such as the Brownian ratchet, lattice gas automata and spin systems. Various authors have pointed outinterest in these games for areas as diverse as biogenesis, political models, small-world networks, economics and population genetics. In this chapter, we will first introduce the relevant properties of Markov transition operators and then introduce some terminology and visualisation techniques from the theory of dynamical systems. We will then use these tools, later in the chapter, to define and investigate some interesting properties of Parrondo's games. ",a. allison,,2002.0,,arXiv,Allison2002,True,,arXiv,Not available,State-Space Visualisation and Fractal Properties of Parrondo's Games,1dc074237337dc8f5d0049cdf4d0e7ac,http://arxiv.org/abs/cond-mat/0205536v2 15737," In Parrondo's games, the apparently paradoxical situation occurs where individually losing games combine to win. The basic formulation and definitions of Parrondo's games are described in Harmer et al.. These games have recently gained considerable attention as they are physically motivated and have been related to physical systems such as the Brownian ratchet, lattice gas automata and spin systems. Various authors have pointed outinterest in these games for areas as diverse as biogenesis, political models, small-world networks, economics and population genetics. In this chapter, we will first introduce the relevant properties of Markov transition operators and then introduce some terminology and visualisation techniques from the theory of dynamical systems. We will then use these tools, later in the chapter, to define and investigate some interesting properties of Parrondo's games. ",c. pearce,,2002.0,,arXiv,Allison2002,True,,arXiv,Not available,State-Space Visualisation and Fractal Properties of Parrondo's Games,1dc074237337dc8f5d0049cdf4d0e7ac,http://arxiv.org/abs/cond-mat/0205536v2 15738," In Parrondo's games, the apparently paradoxical situation occurs where individually losing games combine to win. The basic formulation and definitions of Parrondo's games are described in Harmer et al.. These games have recently gained considerable attention as they are physically motivated and have been related to physical systems such as the Brownian ratchet, lattice gas automata and spin systems. Various authors have pointed outinterest in these games for areas as diverse as biogenesis, political models, small-world networks, economics and population genetics. In this chapter, we will first introduce the relevant properties of Markov transition operators and then introduce some terminology and visualisation techniques from the theory of dynamical systems. We will then use these tools, later in the chapter, to define and investigate some interesting properties of Parrondo's games. ",d. abbott,,2002.0,,arXiv,Allison2002,True,,arXiv,Not available,State-Space Visualisation and Fractal Properties of Parrondo's Games,1dc074237337dc8f5d0049cdf4d0e7ac,http://arxiv.org/abs/cond-mat/0205536v2 15739," Evolutionarily Stable Strategy (ESS) in classical game theory is a refinement of Nash equilibrium concept. We investigate the consequences when a small group of mutants using quantum strategies try to invade a classical ESS in a population engaged in symmetric bimatrix game of Prisoner's Dilemma. Secondly we show that in an asymmetric quantum game between two players an ESS pair can be made to appear or disappear by resorting to entangled or unentangled initial states used to play the game even when the strategy pair remains a Nash equilibrium in both forms of the game. ",a. iqbal,,2000.0,10.1016/S0375-9601(01)00082-2,"Physics Letters, A 280/5-6 (2001), pp 249-256",Iqbal2000,True,,arXiv,Not available,Evolutionarily Stable Strategies in Quantum Games,0d17af9e2b5631e79f35f68ec722c809,http://arxiv.org/abs/quant-ph/0007100v3 15740," We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,Knightian Analysis of the Vickrey Mechanism,aeeb1153b97570dc5a2783cdcc7489d6,http://arxiv.org/abs/1403.6413v3 15741," Evolutionarily Stable Strategy (ESS) in classical game theory is a refinement of Nash equilibrium concept. We investigate the consequences when a small group of mutants using quantum strategies try to invade a classical ESS in a population engaged in symmetric bimatrix game of Prisoner's Dilemma. Secondly we show that in an asymmetric quantum game between two players an ESS pair can be made to appear or disappear by resorting to entangled or unentangled initial states used to play the game even when the strategy pair remains a Nash equilibrium in both forms of the game. ",a. toor,,2000.0,10.1016/S0375-9601(01)00082-2,"Physics Letters, A 280/5-6 (2001), pp 249-256",Iqbal2000,True,,arXiv,Not available,Evolutionarily Stable Strategies in Quantum Games,0d17af9e2b5631e79f35f68ec722c809,http://arxiv.org/abs/quant-ph/0007100v3 15742," Parity games are combinatorial representations of closed Boolean mu-terms. By adding to them draw positions, they have been organized by Arnold and one of the authors into a mu-calculus. As done by Berwanger et al. for the propositional modal mu-calculus, it is possible to classify parity games into levels of a hierarchy according to the number of fixed-point variables. We ask whether this hierarchy collapses w.r.t. the standard interpretation of the games mu-calculus into the class of all complete lattices. We answer this question negatively by providing, for each n >= 1, a parity game Gn with these properties: it unravels to a mu-term built up with n fixed-point variables, it is semantically equivalent to no game with strictly less than n-2 fixed-point variables. ",walid belkhir,,2007.0,,arXiv,Belkhir2007,True,,arXiv,Not available,The Variable Hierarchy for the Games mu-Calculus,83a9eb86f712c62e1acb75ebe7e7bc53,http://arxiv.org/abs/0710.2419v2 15743," Parity games are combinatorial representations of closed Boolean mu-terms. By adding to them draw positions, they have been organized by Arnold and one of the authors into a mu-calculus. As done by Berwanger et al. for the propositional modal mu-calculus, it is possible to classify parity games into levels of a hierarchy according to the number of fixed-point variables. We ask whether this hierarchy collapses w.r.t. the standard interpretation of the games mu-calculus into the class of all complete lattices. We answer this question negatively by providing, for each n >= 1, a parity game Gn with these properties: it unravels to a mu-term built up with n fixed-point variables, it is semantically equivalent to no game with strictly less than n-2 fixed-point variables. ",luigi santocanale,,2007.0,,arXiv,Belkhir2007,True,,arXiv,Not available,The Variable Hierarchy for the Games mu-Calculus,83a9eb86f712c62e1acb75ebe7e7bc53,http://arxiv.org/abs/0710.2419v2 15744," Many models from a variety of areas involve the computation of an equilibrium or fixed point of some kind. Examples include Nash equilibria in games; market equilibria; computing optimal strategies and the values of competitive games (stochastic and other games); stable configurations of neural networks; analysing basic stochastic models for evolution like branching processes and for language like stochastic context-free grammars; and models that incorporate the basic primitives of probability and recursion like recursive Markov chains. It is not known whether these problems can be solved in polynomial time. There are certain common computational principles underlying different types of equilibria, which are captured by the complexity classes PLS, PPAD, and FIXP. Representative complete problems for these classes are respectively, pure Nash equilibria in games where they are guaranteed to exist, (mixed) Nash equilibria in 2-player normal form games, and (mixed) Nash equilibria in normal form games with 3 (or more) players. This paper reviews the underlying computational principles and the corresponding classes. ",mihalis yannakakis,,2008.0,,"Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)",Yannakakis2008,True,,arXiv,Not available,"Equilibria, Fixed Points, and Complexity Classes",11ff57f53870ff7ddaf08d632038b0a5,http://arxiv.org/abs/0802.2831v1 15745," This paper presents a new mathematical formalism that describes the quantization of games. The study of so-called quantum games is quite new, arising from a seminal paper of D. Meyer \cite{Meyer} published in Physics Review Letters in 1999. The ensuing near decade has seen an explosion of contributions and controversy over what exactly a quantized game really is and if there is indeed anything new for game theory. What has clouded many of the issues is the lack of a mathematical formalism for the subject in which these various issues can be clearly and precisely expressed, and which provides a context in which to present their resolution. Such a formalism is presented here, along with proposed resolutions to some of the issues discussed in the literature. One in particular, the question of whether there can exist equilibria in a quantized version of a game that do not correspond to classical correlated equilibria of that game and also deliver better payoffs than the classical correlated equilibria is answered in the affirmative for the Prisoner's Dilemma and Simplified Poker. ",steven bleiler,,2008.0,,arXiv,Bleiler2008,True,,arXiv,Not available,A Formalism for Quantum Games and an Application,a530bf6097cb60de10a795a423462bcb,http://arxiv.org/abs/0808.1389v1 15746," The need of totally secure online auction has led to the invention of many auction protocols. But as new attacks are developed, auction protocols also require corresponding strengthening. We analyze the auction protocol based on the well-known mathematical public-key knapsack problem for the design of asymmetric public-key knapsack trapdoor cryptosystem. Even though the knapsack system is not cryptographically secure, it can be used in certain auction situations. We describe the limitations of the protocol like detecting and solving the tie between bidders, malicious behavior of participants and also selection of price set by the seller and offer solutions. ",navya chodisetti,,2014.0,,arXiv,Chodisetti2014,True,,arXiv,Not available,Analysis of Digital Knapsack Based Sealed Bid Auction,fe96585b3018fcbe9632566ed73badd5,http://arxiv.org/abs/1405.0201v1 15747," Max Consensus-based Auction (MCA) protocols are an elegant approach to establish conflict-free distributed allocations in a wide range of network utility maximization problems. A set of agents independently bid on a set of items, and exchange their bids with their first hop-neighbors for a distributed (max-consensus) winner determination. The use of MCA protocols was proposed, $e.g.$, to solve the task allocation problem for a fleet of unmanned aerial vehicles, in smart grids, or in distributed virtual network management applications. Misconfigured or malicious agents participating in a MCA, or an incorrect instantiation of policies can lead to oscillations of the protocol, causing, $e.g.$, Service Level Agreement (SLA) violations. In this paper, we propose a formal, machine-readable, Max-Consensus Auction model, encoded in the Alloy lightweight modeling language. The model consists of a network of agents applying the MCA mechanisms, instantiated with potentially different policies, and a set of predicates to analyze its convergence properties. We were able to verify that MCA is not resilient against rebidding attacks, and that the protocol fails (to achieve a conflict-free resource allocation) for some specific combinations of policies. Our model can be used to verify, with a ""push-button"" analysis, the convergence of the MCA mechanism to a conflict-free allocation of a wide range of policy instantiations. ",saber mirzaei,,2014.0,10.1109/ICDCSW.2015.15,arXiv,Mirzaei2014,True,,arXiv,Not available,An Alloy Verification Model for Consensus-Based Auction Protocols,2657cff3ca0be03162aa8a96d83466ba,http://arxiv.org/abs/1407.5074v2 15748," Max Consensus-based Auction (MCA) protocols are an elegant approach to establish conflict-free distributed allocations in a wide range of network utility maximization problems. A set of agents independently bid on a set of items, and exchange their bids with their first hop-neighbors for a distributed (max-consensus) winner determination. The use of MCA protocols was proposed, $e.g.$, to solve the task allocation problem for a fleet of unmanned aerial vehicles, in smart grids, or in distributed virtual network management applications. Misconfigured or malicious agents participating in a MCA, or an incorrect instantiation of policies can lead to oscillations of the protocol, causing, $e.g.$, Service Level Agreement (SLA) violations. In this paper, we propose a formal, machine-readable, Max-Consensus Auction model, encoded in the Alloy lightweight modeling language. The model consists of a network of agents applying the MCA mechanisms, instantiated with potentially different policies, and a set of predicates to analyze its convergence properties. We were able to verify that MCA is not resilient against rebidding attacks, and that the protocol fails (to achieve a conflict-free resource allocation) for some specific combinations of policies. Our model can be used to verify, with a ""push-button"" analysis, the convergence of the MCA mechanism to a conflict-free allocation of a wide range of policy instantiations. ",flavio esposito,,2014.0,10.1109/ICDCSW.2015.15,arXiv,Mirzaei2014,True,,arXiv,Not available,An Alloy Verification Model for Consensus-Based Auction Protocols,2657cff3ca0be03162aa8a96d83466ba,http://arxiv.org/abs/1407.5074v2 15749," We study revenue optimization learning algorithms for posted-price auctions with strategic buyers. We analyze a very broad family of monotone regret minimization algorithms for this problem, which includes the previously best known algorithm, and show that no algorithm in that family admits a strategic regret more favorable than $\Omega(\sqrt{T})$. We then introduce a new algorithm that achieves a strategic regret differing from the lower bound only by a factor in $O(\log T)$, an exponential improvement upon the previous best algorithm. Our new algorithm admits a natural analysis and simpler proofs, and the ideas behind its design are general. We also report the results of empirical evaluations comparing our algorithm with the previous state of the art and show a consistent exponential improvement in several different scenarios. ",mehryar mohri,,2014.0,,arXiv,Mohri2014,True,,arXiv,Not available,Revenue Optimization in Posted-Price Auctions with Strategic Buyers,af81bc7cfed687c32636040ada7d0941,http://arxiv.org/abs/1411.6305v1 15750," We study revenue optimization learning algorithms for posted-price auctions with strategic buyers. We analyze a very broad family of monotone regret minimization algorithms for this problem, which includes the previously best known algorithm, and show that no algorithm in that family admits a strategic regret more favorable than $\Omega(\sqrt{T})$. We then introduce a new algorithm that achieves a strategic regret differing from the lower bound only by a factor in $O(\log T)$, an exponential improvement upon the previous best algorithm. Our new algorithm admits a natural analysis and simpler proofs, and the ideas behind its design are general. We also report the results of empirical evaluations comparing our algorithm with the previous state of the art and show a consistent exponential improvement in several different scenarios. ",andres medina,,2014.0,,arXiv,Mohri2014,True,,arXiv,Not available,Revenue Optimization in Posted-Price Auctions with Strategic Buyers,af81bc7cfed687c32636040ada7d0941,http://arxiv.org/abs/1411.6305v1 15751," We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with a known distribution of valuations. We show that a tight lower bound on the seller's expected revenue is $1/e$ times the geometric expectation of the buyer's valuation, and that this bound is uniquely achieved for the equal revenue distribution. We show also that when the valuation's expectation and geometric expectation are close, then the seller's expected revenue is close to the expected valuation. ",omer tamuz,,2012.0,10.1016/j.orl.2013.05.011,"Operations Research Letters, 2013, Volume 41, Issue 5, Pages 474--476",Tamuz2012,True,,arXiv,Not available,A lower bound on seller revenue in single buyer monopoly auctions,954a0ec6ed24fa018aca695167e8594b,http://arxiv.org/abs/1204.5551v2 15752," In this paper, we study a day ahead double energy auction in a distribution system involving dispatchable generation units, renewable generation units supported by battery storage systems(BSSs), fixed loads, price responsive loads, and supply from the Whole Sale Market(WSM) at Locational Marginal Price(LMP). The auction is implemented within a Distribution System Operator (DSO) premises using Mixed Integer Linear Programming (MIP). The proposed auction is cleared at the Distribution LMP (DLMP) and is observed to be weakly budget balanced if no penalty is applied for DSO's deviation from originally committed supply from the WSM. Furthermore, the dynamics of LMP and DLMP, and their effect on distribution market participants scheduled quantities as well as the WSM supply to the distribution system is investigated. ",m. faqiry,,2017.0,10.1109/EIT.2017.8053352,arXiv,Faqiry2017,True,,arXiv,Not available,A Day Ahead Market Energy Auction for Distribution System Operation,43a6ef28a395122ccd859283cb6afa28,http://arxiv.org/abs/1701.03205v3 15753," In this paper, we study a day ahead double energy auction in a distribution system involving dispatchable generation units, renewable generation units supported by battery storage systems(BSSs), fixed loads, price responsive loads, and supply from the Whole Sale Market(WSM) at Locational Marginal Price(LMP). The auction is implemented within a Distribution System Operator (DSO) premises using Mixed Integer Linear Programming (MIP). The proposed auction is cleared at the Distribution LMP (DLMP) and is observed to be weakly budget balanced if no penalty is applied for DSO's deviation from originally committed supply from the WSM. Furthermore, the dynamics of LMP and DLMP, and their effect on distribution market participants scheduled quantities as well as the WSM supply to the distribution system is investigated. ",ahmad zarabie,,2017.0,10.1109/EIT.2017.8053352,arXiv,Faqiry2017,True,,arXiv,Not available,A Day Ahead Market Energy Auction for Distribution System Operation,43a6ef28a395122ccd859283cb6afa28,http://arxiv.org/abs/1701.03205v3 15754," In this paper, we study a day ahead double energy auction in a distribution system involving dispatchable generation units, renewable generation units supported by battery storage systems(BSSs), fixed loads, price responsive loads, and supply from the Whole Sale Market(WSM) at Locational Marginal Price(LMP). The auction is implemented within a Distribution System Operator (DSO) premises using Mixed Integer Linear Programming (MIP). The proposed auction is cleared at the Distribution LMP (DLMP) and is observed to be weakly budget balanced if no penalty is applied for DSO's deviation from originally committed supply from the WSM. Furthermore, the dynamics of LMP and DLMP, and their effect on distribution market participants scheduled quantities as well as the WSM supply to the distribution system is investigated. ",fatehullah nassery,,2017.0,10.1109/EIT.2017.8053352,arXiv,Faqiry2017,True,,arXiv,Not available,A Day Ahead Market Energy Auction for Distribution System Operation,43a6ef28a395122ccd859283cb6afa28,http://arxiv.org/abs/1701.03205v3 15755," In this paper, we study a day ahead double energy auction in a distribution system involving dispatchable generation units, renewable generation units supported by battery storage systems(BSSs), fixed loads, price responsive loads, and supply from the Whole Sale Market(WSM) at Locational Marginal Price(LMP). The auction is implemented within a Distribution System Operator (DSO) premises using Mixed Integer Linear Programming (MIP). The proposed auction is cleared at the Distribution LMP (DLMP) and is observed to be weakly budget balanced if no penalty is applied for DSO's deviation from originally committed supply from the WSM. Furthermore, the dynamics of LMP and DLMP, and their effect on distribution market participants scheduled quantities as well as the WSM supply to the distribution system is investigated. ",hongyu wu,,2017.0,10.1109/EIT.2017.8053352,arXiv,Faqiry2017,True,,arXiv,Not available,A Day Ahead Market Energy Auction for Distribution System Operation,43a6ef28a395122ccd859283cb6afa28,http://arxiv.org/abs/1701.03205v3 15756," In this paper, we study a day ahead double energy auction in a distribution system involving dispatchable generation units, renewable generation units supported by battery storage systems(BSSs), fixed loads, price responsive loads, and supply from the Whole Sale Market(WSM) at Locational Marginal Price(LMP). The auction is implemented within a Distribution System Operator (DSO) premises using Mixed Integer Linear Programming (MIP). The proposed auction is cleared at the Distribution LMP (DLMP) and is observed to be weakly budget balanced if no penalty is applied for DSO's deviation from originally committed supply from the WSM. Furthermore, the dynamics of LMP and DLMP, and their effect on distribution market participants scheduled quantities as well as the WSM supply to the distribution system is investigated. ",sanjoy das,,2017.0,10.1109/EIT.2017.8053352,arXiv,Faqiry2017,True,,arXiv,Not available,A Day Ahead Market Energy Auction for Distribution System Operation,43a6ef28a395122ccd859283cb6afa28,http://arxiv.org/abs/1701.03205v3 15757," The growing demand in mobile Internet access calls for high capacity and energy efficient cellular access with better cell coverage. The in-band relaying solution, proposed in LTE-Advanced, improves coverage without requiring additional spectrum for backhauling, making its deployment more economical and practical. However, in-band relay without careful management incurs low spectrum utilization and reduces the system capacity. We propose auction-based solutions that aim at dynamic spectrum resource sharing, maximizing the utilization of precious spectrum resources. We first present a truthful auction that ensures a theoretical performance guarantee in terms of social welfare. Then in an extended system model that focuses on addressing the heterogeneity of resource blocks, we design a more practical auction mechanism. We implement our proposed auctions under large scale real-world settings. Simulation results verify the efficacy of proposed auctions, showing improvements in both cell coverage and spectrum efficiency. ",linquan zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,An Auction Approach to Spectrum Management in HetNets,5f3145ec504493bd29cd18532af67668,http://arxiv.org/abs/1701.03732v1 15758," The growing demand in mobile Internet access calls for high capacity and energy efficient cellular access with better cell coverage. The in-band relaying solution, proposed in LTE-Advanced, improves coverage without requiring additional spectrum for backhauling, making its deployment more economical and practical. However, in-band relay without careful management incurs low spectrum utilization and reduces the system capacity. We propose auction-based solutions that aim at dynamic spectrum resource sharing, maximizing the utilization of precious spectrum resources. We first present a truthful auction that ensures a theoretical performance guarantee in terms of social welfare. Then in an extended system model that focuses on addressing the heterogeneity of resource blocks, we design a more practical auction mechanism. We implement our proposed auctions under large scale real-world settings. Simulation results verify the efficacy of proposed auctions, showing improvements in both cell coverage and spectrum efficiency. ",zongpeng li,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,An Auction Approach to Spectrum Management in HetNets,5f3145ec504493bd29cd18532af67668,http://arxiv.org/abs/1701.03732v1 15759," The growing demand in mobile Internet access calls for high capacity and energy efficient cellular access with better cell coverage. The in-band relaying solution, proposed in LTE-Advanced, improves coverage without requiring additional spectrum for backhauling, making its deployment more economical and practical. However, in-band relay without careful management incurs low spectrum utilization and reduces the system capacity. We propose auction-based solutions that aim at dynamic spectrum resource sharing, maximizing the utilization of precious spectrum resources. We first present a truthful auction that ensures a theoretical performance guarantee in terms of social welfare. Then in an extended system model that focuses on addressing the heterogeneity of resource blocks, we design a more practical auction mechanism. We implement our proposed auctions under large scale real-world settings. Simulation results verify the efficacy of proposed auctions, showing improvements in both cell coverage and spectrum efficiency. ",chuan wu,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,An Auction Approach to Spectrum Management in HetNets,5f3145ec504493bd29cd18532af67668,http://arxiv.org/abs/1701.03732v1 15760," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",ming tang,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15761," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",haitian pang,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15762," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",xi chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 15763," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",shou wang,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15764," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",lin gao,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15765," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",jianwei huang,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15766," Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dimensional auction mechanisms, through which users sell the opportunities for downloading single and multiple video segments with multiple bitrates, respectively. Both auction mechanisms can achieves truthfulness (i.e, truthful private information revelation) and efficiency (i.e., social welfare maximization). Simulations with real traces show that crowdsourced mobile streaming facilitated by the auction mechanisms outperforms noncooperative stream ing by 48.6% (on average) in terms of social welfare. To evaluate the real-world performance, we also construct a demo system for crowdsourced mobile streaming and implement our proposed auction mechanism. Experiments over the demo system further show that those users who provide resources to others and those users who receive helps can increase their welfares by 15.5% and 35.4% (on average) via cooperation, respectively. ",lifeng sun,,2017.0,,arXiv,Tang2017,True,,arXiv,Not available,"Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming",d912b980668b462e1f34eac29f815f5c,http://arxiv.org/abs/1703.06648v2 15770," We first investigate the evolution of opening and closing auctions volumes of US equities along the years. We then report dynamical properties of pre-auction periods: the indicative match price is strongly mean-reverting because the imbalance is; the final auction price reacts to a single auction order placement or cancellation in markedly different ways in the opening and closing auctions when computed conditionally on imbalance improving or worsening events; the indicative price reverts towards the mid price of the regular limit order book but is not especially bound to the spread. ",damien challet,,2018.0,,arXiv,Challet2018,True,,arXiv,Not available,Dynamical regularities of US equities opening and closing auctions,57b364b5523658bb1ec2de43e20afe75,http://arxiv.org/abs/1802.01921v2 15771," We first investigate the evolution of opening and closing auctions volumes of US equities along the years. We then report dynamical properties of pre-auction periods: the indicative match price is strongly mean-reverting because the imbalance is; the final auction price reacts to a single auction order placement or cancellation in markedly different ways in the opening and closing auctions when computed conditionally on imbalance improving or worsening events; the indicative price reverts towards the mid price of the regular limit order book but is not especially bound to the spread. ",nikita gourianov,,2018.0,,arXiv,Challet2018,True,,arXiv,Not available,Dynamical regularities of US equities opening and closing auctions,57b364b5523658bb1ec2de43e20afe75,http://arxiv.org/abs/1802.01921v2 15772," This paper investigates a consensus-based auction algorithm in the context of decentralized traffic control. In particular, we study the automation of a road intersection, where a set of vehicles is required to cross without collisions. The crossing order will be negotiated in a decentralized fashion. An on-board model predictive controller (MPC) will compute an optimal trajectory which avoids collisions with higher priority vehicles, thus retaining convex safety constraints. Simulations are then performed in a time-variant traffic environment. ",fabio molinari,,2018.0,,arXiv,Molinari2018,True,,arXiv,Not available,"Automation Of Road Intersections Using Consensus-based Auction Algorithms",b44478fd5b57273dbfddea50ad85d9a2,http://arxiv.org/abs/1804.10411v1 15773," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",ilias diakonikolas,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 15774," This paper investigates a consensus-based auction algorithm in the context of decentralized traffic control. In particular, we study the automation of a road intersection, where a set of vehicles is required to cross without collisions. The crossing order will be negotiated in a decentralized fashion. An on-board model predictive controller (MPC) will compute an optimal trajectory which avoids collisions with higher priority vehicles, thus retaining convex safety constraints. Simulations are then performed in a time-variant traffic environment. ",jorg raisch,,2018.0,,arXiv,Molinari2018,True,,arXiv,Not available,"Automation Of Road Intersections Using Consensus-based Auction Algorithms",b44478fd5b57273dbfddea50ad85d9a2,http://arxiv.org/abs/1804.10411v1 15775," In the last three decades, we have seen a significant increase in trading goods and services through online auctions. However, this business created an attractive environment for malicious moneymakers who can commit different types of fraud activities, such as Shill Bidding (SB). The latter is predominant across many auctions but this type of fraud is difficult to detect due to its similarity to normal bidding behaviour. The unavailability of SB datasets makes the development of SB detection and classification models burdensome. Furthermore, to implement efficient SB detection models, we should produce SB data from actual auctions of commercial sites. In this study, we first scraped a large number of eBay auctions of a popular product. After preprocessing the raw auction data, we build a high-quality SB dataset based on the most reliable SB strategies. The aim of our research is to share the preprocessed auction dataset as well as the SB training (unlabelled) dataset, thereby researchers can apply various machine learning techniques by using authentic data of auctions and fraud. ",ahmad alzahrani,,2018.0,10.6084/m9.figshare.6272342,arXiv,Alzahrani2018,True,,arXiv,Not available,"Scraping and Preprocessing Commercial Auction Data for Fraud Classification",a574425bc2c98321fd8e67acc619eeea,http://arxiv.org/abs/1806.00656v2 15776," In the last three decades, we have seen a significant increase in trading goods and services through online auctions. However, this business created an attractive environment for malicious moneymakers who can commit different types of fraud activities, such as Shill Bidding (SB). The latter is predominant across many auctions but this type of fraud is difficult to detect due to its similarity to normal bidding behaviour. The unavailability of SB datasets makes the development of SB detection and classification models burdensome. Furthermore, to implement efficient SB detection models, we should produce SB data from actual auctions of commercial sites. In this study, we first scraped a large number of eBay auctions of a popular product. After preprocessing the raw auction data, we build a high-quality SB dataset based on the most reliable SB strategies. The aim of our research is to share the preprocessed auction dataset as well as the SB training (unlabelled) dataset, thereby researchers can apply various machine learning techniques by using authentic data of auctions and fraud. ",samira sadaoui,,2018.0,10.6084/m9.figshare.6272342,arXiv,Alzahrani2018,True,,arXiv,Not available,"Scraping and Preprocessing Commercial Auction Data for Fraud Classification",a574425bc2c98321fd8e67acc619eeea,http://arxiv.org/abs/1806.00656v2 15777," This volume contains the proceedings of the Fifth International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2014). The symposium took place in Verona, Italy, from 10th to 12th of September 2014. The proceedings of the symposium contain the abstracts of three invited talks and 19 papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers range over a wide spectrum, including algorithmic and behavioral game theory, game semantics, formal languages and automata theory, modal and temporal logics, software verification, hybrid systems. ",adriano peron,,2014.0,10.4204/EPTCS.161,"EPTCS 161, 2014",Peron2014,True,,arXiv,Not available,"Proceedings Fifth International Symposium on Games, Automata, Logics and Formal Verification",76cbc85ae4db118dcfb48b7cd0d6b844,http://arxiv.org/abs/1408.5560v1 15778," This volume contains the proceedings of the Fifth International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2014). The symposium took place in Verona, Italy, from 10th to 12th of September 2014. The proceedings of the symposium contain the abstracts of three invited talks and 19 papers that were accepted after a careful evaluation for presentation at the conference. The topics of the accepted papers range over a wide spectrum, including algorithmic and behavioral game theory, game semantics, formal languages and automata theory, modal and temporal logics, software verification, hybrid systems. ",carla piazza,,2014.0,10.4204/EPTCS.161,"EPTCS 161, 2014",Peron2014,True,,arXiv,Not available,"Proceedings Fifth International Symposium on Games, Automata, Logics and Formal Verification",76cbc85ae4db118dcfb48b7cd0d6b844,http://arxiv.org/abs/1408.5560v1 15779," The outcome of many social and economic interactions, such as stock-market transactions, is strongly determined by the predictions that agents make about the behavior of other individuals. Cognitive Hierarchy Theory provides a framework to model the consequences of forecasting accuracy that has proven to fit data from certain types of game theory experiments, such as Keynesian Beauty Contests and Entry Games. Here, we focus on symmetric two-players-two-actions games and establish an algorithm to find the players' strategies according to the Cognitive Hierarchy Approach. We show that the Snowdrift Game exhibits a pattern of behavior whose complexity grows as the cognitive levels of players increases. In addition to finding the solutions up to the third cognitive level, we demonstrate, in this theoretical frame, two new properties of snowdrift games: i) any snowdrift game can be characterized by only a parameter -- its class, ii) they are anti-symmetric with respect to the diagonal of the pay-off's space. Finally, we propose a model based on an evolutionary dynamics that captures the main features of the Cognitive Hierarchy Theory. ",carlos gracia-lazaro,,2016.0,,arXiv,Gracia-Lázaro2016,True,,arXiv,Not available,Cognitive hierarchy theory and two-person games,37cc90d0a0ff88c281bb159146f19d5b,http://arxiv.org/abs/1611.10312v1 15780," The outcome of many social and economic interactions, such as stock-market transactions, is strongly determined by the predictions that agents make about the behavior of other individuals. Cognitive Hierarchy Theory provides a framework to model the consequences of forecasting accuracy that has proven to fit data from certain types of game theory experiments, such as Keynesian Beauty Contests and Entry Games. Here, we focus on symmetric two-players-two-actions games and establish an algorithm to find the players' strategies according to the Cognitive Hierarchy Approach. We show that the Snowdrift Game exhibits a pattern of behavior whose complexity grows as the cognitive levels of players increases. In addition to finding the solutions up to the third cognitive level, we demonstrate, in this theoretical frame, two new properties of snowdrift games: i) any snowdrift game can be characterized by only a parameter -- its class, ii) they are anti-symmetric with respect to the diagonal of the pay-off's space. Finally, we propose a model based on an evolutionary dynamics that captures the main features of the Cognitive Hierarchy Theory. ",luis floria,,2016.0,,arXiv,Gracia-Lázaro2016,True,,arXiv,Not available,Cognitive hierarchy theory and two-person games,37cc90d0a0ff88c281bb159146f19d5b,http://arxiv.org/abs/1611.10312v1 15781," The outcome of many social and economic interactions, such as stock-market transactions, is strongly determined by the predictions that agents make about the behavior of other individuals. Cognitive Hierarchy Theory provides a framework to model the consequences of forecasting accuracy that has proven to fit data from certain types of game theory experiments, such as Keynesian Beauty Contests and Entry Games. Here, we focus on symmetric two-players-two-actions games and establish an algorithm to find the players' strategies according to the Cognitive Hierarchy Approach. We show that the Snowdrift Game exhibits a pattern of behavior whose complexity grows as the cognitive levels of players increases. In addition to finding the solutions up to the third cognitive level, we demonstrate, in this theoretical frame, two new properties of snowdrift games: i) any snowdrift game can be characterized by only a parameter -- its class, ii) they are anti-symmetric with respect to the diagonal of the pay-off's space. Finally, we propose a model based on an evolutionary dynamics that captures the main features of the Cognitive Hierarchy Theory. ",yamir moreno,,2016.0,,arXiv,Gracia-Lázaro2016,True,,arXiv,Not available,Cognitive hierarchy theory and two-person games,37cc90d0a0ff88c281bb159146f19d5b,http://arxiv.org/abs/1611.10312v1 15782," We consider concurrent games played on graphs. At every round of the game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective: ``stay forever in a set F of states'', and its dual, the reachability objective, ``reach a set R of states''. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player 1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. The significance of the result is twofold. First, while strategy improvement algorithms were known for Markov decision processes and turn-based games, as well as for concurrent reachability games, this is the first strategy improvement algorithm for concurrent safety games. Second, and most importantly, the improvement algorithm provides a way to approximate the value of a concurrent safety game from below (the known value-iteration algorithms approximate the value from above). Thus, when used together with value-iteration algorithms, or with strategy improvement algorithms for reachability games, our algorithm leads to the first practical algorithm for computing converging upper and lower bounds for the value of reachability and safety games. ",krishnendu chatterjee,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Strategy Improvement for Concurrent Safety Games,103cce9a4031e87bb7108672763b815f,http://arxiv.org/abs/0804.4530v1 15783," We consider concurrent games played on graphs. At every round of the game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective: ``stay forever in a set F of states'', and its dual, the reachability objective, ``reach a set R of states''. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player 1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. The significance of the result is twofold. First, while strategy improvement algorithms were known for Markov decision processes and turn-based games, as well as for concurrent reachability games, this is the first strategy improvement algorithm for concurrent safety games. Second, and most importantly, the improvement algorithm provides a way to approximate the value of a concurrent safety game from below (the known value-iteration algorithms approximate the value from above). Thus, when used together with value-iteration algorithms, or with strategy improvement algorithms for reachability games, our algorithm leads to the first practical algorithm for computing converging upper and lower bounds for the value of reachability and safety games. ",luca alfaro,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Strategy Improvement for Concurrent Safety Games,103cce9a4031e87bb7108672763b815f,http://arxiv.org/abs/0804.4530v1 15784," The Ultimatum Game (UG) is an economic game where two players (proposer and responder) decide how to split a certain amount of money. While traditional economic theories based on rational decision making predict that the proposer should make a minimal offer and the responder should accept it, human subjects tend to behave more fairly in UG. Previous studies suggested that extra information such as reputation, empathy, or spatial structure is needed for fairness to evolve in UG. Here we show that fairness can evolve without additional information if players make decisions probabilistically and may continue interactions when the offer is rejected, which we call the Not Quite Ultimatum Game (NQUG). Evolutionary simulations of NQUG showed that the probabilistic decision making contributes to the increase of proposers' offer amounts to avoid rejection, while the repetition of the game works to responders' advantage because they can wait until a good offer comes. These simple extensions greatly promote evolution of fairness in both proposers' offers and responders' acceptance thresholds. ",genki ichinose,,2014.0,10.1038/srep05104,"Scientific Reports 4, 5104, 2014",Ichinose2014,True,,arXiv,Not available,Evolution of Fairness in the Not Quite Ultimatum Game,bf4e0a751258090d1c44a9ebef3145fd,http://arxiv.org/abs/1402.4740v2 15785," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",dimitris paparas,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 15786," We consider concurrent games played on graphs. At every round of the game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety objective: ``stay forever in a set F of states'', and its dual, the reachability objective, ``reach a set R of states''. We present in this paper a strategy improvement algorithm for computing the value of a concurrent safety game, that is, the maximal probability with which player 1 can enforce the safety objective. The algorithm yields a sequence of player-1 strategies which ensure probabilities of winning that converge monotonically to the value of the safety game. The significance of the result is twofold. First, while strategy improvement algorithms were known for Markov decision processes and turn-based games, as well as for concurrent reachability games, this is the first strategy improvement algorithm for concurrent safety games. Second, and most importantly, the improvement algorithm provides a way to approximate the value of a concurrent safety game from below (the known value-iteration algorithms approximate the value from above). Thus, when used together with value-iteration algorithms, or with strategy improvement algorithms for reachability games, our algorithm leads to the first practical algorithm for computing converging upper and lower bounds for the value of reachability and safety games. ",thomas henzinger,,2008.0,,arXiv,Chatterjee2008,True,,arXiv,Not available,Strategy Improvement for Concurrent Safety Games,103cce9a4031e87bb7108672763b815f,http://arxiv.org/abs/0804.4530v1 15787," In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG). In a classical congestion game, multiple users share the same set of resources and a user's payoff for using any resource is a function of the total number of users sharing it. As a potential game, this game enjoys some very appealing properties, including the existence of a pure strategy Nash equilibrium (NE) and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP). While it's tempting to use this model to study spectrum sharing, it does not capture the spatial reuse feature of wireless communication, where resources (interpreted as channels) may be reused without increasing congestion provided that users are located far away from each other. This motivates us to study an extended form of the congestion game where a user's payoff for using a resource is a function of the number of its interfering users sharing it. This naturally results in a spatial congestion game (SCG), where users are placed over a network (or a conflict graph). We study fundamental properties of a spatial congestion game; in particular, we seek to answer under what conditions this game possesses the finite improvement property or a Nash equilibrium. We also discuss the implications of these results when applied to wireless spectrum sharing. ",sahand ahmad,,2010.0,,arXiv,Ahmad2010,True,,arXiv,Not available,Spectrum Sharing as Spatial Congestion Games,f4b9c1e9a7485dda477f86b041702e03,http://arxiv.org/abs/1011.5384v1 15788," In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG). In a classical congestion game, multiple users share the same set of resources and a user's payoff for using any resource is a function of the total number of users sharing it. As a potential game, this game enjoys some very appealing properties, including the existence of a pure strategy Nash equilibrium (NE) and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP). While it's tempting to use this model to study spectrum sharing, it does not capture the spatial reuse feature of wireless communication, where resources (interpreted as channels) may be reused without increasing congestion provided that users are located far away from each other. This motivates us to study an extended form of the congestion game where a user's payoff for using a resource is a function of the number of its interfering users sharing it. This naturally results in a spatial congestion game (SCG), where users are placed over a network (or a conflict graph). We study fundamental properties of a spatial congestion game; in particular, we seek to answer under what conditions this game possesses the finite improvement property or a Nash equilibrium. We also discuss the implications of these results when applied to wireless spectrum sharing. ",cem tekin,,2010.0,,arXiv,Ahmad2010,True,,arXiv,Not available,Spectrum Sharing as Spatial Congestion Games,f4b9c1e9a7485dda477f86b041702e03,http://arxiv.org/abs/1011.5384v1 15789," In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG). In a classical congestion game, multiple users share the same set of resources and a user's payoff for using any resource is a function of the total number of users sharing it. As a potential game, this game enjoys some very appealing properties, including the existence of a pure strategy Nash equilibrium (NE) and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP). While it's tempting to use this model to study spectrum sharing, it does not capture the spatial reuse feature of wireless communication, where resources (interpreted as channels) may be reused without increasing congestion provided that users are located far away from each other. This motivates us to study an extended form of the congestion game where a user's payoff for using a resource is a function of the number of its interfering users sharing it. This naturally results in a spatial congestion game (SCG), where users are placed over a network (or a conflict graph). We study fundamental properties of a spatial congestion game; in particular, we seek to answer under what conditions this game possesses the finite improvement property or a Nash equilibrium. We also discuss the implications of these results when applied to wireless spectrum sharing. ",mingyan liu,,2010.0,,arXiv,Ahmad2010,True,,arXiv,Not available,Spectrum Sharing as Spatial Congestion Games,f4b9c1e9a7485dda477f86b041702e03,http://arxiv.org/abs/1011.5384v1 15790," In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG). In a classical congestion game, multiple users share the same set of resources and a user's payoff for using any resource is a function of the total number of users sharing it. As a potential game, this game enjoys some very appealing properties, including the existence of a pure strategy Nash equilibrium (NE) and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP). While it's tempting to use this model to study spectrum sharing, it does not capture the spatial reuse feature of wireless communication, where resources (interpreted as channels) may be reused without increasing congestion provided that users are located far away from each other. This motivates us to study an extended form of the congestion game where a user's payoff for using a resource is a function of the number of its interfering users sharing it. This naturally results in a spatial congestion game (SCG), where users are placed over a network (or a conflict graph). We study fundamental properties of a spatial congestion game; in particular, we seek to answer under what conditions this game possesses the finite improvement property or a Nash equilibrium. We also discuss the implications of these results when applied to wireless spectrum sharing. ",richard southwell,,2010.0,,arXiv,Ahmad2010,True,,arXiv,Not available,Spectrum Sharing as Spatial Congestion Games,f4b9c1e9a7485dda477f86b041702e03,http://arxiv.org/abs/1011.5384v1 15791," In this paper, we present and analyze the properties of a new class of games - the spatial congestion game (SCG), which is a generalization of the classical congestion game (CG). In a classical congestion game, multiple users share the same set of resources and a user's payoff for using any resource is a function of the total number of users sharing it. As a potential game, this game enjoys some very appealing properties, including the existence of a pure strategy Nash equilibrium (NE) and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP). While it's tempting to use this model to study spectrum sharing, it does not capture the spatial reuse feature of wireless communication, where resources (interpreted as channels) may be reused without increasing congestion provided that users are located far away from each other. This motivates us to study an extended form of the congestion game where a user's payoff for using a resource is a function of the number of its interfering users sharing it. This naturally results in a spatial congestion game (SCG), where users are placed over a network (or a conflict graph). We study fundamental properties of a spatial congestion game; in particular, we seek to answer under what conditions this game possesses the finite improvement property or a Nash equilibrium. We also discuss the implications of these results when applied to wireless spectrum sharing. ",jianwei huang,,2010.0,,arXiv,Ahmad2010,True,,arXiv,Not available,Spectrum Sharing as Spatial Congestion Games,f4b9c1e9a7485dda477f86b041702e03,http://arxiv.org/abs/1011.5384v1 15792," We study the inefficiency of equilibria for various classes of games when players are (partially) altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex combination of 1-\alpha_i times his direct cost and \alpha_i times the social cost. Tuning the parameters \alpha_i allows smooth interpolation between purely selfish and purely altruistic behavior. Within this framework, we study altruistic extensions of linear congestion games, fair cost-sharing games and valid utility games. We derive (tight) bounds on the price of anarchy of these games for several solution concepts. Thereto, we suitably adapt the smoothness notion introduced by Roughgarden and show that it captures the essential properties to determine the robust price of anarchy of these games. Our bounds show that for congestion games and cost-sharing games, the worst-case robust price of anarchy increases with increasing altruism, while for valid utility games, it remains constant and is not affected by altruism. However, the increase in the price of anarchy is not a universal phenomenon: for symmetric singleton linear congestion games, we derive a bound on the pure price of anarchy that decreases as the level of altruism increases. Since the bound is also strictly lower than the robust price of anarchy, it exhibits a natural example in which Nash equilibria are more efficient than more permissive notions of equilibrium. ",po-an chen,,2011.0,,arXiv,Chen2011,True,,arXiv,Not available,The Robust Price of Anarchy of Altruistic Games,be10c994c30e0166ef84355befe3cd44,http://arxiv.org/abs/1112.3680v2 15793," We study the inefficiency of equilibria for various classes of games when players are (partially) altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex combination of 1-\alpha_i times his direct cost and \alpha_i times the social cost. Tuning the parameters \alpha_i allows smooth interpolation between purely selfish and purely altruistic behavior. Within this framework, we study altruistic extensions of linear congestion games, fair cost-sharing games and valid utility games. We derive (tight) bounds on the price of anarchy of these games for several solution concepts. Thereto, we suitably adapt the smoothness notion introduced by Roughgarden and show that it captures the essential properties to determine the robust price of anarchy of these games. Our bounds show that for congestion games and cost-sharing games, the worst-case robust price of anarchy increases with increasing altruism, while for valid utility games, it remains constant and is not affected by altruism. However, the increase in the price of anarchy is not a universal phenomenon: for symmetric singleton linear congestion games, we derive a bound on the pure price of anarchy that decreases as the level of altruism increases. Since the bound is also strictly lower than the robust price of anarchy, it exhibits a natural example in which Nash equilibria are more efficient than more permissive notions of equilibrium. ",bart keijzer,,2011.0,,arXiv,Chen2011,True,,arXiv,Not available,The Robust Price of Anarchy of Altruistic Games,be10c994c30e0166ef84355befe3cd44,http://arxiv.org/abs/1112.3680v2 15794," We study the inefficiency of equilibria for various classes of games when players are (partially) altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex combination of 1-\alpha_i times his direct cost and \alpha_i times the social cost. Tuning the parameters \alpha_i allows smooth interpolation between purely selfish and purely altruistic behavior. Within this framework, we study altruistic extensions of linear congestion games, fair cost-sharing games and valid utility games. We derive (tight) bounds on the price of anarchy of these games for several solution concepts. Thereto, we suitably adapt the smoothness notion introduced by Roughgarden and show that it captures the essential properties to determine the robust price of anarchy of these games. Our bounds show that for congestion games and cost-sharing games, the worst-case robust price of anarchy increases with increasing altruism, while for valid utility games, it remains constant and is not affected by altruism. However, the increase in the price of anarchy is not a universal phenomenon: for symmetric singleton linear congestion games, we derive a bound on the pure price of anarchy that decreases as the level of altruism increases. Since the bound is also strictly lower than the robust price of anarchy, it exhibits a natural example in which Nash equilibria are more efficient than more permissive notions of equilibrium. ",david kempe,,2011.0,,arXiv,Chen2011,True,,arXiv,Not available,The Robust Price of Anarchy of Altruistic Games,be10c994c30e0166ef84355befe3cd44,http://arxiv.org/abs/1112.3680v2 15795," We study the inefficiency of equilibria for various classes of games when players are (partially) altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex combination of 1-\alpha_i times his direct cost and \alpha_i times the social cost. Tuning the parameters \alpha_i allows smooth interpolation between purely selfish and purely altruistic behavior. Within this framework, we study altruistic extensions of linear congestion games, fair cost-sharing games and valid utility games. We derive (tight) bounds on the price of anarchy of these games for several solution concepts. Thereto, we suitably adapt the smoothness notion introduced by Roughgarden and show that it captures the essential properties to determine the robust price of anarchy of these games. Our bounds show that for congestion games and cost-sharing games, the worst-case robust price of anarchy increases with increasing altruism, while for valid utility games, it remains constant and is not affected by altruism. However, the increase in the price of anarchy is not a universal phenomenon: for symmetric singleton linear congestion games, we derive a bound on the pure price of anarchy that decreases as the level of altruism increases. Since the bound is also strictly lower than the robust price of anarchy, it exhibits a natural example in which Nash equilibria are more efficient than more permissive notions of equilibrium. ",guido schaefer,,2011.0,,arXiv,Chen2011,True,,arXiv,Not available,The Robust Price of Anarchy of Altruistic Games,be10c994c30e0166ef84355befe3cd44,http://arxiv.org/abs/1112.3680v2 15796," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",xiaorui sun,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 15797," Evolutionary games on networks traditionally involve the same game at each interaction. Here we depart from this assumption by considering mixed games, where the game played at each interaction is drawn uniformly at random from a set of two different games. While in well-mixed populations the random mixture of the two games is always equivalent to the average single game, in structured populations this is not always the case. We show that the outcome is in fact strongly dependent on the distance of separation of the two games in the parameter space. Effectively, this distance introduces payoff heterogeneity, and the average game is returned only if the heterogeneity is small. For higher levels of heterogeneity the distance to the average game grows, which often involves the promotion of cooperation. The presented results support preceding research that highlights the favorable role of heterogeneity regardless of its origin, and they also emphasize the importance of the population structure in amplifying facilitators of cooperation. ",marco amaral,,2016.0,10.1103/PhysRevE.93.042304,Phys. Rev. E 93 (2016) 042304,Amaral2016,True,,arXiv,Not available,"Evolutionary mixed games in structured populations: Cooperation and the benefits of heterogeneity",04d4c72e22f7368008c0e7c9eb13105f,http://arxiv.org/abs/1605.06491v1 15798," Evolutionary games on networks traditionally involve the same game at each interaction. Here we depart from this assumption by considering mixed games, where the game played at each interaction is drawn uniformly at random from a set of two different games. While in well-mixed populations the random mixture of the two games is always equivalent to the average single game, in structured populations this is not always the case. We show that the outcome is in fact strongly dependent on the distance of separation of the two games in the parameter space. Effectively, this distance introduces payoff heterogeneity, and the average game is returned only if the heterogeneity is small. For higher levels of heterogeneity the distance to the average game grows, which often involves the promotion of cooperation. The presented results support preceding research that highlights the favorable role of heterogeneity regardless of its origin, and they also emphasize the importance of the population structure in amplifying facilitators of cooperation. ",lucas wardil,,2016.0,10.1103/PhysRevE.93.042304,Phys. Rev. E 93 (2016) 042304,Amaral2016,True,,arXiv,Not available,"Evolutionary mixed games in structured populations: Cooperation and the benefits of heterogeneity",04d4c72e22f7368008c0e7c9eb13105f,http://arxiv.org/abs/1605.06491v1 15799," Evolutionary games on networks traditionally involve the same game at each interaction. Here we depart from this assumption by considering mixed games, where the game played at each interaction is drawn uniformly at random from a set of two different games. While in well-mixed populations the random mixture of the two games is always equivalent to the average single game, in structured populations this is not always the case. We show that the outcome is in fact strongly dependent on the distance of separation of the two games in the parameter space. Effectively, this distance introduces payoff heterogeneity, and the average game is returned only if the heterogeneity is small. For higher levels of heterogeneity the distance to the average game grows, which often involves the promotion of cooperation. The presented results support preceding research that highlights the favorable role of heterogeneity regardless of its origin, and they also emphasize the importance of the population structure in amplifying facilitators of cooperation. ",matjaz perc,,2016.0,10.1103/PhysRevE.93.042304,Phys. Rev. E 93 (2016) 042304,Amaral2016,True,,arXiv,Not available,"Evolutionary mixed games in structured populations: Cooperation and the benefits of heterogeneity",04d4c72e22f7368008c0e7c9eb13105f,http://arxiv.org/abs/1605.06491v1 15800," Evolutionary games on networks traditionally involve the same game at each interaction. Here we depart from this assumption by considering mixed games, where the game played at each interaction is drawn uniformly at random from a set of two different games. While in well-mixed populations the random mixture of the two games is always equivalent to the average single game, in structured populations this is not always the case. We show that the outcome is in fact strongly dependent on the distance of separation of the two games in the parameter space. Effectively, this distance introduces payoff heterogeneity, and the average game is returned only if the heterogeneity is small. For higher levels of heterogeneity the distance to the average game grows, which often involves the promotion of cooperation. The presented results support preceding research that highlights the favorable role of heterogeneity regardless of its origin, and they also emphasize the importance of the population structure in amplifying facilitators of cooperation. ",jafferson silva,,2016.0,10.1103/PhysRevE.93.042304,Phys. Rev. E 93 (2016) 042304,Amaral2016,True,,arXiv,Not available,"Evolutionary mixed games in structured populations: Cooperation and the benefits of heterogeneity",04d4c72e22f7368008c0e7c9eb13105f,http://arxiv.org/abs/1605.06491v1 15801," The game of war is one of the most popular international children's card games. In the beginning of the game, the pack is split into two parts, then on each move the players reveal their top cards. The player having the highest card collects both and returns them to the bottom of his hand. The player left with no cards loses. Those who played this game in their childhood did not always have enough patience to wait until the end of the game. A player who has collected almost all the cards can lose all but a few cards in the next 3 minutes. That way the children essentially conduct mathematical experiments observing chaotic dynamics. However, it is not quite so, as the rules of the game do not prescribe the order in which the winning player will put his take to the bottom of his hand: own card, then rival's or vice versa: rival's card, then own. We provide an example of a cycling game with fixed rules. Assume now that each player can seldom but regularly change the returning order. We have managed to prove that in this case the mathematical expectation of the length of the game is finite. In principle it is equivalent to the graph of the game, which has got edges corresponding to all acceptable transitions, having got the following property: from each initial configuration there is at least one path to the end of the game. ",evgeny lakshtanov,,2010.0,,"American Math. Monthly, 119:4, pp/318-323, 2012",Lakshtanov2010,True,,arXiv,Not available,Finiteness in the Card Game of War,b3340d1f9f60bf2a0f38505d48822c32,http://arxiv.org/abs/1007.1371v3 15802," The game of war is one of the most popular international children's card games. In the beginning of the game, the pack is split into two parts, then on each move the players reveal their top cards. The player having the highest card collects both and returns them to the bottom of his hand. The player left with no cards loses. Those who played this game in their childhood did not always have enough patience to wait until the end of the game. A player who has collected almost all the cards can lose all but a few cards in the next 3 minutes. That way the children essentially conduct mathematical experiments observing chaotic dynamics. However, it is not quite so, as the rules of the game do not prescribe the order in which the winning player will put his take to the bottom of his hand: own card, then rival's or vice versa: rival's card, then own. We provide an example of a cycling game with fixed rules. Assume now that each player can seldom but regularly change the returning order. We have managed to prove that in this case the mathematical expectation of the length of the game is finite. In principle it is equivalent to the graph of the game, which has got edges corresponding to all acceptable transitions, having got the following property: from each initial configuration there is at least one path to the end of the game. ",vera roshchina,,2010.0,,"American Math. Monthly, 119:4, pp/318-323, 2012",Lakshtanov2010,True,,arXiv,Not available,Finiteness in the Card Game of War,b3340d1f9f60bf2a0f38505d48822c32,http://arxiv.org/abs/1007.1371v3 15803," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",yaron velner,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15804," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",krishnendu chatterjee,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15805," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",laurent doyen,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15806," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",thomas henzinger,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15807," We resolve the complexity of revenue-optimal deterministic auctions in the unit-demand single-buyer Bayesian setting, i.e., the optimal item pricing problem, when the buyer's values for the items are independent. We show that the problem of computing a revenue-optimal pricing can be solved in polynomial time for distributions of support size 2, and its decision version is NP-complete for distributions of support size 3. We also show that the problem remains NP-complete for the case of identical distributions. ",mihalis yannakakis,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,The Complexity of Optimal Multidimensional Pricing,50c540c457b3829d44ef631088a32e82,http://arxiv.org/abs/1311.2138v1 15808," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",alexander rabinovich,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15809," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of multi-energy games and show the inter-reducibility of multimean-payoff and multi-energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. Finally we present the first solution of multi-meanpayoff games with infinite-memory strategies. We show that multi-mean-payoff games with mean-payoff-sup objectives can be decided in NP and coNP, whereas multi-mean-payoff games with mean-payoff-inf objectives are coNP-complete. ",jean-francois raskin,,2012.0,,arXiv,Velner2012,True,,arXiv,Not available,The Complexity of Multi-Mean-Payoff and Multi-Energy Games,3009764cabd0e8fcd64bac59367b570c,http://arxiv.org/abs/1209.3234v1 15810," In many multiagent scenarios, agents distribute resources, such as time or energy, among several tasks. Having completed their tasks and generated profits, task payoffs must be divided among the agents in some reasonable manner. Cooperative games with overlapping coalitions (OCF games) are a recent framework proposed by Chalkiadakis et al. (2010), generalizing classic cooperative games to the case where agents may belong to more than one coalition. Having formed overlapping coalitions and divided profits, some agents may feel dissatisfied with their share of the profits, and would like to deviate from the given outcome. However, deviation in OCF games is a complicated matter: agents may decide to withdraw only some of their weight from some of the coalitions they belong to; that is, even after deviation, it is possible that agents will still be involved in tasks with non-deviators. This means that the desirability of a deviation, and the stability of formed coalitions, is to a great extent determined by the reaction of non-deviators. In this work, we explore algorithmic aspects of OCF games, focusing on the core in OCF games. We study the problem of deciding if the core of an OCF game is not empty, and whether a core payoff division can be found in polynomial time; moreover, we identify conditions that ensure that the problem admits polynomial time algorithms. Finally, we introduce and study a natural class of OCF games, Linear Bottleneck Games. Interestingly, we show that such games always have a non-empty core, even assuming a highly lenient reaction to deviations. ",yair zick,,2014.0,,arXiv,Zick2014,True,,arXiv,Not available,"Cooperative Games with Overlapping Coalitions: Charting the Tractability Frontier",2668589de864205ecb64809b71de2f74,http://arxiv.org/abs/1407.0420v3 15811," In many multiagent scenarios, agents distribute resources, such as time or energy, among several tasks. Having completed their tasks and generated profits, task payoffs must be divided among the agents in some reasonable manner. Cooperative games with overlapping coalitions (OCF games) are a recent framework proposed by Chalkiadakis et al. (2010), generalizing classic cooperative games to the case where agents may belong to more than one coalition. Having formed overlapping coalitions and divided profits, some agents may feel dissatisfied with their share of the profits, and would like to deviate from the given outcome. However, deviation in OCF games is a complicated matter: agents may decide to withdraw only some of their weight from some of the coalitions they belong to; that is, even after deviation, it is possible that agents will still be involved in tasks with non-deviators. This means that the desirability of a deviation, and the stability of formed coalitions, is to a great extent determined by the reaction of non-deviators. In this work, we explore algorithmic aspects of OCF games, focusing on the core in OCF games. We study the problem of deciding if the core of an OCF game is not empty, and whether a core payoff division can be found in polynomial time; moreover, we identify conditions that ensure that the problem admits polynomial time algorithms. Finally, we introduce and study a natural class of OCF games, Linear Bottleneck Games. Interestingly, we show that such games always have a non-empty core, even assuming a highly lenient reaction to deviations. ",georgios chalkiadakis,,2014.0,,arXiv,Zick2014,True,,arXiv,Not available,"Cooperative Games with Overlapping Coalitions: Charting the Tractability Frontier",2668589de864205ecb64809b71de2f74,http://arxiv.org/abs/1407.0420v3 15812," In many multiagent scenarios, agents distribute resources, such as time or energy, among several tasks. Having completed their tasks and generated profits, task payoffs must be divided among the agents in some reasonable manner. Cooperative games with overlapping coalitions (OCF games) are a recent framework proposed by Chalkiadakis et al. (2010), generalizing classic cooperative games to the case where agents may belong to more than one coalition. Having formed overlapping coalitions and divided profits, some agents may feel dissatisfied with their share of the profits, and would like to deviate from the given outcome. However, deviation in OCF games is a complicated matter: agents may decide to withdraw only some of their weight from some of the coalitions they belong to; that is, even after deviation, it is possible that agents will still be involved in tasks with non-deviators. This means that the desirability of a deviation, and the stability of formed coalitions, is to a great extent determined by the reaction of non-deviators. In this work, we explore algorithmic aspects of OCF games, focusing on the core in OCF games. We study the problem of deciding if the core of an OCF game is not empty, and whether a core payoff division can be found in polynomial time; moreover, we identify conditions that ensure that the problem admits polynomial time algorithms. Finally, we introduce and study a natural class of OCF games, Linear Bottleneck Games. Interestingly, we show that such games always have a non-empty core, even assuming a highly lenient reaction to deviations. ",edith elkind,,2014.0,,arXiv,Zick2014,True,,arXiv,Not available,"Cooperative Games with Overlapping Coalitions: Charting the Tractability Frontier",2668589de864205ecb64809b71de2f74,http://arxiv.org/abs/1407.0420v3 15813," In many multiagent scenarios, agents distribute resources, such as time or energy, among several tasks. Having completed their tasks and generated profits, task payoffs must be divided among the agents in some reasonable manner. Cooperative games with overlapping coalitions (OCF games) are a recent framework proposed by Chalkiadakis et al. (2010), generalizing classic cooperative games to the case where agents may belong to more than one coalition. Having formed overlapping coalitions and divided profits, some agents may feel dissatisfied with their share of the profits, and would like to deviate from the given outcome. However, deviation in OCF games is a complicated matter: agents may decide to withdraw only some of their weight from some of the coalitions they belong to; that is, even after deviation, it is possible that agents will still be involved in tasks with non-deviators. This means that the desirability of a deviation, and the stability of formed coalitions, is to a great extent determined by the reaction of non-deviators. In this work, we explore algorithmic aspects of OCF games, focusing on the core in OCF games. We study the problem of deciding if the core of an OCF game is not empty, and whether a core payoff division can be found in polynomial time; moreover, we identify conditions that ensure that the problem admits polynomial time algorithms. Finally, we introduce and study a natural class of OCF games, Linear Bottleneck Games. Interestingly, we show that such games always have a non-empty core, even assuming a highly lenient reaction to deviations. ",evangelos markakis,,2014.0,,arXiv,Zick2014,True,,arXiv,Not available,"Cooperative Games with Overlapping Coalitions: Charting the Tractability Frontier",2668589de864205ecb64809b71de2f74,http://arxiv.org/abs/1407.0420v3 15814," We study the equilibrium computation problem for two classical resource allocation games: atomic splittable congestion games and multimarket Cournot oligopolies. For atomic splittable congestion games with singleton strategies and player-specific affine cost functions, we devise the first polynomial time algorithm computing a pure Nash equilibrium. Our algorithm is combinatorial and computes the exact equilibrium assuming rational input. The idea is to compute an equilibrium for an associated integrally-splittable singleton congestion game in which the players can only split their demands in integral multiples of a common packet size. While integral games have been considered in the literature before, no polynomial time algorithm computing an equilibrium was known. Also for this class, we devise the first polynomial time algorithm and use it as a building block for our main algorithm. We then develop a polynomial time computable transformation mapping a multimarket Cournot competition game with firm-specific affine price functions and quadratic costs to an associated atomic splittable congestion game as described above. The transformation preserves equilibria in either games and, thus, leads -- via our first algorithm -- to a polynomial time algorithm computing Cournot equilibria. Finally, our analysis for integrally-splittable games implies new bounds on the difference between real and integral Cournot equilibria. The bounds can be seen as a generalization of the recent bounds for single market oligopolies obtained by Todd [2016]. ",veerle timmermans,,2016.0,,arXiv,Timmermans2016,True,,arXiv,Not available,Equilibrium Computation in Resource Allocation Games,e0ba905fa6b2fe45c01925143707130f,http://arxiv.org/abs/1612.00190v5 15815," We study the equilibrium computation problem for two classical resource allocation games: atomic splittable congestion games and multimarket Cournot oligopolies. For atomic splittable congestion games with singleton strategies and player-specific affine cost functions, we devise the first polynomial time algorithm computing a pure Nash equilibrium. Our algorithm is combinatorial and computes the exact equilibrium assuming rational input. The idea is to compute an equilibrium for an associated integrally-splittable singleton congestion game in which the players can only split their demands in integral multiples of a common packet size. While integral games have been considered in the literature before, no polynomial time algorithm computing an equilibrium was known. Also for this class, we devise the first polynomial time algorithm and use it as a building block for our main algorithm. We then develop a polynomial time computable transformation mapping a multimarket Cournot competition game with firm-specific affine price functions and quadratic costs to an associated atomic splittable congestion game as described above. The transformation preserves equilibria in either games and, thus, leads -- via our first algorithm -- to a polynomial time algorithm computing Cournot equilibria. Finally, our analysis for integrally-splittable games implies new bounds on the difference between real and integral Cournot equilibria. The bounds can be seen as a generalization of the recent bounds for single market oligopolies obtained by Todd [2016]. ",tobias harks,,2016.0,,arXiv,Timmermans2016,True,,arXiv,Not available,Equilibrium Computation in Resource Allocation Games,e0ba905fa6b2fe45c01925143707130f,http://arxiv.org/abs/1612.00190v5 15816," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",paul dutting,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 15817," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",felix fischer,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 15818," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",jaya mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 15819," In the standard single-dimensional model of position auctions, bidders agree on the relative values of the positions and each of them submits a single bid that is interpreted in terms of these values. Motivated by current practice in sponsored search we consider a situation where the auctioneer uses estimates of the relative values, which may be imprecise, and show that under both complete and incomplete information a non-truthful mechanism is able to support an efficient outcome in equilibrium for a wider range of these estimates than the VCG mechanism. We thus exhibit a property of the VCG mechanism that may help explain the surprising rarity with which it is used even in settings with unit demand, a relative lack of robustness to misspecification of the bidding language. The result for complete information concerns the generalized second-price mechanism and lends additional theoretical support to the use of this mechanism in practice. Particularly interesting from a technical perspective is the result for incomplete information, which is driven by a surprising connection between equilibrium bids in the VCG mechanism and the generalized first-price mechanism. ",david parkes,,2016.0,,arXiv,Dütting2016,True,,arXiv,Not available,Non-Truthful Position Auctions Are More Robust to Misspecification,5e387ef44ec47d9a0ab43f6a437bb936,http://arxiv.org/abs/1602.07593v4 15820," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",zhiyi huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 15821," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",nikhil devanur,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 15822," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",david malec,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 15823," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",sayan bhattacharya,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 15824," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",janardhan kulkarni,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 15825," A central problem in Microeconomics is to design auctions with good revenue properties. In this setting, the bidders' valuations for the items are private knowledge, but they are drawn from publicly known prior distributions. The goal is to find a truthful auction (no bidder can gain in utility by misreporting her valuation) that maximizes the expected revenue. Naturally, the optimal-auction is sensitive to the prior distributions. An intriguing question is to design a truthful auction that is oblivious to these priors, and yet manages to get a constant factor of the optimal revenue. Such auctions are called prior-free. Goldberg et al. presented a constant-approximate prior-free auction when there are identical copies of an item available in unlimited supply, bidders are unit-demand, and their valuations are drawn from i.i.d. distributions. The recent work of Leonardi et al. [STOC 2012] generalized this problem to non i.i.d. bidders, assuming that the auctioneer knows the ordering of their reserve prices. Leonardi et al. proposed a prior-free auction that achieves a $O(\log^* n)$ approximation. We improve upon this result, by giving the first prior-free auction with constant approximation guarantee. ",xiaoming xu,,2012.0,,arXiv,Bhattacharya2012,True,,arXiv,Not available,Constant-Competitive Prior-Free Auction with Ordered Bidders,c12697b8894c882882ed0d6b0d6d922e,http://arxiv.org/abs/1212.3079v2 15826," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",wei chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15827," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",di he,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15828," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tie-yan liu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15829," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",vikash singh,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 15830," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",tao qin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15831," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",yixin tao,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15832," Generalized Second Price (GSP) auctions are widely used by search engines today to sell their ad slots. Most search engines have supported broad match between queries and bid keywords when executing GSP auctions, however, it has been revealed that GSP auction with the standard broad-match mechanism they are currently using (denoted as SBM-GSP) has several theoretical drawbacks (e.g., its theoretical properties are known only for the single-slot case and full-information setting, and even in this simple setting, the corresponding worst-case social welfare can be rather bad). To address this issue, we propose a novel broad-match mechanism, which we call the Probabilistic Broad-Match (PBM) mechanism. Different from SBM that puts together the ads bidding on all the keywords matched to a given query for the GSP auction, the GSP with PBM (denoted as PBM-GSP) randomly samples a keyword according to a predefined probability distribution and only runs the GSP auction for the ads bidding on this sampled keyword. We perform a comprehensive study on the theoretical properties of the PBM-GSP. Specifically, we study its social welfare in the worst equilibrium, in both full-information and Bayesian settings. The results show that PBM-GSP can generate larger welfare than SBM-GSP under mild conditions. Furthermore, we also study the revenue guarantee for PBM-GSP in Bayesian setting. To the best of our knowledge, this is the first work on broad-match mechanisms for GSP that goes beyond the single-slot case and the full-information setting. ",liwei wang,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Generalized Second Price Auction with Probabilistic Broad Match,59e314eb6159064d61b6a6cc39cdd0fb,http://arxiv.org/abs/1404.3828v1 15833," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",yoram bachrach,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 15834," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",sofia ceppi,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 15835," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",ian kash,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 15836," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",peter key,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 15837," We examine trade-offs among stakeholders in ad auctions. Our metrics are the revenue for the utility of the auctioneer, the number of clicks for the utility of the users and the welfare for the utility of the advertisers. We show how to optimize linear combinations of the stakeholder utilities, showing that these can be tackled through a GSP auction with a per-click reserve price. We then examine constrained optimization of stakeholder utilities. We use simulations and analysis of real-world sponsored search auction data to demonstrate the feasible trade-offs, examining the effect of changing the allowed number of ads on the utilities of the stakeholders. We investigate both short term effects, when the players do not have the time to modify their behavior, and long term equilibrium conditions. Finally, we examine a combinatorially richer constrained optimization problem, where there are several possible allowed configurations (templates) of ad formats. This model captures richer ad formats, which allow using the available screen real estate in various ways. We show that two natural generalizations of the GSP auction rules to this domain are poorly behaved, resulting in not having a symmetric Nash equilibrium or having one with poor welfare. We also provide positive results for restricted cases. ",david kurokawa,,2014.0,,arXiv,Bachrach2014,True,,arXiv,Not available,Optimising Trade-offs Among Stakeholders in Ad Auctions,b9490542a621c5409b4149a6210b066a,http://arxiv.org/abs/1404.5127v1 15838," Media publisher platforms often face an effectiveness-nuisance tradeoff: more annoying ads can be more effective for some advertisers because of their ability to attract attention, but after attracting viewers' attention, their nuisance to viewers can decrease engagement with the platform over time. With the rise of mobile technology and ad blockers, many platforms are becoming increasingly concerned about how to improve monetization through digital ads while improving viewer experience. We study an online ad auction mechanism that incorporates a charge for ad impact on user experience as a criterion for ad selection and pricing. Like a Pigovian tax, the charge causes advertisers to internalize the hidden cost of foregone future platform revenue due to ad impact on user experience. Over time, the mechanism provides an incentive for advertisers to develop ads that are effective while offering viewers a more pleasant experience. We show that adopting the mechanism can simultaneously benefit the publisher, advertisers, and viewers, even in the short term. Incorporating a charge for ad impact can increase expected advertiser profits if enough advertisers compete. A stronger effectiveness-nuisance tradeoff, meaning that ad effectiveness is more strongly associated with negative impact on user experience, increases the amount of competition required for the mechanism to benefit advertisers. The findings suggest that the mechanism can benefit the marketplace for ad slots that consistently attract many advertisers. ",valeria stourm,,2014.0,,arXiv,Stourm2014,True,,arXiv,Not available,Incorporating Hidden Costs of Annoying Ads in Display Auctions,5780b1f28a45b900f9ebb6b517aeda32,http://arxiv.org/abs/1411.0710v2 15839," Media publisher platforms often face an effectiveness-nuisance tradeoff: more annoying ads can be more effective for some advertisers because of their ability to attract attention, but after attracting viewers' attention, their nuisance to viewers can decrease engagement with the platform over time. With the rise of mobile technology and ad blockers, many platforms are becoming increasingly concerned about how to improve monetization through digital ads while improving viewer experience. We study an online ad auction mechanism that incorporates a charge for ad impact on user experience as a criterion for ad selection and pricing. Like a Pigovian tax, the charge causes advertisers to internalize the hidden cost of foregone future platform revenue due to ad impact on user experience. Over time, the mechanism provides an incentive for advertisers to develop ads that are effective while offering viewers a more pleasant experience. We show that adopting the mechanism can simultaneously benefit the publisher, advertisers, and viewers, even in the short term. Incorporating a charge for ad impact can increase expected advertiser profits if enough advertisers compete. A stronger effectiveness-nuisance tradeoff, meaning that ad effectiveness is more strongly associated with negative impact on user experience, increases the amount of competition required for the mechanism to benefit advertisers. The findings suggest that the mechanism can benefit the marketplace for ad slots that consistently attract many advertisers. ",eric bax,,2014.0,,arXiv,Stourm2014,True,,arXiv,Not available,Incorporating Hidden Costs of Annoying Ads in Display Auctions,5780b1f28a45b900f9ebb6b517aeda32,http://arxiv.org/abs/1411.0710v2 15840," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",sajal mukhopadhyay,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 15841," Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values $v < v'$, $\phi(v') - \phi(v) \ge v' - v$, and for regular distributions, $\phi(v') - \phi(v) \ge 0$. Cole and Roughgarden introduced the interpolating class of $\alpha$-Strongly Regular distributions ($\alpha$-SR distributions for short), for which $\phi(v') - \phi(v) \ge \alpha(v' - v)$, for $0 \le \alpha \le 1$. In this paper, we investigate five distinct auction settings for which good expected revenue bounds are known when the bidders' valuations are given by MHR distributions. In every case, we show that these bounds degrade gracefully when extended to $\alpha$-SR distributions. For four of these settings, the auction mechanism requires knowledge of these distribution(s) (in the other setting, the distributions are needed only to ensure good bounds on the expected revenue). In these cases we also investigate what happens when the distributions are known only approximately via samples, specifically how to modify the mechanisms so that they remain effective and how the expected revenue depends on the number of samples. ",richard cole,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,"Applications of $α$-strongly regular distributions to Bayesian auctions",ea46af8ba2b2079a599165ba0c9c4b21,http://arxiv.org/abs/1512.02285v2 15842," Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values $v < v'$, $\phi(v') - \phi(v) \ge v' - v$, and for regular distributions, $\phi(v') - \phi(v) \ge 0$. Cole and Roughgarden introduced the interpolating class of $\alpha$-Strongly Regular distributions ($\alpha$-SR distributions for short), for which $\phi(v') - \phi(v) \ge \alpha(v' - v)$, for $0 \le \alpha \le 1$. In this paper, we investigate five distinct auction settings for which good expected revenue bounds are known when the bidders' valuations are given by MHR distributions. In every case, we show that these bounds degrade gracefully when extended to $\alpha$-SR distributions. For four of these settings, the auction mechanism requires knowledge of these distribution(s) (in the other setting, the distributions are needed only to ensure good bounds on the expected revenue). In these cases we also investigate what happens when the distributions are known only approximately via samples, specifically how to modify the mechanisms so that they remain effective and how the expected revenue depends on the number of samples. ",shravas rao,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,"Applications of $α$-strongly regular distributions to Bayesian auctions",ea46af8ba2b2079a599165ba0c9c4b21,http://arxiv.org/abs/1512.02285v2 15843," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",hossein azari,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 15844," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",william heavlin,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 15845," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",hoda heidari,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 15846," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",max lin,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 15847," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",sonia todorova,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 15848," We provide algorithms that learn simple auctions whose revenue is approximately optimal in multi-item multi-bidder settings, for a wide range of valuations including unit-demand, additive, constrained additive, XOS, and subadditive. We obtain our learning results in two settings. The first is the commonly studied setting where sample access to the bidders' distributions over valuations is given, for both regular distributions and arbitrary distributions with bounded support. Our algorithms require polynomially many samples in the number of items and bidders. The second is a more general max-min learning setting that we introduce, where we are given ""approximate distributions,"" and we seek to compute an auction whose revenue is approximately optimal simultaneously for all ""true distributions"" that are close to the given ones. These results are more general in that they imply the sample-based results, and are also applicable in settings where we have no sample access to the underlying distributions but have estimated them indirectly via market research or by observation of previously run, potentially non-truthful auctions. Our results hold for valuation distributions satisfying the standard (and necessary) independence-across-items property. They also generalize and improve upon recent works, which have provided algorithms that learn approximately optimal auctions in more restricted settings with additive, subadditive and unit-demand valuations using sample access to distributions. We generalize these results to the complete unit-demand, additive, and XOS setting, to i.i.d. subadditive bidders, and to the max-min setting. Our results are enabled by new uniform convergence bounds for hypotheses classes under product measures. Our bounds result in exponential savings in sample complexity compared to bounds derived by bounding the VC dimension, and are of independent interest. ",yang cai,,2017.0,,arXiv,Cai2017,True,,arXiv,Not available,Learning Multi-item Auctions with (or without) Samples,408585e8b13a56f44952826ff8c99770,http://arxiv.org/abs/1709.00228v1 15849," We provide algorithms that learn simple auctions whose revenue is approximately optimal in multi-item multi-bidder settings, for a wide range of valuations including unit-demand, additive, constrained additive, XOS, and subadditive. We obtain our learning results in two settings. The first is the commonly studied setting where sample access to the bidders' distributions over valuations is given, for both regular distributions and arbitrary distributions with bounded support. Our algorithms require polynomially many samples in the number of items and bidders. The second is a more general max-min learning setting that we introduce, where we are given ""approximate distributions,"" and we seek to compute an auction whose revenue is approximately optimal simultaneously for all ""true distributions"" that are close to the given ones. These results are more general in that they imply the sample-based results, and are also applicable in settings where we have no sample access to the underlying distributions but have estimated them indirectly via market research or by observation of previously run, potentially non-truthful auctions. Our results hold for valuation distributions satisfying the standard (and necessary) independence-across-items property. They also generalize and improve upon recent works, which have provided algorithms that learn approximately optimal auctions in more restricted settings with additive, subadditive and unit-demand valuations using sample access to distributions. We generalize these results to the complete unit-demand, additive, and XOS setting, to i.i.d. subadditive bidders, and to the max-min setting. Our results are enabled by new uniform convergence bounds for hypotheses classes under product measures. Our bounds result in exponential savings in sample complexity compared to bounds derived by bounding the VC dimension, and are of independent interest. ",constantinos daskalakis,,2017.0,,arXiv,Cai2017,True,,arXiv,Not available,Learning Multi-item Auctions with (or without) Samples,408585e8b13a56f44952826ff8c99770,http://arxiv.org/abs/1709.00228v1 15850," We consider the revenue maximization problem of a monopolist via a non-Myersonian approach that could generalize to multiple items and multiple buyers. Although such an approach does not lead to any closed-form solution of the problem, it does provide some insights into this problem from different angles. In particular, we consider both Bayesian (Bayesian Incentive Compatible + Bayesian Individually Rational) and Dominant-Strategy (Dominant-Strategy Incentive Compatible + ex-post Individually Rational) implementations, where all the buyers have additive valuations and quasi-linear utilities and all the valuations are independent across buyers (not necessarily independent across items). The main technique of our approach is to formulate the problem as an LP (probably with exponential size) and apply primal-dual analysis. We observe that any optimal solution of the dual program naturally defines the virtual value functions for the primal revenue maximization problem in the sense that any revenue-maximizing auction must be a virtual welfare maximizer (cf. Myerson's auction for a single item [Myerson, 1981]). Based on this observation, we characterize a sufficient and necessary condition for BIC = DSIC, i.e., the optimal revenue of Bayesian implementations equals to the optimal revenue of dominant-strategy implementations (BRev = DRev). The condition is if and only if the optimal DSIC revenue DRev can be achieved by a DSIC and ex-post IR virtual welfare maximizer with buyer-independent virtual value functions (buyer i's virtual value is independent of other buyers' valuations). In light of the characterization, we further show that when all the valuations are i.i.d., it is further equivalent to that separate-selling is optimal. In particular, it respects one result from the recent breakthrough work on the exact optimal solutions in the multi-item multi-buyer setting by Yao [2016]. ",song zuo,,2017.0,,arXiv,Zuo2017,True,,arXiv,Not available,"Generalizing Virtual Values to Multidimensional Auctions: a Non-Myersonian Approach",7fbe52f2512611271f3e70654e6bab02,http://arxiv.org/abs/1711.10922v1 15851," As mobile devices have been ubiquitous, participatory sensing emerges as a powerful tool to solve many contemporary real life problems. Here, we contemplate the participatory sensing in online double auction environment by considering the location information of the participating agents. In this paper, we propose a truthful mechanism in this setting and the mechanism also satisfies the other economic properties such as budget balance and individual rationality. ",anita pal,,2017.0,,arXiv,Mukhopadhyay2017,True,,arXiv,Not available,"Online Participatory Sensing in Double Auction Environment with Location Information",f528a886076f724d5382a0e300e42db1,http://arxiv.org/abs/1706.07917v1 15852," In this paper, we study the incentive mechanism design for real-time data aggregation, which holds a large spectrum of crowdsensing applications. Despite extensive studies on static incentive mechanisms, none of these are applicable to real-time data aggregation due to their incapability of maintaining PUs' long-term participation. We emphasize that, to maintain PUs' long-term participation, it is of significant importance to protect their privacy as well as to provide them a desirable cumulative compensation. Thus motivated, in this paper, we propose LEPA, an efficient incentive mechanism to stimulate long-term participation in real-time data aggregation. Specifically, we allow PUs to preserve their privacy by reporting noisy data, the impact of which on the aggregation accuracy is quantified with proper privacy and accuracy measures. Then, we provide a framework that jointly optimizes the incentive schemes in different time slots to ensure desirable cumulative compensation for PUs and thereby prevent PUs from leaving the system halfway. Considering PUs' strategic behaviors and combinatorial nature of the sensing tasks, we propose a computationally efficient on-line auction with close-to-optimal performance in presence of NP-hardness of winner user selection. We further show that the proposed on-line auction satisfies desirable properties of truthfulness and individual rationality. The performance of LEPA is validated by both theoretical analysis and extensive simulations. ",zhikun zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"LEPA: Incentivizing Long-term Privacy-preserving Data Aggregation in Crowdsensing",de93dd5f9d49a171aa80f3720baae30f,http://arxiv.org/abs/1712.08807v1 15853," In this paper, we study the incentive mechanism design for real-time data aggregation, which holds a large spectrum of crowdsensing applications. Despite extensive studies on static incentive mechanisms, none of these are applicable to real-time data aggregation due to their incapability of maintaining PUs' long-term participation. We emphasize that, to maintain PUs' long-term participation, it is of significant importance to protect their privacy as well as to provide them a desirable cumulative compensation. Thus motivated, in this paper, we propose LEPA, an efficient incentive mechanism to stimulate long-term participation in real-time data aggregation. Specifically, we allow PUs to preserve their privacy by reporting noisy data, the impact of which on the aggregation accuracy is quantified with proper privacy and accuracy measures. Then, we provide a framework that jointly optimizes the incentive schemes in different time slots to ensure desirable cumulative compensation for PUs and thereby prevent PUs from leaving the system halfway. Considering PUs' strategic behaviors and combinatorial nature of the sensing tasks, we propose a computationally efficient on-line auction with close-to-optimal performance in presence of NP-hardness of winner user selection. We further show that the proposed on-line auction satisfies desirable properties of truthfulness and individual rationality. The performance of LEPA is validated by both theoretical analysis and extensive simulations. ",shibo he,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"LEPA: Incentivizing Long-term Privacy-preserving Data Aggregation in Crowdsensing",de93dd5f9d49a171aa80f3720baae30f,http://arxiv.org/abs/1712.08807v1 15854," In this paper, we study the incentive mechanism design for real-time data aggregation, which holds a large spectrum of crowdsensing applications. Despite extensive studies on static incentive mechanisms, none of these are applicable to real-time data aggregation due to their incapability of maintaining PUs' long-term participation. We emphasize that, to maintain PUs' long-term participation, it is of significant importance to protect their privacy as well as to provide them a desirable cumulative compensation. Thus motivated, in this paper, we propose LEPA, an efficient incentive mechanism to stimulate long-term participation in real-time data aggregation. Specifically, we allow PUs to preserve their privacy by reporting noisy data, the impact of which on the aggregation accuracy is quantified with proper privacy and accuracy measures. Then, we provide a framework that jointly optimizes the incentive schemes in different time slots to ensure desirable cumulative compensation for PUs and thereby prevent PUs from leaving the system halfway. Considering PUs' strategic behaviors and combinatorial nature of the sensing tasks, we propose a computationally efficient on-line auction with close-to-optimal performance in presence of NP-hardness of winner user selection. We further show that the proposed on-line auction satisfies desirable properties of truthfulness and individual rationality. The performance of LEPA is validated by both theoretical analysis and extensive simulations. ",mengyuan zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"LEPA: Incentivizing Long-term Privacy-preserving Data Aggregation in Crowdsensing",de93dd5f9d49a171aa80f3720baae30f,http://arxiv.org/abs/1712.08807v1 15855," In this paper, we study the incentive mechanism design for real-time data aggregation, which holds a large spectrum of crowdsensing applications. Despite extensive studies on static incentive mechanisms, none of these are applicable to real-time data aggregation due to their incapability of maintaining PUs' long-term participation. We emphasize that, to maintain PUs' long-term participation, it is of significant importance to protect their privacy as well as to provide them a desirable cumulative compensation. Thus motivated, in this paper, we propose LEPA, an efficient incentive mechanism to stimulate long-term participation in real-time data aggregation. Specifically, we allow PUs to preserve their privacy by reporting noisy data, the impact of which on the aggregation accuracy is quantified with proper privacy and accuracy measures. Then, we provide a framework that jointly optimizes the incentive schemes in different time slots to ensure desirable cumulative compensation for PUs and thereby prevent PUs from leaving the system halfway. Considering PUs' strategic behaviors and combinatorial nature of the sensing tasks, we propose a computationally efficient on-line auction with close-to-optimal performance in presence of NP-hardness of winner user selection. We further show that the proposed on-line auction satisfies desirable properties of truthfulness and individual rationality. The performance of LEPA is validated by both theoretical analysis and extensive simulations. ",jiming chen,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,"LEPA: Incentivizing Long-term Privacy-preserving Data Aggregation in Crowdsensing",de93dd5f9d49a171aa80f3720baae30f,http://arxiv.org/abs/1712.08807v1 15856," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",kan ren,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15857," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",weinan zhang,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15858," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",ke chang,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15859," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",yifei rong,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15860," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",yong yu,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15861," Real-time bidding (RTB) based display advertising has become one of the key technological advances in computational advertising. RTB enables advertisers to buy individual ad impressions via an auction in real-time and facilitates the evaluation and the bidding of individual impressions across multiple advertisers. In RTB, the advertisers face three main challenges when optimizing their bidding strategies, namely (i) estimating the utility (e.g., conversions, clicks) of the ad impression, (ii) forecasting the market value (thus the cost) of the given ad impression, and (iii) deciding the optimal bid for the given auction based on the first two. Previous solutions assume the first two are solved before addressing the bid optimization problem. However, these challenges are strongly correlated and dealing with any individual problem independently may not be globally optimal. In this paper, we propose Bidding Machine, a comprehensive learning to bid framework, which consists of three optimizers dealing with each challenge above, and as a whole, jointly optimizes these three parts. We show that such a joint optimization would largely increase the campaign effectiveness and the profit. From the learning perspective, we show that the bidding machine can be updated smoothly with both offline periodical batch or online sequential training schemes. Our extensive offline empirical study and online A/B testing verify the high effectiveness of the proposed bidding machine. ",jun wang,,2018.0,10.1109/TKDE.2017.2775228,"IEEE Transactions on Knowledge and Data Engineering, Volume: 30, Issue: 4, Year: 2018, Pages: 645-659",Ren2018,True,,arXiv,Not available,"Bidding Machine: Learning to Bid for Directly Optimizing Profits in Display Advertising",8f4ad4bb6753b073875c7f431a7c2728,http://arxiv.org/abs/1803.02194v2 15862," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",constantinos daskalakis,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 15863," We study revenue optimization pricing algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation. We show that, in the case when both the seller and the buyer have the same discounting in their cumulative utilities (revenue and surplus), there exist two optimal algorithms. The first one constantly offers the Myerson price, while the second pricing proposes a ""big deal"": pay for all goods in advance (at the first round) or get nothing. However, when there is an imbalance between the seller and the buyer in the patience to wait for utility, we find that the constant pricing, surprisingly, is no longer optimal. First, it is outperformed by the pricing algorithm ""big deal"", when the seller's discount rate is lower than the one of the buyer. Second, in the inverse case of a less patient buyer, we reduce the problem of finding an optimal algorithm to a multidimensional optimization problem (a multivariate analogue of the functional used to determine Myerson's price) that does not admit a closed form solution in general, but can be solved by numerical optimization techniques (e.g., gradient ones). We provide extensive analysis of numerically found optimal algorithms to demonstrate that they are non-trivial, may be non-consistent, and generate larger expected revenue than the constant pricing with the Myerson price. ",arsenii vanunts,,2018.0,,arXiv,Vanunts2018,True,,arXiv,Not available,Optimal Pricing in Repeated Posted-Price Auctions,77744b40b5e756238bf2b1efa37ac197,http://arxiv.org/abs/1805.02574v1 15864," We study revenue optimization pricing algorithms for repeated posted-price auctions where a seller interacts with a single strategic buyer that holds a fixed private valuation. We show that, in the case when both the seller and the buyer have the same discounting in their cumulative utilities (revenue and surplus), there exist two optimal algorithms. The first one constantly offers the Myerson price, while the second pricing proposes a ""big deal"": pay for all goods in advance (at the first round) or get nothing. However, when there is an imbalance between the seller and the buyer in the patience to wait for utility, we find that the constant pricing, surprisingly, is no longer optimal. First, it is outperformed by the pricing algorithm ""big deal"", when the seller's discount rate is lower than the one of the buyer. Second, in the inverse case of a less patient buyer, we reduce the problem of finding an optimal algorithm to a multidimensional optimization problem (a multivariate analogue of the functional used to determine Myerson's price) that does not admit a closed form solution in general, but can be solved by numerical optimization techniques (e.g., gradient ones). We provide extensive analysis of numerically found optimal algorithms to demonstrate that they are non-trivial, may be non-consistent, and generate larger expected revenue than the constant pricing with the Myerson price. ",alexey drutsa,,2018.0,,arXiv,Vanunts2018,True,,arXiv,Not available,Optimal Pricing in Repeated Posted-Price Auctions,77744b40b5e756238bf2b1efa37ac197,http://arxiv.org/abs/1805.02574v1 15865," The popularity and applicability of mobile crowdsensing applications are continuously increasing due to the widespread of mobile devices and their sensing and processing capabilities. However, we need to offer appropriate incentives to the mobile users who contribute their resources and preserve their privacy. Blockchain technologies enable semi-anonymous multi-party interactions and can be utilized in crowdsensing applications to maintain the privacy of the mobile users while ensuring first-rate crowdsensed data. In this work, we propose to use blockchain technologies and smart contracts to orchestrate the interactions between mobile crowdsensing providers and mobile users for the case of spatial crowdsensing, where mobile users need to be at specific locations to perform the tasks. Smart contracts, by operating as processes that are executed on the blockchain, are used to preserve users' privacy and make payments. Furthermore, for the assignment of the crowdsensing tasks to the mobile users, we design a truthful, cost-optimal auction that minimizes the payments from the crowdsensing providers to the mobile users. Extensive experimental results show that the proposed privacy preserving auction outperforms state-of-the-art proposals regarding cost by ten times for high numbers of mobile users and tasks. ",dimitris chatzopoulos,,2018.0,,arXiv,Chatzopoulos2018,True,,arXiv,Not available,"Privacy Preserving and Cost Optimal Mobile Crowdsensing using Smart Contracts on Blockchain",f2b5804508034e017ce458648625d175,http://arxiv.org/abs/1808.04056v2 15866," The popularity and applicability of mobile crowdsensing applications are continuously increasing due to the widespread of mobile devices and their sensing and processing capabilities. However, we need to offer appropriate incentives to the mobile users who contribute their resources and preserve their privacy. Blockchain technologies enable semi-anonymous multi-party interactions and can be utilized in crowdsensing applications to maintain the privacy of the mobile users while ensuring first-rate crowdsensed data. In this work, we propose to use blockchain technologies and smart contracts to orchestrate the interactions between mobile crowdsensing providers and mobile users for the case of spatial crowdsensing, where mobile users need to be at specific locations to perform the tasks. Smart contracts, by operating as processes that are executed on the blockchain, are used to preserve users' privacy and make payments. Furthermore, for the assignment of the crowdsensing tasks to the mobile users, we design a truthful, cost-optimal auction that minimizes the payments from the crowdsensing providers to the mobile users. Extensive experimental results show that the proposed privacy preserving auction outperforms state-of-the-art proposals regarding cost by ten times for high numbers of mobile users and tasks. ",sujit gujar,,2018.0,,arXiv,Chatzopoulos2018,True,,arXiv,Not available,"Privacy Preserving and Cost Optimal Mobile Crowdsensing using Smart Contracts on Blockchain",f2b5804508034e017ce458648625d175,http://arxiv.org/abs/1808.04056v2 15867," The popularity and applicability of mobile crowdsensing applications are continuously increasing due to the widespread of mobile devices and their sensing and processing capabilities. However, we need to offer appropriate incentives to the mobile users who contribute their resources and preserve their privacy. Blockchain technologies enable semi-anonymous multi-party interactions and can be utilized in crowdsensing applications to maintain the privacy of the mobile users while ensuring first-rate crowdsensed data. In this work, we propose to use blockchain technologies and smart contracts to orchestrate the interactions between mobile crowdsensing providers and mobile users for the case of spatial crowdsensing, where mobile users need to be at specific locations to perform the tasks. Smart contracts, by operating as processes that are executed on the blockchain, are used to preserve users' privacy and make payments. Furthermore, for the assignment of the crowdsensing tasks to the mobile users, we design a truthful, cost-optimal auction that minimizes the payments from the crowdsensing providers to the mobile users. Extensive experimental results show that the proposed privacy preserving auction outperforms state-of-the-art proposals regarding cost by ten times for high numbers of mobile users and tasks. ",boi faltings,,2018.0,,arXiv,Chatzopoulos2018,True,,arXiv,Not available,"Privacy Preserving and Cost Optimal Mobile Crowdsensing using Smart Contracts on Blockchain",f2b5804508034e017ce458648625d175,http://arxiv.org/abs/1808.04056v2 15868," The popularity and applicability of mobile crowdsensing applications are continuously increasing due to the widespread of mobile devices and their sensing and processing capabilities. However, we need to offer appropriate incentives to the mobile users who contribute their resources and preserve their privacy. Blockchain technologies enable semi-anonymous multi-party interactions and can be utilized in crowdsensing applications to maintain the privacy of the mobile users while ensuring first-rate crowdsensed data. In this work, we propose to use blockchain technologies and smart contracts to orchestrate the interactions between mobile crowdsensing providers and mobile users for the case of spatial crowdsensing, where mobile users need to be at specific locations to perform the tasks. Smart contracts, by operating as processes that are executed on the blockchain, are used to preserve users' privacy and make payments. Furthermore, for the assignment of the crowdsensing tasks to the mobile users, we design a truthful, cost-optimal auction that minimizes the payments from the crowdsensing providers to the mobile users. Extensive experimental results show that the proposed privacy preserving auction outperforms state-of-the-art proposals regarding cost by ten times for high numbers of mobile users and tasks. ",pan hui,,2018.0,,arXiv,Chatzopoulos2018,True,,arXiv,Not available,"Privacy Preserving and Cost Optimal Mobile Crowdsensing using Smart Contracts on Blockchain",f2b5804508034e017ce458648625d175,http://arxiv.org/abs/1808.04056v2 15869," In the past decade, Real Time Bidding (RTB) has become one of the most common purchase mechanisms of the online advertisement market. Under RTB a unique second-price auction between bidders is managed for every individual advertisement slot. We consider the bidder's problem of maximizing the value of the bundle of ads they purchase, subject to budget constraints, and assuming the value of each ad is known. We generalize the problem as a second-price knapsack problem with uncertain resource consumption: the bidder selects a bidding policy rather than a selection policy, and for each item the bidder wins the auction when their bid exceeds the unknown amount they must pay. Surprisingly, because of the second-price mechanism, we prove that a linear form of bidding yields a near-optimal selection of ads. We extend to an implementable online one-shot learning algorithm. We prove that key points of the random permutation assumption hold in this setting, and that we can apply algorithms for the online-knapsack problem to this setting. Through this we recover a competitive ratio of $1-6\epsilon$, where $\epsilon$ is the training ratio and is small in general, yielding a strong theoretical result on a simple variation of the standard online knapsack problem. Numerical results from the iPinYou dataset verify our results, recovering a bundle of ads with 99.5\% - 100.0\% of the optimal value. ",jonathan amar,,2018.0,,arXiv,Amar2018,True,,arXiv,Not available,"Near-Optimal Online Knapsack Strategy for Real-Time Bidding in Internet Advertising",0455596084bc11c348c05e278bdc9b5c,http://arxiv.org/abs/1810.10661v1 15870," In the past decade, Real Time Bidding (RTB) has become one of the most common purchase mechanisms of the online advertisement market. Under RTB a unique second-price auction between bidders is managed for every individual advertisement slot. We consider the bidder's problem of maximizing the value of the bundle of ads they purchase, subject to budget constraints, and assuming the value of each ad is known. We generalize the problem as a second-price knapsack problem with uncertain resource consumption: the bidder selects a bidding policy rather than a selection policy, and for each item the bidder wins the auction when their bid exceeds the unknown amount they must pay. Surprisingly, because of the second-price mechanism, we prove that a linear form of bidding yields a near-optimal selection of ads. We extend to an implementable online one-shot learning algorithm. We prove that key points of the random permutation assumption hold in this setting, and that we can apply algorithms for the online-knapsack problem to this setting. Through this we recover a competitive ratio of $1-6\epsilon$, where $\epsilon$ is the training ratio and is small in general, yielding a strong theoretical result on a simple variation of the standard online knapsack problem. Numerical results from the iPinYou dataset verify our results, recovering a bundle of ads with 99.5\% - 100.0\% of the optimal value. ",nicholas renegar,,2018.0,,arXiv,Amar2018,True,,arXiv,Not available,"Near-Optimal Online Knapsack Strategy for Real-Time Bidding in Internet Advertising",0455596084bc11c348c05e278bdc9b5c,http://arxiv.org/abs/1810.10661v1 15871," In the past decade, Real Time Bidding (RTB) has become one of the most common purchase mechanisms of the online advertisement market. Under RTB a unique second-price auction between bidders is managed for every individual advertisement slot. We consider the bidder's problem of maximizing the value of the bundle of ads they purchase, subject to budget constraints, and assuming the value of each ad is known. We generalize the problem as a second-price knapsack problem with uncertain resource consumption: the bidder selects a bidding policy rather than a selection policy, and for each item the bidder wins the auction when their bid exceeds the unknown amount they must pay. Surprisingly, because of the second-price mechanism, we prove that a linear form of bidding yields a near-optimal selection of ads. We extend to an implementable online one-shot learning algorithm. We prove that key points of the random permutation assumption hold in this setting, and that we can apply algorithms for the online-knapsack problem to this setting. Through this we recover a competitive ratio of $1-6\epsilon$, where $\epsilon$ is the training ratio and is small in general, yielding a strong theoretical result on a simple variation of the standard online knapsack problem. Numerical results from the iPinYou dataset verify our results, recovering a bundle of ads with 99.5\% - 100.0\% of the optimal value. ",haihao lu,,2018.0,,arXiv,Amar2018,True,,arXiv,Not available,"Near-Optimal Online Knapsack Strategy for Real-Time Bidding in Internet Advertising",0455596084bc11c348c05e278bdc9b5c,http://arxiv.org/abs/1810.10661v1 15872," A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al.[8]. We explore the privacy properties of a natural class of communication protocols that we refer to as ""dissection protocols"". Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in [8]. Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form ""Is your input between the values \alpha and \beta (under a predefined order over the possible inputs)?"". We prove that for a large class of functions, called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or ""almost uniform"" probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest. ",marco comi,,2011.0,10.1016/j.tcs.2012.07.008,"Theoretical Computer Science, 457, 45-58, 2012",Comi2011,True,,arXiv,Not available,On Communication Protocols that Compute Almost Privately,c9d02e286f3d024dba1bb30777825d9d,http://arxiv.org/abs/1102.1443v3 15873," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",alan deckelbaum,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 15874," A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al.[8]. We explore the privacy properties of a natural class of communication protocols that we refer to as ""dissection protocols"". Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in [8]. Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form ""Is your input between the values \alpha and \beta (under a predefined order over the possible inputs)?"". We prove that for a large class of functions, called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or ""almost uniform"" probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest. ",bhaskar dasgupta,,2011.0,10.1016/j.tcs.2012.07.008,"Theoretical Computer Science, 457, 45-58, 2012",Comi2011,True,,arXiv,Not available,On Communication Protocols that Compute Almost Privately,c9d02e286f3d024dba1bb30777825d9d,http://arxiv.org/abs/1102.1443v3 15875," A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al.[8]. We explore the privacy properties of a natural class of communication protocols that we refer to as ""dissection protocols"". Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in [8]. Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form ""Is your input between the values \alpha and \beta (under a predefined order over the possible inputs)?"". We prove that for a large class of functions, called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or ""almost uniform"" probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest. ",michael schapira,,2011.0,10.1016/j.tcs.2012.07.008,"Theoretical Computer Science, 457, 45-58, 2012",Comi2011,True,,arXiv,Not available,On Communication Protocols that Compute Almost Privately,c9d02e286f3d024dba1bb30777825d9d,http://arxiv.org/abs/1102.1443v3 15876," A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approximate privacy model for two-party communication recently introduced by Feigenbaum et al.[8]. We explore the privacy properties of a natural class of communication protocols that we refer to as ""dissection protocols"". Dissection protocols include, among others, the bisection auction in [9,10] and the bisection protocol for the millionaires problem in [8]. Informally, in a dissection protocol the communicating parties are restricted to answering simple questions of the form ""Is your input between the values \alpha and \beta (under a predefined order over the possible inputs)?"". We prove that for a large class of functions, called tiling functions, which include the 2nd-price Vickrey auction, there always exists a dissection protocol that provides a constant average-case privacy approximation ratio for uniform or ""almost uniform"" probability distributions over inputs. To establish this result we present an interesting connection between the approximate privacy framework and basic concepts in computational geometry. We show that such a good privacy approximation ratio for tiling functions does not, in general, exist in the worst case. We also discuss extensions of the basic setup to more than two parties and to non-tiling functions, and provide calculations of privacy approximation ratios for two functions of interest. ",venkatakumar srinivasan,,2011.0,10.1016/j.tcs.2012.07.008,"Theoretical Computer Science, 457, 45-58, 2012",Comi2011,True,,arXiv,Not available,On Communication Protocols that Compute Almost Privately,c9d02e286f3d024dba1bb30777825d9d,http://arxiv.org/abs/1102.1443v3 15877," Bilateral trade is a fundamental economic scenario comprising a strategically acting buyer and seller, each holding valuations for the item, drawn from publicly known distributions. A mechanism is supposed to facilitate trade between these agents, if such trade is beneficial. It was recently shown that the only mechanisms that are simultaneously DSIC, SBB, and ex-post IR, are fixed price mechanisms, i.e., mechanisms that are parametrised by a price p, and trade occurs if and only if the valuation of the buyer is at least p and the valuation of the seller is at most p. The gain from trade is the increase in welfare that results from applying a mechanism; here we study the gain from trade achievable by fixed price mechanisms. We explore this question for both the bilateral trade setting, and a double auction setting where there are multiple buyers and sellers. We first identify a fixed price mechanism that achieves a gain from trade of at least 2/r times the optimum, where r is the probability that the seller's valuation does not exceed the buyer's valuation. This extends a previous result by McAfee. Subsequently, we improve this approximation factor in an asymptotic sense, by showing that a more sophisticated rule for setting the fixed price results in an expected gain from trade within a factor O(log(1/r)) of the optimal gain from trade. This is asymptotically the best approximation factor possible. Lastly, we extend our study of fixed price mechanisms to the double auction setting defined by a set of multiple i.i.d. unit demand buyers, and i.i.d. unit supply sellers. We present a fixed price mechanism that achieves a gain from trade that achieves for all epsilon > 0 a gain from trade of at least (1-epsilon) times the expected optimal gain from trade with probability 1 - 2/e^{#T epsilon^2 /2}, where #T is the expected number of trades resulting from the double auction. ",riccardo colini-baldeschi,,2017.0,,arXiv,Colini-Baldeschi2017,True,,arXiv,Not available,Fixed Price Approximability of the Optimal Gain From Trade,a225dd2f0d8a5b91d0736907bd9f027c,http://arxiv.org/abs/1710.08394v1 15878," Bilateral trade is a fundamental economic scenario comprising a strategically acting buyer and seller, each holding valuations for the item, drawn from publicly known distributions. A mechanism is supposed to facilitate trade between these agents, if such trade is beneficial. It was recently shown that the only mechanisms that are simultaneously DSIC, SBB, and ex-post IR, are fixed price mechanisms, i.e., mechanisms that are parametrised by a price p, and trade occurs if and only if the valuation of the buyer is at least p and the valuation of the seller is at most p. The gain from trade is the increase in welfare that results from applying a mechanism; here we study the gain from trade achievable by fixed price mechanisms. We explore this question for both the bilateral trade setting, and a double auction setting where there are multiple buyers and sellers. We first identify a fixed price mechanism that achieves a gain from trade of at least 2/r times the optimum, where r is the probability that the seller's valuation does not exceed the buyer's valuation. This extends a previous result by McAfee. Subsequently, we improve this approximation factor in an asymptotic sense, by showing that a more sophisticated rule for setting the fixed price results in an expected gain from trade within a factor O(log(1/r)) of the optimal gain from trade. This is asymptotically the best approximation factor possible. Lastly, we extend our study of fixed price mechanisms to the double auction setting defined by a set of multiple i.i.d. unit demand buyers, and i.i.d. unit supply sellers. We present a fixed price mechanism that achieves a gain from trade that achieves for all epsilon > 0 a gain from trade of at least (1-epsilon) times the expected optimal gain from trade with probability 1 - 2/e^{#T epsilon^2 /2}, where #T is the expected number of trades resulting from the double auction. ",paul goldberg,,2017.0,,arXiv,Colini-Baldeschi2017,True,,arXiv,Not available,Fixed Price Approximability of the Optimal Gain From Trade,a225dd2f0d8a5b91d0736907bd9f027c,http://arxiv.org/abs/1710.08394v1 15879," Bilateral trade is a fundamental economic scenario comprising a strategically acting buyer and seller, each holding valuations for the item, drawn from publicly known distributions. A mechanism is supposed to facilitate trade between these agents, if such trade is beneficial. It was recently shown that the only mechanisms that are simultaneously DSIC, SBB, and ex-post IR, are fixed price mechanisms, i.e., mechanisms that are parametrised by a price p, and trade occurs if and only if the valuation of the buyer is at least p and the valuation of the seller is at most p. The gain from trade is the increase in welfare that results from applying a mechanism; here we study the gain from trade achievable by fixed price mechanisms. We explore this question for both the bilateral trade setting, and a double auction setting where there are multiple buyers and sellers. We first identify a fixed price mechanism that achieves a gain from trade of at least 2/r times the optimum, where r is the probability that the seller's valuation does not exceed the buyer's valuation. This extends a previous result by McAfee. Subsequently, we improve this approximation factor in an asymptotic sense, by showing that a more sophisticated rule for setting the fixed price results in an expected gain from trade within a factor O(log(1/r)) of the optimal gain from trade. This is asymptotically the best approximation factor possible. Lastly, we extend our study of fixed price mechanisms to the double auction setting defined by a set of multiple i.i.d. unit demand buyers, and i.i.d. unit supply sellers. We present a fixed price mechanism that achieves a gain from trade that achieves for all epsilon > 0 a gain from trade of at least (1-epsilon) times the expected optimal gain from trade with probability 1 - 2/e^{#T epsilon^2 /2}, where #T is the expected number of trades resulting from the double auction. ",bart keijzer,,2017.0,,arXiv,Colini-Baldeschi2017,True,,arXiv,Not available,Fixed Price Approximability of the Optimal Gain From Trade,a225dd2f0d8a5b91d0736907bd9f027c,http://arxiv.org/abs/1710.08394v1 15880," Bilateral trade is a fundamental economic scenario comprising a strategically acting buyer and seller, each holding valuations for the item, drawn from publicly known distributions. A mechanism is supposed to facilitate trade between these agents, if such trade is beneficial. It was recently shown that the only mechanisms that are simultaneously DSIC, SBB, and ex-post IR, are fixed price mechanisms, i.e., mechanisms that are parametrised by a price p, and trade occurs if and only if the valuation of the buyer is at least p and the valuation of the seller is at most p. The gain from trade is the increase in welfare that results from applying a mechanism; here we study the gain from trade achievable by fixed price mechanisms. We explore this question for both the bilateral trade setting, and a double auction setting where there are multiple buyers and sellers. We first identify a fixed price mechanism that achieves a gain from trade of at least 2/r times the optimum, where r is the probability that the seller's valuation does not exceed the buyer's valuation. This extends a previous result by McAfee. Subsequently, we improve this approximation factor in an asymptotic sense, by showing that a more sophisticated rule for setting the fixed price results in an expected gain from trade within a factor O(log(1/r)) of the optimal gain from trade. This is asymptotically the best approximation factor possible. Lastly, we extend our study of fixed price mechanisms to the double auction setting defined by a set of multiple i.i.d. unit demand buyers, and i.i.d. unit supply sellers. We present a fixed price mechanism that achieves a gain from trade that achieves for all epsilon > 0 a gain from trade of at least (1-epsilon) times the expected optimal gain from trade with probability 1 - 2/e^{#T epsilon^2 /2}, where #T is the expected number of trades resulting from the double auction. ",stefano leonardi,,2017.0,,arXiv,Colini-Baldeschi2017,True,,arXiv,Not available,Fixed Price Approximability of the Optimal Gain From Trade,a225dd2f0d8a5b91d0736907bd9f027c,http://arxiv.org/abs/1710.08394v1 15881," Bilateral trade is a fundamental economic scenario comprising a strategically acting buyer and seller, each holding valuations for the item, drawn from publicly known distributions. A mechanism is supposed to facilitate trade between these agents, if such trade is beneficial. It was recently shown that the only mechanisms that are simultaneously DSIC, SBB, and ex-post IR, are fixed price mechanisms, i.e., mechanisms that are parametrised by a price p, and trade occurs if and only if the valuation of the buyer is at least p and the valuation of the seller is at most p. The gain from trade is the increase in welfare that results from applying a mechanism; here we study the gain from trade achievable by fixed price mechanisms. We explore this question for both the bilateral trade setting, and a double auction setting where there are multiple buyers and sellers. We first identify a fixed price mechanism that achieves a gain from trade of at least 2/r times the optimum, where r is the probability that the seller's valuation does not exceed the buyer's valuation. This extends a previous result by McAfee. Subsequently, we improve this approximation factor in an asymptotic sense, by showing that a more sophisticated rule for setting the fixed price results in an expected gain from trade within a factor O(log(1/r)) of the optimal gain from trade. This is asymptotically the best approximation factor possible. Lastly, we extend our study of fixed price mechanisms to the double auction setting defined by a set of multiple i.i.d. unit demand buyers, and i.i.d. unit supply sellers. We present a fixed price mechanism that achieves a gain from trade that achieves for all epsilon > 0 a gain from trade of at least (1-epsilon) times the expected optimal gain from trade with probability 1 - 2/e^{#T epsilon^2 /2}, where #T is the expected number of trades resulting from the double auction. ",stefano turchetta,,2017.0,,arXiv,Colini-Baldeschi2017,True,,arXiv,Not available,Fixed Price Approximability of the Optimal Gain From Trade,a225dd2f0d8a5b91d0736907bd9f027c,http://arxiv.org/abs/1710.08394v1 15882," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",marco scarsini,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 15883," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",eilon solan,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 15884," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",christos tzamos,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 15885," We consider a class of auctions (Lowest Unique Bid Auctions) that have achieved a considerable success on the Internet. Bids are made in cents (of euro) and every bidder can bid as many numbers as she wants. The lowest unique bid wins the auction. Every bid has a fixed cost, and once a participant makes a bid, she gets to know whether her bid was unique and whether it was the lowest unique. Information is updated in real time, but every bidder sees only what's relevant to the bids she made. We show that the observed behavior in these auctions differs considerably from what theory would prescribe if all bidders were fully rational. We show that the seller makes money, which would not be the case with rational bidders, and some bidders win the auctions quite often. We describe a possible strategy for these bidders. ",nicolas vieille,,2010.0,,arXiv,Scarsini2010,True,,arXiv,Not available,Lowest Unique Bid Auctions,ee77257bd347def458e3f3370e31aad8,http://arxiv.org/abs/1007.4264v1 15886," In this paper, we focus our attention on the large capacities unsplittable flow problem in a game theoretic setting. In this setting, there are selfish agents, which control some of the requests characteristics, and may be dishonest about them. It is worth noting that in game theoretic settings many standard techniques, such as randomized rounding, violate certain monotonicity properties, which are imperative for truthfulness, and therefore cannot be employed. In light of this state of affairs, we design a monotone deterministic algorithm, which is based on a primal-dual machinery, which attains an approximation ratio of $\frac{e}{e-1}$, up to a disparity of $\epsilon$ away. This implies an improvement on the current best truthful mechanism, as well as an improvement on the current best combinatorial algorithm for the problem under consideration. Surprisingly, we demonstrate that any algorithm in the family of reasonable iterative path minimizing algorithms, cannot yield a better approximation ratio. Consequently, it follows that in order to achieve a monotone PTAS, if exists, one would have to exert different techniques. We also consider the large capacities \textit{single-minded multi-unit combinatorial auction problem}. This problem is closely related to the unsplittable flow problem since one can formulate it as a special case of the integer linear program of the unsplittable flow problem. Accordingly, we obtain a comparable performance guarantee by refining the algorithm suggested for the unsplittable flow problem. ",yossi azar,,2008.0,,"Proc. of 19th SPAA (2007), 320-329",Azar2008,True,,arXiv,Not available,Truthful Unsplittable Flow for Large Capacity Networks,16d81450b91fe096bba60ab901c27b0c,http://arxiv.org/abs/0804.2112v1 15887," In this paper, we focus our attention on the large capacities unsplittable flow problem in a game theoretic setting. In this setting, there are selfish agents, which control some of the requests characteristics, and may be dishonest about them. It is worth noting that in game theoretic settings many standard techniques, such as randomized rounding, violate certain monotonicity properties, which are imperative for truthfulness, and therefore cannot be employed. In light of this state of affairs, we design a monotone deterministic algorithm, which is based on a primal-dual machinery, which attains an approximation ratio of $\frac{e}{e-1}$, up to a disparity of $\epsilon$ away. This implies an improvement on the current best truthful mechanism, as well as an improvement on the current best combinatorial algorithm for the problem under consideration. Surprisingly, we demonstrate that any algorithm in the family of reasonable iterative path minimizing algorithms, cannot yield a better approximation ratio. Consequently, it follows that in order to achieve a monotone PTAS, if exists, one would have to exert different techniques. We also consider the large capacities \textit{single-minded multi-unit combinatorial auction problem}. This problem is closely related to the unsplittable flow problem since one can formulate it as a special case of the integer linear program of the unsplittable flow problem. Accordingly, we obtain a comparable performance guarantee by refining the algorithm suggested for the unsplittable flow problem. ",iftah gamzu,,2008.0,,"Proc. of 19th SPAA (2007), 320-329",Azar2008,True,,arXiv,Not available,Truthful Unsplittable Flow for Large Capacity Networks,16d81450b91fe096bba60ab901c27b0c,http://arxiv.org/abs/0804.2112v1 15888," In this paper, we focus our attention on the large capacities unsplittable flow problem in a game theoretic setting. In this setting, there are selfish agents, which control some of the requests characteristics, and may be dishonest about them. It is worth noting that in game theoretic settings many standard techniques, such as randomized rounding, violate certain monotonicity properties, which are imperative for truthfulness, and therefore cannot be employed. In light of this state of affairs, we design a monotone deterministic algorithm, which is based on a primal-dual machinery, which attains an approximation ratio of $\frac{e}{e-1}$, up to a disparity of $\epsilon$ away. This implies an improvement on the current best truthful mechanism, as well as an improvement on the current best combinatorial algorithm for the problem under consideration. Surprisingly, we demonstrate that any algorithm in the family of reasonable iterative path minimizing algorithms, cannot yield a better approximation ratio. Consequently, it follows that in order to achieve a monotone PTAS, if exists, one would have to exert different techniques. We also consider the large capacities \textit{single-minded multi-unit combinatorial auction problem}. This problem is closely related to the unsplittable flow problem since one can formulate it as a special case of the integer linear program of the unsplittable flow problem. Accordingly, we obtain a comparable performance guarantee by refining the algorithm suggested for the unsplittable flow problem. ",shai gutner,,2008.0,,"Proc. of 19th SPAA (2007), 320-329",Azar2008,True,,arXiv,Not available,Truthful Unsplittable Flow for Large Capacity Networks,16d81450b91fe096bba60ab901c27b0c,http://arxiv.org/abs/0804.2112v1 15889," Much work in AI deals with the selection of proper actions in a given (known or unknown) environment. However, the way to select a proper action when facing other agents is quite unclear. Most work in AI adopts classical game-theoretic equilibrium analysis to predict agent behavior in such settings. This approach however does not provide us with any guarantee for the agent. In this paper we introduce competitive safety analysis. This approach bridges the gap between the desired normative AI approach, where a strategy should be selected in order to guarantee a desired payoff, and equilibrium analysis. We show that a safety level strategy is able to guarantee the value obtained in a Nash equilibrium, in several classical computer science settings. Then, we discuss the concept of competitive safety strategies, and illustrate its use in a decentralized load balancing setting, typical to network problems. In particular, we show that when we have many agents, it is possible to guarantee an expected payoff which is a factor of 8/9 of the payoff obtained in a Nash equilibrium. Our discussion of competitive safety analysis for decentralized load balancing is further developed to deal with many communication links and arbitrary speeds. Finally, we discuss the extension of the above concepts to Bayesian games, and illustrate their use in a basic auctions setup. ",m. tennenholtz,,2011.0,10.1613/jair.1065,"Journal Of Artificial Intelligence Research, Volume 17, pages 363-378, 2002",Tennenholtz2011,True,,arXiv,Not available,"Competitive Safety Analysis: Robust Decision-Making in Multi-Agent Systems",05d0fe51b4aa1c7db15d7a781f45acb2,http://arxiv.org/abs/1106.4570v1 15890," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",thodoris lykouris,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15891," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",vasilis syrgkanis,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15892," We study the quality of outcomes in repeated games when the population of players is dynamically changing and participants use learning algorithms to adapt to the changing environment. Game theory classically considers Nash equilibria of one-shot games, while in practice many games are players repeatedly, and in such games players often use algorithmic tools to learn to play in the given environment. Learning in repeated games has only been studied when the population playing the game is stable over time. We analyze efficiency of repeated games in dynamically changing environments, motivated by application domains such as packet routing and Internet ad-auctions. We prove that, in many classes of games, if players choose their strategies in a way that guarantees low adaptive regret, then high social welfare is ensured, even under very frequent changes. This result extends previous work, which showed high welfare for learning outcomes in stable environments. A main technical tool for our analysis is the existence of a solution to the welfare maximization problem that is both close to optimal and relatively stable over time. Such a solution serves as a benchmark in the efficiency analysis of learning outcomes. We show that such stable and near-optimal solutions exist for many problems, even in cases when the exact optimal solution can be very unstable. We develop direct techniques to show the existence of a stable solution in some classes of games. Further, we show that a sufficient condition for the existence of stable solutions is the existence of a differentially private algorithm for the welfare maximization problem. We demonstrate our techniques by focusing on three classes of games as examples: simultaneous item auctions, bandwidth allocation mechanisms and congestion games. ",eva tardos,,2015.0,,arXiv,Lykouris2015,True,,arXiv,Not available,Learning and Efficiency in Games with Dynamic Population,00550d8491fe954ff5b547e55a8c5b95,http://arxiv.org/abs/1505.00391v3 15893," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The paper presents the history, basic ideas and recent development in quantum game theory. In this context, a new application of the Ising chain model is proposed. ",e. piotrowski,,2002.0,,Int.J.Theor.Phys. 42 (2003) 1089,Piotrowski2002,True,,arXiv,Not available,An invitation to Quantum Game Theory,571bf9709839fcce8baa36c669d2ab98,http://arxiv.org/abs/quant-ph/0211191v1 15894," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The paper presents the history, basic ideas and recent development in quantum game theory. In this context, a new application of the Ising chain model is proposed. ",j. sladkowski,,2002.0,,Int.J.Theor.Phys. 42 (2003) 1089,Piotrowski2002,True,,arXiv,Not available,An invitation to Quantum Game Theory,571bf9709839fcce8baa36c669d2ab98,http://arxiv.org/abs/quant-ph/0211191v1 15895," The Ultimatum Game (UG) is an economic game where two players (proposer and responder) decide how to split a certain amount of money. While traditional economic theories based on rational decision making predict that the proposer should make a minimal offer and the responder should accept it, human subjects tend to behave more fairly in UG. Previous studies suggested that extra information such as reputation, empathy, or spatial structure is needed for fairness to evolve in UG. Here we show that fairness can evolve without additional information if players make decisions probabilistically and may continue interactions when the offer is rejected, which we call the Not Quite Ultimatum Game (NQUG). Evolutionary simulations of NQUG showed that the probabilistic decision making contributes to the increase of proposers' offer amounts to avoid rejection, while the repetition of the game works to responders' advantage because they can wait until a good offer comes. These simple extensions greatly promote evolution of fairness in both proposers' offers and responders' acceptance thresholds. ",hiroki sayama,,2014.0,10.1038/srep05104,"Scientific Reports 4, 5104, 2014",Ichinose2014,True,,arXiv,Not available,Evolution of Fairness in the Not Quite Ultimatum Game,bf4e0a751258090d1c44a9ebef3145fd,http://arxiv.org/abs/1402.4740v2 15896," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",bowei chen,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 15897," In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP), which is also a local optimum to a potential function. On the other hand, this class of games does not model well the congestion or resource sharing in a wireless context, a prominent feature of which is spatial reuse. What this translates to in the context of a congestion game is that a users payoff for using a resource (interpreted as a channel) is a function of the its number of its interfering users sharing that channel, rather than the total number among all users. This makes the problem quite different. We will call this the congestion game with resource reuse (CG-RR). In this paper we study intrinsic properties of such a game; in particular, we seek to address under what conditions on the underlying network this game possesses the FIP or NE. We also discuss the implications of these results when applied to wireless spectrum sharing ",sahand ahmad,,2009.0,,arXiv,Ahmad2009,True,,arXiv,Not available,"Congestion games with resource reuse and applications in spectrum sharing",66489eaf5b2a992c6ca97fd8bd4a4b45,http://arxiv.org/abs/0910.4214v1 15898," In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP), which is also a local optimum to a potential function. On the other hand, this class of games does not model well the congestion or resource sharing in a wireless context, a prominent feature of which is spatial reuse. What this translates to in the context of a congestion game is that a users payoff for using a resource (interpreted as a channel) is a function of the its number of its interfering users sharing that channel, rather than the total number among all users. This makes the problem quite different. We will call this the congestion game with resource reuse (CG-RR). In this paper we study intrinsic properties of such a game; in particular, we seek to address under what conditions on the underlying network this game possesses the FIP or NE. We also discuss the implications of these results when applied to wireless spectrum sharing ",mingyan liu,,2009.0,,arXiv,Ahmad2009,True,,arXiv,Not available,"Congestion games with resource reuse and applications in spectrum sharing",66489eaf5b2a992c6ca97fd8bd4a4b45,http://arxiv.org/abs/0910.4214v1 15899," In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP), which is also a local optimum to a potential function. On the other hand, this class of games does not model well the congestion or resource sharing in a wireless context, a prominent feature of which is spatial reuse. What this translates to in the context of a congestion game is that a users payoff for using a resource (interpreted as a channel) is a function of the its number of its interfering users sharing that channel, rather than the total number among all users. This makes the problem quite different. We will call this the congestion game with resource reuse (CG-RR). In this paper we study intrinsic properties of such a game; in particular, we seek to address under what conditions on the underlying network this game possesses the FIP or NE. We also discuss the implications of these results when applied to wireless spectrum sharing ",yunnan wu,,2009.0,,arXiv,Ahmad2009,True,,arXiv,Not available,"Congestion games with resource reuse and applications in spectrum sharing",66489eaf5b2a992c6ca97fd8bd4a4b45,http://arxiv.org/abs/0910.4214v1 15900," This paper investigates design of noncooperative games from an optimization and control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of a fairly general class of noncooperative games satisfies certain global objectives such as welfare maximization or achieving a certain level of quality-of-service (QoS). The class of games considered provide a theoretical basis for decentralized resource allocation and control problems including network congestion control, wireless uplink power control, and optical power control. The game design problem is analyzed under different knowledge assumptions (full versus limited information) and design objectives (QoS versus utility maximization) for separable and non-separable utility functions. The ``price of anarchy'' is shown not to be an inherent feature of full-information games that incorporate pricing mechanisms. Moreover, a simple linear pricing is shown to be sufficient for design of Nash equilibrium according to a chosen global objective for a fairly general class of games. Stability properties of the game and pricing dynamics are studied under the assumption of time-scale separation and in two separate time-scales. Thus, sufficient conditions are derived, which allow the designer to place the Nash equilibrium solution or to guide the system trajectory to a desired region or point. The obtained results are illustrated with a number of examples. ",tansu alpcan,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,"An Optimization and Control Theoretic Approach to Noncooperative Game Design",8fbe4602c161528e40454a071eb0c125,http://arxiv.org/abs/1007.0144v1 15901," This paper investigates design of noncooperative games from an optimization and control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of a fairly general class of noncooperative games satisfies certain global objectives such as welfare maximization or achieving a certain level of quality-of-service (QoS). The class of games considered provide a theoretical basis for decentralized resource allocation and control problems including network congestion control, wireless uplink power control, and optical power control. The game design problem is analyzed under different knowledge assumptions (full versus limited information) and design objectives (QoS versus utility maximization) for separable and non-separable utility functions. The ``price of anarchy'' is shown not to be an inherent feature of full-information games that incorporate pricing mechanisms. Moreover, a simple linear pricing is shown to be sufficient for design of Nash equilibrium according to a chosen global objective for a fairly general class of games. Stability properties of the game and pricing dynamics are studied under the assumption of time-scale separation and in two separate time-scales. Thus, sufficient conditions are derived, which allow the designer to place the Nash equilibrium solution or to guide the system trajectory to a desired region or point. The obtained results are illustrated with a number of examples. ",lacra pavel,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,"An Optimization and Control Theoretic Approach to Noncooperative Game Design",8fbe4602c161528e40454a071eb0c125,http://arxiv.org/abs/1007.0144v1 15902," This paper investigates design of noncooperative games from an optimization and control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of a fairly general class of noncooperative games satisfies certain global objectives such as welfare maximization or achieving a certain level of quality-of-service (QoS). The class of games considered provide a theoretical basis for decentralized resource allocation and control problems including network congestion control, wireless uplink power control, and optical power control. The game design problem is analyzed under different knowledge assumptions (full versus limited information) and design objectives (QoS versus utility maximization) for separable and non-separable utility functions. The ``price of anarchy'' is shown not to be an inherent feature of full-information games that incorporate pricing mechanisms. Moreover, a simple linear pricing is shown to be sufficient for design of Nash equilibrium according to a chosen global objective for a fairly general class of games. Stability properties of the game and pricing dynamics are studied under the assumption of time-scale separation and in two separate time-scales. Thus, sufficient conditions are derived, which allow the designer to place the Nash equilibrium solution or to guide the system trajectory to a desired region or point. The obtained results are illustrated with a number of examples. ",nem stefanovic,,2010.0,,arXiv,Alpcan2010,True,,arXiv,Not available,"An Optimization and Control Theoretic Approach to Noncooperative Game Design",8fbe4602c161528e40454a071eb0c125,http://arxiv.org/abs/1007.0144v1 15903," Games on recursive game graphs can be used to reason about the control flow of sequential programs with recursion. In games over recursive game graphs, the most natural notion of strategy is the modular strategy, i.e., a strategy that is local to a module and is oblivious to previous module invocations, and thus does not depend on the context of invocation. In this work, we study for the first time modular strategies with respect to winning conditions that can be expressed by a pushdown automaton. We show that such games are undecidable in general, and become decidable for visibly pushdown automata specifications. Our solution relies on a reduction to modular games with finite-state automata winning conditions, which are known in the literature. We carefully characterize the computational complexity of the considered decision problem. In particular, we show that modular games with a universal Buchi or co Buchi visibly pushdown winning condition are EXPTIME-complete, and when the winning condition is given by a CARET or NWTL temporal logic formula the problem is 2EXPTIME-complete, and it remains 2EXPTIME-hard even for simple fragments of these logics. As a further contribution, we present a different solution for modular games with finite-state automata winning condition that runs faster than known solutions for large specifications and many exits. ",ilaria crescenzo,,2014.0,10.4204/EPTCS.161.22,"EPTCS 161, 2014, pp. 260-274",Crescenzo2014,True,,arXiv,Not available,Visibly Pushdown Modular Games,68709e285073685d0da6800acea8e4db,http://arxiv.org/abs/1408.5969v1 15904," Games on recursive game graphs can be used to reason about the control flow of sequential programs with recursion. In games over recursive game graphs, the most natural notion of strategy is the modular strategy, i.e., a strategy that is local to a module and is oblivious to previous module invocations, and thus does not depend on the context of invocation. In this work, we study for the first time modular strategies with respect to winning conditions that can be expressed by a pushdown automaton. We show that such games are undecidable in general, and become decidable for visibly pushdown automata specifications. Our solution relies on a reduction to modular games with finite-state automata winning conditions, which are known in the literature. We carefully characterize the computational complexity of the considered decision problem. In particular, we show that modular games with a universal Buchi or co Buchi visibly pushdown winning condition are EXPTIME-complete, and when the winning condition is given by a CARET or NWTL temporal logic formula the problem is 2EXPTIME-complete, and it remains 2EXPTIME-hard even for simple fragments of these logics. As a further contribution, we present a different solution for modular games with finite-state automata winning condition that runs faster than known solutions for large specifications and many exits. ",salvatore torre,,2014.0,10.4204/EPTCS.161.22,"EPTCS 161, 2014, pp. 260-274",Crescenzo2014,True,,arXiv,Not available,Visibly Pushdown Modular Games,68709e285073685d0da6800acea8e4db,http://arxiv.org/abs/1408.5969v1 15905," Games on recursive game graphs can be used to reason about the control flow of sequential programs with recursion. In games over recursive game graphs, the most natural notion of strategy is the modular strategy, i.e., a strategy that is local to a module and is oblivious to previous module invocations, and thus does not depend on the context of invocation. In this work, we study for the first time modular strategies with respect to winning conditions that can be expressed by a pushdown automaton. We show that such games are undecidable in general, and become decidable for visibly pushdown automata specifications. Our solution relies on a reduction to modular games with finite-state automata winning conditions, which are known in the literature. We carefully characterize the computational complexity of the considered decision problem. In particular, we show that modular games with a universal Buchi or co Buchi visibly pushdown winning condition are EXPTIME-complete, and when the winning condition is given by a CARET or NWTL temporal logic formula the problem is 2EXPTIME-complete, and it remains 2EXPTIME-hard even for simple fragments of these logics. As a further contribution, we present a different solution for modular games with finite-state automata winning condition that runs faster than known solutions for large specifications and many exits. ",yaron velner,,2014.0,10.4204/EPTCS.161.22,"EPTCS 161, 2014, pp. 260-274",Crescenzo2014,True,,arXiv,Not available,Visibly Pushdown Modular Games,68709e285073685d0da6800acea8e4db,http://arxiv.org/abs/1408.5969v1 15906," This short paper concerns discretization schemes for representing and computing approximate Nash equilibria, with emphasis on graphical games, but briefly touching on normal-form and poly-matrix games. The main technical contribution is a representation theorem that informally states that to account for every exact Nash equilibrium using a nearby approximate Nash equilibrium on a grid over mixed strategies, a uniform discretization size linear on the inverse of the approximation quality and natural game-representation parameters suffices. For graphical games, under natural conditions, the discretization is logarithmic in the game-representation size, a substantial improvement over the linear dependency previously required. The paper has five other objectives: (1) given the venue, to highlight the important, but often ignored, role that work on constraint networks in AI has in simplifying the derivation and analysis of algorithms for computing approximate Nash equilibria; (2) to summarize the state-of-the-art on computing approximate Nash equilibria, with emphasis on relevance to graphical games; (3) to help clarify the distinction between sparse-discretization and sparse-support techniques; (4) to illustrate and advocate for the deliberate mathematical simplicity of the formal proof of the representation theorem; and (5) to list and discuss important open problems, emphasizing graphical-game generalizations, which the AI community is most suitable to solve. ",luis ortiz,,2014.0,,arXiv,Ortiz2014,True,,arXiv,Not available,On Sparse Discretization for Graphical Games,16fd8a53335c0208f4e3c3adb455796e,http://arxiv.org/abs/1411.3320v1 15907," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",jun wang,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 15908," Evolutionary game theory has become one of the most diverse and far reaching theories in biology. Applications of this theory range from cell dynamics to social evolution. However, many applications make it clear that inherent non-linearities of natural systems need to be taken into account. One way of introducing such non-linearities into evolutionary games is by the inclusion of multiple players. An example is of social dilemmas, where group benefits could e.g.\ increase less than linear with the number of cooperators. Such multiplayer games can be introduced in all the fields where evolutionary game theory is already well established. However, the inclusion of non-linearities can help to advance the analysis of systems which are known to be complex, e.g. in the case of non-Mendelian inheritance. We review the diachronic theory and applications of multiplayer evolutionary games and present the current state of the field. Our aim is a summary of the theoretical results from well-mixed populations in infinite as well as finite populations. We also discuss examples from three fields where the theory has been successfully applied, ecology, social sciences and population genetics. In closing, we probe certain future directions which can be explored using the complexity of multiplayer games while preserving the promise of simplicity of evolutionary games. ",chaitanya gokhale,,2014.0,10.1007/s13235-014-0106-2,"Dynamic Games and Applications, 2014, 10.1007/s13235-014-0106-2",Gokhale2014,True,,arXiv,Not available,Evolutionary Multiplayer Games,abdd46e34d75b2fe77005e7a7a1f04d6,http://arxiv.org/abs/1404.1421v1 15909," Evolutionary game theory has become one of the most diverse and far reaching theories in biology. Applications of this theory range from cell dynamics to social evolution. However, many applications make it clear that inherent non-linearities of natural systems need to be taken into account. One way of introducing such non-linearities into evolutionary games is by the inclusion of multiple players. An example is of social dilemmas, where group benefits could e.g.\ increase less than linear with the number of cooperators. Such multiplayer games can be introduced in all the fields where evolutionary game theory is already well established. However, the inclusion of non-linearities can help to advance the analysis of systems which are known to be complex, e.g. in the case of non-Mendelian inheritance. We review the diachronic theory and applications of multiplayer evolutionary games and present the current state of the field. Our aim is a summary of the theoretical results from well-mixed populations in infinite as well as finite populations. We also discuss examples from three fields where the theory has been successfully applied, ecology, social sciences and population genetics. In closing, we probe certain future directions which can be explored using the complexity of multiplayer games while preserving the promise of simplicity of evolutionary games. ",arne traulsen,,2014.0,10.1007/s13235-014-0106-2,"Dynamic Games and Applications, 2014, 10.1007/s13235-014-0106-2",Gokhale2014,True,,arXiv,Not available,Evolutionary Multiplayer Games,abdd46e34d75b2fe77005e7a7a1f04d6,http://arxiv.org/abs/1404.1421v1 15910," Using coalgebraic methods, we extend Conway's theory of games to possibly non-terminating, i.e. non-wellfounded games (hypergames). We take the view that a play which goes on forever is a draw, and hence rather than focussing on winning strategies, we focus on non-losing strategies. Hypergames are a fruitful metaphor for non-terminating processes, Conway's sum being similar to shuffling. We develop a theory of hypergames, which extends in a non-trivial way Conway's theory; in particular, we generalize Conway's results on game determinacy and characterization of strategies. Hypergames have a rather interesting theory, already in the case of impartial hypergames, for which we give a compositional semantics, in terms of a generalized Grundy-Sprague function and a system of generalized Nim games. Equivalences and congruences on games and hypergames are discussed. We indicate a number of intriguing directions for future work. We briefly compare hypergames with other notions of games used in computer science. ",furio honsell,,2011.0,10.2168/LMCS-7(3:8)2011,"Logical Methods in Computer Science, Volume 7, Issue 3 (September 1, 2011) lmcs:703",Honsell2011,True,,arXiv,Not available,"Conway games, algebraically and coalgebraically",6e6a0e4b2d5f86228f341834ea4095cd,http://arxiv.org/abs/1107.1351v3 15911," Using coalgebraic methods, we extend Conway's theory of games to possibly non-terminating, i.e. non-wellfounded games (hypergames). We take the view that a play which goes on forever is a draw, and hence rather than focussing on winning strategies, we focus on non-losing strategies. Hypergames are a fruitful metaphor for non-terminating processes, Conway's sum being similar to shuffling. We develop a theory of hypergames, which extends in a non-trivial way Conway's theory; in particular, we generalize Conway's results on game determinacy and characterization of strategies. Hypergames have a rather interesting theory, already in the case of impartial hypergames, for which we give a compositional semantics, in terms of a generalized Grundy-Sprague function and a system of generalized Nim games. Equivalences and congruences on games and hypergames are discussed. We indicate a number of intriguing directions for future work. We briefly compare hypergames with other notions of games used in computer science. ",marina lenisa,,2011.0,10.2168/LMCS-7(3:8)2011,"Logical Methods in Computer Science, Volume 7, Issue 3 (September 1, 2011) lmcs:703",Honsell2011,True,,arXiv,Not available,"Conway games, algebraically and coalgebraically",6e6a0e4b2d5f86228f341834ea4095cd,http://arxiv.org/abs/1107.1351v3 15912," A new mathematical model for evolutionary games on graphs is proposed to extend the classical replicator equation to finite populations of players organized on a network with generic topology. Classical results from game theory, evolutionary game theory and graph theory are used. More specifically, each player is placed in a vertex of the graph and he is seen as an infinite population of replicators which replicate within the vertex. At each time instant, a game is played by two replicators belonging to different connected vertices, and the outcome of the game influences their ability of producing offspring. Then, the behavior of a vertex player is determined by the distribution of strategies used by the internal replicators. Under suitable hypotheses, the proposed model is equivalent to the classical replicator equation. Extended simulations are performed to show the dynamical behavior of the solutions and the potentialities of the developed model. ",dario madeo,,2013.0,,arXiv,Madeo2013,True,,arXiv,Not available,"A New Mathematical Model for Evolutionary Games on Finite Networks of Players",0554cf86a14d04f4d4ba5d942ca0b6d5,http://arxiv.org/abs/1307.1670v1 15913," A new mathematical model for evolutionary games on graphs is proposed to extend the classical replicator equation to finite populations of players organized on a network with generic topology. Classical results from game theory, evolutionary game theory and graph theory are used. More specifically, each player is placed in a vertex of the graph and he is seen as an infinite population of replicators which replicate within the vertex. At each time instant, a game is played by two replicators belonging to different connected vertices, and the outcome of the game influences their ability of producing offspring. Then, the behavior of a vertex player is determined by the distribution of strategies used by the internal replicators. Under suitable hypotheses, the proposed model is equivalent to the classical replicator equation. Extended simulations are performed to show the dynamical behavior of the solutions and the potentialities of the developed model. ",chiara mocenni,,2013.0,,arXiv,Madeo2013,True,,arXiv,Not available,"A New Mathematical Model for Evolutionary Games on Finite Networks of Players",0554cf86a14d04f4d4ba5d942ca0b6d5,http://arxiv.org/abs/1307.1670v1 15914," Game theory has been widely applied to many areas including economics, biology and social sciences. However, it is still challenging to quantify the global stability and global dynamics of the game theory. We developed a landscape and flux framework to quantify the global stability and global dynamics of the game theory. As an example, we investigated the models of three-strategy games: a special replicator-mutator game, the repeated prison dilemma model. In this model, one stable state, two stable states and limit cycle can emerge under different parameters. The repeated Prisoner's Dilemma system has Hopf bifurcation transitions from one stable state to limit cycle state, and then to another one stable state or two stable states, or vice versa. We explored the global stability of the repeated Prisoner's Dilemma system and the kinetic paths between the basins of attractor. The paths are irreversible due to the non-zero flux. One can explain the game for $Peace$ and $War$. ",li xu,,2017.0,10.1371/journal.pone.0201130,arXiv,Xu2017,True,,arXiv,Not available,"Landscape and flux for quantifying global stability and dynamics of game theory",29c416df597b8a347fb868b20a8095cb,http://arxiv.org/abs/1707.00001v1 15915," Game theory has been widely applied to many areas including economics, biology and social sciences. However, it is still challenging to quantify the global stability and global dynamics of the game theory. We developed a landscape and flux framework to quantify the global stability and global dynamics of the game theory. As an example, we investigated the models of three-strategy games: a special replicator-mutator game, the repeated prison dilemma model. In this model, one stable state, two stable states and limit cycle can emerge under different parameters. The repeated Prisoner's Dilemma system has Hopf bifurcation transitions from one stable state to limit cycle state, and then to another one stable state or two stable states, or vice versa. We explored the global stability of the repeated Prisoner's Dilemma system and the kinetic paths between the basins of attractor. The paths are irreversible due to the non-zero flux. One can explain the game for $Peace$ and $War$. ",jin wang,,2017.0,10.1371/journal.pone.0201130,arXiv,Xu2017,True,,arXiv,Not available,"Landscape and flux for quantifying global stability and dynamics of game theory",29c416df597b8a347fb868b20a8095cb,http://arxiv.org/abs/1707.00001v1 15916," Auctions have been employed as an effective framework for the management and the assignment of tasks in mobile crowdsensing (MCS). In auctions terminology, the clearance rate (CR) refers to the percentage of items that are sold over the duration of the auction. This research is concerned with maximizing the CR of reputation-aware (RA) auctions in centralized, participatory MCS systems. Recent techniques in the literature had focused on several challenges including untruthful bidding and malicious information that might be sent by the participants. Less attention has been given, though, to the number of completed tasks in such systems, even though it has a tangible impact on the satisfaction of service demanders. Towards the goal of maximizing CR in MCS systems, we propose two new formulations for the bidding procedure that is a part of the task allocation strategy. Simulations were carried out to evaluate the proposed methods and their impact on the user utility, under varying number of auctions, tasks, and participants. We demonstrate the effectiveness of the suggested methods through consistent and considerable increases (three times increase, in some cases) in the CR compared to the state-of-the-art. ",maggie gendy,,2018.0,,arXiv,Gendy2018,True,,arXiv,Not available,"Maximizing Clearance Rate of Reputation-aware Auctions in Mobile Crowdsensing",b90d133aa9c76613d55b5f6a44c87feb,http://arxiv.org/abs/1810.05774v1 15917," Auctions have been employed as an effective framework for the management and the assignment of tasks in mobile crowdsensing (MCS). In auctions terminology, the clearance rate (CR) refers to the percentage of items that are sold over the duration of the auction. This research is concerned with maximizing the CR of reputation-aware (RA) auctions in centralized, participatory MCS systems. Recent techniques in the literature had focused on several challenges including untruthful bidding and malicious information that might be sent by the participants. Less attention has been given, though, to the number of completed tasks in such systems, even though it has a tangible impact on the satisfaction of service demanders. Towards the goal of maximizing CR in MCS systems, we propose two new formulations for the bidding procedure that is a part of the task allocation strategy. Simulations were carried out to evaluate the proposed methods and their impact on the user utility, under varying number of auctions, tasks, and participants. We demonstrate the effectiveness of the suggested methods through consistent and considerable increases (three times increase, in some cases) in the CR compared to the state-of-the-art. ",ahmad al-kabbany,,2018.0,,arXiv,Gendy2018,True,,arXiv,Not available,"Maximizing Clearance Rate of Reputation-aware Auctions in Mobile Crowdsensing",b90d133aa9c76613d55b5f6a44c87feb,http://arxiv.org/abs/1810.05774v1 15918," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",ingemar cox,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 15919," Auctions have been employed as an effective framework for the management and the assignment of tasks in mobile crowdsensing (MCS). In auctions terminology, the clearance rate (CR) refers to the percentage of items that are sold over the duration of the auction. This research is concerned with maximizing the CR of reputation-aware (RA) auctions in centralized, participatory MCS systems. Recent techniques in the literature had focused on several challenges including untruthful bidding and malicious information that might be sent by the participants. Less attention has been given, though, to the number of completed tasks in such systems, even though it has a tangible impact on the satisfaction of service demanders. Towards the goal of maximizing CR in MCS systems, we propose two new formulations for the bidding procedure that is a part of the task allocation strategy. Simulations were carried out to evaluate the proposed methods and their impact on the user utility, under varying number of auctions, tasks, and participants. We demonstrate the effectiveness of the suggested methods through consistent and considerable increases (three times increase, in some cases) in the CR compared to the state-of-the-art. ",ehab badran,,2018.0,,arXiv,Gendy2018,True,,arXiv,Not available,"Maximizing Clearance Rate of Reputation-aware Auctions in Mobile Crowdsensing",b90d133aa9c76613d55b5f6a44c87feb,http://arxiv.org/abs/1810.05774v1 15920," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",zhili chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15921," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",xuemei wei,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15922," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",hong zhong,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15923," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",jie cui,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15924," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",yan xu,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15925," Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a privacy-preserving and socially efficient double spectrum auction design, SDSA. Specifically, by combining three security techniques: homomorphic encryption, secret sharing and garbled circuits, we design a secure two-party protocol computing a socially efficient double spectrum auction, TDSA, without leaking any information about sellers' requests or buyers' bids beyond the auction outcome. We give the formal security definition in our context, and theoretically prove the security that our design achieves. Experimental results show that our design is also efficient in performance, even for large-scale double spectrum auctions. ",shun zhang,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,"Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter",a837a07bb8edddcdf4c1088933d70540,http://arxiv.org/abs/1810.07880v1 15926," Auction is widely regarded as an effective way in dynamic spectrum redistribution. Recently, considerable research efforts have been devoted to designing privacy-preserving spectrum auctions in a variety of auction settings. However, none of existing work has addressed the privacy issue in the most generic scenario, double spectrum auctions where each seller sells multiple channels and each buyer buys multiple channels. To fill this gap, in this paper we propose PP-MCSA, a Privacy Preserving mechanism for Multi-Channel double Spectrum Auctions. Technically, by leveraging garbled circuits, we manage to protect the privacy of both sellers' requests and buyers' bids in multi-channel double spectrum auctions. As far as we know, PP-MCSA is the first privacy-preserving solution for multi-channel double spectrum auctions. We further theoretically demonstrate the privacy guarantee of PP-MCSA, and extensively evaluate its performance via experiments. Experimental results show that PP-MCSA incurs only moderate communication and computation overhead. ",zhili chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction,309b12b4004214677d9cb1579bd73b79,http://arxiv.org/abs/1810.08451v1 15927," Auction is widely regarded as an effective way in dynamic spectrum redistribution. Recently, considerable research efforts have been devoted to designing privacy-preserving spectrum auctions in a variety of auction settings. However, none of existing work has addressed the privacy issue in the most generic scenario, double spectrum auctions where each seller sells multiple channels and each buyer buys multiple channels. To fill this gap, in this paper we propose PP-MCSA, a Privacy Preserving mechanism for Multi-Channel double Spectrum Auctions. Technically, by leveraging garbled circuits, we manage to protect the privacy of both sellers' requests and buyers' bids in multi-channel double spectrum auctions. As far as we know, PP-MCSA is the first privacy-preserving solution for multi-channel double spectrum auctions. We further theoretically demonstrate the privacy guarantee of PP-MCSA, and extensively evaluate its performance via experiments. Experimental results show that PP-MCSA incurs only moderate communication and computation overhead. ",sheng chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction,309b12b4004214677d9cb1579bd73b79,http://arxiv.org/abs/1810.08451v1 15928," Auction is widely regarded as an effective way in dynamic spectrum redistribution. Recently, considerable research efforts have been devoted to designing privacy-preserving spectrum auctions in a variety of auction settings. However, none of existing work has addressed the privacy issue in the most generic scenario, double spectrum auctions where each seller sells multiple channels and each buyer buys multiple channels. To fill this gap, in this paper we propose PP-MCSA, a Privacy Preserving mechanism for Multi-Channel double Spectrum Auctions. Technically, by leveraging garbled circuits, we manage to protect the privacy of both sellers' requests and buyers' bids in multi-channel double spectrum auctions. As far as we know, PP-MCSA is the first privacy-preserving solution for multi-channel double spectrum auctions. We further theoretically demonstrate the privacy guarantee of PP-MCSA, and extensively evaluate its performance via experiments. Experimental results show that PP-MCSA incurs only moderate communication and computation overhead. ",hong zhong,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction,309b12b4004214677d9cb1579bd73b79,http://arxiv.org/abs/1810.08451v1 15929," In sponsored search, advertisement (abbreviated ad) slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords. In theory, auction mechanisms have many desirable economic properties. However, keyword auctions have a number of limitations including: the uncertainty in payment prices for advertisers; the volatility in the search engine's revenue; and the weak loyalty between advertiser and search engine. In this paper we propose a special ad option that alleviates these problems. In our proposal, an advertiser can purchase an option from a search engine in advance by paying an upfront fee, known as the option price. He then has the right, but no obligation, to purchase among the pre-specified set of keywords at the fixed cost-per-clicks (CPCs) for a specified number of clicks in a specified period of time. The proposed option is closely related to a special exotic option in finance that contains multiple underlying assets (multi-keyword) and is also multi-exercisable (multi-click). This novel structure has many benefits: advertisers can have reduced uncertainty in advertising; the search engine can improve the advertisers' loyalty as well as obtain a stable and increased expected revenue over time. Since the proposed ad option can be implemented in conjunction with the existing keyword auctions, the option price and corresponding fixed CPCs must be set such that there is no arbitrage between the two markets. Option pricing methods are discussed and our experimental results validate the development. Compared to keyword auctions, a search engine can have an increased expected revenue by selling an ad option. ",mohan kankanhalli,,2013.0,,arXiv,Chen2013,True,,arXiv,Not available,"Multi-keyword multi-click advertisement option contracts for sponsored search",e10e253cc703b8179706e5bca1b72120,http://arxiv.org/abs/1307.4980v7 15930," Auction is widely regarded as an effective way in dynamic spectrum redistribution. Recently, considerable research efforts have been devoted to designing privacy-preserving spectrum auctions in a variety of auction settings. However, none of existing work has addressed the privacy issue in the most generic scenario, double spectrum auctions where each seller sells multiple channels and each buyer buys multiple channels. To fill this gap, in this paper we propose PP-MCSA, a Privacy Preserving mechanism for Multi-Channel double Spectrum Auctions. Technically, by leveraging garbled circuits, we manage to protect the privacy of both sellers' requests and buyers' bids in multi-channel double spectrum auctions. As far as we know, PP-MCSA is the first privacy-preserving solution for multi-channel double spectrum auctions. We further theoretically demonstrate the privacy guarantee of PP-MCSA, and extensively evaluate its performance via experiments. Experimental results show that PP-MCSA incurs only moderate communication and computation overhead. ",lin chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction,309b12b4004214677d9cb1579bd73b79,http://arxiv.org/abs/1810.08451v1 15931," Auction is widely regarded as an effective way in dynamic spectrum redistribution. Recently, considerable research efforts have been devoted to designing privacy-preserving spectrum auctions in a variety of auction settings. However, none of existing work has addressed the privacy issue in the most generic scenario, double spectrum auctions where each seller sells multiple channels and each buyer buys multiple channels. To fill this gap, in this paper we propose PP-MCSA, a Privacy Preserving mechanism for Multi-Channel double Spectrum Auctions. Technically, by leveraging garbled circuits, we manage to protect the privacy of both sellers' requests and buyers' bids in multi-channel double spectrum auctions. As far as we know, PP-MCSA is the first privacy-preserving solution for multi-channel double spectrum auctions. We further theoretically demonstrate the privacy guarantee of PP-MCSA, and extensively evaluate its performance via experiments. Experimental results show that PP-MCSA incurs only moderate communication and computation overhead. ",miaomiao tian,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction,309b12b4004214677d9cb1579bd73b79,http://arxiv.org/abs/1810.08451v1 15932," The electricity consumption behavior in Brazil has been extensively investigated over the years due to financial and social problems. In this context, it is important to simulate the energy prices of the energy efficiency auctions in the Brazilian regulated environment. This paper presents an approach to generate samples of auction energy prices in energy efficiency market, using Markov chain Monte Carlo method, through the Metropolis-Hastings algorithm. The obtained results show that this approach can be used to generate energy price samples. ",javier gonzales,,2018.0,,arXiv,Gonzales2018,True,,arXiv,Not available,Simulation of the energy efficiency auction prices in Brazil,f770d0bec24abda896238ce6986db74e,http://arxiv.org/abs/1811.04144v1 15933," The electricity consumption behavior in Brazil has been extensively investigated over the years due to financial and social problems. In this context, it is important to simulate the energy prices of the energy efficiency auctions in the Brazilian regulated environment. This paper presents an approach to generate samples of auction energy prices in energy efficiency market, using Markov chain Monte Carlo method, through the Metropolis-Hastings algorithm. The obtained results show that this approach can be used to generate energy price samples. ",rodrigo calili,,2018.0,,arXiv,Gonzales2018,True,,arXiv,Not available,Simulation of the energy efficiency auction prices in Brazil,f770d0bec24abda896238ce6986db74e,http://arxiv.org/abs/1811.04144v1 15934," The electricity consumption behavior in Brazil has been extensively investigated over the years due to financial and social problems. In this context, it is important to simulate the energy prices of the energy efficiency auctions in the Brazilian regulated environment. This paper presents an approach to generate samples of auction energy prices in energy efficiency market, using Markov chain Monte Carlo method, through the Metropolis-Hastings algorithm. The obtained results show that this approach can be used to generate energy price samples. ",reinaldo souza,,2018.0,,arXiv,Gonzales2018,True,,arXiv,Not available,Simulation of the energy efficiency auction prices in Brazil,f770d0bec24abda896238ce6986db74e,http://arxiv.org/abs/1811.04144v1 15935," The electricity consumption behavior in Brazil has been extensively investigated over the years due to financial and social problems. In this context, it is important to simulate the energy prices of the energy efficiency auctions in the Brazilian regulated environment. This paper presents an approach to generate samples of auction energy prices in energy efficiency market, using Markov chain Monte Carlo method, through the Metropolis-Hastings algorithm. The obtained results show that this approach can be used to generate energy price samples. ",felipe silva,,2018.0,,arXiv,Gonzales2018,True,,arXiv,Not available,Simulation of the energy efficiency auction prices in Brazil,f770d0bec24abda896238ce6986db74e,http://arxiv.org/abs/1811.04144v1 15936," In this paper, we assess the applicability of auctions based on the Vickrey second price model for allocating wireless spectrum in developing countries. We first provide an overview of auction models for allocating resources. We then examine the experience of auctioning spectrum in different countries. Based on this examination, we posit some axioms that seem to have to be satisfied when allocating spectrum in most developing countries. In light of these axioms, we provide a critical evaluation of using Vickrey second- price auctions to allocate spectrum in developing countries. We suggest the use of a new auction mechanism, the Vickrey ""share auction"" which will satisfy many of these axioms. ",g. anandalingam,,2001.0,,arXiv,Anandalingam2001,True,,arXiv,Not available,"On the Use of Vickrey Auctions for Spectrum Allocation in Developing Countries",a92fd31cffce4d547de8754e08be9b04,http://arxiv.org/abs/cs/0109065v1 15937," Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid $k$ times, called the $k$-frequent bidder, up to the $t$-th bidding progresses as $n_k(t)\sim tk^{-2.4}$. The successfully transmitted bidding rate by the $k$-frequent bidder is obtained as $q_k(t) \sim k^{-1.4}$, independent of $t$ for large $t$. This theoretical prediction is in agreement with empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction. ",i. yang,,2005.0,10.1103/PhysRevE.73.067101,arXiv,Yang2005,True,,arXiv,Not available,"Bidding process in online auctions and winning strategy:rate equation approach",8bc095941937ea6f91cac24de64d16b8,http://arxiv.org/abs/physics/0511073v1 15938," Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid $k$ times, called the $k$-frequent bidder, up to the $t$-th bidding progresses as $n_k(t)\sim tk^{-2.4}$. The successfully transmitted bidding rate by the $k$-frequent bidder is obtained as $q_k(t) \sim k^{-1.4}$, independent of $t$ for large $t$. This theoretical prediction is in agreement with empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction. ",b. kahng,,2005.0,10.1103/PhysRevE.73.067101,arXiv,Yang2005,True,,arXiv,Not available,"Bidding process in online auctions and winning strategy:rate equation approach",8bc095941937ea6f91cac24de64d16b8,http://arxiv.org/abs/physics/0511073v1 15939," We show that the cost of market orders and the profit of infinitesimal market-making or -taking strategies can be expressed in terms of directly observable quantities, namely the spread and the lag-dependent impact function. Imposing that any market taking or liquidity providing strategies is at best marginally profitable, we obtain a linear relation between the bid-ask spread and the instantaneous impact of market orders, in good agreement with our empirical observations on electronic markets. We then use this relation to justify a strong, and hitherto unnoticed, empirical correlation between the spread and the volatility_per trade_, with R^2s exceeding 0.9. This correlation suggests both that the main determinant of the bid-ask spread is adverse selection, and that most of the volatilitycomes from trade impact. We argue that the role of the time-horizon appearing in the definition of costs is crucial and that long-range correlations in the order flow, overlooked in previous studies, must be carefully factored in. We find that the spread is significantly larger on the nyse, a liquid market with specialists, where monopoly rents appear to be present. ",matthieu wyart,,2006.0,,arXiv,Wyart2006,True,,arXiv,Not available,"Relation between Bid-Ask Spread, Impact and Volatility in Double Auction Markets",1d063f8608d86c194292a3d1e36d572a,http://arxiv.org/abs/physics/0603084v3 15940," We suggest a general method for inferring players' values from their actions in repeated games. The method extends and improves upon the recent suggestion of (Nekipelov et al., EC 2015) and is based on the assumption that players are more likely to exhibit sequences of actions that have lower regret. We evaluate this ""quantal regret"" method on two different datasets from experiments of repeated games with controlled player values: those of (Selten and Chmura, AER 2008) on a variety of two-player 2x2 games and our own experiment on ad-auctions (Noti et al., WWW 2014). We find that the quantal regret method is consistently and significantly more precise than either ""classic"" econometric methods that are based on Nash equilibria, or the ""min-regret"" method of (Nekipelov et al., EC 2015). ",noam nisan,,2017.0,,arXiv,Nisan2017,True,,arXiv,Not available,"A ""Quantal Regret"" Method for Structural Econometrics in Repeated Games",b1355190de9960b920279c5745050f0e,http://arxiv.org/abs/1702.04254v2 15941," We show that the cost of market orders and the profit of infinitesimal market-making or -taking strategies can be expressed in terms of directly observable quantities, namely the spread and the lag-dependent impact function. Imposing that any market taking or liquidity providing strategies is at best marginally profitable, we obtain a linear relation between the bid-ask spread and the instantaneous impact of market orders, in good agreement with our empirical observations on electronic markets. We then use this relation to justify a strong, and hitherto unnoticed, empirical correlation between the spread and the volatility_per trade_, with R^2s exceeding 0.9. This correlation suggests both that the main determinant of the bid-ask spread is adverse selection, and that most of the volatilitycomes from trade impact. We argue that the role of the time-horizon appearing in the definition of costs is crucial and that long-range correlations in the order flow, overlooked in previous studies, must be carefully factored in. We find that the spread is significantly larger on the nyse, a liquid market with specialists, where monopoly rents appear to be present. ",jean-philippe bouchaud,,2006.0,,arXiv,Wyart2006,True,,arXiv,Not available,"Relation between Bid-Ask Spread, Impact and Volatility in Double Auction Markets",1d063f8608d86c194292a3d1e36d572a,http://arxiv.org/abs/physics/0603084v3 15942," We show that the cost of market orders and the profit of infinitesimal market-making or -taking strategies can be expressed in terms of directly observable quantities, namely the spread and the lag-dependent impact function. Imposing that any market taking or liquidity providing strategies is at best marginally profitable, we obtain a linear relation between the bid-ask spread and the instantaneous impact of market orders, in good agreement with our empirical observations on electronic markets. We then use this relation to justify a strong, and hitherto unnoticed, empirical correlation between the spread and the volatility_per trade_, with R^2s exceeding 0.9. This correlation suggests both that the main determinant of the bid-ask spread is adverse selection, and that most of the volatilitycomes from trade impact. We argue that the role of the time-horizon appearing in the definition of costs is crucial and that long-range correlations in the order flow, overlooked in previous studies, must be carefully factored in. We find that the spread is significantly larger on the nyse, a liquid market with specialists, where monopoly rents appear to be present. ",julien kockelkoren,,2006.0,,arXiv,Wyart2006,True,,arXiv,Not available,"Relation between Bid-Ask Spread, Impact and Volatility in Double Auction Markets",1d063f8608d86c194292a3d1e36d572a,http://arxiv.org/abs/physics/0603084v3 15943," We show that the cost of market orders and the profit of infinitesimal market-making or -taking strategies can be expressed in terms of directly observable quantities, namely the spread and the lag-dependent impact function. Imposing that any market taking or liquidity providing strategies is at best marginally profitable, we obtain a linear relation between the bid-ask spread and the instantaneous impact of market orders, in good agreement with our empirical observations on electronic markets. We then use this relation to justify a strong, and hitherto unnoticed, empirical correlation between the spread and the volatility_per trade_, with R^2s exceeding 0.9. This correlation suggests both that the main determinant of the bid-ask spread is adverse selection, and that most of the volatilitycomes from trade impact. We argue that the role of the time-horizon appearing in the definition of costs is crucial and that long-range correlations in the order flow, overlooked in previous studies, must be carefully factored in. We find that the spread is significantly larger on the nyse, a liquid market with specialists, where monopoly rents appear to be present. ",marc potters,,2006.0,,arXiv,Wyart2006,True,,arXiv,Not available,"Relation between Bid-Ask Spread, Impact and Volatility in Double Auction Markets",1d063f8608d86c194292a3d1e36d572a,http://arxiv.org/abs/physics/0603084v3 15944," We show that the cost of market orders and the profit of infinitesimal market-making or -taking strategies can be expressed in terms of directly observable quantities, namely the spread and the lag-dependent impact function. Imposing that any market taking or liquidity providing strategies is at best marginally profitable, we obtain a linear relation between the bid-ask spread and the instantaneous impact of market orders, in good agreement with our empirical observations on electronic markets. We then use this relation to justify a strong, and hitherto unnoticed, empirical correlation between the spread and the volatility_per trade_, with R^2s exceeding 0.9. This correlation suggests both that the main determinant of the bid-ask spread is adverse selection, and that most of the volatilitycomes from trade impact. We argue that the role of the time-horizon appearing in the definition of costs is crucial and that long-range correlations in the order flow, overlooked in previous studies, must be carefully factored in. We find that the spread is significantly larger on the nyse, a liquid market with specialists, where monopoly rents appear to be present. ",michele vettorazzo,,2006.0,,arXiv,Wyart2006,True,,arXiv,Not available,"Relation between Bid-Ask Spread, Impact and Volatility in Double Auction Markets",1d063f8608d86c194292a3d1e36d572a,http://arxiv.org/abs/physics/0603084v3 15945," This paper describes an optimization model for setting bid levels for certain types of advertisements on web pages. This model is non-convex, but we are able to obtain optimal or near-optimal solutions rapidly using branch and cut open-source software. The financial benefits obtained using the prototype system have been substantial. ",ralphe wiggins,,2007.0,,arXiv,Wiggins2007,True,,arXiv,Not available,"Bid Optimization for Internet Graphical Ad Auction Systems via Special Ordered Sets",69e153af3c0823074e10222edd20443d,http://arxiv.org/abs/0706.3865v1 15946," This paper describes an optimization model for setting bid levels for certain types of advertisements on web pages. This model is non-convex, but we are able to obtain optimal or near-optimal solutions rapidly using branch and cut open-source software. The financial benefits obtained using the prototype system have been substantial. ",john tomlin,,2007.0,,arXiv,Wiggins2007,True,,arXiv,Not available,"Bid Optimization for Internet Graphical Ad Auction Systems via Special Ordered Sets",69e153af3c0823074e10222edd20443d,http://arxiv.org/abs/0706.3865v1 15947," We propose a distance between two realizations of a random process where for each realization only sparse and irregularly spaced measurements with additional measurement errors are available. Such data occur commonly in longitudinal studies and online trading data. A distance measure then makes it possible to apply distance-based analysis such as classification, clustering and multidimensional scaling for irregularly sampled longitudinal data. Once a suitable distance measure for sparsely sampled longitudinal trajectories has been found, we apply distance-based clustering methods to eBay online auction data. We identify six distinct clusters of bidding patterns. Each of these bidding patterns is found to be associated with a specific chance to obtain the auctioned item at a reasonable price. ",jie peng,,2008.0,10.1214/08-AOAS172,"Annals of Applied Statistics 2008, Vol. 2, No. 3, 1056-1077",Peng2008,True,,arXiv,Not available,"Distance-based clustering of sparsely observed stochastic processes, with applications to online auctions",ca540008ac499853788bf72db4220c43,http://arxiv.org/abs/0805.0463v2 15948," We propose a distance between two realizations of a random process where for each realization only sparse and irregularly spaced measurements with additional measurement errors are available. Such data occur commonly in longitudinal studies and online trading data. A distance measure then makes it possible to apply distance-based analysis such as classification, clustering and multidimensional scaling for irregularly sampled longitudinal data. Once a suitable distance measure for sparsely sampled longitudinal trajectories has been found, we apply distance-based clustering methods to eBay online auction data. We identify six distinct clusters of bidding patterns. Each of these bidding patterns is found to be associated with a specific chance to obtain the auctioned item at a reasonable price. ",hans-georg muller,,2008.0,10.1214/08-AOAS172,"Annals of Applied Statistics 2008, Vol. 2, No. 3, 1056-1077",Peng2008,True,,arXiv,Not available,"Distance-based clustering of sparsely observed stochastic processes, with applications to online auctions",ca540008ac499853788bf72db4220c43,http://arxiv.org/abs/0805.0463v2 15949," Real world markets display power-law features in variables such as price fluctuations in stocks. To further understand market behavior, we have conducted a series of market experiments on our web-based prediction market platform which allows us to reconstruct transaction networks among traders. From these networks, we are able to record the degree of a trader, the size of a community of traders, the transaction time interval among traders and other variables that are of interest. The distributions of all these variables show power-law behavior. On the other hand, agent-based models have been proposed to study the properties of real financial markets. We here study the statistical properties of these agent-based models and compare them with the results from our web-based market experiments. In this work, three agent-based models are studied, namely, zero-intelligence (ZI), zero-intelligence-plus (ZIP) and Gjerstad-Dickhaut (GD). Computer simulations of variables based on these three agent-based models were carried out. We found that although being the most naive agent-based model, ZI indeed best describes the properties observed in real markets. Our study suggests that the basic ingredient to produce the observed properties from real world markets could in fact be the result of a continuously evolving dynamical system with basic features similar to the ZI model. ",jie-jun tseng,,2010.0,10.1016/j.physa.2009.12.034,"Physica A 389, 1699 - 1707 (2010)",Tseng2010,True,,arXiv,Not available,"Statistical properties of agent-based models in markets with continuous double auction mechanism",d7b57e310f52dfcff66c6f21a7964958,http://arxiv.org/abs/1002.0917v1 15950," Real world markets display power-law features in variables such as price fluctuations in stocks. To further understand market behavior, we have conducted a series of market experiments on our web-based prediction market platform which allows us to reconstruct transaction networks among traders. From these networks, we are able to record the degree of a trader, the size of a community of traders, the transaction time interval among traders and other variables that are of interest. The distributions of all these variables show power-law behavior. On the other hand, agent-based models have been proposed to study the properties of real financial markets. We here study the statistical properties of these agent-based models and compare them with the results from our web-based market experiments. In this work, three agent-based models are studied, namely, zero-intelligence (ZI), zero-intelligence-plus (ZIP) and Gjerstad-Dickhaut (GD). Computer simulations of variables based on these three agent-based models were carried out. We found that although being the most naive agent-based model, ZI indeed best describes the properties observed in real markets. Our study suggests that the basic ingredient to produce the observed properties from real world markets could in fact be the result of a continuously evolving dynamical system with basic features similar to the ZI model. ",chih-hao lin,,2010.0,10.1016/j.physa.2009.12.034,"Physica A 389, 1699 - 1707 (2010)",Tseng2010,True,,arXiv,Not available,"Statistical properties of agent-based models in markets with continuous double auction mechanism",d7b57e310f52dfcff66c6f21a7964958,http://arxiv.org/abs/1002.0917v1 15951," We suggest a general method for inferring players' values from their actions in repeated games. The method extends and improves upon the recent suggestion of (Nekipelov et al., EC 2015) and is based on the assumption that players are more likely to exhibit sequences of actions that have lower regret. We evaluate this ""quantal regret"" method on two different datasets from experiments of repeated games with controlled player values: those of (Selten and Chmura, AER 2008) on a variety of two-player 2x2 games and our own experiment on ad-auctions (Noti et al., WWW 2014). We find that the quantal regret method is consistently and significantly more precise than either ""classic"" econometric methods that are based on Nash equilibria, or the ""min-regret"" method of (Nekipelov et al., EC 2015). ",gali noti,,2017.0,,arXiv,Nisan2017,True,,arXiv,Not available,"A ""Quantal Regret"" Method for Structural Econometrics in Repeated Games",b1355190de9960b920279c5745050f0e,http://arxiv.org/abs/1702.04254v2 15952," Real world markets display power-law features in variables such as price fluctuations in stocks. To further understand market behavior, we have conducted a series of market experiments on our web-based prediction market platform which allows us to reconstruct transaction networks among traders. From these networks, we are able to record the degree of a trader, the size of a community of traders, the transaction time interval among traders and other variables that are of interest. The distributions of all these variables show power-law behavior. On the other hand, agent-based models have been proposed to study the properties of real financial markets. We here study the statistical properties of these agent-based models and compare them with the results from our web-based market experiments. In this work, three agent-based models are studied, namely, zero-intelligence (ZI), zero-intelligence-plus (ZIP) and Gjerstad-Dickhaut (GD). Computer simulations of variables based on these three agent-based models were carried out. We found that although being the most naive agent-based model, ZI indeed best describes the properties observed in real markets. Our study suggests that the basic ingredient to produce the observed properties from real world markets could in fact be the result of a continuously evolving dynamical system with basic features similar to the ZI model. ",chih-ting lin,,2010.0,10.1016/j.physa.2009.12.034,"Physica A 389, 1699 - 1707 (2010)",Tseng2010,True,,arXiv,Not available,"Statistical properties of agent-based models in markets with continuous double auction mechanism",d7b57e310f52dfcff66c6f21a7964958,http://arxiv.org/abs/1002.0917v1 15953," Real world markets display power-law features in variables such as price fluctuations in stocks. To further understand market behavior, we have conducted a series of market experiments on our web-based prediction market platform which allows us to reconstruct transaction networks among traders. From these networks, we are able to record the degree of a trader, the size of a community of traders, the transaction time interval among traders and other variables that are of interest. The distributions of all these variables show power-law behavior. On the other hand, agent-based models have been proposed to study the properties of real financial markets. We here study the statistical properties of these agent-based models and compare them with the results from our web-based market experiments. In this work, three agent-based models are studied, namely, zero-intelligence (ZI), zero-intelligence-plus (ZIP) and Gjerstad-Dickhaut (GD). Computer simulations of variables based on these three agent-based models were carried out. We found that although being the most naive agent-based model, ZI indeed best describes the properties observed in real markets. Our study suggests that the basic ingredient to produce the observed properties from real world markets could in fact be the result of a continuously evolving dynamical system with basic features similar to the ZI model. ",sun-chong wang,,2010.0,10.1016/j.physa.2009.12.034,"Physica A 389, 1699 - 1707 (2010)",Tseng2010,True,,arXiv,Not available,"Statistical properties of agent-based models in markets with continuous double auction mechanism",d7b57e310f52dfcff66c6f21a7964958,http://arxiv.org/abs/1002.0917v1 15954," Real world markets display power-law features in variables such as price fluctuations in stocks. To further understand market behavior, we have conducted a series of market experiments on our web-based prediction market platform which allows us to reconstruct transaction networks among traders. From these networks, we are able to record the degree of a trader, the size of a community of traders, the transaction time interval among traders and other variables that are of interest. The distributions of all these variables show power-law behavior. On the other hand, agent-based models have been proposed to study the properties of real financial markets. We here study the statistical properties of these agent-based models and compare them with the results from our web-based market experiments. In this work, three agent-based models are studied, namely, zero-intelligence (ZI), zero-intelligence-plus (ZIP) and Gjerstad-Dickhaut (GD). Computer simulations of variables based on these three agent-based models were carried out. We found that although being the most naive agent-based model, ZI indeed best describes the properties observed in real markets. Our study suggests that the basic ingredient to produce the observed properties from real world markets could in fact be the result of a continuously evolving dynamical system with basic features similar to the ZI model. ",sai-ping li,,2010.0,10.1016/j.physa.2009.12.034,"Physica A 389, 1699 - 1707 (2010)",Tseng2010,True,,arXiv,Not available,"Statistical properties of agent-based models in markets with continuous double auction mechanism",d7b57e310f52dfcff66c6f21a7964958,http://arxiv.org/abs/1002.0917v1 15955," Many real-world problems modeled by stochastic games have huge state and/or action spaces, leading to the well-known curse of dimensionality. The complexity of the analysis of large-scale systems is dramatically reduced by exploiting mean field limit and dynamical system viewpoints. Under regularity assumptions and specific time-scaling techniques, the evolution of the mean field limit can be expressed in terms of deterministic or stochastic equation or inclusion (difference or differential). In this paper, we overview recent advances of large-scale games in large-scale systems. We focus in particular on population games, stochastic population games and mean field stochastic games. Considering long-term payoffs, we characterize the mean field systems using Bellman and Kolmogorov forward equations. ",h. tembine,,2011.0,,arXiv,Tembine2011,True,,arXiv,Not available,Large-scale games in large-scale systems,821a189d954e519261e867bdf43cda10,http://arxiv.org/abs/1111.2285v3 15956," This work shows that the formation of a finite number of coalitions in a nonatomic network congestion game benefits everyone. At the equilibrium of the composite game played by coalitions and individuals, the average cost to each coalition and the individuals' common cost are all lower than in the corresponding nonatomic game (without coalitions). The individuals' cost is lower than the average cost to any coalition. Similarly, the average cost to a coalition is lower than that to any larger coalition. Whenever some members of a coalition become individuals, the individuals' payoff is increased. In the case of a unique coalition, both the average cost to the coalition and the individuals' cost are decreasing with respect to the size of the coalition. In a sequence of composite games, if a finite number of coalitions are fixed, while the size of the remaining coalitions goes to zero, the equilibria of these games converge to the equilibrium of a composite game played by the same fixed coalitions and the remaining individuals. ",cheng wan,,2012.0,,arXiv,Wan2012,True,,arXiv,Not available,Coalitions in nonatomic network congestion games,b8c5884b2cc40aa07277eba2d6686f88,http://arxiv.org/abs/1203.5822v2 15957," The multiplication game is a two-person game in which each player chooses a positive integer without knowledge of the other player's number. The two numbers are then multiplied together and the first digit of the product determines the winner. Rather than analyzing this game directly, we consider a closely related game in which the players choose positive real numbers between 1 and 10, multiply them together, and move the decimal point, if necessary, so that the result is between 1 and 10. The mixed strategies are probability distributions on this interval, and it is shown that for both players it is optimal to choose their numbers from the Benford distribution. Furthermore, this strategy is optimal for any winning set, and the probability of winning is the Benford measure of the player's winning set. Using these results we prove that the original game in which the players choose integers has a well-defined value and that strategies exist that are arbitrarily close to optimal. Finally, we consider generalizations of the game in which players choose elements from a compact topological group and show that choosing them according to Haar measure is an optimal strategy. ",kent morrison,,2012.0,10.4169/002557010X482862,Mathematics Magazine 83 (2010) 100-110,Morrison2012,True,,arXiv,Not available,The multiplication game,c681470c503aea0583238f64fe62d26e,http://arxiv.org/abs/1208.1329v1 15958," We consider infinite-state turn-based stochastic games of two players, Box and Diamond, who aim at maximizing and minimizing the expected total reward accumulated along a run, respectively. Since the total accumulated reward is unbounded, the determinacy of such games cannot be deduced directly from Martin's determinacy result for Blackwell games. Nevertheless, we show that these games are determined both for unrestricted (i.e., history-dependent and randomized) strategies and deterministic strategies, and the equilibrium value is the same. Further, we show that these games are generally not determined for memoryless strategies. Then, we consider a subclass of Diamond-finitely-branching games and show that they are determined for all of the considered strategy types, where the equilibrium value is always the same. We also examine the existence and type of (epsilon-)optimal strategies for both players. ",tomas brazdil,,2012.0,,arXiv,Brázdil2012,True,,arXiv,Not available,Determinacy in Stochastic Games with Unbounded Payoff Functions,2d3567524085c970fec72a2028e9e08d,http://arxiv.org/abs/1208.1639v1 15959," We consider infinite-state turn-based stochastic games of two players, Box and Diamond, who aim at maximizing and minimizing the expected total reward accumulated along a run, respectively. Since the total accumulated reward is unbounded, the determinacy of such games cannot be deduced directly from Martin's determinacy result for Blackwell games. Nevertheless, we show that these games are determined both for unrestricted (i.e., history-dependent and randomized) strategies and deterministic strategies, and the equilibrium value is the same. Further, we show that these games are generally not determined for memoryless strategies. Then, we consider a subclass of Diamond-finitely-branching games and show that they are determined for all of the considered strategy types, where the equilibrium value is always the same. We also examine the existence and type of (epsilon-)optimal strategies for both players. ",antonin kucera,,2012.0,,arXiv,Brázdil2012,True,,arXiv,Not available,Determinacy in Stochastic Games with Unbounded Payoff Functions,2d3567524085c970fec72a2028e9e08d,http://arxiv.org/abs/1208.1639v1 15960," We consider infinite-state turn-based stochastic games of two players, Box and Diamond, who aim at maximizing and minimizing the expected total reward accumulated along a run, respectively. Since the total accumulated reward is unbounded, the determinacy of such games cannot be deduced directly from Martin's determinacy result for Blackwell games. Nevertheless, we show that these games are determined both for unrestricted (i.e., history-dependent and randomized) strategies and deterministic strategies, and the equilibrium value is the same. Further, we show that these games are generally not determined for memoryless strategies. Then, we consider a subclass of Diamond-finitely-branching games and show that they are determined for all of the considered strategy types, where the equilibrium value is always the same. We also examine the existence and type of (epsilon-)optimal strategies for both players. ",petr novotny,,2012.0,,arXiv,Brázdil2012,True,,arXiv,Not available,Determinacy in Stochastic Games with Unbounded Payoff Functions,2d3567524085c970fec72a2028e9e08d,http://arxiv.org/abs/1208.1639v1 15961," Multiplayer games with selfish agents naturally occur in the design of distributed and embedded systems. As the goals of selfish agents are usually neither equivalent nor antagonistic to each other, such games are non zero-sum games. We study such games and show that a large class of these games, including games where the individual objectives are mean- or discounted-payoff, or quantitative reachability, and show that they do not only have a solution, but a simple solution. We establish the existence of Nash equilibria that are composed of k memoryless strategies for each agent in a setting with k agents, one main and k-1 minor strategies. The main strategy describes what happens when all agents comply, whereas the minor strategies ensure that all other agents immediately start to co-operate against the agent who first deviates from the plan. This simplicity is important, as rational agents are an idealisation. Realistically, agents have to decide on their moves with very limited resources, and complicated strategies that require exponential--or even non-elementary--implementations cannot realistically be implemented. The existence of simple strategies that we prove in this paper therefore holds a promise of implementability. ",thomas brihaye,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,Multiplayer Cost Games with Simple Nash Equilibria,a258a4f72aa3c01660a053f109ffca86,http://arxiv.org/abs/1210.3548v1 15962," Iterated regret minimization has been introduced recently by J.Y. Halpern and R. Pass in classical strategic games. For many games of interest, this new solution concept provides solutions that are judged more reasonable than solutions offered by traditional game concepts -- such as Nash equilibrium --. Although computing iterated regret on explicit matrix game is conceptually and computationally easy, nothing is known about computing the iterated regret on games whose matrices are defined implicitly using game tree, game DAG or, more generally game graphs. In this paper, we investigate iterated regret minimization for infinite duration two-player quantitative non-zero sum games played on graphs. We consider reachability objectives that are not necessarily antagonist. Edges are weighted by integers -- one for each player --, and the payoffs are defined by the sum of the weights along the paths. Depending on the class of graphs, we give either polynomial or pseudo-polynomial time algorithms to compute a strategy that minimizes the regret for a fixed player. We finally give algorithms to compute the strategies of the two players that minimize the iterated regret for trees, and for graphs with strictly positive weights only. ",emmanuel filiot,,2010.0,10.1007/978-3-642-15155-2_31,arXiv,Filiot2010,True,,arXiv,Not available,Iterated Regret Minimization in Game Graphs,ee7a3e46edae18e3c98c13041ed6e769,http://arxiv.org/abs/1002.1456v3 15963," Multiplayer games with selfish agents naturally occur in the design of distributed and embedded systems. As the goals of selfish agents are usually neither equivalent nor antagonistic to each other, such games are non zero-sum games. We study such games and show that a large class of these games, including games where the individual objectives are mean- or discounted-payoff, or quantitative reachability, and show that they do not only have a solution, but a simple solution. We establish the existence of Nash equilibria that are composed of k memoryless strategies for each agent in a setting with k agents, one main and k-1 minor strategies. The main strategy describes what happens when all agents comply, whereas the minor strategies ensure that all other agents immediately start to co-operate against the agent who first deviates from the plan. This simplicity is important, as rational agents are an idealisation. Realistically, agents have to decide on their moves with very limited resources, and complicated strategies that require exponential--or even non-elementary--implementations cannot realistically be implemented. The existence of simple strategies that we prove in this paper therefore holds a promise of implementability. ",julie pril,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,Multiplayer Cost Games with Simple Nash Equilibria,a258a4f72aa3c01660a053f109ffca86,http://arxiv.org/abs/1210.3548v1 15964," Multiplayer games with selfish agents naturally occur in the design of distributed and embedded systems. As the goals of selfish agents are usually neither equivalent nor antagonistic to each other, such games are non zero-sum games. We study such games and show that a large class of these games, including games where the individual objectives are mean- or discounted-payoff, or quantitative reachability, and show that they do not only have a solution, but a simple solution. We establish the existence of Nash equilibria that are composed of k memoryless strategies for each agent in a setting with k agents, one main and k-1 minor strategies. The main strategy describes what happens when all agents comply, whereas the minor strategies ensure that all other agents immediately start to co-operate against the agent who first deviates from the plan. This simplicity is important, as rational agents are an idealisation. Realistically, agents have to decide on their moves with very limited resources, and complicated strategies that require exponential--or even non-elementary--implementations cannot realistically be implemented. The existence of simple strategies that we prove in this paper therefore holds a promise of implementability. ",sven schewe,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,Multiplayer Cost Games with Simple Nash Equilibria,a258a4f72aa3c01660a053f109ffca86,http://arxiv.org/abs/1210.3548v1 15965," Muller games are played by two players moving a token along a graph; the winner is determined by the set of vertices that occur infinitely often. The central algorithmic problem is to compute the winning regions for the players. Different classes and representations of Muller games lead to problems of varying computational complexity. One such class are parity games; these are of particular significance in computational complexity, as they remain one of the few combinatorial problems known to be in NP and co-NP but not known to be in P. We show that winning regions for a Muller game can be determined from the alternating structure of its traps. To every Muller game we then associate a natural number that we call its trap-depth; this parameter measures how complicated the trap structure is. We present algorithms for parity games that run in polynomial time for graphs of bounded trap depth, and in general run in time exponential in the trap depth. ",a. grinshpun,,2013.0,,arXiv,Grinshpun2013,True,,arXiv,Not available,Alternating Traps in Muller and Parity Games,bd44e48fbaec431db893af42d8e7a1e6,http://arxiv.org/abs/1303.3777v2 15966," Muller games are played by two players moving a token along a graph; the winner is determined by the set of vertices that occur infinitely often. The central algorithmic problem is to compute the winning regions for the players. Different classes and representations of Muller games lead to problems of varying computational complexity. One such class are parity games; these are of particular significance in computational complexity, as they remain one of the few combinatorial problems known to be in NP and co-NP but not known to be in P. We show that winning regions for a Muller game can be determined from the alternating structure of its traps. To every Muller game we then associate a natural number that we call its trap-depth; this parameter measures how complicated the trap structure is. We present algorithms for parity games that run in polynomial time for graphs of bounded trap depth, and in general run in time exponential in the trap depth. ",p. phalitnonkiat,,2013.0,,arXiv,Grinshpun2013,True,,arXiv,Not available,Alternating Traps in Muller and Parity Games,bd44e48fbaec431db893af42d8e7a1e6,http://arxiv.org/abs/1303.3777v2 15967," Muller games are played by two players moving a token along a graph; the winner is determined by the set of vertices that occur infinitely often. The central algorithmic problem is to compute the winning regions for the players. Different classes and representations of Muller games lead to problems of varying computational complexity. One such class are parity games; these are of particular significance in computational complexity, as they remain one of the few combinatorial problems known to be in NP and co-NP but not known to be in P. We show that winning regions for a Muller game can be determined from the alternating structure of its traps. To every Muller game we then associate a natural number that we call its trap-depth; this parameter measures how complicated the trap structure is. We present algorithms for parity games that run in polynomial time for graphs of bounded trap depth, and in general run in time exponential in the trap depth. ",s. rubin,,2013.0,,arXiv,Grinshpun2013,True,,arXiv,Not available,Alternating Traps in Muller and Parity Games,bd44e48fbaec431db893af42d8e7a1e6,http://arxiv.org/abs/1303.3777v2 15968," Muller games are played by two players moving a token along a graph; the winner is determined by the set of vertices that occur infinitely often. The central algorithmic problem is to compute the winning regions for the players. Different classes and representations of Muller games lead to problems of varying computational complexity. One such class are parity games; these are of particular significance in computational complexity, as they remain one of the few combinatorial problems known to be in NP and co-NP but not known to be in P. We show that winning regions for a Muller game can be determined from the alternating structure of its traps. To every Muller game we then associate a natural number that we call its trap-depth; this parameter measures how complicated the trap structure is. We present algorithms for parity games that run in polynomial time for graphs of bounded trap depth, and in general run in time exponential in the trap depth. ",a. tarfulea,,2013.0,,arXiv,Grinshpun2013,True,,arXiv,Not available,Alternating Traps in Muller and Parity Games,bd44e48fbaec431db893af42d8e7a1e6,http://arxiv.org/abs/1303.3777v2 15969," Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than by acting in isolation. In the classical Transferable Utility (TU) setting, coalition worths can be freely distributed amongst agents. However, in several application scenarios, this is not the case and the Non-Transferable Utility setting (NTU) must be considered, where additional application-oriented constraints are imposed on the possible worth distributions. In this paper, an approach to define NTU games is proposed which is based on describing allowed distributions via a set of mixed-integer linear constraints applied to an underlying TU game. It is shown that such games allow non-transferable conditions on worth distributions to be specified in a natural and succinct way. The properties and the relationships among the most prominent solution concepts for NTU games that hold when they are applied on (mixed-integer) constrained games are investigated. Finally, a thorough analysis is carried out to assess the impact of issuing constraints on the computational complexity of some of these solution concepts. ",gianluigi greco,,2014.0,10.1613/jair.3060,"Journal Of Artificial Intelligence Research, Volume 38, pages 633-685, 2010",Greco2014,True,,arXiv,Not available,"Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints",e6dbcb84476dad1748f8fad5e972d893,http://arxiv.org/abs/1401.3852v1 15970," Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than by acting in isolation. In the classical Transferable Utility (TU) setting, coalition worths can be freely distributed amongst agents. However, in several application scenarios, this is not the case and the Non-Transferable Utility setting (NTU) must be considered, where additional application-oriented constraints are imposed on the possible worth distributions. In this paper, an approach to define NTU games is proposed which is based on describing allowed distributions via a set of mixed-integer linear constraints applied to an underlying TU game. It is shown that such games allow non-transferable conditions on worth distributions to be specified in a natural and succinct way. The properties and the relationships among the most prominent solution concepts for NTU games that hold when they are applied on (mixed-integer) constrained games are investigated. Finally, a thorough analysis is carried out to assess the impact of issuing constraints on the computational complexity of some of these solution concepts. ",enrico malizia,,2014.0,10.1613/jair.3060,"Journal Of Artificial Intelligence Research, Volume 38, pages 633-685, 2010",Greco2014,True,,arXiv,Not available,"Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints",e6dbcb84476dad1748f8fad5e972d893,http://arxiv.org/abs/1401.3852v1 15971," Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than by acting in isolation. In the classical Transferable Utility (TU) setting, coalition worths can be freely distributed amongst agents. However, in several application scenarios, this is not the case and the Non-Transferable Utility setting (NTU) must be considered, where additional application-oriented constraints are imposed on the possible worth distributions. In this paper, an approach to define NTU games is proposed which is based on describing allowed distributions via a set of mixed-integer linear constraints applied to an underlying TU game. It is shown that such games allow non-transferable conditions on worth distributions to be specified in a natural and succinct way. The properties and the relationships among the most prominent solution concepts for NTU games that hold when they are applied on (mixed-integer) constrained games are investigated. Finally, a thorough analysis is carried out to assess the impact of issuing constraints on the computational complexity of some of these solution concepts. ",luigi palopoli,,2014.0,10.1613/jair.3060,"Journal Of Artificial Intelligence Research, Volume 38, pages 633-685, 2010",Greco2014,True,,arXiv,Not available,"Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints",e6dbcb84476dad1748f8fad5e972d893,http://arxiv.org/abs/1401.3852v1 15972," Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than by acting in isolation. In the classical Transferable Utility (TU) setting, coalition worths can be freely distributed amongst agents. However, in several application scenarios, this is not the case and the Non-Transferable Utility setting (NTU) must be considered, where additional application-oriented constraints are imposed on the possible worth distributions. In this paper, an approach to define NTU games is proposed which is based on describing allowed distributions via a set of mixed-integer linear constraints applied to an underlying TU game. It is shown that such games allow non-transferable conditions on worth distributions to be specified in a natural and succinct way. The properties and the relationships among the most prominent solution concepts for NTU games that hold when they are applied on (mixed-integer) constrained games are investigated. Finally, a thorough analysis is carried out to assess the impact of issuing constraints on the computational complexity of some of these solution concepts. ",francesco scarcello,,2014.0,10.1613/jair.3060,"Journal Of Artificial Intelligence Research, Volume 38, pages 633-685, 2010",Greco2014,True,,arXiv,Not available,"Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints",e6dbcb84476dad1748f8fad5e972d893,http://arxiv.org/abs/1401.3852v1 15973," Iterated regret minimization has been introduced recently by J.Y. Halpern and R. Pass in classical strategic games. For many games of interest, this new solution concept provides solutions that are judged more reasonable than solutions offered by traditional game concepts -- such as Nash equilibrium --. Although computing iterated regret on explicit matrix game is conceptually and computationally easy, nothing is known about computing the iterated regret on games whose matrices are defined implicitly using game tree, game DAG or, more generally game graphs. In this paper, we investigate iterated regret minimization for infinite duration two-player quantitative non-zero sum games played on graphs. We consider reachability objectives that are not necessarily antagonist. Edges are weighted by integers -- one for each player --, and the payoffs are defined by the sum of the weights along the paths. Depending on the class of graphs, we give either polynomial or pseudo-polynomial time algorithms to compute a strategy that minimizes the regret for a fixed player. We finally give algorithms to compute the strategies of the two players that minimize the iterated regret for trees, and for graphs with strictly positive weights only. ",tristan gall,,2010.0,10.1007/978-3-642-15155-2_31,arXiv,Filiot2010,True,,arXiv,Not available,Iterated Regret Minimization in Game Graphs,ee7a3e46edae18e3c98c13041ed6e769,http://arxiv.org/abs/1002.1456v3 15974," We provide a series of algorithms demonstrating that solutions according to the fundamental game-theoretic solution concept of closed under rational behavior (CURB) sets in two-player, normal-form games can be computed in polynomial time (we also discuss extensions to n-player games). First, we describe an algorithm that identifies all of a player's best responses conditioned on the belief that the other player will play from within a given subset of its strategy space. This algorithm serves as a subroutine in a series of polynomial-time algorithms for finding all minimal CURB sets, one minimal CURB set, and the smallest minimal CURB set in a game. We then show that the complexity of finding a Nash equilibrium can be exponential only in the size of a game's smallest CURB set. Related to this, we show that the smallest CURB set can be an arbitrarily small portion of the game, but it can also be arbitrarily larger than the supports of its only enclosed Nash equilibrium. We test our algorithms empirically and find that most commonly studied academic games tend to have either very large or very small minimal CURB sets. ",michael benisch,,2014.0,10.1613/jair.3070,"Journal Of Artificial Intelligence Research, Volume 38, pages 513-534, 2010",Benisch2014,True,,arXiv,Not available,Algorithms for Closed Under Rational Behavior (CURB) Sets,4fcd717e6aa2c856f9c13427f6b43205,http://arxiv.org/abs/1401.3855v1 15975," We provide a series of algorithms demonstrating that solutions according to the fundamental game-theoretic solution concept of closed under rational behavior (CURB) sets in two-player, normal-form games can be computed in polynomial time (we also discuss extensions to n-player games). First, we describe an algorithm that identifies all of a player's best responses conditioned on the belief that the other player will play from within a given subset of its strategy space. This algorithm serves as a subroutine in a series of polynomial-time algorithms for finding all minimal CURB sets, one minimal CURB set, and the smallest minimal CURB set in a game. We then show that the complexity of finding a Nash equilibrium can be exponential only in the size of a game's smallest CURB set. Related to this, we show that the smallest CURB set can be an arbitrarily small portion of the game, but it can also be arbitrarily larger than the supports of its only enclosed Nash equilibrium. We test our algorithms empirically and find that most commonly studied academic games tend to have either very large or very small minimal CURB sets. ",george davis,,2014.0,10.1613/jair.3070,"Journal Of Artificial Intelligence Research, Volume 38, pages 513-534, 2010",Benisch2014,True,,arXiv,Not available,Algorithms for Closed Under Rational Behavior (CURB) Sets,4fcd717e6aa2c856f9c13427f6b43205,http://arxiv.org/abs/1401.3855v1 15976," We provide a series of algorithms demonstrating that solutions according to the fundamental game-theoretic solution concept of closed under rational behavior (CURB) sets in two-player, normal-form games can be computed in polynomial time (we also discuss extensions to n-player games). First, we describe an algorithm that identifies all of a player's best responses conditioned on the belief that the other player will play from within a given subset of its strategy space. This algorithm serves as a subroutine in a series of polynomial-time algorithms for finding all minimal CURB sets, one minimal CURB set, and the smallest minimal CURB set in a game. We then show that the complexity of finding a Nash equilibrium can be exponential only in the size of a game's smallest CURB set. Related to this, we show that the smallest CURB set can be an arbitrarily small portion of the game, but it can also be arbitrarily larger than the supports of its only enclosed Nash equilibrium. We test our algorithms empirically and find that most commonly studied academic games tend to have either very large or very small minimal CURB sets. ",tuomas sandholm,,2014.0,10.1613/jair.3070,"Journal Of Artificial Intelligence Research, Volume 38, pages 513-534, 2010",Benisch2014,True,,arXiv,Not available,Algorithms for Closed Under Rational Behavior (CURB) Sets,4fcd717e6aa2c856f9c13427f6b43205,http://arxiv.org/abs/1401.3855v1 15977," We consider a class of two-player dynamic stochastic nonzero-sum games where the state transition and observation equations are linear, and the primitive random variables are Gaussian. Each controller acquires possibly different dynamic information about the state process and the other controller's past actions and observations. This leads to a dynamic game of asymmetric information among the controllers. Building on our earlier work on finite games with asymmetric information, we devise an algorithm to compute a Nash equilibrium by using the common information among the controllers. We call such equilibria common information based Markov perfect equilibria of the game, which can be viewed as a refinement of Nash equilibrium in games with asymmetric information. If the players' cost functions are quadratic, then we show that under certain conditions a unique common information based Markov perfect equilibrium exists. Furthermore, this equilibrium can be computed by solving a sequence of linear equations. We also show through an example that there could be other Nash equilibria in a game of asymmetric information, not corresponding to common information based Markov perfect equilibria. ",abhishek gupta,,2014.0,,arXiv,Gupta2014,True,,arXiv,Not available,"Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information",45d4298f304f934f67b75f60a2bbbe06,http://arxiv.org/abs/1401.4786v1 15978," We consider a class of two-player dynamic stochastic nonzero-sum games where the state transition and observation equations are linear, and the primitive random variables are Gaussian. Each controller acquires possibly different dynamic information about the state process and the other controller's past actions and observations. This leads to a dynamic game of asymmetric information among the controllers. Building on our earlier work on finite games with asymmetric information, we devise an algorithm to compute a Nash equilibrium by using the common information among the controllers. We call such equilibria common information based Markov perfect equilibria of the game, which can be viewed as a refinement of Nash equilibrium in games with asymmetric information. If the players' cost functions are quadratic, then we show that under certain conditions a unique common information based Markov perfect equilibrium exists. Furthermore, this equilibrium can be computed by solving a sequence of linear equations. We also show through an example that there could be other Nash equilibria in a game of asymmetric information, not corresponding to common information based Markov perfect equilibria. ",ashutosh nayyar,,2014.0,,arXiv,Gupta2014,True,,arXiv,Not available,"Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information",45d4298f304f934f67b75f60a2bbbe06,http://arxiv.org/abs/1401.4786v1 15979," We consider a class of two-player dynamic stochastic nonzero-sum games where the state transition and observation equations are linear, and the primitive random variables are Gaussian. Each controller acquires possibly different dynamic information about the state process and the other controller's past actions and observations. This leads to a dynamic game of asymmetric information among the controllers. Building on our earlier work on finite games with asymmetric information, we devise an algorithm to compute a Nash equilibrium by using the common information among the controllers. We call such equilibria common information based Markov perfect equilibria of the game, which can be viewed as a refinement of Nash equilibrium in games with asymmetric information. If the players' cost functions are quadratic, then we show that under certain conditions a unique common information based Markov perfect equilibrium exists. Furthermore, this equilibrium can be computed by solving a sequence of linear equations. We also show through an example that there could be other Nash equilibria in a game of asymmetric information, not corresponding to common information based Markov perfect equilibria. ",cedric langbort,,2014.0,,arXiv,Gupta2014,True,,arXiv,Not available,"Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information",45d4298f304f934f67b75f60a2bbbe06,http://arxiv.org/abs/1401.4786v1 15980," We consider a class of two-player dynamic stochastic nonzero-sum games where the state transition and observation equations are linear, and the primitive random variables are Gaussian. Each controller acquires possibly different dynamic information about the state process and the other controller's past actions and observations. This leads to a dynamic game of asymmetric information among the controllers. Building on our earlier work on finite games with asymmetric information, we devise an algorithm to compute a Nash equilibrium by using the common information among the controllers. We call such equilibria common information based Markov perfect equilibria of the game, which can be viewed as a refinement of Nash equilibrium in games with asymmetric information. If the players' cost functions are quadratic, then we show that under certain conditions a unique common information based Markov perfect equilibrium exists. Furthermore, this equilibrium can be computed by solving a sequence of linear equations. We also show through an example that there could be other Nash equilibria in a game of asymmetric information, not corresponding to common information based Markov perfect equilibria. ",tamer basar,,2014.0,,arXiv,Gupta2014,True,,arXiv,Not available,"Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information",45d4298f304f934f67b75f60a2bbbe06,http://arxiv.org/abs/1401.4786v1 15981," We examine sequential equilibrium in the context of computational games, where agents are charged for computation. In such games, an agent can rationally choose to forget, so issues of imperfect recall arise. In this setting, we consider two notions of sequential equilibrium. One is an ex ante notion, where a player chooses his strategy before the game starts and is committed to it, but chooses it in such a way that it remains optimal even off the equilibrium path. The second is an interim notion, where a player can reconsider at each information set whether he is doing the ""right"" thing, and if not, can change his strategy. The two notions agree in games of perfect recall, but not in games of imperfect recall. Although the interim notion seems more appealing, \fullv{Halpern and Pass [2011] argue that there are some deep conceptual problems with it in standard games of imperfect recall. We show that the conceptual problems largely disappear in the computational setting. Moreover, in this setting, under natural assumptions, the two notions coincide. ",joseph halpern,,2014.0,,arXiv,Halpern2014,True,,arXiv,Not available,Sequential Equilibrium in Computational Games,a8718554d6446d83cff841353b78a4e4,http://arxiv.org/abs/1412.6361v1 15982," We examine sequential equilibrium in the context of computational games, where agents are charged for computation. In such games, an agent can rationally choose to forget, so issues of imperfect recall arise. In this setting, we consider two notions of sequential equilibrium. One is an ex ante notion, where a player chooses his strategy before the game starts and is committed to it, but chooses it in such a way that it remains optimal even off the equilibrium path. The second is an interim notion, where a player can reconsider at each information set whether he is doing the ""right"" thing, and if not, can change his strategy. The two notions agree in games of perfect recall, but not in games of imperfect recall. Although the interim notion seems more appealing, \fullv{Halpern and Pass [2011] argue that there are some deep conceptual problems with it in standard games of imperfect recall. We show that the conceptual problems largely disappear in the computational setting. Moreover, in this setting, under natural assumptions, the two notions coincide. ",rafael pass,,2014.0,,arXiv,Halpern2014,True,,arXiv,Not available,Sequential Equilibrium in Computational Games,a8718554d6446d83cff841353b78a4e4,http://arxiv.org/abs/1412.6361v1 15983," In this paper, we approach the classical problem of clustering using solution concepts from cooperative game theory such as Nucleolus and Shapley value. We formulate the problem of clustering as a characteristic form game and develop a novel algorithm DRAC (Density-Restricted Agglomerative Clustering) for clustering. With extensive experimentation on standard data sets, we compare the performance of DRAC with that of well known algorithms. We show an interesting result that four prominent solution concepts, Nucleolus, Shapley value, Gately point and \tau-value coincide for the defined characteristic form game. This vindicates the choice of the characteristic function of the clustering game and also provides strong intuitive foundation for our approach. ",swapnil dhamal,,2012.0,,arXiv,Dhamal2012,True,,arXiv,Not available,Pattern Clustering using Cooperative Game Theory,0c66feddb7095332c2a9fc4c4ce23ec1,http://arxiv.org/abs/1201.0461v1 15984," Iterated regret minimization has been introduced recently by J.Y. Halpern and R. Pass in classical strategic games. For many games of interest, this new solution concept provides solutions that are judged more reasonable than solutions offered by traditional game concepts -- such as Nash equilibrium --. Although computing iterated regret on explicit matrix game is conceptually and computationally easy, nothing is known about computing the iterated regret on games whose matrices are defined implicitly using game tree, game DAG or, more generally game graphs. In this paper, we investigate iterated regret minimization for infinite duration two-player quantitative non-zero sum games played on graphs. We consider reachability objectives that are not necessarily antagonist. Edges are weighted by integers -- one for each player --, and the payoffs are defined by the sum of the weights along the paths. Depending on the class of graphs, we give either polynomial or pseudo-polynomial time algorithms to compute a strategy that minimizes the regret for a fixed player. We finally give algorithms to compute the strategies of the two players that minimize the iterated regret for trees, and for graphs with strictly positive weights only. ",jean-francois raskin,,2010.0,10.1007/978-3-642-15155-2_31,arXiv,Filiot2010,True,,arXiv,Not available,Iterated Regret Minimization in Game Graphs,ee7a3e46edae18e3c98c13041ed6e769,http://arxiv.org/abs/1002.1456v3 15985," In this paper, we approach the classical problem of clustering using solution concepts from cooperative game theory such as Nucleolus and Shapley value. We formulate the problem of clustering as a characteristic form game and develop a novel algorithm DRAC (Density-Restricted Agglomerative Clustering) for clustering. With extensive experimentation on standard data sets, we compare the performance of DRAC with that of well known algorithms. We show an interesting result that four prominent solution concepts, Nucleolus, Shapley value, Gately point and \tau-value coincide for the defined characteristic form game. This vindicates the choice of the characteristic function of the clustering game and also provides strong intuitive foundation for our approach. ",satyanath bhat,,2012.0,,arXiv,Dhamal2012,True,,arXiv,Not available,Pattern Clustering using Cooperative Game Theory,0c66feddb7095332c2a9fc4c4ce23ec1,http://arxiv.org/abs/1201.0461v1 15986," In this paper, we approach the classical problem of clustering using solution concepts from cooperative game theory such as Nucleolus and Shapley value. We formulate the problem of clustering as a characteristic form game and develop a novel algorithm DRAC (Density-Restricted Agglomerative Clustering) for clustering. With extensive experimentation on standard data sets, we compare the performance of DRAC with that of well known algorithms. We show an interesting result that four prominent solution concepts, Nucleolus, Shapley value, Gately point and \tau-value coincide for the defined characteristic form game. This vindicates the choice of the characteristic function of the clustering game and also provides strong intuitive foundation for our approach. ",k. anoop,,2012.0,,arXiv,Dhamal2012,True,,arXiv,Not available,Pattern Clustering using Cooperative Game Theory,0c66feddb7095332c2a9fc4c4ce23ec1,http://arxiv.org/abs/1201.0461v1 15987," In this paper, we approach the classical problem of clustering using solution concepts from cooperative game theory such as Nucleolus and Shapley value. We formulate the problem of clustering as a characteristic form game and develop a novel algorithm DRAC (Density-Restricted Agglomerative Clustering) for clustering. With extensive experimentation on standard data sets, we compare the performance of DRAC with that of well known algorithms. We show an interesting result that four prominent solution concepts, Nucleolus, Shapley value, Gately point and \tau-value coincide for the defined characteristic form game. This vindicates the choice of the characteristic function of the clustering game and also provides strong intuitive foundation for our approach. ",varun embar,,2012.0,,arXiv,Dhamal2012,True,,arXiv,Not available,Pattern Clustering using Cooperative Game Theory,0c66feddb7095332c2a9fc4c4ce23ec1,http://arxiv.org/abs/1201.0461v1 15988," This work tackles the problem of energy-efficient distributed power control in wireless networks with a large number of transmitters. The problem is modeled by a dynamic game. Each transmitter-receiver communication is characterized by a state given by the available energy and/or the individual channel state and whose evolution is governed by certain dynamics. Since equilibrium analysis in such a (stochastic) game is generally difficult and even impossible, the problem is approximated by exploiting the large system assumption. Under an appropriate exchangeability assumption, the corresponding mean field game is well defined and studied in detail for special cases. The main contribution of this work is to show how mean field games can be applied to the problem under investigation and provide illustrative numerical results. Our results indicate that this approach can lead to significant gains in terms of energy-efficiency at the resulting equilibrium. ",francois meriaux,,2013.0,,arXiv,Mériaux2013,True,,arXiv,Not available,Mean Field Energy Games in Wireless Networks,fb8fb469e3a2b52d874120f9e55c83af,http://arxiv.org/abs/1301.6793v1 15989," This work tackles the problem of energy-efficient distributed power control in wireless networks with a large number of transmitters. The problem is modeled by a dynamic game. Each transmitter-receiver communication is characterized by a state given by the available energy and/or the individual channel state and whose evolution is governed by certain dynamics. Since equilibrium analysis in such a (stochastic) game is generally difficult and even impossible, the problem is approximated by exploiting the large system assumption. Under an appropriate exchangeability assumption, the corresponding mean field game is well defined and studied in detail for special cases. The main contribution of this work is to show how mean field games can be applied to the problem under investigation and provide illustrative numerical results. Our results indicate that this approach can lead to significant gains in terms of energy-efficiency at the resulting equilibrium. ",vineeth varma,,2013.0,,arXiv,Mériaux2013,True,,arXiv,Not available,Mean Field Energy Games in Wireless Networks,fb8fb469e3a2b52d874120f9e55c83af,http://arxiv.org/abs/1301.6793v1 15990," This work tackles the problem of energy-efficient distributed power control in wireless networks with a large number of transmitters. The problem is modeled by a dynamic game. Each transmitter-receiver communication is characterized by a state given by the available energy and/or the individual channel state and whose evolution is governed by certain dynamics. Since equilibrium analysis in such a (stochastic) game is generally difficult and even impossible, the problem is approximated by exploiting the large system assumption. Under an appropriate exchangeability assumption, the corresponding mean field game is well defined and studied in detail for special cases. The main contribution of this work is to show how mean field games can be applied to the problem under investigation and provide illustrative numerical results. Our results indicate that this approach can lead to significant gains in terms of energy-efficiency at the resulting equilibrium. ",samson lasaulce,,2013.0,,arXiv,Mériaux2013,True,,arXiv,Not available,Mean Field Energy Games in Wireless Networks,fb8fb469e3a2b52d874120f9e55c83af,http://arxiv.org/abs/1301.6793v1 15991," In this paper, we study the problem of cooperative interference management in an OFDMA two-tier small cell network. In particular, we propose a novel approach for allowing the small cells to cooperate, so as to optimize their sum-rate, while cooperatively satisfying their maximum transmit power constraints. Unlike existing work which assumes that only disjoint groups of cooperative small cells can emerge, we formulate the small cells' cooperation problem as a coalition formation game with overlapping coalitions. In this game, each small cell base station can choose to participate in one or more cooperative groups (or coalitions) simultaneously, so as to optimize the tradeoff between the benefits and costs associated with cooperation. We study the properties of the proposed overlapping coalition formation game and we show that it exhibits negative externalities due to interference. Then, we propose a novel decentralized algorithm that allows the small cell base stations to interact and self-organize into a stable overlapping coalitional structure. Simulation results show that the proposed algorithm results in a notable performance advantage in terms of the total system sum-rate, relative to the noncooperative case and the classical algorithms for coalitional games with non-overlapping coalitions. ",zengfeng zhang,,2014.0,,arXiv,Zhang2014,True,,arXiv,Not available,"Coalitional Games with Overlapping Coalitions for Interference Management in Small Cell Networks",e2c908bbfb04bd8d9bbdd0ffe0d9f62c,http://arxiv.org/abs/1402.2479v1 15992," In this paper, we study the problem of cooperative interference management in an OFDMA two-tier small cell network. In particular, we propose a novel approach for allowing the small cells to cooperate, so as to optimize their sum-rate, while cooperatively satisfying their maximum transmit power constraints. Unlike existing work which assumes that only disjoint groups of cooperative small cells can emerge, we formulate the small cells' cooperation problem as a coalition formation game with overlapping coalitions. In this game, each small cell base station can choose to participate in one or more cooperative groups (or coalitions) simultaneously, so as to optimize the tradeoff between the benefits and costs associated with cooperation. We study the properties of the proposed overlapping coalition formation game and we show that it exhibits negative externalities due to interference. Then, we propose a novel decentralized algorithm that allows the small cell base stations to interact and self-organize into a stable overlapping coalitional structure. Simulation results show that the proposed algorithm results in a notable performance advantage in terms of the total system sum-rate, relative to the noncooperative case and the classical algorithms for coalitional games with non-overlapping coalitions. ",lingyang song,,2014.0,,arXiv,Zhang2014,True,,arXiv,Not available,"Coalitional Games with Overlapping Coalitions for Interference Management in Small Cell Networks",e2c908bbfb04bd8d9bbdd0ffe0d9f62c,http://arxiv.org/abs/1402.2479v1 15993," In this paper, we study the problem of cooperative interference management in an OFDMA two-tier small cell network. In particular, we propose a novel approach for allowing the small cells to cooperate, so as to optimize their sum-rate, while cooperatively satisfying their maximum transmit power constraints. Unlike existing work which assumes that only disjoint groups of cooperative small cells can emerge, we formulate the small cells' cooperation problem as a coalition formation game with overlapping coalitions. In this game, each small cell base station can choose to participate in one or more cooperative groups (or coalitions) simultaneously, so as to optimize the tradeoff between the benefits and costs associated with cooperation. We study the properties of the proposed overlapping coalition formation game and we show that it exhibits negative externalities due to interference. Then, we propose a novel decentralized algorithm that allows the small cell base stations to interact and self-organize into a stable overlapping coalitional structure. Simulation results show that the proposed algorithm results in a notable performance advantage in terms of the total system sum-rate, relative to the noncooperative case and the classical algorithms for coalitional games with non-overlapping coalitions. ",zhu han,,2014.0,,arXiv,Zhang2014,True,,arXiv,Not available,"Coalitional Games with Overlapping Coalitions for Interference Management in Small Cell Networks",e2c908bbfb04bd8d9bbdd0ffe0d9f62c,http://arxiv.org/abs/1402.2479v1 15994," In this paper, we study the problem of cooperative interference management in an OFDMA two-tier small cell network. In particular, we propose a novel approach for allowing the small cells to cooperate, so as to optimize their sum-rate, while cooperatively satisfying their maximum transmit power constraints. Unlike existing work which assumes that only disjoint groups of cooperative small cells can emerge, we formulate the small cells' cooperation problem as a coalition formation game with overlapping coalitions. In this game, each small cell base station can choose to participate in one or more cooperative groups (or coalitions) simultaneously, so as to optimize the tradeoff between the benefits and costs associated with cooperation. We study the properties of the proposed overlapping coalition formation game and we show that it exhibits negative externalities due to interference. Then, we propose a novel decentralized algorithm that allows the small cell base stations to interact and self-organize into a stable overlapping coalitional structure. Simulation results show that the proposed algorithm results in a notable performance advantage in terms of the total system sum-rate, relative to the noncooperative case and the classical algorithms for coalitional games with non-overlapping coalitions. ",walid saad,,2014.0,,arXiv,Zhang2014,True,,arXiv,Not available,"Coalitional Games with Overlapping Coalitions for Interference Management in Small Cell Networks",e2c908bbfb04bd8d9bbdd0ffe0d9f62c,http://arxiv.org/abs/1402.2479v1 15995," We study ""logit dynamics"" [Blume, Games and Economic Behavior, 1993] for strategic games. This dynamics works as follows: at every stage of the game a player is selected uniformly at random and she plays according to a ""noisy"" best-response where the noise level is tuned by a parameter $\beta$. Such a dynamics defines a family of ergodic Markov chains, indexed by $\beta$, over the set of strategy profiles. We believe that the stationary distribution of these Markov chains gives a meaningful description of the long-term behavior for systems whose agents are not completely rational. Our aim is twofold: On the one hand, we are interested in evaluating the performance of the game at equilibrium, i.e. the expected social welfare when the strategy profiles are random according to the stationary distribution. On the other hand, we want to estimate how long it takes, for a system starting at an arbitrary profile and running the logit dynamics, to get close to its stationary distribution; i.e., the ""mixing time"" of the chain. In this paper we study the stationary expected social welfare for the 3-player CK game, for 2-player coordination games, and for two simple $n$-player games. For all these games, we also give almost tight upper and lower bounds on the mixing time of logit dynamics. Our results show two different behaviors: in some games the mixing time depends exponentially on $\beta$, while for other games it can be upper bounded by a function independent of $\beta$. ",vincenzo auletta,,2010.0,10.1007/978-3-642-16170-4_6,arXiv,Auletta2010,True,,arXiv,Not available,Mixing Time and Stationary Expected Social Welfare of Logit Dynamics,90aa3f75a5480e3a2f09190b2d77f256,http://arxiv.org/abs/1002.3474v4 15996," In the game of Matching Pennies, Alice and Bob each hold a penny, and at every tick of the clock they simultaneously display the head or the tail sides of their coins. If they both display the same side, then Alice wins Bob's penny; if they display different sides, then Bob wins Alice's penny. To avoid giving the opponent a chance to win, both players seem to have nothing else to do but to randomly play heads and tails with equal frequencies. However, while not losing in this game is easy, not missing an opportunity to win is not. Randomizing your own moves can be made easy. Recognizing when the opponent's moves are not random can be arbitrarily hard. The notion of randomness is central in game theory, but it is usually taken for granted. The notion of outsmarting is not central in game theory, but it is central in the practice of gaming. We pursue the idea that these two notions can be usefully viewed as two sides of the same coin. ",dusko pavlovic,,2015.0,,arXiv,Pavlovic2015,True,,arXiv,Not available,Testing Randomness by Matching Pennies,1515b23c905c50179074f9d0d8c5e7e3,http://arxiv.org/abs/1503.03185v2 15997," In the game of Matching Pennies, Alice and Bob each hold a penny, and at every tick of the clock they simultaneously display the head or the tail sides of their coins. If they both display the same side, then Alice wins Bob's penny; if they display different sides, then Bob wins Alice's penny. To avoid giving the opponent a chance to win, both players seem to have nothing else to do but to randomly play heads and tails with equal frequencies. However, while not losing in this game is easy, not missing an opportunity to win is not. Randomizing your own moves can be made easy. Recognizing when the opponent's moves are not random can be arbitrarily hard. The notion of randomness is central in game theory, but it is usually taken for granted. The notion of outsmarting is not central in game theory, but it is central in the practice of gaming. We pursue the idea that these two notions can be usefully viewed as two sides of the same coin. ",peter-michael seidel,,2015.0,,arXiv,Pavlovic2015,True,,arXiv,Not available,Testing Randomness by Matching Pennies,1515b23c905c50179074f9d0d8c5e7e3,http://arxiv.org/abs/1503.03185v2 15998," In the game of Matching Pennies, Alice and Bob each hold a penny, and at every tick of the clock they simultaneously display the head or the tail sides of their coins. If they both display the same side, then Alice wins Bob's penny; if they display different sides, then Bob wins Alice's penny. To avoid giving the opponent a chance to win, both players seem to have nothing else to do but to randomly play heads and tails with equal frequencies. However, while not losing in this game is easy, not missing an opportunity to win is not. Randomizing your own moves can be made easy. Recognizing when the opponent's moves are not random can be arbitrarily hard. The notion of randomness is central in game theory, but it is usually taken for granted. The notion of outsmarting is not central in game theory, but it is central in the practice of gaming. We pursue the idea that these two notions can be usefully viewed as two sides of the same coin. ",muzamil yahia,,2015.0,,arXiv,Pavlovic2015,True,,arXiv,Not available,Testing Randomness by Matching Pennies,1515b23c905c50179074f9d0d8c5e7e3,http://arxiv.org/abs/1503.03185v2 15999," Each participant in peer-to-peer network prefers to free-ride on the contribution of other participants. Reputation based resource sharing is a way to control the free riding. Instead of classical game theory we use evolutionary game theory to analyse the reputation based resource sharing in peer to peer system. Classical game-theoretical approach requires global information of the population. However, the evolutionary games only assumes light cognitive capabilities of users, that is, each user imitates the behavior of other user with better payoff. We find that without any extra benefit reputation strategy is not stable in the system. We also find the fraction of users who calculate the reputation for controlling the free riding in equilibrium. In this work first we made a game theoretical model for the reputation system and then we calculate the threshold of the fraction of users with which the reputation strategy is sustainable in the system. We found that in simplistic conditions reputation calculation is not evolutionarily stable strategy but if we impose some initial payment to all users and then distribute that payment among the users who are calculating reputation then reputation is evolutionary stable strategy. ",antriksh goswami,,2017.0,,arXiv,Goswami2017,True,,arXiv,Not available,"Evolutionary Stability of Reputation Management System in Peer to Peer Networks",c630fa8d084d7422bd90e6edbdb1cfdd,http://arxiv.org/abs/1703.08286v1 16000," Each participant in peer-to-peer network prefers to free-ride on the contribution of other participants. Reputation based resource sharing is a way to control the free riding. Instead of classical game theory we use evolutionary game theory to analyse the reputation based resource sharing in peer to peer system. Classical game-theoretical approach requires global information of the population. However, the evolutionary games only assumes light cognitive capabilities of users, that is, each user imitates the behavior of other user with better payoff. We find that without any extra benefit reputation strategy is not stable in the system. We also find the fraction of users who calculate the reputation for controlling the free riding in equilibrium. In this work first we made a game theoretical model for the reputation system and then we calculate the threshold of the fraction of users with which the reputation strategy is sustainable in the system. We found that in simplistic conditions reputation calculation is not evolutionarily stable strategy but if we impose some initial payment to all users and then distribute that payment among the users who are calculating reputation then reputation is evolutionary stable strategy. ",ruchir gupta,,2017.0,,arXiv,Goswami2017,True,,arXiv,Not available,"Evolutionary Stability of Reputation Management System in Peer to Peer Networks",c630fa8d084d7422bd90e6edbdb1cfdd,http://arxiv.org/abs/1703.08286v1 16001," In wireless packet-forwarding networks with selfish nodes, application of a repeated game can induce the nodes to forward each others' packets, so that the network performance can be improved. However, the nodes on the boundary of such networks cannot benefit from this strategy, as the other nodes do not depend on them. This problem is sometimes known as {\em the curse of the boundary nodes}. To overcome this problem, an approach based on coalition games is proposed, in which the boundary nodes can use cooperative transmission to help the backbone nodes in the middle of the network. In return, the backbone nodes are willing to forward the boundary nodes' packets. Here, the concept of core is used to study the stability of the coalitions in such games. Then three types of fairness are investigated, namely, min-max fairness using nucleolus, average fairness using the Shapley function, and a newly proposed market fairness. Based on the specific problem addressed in this paper, market fairness is a new fairness concept involving fairness between multiple backbone nodes and multiple boundary nodes. Finally, a protocol is designed using both repeated games and coalition games. Simulation results show how boundary nodes and backbone nodes form coalitions according to different fairness criteria. The proposed protocol can improve the network connectivity by about 50%, compared with pure repeated game schemes. ",zhu han,,2008.0,,arXiv,Han2008,True,,arXiv,Not available,"Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks",8a13e584fb9533a34075c927fa46197d,http://arxiv.org/abs/0805.4249v1 16002," In wireless packet-forwarding networks with selfish nodes, application of a repeated game can induce the nodes to forward each others' packets, so that the network performance can be improved. However, the nodes on the boundary of such networks cannot benefit from this strategy, as the other nodes do not depend on them. This problem is sometimes known as {\em the curse of the boundary nodes}. To overcome this problem, an approach based on coalition games is proposed, in which the boundary nodes can use cooperative transmission to help the backbone nodes in the middle of the network. In return, the backbone nodes are willing to forward the boundary nodes' packets. Here, the concept of core is used to study the stability of the coalitions in such games. Then three types of fairness are investigated, namely, min-max fairness using nucleolus, average fairness using the Shapley function, and a newly proposed market fairness. Based on the specific problem addressed in this paper, market fairness is a new fairness concept involving fairness between multiple backbone nodes and multiple boundary nodes. Finally, a protocol is designed using both repeated games and coalition games. Simulation results show how boundary nodes and backbone nodes form coalitions according to different fairness criteria. The proposed protocol can improve the network connectivity by about 50%, compared with pure repeated game schemes. ",vincent poor,,2008.0,,arXiv,Han2008,True,,arXiv,Not available,"Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks",8a13e584fb9533a34075c927fa46197d,http://arxiv.org/abs/0805.4249v1 16003," Poker has become a popular pastime all over the world. At any given moment one can find tens, if not hundreds, of thousands of players playing poker via their computers on the major on-line gaming sites. Indeed, according to the Vancouver, B.C. based pokerpulse.com estimates, more than 190 million US dollars daily is bet in on-line poker rooms. But communication and computation are changing as the relentless application of Moore's Law brings computation and information into the quantum realm. The quantum theory of games concerns the behavior of classical games when played in the coming quantum computing environment or when played with quantum information. In almost all cases, the ""quantized"" versions of these games afford many new strategic options to the players. The study of so-called quantum games is quite new, arising from a seminal paper of D. Meyer \cite{Meyer} published in Physics Review Letters in 1999. The ensuing near decade has seen an explosion of contributions and controversy over what exactly a quantized game really is and if there is indeed anything new for game theory. With the settling of some of these controversies \cite{Bleiler}, it is now possible to fully analyze some of the basic endgame models from the game theory of Poker and predict with confidence just how the optimal play of Poker will change when played in the coming quantum computation environment. The analysis here shows that for certain players, ""entangled"" poker will allow results that outperform those available to players ""in real life"". ",steven bleiler,,2009.0,,arXiv,Bleiler2009,True,,arXiv,Not available,Quantized Poker,21224e30fa43c33ec027f0626511a8a4,http://arxiv.org/abs/0902.2196v2 16004," A decentralized network of cognitive and non-cognitive transmitters where each transmitter aims at maximizing his energy-efficiency is considered. The cognitive transmitters are assumed to be able to sense the transmit power of their non-cognitive counterparts and the former have a cost for sensing. The Stackelberg equilibrium analysis of this $2-$level hierarchical game is conducted, which allows us to better understand the effects of cognition on energy-efficiency. In particular, it is proven that the network energy-efficiency is maximized when only a given fraction of terminals are cognitive. Then, we study a sensing game where all the transmitters are assumed to take the decision whether to sense (namely to be cognitive) or not. This game is shown to be a weighted potential game and its set of equilibria is studied. Playing the sensing game in a first phase (e.g., of a time-slot) and then playing the power control game is shown to be more efficient individually for all transmitters than playing a game where a transmitter would jointly optimize whether to sense and his power level, showing the existence of a kind of Braess paradox. The derived results are illustrated by numerical results and provide some insights on how to deploy cognitive radios in heterogeneous networks in terms of sensing capabilities. Keywords: Power Control, Stackelberg Equilibrium, Energy-Efficiency. ",mael treust,,2013.0,10.1109/TVT.2012.2227858,"IEEE Transaction on Vehicular Technology, 2012",Treust2013,True,,arXiv,Not available,Green Power Control in Cognitive Wireless Networks,7da79210930ef3d6577349ce5fc4ca16,http://arxiv.org/abs/1304.4199v1 16005," A decentralized network of cognitive and non-cognitive transmitters where each transmitter aims at maximizing his energy-efficiency is considered. The cognitive transmitters are assumed to be able to sense the transmit power of their non-cognitive counterparts and the former have a cost for sensing. The Stackelberg equilibrium analysis of this $2-$level hierarchical game is conducted, which allows us to better understand the effects of cognition on energy-efficiency. In particular, it is proven that the network energy-efficiency is maximized when only a given fraction of terminals are cognitive. Then, we study a sensing game where all the transmitters are assumed to take the decision whether to sense (namely to be cognitive) or not. This game is shown to be a weighted potential game and its set of equilibria is studied. Playing the sensing game in a first phase (e.g., of a time-slot) and then playing the power control game is shown to be more efficient individually for all transmitters than playing a game where a transmitter would jointly optimize whether to sense and his power level, showing the existence of a kind of Braess paradox. The derived results are illustrated by numerical results and provide some insights on how to deploy cognitive radios in heterogeneous networks in terms of sensing capabilities. Keywords: Power Control, Stackelberg Equilibrium, Energy-Efficiency. ",samson lasaulce,,2013.0,10.1109/TVT.2012.2227858,"IEEE Transaction on Vehicular Technology, 2012",Treust2013,True,,arXiv,Not available,Green Power Control in Cognitive Wireless Networks,7da79210930ef3d6577349ce5fc4ca16,http://arxiv.org/abs/1304.4199v1 16006," The Marinatto-Weber approach to quantum game is a straightforward way to apply the power of quantum mechanics to classical game theory. In the simplest case, the quantum scheme is that players manipulate their own qubits of a two-qubit state either with the identity operator or the Pauli operator $\sigma_{x}$. However, such a simplification of the scheme raises doubt as to whether it could really reflect a quantum game. In this paper we put forward examples which may constitute arguments against the present form of the Marinatto-Weber scheme. Next, we modify the scheme to eliminate the undesirable properties of the protocol by extending the players' strategy sets. ",piotr frackiewicz,,2014.0,10.1088/1751-8113/46/27/275301,J. Phys. A: Math. Theor. {\bf 46} (2013) 275301,Frackiewicz2014,True,,arXiv,Not available,A new model for quantum games based on the Marinatto-Weber approach,1b33b7f3a1797ed0dedff28dd1c14d1d,http://arxiv.org/abs/1409.3685v1 16007," In this work we apply methods from cryptography to enable any number of mutually distrusting players to implement broad classes of mediated equilibria of strategic games without the need for trusted mediation. Our implementation makes use of a (standard) pre-play ""cheap talk"" phase, in which players engage in free and non-binding communication prior to playing in the original game. In our cheap talk phase, the players execute a secure multi-party computation protocol to sample an action profile from an equilibrium of a ""cryptographically blinded"" version of the original game, in which actions are encrypted. The essence of our approach is to exploit the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved. In contrast to previous applications of cryptography to game theory, this work is the first to employ the paradigm of using encryption to allow players to benefit from hiding information \emph{from themselves}, rather than from others; and we stress that rational players would \emph{choose} to hide the information from themselves. ",pavel hubacek,,2014.0,,arXiv,Hubáček2014,True,,arXiv,Not available,"Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit",9797bd50ddf014cc1222c111574dc773,http://arxiv.org/abs/1411.3747v1 16008," We study ""logit dynamics"" [Blume, Games and Economic Behavior, 1993] for strategic games. This dynamics works as follows: at every stage of the game a player is selected uniformly at random and she plays according to a ""noisy"" best-response where the noise level is tuned by a parameter $\beta$. Such a dynamics defines a family of ergodic Markov chains, indexed by $\beta$, over the set of strategy profiles. We believe that the stationary distribution of these Markov chains gives a meaningful description of the long-term behavior for systems whose agents are not completely rational. Our aim is twofold: On the one hand, we are interested in evaluating the performance of the game at equilibrium, i.e. the expected social welfare when the strategy profiles are random according to the stationary distribution. On the other hand, we want to estimate how long it takes, for a system starting at an arbitrary profile and running the logit dynamics, to get close to its stationary distribution; i.e., the ""mixing time"" of the chain. In this paper we study the stationary expected social welfare for the 3-player CK game, for 2-player coordination games, and for two simple $n$-player games. For all these games, we also give almost tight upper and lower bounds on the mixing time of logit dynamics. Our results show two different behaviors: in some games the mixing time depends exponentially on $\beta$, while for other games it can be upper bounded by a function independent of $\beta$. ",diodato ferraioli,,2010.0,10.1007/978-3-642-16170-4_6,arXiv,Auletta2010,True,,arXiv,Not available,Mixing Time and Stationary Expected Social Welfare of Logit Dynamics,90aa3f75a5480e3a2f09190b2d77f256,http://arxiv.org/abs/1002.3474v4 16009," A decentralized network of cognitive and non-cognitive transmitters where each transmitter aims at maximizing his energy-efficiency is considered. The cognitive transmitters are assumed to be able to sense the transmit power of their non-cognitive counterparts and the former have a cost for sensing. The Stackelberg equilibrium analysis of this $2-$level hierarchical game is conducted, which allows us to better understand the effects of cognition on energy-efficiency. In particular, it is proven that the network energy-efficiency is maximized when only a given fraction of terminals are cognitive. Then, we study a sensing game where all the transmitters are assumed to take the decision whether to sense (namely to be cognitive) or not. This game is shown to be a weighted potential game and its set of equilibria is studied. Playing the sensing game in a first phase (e.g., of a time-slot) and then playing the power control game is shown to be more efficient individually for all transmitters than playing a game where a transmitter would jointly optimize whether to sense and his power level, showing the existence of a kind of Braess paradox. The derived results are illustrated by numerical results and provide some insights on how to deploy cognitive radios in heterogeneous networks in terms of sensing capabilities. Keywords: Power Control, Stackelberg Equilibrium, Energy-Efficiency. ",yezekael hayel,,2013.0,10.1109/TVT.2012.2227858,"IEEE Transaction on Vehicular Technology, 2012",Treust2013,True,,arXiv,Not available,Green Power Control in Cognitive Wireless Networks,7da79210930ef3d6577349ce5fc4ca16,http://arxiv.org/abs/1304.4199v1 16010," A decentralized network of cognitive and non-cognitive transmitters where each transmitter aims at maximizing his energy-efficiency is considered. The cognitive transmitters are assumed to be able to sense the transmit power of their non-cognitive counterparts and the former have a cost for sensing. The Stackelberg equilibrium analysis of this $2-$level hierarchical game is conducted, which allows us to better understand the effects of cognition on energy-efficiency. In particular, it is proven that the network energy-efficiency is maximized when only a given fraction of terminals are cognitive. Then, we study a sensing game where all the transmitters are assumed to take the decision whether to sense (namely to be cognitive) or not. This game is shown to be a weighted potential game and its set of equilibria is studied. Playing the sensing game in a first phase (e.g., of a time-slot) and then playing the power control game is shown to be more efficient individually for all transmitters than playing a game where a transmitter would jointly optimize whether to sense and his power level, showing the existence of a kind of Braess paradox. The derived results are illustrated by numerical results and provide some insights on how to deploy cognitive radios in heterogeneous networks in terms of sensing capabilities. Keywords: Power Control, Stackelberg Equilibrium, Energy-Efficiency. ",gaoning he,,2013.0,10.1109/TVT.2012.2227858,"IEEE Transaction on Vehicular Technology, 2012",Treust2013,True,,arXiv,Not available,Green Power Control in Cognitive Wireless Networks,7da79210930ef3d6577349ce5fc4ca16,http://arxiv.org/abs/1304.4199v1 16011," When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. ",andrew fielder,,2015.0,,arXiv,Fielder2015,True,,arXiv,Not available,Comparing Decision Support Approaches for Cyber Security Investment,5364bf16c41b5ee0b5bf431a92b79d60,http://arxiv.org/abs/1502.05532v1 16012," When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. ",emmanouil panaousis,,2015.0,,arXiv,Fielder2015,True,,arXiv,Not available,Comparing Decision Support Approaches for Cyber Security Investment,5364bf16c41b5ee0b5bf431a92b79d60,http://arxiv.org/abs/1502.05532v1 16013," When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. ",pasquale malacaria,,2015.0,,arXiv,Fielder2015,True,,arXiv,Not available,Comparing Decision Support Approaches for Cyber Security Investment,5364bf16c41b5ee0b5bf431a92b79d60,http://arxiv.org/abs/1502.05532v1 16014," When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. ",chris hankin,,2015.0,,arXiv,Fielder2015,True,,arXiv,Not available,Comparing Decision Support Approaches for Cyber Security Investment,5364bf16c41b5ee0b5bf431a92b79d60,http://arxiv.org/abs/1502.05532v1 16015," When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. ",fabrizio smeraldi,,2015.0,,arXiv,Fielder2015,True,,arXiv,Not available,Comparing Decision Support Approaches for Cyber Security Investment,5364bf16c41b5ee0b5bf431a92b79d60,http://arxiv.org/abs/1502.05532v1 16016," Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers' subjective behavior on each other's DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency. ",yunpeng wang,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Load Shifting in the Smart Grid: To Participate or Not?,c64c37dfa16e2f10caeaa3c552b35051,http://arxiv.org/abs/1509.07963v1 16017," Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers' subjective behavior on each other's DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency. ",walid saad,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Load Shifting in the Smart Grid: To Participate or Not?,c64c37dfa16e2f10caeaa3c552b35051,http://arxiv.org/abs/1509.07963v1 16018," Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers' subjective behavior on each other's DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency. ",narayan mandayam,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Load Shifting in the Smart Grid: To Participate or Not?,c64c37dfa16e2f10caeaa3c552b35051,http://arxiv.org/abs/1509.07963v1 16019," We study ""logit dynamics"" [Blume, Games and Economic Behavior, 1993] for strategic games. This dynamics works as follows: at every stage of the game a player is selected uniformly at random and she plays according to a ""noisy"" best-response where the noise level is tuned by a parameter $\beta$. Such a dynamics defines a family of ergodic Markov chains, indexed by $\beta$, over the set of strategy profiles. We believe that the stationary distribution of these Markov chains gives a meaningful description of the long-term behavior for systems whose agents are not completely rational. Our aim is twofold: On the one hand, we are interested in evaluating the performance of the game at equilibrium, i.e. the expected social welfare when the strategy profiles are random according to the stationary distribution. On the other hand, we want to estimate how long it takes, for a system starting at an arbitrary profile and running the logit dynamics, to get close to its stationary distribution; i.e., the ""mixing time"" of the chain. In this paper we study the stationary expected social welfare for the 3-player CK game, for 2-player coordination games, and for two simple $n$-player games. For all these games, we also give almost tight upper and lower bounds on the mixing time of logit dynamics. Our results show two different behaviors: in some games the mixing time depends exponentially on $\beta$, while for other games it can be upper bounded by a function independent of $\beta$. ",francesco pasquale,,2010.0,10.1007/978-3-642-16170-4_6,arXiv,Auletta2010,True,,arXiv,Not available,Mixing Time and Stationary Expected Social Welfare of Logit Dynamics,90aa3f75a5480e3a2f09190b2d77f256,http://arxiv.org/abs/1002.3474v4 16020," Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers' subjective behavior on each other's DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency. ",h. poor,,2015.0,,arXiv,Wang2015,True,,arXiv,Not available,Load Shifting in the Smart Grid: To Participate or Not?,c64c37dfa16e2f10caeaa3c552b35051,http://arxiv.org/abs/1509.07963v1 16021," The aim of this paper is to bring together the notions of quantum game and game isomorphism. The work is intended as an attempt to introduce a new criterion for quantum game schemes. The generally accepted requirement forces a quantum scheme to generate the classical game in a particular case. Now, given a quantum game scheme and two isomorphic classical games, we additionally require the resulting quantum games to be isomorphic as well. We are concerned with the Eisert-Wilkens-Lewenstein quantum game scheme and the strong isomorphism between games in strategic form. ",piotr frackiewicz,,2017.0,10.1155/2016/4180864,"Advances in Mathematical Physics Vol. 2016, Article ID 4180864",Frackiewicz2017,True,,arXiv,Not available,Strong isomorphism in Eisert-Wilkens-Lewenstein type quantum games,896470a94e26941666bd7ee10463c7ea,http://arxiv.org/abs/1701.05633v1 16022," Our purpose is to focus attention on a new criterion for quantum schemes by bringing together the notions of quantum game and game isomorphism. A quantum game scheme is required to generate the classical game as a special case. Now, given a quantum game scheme and two isomorphic classical games, we additionally require the resulting quantum games to be isomorphic as well. We show how this isomorphism condition influences the players' strategy sets. We are concerned with the Marinatto-Weber type quantum game scheme and the strong isomorphism between games in strategic form. ",piotr frackiewicz,,2017.0,,arXiv,Frąckiewicz2017,True,,arXiv,Not available,Strong isomorphism in Marinatto-Weber type quantum games,f5f915462331f55df006755d7f310a82,http://arxiv.org/abs/1701.06100v1 16023," In this paper, we will be proving mathematically that scoring play combinatorial game theory covers all combinatorial games. That is, there is a sub-set of scoring play games that are identical to the set of normal play games, and a different sub-set that is identical to the set of mis\`ere play games. This proves conclusively, that scoring play combinatorial game theory is a complete theory for combinatorial games, and that every combinatorial game, regardless of the rule-set, can be analysed using scoring play combinatorial game theory. ",fraser stewart,,2013.0,,arXiv,Stewart2013,True,,arXiv,Not available,Tame and Wild Scoring Play Games,26da9830cec63234b59cdcf3987ea55f,http://arxiv.org/abs/1303.4275v1 16024," We consider the class of ""well-tempered"" integer-valued scoring games, which have the property that the parity of the length of the game is independent of the line of play. We consider disjunctive sums of these games, and develop a theory for them analogous to the standard theory of disjunctive sums of normal-play partizan games. We show that the monoid of well-tempered scoring games modulo indistinguishability is cancellative but not a group, and we describe its structure in terms of the group of normal-play partizan games. We also classify Boolean-valued well-tempered scoring games, showing that there are exactly seventy, up to equivalence. ",will johnson,,2011.0,,arXiv,Johnson2011,True,,arXiv,Not available,The Combinatorial Game Theory of Well-Tempered Scoring Games,df03a63e91e11bd6ccdd7f6203cc2285,http://arxiv.org/abs/1112.3610v1 16025," Hierarchical simple games - both disjunctive and conjunctive - are natural generalizations of simple majority games. They take their origin in the theory of secret sharing. Another important generalization of simple majority games with origin in economics and politics are weighted and roughly weighted majority games. In this paper we characterize roughly weighted hierarchical games identifying where the two approaches coincide. ",ali hameed,,2012.0,,arXiv,Hameed2012,True,,arXiv,Not available,Roughly Weighted Hierarchical Simple Games,69f49e5ad6558a27c6611e449ae4b2b8,http://arxiv.org/abs/1205.2152v1 16026," Hierarchical simple games - both disjunctive and conjunctive - are natural generalizations of simple majority games. They take their origin in the theory of secret sharing. Another important generalization of simple majority games with origin in economics and politics are weighted and roughly weighted majority games. In this paper we characterize roughly weighted hierarchical games identifying where the two approaches coincide. ",arkadii slinko,,2012.0,,arXiv,Hameed2012,True,,arXiv,Not available,Roughly Weighted Hierarchical Simple Games,69f49e5ad6558a27c6611e449ae4b2b8,http://arxiv.org/abs/1205.2152v1 16027," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",lior fishman,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 16028," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",vanessa reams,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 16029," We introduce two new mathematical games, the Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game, merging well-known games. We investigate the properties of the games, as well as providing an application to Diophantine approximation theory, analyzing the geometric structure of certain Diophantine sets. ",david simmons,,2015.0,,arXiv,Fishman2015,True,,arXiv,Not available,The Banach-Mazur-Schmidt game and the Banach-Mazur-McMullen game,4abfd8f07b0ddf4aefdaa16279eefffc,http://arxiv.org/abs/1503.03428v2 16030," We study ""logit dynamics"" [Blume, Games and Economic Behavior, 1993] for strategic games. This dynamics works as follows: at every stage of the game a player is selected uniformly at random and she plays according to a ""noisy"" best-response where the noise level is tuned by a parameter $\beta$. Such a dynamics defines a family of ergodic Markov chains, indexed by $\beta$, over the set of strategy profiles. We believe that the stationary distribution of these Markov chains gives a meaningful description of the long-term behavior for systems whose agents are not completely rational. Our aim is twofold: On the one hand, we are interested in evaluating the performance of the game at equilibrium, i.e. the expected social welfare when the strategy profiles are random according to the stationary distribution. On the other hand, we want to estimate how long it takes, for a system starting at an arbitrary profile and running the logit dynamics, to get close to its stationary distribution; i.e., the ""mixing time"" of the chain. In this paper we study the stationary expected social welfare for the 3-player CK game, for 2-player coordination games, and for two simple $n$-player games. For all these games, we also give almost tight upper and lower bounds on the mixing time of logit dynamics. Our results show two different behaviors: in some games the mixing time depends exponentially on $\beta$, while for other games it can be upper bounded by a function independent of $\beta$. ",giuseppe persiano,,2010.0,10.1007/978-3-642-16170-4_6,arXiv,Auletta2010,True,,arXiv,Not available,Mixing Time and Stationary Expected Social Welfare of Logit Dynamics,90aa3f75a5480e3a2f09190b2d77f256,http://arxiv.org/abs/1002.3474v4 16031," Changes in payoffs can transform Prisoner's Dilemma and other social dilemmas into harmonious win-win games. Using the Robinson-Goforth topology of 2x2 games, this paper analyzes how payoff swaps turn Prisoner's Dilemma into other games, compares Prisoner's Dilemmas with other families of games, traces paths that affect the difficulty of transforming Prisoner's Dilemma and other social dilemmas into win-win games, and shows how ties connect simpler and more complex games. Charts illustrate the relationships between the 144 strict ordinal 2x2 games, the 38 symmetric 2x2 ordinal games with and without ties, and the complete set of 1,413 2x2 ordinal games. Payoffs from the symmetric ordinal 2x2 games combine to form asymmetric games, generating coordinates for a simple labeling scheme to uniquely identify and locate all asymmetric ordinal 2x2 games. The expanded topology elegantly maps relationships between 2x2 games with and without ties, enables a systematic understanding of the potential for transformations in social dilemmas and other strategic interactions, offers a tool for institutional analysis and design, and locates a variety of interesting games for further research. ",bryan bruns,,2012.0,,arXiv,Bruns2012,True,,arXiv,Not available,"Escaping Prisoner's Dilemmas: From Discord to Harmony in the Landscape of 2x2 Games",03fc279768051cef330b42ad51b9a46c,http://arxiv.org/abs/1206.1880v1 16032," We study tree games developed recently by Matteo Mio as a game interpretation of the probabilistic $\mu$-calculus. With expressive power comes complexity. Mio showed that tree games are able to encode Blackwell games and, consequently, are not determined under deterministic strategies. We show that non-stochastic tree games with objectives recognisable by so-called game automata are determined under deterministic, finite memory strategies. Moreover, we give an elementary algorithmic procedure which, for an arbitrary regular language L and a finite non-stochastic tree game with a winning objective L decides if the game is determined under deterministic strategies. ",marcin przybylko,,2014.0,10.4204/EPTCS.161.20,"EPTCS 161, 2014, pp. 231-244",Przybyłko2014,True,,arXiv,Not available,Tree games with regular objectives,a9704b729e28aacabd82219a63cea093,http://arxiv.org/abs/1408.6477v1 16033," We generalize a concept of classical finite extensive game to make it useful for application of quantum objects. The generalization extends a quantum realization scheme of static games to any finite extensive game. It represents an extension of any classical finite extensive games to the quantum domain. In addition our model is compatible with well-known quantum schemes of static games. The paper is summed up by two examples. ",piotr frackiewicz,,2010.0,,arXiv,Frackiewicz2010,True,,arXiv,Not available,Quantum realization of extensive games,0fd92db8f41cc89ea6518ce8291d8c3e,http://arxiv.org/abs/1008.3366v1 16034," The paper is devoted to quantization of extensive games with the use of both the Marinatto-Weber and the Eisert-Wilkens-Lewenstein concept of quantum game. We revise the current conception of quantum ultimatum game and we show why the proposal is unacceptable. To support our comment, we present the new idea of the quantum ultimatum game. Our scheme also makes a point of departure for a protocol to quantize extensive games. ",piotr frackiewicz,,2011.0,,arXiv,Frackiewicz2011,True,,arXiv,Not available,Quantum information approach to the ultimatum game,48164113511c96de38c48d639571f3fc,http://arxiv.org/abs/1109.2169v1 16035," Two-player games on graphs provide the theoretical frame- work for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games. In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated. We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of omega-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games. ",krishnendu chatterjee,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Doomsday Equilibria for Omega-Regular Games,81006ad296f4c18b88aa1094544c0bc2,http://arxiv.org/abs/1311.3238v1 16036," Two-player games on graphs provide the theoretical frame- work for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games. In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated. We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of omega-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games. ",laurent doyen,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Doomsday Equilibria for Omega-Regular Games,81006ad296f4c18b88aa1094544c0bc2,http://arxiv.org/abs/1311.3238v1 16037," Two-player games on graphs provide the theoretical frame- work for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games. In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated. We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of omega-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games. ",emmanuel filiot,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Doomsday Equilibria for Omega-Regular Games,81006ad296f4c18b88aa1094544c0bc2,http://arxiv.org/abs/1311.3238v1 16038," Two-player games on graphs provide the theoretical frame- work for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games. In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated. We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of omega-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games. ",jean-francois raskin,,2013.0,,arXiv,Chatterjee2013,True,,arXiv,Not available,Doomsday Equilibria for Omega-Regular Games,81006ad296f4c18b88aa1094544c0bc2,http://arxiv.org/abs/1311.3238v1 16039," Evolutionary game theory is a common framework to study the evolution of cooperation, where it is usually assumed that the same game is played in all interactions. Here, we investigate a model where the game that is played by two individuals is uniformly drawn from a sample of two different games. Using the master equation approach we show that the random mixture of two games is equivalent to play the average game when (i) the strategies are statistically independent of the game distribution and (ii) the transition rates are linear functions of the payoffs. We also use Monte-Carlo simulations in a two dimensional lattice and mean-field techniques to investigate the scenario when the two above conditions do not hold. We find that even outside of such conditions, several quantities characterizing the mixed-games are still the same as the ones obtained in the average game when the two games are not very different. ",marco amaral,,2015.0,10.1088/1751-8113/48/44/445002,J. Phys. A: Math. Theor. 48 (2015) 445002,Amaral2015,True,,arXiv,Not available,Cooperation in two-dimensional mixed-games,119a83372230d651a40e71c98a27b535,http://arxiv.org/abs/1505.03875v2 16040," Evolutionary game theory is a common framework to study the evolution of cooperation, where it is usually assumed that the same game is played in all interactions. Here, we investigate a model where the game that is played by two individuals is uniformly drawn from a sample of two different games. Using the master equation approach we show that the random mixture of two games is equivalent to play the average game when (i) the strategies are statistically independent of the game distribution and (ii) the transition rates are linear functions of the payoffs. We also use Monte-Carlo simulations in a two dimensional lattice and mean-field techniques to investigate the scenario when the two above conditions do not hold. We find that even outside of such conditions, several quantities characterizing the mixed-games are still the same as the ones obtained in the average game when the two games are not very different. ",jafferson silva,,2015.0,10.1088/1751-8113/48/44/445002,J. Phys. A: Math. Theor. 48 (2015) 445002,Amaral2015,True,,arXiv,Not available,Cooperation in two-dimensional mixed-games,119a83372230d651a40e71c98a27b535,http://arxiv.org/abs/1505.03875v2 16041," There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit. ",dmytro korzhyk,,2014.0,10.1613/jair.3269,"Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011",Korzhyk2014,True,,arXiv,Not available,"Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness",a789c67c90ecbcf51f9809205fa22421,http://arxiv.org/abs/1401.3888v1 16042," Evolutionary game theory is a common framework to study the evolution of cooperation, where it is usually assumed that the same game is played in all interactions. Here, we investigate a model where the game that is played by two individuals is uniformly drawn from a sample of two different games. Using the master equation approach we show that the random mixture of two games is equivalent to play the average game when (i) the strategies are statistically independent of the game distribution and (ii) the transition rates are linear functions of the payoffs. We also use Monte-Carlo simulations in a two dimensional lattice and mean-field techniques to investigate the scenario when the two above conditions do not hold. We find that even outside of such conditions, several quantities characterizing the mixed-games are still the same as the ones obtained in the average game when the two games are not very different. ",lucas wardil,,2015.0,10.1088/1751-8113/48/44/445002,J. Phys. A: Math. Theor. 48 (2015) 445002,Amaral2015,True,,arXiv,Not available,Cooperation in two-dimensional mixed-games,119a83372230d651a40e71c98a27b535,http://arxiv.org/abs/1505.03875v2 16043," Hedonic games provide a natural model of coalition formation among self-interested agents. The associated problem of finding stable outcomes in such games has been extensively studied. In this paper, we identify simple conditions on expressivity of hedonic games that are sufficient for the problem of checking whether a given game admits a stable outcome to be computationally hard. Somewhat surprisingly, these conditions are very mild and intuitive. Our results apply to a wide range of stability concepts (core stability, individual stability, Nash stability, etc.) and to many known formalisms for hedonic games (additively separable games, games with W-preferences, fractional hedonic games, etc.), and unify and extend known results for these formalisms. They also have broader applicability: for several classes of hedonic games whose computational complexity has not been explored in prior work, we show that our framework immediately implies a number of hardness results for them. ",dominik peters,,2015.0,,arXiv,Peters2015,True,,arXiv,Not available,Simple Causes of Complexity in Hedonic Games,386618432ecb2c19ea44c65c09d3dde2,http://arxiv.org/abs/1507.03474v1 16044," Hedonic games provide a natural model of coalition formation among self-interested agents. The associated problem of finding stable outcomes in such games has been extensively studied. In this paper, we identify simple conditions on expressivity of hedonic games that are sufficient for the problem of checking whether a given game admits a stable outcome to be computationally hard. Somewhat surprisingly, these conditions are very mild and intuitive. Our results apply to a wide range of stability concepts (core stability, individual stability, Nash stability, etc.) and to many known formalisms for hedonic games (additively separable games, games with W-preferences, fractional hedonic games, etc.), and unify and extend known results for these formalisms. They also have broader applicability: for several classes of hedonic games whose computational complexity has not been explored in prior work, we show that our framework immediately implies a number of hardness results for them. ",edith elkind,,2015.0,,arXiv,Peters2015,True,,arXiv,Not available,Simple Causes of Complexity in Hedonic Games,386618432ecb2c19ea44c65c09d3dde2,http://arxiv.org/abs/1507.03474v1 16045," In this paper, we study games with continuous action spaces and non-linear payoff functions. Our key insight is that Lipschitz continuity of the payoff function allows us to provide algorithms for finding approximate equilibria in these games. We begin by studying Lipschitz games, which encompass, for example, all concave games with Lipschitz continuous payoff functions. We provide an efficient algorithm for computing approximate equilibria in these games. Then we turn our attention to penalty games, which encompass biased games and games in which players take risk into account. Here we show that if the penalty function is Lipschitz continuous, then we can provide a quasi-polynomial time approximation scheme. Finally, we study distance biased games, where we present simple strongly polynomial time algorithms for finding best responses in $L_1$, $L_2^2$, and $L_\infty$ biased games, and then use these algorithms to provide strongly polynomial algorithms that find $2/3$, $5/7$, and $2/3$ approximations for these norms, respectively. ",argyrios deligkas,,2015.0,,arXiv,Deligkas2015,True,,arXiv,Not available,Lipschitz Continuity and Approximate Equilibria,63769f2dce4fba769a1ec982da6186e4,http://arxiv.org/abs/1509.02023v3 16046," In this paper, we study games with continuous action spaces and non-linear payoff functions. Our key insight is that Lipschitz continuity of the payoff function allows us to provide algorithms for finding approximate equilibria in these games. We begin by studying Lipschitz games, which encompass, for example, all concave games with Lipschitz continuous payoff functions. We provide an efficient algorithm for computing approximate equilibria in these games. Then we turn our attention to penalty games, which encompass biased games and games in which players take risk into account. Here we show that if the penalty function is Lipschitz continuous, then we can provide a quasi-polynomial time approximation scheme. Finally, we study distance biased games, where we present simple strongly polynomial time algorithms for finding best responses in $L_1$, $L_2^2$, and $L_\infty$ biased games, and then use these algorithms to provide strongly polynomial algorithms that find $2/3$, $5/7$, and $2/3$ approximations for these norms, respectively. ",john fearnley,,2015.0,,arXiv,Deligkas2015,True,,arXiv,Not available,Lipschitz Continuity and Approximate Equilibria,63769f2dce4fba769a1ec982da6186e4,http://arxiv.org/abs/1509.02023v3 16047," In this paper, we study games with continuous action spaces and non-linear payoff functions. Our key insight is that Lipschitz continuity of the payoff function allows us to provide algorithms for finding approximate equilibria in these games. We begin by studying Lipschitz games, which encompass, for example, all concave games with Lipschitz continuous payoff functions. We provide an efficient algorithm for computing approximate equilibria in these games. Then we turn our attention to penalty games, which encompass biased games and games in which players take risk into account. Here we show that if the penalty function is Lipschitz continuous, then we can provide a quasi-polynomial time approximation scheme. Finally, we study distance biased games, where we present simple strongly polynomial time algorithms for finding best responses in $L_1$, $L_2^2$, and $L_\infty$ biased games, and then use these algorithms to provide strongly polynomial algorithms that find $2/3$, $5/7$, and $2/3$ approximations for these norms, respectively. ",paul spirakis,,2015.0,,arXiv,Deligkas2015,True,,arXiv,Not available,Lipschitz Continuity and Approximate Equilibria,63769f2dce4fba769a1ec982da6186e4,http://arxiv.org/abs/1509.02023v3 16048," S. J. van Enk and R. Pike in PRA 66, 024306 (2002), argue that the equilibrium solution to a quantum game isn't unique but is already present in the classical game itself. In this work, we debunk this assertion by showing that a random strategy in a particular quantum (Hawk-Dove) game is unique to the quantum game. In other words the equilibrium solution of the quantum Hawk-Dove game can not be obtained in the classical Hawk-Dove game. Moreover, we provide an analytical solution to the quantum $2\times2$ strategic form Hawk-Dove game using random mixed strategies. The random strategies which we describe are evolutionary stable implying both Pareto optimality and Nash equilibrium with their payoff's classically unobtainable. ",nilesh vyas,,2017.0,,arXiv,Vyas2017,True,,arXiv,Not available,"Negating van Enk-Pike's assertion on quantum games OR Is the essence of a quantum game captured completely in the original classical game?",8a18aff23cd648212d37280294962e8b,http://arxiv.org/abs/1701.08573v2 16049," S. J. van Enk and R. Pike in PRA 66, 024306 (2002), argue that the equilibrium solution to a quantum game isn't unique but is already present in the classical game itself. In this work, we debunk this assertion by showing that a random strategy in a particular quantum (Hawk-Dove) game is unique to the quantum game. In other words the equilibrium solution of the quantum Hawk-Dove game can not be obtained in the classical Hawk-Dove game. Moreover, we provide an analytical solution to the quantum $2\times2$ strategic form Hawk-Dove game using random mixed strategies. The random strategies which we describe are evolutionary stable implying both Pareto optimality and Nash equilibrium with their payoff's classically unobtainable. ",colin benjamin,,2017.0,,arXiv,Vyas2017,True,,arXiv,Not available,"Negating van Enk-Pike's assertion on quantum games OR Is the essence of a quantum game captured completely in the original classical game?",8a18aff23cd648212d37280294962e8b,http://arxiv.org/abs/1701.08573v2 16050," The notions of entanglement and nonlocality are among the most striking ingredients found in quantum information theory. One tool to better understand these notions is the model of nonlocal games; a mathematical framework that abstractly models a physical system. The simplest instance of a nonlocal game involves two players, Alice and Bob, who are not allowed to communicate with each other once the game has started and who play cooperatively against an adversary referred to as the referee. The focus of this thesis is a class of games called extended nonlocal games, of which nonlocal games are a subset. In an extended nonlocal game, the players initially share a tripartite state with the referee. In such games, the winning conditions for Alice and Bob may depend on outcomes of measurements made by the referee, on its part of the shared quantum state, in addition to Alice and Bob's answers to the questions sent by the referee. We build up the framework for extended nonlocal games and study their properties and how they relate to nonlocal games. ",vincent russo,,2017.0,,arXiv,Russo2017,True,,arXiv,Not available,Extended Nonlocal Games,fbe3e1c6cf4f63cb2457a804961db51e,http://arxiv.org/abs/1704.07375v1 16051," We introduce quantitative reductions, a novel technique for structuring the space of quantitative games and solving them that does not rely on a reduction to qualitative games. We show that such reductions exhibit the same desirable properties as their qualitative counterparts and additionally retain the optimality of solutions. Moreover, we introduce vertex-ranked games as a general-purpose target for quantitative reductions and show how to solve them. In such games, the value of a play is determined only by a qualitative winning condition and a ranking of the vertices. We provide quantitative reductions of quantitative request-response games to vertex-ranked games, thus showing ExpTime-completeness of solving the former games. Furthermore, we exhibit the usefulness and flexibility of vertex-ranked games by showing how to use such games to compute fault-resilient strategies for safety specifications. This work lays the foundation for a general study of fault-resilient strategies for more complex winning conditions ",alexander weinert,,2018.0,10.4204/EPTCS.277.1,"EPTCS 277, 2018, pp. 1-15",Weinert2018,True,,arXiv,Not available,Quantitative Reductions and Vertex-Ranked Infinite Games,0cd2da397188cd40a930c61e7058ed42,http://arxiv.org/abs/1809.03887v1 16052," There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit. ",zhengyu yin,,2014.0,10.1613/jair.3269,"Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011",Korzhyk2014,True,,arXiv,Not available,"Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness",a789c67c90ecbcf51f9809205fa22421,http://arxiv.org/abs/1401.3888v1 16053," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of~$2^N$ into a set~$\mathcal{L}$ of losing coalitions~$L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W}, L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are exactly the weighted voting games. We show that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$, confirming the conjecture of Freixas and Kurz (IJGT, 2014). For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size~2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",frits hof,,2018.0,,arXiv,Hof2018,True,,arXiv,Not available,"Simple Games versus Weighted Voting Games: Bounding the Critical Threshold Value",44acdb77e3e0a8646e538953184efb2a,http://arxiv.org/abs/1810.08841v1 16054," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of~$2^N$ into a set~$\mathcal{L}$ of losing coalitions~$L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W}, L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are exactly the weighted voting games. We show that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$, confirming the conjecture of Freixas and Kurz (IJGT, 2014). For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size~2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",walter kern,,2018.0,,arXiv,Hof2018,True,,arXiv,Not available,"Simple Games versus Weighted Voting Games: Bounding the Critical Threshold Value",44acdb77e3e0a8646e538953184efb2a,http://arxiv.org/abs/1810.08841v1 16055," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of~$2^N$ into a set~$\mathcal{L}$ of losing coalitions~$L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W}, L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are exactly the weighted voting games. We show that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$, confirming the conjecture of Freixas and Kurz (IJGT, 2014). For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size~2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",sascha kurz,,2018.0,,arXiv,Hof2018,True,,arXiv,Not available,"Simple Games versus Weighted Voting Games: Bounding the Critical Threshold Value",44acdb77e3e0a8646e538953184efb2a,http://arxiv.org/abs/1810.08841v1 16056," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of~$2^N$ into a set~$\mathcal{L}$ of losing coalitions~$L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W}, L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are exactly the weighted voting games. We show that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$, confirming the conjecture of Freixas and Kurz (IJGT, 2014). For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size~2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",kanstantsin pashkovich,,2018.0,,arXiv,Hof2018,True,,arXiv,Not available,"Simple Games versus Weighted Voting Games: Bounding the Critical Threshold Value",44acdb77e3e0a8646e538953184efb2a,http://arxiv.org/abs/1810.08841v1 16057," A simple game $(N,v)$ is given by a set $N$ of $n$ players and a partition of~$2^N$ into a set~$\mathcal{L}$ of losing coalitions~$L$ with value $v(L)=0$ that is closed under taking subsets and a set $\mathcal{W}$ of winning coalitions $W$ with $v(W)=1$. Simple games with $\alpha= \min_{p\geq 0}\max_{W\in {\cal W}, L\in {\cal L}} \frac{p(L)}{p(W)}<1$ are exactly the weighted voting games. We show that $\alpha\leq \frac{1}{4}n$ for every simple game $(N,v)$, confirming the conjecture of Freixas and Kurz (IJGT, 2014). For complete simple games, Freixas and Kurz conjectured that $\alpha=O(\sqrt{n})$. We prove this conjecture up to a $\ln n$ factor. We also prove that for graphic simple games, that is, simple games in which every minimal winning coalition has size~2, computing $\alpha$ is \NP-hard, but polynomial-time solvable if the underlying graph is bipartite. Moreover, we show that for every graphic simple game, deciding if $\alpha0$. ",daniel paulusma,,2018.0,,arXiv,Hof2018,True,,arXiv,Not available,"Simple Games versus Weighted Voting Games: Bounding the Critical Threshold Value",44acdb77e3e0a8646e538953184efb2a,http://arxiv.org/abs/1810.08841v1 16058," The semigroup game is a two-person zero-sum game defined on a semigroup S as follows: Players 1 and 2 choose elements x and y in S, respectively, and player 1 receives a payoff f(xy) defined by a function f from S to [-1,1]. If the semigroup is amenable in the sense of Day and von Neumann, one can extend the set of classical strategies, namely countably additive probability measures on S, to include some finitely additive measures in a natural way. This extended game has a value and the players have optimal strategies. This theorem extends previous results for the multiplication game on a compact group or on the positive integers with a specific payoff. We also prove that the procedure of extending the set of allowed strategies preserves classical solutions: if a semigroup game has a classical solution, this solution solves also the extended game. ",valerio capraro,,2011.0,10.1007/s00182-012-0345-7,International Journal of Game Theory 42 (2013) 917-929,Capraro2011,True,,arXiv,Not available,Optimal strategies for a game on amenable semigroups,616e95546f65ff2faa01af422b872879,http://arxiv.org/abs/1104.3098v3 16059," The semigroup game is a two-person zero-sum game defined on a semigroup S as follows: Players 1 and 2 choose elements x and y in S, respectively, and player 1 receives a payoff f(xy) defined by a function f from S to [-1,1]. If the semigroup is amenable in the sense of Day and von Neumann, one can extend the set of classical strategies, namely countably additive probability measures on S, to include some finitely additive measures in a natural way. This extended game has a value and the players have optimal strategies. This theorem extends previous results for the multiplication game on a compact group or on the positive integers with a specific payoff. We also prove that the procedure of extending the set of allowed strategies preserves classical solutions: if a semigroup game has a classical solution, this solution solves also the extended game. ",kent morrison,,2011.0,10.1007/s00182-012-0345-7,International Journal of Game Theory 42 (2013) 917-929,Capraro2011,True,,arXiv,Not available,Optimal strategies for a game on amenable semigroups,616e95546f65ff2faa01af422b872879,http://arxiv.org/abs/1104.3098v3 16060," A network of cognitive transmitters is considered. Each transmitter has to decide his power control policy in order to maximize energy-efficiency of his transmission. For this, a transmitter has two actions to take. He has to decide whether to sense the power levels of the others or not (which corresponds to a finite sensing game), and to choose his transmit power level for each block (which corresponds to a compact power control game). The sensing game is shown to be a weighted potential game and its set of correlated equilibria is studied. Interestingly, it is shown that the general hybrid game where each transmitter can jointly choose the hybrid pair of actions (to sense or not to sense, transmit power level) leads to an outcome which is worse than the one obtained by playing the sensing game first, and then playing the power control game. This is an interesting Braess-type paradox to be aware of for energy-efficient power control in cognitive networks. ",mael treust,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"""To sense"" or ""not to sense"" in energy-efficient power control games",8a19ec24abc7b9dfa2480533a6158d86,http://arxiv.org/abs/1210.6370v1 16061," A network of cognitive transmitters is considered. Each transmitter has to decide his power control policy in order to maximize energy-efficiency of his transmission. For this, a transmitter has two actions to take. He has to decide whether to sense the power levels of the others or not (which corresponds to a finite sensing game), and to choose his transmit power level for each block (which corresponds to a compact power control game). The sensing game is shown to be a weighted potential game and its set of correlated equilibria is studied. Interestingly, it is shown that the general hybrid game where each transmitter can jointly choose the hybrid pair of actions (to sense or not to sense, transmit power level) leads to an outcome which is worse than the one obtained by playing the sensing game first, and then playing the power control game. This is an interesting Braess-type paradox to be aware of for energy-efficient power control in cognitive networks. ",yezekael hayel,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"""To sense"" or ""not to sense"" in energy-efficient power control games",8a19ec24abc7b9dfa2480533a6158d86,http://arxiv.org/abs/1210.6370v1 16062," A network of cognitive transmitters is considered. Each transmitter has to decide his power control policy in order to maximize energy-efficiency of his transmission. For this, a transmitter has two actions to take. He has to decide whether to sense the power levels of the others or not (which corresponds to a finite sensing game), and to choose his transmit power level for each block (which corresponds to a compact power control game). The sensing game is shown to be a weighted potential game and its set of correlated equilibria is studied. Interestingly, it is shown that the general hybrid game where each transmitter can jointly choose the hybrid pair of actions (to sense or not to sense, transmit power level) leads to an outcome which is worse than the one obtained by playing the sensing game first, and then playing the power control game. This is an interesting Braess-type paradox to be aware of for energy-efficient power control in cognitive networks. ",samson lasaulce,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"""To sense"" or ""not to sense"" in energy-efficient power control games",8a19ec24abc7b9dfa2480533a6158d86,http://arxiv.org/abs/1210.6370v1 16063," There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit. ",christopher kiekintveld,,2014.0,10.1613/jair.3269,"Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011",Korzhyk2014,True,,arXiv,Not available,"Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness",a789c67c90ecbcf51f9809205fa22421,http://arxiv.org/abs/1401.3888v1 16064," A network of cognitive transmitters is considered. Each transmitter has to decide his power control policy in order to maximize energy-efficiency of his transmission. For this, a transmitter has two actions to take. He has to decide whether to sense the power levels of the others or not (which corresponds to a finite sensing game), and to choose his transmit power level for each block (which corresponds to a compact power control game). The sensing game is shown to be a weighted potential game and its set of correlated equilibria is studied. Interestingly, it is shown that the general hybrid game where each transmitter can jointly choose the hybrid pair of actions (to sense or not to sense, transmit power level) leads to an outcome which is worse than the one obtained by playing the sensing game first, and then playing the power control game. This is an interesting Braess-type paradox to be aware of for energy-efficient power control in cognitive networks. ",merouane debbah,,2012.0,,arXiv,Treust2012,True,,arXiv,Not available,"""To sense"" or ""not to sense"" in energy-efficient power control games",8a19ec24abc7b9dfa2480533a6158d86,http://arxiv.org/abs/1210.6370v1 16065," We investigate determinacy of delay games with Borel winning conditions, infinite-duration two-player games in which one player may delay her moves to obtain a lookahead on her opponent's moves. First, we prove determinacy of such games with respect to a fixed evolution of the lookahead. However, strategies in such games may depend on information about the evolution. Thus, we introduce different notions of universal strategies for both players, which are evolution-independent, and determine the exact amount of information a universal strategy needs about the history of a play and the evolution of the lookahead to be winning. In particular, we show that delay games with Borel winning conditions are determined with respect to universal strategies. Finally, we consider decidability problems, e.g., ""Does a player have a universal winning strategy for delay games with a given winning condition?"", for omega-regular and omega-context-free winning conditions. ",felix klein,,2015.0,,arXiv,Klein2015,True,,arXiv,Not available,"What are Strategies in Delay Games? Borel Determinacy for Games with Lookahead",642715bf97320cde0492a400adccd62f,http://arxiv.org/abs/1504.02627v1 16066," We investigate determinacy of delay games with Borel winning conditions, infinite-duration two-player games in which one player may delay her moves to obtain a lookahead on her opponent's moves. First, we prove determinacy of such games with respect to a fixed evolution of the lookahead. However, strategies in such games may depend on information about the evolution. Thus, we introduce different notions of universal strategies for both players, which are evolution-independent, and determine the exact amount of information a universal strategy needs about the history of a play and the evolution of the lookahead to be winning. In particular, we show that delay games with Borel winning conditions are determined with respect to universal strategies. Finally, we consider decidability problems, e.g., ""Does a player have a universal winning strategy for delay games with a given winning condition?"", for omega-regular and omega-context-free winning conditions. ",martin zimmermann,,2015.0,,arXiv,Klein2015,True,,arXiv,Not available,"What are Strategies in Delay Games? Borel Determinacy for Games with Lookahead",642715bf97320cde0492a400adccd62f,http://arxiv.org/abs/1504.02627v1 16067," Gvozdeva, Hemaspaandra, and Slinko (2011) have introduced three hierarchies for simple games in order to measure the distance of a given simple game to the class of (roughly) weighted voting games. Their third class $\mathcal{C}_\alpha$ consists of all simple games permitting a weighted representation such that each winning coalition has a weight of at least 1 and each losing coalition a weight of at most $\alpha$. For a given game the minimal possible value of $\alpha$ is called its critical threshold value. We continue the work on the critical threshold value, initiated by Gvozdeva et al., and contribute some new results on the possible values for a given number of voters as well as some general bounds for restricted subclasses of games. A strong relation beween this concept and the cost of stability, i.e. the minimum amount of external payment to ensure stability in a coalitional game, is uncovered. ",josep freixas,,2011.0,,arXiv,Freixas2011,True,,arXiv,Not available,On $α$-roughly weighted games,104bd6a6bb73bdb7342723e678f49707,http://arxiv.org/abs/1112.2861v2 16068," Gvozdeva, Hemaspaandra, and Slinko (2011) have introduced three hierarchies for simple games in order to measure the distance of a given simple game to the class of (roughly) weighted voting games. Their third class $\mathcal{C}_\alpha$ consists of all simple games permitting a weighted representation such that each winning coalition has a weight of at least 1 and each losing coalition a weight of at most $\alpha$. For a given game the minimal possible value of $\alpha$ is called its critical threshold value. We continue the work on the critical threshold value, initiated by Gvozdeva et al., and contribute some new results on the possible values for a given number of voters as well as some general bounds for restricted subclasses of games. A strong relation beween this concept and the cost of stability, i.e. the minimum amount of external payment to ensure stability in a coalitional game, is uncovered. ",sascha kurz,,2011.0,,arXiv,Freixas2011,True,,arXiv,Not available,On $α$-roughly weighted games,104bd6a6bb73bdb7342723e678f49707,http://arxiv.org/abs/1112.2861v2 16069," Algorithms for computing game-theoretic solutions have recently been applied to a number of security domains. However, many of the techniques developed for compact representations of security games do not extend to {\em Bayesian} security games, which allow us to model uncertainty about the attacker's type. In this paper, we introduce a general framework of {\em catcher-evader} games that can capture Bayesian security games as well as other game families of interest. We show that computing Stackelberg strategies is NP-hard, but give an algorithm for computing a Nash equilibrium that performs well in experiments. We also prove that the Nash equilibria of these games satisfy the {\em interchangeability} property, so that equilibrium selection is not an issue. ",yuqian li,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Catcher-Evader Games,dfcfa20897fea5ef39562b585c869882,http://arxiv.org/abs/1602.01896v2 16070," Algorithms for computing game-theoretic solutions have recently been applied to a number of security domains. However, many of the techniques developed for compact representations of security games do not extend to {\em Bayesian} security games, which allow us to model uncertainty about the attacker's type. In this paper, we introduce a general framework of {\em catcher-evader} games that can capture Bayesian security games as well as other game families of interest. We show that computing Stackelberg strategies is NP-hard, but give an algorithm for computing a Nash equilibrium that performs well in experiments. We also prove that the Nash equilibria of these games satisfy the {\em interchangeability} property, so that equilibrium selection is not an issue. ",vincent conitzer,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Catcher-Evader Games,dfcfa20897fea5ef39562b585c869882,http://arxiv.org/abs/1602.01896v2 16071," Algorithms for computing game-theoretic solutions have recently been applied to a number of security domains. However, many of the techniques developed for compact representations of security games do not extend to {\em Bayesian} security games, which allow us to model uncertainty about the attacker's type. In this paper, we introduce a general framework of {\em catcher-evader} games that can capture Bayesian security games as well as other game families of interest. We show that computing Stackelberg strategies is NP-hard, but give an algorithm for computing a Nash equilibrium that performs well in experiments. We also prove that the Nash equilibria of these games satisfy the {\em interchangeability} property, so that equilibrium selection is not an issue. ",dmytro korzhyk,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Catcher-Evader Games,dfcfa20897fea5ef39562b585c869882,http://arxiv.org/abs/1602.01896v2 16072," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Generalized mean-payoff and energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of generalized energy games and show the inter-reducibility of generalized mean-payoff and energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. ",krishnendu chatterjee,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Generalized Mean-payoff and Energy Games,1c79159d028be52d91d3ef2f089180b2,http://arxiv.org/abs/1007.1669v4 16073," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Generalized mean-payoff and energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of generalized energy games and show the inter-reducibility of generalized mean-payoff and energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. ",laurent doyen,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Generalized Mean-payoff and Energy Games,1c79159d028be52d91d3ef2f089180b2,http://arxiv.org/abs/1007.1669v4 16074," There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit. ",vincent conitzer,,2014.0,10.1613/jair.3269,"Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011",Korzhyk2014,True,,arXiv,Not available,"Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness",a789c67c90ecbcf51f9809205fa22421,http://arxiv.org/abs/1401.3888v1 16075," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Generalized mean-payoff and energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of generalized energy games and show the inter-reducibility of generalized mean-payoff and energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. ",thomas henzinger,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Generalized Mean-payoff and Energy Games,1c79159d028be52d91d3ef2f089180b2,http://arxiv.org/abs/1007.1669v4 16076," In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Generalized mean-payoff and energy games replace individual weights by tuples, and the limit average (resp. running sum) of each coordinate must be (resp. remain) nonnegative. These games have applications in the synthesis of resource-bounded processes with multiple resources. We prove the finite-memory determinacy of generalized energy games and show the inter-reducibility of generalized mean-payoff and energy games for finite-memory strategies. We also improve the computational complexity for solving both classes of games with finite-memory strategies: while the previously best known upper bound was EXPSPACE, and no lower bound was known, we give an optimal coNP-complete bound. For memoryless strategies, we show that the problem of deciding the existence of a winning strategy for the protagonist is NP-complete. ",jean-francois raskin,,2010.0,,arXiv,Chatterjee2010,True,,arXiv,Not available,Generalized Mean-payoff and Energy Games,1c79159d028be52d91d3ef2f089180b2,http://arxiv.org/abs/1007.1669v4 16077," A poset game is a two-player game played over a partially ordered set (poset) in which the players alternate choosing an element of the poset, removing it and all elements greater than it. The first player unable to select an element of the poset loses. Polynomial time algorithms exist for certain restricted classes of poset games, such as the game of Nim. However, until recently the complexity of arbitrary finite poset games was only known to exist somewhere between NC^1 and PSPACE. We resolve this discrepancy by showing that deciding the winner of an arbitrary finite poset game is PSPACE-complete. To this end, we give an explicit reduction from Node Kayles, a PSPACE-complete game in which players vie to chose an independent set in a graph. ",daniel grier,,2012.0,10.1007/978-3-642-39206-1_42,"ICALP 2013, Part I, LNCS 7965, 2013, pp 497-503",Grier2012,True,,arXiv,Not available,Deciding the Winner of an Arbitrary Finite Poset Game is PSPACE-Complete,0a6a8bdf70c3f671c0397cc96c88b3fe,http://arxiv.org/abs/1209.1750v2 16078," We study the problem of finding robust equilibria in multiplayer concurrent games with mean payoff objectives. A $(k,t)$-robust equilibrium is a strategy profile such that no coalition of size $k$ can improve the payoff of one its member by deviating, and no coalition of size $t$ can decrease the payoff of other players. We are interested in pure equilibria, that is, solutions that can be implemented using non-randomized strategies. We suggest a general transformation from multiplayer games to two-player games such that pure equilibria in the first game correspond to winning strategies in the second one. We then devise from this transformation, an algorithm which computes equilibria in mean-payoff games. Robust equilibria in mean-payoff games reduce to winning strategies in multidimensional mean-payoff games for some threshold satisfying some constraints. We then show that the existence of such equilibria can be decided in polynomial space, and that the decision problem is PSPACE-complete. ",romain brenguier,,2013.0,,arXiv,Brenguier2013,True,,arXiv,Not available,Robust Equilibria in Concurrent Games,2516108e039f96b6edd4ac96ed1cbe0c,http://arxiv.org/abs/1311.7683v7 16079," We study infinitely repeated games in settings of imperfect monitoring. We first prove a family of theorems that show that when the signals observed by the players satisfy a condition known as $(\epsilon, \gamma)$-differential privacy, that the folk theorem has little bite: for values of $\epsilon$ and $\gamma$ sufficiently small, for a fixed discount factor, any equilibrium of the repeated game involve players playing approximate equilibria of the stage game in every period. Next, we argue that in large games ($n$ player games in which unilateral deviations by single players have only a small impact on the utility of other players), many monitoring settings naturally lead to signals that satisfy $(\epsilon,\gamma)$-differential privacy, for $\epsilon$ and $\gamma$ tending to zero as the number of players $n$ grows large. We conclude that in such settings, the set of equilibria of the repeated game collapse to the set of equilibria of the stage game. ",mallesh pai,,2014.0,,arXiv,Pai2014,True,,arXiv,Not available,An Anti-Folk Theorem for Large Repeated Games with Imperfect Monitoring,683187401e45dc08474e144a68e9a2fb,http://arxiv.org/abs/1402.2801v2 16080," We study infinitely repeated games in settings of imperfect monitoring. We first prove a family of theorems that show that when the signals observed by the players satisfy a condition known as $(\epsilon, \gamma)$-differential privacy, that the folk theorem has little bite: for values of $\epsilon$ and $\gamma$ sufficiently small, for a fixed discount factor, any equilibrium of the repeated game involve players playing approximate equilibria of the stage game in every period. Next, we argue that in large games ($n$ player games in which unilateral deviations by single players have only a small impact on the utility of other players), many monitoring settings naturally lead to signals that satisfy $(\epsilon,\gamma)$-differential privacy, for $\epsilon$ and $\gamma$ tending to zero as the number of players $n$ grows large. We conclude that in such settings, the set of equilibria of the repeated game collapse to the set of equilibria of the stage game. ",aaron roth,,2014.0,,arXiv,Pai2014,True,,arXiv,Not available,An Anti-Folk Theorem for Large Repeated Games with Imperfect Monitoring,683187401e45dc08474e144a68e9a2fb,http://arxiv.org/abs/1402.2801v2 16081," We study infinitely repeated games in settings of imperfect monitoring. We first prove a family of theorems that show that when the signals observed by the players satisfy a condition known as $(\epsilon, \gamma)$-differential privacy, that the folk theorem has little bite: for values of $\epsilon$ and $\gamma$ sufficiently small, for a fixed discount factor, any equilibrium of the repeated game involve players playing approximate equilibria of the stage game in every period. Next, we argue that in large games ($n$ player games in which unilateral deviations by single players have only a small impact on the utility of other players), many monitoring settings naturally lead to signals that satisfy $(\epsilon,\gamma)$-differential privacy, for $\epsilon$ and $\gamma$ tending to zero as the number of players $n$ grows large. We conclude that in such settings, the set of equilibria of the repeated game collapse to the set of equilibria of the stage game. ",jonathan ullman,,2014.0,,arXiv,Pai2014,True,,arXiv,Not available,An Anti-Folk Theorem for Large Repeated Games with Imperfect Monitoring,683187401e45dc08474e144a68e9a2fb,http://arxiv.org/abs/1402.2801v2 16082," A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mechanisms. In this paper, we propose a framework of spatial spectrum access games on directed interference graphs, which can model quite general interference relationship with spatial reuse in wireless networks. We show that a pure Nash equilibrium exists for the two classes of games: (1) any spatial spectrum access games on directed acyclic graphs, and (2) any games satisfying the congestion property on directed trees and directed forests. Under mild technical conditions, the spatial spectrum access games with random backoff and Aloha channel contention mechanisms on undirected graphs also have a pure Nash equilibrium. We also quantify the price of anarchy of the spatial spectrum access game. We then propose a distributed learning algorithm, which only utilizes users' local observations to adaptively adjust the spectrum access strategies. We show that the distributed learning algorithm can converge to an approximate mixed-strategy Nash equilibrium for any spatial spectrum access games. Numerical results demonstrate that the distributed learning algorithm achieves up to superior performance improvement over a random access algorithm. ",xu chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Spatial Spectrum Access Game,a83d0ca29b32d30ccedfc12e5bfc4a54,http://arxiv.org/abs/1405.3860v1 16083," A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mechanisms. In this paper, we propose a framework of spatial spectrum access games on directed interference graphs, which can model quite general interference relationship with spatial reuse in wireless networks. We show that a pure Nash equilibrium exists for the two classes of games: (1) any spatial spectrum access games on directed acyclic graphs, and (2) any games satisfying the congestion property on directed trees and directed forests. Under mild technical conditions, the spatial spectrum access games with random backoff and Aloha channel contention mechanisms on undirected graphs also have a pure Nash equilibrium. We also quantify the price of anarchy of the spatial spectrum access game. We then propose a distributed learning algorithm, which only utilizes users' local observations to adaptively adjust the spectrum access strategies. We show that the distributed learning algorithm can converge to an approximate mixed-strategy Nash equilibrium for any spatial spectrum access games. Numerical results demonstrate that the distributed learning algorithm achieves up to superior performance improvement over a random access algorithm. ",jianwei huang,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Spatial Spectrum Access Game,a83d0ca29b32d30ccedfc12e5bfc4a54,http://arxiv.org/abs/1405.3860v1 16084," We study two impartial games introduced by Anderson and Harary and further developed by Barnes. Both games are played by two players who alternately select previously unselected elements of a finite group. The first player who builds a generating set from the jointly selected elements wins the first game. The first player who cannot select an element without building a generating set loses the second game. After the development of some general results, we determine the nim-numbers of these games for abelian and dihedral groups. We also present some conjectures based on computer calculations. Our main computational and theoretical tool is the structure diagram of a game, which is a type of identification digraph of the game digraph that is compatible with the nim-numbers of the positions. Structure diagrams also provide simple yet intuitive visualizations of these games that capture the complexity of the positions. ",dana ernst,,2014.0,,arXiv,Ernst2014,True,,arXiv,Not available,Impartial achievement and avoidance games for generating finite groups,3a5fd7e706b6c960ab58617285f48e32,http://arxiv.org/abs/1407.0784v2 16085," There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit. ",milind tambe,,2014.0,10.1613/jair.3269,"Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011",Korzhyk2014,True,,arXiv,Not available,"Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness",a789c67c90ecbcf51f9809205fa22421,http://arxiv.org/abs/1401.3888v1 16086," We study two impartial games introduced by Anderson and Harary and further developed by Barnes. Both games are played by two players who alternately select previously unselected elements of a finite group. The first player who builds a generating set from the jointly selected elements wins the first game. The first player who cannot select an element without building a generating set loses the second game. After the development of some general results, we determine the nim-numbers of these games for abelian and dihedral groups. We also present some conjectures based on computer calculations. Our main computational and theoretical tool is the structure diagram of a game, which is a type of identification digraph of the game digraph that is compatible with the nim-numbers of the positions. Structure diagrams also provide simple yet intuitive visualizations of these games that capture the complexity of the positions. ",nandor sieben,,2014.0,,arXiv,Ernst2014,True,,arXiv,Not available,Impartial achievement and avoidance games for generating finite groups,3a5fd7e706b6c960ab58617285f48e32,http://arxiv.org/abs/1407.0784v2 16087," A real-valued game has the finite improvement property (FIP), if starting from an arbitrary strategy profile and letting the players change strategies to increase their individual payoffs in a sequential but non-deterministic order always reaches a Nash equilibrium. E.g., potential games have the FIP. Many of them have the FIP by chance nonetheless, since modifying even a single payoff may ruin the property. This article characterises (in quadratic time) the class of the finite games where FIP not only holds but is also preserved when modifying all the occurrences of an arbitrary payoff. The characterisation relies on a pattern-matching sufficient condition for games (finite or infinite) to enjoy the FIP, and is followed by an inductive description of this class. A real-valued game is weakly acyclic if the improvement described above can reach a Nash equilibrium. This article characterises the finite such games using Markov chains and almost sure convergence to equilibrium. It also gives an inductive description of the two-player such games. ",stephane roux,,2014.0,,arXiv,Roux2014,True,,arXiv,Not available,On terminating improvement in two-player games,5b6fb078b83b91be9c0a4b7b80cd8624,http://arxiv.org/abs/1409.6489v2 16088," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 16089," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 16090," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",himawan gunadhi,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 16091," We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Diversification in the Internet Economy:The Role of For-Profit Mediators,b8d73da59ca186ce4d3aae68ebdb841e,http://arxiv.org/abs/0711.0259v1 16092," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",constantinos daskalakis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 16093," A line of recent work provides welfare guarantees of simple combinatorial auction formats, such as selling m items via simultaneous second price auctions (SiSPAs) (Christodoulou et al. 2008, Bhawalkar and Roughgarden 2011, Feldman et al. 2013). These guarantees hold even when the auctions are repeatedly executed and players use no-regret learning algorithms. Unfortunately, off-the-shelf no-regret algorithms for these auctions are computationally inefficient as the number of actions is exponential. We show that this obstacle is insurmountable: there are no polynomial-time no-regret algorithms for SiSPAs, unless RP$\supseteq$ NP, even when the bidders are unit-demand. Our lower bound raises the question of how good outcomes polynomially-bounded bidders may discover in such auctions. To answer this question, we propose a novel concept of learning in auctions, termed ""no-envy learning."" This notion is founded upon Walrasian equilibrium, and we show that it is both efficiently implementable and results in approximately optimal welfare, even when the bidders have fractionally subadditive (XOS) valuations (assuming demand oracles) or coverage valuations (without demand oracles). No-envy learning outcomes are a relaxation of no-regret outcomes, which maintain their approximate welfare optimality while endowing them with computational tractability. Our results extend to other auction formats that have been studied in the literature via the smoothness paradigm. Our results for XOS valuations are enabled by a novel Follow-The-Perturbed-Leader algorithm for settings where the number of experts is infinite, and the payoff function of the learner is non-linear. This algorithm has applications outside of auction settings, such as in security games. Our result for coverage valuations is based on a novel use of convex rounding schemes and a reduction to online convex optimization. ",vasilis syrgkanis,,2015.0,,arXiv,Daskalakis2015,True,,arXiv,Not available,"Learning in Auctions: Regret is Hard, Envy is Easy",d9dfbdbab7db90e5b3a8ab9fe308680d,http://arxiv.org/abs/1511.01411v6 16094," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",jon feldman,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 16095," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",s. muthukrishnan,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 16096," Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes-no voting system is a set of rules that specifies exactly which collections of ``yea'' votes yield passage of the issue at hand. A collection of ``yea'' voters forms a winning coalition. We are interested on performing a complexity analysis of problems on such games depending on the game representation. We consider four natural explicit representations, winning, loosing, minimal winning, and maximal loosing. We first analyze the computational complexity of obtaining a particular representation of a simple game from a different one. We show that some cases this transformation can be done in polynomial time while the others require exponential time. The second question is classifying the complexity for testing whether a game is simple or weighted. We show that for the four types of representation both problem can be solved in polynomial time. Finally, we provide results on the complexity of testing whether a simple game or a weighted game is of a special type. In this way, we analyze strongness, properness, decisiveness and homogeneity, which are desirable properties to be fulfilled for a simple game. ",josep freixas,,2008.0,,arXiv,Freixas2008,True,,arXiv,Not available,The Complexity of Testing Properties of Simple Games,c0de48daa862d8912666b4bc38f0c827,http://arxiv.org/abs/0803.0404v1 16097," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",daniel reeves,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16098," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",michael wellman,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16099," Escalation is the fact that in a game (for instance an auction), the agents play forever. It is not necessary to consider complex examples to establish its rationality. In particular, the $0,1$-game is an extremely simple infinite game in which escalation arises naturally and rationally. In some sense, it can be considered as the paradigm of escalation. Through an example of economic games, we show the benefit economics can take of coinduction. ",pierre lescanne,,2013.0,,"Dans CALCO 2013 - 5th Conference on Algebra and Coalgebra in Computer Science, CALCO 2013, Warsaw : Poland (2013)",Lescanne2013,True,,arXiv,Not available,A simple case of rationality of escalation,f5031be006a4e4f9f06ef0bb27e7aea2,http://arxiv.org/abs/1306.2284v1 16100," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",daniel lehmann,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 16101," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",liadan o'callaghan,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 16102," Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms - in particular, their truth revelation properties - assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying natural properties for combinatorial auctions and showing that, for our restricted class of players, they imply that truthful strategies are dominant. Those properties have applicability beyond the specific auction studied. ",yoav shoham,,2002.0,,"Journal of the ACM Vol. 49, No. 5, September 2002, pp. 577-602",Lehmann2002,True,,arXiv,Not available,Truth Revelation in Approximately Efficient Combinatorial Auctions,e919dc771a244231a5e939befd5f4e38,http://arxiv.org/abs/cs/0202017v1 16106," We design approximate weakly group strategy-proof mechanisms for resource reallocation problems using Milgrom and Segal's deferred acceptance auction framework: the radio spectrum and network bandwidth reallocation problems in the procurement auction setting and the cost minimization problem with set cover constraints in the selling auction setting. Our deferred acceptance auctions are derived from simple greedy algorithms for the underlying optimization problems and guarantee approximately optimal social welfare (cost) of the agents retaining their rights (contracts). In the reallocation problems, we design procurement auctions to purchase agents' broadcast/access rights to free up some of the resources such that the unpurchased rights can still be exercised with respect to the remaining resources. In the cost minimization problem, we design a selling auction to sell early termination rights to agents with existing contracts such that some minimal constraints are still satisfied with remaining contracts. In these problems, while the ""allocated"" agents transact, exchanging rights and payments, the objective and feasibility constraints are on the ""rejected"" agents. ",anthony kim,,2015.0,,arXiv,Kim2015,True,,arXiv,Not available,"Welfare Maximization with Deferred Acceptance Auctions in Reallocation Problems",7aead1c2c81a7153c1e1ec9bab0aa4b5,http://arxiv.org/abs/1507.01353v3 16107," Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes-no voting system is a set of rules that specifies exactly which collections of ``yea'' votes yield passage of the issue at hand. A collection of ``yea'' voters forms a winning coalition. We are interested on performing a complexity analysis of problems on such games depending on the game representation. We consider four natural explicit representations, winning, loosing, minimal winning, and maximal loosing. We first analyze the computational complexity of obtaining a particular representation of a simple game from a different one. We show that some cases this transformation can be done in polynomial time while the others require exponential time. The second question is classifying the complexity for testing whether a game is simple or weighted. We show that for the four types of representation both problem can be solved in polynomial time. Finally, we provide results on the complexity of testing whether a simple game or a weighted game is of a special type. In this way, we analyze strongness, properness, decisiveness and homogeneity, which are desirable properties to be fulfilled for a simple game. ",xavier molinero,,2008.0,,arXiv,Freixas2008,True,,arXiv,Not available,The Complexity of Testing Properties of Simple Games,c0de48daa862d8912666b4bc38f0c827,http://arxiv.org/abs/0803.0404v1 16108," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dengji zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 16109," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dongmo zhang,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 16110," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",laurent perrussel,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 16111," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",shaddin dughmi,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 16112," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",nicole immorlica,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 16113," We consider the problem of an auctioneer who faces the task of selling a good (drawn from a known distribution) to a set of buyers, when the auctioneer does not have the capacity to describe to the buyers the exact identity of the good that he is selling. Instead, he must come up with a constrained signalling scheme: a (non injective) mapping from goods to signals, that satisfies the constraints of his setting. For example, the auctioneer may be able to communicate only a bounded length message for each good, or he might be legally constrained in how he can advertise the item being sold. Each candidate signaling scheme induces an incomplete-information game among the buyers, and the goal of the auctioneer is to choose the signaling scheme and accompanying auction format that optimizes welfare. In this paper, we use techniques from submodular function maximization and no-regret learning to give algorithms for computing constrained signaling schemes for a variety of constrained signaling problems. ",aaron roth,,2013.0,,arXiv,Dughmi2013,True,,arXiv,Not available,Constrained Signaling in Auction Design,e8607e2212b03edd029793dafe3bd12f,http://arxiv.org/abs/1302.4713v2 16114," We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized by uniformly optimal pure stationary strategies. We also demonstrate that $k$-total reward games can be embedded into $(k+1)$-total reward games. ",endre boros,,2014.0,,arXiv,Boros2014,True,,arXiv,Not available,A Nested Family of $k$-total Effective Rewards for Positional Games,e1aa2c92d6d2fa063f12ab9838deddbe,http://arxiv.org/abs/1412.6072v2 16115," We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized by uniformly optimal pure stationary strategies. We also demonstrate that $k$-total reward games can be embedded into $(k+1)$-total reward games. ",khaled elbassioni,,2014.0,,arXiv,Boros2014,True,,arXiv,Not available,A Nested Family of $k$-total Effective Rewards for Positional Games,e1aa2c92d6d2fa063f12ab9838deddbe,http://arxiv.org/abs/1412.6072v2 16116," We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized by uniformly optimal pure stationary strategies. We also demonstrate that $k$-total reward games can be embedded into $(k+1)$-total reward games. ",vladimir gurvich,,2014.0,,arXiv,Boros2014,True,,arXiv,Not available,A Nested Family of $k$-total Effective Rewards for Positional Games,e1aa2c92d6d2fa063f12ab9838deddbe,http://arxiv.org/abs/1412.6072v2 16117," We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized by uniformly optimal pure stationary strategies. We also demonstrate that $k$-total reward games can be embedded into $(k+1)$-total reward games. ",kazuhisa makino,,2014.0,,arXiv,Boros2014,True,,arXiv,Not available,A Nested Family of $k$-total Effective Rewards for Positional Games,e1aa2c92d6d2fa063f12ab9838deddbe,http://arxiv.org/abs/1412.6072v2 16118," In this work we apply methods from cryptography to enable any number of mutually distrusting players to implement broad classes of mediated equilibria of strategic games without the need for trusted mediation. Our implementation makes use of a (standard) pre-play ""cheap talk"" phase, in which players engage in free and non-binding communication prior to playing in the original game. In our cheap talk phase, the players execute a secure multi-party computation protocol to sample an action profile from an equilibrium of a ""cryptographically blinded"" version of the original game, in which actions are encrypted. The essence of our approach is to exploit the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved. In contrast to previous applications of cryptography to game theory, this work is the first to employ the paradigm of using encryption to allow players to benefit from hiding information \emph{from themselves}, rather than from others; and we stress that rational players would \emph{choose} to hide the information from themselves. ",sunoo park,,2014.0,,arXiv,Hubáček2014,True,,arXiv,Not available,"Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit",9797bd50ddf014cc1222c111574dc773,http://arxiv.org/abs/1411.3747v1 16119," Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes-no voting system is a set of rules that specifies exactly which collections of ``yea'' votes yield passage of the issue at hand. A collection of ``yea'' voters forms a winning coalition. We are interested on performing a complexity analysis of problems on such games depending on the game representation. We consider four natural explicit representations, winning, loosing, minimal winning, and maximal loosing. We first analyze the computational complexity of obtaining a particular representation of a simple game from a different one. We show that some cases this transformation can be done in polynomial time while the others require exponential time. The second question is classifying the complexity for testing whether a game is simple or weighted. We show that for the four types of representation both problem can be solved in polynomial time. Finally, we provide results on the complexity of testing whether a simple game or a weighted game is of a special type. In this way, we analyze strongness, properness, decisiveness and homogeneity, which are desirable properties to be fulfilled for a simple game. ",martin olsen,,2008.0,,arXiv,Freixas2008,True,,arXiv,Not available,The Complexity of Testing Properties of Simple Games,c0de48daa862d8912666b4bc38f0c827,http://arxiv.org/abs/0803.0404v1 16120," We establish a network formation game for the Internet's Autonomous System (AS) interconnection topology. The game includes different types of players, accounting for the heterogeneity of ASs in the Internet. We incorporate reliability considerations in the player's utility function, and analyze static properties of the game as well as its dynamic evolution. We provide dynamic analysis of its topological quantities, and explain the prevalence of some ""network motifs"" in the Internet graph. We assess our predictions with real-world data. ",eli meirom,,2014.0,,arXiv,Meirom2014,True,,arXiv,Not available,Formation Games of Reliable Networks,4dde21086bd208b15935383f72297ab1,http://arxiv.org/abs/1412.8501v1 16121," We establish a network formation game for the Internet's Autonomous System (AS) interconnection topology. The game includes different types of players, accounting for the heterogeneity of ASs in the Internet. We incorporate reliability considerations in the player's utility function, and analyze static properties of the game as well as its dynamic evolution. We provide dynamic analysis of its topological quantities, and explain the prevalence of some ""network motifs"" in the Internet graph. We assess our predictions with real-world data. ",shie mannor,,2014.0,,arXiv,Meirom2014,True,,arXiv,Not available,Formation Games of Reliable Networks,4dde21086bd208b15935383f72297ab1,http://arxiv.org/abs/1412.8501v1 16122," We establish a network formation game for the Internet's Autonomous System (AS) interconnection topology. The game includes different types of players, accounting for the heterogeneity of ASs in the Internet. We incorporate reliability considerations in the player's utility function, and analyze static properties of the game as well as its dynamic evolution. We provide dynamic analysis of its topological quantities, and explain the prevalence of some ""network motifs"" in the Internet graph. We assess our predictions with real-world data. ",ariel orda,,2014.0,,arXiv,Meirom2014,True,,arXiv,Not available,Formation Games of Reliable Networks,4dde21086bd208b15935383f72297ab1,http://arxiv.org/abs/1412.8501v1 16123," This paper studies strategic decentralization in binary choice composite network congestion games. A player decentralizes if she lets some autonomous agents to decide respectively how to send different parts of her stock from the origin to the destination. This paper shows that, with convex, strictly increasing and differentiable arc cost functions, an atomic splittable player always has an optimal unilateral decentralization strategy. Besides, unilateral decentralization gives her the same advantage as being the leader in a Stackelberg congestion game. Finally, unilateral decentralization of an atomic player has a negative impact on the social cost and on the costs of the other players at the equilibrium of the congestion game. ",cheng wan,,2015.0,,arXiv,Wan2015,True,,arXiv,Not available,Strategic decentralization in binary choice composite congestion games,831c8f6ae9b32b72ab69a56bac04990b,http://arxiv.org/abs/1506.03479v2 16124," Among the strategic choices made by today's economic actors are choices about algorithms and computational resources. Different access to computational resources may result in a kind of economic asymmetry analogous to information asymmetry. In order to represent strategic computational choices within a game theoretic framework, we propose a new game specification, Strategic Bayesian Networks (SBN). In an SBN, random variables are represented as nodes in a graph, with edges indicating probabilistic dependence. For some nodes, players can choose conditional probability distributions as a strategic choice. Using SBN, we present two games that demonstrate computational asymmetry. These games are symmetric except for the computational limitations of the actors. We show that the better computationally endowed player receives greater payoff. ",sebastian benthall,,2012.0,,arXiv,Benthall2012,True,,arXiv,Not available,Computational Asymmetry in Strategic Bayesian Networks,1ad00499a3527fb1e5d221f587521593,http://arxiv.org/abs/1206.2878v1 16125," Among the strategic choices made by today's economic actors are choices about algorithms and computational resources. Different access to computational resources may result in a kind of economic asymmetry analogous to information asymmetry. In order to represent strategic computational choices within a game theoretic framework, we propose a new game specification, Strategic Bayesian Networks (SBN). In an SBN, random variables are represented as nodes in a graph, with edges indicating probabilistic dependence. For some nodes, players can choose conditional probability distributions as a strategic choice. Using SBN, we present two games that demonstrate computational asymmetry. These games are symmetric except for the computational limitations of the actors. We show that the better computationally endowed player receives greater payoff. ",john chuang,,2012.0,,arXiv,Benthall2012,True,,arXiv,Not available,Computational Asymmetry in Strategic Bayesian Networks,1ad00499a3527fb1e5d221f587521593,http://arxiv.org/abs/1206.2878v1 16126," We present an algorithm that identifies the reasoning patterns of agents in a game, by iteratively examining the graph structure of its Multi-Agent Influence Diagram (MAID) representation. If the decision of an agent participates in no reasoning patterns, then we can effectively ignore that decision for the purpose of calculating a Nash equilibrium for the game. In some cases, this can lead to exponential time savings in the process of equilibrium calculation. Moreover, our algorithm can be used to enumerate the reasoning patterns in a game, which can be useful for constructing more effective computerized agents interacting with humans. ",dimitrios antos,,2012.0,,arXiv,Antos2012,True,,arXiv,Not available,Identifying reasoning patterns in games,b00ef19c87b5dc2b983428b79869139b,http://arxiv.org/abs/1206.3235v1 16127," We present an algorithm that identifies the reasoning patterns of agents in a game, by iteratively examining the graph structure of its Multi-Agent Influence Diagram (MAID) representation. If the decision of an agent participates in no reasoning patterns, then we can effectively ignore that decision for the purpose of calculating a Nash equilibrium for the game. In some cases, this can lead to exponential time savings in the process of equilibrium calculation. Moreover, our algorithm can be used to enumerate the reasoning patterns in a game, which can be useful for constructing more effective computerized agents interacting with humans. ",avi pfeffer,,2012.0,,arXiv,Antos2012,True,,arXiv,Not available,Identifying reasoning patterns in games,b00ef19c87b5dc2b983428b79869139b,http://arxiv.org/abs/1206.3235v1 16128," We introduce the novel notion of winning cores in parity games and develop a deterministic polynomial-time under-approximation algorithm for solving parity games based on winning core approximation. Underlying this algorithm are a number properties about winning cores which are interesting in their own right. In particular, we show that the winning core and the winning region for a player in a parity game are equivalently empty. Moreover, the winning core contains all fatal attractors but is not necessarily a dominion itself. Experimental results are very positive both with respect to quality of approximation and running time. It outperforms existing state-of-the-art algorithms significantly on most benchmarks. ",steen vester,,2016.0,,arXiv,Vester2016,True,,arXiv,Not available,Winning Cores in Parity Games,d604b53cbd8b722b7f38ca02c09537f9,http://arxiv.org/abs/1602.01963v1 16129," A mean-field-type game is a game in which the instantaneous payoffs and/or the state dynamics functions involve not only the state and the action profile but also the joint distributions of state-action pairs. This article presents some engineering applications of mean-field-type games including road traffic networks, multi-level building evacuation, millimeter wave wireless communications, distributed power networks, virus spread over networks, virtual machine resource management in cloud networks, synchronization of oscillators, energy-efficient buildings, online meeting and mobile crowdsensing. ",boualem djehiche,,2016.0,,arXiv,Djehiche2016,True,,arXiv,Not available,Mean-Field-Type Games in Engineering,4cbb199cef052b3ed640424f5de34f7b,http://arxiv.org/abs/1605.03281v3 16130," Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes-no voting system is a set of rules that specifies exactly which collections of ``yea'' votes yield passage of the issue at hand. A collection of ``yea'' voters forms a winning coalition. We are interested on performing a complexity analysis of problems on such games depending on the game representation. We consider four natural explicit representations, winning, loosing, minimal winning, and maximal loosing. We first analyze the computational complexity of obtaining a particular representation of a simple game from a different one. We show that some cases this transformation can be done in polynomial time while the others require exponential time. The second question is classifying the complexity for testing whether a game is simple or weighted. We show that for the four types of representation both problem can be solved in polynomial time. Finally, we provide results on the complexity of testing whether a simple game or a weighted game is of a special type. In this way, we analyze strongness, properness, decisiveness and homogeneity, which are desirable properties to be fulfilled for a simple game. ",maria serna,,2008.0,,arXiv,Freixas2008,True,,arXiv,Not available,The Complexity of Testing Properties of Simple Games,c0de48daa862d8912666b4bc38f0c827,http://arxiv.org/abs/0803.0404v1 16131," A mean-field-type game is a game in which the instantaneous payoffs and/or the state dynamics functions involve not only the state and the action profile but also the joint distributions of state-action pairs. This article presents some engineering applications of mean-field-type games including road traffic networks, multi-level building evacuation, millimeter wave wireless communications, distributed power networks, virus spread over networks, virtual machine resource management in cloud networks, synchronization of oscillators, energy-efficient buildings, online meeting and mobile crowdsensing. ",alain tcheukam,,2016.0,,arXiv,Djehiche2016,True,,arXiv,Not available,Mean-Field-Type Games in Engineering,4cbb199cef052b3ed640424f5de34f7b,http://arxiv.org/abs/1605.03281v3 16132," A mean-field-type game is a game in which the instantaneous payoffs and/or the state dynamics functions involve not only the state and the action profile but also the joint distributions of state-action pairs. This article presents some engineering applications of mean-field-type games including road traffic networks, multi-level building evacuation, millimeter wave wireless communications, distributed power networks, virus spread over networks, virtual machine resource management in cloud networks, synchronization of oscillators, energy-efficient buildings, online meeting and mobile crowdsensing. ",hamidou tembine,,2016.0,,arXiv,Djehiche2016,True,,arXiv,Not available,Mean-Field-Type Games in Engineering,4cbb199cef052b3ed640424f5de34f7b,http://arxiv.org/abs/1605.03281v3 16133," We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-operator spectrum sharing in small-cell indoor office environment, the convergence is fast and there is a significant performance improvement for the operators when compared to the default resource usage configuration. ",sofonias hailu,,2016.0,,arXiv,Hailu2016,True,,arXiv,Not available,Network Resource Sharing Games with Instantaneous Reciprocity,0d158d086f3a80187e5c4c618793264a,http://arxiv.org/abs/1605.09194v1 16134," We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-operator spectrum sharing in small-cell indoor office environment, the convergence is fast and there is a significant performance improvement for the operators when compared to the default resource usage configuration. ",ragnar freij-hollanti,,2016.0,,arXiv,Hailu2016,True,,arXiv,Not available,Network Resource Sharing Games with Instantaneous Reciprocity,0d158d086f3a80187e5c4c618793264a,http://arxiv.org/abs/1605.09194v1 16135," We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-operator spectrum sharing in small-cell indoor office environment, the convergence is fast and there is a significant performance improvement for the operators when compared to the default resource usage configuration. ",alexis dowhuszko,,2016.0,,arXiv,Hailu2016,True,,arXiv,Not available,Network Resource Sharing Games with Instantaneous Reciprocity,0d158d086f3a80187e5c4c618793264a,http://arxiv.org/abs/1605.09194v1 16136," We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-operator spectrum sharing in small-cell indoor office environment, the convergence is fast and there is a significant performance improvement for the operators when compared to the default resource usage configuration. ",olav tirkkonen,,2016.0,,arXiv,Hailu2016,True,,arXiv,Not available,Network Resource Sharing Games with Instantaneous Reciprocity,0d158d086f3a80187e5c4c618793264a,http://arxiv.org/abs/1605.09194v1 16137," EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits. ",florian hartig,,2008.0,10.1016/j.envsoft.2009.01.003,"Environmental Modelling & Software, 2010, 25, 1479-1480",Hartig2008,True,,arXiv,Not available,"EcoTRADE - a multi player network game of a tradable permit market for biodiversity credits",24700e05a940c50b4d23ee0c48ca2d9f,http://arxiv.org/abs/0812.0956v2 16138," EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits. ",martin horn,,2008.0,10.1016/j.envsoft.2009.01.003,"Environmental Modelling & Software, 2010, 25, 1479-1480",Hartig2008,True,,arXiv,Not available,"EcoTRADE - a multi player network game of a tradable permit market for biodiversity credits",24700e05a940c50b4d23ee0c48ca2d9f,http://arxiv.org/abs/0812.0956v2 16139," EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits. ",martin drechsler,,2008.0,10.1016/j.envsoft.2009.01.003,"Environmental Modelling & Software, 2010, 25, 1479-1480",Hartig2008,True,,arXiv,Not available,"EcoTRADE - a multi player network game of a tradable permit market for biodiversity credits",24700e05a940c50b4d23ee0c48ca2d9f,http://arxiv.org/abs/0812.0956v2 16140," In this note we provide a new proof for the results of Lipton et al. on the existence of an approximate Nash equilibrium with logarithmic support size. Besides its simplicity, the new proof leads to the following contributions: 1. For n-player games, we improve the bound on the size of the support of an approximate Nash equilibrium. 2. We generalize the result of Daskalakis and Papadimitriou on small probability games from the two-player case to the general n-player case. 3. We provide a logarithmic bound on the size of the support of an approximate Nash equilibrium in the case of graphical games. ",yakov babichenko,,2013.0,,arXiv,Babichenko2013,True,,arXiv,Not available,Small Support Equilibria in Large Games,b48f2380d389837c7436468f6cb8e04a,http://arxiv.org/abs/1305.2432v2 16141," Over the years, numerous experiments have been accumulated to show that cooperation is not casual and depends on the payoffs of the game. These findings suggest that humans have attitude to cooperation by nature and the same person may act more or less cooperatively depending on the particular payoffs. In other words, people do not act a priori as single agents, but they forecast how the game would be played if they formed coalitions and then they play according to their best forecast. In this paper we formalize this idea and we define a new solution concept for one-shot normal form games. We prove that this \emph{cooperative equilibrium} exists for all finite games and it explains a number of different experimental findings, such as (1) the rate of cooperation in the Prisoner's dilemma depends on the cost-benefit ratio; (2) the rate of cooperation in the Traveler's dilemma depends on the bonus/penalty; (3) the rate of cooperation in the Publig Goods game depends on the pro-capite marginal return and on the numbers of players; (4) the rate of cooperation in the Bertrand competition depends on the number of players; (5) players tend to be fair in the bargaining problem; (6) players tend to be fair in the Ultimatum game; (7) players tend to be altruist in the Dictator game; (8) offers in the Ultimatum game are larger than offers in the Dictator game. ",valerio capraro,,2013.0,,arXiv,Capraro2013,True,,arXiv,Not available,A solution concept for games with altruism and cooperation,7aa265fc41292a3a0cb3af64b9183be3,http://arxiv.org/abs/1302.3988v4 16142," Within the private-values paradigm, we construct a tractable empirical model of equilibrium behavior at first-price auctions when bidders' valuations are potentially dependent, but not necessarily affiliated. We develop a test of affiliation and apply our framework to data from low-price, sealed-bid auctions held by the Department of Transportation in the State of Michigan to procure road-resurfacing services: we do not reject the hypothesis of affiliation in cost signals. ",luciano castro,,2011.0,10.1214/10-AOAS344,"Annals of Applied Statistics 2010, Vol. 4, No. 4, 2073-2098",Castro2011,True,,arXiv,Not available,"Testing affiliation in private-values models of first-price auctions using grid distributions",d0e03e342c749edae2d00a6f8f045506,http://arxiv.org/abs/1101.1398v1 16143," Within the private-values paradigm, we construct a tractable empirical model of equilibrium behavior at first-price auctions when bidders' valuations are potentially dependent, but not necessarily affiliated. We develop a test of affiliation and apply our framework to data from low-price, sealed-bid auctions held by the Department of Transportation in the State of Michigan to procure road-resurfacing services: we do not reject the hypothesis of affiliation in cost signals. ",harry paarsch,,2011.0,10.1214/10-AOAS344,"Annals of Applied Statistics 2010, Vol. 4, No. 4, 2073-2098",Castro2011,True,,arXiv,Not available,"Testing affiliation in private-values models of first-price auctions using grid distributions",d0e03e342c749edae2d00a6f8f045506,http://arxiv.org/abs/1101.1398v1 16144," Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical price dynamics based on past data and uses the model to analytically calculate, to the greatest extent possible, optimal bids. We introduce a new and general boosting-based algorithm for conditional density estimation problems of this kind, i.e., supervised learning problems in which the goal is to estimate the entire conditional distribution of the real-valued label. This approach is fully implemented as ATTac-2001, a top-scoring agent in the second Trading Agent Competition (TAC-01). We present experiments demonstrating the effectiveness of our boosting-based price predictor relative to several reasonable alternatives. ",j. csirik,,2011.0,10.1613/jair.1200,"Journal Of Artificial Intelligence Research, Volume 19, pages 209-242, 2003",Csirik2011,True,,arXiv,Not available,"Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions",28a06efb16850d26b5ca3035e4819d0a,http://arxiv.org/abs/1106.5270v1 16145," Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical price dynamics based on past data and uses the model to analytically calculate, to the greatest extent possible, optimal bids. We introduce a new and general boosting-based algorithm for conditional density estimation problems of this kind, i.e., supervised learning problems in which the goal is to estimate the entire conditional distribution of the real-valued label. This approach is fully implemented as ATTac-2001, a top-scoring agent in the second Trading Agent Competition (TAC-01). We present experiments demonstrating the effectiveness of our boosting-based price predictor relative to several reasonable alternatives. ",m. littman,,2011.0,10.1613/jair.1200,"Journal Of Artificial Intelligence Research, Volume 19, pages 209-242, 2003",Csirik2011,True,,arXiv,Not available,"Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions",28a06efb16850d26b5ca3035e4819d0a,http://arxiv.org/abs/1106.5270v1 16146," Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical price dynamics based on past data and uses the model to analytically calculate, to the greatest extent possible, optimal bids. We introduce a new and general boosting-based algorithm for conditional density estimation problems of this kind, i.e., supervised learning problems in which the goal is to estimate the entire conditional distribution of the real-valued label. This approach is fully implemented as ATTac-2001, a top-scoring agent in the second Trading Agent Competition (TAC-01). We present experiments demonstrating the effectiveness of our boosting-based price predictor relative to several reasonable alternatives. ",d. mcallester,,2011.0,10.1613/jair.1200,"Journal Of Artificial Intelligence Research, Volume 19, pages 209-242, 2003",Csirik2011,True,,arXiv,Not available,"Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions",28a06efb16850d26b5ca3035e4819d0a,http://arxiv.org/abs/1106.5270v1 16147," Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical price dynamics based on past data and uses the model to analytically calculate, to the greatest extent possible, optimal bids. We introduce a new and general boosting-based algorithm for conditional density estimation problems of this kind, i.e., supervised learning problems in which the goal is to estimate the entire conditional distribution of the real-valued label. This approach is fully implemented as ATTac-2001, a top-scoring agent in the second Trading Agent Competition (TAC-01). We present experiments demonstrating the effectiveness of our boosting-based price predictor relative to several reasonable alternatives. ",r. schapire,,2011.0,10.1613/jair.1200,"Journal Of Artificial Intelligence Research, Volume 19, pages 209-242, 2003",Csirik2011,True,,arXiv,Not available,"Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions",28a06efb16850d26b5ca3035e4819d0a,http://arxiv.org/abs/1106.5270v1 16148," Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical price dynamics based on past data and uses the model to analytically calculate, to the greatest extent possible, optimal bids. We introduce a new and general boosting-based algorithm for conditional density estimation problems of this kind, i.e., supervised learning problems in which the goal is to estimate the entire conditional distribution of the real-valued label. This approach is fully implemented as ATTac-2001, a top-scoring agent in the second Trading Agent Competition (TAC-01). We present experiments demonstrating the effectiveness of our boosting-based price predictor relative to several reasonable alternatives. ",p. stone,,2011.0,10.1613/jair.1200,"Journal Of Artificial Intelligence Research, Volume 19, pages 209-242, 2003",Csirik2011,True,,arXiv,Not available,"Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions",28a06efb16850d26b5ca3035e4819d0a,http://arxiv.org/abs/1106.5270v1 16149," As computational agents are developed for increasingly complicated e-commerce applications, the complexity of the decisions they face demands advances in artificial intelligence techniques. For example, an agent representing a seller in an auction should try to maximize the seller's profit by reasoning about a variety of possibly uncertain pieces of information, such as the maximum prices various buyers might be willing to pay, the possible prices being offered by competing sellers, the rules by which the auction operates, the dynamic arrival and matching of offers to buy and sell, and so on. A naive application of multiagent reasoning techniques would require the seller's agent to explicitly model all of the other agents through an extended time horizon, rendering the problem intractable for many realistically-sized problems. We have instead devised a new strategy that an agent can use to determine its bid price based on a more tractable Markov chain model of the auction process. We have experimentally identified the conditions under which our new strategy works well, as well as how well it works in comparison to the optimal performance the agent could have achieved had it known the future. Our results show that our new strategy in general performs well, outperforming other tractable heuristic strategies in a majority of experiments, and is particularly effective in a 'seller?s market', where many buy offers are available. ",w. birmingham,,2011.0,10.1613/jair.1466,"Journal Of Artificial Intelligence Research, Volume 22, pages 175-214, 2004",Birmingham2011,True,,arXiv,Not available,"Use of Markov Chains to Design an Agent Bidding Strategy for Continuous Double Auctions",a3abeb90085a52778958b95a30a94d80,http://arxiv.org/abs/1106.6022v1 16150," As computational agents are developed for increasingly complicated e-commerce applications, the complexity of the decisions they face demands advances in artificial intelligence techniques. For example, an agent representing a seller in an auction should try to maximize the seller's profit by reasoning about a variety of possibly uncertain pieces of information, such as the maximum prices various buyers might be willing to pay, the possible prices being offered by competing sellers, the rules by which the auction operates, the dynamic arrival and matching of offers to buy and sell, and so on. A naive application of multiagent reasoning techniques would require the seller's agent to explicitly model all of the other agents through an extended time horizon, rendering the problem intractable for many realistically-sized problems. We have instead devised a new strategy that an agent can use to determine its bid price based on a more tractable Markov chain model of the auction process. We have experimentally identified the conditions under which our new strategy works well, as well as how well it works in comparison to the optimal performance the agent could have achieved had it known the future. Our results show that our new strategy in general performs well, outperforming other tractable heuristic strategies in a majority of experiments, and is particularly effective in a 'seller?s market', where many buy offers are available. ",e. durfee,,2011.0,10.1613/jair.1466,"Journal Of Artificial Intelligence Research, Volume 22, pages 175-214, 2004",Birmingham2011,True,,arXiv,Not available,"Use of Markov Chains to Design an Agent Bidding Strategy for Continuous Double Auctions",a3abeb90085a52778958b95a30a94d80,http://arxiv.org/abs/1106.6022v1 16151," As computational agents are developed for increasingly complicated e-commerce applications, the complexity of the decisions they face demands advances in artificial intelligence techniques. For example, an agent representing a seller in an auction should try to maximize the seller's profit by reasoning about a variety of possibly uncertain pieces of information, such as the maximum prices various buyers might be willing to pay, the possible prices being offered by competing sellers, the rules by which the auction operates, the dynamic arrival and matching of offers to buy and sell, and so on. A naive application of multiagent reasoning techniques would require the seller's agent to explicitly model all of the other agents through an extended time horizon, rendering the problem intractable for many realistically-sized problems. We have instead devised a new strategy that an agent can use to determine its bid price based on a more tractable Markov chain model of the auction process. We have experimentally identified the conditions under which our new strategy works well, as well as how well it works in comparison to the optimal performance the agent could have achieved had it known the future. Our results show that our new strategy in general performs well, outperforming other tractable heuristic strategies in a majority of experiments, and is particularly effective in a 'seller?s market', where many buy offers are available. ",s. park,,2011.0,10.1613/jair.1466,"Journal Of Artificial Intelligence Research, Volume 22, pages 175-214, 2004",Birmingham2011,True,,arXiv,Not available,"Use of Markov Chains to Design an Agent Bidding Strategy for Continuous Double Auctions",a3abeb90085a52778958b95a30a94d80,http://arxiv.org/abs/1106.6022v1 16152," In two-player zero-sum games, if both players minimize their average external regret, then the average of the strategy profiles converges to a Nash equilibrium. For n-player general-sum games, however, theoretical guarantees for regret minimization are less understood. Nonetheless, Counterfactual Regret Minimization (CFR), a popular regret minimization algorithm for extensive-form games, has generated winning three-player Texas Hold'em agents in the Annual Computer Poker Competition (ACPC). In this paper, we provide the first set of theoretical properties for regret minimization algorithms in non-zero-sum games by proving that solutions eliminate iterative strict domination. We formally define \emph{dominated actions} in extensive-form games, show that CFR avoids iteratively strictly dominated actions and strategies, and demonstrate that removing iteratively dominated actions is enough to win a mock tournament in a small poker game. In addition, for two-player non-zero-sum games, we bound the worst case performance and show that in practice, regret minimization can yield strategies very close to equilibrium. Our theoretical advancements lead us to a new modification of CFR for games with more than two players that is more efficient and may be used to generate stronger strategies than previously possible. Furthermore, we present a new three-player Texas Hold'em poker agent that was built using CFR and a novel game decomposition method. Our new agent wins the three-player events of the 2012 ACPC and defeats the winning three-player programs from previous competitions while requiring less resources to generate than the 2011 winner. Finally, we show that our CFR modification computes a strategy of equal quality to our new agent in a quarter of the time of standard CFR using half the memory. ",richard gibson,,2013.0,,arXiv,Gibson2013,True,,arXiv,Not available,"Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents",e4ccce935b0511007766e93e11f08f04,http://arxiv.org/abs/1305.0034v1 16153," The success of online auctions has given buyers access to greater product diversity with potentially lower prices. It has provided sellers with access to large numbers of potential buyers and reduced transaction costs by enabling auctions to take place without regard to time or place. However it is difficult to spend more time period with system and closely monitor the auction until auction participant wins the bid or closing of the auction. Determining which items to bid on or what may be the recommended bid and when to bid it are difficult questions to answer for online auction participants. The multi agent auction advisor system JADE and TRACE, which is connected with decision support system, gives the recommended bid to buyers for online auctions. The auction advisor system relies on intelligent agents both for the retrieval of relevant auction data and for the processing of that data to enable meaningful recommendations, statistical reports and market prediction report to be made to auction participants. ",a. martin,,2011.0,10.4156/jcit.vol4.issue2.martin,"Journal of Convergence Information Technology Volume 4, Number 2, June 2009, 154-163",Martin2011,True,,arXiv,Not available,"Multi Agent Communication System for Online Auction with Decision Support System by JADE and TRACE",4ffffcdb43bccd2ae22bf88755a2b5f9,http://arxiv.org/abs/1109.1093v1 16154," The success of online auctions has given buyers access to greater product diversity with potentially lower prices. It has provided sellers with access to large numbers of potential buyers and reduced transaction costs by enabling auctions to take place without regard to time or place. However it is difficult to spend more time period with system and closely monitor the auction until auction participant wins the bid or closing of the auction. Determining which items to bid on or what may be the recommended bid and when to bid it are difficult questions to answer for online auction participants. The multi agent auction advisor system JADE and TRACE, which is connected with decision support system, gives the recommended bid to buyers for online auctions. The auction advisor system relies on intelligent agents both for the retrieval of relevant auction data and for the processing of that data to enable meaningful recommendations, statistical reports and market prediction report to be made to auction participants. ",t. lakshmi,,2011.0,10.4156/jcit.vol4.issue2.martin,"Journal of Convergence Information Technology Volume 4, Number 2, June 2009, 154-163",Martin2011,True,,arXiv,Not available,"Multi Agent Communication System for Online Auction with Decision Support System by JADE and TRACE",4ffffcdb43bccd2ae22bf88755a2b5f9,http://arxiv.org/abs/1109.1093v1 16155," The success of online auctions has given buyers access to greater product diversity with potentially lower prices. It has provided sellers with access to large numbers of potential buyers and reduced transaction costs by enabling auctions to take place without regard to time or place. However it is difficult to spend more time period with system and closely monitor the auction until auction participant wins the bid or closing of the auction. Determining which items to bid on or what may be the recommended bid and when to bid it are difficult questions to answer for online auction participants. The multi agent auction advisor system JADE and TRACE, which is connected with decision support system, gives the recommended bid to buyers for online auctions. The auction advisor system relies on intelligent agents both for the retrieval of relevant auction data and for the processing of that data to enable meaningful recommendations, statistical reports and market prediction report to be made to auction participants. ",j. madhusudanan,,2011.0,10.4156/jcit.vol4.issue2.martin,"Journal of Convergence Information Technology Volume 4, Number 2, June 2009, 154-163",Martin2011,True,,arXiv,Not available,"Multi Agent Communication System for Online Auction with Decision Support System by JADE and TRACE",4ffffcdb43bccd2ae22bf88755a2b5f9,http://arxiv.org/abs/1109.1093v1 16156," We introduce and treat rigorously a new multi-agent model of the continuous double auction or in other words the order book (OB). It is designed to explain collective behaviour of the market when new information affecting the market arrives. The novel feature of the model is two additional slow changing parameters, the so-called sentiment functions. These sentiment functions measure the conception of the fair price of two groups of investors, namely, bulls and bears. Our model specifies differential equations for the time evolution of sentiment functions and constitutes a nonlinear Markov process which exhibits long term correlations. We explain the intuition behind equations for sentiment functions and present numerical simulations which show that the behaviour of our model is similar to the behaviour of the real market. We also obtain a diffusion limit of the model, the Ornstein-Uhlenbeck type process with variable volatility. The volatility is proportional to the difference of opinions of bulls and bears about the fair price of a security. The paper is complimentary to our previous work where mathematical proofs are presented. ",a. lykov,,2012.0,,arXiv,Lykov2012,True,,arXiv,Not available,"Investor's sentiment in multi-agent model of the continuous double auction",3fd7641411c647e0b9ae192aefc12833,http://arxiv.org/abs/1208.3083v4 16157," We introduce and treat rigorously a new multi-agent model of the continuous double auction or in other words the order book (OB). It is designed to explain collective behaviour of the market when new information affecting the market arrives. The novel feature of the model is two additional slow changing parameters, the so-called sentiment functions. These sentiment functions measure the conception of the fair price of two groups of investors, namely, bulls and bears. Our model specifies differential equations for the time evolution of sentiment functions and constitutes a nonlinear Markov process which exhibits long term correlations. We explain the intuition behind equations for sentiment functions and present numerical simulations which show that the behaviour of our model is similar to the behaviour of the real market. We also obtain a diffusion limit of the model, the Ornstein-Uhlenbeck type process with variable volatility. The volatility is proportional to the difference of opinions of bulls and bears about the fair price of a security. The paper is complimentary to our previous work where mathematical proofs are presented. ",s. muzychka,,2012.0,,arXiv,Lykov2012,True,,arXiv,Not available,"Investor's sentiment in multi-agent model of the continuous double auction",3fd7641411c647e0b9ae192aefc12833,http://arxiv.org/abs/1208.3083v4 16158," We introduce and treat rigorously a new multi-agent model of the continuous double auction or in other words the order book (OB). It is designed to explain collective behaviour of the market when new information affecting the market arrives. The novel feature of the model is two additional slow changing parameters, the so-called sentiment functions. These sentiment functions measure the conception of the fair price of two groups of investors, namely, bulls and bears. Our model specifies differential equations for the time evolution of sentiment functions and constitutes a nonlinear Markov process which exhibits long term correlations. We explain the intuition behind equations for sentiment functions and present numerical simulations which show that the behaviour of our model is similar to the behaviour of the real market. We also obtain a diffusion limit of the model, the Ornstein-Uhlenbeck type process with variable volatility. The volatility is proportional to the difference of opinions of bulls and bears about the fair price of a security. The paper is complimentary to our previous work where mathematical proofs are presented. ",k. vaninsky,,2012.0,,arXiv,Lykov2012,True,,arXiv,Not available,"Investor's sentiment in multi-agent model of the continuous double auction",3fd7641411c647e0b9ae192aefc12833,http://arxiv.org/abs/1208.3083v4 16159," In the paper, a statistical procedure for estimating the parameters of zero intelligence models by means of tick-by-tick quote (L1) data is proposed. A large class of existing zero intelligence models is reviewed. It is shown that all those models fail to describe the actual behavior of limit order books close to the ask price. A generalized model, accommodating the discrepancies found, is proposed and shown to give significant results for L1 data from three US electronic markets. It is also demonstrated that the generalized model preforms significantly better than the reviewed models. ",martin smid,,2013.0,,arXiv,Šmíd2013,True,,arXiv,Not available,"Zero Intelligence Models of the Continuous Double Auction: Econometrics, Empirical Evidence and Generalization",90dd66a4ecf6f2d3c8c78aa3cac935df,http://arxiv.org/abs/1303.6765v4 16160," We consider a simplified model of the continuous double auction where prices are integers varying from $1$ to $N$ with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two $M/M/1$ queues. We study the behaviour of the auction in the low-traffic limit where limit orders are immediately transformed into market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below $1/2$. This is further confirmed by the analysis of the first passage time in $1$ or $N$. ",enrico scalas,,2016.0,10.1016/j.physa.2017.05.020,arXiv,Scalas2016,True,,arXiv,Not available,"Low-traffic limit and first-passage times for a simple model of the continuous double auction",cc164df41a9f7e525a85ebdd4740af14,http://arxiv.org/abs/1603.09666v1 16161," We consider a simplified model of the continuous double auction where prices are integers varying from $1$ to $N$ with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two $M/M/1$ queues. We study the behaviour of the auction in the low-traffic limit where limit orders are immediately transformed into market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below $1/2$. This is further confirmed by the analysis of the first passage time in $1$ or $N$. ",fabio rapallo,,2016.0,10.1016/j.physa.2017.05.020,arXiv,Scalas2016,True,,arXiv,Not available,"Low-traffic limit and first-passage times for a simple model of the continuous double auction",cc164df41a9f7e525a85ebdd4740af14,http://arxiv.org/abs/1603.09666v1 16162," We consider a simplified model of the continuous double auction where prices are integers varying from $1$ to $N$ with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two $M/M/1$ queues. We study the behaviour of the auction in the low-traffic limit where limit orders are immediately transformed into market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below $1/2$. This is further confirmed by the analysis of the first passage time in $1$ or $N$. ",tijana radivojevic,,2016.0,10.1016/j.physa.2017.05.020,arXiv,Scalas2016,True,,arXiv,Not available,"Low-traffic limit and first-passage times for a simple model of the continuous double auction",cc164df41a9f7e525a85ebdd4740af14,http://arxiv.org/abs/1603.09666v1 16163," In an $\epsilon$-Nash equilibrium, a player can gain at most $\epsilon$ by unilaterally changing his behaviour. For two-player (bimatrix) games with payoffs in $[0,1]$, the best-known$\epsilon$ achievable in polynomial time is 0.3393. In general, for $n$-player games an $\epsilon$-Nash equilibrium can be computed in polynomial time for an $\epsilon$ that is an increasing function of $n$ but does not depend on the number of strategies of the players. For three-player and four-player games the corresponding values of $\epsilon$ are 0.6022 and 0.7153, respectively. Polymatrix games are a restriction of general $n$-player games where a player's payoff is the sum of payoffs from a number of bimatrix games. There exists a very small but constant $\epsilon$ such that computing an $\epsilon$-Nash equilibrium of a polymatrix game is \PPAD-hard. Our main result is that a $(0.5+\delta)$-Nash equilibrium of an $n$-player polymatrix game can be computed in time polynomial in the input size and $\frac{1}{\delta}$. Inspired by the algorithm of Tsaknakis and Spirakis, our algorithm uses gradient descent on the maximum regret of the players. We also show that this algorithm can be applied to efficiently find a $(0.5+\delta)$-Nash equilibrium in a two-player Bayesian game. ",argyrios deligkas,,2014.0,,arXiv,Deligkas2014,True,,arXiv,Not available,Computing Approximate Nash Equilibria in Polymatrix Games,deee9e5596b2ba0e9ce19db9b54313f7,http://arxiv.org/abs/1409.3741v2 16164," We study a phenomenological model for the continuous double auction, equivalent to two independent $M/M/1$ queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe an intermittent behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. ",tijana radivojevic,,2013.0,10.1371/journal.pone.0088095,arXiv,Radivojević2013,True,,arXiv,Not available,Ergodic transition in a simple model of the continuous double auction,a881476e5f6634320480e67f42b2de2d,http://arxiv.org/abs/1305.2716v1 16165," We study a phenomenological model for the continuous double auction, equivalent to two independent $M/M/1$ queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe an intermittent behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. ",jonatha anselmi,,2013.0,10.1371/journal.pone.0088095,arXiv,Radivojević2013,True,,arXiv,Not available,Ergodic transition in a simple model of the continuous double auction,a881476e5f6634320480e67f42b2de2d,http://arxiv.org/abs/1305.2716v1 16166," We study a phenomenological model for the continuous double auction, equivalent to two independent $M/M/1$ queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe an intermittent behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. ",enrico scalas,,2013.0,10.1371/journal.pone.0088095,arXiv,Radivojević2013,True,,arXiv,Not available,Ergodic transition in a simple model of the continuous double auction,a881476e5f6634320480e67f42b2de2d,http://arxiv.org/abs/1305.2716v1 16167," The idea of having the geolocation database monitor the secondary use of TV white space (TVWS) spectrum and assist in coordinating the secondary usage is gaining ground. Considering the home networking use case, we leverage the geolocation database for interference-aware coordinated TVWS sharing among secondary users (home networks) using {\em short-term auctions}, thereby realize a dynamic secondary market. To enable this auctioning based coordinated TVWS sharing framework, we propose an enhanced {\em market-driven TVWS spectrum access model}. For the short-term auctions, we propose an online multi-unit, iterative truthful mechanism called VERUM that takes into consideration spatially heterogeneous spectrum availability, an inherent characteristic in the TVWS context. We prove that VERUM is truthful (i.e., the best strategy for every bidder is to bid based on its true valuation) and is also efficient in that it allocates spectrum to users who value it the most. Evaluation results from scenarios with real home distributions in urban and dense-urban environments and using realistic TVWS spectrum availability maps show that VERUM performs close to optimal allocation in terms of revenue for the coordinating spectrum manager. Comparison with two existing efficient and truthful multi-unit spectrum auction schemes, VERITAS and SATYA, shows that VERUM fares better in terms of revenue, spectrum utilisation and percentage of winning bidders in diverse conditions. Taking all of the above together, VERUM can be seen to offer incentives to subscribed users encouraging them to use TVWS spectrum through greater spectrum availability (as measured by percentage of winning bidders) as well as to the coordinating spectrum manager through revenue generation. ",saravana manickam,,2013.0,,arXiv,Manickam2013,True,,arXiv,Not available,"Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks",28607bb6b5d6f6da144b069e7657ca2b,http://arxiv.org/abs/1307.0962v2 16168," The idea of having the geolocation database monitor the secondary use of TV white space (TVWS) spectrum and assist in coordinating the secondary usage is gaining ground. Considering the home networking use case, we leverage the geolocation database for interference-aware coordinated TVWS sharing among secondary users (home networks) using {\em short-term auctions}, thereby realize a dynamic secondary market. To enable this auctioning based coordinated TVWS sharing framework, we propose an enhanced {\em market-driven TVWS spectrum access model}. For the short-term auctions, we propose an online multi-unit, iterative truthful mechanism called VERUM that takes into consideration spatially heterogeneous spectrum availability, an inherent characteristic in the TVWS context. We prove that VERUM is truthful (i.e., the best strategy for every bidder is to bid based on its true valuation) and is also efficient in that it allocates spectrum to users who value it the most. Evaluation results from scenarios with real home distributions in urban and dense-urban environments and using realistic TVWS spectrum availability maps show that VERUM performs close to optimal allocation in terms of revenue for the coordinating spectrum manager. Comparison with two existing efficient and truthful multi-unit spectrum auction schemes, VERITAS and SATYA, shows that VERUM fares better in terms of revenue, spectrum utilisation and percentage of winning bidders in diverse conditions. Taking all of the above together, VERUM can be seen to offer incentives to subscribed users encouraging them to use TVWS spectrum through greater spectrum availability (as measured by percentage of winning bidders) as well as to the coordinating spectrum manager through revenue generation. ",mahesh marina,,2013.0,,arXiv,Manickam2013,True,,arXiv,Not available,"Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks",28607bb6b5d6f6da144b069e7657ca2b,http://arxiv.org/abs/1307.0962v2 16169," The idea of having the geolocation database monitor the secondary use of TV white space (TVWS) spectrum and assist in coordinating the secondary usage is gaining ground. Considering the home networking use case, we leverage the geolocation database for interference-aware coordinated TVWS sharing among secondary users (home networks) using {\em short-term auctions}, thereby realize a dynamic secondary market. To enable this auctioning based coordinated TVWS sharing framework, we propose an enhanced {\em market-driven TVWS spectrum access model}. For the short-term auctions, we propose an online multi-unit, iterative truthful mechanism called VERUM that takes into consideration spatially heterogeneous spectrum availability, an inherent characteristic in the TVWS context. We prove that VERUM is truthful (i.e., the best strategy for every bidder is to bid based on its true valuation) and is also efficient in that it allocates spectrum to users who value it the most. Evaluation results from scenarios with real home distributions in urban and dense-urban environments and using realistic TVWS spectrum availability maps show that VERUM performs close to optimal allocation in terms of revenue for the coordinating spectrum manager. Comparison with two existing efficient and truthful multi-unit spectrum auction schemes, VERITAS and SATYA, shows that VERUM fares better in terms of revenue, spectrum utilisation and percentage of winning bidders in diverse conditions. Taking all of the above together, VERUM can be seen to offer incentives to subscribed users encouraging them to use TVWS spectrum through greater spectrum availability (as measured by percentage of winning bidders) as well as to the coordinating spectrum manager through revenue generation. ",sofia pediaditaki,,2013.0,,arXiv,Manickam2013,True,,arXiv,Not available,"Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks",28607bb6b5d6f6da144b069e7657ca2b,http://arxiv.org/abs/1307.0962v2 16170," The idea of having the geolocation database monitor the secondary use of TV white space (TVWS) spectrum and assist in coordinating the secondary usage is gaining ground. Considering the home networking use case, we leverage the geolocation database for interference-aware coordinated TVWS sharing among secondary users (home networks) using {\em short-term auctions}, thereby realize a dynamic secondary market. To enable this auctioning based coordinated TVWS sharing framework, we propose an enhanced {\em market-driven TVWS spectrum access model}. For the short-term auctions, we propose an online multi-unit, iterative truthful mechanism called VERUM that takes into consideration spatially heterogeneous spectrum availability, an inherent characteristic in the TVWS context. We prove that VERUM is truthful (i.e., the best strategy for every bidder is to bid based on its true valuation) and is also efficient in that it allocates spectrum to users who value it the most. Evaluation results from scenarios with real home distributions in urban and dense-urban environments and using realistic TVWS spectrum availability maps show that VERUM performs close to optimal allocation in terms of revenue for the coordinating spectrum manager. Comparison with two existing efficient and truthful multi-unit spectrum auction schemes, VERITAS and SATYA, shows that VERUM fares better in terms of revenue, spectrum utilisation and percentage of winning bidders in diverse conditions. Taking all of the above together, VERUM can be seen to offer incentives to subscribed users encouraging them to use TVWS spectrum through greater spectrum availability (as measured by percentage of winning bidders) as well as to the coordinating spectrum manager through revenue generation. ",maziar nekovee,,2013.0,,arXiv,Manickam2013,True,,arXiv,Not available,"Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks",28607bb6b5d6f6da144b069e7657ca2b,http://arxiv.org/abs/1307.0962v2 16171," It is well-known that a market equilibrium with uniform prices often does not exist in non-convex day-ahead electricity auctions. We consider the case of the non-convex, uniform-price Pan-European day-ahead electricity market ""PCR"" (Price Coupling of Regions), with non-convexities arising from so-called complex and block orders. Extending previous results, we propose a new primal-dual framework for these auctions, which has applications in both economic analysis and algorithm design. The contribution here is threefold. First, from the algorithmic point of view, we give a non-trivial exact (i.e. not approximate) linearization of a non-convex 'minimum income condition' that must hold for complex orders arising from the Spanish market, avoiding the introduction of any auxiliary variables, and allowing us to solve market clearing instances involving most of the bidding products proposed in PCR using off-the-shelf MIP solvers. Second, from the economic analysis point of view, we give the first MILP formulations of optimization problems such as the maximization of the traded volume, or the minimization of opportunity costs of paradoxically rejected block bids. We first show on a toy example that these two objectives are distinct from maximizing welfare. We also recover directly a previously noted property of an alternative market model. Third, we provide numerical experiments on realistic large-scale instances. They illustrate the efficiency of the approach, as well as the economics trade-offs that may occur in practice. ",mehdi madani,,2014.0,,arXiv,Madani2014,True,,arXiv,Not available,"A MIP framework for non-convex uniform price day-ahead electricity auctions",e6308ce545a96b4eb3266863a5c46764,http://arxiv.org/abs/1410.4468v2 16172," It is well-known that a market equilibrium with uniform prices often does not exist in non-convex day-ahead electricity auctions. We consider the case of the non-convex, uniform-price Pan-European day-ahead electricity market ""PCR"" (Price Coupling of Regions), with non-convexities arising from so-called complex and block orders. Extending previous results, we propose a new primal-dual framework for these auctions, which has applications in both economic analysis and algorithm design. The contribution here is threefold. First, from the algorithmic point of view, we give a non-trivial exact (i.e. not approximate) linearization of a non-convex 'minimum income condition' that must hold for complex orders arising from the Spanish market, avoiding the introduction of any auxiliary variables, and allowing us to solve market clearing instances involving most of the bidding products proposed in PCR using off-the-shelf MIP solvers. Second, from the economic analysis point of view, we give the first MILP formulations of optimization problems such as the maximization of the traded volume, or the minimization of opportunity costs of paradoxically rejected block bids. We first show on a toy example that these two objectives are distinct from maximizing welfare. We also recover directly a previously noted property of an alternative market model. Third, we provide numerical experiments on realistic large-scale instances. They illustrate the efficiency of the approach, as well as the economics trade-offs that may occur in practice. ",mathieu vyve,,2014.0,,arXiv,Madani2014,True,,arXiv,Not available,"A MIP framework for non-convex uniform price day-ahead electricity auctions",e6308ce545a96b4eb3266863a5c46764,http://arxiv.org/abs/1410.4468v2 16173," We study a nonzero-sum game of two players which is a generalization of the antagonistic noisy duel of discrete type. The game is considered from the point of view of various criterions of optimality. We prove existence of epsilon-equilibrium situations and show that the epsilon-equilibrium strategies that we have found are epsilon-maxmin. Conditions under which the equilibrium plays are Pareto-optimal are given. Keywords: noisy duel, payoff function, strategy, equilibrium situation, Pareto optimality, the value of a game. ",lyubov positselskaya,,2007.0,,arXiv,Positselskaya2007,True,,arXiv,Not available,"Nonantagonistic noisy duels of discrete type with an arbitrary number of actions",74fbc3c7751b1d167c574fec75c7ecef,http://arxiv.org/abs/0708.2023v2 16174," In an $\epsilon$-Nash equilibrium, a player can gain at most $\epsilon$ by unilaterally changing his behaviour. For two-player (bimatrix) games with payoffs in $[0,1]$, the best-known$\epsilon$ achievable in polynomial time is 0.3393. In general, for $n$-player games an $\epsilon$-Nash equilibrium can be computed in polynomial time for an $\epsilon$ that is an increasing function of $n$ but does not depend on the number of strategies of the players. For three-player and four-player games the corresponding values of $\epsilon$ are 0.6022 and 0.7153, respectively. Polymatrix games are a restriction of general $n$-player games where a player's payoff is the sum of payoffs from a number of bimatrix games. There exists a very small but constant $\epsilon$ such that computing an $\epsilon$-Nash equilibrium of a polymatrix game is \PPAD-hard. Our main result is that a $(0.5+\delta)$-Nash equilibrium of an $n$-player polymatrix game can be computed in time polynomial in the input size and $\frac{1}{\delta}$. Inspired by the algorithm of Tsaknakis and Spirakis, our algorithm uses gradient descent on the maximum regret of the players. We also show that this algorithm can be applied to efficiently find a $(0.5+\delta)$-Nash equilibrium in a two-player Bayesian game. ",john fearnley,,2014.0,,arXiv,Deligkas2014,True,,arXiv,Not available,Computing Approximate Nash Equilibria in Polymatrix Games,deee9e5596b2ba0e9ce19db9b54313f7,http://arxiv.org/abs/1409.3741v2 16175," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",jon feldman,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 16176," Modern commercial Internet search engines display advertisements along side the search results in response to user queries. Such sponsored search relies on market mechanisms to elicit prices for these advertisements, making use of an auction among advertisers who bid in order to have their ads shown for specific keywords. We present an overview of the current systems for such auctions and also describe the underlying game-theoretic aspects. The game involves three parties--advertisers, the search engine, and search users--and we present example research directions that emphasize the role of each. The algorithms for bidding and pricing in these games use techniques from three mathematical areas: mechanism design, optimization, and statistical estimation. Finally, we present some challenges in sponsored search advertising. ",s. muthukrishnan,,2008.0,,arXiv,Feldman2008,True,,arXiv,Not available,Algorithmic Methods for Sponsored Search Advertising,21df29ce558c708e11fa9546f4dae141,http://arxiv.org/abs/0805.1759v1 16177," We give a new proof that any candy-passing game on a graph G with at least 4|E(G)|-|V(G)| candies stabilizes. (This result was first proven in arXiv:0807.4450.) Unlike the prior literature on candy-passing games, we use methods from the general theory of chip-firing games which allow us to obtain a polynomial bound on the number of rounds before stabilization. ",paul kominers,,2008.0,,arXiv,Kominers2008,True,,arXiv,Not available,"Candy-passing Games on General Graphs, II",c1e22f94678a37a78f937c8ed461d31e,http://arxiv.org/abs/0807.4655v1 16178," We give a new proof that any candy-passing game on a graph G with at least 4|E(G)|-|V(G)| candies stabilizes. (This result was first proven in arXiv:0807.4450.) Unlike the prior literature on candy-passing games, we use methods from the general theory of chip-firing games which allow us to obtain a polynomial bound on the number of rounds before stabilization. ",scott kominers,,2008.0,,arXiv,Kominers2008,True,,arXiv,Not available,"Candy-passing Games on General Graphs, II",c1e22f94678a37a78f937c8ed461d31e,http://arxiv.org/abs/0807.4655v1 16179," We consider games played on finite graphs, whose goal is to obtain a trace belonging to a given set of winning traces. We focus on those states from which Player 1 cannot force a win. We explore and compare several criteria for establishing what is the preferable behavior of Player 1 from those states. Along the way, we prove several results of theoretical and practical interest, such as a characterization of admissible strategies, which also provides a simple algorithm for computing such strategies for various common goals, and the equivalence between the existence of positional winning strategies and the existence of positional subgame perfect strategies. ",marco faella,,2008.0,,arXiv,Faella2008,True,,arXiv,Not available,Best-Effort Strategies for Losing States,404ff0b0098a2c92d719d5d645b2fa1d,http://arxiv.org/abs/0811.1664v1 16180," Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains. ",dietmar berwanger,,2009.0,,arXiv,Berwanger2009,True,,arXiv,Not available,Alpaga: A Tool for Solving Parity Games with Imperfect Information,a0a65ef623681761ac63b5481c7f0bcf,http://arxiv.org/abs/0901.4728v1 16181," Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains. ",krishnendu chatterjee,,2009.0,,arXiv,Berwanger2009,True,,arXiv,Not available,Alpaga: A Tool for Solving Parity Games with Imperfect Information,a0a65ef623681761ac63b5481c7f0bcf,http://arxiv.org/abs/0901.4728v1 16182," Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains. ",martin wulf,,2009.0,,arXiv,Berwanger2009,True,,arXiv,Not available,Alpaga: A Tool for Solving Parity Games with Imperfect Information,a0a65ef623681761ac63b5481c7f0bcf,http://arxiv.org/abs/0901.4728v1 16183," Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains. ",laurent doyen,,2009.0,,arXiv,Berwanger2009,True,,arXiv,Not available,Alpaga: A Tool for Solving Parity Games with Imperfect Information,a0a65ef623681761ac63b5481c7f0bcf,http://arxiv.org/abs/0901.4728v1 16184," Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains. ",thomas henzinger,,2009.0,,arXiv,Berwanger2009,True,,arXiv,Not available,Alpaga: A Tool for Solving Parity Games with Imperfect Information,a0a65ef623681761ac63b5481c7f0bcf,http://arxiv.org/abs/0901.4728v1 16185," In an $\epsilon$-Nash equilibrium, a player can gain at most $\epsilon$ by unilaterally changing his behaviour. For two-player (bimatrix) games with payoffs in $[0,1]$, the best-known$\epsilon$ achievable in polynomial time is 0.3393. In general, for $n$-player games an $\epsilon$-Nash equilibrium can be computed in polynomial time for an $\epsilon$ that is an increasing function of $n$ but does not depend on the number of strategies of the players. For three-player and four-player games the corresponding values of $\epsilon$ are 0.6022 and 0.7153, respectively. Polymatrix games are a restriction of general $n$-player games where a player's payoff is the sum of payoffs from a number of bimatrix games. There exists a very small but constant $\epsilon$ such that computing an $\epsilon$-Nash equilibrium of a polymatrix game is \PPAD-hard. Our main result is that a $(0.5+\delta)$-Nash equilibrium of an $n$-player polymatrix game can be computed in time polynomial in the input size and $\frac{1}{\delta}$. Inspired by the algorithm of Tsaknakis and Spirakis, our algorithm uses gradient descent on the maximum regret of the players. We also show that this algorithm can be applied to efficiently find a $(0.5+\delta)$-Nash equilibrium in a two-player Bayesian game. ",rahul savani,,2014.0,,arXiv,Deligkas2014,True,,arXiv,Not available,Computing Approximate Nash Equilibria in Polymatrix Games,deee9e5596b2ba0e9ce19db9b54313f7,http://arxiv.org/abs/1409.3741v2 16186," Stochastic games are a natural model for the synthesis of controllers confronted to adversarial and/or random actions. In particular, $\omega$-regular games of infinite length can represent reactive systems which are not expected to reach a correct state, but rather to handle a continuous stream of events. One critical resource in such applications is the memory used by the controller. In this paper, we study the amount of memory that can be saved through the use of randomisation in strategies, and present matching upper and lower bounds for stochastic Muller games. ",florian horn,,2009.0,,"26th International Symposium on Theoretical Aspects of Computer Science - STACS 2009 (2009) 541-552",Horn2009,True,,arXiv,Not available,Random Fruits on the Zielonka Tree,ca54a1162e7f4390471e09aded16b77b,http://arxiv.org/abs/0902.2736v1 16187," We discuss a duel-type game in which Player I uses his resource continuously and Player II distributes it by discrete portions. Each player knows how much resources he and his opponent have at every moment of time. The solution of the game is given in an explicit form. Keywords: noisy duel, payoff, strategy, the value of a game, consumption of resource. ",lyubov positselskaya,,2009.0,,arXiv,Positselskaya2009,True,,arXiv,Not available,Noisy fighter-bomber duel,483dc4cee377eb18bcb0fcec248313d3,http://arxiv.org/abs/0910.0548v1 16188," We address the equilibrium concept of a reverse auction game so that no one can enhance the individual payoff by a unilateral change when all the others follow a certain strategy. In this approach the combinatorial possibilities to consider become very much involved even for a small number of players, which has hindered a precise analysis in previous works. We here present a systematic way to reach the solution for a general number of players, and show that this game is an example of conflict between the group and the individual interests. ",seung baek,,2010.0,10.1142/S0219477510000071,"Fluctuation and Noise Letters, 9:1, pp. 61-68 (2010)",Baek2010,True,,arXiv,Not available,Equilibrium solution to the lowest unique positive integer game,d4c58181d36866f7e28e092a07265217,http://arxiv.org/abs/1001.1065v1 16189," We address the equilibrium concept of a reverse auction game so that no one can enhance the individual payoff by a unilateral change when all the others follow a certain strategy. In this approach the combinatorial possibilities to consider become very much involved even for a small number of players, which has hindered a precise analysis in previous works. We here present a systematic way to reach the solution for a general number of players, and show that this game is an example of conflict between the group and the individual interests. ",sebastian bernhardsson,,2010.0,10.1142/S0219477510000071,"Fluctuation and Noise Letters, 9:1, pp. 61-68 (2010)",Baek2010,True,,arXiv,Not available,Equilibrium solution to the lowest unique positive integer game,d4c58181d36866f7e28e092a07265217,http://arxiv.org/abs/1001.1065v1 16190," Within the context of games on networks S. Goyal (Goya (2007), pg. 39) posed the following problem. Under any arbitrary but fixed topology, does there exist at least one pure Nash equilibrium that exhibits a positive relation between the cardinality of a player's set of neighbors and its utility payoff? In this paper we present a class of topologies/games in which pure Nash equilibria with the above property do not exist. ",ali kakhbod,,2010.0,,"Economic Bulletin (EB). vol 31, no. 3, pp. 2177-2184, 2011",Kakhbod2010,True,,arXiv,Not available,Games on Social Networks: On a Problem Posed by Goyal,c7ba3747a9f50c624ea6a7f8547d2163,http://arxiv.org/abs/1001.3896v4 16191," Within the context of games on networks S. Goyal (Goya (2007), pg. 39) posed the following problem. Under any arbitrary but fixed topology, does there exist at least one pure Nash equilibrium that exhibits a positive relation between the cardinality of a player's set of neighbors and its utility payoff? In this paper we present a class of topologies/games in which pure Nash equilibria with the above property do not exist. ",demosthenis teneketzis,,2010.0,,"Economic Bulletin (EB). vol 31, no. 3, pp. 2177-2184, 2011",Kakhbod2010,True,,arXiv,Not available,Games on Social Networks: On a Problem Posed by Goyal,c7ba3747a9f50c624ea6a7f8547d2163,http://arxiv.org/abs/1001.3896v4 16192," Calibrated strategies can be obtained by performing strategies that have no internal regret in some auxiliary game. Such strategies can be constructed explicitly with the use of Blackwell's approachability theorem, in an other auxiliary game. We establish the converse: a strategy that approaches a convex $B$-set can be derived from the construction of a calibrated strategy. We develop these tools in the framework of a game with partial monitoring, where players do not observe the actions of their opponents but receive random signals, to define a notion of internal regret and construct strategies that have no such regret. ",vianney perchet,,2010.0,,arXiv,Perchet2010,True,,arXiv,Not available,Calibration and Internal no-Regret with Partial Monitoring,25d9669e384ea20e2045565fb5869748,http://arxiv.org/abs/1006.1746v1 16193," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",david balduzzi,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16194," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",sebastien racaniere,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16195," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",james martens,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16196," In an $\epsilon$-Nash equilibrium, a player can gain at most $\epsilon$ by unilaterally changing his behaviour. For two-player (bimatrix) games with payoffs in $[0,1]$, the best-known$\epsilon$ achievable in polynomial time is 0.3393. In general, for $n$-player games an $\epsilon$-Nash equilibrium can be computed in polynomial time for an $\epsilon$ that is an increasing function of $n$ but does not depend on the number of strategies of the players. For three-player and four-player games the corresponding values of $\epsilon$ are 0.6022 and 0.7153, respectively. Polymatrix games are a restriction of general $n$-player games where a player's payoff is the sum of payoffs from a number of bimatrix games. There exists a very small but constant $\epsilon$ such that computing an $\epsilon$-Nash equilibrium of a polymatrix game is \PPAD-hard. Our main result is that a $(0.5+\delta)$-Nash equilibrium of an $n$-player polymatrix game can be computed in time polynomial in the input size and $\frac{1}{\delta}$. Inspired by the algorithm of Tsaknakis and Spirakis, our algorithm uses gradient descent on the maximum regret of the players. We also show that this algorithm can be applied to efficiently find a $(0.5+\delta)$-Nash equilibrium in a two-player Bayesian game. ",paul spirakis,,2014.0,,arXiv,Deligkas2014,True,,arXiv,Not available,Computing Approximate Nash Equilibria in Polymatrix Games,deee9e5596b2ba0e9ce19db9b54313f7,http://arxiv.org/abs/1409.3741v2 16197," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",jakob foerster,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16198," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",karl tuyls,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16199," The cornerstone underpinning deep learning is the guarantee that gradient descent on an objective converges to local minima. Unfortunately, this guarantee fails in settings, such as generative adversarial nets, where there are multiple interacting losses. The behavior of gradient-based methods in games is not well understood -- and is becoming increasingly important as adversarial and multi-objective architectures proliferate. In this paper, we develop new techniques to understand and control the dynamics in general games. The key result is to decompose the second-order dynamics into two components. The first is related to potential games, which reduce to gradient descent on an implicit function; the second relates to Hamiltonian games, a new class of games that obey a conservation law, akin to conservation laws in classical mechanical systems. The decomposition motivates Symplectic Gradient Adjustment (SGA), a new algorithm for finding stable fixed points in general games. Basic experiments show SGA is competitive with recently proposed algorithms for finding stable fixed points in GANs -- whilst at the same time being applicable to -- and having guarantees in -- much more general games. ",thore graepel,,2018.0,,"PMLR volume 80, 2018",Balduzzi2018,True,,arXiv,Not available,The Mechanics of n-Player Differentiable Games,48bcea52c4fc493a73c3f55d079ea0a2,http://arxiv.org/abs/1802.05642v2 16200," This paper studies the optimization of strategies in the context of possibly randomized two players zero-sum games with incomplete information. We compare 5 algorithms for tuning the parameters of strategies over a benchmark of 12 games. A first evolutionary approach consists in designing a highly randomized opponent (called naive opponent) and optimizing the parametric strategy against it; a second one is optimizing iteratively the strategy, i.e. constructing a sequence of strategies starting from the naive one. 2 versions of coevolutions, real and approximate, are also tested as well as a seed method. The coevolution methods were performing well, but results were not stable from one game to another. In spite of its simplicity, the seed method, which can be seen as an extremal version of coevolution, works even when nothing else works. Incidentally, these methods brought out some unexpected strategies for some games, such as Batawaf or the game of War, which seem, at first view, purely random games without any structured actions possible for the players or Guess Who, where a dichotomy between the characters seems to be the most reasonable strategy. All source codes of games are written in Matlab/Octave and are freely available for download. ",marie-liesse cauwet,,2018.0,,"IEEE Congress on Evolutionary Computation, Jul 2018, Rio de Janeiro, Brazil",Cauwet2018,True,,arXiv,Not available,"Surprising strategies obtained by stochastic optimization in partially observable games",63d2d359d2d15e8a31100d0e197af54d,http://arxiv.org/abs/1807.01877v1 16201," This paper studies the optimization of strategies in the context of possibly randomized two players zero-sum games with incomplete information. We compare 5 algorithms for tuning the parameters of strategies over a benchmark of 12 games. A first evolutionary approach consists in designing a highly randomized opponent (called naive opponent) and optimizing the parametric strategy against it; a second one is optimizing iteratively the strategy, i.e. constructing a sequence of strategies starting from the naive one. 2 versions of coevolutions, real and approximate, are also tested as well as a seed method. The coevolution methods were performing well, but results were not stable from one game to another. In spite of its simplicity, the seed method, which can be seen as an extremal version of coevolution, works even when nothing else works. Incidentally, these methods brought out some unexpected strategies for some games, such as Batawaf or the game of War, which seem, at first view, purely random games without any structured actions possible for the players or Guess Who, where a dichotomy between the characters seems to be the most reasonable strategy. All source codes of games are written in Matlab/Octave and are freely available for download. ",olivier teytaud,,2018.0,,"IEEE Congress on Evolutionary Computation, Jul 2018, Rio de Janeiro, Brazil",Cauwet2018,True,,arXiv,Not available,"Surprising strategies obtained by stochastic optimization in partially observable games",63d2d359d2d15e8a31100d0e197af54d,http://arxiv.org/abs/1807.01877v1 16202," We study the effects of individual perceptions of payoffs in two-player games. In particular we consider the setting in which individuals' perceptions of the game are influenced by their previous experiences and outcomes. Accordingly, we introduce a framework based on evolutionary games where individuals have the capacity to perceive their interactions in different ways. Starting from the narrative of social behaviors in a pub as an illustration, we first study the combination of the prisoner's dilemma and harmony game as two alternative perceptions of the same situation. Considering a selection of game pairs, our results show that the interplay between perception dynamics and game payoffs gives rise to non-linear phenomena unexpected in each of the games separately, such as catastrophic phase transitions in the cooperation basin of attraction, Hopf bifurcations and cycles of cooperation and defection. Combining analytical techniques with multi-agent simulations we also show how introducing individual perceptions can cause non-trivial dynamical behaviors to emerge, which cannot be obtained by analyzing the system as a whole. Specifically, initial heterogeneities at the microscopic level can yield a polarization effect that is unpredictable at the macroscopic level. This framework opens the door to the exploration of new ways of understanding the link between the emergence of cooperation and individual preferences and perceptions, with potential applications beyond social interactions. ",alberto antonioni,,2018.0,,arXiv,Antonioni2018,True,,arXiv,Not available,Individual perception dynamics in drunk games,2eb2165b041e3b27657da0e4775eb6f9,http://arxiv.org/abs/1807.08635v1 16203," We study the effects of individual perceptions of payoffs in two-player games. In particular we consider the setting in which individuals' perceptions of the game are influenced by their previous experiences and outcomes. Accordingly, we introduce a framework based on evolutionary games where individuals have the capacity to perceive their interactions in different ways. Starting from the narrative of social behaviors in a pub as an illustration, we first study the combination of the prisoner's dilemma and harmony game as two alternative perceptions of the same situation. Considering a selection of game pairs, our results show that the interplay between perception dynamics and game payoffs gives rise to non-linear phenomena unexpected in each of the games separately, such as catastrophic phase transitions in the cooperation basin of attraction, Hopf bifurcations and cycles of cooperation and defection. Combining analytical techniques with multi-agent simulations we also show how introducing individual perceptions can cause non-trivial dynamical behaviors to emerge, which cannot be obtained by analyzing the system as a whole. Specifically, initial heterogeneities at the microscopic level can yield a polarization effect that is unpredictable at the macroscopic level. This framework opens the door to the exploration of new ways of understanding the link between the emergence of cooperation and individual preferences and perceptions, with potential applications beyond social interactions. ",luis martinez-vaquero,,2018.0,,arXiv,Antonioni2018,True,,arXiv,Not available,Individual perception dynamics in drunk games,2eb2165b041e3b27657da0e4775eb6f9,http://arxiv.org/abs/1807.08635v1 16204," We study the effects of individual perceptions of payoffs in two-player games. In particular we consider the setting in which individuals' perceptions of the game are influenced by their previous experiences and outcomes. Accordingly, we introduce a framework based on evolutionary games where individuals have the capacity to perceive their interactions in different ways. Starting from the narrative of social behaviors in a pub as an illustration, we first study the combination of the prisoner's dilemma and harmony game as two alternative perceptions of the same situation. Considering a selection of game pairs, our results show that the interplay between perception dynamics and game payoffs gives rise to non-linear phenomena unexpected in each of the games separately, such as catastrophic phase transitions in the cooperation basin of attraction, Hopf bifurcations and cycles of cooperation and defection. Combining analytical techniques with multi-agent simulations we also show how introducing individual perceptions can cause non-trivial dynamical behaviors to emerge, which cannot be obtained by analyzing the system as a whole. Specifically, initial heterogeneities at the microscopic level can yield a polarization effect that is unpredictable at the macroscopic level. This framework opens the door to the exploration of new ways of understanding the link between the emergence of cooperation and individual preferences and perceptions, with potential applications beyond social interactions. ",cole mathis,,2018.0,,arXiv,Antonioni2018,True,,arXiv,Not available,Individual perception dynamics in drunk games,2eb2165b041e3b27657da0e4775eb6f9,http://arxiv.org/abs/1807.08635v1 16205," We study the effects of individual perceptions of payoffs in two-player games. In particular we consider the setting in which individuals' perceptions of the game are influenced by their previous experiences and outcomes. Accordingly, we introduce a framework based on evolutionary games where individuals have the capacity to perceive their interactions in different ways. Starting from the narrative of social behaviors in a pub as an illustration, we first study the combination of the prisoner's dilemma and harmony game as two alternative perceptions of the same situation. Considering a selection of game pairs, our results show that the interplay between perception dynamics and game payoffs gives rise to non-linear phenomena unexpected in each of the games separately, such as catastrophic phase transitions in the cooperation basin of attraction, Hopf bifurcations and cycles of cooperation and defection. Combining analytical techniques with multi-agent simulations we also show how introducing individual perceptions can cause non-trivial dynamical behaviors to emerge, which cannot be obtained by analyzing the system as a whole. Specifically, initial heterogeneities at the microscopic level can yield a polarization effect that is unpredictable at the macroscopic level. This framework opens the door to the exploration of new ways of understanding the link between the emergence of cooperation and individual preferences and perceptions, with potential applications beyond social interactions. ",leto peel,,2018.0,,arXiv,Antonioni2018,True,,arXiv,Not available,Individual perception dynamics in drunk games,2eb2165b041e3b27657da0e4775eb6f9,http://arxiv.org/abs/1807.08635v1 16206," We study the effects of individual perceptions of payoffs in two-player games. In particular we consider the setting in which individuals' perceptions of the game are influenced by their previous experiences and outcomes. Accordingly, we introduce a framework based on evolutionary games where individuals have the capacity to perceive their interactions in different ways. Starting from the narrative of social behaviors in a pub as an illustration, we first study the combination of the prisoner's dilemma and harmony game as two alternative perceptions of the same situation. Considering a selection of game pairs, our results show that the interplay between perception dynamics and game payoffs gives rise to non-linear phenomena unexpected in each of the games separately, such as catastrophic phase transitions in the cooperation basin of attraction, Hopf bifurcations and cycles of cooperation and defection. Combining analytical techniques with multi-agent simulations we also show how introducing individual perceptions can cause non-trivial dynamical behaviors to emerge, which cannot be obtained by analyzing the system as a whole. Specifically, initial heterogeneities at the microscopic level can yield a polarization effect that is unpredictable at the macroscopic level. This framework opens the door to the exploration of new ways of understanding the link between the emergence of cooperation and individual preferences and perceptions, with potential applications beyond social interactions. ",massimo stella,,2018.0,,arXiv,Antonioni2018,True,,arXiv,Not available,Individual perception dynamics in drunk games,2eb2165b041e3b27657da0e4775eb6f9,http://arxiv.org/abs/1807.08635v1 16207," We consider a multilevel network game, where nodes can improve their communication costs by connecting to a high-speed network. The $n$ nodes are connected by a static network and each node can decide individually to become a gateway to the high-speed network. The goal of a node $v$ is to minimize its private costs, i.e., the sum (SUM-game) or maximum (MAX-game) of communication distances from $v$ to all other nodes plus a fixed price $\alpha > 0$ if it decides to be a gateway. Between gateways the communication distance is $0$, and gateways also improve other nodes' distances by behaving as shortcuts. For the SUM-game, we show that for $\alpha \leq n-1$, the price of anarchy is $\Theta(n/\sqrt{\alpha})$ and in this range equilibria always exist. In range $\alpha \in (n-1,n(n-1))$ the price of anarchy is $\Theta(\sqrt{\alpha})$, and for $\alpha \geq n(n-1)$ it is constant. For the MAX-game, we show that the price of anarchy is either $\Theta(1 + n/\sqrt{\alpha})$, for $\alpha\geq 1$, or else $1$. Given a graph with girth of at least $4\alpha$, equilibria always exist. Concerning the dynamics, both the SUM-game and the MAX-game are not potential games. For the SUM-game, we even show that it is not weakly acyclic. ",sebastian abshoff,,2014.0,,arXiv,Abshoff2014,True,,arXiv,Not available,Multilevel Network Games,f191d00dcd151d7e14cb47baece4cc6f,http://arxiv.org/abs/1409.5383v1 16208," The decisions that human beings make to allocate time has significant bearing on economic output and to the sustenance of social networks. The time allocation problem motivates our formal analysis of the resource allocation game, where agents on a social network, who have asymmetric, private interaction preferences, make decisions on how to allocate time, a bounded endowment, over their neighbors. Unlike the well-known opinion formation game on a social network, our game appears not to be a potential game, and the Best-Response dynamics is non-differentiable making the analysis of Best-Response dynamics non-trivial. In our game, we consider two types of player behavior, namely optimistic or pessimistic, based on how they use their time endowment over their neighbors. To analyze Best-Response dynamics, we circumvent the problem of the game not being a potential game, through the lens of a novel two-level potential function approach. We show that the Best-Response dynamics converges point-wise to a Nash Equilibrium when players are all: optimistic; pessimistic; a mix of both types. Finally, we show that the Nash Equilibrium set is non-convex but connected, and Price of Anarchy is unbounded while Price of Stability is one. Extensive simulations over a stylized grid reveals that the distribution of quality of the convergence points is unimodal-we conjecture that presence of unimodality is tied to the connectedness of Nash Equilibrium. ",wei-chun lee,,2018.0,,arXiv,Lee2018,True,,arXiv,Not available,"Resource Allocation Game on Social Networks: Best Response Dynamics and Convergence",c590901f0ccf64a552f87197644a0df9,http://arxiv.org/abs/1808.08260v1 16209," The decisions that human beings make to allocate time has significant bearing on economic output and to the sustenance of social networks. The time allocation problem motivates our formal analysis of the resource allocation game, where agents on a social network, who have asymmetric, private interaction preferences, make decisions on how to allocate time, a bounded endowment, over their neighbors. Unlike the well-known opinion formation game on a social network, our game appears not to be a potential game, and the Best-Response dynamics is non-differentiable making the analysis of Best-Response dynamics non-trivial. In our game, we consider two types of player behavior, namely optimistic or pessimistic, based on how they use their time endowment over their neighbors. To analyze Best-Response dynamics, we circumvent the problem of the game not being a potential game, through the lens of a novel two-level potential function approach. We show that the Best-Response dynamics converges point-wise to a Nash Equilibrium when players are all: optimistic; pessimistic; a mix of both types. Finally, we show that the Nash Equilibrium set is non-convex but connected, and Price of Anarchy is unbounded while Price of Stability is one. Extensive simulations over a stylized grid reveals that the distribution of quality of the convergence points is unimodal-we conjecture that presence of unimodality is tied to the connectedness of Nash Equilibrium. ",vasilis livanos,,2018.0,,arXiv,Lee2018,True,,arXiv,Not available,"Resource Allocation Game on Social Networks: Best Response Dynamics and Convergence",c590901f0ccf64a552f87197644a0df9,http://arxiv.org/abs/1808.08260v1 16210," The decisions that human beings make to allocate time has significant bearing on economic output and to the sustenance of social networks. The time allocation problem motivates our formal analysis of the resource allocation game, where agents on a social network, who have asymmetric, private interaction preferences, make decisions on how to allocate time, a bounded endowment, over their neighbors. Unlike the well-known opinion formation game on a social network, our game appears not to be a potential game, and the Best-Response dynamics is non-differentiable making the analysis of Best-Response dynamics non-trivial. In our game, we consider two types of player behavior, namely optimistic or pessimistic, based on how they use their time endowment over their neighbors. To analyze Best-Response dynamics, we circumvent the problem of the game not being a potential game, through the lens of a novel two-level potential function approach. We show that the Best-Response dynamics converges point-wise to a Nash Equilibrium when players are all: optimistic; pessimistic; a mix of both types. Finally, we show that the Nash Equilibrium set is non-convex but connected, and Price of Anarchy is unbounded while Price of Stability is one. Extensive simulations over a stylized grid reveals that the distribution of quality of the convergence points is unimodal-we conjecture that presence of unimodality is tied to the connectedness of Nash Equilibrium. ",ruta mehta,,2018.0,,arXiv,Lee2018,True,,arXiv,Not available,"Resource Allocation Game on Social Networks: Best Response Dynamics and Convergence",c590901f0ccf64a552f87197644a0df9,http://arxiv.org/abs/1808.08260v1 16211," The decisions that human beings make to allocate time has significant bearing on economic output and to the sustenance of social networks. The time allocation problem motivates our formal analysis of the resource allocation game, where agents on a social network, who have asymmetric, private interaction preferences, make decisions on how to allocate time, a bounded endowment, over their neighbors. Unlike the well-known opinion formation game on a social network, our game appears not to be a potential game, and the Best-Response dynamics is non-differentiable making the analysis of Best-Response dynamics non-trivial. In our game, we consider two types of player behavior, namely optimistic or pessimistic, based on how they use their time endowment over their neighbors. To analyze Best-Response dynamics, we circumvent the problem of the game not being a potential game, through the lens of a novel two-level potential function approach. We show that the Best-Response dynamics converges point-wise to a Nash Equilibrium when players are all: optimistic; pessimistic; a mix of both types. Finally, we show that the Nash Equilibrium set is non-convex but connected, and Price of Anarchy is unbounded while Price of Stability is one. Extensive simulations over a stylized grid reveals that the distribution of quality of the convergence points is unimodal-we conjecture that presence of unimodality is tied to the connectedness of Nash Equilibrium. ",hari sundaram,,2018.0,,arXiv,Lee2018,True,,arXiv,Not available,"Resource Allocation Game on Social Networks: Best Response Dynamics and Convergence",c590901f0ccf64a552f87197644a0df9,http://arxiv.org/abs/1808.08260v1 16212," We present a polynomial-time algorithm for computing $d^{d+o(d)}$-approximate (pure) Nash equilibria in weighted congestion games with polynomial cost functions of degree at most $d$. This is an exponential improvement of the approximation factor with respect to the previously best algorithm. An appealing additional feature of our algorithm is that it uses only best-improvement steps in the actual game, as opposed to earlier approaches that first had to transform the game itself. Our algorithm is an adaptation of the seminal algorithm by Caragiannis et al. [FOCS'11, TEAC 2015], but we utilize an approximate potential function directly on the original game instead of an exact one on a modified game. A critical component of our analysis, which is of independent interest, is the derivation of a novel bound of $[d/\mathcal{W}(d/\rho)]^{d+1}$ for the Price of Anarchy (PoA) of $\rho$-approximate equilibria in weighted congestion games, where $\mathcal{W}$ is the Lambert-W function. More specifically, we show that this PoA is exactly equal to $\Phi_{d,\rho}^{d+1}$, where $\Phi_{d,\rho}$ is the unique positive solution of the equation $\rho (x+1)^d=x^{d+1}$. Our upper bound is derived via a smoothness-like argument, and thus holds even for mixed Nash and correlated equilibria, while our lower bound is simple enough to apply even to singleton congestion games. ",yiannis giannakopoulos,,2018.0,,arXiv,Giannakopoulos2018,True,,arXiv,Not available,"An Improved Algorithm for Computing Approximate Equilibria in Weighted Congestion Games",f12ec24a6248798c6c2a9888b6be8dab,http://arxiv.org/abs/1810.12806v2 16213," We present a polynomial-time algorithm for computing $d^{d+o(d)}$-approximate (pure) Nash equilibria in weighted congestion games with polynomial cost functions of degree at most $d$. This is an exponential improvement of the approximation factor with respect to the previously best algorithm. An appealing additional feature of our algorithm is that it uses only best-improvement steps in the actual game, as opposed to earlier approaches that first had to transform the game itself. Our algorithm is an adaptation of the seminal algorithm by Caragiannis et al. [FOCS'11, TEAC 2015], but we utilize an approximate potential function directly on the original game instead of an exact one on a modified game. A critical component of our analysis, which is of independent interest, is the derivation of a novel bound of $[d/\mathcal{W}(d/\rho)]^{d+1}$ for the Price of Anarchy (PoA) of $\rho$-approximate equilibria in weighted congestion games, where $\mathcal{W}$ is the Lambert-W function. More specifically, we show that this PoA is exactly equal to $\Phi_{d,\rho}^{d+1}$, where $\Phi_{d,\rho}$ is the unique positive solution of the equation $\rho (x+1)^d=x^{d+1}$. Our upper bound is derived via a smoothness-like argument, and thus holds even for mixed Nash and correlated equilibria, while our lower bound is simple enough to apply even to singleton congestion games. ",georgy noarov,,2018.0,,arXiv,Giannakopoulos2018,True,,arXiv,Not available,"An Improved Algorithm for Computing Approximate Equilibria in Weighted Congestion Games",f12ec24a6248798c6c2a9888b6be8dab,http://arxiv.org/abs/1810.12806v2 16214," We present a polynomial-time algorithm for computing $d^{d+o(d)}$-approximate (pure) Nash equilibria in weighted congestion games with polynomial cost functions of degree at most $d$. This is an exponential improvement of the approximation factor with respect to the previously best algorithm. An appealing additional feature of our algorithm is that it uses only best-improvement steps in the actual game, as opposed to earlier approaches that first had to transform the game itself. Our algorithm is an adaptation of the seminal algorithm by Caragiannis et al. [FOCS'11, TEAC 2015], but we utilize an approximate potential function directly on the original game instead of an exact one on a modified game. A critical component of our analysis, which is of independent interest, is the derivation of a novel bound of $[d/\mathcal{W}(d/\rho)]^{d+1}$ for the Price of Anarchy (PoA) of $\rho$-approximate equilibria in weighted congestion games, where $\mathcal{W}$ is the Lambert-W function. More specifically, we show that this PoA is exactly equal to $\Phi_{d,\rho}^{d+1}$, where $\Phi_{d,\rho}$ is the unique positive solution of the equation $\rho (x+1)^d=x^{d+1}$. Our upper bound is derived via a smoothness-like argument, and thus holds even for mixed Nash and correlated equilibria, while our lower bound is simple enough to apply even to singleton congestion games. ",andreas schulz,,2018.0,,arXiv,Giannakopoulos2018,True,,arXiv,Not available,"An Improved Algorithm for Computing Approximate Equilibria in Weighted Congestion Games",f12ec24a6248798c6c2a9888b6be8dab,http://arxiv.org/abs/1810.12806v2 16215," In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework utility functions as well as preference relations are special cases to describe players' goals. We show that in higher-order functions formal descriptions of players may still exist where utility functions do not using a classical example, a variant of Keynes' beauty contest. We also show that equilibrium conditions based on Nash can be easily adapted to our framework. Lastly, this framework serves as a stepping stone to powerful tools from computer science that can be usefully applied to economic game theory in the future such as computational and computability aspects. ",jules hedges,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,Higher-Order Game Theory,cc6adb53a5daa9bdb2bf0b04661f0d85,http://arxiv.org/abs/1506.01002v2 16216," In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework utility functions as well as preference relations are special cases to describe players' goals. We show that in higher-order functions formal descriptions of players may still exist where utility functions do not using a classical example, a variant of Keynes' beauty contest. We also show that equilibrium conditions based on Nash can be easily adapted to our framework. Lastly, this framework serves as a stepping stone to powerful tools from computer science that can be usefully applied to economic game theory in the future such as computational and computability aspects. ",paulo oliva,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,Higher-Order Game Theory,cc6adb53a5daa9bdb2bf0b04661f0d85,http://arxiv.org/abs/1506.01002v2 16217," In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework utility functions as well as preference relations are special cases to describe players' goals. We show that in higher-order functions formal descriptions of players may still exist where utility functions do not using a classical example, a variant of Keynes' beauty contest. We also show that equilibrium conditions based on Nash can be easily adapted to our framework. Lastly, this framework serves as a stepping stone to powerful tools from computer science that can be usefully applied to economic game theory in the future such as computational and computability aspects. ",evguenia sprits,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,Higher-Order Game Theory,cc6adb53a5daa9bdb2bf0b04661f0d85,http://arxiv.org/abs/1506.01002v2 16218," We consider a multilevel network game, where nodes can improve their communication costs by connecting to a high-speed network. The $n$ nodes are connected by a static network and each node can decide individually to become a gateway to the high-speed network. The goal of a node $v$ is to minimize its private costs, i.e., the sum (SUM-game) or maximum (MAX-game) of communication distances from $v$ to all other nodes plus a fixed price $\alpha > 0$ if it decides to be a gateway. Between gateways the communication distance is $0$, and gateways also improve other nodes' distances by behaving as shortcuts. For the SUM-game, we show that for $\alpha \leq n-1$, the price of anarchy is $\Theta(n/\sqrt{\alpha})$ and in this range equilibria always exist. In range $\alpha \in (n-1,n(n-1))$ the price of anarchy is $\Theta(\sqrt{\alpha})$, and for $\alpha \geq n(n-1)$ it is constant. For the MAX-game, we show that the price of anarchy is either $\Theta(1 + n/\sqrt{\alpha})$, for $\alpha\geq 1$, or else $1$. Given a graph with girth of at least $4\alpha$, equilibria always exist. Concerning the dynamics, both the SUM-game and the MAX-game are not potential games. For the SUM-game, we even show that it is not weakly acyclic. ",andreas cord-landwehr,,2014.0,,arXiv,Abshoff2014,True,,arXiv,Not available,Multilevel Network Games,f191d00dcd151d7e14cb47baece4cc6f,http://arxiv.org/abs/1409.5383v1 16219," In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework utility functions as well as preference relations are special cases to describe players' goals. We show that in higher-order functions formal descriptions of players may still exist where utility functions do not using a classical example, a variant of Keynes' beauty contest. We also show that equilibrium conditions based on Nash can be easily adapted to our framework. Lastly, this framework serves as a stepping stone to powerful tools from computer science that can be usefully applied to economic game theory in the future such as computational and computability aspects. ",viktor winschel,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,Higher-Order Game Theory,cc6adb53a5daa9bdb2bf0b04661f0d85,http://arxiv.org/abs/1506.01002v2 16220," In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework utility functions as well as preference relations are special cases to describe players' goals. We show that in higher-order functions formal descriptions of players may still exist where utility functions do not using a classical example, a variant of Keynes' beauty contest. We also show that equilibrium conditions based on Nash can be easily adapted to our framework. Lastly, this framework serves as a stepping stone to powerful tools from computer science that can be usefully applied to economic game theory in the future such as computational and computability aspects. ",philipp zahn,,2015.0,,arXiv,Hedges2015,True,,arXiv,Not available,Higher-Order Game Theory,cc6adb53a5daa9bdb2bf0b04661f0d85,http://arxiv.org/abs/1506.01002v2 16221," This paper has a twofold scope. The first one is to clarify and put in evidence the isomorphic character of two theories developed in quite different fields: on one side, threshold logic, on the other side, simple games. One of the main purposes in both theories is to determine when a simple game is representable as a weighted game, which allows a very compact and easily comprehensible representation. Deep results were found in threshold logic in the sixties and seventies for this problem. However, game theory has taken the lead and some new results have been obtained for the problem in the last two decades. The second and main goal of this paper is to provide some new results on this problem and propose several open questions and conjectures for future research. The results we obtain depend on two significant parameters of the game: the number of types of equivalent players and the number of types of shift-minimal winning coalitions. ",josep freixas,,2016.0,10.1007/s11238-017-9606-z,arXiv,Freixas2016,True,,arXiv,Not available,"Characterization of threshold functions: state of the art, some new contributions and open problems",2e007d9f57ac1ad33fd7c74f69732ce3,http://arxiv.org/abs/1603.00329v2 16222," This paper has a twofold scope. The first one is to clarify and put in evidence the isomorphic character of two theories developed in quite different fields: on one side, threshold logic, on the other side, simple games. One of the main purposes in both theories is to determine when a simple game is representable as a weighted game, which allows a very compact and easily comprehensible representation. Deep results were found in threshold logic in the sixties and seventies for this problem. However, game theory has taken the lead and some new results have been obtained for the problem in the last two decades. The second and main goal of this paper is to provide some new results on this problem and propose several open questions and conjectures for future research. The results we obtain depend on two significant parameters of the game: the number of types of equivalent players and the number of types of shift-minimal winning coalitions. ",marc freixas,,2016.0,10.1007/s11238-017-9606-z,arXiv,Freixas2016,True,,arXiv,Not available,"Characterization of threshold functions: state of the art, some new contributions and open problems",2e007d9f57ac1ad33fd7c74f69732ce3,http://arxiv.org/abs/1603.00329v2 16223," This paper has a twofold scope. The first one is to clarify and put in evidence the isomorphic character of two theories developed in quite different fields: on one side, threshold logic, on the other side, simple games. One of the main purposes in both theories is to determine when a simple game is representable as a weighted game, which allows a very compact and easily comprehensible representation. Deep results were found in threshold logic in the sixties and seventies for this problem. However, game theory has taken the lead and some new results have been obtained for the problem in the last two decades. The second and main goal of this paper is to provide some new results on this problem and propose several open questions and conjectures for future research. The results we obtain depend on two significant parameters of the game: the number of types of equivalent players and the number of types of shift-minimal winning coalitions. ",sascha kurz,,2016.0,10.1007/s11238-017-9606-z,arXiv,Freixas2016,True,,arXiv,Not available,"Characterization of threshold functions: state of the art, some new contributions and open problems",2e007d9f57ac1ad33fd7c74f69732ce3,http://arxiv.org/abs/1603.00329v2 16224," The minimum-effort coordination game, having potentially important implications in both evolutionary biology and sociology, draws recently more attention for the fact that human behavior in this social dilemma is often inconsistent with the predictions of classic game theory. In the framework of classic game theory, any common effort level is a strict and trembling hand perfect Nash equilibrium, so that no desideratum is provided for selecting among them. Behavior experiments, however, show that the effort levels employed by subjects are inversely related to the effort costs. Here, we combine coalescence theory and evolutionary game theory to investigate this game in finite populations. Both analytic results and individual-based simulations show that effort costs play a key role in the evolution of contribution levels, which is in good agreement with those observed experimentally. Besides well-mixed populations, set structured populations, where the population structure itself is a consequence of the evolutionary process, have also been taken into consideration. Therein we find that large number of sets and moderate migration rate greatly promote effort levels, especially for high effort costs. Our results may provide theoretical explanations for coordination behaviors observed in real life from an evolutionary perspective. ",kun li,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Stochastic evolutionary dynamics of minimum-effort coordination games,4d7ab34b1d569ca1b4cf4c114d7faca7,http://arxiv.org/abs/1603.06114v1 16225," The minimum-effort coordination game, having potentially important implications in both evolutionary biology and sociology, draws recently more attention for the fact that human behavior in this social dilemma is often inconsistent with the predictions of classic game theory. In the framework of classic game theory, any common effort level is a strict and trembling hand perfect Nash equilibrium, so that no desideratum is provided for selecting among them. Behavior experiments, however, show that the effort levels employed by subjects are inversely related to the effort costs. Here, we combine coalescence theory and evolutionary game theory to investigate this game in finite populations. Both analytic results and individual-based simulations show that effort costs play a key role in the evolution of contribution levels, which is in good agreement with those observed experimentally. Besides well-mixed populations, set structured populations, where the population structure itself is a consequence of the evolutionary process, have also been taken into consideration. Therein we find that large number of sets and moderate migration rate greatly promote effort levels, especially for high effort costs. Our results may provide theoretical explanations for coordination behaviors observed in real life from an evolutionary perspective. ",rui cong,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Stochastic evolutionary dynamics of minimum-effort coordination games,4d7ab34b1d569ca1b4cf4c114d7faca7,http://arxiv.org/abs/1603.06114v1 16226," The minimum-effort coordination game, having potentially important implications in both evolutionary biology and sociology, draws recently more attention for the fact that human behavior in this social dilemma is often inconsistent with the predictions of classic game theory. In the framework of classic game theory, any common effort level is a strict and trembling hand perfect Nash equilibrium, so that no desideratum is provided for selecting among them. Behavior experiments, however, show that the effort levels employed by subjects are inversely related to the effort costs. Here, we combine coalescence theory and evolutionary game theory to investigate this game in finite populations. Both analytic results and individual-based simulations show that effort costs play a key role in the evolution of contribution levels, which is in good agreement with those observed experimentally. Besides well-mixed populations, set structured populations, where the population structure itself is a consequence of the evolutionary process, have also been taken into consideration. Therein we find that large number of sets and moderate migration rate greatly promote effort levels, especially for high effort costs. Our results may provide theoretical explanations for coordination behaviors observed in real life from an evolutionary perspective. ",long wang,,2016.0,,arXiv,Li2016,True,,arXiv,Not available,Stochastic evolutionary dynamics of minimum-effort coordination games,4d7ab34b1d569ca1b4cf4c114d7faca7,http://arxiv.org/abs/1603.06114v1 16227," A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondance with correlations in space-like separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality. ",alley hameedi,,2017.0,10.1103/PhysRevLett.119.220402,"Phys. Rev. Lett. 119, 220402 (2017)",Hameedi2017,True,,arXiv,Not available,Communication games reveal preparation contextuality,0766c9ab64d969eb2d3376a1b96674c8,http://arxiv.org/abs/1704.08223v3 16228," A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondance with correlations in space-like separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality. ",armin tavakoli,,2017.0,10.1103/PhysRevLett.119.220402,"Phys. Rev. Lett. 119, 220402 (2017)",Hameedi2017,True,,arXiv,Not available,Communication games reveal preparation contextuality,0766c9ab64d969eb2d3376a1b96674c8,http://arxiv.org/abs/1704.08223v3 16229," Evolutionarily stable strategy (ESS) is a key concept in evolutionary game theory. ESS provides an evolutionary stability criterion for biological, social and economical behaviors. In this paper, we develop a new approach to evaluate ESS in symmetric two player games with fuzzy payoffs. Particularly, every strategy is assigned a fuzzy membership that describes to what degree it is an ESS in presence of uncertainty. The fuzzy set of ESS characterize the nature of ESS. The proposed approach avoids loss of any information that happens by the defuzzification method in games and handles uncertainty of payoffs through all steps of finding an ESS. We use the satisfaction function to compare fuzzy payoffs, and adopts the fuzzy decision rule to obtain the membership function of the fuzzy set of ESS. The theorem shows the relation between fuzzy ESS and fuzzy Nash quilibrium. The numerical results illustrate the proposed method is an appropriate generalization of ESS to fuzzy payoff games. ",haozhen situ,,2015.0,,arXiv,Situ2015,True,,arXiv,Not available,Evolutionary Stable Strategies in Games with Fuzzy Payoffs,0a88009f89c5e7562561e6cb2bd31e45,http://arxiv.org/abs/1501.04265v2 16230," We consider a multilevel network game, where nodes can improve their communication costs by connecting to a high-speed network. The $n$ nodes are connected by a static network and each node can decide individually to become a gateway to the high-speed network. The goal of a node $v$ is to minimize its private costs, i.e., the sum (SUM-game) or maximum (MAX-game) of communication distances from $v$ to all other nodes plus a fixed price $\alpha > 0$ if it decides to be a gateway. Between gateways the communication distance is $0$, and gateways also improve other nodes' distances by behaving as shortcuts. For the SUM-game, we show that for $\alpha \leq n-1$, the price of anarchy is $\Theta(n/\sqrt{\alpha})$ and in this range equilibria always exist. In range $\alpha \in (n-1,n(n-1))$ the price of anarchy is $\Theta(\sqrt{\alpha})$, and for $\alpha \geq n(n-1)$ it is constant. For the MAX-game, we show that the price of anarchy is either $\Theta(1 + n/\sqrt{\alpha})$, for $\alpha\geq 1$, or else $1$. Given a graph with girth of at least $4\alpha$, equilibria always exist. Concerning the dynamics, both the SUM-game and the MAX-game are not potential games. For the SUM-game, we even show that it is not weakly acyclic. ",daniel jung,,2014.0,,arXiv,Abshoff2014,True,,arXiv,Not available,Multilevel Network Games,f191d00dcd151d7e14cb47baece4cc6f,http://arxiv.org/abs/1409.5383v1 16231," A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondance with correlations in space-like separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality. ",breno marques,,2017.0,10.1103/PhysRevLett.119.220402,"Phys. Rev. Lett. 119, 220402 (2017)",Hameedi2017,True,,arXiv,Not available,Communication games reveal preparation contextuality,0766c9ab64d969eb2d3376a1b96674c8,http://arxiv.org/abs/1704.08223v3 16232," A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondance with correlations in space-like separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality. ",mohamed bourennane,,2017.0,10.1103/PhysRevLett.119.220402,"Phys. Rev. Lett. 119, 220402 (2017)",Hameedi2017,True,,arXiv,Not available,Communication games reveal preparation contextuality,0766c9ab64d969eb2d3376a1b96674c8,http://arxiv.org/abs/1704.08223v3 16233," Due to the spectrum reuse in small cell network, the inter-cell interference has great effect on MEC's performance. In this paper, for reducing the energy consumption and latency of MEC, we propose a game theory based jointing offloading decision and resource allocation algorithm for multi-user MEC. In this algorithm, the transmission power, offloading decision, and mobile user's CPU capability are determined jointly. We prove that this game is an exact potential game and the NE of this game exists and is unique. For reaching the NE, the best response dynamic is applied. We calculate the best responses of these three variables. Moreover, we investigate the properties of this algorithm, including the convergence, the computation complexity, and the price of anarchy. The theoretical analysis shows that the inter-cell interference has great effect on the performance of MEC. The NE of this game is Pareto efficiency and also the global optimal solution of the proposed optimal issue. Finally, we evaluate the performance of this algorithm by simulation. The simulation results illustrates that this algorithm is effective on improving the performance of the multi-user MEC system. ",ning li,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,"Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach",2d76f526648cb3d80630f29474b9d2fb,http://arxiv.org/abs/1805.02182v1 16234," Due to the spectrum reuse in small cell network, the inter-cell interference has great effect on MEC's performance. In this paper, for reducing the energy consumption and latency of MEC, we propose a game theory based jointing offloading decision and resource allocation algorithm for multi-user MEC. In this algorithm, the transmission power, offloading decision, and mobile user's CPU capability are determined jointly. We prove that this game is an exact potential game and the NE of this game exists and is unique. For reaching the NE, the best response dynamic is applied. We calculate the best responses of these three variables. Moreover, we investigate the properties of this algorithm, including the convergence, the computation complexity, and the price of anarchy. The theoretical analysis shows that the inter-cell interference has great effect on the performance of MEC. The NE of this game is Pareto efficiency and also the global optimal solution of the proposed optimal issue. Finally, we evaluate the performance of this algorithm by simulation. The simulation results illustrates that this algorithm is effective on improving the performance of the multi-user MEC system. ",jose-fernan martinez-ortega,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,"Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach",2d76f526648cb3d80630f29474b9d2fb,http://arxiv.org/abs/1805.02182v1 16235," Due to the spectrum reuse in small cell network, the inter-cell interference has great effect on MEC's performance. In this paper, for reducing the energy consumption and latency of MEC, we propose a game theory based jointing offloading decision and resource allocation algorithm for multi-user MEC. In this algorithm, the transmission power, offloading decision, and mobile user's CPU capability are determined jointly. We prove that this game is an exact potential game and the NE of this game exists and is unique. For reaching the NE, the best response dynamic is applied. We calculate the best responses of these three variables. Moreover, we investigate the properties of this algorithm, including the convergence, the computation complexity, and the price of anarchy. The theoretical analysis shows that the inter-cell interference has great effect on the performance of MEC. The NE of this game is Pareto efficiency and also the global optimal solution of the proposed optimal issue. Finally, we evaluate the performance of this algorithm by simulation. The simulation results illustrates that this algorithm is effective on improving the performance of the multi-user MEC system. ",gregorio rubio,,2018.0,,arXiv,Li2018,True,,arXiv,Not available,"Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach",2d76f526648cb3d80630f29474b9d2fb,http://arxiv.org/abs/1805.02182v1 16236," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",jing chen,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 16237," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",bo li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 16238," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",yingkai li,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 16239," Generating good revenue is one of the most important problems in Bayesian auction design, and many (approximately) optimal dominant-strategy incentive compatible (DSIC) Bayesian mechanisms have been constructed for various auction settings. However, most existing studies do not consider the complexity for the seller to carry out the mechanism. It is assumed that the seller knows ""each single bit"" of the distributions and is able to optimize perfectly based on the entire distributions. Unfortunately, this is a strong assumption and may not hold in reality: for example, when the value distributions have exponentially large supports or do not have succinct representations. In this work we consider, for the first time, the query complexity of Bayesian mechanisms. We only allow the seller to have limited oracle accesses to the players' value distributions, via quantile queries and value queries. For a large class of auction settings, we prove logarithmic lower-bounds for the query complexity for any DSIC Bayesian mechanism to be of any constant approximation to the optimal revenue. For single-item auctions and multi-item auctions with unit-demand or additive valuation functions, we prove tight upper-bounds via efficient query schemes, without requiring the distributions to be regular or have monotone hazard rate. Thus, in those auction settings the seller needs to access much less than the full distributions in order to achieve approximately optimal revenue. ",pinyan lu,,2018.0,,arXiv,Chen2018,True,,arXiv,Not available,Bayesian Auctions with Efficient Queries,ae432a2715c85dd7d7f06e9a0d6bb12d,http://arxiv.org/abs/1804.07451v1 16240," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",gang bai,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16241," We consider a multilevel network game, where nodes can improve their communication costs by connecting to a high-speed network. The $n$ nodes are connected by a static network and each node can decide individually to become a gateway to the high-speed network. The goal of a node $v$ is to minimize its private costs, i.e., the sum (SUM-game) or maximum (MAX-game) of communication distances from $v$ to all other nodes plus a fixed price $\alpha > 0$ if it decides to be a gateway. Between gateways the communication distance is $0$, and gateways also improve other nodes' distances by behaving as shortcuts. For the SUM-game, we show that for $\alpha \leq n-1$, the price of anarchy is $\Theta(n/\sqrt{\alpha})$ and in this range equilibria always exist. In range $\alpha \in (n-1,n(n-1))$ the price of anarchy is $\Theta(\sqrt{\alpha})$, and for $\alpha \geq n(n-1)$ it is constant. For the MAX-game, we show that the price of anarchy is either $\Theta(1 + n/\sqrt{\alpha})$, for $\alpha\geq 1$, or else $1$. Given a graph with girth of at least $4\alpha$, equilibria always exist. Concerning the dynamics, both the SUM-game and the MAX-game are not potential games. For the SUM-game, we even show that it is not weakly acyclic. ",alexander skopalik,,2014.0,,arXiv,Abshoff2014,True,,arXiv,Not available,Multilevel Network Games,f191d00dcd151d7e14cb47baece4cc6f,http://arxiv.org/abs/1409.5383v1 16242," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",zhihui xie,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16243," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",liang wang,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16244," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",vincent conitzer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 16245," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",christian kroer,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 16246," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",eric sodomka,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 16247," Budgets play a significant role in real-world sequential auction markets such as those implemented by Internet companies. To maximize the value provided to auction participants, spending is smoothed across auctions so budgets are used for the best opportunities. This paper considers a smoothing procedure that relies on {\em pacing multipliers}: for each bidder, the platform applies a factor between 0 and 1 that uniformly scales the bids across all auctions. Looking at this process as a game between all bidders, we introduce the notion of {\em pacing equilibrium}, and prove that they are always guaranteed to exist. We demonstrate through examples that a market can have multiple pacing equilibria with large variations in several natural objectives. We go on to show that computing either a social-welfare-maximizing or a revenue-maximizing pacing equilibrium is NP-hard. Finally, we develop a mixed-integer program whose feasible solutions coincide with pacing equilibria, and show that it can be used to find equilibria that optimize several interesting objectives. Using our mixed-integer program, we perform numerical simulations on synthetic auction markets that provide evidence that, in spite of the possibility of equilibrium multiplicity, it occurs very rarely across several families of random instances. We also show that solutions from the mixed-integer program can be used to improve the outcomes achieved in a more realistic adaptive pacing setting. ",nicolas stier-moses,,2017.0,,arXiv,Conitzer2017,True,,arXiv,Not available,Multiplicative Pacing Equilibria in Auction Markets,858b1cf71913f47e457ddd70c86baba1,http://arxiv.org/abs/1706.07151v1 16248," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",jason hartline,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 16249," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",nicole immorlica,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 16250," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",mohammad khani,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 16251," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",brendan lucier,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 16252," In this paper we develop a novel approach to the convergence of Best-Response Dynamics for the family of interference games. Interference games represent the fundamental resource allocation conflict between users of the radio spectrum. In contrast to congestion games, interference games are generally not potential games. Therefore, proving the convergence of the best-response dynamics to a Nash equilibrium in these games requires new techniques. We suggest a model for random interference games, based on the long term fading governed by the players' geometry. Our goal is to prove convergence of the approximate best-response dynamics with high probability with respect to the randomized game. We embrace the asynchronous model in which the acting player is chosen at each stage at random. In our approximate best-response dynamics, the action of a deviating player is chosen at random among all the approximately best ones. We show that with high probability, with respect to the players' geometry and asymptotically with the number of players, each action increases the expected social-welfare (sum of achievable rates). Hence, the induced sum-rate process is a submartingale. Based on the Martingale Convergence Theorem, we prove convergence of the strategy profile to an approximate Nash equilibrium with good performance for asymptotically almost all interference games. We use the Markovity of the induced sum-rate process to provide probabilistic bounds on the convergence time. Finally, we demonstrate our results in simulated examples. ",ilai bistritz,,2017.0,,arXiv,Bistritz2017,True,,arXiv,Not available,Approximate Best-Response Dynamics in Random Interference Games,09e57462cadbe0c37d15fde0fe9e69d7,http://arxiv.org/abs/1706.05081v1 16253," As online ad offerings become increasingly complex, with multiple size configurations and layouts available to advertisers, the sale of web advertising space increasingly resembles a combinatorial auction with complementarities. Standard ad auction formats do not immediately extend to these settings, and truthful combinatorial auctions, such as the Vickrey-Clarke-Groves auction, can yield unacceptably low revenue. Core selecting auctions, which apply to combinatorial markets, boost revenue by setting prices so that no group of agents, including the auctioneer, can jointly improve their utilities by switching to a different allocation and payments. Among outcomes in the core, bidder-optimal core points have been the most widely studied due to their incentive properties, such as being implementable at equilibrium. Prior work in economics has studied heuristics for computing approximate bidder-optimal core points given oracle access to the welfare optimization problem, but these solutions either lack performance guarantees or are based on prohibitively slow convex programs. Our main result is a combinatorial algorithm that finds an approximate bidder-optimal core point with almost linear number of calls to the welfare maximization oracle. Our algorithm is faster than previously-proposed heuristics, has theoretical guarantees, and reveals some useful structural properties of the core polytope. We conclude that core pricing is implementable even for very time sensitive practical use cases such as realtime auctions for online advertising and can yield more revenue. We justify this claim experimentally using the Microsoft Bing Ad Auction platform, which allows advertisers to have decorations with a non-uniform number of lines of text. We find that core pricing generates almost 100% more revenue than VCG, and almost 20% more revenue than the standard Generalized Second Price (GSP) auction. ",rad niazadeh,,2016.0,,arXiv,Hartline2016,True,,arXiv,Not available,Fast Core Pricing for Rich Advertising Auctions,6959e22d65779e94daaf4dad29263fc9,http://arxiv.org/abs/1610.03564v3 16254," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 16255," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 16256," Auctions for perishable goods such as internet ad inventory need to make real-time allocation and pricing decisions as the supply of the good arrives in an online manner, without knowing the entire supply in advance. These allocation and pricing decisions get complicated when buyers have some global constraints. In this work, we consider a multi-unit model where buyers have global {\em budget} constraints, and the supply arrives in an online manner. Our main contribution is to show that for this setting there is an individually-rational, incentive-compatible and Pareto-optimal auction that allocates these units and calculates prices on the fly, without knowledge of the total supply. We do so by showing that the Adaptive Clinching Auction satisfies a {\em supply-monotonicity} property. We also analyze and discuss, using examples, how the insights gained by the allocation and payment rule can be applied to design better ad allocation heuristics in practice. Finally, while our main technical result concerns multi-unit supply, we propose a formal model of online supply that captures scenarios beyond multi-unit supply and has applications to sponsored search. We conjecture that our results for multi-unit auctions can be extended to these more general models. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Clinching Auctions with Online Supply,b7bd946ff58044ae9f7358b2dfac3866,http://arxiv.org/abs/1210.1456v1 16257," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",saeed alaei,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16258," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",azarakhsh malekian,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16259," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",aravind srinivasan,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16260," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",hu fu,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 16261," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",nima haghpanah,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 16262," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",jason hartline,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 16263," In this paper we develop a novel approach to the convergence of Best-Response Dynamics for the family of interference games. Interference games represent the fundamental resource allocation conflict between users of the radio spectrum. In contrast to congestion games, interference games are generally not potential games. Therefore, proving the convergence of the best-response dynamics to a Nash equilibrium in these games requires new techniques. We suggest a model for random interference games, based on the long term fading governed by the players' geometry. Our goal is to prove convergence of the approximate best-response dynamics with high probability with respect to the randomized game. We embrace the asynchronous model in which the acting player is chosen at each stage at random. In our approximate best-response dynamics, the action of a deviating player is chosen at random among all the approximately best ones. We show that with high probability, with respect to the players' geometry and asymptotically with the number of players, each action increases the expected social-welfare (sum of achievable rates). Hence, the induced sum-rate process is a submartingale. Based on the Martingale Convergence Theorem, we prove convergence of the strategy profile to an approximate Nash equilibrium with good performance for asymptotically almost all interference games. We use the Markovity of the induced sum-rate process to provide probabilistic bounds on the convergence time. Finally, we demonstrate our results in simulated examples. ",amir leshem,,2017.0,,arXiv,Bistritz2017,True,,arXiv,Not available,Approximate Best-Response Dynamics in Random Interference Games,09e57462cadbe0c37d15fde0fe9e69d7,http://arxiv.org/abs/1706.05081v1 16264," Cr\'emer and McLean [1985] showed that, when buyers' valuations are drawn from a correlated distribution, an auction with full knowledge on the distribution can extract the full social surplus. We study whether this phenomenon persists when the auctioneer has only incomplete knowledge of the distribution, represented by a finite family of candidate distributions, and has sample access to the real distribution. We show that the naive approach which uses samples to distinguish candidate distributions may fail, whereas an extended version of the Cr\'emer-McLean auction simultaneously extracts full social surplus under each candidate distribution. With an algebraic argument, we give a tight bound on the number of samples needed by this auction, which is the difference between the number of candidate distributions and the dimension of the linear space they span. ",robert kleinberg,,2014.0,,arXiv,Fu2014,True,,arXiv,Not available,Optimal Auctions for Correlated Buyers with Sampling,e523922d379e5166479fdbfdb5e1354f,http://arxiv.org/abs/1406.1571v1 16265," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",vineet abhishek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 16266," We study efficiency loss in Bayesian revenue optimal auctions. We quantify this as the worst case ratio of loss in the realized social welfare to the social welfare that can be realized by an efficient auction. Our focus is on auctions with single-parameter buyers and where buyers' valuation sets are finite. For binary valued single-parameter buyers with independent (not necessarily identically distributed) private valuations, we show that the worst case efficiency loss ratio (ELR) is no worse than it is with only one buyer; moreover, it is at most 1/2. Moving beyond the case of binary valuations but restricting to single item auctions, where buyers' private valuations are independent and identically distributed, we obtain bounds on the worst case ELR as a function of number of buyers, cardinality of buyers' valuation set, and ratio of maximum to minimum possible values that buyers can have for the item. ",bruce hajek,,2010.0,,arXiv,Abhishek2010,True,,arXiv,Not available,Efficiency Loss in Revenue Optimal Auctions,6bc0926da61cb7246c9964d32aeeb892,http://arxiv.org/abs/1005.1121v2 16267," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",hu fu,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 16268," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",nicole immolica,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 16269," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",brendan lucier,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 16270," Designing revenue optimal auctions for selling an item to $n$ symmetric bidders is a fundamental problem in mechanism design. Myerson (1981) shows that the second price auction with an appropriate reserve price is optimal when bidders' values are drawn i.i.d. from a known regular distribution. A cornerstone in the prior-independent revenue maximization literature is a result by Bulow and Klemperer (1996) showing that the second price auction without a reserve achieves $(n-1)/n$ of the optimal revenue in the worst case. We construct a randomized mechanism that strictly outperforms the second price auction in this setting. Our mechanism inflates the second highest bid with a probability that varies with $n$. For two bidders we improve the performance guarantee from $0.5$ to $0.512$ of the optimal revenue. We also resolve a question in the design of revenue optimal mechanisms that have access to a single sample from an unknown distribution. We show that a randomized mechanism strictly outperforms all deterministic mechanisms in terms of worst case guarantee. ",philipp strack,,2015.0,,arXiv,Fu2015,True,,arXiv,Not available,Randomization beats Second Price as a Prior-Independent Auction,77b9e8505291c4d49bb3b485acff8d69,http://arxiv.org/abs/1507.08042v1 16271," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",erel segal-halevi,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 16272," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",avinatan hassidim,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 16273," Motivated by applications such as stock exchanges and spectrum auctions, there is a growing interest in mechanisms for arranging trade in two-sided markets. Existing mechanisms are either not truthful, or do not guarantee an asymptotically-optimal gain-from-trade, or rely on a prior on the traders' valuations, or operate in limited settings such as a single kind of good. We extend the random market-halving technique used in earlier works to markets with multiple kinds of goods, where traders have gross-substitute valuations. We present MIDA: a Multi Item-kind Double-Auction mechanism. It is prior-free, truthful, strongly-budget-balanced, and guarantees near-optimal gain from trade when market sizes of all goods grow to $\infty$ at a similar rate. ",yonatan aumann,,2016.0,,arXiv,Segal-Halevi2016,True,,arXiv,Not available,Double Auctions in Markets for Multiple Kinds of Goods,cbde9b521bff3531b8986833148f3483,http://arxiv.org/abs/1604.06210v5 16274," In an earlier experiment, participants played a perfect information game against a computer, which was programmed to deviate often from its backward induction strategy right at the beginning of the game. Participants knew that in each game, the computer was nevertheless optimizing against some belief about the participant's future strategy. In the aggregate, it appeared that participants applied forward induction. However, cardinal effects seemed to play a role as well: a number of participants might have been trying to maximize expected utility. In order to find out how people really reason in such a game, we designed centipede-like turn-taking games with new payoff structures in order to make such cardinal effects less likely. We ran a new experiment with 50 participants, based on marble drop visualizations of these revised payoff structures. After participants played 48 test games, we asked a number of questions to gauge the participants' reasoning about their own and the opponent's strategy at all decision nodes of a sample game. We also checked how the verbalized strategies fit to the actual choices they made at all their decision points in the 48 test games. Even though in the aggregate, participants in the new experiment still tend to slightly favor the forward induction choice at their first decision node, their verbalized strategies most often depend on their own attitudes towards risk and those they assign to the computer opponent, sometimes in addition to considerations about cooperativeness and competitiveness. ",sujata ghosh,,2017.0,10.4204/EPTCS.251.19,"EPTCS 251, 2017, pp. 265-284",Ghosh2017,True,,arXiv,Not available,"What Drives People's Choices in Turn-Taking Games, if not Game-Theoretic Rationality?",3832039bd19e3f2a603cb1dbea2d0585,http://arxiv.org/abs/1707.08749v1 16275," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",hu fu,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 16276," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",jason hartline,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 16277," We study simple and approximately optimal auctions for agents with a particular form of risk-averse preferences. We show that, for symmetric agents, the optimal revenue (given a prior distribution over the agent preferences) can be approximated by the first-price auction (which is prior independent), and, for asymmetric agents, the optimal revenue can be approximated by an auction with simple form. These results are based on two technical methods. The first is for upper-bounding the revenue from a risk-averse agent. The second gives a payment identity for mechanisms with pay-your-bid semantics. ",darrell hoy,,2013.0,,arXiv,Fu2013,True,,arXiv,Not available,Prior-independent Auctions for Risk-averse Agents,a852bf114db37337ccd732ffc9968d8b,http://arxiv.org/abs/1301.0401v1 16283," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. The VCG mechanism guarantees very high social welfare both in single- and multi-good auctions, so long as Knightian players do not select strategies that are dominated. With such Knightian players, however, we prove that the VCG mechanism guarantees very poor social welfare in unrestricted combinatorial auctions. ",alessandro chiesa,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,"Knightian Analysis of the VCG Mechanism in Unrestricted Combinatorial Auctions",8547ec952285828b1f02882a9447a257,http://arxiv.org/abs/1403.6410v1 16284," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. The VCG mechanism guarantees very high social welfare both in single- and multi-good auctions, so long as Knightian players do not select strategies that are dominated. With such Knightian players, however, we prove that the VCG mechanism guarantees very poor social welfare in unrestricted combinatorial auctions. ",silvio micali,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,"Knightian Analysis of the VCG Mechanism in Unrestricted Combinatorial Auctions",8547ec952285828b1f02882a9447a257,http://arxiv.org/abs/1403.6410v1 16285," In an earlier experiment, participants played a perfect information game against a computer, which was programmed to deviate often from its backward induction strategy right at the beginning of the game. Participants knew that in each game, the computer was nevertheless optimizing against some belief about the participant's future strategy. In the aggregate, it appeared that participants applied forward induction. However, cardinal effects seemed to play a role as well: a number of participants might have been trying to maximize expected utility. In order to find out how people really reason in such a game, we designed centipede-like turn-taking games with new payoff structures in order to make such cardinal effects less likely. We ran a new experiment with 50 participants, based on marble drop visualizations of these revised payoff structures. After participants played 48 test games, we asked a number of questions to gauge the participants' reasoning about their own and the opponent's strategy at all decision nodes of a sample game. We also checked how the verbalized strategies fit to the actual choices they made at all their decision points in the 48 test games. Even though in the aggregate, participants in the new experiment still tend to slightly favor the forward induction choice at their first decision node, their verbalized strategies most often depend on their own attitudes towards risk and those they assign to the computer opponent, sometimes in addition to considerations about cooperativeness and competitiveness. ",aviad heifetz,,2017.0,10.4204/EPTCS.251.19,"EPTCS 251, 2017, pp. 265-284",Ghosh2017,True,,arXiv,Not available,"What Drives People's Choices in Turn-Taking Games, if not Game-Theoretic Rationality?",3832039bd19e3f2a603cb1dbea2d0585,http://arxiv.org/abs/1707.08749v1 16286," We consider auctions in which the players have very limited knowledge about their own valuations. Specifically, the only information that a Knightian player $i$ has about the profile of true valuations, $\theta^*$, consists of a set of distributions, from one of which $\theta_i^*$ has been drawn. The VCG mechanism guarantees very high social welfare both in single- and multi-good auctions, so long as Knightian players do not select strategies that are dominated. With such Knightian players, however, we prove that the VCG mechanism guarantees very poor social welfare in unrestricted combinatorial auctions. ",zeyuan zhu,,2014.0,,arXiv,Chiesa2014,True,,arXiv,Not available,"Knightian Analysis of the VCG Mechanism in Unrestricted Combinatorial Auctions",8547ec952285828b1f02882a9447a257,http://arxiv.org/abs/1403.6410v1 16287," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",darrell hoy,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 16288," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",kamal jain,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 16289," A single advertisement often benefits many parties, for example, an ad for a Samsung laptop benefits Microsoft. We study this phenomenon in search advertising auctions and show that standard solutions, including the status quo ignorance of mutual benefit and a benefit-aware Vickrey-Clarke-Groves mechanism, perform poorly. In contrast, we show that an appropriate first-price auction has nice equilibria in a single-slot ad auction --- all equilibria that satisfy a natural cooperative envy-freeness condition select the welfare-maximizing ad and satisfy an intuitive lower-bound on revenue. ",christopher wilkens,,2012.0,,arXiv,Hoy2012,True,,arXiv,Not available,Coopetitive Ad Auctions,1a23cf53c3536a796744c7a2e33f2a56,http://arxiv.org/abs/1209.0832v1 16290," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",elias koutsoupias,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 16291," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",stefano leonardi,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 16292," We construct prior-free auctions with constant-factor approximation guarantees with ordered bidders, in both unlimited and limited supply settings. We compare the expected revenue of our auctions on a bid vector to the monotone price benchmark, the maximum revenue that can be obtained from a bid vector using supply-respecting prices that are nonincreasing in the bidder ordering and bounded above by the second-highest bid. As a consequence, our auctions are simultaneously near-optimal in a wide range of Bayesian multi-unit environments. ",tim roughgarden,,2012.0,,arXiv,Koutsoupias2012,True,,arXiv,Not available,Near-Optimal Multi-Unit Auctions with Ordered Bidders,6e6fb8c370b57c5f4cd10ad848db2936,http://arxiv.org/abs/1212.2825v1 16293," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",ahmed abdelhadi,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 16294," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",haya shajaiah,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 16295," Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for efficient sharing of spectrum with commercial wireless system providers (WSPs), with an emphasis on federal spectrum sharing. The proposed spectrum sharing system optimizes usage of spectrum resources, manages intra-WSP and inter-WSP interference and provides essential level of security, privacy, and obfuscation to enable the most efficient and reliable usage of the shared spectrum. It features an intermediate spectrum auctioneer responsible for allocating resources to commercial WSPs by running secure spectrum auctions. The proposed secure spectrum auction, MTSSA, leverages Paillier cryptosystem to avoid possible fraud and bid-rigging. Numerical simulations are provided to compare the performance of MTSSA, in the considered spectrum sharing system, with other spectrum auction mechanisms for realistic cellular systems. ",charles clancy,,2015.0,10.1109/TCCN.2015.2488618,arXiv,Abdelhadi2015,True,,arXiv,Not available,"A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions",6ea63f2f5d482f00687f5aee42f7ca68,http://arxiv.org/abs/1503.04899v2 16296," In an earlier experiment, participants played a perfect information game against a computer, which was programmed to deviate often from its backward induction strategy right at the beginning of the game. Participants knew that in each game, the computer was nevertheless optimizing against some belief about the participant's future strategy. In the aggregate, it appeared that participants applied forward induction. However, cardinal effects seemed to play a role as well: a number of participants might have been trying to maximize expected utility. In order to find out how people really reason in such a game, we designed centipede-like turn-taking games with new payoff structures in order to make such cardinal effects less likely. We ran a new experiment with 50 participants, based on marble drop visualizations of these revised payoff structures. After participants played 48 test games, we asked a number of questions to gauge the participants' reasoning about their own and the opponent's strategy at all decision nodes of a sample game. We also checked how the verbalized strategies fit to the actual choices they made at all their decision points in the 48 test games. Even though in the aggregate, participants in the new experiment still tend to slightly favor the forward induction choice at their first decision node, their verbalized strategies most often depend on their own attitudes towards risk and those they assign to the computer opponent, sometimes in addition to considerations about cooperativeness and competitiveness. ",rineke verbrugge,,2017.0,10.4204/EPTCS.251.19,"EPTCS 251, 2017, pp. 265-284",Ghosh2017,True,,arXiv,Not available,"What Drives People's Choices in Turn-Taking Games, if not Game-Theoretic Rationality?",3832039bd19e3f2a603cb1dbea2d0585,http://arxiv.org/abs/1707.08749v1 16297," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 16298," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",eva tardos,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 16299," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoad lewenberg,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 16300," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",omer lev,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 16301," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",yoram bachrach,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 16302," All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties of the equilibrium, such as the lack of influence of the most-likely-to-participate player on the behavior of the other players. We perform this analysis with two scenarios: the sum-profit model, where the auctioneer obtains the sum of all submitted bids, and the max-profit model of crowdsourcing contests, where the auctioneer can only use the best submissions and thus obtains only the winning bid. Furthermore, we examine various methods of influencing the probability of participation such as the effects of misreporting one's own probability of participating, and how influencing another player's participation chances changes the player's strategy. ",jeffrey rosenschein,,2017.0,,"IEEE Intelligent Systems, 2017",Lewenberg2017,True,,arXiv,Not available,Agent Failures in All-Pay Auctions,1f63cf331cdc8c78d8e119b59b1bb58f,http://arxiv.org/abs/1702.04138v1 16303," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",mojgan khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 16304," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",mehrdad khaledi,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 16305," We propose a game theoretic framework for task allocation in mobile cloud computing that corresponds to offloading of compute tasks to a group of nearby mobile devices. Specifically, in our framework, a distributor node holds a multidimensional auction for allocating the tasks of a job among nearby mobile nodes based on their computational capabilities and also the cost of computation at these nodes, with the goal of reducing the overall job completion time. Our proposed auction also has the desired incentive compatibility property that ensures that mobile devices truthfully reveal their capabilities and costs and that those devices benefit from the task allocation. To deal with node mobility, we perform multiple auctions over adaptive time intervals. We develop a heuristic approach to dynamically find the best time intervals between auctions to minimize unnecessary auctions and the accompanying overheads. We evaluate our framework and methods using both real world and synthetic mobility traces. Our evaluation results show that our game theoretic framework improves the job completion time by a factor of 2-5 in comparison to the time taken for executing the job locally, while minimizing the number of auctions and the accompanying overheads. Our approach is also profitable for the nearby nodes that execute the distributor's tasks with these nodes receiving a compensation higher than their actual costs. ",sneha kasera,,2016.0,,arXiv,Khaledi2016,True,,arXiv,Not available,Profitable Task Allocation in Mobile Cloud Computing,34411beade6c0e348ab24f31f40fdfec,http://arxiv.org/abs/1608.08521v1 16307," In an earlier experiment, participants played a perfect information game against a computer, which was programmed to deviate often from its backward induction strategy right at the beginning of the game. Participants knew that in each game, the computer was nevertheless optimizing against some belief about the participant's future strategy. In the aggregate, it appeared that participants applied forward induction. However, cardinal effects seemed to play a role as well: a number of participants might have been trying to maximize expected utility. In order to find out how people really reason in such a game, we designed centipede-like turn-taking games with new payoff structures in order to make such cardinal effects less likely. We ran a new experiment with 50 participants, based on marble drop visualizations of these revised payoff structures. After participants played 48 test games, we asked a number of questions to gauge the participants' reasoning about their own and the opponent's strategy at all decision nodes of a sample game. We also checked how the verbalized strategies fit to the actual choices they made at all their decision points in the 48 test games. Even though in the aggregate, participants in the new experiment still tend to slightly favor the forward induction choice at their first decision node, their verbalized strategies most often depend on their own attitudes towards risk and those they assign to the computer opponent, sometimes in addition to considerations about cooperativeness and competitiveness. ",harmen weerd,,2017.0,10.4204/EPTCS.251.19,"EPTCS 251, 2017, pp. 265-284",Ghosh2017,True,,arXiv,Not available,"What Drives People's Choices in Turn-Taking Games, if not Game-Theoretic Rationality?",3832039bd19e3f2a603cb1dbea2d0585,http://arxiv.org/abs/1707.08749v1 16309," We present a scheme for playing quantum repeated 2x2 games based on the Marinatto and Weber's approach to quantum games. As a potential application, we study twice repeated Prisoner's Dilemma game. We show that results not available in classical game can be obtained when the game is played in the quantum way. Before we present our idea, we comment on the previous scheme of playing quantum repeated games. ",piotr frackiewicz,,2011.0,10.1088/1751-8113/45/8/085307,arXiv,Frackiewicz2011,True,,arXiv,Not available,Quantum repeated games revisited,a091a5871a50766661f22ea80a7606fb,http://arxiv.org/abs/1109.3753v1 16310," We study the problem of setting a price for a potential buyer with a valuation drawn from an unknown distribution $D$. The seller has ""data""' about $D$ in the form of $m \ge 1$ i.i.d. samples, and the algorithmic challenge is to use these samples to obtain expected revenue as close as possible to what could be achieved with advance knowledge of $D$. Our first set of results quantifies the number of samples $m$ that are necessary and sufficient to obtain a $(1-\epsilon)$-approximation. For example, for an unknown distribution that satisfies the monotone hazard rate (MHR) condition, we prove that $\tilde{\Theta}(\epsilon^{-3/2})$ samples are necessary and sufficient. Remarkably, this is fewer samples than is necessary to accurately estimate the expected revenue obtained by even a single reserve price. We also prove essentially tight sample complexity bounds for regular distributions, bounded-support distributions, and a wide class of irregular distributions. Our lower bound approach borrows tools from differential privacy and information theory, and we believe it could find further applications in auction theory. Our second set of results considers the single-sample case. For regular distributions, we prove that no pricing strategy is better than $\tfrac{1}{2}$-approximate, and this is optimal by the Bulow-Klemperer theorem. For MHR distributions, we show how to do better: we give a simple pricing strategy that guarantees expected revenue at least $0.589$ times the maximum possible. We also prove that no pricing strategy achieves an approximation guarantee better than $\frac{e}{4} \approx .68$. ",zhiyi huang,,2014.0,,arXiv,Huang2014,True,,arXiv,Not available,Making the Most of Your Samples,0beaa9211ab7397c119a3299ad8c7696,http://arxiv.org/abs/1407.2479v2 16311," We study the problem of setting a price for a potential buyer with a valuation drawn from an unknown distribution $D$. The seller has ""data""' about $D$ in the form of $m \ge 1$ i.i.d. samples, and the algorithmic challenge is to use these samples to obtain expected revenue as close as possible to what could be achieved with advance knowledge of $D$. Our first set of results quantifies the number of samples $m$ that are necessary and sufficient to obtain a $(1-\epsilon)$-approximation. For example, for an unknown distribution that satisfies the monotone hazard rate (MHR) condition, we prove that $\tilde{\Theta}(\epsilon^{-3/2})$ samples are necessary and sufficient. Remarkably, this is fewer samples than is necessary to accurately estimate the expected revenue obtained by even a single reserve price. We also prove essentially tight sample complexity bounds for regular distributions, bounded-support distributions, and a wide class of irregular distributions. Our lower bound approach borrows tools from differential privacy and information theory, and we believe it could find further applications in auction theory. Our second set of results considers the single-sample case. For regular distributions, we prove that no pricing strategy is better than $\tfrac{1}{2}$-approximate, and this is optimal by the Bulow-Klemperer theorem. For MHR distributions, we show how to do better: we give a simple pricing strategy that guarantees expected revenue at least $0.589$ times the maximum possible. We also prove that no pricing strategy achieves an approximation guarantee better than $\frac{e}{4} \approx .68$. ",yishay mansour,,2014.0,,arXiv,Huang2014,True,,arXiv,Not available,Making the Most of Your Samples,0beaa9211ab7397c119a3299ad8c7696,http://arxiv.org/abs/1407.2479v2 16312," We study the problem of setting a price for a potential buyer with a valuation drawn from an unknown distribution $D$. The seller has ""data""' about $D$ in the form of $m \ge 1$ i.i.d. samples, and the algorithmic challenge is to use these samples to obtain expected revenue as close as possible to what could be achieved with advance knowledge of $D$. Our first set of results quantifies the number of samples $m$ that are necessary and sufficient to obtain a $(1-\epsilon)$-approximation. For example, for an unknown distribution that satisfies the monotone hazard rate (MHR) condition, we prove that $\tilde{\Theta}(\epsilon^{-3/2})$ samples are necessary and sufficient. Remarkably, this is fewer samples than is necessary to accurately estimate the expected revenue obtained by even a single reserve price. We also prove essentially tight sample complexity bounds for regular distributions, bounded-support distributions, and a wide class of irregular distributions. Our lower bound approach borrows tools from differential privacy and information theory, and we believe it could find further applications in auction theory. Our second set of results considers the single-sample case. For regular distributions, we prove that no pricing strategy is better than $\tfrac{1}{2}$-approximate, and this is optimal by the Bulow-Klemperer theorem. For MHR distributions, we show how to do better: we give a simple pricing strategy that guarantees expected revenue at least $0.589$ times the maximum possible. We also prove that no pricing strategy achieves an approximation guarantee better than $\frac{e}{4} \approx .68$. ",tim roughgarden,,2014.0,,arXiv,Huang2014,True,,arXiv,Not available,Making the Most of Your Samples,0beaa9211ab7397c119a3299ad8c7696,http://arxiv.org/abs/1407.2479v2 16313," In Zeng et al. [Fluct. Noise Lett. 7 (2007) L439--L447] the analysis of the lowest unique positive integer game is simplified by some reasonable assumptions that make the problem tractable for arbitrary numbers of players. However, here we show that the solution obtained for rational players is not a Nash equilibrium and that a rational utility maximizer with full computational capability would arrive at a solution with a superior expected payoff. An exact solution is presented for the three- and four-player cases and an approximate solution for an arbitrary number of players. ",adrian flitney,,2008.0,,Fluct. Noise Lett. 8 (2008) C1-C4,Flitney2008,True,,arXiv,Not available,"Comments on ""Reverse auction: the lowest positive integer game""",25fd8ccd4c07b9b0d8fb8e37e9f30047,http://arxiv.org/abs/0801.1535v1 16314," Second-price auctions with reserve play a critical role for modern search engine and popular online sites since the revenue of these companies often directly de- pends on the outcome of such auctions. The choice of the reserve price is the main mechanism through which the auction revenue can be influenced in these electronic markets. We cast the problem of selecting the reserve price to optimize revenue as a learning problem and present a full theoretical analysis dealing with the complex properties of the corresponding loss function. We further give novel algorithms for solving this problem and report the results of several experiments in both synthetic and real data demonstrating their effectiveness. ",mehryar mohri,,2013.0,,arXiv,Mohri2013,True,,arXiv,Not available,"Learning Theory and Algorithms for Revenue Optimization in Second-Price Auctions with Reserve",065e83e802149e3e0fbaa26ec9a44084,http://arxiv.org/abs/1310.5665v3 16315," Second-price auctions with reserve play a critical role for modern search engine and popular online sites since the revenue of these companies often directly de- pends on the outcome of such auctions. The choice of the reserve price is the main mechanism through which the auction revenue can be influenced in these electronic markets. We cast the problem of selecting the reserve price to optimize revenue as a learning problem and present a full theoretical analysis dealing with the complex properties of the corresponding loss function. We further give novel algorithms for solving this problem and report the results of several experiments in both synthetic and real data demonstrating their effectiveness. ",andres medina,,2013.0,,arXiv,Mohri2013,True,,arXiv,Not available,"Learning Theory and Algorithms for Revenue Optimization in Second-Price Auctions with Reserve",065e83e802149e3e0fbaa26ec9a44084,http://arxiv.org/abs/1310.5665v3 16316," The call auction is a widely used trading mechanism, especially during the opening and closing periods of financial markets. In this paper, we study a standard call auction problem where orders are submitted according to Poisson processes, with random prices distributed according to a general distribution, and may be cancelled at any time. We compute the analytical expressions of the distributions of the traded volume, of the lower and upper bounds of the clearing prices, and of the price range of these possible clearing prices of the call auction. Using results from the theory of order statistics and a theorem on the limit of sequences of random variables with independent random indices, we derive the weak limits of all these distributions. In this setting, traded volume and bounds of the clearing prices are found to be asymptotically normal, while the clearing price range is asymptotically exponential. All the parameters of these distributions are explicitly derived as functions of the parameters of the incoming orders' flows. ",ioane toke,,2014.0,,arXiv,Toke2014,True,,arXiv,Not available,Exact and asymptotic solutions of the call auction problem,a8c1fd06545ba8acb94fe635d3abcba7,http://arxiv.org/abs/1407.4512v2 16317," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",alfonso lobos,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16318," We introduce a framework for studying the effect of cooperation on the quality of outcomes in utility games. Our framework is a coalitional analog of the smoothness framework of non-cooperative games. Coalitional smoothness implies bounds on the strong price of anarchy, the loss of quality of coalitionally stable outcomes, as well as bounds on coalitional versions of coarse correlated equilibria and sink equilibria, which we define as out-of-equilibrium myopic behavior as determined by a natural coalitional version of best-response dynamics. Our coalitional smoothness framework captures existing results bounding the strong price of anarchy of network design games. We show that in any monotone utility-maximization game, if each player's utility is at least his marginal contribution to the welfare, then the strong price of anarchy is at most 2. This captures a broad class of games, including games with a very high price of anarchy. Additionally, we show that in potential games the strong price of anarchy is close to the price of stability, the quality of the best Nash equilibrium. ",yoram bachrach,,2013.0,,arXiv,Bachrach2013,True,,arXiv,Not available,Strong Price of Anarchy and Coalitional Dynamics,0af31fdf9e7e188adbdb7f97879422ab,http://arxiv.org/abs/1307.2537v1 16319," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",paul grigas,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16320," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",zheng wen,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16321," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",kuang-chih lee,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16322," Quantization becomes a new way to study classical game theory since quantum strategies and quantum games have been proposed. In previous studies, many typical game models, such as prisoner's dilemma, battle of the sexes, Hawk-Dove game, have been investigated by using quantization approaches. In this paper, several game models of opinion formations have been quantized based on the Marinatto-Weber quantum game scheme, a frequently used scheme to convert classical games to quantum versions. Our results show that the quantization can change fascinatingly the properties of some classical opinion formation game models so as to generate win-win outcomes. ",xinyang deng,,2015.0,10.1209/0295-5075/114/50012,arXiv,Deng2015,True,,arXiv,Not available,"Quantum games of opinion formation based on the Marinatto-Weber quantum game scheme",637025fc7b8ab599113a4a838497b62f,http://arxiv.org/abs/1507.07966v1 16323," Quantization becomes a new way to study classical game theory since quantum strategies and quantum games have been proposed. In previous studies, many typical game models, such as prisoner's dilemma, battle of the sexes, Hawk-Dove game, have been investigated by using quantization approaches. In this paper, several game models of opinion formations have been quantized based on the Marinatto-Weber quantum game scheme, a frequently used scheme to convert classical games to quantum versions. Our results show that the quantization can change fascinatingly the properties of some classical opinion formation game models so as to generate win-win outcomes. ",yong deng,,2015.0,10.1209/0295-5075/114/50012,arXiv,Deng2015,True,,arXiv,Not available,"Quantum games of opinion formation based on the Marinatto-Weber quantum game scheme",637025fc7b8ab599113a4a838497b62f,http://arxiv.org/abs/1507.07966v1 16324," Quantization becomes a new way to study classical game theory since quantum strategies and quantum games have been proposed. In previous studies, many typical game models, such as prisoner's dilemma, battle of the sexes, Hawk-Dove game, have been investigated by using quantization approaches. In this paper, several game models of opinion formations have been quantized based on the Marinatto-Weber quantum game scheme, a frequently used scheme to convert classical games to quantum versions. Our results show that the quantization can change fascinatingly the properties of some classical opinion formation game models so as to generate win-win outcomes. ",qi liu,,2015.0,10.1209/0295-5075/114/50012,arXiv,Deng2015,True,,arXiv,Not available,"Quantum games of opinion formation based on the Marinatto-Weber quantum game scheme",637025fc7b8ab599113a4a838497b62f,http://arxiv.org/abs/1507.07966v1 16325," Quantization becomes a new way to study classical game theory since quantum strategies and quantum games have been proposed. In previous studies, many typical game models, such as prisoner's dilemma, battle of the sexes, Hawk-Dove game, have been investigated by using quantization approaches. In this paper, several game models of opinion formations have been quantized based on the Marinatto-Weber quantum game scheme, a frequently used scheme to convert classical games to quantum versions. Our results show that the quantization can change fascinatingly the properties of some classical opinion formation game models so as to generate win-win outcomes. ",zhen wang,,2015.0,10.1209/0295-5075/114/50012,arXiv,Deng2015,True,,arXiv,Not available,"Quantum games of opinion formation based on the Marinatto-Weber quantum game scheme",637025fc7b8ab599113a4a838497b62f,http://arxiv.org/abs/1507.07966v1 16326," Using duality theory techniques we derive simple, closed-form formulas for bounding the optimal revenue of a monopolist selling many heterogeneous goods, in the case where the buyer's valuations for the items come i.i.d. from a uniform distribution and in the case where they follow independent (but not necessarily identical) exponential distributions. We apply this in order to get in both these settings specific performance guarantees, as functions of the number of items $m$, for the simple deterministic selling mechanisms studied by Hart and Nisan [EC 2012], namely the one that sells the items separately and the one that offers them all in a single bundle. We also propose and study the performance of a natural randomized mechanism for exponential valuations, called Proportional. As an interesting corollary, for the special case where the exponential distributions are also identical, we can derive that offering the goods in a single full bundle is the optimal selling mechanism for any number of items. To our knowledge, this is the first result of its kind: finding a revenue-maximizing auction in an additive setting with arbitrarily many goods. ",yiannis giannakopoulos,,2014.0,10.1016/j.tcs.2015.03.010,Theoretical Computer Science 581 (2015) 83-96,Giannakopoulos2014,True,,arXiv,Not available,Bounding the Optimal Revenue of Selling Multiple Goods,3a264e4fc56b59693f4bf20f31cbdefe,http://arxiv.org/abs/1404.2832v6 16327," The design of profit-maximizing multi-item mechanisms is a notoriously challenging problem with tremendous real-world impact. The mechanism designer's goal is to field a mechanism with high expected profit on the distribution over buyers' values. Unfortunately, if the set of mechanisms he optimizes over is complex, a mechanism may have high empirical profit over a small set of samples but low expected profit. This raises the question, how many samples are sufficient to ensure that the empirically optimal mechanism is nearly optimal in expectation? We uncover structure shared by a myriad of pricing, auction, and lottery mechanisms that allows us to prove strong sample complexity bounds: for any set of buyers' values, profit is a piecewise linear function of the mechanism's parameters. We prove new bounds for mechanism classes not yet studied in the sample-based mechanism design literature and match or improve over the best known guarantees for many classes. The profit functions we study are significantly different from well-understood functions in machine learning, so our analysis requires a sharp understanding of the interplay between mechanism parameters and buyer values. We strengthen our main results with data-dependent bounds when the distribution over buyers' values is ""well-behaved."" Finally, we investigate a fundamental tradeoff in sample-based mechanism design: complex mechanisms often have higher profit than simple mechanisms, but more samples are required to ensure that empirical and expected profit are close. We provide techniques for optimizing this tradeoff. ",maria-florina balcan,,2017.0,,arXiv,Balcan2017,True,,arXiv,Not available,A General Theory of Sample Complexity for Multi-Item Profit Maximization,15ca727cd6f087f396938b765a22c74d,http://arxiv.org/abs/1705.00243v4 16328," The design of profit-maximizing multi-item mechanisms is a notoriously challenging problem with tremendous real-world impact. The mechanism designer's goal is to field a mechanism with high expected profit on the distribution over buyers' values. Unfortunately, if the set of mechanisms he optimizes over is complex, a mechanism may have high empirical profit over a small set of samples but low expected profit. This raises the question, how many samples are sufficient to ensure that the empirically optimal mechanism is nearly optimal in expectation? We uncover structure shared by a myriad of pricing, auction, and lottery mechanisms that allows us to prove strong sample complexity bounds: for any set of buyers' values, profit is a piecewise linear function of the mechanism's parameters. We prove new bounds for mechanism classes not yet studied in the sample-based mechanism design literature and match or improve over the best known guarantees for many classes. The profit functions we study are significantly different from well-understood functions in machine learning, so our analysis requires a sharp understanding of the interplay between mechanism parameters and buyer values. We strengthen our main results with data-dependent bounds when the distribution over buyers' values is ""well-behaved."" Finally, we investigate a fundamental tradeoff in sample-based mechanism design: complex mechanisms often have higher profit than simple mechanisms, but more samples are required to ensure that empirical and expected profit are close. We provide techniques for optimizing this tradeoff. ",tuomas sandholm,,2017.0,,arXiv,Balcan2017,True,,arXiv,Not available,A General Theory of Sample Complexity for Multi-Item Profit Maximization,15ca727cd6f087f396938b765a22c74d,http://arxiv.org/abs/1705.00243v4 16329," We introduce a framework for studying the effect of cooperation on the quality of outcomes in utility games. Our framework is a coalitional analog of the smoothness framework of non-cooperative games. Coalitional smoothness implies bounds on the strong price of anarchy, the loss of quality of coalitionally stable outcomes, as well as bounds on coalitional versions of coarse correlated equilibria and sink equilibria, which we define as out-of-equilibrium myopic behavior as determined by a natural coalitional version of best-response dynamics. Our coalitional smoothness framework captures existing results bounding the strong price of anarchy of network design games. We show that in any monotone utility-maximization game, if each player's utility is at least his marginal contribution to the welfare, then the strong price of anarchy is at most 2. This captures a broad class of games, including games with a very high price of anarchy. Additionally, we show that in potential games the strong price of anarchy is close to the price of stability, the quality of the best Nash equilibrium. ",vasilis syrgkanis,,2013.0,,arXiv,Bachrach2013,True,,arXiv,Not available,Strong Price of Anarchy and Coalitional Dynamics,0af31fdf9e7e188adbdb7f97879422ab,http://arxiv.org/abs/1307.2537v1 16330," The design of profit-maximizing multi-item mechanisms is a notoriously challenging problem with tremendous real-world impact. The mechanism designer's goal is to field a mechanism with high expected profit on the distribution over buyers' values. Unfortunately, if the set of mechanisms he optimizes over is complex, a mechanism may have high empirical profit over a small set of samples but low expected profit. This raises the question, how many samples are sufficient to ensure that the empirically optimal mechanism is nearly optimal in expectation? We uncover structure shared by a myriad of pricing, auction, and lottery mechanisms that allows us to prove strong sample complexity bounds: for any set of buyers' values, profit is a piecewise linear function of the mechanism's parameters. We prove new bounds for mechanism classes not yet studied in the sample-based mechanism design literature and match or improve over the best known guarantees for many classes. The profit functions we study are significantly different from well-understood functions in machine learning, so our analysis requires a sharp understanding of the interplay between mechanism parameters and buyer values. We strengthen our main results with data-dependent bounds when the distribution over buyers' values is ""well-behaved."" Finally, we investigate a fundamental tradeoff in sample-based mechanism design: complex mechanisms often have higher profit than simple mechanisms, but more samples are required to ensure that empirical and expected profit are close. We provide techniques for optimizing this tradeoff. ",ellen vitercik,,2017.0,,arXiv,Balcan2017,True,,arXiv,Not available,A General Theory of Sample Complexity for Multi-Item Profit Maximization,15ca727cd6f087f396938b765a22c74d,http://arxiv.org/abs/1705.00243v4 16331," As the number of resources on chip multiprocessors (CMPs) increases, the complexity of how to best allocate these resources increases drastically. Because the higher number of applications makes the interaction and impacts of various memory levels more complex. Also, the selection of the objective function to define what \enquote{best} means for all applications is challenging. Memory-level parallelism (MLP) aware replacement algorithms in CMPs try to maximize the overall system performance or equalize each application's performance degradation due to sharing. However, depending on the selected \enquote{performance} metric, these algorithms are not efficiently implemented, because these centralized approaches mostly need some further information regarding about applications' need. In this paper, we propose a contention-aware game-theoretic resource management approach (CARMA) using market auction mechanism to find an optimal strategy for each application in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we consider two cases: (i) cache competition game, and (ii) main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches. ",farshid farhat,,2017.0,,arXiv,Farhat2017,True,,arXiv,Not available,"CARMA: Contention-aware Auction-based Resource Management in Architecture",e96a94cf2967d68de4e7a03781cd9312,http://arxiv.org/abs/1710.00073v4 16332," As the number of resources on chip multiprocessors (CMPs) increases, the complexity of how to best allocate these resources increases drastically. Because the higher number of applications makes the interaction and impacts of various memory levels more complex. Also, the selection of the objective function to define what \enquote{best} means for all applications is challenging. Memory-level parallelism (MLP) aware replacement algorithms in CMPs try to maximize the overall system performance or equalize each application's performance degradation due to sharing. However, depending on the selected \enquote{performance} metric, these algorithms are not efficiently implemented, because these centralized approaches mostly need some further information regarding about applications' need. In this paper, we propose a contention-aware game-theoretic resource management approach (CARMA) using market auction mechanism to find an optimal strategy for each application in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we consider two cases: (i) cache competition game, and (ii) main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches. ",diman tootaghaj,,2017.0,,arXiv,Farhat2017,True,,arXiv,Not available,"CARMA: Contention-aware Auction-based Resource Management in Architecture",e96a94cf2967d68de4e7a03781cd9312,http://arxiv.org/abs/1710.00073v4 16333," We provide some examples showing how game-theoretic arguments can be used in computability theory and algorithmic information theory: unique numbering theorem (Friedberg), the gap between conditional complexity and total conditional complexity, Epstein--Levin theorem and some (yet unpublished) result of Muchnik and Vyugin ",andrej muchnik,,2012.0,,arXiv,Muchnik2012,True,,arXiv,Not available,"Game arguments in computability theory and algorithmic information theory",e2d25a25f68f039d6ae204ee42b37076,http://arxiv.org/abs/1204.0198v4 16334," We provide some examples showing how game-theoretic arguments can be used in computability theory and algorithmic information theory: unique numbering theorem (Friedberg), the gap between conditional complexity and total conditional complexity, Epstein--Levin theorem and some (yet unpublished) result of Muchnik and Vyugin ",alexander shen,,2012.0,,arXiv,Muchnik2012,True,,arXiv,Not available,"Game arguments in computability theory and algorithmic information theory",e2d25a25f68f039d6ae204ee42b37076,http://arxiv.org/abs/1204.0198v4 16335," We provide some examples showing how game-theoretic arguments can be used in computability theory and algorithmic information theory: unique numbering theorem (Friedberg), the gap between conditional complexity and total conditional complexity, Epstein--Levin theorem and some (yet unpublished) result of Muchnik and Vyugin ",mikhail vyugin,,2012.0,,arXiv,Muchnik2012,True,,arXiv,Not available,"Game arguments in computability theory and algorithmic information theory",e2d25a25f68f039d6ae204ee42b37076,http://arxiv.org/abs/1204.0198v4 16336," We consider monotonicity problems for graph searching games. Variants of these games - defined by the type of moves allowed for the players - have been found to be closely connected to graph decompositions and associated width measures such as path- or tree-width. Of particular interest is the question whether these games are monotone, i.e. whether the cops can catch a robber without ever allowing the robber to reach positions that have been cleared before. The monotonicity problem for graph searching games has intensely been studied in the literature, but for two types of games the problem was left unresolved. These are the games on digraphs where the robber is invisible and lazy or visible and fast. In this paper, we solve the problems by giving examples showing that both types of games are non-monotone. Graph searching games on digraphs are closely related to recent proposals for digraph decompositions generalising tree-width to directed graphs. These proposals have partly been motivated by attempts to develop a structure theory for digraphs similar to the graph minor theory developed by Robertson and Seymour for undirected graphs, and partly by the immense number of algorithmic results using tree-width of undirected graphs and the hope that part of this success might be reproducible on digraphs using a directed tree-width. Unfortunately the number of applications for the digraphs measures introduced so far is still small. We therefore explore the limits of the algorithmic applicability of digraph decompositions. In particular, we show that various natural candidates for problems that might benefit from digraphs having small directed tree-width remain NP-complete even on almost acyclic graphs. ",stephan kreutzer,,2008.0,,arXiv,Kreutzer2008,True,,arXiv,Not available,Digraph Decompositions and Monotonicity in Digraph Searching,34c7d9b8dbed273404b8ca711b6c0292,http://arxiv.org/abs/0802.2228v1 16337," We consider monotonicity problems for graph searching games. Variants of these games - defined by the type of moves allowed for the players - have been found to be closely connected to graph decompositions and associated width measures such as path- or tree-width. Of particular interest is the question whether these games are monotone, i.e. whether the cops can catch a robber without ever allowing the robber to reach positions that have been cleared before. The monotonicity problem for graph searching games has intensely been studied in the literature, but for two types of games the problem was left unresolved. These are the games on digraphs where the robber is invisible and lazy or visible and fast. In this paper, we solve the problems by giving examples showing that both types of games are non-monotone. Graph searching games on digraphs are closely related to recent proposals for digraph decompositions generalising tree-width to directed graphs. These proposals have partly been motivated by attempts to develop a structure theory for digraphs similar to the graph minor theory developed by Robertson and Seymour for undirected graphs, and partly by the immense number of algorithmic results using tree-width of undirected graphs and the hope that part of this success might be reproducible on digraphs using a directed tree-width. Unfortunately the number of applications for the digraphs measures introduced so far is still small. We therefore explore the limits of the algorithmic applicability of digraph decompositions. In particular, we show that various natural candidates for problems that might benefit from digraphs having small directed tree-width remain NP-complete even on almost acyclic graphs. ",sebastian ordyniak,,2008.0,,arXiv,Kreutzer2008,True,,arXiv,Not available,Digraph Decompositions and Monotonicity in Digraph Searching,34c7d9b8dbed273404b8ca711b6c0292,http://arxiv.org/abs/0802.2228v1 16338," Representation languages for coalitional games are a key research area in algorithmic game theory. There is an inherent tradeoff between how general a language is, allowing it to capture more elaborate games, and how hard it is computationally to optimize and solve such games. One prominent such language is the simple yet expressive Weighted Graph Games (WGGs) representation [14], which maintains knowledge about synergies between agents in the form of an edge weighted graph. We consider the problem of finding the optimal coalition structure in WGGs. The agents in such games are vertices in a graph, and the value of a coalition is the sum of the weights of the edges present between coalition members. The optimal coalition structure is a partition of the agents to coalitions, that maximizes the sum of utilities obtained by the coalitions. We show that finding the optimal coalition structure is not only hard for general graphs, but is also intractable for restricted families such as planar graphs which are amenable for many other combinatorial problems. We then provide algorithms with constant factor approximations for planar, minor-free and bounded degree graphs. ",yoram bachrach,,2011.0,,arXiv,Bachrach2011,True,,arXiv,Not available,Optimal Coalition Structures in Cooperative Graph Games,e58351577fc6c36ca638df97126ea730,http://arxiv.org/abs/1108.5248v2 16339," Representation languages for coalitional games are a key research area in algorithmic game theory. There is an inherent tradeoff between how general a language is, allowing it to capture more elaborate games, and how hard it is computationally to optimize and solve such games. One prominent such language is the simple yet expressive Weighted Graph Games (WGGs) representation [14], which maintains knowledge about synergies between agents in the form of an edge weighted graph. We consider the problem of finding the optimal coalition structure in WGGs. The agents in such games are vertices in a graph, and the value of a coalition is the sum of the weights of the edges present between coalition members. The optimal coalition structure is a partition of the agents to coalitions, that maximizes the sum of utilities obtained by the coalitions. We show that finding the optimal coalition structure is not only hard for general graphs, but is also intractable for restricted families such as planar graphs which are amenable for many other combinatorial problems. We then provide algorithms with constant factor approximations for planar, minor-free and bounded degree graphs. ",pushmeet kohli,,2011.0,,arXiv,Bachrach2011,True,,arXiv,Not available,Optimal Coalition Structures in Cooperative Graph Games,e58351577fc6c36ca638df97126ea730,http://arxiv.org/abs/1108.5248v2 16340," We study a game for recognising formal languages, in which two players with imperfect information need to coordinate on a common decision, given private input words correlated by a finite graph. The players have a joint objective to avoid an inadmissible decision, in spite of the uncertainty induced by the input. We show that the acceptor model based on consensus games characterises context-sensitive languages. Further, we describe the expressiveness of these games in terms of iterated synchronous transductions and identify a subclass that characterises context-free languages. ",dietmar berwanger,,2015.0,,arXiv,Berwanger2015,True,,arXiv,Not available,Consensus Game Acceptors and Iterated Transductions,fb66475077eaf68af0c9cd96dbe7d038,http://arxiv.org/abs/1501.07131v3 16341," We introduce a framework for studying the effect of cooperation on the quality of outcomes in utility games. Our framework is a coalitional analog of the smoothness framework of non-cooperative games. Coalitional smoothness implies bounds on the strong price of anarchy, the loss of quality of coalitionally stable outcomes, as well as bounds on coalitional versions of coarse correlated equilibria and sink equilibria, which we define as out-of-equilibrium myopic behavior as determined by a natural coalitional version of best-response dynamics. Our coalitional smoothness framework captures existing results bounding the strong price of anarchy of network design games. We show that in any monotone utility-maximization game, if each player's utility is at least his marginal contribution to the welfare, then the strong price of anarchy is at most 2. This captures a broad class of games, including games with a very high price of anarchy. Additionally, we show that in potential games the strong price of anarchy is close to the price of stability, the quality of the best Nash equilibrium. ",eva tardos,,2013.0,,arXiv,Bachrach2013,True,,arXiv,Not available,Strong Price of Anarchy and Coalitional Dynamics,0af31fdf9e7e188adbdb7f97879422ab,http://arxiv.org/abs/1307.2537v1 16342," Representation languages for coalitional games are a key research area in algorithmic game theory. There is an inherent tradeoff between how general a language is, allowing it to capture more elaborate games, and how hard it is computationally to optimize and solve such games. One prominent such language is the simple yet expressive Weighted Graph Games (WGGs) representation [14], which maintains knowledge about synergies between agents in the form of an edge weighted graph. We consider the problem of finding the optimal coalition structure in WGGs. The agents in such games are vertices in a graph, and the value of a coalition is the sum of the weights of the edges present between coalition members. The optimal coalition structure is a partition of the agents to coalitions, that maximizes the sum of utilities obtained by the coalitions. We show that finding the optimal coalition structure is not only hard for general graphs, but is also intractable for restricted families such as planar graphs which are amenable for many other combinatorial problems. We then provide algorithms with constant factor approximations for planar, minor-free and bounded degree graphs. ",vladimir kolmogorov,,2011.0,,arXiv,Bachrach2011,True,,arXiv,Not available,Optimal Coalition Structures in Cooperative Graph Games,e58351577fc6c36ca638df97126ea730,http://arxiv.org/abs/1108.5248v2 16343," Representation languages for coalitional games are a key research area in algorithmic game theory. There is an inherent tradeoff between how general a language is, allowing it to capture more elaborate games, and how hard it is computationally to optimize and solve such games. One prominent such language is the simple yet expressive Weighted Graph Games (WGGs) representation [14], which maintains knowledge about synergies between agents in the form of an edge weighted graph. We consider the problem of finding the optimal coalition structure in WGGs. The agents in such games are vertices in a graph, and the value of a coalition is the sum of the weights of the edges present between coalition members. The optimal coalition structure is a partition of the agents to coalitions, that maximizes the sum of utilities obtained by the coalitions. We show that finding the optimal coalition structure is not only hard for general graphs, but is also intractable for restricted families such as planar graphs which are amenable for many other combinatorial problems. We then provide algorithms with constant factor approximations for planar, minor-free and bounded degree graphs. ",morteza zadimoghaddam,,2011.0,,arXiv,Bachrach2011,True,,arXiv,Not available,Optimal Coalition Structures in Cooperative Graph Games,e58351577fc6c36ca638df97126ea730,http://arxiv.org/abs/1108.5248v2 16344," Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated games. We use the inaugural Lemonade Stand Game Tournament to demonstrate the effectiveness of our approach, and find that TeamUP is the best performing agent, demoting the Tournament's actual winning strategy into second place. In our experimental analysis, we show hat our strategy successfully and consistently builds collaborations with many different heterogeneous (and sometimes very sophisticated) adversaries. ",enrique cote,,2012.0,,arXiv,Cote2012,True,,arXiv,Not available,Automated Planning in Repeated Adversarial Games,5ec008101ce2a6052061d50dae3497eb,http://arxiv.org/abs/1203.3498v1 16345," Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated games. We use the inaugural Lemonade Stand Game Tournament to demonstrate the effectiveness of our approach, and find that TeamUP is the best performing agent, demoting the Tournament's actual winning strategy into second place. In our experimental analysis, we show hat our strategy successfully and consistently builds collaborations with many different heterogeneous (and sometimes very sophisticated) adversaries. ",archie chapman,,2012.0,,arXiv,Cote2012,True,,arXiv,Not available,Automated Planning in Repeated Adversarial Games,5ec008101ce2a6052061d50dae3497eb,http://arxiv.org/abs/1203.3498v1 16346," Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated games. We use the inaugural Lemonade Stand Game Tournament to demonstrate the effectiveness of our approach, and find that TeamUP is the best performing agent, demoting the Tournament's actual winning strategy into second place. In our experimental analysis, we show hat our strategy successfully and consistently builds collaborations with many different heterogeneous (and sometimes very sophisticated) adversaries. ",adam sykulski,,2012.0,,arXiv,Cote2012,True,,arXiv,Not available,Automated Planning in Repeated Adversarial Games,5ec008101ce2a6052061d50dae3497eb,http://arxiv.org/abs/1203.3498v1 16347," Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated games. We use the inaugural Lemonade Stand Game Tournament to demonstrate the effectiveness of our approach, and find that TeamUP is the best performing agent, demoting the Tournament's actual winning strategy into second place. In our experimental analysis, we show hat our strategy successfully and consistently builds collaborations with many different heterogeneous (and sometimes very sophisticated) adversaries. ",nicholas jennings,,2012.0,,arXiv,Cote2012,True,,arXiv,Not available,Automated Planning in Repeated Adversarial Games,5ec008101ce2a6052061d50dae3497eb,http://arxiv.org/abs/1203.3498v1 16348," Parity games are an expressive framework to consider realizability questions for omega-regular languages. However, it is open whether they can be solved in polynomial time, making them unamenable for practical usage. To overcome this restriction, we consider 3-color parity games, which can be solved in polynomial time. They still cover an expressive fragment of specifications, as they include the classical B\""uchi and co-B\""uchi winning conditions as well as their union and intersection. This already suffices to express many useful combinations of safety and liveness properties, as for example the family of GR(1). The best known algorithm for 3-color parity games solves a game with n vertices in $ O(n^{2}\sqrt{n}) $ time. We improve on this result by presenting a new algorithm, based on simple attractor constructions, which only needs time $ O(n^2) $. As a result, we match the best known running times for solving (co)-B\""uchi games, showing that 3-color parity games are not harder to solve in general. ",felix klein,,2014.0,,arXiv,Klein2014,True,,arXiv,Not available,Solving 3-Color Parity Games in $ O(n^2) $ Time,d73faf59fa50ffa5c445dd165474212f,http://arxiv.org/abs/1412.5159v2 16349," Two fundamental problems in computational game theory are computing a Nash equilibrium and learning to exploit opponents given observations of their play (opponent exploitation). The latter is perhaps even more important than the former: Nash equilibrium does not have a compelling theoretical justification in game classes other than two-player zero-sum, and for all games one can potentially do better by exploiting perceived weaknesses of the opponent than by following a static equilibrium strategy throughout the match. The natural setting for opponent exploitation is the Bayesian setting where we have a prior model that is integrated with observations to create a posterior opponent model that we respond to. The most natural, and a well-studied prior distribution is the Dirichlet distribution. An exact polynomial-time algorithm is known for best-responding to the posterior distribution for an opponent assuming a Dirichlet prior with multinomial sampling in normal-form games; however, for imperfect-information games the best known algorithm is based on approximating an infinite integral without theoretical guarantees. We present the first exact algorithm for a natural class of imperfect-information games. We demonstrate that our algorithm runs quickly in practice and outperforms the best prior approaches. We also present an algorithm for the uniform prior setting. ",sam ganzfried,,2016.0,,arXiv,Ganzfried2016,True,,arXiv,Not available,Bayesian Opponent Exploitation in Imperfect-Information Games,387fd57284473cfe0b7b5b4a82553584,http://arxiv.org/abs/1603.03491v6 16350," Two fundamental problems in computational game theory are computing a Nash equilibrium and learning to exploit opponents given observations of their play (opponent exploitation). The latter is perhaps even more important than the former: Nash equilibrium does not have a compelling theoretical justification in game classes other than two-player zero-sum, and for all games one can potentially do better by exploiting perceived weaknesses of the opponent than by following a static equilibrium strategy throughout the match. The natural setting for opponent exploitation is the Bayesian setting where we have a prior model that is integrated with observations to create a posterior opponent model that we respond to. The most natural, and a well-studied prior distribution is the Dirichlet distribution. An exact polynomial-time algorithm is known for best-responding to the posterior distribution for an opponent assuming a Dirichlet prior with multinomial sampling in normal-form games; however, for imperfect-information games the best known algorithm is based on approximating an infinite integral without theoretical guarantees. We present the first exact algorithm for a natural class of imperfect-information games. We demonstrate that our algorithm runs quickly in practice and outperforms the best prior approaches. We also present an algorithm for the uniform prior setting. ",qingyun sun,,2016.0,,arXiv,Ganzfried2016,True,,arXiv,Not available,Bayesian Opponent Exploitation in Imperfect-Information Games,387fd57284473cfe0b7b5b4a82553584,http://arxiv.org/abs/1603.03491v6 16351," We consider eager-push epidemic dissemination in a complete graph. Time is divided into synchronous stages. In each stage, a source disseminates $\nu$ events. Each event is sent by the source, and forwarded by each node upon its first reception, to $f$ nodes selected uniformly at random, where $f$ is the fanout. We use Game Theory to study the range of $f$ for which equilibria strategies exist, assuming that players are either rational or obedient to the protocol, and that they do not collude. We model interactions as an infinitely repeated game. We devise a monitoring mechanism that extends the repeated game with communication rounds used for exchanging monitoring information, and define strategies for this extended game. We assume the existence of a trusted mediator, that players are computationally bounded such that they cannot break the cryptographic primitives used in our mechanism, and that symmetric ciphering is cheap. Under these assumptions, we show that, if the size of the stream is sufficiently large and players attribute enough value to future utilities, then the defined strategies are Sequential Equilibria of the extended game for any value of $f$. Moreover, the utility provided to each player is arbitrarily close to that provided in the original game. This shows that we can persuade rational nodes to follow a dissemination protocol that uses any fanout, while arbitrarily minimising the relative overhead of monitoring. ",xavier vilaca,,2014.0,,arXiv,Vilaca2014,True,,arXiv,Not available,"On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator",ae45198f9980d886cc875bddffe2a26d,http://arxiv.org/abs/1407.6295v3 16352," We introduce a framework for studying the effect of cooperation on the quality of outcomes in utility games. Our framework is a coalitional analog of the smoothness framework of non-cooperative games. Coalitional smoothness implies bounds on the strong price of anarchy, the loss of quality of coalitionally stable outcomes, as well as bounds on coalitional versions of coarse correlated equilibria and sink equilibria, which we define as out-of-equilibrium myopic behavior as determined by a natural coalitional version of best-response dynamics. Our coalitional smoothness framework captures existing results bounding the strong price of anarchy of network design games. We show that in any monotone utility-maximization game, if each player's utility is at least his marginal contribution to the welfare, then the strong price of anarchy is at most 2. This captures a broad class of games, including games with a very high price of anarchy. Additionally, we show that in potential games the strong price of anarchy is close to the price of stability, the quality of the best Nash equilibrium. ",milan vojnovic,,2013.0,,arXiv,Bachrach2013,True,,arXiv,Not available,Strong Price of Anarchy and Coalitional Dynamics,0af31fdf9e7e188adbdb7f97879422ab,http://arxiv.org/abs/1307.2537v1 16353," We consider eager-push epidemic dissemination in a complete graph. Time is divided into synchronous stages. In each stage, a source disseminates $\nu$ events. Each event is sent by the source, and forwarded by each node upon its first reception, to $f$ nodes selected uniformly at random, where $f$ is the fanout. We use Game Theory to study the range of $f$ for which equilibria strategies exist, assuming that players are either rational or obedient to the protocol, and that they do not collude. We model interactions as an infinitely repeated game. We devise a monitoring mechanism that extends the repeated game with communication rounds used for exchanging monitoring information, and define strategies for this extended game. We assume the existence of a trusted mediator, that players are computationally bounded such that they cannot break the cryptographic primitives used in our mechanism, and that symmetric ciphering is cheap. Under these assumptions, we show that, if the size of the stream is sufficiently large and players attribute enough value to future utilities, then the defined strategies are Sequential Equilibria of the extended game for any value of $f$. Moreover, the utility provided to each player is arbitrarily close to that provided in the original game. This shows that we can persuade rational nodes to follow a dissemination protocol that uses any fanout, while arbitrarily minimising the relative overhead of monitoring. ",luis rodrigues,,2014.0,,arXiv,Vilaca2014,True,,arXiv,Not available,"On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator",ae45198f9980d886cc875bddffe2a26d,http://arxiv.org/abs/1407.6295v3 16354," Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems. ",jeffrey pawlick,,2015.0,10.13140/RG.2.1.3128.9446,arXiv,Pawlick2015,True,,arXiv,Not available,"Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats",79451471eb556da5bc5d15fa8abddff4,http://arxiv.org/abs/1507.00576v2 16355," Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems. ",sadegh farhang,,2015.0,10.13140/RG.2.1.3128.9446,arXiv,Pawlick2015,True,,arXiv,Not available,"Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats",79451471eb556da5bc5d15fa8abddff4,http://arxiv.org/abs/1507.00576v2 16356," Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems. ",quanyan zhu,,2015.0,10.13140/RG.2.1.3128.9446,arXiv,Pawlick2015,True,,arXiv,Not available,"Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats",79451471eb556da5bc5d15fa8abddff4,http://arxiv.org/abs/1507.00576v2 16357," This paper studies the complexity of solving two classes of non-cooperative games in a distributed manner in which the players communicate with a set of system nodes over noisy communication channels. The complexity of solving each game class is defined as the minimum number of iterations required to find a Nash equilibrium (NE) of any game in that class with $\epsilon$ accuracy. First, we consider the class $\mathcal{G}$ of all $N$-player non-cooperative games with a continuous action space that admit at least one NE. Using information-theoretic inequalities, we derive a lower bound on the complexity of solving $\mathcal{G}$ that depends on the Kolmogorov $2\epsilon$-capacity of the constraint set and the total capacity of the communication channels. We also derive a lower bound on the complexity of solving games in $\mathcal{G}$ which depends on the volume and surface area of the constraint set. We next consider the class of all $N$-player non-cooperative games with at least one NE such that the players' utility functions satisfy a certain (differential) constraint. We derive lower bounds on the complexity of solving this game class under both Gaussian and non-Gaussian noise models. Our result in the non-Gaussian case is derived by establishing a connection between the Kullback-Leibler distance and Fisher information. ",ehsan nekouei,,2017.0,,arXiv,Nekouei2017,True,,arXiv,Not available,"Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games",01ab54afcdb58fee3cd3049477409b4b,http://arxiv.org/abs/1701.06717v1 16358," This paper studies the complexity of solving two classes of non-cooperative games in a distributed manner in which the players communicate with a set of system nodes over noisy communication channels. The complexity of solving each game class is defined as the minimum number of iterations required to find a Nash equilibrium (NE) of any game in that class with $\epsilon$ accuracy. First, we consider the class $\mathcal{G}$ of all $N$-player non-cooperative games with a continuous action space that admit at least one NE. Using information-theoretic inequalities, we derive a lower bound on the complexity of solving $\mathcal{G}$ that depends on the Kolmogorov $2\epsilon$-capacity of the constraint set and the total capacity of the communication channels. We also derive a lower bound on the complexity of solving games in $\mathcal{G}$ which depends on the volume and surface area of the constraint set. We next consider the class of all $N$-player non-cooperative games with at least one NE such that the players' utility functions satisfy a certain (differential) constraint. We derive lower bounds on the complexity of solving this game class under both Gaussian and non-Gaussian noise models. Our result in the non-Gaussian case is derived by establishing a connection between the Kullback-Leibler distance and Fisher information. ",girish nair,,2017.0,,arXiv,Nekouei2017,True,,arXiv,Not available,"Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games",01ab54afcdb58fee3cd3049477409b4b,http://arxiv.org/abs/1701.06717v1 16359," This paper studies the complexity of solving two classes of non-cooperative games in a distributed manner in which the players communicate with a set of system nodes over noisy communication channels. The complexity of solving each game class is defined as the minimum number of iterations required to find a Nash equilibrium (NE) of any game in that class with $\epsilon$ accuracy. First, we consider the class $\mathcal{G}$ of all $N$-player non-cooperative games with a continuous action space that admit at least one NE. Using information-theoretic inequalities, we derive a lower bound on the complexity of solving $\mathcal{G}$ that depends on the Kolmogorov $2\epsilon$-capacity of the constraint set and the total capacity of the communication channels. We also derive a lower bound on the complexity of solving games in $\mathcal{G}$ which depends on the volume and surface area of the constraint set. We next consider the class of all $N$-player non-cooperative games with at least one NE such that the players' utility functions satisfy a certain (differential) constraint. We derive lower bounds on the complexity of solving this game class under both Gaussian and non-Gaussian noise models. Our result in the non-Gaussian case is derived by establishing a connection between the Kullback-Leibler distance and Fisher information. ",tansu alpcan,,2017.0,,arXiv,Nekouei2017,True,,arXiv,Not available,"Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games",01ab54afcdb58fee3cd3049477409b4b,http://arxiv.org/abs/1701.06717v1 16360," This paper studies the complexity of solving two classes of non-cooperative games in a distributed manner in which the players communicate with a set of system nodes over noisy communication channels. The complexity of solving each game class is defined as the minimum number of iterations required to find a Nash equilibrium (NE) of any game in that class with $\epsilon$ accuracy. First, we consider the class $\mathcal{G}$ of all $N$-player non-cooperative games with a continuous action space that admit at least one NE. Using information-theoretic inequalities, we derive a lower bound on the complexity of solving $\mathcal{G}$ that depends on the Kolmogorov $2\epsilon$-capacity of the constraint set and the total capacity of the communication channels. We also derive a lower bound on the complexity of solving games in $\mathcal{G}$ which depends on the volume and surface area of the constraint set. We next consider the class of all $N$-player non-cooperative games with at least one NE such that the players' utility functions satisfy a certain (differential) constraint. We derive lower bounds on the complexity of solving this game class under both Gaussian and non-Gaussian noise models. Our result in the non-Gaussian case is derived by establishing a connection between the Kullback-Leibler distance and Fisher information. ",robin evans,,2017.0,,arXiv,Nekouei2017,True,,arXiv,Not available,"Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games",01ab54afcdb58fee3cd3049477409b4b,http://arxiv.org/abs/1701.06717v1 16361," Parity games are games that are played on directed graphs whose vertices are labeled by natural numbers, called priorities. The players push a token along the edges of the digraph. The winner is determined by the parity of the greatest priority occurring infinitely often in this infinite play. A motivation for studying parity games comes from the area of formal verification of systems by model checking. Deciding the winner in a parity game is polynomial time equivalent to the model checking problem of the modal mu-calculus. Another strong motivation lies in the fact that the exact complexity of solving parity games is a long-standing open problem, the currently best known algorithm being subexponential. It is known that the problem is in the complexity classes UP and coUP. In this paper we identify restricted classes of digraphs where the problem is solvable in polynomial time, following an approach from structural graph theory. We consider three standard graph operations: the join of two graphs, repeated pasting along vertices, and the addition of a vertex. Given a class C of digraphs on which we can solve parity games in polynomial time, we show that the same holds for the class obtained from C by applying once any of these three operations to its elements. These results provide, in particular, polynomial time algorithms for parity games whose underlying graph is an orientation of a complete graph, a complete bipartite graph, a block graph, or a block-cactus graph. These are classes where the problem was not known to be efficiently solvable. Previous results concerning restricted classes of parity games which are solvable in polynomial time include classes of bounded tree-width, bounded DAG-width, and bounded clique-width. We also prove that recognising the winning regions of a parity game is not easier than computing them from scratch. ",christoph dittmann,,2012.0,,arXiv,Dittmann2012,True,,arXiv,Not available,Graph Operations on Parity Games and Polynomial-Time Algorithms,4e05dfef3920b8778282155f6a631823,http://arxiv.org/abs/1208.1640v1 16362," Parity games are games that are played on directed graphs whose vertices are labeled by natural numbers, called priorities. The players push a token along the edges of the digraph. The winner is determined by the parity of the greatest priority occurring infinitely often in this infinite play. A motivation for studying parity games comes from the area of formal verification of systems by model checking. Deciding the winner in a parity game is polynomial time equivalent to the model checking problem of the modal mu-calculus. Another strong motivation lies in the fact that the exact complexity of solving parity games is a long-standing open problem, the currently best known algorithm being subexponential. It is known that the problem is in the complexity classes UP and coUP. In this paper we identify restricted classes of digraphs where the problem is solvable in polynomial time, following an approach from structural graph theory. We consider three standard graph operations: the join of two graphs, repeated pasting along vertices, and the addition of a vertex. Given a class C of digraphs on which we can solve parity games in polynomial time, we show that the same holds for the class obtained from C by applying once any of these three operations to its elements. These results provide, in particular, polynomial time algorithms for parity games whose underlying graph is an orientation of a complete graph, a complete bipartite graph, a block graph, or a block-cactus graph. These are classes where the problem was not known to be efficiently solvable. Previous results concerning restricted classes of parity games which are solvable in polynomial time include classes of bounded tree-width, bounded DAG-width, and bounded clique-width. We also prove that recognising the winning regions of a parity game is not easier than computing them from scratch. ",stephan kreutzer,,2012.0,,arXiv,Dittmann2012,True,,arXiv,Not available,Graph Operations on Parity Games and Polynomial-Time Algorithms,4e05dfef3920b8778282155f6a631823,http://arxiv.org/abs/1208.1640v1 16363," Boolean games are an expressive and natural formalism through which to investigate problems of strategic interaction in multiagent systems. Although they have been widely studied, almost all previous work on Nash equilibria in Boolean games has focused on the restricted setting of pure strategies. This is a shortcoming as finite games are guaranteed to have at least one equilibrium in mixed strategies, but many simple games fail to have pure strategy equilibria at all. We address this by showing that a natural decision problem about mixed equilibria: determining whether a Boolean game has a mixed strategy equilibrium that guarantees every player a given payoff, is NEXP-hard. Accordingly, the $\epsilon$ variety of the problem is NEXP-complete. The proof can be adapted to show coNEXP-hardness of a similar question: whether all Nash equilibria of a Boolean game guarantee every player at least the given payoff. ",egor ianovski,,2013.0,,arXiv,Ianovski2013,True,,arXiv,Not available,EGuaranteeNash for Boolean Games is NEXP-Hard,272e38fb774a62e2e3d5de3b3ab51114,http://arxiv.org/abs/1312.4114v1 16364," Parity games are games that are played on directed graphs whose vertices are labeled by natural numbers, called priorities. The players push a token along the edges of the digraph. The winner is determined by the parity of the greatest priority occurring infinitely often in this infinite play. A motivation for studying parity games comes from the area of formal verification of systems by model checking. Deciding the winner in a parity game is polynomial time equivalent to the model checking problem of the modal mu-calculus. Another strong motivation lies in the fact that the exact complexity of solving parity games is a long-standing open problem, the currently best known algorithm being subexponential. It is known that the problem is in the complexity classes UP and coUP. In this paper we identify restricted classes of digraphs where the problem is solvable in polynomial time, following an approach from structural graph theory. We consider three standard graph operations: the join of two graphs, repeated pasting along vertices, and the addition of a vertex. Given a class C of digraphs on which we can solve parity games in polynomial time, we show that the same holds for the class obtained from C by applying once any of these three operations to its elements. These results provide, in particular, polynomial time algorithms for parity games whose underlying graph is an orientation of a complete graph, a complete bipartite graph, a block graph, or a block-cactus graph. These are classes where the problem was not known to be efficiently solvable. Previous results concerning restricted classes of parity games which are solvable in polynomial time include classes of bounded tree-width, bounded DAG-width, and bounded clique-width. We also prove that recognising the winning regions of a parity game is not easier than computing them from scratch. ",alexandru tomescu,,2012.0,,arXiv,Dittmann2012,True,,arXiv,Not available,Graph Operations on Parity Games and Polynomial-Time Algorithms,4e05dfef3920b8778282155f6a631823,http://arxiv.org/abs/1208.1640v1 16365," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",shuchi chawla,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 16366," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",jason hartline,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 16367," Good economic mechanisms depend on the preferences of participants in the mechanism. For example, the revenue-optimal auction for selling an item is parameterized by a reserve price, and the appropriate reserve price depends on how much the bidders are willing to pay. A mechanism designer can potentially learn about the participants' preferences by observing historical data from the mechanism; the designer could then update the mechanism in response to learned preferences to improve its performance. The challenge of such an approach is that the data corresponds to the actions of the participants and not their preferences. Preferences can potentially be inferred from actions but the degree of inference possible depends on the mechanism. In the optimal auction example, it is impossible to learn anything about preferences of bidders who are not willing to pay the reserve price. These bidders will not cast bids in the auction and, from historical bid data, the auctioneer could never learn that lowering the reserve price would give a higher revenue (even if it would). To address this impossibility, the auctioneer could sacrifice revenue optimality in the initial auction to obtain better inference properties so that the auction's parameters can be adapted to changing preferences in the future. This paper develops the theory for optimal mechanism design subject to good inferability. ",denis nekipelov,,2014.0,,arXiv,Chawla2014,True,,arXiv,Not available,Mechanism Design for Data Science,5b24227fa781f60b651c7539c70d0211,http://arxiv.org/abs/1404.5971v2 16368," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",gagan goel,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 16369," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",mohammad khani,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 16370," One of the major drawbacks of the celebrated VCG auction is its low (or zero) revenue even when the agents have high value for the goods and a {\em competitive} outcome could have generated a significant revenue. A competitive outcome is one for which it is impossible for the seller and a subset of buyers to `block' the auction by defecting and negotiating an outcome with higher payoffs for themselves. This corresponds to the well-known concept of {\em core} in cooperative game theory. In particular, VCG revenue is known to be not competitive when the goods being sold have complementarities. A bottleneck here is an impossibility result showing that there is no auction that simultaneously achieves competitive prices (a core outcome) and incentive-compatibility. In this paper we try to overcome the above impossibility result by asking the following natural question: is it possible to design an incentive-compatible auction whose revenue is comparable (even if less) to a competitive outcome? Towards this, we define a notion of {\em core-competitive} auctions. We say that an incentive-compatible auction is $\alpha$-core-competitive if its revenue is at least $1/\alpha$ fraction of the minimum revenue of a core-outcome. We study the Text-and-Image setting. In this setting, there is an ad slot which can be filled with either a single image ad or $k$ text ads. We design an $O(\ln \ln k)$ core-competitive randomized auction and an $O(\sqrt{\ln(k)})$ competitive deterministic auction for the Text-and-Image setting. We also show that both factors are tight. ",renato leme,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Core-competitive Auctions,5fb277b82485f3d5fcd69f8565ac0626,http://arxiv.org/abs/1505.07911v2 16371," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",devansh dikshit,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 16372," Inspired by the recent developments in the field of Spectrum Auctions, we have tried to provide a comprehensive framework for the complete procedure of Spectrum Licensing. We have identified the various issues the Governments need to decide upon while designing the licensing procedure and what are the various options available in each issue. We also provide an in depth study of how each of this options impact the overall procedure along with theoretical and practical results from the past. Lastly we argue as to how we can combine the positives two most widely used Spectrum Auctions mechanisms into the Hybrid Multiple Round Auction mechanism being proposed by us. ",y. narahari,,2009.0,,arXiv,Dikshit2009,True,,arXiv,Not available,"On Framework and Hybrid Auction Approach to the Spectrum Licensing Procedure",b9e97ebb2ab9cecafad03ebbcf641387,http://arxiv.org/abs/0902.3104v1 16374," Boolean games are an expressive and natural formalism through which to investigate problems of strategic interaction in multiagent systems. Although they have been widely studied, almost all previous work on Nash equilibria in Boolean games has focused on the restricted setting of pure strategies. This is a shortcoming as finite games are guaranteed to have at least one equilibrium in mixed strategies, but many simple games fail to have pure strategy equilibria at all. We address this by showing that a natural decision problem about mixed equilibria: determining whether a Boolean game has a mixed strategy equilibrium that guarantees every player a given payoff, is NEXP-hard. Accordingly, the $\epsilon$ variety of the problem is NEXP-complete. The proof can be adapted to show coNEXP-hardness of a similar question: whether all Nash equilibria of a Boolean game guarantee every player at least the given payoff. ",luke ong,,2013.0,,arXiv,Ianovski2013,True,,arXiv,Not available,EGuaranteeNash for Boolean Games is NEXP-Hard,272e38fb774a62e2e3d5de3b3ab51114,http://arxiv.org/abs/1312.4114v1 16376," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",evangelos markakis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 16377," We present our results on Uniform Price Auctions, one of the standard sealed-bid multi-unit auction formats, for selling multiple identical units of a single good to multi-demand bidders. Contrary to the truthful and economically efficient multi-unit Vickrey auction, the Uniform Price Auction encourages strategic bidding and is socially inefficient in general. The uniform pricing rule is, however, widely popular by its appeal to the natural anticipation, that identical items should be identically priced. In this work we study equilibria of the Uniform Price Auction for bidders with (symmetric) submodular valuation functions, over the number of units that they win. We investigate pure Nash equilibria of the auction in undominated strategies; we produce a characterization of these equilibria that allows us to prove that a fraction 1-1/e of the optimum social welfare is always recovered in undominated pure Nash equilibrium -- and this bound is essentially tight. Subsequently, we study the auction under the incomplete information setting and prove a bound of 4-2/k on the economic inefficiency of (mixed) Bayes Nash equilibria that are supported by undominated strategies. ",orestis telelis,,2012.0,,arXiv,Markakis2012,True,,arXiv,Not available,On the Inefficiency of the Uniform Price Auction,4f68f7005c1cb99e5e15b980fd3dd17a,http://arxiv.org/abs/1211.1860v4 16378," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",michal feldman,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 16379," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",ophir friedler,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 16380," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",jamie morgenstern,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 16381," We study the efficiency of simple auctions in the presence of complements. [DMSW15] introduced the single-bid auction, and showed that it has a price of anarchy (PoA) of $O(\log m)$ for complement-free (i.e., subadditive) valuations. Prior to our work, no non-trivial upper bound on the PoA of single bid auctions was known for valuations exhibiting complements. We introduce a hierarchy over valuations, where levels of the hierarchy correspond to the degree of complementarity, and the PoA of the single bid auction degrades gracefully with the level of the hierarchy. This hierarchy is a refinement of the Maximum over Positive Hypergraphs (MPH) hierarchy [FFIILS15], where the degree of complementarity $d$ is captured by the maximum number of neighbors of a node in the positive hypergraph representation. We show that the price of anarchy of the single bid auction for valuations of level $d$ of the hierarchy is $O(d^2 \log(m/d))$, where $m$ is the number of items. We also establish an improved upper bound of $O(d \log m)$ for a subclass where every hyperedge in the positive hypergraph representation is of size at most 2 (but the degree is still $d$). Finally, we show that randomizing between the single bid auction and the grand bundle auction has a price of anarchy of at most $O(\sqrt{m})$ for general valuations. All of our results are derived via the smoothness framework, thus extend to coarse-correlated equilibria and to Bayes Nash equilibria. ",guy reiner,,2016.0,10.1145/2940716.2940735,arXiv,Feldman2016,True,,arXiv,Not available,Simple Mechanisms For Agents With Complements,256610b16b93d394b1fb44ac5fcfc814,http://arxiv.org/abs/1603.07939v2 16382," Many auction settings implicitly or explicitly require that bidders are treated equally ex-ante. This may be because discrimination is philosophically or legally impermissible, or because it is practically difficult to implement or impossible to enforce. We study so-called {\em anonymous} auctions to understand the revenue tradeoffs and to develop simple anonymous auctions that are approximately optimal. We consider digital goods settings and show that the optimal anonymous, dominant strategy incentive compatible auction has an intuitive structure --- imagine that bidders are randomly permuted before the auction, then infer a posterior belief about bidder i's valuation from the values of other bidders and set a posted price that maximizes revenue given this posterior. We prove that no anonymous mechanism can guarantee an approximation better than O(n) to the optimal revenue in the worst case (or O(log n) for regular distributions) and that even posted price mechanisms match those guarantees. Understanding that the real power of anonymous mechanisms comes when the auctioneer can infer the bidder identities accurately, we show a tight O(k) approximation guarantee when each bidder can be confused with at most k ""higher types"". Moreover, we introduce a simple mechanism based on n target prices that is asymptotically optimal and build on this mechanism to extend our results to m-unit auctions and sponsored search. ",christos tzamos,,2014.0,,arXiv,Tzamos2014,True,,arXiv,Not available,The Value of Knowing Your Enemy,96386a0fadb1e4af86d74327b4dcc867,http://arxiv.org/abs/1411.1379v1 16383," Many auction settings implicitly or explicitly require that bidders are treated equally ex-ante. This may be because discrimination is philosophically or legally impermissible, or because it is practically difficult to implement or impossible to enforce. We study so-called {\em anonymous} auctions to understand the revenue tradeoffs and to develop simple anonymous auctions that are approximately optimal. We consider digital goods settings and show that the optimal anonymous, dominant strategy incentive compatible auction has an intuitive structure --- imagine that bidders are randomly permuted before the auction, then infer a posterior belief about bidder i's valuation from the values of other bidders and set a posted price that maximizes revenue given this posterior. We prove that no anonymous mechanism can guarantee an approximation better than O(n) to the optimal revenue in the worst case (or O(log n) for regular distributions) and that even posted price mechanisms match those guarantees. Understanding that the real power of anonymous mechanisms comes when the auctioneer can infer the bidder identities accurately, we show a tight O(k) approximation guarantee when each bidder can be confused with at most k ""higher types"". Moreover, we introduce a simple mechanism based on n target prices that is asymptotically optimal and build on this mechanism to extend our results to m-unit auctions and sponsored search. ",christopher wilkens,,2014.0,,arXiv,Tzamos2014,True,,arXiv,Not available,The Value of Knowing Your Enemy,96386a0fadb1e4af86d74327b4dcc867,http://arxiv.org/abs/1411.1379v1 16384," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",vineet abhishek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 16385," Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multiple audit resources where each resource is restricted to audit a subset of all potential violations, thus enabling application to practical auditing scenarios. We provide an FPTAS that computes an approximately optimal solution to the resulting non-convex optimization problem. The main technical novelty is in the design and correctness proof of an optimization transformation that enables the construction of this FPTAS. In addition, we experimentally demonstrate that this transformation significantly speeds up computation of solutions for a class of audit games and security games. ",jeremiah blocki,,2014.0,,arXiv,Blocki2014,True,,arXiv,Not available,Audit Games with Multiple Defender Resources,08a641620dd57ba419821d6e8f9ce5bf,http://arxiv.org/abs/1409.4503v3 16386," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",bruce hajek,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 16387," We study the problem of selling a resource through an auction mechanism. The winning buyer in turn develops this resource to generate profit. Two forms of payment are considered: charging the winning buyer a one-time payment, or an initial payment plus a profit sharing contract (PSC). We consider a symmetric interdependent values model with risk averse or risk neutral buyers and a risk neutral seller. For the second price auction and the English auction, we show that the seller's expected total revenue from the auction where he also takes a fraction of the positive profit is higher than the expected revenue from the auction with only a one-time payment. Moreover, the seller can generate an even higher expected total revenue if, in addition to taking a fraction of the positive profit, he also takes the same fraction of any loss incurred from developing the resource. Moving beyond simple PSCs, we show that the auction with a PSC from a very general class generates higher expected total revenue than the auction with only a one-time payment. Finally, we show that suitable PSCs provide higher expected total revenue than a one-time payment even when the incentives of the winning buyer to develop the resource must be addressed by the seller. ",steven williams,,2011.0,,arXiv,Abhishek2011,True,,arXiv,Not available,Auctions with a Profit Sharing Contract,b4a1d63ac3c865159de35e530f1e249d,http://arxiv.org/abs/1102.3195v5 16388," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",chen xu,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16389," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",lingyang song,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16390," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",zhu han,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16391," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",qun zhao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16392," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiaoli wang,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16393," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",xiang cheng,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16394," Peer-to-peer communication has been recently considered as a popular issue for local area services. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism. In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate. ",bingli jiao,,2012.0,10.1109/JSAC.2013.SUP.0513031,arXiv,Xu2012,True,,arXiv,Not available,"Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach",dc68d6c76b39d729c40d710862f1da6e,http://arxiv.org/abs/1211.2065v1 16395," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",zhiyi huang,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 16396," Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multiple audit resources where each resource is restricted to audit a subset of all potential violations, thus enabling application to practical auditing scenarios. We provide an FPTAS that computes an approximately optimal solution to the resulting non-convex optimization problem. The main technical novelty is in the design and correctness proof of an optimization transformation that enables the construction of this FPTAS. In addition, we experimentally demonstrate that this transformation significantly speeds up computation of solutions for a class of audit games and security games. ",nicolas christin,,2014.0,,arXiv,Blocki2014,True,,arXiv,Not available,Audit Games with Multiple Defender Resources,08a641620dd57ba419821d6e8f9ce5bf,http://arxiv.org/abs/1409.4503v3 16397," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",nikhil devanur,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 16398," In this paper, we study sequential auctions with two budget constrained bidders and any number of identical items. All prior results on such auctions consider only two items. We construct a canonical outcome of the auction that is the only natural equilibrium and is unique under a refinement of subgame perfect equilibria. We show certain interesting properties of this equilibrium; for instance, we show that the prices decrease as the auction progresses. This phenomenon has been observed in many experiments and previous theoretic work attributed it to features such as uncertainty in the supply or risk averse bidders. We show that such features are not needed for this phenomenon and that it arises purely from the most essential features: budget constraints and the sequential nature of the auction. A little surprisingly we also show that in this equilibrium one agent wins all his items in the beginning and then the other agent wins the rest. The major difficulty in analyzing such sequential auctions has been in understanding how the selling prices of the first few rounds affect the utilities of the agents in the later rounds. We tackle this difficulty by identifying certain key properties of the auction and the proof is via a joint induction on all of them. ",david malec,,2012.0,,arXiv,Huang2012,True,,arXiv,Not available,Sequential Auctions of Identical Items with Budget-Constrained Bidders,0cb4828242c6fcb68bb7c024421c8ec3,http://arxiv.org/abs/1209.1698v1 16399," The recent proliferation of increasingly capable mobile devices has given rise to mobile crowd sensing (MCS) systems that outsource the collection of sensory data to a crowd of participating workers that carry various mobile devices. Aware of the paramount importance of effectively incentivizing participation in such systems, the research community has proposed a wide variety of incentive mechanisms. However, different from most of these existing mechanisms which assume the existence of only one data requester, we consider MCS systems with multiple data requesters, which are actually more common in practice. Specifically, our incentive mechanism is based on double auction, and is able to stimulate the participation of both data requesters and workers. In real practice, the incentive mechanism is typically not an isolated module, but interacts with the data aggregation mechanism that aggregates workers' data. For this reason, we propose CENTURION, a novel integrated framework for multi-requester MCS systems, consisting of the aforementioned incentive and data aggregation mechanism. CENTURION's incentive mechanism satisfies truthfulness, individual rationality, computational efficiency, as well as guaranteeing non-negative social welfare, and its data aggregation mechanism generates highly accurate aggregated results. The desirable properties of CENTURION are validated through both theoretical analysis and extensive simulations. ",haiming jin,,2017.0,,arXiv,Jin2017,True,,arXiv,Not available,CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing,8ac9eee546c559c6c36e8a0549e3c3a7,http://arxiv.org/abs/1701.01533v1 16400," The recent proliferation of increasingly capable mobile devices has given rise to mobile crowd sensing (MCS) systems that outsource the collection of sensory data to a crowd of participating workers that carry various mobile devices. Aware of the paramount importance of effectively incentivizing participation in such systems, the research community has proposed a wide variety of incentive mechanisms. However, different from most of these existing mechanisms which assume the existence of only one data requester, we consider MCS systems with multiple data requesters, which are actually more common in practice. Specifically, our incentive mechanism is based on double auction, and is able to stimulate the participation of both data requesters and workers. In real practice, the incentive mechanism is typically not an isolated module, but interacts with the data aggregation mechanism that aggregates workers' data. For this reason, we propose CENTURION, a novel integrated framework for multi-requester MCS systems, consisting of the aforementioned incentive and data aggregation mechanism. CENTURION's incentive mechanism satisfies truthfulness, individual rationality, computational efficiency, as well as guaranteeing non-negative social welfare, and its data aggregation mechanism generates highly accurate aggregated results. The desirable properties of CENTURION are validated through both theoretical analysis and extensive simulations. ",lu su,,2017.0,,arXiv,Jin2017,True,,arXiv,Not available,CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing,8ac9eee546c559c6c36e8a0549e3c3a7,http://arxiv.org/abs/1701.01533v1 16401," The recent proliferation of increasingly capable mobile devices has given rise to mobile crowd sensing (MCS) systems that outsource the collection of sensory data to a crowd of participating workers that carry various mobile devices. Aware of the paramount importance of effectively incentivizing participation in such systems, the research community has proposed a wide variety of incentive mechanisms. However, different from most of these existing mechanisms which assume the existence of only one data requester, we consider MCS systems with multiple data requesters, which are actually more common in practice. Specifically, our incentive mechanism is based on double auction, and is able to stimulate the participation of both data requesters and workers. In real practice, the incentive mechanism is typically not an isolated module, but interacts with the data aggregation mechanism that aggregates workers' data. For this reason, we propose CENTURION, a novel integrated framework for multi-requester MCS systems, consisting of the aforementioned incentive and data aggregation mechanism. CENTURION's incentive mechanism satisfies truthfulness, individual rationality, computational efficiency, as well as guaranteeing non-negative social welfare, and its data aggregation mechanism generates highly accurate aggregated results. The desirable properties of CENTURION are validated through both theoretical analysis and extensive simulations. ",klara nahrstedt,,2017.0,,arXiv,Jin2017,True,,arXiv,Not available,CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing,8ac9eee546c559c6c36e8a0549e3c3a7,http://arxiv.org/abs/1701.01533v1 16402," Mobile crowdsensing (MCS) is a promising sensing paradigm that leverages the diverse embedded sensors in massive mobile devices. A key objective in MCS is to efficiently schedule mobile users to perform multiple sensing tasks. Prior work mainly focused on interactions between the task-layer and the user-layer, without considering tasks' similar data requirements and users' heterogeneous sensing capabilities. In this work, we propose a three-layer data-centric MCS model by introducing a new data-layer between tasks and users, enable different tasks to reuse the same data items, hence effectively leverage both task similarities and user heterogeneities. We formulate a joint task selection and user scheduling problem based on the new framework, aiming at maximizing social welfare. We first analyze the centralized optimization problem with the statistical information of tasks and users, and show the bound of the social welfare gain due to data reuse. Then we consider the two-sided information asymmetry of selfish task-owners and users, and propose a decentralized market mechanism for achieving the centralized social optimality. In particular, considering the NP-hardness of the optimization, we propose a truthful two-sided randomized auction mechanism that ensures computational efficiency and a close-to-optimal performance. Simulations verify the effectiveness of our proposed model and mechanism. ",changkun jiang,,2017.0,,arXiv,Jiang2017,True,,arXiv,Not available,Data-Centric Mobile Crowdsensing,d490a07e33895548f90de3aef3852a8e,http://arxiv.org/abs/1705.06055v1 16403," Mobile crowdsensing (MCS) is a promising sensing paradigm that leverages the diverse embedded sensors in massive mobile devices. A key objective in MCS is to efficiently schedule mobile users to perform multiple sensing tasks. Prior work mainly focused on interactions between the task-layer and the user-layer, without considering tasks' similar data requirements and users' heterogeneous sensing capabilities. In this work, we propose a three-layer data-centric MCS model by introducing a new data-layer between tasks and users, enable different tasks to reuse the same data items, hence effectively leverage both task similarities and user heterogeneities. We formulate a joint task selection and user scheduling problem based on the new framework, aiming at maximizing social welfare. We first analyze the centralized optimization problem with the statistical information of tasks and users, and show the bound of the social welfare gain due to data reuse. Then we consider the two-sided information asymmetry of selfish task-owners and users, and propose a decentralized market mechanism for achieving the centralized social optimality. In particular, considering the NP-hardness of the optimization, we propose a truthful two-sided randomized auction mechanism that ensures computational efficiency and a close-to-optimal performance. Simulations verify the effectiveness of our proposed model and mechanism. ",lin gao,,2017.0,,arXiv,Jiang2017,True,,arXiv,Not available,Data-Centric Mobile Crowdsensing,d490a07e33895548f90de3aef3852a8e,http://arxiv.org/abs/1705.06055v1 16404," Mobile crowdsensing (MCS) is a promising sensing paradigm that leverages the diverse embedded sensors in massive mobile devices. A key objective in MCS is to efficiently schedule mobile users to perform multiple sensing tasks. Prior work mainly focused on interactions between the task-layer and the user-layer, without considering tasks' similar data requirements and users' heterogeneous sensing capabilities. In this work, we propose a three-layer data-centric MCS model by introducing a new data-layer between tasks and users, enable different tasks to reuse the same data items, hence effectively leverage both task similarities and user heterogeneities. We formulate a joint task selection and user scheduling problem based on the new framework, aiming at maximizing social welfare. We first analyze the centralized optimization problem with the statistical information of tasks and users, and show the bound of the social welfare gain due to data reuse. Then we consider the two-sided information asymmetry of selfish task-owners and users, and propose a decentralized market mechanism for achieving the centralized social optimality. In particular, considering the NP-hardness of the optimization, we propose a truthful two-sided randomized auction mechanism that ensures computational efficiency and a close-to-optimal performance. Simulations verify the effectiveness of our proposed model and mechanism. ",lingjie duan,,2017.0,,arXiv,Jiang2017,True,,arXiv,Not available,Data-Centric Mobile Crowdsensing,d490a07e33895548f90de3aef3852a8e,http://arxiv.org/abs/1705.06055v1 16405," Mobile crowdsensing (MCS) is a promising sensing paradigm that leverages the diverse embedded sensors in massive mobile devices. A key objective in MCS is to efficiently schedule mobile users to perform multiple sensing tasks. Prior work mainly focused on interactions between the task-layer and the user-layer, without considering tasks' similar data requirements and users' heterogeneous sensing capabilities. In this work, we propose a three-layer data-centric MCS model by introducing a new data-layer between tasks and users, enable different tasks to reuse the same data items, hence effectively leverage both task similarities and user heterogeneities. We formulate a joint task selection and user scheduling problem based on the new framework, aiming at maximizing social welfare. We first analyze the centralized optimization problem with the statistical information of tasks and users, and show the bound of the social welfare gain due to data reuse. Then we consider the two-sided information asymmetry of selfish task-owners and users, and propose a decentralized market mechanism for achieving the centralized social optimality. In particular, considering the NP-hardness of the optimization, we propose a truthful two-sided randomized auction mechanism that ensures computational efficiency and a close-to-optimal performance. Simulations verify the effectiveness of our proposed model and mechanism. ",jianwei huang,,2017.0,,arXiv,Jiang2017,True,,arXiv,Not available,Data-Centric Mobile Crowdsensing,d490a07e33895548f90de3aef3852a8e,http://arxiv.org/abs/1705.06055v1 16406," We develop an optimization model and corresponding algorithm for the management of a demand-side platform (DSP), whereby the DSP aims to maximize its own profit while acquiring valuable impressions for its advertiser clients. We formulate the problem of profit maximization for a DSP interacting with ad exchanges in a real-time bidding environment in a cost-per-click/cost-per-action pricing model. Our proposed formulation leads to a nonconvex optimization problem due to the joint optimization over both impression allocation and bid price decisions. We use Lagrangian relaxation to develop a tractable convex dual problem, which, due to the properties of second-price auctions, may be solved efficiently with subgradient methods. We propose a two-phase solution procedure, whereby in the first phase we solve the convex dual problem using a subgradient algorithm, and in the second phase we use the previously computed dual solution to set bid prices and then solve a linear optimization problem to obtain the allocation probability variables. On several synthetic examples, we demonstrate that our proposed solution approach leads to superior performance over a baseline method that is used in practice. ",paul grigas,,2017.0,,arXiv,Grigas2017,True,,arXiv,Not available,Profit Maximization for Online Advertising Demand-Side Platforms,1c416796828edfc80b2fb22f945c82a5,http://arxiv.org/abs/1706.01614v1 16407," Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multiple audit resources where each resource is restricted to audit a subset of all potential violations, thus enabling application to practical auditing scenarios. We provide an FPTAS that computes an approximately optimal solution to the resulting non-convex optimization problem. The main technical novelty is in the design and correctness proof of an optimization transformation that enables the construction of this FPTAS. In addition, we experimentally demonstrate that this transformation significantly speeds up computation of solutions for a class of audit games and security games. ",anupam datta,,2014.0,,arXiv,Blocki2014,True,,arXiv,Not available,Audit Games with Multiple Defender Resources,08a641620dd57ba419821d6e8f9ce5bf,http://arxiv.org/abs/1409.4503v3 16408," We develop an optimization model and corresponding algorithm for the management of a demand-side platform (DSP), whereby the DSP aims to maximize its own profit while acquiring valuable impressions for its advertiser clients. We formulate the problem of profit maximization for a DSP interacting with ad exchanges in a real-time bidding environment in a cost-per-click/cost-per-action pricing model. Our proposed formulation leads to a nonconvex optimization problem due to the joint optimization over both impression allocation and bid price decisions. We use Lagrangian relaxation to develop a tractable convex dual problem, which, due to the properties of second-price auctions, may be solved efficiently with subgradient methods. We propose a two-phase solution procedure, whereby in the first phase we solve the convex dual problem using a subgradient algorithm, and in the second phase we use the previously computed dual solution to set bid prices and then solve a linear optimization problem to obtain the allocation probability variables. On several synthetic examples, we demonstrate that our proposed solution approach leads to superior performance over a baseline method that is used in practice. ",alfonso lobos,,2017.0,,arXiv,Grigas2017,True,,arXiv,Not available,Profit Maximization for Online Advertising Demand-Side Platforms,1c416796828edfc80b2fb22f945c82a5,http://arxiv.org/abs/1706.01614v1 16409," We develop an optimization model and corresponding algorithm for the management of a demand-side platform (DSP), whereby the DSP aims to maximize its own profit while acquiring valuable impressions for its advertiser clients. We formulate the problem of profit maximization for a DSP interacting with ad exchanges in a real-time bidding environment in a cost-per-click/cost-per-action pricing model. Our proposed formulation leads to a nonconvex optimization problem due to the joint optimization over both impression allocation and bid price decisions. We use Lagrangian relaxation to develop a tractable convex dual problem, which, due to the properties of second-price auctions, may be solved efficiently with subgradient methods. We propose a two-phase solution procedure, whereby in the first phase we solve the convex dual problem using a subgradient algorithm, and in the second phase we use the previously computed dual solution to set bid prices and then solve a linear optimization problem to obtain the allocation probability variables. On several synthetic examples, we demonstrate that our proposed solution approach leads to superior performance over a baseline method that is used in practice. ",zheng wen,,2017.0,,arXiv,Grigas2017,True,,arXiv,Not available,Profit Maximization for Online Advertising Demand-Side Platforms,1c416796828edfc80b2fb22f945c82a5,http://arxiv.org/abs/1706.01614v1 16410," We develop an optimization model and corresponding algorithm for the management of a demand-side platform (DSP), whereby the DSP aims to maximize its own profit while acquiring valuable impressions for its advertiser clients. We formulate the problem of profit maximization for a DSP interacting with ad exchanges in a real-time bidding environment in a cost-per-click/cost-per-action pricing model. Our proposed formulation leads to a nonconvex optimization problem due to the joint optimization over both impression allocation and bid price decisions. We use Lagrangian relaxation to develop a tractable convex dual problem, which, due to the properties of second-price auctions, may be solved efficiently with subgradient methods. We propose a two-phase solution procedure, whereby in the first phase we solve the convex dual problem using a subgradient algorithm, and in the second phase we use the previously computed dual solution to set bid prices and then solve a linear optimization problem to obtain the allocation probability variables. On several synthetic examples, we demonstrate that our proposed solution approach leads to superior performance over a baseline method that is used in practice. ",kuang-chih lee,,2017.0,,arXiv,Grigas2017,True,,arXiv,Not available,Profit Maximization for Online Advertising Demand-Side Platforms,1c416796828edfc80b2fb22f945c82a5,http://arxiv.org/abs/1706.01614v1 16411," The question of the minimum menu-size for approximate (i.e., up-to-$\varepsilon$) Bayesian revenue maximization when selling two goods to an additive risk-neutral quasilinear buyer was introduced by Hart and Nisan (2013), who give an upper bound of $O(\frac{1}{\varepsilon^4})$ for this problem. Using the optimal-transport duality framework of Daskalakis et al. (2013, 2015), we derive the first lower bound for this problem - of $\Omega(\frac{1}{\sqrt[4]{\varepsilon}})$, even when the values for the two goods are drawn i.i.d. from ""nice"" distributions, establishing how to reason about approximately optimal mechanisms via this duality framework. This bound implies, for any fixed number of goods, a tight bound of $\Theta(\log\frac{1}{\varepsilon})$ on the minimum deterministic communication complexity guaranteed to suffice for running some approximately revenue-maximizing mechanism, thereby completely resolving this problem. As a secondary result, we show that under standard economic assumptions on distributions, the above upper bound of Hart and Nisan (2013) can be strengthened to $O(\frac{1}{\varepsilon^2})$. ",yannai gonczarowski,,2017.0,,arXiv,Gonczarowski2017,True,,arXiv,Not available,"Bounding the Menu-Size of Approximately Optimal Auctions via Optimal-Transport Duality",e3f58022422ecfc2a296e38decdc183f,http://arxiv.org/abs/1708.08907v4 16412," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",yang cai,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16413," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",federico echenique,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16414," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",hu fu,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16415," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",katrina ligett,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16416," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",adam wierman,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16417," This paper studies the revenue of simple mechanisms in settings where a third-party data provider is present. When no data provider is present, it is known that simple mechanisms achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, we show that even with a single seller, a single bidder, and a single item of uncertain type for sale, pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. ",juba ziani,,2018.0,,arXiv,Cai2018,True,,arXiv,Not available,Third-Party Data Providers Ruin Simple Mechanisms,1c192bb1573a1c2272ea1c9471439800,http://arxiv.org/abs/1802.07407v1 16418," Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multiple audit resources where each resource is restricted to audit a subset of all potential violations, thus enabling application to practical auditing scenarios. We provide an FPTAS that computes an approximately optimal solution to the resulting non-convex optimization problem. The main technical novelty is in the design and correctness proof of an optimization transformation that enables the construction of this FPTAS. In addition, we experimentally demonstrate that this transformation significantly speeds up computation of solutions for a class of audit games and security games. ",ariel procaccia,,2014.0,,arXiv,Blocki2014,True,,arXiv,Not available,Audit Games with Multiple Defender Resources,08a641620dd57ba419821d6e8f9ce5bf,http://arxiv.org/abs/1409.4503v3 16419," We study the problem of exchange when 1) agents are endowed with heterogeneous indivisible objects, and 2) there is no money. In general, no rule satisfies the three central properties Pareto-efficiency, individual rationality, and strategy-proofness \cite{Sonmez1999}. Recently, it was shown that Top Trading Cycles is $\NP$-hard to manipulate \cite{FujitaEA2015}, a relaxation of strategy-proofness. However, parameterized complexity is a more appropriate framework for this and other economic settings. Certain aspects of the problem - number of objects each agent brings to the table, goods up for auction, candidates in an election \cite{consandlang2007}, legislative figures to influence \cite{christian2007complexity} - may face natural bounds or are fixed as the problem grows. We take a parameterized complexity approach to indivisible goods exchange for the first time. Our results represent good and bad news for TTC. When the size of the endowments $k$ is a fixed constant, we show that the computational task of manipulating TTC can be performed in polynomial time. On the other hand, we show that this parameterized problem is $\W[1]$-hard, and therefore unlikely to be \emph{fixed parameter tractable}. ",william phan,,2018.0,,arXiv,Phan2018,True,,arXiv,Not available,On the parameterized complexity of manipulating Top Trading Cycles,142e831e5816639fd159dd0eaf8123ea,http://arxiv.org/abs/1803.02409v1 16420," We study the problem of exchange when 1) agents are endowed with heterogeneous indivisible objects, and 2) there is no money. In general, no rule satisfies the three central properties Pareto-efficiency, individual rationality, and strategy-proofness \cite{Sonmez1999}. Recently, it was shown that Top Trading Cycles is $\NP$-hard to manipulate \cite{FujitaEA2015}, a relaxation of strategy-proofness. However, parameterized complexity is a more appropriate framework for this and other economic settings. Certain aspects of the problem - number of objects each agent brings to the table, goods up for auction, candidates in an election \cite{consandlang2007}, legislative figures to influence \cite{christian2007complexity} - may face natural bounds or are fixed as the problem grows. We take a parameterized complexity approach to indivisible goods exchange for the first time. Our results represent good and bad news for TTC. When the size of the endowments $k$ is a fixed constant, we show that the computational task of manipulating TTC can be performed in polynomial time. On the other hand, we show that this parameterized problem is $\W[1]$-hard, and therefore unlikely to be \emph{fixed parameter tractable}. ",christopher purcell,,2018.0,,arXiv,Phan2018,True,,arXiv,Not available,On the parameterized complexity of manipulating Top Trading Cycles,142e831e5816639fd159dd0eaf8123ea,http://arxiv.org/abs/1803.02409v1 16421," We study the performance of anonymous posted-price selling mechanisms for a standard Bayesian auction setting, where $n$ bidders have i.i.d. valuations for a single item. We show that for the natural class of Monotone Hazard Rate (MHR) distributions, offering the same, take-it-or-leave-it price to all bidders can achieve an (asymptotically) optimal revenue. In particular, the approximation ratio is shown to be $1+O(\ln \ln n / \ln n)$, matched by a tight lower bound for the case of exponential distributions. This improves upon the previously best-known upper bound of $e/(e-1)\approx 1.58$ for the slightly more general class of regular distributions. In the worst case (over $n$), we still show a global upper bound of $1.35$. We give a simple, closed-form description of our prices which, interestingly enough, relies only on minimal knowledge of the prior distribution, namely just the expectation of its second-highest order statistic. ",yiannis giannakopoulos,,2018.0,,arXiv,Giannakopoulos2018,True,,arXiv,Not available,Optimal Pricing For MHR Distributions,08abd963a1ea7211818b28a56c712626,http://arxiv.org/abs/1810.00800v1 16422," We study the performance of anonymous posted-price selling mechanisms for a standard Bayesian auction setting, where $n$ bidders have i.i.d. valuations for a single item. We show that for the natural class of Monotone Hazard Rate (MHR) distributions, offering the same, take-it-or-leave-it price to all bidders can achieve an (asymptotically) optimal revenue. In particular, the approximation ratio is shown to be $1+O(\ln \ln n / \ln n)$, matched by a tight lower bound for the case of exponential distributions. This improves upon the previously best-known upper bound of $e/(e-1)\approx 1.58$ for the slightly more general class of regular distributions. In the worst case (over $n$), we still show a global upper bound of $1.35$. We give a simple, closed-form description of our prices which, interestingly enough, relies only on minimal knowledge of the prior distribution, namely just the expectation of its second-highest order statistic. ",keyu zhu,,2018.0,,arXiv,Giannakopoulos2018,True,,arXiv,Not available,Optimal Pricing For MHR Distributions,08abd963a1ea7211818b28a56c712626,http://arxiv.org/abs/1810.00800v1 16423," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",gangqiang zhou,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16424," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",jigang wu,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16425," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",long chen,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16426," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",guiyuan jiang,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16427," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",siew-kei lam,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16428," Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money. While many extensions of Nash equilibrium have been proposed that address collusion and other issues relevant to distributed and peer-to-peer systems, our results show that none of them adequately address the issues raised by sybils and collusion in scrip systems. ",ian kash,,2009.0,10.1007/978-3-642-03821-1_4,arXiv,Kash2009,True,,arXiv,Not available,Manipulating Scrip Systems: Sybils and Collusion,366b56814a12333122c5c8e31f9ba344,http://arxiv.org/abs/0903.2278v1 16429," Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multiple audit resources where each resource is restricted to audit a subset of all potential violations, thus enabling application to practical auditing scenarios. We provide an FPTAS that computes an approximately optimal solution to the resulting non-convex optimization problem. The main technical novelty is in the design and correctness proof of an optimization transformation that enables the construction of this FPTAS. In addition, we experimentally demonstrate that this transformation significantly speeds up computation of solutions for a class of audit games and security games. ",arunesh sinha,,2014.0,,arXiv,Blocki2014,True,,arXiv,Not available,Audit Games with Multiple Defender Resources,08a641620dd57ba419821d6e8f9ce5bf,http://arxiv.org/abs/1409.4503v3 16430," Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money. While many extensions of Nash equilibrium have been proposed that address collusion and other issues relevant to distributed and peer-to-peer systems, our results show that none of them adequately address the issues raised by sybils and collusion in scrip systems. ",eric friedman,,2009.0,10.1007/978-3-642-03821-1_4,arXiv,Kash2009,True,,arXiv,Not available,Manipulating Scrip Systems: Sybils and Collusion,366b56814a12333122c5c8e31f9ba344,http://arxiv.org/abs/0903.2278v1 16431," Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money. While many extensions of Nash equilibrium have been proposed that address collusion and other issues relevant to distributed and peer-to-peer systems, our results show that none of them adequately address the issues raised by sybils and collusion in scrip systems. ",joseph halpern,,2009.0,10.1007/978-3-642-03821-1_4,arXiv,Kash2009,True,,arXiv,Not available,Manipulating Scrip Systems: Sybils and Collusion,366b56814a12333122c5c8e31f9ba344,http://arxiv.org/abs/0903.2278v1 16432," In a multi-battle contest, each time a player competes by investing some of her budgets or resources in a component battle to collect a value if winning the battle. There are multiple battles to fight, and the budgets get consumed over time. The final winner in the overall contest is the one who first reaches some amount of total value. Examples include R & D races, sports competition, elections, and many more. A player needs to make adequate sequential actions to win the contest against dynamic competition over time from the others. We are interested in how much budgets the players would need and what actions they should take in order to perform well. We model and study such budget-constrained multi-battle contests where each component battle is a first-price or all-pay auction. We focus on analyzing the 2-player budget ratio that guarantees a player's winning (or falling behind in just a bounded amount of collected value) against the other omnipotent player. In the settings considered, we give efficient dynamic programs to find the optimal budget ratios and the corresponding bidding strategies. Our definition of game, budget constraints, and emphasis on budget analyses provide a new perspective and analysis in the related context. ",chu-han cheng,,2016.0,,arXiv,Cheng2016,True,,arXiv,Not available,Budget-Constrained Multi-Battle Contests: A New Perspective and Analysis,b29c2704af5a1acdcc1c1920311aba36,http://arxiv.org/abs/1602.04000v1 16433," In a multi-battle contest, each time a player competes by investing some of her budgets or resources in a component battle to collect a value if winning the battle. There are multiple battles to fight, and the budgets get consumed over time. The final winner in the overall contest is the one who first reaches some amount of total value. Examples include R & D races, sports competition, elections, and many more. A player needs to make adequate sequential actions to win the contest against dynamic competition over time from the others. We are interested in how much budgets the players would need and what actions they should take in order to perform well. We model and study such budget-constrained multi-battle contests where each component battle is a first-price or all-pay auction. We focus on analyzing the 2-player budget ratio that guarantees a player's winning (or falling behind in just a bounded amount of collected value) against the other omnipotent player. In the settings considered, we give efficient dynamic programs to find the optimal budget ratios and the corresponding bidding strategies. Our definition of game, budget constraints, and emphasis on budget analyses provide a new perspective and analysis in the related context. ",po-an chen,,2016.0,,arXiv,Cheng2016,True,,arXiv,Not available,Budget-Constrained Multi-Battle Contests: A New Perspective and Analysis,b29c2704af5a1acdcc1c1920311aba36,http://arxiv.org/abs/1602.04000v1 16434," In a multi-battle contest, each time a player competes by investing some of her budgets or resources in a component battle to collect a value if winning the battle. There are multiple battles to fight, and the budgets get consumed over time. The final winner in the overall contest is the one who first reaches some amount of total value. Examples include R & D races, sports competition, elections, and many more. A player needs to make adequate sequential actions to win the contest against dynamic competition over time from the others. We are interested in how much budgets the players would need and what actions they should take in order to perform well. We model and study such budget-constrained multi-battle contests where each component battle is a first-price or all-pay auction. We focus on analyzing the 2-player budget ratio that guarantees a player's winning (or falling behind in just a bounded amount of collected value) against the other omnipotent player. In the settings considered, we give efficient dynamic programs to find the optimal budget ratios and the corresponding bidding strategies. Our definition of game, budget constraints, and emphasis on budget analyses provide a new perspective and analysis in the related context. ",wing-kai hon,,2016.0,,arXiv,Cheng2016,True,,arXiv,Not available,Budget-Constrained Multi-Battle Contests: A New Perspective and Analysis,b29c2704af5a1acdcc1c1920311aba36,http://arxiv.org/abs/1602.04000v1 16435," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",tim roughgarden,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 16436," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",vasilis syrgkanis,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 16437," This survey outlines a general and modular theory for proving approximation guarantees for equilibria of auctions in complex settings. This theory complements traditional economic techniques, which generally focus on exact and optimal solutions and are accordingly limited to relatively stylized settings. We highlight three user-friendly analytical tools: smoothness-type inequalities, which immediately yield approximation guarantees for many auction formats of interest in the special case of complete information and deterministic strategies; extension theorems, which extend such guarantees to randomized strategies, no-regret learning outcomes, and incomplete-information settings; and composition theorems, which extend such guarantees from simpler to more complex auctions. Combining these tools yields tight worst-case approximation guarantees for the equilibria of many widely-used auction formats. ",eva tardos,,2016.0,,arXiv,Roughgarden2016,True,,arXiv,Not available,The Price of Anarchy in Auctions,b50c6b44abd49fbc9c5119dfbcf531c4,http://arxiv.org/abs/1607.07684v1 16438," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",jinzhong niu,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 16439," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",simon parsons,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 16440," Cooperative interval games are a generalized model of cooperative games in which the worth of every coalition corresponds to a closed interval representing the possible outcomes of its cooperation. Selections are all possible outcomes of the interval game with no additional uncertainty. We introduce new selection-based classes of interval games and prove their characterization theorems and relations to existing classes based on the interval weakly better operator. We show new results regarding the core and imputations and examine a problem of equivalence for two different versions of the core, the main stability solution of cooperative games. Finally, we introduce the definition of strong imputation and strong core as universal solution concepts of interval games. ",jan bok,,2014.0,,arXiv,Bok2014,True,,arXiv,Not available,Selection-based Approach to Cooperative Interval Games,e392766459baf204092a2984f4707a4f,http://arxiv.org/abs/1410.3877v6 16441," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",jamie morgenstern,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 16442," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",tim roughgarden,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 16449," Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). Based on the cavity method of statistical mechanics, we introduce a message passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise. ",f. altarelli,,2009.0,10.1088/1742-5468/2009/07/P07002,JSTAT 2009;2009:P07002 (27pp),Altarelli2009,True,,arXiv,Not available,Statistical mechanics of budget-constrained auctions,e36e3a8bdc0d960fa43fa9a96483d17c,http://arxiv.org/abs/0903.2429v2 16450," Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). Based on the cavity method of statistical mechanics, we introduce a message passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise. ",a. braunstein,,2009.0,10.1088/1742-5468/2009/07/P07002,JSTAT 2009;2009:P07002 (27pp),Altarelli2009,True,,arXiv,Not available,Statistical mechanics of budget-constrained auctions,e36e3a8bdc0d960fa43fa9a96483d17c,http://arxiv.org/abs/0903.2429v2 16451," We study a game for recognising formal languages, in which two players with imperfect information need to coordinate on a common decision, given private input words correlated by a finite graph. The players have a joint objective to avoid an inadmissible decision, in spite of the uncertainty induced by the input. We show that the acceptor model based on consensus games characterises context-sensitive languages. Further, we describe the expressiveness of these games in terms of iterated synchronous transductions and identify a subclass that characterises context-free languages. ",marie bogaard,,2015.0,,arXiv,Berwanger2015,True,,arXiv,Not available,Consensus Game Acceptors and Iterated Transductions,fb66475077eaf68af0c9cd96dbe7d038,http://arxiv.org/abs/1501.07131v3 16452," Cooperative interval games are a generalized model of cooperative games in which the worth of every coalition corresponds to a closed interval representing the possible outcomes of its cooperation. Selections are all possible outcomes of the interval game with no additional uncertainty. We introduce new selection-based classes of interval games and prove their characterization theorems and relations to existing classes based on the interval weakly better operator. We show new results regarding the core and imputations and examine a problem of equivalence for two different versions of the core, the main stability solution of cooperative games. Finally, we introduce the definition of strong imputation and strong core as universal solution concepts of interval games. ",milan hladik,,2014.0,,arXiv,Bok2014,True,,arXiv,Not available,Selection-based Approach to Cooperative Interval Games,e392766459baf204092a2984f4707a4f,http://arxiv.org/abs/1410.3877v6 16453," Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). Based on the cavity method of statistical mechanics, we introduce a message passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise. ",j. realpe-gomez,,2009.0,10.1088/1742-5468/2009/07/P07002,JSTAT 2009;2009:P07002 (27pp),Altarelli2009,True,,arXiv,Not available,Statistical mechanics of budget-constrained auctions,e36e3a8bdc0d960fa43fa9a96483d17c,http://arxiv.org/abs/0903.2429v2 16454," Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). Based on the cavity method of statistical mechanics, we introduce a message passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise. ",r. zecchina,,2009.0,10.1088/1742-5468/2009/07/P07002,JSTAT 2009;2009:P07002 (27pp),Altarelli2009,True,,arXiv,Not available,Statistical mechanics of budget-constrained auctions,e36e3a8bdc0d960fa43fa9a96483d17c,http://arxiv.org/abs/0903.2429v2 16455," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",shahar dobzinski,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 16456," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",hu fu,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 16457," We consider the problem of designing a revenue-maximizing auction for a single item, when the values of the bidders are drawn from a correlated distribution. We observe that there exists an algorithm that finds the optimal randomized mechanism that runs in time polynomial in the size of the support. We leverage this result to show that in the oracle model introduced by Ronen and Saberi [FOCS'02], there exists a polynomial time truthful in expectation mechanism that provides a $(\frac 3 2+\epsilon)$-approximation to the revenue achievable by an optimal truthful-in-expectation mechanism, and a polynomial time deterministic truthful mechanism that guarantees $\frac 5 3$ approximation to the revenue achievable by an optimal deterministic truthful mechanism. We show that the $\frac 5 3$-approximation mechanism provides the same approximation ratio also with respect to the optimal truthful-in-expectation mechanism. This shows that the performance gap between truthful-in-expectation and deterministic mechanisms is relatively small. En route, we solve an open question of Mehta and Vazirani [EC'04]. Finally, we extend some of our results to the multi-item case, and show how to compute the optimal truthful-in-expectation mechanisms for bidders with more complex valuations. ",robert kleinberg,,2010.0,,arXiv,Dobzinski2010,True,,arXiv,Not available,Optimal Auctions with Correlated Bidders are Easy,e74f1707fccc591302763ca27e1ad4eb,http://arxiv.org/abs/1011.2413v1 16462," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",ilias diakonikolas,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 16463," We put forward a new model of congestion games where agents have uncertainty over the routes used by other agents. We take a non-probabilistic approach, assuming that each agent knows that the number of agents using an edge is within a certain range. Given this uncertainty, we model agents who either minimize their worst-case cost (WCC) or their worst-case regret (WCR), and study implications on equilibrium existence, convergence through adaptive play, and efficiency. Under the WCC behavior the game reduces to a modified congestion game, and welfare improves when agents have moderate uncertainty. Under WCR behavior the game is not, in general, a congestion game, but we show convergence and efficiency bounds for a simple class of games. ",reshef meir,,2014.0,,arXiv,Meir2014,True,,arXiv,Not available,Congestion Games with Distance-Based Strict Uncertainty,c674bb600a590efa17de65ffa1ac0fc8,http://arxiv.org/abs/1411.4943v2 16464," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",christos papadimitriou,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 16465," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",george pierrakos,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 16466," When agents with independent priors bid for a single item, Myerson's optimal auction maximizes expected revenue, whereas Vickrey's second-price auction optimizes social welfare. We address the natural question of trade-offs between the two criteria, that is, auctions that optimize, say, revenue under the constraint that the welfare is above a given level. If one allows for randomized mechanisms, it is easy to see that there are polynomial-time mechanisms that achieve any point in the trade-off (the Pareto curve) between revenue and welfare. We investigate whether one can achieve the same guarantees using deterministic mechanisms. We provide a negative answer to this question by showing that this is a (weakly) NP-hard problem. On the positive side, we provide polynomial-time deterministic mechanisms that approximate with arbitrary precision any point of the trade-off between these two fundamental objectives for the case of two bidders, even when the valuations are correlated arbitrarily. The major problem left open by our work is whether there is such an algorithm for three or more bidders with independent valuation distributions. ",yaron singer,,2012.0,,arXiv,Diakonikolas2012,True,,arXiv,Not available,Efficiency-Revenue Trade-offs in Auctions,f070a4a2ac7be85aa856f850e6935527,http://arxiv.org/abs/1205.3077v1 16467," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",yang cai,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 16468," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",zhiyi huang,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 16469," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jannik dreier,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 16470," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",jean-guillaume dumas,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 16471," Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems. ",pascal lafourcade,,2012.0,,arXiv,Dreier2012,True,,arXiv,Not available,Brandt's Fully Private Auction Protocol Revisited,abaeaaf0117ab90b6c3758da84138210,http://arxiv.org/abs/1210.6780v3 16472," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",anand bhalgat,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 16473," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",sreenivas gollapudi,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 16474," We put forward a new model of congestion games where agents have uncertainty over the routes used by other agents. We take a non-probabilistic approach, assuming that each agent knows that the number of agents using an edge is within a certain range. Given this uncertainty, we model agents who either minimize their worst-case cost (WCC) or their worst-case regret (WCR), and study implications on equilibrium existence, convergence through adaptive play, and efficiency. Under the WCC behavior the game reduces to a modified congestion game, and welfare improves when agents have moderate uncertainty. Under WCR behavior the game is not, in general, a congestion game, but we show convergence and efficiency bounds for a simple class of games. ",david parkes,,2014.0,,arXiv,Meir2014,True,,arXiv,Not available,Congestion Games with Distance-Based Strict Uncertainty,c674bb600a590efa17de65ffa1ac0fc8,http://arxiv.org/abs/1411.4943v2 16475," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",kamesh munagala,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 16476," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",h. mcmahan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 16477," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",omkar muralidharan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 16478," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",saeed alaei,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16479," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",azarakhsh malekian,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16480," In the context of auctions for digital goods, an interesting random sampling auction has been proposed by Goldberg, Hartline, and Wright [2001]. This auction has been analyzed by Feige, Flaxman, Hartline, and Kleinberg [2005], who have shown that it is 15-competitive in the worst case {which is substantially better than the previously proven constant bounds but still far from the conjectured competitive ratio of 4. In this paper, we prove that the aforementioned random sampling auction is indeed 4-competitive for a large class of instances where the number of bids above (or equal to) the optimal sale price is at least 6. We also show that it is 4:68-competitive for the small class of remaining instances thus leaving a negligible gap between the lower and upper bound. We employ a mix of probabilistic techniques and dynamic programming to compute these bounds. ",aravind srinivasan,,2013.0,,arXiv,Alaei2013,True,,arXiv,Not available,On Random Sampling Auctions for Digital Goods,53a187d0046ee86735ccf8b3c0ea050b,http://arxiv.org/abs/1303.4438v1 16481," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",jinzhong niu,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 16482," In this paper, we introduce a novel, non-recursive, maximal matching algorithm for double auctions, which aims to maximize the amount of commodities to be traded. It differs from the usual equilibrium matching, which clears a market at the equilibrium price. We compare the two algorithms through experimental analyses, showing that the maximal matching algorithm is favored in scenarios where trading volume is a priority and that it may possibly improve allocative efficiency over equilibrium matching as well. A parameterized algorithm that incorporates both maximal matching and equilibrium matching as special cases is also presented to allow flexible control on how much to trade in a double auction. ",simon parsons,,2013.0,,arXiv,Niu2013,True,,arXiv,Not available,Maximizing Matching in Double-sided Auctions,51e83871b18a0c591f28fb9a712fc3d2,http://arxiv.org/abs/1304.3135v1 16483," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ben roberts,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 16484," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",dinan gunawardena,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 16485," A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions. ",dinh hoang,,2015.0,,arXiv,Hoang2015,True,,arXiv,Not available,Applications of Repeated Games in Wireless Networks: A Survey,f2963180e0e32bd515fb584b5dd3386c,http://arxiv.org/abs/1501.02886v1 16486," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",ian kash,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 16487," In a sponsored search auction, decisions about how to rank ads impose tradeoffs between objectives such as revenue and welfare. In this paper, we examine how these tradeoffs should be made. We begin by arguing that the most natural solution concept to evaluate these tradeoffs is the lowest symmetric Nash equilibrium (SNE). As part of this argument, we generalise the well known connection between the lowest SNE and the VCG outcome. We then propose a new ranking algorithm, loosely based on the revenue-optimal auction, that uses a reserve price to order the ads (not just to filter them) and give conditions under which it raises more revenue than simply applying that reserve price. Finally, we conduct extensive simulations examining the tradeoffs enabled by different ranking algorithms and show that our proposed algorithm enables superior operating points by a variety of metrics. ",peter key,,2013.0,,arXiv,Roberts2013,True,,arXiv,Not available,Ranking and Tradeoffs in Sponsored Search Auctions,033a3029b9193dd8d04f4dc6e7707b0c,http://arxiv.org/abs/1304.7642v1 16491," We consider Vickrey-Clarke-Groves (VCG) auctions for a very general combinatorial structure, in an average-case setting where item costs are independent, identically distributed uniform random variables. We prove that the expected VCG cost is at least double the expected nominal cost, and exactly double when the desired structure is a basis of a bridgeless matroid. In the matroid case we further show that, conditioned upon the VCG cost, the expectation of the nominal cost is exactly half the VCG cost, and we show several results on variances and covariances among the nominal cost, the VCG cost, and related quantities. As an application, we find the asymptotic variance of the VCG cost of the minimum spanning tree in a complete graph with random edge costs. ",svante janson,,2013.0,,arXiv,Janson2013,True,,arXiv,Not available,VCG Auction Mechanism Cost Expectations and Variances,01b86454da7398df7472fb794a641836,http://arxiv.org/abs/1310.1777v1 16492," We consider Vickrey-Clarke-Groves (VCG) auctions for a very general combinatorial structure, in an average-case setting where item costs are independent, identically distributed uniform random variables. We prove that the expected VCG cost is at least double the expected nominal cost, and exactly double when the desired structure is a basis of a bridgeless matroid. In the matroid case we further show that, conditioned upon the VCG cost, the expectation of the nominal cost is exactly half the VCG cost, and we show several results on variances and covariances among the nominal cost, the VCG cost, and related quantities. As an application, we find the asymptotic variance of the VCG cost of the minimum spanning tree in a complete graph with random edge costs. ",gregory sorkin,,2013.0,,arXiv,Janson2013,True,,arXiv,Not available,VCG Auction Mechanism Cost Expectations and Variances,01b86454da7398df7472fb794a641836,http://arxiv.org/abs/1310.1777v1 16496," A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions. ",xiao lu,,2015.0,,arXiv,Hoang2015,True,,arXiv,Not available,Applications of Repeated Games in Wireless Networks: A Survey,f2963180e0e32bd515fb584b5dd3386c,http://arxiv.org/abs/1501.02886v1 16497," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",michael wellman,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 16498," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",eric sodomka,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 16499," Bidding in simultaneous auctions is challenging because an agent's value for a good in one auction may depend on the uncertain outcome of other auctions: the so-called exposure problem. Given the gap in understanding of general simultaneous auction games, previous works have tackled this problem with heuristic strategies that employ probabilistic price predictions. We define a concept of self-confirming prices, and show that within an independent private value model, Bayes-Nash equilibrium can be fully characterized as a profile of optimal price prediction strategies with self-confirming predictions. We exhibit practical procedures to compute approximately optimal bids given a probabilistic price prediction, and near self-confirming price predictions given a price-prediction strategy. An extensive empirical game-theoretic analysis demonstrates that self-confirming price prediction strategies are effective in simultaneous auction games with both complementary and substitutable preference structures. ",amy greenwald,,2012.0,,arXiv,Wellman2012,True,,arXiv,Not available,"Self-Confirming Price Prediction Strategies for Simultaneous One-Shot Auctions",5f4547b16928cafa41df0fa5992e92e0,http://arxiv.org/abs/1210.4915v1 16500," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",vasilis syrgkanis,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 16501," In many natural settings agents participate in multiple different auctions that are not simultaneous. In such auctions, future opportunities affect strategic considerations of the players. The goal of this paper is to develop a quantitative understanding of outcomes of such sequential auctions. In earlier work (Paes Leme et al. 2012) we initiated the study of the price of anarchy in sequential auctions. We considered sequential first price auctions in the full information model, where players are aware of all future opportunities, as well as the valuation of all players. In this paper, we study efficiency in sequential auctions in the Bayesian environment, relaxing the informational assumption on the players. We focus on two environments, both studied in the full information model in Paes Leme et al. 2012, matching markets and matroid auctions. In the full information environment, a sequential first price cut auction for matroid settings is efficient. In Bayesian environments this is no longer the case, as we show using a simple example with three players. Our main result is a bound of $1+\frac{e}{e-1}\approx 2.58$ on the price of anarchy in both matroid auctions and single-value matching markets (even with correlated types) and a bound of $2\frac{e}{e-1}\approx 3.16$ for general matching markets with independent types. To bound the price of anarchy we need to consider possible deviations at an equilibrium. In a sequential Bayesian environment the effect of deviations is more complex than in one-shot games; early bids allow others to infer information about the player's value. We create effective deviations despite the presence of this difficulty by introducing a bluffing technique of independent interest. ",eva tardos,,2012.0,,arXiv,Syrgkanis2012,True,,arXiv,Not available,Bayesian Sequential Auctions,f4d6d2838cdc78bdbdd4f3b9f4370193,http://arxiv.org/abs/1206.4771v1 16502," This paper studies an environment of simultaneous, separate, first-price auctions for complementary goods. Agents observe private values of each good before making bids, and the complementarity between goods is explicitly incorporated in their utility. For simplicity, a model is presented with two first-price auctions and two bidders. We show that a monotone pure-strategy Bayesian Nash Equilibrium exists in the environment. ",wiroy shin,,2013.0,,arXiv,Shin2013,True,,arXiv,Not available,Simultaneous auctions for complementary goods,878b4680f06c7892ffefd2adfbc511d7,http://arxiv.org/abs/1312.2641v1 16503," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",gagan goel,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 16504," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",vahab mirrokni,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 16505," A central issue in applying auction theory in practice is the problem of dealing with budget-constrained agents. A desirable goal in practice is to design incentive compatible, individually rational, and Pareto optimal auctions while respecting the budget constraints. Achieving this goal is particularly challenging in the presence of nontrivial combinatorial constraints over the set of feasible allocations. Toward this goal and motivated by AdWords auctions, we present an auction for {\em polymatroidal} environments satisfying the above properties. Our auction employs a novel clinching technique with a clean geometric description and only needs an oracle access to the submodular function defining the polymatroid. As a result, this auction not only simplifies and generalizes all previous results, it applies to several new applications including AdWords Auctions, bandwidth markets, and video on demand. In particular, our characterization of the AdWords auction as polymatroidal constraints might be of independent interest. This allows us to design the first mechanism for Ad Auctions taking into account simultaneously budgets, multiple keywords and multiple slots. We show that it is impossible to extend this result to generic polyhedral constraints. This also implies an impossibility result for multi-unit auctions with decreasing marginal utilities in the presence of budget constraints. ",renato leme,,2012.0,,arXiv,Goel2012,True,,arXiv,Not available,Polyhedral Clinching Auctions and the Adwords Polytope,226262e8a94ae769c0097e00eae7770f,http://arxiv.org/abs/1201.0404v3 16506," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",jamie morgenstern,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 16507," A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions. ",dusit niyato,,2015.0,,arXiv,Hoang2015,True,,arXiv,Not available,Applications of Repeated Games in Wireless Networks: A Survey,f2963180e0e32bd515fb584b5dd3386c,http://arxiv.org/abs/1501.02886v1 16508," This paper develops a general approach, rooted in statistical learning theory, to learning an approximately revenue-maximizing auction from data. We introduce $t$-level auctions to interpolate between simple auctions, such as welfare maximization with reserve prices, and optimal auctions, thereby balancing the competing demands of expressivity and simplicity. We prove that such auctions have small representation error, in the sense that for every product distribution $F$ over bidders' valuations, there exists a $t$-level auction with small $t$ and expected revenue close to optimal. We show that the set of $t$-level auctions has modest pseudo-dimension (for polynomial $t$) and therefore leads to small learning error. One consequence of our results is that, in arbitrary single-parameter settings, one can learn a mechanism with expected revenue arbitrarily close to optimal from a polynomial number of samples. ",tim roughgarden,,2015.0,,arXiv,Morgenstern2015,True,,arXiv,Not available,The Pseudo-Dimension of Near-Optimal Auctions,358ae158c68af120be262f1f2ba3535b,http://arxiv.org/abs/1506.03684v1 16509," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",chonho lee,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 16510," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",ping wang,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 16511," Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and monetary benefits to auction participants (e.g., cloud users and providers). The proposed auction system assists them to decide when and how providers allocate their resources to which users. Furthermore, we propose a distributed algorithm using a group formation game that determines which users and providers will trade resources by their cooperative decisions. To find how to allocate the resources, the utility optimization problem is formulated as a binary integer programming problem, and the nearly optimal solution is obtained by a heuristic algorithm with quadratic time complexity. In comparison studies, the proposed real-time group auction system with cooperation outperforms an individual auction in terms of the resource efficiency (e.g., the request acceptance rate for users and resource utilization for providers) and monetary benefits (e.g., average payments for users and total profits for providers). ",dusit niyato,,2013.0,,arXiv,Lee2013,True,,arXiv,Not available,"A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications",007c6809dc4ca00e600550b9b8e62478,http://arxiv.org/abs/1304.0539v1 16515," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",david kempe,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16516," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",mahyar salek,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16517," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",cristopher moore,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16518," A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions. ",ping wang,,2015.0,,arXiv,Hoang2015,True,,arXiv,Not available,Applications of Repeated Games in Wireless Networks: A Survey,f2963180e0e32bd515fb584b5dd3386c,http://arxiv.org/abs/1501.02886v1 16519," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",marc abeille,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 16520," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",clement calauzenes,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 16521," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",noureddine karoui,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 16522," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",thomas nedelec,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 16523," With the increasing use of auctions in online advertising, there has been a large effort to study seller revenue maximization, following Myerson's seminal work, both theoretically and practically. We take the point of view of the buyer in classical auctions and ask the question of whether she has an incentive to shade her bid even in auctions that are reputed to be truthful, when aware of the revenue optimization mechanism. We show that in auctions such as the Myerson auction or a VCG with reserve price set as the monopoly price, the buyer who is aware of this information has indeed an incentive to shade. Intuitively, by selecting the revenue maximizing auction, the seller introduces a dependency on the buyers' distributions in the choice of the auction. We study in depth the case of the Myerson auction and show that a symmetric equilibrium exists in which buyers shade non-linearly what would be their first price bid. They then end up with an expected payoff that is equal to what they would get in a first price auction with no reserve price. We conclude that a return to simple first price auctions with no reserve price or at least non-dynamic anonymous ones is desirable from the point of view of both buyers, sellers and increasing transparency. ",vianney perchet,,2018.0,,arXiv,Abeille2018,True,,arXiv,Not available,Explicit shading strategies for repeated truthful auctions,79ead3760524629b5553ee965407af92,http://arxiv.org/abs/1805.00256v2 16524," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",amos fiat,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 16525," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",stefano leonardi,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 16526," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",jared saia,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 16527," We consider budget constrained combinatorial auctions where bidder $i$ has a private value $v_i$, a budget $b_i$, and is interested in all the items in $S_i$. The value to agent $i$ of a set of items $R$ is $|R \cap S_i| \cdot v_i$. Such auctions capture adword auctions, where advertisers offer a bid for ads in response to an advertiser-dependent set of adwords, and advertisers have budgets. It is known that even of all items are identical and all budgets are public it is not possible to be truthful and efficient. Our main result is a novel auction that runs in polynomial time, is incentive compatible, and ensures Pareto-optimality for such auctions when the valuations are private and the budgets are public knowledge. This extends the result of Dobzinski et al. (FOCS 2008) for auctions of multiple {\sl identical} items and public budgets to single-valued {\sl combinatorial} auctions with public budgets. ",piotr sankowski,,2010.0,,arXiv,Fiat2010,True,,arXiv,Not available,Combinatorial Auctions with Budgets,8f33ad3f5eb49d4d1f7de52b394f8ff7,http://arxiv.org/abs/1001.1686v2 16528," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",jian zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 16529," A repeated game is an effective tool to model interactions and conflicts for players aiming to achieve their objectives in a long-term basis. Contrary to static noncooperative games that model an interaction among players in only one period, in repeated games, interactions of players repeat for multiple periods; and thus the players become aware of other players' past behaviors and their future benefits, and will adapt their behavior accordingly. In wireless networks, conflicts among wireless nodes can lead to selfish behaviors, resulting in poor network performances and detrimental individual payoffs. In this paper, we survey the applications of repeated games in different wireless networks. The main goal is to demonstrate the use of repeated games to encourage wireless nodes to cooperate, thereby improving network performances and avoiding network disruption due to selfish behaviors. Furthermore, various problems in wireless networks and variations of repeated game models together with the corresponding solutions are discussed in this survey. Finally, we outline some open issues and future research directions. ",zhu han,,2015.0,,arXiv,Hoang2015,True,,arXiv,Not available,Applications of Repeated Games in Wireless Networks: A Survey,f2963180e0e32bd515fb584b5dd3386c,http://arxiv.org/abs/1501.02886v1 16530," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",chuan wu,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 16531," IaaS clouds invest substantial capital in operating their data centers. Reducing the cost of resource provisioning, is their forever pursuing goal. Computing resource trading among multiple IaaS clouds provide a potential for IaaS clouds to utilize cheaper resources to fulfill their jobs, by exploiting the diversities of different clouds' workloads and operational costs. In this paper, we focus on studying the IaaS clouds' cost reduction through computing resource trading among multiple IaaS clouds. We formulate the global cost minimization problem among multiple IaaS clouds under cooperative scenario where each individual cloud's workload and cost information is known. Taking into consideration jobs with disparate lengths, a non-preemptive approximation algorithm for leftover job migration and new job scheduling is designed. Given to the selfishness of individual clouds, we further design a randomized double auction mechanism to elicit clouds' truthful bidding for buying or selling virtual machines. We evaluate our algorithms using trace-driven simulations. ",zongpeng li,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Cost Minimization in Multiple IaaS Clouds: A Double Auction Approach,a0c1d83c091bda707ac392755b2ac3d3,http://arxiv.org/abs/1308.0841v3 16532," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",tri wijaya,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 16533," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",kate larson,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 16534," Recent work has suggested reducing electricity generation cost by cutting the peak to average ratio (PAR) without reducing the total amount of the loads. However, most of these proposals rely on consumer's willingness to act. In this paper, we propose an approach to cut PAR explicitly from the supply side. The resulting cut loads are then distributed among consumers by the means of a multiunit auction which is done by an intelligent agent on behalf of the consumer. This approach is also in line with the future vision of the smart grid to have the demand side matched with the supply side. Experiments suggest that our approach reduces overall system cost and gives benefit to both consumers and the energy provider. ",karl aberer,,2013.0,10.1109/COMSNETS.2013.6465595,"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), vol., no., pp.1,6, 7-10 Jan. 2013",Wijaya2013,True,,arXiv,Not available,"Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction",12c2f1f285175fae21698b094ba4a231,http://arxiv.org/abs/1308.4761v1 16535," We consider Vickrey-Clarke-Groves (VCG) auctions for a very general combinatorial structure, in an average-case setting where item costs are independent, identically distributed uniform random variables. We prove that the expected VCG cost is at least double the expected nominal cost, and exactly double when the desired structure is a basis of a bridgeless matroid. In the matroid case we further show that, conditioned upon the VCG cost, the expectation of the nominal cost is exactly half the VCG cost, and we show several results on variances and covariances among the nominal cost, the VCG cost, and related quantities. As an application, we find the asymptotic variance of the VCG cost of the minimum spanning tree in a complete graph with random edge costs. ",svante janson,,2013.0,,arXiv,Janson2013,True,,arXiv,Not available,VCG Auction Mechanism Cost Expectations and Variances,01b86454da7398df7472fb794a641836,http://arxiv.org/abs/1310.1777v1 16536," We consider Vickrey-Clarke-Groves (VCG) auctions for a very general combinatorial structure, in an average-case setting where item costs are independent, identically distributed uniform random variables. We prove that the expected VCG cost is at least double the expected nominal cost, and exactly double when the desired structure is a basis of a bridgeless matroid. In the matroid case we further show that, conditioned upon the VCG cost, the expectation of the nominal cost is exactly half the VCG cost, and we show several results on variances and covariances among the nominal cost, the VCG cost, and related quantities. As an application, we find the asymptotic variance of the VCG cost of the minimum spanning tree in a complete graph with random edge costs. ",gregory sorkin,,2013.0,,arXiv,Janson2013,True,,arXiv,Not available,VCG Auction Mechanism Cost Expectations and Variances,01b86454da7398df7472fb794a641836,http://arxiv.org/abs/1310.1777v1 16540," We model evolution according to an asymmetric game as occurring in multiple finite populations, one for each role in the game, and study the effect of subjecting individuals to stochastic strategy mutations. We show that, when these mutations occur sufficiently infrequently, the dynamics over all population states simplify to an ergodic Markov chain over just the pure population states (where each population is monomorphic). This makes calculation of the stationary distribution computationally feasible. The transition probabilities of this embedded Markov chain involve fixation probabilities of mutants in single populations. The asymmetry of the underlying game leads to fixation probabilities that are derived from frequency-independent selection, in contrast to the analogous single-population symmetric-game case (Fudenberg and Imhof 2006). This frequency independence is useful in that it allows us to employ results from the population genetics literature to calculate the stationary distribution of the evolutionary process, giving sharper, and sometimes even analytic, results. We demonstrate the utility of this approach by applying it to a battle-of-the-sexes game, a Crawford-Sobel signalling game, and the beer-quiche game of Cho and Kreps (1987). ",carl veller,,2015.0,10.1016/j.jet.2015.12.005,arXiv,Veller2015,True,,arXiv,Not available,Finite-population evolution with rare mutations in asymmetric games,151ab23a28e85eb97a90a25de2a74f7d,http://arxiv.org/abs/1503.06245v2 16541," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",ilan cohen,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 16542," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",alon eden,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 16543," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",amos fiat,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 16544," We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible. In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially. ",lukasz jez,,2015.0,,arXiv,Cohen2015,True,,arXiv,Not available,Pricing Online Decisions: Beyond Auctions,aaf8e816d7ef98a1b1425fc9a3d403d0,http://arxiv.org/abs/1504.01093v1 16545," We introduce robust learning equilibrium. The idea of learning equilibrium is that learning algorithms in multi-agent systems should themselves be in equilibrium rather than only lead to equilibrium. That is, learning equilibrium is immune to strategic deviations: Every agent is better off using its prescribed learning algorithm, if all other agents follow their algorithms, regardless of the unknown state of the environment. However, a learning equilibrium may not be immune to non strategic mistakes. For example, if for a certain period of time there is a failure in the monitoring devices (e.g., the correct input does not reach the agents), then it may not be in equilibrium to follow the algorithm after the devices are corrected. A robust learning equilibrium is immune also to such non-strategic mistakes. The existence of (robust) learning equilibrium is especially challenging when the monitoring devices are 'weak'. That is, the information available to each agent at each stage is limited. We initiate a study of robust learning equilibrium with general monitoring structure and apply it to the context of auctions. We prove the existence of robust learning equilibrium in repeated first-price auctions, and discuss its properties. ",itai ashlagi,,2012.0,,arXiv,Ashlagi2012,True,,arXiv,Not available,Robust Learning Equilibrium,46850abcaeae252fc678dc2c21786a53,http://arxiv.org/abs/1206.6826v1 16546," We introduce robust learning equilibrium. The idea of learning equilibrium is that learning algorithms in multi-agent systems should themselves be in equilibrium rather than only lead to equilibrium. That is, learning equilibrium is immune to strategic deviations: Every agent is better off using its prescribed learning algorithm, if all other agents follow their algorithms, regardless of the unknown state of the environment. However, a learning equilibrium may not be immune to non strategic mistakes. For example, if for a certain period of time there is a failure in the monitoring devices (e.g., the correct input does not reach the agents), then it may not be in equilibrium to follow the algorithm after the devices are corrected. A robust learning equilibrium is immune also to such non-strategic mistakes. The existence of (robust) learning equilibrium is especially challenging when the monitoring devices are 'weak'. That is, the information available to each agent at each stage is limited. We initiate a study of robust learning equilibrium with general monitoring structure and apply it to the context of auctions. We prove the existence of robust learning equilibrium in repeated first-price auctions, and discuss its properties. ",dov monderer,,2012.0,,arXiv,Ashlagi2012,True,,arXiv,Not available,Robust Learning Equilibrium,46850abcaeae252fc678dc2c21786a53,http://arxiv.org/abs/1206.6826v1 16547," We introduce robust learning equilibrium. The idea of learning equilibrium is that learning algorithms in multi-agent systems should themselves be in equilibrium rather than only lead to equilibrium. That is, learning equilibrium is immune to strategic deviations: Every agent is better off using its prescribed learning algorithm, if all other agents follow their algorithms, regardless of the unknown state of the environment. However, a learning equilibrium may not be immune to non strategic mistakes. For example, if for a certain period of time there is a failure in the monitoring devices (e.g., the correct input does not reach the agents), then it may not be in equilibrium to follow the algorithm after the devices are corrected. A robust learning equilibrium is immune also to such non-strategic mistakes. The existence of (robust) learning equilibrium is especially challenging when the monitoring devices are 'weak'. That is, the information available to each agent at each stage is limited. We initiate a study of robust learning equilibrium with general monitoring structure and apply it to the context of auctions. We prove the existence of robust learning equilibrium in repeated first-price auctions, and discuss its properties. ",moshe tennenholtz,,2012.0,,arXiv,Ashlagi2012,True,,arXiv,Not available,Robust Learning Equilibrium,46850abcaeae252fc678dc2c21786a53,http://arxiv.org/abs/1206.6826v1 16548," Using data obtained in a controlled ad-auction experiment that we ran, we evaluate the regret-based approach to econometrics that was recently suggested by Nekipelov, Syrgkanis, and Tardos (EC 2015). We found that despite the weak regret-based assumptions, the results were (at least) as accurate as those obtained using classic equilibrium-based assumptions. En route we studied to what extent humans actually minimize regret in our ad auction, and found a significant difference between the ""high types"" (players with a high valuation) who indeed rationally minimized regret and the ""low types"" who significantly overbid. We suggest that correcting for these biases and adjusting the regret-based econometric method may improve the accuracy of estimated values. ",noam nisan,,2016.0,10.1145/3038912.3052621,arXiv,Nisan2016,True,,arXiv,Not available,An Experimental Evaluation of Regret-Based Econometrics,442641c200499fbcbcc239815cfc291d,http://arxiv.org/abs/1605.03838v2 16549," Using data obtained in a controlled ad-auction experiment that we ran, we evaluate the regret-based approach to econometrics that was recently suggested by Nekipelov, Syrgkanis, and Tardos (EC 2015). We found that despite the weak regret-based assumptions, the results were (at least) as accurate as those obtained using classic equilibrium-based assumptions. En route we studied to what extent humans actually minimize regret in our ad auction, and found a significant difference between the ""high types"" (players with a high valuation) who indeed rationally minimized regret and the ""low types"" who significantly overbid. We suggest that correcting for these biases and adjusting the regret-based econometric method may improve the accuracy of estimated values. ",gali noti,,2016.0,10.1145/3038912.3052621,arXiv,Nisan2016,True,,arXiv,Not available,An Experimental Evaluation of Regret-Based Econometrics,442641c200499fbcbcc239815cfc291d,http://arxiv.org/abs/1605.03838v2 16550," Online double auctions (DAs) model a dynamic two-sided matching problem with private information and self-interest, and are relevant for dynamic resource and task allocation problems. We present a general method to design truthful DAs, such that no agent can benefit from misreporting its arrival time, duration, or value. The family of DAs is parameterized by a pricing rule, and includes a generalization of McAfee's truthful DA to this dynamic setting. We present an empirical study, in which we study the allocative-surplus and agent surplus for a number of different DAs. Our results illustrate that dynamic pricing rules are important to provide good market efficiency for markets with high volatility or low volume. ",jonathan bredin,,2012.0,,arXiv,Bredin2012,True,,arXiv,Not available,Models for Truthful Online Double Auctions,4317e3466310ada4542c96752d79ff62,http://arxiv.org/abs/1207.1360v1 16551," We model evolution according to an asymmetric game as occurring in multiple finite populations, one for each role in the game, and study the effect of subjecting individuals to stochastic strategy mutations. We show that, when these mutations occur sufficiently infrequently, the dynamics over all population states simplify to an ergodic Markov chain over just the pure population states (where each population is monomorphic). This makes calculation of the stationary distribution computationally feasible. The transition probabilities of this embedded Markov chain involve fixation probabilities of mutants in single populations. The asymmetry of the underlying game leads to fixation probabilities that are derived from frequency-independent selection, in contrast to the analogous single-population symmetric-game case (Fudenberg and Imhof 2006). This frequency independence is useful in that it allows us to employ results from the population genetics literature to calculate the stationary distribution of the evolutionary process, giving sharper, and sometimes even analytic, results. We demonstrate the utility of this approach by applying it to a battle-of-the-sexes game, a Crawford-Sobel signalling game, and the beer-quiche game of Cho and Kreps (1987). ",laura hayward,,2015.0,10.1016/j.jet.2015.12.005,arXiv,Veller2015,True,,arXiv,Not available,Finite-population evolution with rare mutations in asymmetric games,151ab23a28e85eb97a90a25de2a74f7d,http://arxiv.org/abs/1503.06245v2 16552," Online double auctions (DAs) model a dynamic two-sided matching problem with private information and self-interest, and are relevant for dynamic resource and task allocation problems. We present a general method to design truthful DAs, such that no agent can benefit from misreporting its arrival time, duration, or value. The family of DAs is parameterized by a pricing rule, and includes a generalization of McAfee's truthful DA to this dynamic setting. We present an empirical study, in which we study the allocative-surplus and agent surplus for a number of different DAs. Our results illustrate that dynamic pricing rules are important to provide good market efficiency for markets with high volatility or low volume. ",david parkes,,2012.0,,arXiv,Bredin2012,True,,arXiv,Not available,Models for Truthful Online Double Auctions,4317e3466310ada4542c96752d79ff62,http://arxiv.org/abs/1207.1360v1 16553," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",paul duetting,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 16554," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",monika henzinger,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 16555," We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for divisible items. We use this to show that there can also be no randomized mechanism that achieves this for either divisible or indivisible items. For single-dimensional valuations we show that there can be no deterministic mechanism with these properties for indivisible items, but that there is a randomized mechanism that achieves this for either divisible or indivisible items. The impossibility results hold for public budgets, while the mechanism allows private budgets, which is in both cases the harder variant to show. While all positive results are polynomial-time algorithms, all negative results hold independent of complexity considerations. ",martin starnberger,,2012.0,,arXiv,Duetting2012,True,,arXiv,Not available,Auctions with Heterogeneous Items and Budget Limits,49f5df7704e237fe6b24c88de3effc21,http://arxiv.org/abs/1209.6448v1 16556," It was recently shown in [http://arxiv.org/abs/1207.5518] that revenue optimization can be computationally efficiently reduced to welfare optimization in all multi-dimensional Bayesian auction problems with arbitrary (possibly combinatorial) feasibility constraints and independent additive bidders with arbitrary (possibly combinatorial) demand constraints. This reduction provides a poly-time solution to the optimal mechanism design problem in all auction settings where welfare optimization can be solved efficiently, but it is fragile to approximation and cannot provide solutions to settings where welfare maximization can only be tractably approximated. In this paper, we extend the reduction to accommodate approximation algorithms, providing an approximation preserving reduction from (truthful) revenue maximization to (not necessarily truthful) welfare maximization. The mechanisms output by our reduction choose allocations via black-box calls to welfare approximation on randomly selected inputs, thereby generalizing also our earlier structural results on optimal multi-dimensional mechanisms to approximately optimal mechanisms. Unlike [http://arxiv.org/abs/1207.5518], our results here are obtained through novel uses of the Ellipsoid algorithm and other optimization techniques over {\em non-convex regions}. ",yang cai,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,"Reducing Revenue to Welfare Maximization: Approximation Algorithms and other Generalizations",47ac4f128d25c93f75d2cedc8278c9af,http://arxiv.org/abs/1305.4000v1 16557," It was recently shown in [http://arxiv.org/abs/1207.5518] that revenue optimization can be computationally efficiently reduced to welfare optimization in all multi-dimensional Bayesian auction problems with arbitrary (possibly combinatorial) feasibility constraints and independent additive bidders with arbitrary (possibly combinatorial) demand constraints. This reduction provides a poly-time solution to the optimal mechanism design problem in all auction settings where welfare optimization can be solved efficiently, but it is fragile to approximation and cannot provide solutions to settings where welfare maximization can only be tractably approximated. In this paper, we extend the reduction to accommodate approximation algorithms, providing an approximation preserving reduction from (truthful) revenue maximization to (not necessarily truthful) welfare maximization. The mechanisms output by our reduction choose allocations via black-box calls to welfare approximation on randomly selected inputs, thereby generalizing also our earlier structural results on optimal multi-dimensional mechanisms to approximately optimal mechanisms. Unlike [http://arxiv.org/abs/1207.5518], our results here are obtained through novel uses of the Ellipsoid algorithm and other optimization techniques over {\em non-convex regions}. ",constantinos daskalakis,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,"Reducing Revenue to Welfare Maximization: Approximation Algorithms and other Generalizations",47ac4f128d25c93f75d2cedc8278c9af,http://arxiv.org/abs/1305.4000v1 16558," It was recently shown in [http://arxiv.org/abs/1207.5518] that revenue optimization can be computationally efficiently reduced to welfare optimization in all multi-dimensional Bayesian auction problems with arbitrary (possibly combinatorial) feasibility constraints and independent additive bidders with arbitrary (possibly combinatorial) demand constraints. This reduction provides a poly-time solution to the optimal mechanism design problem in all auction settings where welfare optimization can be solved efficiently, but it is fragile to approximation and cannot provide solutions to settings where welfare maximization can only be tractably approximated. In this paper, we extend the reduction to accommodate approximation algorithms, providing an approximation preserving reduction from (truthful) revenue maximization to (not necessarily truthful) welfare maximization. The mechanisms output by our reduction choose allocations via black-box calls to welfare approximation on randomly selected inputs, thereby generalizing also our earlier structural results on optimal multi-dimensional mechanisms to approximately optimal mechanisms. Unlike [http://arxiv.org/abs/1207.5518], our results here are obtained through novel uses of the Ellipsoid algorithm and other optimization techniques over {\em non-convex regions}. ",s. weinberg,,2013.0,,arXiv,Cai2013,True,,arXiv,Not available,"Reducing Revenue to Welfare Maximization: Approximation Algorithms and other Generalizations",47ac4f128d25c93f75d2cedc8278c9af,http://arxiv.org/abs/1305.4000v1 16559," This brief paper describes the single-player card game called ""Perpetual Motion"" and reports on a computational analysis of the game's outcome. The analysis follows a Monte Carlo methodology based on a sample of 10,000 randomly generated games. The key result is that 54.55% +/- 0.89% of games can be completed (by a patient player!) but that the remaining 45.45% result in non-terminating cycles. The lengths of these non-terminating cycles leave some outstanding questions. ",matthew clarke,,2009.0,,arXiv,Clarke2009,True,,arXiv,Not available,"On the Chances of Completing the Game of ""Perpetual Motion""",1689fabd98a18b8e36c6dc5f3a6bb2a2,http://arxiv.org/abs/0907.1955v1 16560," We present a direct reduction from k-player games to 2-player games that preserves approximate Nash equilibrium. Previously, the computational equivalence of computing approximate Nash equilibrium in k-player and 2-player games was established via an indirect reduction. This included a sequence of works defining the complexity class PPAD, identifying complete problems for this class, showing that computing approximate Nash equilibrium for k-player games is in PPAD, and reducing a PPAD-complete problem to computing approximate Nash equilibrium for 2-player games. Our direct reduction makes no use of the concept of PPAD, thus eliminating some of the difficulties involved in following the known indirect reduction. ",uriel feige,,2010.0,10.1007/978-3-642-16170-4_13,arXiv,Feige2010,True,,arXiv,Not available,"A Direct Reduction from k-Player to 2-Player Approximate Nash Equilibrium",414beac6d20cba0920116a9305028f32,http://arxiv.org/abs/1007.3886v1 16561," We present a direct reduction from k-player games to 2-player games that preserves approximate Nash equilibrium. Previously, the computational equivalence of computing approximate Nash equilibrium in k-player and 2-player games was established via an indirect reduction. This included a sequence of works defining the complexity class PPAD, identifying complete problems for this class, showing that computing approximate Nash equilibrium for k-player games is in PPAD, and reducing a PPAD-complete problem to computing approximate Nash equilibrium for 2-player games. Our direct reduction makes no use of the concept of PPAD, thus eliminating some of the difficulties involved in following the known indirect reduction. ",inbal talgam-cohen,,2010.0,10.1007/978-3-642-16170-4_13,arXiv,Feige2010,True,,arXiv,Not available,"A Direct Reduction from k-Player to 2-Player Approximate Nash Equilibrium",414beac6d20cba0920116a9305028f32,http://arxiv.org/abs/1007.3886v1 16562," In this paper, we study the distribution and behaviour of internal equilibria in a $d$-player $n$-strategy random evolutionary game where the game payoff matrix is generated from normal distributions. The study of this paper reveals and exploits interesting connections between evolutionary game theory and random polynomial theory. The main novelties of the paper are some qualitative and quantitative results on the expected density, $f_{n,d}$, and the expected number, $E(n,d)$, of (stable) internal equilibria. Firstly, we show that in multi-player two-strategy games, they behave asymptotically as $\sqrt{d-1}$ as $d$ is sufficiently large. Secondly, we prove that they are monotone functions of $d$. We also make a conjecture for games with more than two strategies. Thirdly, we provide numerical simulations for our analytical results and to support the conjecture. As consequences of our analysis, some qualitative and quantitative results on the distribution of zeros of a random Bernstein polynomial are also obtained. ",manh duong,,2015.0,,arXiv,Duong2015,True,,arXiv,Not available,"Analysis of the expected density of internal equilibria in random evolutionary multi-player multi-strategy games",195738357aa8fe703aeba1f2b92817d9,http://arxiv.org/abs/1505.04676v3 16563," We study pure-strategy Nash equilibria in multi-player concurrent deterministic games, for a variety of preference relations. We provide a novel construction, called the suspect game, which transforms a multi-player concurrent game into a two-player turn-based game which turns Nash equilibria into winning strategies (for some objective that depends on the preference relations of the players in the original game). We use that transformation to design algorithms for computing Nash equilibria in finite games, which in most cases have optimal worst-case complexity, for large classes of preference relations. This includes the purely qualitative framework, where each player has a single omega-regular objective that she wants to satisfy, but also the larger class of semi-quantitative objectives, where each player has several omega-regular objectives equipped with a preorder (for instance, a player may want to satisfy all her objectives, or to maximise the number of objectives that she achieves.) ",patricia bouyer,,2015.0,10.2168/LMCS-11(2:9)2015,"Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1569",Bouyer2015,True,,arXiv,Not available,Pure Nash Equilibria in Concurrent Deterministic Games,a6b94c317a0af8dc06d94788e7b239f9,http://arxiv.org/abs/1503.06826v2 16564," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",daniel reeves,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16565," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",michael wellman,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16566," Throughout the history of games, representing the abilities of the various agents acting on behalf of the players has been a central concern. With increasingly sophisticated games emerging, these simulations have become more realistic, but the underlying mechanisms are still, to a large extent, of an ad hoc nature. This paper proposes using a logistic model from psychometrics as a unified mechanism for task resolution in simulation-oriented games. ",magnus hetland,,2013.0,10.1007/978-3-642-40790-1_22,"Serious Games Development and Applications. Lecture Notes in Computer Science Volume 8101, 2013, pp 226-238",Hetland2013,True,,arXiv,Not available,Simulating Ability: Representing Skills in Games,0df4d4850fe3737623f4d085a1457f25,http://arxiv.org/abs/1307.0201v2 16567," In this paper we survey various notions of symmetry for finite strategic-form games; show that game bijections and game isomorphisms form groupoids; introduce matchings as a convenient characterisation of strategy triviality; and outline how to construct and partially order parameterised symmetric games with numerous examples that range all combinations of surveyed symmetry notions. ",nicholas ham,,2013.0,,arXiv,Ham2013,True,,arXiv,Not available,Notions of Symmetry for Finite Strategic-Form Games,d5da56535bfabb98313576b9d3b4640c,http://arxiv.org/abs/1311.4766v4 16568," The optimal value computation for turned-based stochastic games with reachability objectives, also known as simple stochastic games, is one of the few problems in $NP \cap coNP$ which are not known to be in $P$. However, there are some cases where these games can be easily solved, as for instance when the underlying graph is acyclic. In this work, we try to extend this tractability to several classes of games that can be thought as ""almost"" acyclic. We give some fixed-parameter tractable or polynomial algorithms in terms of different parameters such as the number of cycles or the size of the minimal feedback vertex set. ",david auger,,2014.0,,arXiv,Auger2014,True,,arXiv,Not available,Finding Optimal Strategies of Almost Acyclic Simple Stochatic Games,98368c309ff9842d22b62fb014db5764,http://arxiv.org/abs/1402.0471v1 16569," The optimal value computation for turned-based stochastic games with reachability objectives, also known as simple stochastic games, is one of the few problems in $NP \cap coNP$ which are not known to be in $P$. However, there are some cases where these games can be easily solved, as for instance when the underlying graph is acyclic. In this work, we try to extend this tractability to several classes of games that can be thought as ""almost"" acyclic. We give some fixed-parameter tractable or polynomial algorithms in terms of different parameters such as the number of cycles or the size of the minimal feedback vertex set. ",pierre coucheney,,2014.0,,arXiv,Auger2014,True,,arXiv,Not available,Finding Optimal Strategies of Almost Acyclic Simple Stochatic Games,98368c309ff9842d22b62fb014db5764,http://arxiv.org/abs/1402.0471v1 16570," The optimal value computation for turned-based stochastic games with reachability objectives, also known as simple stochastic games, is one of the few problems in $NP \cap coNP$ which are not known to be in $P$. However, there are some cases where these games can be easily solved, as for instance when the underlying graph is acyclic. In this work, we try to extend this tractability to several classes of games that can be thought as ""almost"" acyclic. We give some fixed-parameter tractable or polynomial algorithms in terms of different parameters such as the number of cycles or the size of the minimal feedback vertex set. ",yann strozecki,,2014.0,,arXiv,Auger2014,True,,arXiv,Not available,Finding Optimal Strategies of Almost Acyclic Simple Stochatic Games,98368c309ff9842d22b62fb014db5764,http://arxiv.org/abs/1402.0471v1 16571," We propose a benchmark suite for parity games that includes all benchmarks that have been used in the literature, and make it available online. We give an overview of the parity games, including a description of how they have been generated. We also describe structural properties of parity games, and using these properties we show that our benchmarks are representative. With this work we provide a starting point for further experimentation with parity games. ",jeroen keiren,,2014.0,,arXiv,Keiren2014,True,,arXiv,Not available,Benchmarks for Parity Games (extended version),7426be34a963fae7dc4314b074b913aa,http://arxiv.org/abs/1407.3121v2 16572," We introduce the concept of budget games. Players choose a set of tasks and each task has a certain demand on every resource in the game. Each resource has a budget. If the budget is not enough to satisfy the sum of all demands, it has to be shared between the tasks. We study strategic budget games, where the budget is shared proportionally. We also consider a variant in which the order of the strategic decisions influences the distribution of the budgets. The complexity of the optimal solution as well as existence, complexity and quality of equilibria are analyzed. Finally, we show that the time an ordered budget game needs to convergence towards an equilibrium may be exponential. ",maximilian drees,,2014.0,,arXiv,Drees2014,True,,arXiv,Not available,Budget-restricted utility games with ordered strategic decisions,c4127866338b15e4bd0315ff6129e21e,http://arxiv.org/abs/1407.3123v1 16573," We introduce the concept of budget games. Players choose a set of tasks and each task has a certain demand on every resource in the game. Each resource has a budget. If the budget is not enough to satisfy the sum of all demands, it has to be shared between the tasks. We study strategic budget games, where the budget is shared proportionally. We also consider a variant in which the order of the strategic decisions influences the distribution of the budgets. The complexity of the optimal solution as well as existence, complexity and quality of equilibria are analyzed. Finally, we show that the time an ordered budget game needs to convergence towards an equilibrium may be exponential. ",soren riechers,,2014.0,,arXiv,Drees2014,True,,arXiv,Not available,Budget-restricted utility games with ordered strategic decisions,c4127866338b15e4bd0315ff6129e21e,http://arxiv.org/abs/1407.3123v1 16574," We study pure-strategy Nash equilibria in multi-player concurrent deterministic games, for a variety of preference relations. We provide a novel construction, called the suspect game, which transforms a multi-player concurrent game into a two-player turn-based game which turns Nash equilibria into winning strategies (for some objective that depends on the preference relations of the players in the original game). We use that transformation to design algorithms for computing Nash equilibria in finite games, which in most cases have optimal worst-case complexity, for large classes of preference relations. This includes the purely qualitative framework, where each player has a single omega-regular objective that she wants to satisfy, but also the larger class of semi-quantitative objectives, where each player has several omega-regular objectives equipped with a preorder (for instance, a player may want to satisfy all her objectives, or to maximise the number of objectives that she achieves.) ",romain brenguier,,2015.0,10.2168/LMCS-11(2:9)2015,"Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1569",Bouyer2015,True,,arXiv,Not available,Pure Nash Equilibria in Concurrent Deterministic Games,a6b94c317a0af8dc06d94788e7b239f9,http://arxiv.org/abs/1503.06826v2 16575," We introduce the concept of budget games. Players choose a set of tasks and each task has a certain demand on every resource in the game. Each resource has a budget. If the budget is not enough to satisfy the sum of all demands, it has to be shared between the tasks. We study strategic budget games, where the budget is shared proportionally. We also consider a variant in which the order of the strategic decisions influences the distribution of the budgets. The complexity of the optimal solution as well as existence, complexity and quality of equilibria are analyzed. Finally, we show that the time an ordered budget game needs to convergence towards an equilibrium may be exponential. ",alexander skopalik,,2014.0,,arXiv,Drees2014,True,,arXiv,Not available,Budget-restricted utility games with ordered strategic decisions,c4127866338b15e4bd0315ff6129e21e,http://arxiv.org/abs/1407.3123v1 16576," An algorithm based on backward induction is devised in order to compute the optimal sequence of games to be played in Parrondo games. The algorithm can be used to find the optimal sequence for any finite number of turns or in the steady state, showing that ABABB... is the sequence with the highest steady state average gain. The algorithm can also be generalised to find the optimal adaptive strategy in a multi-player version of the games, where a finite number of players may choose, at every turn, the game the whole ensemble should play. ",l. dinis,,2014.0,10.1103/PhysRevE.77.021124,"Physical Review E 77, 021124 (2008)",Dinis2014,True,,arXiv,Not available,Optimal sequence for Parrondo games,2293b7aa06c4ae52426814a6b7f13cb1,http://arxiv.org/abs/1409.6497v1 16577," Poset games have been the object of mathematical study for over a century, but little has been written on the computational complexity of determining important properties of these games. In this introduction we develop the fundamentals of combinatorial game theory and focus for the most part on poset games, of which Nim is perhaps the best-known example. We present the complexity results known to date, some discovered very recently. ",stephen fenner,,2015.0,,arXiv,Fenner2015,True,,arXiv,Not available,Combinatorial Game Complexity: An Introduction with Poset Games,e7129aa6aa2d7d384a481e8dd4e5e4b7,http://arxiv.org/abs/1505.07416v2 16578," Poset games have been the object of mathematical study for over a century, but little has been written on the computational complexity of determining important properties of these games. In this introduction we develop the fundamentals of combinatorial game theory and focus for the most part on poset games, of which Nim is perhaps the best-known example. We present the complexity results known to date, some discovered very recently. ",john rogers,,2015.0,,arXiv,Fenner2015,True,,arXiv,Not available,Combinatorial Game Complexity: An Introduction with Poset Games,e7129aa6aa2d7d384a481e8dd4e5e4b7,http://arxiv.org/abs/1505.07416v2 16579," We provide an exact analytical solution of the Nash equilibrium for $k$- price auctions. We also introduce a new type of auction and demonstrate that it has fair solutions other than the second price auctions, therefore paving the way for replacing second price auctions. ",martin mihelich,,2018.0,,arXiv,Mihelich2018,True,,arXiv,Not available,k-price auctions and Combination auctions,9e5690462e56356f76d38d42dcf1fcd0,http://arxiv.org/abs/1810.03494v2 16580," We provide an exact analytical solution of the Nash equilibrium for $k$- price auctions. We also introduce a new type of auction and demonstrate that it has fair solutions other than the second price auctions, therefore paving the way for replacing second price auctions. ",yan shu,,2018.0,,arXiv,Mihelich2018,True,,arXiv,Not available,k-price auctions and Combination auctions,9e5690462e56356f76d38d42dcf1fcd0,http://arxiv.org/abs/1810.03494v2 16581," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",l. blumrosen,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 16582," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",n. nisan,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 16583," We study auctions with severe bounds on the communication allowed: each bidder may only transmit t bits of information to the auctioneer. We consider both welfare- and profit-maximizing auctions under this communication restriction. For both measures, we determine the optimal auction and show that the loss incurred relative to unconstrained auctions is mild. We prove non-surprising properties of these kinds of auctions, e.g., that in optimal mechanisms bidders simply report the interval in which their valuation lies in, as well as some surprising properties, e.g., that asymmetric auctions are better than symmetric ones and that multi-round auctions reduce the communication complexity only by a linear factor. ",i. segal,,2011.0,10.1613/jair.2081,"Journal Of Artificial Intelligence Research, Volume 28, pages 233-266, 2007",Blumrosen2011,True,,arXiv,Not available,Auctions with Severely Bounded Communication,a8b1b18247078cc44d008633f4b04527,http://arxiv.org/abs/1110.2733v1 16584," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",nianxia cao,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 16585," We study pure-strategy Nash equilibria in multi-player concurrent deterministic games, for a variety of preference relations. We provide a novel construction, called the suspect game, which transforms a multi-player concurrent game into a two-player turn-based game which turns Nash equilibria into winning strategies (for some objective that depends on the preference relations of the players in the original game). We use that transformation to design algorithms for computing Nash equilibria in finite games, which in most cases have optimal worst-case complexity, for large classes of preference relations. This includes the purely qualitative framework, where each player has a single omega-regular objective that she wants to satisfy, but also the larger class of semi-quantitative objectives, where each player has several omega-regular objectives equipped with a preorder (for instance, a player may want to satisfy all her objectives, or to maximise the number of objectives that she achieves.) ",nicolas markey,,2015.0,10.2168/LMCS-11(2:9)2015,"Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1569",Bouyer2015,True,,arXiv,Not available,Pure Nash Equilibria in Concurrent Deterministic Games,a6b94c317a0af8dc06d94788e7b239f9,http://arxiv.org/abs/1503.06826v2 16586," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",swastik brahma,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 16587," This letter considers the design of an auction mechanism to sell the object of a seller when the buyers quantize their private value estimates regarding the object prior to communicating them to the seller. The designed auction mechanism maximizes the utility of the seller (i.e., the auction is optimal), prevents buyers from communicating falsified quantized bids (i.e., the auction is incentive-compatible), and ensures that buyers will participate in the auction (i.e., the auction is individually-rational). The letter also investigates the design of the optimal quantization thresholds using which buyers quantize their private value estimates. Numerical results provide insights regarding the influence of the quantization thresholds on the auction mechanism. ",pramod varshney,,2015.0,10.1109/LSP.2016.2604280,arXiv,Cao2015,True,,arXiv,Not available,Optimal Auction Design with Quantized Bids,adde2e9f826851c238afe09601dbe3b2,http://arxiv.org/abs/1509.08496v1 16588," We introduce a novel characterization of all Walrasian price vectors in terms of forbidden over- and under demanded sets for monotone gross substitute combinatorial auctions. For ascending and descending auctions we suggest a universal framework for finding the minimum or maximum Walrasian price vectors for monotone gross substitute combinatorial auctions. An ascending (descending) auction is guaranteed to find the minimum (maximum) Walrasian if and only if it follows the suggested framework. ",oren ben-zwi,,2016.0,,arXiv,Ben-Zwi2016,True,,arXiv,Not available,Walrasian's Characterization and a Universal Ascending Auction,5240bf4f1cd8dffe3cb81174390cd88e,http://arxiv.org/abs/1605.03826v1 16589," In auction theory, cryptography has been used to achieve anonymity of the participants, security and privacy of the bids, secure computation and to simulate mediator (auctioneer). Auction theory focuses on revenue and Cryptography focuses on security and privacy. Involving Cryptography at base level, to enhance revenue gives entirely new perspective and insight to Auction theory, thereby achieving the core goals of auction theory. In this report, we try to investigate an interesting field of study in Auction Theory using Cryptographic primitives. ",amjed shareef,,2012.0,,arXiv,Shareef2012,True,,arXiv,Not available,"Short Report on: Possible directions to Auctions with Cryptographic pre-play",c04173a7604b7b653f8c49c8d20b09ba,http://arxiv.org/abs/1210.6450v1 16590," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",ning chen,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 16591," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",nick gravin,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 16592," We propose a uniform approach for the design and analysis of prior-free competitive auctions and online auctions. Our philosophy is to view the benchmark function as a variable parameter of the model and study a broad class of functions instead of a individual target benchmark. We consider a multitude of well-studied auction settings, and improve upon a few previous results. (1) Multi-unit auctions. Given a $\beta$-competitive unlimited supply auction, the best previously known multi-unit auction is $2\beta$-competitive. We design a $(1+\beta)$-competitive auction reducing the ratio from $4.84$ to $3.24$. These results carry over to matroid and position auctions. (2) General downward-closed environments. We design a $6.5$-competitive auction improving upon the ratio of $7.5$. Our auction is noticeably simpler than the previous best one. (3) Unlimited supply online auctions. Our analysis yields an auction with a competitive ratio of $4.12$, which significantly narrows the margin of $[4,4.84]$ previously known for this problem. A particularly important tool in our analysis is a simple decomposition lemma, which allows us to bound the competitive ratio against a sum of benchmark functions. We use this lemma in a ""divide and conquer"" fashion by dividing the target benchmark into the sum of simpler functions. ",pinyan lu,,2014.0,,arXiv,Chen2014,True,,arXiv,Not available,Competitive analysis via benchmark decomposition,5861bdcebe37402d5f701d88bd5edf22,http://arxiv.org/abs/1411.2079v1 16593," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",darrell hoy,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16594," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",kamal jain,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16595," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",christopher wilkens,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16596," We study pure-strategy Nash equilibria in multi-player concurrent deterministic games, for a variety of preference relations. We provide a novel construction, called the suspect game, which transforms a multi-player concurrent game into a two-player turn-based game which turns Nash equilibria into winning strategies (for some objective that depends on the preference relations of the players in the original game). We use that transformation to design algorithms for computing Nash equilibria in finite games, which in most cases have optimal worst-case complexity, for large classes of preference relations. This includes the purely qualitative framework, where each player has a single omega-regular objective that she wants to satisfy, but also the larger class of semi-quantitative objectives, where each player has several omega-regular objectives equipped with a preorder (for instance, a player may want to satisfy all her objectives, or to maximise the number of objectives that she achieves.) ",michael ummels,,2015.0,10.2168/LMCS-11(2:9)2015,"Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1569",Bouyer2015,True,,arXiv,Not available,Pure Nash Equilibria in Concurrent Deterministic Games,a6b94c317a0af8dc06d94788e7b239f9,http://arxiv.org/abs/1503.06826v2 16597," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",ashish goel,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 16598," Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. ",kamesh munagala,,2008.0,,arXiv,Goel2008,True,,arXiv,Not available,Hybrid Keyword Search Auctions,77fa375d8a0bf33692dab873d0957bd5,http://arxiv.org/abs/0807.2496v2 16599," We discuss bundle auctions within the framework of an integer allocation problem. We show that for multi-unit auctions, of which bundle auctions are a special case, market equilibrium and constrained market equilibrium are equivalent concepts. This equivalence, allows us to obtain a computable necessary and sufficient condition for the existence of constrained market equilibrium for bundle auctions. We use this result to obtain a necessary and sufficient condition for the existence of market equilibrium for multi-unit auctions. After obtaining the induced bundle auction of a nonnegative TU game, we show that the existence of market equilibrium implies the existence of a possibly different market equilibrium as well, which corresponds very naturally to an outcome in the matching core of the TU game. Consequently we show that the matching core of the nonnegative TU game is non-empty if and only if the induced market game has a market equilibrium. ",somdeb lahiri,,2006.0,,arXiv,Lahiri2006,True,,arXiv,Not available,"Market Equilibrium for Bundle Auctions and the Matching Core of Nonnegative TU Games",76077471140c9fabd94199f3a8422910,http://arxiv.org/abs/cs/0603032v3 16600," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",jinzhong niu,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 16601," Auctions are markets with strict regulations governing the information available to traders in the market and the possible actions they can take. Since well designed auctions achieve desirable economic outcomes, they have been widely used in solving real-world optimization problems, and in structuring stock or futures exchanges. Auctions also provide a very valuable testing-ground for economic theory, and they play an important role in computer-based control systems. Auction mechanism design aims to manipulate the rules of an auction in order to achieve specific goals. Economists traditionally use mathematical methods, mainly game theory, to analyze auctions and design new auction forms. However, due to the high complexity of auctions, the mathematical models are typically simplified to obtain results, and this makes it difficult to apply results derived from such models to market environments in the real world. As a result, researchers are turning to empirical approaches. This report aims to survey the theoretical and empirical approaches to designing auction mechanisms and trading strategies with more weights on empirical ones, and build the foundation for further research in the field. ",simon parsons,,2009.0,,arXiv,Niu2009,True,,arXiv,Not available,An Investigation Report on Auction Mechanism Design,a361692f9e4b8aaa72b2e9d6c12fe02f,http://arxiv.org/abs/0904.1258v2 16602," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",greg linden,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16603," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",christopher meek,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16604," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",max chickering,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16605," Online advertising is the main source of revenue for many Internet firms. A central component of online advertising is the underlying mechanism that selects and prices the winning ads for a given ad slot. In this paper we study designing a mechanism for the Combinatorial Auction with Identical Items (CAII) in which we are interested in selling $k$ identical items to a group of bidders each demanding a certain number of items between $1$ and $k$. CAII generalizes important online advertising scenarios such as image-text and video-pod auctions [GK14]. In image-text auction we want to fill an advertising slot on a publisher's web page with either $k$ text-ads or a single image-ad and in video-pod auction we want to fill an advertising break of $k$ seconds with video-ads of possibly different durations. Our goal is to design truthful mechanisms that satisfy Revenue Monotonicity (RM). RM is a natural constraint which states that the revenue of a mechanism should not decrease if the number of participants increases or if a participant increases her bid. [GK14] showed that no deterministic RM mechanism can attain PoRM of less than $\ln(k)$ for CAII, i.e., no deterministic mechanism can attain more than $\frac{1}{\ln(k)}$ fraction of the maximum social welfare. [GK14] also design a mechanism with PoRM of $O(\ln^2(k))$ for CAII. In this paper, we seek to overcome the impossibility result of [GK14] for deterministic mechanisms by using the power of randomization. We show that by using randomization, one can attain a constant PoRM. In particular, we design a randomized RM mechanism with PoRM of $3$ for CAII. ",gagan goel,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Randomized Revenue Monotone Mechanisms for Online Advertising,a96c6b846126bb9932daee7c56e23962,http://arxiv.org/abs/1507.00130v1 16606," Online advertising is the main source of revenue for many Internet firms. A central component of online advertising is the underlying mechanism that selects and prices the winning ads for a given ad slot. In this paper we study designing a mechanism for the Combinatorial Auction with Identical Items (CAII) in which we are interested in selling $k$ identical items to a group of bidders each demanding a certain number of items between $1$ and $k$. CAII generalizes important online advertising scenarios such as image-text and video-pod auctions [GK14]. In image-text auction we want to fill an advertising slot on a publisher's web page with either $k$ text-ads or a single image-ad and in video-pod auction we want to fill an advertising break of $k$ seconds with video-ads of possibly different durations. Our goal is to design truthful mechanisms that satisfy Revenue Monotonicity (RM). RM is a natural constraint which states that the revenue of a mechanism should not decrease if the number of participants increases or if a participant increases her bid. [GK14] showed that no deterministic RM mechanism can attain PoRM of less than $\ln(k)$ for CAII, i.e., no deterministic mechanism can attain more than $\frac{1}{\ln(k)}$ fraction of the maximum social welfare. [GK14] also design a mechanism with PoRM of $O(\ln^2(k))$ for CAII. In this paper, we seek to overcome the impossibility result of [GK14] for deterministic mechanisms by using the power of randomization. We show that by using randomization, one can attain a constant PoRM. In particular, we design a randomized RM mechanism with PoRM of $3$ for CAII. ",mohammadtaghi hajiaghayi,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Randomized Revenue Monotone Mechanisms for Online Advertising,a96c6b846126bb9932daee7c56e23962,http://arxiv.org/abs/1507.00130v1 16607," We consider sequences of games $\mathcal{G}=\{G_1,G_2,\ldots\}$ where, for all $n$, $G_n$ has the same set of players. Such sequences arise in the analysis of running time of players in games, in electronic money systems such as Bitcoin and in cryptographic protocols. Assuming that one-way functions exist, we prove that there is a sequence of 2-player zero-sum Bayesian games $\mathcal{G}$ such that, for all $n$, the size of every action in $G_n$ is polynomial in $n$, the utility function is polynomial computable in $n$, and yet there is no polynomial-time Nash equilibrium, where we use a notion of Nash equilibrium that is tailored to sequences of games. We also demonstrate that Nash equilibrium may not exist when considering players that are constrained to perform at most $T$ computational steps in each of the games $\{G_i\}_{i=1}^{\infty}$. These examples may shed light on competitive settings where the availability of more running time or faster algorithms lead to a ""computational arms race"", precluding the existence of equilibrium. They also point to inherent limitations of concepts such ""best response"" and Nash equilibrium in games with resource-bounded players. ",joseph halpern,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,"On the Non-Existence of Nash Equilibrium in Games with Resource-Bounded Players",a7b96118021b9c713ee13526ce34ce00,http://arxiv.org/abs/1507.01501v2 16608," Online advertising is the main source of revenue for many Internet firms. A central component of online advertising is the underlying mechanism that selects and prices the winning ads for a given ad slot. In this paper we study designing a mechanism for the Combinatorial Auction with Identical Items (CAII) in which we are interested in selling $k$ identical items to a group of bidders each demanding a certain number of items between $1$ and $k$. CAII generalizes important online advertising scenarios such as image-text and video-pod auctions [GK14]. In image-text auction we want to fill an advertising slot on a publisher's web page with either $k$ text-ads or a single image-ad and in video-pod auction we want to fill an advertising break of $k$ seconds with video-ads of possibly different durations. Our goal is to design truthful mechanisms that satisfy Revenue Monotonicity (RM). RM is a natural constraint which states that the revenue of a mechanism should not decrease if the number of participants increases or if a participant increases her bid. [GK14] showed that no deterministic RM mechanism can attain PoRM of less than $\ln(k)$ for CAII, i.e., no deterministic mechanism can attain more than $\frac{1}{\ln(k)}$ fraction of the maximum social welfare. [GK14] also design a mechanism with PoRM of $O(\ln^2(k))$ for CAII. In this paper, we seek to overcome the impossibility result of [GK14] for deterministic mechanisms by using the power of randomization. We show that by using randomization, one can attain a constant PoRM. In particular, we design a randomized RM mechanism with PoRM of $3$ for CAII. ",mohammad khani,,2015.0,,arXiv,Goel2015,True,,arXiv,Not available,Randomized Revenue Monotone Mechanisms for Online Advertising,a96c6b846126bb9932daee7c56e23962,http://arxiv.org/abs/1507.00130v1 16609," Combinatorial auctions (CA) are a well-studied area in algorithmic mechanism design. However, contrary to the standard model, empirical studies suggest that a bidder's valuation often does not depend solely on the goods assigned to him. For instance, in adwords auctions an advertiser might not want his ads to be displayed next to his competitors' ads. In this paper, we propose and analyze several natural graph-theoretic models that incorporate such negative externalities, in which bidders form a directed conflict graph with maximum out-degree $\Delta$. We design algorithms and truthful mechanisms for social welfare maximization that attain approximation ratios depending on $\Delta$. For CA, our results are twofold: (1) A lottery that eliminates conflicts by discarding bidders/items independent of the bids. It allows to apply any truthful $\alpha$-approximation mechanism for conflict-free valuations and yields an $\mathcal{O}(\alpha\Delta)$-approximation mechanism. (2) For fractionally sub-additive valuations, we design a rounding algorithm via a novel combination of a semi-definite program and a linear program, resulting in a cone program; the approximation ratio is $\mathcal{O}((\Delta \log \log \Delta)/\log \Delta)$. The ratios are almost optimal given existing hardness results. For the prominent application of adwords auctions, we present several algorithms for the most relevant scenario when the number of items is small. In particular, we design a truthful mechanism with approximation ratio $o(\Delta)$ when the number of items is only logarithmic in the number of bidders. ",yun cheung,,2015.0,,arXiv,Cheung2015,True,,arXiv,Not available,Combinatorial Auctions with Conflict-Based Externalities,c5539da85665d3850b0cc07a89b1cb79,http://arxiv.org/abs/1509.09147v1 16610," Combinatorial auctions (CA) are a well-studied area in algorithmic mechanism design. However, contrary to the standard model, empirical studies suggest that a bidder's valuation often does not depend solely on the goods assigned to him. For instance, in adwords auctions an advertiser might not want his ads to be displayed next to his competitors' ads. In this paper, we propose and analyze several natural graph-theoretic models that incorporate such negative externalities, in which bidders form a directed conflict graph with maximum out-degree $\Delta$. We design algorithms and truthful mechanisms for social welfare maximization that attain approximation ratios depending on $\Delta$. For CA, our results are twofold: (1) A lottery that eliminates conflicts by discarding bidders/items independent of the bids. It allows to apply any truthful $\alpha$-approximation mechanism for conflict-free valuations and yields an $\mathcal{O}(\alpha\Delta)$-approximation mechanism. (2) For fractionally sub-additive valuations, we design a rounding algorithm via a novel combination of a semi-definite program and a linear program, resulting in a cone program; the approximation ratio is $\mathcal{O}((\Delta \log \log \Delta)/\log \Delta)$. The ratios are almost optimal given existing hardness results. For the prominent application of adwords auctions, we present several algorithms for the most relevant scenario when the number of items is small. In particular, we design a truthful mechanism with approximation ratio $o(\Delta)$ when the number of items is only logarithmic in the number of bidders. ",monika henzinger,,2015.0,,arXiv,Cheung2015,True,,arXiv,Not available,Combinatorial Auctions with Conflict-Based Externalities,c5539da85665d3850b0cc07a89b1cb79,http://arxiv.org/abs/1509.09147v1 16611," Combinatorial auctions (CA) are a well-studied area in algorithmic mechanism design. However, contrary to the standard model, empirical studies suggest that a bidder's valuation often does not depend solely on the goods assigned to him. For instance, in adwords auctions an advertiser might not want his ads to be displayed next to his competitors' ads. In this paper, we propose and analyze several natural graph-theoretic models that incorporate such negative externalities, in which bidders form a directed conflict graph with maximum out-degree $\Delta$. We design algorithms and truthful mechanisms for social welfare maximization that attain approximation ratios depending on $\Delta$. For CA, our results are twofold: (1) A lottery that eliminates conflicts by discarding bidders/items independent of the bids. It allows to apply any truthful $\alpha$-approximation mechanism for conflict-free valuations and yields an $\mathcal{O}(\alpha\Delta)$-approximation mechanism. (2) For fractionally sub-additive valuations, we design a rounding algorithm via a novel combination of a semi-definite program and a linear program, resulting in a cone program; the approximation ratio is $\mathcal{O}((\Delta \log \log \Delta)/\log \Delta)$. The ratios are almost optimal given existing hardness results. For the prominent application of adwords auctions, we present several algorithms for the most relevant scenario when the number of items is small. In particular, we design a truthful mechanism with approximation ratio $o(\Delta)$ when the number of items is only logarithmic in the number of bidders. ",martin hoefer,,2015.0,,arXiv,Cheung2015,True,,arXiv,Not available,Combinatorial Auctions with Conflict-Based Externalities,c5539da85665d3850b0cc07a89b1cb79,http://arxiv.org/abs/1509.09147v1 16612," Combinatorial auctions (CA) are a well-studied area in algorithmic mechanism design. However, contrary to the standard model, empirical studies suggest that a bidder's valuation often does not depend solely on the goods assigned to him. For instance, in adwords auctions an advertiser might not want his ads to be displayed next to his competitors' ads. In this paper, we propose and analyze several natural graph-theoretic models that incorporate such negative externalities, in which bidders form a directed conflict graph with maximum out-degree $\Delta$. We design algorithms and truthful mechanisms for social welfare maximization that attain approximation ratios depending on $\Delta$. For CA, our results are twofold: (1) A lottery that eliminates conflicts by discarding bidders/items independent of the bids. It allows to apply any truthful $\alpha$-approximation mechanism for conflict-free valuations and yields an $\mathcal{O}(\alpha\Delta)$-approximation mechanism. (2) For fractionally sub-additive valuations, we design a rounding algorithm via a novel combination of a semi-definite program and a linear program, resulting in a cone program; the approximation ratio is $\mathcal{O}((\Delta \log \log \Delta)/\log \Delta)$. The ratios are almost optimal given existing hardness results. For the prominent application of adwords auctions, we present several algorithms for the most relevant scenario when the number of items is small. In particular, we design a truthful mechanism with approximation ratio $o(\Delta)$ when the number of items is only logarithmic in the number of bidders. ",martin starnberger,,2015.0,,arXiv,Cheung2015,True,,arXiv,Not available,Combinatorial Auctions with Conflict-Based Externalities,c5539da85665d3850b0cc07a89b1cb79,http://arxiv.org/abs/1509.09147v1 16617," Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values $v < v'$, $\phi(v') - \phi(v) \ge v' - v$, and for regular distributions, $\phi(v') - \phi(v) \ge 0$. Cole and Roughgarden introduced the interpolating class of $\alpha$-Strongly Regular distributions ($\alpha$-SR distributions for short), for which $\phi(v') - \phi(v) \ge \alpha(v' - v)$, for $0 \le \alpha \le 1$. In this paper, we investigate five distinct auction settings for which good expected revenue bounds are known when the bidders' valuations are given by MHR distributions. In every case, we show that these bounds degrade gracefully when extended to $\alpha$-SR distributions. For four of these settings, the auction mechanism requires knowledge of these distribution(s) (in the other setting, the distributions are needed only to ensure good bounds on the expected revenue). In these cases we also investigate what happens when the distributions are known only approximately via samples, specifically how to modify the mechanisms so that they remain effective and how the expected revenue depends on the number of samples. ",richard cole,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,"Applications of $α$-strongly regular distributions to Bayesian auctions",ea46af8ba2b2079a599165ba0c9c4b21,http://arxiv.org/abs/1512.02285v2 16618," We consider sequences of games $\mathcal{G}=\{G_1,G_2,\ldots\}$ where, for all $n$, $G_n$ has the same set of players. Such sequences arise in the analysis of running time of players in games, in electronic money systems such as Bitcoin and in cryptographic protocols. Assuming that one-way functions exist, we prove that there is a sequence of 2-player zero-sum Bayesian games $\mathcal{G}$ such that, for all $n$, the size of every action in $G_n$ is polynomial in $n$, the utility function is polynomial computable in $n$, and yet there is no polynomial-time Nash equilibrium, where we use a notion of Nash equilibrium that is tailored to sequences of games. We also demonstrate that Nash equilibrium may not exist when considering players that are constrained to perform at most $T$ computational steps in each of the games $\{G_i\}_{i=1}^{\infty}$. These examples may shed light on competitive settings where the availability of more running time or faster algorithms lead to a ""computational arms race"", precluding the existence of equilibrium. They also point to inherent limitations of concepts such ""best response"" and Nash equilibrium in games with resource-bounded players. ",rafael pass,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,"On the Non-Existence of Nash Equilibrium in Games with Resource-Bounded Players",a7b96118021b9c713ee13526ce34ce00,http://arxiv.org/abs/1507.01501v2 16619," Two classes of distributions that are widely used in the analysis of Bayesian auctions are the Monotone Hazard Rate (MHR) and Regular distributions. They can both be characterized in terms of the rate of change of the associated virtual value functions: for MHR distributions the condition is that for values $v < v'$, $\phi(v') - \phi(v) \ge v' - v$, and for regular distributions, $\phi(v') - \phi(v) \ge 0$. Cole and Roughgarden introduced the interpolating class of $\alpha$-Strongly Regular distributions ($\alpha$-SR distributions for short), for which $\phi(v') - \phi(v) \ge \alpha(v' - v)$, for $0 \le \alpha \le 1$. In this paper, we investigate five distinct auction settings for which good expected revenue bounds are known when the bidders' valuations are given by MHR distributions. In every case, we show that these bounds degrade gracefully when extended to $\alpha$-SR distributions. For four of these settings, the auction mechanism requires knowledge of these distribution(s) (in the other setting, the distributions are needed only to ensure good bounds on the expected revenue). In these cases we also investigate what happens when the distributions are known only approximately via samples, specifically how to modify the mechanisms so that they remain effective and how the expected revenue depends on the number of samples. ",shravas rao,,2015.0,,arXiv,Cole2015,True,,arXiv,Not available,"Applications of $α$-strongly regular distributions to Bayesian auctions",ea46af8ba2b2079a599165ba0c9c4b21,http://arxiv.org/abs/1512.02285v2 16620," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",moshe babaioff,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 16621," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",yannai gonczarowski,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 16622," We consider a monopolist that is selling $n$ items to a single additive buyer, where the buyer's values for the items are drawn according to independent distributions $F_1, F_2,\ldots,F_n$ that possibly have unbounded support. It is well known that - unlike in the single item case - the revenue-optimal auction (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. It is also known that simple auctions with a finite bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, the question of the possibility of extracting an arbitrarily high fraction of the optimal revenue via a finite menu size remained open. In this paper, we give an affirmative answer to this open question, showing that for every $n$ and for every $\varepsilon>0$, there exists a complexity bound $C=C(n,\varepsilon)$ such that auctions of menu size at most $C$ suffice for obtaining a $(1-\varepsilon)$ fraction of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue approximation complexity $C(n,\varepsilon)$, as well as on the deterministic communication complexity required to run an auction that achieves such an approximation. ",noam nisan,,2016.0,,arXiv,Babaioff2016,True,,arXiv,Not available,The Menu-Size Complexity of Revenue Approximation,5cbae5328b80a92106ea3299bc2da90b,http://arxiv.org/abs/1604.06580v3 16623," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",hossein azari,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 16624," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",william heavlin,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 16625," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",hoda heidari,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 16626," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",max lin,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 16627," Motivated by online display ad exchanges, we study a setting in which an exchange repeatedly interacts with bidders who have quota, making decisions about which subsets of bidders are called to participate in ad-slot-specific auctions. A bidder with quota cannot respond to more than a certain number of calls per second. In practice, random throttling is the principal solution by which these constraints are enforced. Given the repeated nature of the interaction with its bidders, the exchange has access to data containing information about each bidder's segments of interest. This information can be utilized to design smarter callout mechanisms --- with the potential of improving the exchange's long-term revenue. In this work, we present a general framework for evaluating and comparing the performance of various callout mechanisms using historical auction data only. To measure the impact of a callout mechanism on long-term revenue, we propose a strategic model that captures the repeated interaction between the exchange and bidders. Our model leads us to two metrics for performance: immediate revenue impact and social welfare. Next we present an empirical framework for estimating these two metrics from historical data. For the baseline to compare against, we consider random throttling, as well as a greedy algorithm with certain theoretical guarantees. We propose several natural callout mechanisms and investigate them through our framework on both synthetic and real auction data. We characterize the conditions under which each heuristic performs well and show that, in addition to being computationally faster, in practice our heuristics consistently and significantly outperform the baselines. ",sonia todorova,,2017.0,,arXiv,Azari2017,True,,arXiv,Not available,"A General Framework for Evaluating Callout Mechanisms in Repeated Auctions",9f594067a53dda5945498f77b3dc34cf,http://arxiv.org/abs/1702.01803v1 16628," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",divya padmanabhan,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 16629," We consider sequences of games $\mathcal{G}=\{G_1,G_2,\ldots\}$ where, for all $n$, $G_n$ has the same set of players. Such sequences arise in the analysis of running time of players in games, in electronic money systems such as Bitcoin and in cryptographic protocols. Assuming that one-way functions exist, we prove that there is a sequence of 2-player zero-sum Bayesian games $\mathcal{G}$ such that, for all $n$, the size of every action in $G_n$ is polynomial in $n$, the utility function is polynomial computable in $n$, and yet there is no polynomial-time Nash equilibrium, where we use a notion of Nash equilibrium that is tailored to sequences of games. We also demonstrate that Nash equilibrium may not exist when considering players that are constrained to perform at most $T$ computational steps in each of the games $\{G_i\}_{i=1}^{\infty}$. These examples may shed light on competitive settings where the availability of more running time or faster algorithms lead to a ""computational arms race"", precluding the existence of equilibrium. They also point to inherent limitations of concepts such ""best response"" and Nash equilibrium in games with resource-bounded players. ",daniel reichman,,2015.0,,arXiv,Halpern2015,True,,arXiv,Not available,"On the Non-Existence of Nash Equilibrium in Games with Resource-Bounded Players",a7b96118021b9c713ee13526ce34ce00,http://arxiv.org/abs/1507.01501v2 16630," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",satyanath bhat,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 16631," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",prabuchandran j.,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 16632," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",shirish shevade,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 16633," Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $\Omega(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $\Delta$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $\Delta$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $\Delta$-UCB achieves a $\Delta$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated. ",y. narahari,,2017.0,,arXiv,Padmanabhan2017,True,,arXiv,Not available,"A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret",2e4918095b4ebc4044db4e94b26df107,http://arxiv.org/abs/1703.00632v1 16634," The online ads trading platform plays a crucial role in connecting publishers and advertisers and generates tremendous value in facilitating the convenience of our lives. It has been evolving into a more and more complicated structure. In this paper, we consider the problem of maximizing the revenue for the seller side via utilizing proper reserve price for the auctions in a dynamical way. Predicting the optimal reserve price for each auction in the repeated auction marketplaces is a non-trivial problem. However, we were able to come up with an efficient method of improving the seller revenue by mainly focusing on adjusting the reserve price for those high-value inventories. Previously, no dedicated work has been performed from this perspective. Inspired by Paul and Michael, our model first identifies the value of the inventory by predicting the top bid price bucket using a cascade of classifiers. The cascade is essential in significantly reducing the false positive rate of a single classifier. Based on the output of the first step, we build another cluster of classifiers to predict the price separations between the top two bids. We showed that although the high-value auctions are only a small portion of all the traffic, successfully identifying them and setting correct reserve price would result in a significant revenue lift. Moreover, our optimization is compatible with all other reserve price models in the system and does not impact their performance. In other words, when combined with other models, the enhancement on exchange revenue will be aggregated. Simulations on randomly sampled Yahoo ads exchange (YAXR) data showed stable and expected lift after applying our model. ",zhihui xie,,2017.0,10.1145/3124749.3124760,arXiv,Xie2017,True,,arXiv,Not available,"Optimal Reserve Price for Online Ads Trading Based on Inventory Identification",c72343c5588fa46d4e816078bf4783cc,http://arxiv.org/abs/1709.10388v1 16635," The online ads trading platform plays a crucial role in connecting publishers and advertisers and generates tremendous value in facilitating the convenience of our lives. It has been evolving into a more and more complicated structure. In this paper, we consider the problem of maximizing the revenue for the seller side via utilizing proper reserve price for the auctions in a dynamical way. Predicting the optimal reserve price for each auction in the repeated auction marketplaces is a non-trivial problem. However, we were able to come up with an efficient method of improving the seller revenue by mainly focusing on adjusting the reserve price for those high-value inventories. Previously, no dedicated work has been performed from this perspective. Inspired by Paul and Michael, our model first identifies the value of the inventory by predicting the top bid price bucket using a cascade of classifiers. The cascade is essential in significantly reducing the false positive rate of a single classifier. Based on the output of the first step, we build another cluster of classifiers to predict the price separations between the top two bids. We showed that although the high-value auctions are only a small portion of all the traffic, successfully identifying them and setting correct reserve price would result in a significant revenue lift. Moreover, our optimization is compatible with all other reserve price models in the system and does not impact their performance. In other words, when combined with other models, the enhancement on exchange revenue will be aggregated. Simulations on randomly sampled Yahoo ads exchange (YAXR) data showed stable and expected lift after applying our model. ",kuang-chih lee,,2017.0,10.1145/3124749.3124760,arXiv,Xie2017,True,,arXiv,Not available,"Optimal Reserve Price for Online Ads Trading Based on Inventory Identification",c72343c5588fa46d4e816078bf4783cc,http://arxiv.org/abs/1709.10388v1 16636," The online ads trading platform plays a crucial role in connecting publishers and advertisers and generates tremendous value in facilitating the convenience of our lives. It has been evolving into a more and more complicated structure. In this paper, we consider the problem of maximizing the revenue for the seller side via utilizing proper reserve price for the auctions in a dynamical way. Predicting the optimal reserve price for each auction in the repeated auction marketplaces is a non-trivial problem. However, we were able to come up with an efficient method of improving the seller revenue by mainly focusing on adjusting the reserve price for those high-value inventories. Previously, no dedicated work has been performed from this perspective. Inspired by Paul and Michael, our model first identifies the value of the inventory by predicting the top bid price bucket using a cascade of classifiers. The cascade is essential in significantly reducing the false positive rate of a single classifier. Based on the output of the first step, we build another cluster of classifiers to predict the price separations between the top two bids. We showed that although the high-value auctions are only a small portion of all the traffic, successfully identifying them and setting correct reserve price would result in a significant revenue lift. Moreover, our optimization is compatible with all other reserve price models in the system and does not impact their performance. In other words, when combined with other models, the enhancement on exchange revenue will be aggregated. Simulations on randomly sampled Yahoo ads exchange (YAXR) data showed stable and expected lift after applying our model. ",liang wang,,2017.0,10.1145/3124749.3124760,arXiv,Xie2017,True,,arXiv,Not available,"Optimal Reserve Price for Online Ads Trading Based on Inventory Identification",c72343c5588fa46d4e816078bf4783cc,http://arxiv.org/abs/1709.10388v1 16637," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",zhe feng,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 16638," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",chara podimata,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 16639," We address online learning in complex auction settings, such as sponsored search auctions, where the value of the bidder is unknown to her, evolving in an arbitrary manner and observed only if the bidder wins an allocation. We leverage the structure of the utility of the bidder and the partial feedback that bidders typically receive in auctions, in order to provide algorithms with regret rates against the best fixed bid in hindsight, that are exponentially faster in convergence in terms of dependence on the action space, than what would have been derived by applying a generic bandit algorithm and almost equivalent to what would have been achieved in the full information setting. Our results are enabled by analyzing a new online learning setting with outcome-based feedback, which generalizes learning with feedback graphs. We provide an online learning algorithm for this setting, of independent interest, with regret that grows only logarithmically with the number of actions and linearly only in the number of potential outcomes (the latter being very small in most auction settings). Last but not least, we show that our algorithm outperforms the bandit approach experimentally and that this performance is robust to dropping some of our theoretical assumptions or introducing noise in the feedback that the bidder receives. ",vasilis syrgkanis,,2017.0,,arXiv,Feng2017,True,,arXiv,Not available,Learning to Bid Without Knowing your Value,e837d4fdaab03e7fb0a69489561ed1b8,http://arxiv.org/abs/1711.01333v5 16640," We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this paper, we show that BWR-games with a constant number of random positions can be solved in pseudo-polynomial time. More precisely, in any BWR-game with $|V_R|=O(1)$, a saddle point in uniformly optimal pure stationary strategies can be found in time polynomial in $|V_W|+|V_B|$, the maximum absolute local reward, and the common denominator of the transition probabilities. ",endre boros,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Pseudo-Polynomial Algorithm for Mean Payoff Stochastic Games with Perfect Information and Few Random Positions",a882f61b79b99f198e4d2f17882c5d33,http://arxiv.org/abs/1508.03431v2 16641," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",saeed alaei,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 16642," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",hu fu,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 16643," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",nima haghpanah,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 16644," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",jason hartline,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 16645," We study an abstract optimal auction problem for a single good or service. This problem includes environments where agents have budgets, risk preferences, or multi-dimensional preferences over several possible configurations of the good (furthermore, it allows an agent's budget and risk preference to be known only privately to the agent). These are the main challenge areas for auction theory. A single-agent problem is to optimize a given objective subject to a constraint on the maximum probability with which each type is allocated, a.k.a., an allocation rule. Our approach is a reduction from multi-agent mechanism design problem to collection of single-agent problems. We focus on maximizing revenue, but our results can be applied to other objectives (e.g., welfare). An optimal multi-agent mechanism can be computed by a linear/convex program on interim allocation rules by simultaneously optimizing several single-agent mechanisms subject to joint feasibility of the allocation rules. For single-unit auctions, Border \citeyearpar{B91} showed that the space of all jointly feasible interim allocation rules for $n$ agents is a $\NumTypes$-dimensional convex polytope which can be specified by $2^\NumTypes$ linear constraints, where $\NumTypes$ is the total number of all agents' types. Consequently, efficiently solving the mechanism design problem requires a separation oracle for the feasibility conditions and also an algorithm for ex-post implementation of the interim allocation rules. We show that the polytope of jointly feasible interim allocation rules is the projection of a higher dimensional polytope which can be specified by only $O(\NumTypes^2)$ linear constraints. Furthermore, our proof shows that finding a preimage of the interim allocation rules in the higher dimensional polytope immediately gives an ex-post implementation. ",azarakhsh malekian,,2012.0,,arXiv,Alaei2012,True,,arXiv,Not available,Bayesian Optimal Auctions via Multi- to Single-agent Reduction,0eb1ad886409a33b765f7296d8b829c5,http://arxiv.org/abs/1203.5099v1 16646," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",darrell hoy,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16647," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",kamal jain,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16648," The first-price auction is popular in practice for its simplicity and transparency. Moreover, its potential virtues grow in complex settings where incentive compatible auctions may generate little or no revenue. Unfortunately, the first-price auction is poorly understood in theory because equilibrium is not {\em a priori} a credible predictor of bidder behavior. We take a dynamic approach to studying first-price auctions: rather than basing performance guarantees solely on static equilibria, we study the repeated setting and show that robust performance guarantees may be derived from simple axioms of bidder behavior. For example, as long as a loser raises her bid quickly, a standard first-price auction will generate at least as much revenue as a second-price auction. We generalize this dynamic technique to complex pay-your-bid auction settings and show that progressively stronger assumptions about bidder behavior imply progressively stronger guarantees about the auction's performance. Along the way, we find that the auctioneer's choice of bidding language is critical when generalizing beyond the single-item setting, and we propose a specific construction called the {\em utility-target auction} that performs well. The utility-target auction includes a bidder's final utility as an additional parameter, identifying the single dimension along which she wishes to compete. This auction is closely related to profit-target bidding in first-price and ascending proxy package auctions and gives strong revenue guarantees for a variety of complex auction environments. Of particular interest, the guaranteed existence of a pure-strategy equilibrium in the utility-target auction shows how Overture might have eliminated the cyclic behavior in their generalized first-price sponsored search auction if bidders could have placed more sophisticated bids. ",christopher wilkens,,2013.0,,arXiv,Hoy2013,True,,arXiv,Not available,A Dynamic Axiomatic Approach to First-Price Auctions,e3865d4807693c96e9d0ae19f29e5cd7,http://arxiv.org/abs/1304.7718v1 16649," With the recent growth in the size of cloud computing business, handling the interactions between customers and cloud providers has become more challenging. Auction theory has been proposed to model these interactions due to its simplicity and a good match with real-world scenarios. In this paper, we consider cloud of clouds networks (CCNs) with different types of servers along with customers with heterogeneous demands. For each CCN, a CCN manager is designated to handle the cloud resources. A comprehensive framework is introduced in which the process of resource gathering and allocation is addressed via two stages, where the first stage models the interactions between customers and CCN managers, and the second stage examines the interactions between CCN managers and private cloud providers (CPs). For the first stage, an options-based sequential auction (OBSA) is adapted to the examined market, which is capable of providing truthfulness as the dominant strategy and resolving the entrance time problem. An analytical foundation for OBSAs is presented and multiple performance metrics are derived. For the second stage, two parallel markets are assumed: flat-price and auction-based market. A theoretical framework for market analysis is provided and the bidding behavior of CCN managers is described. ",seyyedali hosseinalipour,,2018.0,,arXiv,Hosseinalipour2018,True,,arXiv,Not available,A Two-Stage Auction Mechanism for Cloud Resource Allocation,e6756a574be5d43a55091881d3add347,http://arxiv.org/abs/1807.04214v2 16650," With the recent growth in the size of cloud computing business, handling the interactions between customers and cloud providers has become more challenging. Auction theory has been proposed to model these interactions due to its simplicity and a good match with real-world scenarios. In this paper, we consider cloud of clouds networks (CCNs) with different types of servers along with customers with heterogeneous demands. For each CCN, a CCN manager is designated to handle the cloud resources. A comprehensive framework is introduced in which the process of resource gathering and allocation is addressed via two stages, where the first stage models the interactions between customers and CCN managers, and the second stage examines the interactions between CCN managers and private cloud providers (CPs). For the first stage, an options-based sequential auction (OBSA) is adapted to the examined market, which is capable of providing truthfulness as the dominant strategy and resolving the entrance time problem. An analytical foundation for OBSAs is presented and multiple performance metrics are derived. For the second stage, two parallel markets are assumed: flat-price and auction-based market. A theoretical framework for market analysis is provided and the bidding behavior of CCN managers is described. ",huaiyu dai,,2018.0,,arXiv,Hosseinalipour2018,True,,arXiv,Not available,A Two-Stage Auction Mechanism for Cloud Resource Allocation,e6756a574be5d43a55091881d3add347,http://arxiv.org/abs/1807.04214v2 16651," We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this paper, we show that BWR-games with a constant number of random positions can be solved in pseudo-polynomial time. More precisely, in any BWR-game with $|V_R|=O(1)$, a saddle point in uniformly optimal pure stationary strategies can be found in time polynomial in $|V_W|+|V_B|$, the maximum absolute local reward, and the common denominator of the transition probabilities. ",khaled elbassioni,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Pseudo-Polynomial Algorithm for Mean Payoff Stochastic Games with Perfect Information and Few Random Positions",a882f61b79b99f198e4d2f17882c5d33,http://arxiv.org/abs/1508.03431v2 16652," Previous works suggested the use of Branch and Bound techniques for finding the optimal allocation in (multi-unit) combinatorial auctions. They remarked that Linear Programming could provide a good upper-bound to the optimal allocation, but they went on using lighter and less tight upper-bound heuristics, on the ground that LP was too time-consuming to be used repetitively to solve large combinatorial auctions. We present the results of extensive experiments solving large (multi-unit) combinatorial auctions generated according to distributions proposed by different researchers. Our surprising conclusion is that Linear Programming is worth using. Investing almost all of one's computing time in using LP to bound from above the value of the optimal solution in order to prune aggressively pays off. We present a way to save on the number of calls to the LP routine and experimental results comparing different heuristics for choosing the bid to be considered next. Those results show that the ordering based on the square root of the size of the bids that was shown to be theoretically optimal in a previous paper by the authors performs surprisingly better than others in practice. Choosing to deal first with the bid with largest coefficient (typically 1) in the optimal solution of the relaxed LP problem, is also a good choice. The gap between the lower bound provided by greedy heuristics and the upper bound provided by LP is typically small and pruning is therefore extensive. For most distributions, auctions of a few hundred goods among a few thousand bids can be solved in practice. All experiments were run on a PC under Matlab. ",rica gonen,,2002.0,,arXiv,Gonen2002,True,,arXiv,Not available,Linear Programming helps solving large multi-unit combinatorial auctions,f0cec6aca985105d31dfc4b77338322b,http://arxiv.org/abs/cs/0202016v1 16653," Previous works suggested the use of Branch and Bound techniques for finding the optimal allocation in (multi-unit) combinatorial auctions. They remarked that Linear Programming could provide a good upper-bound to the optimal allocation, but they went on using lighter and less tight upper-bound heuristics, on the ground that LP was too time-consuming to be used repetitively to solve large combinatorial auctions. We present the results of extensive experiments solving large (multi-unit) combinatorial auctions generated according to distributions proposed by different researchers. Our surprising conclusion is that Linear Programming is worth using. Investing almost all of one's computing time in using LP to bound from above the value of the optimal solution in order to prune aggressively pays off. We present a way to save on the number of calls to the LP routine and experimental results comparing different heuristics for choosing the bid to be considered next. Those results show that the ordering based on the square root of the size of the bids that was shown to be theoretically optimal in a previous paper by the authors performs surprisingly better than others in practice. Choosing to deal first with the bid with largest coefficient (typically 1) in the optimal solution of the relaxed LP problem, is also a good choice. The gap between the lower bound provided by greedy heuristics and the upper bound provided by LP is typically small and pruning is therefore extensive. For most distributions, auctions of a few hundred goods among a few thousand bids can be solved in practice. All experiments were run on a PC under Matlab. ",daniel lehmann,,2002.0,,arXiv,Gonen2002,True,,arXiv,Not available,Linear Programming helps solving large multi-unit combinatorial auctions,f0cec6aca985105d31dfc4b77338322b,http://arxiv.org/abs/cs/0202016v1 16654," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",sayan bhattacharya,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 16655," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",vincent conitzer,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 16656," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",kamesh munagala,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 16657," In this paper, we consider the problem of designing incentive compatible auctions for multiple (homogeneous) units of a good, when bidders have private valuations and private budget constraints. When only the valuations are private and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive clinching} auction is the unique incentive-compatible auction achieving Pareto-optimality. They further show thatthere is no deterministic Pareto-optimal auction with private budgets. Our main contribution is to show the following Budget Monotonicity property of this auction: When there is only one infinitely divisible good, a bidder cannot improve her utility by reporting a budget smaller than the truth. This implies that a randomized modification to the adaptive clinching auction is incentive compatible and Pareto-optimal with private budgets. The Budget Monotonicity property also implies other improved results in this context. For revenue maximization, the same auction improves the best-known competitive ratio due to Abrams by a factor of 4, and asymptotically approaches the performance of the optimal single-price auction. Finally, we consider the problem of revenue maximization (or social welfare) in a Bayesian setting. We allow the bidders have public size constraints (on the amount of good they are willing to buy) in addition to private budget constraints. We show a simple poly-time computable 5.83-approximation to the optimal Bayesian incentive compatible mechanism, that is implementable in dominant strategies. Our technique again crucially needs the ability to prevent bidders from over-reporting budgets via randomization. ",lirong xia,,2009.0,,arXiv,Bhattacharya2009,True,,arXiv,Not available,Incentive Compatible Budget Elicitation in Multi-unit Auctions,c2f97d5a56bdb96e344b3b7394c84ae3,http://arxiv.org/abs/0904.3501v1 16658," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",david kempe,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16659," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",mahyar salek,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16660," We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism. ",cristopher moore,,2009.0,,arXiv,Kempe2009,True,,arXiv,Not available,"Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts",c03b2cc6986525592437afb81b43c5e6,http://arxiv.org/abs/0912.3310v2 16661," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",akash sarma,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 16662," We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this paper, we show that BWR-games with a constant number of random positions can be solved in pseudo-polynomial time. More precisely, in any BWR-game with $|V_R|=O(1)$, a saddle point in uniformly optimal pure stationary strategies can be found in time polynomial in $|V_W|+|V_B|$, the maximum absolute local reward, and the common denominator of the transition probabilities. ",vladimir gurvich,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Pseudo-Polynomial Algorithm for Mean Payoff Stochastic Games with Perfect Information and Few Random Positions",a882f61b79b99f198e4d2f17882c5d33,http://arxiv.org/abs/1508.03431v2 16663," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",sujit gujar,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 16664," In pay-per click sponsored search auctions which are currently extensively used by search engines, the auction for a keyword involves a certain number of advertisers (say k) competing for available slots (say m) to display their ads. This auction is typically conducted for a number of rounds (say T). There are click probabilities mu_ij associated with each agent-slot pairs. The goal of the search engine is to maximize social welfare of the advertisers, that is, the sum of values of the advertisers. The search engine does not know the true values advertisers have for a click to their respective ads and also does not know the click probabilities mu_ij s. A key problem for the search engine therefore is to learn these click probabilities during the T rounds of the auction and also to ensure that the auction mechanism is truthful. Mechanisms for addressing such learning and incentives issues have recently been introduced and are aptly referred to as multi-armed-bandit (MAB) mechanisms. When m = 1, characterizations for truthful MAB mechanisms are available in the literature and it has been shown that the regret for such mechanisms will be O(T^{2/3}). In this paper, we seek to derive a characterization in the realistic but non-trivial general case when m > 1 and obtain several interesting results. ",y. narahari,,2010.0,,arXiv,Sarma2010,True,,arXiv,Not available,Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions,b0d933951a71f82f1c5bc09c968178e2,http://arxiv.org/abs/1001.1414v2 16665," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",tanmoy chakraborty,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 16666," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",eyal even-dar,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 16667," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",sudipto guha,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 16668," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",yishay mansour,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 16669," We design algorithms for computing approximately revenue-maximizing {\em sequential posted-pricing mechanisms (SPM)} in $K$-unit auctions, in a standard Bayesian model. A seller has $K$ copies of an item to sell, and there are $n$ buyers, each interested in only one copy, who have some value for the item. The seller must post a price for each buyer, the buyers arrive in a sequence enforced by the seller, and a buyer buys the item if its value exceeds the price posted to it. The seller does not know the values of the buyers, but have Bayesian information about them. An SPM specifies the ordering of buyers and the posted prices, and may be {\em adaptive} or {\em non-adaptive} in its behavior. The goal is to design SPM in polynomial time to maximize expected revenue. We compare against the expected revenue of optimal SPM, and provide a polynomial time approximation scheme (PTAS) for both non-adaptive and adaptive SPMs. This is achieved by two algorithms: an efficient algorithm that gives a $(1-\frac{1}{\sqrt{2\pi K}})$-approximation (and hence a PTAS for sufficiently large $K$), and another that is a PTAS for constant $K$. The first algorithm yields a non-adaptive SPM that yields its approximation guarantees against an optimal adaptive SPM -- this implies that the {\em adaptivity gap} in SPMs vanishes as $K$ becomes larger. ",s. muthukrishnan,,2010.0,,arXiv,Chakraborty2010,True,,arXiv,Not available,"Approximation Schemes for Sequential Posted Pricing in Multi-Unit Auctions",f5bce1bf0c8a1241e9d02e10eb616ab1,http://arxiv.org/abs/1008.1616v1 16670," For Bayesian combinatorial auctions, we present a general framework for approximately reducing the mechanism design problem for multiple buyers to single buyer sub-problems. Our framework can be applied to any setting which roughly satisfies the following assumptions: (i) buyers' types must be distributed independently (not necessarily identically), (ii) objective function must be linearly separable over the buyers, and (iii) except for the supply constraints, there should be no other inter-buyer constraints. Our framework is general in the sense that it makes no explicit assumption about buyers' valuations, type distributions, and single buyer constraints (e.g., budget, incentive compatibility, etc). We present two generic multi buyer mechanisms which use single buyer mechanisms as black boxes; if an $\alpha$-approximate single buyer mechanism can be constructed for each buyer, and if no buyer requires more than $\frac{1}{k}$ of all units of each item, then our generic multi buyer mechanisms are $\gamma_k\alpha$-approximation of the optimal multi buyer mechanism, where $\gamma_k$ is a constant which is at least $1-\frac{1}{\sqrt{k+3}}$. Observe that $\gamma_k$ is at least 1/2 (for $k=1$) and approaches 1 as $k \to \infty$. As a byproduct of our construction, we present a generalization of prophet inequalities. Furthermore, as applications of our framework, we present multi buyer mechanisms with improved approximation factor for several settings from the literature. ",saeed alaei,,2011.0,,arXiv,Alaei2011,True,,arXiv,Not available,"Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers",7550aef5decfb04112daa0b811f87a11,http://arxiv.org/abs/1106.0961v4 16671," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",greg linden,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16672," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",christopher meek,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16673," In this paper, we study the distribution and behaviour of internal equilibria in a $d$-player $n$-strategy random evolutionary game where the game payoff matrix is generated from normal distributions. The study of this paper reveals and exploits interesting connections between evolutionary game theory and random polynomial theory. The main novelties of the paper are some qualitative and quantitative results on the expected density, $f_{n,d}$, and the expected number, $E(n,d)$, of (stable) internal equilibria. Firstly, we show that in multi-player two-strategy games, they behave asymptotically as $\sqrt{d-1}$ as $d$ is sufficiently large. Secondly, we prove that they are monotone functions of $d$. We also make a conjecture for games with more than two strategies. Thirdly, we provide numerical simulations for our analytical results and to support the conjecture. As consequences of our analysis, some qualitative and quantitative results on the distribution of zeros of a random Bernstein polynomial are also obtained. ",the han,,2015.0,,arXiv,Duong2015,True,,arXiv,Not available,"Analysis of the expected density of internal equilibria in random evolutionary multi-player multi-strategy games",195738357aa8fe703aeba1f2b92817d9,http://arxiv.org/abs/1505.04676v3 16674," We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this paper, we show that BWR-games with a constant number of random positions can be solved in pseudo-polynomial time. More precisely, in any BWR-game with $|V_R|=O(1)$, a saddle point in uniformly optimal pure stationary strategies can be found in time polynomial in $|V_W|+|V_B|$, the maximum absolute local reward, and the common denominator of the transition probabilities. ",kazuhisa makino,,2015.0,,arXiv,Boros2015,True,,arXiv,Not available,"A Pseudo-Polynomial Algorithm for Mean Payoff Stochastic Games with Perfect Information and Few Random Positions",a882f61b79b99f198e4d2f17882c5d33,http://arxiv.org/abs/1508.03431v2 16675," Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to include an effect where repeatedly showing less relevant ads has a persistent impact on all advertising on the search engine, an impact we designate as the pollution effect. In Monte-Carlo simulations using distributions fitted to Yahoo data, we show that a modest pollution effect is sufficient to dramatically change the advertising rank order that yields the optimal advertising revenue for a search engine. In addition, if a pollution effect exists, it is possible to maximize revenue while also increasing advertiser, and publisher utility. Our results suggest that search engines could benefit from making relevant advertisements less expensive and irrelevant advertisements more costly for advertisers than is the current practice. ",max chickering,,2011.0,,arXiv,Linden2011,True,,arXiv,Not available,"The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising",6c19b4146facdccfc27a529889a4c02d,http://arxiv.org/abs/1109.6263v1 16676," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",yannai gonczarowski,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 16677," We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments. ",noam nisan,,2016.0,,arXiv,Gonczarowski2016,True,,arXiv,Not available,"Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments",c6b5b8f17e72c87f0e1c12b1c26f1f96,http://arxiv.org/abs/1610.09976v2 16681," This paper studies an auction design problem for a seller to sell a commodity in a social network, where each individual (the seller or a buyer) can only communicate with her neighbors. The challenge to the seller is to design a mechanism to incentivize the buyers, who are aware of the auction, to further propagate the information to their neighbors so that more buyers will participate in the auction and hence, the seller will be able to make a higher revenue. We propose a novel auction mechanism, called information diffusion mechanism (IDM), which incentivizes the buyers to not only truthfully report their valuations on the commodity to the seller, but also further propagate the auction information to all their neighbors. In comparison, the direct extension of the well-known Vickrey-Clarke-Groves (VCG) mechanism in social networks can also incentivize the information diffusion, but it will decrease the seller's revenue or even lead to a deficit sometimes. The formalization of the problem has not yet been addressed in the literature of mechanism design and our solution is very significant in the presence of large-scale online social networks. ",bin li,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Mechanism Design in Social Networks,acd01ad9417afe55302a65cc7981a915,http://arxiv.org/abs/1702.03627v1 16682," This paper studies an auction design problem for a seller to sell a commodity in a social network, where each individual (the seller or a buyer) can only communicate with her neighbors. The challenge to the seller is to design a mechanism to incentivize the buyers, who are aware of the auction, to further propagate the information to their neighbors so that more buyers will participate in the auction and hence, the seller will be able to make a higher revenue. We propose a novel auction mechanism, called information diffusion mechanism (IDM), which incentivizes the buyers to not only truthfully report their valuations on the commodity to the seller, but also further propagate the auction information to all their neighbors. In comparison, the direct extension of the well-known Vickrey-Clarke-Groves (VCG) mechanism in social networks can also incentivize the information diffusion, but it will decrease the seller's revenue or even lead to a deficit sometimes. The formalization of the problem has not yet been addressed in the literature of mechanism design and our solution is very significant in the presence of large-scale online social networks. ",dong hao,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Mechanism Design in Social Networks,acd01ad9417afe55302a65cc7981a915,http://arxiv.org/abs/1702.03627v1 16683," This paper studies an auction design problem for a seller to sell a commodity in a social network, where each individual (the seller or a buyer) can only communicate with her neighbors. The challenge to the seller is to design a mechanism to incentivize the buyers, who are aware of the auction, to further propagate the information to their neighbors so that more buyers will participate in the auction and hence, the seller will be able to make a higher revenue. We propose a novel auction mechanism, called information diffusion mechanism (IDM), which incentivizes the buyers to not only truthfully report their valuations on the commodity to the seller, but also further propagate the auction information to all their neighbors. In comparison, the direct extension of the well-known Vickrey-Clarke-Groves (VCG) mechanism in social networks can also incentivize the information diffusion, but it will decrease the seller's revenue or even lead to a deficit sometimes. The formalization of the problem has not yet been addressed in the literature of mechanism design and our solution is very significant in the presence of large-scale online social networks. ",dengji zhao,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Mechanism Design in Social Networks,acd01ad9417afe55302a65cc7981a915,http://arxiv.org/abs/1702.03627v1 16684," This paper studies an auction design problem for a seller to sell a commodity in a social network, where each individual (the seller or a buyer) can only communicate with her neighbors. The challenge to the seller is to design a mechanism to incentivize the buyers, who are aware of the auction, to further propagate the information to their neighbors so that more buyers will participate in the auction and hence, the seller will be able to make a higher revenue. We propose a novel auction mechanism, called information diffusion mechanism (IDM), which incentivizes the buyers to not only truthfully report their valuations on the commodity to the seller, but also further propagate the auction information to all their neighbors. In comparison, the direct extension of the well-known Vickrey-Clarke-Groves (VCG) mechanism in social networks can also incentivize the information diffusion, but it will decrease the seller's revenue or even lead to a deficit sometimes. The formalization of the problem has not yet been addressed in the literature of mechanism design and our solution is very significant in the presence of large-scale online social networks. ",tao zhou,,2017.0,,arXiv,Li2017,True,,arXiv,Not available,Mechanism Design in Social Networks,acd01ad9417afe55302a65cc7981a915,http://arxiv.org/abs/1702.03627v1 16685," We address the question of whether price of stability results (existence of equilibria with low social cost) are robust to incomplete information. We show that this is the case in potential games, if the underlying algorithmic social cost minimization problem admits a constant factor approximation algorithm via strict cost-sharing schemes. Roughly, if the existence of an $\alpha$-approximate equilibrium in the complete information setting was proven via the potential method, then there also exists a $\alpha\cdot \beta$-approximate Bayes-Nash equilibrium in the incomplete information setting, where $\beta$ is the approximation factor of the strict-cost sharing scheme algorithm. We apply our approach to Bayesian versions of the archetypal, in the price of stability analysis, network design models and show the existence of $O(\log(n))$-approximate Bayes-Nash equilibria in several games whose complete information counterparts have been well-studied, such as undirected network design games, multi-cast games and covering games. ",vasilis syrgkanis,,2015.0,,arXiv,Syrgkanis2015,True,,arXiv,Not available,Price of Stability in Games of Incomplete Information,076f8c69ad1793a554aa6886579bd5a6,http://arxiv.org/abs/1503.03739v1 16686," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",orcun karaca,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 16687," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",pier sessa,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 16688," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",neil walton,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 16689," This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the participants. Since calculating the payments directly for these mechanisms is computationally difficult for auctions involving many participants, we present two computationally efficient methods. Our results are verified with several case studies based on electricity market data. ",maryam kamgarpour,,2017.0,,arXiv,Karaca2017,True,,arXiv,Not available,Designing Coalition-Proof Reverse Auctions over Continuous Goods,1dd6f12b1b405f84991c2ffae2f33171,http://arxiv.org/abs/1711.06774v3 16690," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",daniel reeves,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16691," We describe an algorithm for computing best response strategies in a class of two-player infinite games of incomplete information, defined by payoffs piecewise linear in agents' types and actions, conditional on linear comparisons of agents' actions. We show that this class includes many well-known games including a variety of auctions and a novel allocation game. In some cases, the best-response algorithm can be iterated to compute Bayes-Nash equilibria. We demonstrate the efficiency of our approach on existing and new games. ",michael wellman,,2012.0,,arXiv,Reeves2012,True,,arXiv,Not available,"Computing Best-Response Strategies in Infinite Games of Incomplete Information",067fb14ef316953fb2525cc774bd6388,http://arxiv.org/abs/1207.4171v1 16692," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",gabriele farina,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 16693," The design of the best economic mechanism for Sponsored Search Auctions (SSAs) is a central task in computational mechanism design/game theory. Two open questions concern the adoption of user models more accurate than that one currently used and the choice between Generalized Second Price auction (GSP) and Vickrey-Clark-Groves mechanism (VCG). In this paper, we provide some contributions to answer these questions. We study Price of Anarchy (PoA) and Price of Stability (PoS) over social welfare and auctioneer's revenue of GSP w.r.t. the VCG when the users follow the famous cascade model. Furthermore, we provide exact, randomized, and approximate algorithms, showing that in real-world settings (Yahoo! Webscope A3 dataset, 10 available slots) optimal allocations can be found in less than 1s with up to 1000 ads, and can be approximated in less than 20ms even with more than 1000 ads with an average accuracy greater than 99%. ",nicola gatti,,2015.0,,arXiv,Farina2015,True,,arXiv,Not available,Ad auctions and cascade model: GSP inefficiency and algorithms,64ab42f22153cb9c458d6fd93d4cc0a7,http://arxiv.org/abs/1511.07397v1 16694," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",michal feldman,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 16695," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",reshef meir,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 16696," The achievement of common goals through voluntary efforts of members of a group can be challenged by the high temptation of individual defection. Here, two-person one-goal assurance games are generalized to N-person, M-goal achievement games in which group members can have different motivations with respect to the achievement of the different goals. The theoretical performance of groups faced with the challenge of multiple simultaneous goals is analyzed mathematically and computationally. For two-goal scenarios one finds that ""polarized"" as well as ""biased"" groups perform well in the presence of defectors. A special case, called individual purpose games (N-person, N-goal achievements games where there is a one-to-one mapping between actors and goals for which they have a high achievement motivation) is analyzed in more detail in form of the ""importance of being different theorem"". It is shown that in some individual purpose games, groups of size N can successfully accomplish N goals, such that each group member is highly motivated towards the achievement of one unique goal. The game-theoretic results suggest that multiple goals as well as differences in motivations can, in some cases, correspond to highly effective groups. ",eckart bindewald,,2015.0,,arXiv,Bindewald2015,True,,arXiv,Not available,Achieving Multiple Goals via Voluntary Efforts and Motivation Asymmetry,e841d3e55c4cee5c8327c6b49a94e0db,http://arxiv.org/abs/1503.05908v1 16697," We introduce a measure for the level of stability against coalitional deviations, called \emph{stability scores}, which generalizes widely used notions of stability in non-cooperative games. We use the proposed measure to compare various Nash equilibria in congestion games, and to quantify the effect of game parameters on coalitional stability. For our main results, we apply stability scores to analyze and compare the Generalized Second Price (GSP) and Vickrey-Clarke-Groves (VCG) ad auctions. We show that while a central result of the ad auctions literature is that the GSP and VCG auctions implement the same outcome in one of the equilibria of GSP, the GSP outcome is far more stable. Finally, a modified version of VCG is introduced, which is group strategy-proof, and thereby achieves the highest possible stability score. ",moshe tennenholtz,,2011.0,,arXiv,Feldman2011,True,,arXiv,Not available,Stability Scores: Measuring Coalitional Stability,590f42d2a826c022640221821f5e351f,http://arxiv.org/abs/1105.5983v2 16698," Inspired by Internet ad auction applications, we study the problem of allocating a single item via an auction when bidders place very different values on the item. We formulate this as the problem of prior-free auction and focus on designing a simple mechanism that always allocates the item. Rather than designing sophisticated pricing methods like prior literature, we design better allocation methods. In particular, we propose quasi-proportional allocation methods in which the probability that an item is allocated to a bidder depends (quasi-proportionally) on the bids. We prove that corresponding games for both all-pay and winners-pay quasi-proportional mechanisms admit pure Nash equilibria and this equilibrium is unique. We also give an algorithm to compute this equilibrium in polynomial time. Further, we show that the revenue of the auctioneer is promisingly high compared to the ultimate, i.e., the highest value of any of the bidders, and show bounds on the revenue of equilibria both analytically, as well as using experiments for specific quasi-proportional functions. This is the first known revenue analysis for these natural mechanisms (including the special case of proportional mechanism which is common in network resource allocation problems). ",vahab mirrokni,,2009.0,,arXiv,Mirrokni2009,True,,arXiv,Not available,Quasi-Proportional Mechanisms: Prior-free Revenue Maximization,4377d5a52b2abdc1056975e6046afe2c,http://arxiv.org/abs/0909.5365v1 16699," Inspired by Internet ad auction applications, we study the problem of allocating a single item via an auction when bidders place very different values on the item. We formulate this as the problem of prior-free auction and focus on designing a simple mechanism that always allocates the item. Rather than designing sophisticated pricing methods like prior literature, we design better allocation methods. In particular, we propose quasi-proportional allocation methods in which the probability that an item is allocated to a bidder depends (quasi-proportionally) on the bids. We prove that corresponding games for both all-pay and winners-pay quasi-proportional mechanisms admit pure Nash equilibria and this equilibrium is unique. We also give an algorithm to compute this equilibrium in polynomial time. Further, we show that the revenue of the auctioneer is promisingly high compared to the ultimate, i.e., the highest value of any of the bidders, and show bounds on the revenue of equilibria both analytically, as well as using experiments for specific quasi-proportional functions. This is the first known revenue analysis for these natural mechanisms (including the special case of proportional mechanism which is common in network resource allocation problems). ",s. muthukrishnan,,2009.0,,arXiv,Mirrokni2009,True,,arXiv,Not available,Quasi-Proportional Mechanisms: Prior-free Revenue Maximization,4377d5a52b2abdc1056975e6046afe2c,http://arxiv.org/abs/0909.5365v1 16700," Inspired by Internet ad auction applications, we study the problem of allocating a single item via an auction when bidders place very different values on the item. We formulate this as the problem of prior-free auction and focus on designing a simple mechanism that always allocates the item. Rather than designing sophisticated pricing methods like prior literature, we design better allocation methods. In particular, we propose quasi-proportional allocation methods in which the probability that an item is allocated to a bidder depends (quasi-proportionally) on the bids. We prove that corresponding games for both all-pay and winners-pay quasi-proportional mechanisms admit pure Nash equilibria and this equilibrium is unique. We also give an algorithm to compute this equilibrium in polynomial time. Further, we show that the revenue of the auctioneer is promisingly high compared to the ultimate, i.e., the highest value of any of the bidders, and show bounds on the revenue of equilibria both analytically, as well as using experiments for specific quasi-proportional functions. This is the first known revenue analysis for these natural mechanisms (including the special case of proportional mechanism which is common in network resource allocation problems). ",uri nadav,,2009.0,,arXiv,Mirrokni2009,True,,arXiv,Not available,Quasi-Proportional Mechanisms: Prior-free Revenue Maximization,4377d5a52b2abdc1056975e6046afe2c,http://arxiv.org/abs/0909.5365v1 16701," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",mireille bossy,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 16702," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",nadia maizi,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 16703," In this paper, we analyze Nash equilibria between electricity producers selling their production on an electricity market and buying CO2 emission allowances on an auction carbon market. The producers' strategies integrate the coupling of the two markets via the cost functions of the electricity production. We set out a clear Nash equilibrium on the power market that can be used to compute equilibrium prices on both markets as well as the related electricity produced and CO2 emissions released. ",odile pourtallier,,2014.0,,arXiv,Bossy2014,True,,arXiv,Not available,"Game theory analysis for carbon auction market through electricity market coupling",8d4970acb4f369b65d06c76f0eeb47d2,http://arxiv.org/abs/1408.6122v3 16704," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",tony luo,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 16705," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",salil kanhere,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 16706," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",jianwei huang,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 16707," In a pursuit-evasion game, a team of pursuers attempt to capture an evader. The players alternate turns, move with equal speed, and have full information about the state of the game. We consider the most restictive capture condition: a pursuer must become colocated with the evader to win the game. We prove two general results about pursuit-evasion games in topological spaces. First, we show that one pursuer has a winning strategy in any CAT(0) space under this restrictive capture criterion. This complements a result of Alexander, Bishop and Ghrist, who provide a winning strategy for a game with positive capture radius. Second, we consider the game played in a compact domain in Euclidean two-space with piecewise analytic boundary and arbitrary Euler characteristic. We show that three pursuers always have a winning strategy by extending recent work of Bhadauria, Klein, Isler and Suri from polygonal environments to our more general setting. ",andrew beveridge,,2015.0,,arXiv,Beveridge2015,True,,arXiv,Not available,"Two-Dimensional Pursuit-Evasion in a Compact Domain with Piecewise Analytic Boundary",3efcc3db9f88aa581cf77f4cc92cd232,http://arxiv.org/abs/1505.00297v1 16708," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",sajal das,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 16709," Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate. This article provides an exposition of design principles of six incentive mechanisms, drawing special attention to the sustainability issue. We cover three primary classes of incentive mechanisms: auctions, lotteries, and trust and reputation systems, as well as three other frameworks of promising potential: bargaining games, contract theory, and market-driven mechanisms. ",fan wu,,2017.0,,arXiv,Luo2017,True,,arXiv,Not available,"Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems",6fe660b8000686cfb8441c0530941686,http://arxiv.org/abs/1701.00248v2 16710," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",justin brunelle,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16711," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",kyle dempsey,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16712," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",g. jackson,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16713," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",chutima boonthum,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16714," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",irwin levinstein,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16715," MiBoard (Multiplayer Interactive Board Game) is an online, turn-based board game, which is a supplement of the iSTART (Interactive Strategy Training for Active Reading and Thinking) application. MiBoard is developed to test the hypothesis that integrating game characteristics (point rewards, game-like interaction, and peer feedback) into the iSTART trainer will significantly improve its effectiveness on students' learning. It was shown by M. Rowe that a physical board game did in fact enhance students' performance. MiBoard is a computer-based version of Rowe's board game that eliminates constraints on locality while retaining the crucial practice components that were the game's objective. MiBoard gives incentives for participation and provides a more enjoyable and social practice environment compared to the online individual practice component of the original trainer ",danielle mcnamara,,2010.0,,arXiv,Brunelle2010,True,,arXiv,Not available,MiBoard: iSTART Metacognitive Training through Gaming,16561da228a951a4517293c90958e798,http://arxiv.org/abs/1009.2205v1 16716," Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game. ",kyle dempsey,,2010.0,,"FLAIRS-23, May 22-23 2010",Dempsey2010,True,,arXiv,Not available,MiBoard: A Digital Game from a Physical World,47e9f9f2c54aba479e8a7360ece007a3,http://arxiv.org/abs/1009.2207v1 16717," Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game. ",g. jackson,,2010.0,,"FLAIRS-23, May 22-23 2010",Dempsey2010,True,,arXiv,Not available,MiBoard: A Digital Game from a Physical World,47e9f9f2c54aba479e8a7360ece007a3,http://arxiv.org/abs/1009.2207v1 16718," In a pursuit-evasion game, a team of pursuers attempt to capture an evader. The players alternate turns, move with equal speed, and have full information about the state of the game. We consider the most restictive capture condition: a pursuer must become colocated with the evader to win the game. We prove two general results about pursuit-evasion games in topological spaces. First, we show that one pursuer has a winning strategy in any CAT(0) space under this restrictive capture criterion. This complements a result of Alexander, Bishop and Ghrist, who provide a winning strategy for a game with positive capture radius. Second, we consider the game played in a compact domain in Euclidean two-space with piecewise analytic boundary and arbitrary Euler characteristic. We show that three pursuers always have a winning strategy by extending recent work of Bhadauria, Klein, Isler and Suri from polygonal environments to our more general setting. ",yiqing cai,,2015.0,,arXiv,Beveridge2015,True,,arXiv,Not available,"Two-Dimensional Pursuit-Evasion in a Compact Domain with Piecewise Analytic Boundary",3efcc3db9f88aa581cf77f4cc92cd232,http://arxiv.org/abs/1505.00297v1 16719," Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game. ",justin brunelle,,2010.0,,"FLAIRS-23, May 22-23 2010",Dempsey2010,True,,arXiv,Not available,MiBoard: A Digital Game from a Physical World,47e9f9f2c54aba479e8a7360ece007a3,http://arxiv.org/abs/1009.2207v1 16720," Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game. ",michael rowe,,2010.0,,"FLAIRS-23, May 22-23 2010",Dempsey2010,True,,arXiv,Not available,MiBoard: A Digital Game from a Physical World,47e9f9f2c54aba479e8a7360ece007a3,http://arxiv.org/abs/1009.2207v1 16721," Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game. ",danielle mcnamara,,2010.0,,"FLAIRS-23, May 22-23 2010",Dempsey2010,True,,arXiv,Not available,MiBoard: A Digital Game from a Physical World,47e9f9f2c54aba479e8a7360ece007a3,http://arxiv.org/abs/1009.2207v1 16722," This short note demonstrates how one can define a transformation of a non-zero sum game into a zero sum, so that the optimal mixed strategy achieving equilibrium always exists. The transformation is equivalent to introduction of a passive player into a game (a player with a singleton set of pure strategies), whose payoff depends on the actions of the active players, and it is justified by the law of conservation of utility in a game. In a transformed game, each participant plays against all other players, including the passive player. The advantage of this approach is that the transformed game is zero-sum and has an equilibrium solution. The optimal strategy and the value of the new game, however, can be different from strategies that are rational in the original game. We demonstrate the principle using the Prisoner's Dilemma example. ",roman belavkin,,2010.0,,arXiv,Belavkin2010,True,,arXiv,Not available,Conservation Law of Utility and Equilibria in Non-Zero Sum Games,40499c637af8b1a9903fdfc327062d73,http://arxiv.org/abs/1010.2439v2 16723," We consider perfect-information reachability stochastic games for 2 players on infinite graphs. We identify a subclass of such games, and prove two interesting properties of it: first, Player Max always has optimal strategies in games from this subclass, and second, these games are strongly determined. The subclass is defined by the property that the set of all values can only have one accumulation point -- 0. Our results nicely mirror recent results for finitely-branching games, where, on the contrary, Player Min always has optimal strategies. However, our proof methods are substantially different, because the roles of the players are not symmetric. We also do not restrict the branching of the games. Finally, we apply our results in the context of recently studied One-Counter stochastic games. ",vaclav brozek,,2011.0,10.4204/EPTCS.54.5,"EPTCS 54, 2011, pp. 60-73",Brožek2011,True,,arXiv,Not available,Optimal Strategies in Infinite-state Stochastic Reachability Games,98c7395f9804a89fefd473ac6e206747,http://arxiv.org/abs/1103.1065v3 16724," Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {\sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes O(1)-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+\epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/\epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium; the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $\rho$-approximate equilibria is {\sf PLS}-complete for any polynomial-time computable $\rho$. ",ioannis caragiannis,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Efficient computation of approximate pure Nash equilibria in congestion games",ee25b4201dfc95a6c8a6daf9d7915cb8,http://arxiv.org/abs/1104.2690v2 16725," Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {\sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes O(1)-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+\epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/\epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium; the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $\rho$-approximate equilibria is {\sf PLS}-complete for any polynomial-time computable $\rho$. ",angelo fanelli,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Efficient computation of approximate pure Nash equilibria in congestion games",ee25b4201dfc95a6c8a6daf9d7915cb8,http://arxiv.org/abs/1104.2690v2 16726," Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {\sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes O(1)-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+\epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/\epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium; the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $\rho$-approximate equilibria is {\sf PLS}-complete for any polynomial-time computable $\rho$. ",nick gravin,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Efficient computation of approximate pure Nash equilibria in congestion games",ee25b4201dfc95a6c8a6daf9d7915cb8,http://arxiv.org/abs/1104.2690v2 16727," Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {\sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes O(1)-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+\epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/\epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium; the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $\rho$-approximate equilibria is {\sf PLS}-complete for any polynomial-time computable $\rho$. ",alexander skopalik,,2011.0,,arXiv,Caragiannis2011,True,,arXiv,Not available,"Efficient computation of approximate pure Nash equilibria in congestion games",ee25b4201dfc95a6c8a6daf9d7915cb8,http://arxiv.org/abs/1104.2690v2 16728," The class of weakly acyclic games, which includes potential games and dominance-solvable games, captures many practical application domains. In a weakly acyclic game, from any starting state, there is a sequence of better-response moves that leads to a pure Nash equilibrium; informally, these are games in which natural distributed dynamics, such as better-response dynamics, cannot enter inescapable oscillations. We establish a novel link between such games and the existence of pure Nash equilibria in subgames. Specifically, we show that the existence of a unique pure Nash equilibrium in every subgame implies the weak acyclicity of a game. In contrast, the possible existence of multiple pure Nash equilibria in every subgame is insufficient for weak acyclicity in general; here, we also systematically identify the special cases (in terms of the number of players and strategies) for which this is sufficient to guarantee weak acyclicity. ",alex fabrikant,,2011.0,,arXiv,Fabrikant2011,True,,arXiv,Not available,On the Structure of Weakly Acyclic Games,037e21f1117b699b86f6e24ae451f172,http://arxiv.org/abs/1108.2092v1 16729," Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees. ",carme alvarez,,2015.0,,arXiv,Àlvarez2015,True,,arXiv,Not available,Stars and Celebrities: A Network Creation Game,e26aa61ae9943c4649b57de2ea95cdcf,http://arxiv.org/abs/1505.03718v3 16730," The class of weakly acyclic games, which includes potential games and dominance-solvable games, captures many practical application domains. In a weakly acyclic game, from any starting state, there is a sequence of better-response moves that leads to a pure Nash equilibrium; informally, these are games in which natural distributed dynamics, such as better-response dynamics, cannot enter inescapable oscillations. We establish a novel link between such games and the existence of pure Nash equilibria in subgames. Specifically, we show that the existence of a unique pure Nash equilibrium in every subgame implies the weak acyclicity of a game. In contrast, the possible existence of multiple pure Nash equilibria in every subgame is insufficient for weak acyclicity in general; here, we also systematically identify the special cases (in terms of the number of players and strategies) for which this is sufficient to guarantee weak acyclicity. ",aaron jaggard,,2011.0,,arXiv,Fabrikant2011,True,,arXiv,Not available,On the Structure of Weakly Acyclic Games,037e21f1117b699b86f6e24ae451f172,http://arxiv.org/abs/1108.2092v1 16731," The class of weakly acyclic games, which includes potential games and dominance-solvable games, captures many practical application domains. In a weakly acyclic game, from any starting state, there is a sequence of better-response moves that leads to a pure Nash equilibrium; informally, these are games in which natural distributed dynamics, such as better-response dynamics, cannot enter inescapable oscillations. We establish a novel link between such games and the existence of pure Nash equilibria in subgames. Specifically, we show that the existence of a unique pure Nash equilibrium in every subgame implies the weak acyclicity of a game. In contrast, the possible existence of multiple pure Nash equilibria in every subgame is insufficient for weak acyclicity in general; here, we also systematically identify the special cases (in terms of the number of players and strategies) for which this is sufficient to guarantee weak acyclicity. ",michael schapira,,2011.0,,arXiv,Fabrikant2011,True,,arXiv,Not available,On the Structure of Weakly Acyclic Games,037e21f1117b699b86f6e24ae451f172,http://arxiv.org/abs/1108.2092v1 16732," We consider an extension of strategic normal form games with a phase of negotiations before the actual play of the game, where players can make binding offers for transfer of utilities to other players after the play of the game, in order to provide additional incentives for each other to play designated strategies. Such offers are conditional on the recipients playing the specified strategies and they effect transformations of the payoff matrix of the game by accordingly transferring payoffs between players. We introduce and analyze solution concepts for 2-player normal form games with such preplay offers under various assumptions for the preplay negotiation phase and obtain results for existence of efficient negotiation strategies of the players. Then we extend the framework to coalitional preplay offers in N-player games, as well as to extensive form games with inter-play offers for side payments. ",valentin goranko,,2012.0,,arXiv,Goranko2012,True,,arXiv,Not available,Non-cooperative games with preplay negotiations,74eaf391f08680429a40ac53097cc105,http://arxiv.org/abs/1208.1718v4 16733," We consider an extension of strategic normal form games with a phase of negotiations before the actual play of the game, where players can make binding offers for transfer of utilities to other players after the play of the game, in order to provide additional incentives for each other to play designated strategies. Such offers are conditional on the recipients playing the specified strategies and they effect transformations of the payoff matrix of the game by accordingly transferring payoffs between players. We introduce and analyze solution concepts for 2-player normal form games with such preplay offers under various assumptions for the preplay negotiation phase and obtain results for existence of efficient negotiation strategies of the players. Then we extend the framework to coalitional preplay offers in N-player games, as well as to extensive form games with inter-play offers for side payments. ",paolo turrini,,2012.0,,arXiv,Goranko2012,True,,arXiv,Not available,Non-cooperative games with preplay negotiations,74eaf391f08680429a40ac53097cc105,http://arxiv.org/abs/1208.1718v4 16734," We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model due to Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomizedstrategy. We adapt IDS games to model the attacker's deliberate behavior. We define the attacker's pure-strategy space and utility function and derive appropriate cost functions for the defenders. We provide a complete characterization of mixed-strategy Nash equilibria (MSNE), and design a simple polynomial-time algorithm for computing all of them, for an important subclass of IDD games. In addition, we propose a randominstance generator of (general) IDD games based on a version of the real-world Internet-derived Autonomous Systems (AS) graph (with around 27K nodes and 100K edges), and present promising empirical results using a simple learning heuristics to compute (approximate) MSNE in such games. ",hau chan,,2012.0,,arXiv,Chan2012,True,,arXiv,Not available,"Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks",0f6eba0d26c8332e0d78821b02dbcde6,http://arxiv.org/abs/1210.4838v1 16735," We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model due to Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomizedstrategy. We adapt IDS games to model the attacker's deliberate behavior. We define the attacker's pure-strategy space and utility function and derive appropriate cost functions for the defenders. We provide a complete characterization of mixed-strategy Nash equilibria (MSNE), and design a simple polynomial-time algorithm for computing all of them, for an important subclass of IDD games. In addition, we propose a randominstance generator of (general) IDD games based on a version of the real-world Internet-derived Autonomous Systems (AS) graph (with around 27K nodes and 100K edges), and present promising empirical results using a simple learning heuristics to compute (approximate) MSNE in such games. ",michael ceyko,,2012.0,,arXiv,Chan2012,True,,arXiv,Not available,"Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks",0f6eba0d26c8332e0d78821b02dbcde6,http://arxiv.org/abs/1210.4838v1 16736," We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model due to Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomizedstrategy. We adapt IDS games to model the attacker's deliberate behavior. We define the attacker's pure-strategy space and utility function and derive appropriate cost functions for the defenders. We provide a complete characterization of mixed-strategy Nash equilibria (MSNE), and design a simple polynomial-time algorithm for computing all of them, for an important subclass of IDD games. In addition, we propose a randominstance generator of (general) IDD games based on a version of the real-world Internet-derived Autonomous Systems (AS) graph (with around 27K nodes and 100K edges), and present promising empirical results using a simple learning heuristics to compute (approximate) MSNE in such games. ",luis ortiz,,2012.0,,arXiv,Chan2012,True,,arXiv,Not available,"Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks",0f6eba0d26c8332e0d78821b02dbcde6,http://arxiv.org/abs/1210.4838v1 16737," We consider an extension of strategic normal form games with a phase before the actual play of the game, where players can make binding offers for transfer of utilities to other players after the play of the game, contingent on the recipient playing the strategy indicated in the offer. Such offers transform the payoff matrix of the original game but preserve its non-cooperative nature. The type of offers we focus on here are conditional on a suggested 'matching offer' of the same kind made in return by the receiver. Players can exchange a series of such offers, thus engaging in a bargaining process before a strategic normal form game is played. In this paper we study and analyze solution concepts for two-player normal form games with such preplay negotiation phase, under several assumptions for the bargaining power of the players, such as the possibility of withdrawing previously made offers and opting out from the negotiation process, as well as the value of time for the players in such negotiations. We obtain results describing the possible solutions of such bargaining games and analyze the degrees of efficiency and fairness that can be achieved in such negotiation process. ",valentin goranko,,2013.0,,arXiv,Goranko2013,True,,arXiv,Not available,Two-player preplay negotiation games with conditional offers,18fed306496485dc468a4090c204ad93,http://arxiv.org/abs/1304.2161v2 16738," We consider an extension of strategic normal form games with a phase before the actual play of the game, where players can make binding offers for transfer of utilities to other players after the play of the game, contingent on the recipient playing the strategy indicated in the offer. Such offers transform the payoff matrix of the original game but preserve its non-cooperative nature. The type of offers we focus on here are conditional on a suggested 'matching offer' of the same kind made in return by the receiver. Players can exchange a series of such offers, thus engaging in a bargaining process before a strategic normal form game is played. In this paper we study and analyze solution concepts for two-player normal form games with such preplay negotiation phase, under several assumptions for the bargaining power of the players, such as the possibility of withdrawing previously made offers and opting out from the negotiation process, as well as the value of time for the players in such negotiations. We obtain results describing the possible solutions of such bargaining games and analyze the degrees of efficiency and fairness that can be achieved in such negotiation process. ",paolo turrini,,2013.0,,arXiv,Goranko2013,True,,arXiv,Not available,Two-player preplay negotiation games with conditional offers,18fed306496485dc468a4090c204ad93,http://arxiv.org/abs/1304.2161v2 16739," We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $\epsilon$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS algorithm eventually converges to an approximate Nash equilibrium (NE) of the extensive-form game. We empirically evaluate this claim using regret matching and Exp3 as the selection methods on randomly generated games and empirically selected worst case games. We confirm the formal result and show that additional MCTS variants also converge to approximate NE on the evaluated games. ",viliam lisy,,2013.0,,"Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013",Lisý2013,True,,arXiv,Not available,Convergence of Monte Carlo Tree Search in Simultaneous Move Games,1d8d700fa10087efa7dd2292aafe93cb,http://arxiv.org/abs/1310.8613v2 16740," Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees. ",maria blesa,,2015.0,,arXiv,Àlvarez2015,True,,arXiv,Not available,Stars and Celebrities: A Network Creation Game,e26aa61ae9943c4649b57de2ea95cdcf,http://arxiv.org/abs/1505.03718v3 16741," We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $\epsilon$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS algorithm eventually converges to an approximate Nash equilibrium (NE) of the extensive-form game. We empirically evaluate this claim using regret matching and Exp3 as the selection methods on randomly generated games and empirically selected worst case games. We confirm the formal result and show that additional MCTS variants also converge to approximate NE on the evaluated games. ",vojtech kovarik,,2013.0,,"Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013",Lisý2013,True,,arXiv,Not available,Convergence of Monte Carlo Tree Search in Simultaneous Move Games,1d8d700fa10087efa7dd2292aafe93cb,http://arxiv.org/abs/1310.8613v2 16742," We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $\epsilon$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS algorithm eventually converges to an approximate Nash equilibrium (NE) of the extensive-form game. We empirically evaluate this claim using regret matching and Exp3 as the selection methods on randomly generated games and empirically selected worst case games. We confirm the formal result and show that additional MCTS variants also converge to approximate NE on the evaluated games. ",marc lanctot,,2013.0,,"Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013",Lisý2013,True,,arXiv,Not available,Convergence of Monte Carlo Tree Search in Simultaneous Move Games,1d8d700fa10087efa7dd2292aafe93cb,http://arxiv.org/abs/1310.8613v2 16743," We study Monte Carlo tree search (MCTS) in zero-sum extensive-form games with perfect information and simultaneous moves. We present a general template of MCTS algorithms for these games, which can be instantiated by various selection methods. We formally prove that if a selection method is $\epsilon$-Hannan consistent in a matrix game and satisfies additional requirements on exploration, then the MCTS algorithm eventually converges to an approximate Nash equilibrium (NE) of the extensive-form game. We empirically evaluate this claim using regret matching and Exp3 as the selection methods on randomly generated games and empirically selected worst case games. We confirm the formal result and show that additional MCTS variants also converge to approximate NE on the evaluated games. ",branislav bosansky,,2013.0,,"Advances in Neural Information Processing Systems 26, pp 2112-2120, 2013",Lisý2013,True,,arXiv,Not available,Convergence of Monte Carlo Tree Search in Simultaneous Move Games,1d8d700fa10087efa7dd2292aafe93cb,http://arxiv.org/abs/1310.8613v2 16744," Recently, Dohrau et al. studied a zero-player game on switch graphs and proved that deciding the termination of the game is in NP $\cap$ coNP. In this short paper, we show that the search version of this game on switch graphs, i.e., the task of finding a witness of termination (or of non-termination) is in PLS. ",karthik s.,,2016.0,,arXiv,S.2016,True,,arXiv,Not available,Did the Train Reach its Destination: The Complexity of Finding a Witness,13c67e82fbf0ffbcc38ea3a4b1b13f6d,http://arxiv.org/abs/1609.03840v2 16745," We study an independent best-response dynamics on network games in which the nodes (players) decide to revise their strategies independently with some probability. We are interested in the convergence time to the equilibrium as a function of this probability, the degree of the network, and the potential of the underlying games. ",paolo penna,,2016.0,,arXiv,Penna2016,True,,arXiv,Not available,Independent lazy better-response dynamics on network games,e884e0994fd3d1f3cf33145c94d73aef,http://arxiv.org/abs/1609.08953v1 16746," We study an independent best-response dynamics on network games in which the nodes (players) decide to revise their strategies independently with some probability. We are interested in the convergence time to the equilibrium as a function of this probability, the degree of the network, and the potential of the underlying games. ",laurent viennot,,2016.0,,arXiv,Penna2016,True,,arXiv,Not available,Independent lazy better-response dynamics on network games,e884e0994fd3d1f3cf33145c94d73aef,http://arxiv.org/abs/1609.08953v1 16747," We study some mathematical aspects of the Mahjong game. In particular, we use combinatorial theory and write a Python program to study some special features of the game. The results confirm some folklore concerning the game, and expose some unexpected results. Related results and possible future research in connection to artificial intelligence are mentioned. ",yuan cheng,,2017.0,,arXiv,Cheng2017,True,,arXiv,Not available,"Mathematical aspect of the combinatorial game ""Mahjong""",0b5ccb0e0371c19b0a8f8aefff6d2869,http://arxiv.org/abs/1707.07345v1 16748," We study some mathematical aspects of the Mahjong game. In particular, we use combinatorial theory and write a Python program to study some special features of the game. The results confirm some folklore concerning the game, and expose some unexpected results. Related results and possible future research in connection to artificial intelligence are mentioned. ",chi-kwong li,,2017.0,,arXiv,Cheng2017,True,,arXiv,Not available,"Mathematical aspect of the combinatorial game ""Mahjong""",0b5ccb0e0371c19b0a8f8aefff6d2869,http://arxiv.org/abs/1707.07345v1 16749," We study some mathematical aspects of the Mahjong game. In particular, we use combinatorial theory and write a Python program to study some special features of the game. The results confirm some folklore concerning the game, and expose some unexpected results. Related results and possible future research in connection to artificial intelligence are mentioned. ",sharon li,,2017.0,,arXiv,Cheng2017,True,,arXiv,Not available,"Mathematical aspect of the combinatorial game ""Mahjong""",0b5ccb0e0371c19b0a8f8aefff6d2869,http://arxiv.org/abs/1707.07345v1 16750," We derive zero-determinant strategies for general multi-player multi-action repeated incomplete-information games. By formulating zero-determinant strategy in terms of linear algebra, we prove that linear payoff relations assigned by players always have solutions. An example for zero-determinant strategy in a repeated incomplete-information game is also provided. ",masahiko ueda,,2018.0,,arXiv,Ueda2018,True,,arXiv,Not available,"Zero-determinant strategies in repeated incomplete-information games: Consistency of payoff relations",33f04963cb027e393ee12661d7f0093a,http://arxiv.org/abs/1807.00472v1 16751," Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees. ",amalia duch,,2015.0,,arXiv,Àlvarez2015,True,,arXiv,Not available,Stars and Celebrities: A Network Creation Game,e26aa61ae9943c4649b57de2ea95cdcf,http://arxiv.org/abs/1505.03718v3 16752," We derive zero-determinant strategies for general multi-player multi-action repeated incomplete-information games. By formulating zero-determinant strategy in terms of linear algebra, we prove that linear payoff relations assigned by players always have solutions. An example for zero-determinant strategy in a repeated incomplete-information game is also provided. ",toshiyuki tanaka,,2018.0,,arXiv,Ueda2018,True,,arXiv,Not available,"Zero-determinant strategies in repeated incomplete-information games: Consistency of payoff relations",33f04963cb027e393ee12661d7f0093a,http://arxiv.org/abs/1807.00472v1 16753," The problem of the existence of Berge equilibria in the sense of Zhukovskii in normal form finite games in pure and in mixed strategies is studied. The example of a three-player game that has Berge equilibrium neither in pure nor in mixed strategies is given. ",jaroslaw pykacz,,2018.0,,arXiv,Pykacz2018,True,,arXiv,Not available,Example of a finite game with no Berge equilibria at all,2bcd3cc8e17652599d65d29f2dfcfe40,http://arxiv.org/abs/1807.05821v1 16754," The problem of the existence of Berge equilibria in the sense of Zhukovskii in normal form finite games in pure and in mixed strategies is studied. The example of a three-player game that has Berge equilibrium neither in pure nor in mixed strategies is given. ",pawel bytner,,2018.0,,arXiv,Pykacz2018,True,,arXiv,Not available,Example of a finite game with no Berge equilibria at all,2bcd3cc8e17652599d65d29f2dfcfe40,http://arxiv.org/abs/1807.05821v1 16755," The problem of the existence of Berge equilibria in the sense of Zhukovskii in normal form finite games in pure and in mixed strategies is studied. The example of a three-player game that has Berge equilibrium neither in pure nor in mixed strategies is given. ",piotr frackiewicz,,2018.0,,arXiv,Pykacz2018,True,,arXiv,Not available,Example of a finite game with no Berge equilibria at all,2bcd3cc8e17652599d65d29f2dfcfe40,http://arxiv.org/abs/1807.05821v1 16756," We establish, for the first time, a connection between stochastic games and multi-parameter eigenvalue problems, using the theory developed by Shapley and Snow (1950) in the context of matrix games. This connection provides new results, new proofs, and new tools for studying stochastic games. ",luc attia,,2018.0,,arXiv,Attia2018,True,,arXiv,Not available,Shapley-Snow kernels in zero-sum stochastic games,03f70d5b89e55b7aeca0797190b6989b,http://arxiv.org/abs/1810.08798v1 16757," We establish, for the first time, a connection between stochastic games and multi-parameter eigenvalue problems, using the theory developed by Shapley and Snow (1950) in the context of matrix games. This connection provides new results, new proofs, and new tools for studying stochastic games. ",miquel oliu-barton,,2018.0,,arXiv,Attia2018,True,,arXiv,Not available,Shapley-Snow kernels in zero-sum stochastic games,03f70d5b89e55b7aeca0797190b6989b,http://arxiv.org/abs/1810.08798v1 16758," In evolutionary game theory, repeated two-player games are used to study strategy evolution in a population under natural selection. As the evolution greatly depends on the interaction structure, there has been growing interests in studying the games on graphs. In this setting, players occupy the vertices of a graph and play the game only with their immediate neighbours. Various evolutionary dynamics have been studied in this setting for different games. Due to the complexity of the analysis, however, most of the work in this area is experimental. This paper aims to contribute to a more complete understanding, by providing rigorous analysis. We study the imitation dynamics on two classes of graph: cycles and complete graphs. We focus on three well known social dilemmas, namely the Prisoner's Dilemma, the Stag Hunt and the Snowdrift Game. We also consider, for completeness, the so-called Harmony Game. Our analysis shows that, on the cycle, all four games converge fast, either to total cooperation or total defection. On the complete graph, all but the Snowdrift game converge fast, either to cooperation or defection. The Snowdrift game reaches a metastable state fast, where cooperators and defectors coexist. It will converge to cooperation or defection only after spending time in this state which is exponential in the size, n, of the graph. In exceptional cases, it will remain in this state indefinitely. Our theoretical results are supported by experimental investigations. ",colin cooper,,2011.0,,arXiv,Cooper2011,True,,arXiv,Not available,On the Imitation Strategy for Games on Graphs,d2fad0d686c969110a23bf37b97d97f3,http://arxiv.org/abs/1102.3879v1 16759," In evolutionary game theory, repeated two-player games are used to study strategy evolution in a population under natural selection. As the evolution greatly depends on the interaction structure, there has been growing interests in studying the games on graphs. In this setting, players occupy the vertices of a graph and play the game only with their immediate neighbours. Various evolutionary dynamics have been studied in this setting for different games. Due to the complexity of the analysis, however, most of the work in this area is experimental. This paper aims to contribute to a more complete understanding, by providing rigorous analysis. We study the imitation dynamics on two classes of graph: cycles and complete graphs. We focus on three well known social dilemmas, namely the Prisoner's Dilemma, the Stag Hunt and the Snowdrift Game. We also consider, for completeness, the so-called Harmony Game. Our analysis shows that, on the cycle, all four games converge fast, either to total cooperation or total defection. On the complete graph, all but the Snowdrift game converge fast, either to cooperation or defection. The Snowdrift game reaches a metastable state fast, where cooperators and defectors coexist. It will converge to cooperation or defection only after spending time in this state which is exponential in the size, n, of the graph. In exceptional cases, it will remain in this state indefinitely. Our theoretical results are supported by experimental investigations. ",martin dyer,,2011.0,,arXiv,Cooper2011,True,,arXiv,Not available,On the Imitation Strategy for Games on Graphs,d2fad0d686c969110a23bf37b97d97f3,http://arxiv.org/abs/1102.3879v1 16760," In evolutionary game theory, repeated two-player games are used to study strategy evolution in a population under natural selection. As the evolution greatly depends on the interaction structure, there has been growing interests in studying the games on graphs. In this setting, players occupy the vertices of a graph and play the game only with their immediate neighbours. Various evolutionary dynamics have been studied in this setting for different games. Due to the complexity of the analysis, however, most of the work in this area is experimental. This paper aims to contribute to a more complete understanding, by providing rigorous analysis. We study the imitation dynamics on two classes of graph: cycles and complete graphs. We focus on three well known social dilemmas, namely the Prisoner's Dilemma, the Stag Hunt and the Snowdrift Game. We also consider, for completeness, the so-called Harmony Game. Our analysis shows that, on the cycle, all four games converge fast, either to total cooperation or total defection. On the complete graph, all but the Snowdrift game converge fast, either to cooperation or defection. The Snowdrift game reaches a metastable state fast, where cooperators and defectors coexist. It will converge to cooperation or defection only after spending time in this state which is exponential in the size, n, of the graph. In exceptional cases, it will remain in this state indefinitely. Our theoretical results are supported by experimental investigations. ",velumailum mohanaraj,,2011.0,,arXiv,Cooper2011,True,,arXiv,Not available,On the Imitation Strategy for Games on Graphs,d2fad0d686c969110a23bf37b97d97f3,http://arxiv.org/abs/1102.3879v1 16761," We investigate a routing game that allows for the creation of coalitions, within the framework of cooperative game theory. Specifically, we describe the cost of each coalition as its maximin value. This represents the performance that the coalition can guarantee itself, under any (including worst) conditions. We then investigate fundamental solution concepts of the considered cooperative game, namely the core and a variant of the min-max fair nucleolus. We consider two types of routing games based on the agents' Performance Objectives, namely bottleneck routing games and additive routing games. For bottleneck games we establish that the core includes all system-optimal flow profiles and that the nucleolus is system-optimal or disadvantageous for the smallest agent in the system. Moreover, we describe an interesting set of scenarios for which the nucleolus is always system-optimal. For additive games, we focus on the fundamental load balancing game of routing over parallel links. We establish that, in contrary to bottleneck games, not all system-optimal flow profiles lie in the core. However, we describe a specific system-optimal flow profile that does lie in the core and, under assumptions of symmetry, is equal to the nucleolus. ",gideon blocq,,2013.0,,arXiv,Blocq2013,True,,arXiv,Not available,Coalitions in Routing Games: A Worst-Case Perspective,ba511757fcec77d71419f5a829f0259e,http://arxiv.org/abs/1310.3487v4 16762," Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees. ",arnau messegue,,2015.0,,arXiv,Àlvarez2015,True,,arXiv,Not available,Stars and Celebrities: A Network Creation Game,e26aa61ae9943c4649b57de2ea95cdcf,http://arxiv.org/abs/1505.03718v3 16763," We investigate a routing game that allows for the creation of coalitions, within the framework of cooperative game theory. Specifically, we describe the cost of each coalition as its maximin value. This represents the performance that the coalition can guarantee itself, under any (including worst) conditions. We then investigate fundamental solution concepts of the considered cooperative game, namely the core and a variant of the min-max fair nucleolus. We consider two types of routing games based on the agents' Performance Objectives, namely bottleneck routing games and additive routing games. For bottleneck games we establish that the core includes all system-optimal flow profiles and that the nucleolus is system-optimal or disadvantageous for the smallest agent in the system. Moreover, we describe an interesting set of scenarios for which the nucleolus is always system-optimal. For additive games, we focus on the fundamental load balancing game of routing over parallel links. We establish that, in contrary to bottleneck games, not all system-optimal flow profiles lie in the core. However, we describe a specific system-optimal flow profile that does lie in the core and, under assumptions of symmetry, is equal to the nucleolus. ",ariel orda,,2013.0,,arXiv,Blocq2013,True,,arXiv,Not available,Coalitions in Routing Games: A Worst-Case Perspective,ba511757fcec77d71419f5a829f0259e,http://arxiv.org/abs/1310.3487v4 16764," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",parosh abdulla,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16765," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",mohamed atig,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16766," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",piotr hofman,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16767," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",richard mayr,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16768," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",k. kumar,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16769," Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induced by pushdown automata (modelling recursion) or their subclass of one-counter automata. Our main result is that energy games are decidable in the case where the game graph is induced by a one-counter automaton and the energy is one-dimensional. On the other hand, every further generalization is undecidable: Energy games on one-counter automata with a 2-dimensional energy are undecidable, and energy games on pushdown automata are undecidable even if the energy is one-dimensional. Furthermore, we show that energy games and simulation games are inter-reducible, and thus we additionally obtain several new (un)decidability results for the problem of checking simulation preorder between pushdown automata and vector addition systems. ",patrick totzke,,2014.0,,"Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)",Abdulla2014,True,,arXiv,Not available,Infinite-State Energy Games,d8a0b7f60f4c2ce85ccf3e0b1dc2480c,http://arxiv.org/abs/1405.0628v1 16770," Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attractive framework. In this paper, we present Protection and Deception (P&G), a novel two-player board game. P&G has three main contributions. First, it builds cyber literacy by giving participants ""hands-on"" experience with game pieces that have the capabilities of cyber-attacks such as worms, masquerading attacks/spoofs, replay attacks, and Trojans. Second, P&G teaches the important game-theoretic concepts of asymmetric information and resource allocation implicitly and non-obtrusively through its game play. Finally, it strives for the important objective of security education for underrepresented minorities and people without explicit technical experience. We tested P&G at a community center in Manhattan with middle- and high school students, and observed enjoyment and increased cyber literacy along with suggestions for improvement of the game. Together with these results, our paper also presents images of the attractive board design and 3D printed game pieces, together with a Monte-Carlo analysis that we used to ensure a balanced gaming experience. ",saboor zahir,,2015.0,,arXiv,Zahir2015,True,,arXiv,Not available,"Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience",17309a8c6f23a2357eccd8291570904e,http://arxiv.org/abs/1505.05570v1 16771," Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attractive framework. In this paper, we present Protection and Deception (P&G), a novel two-player board game. P&G has three main contributions. First, it builds cyber literacy by giving participants ""hands-on"" experience with game pieces that have the capabilities of cyber-attacks such as worms, masquerading attacks/spoofs, replay attacks, and Trojans. Second, P&G teaches the important game-theoretic concepts of asymmetric information and resource allocation implicitly and non-obtrusively through its game play. Finally, it strives for the important objective of security education for underrepresented minorities and people without explicit technical experience. We tested P&G at a community center in Manhattan with middle- and high school students, and observed enjoyment and increased cyber literacy along with suggestions for improvement of the game. Together with these results, our paper also presents images of the attractive board design and 3D printed game pieces, together with a Monte-Carlo analysis that we used to ensure a balanced gaming experience. ",john pak,,2015.0,,arXiv,Zahir2015,True,,arXiv,Not available,"Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience",17309a8c6f23a2357eccd8291570904e,http://arxiv.org/abs/1505.05570v1 16772," Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attractive framework. In this paper, we present Protection and Deception (P&G), a novel two-player board game. P&G has three main contributions. First, it builds cyber literacy by giving participants ""hands-on"" experience with game pieces that have the capabilities of cyber-attacks such as worms, masquerading attacks/spoofs, replay attacks, and Trojans. Second, P&G teaches the important game-theoretic concepts of asymmetric information and resource allocation implicitly and non-obtrusively through its game play. Finally, it strives for the important objective of security education for underrepresented minorities and people without explicit technical experience. We tested P&G at a community center in Manhattan with middle- and high school students, and observed enjoyment and increased cyber literacy along with suggestions for improvement of the game. Together with these results, our paper also presents images of the attractive board design and 3D printed game pieces, together with a Monte-Carlo analysis that we used to ensure a balanced gaming experience. ",jatinder singh,,2015.0,,arXiv,Zahir2015,True,,arXiv,Not available,"Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience",17309a8c6f23a2357eccd8291570904e,http://arxiv.org/abs/1505.05570v1 16773," Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees. ",maria serna,,2015.0,,arXiv,Àlvarez2015,True,,arXiv,Not available,Stars and Celebrities: A Network Creation Game,e26aa61ae9943c4649b57de2ea95cdcf,http://arxiv.org/abs/1505.03718v3 16774," Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attractive framework. In this paper, we present Protection and Deception (P&G), a novel two-player board game. P&G has three main contributions. First, it builds cyber literacy by giving participants ""hands-on"" experience with game pieces that have the capabilities of cyber-attacks such as worms, masquerading attacks/spoofs, replay attacks, and Trojans. Second, P&G teaches the important game-theoretic concepts of asymmetric information and resource allocation implicitly and non-obtrusively through its game play. Finally, it strives for the important objective of security education for underrepresented minorities and people without explicit technical experience. We tested P&G at a community center in Manhattan with middle- and high school students, and observed enjoyment and increased cyber literacy along with suggestions for improvement of the game. Together with these results, our paper also presents images of the attractive board design and 3D printed game pieces, together with a Monte-Carlo analysis that we used to ensure a balanced gaming experience. ",jeffrey pawlick,,2015.0,,arXiv,Zahir2015,True,,arXiv,Not available,"Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience",17309a8c6f23a2357eccd8291570904e,http://arxiv.org/abs/1505.05570v1 16775," Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attractive framework. In this paper, we present Protection and Deception (P&G), a novel two-player board game. P&G has three main contributions. First, it builds cyber literacy by giving participants ""hands-on"" experience with game pieces that have the capabilities of cyber-attacks such as worms, masquerading attacks/spoofs, replay attacks, and Trojans. Second, P&G teaches the important game-theoretic concepts of asymmetric information and resource allocation implicitly and non-obtrusively through its game play. Finally, it strives for the important objective of security education for underrepresented minorities and people without explicit technical experience. We tested P&G at a community center in Manhattan with middle- and high school students, and observed enjoyment and increased cyber literacy along with suggestions for improvement of the game. Together with these results, our paper also presents images of the attractive board design and 3D printed game pieces, together with a Monte-Carlo analysis that we used to ensure a balanced gaming experience. ",quanyan zhu,,2015.0,,arXiv,Zahir2015,True,,arXiv,Not available,"Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience",17309a8c6f23a2357eccd8291570904e,http://arxiv.org/abs/1505.05570v1 16776," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",gangqiang zhou,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16777," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",jigang wu,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16778," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",long chen,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16779," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",guiyuan jiang,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16780," Cloudlet deployment and resource allocation for mobile users (MUs) have been extensively studied in existing works for computation resource scarcity. However, most of them failed to jointly consider the two techniques together, and the selfishness of cloudlet and access point (AP) are ignored. Inspired by the group-buying mechanism, this paper proposes three-stage auction schemes by combining cloudlet placement and resource assignment, to improve the social welfare subject to the economic properties. We first divide all MUs into some small groups according to the associated APs. Then the MUs in same group can trade with cloudlets in a group-buying way through the APs. Finally, the MUs pay for the cloudlets if they are the winners in the auction scheme. We prove that our auction schemes can work in polynomial time. We also provide the proofs for economic properties in theory. For the purpose of performance comparison, we compare the proposed schemes with HAF, which is a centralized cloudlet placement scheme without auction. Numerical results confirm the correctness and efficiency of the proposed schemes. ",siew-kei lam,,2018.0,,arXiv,Zhou2018,True,,arXiv,Not available,"Efficient Three-stage Auction Schemes for Cloudlets Deployment in Wireless Access Network",3be0f0a6b751b671460b7e0665bc29ef,http://arxiv.org/abs/1804.01512v1 16781," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",alfonso lobos,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16782," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",paul grigas,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16783," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",zheng wen,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16784," We present a new form of a Parrondo game using discrete-time quantum walk on a line. The two players A and B with different quantum coins operators, individually losing the game can develop a strategy to emerge as joint winners by using their coins alternatively, or in combination for each step of the quantum walk evolution. We also present a strategy for a player A (B) to have a winning probability more than player B (A). Significance of the game strategy in information theory and physical applications are also discussed. ",c. chandrashekar,,2010.0,10.1016/j.physleta.2011.02.071,"Physics Letters A 375 (2011), pp. 1553-1558",Chandrashekar2010,True,,arXiv,Not available,Parrondo's game using a discrete-time quantum walk,ee29402383b7e8d780d57f3d0e386dae,http://arxiv.org/abs/1008.5121v2 16785," Subgame perfect equilibria are specific Nash equilibria in perfect information games in extensive form. They are important because they relate to the rationality of the players. They always exist in infinite games with continuous real-valued payoffs, but may fail to exist even in simple games with slightly discontinuous payoffs. This article considers only games whose outcome functions are measurable in the Hausdorff difference hierarchy of the open sets (\textit{i.e.} $\Delta^0_2$ when in the Baire space), and it characterizes the families of linear preferences such that every game using these preferences has a subgame perfect equilibrium: the preferences without infinite ascending chains (of course), and such that for all players $a$ and $b$ and outcomes $x,y,z$ we have $\neg(z <_a y <_a x \,\wedge\, x <_b z <_b y)$. Moreover at each node of the game, the equilibrium constructed for the proof is Pareto-optimal among all the outcomes occurring in the subgame. Additional results for non-linear preferences are presented. ",stephane roux,,2015.0,,arXiv,Roux2015,True,,arXiv,Not available,"Infinite subgame perfect equilibrium in the Hausdorff difference hierarchy",136741611066cee7b1c5532417026c9d,http://arxiv.org/abs/1505.06320v2 16786," We develop a novel optimization model to maximize the profit of a Demand-Side Platform (DSP) while ensuring that the budget utilization preferences of the DSP's advertiser clients are adequately met. Our model is highly flexible and can be applied in a Real-Time Bidding environment (RTB) with arbitrary auction types, e.g., both first and second price auctions. Our proposed formulation leads to a non-convex optimization problem due to the joint optimization over both impression allocation and bid price decisions. Using Fenchel duality theory, we construct a dual problem that is convex and can be solved efficiently to obtain feasible bidding prices and allocation variables that can be deployed in a RTB setting. With a few minimal additional assumptions on the properties of the auctions, we demonstrate theoretically that our computationally efficient procedure based on convex optimization principles is guaranteed to deliver a globally optimal solution. We conduct experiments using data from a real DSP to validate our theoretical findings and to demonstrate that our method successfully trades off between DSP profitability and budget utilization in a simulated online environment. ",kuang-chih lee,,2018.0,,arXiv,Lobos2018,True,,arXiv,Not available,"Optimal Bidding, Allocation and Budget Spending for a Demand Side Platform Under Many Auction Types",337486461d7ca1a9c4f51c638cb6f80f,http://arxiv.org/abs/1805.11645v1 16787," We investigate \emph{bi-valued} auctions in the digital good setting and construct an explicit polynomial time deterministic auction. We prove an unconditional tight lower bound which holds even for random superpolynomial auctions. The analysis of the construction uses the adoption of the finer lens of \emph{general competitiveness} which considers additive losses on top of multiplicative ones. The result implies that general competitiveness is the right notion to use in this setting, as this optimal auction is uncompetitive with respect to competitive measures which do not consider additive losses. ",oren ben-zwi,,2011.0,,arXiv,Ben-Zwi2011,True,,arXiv,Not available,Optimal Bi-Valued Auctions,db71c80df15fd91bc32930ed2524c0bd,http://arxiv.org/abs/1106.4677v1 16788," We investigate \emph{bi-valued} auctions in the digital good setting and construct an explicit polynomial time deterministic auction. We prove an unconditional tight lower bound which holds even for random superpolynomial auctions. The analysis of the construction uses the adoption of the finer lens of \emph{general competitiveness} which considers additive losses on top of multiplicative ones. The result implies that general competitiveness is the right notion to use in this setting, as this optimal auction is uncompetitive with respect to competitive measures which do not consider additive losses. ",ilan newman,,2011.0,,arXiv,Ben-Zwi2011,True,,arXiv,Not available,Optimal Bi-Valued Auctions,db71c80df15fd91bc32930ed2524c0bd,http://arxiv.org/abs/1106.4677v1 16789," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",sharad borle,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 16790," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",peter boatwright,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 16791," Online auctions are fast gaining popularity in today's electronic commerce. Relative to offline auctions, there is a greater degree of multiple bidding and late bidding in online auctions, an empirical finding by some recent research. These two behaviors (multiple bidding and late bidding) are of ``strategic'' importance to online auctions and hence important to investigate. In this article we empirically measure the distribution of bid timings and the extent of multiple bidding in a large set of online auctions, using bidder experience as a mediating variable. We use data from the popular auction site \url{www.eBay.com} to investigate more than 10,000 auctions from 15 consumer product categories. We estimate the distribution of late bidding and multiple bidding, which allows us to place these product categories along a continuum of these metrics (the extent of late bidding and the extent of multiple bidding). Interestingly, the results of the analysis distinguish most of the product categories from one another with respect to these metrics, implying that product categories, after controlling for bidder experience, differ in the extent of multiple bidding and late bidding observed in them. We also find a nonmonotonic impact of bidder experience on the timing of bid placements. Experienced bidders are ``more'' active either toward the close of auction or toward the start of auction. The impact of experience on the extent of multiple bidding, though, is monotonic across the auction interval; more experienced bidders tend to indulge ``less'' in multiple bidding. ",joseph kadane,,2006.0,10.1214/088342306000000123,"Statistical Science 2006, Vol. 21, No. 2, 194-205",Borle2006,True,,arXiv,Not available,"The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions",65ad48b34aa3c7b9fd170c7dbe7389a6,http://arxiv.org/abs/math/0609194v1 16792," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",johannes muller,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16793," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",sebastian pokutta,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16794," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",alexander martin,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16795," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",susanne pape,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16796," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",azhar iqbal,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 16797," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",andrea peter,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16798," In this article we consider combinatorial markets with valuations only for singletons and pairs of buy/sell-orders for swapping two items in equal quantity. We provide an algorithm that permits polynomial time market-clearing and -pricing. The results are presented in the context of our main application: the futures opening auction problem. Futures contracts are an important tool to mitigate market risk and counterparty credit risk. In futures markets these contracts can be traded with varying expiration dates and underlyings. A common hedging strategy is to roll positions forward into the next expiration date, however this strategy comes with significant operational risk. To address this risk, exchanges started to offer so-called futures contract combinations, which allow the traders for swapping two futures contracts with different expiration dates or for swapping two futures contracts with different underlyings. In theory, the price is in both cases the difference of the two involved futures contracts. However, in particular in the opening auctions price inefficiencies often occur due to suboptimal clearing, leading to potential arbitrage opportunities. We present a minimum cost flow formulation of the futures opening auction problem that guarantees consistent prices. The core ideas are to model orders as arcs in a network, to enforce the equilibrium conditions with the help of two hierarchical objectives, and to combine these objectives into a single weighted objective while preserving the price information of dual optimal solutions. The resulting optimization problem can be solved in polynomial time and computational tests establish an empirical performance suitable for production environments. ",thomas winter,,2014.0,10.1007/s00186-016-0555-z,"Mathematical Methods of Operations Research, April 2017, Volume 85, Issue 2, pp 155-177",Müller2014,True,,arXiv,Not available,"Pricing and clearing combinatorial markets with singleton and swap orders: Efficient algorithms for the futures opening auction problem",1d79bd6e44e20ec399ef5d1ac3d5c5c2,http://arxiv.org/abs/1404.6546v3 16799," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",tobias galla,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16800," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",michele leone,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16801," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",matteo marsili,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16802," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",mauro sellitto,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16803," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",martin weigt,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16804," Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols. ",riccardo zecchina,,2006.0,10.1103/PhysRevLett.97.128701,"Phys. Rev. Lett. 97, 128701 (2006)",Galla2006,True,,arXiv,Not available,Statistical mechanics of combinatorial auctions,4f7bd033fa047b2ea97dd2a6f3792a55,http://arxiv.org/abs/cond-mat/0605623v2 16805," We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies. ",alireza namazi,,2006.0,10.1142/S012918310600993X,arXiv,Namazi2006,True,,arXiv,Not available,Statistical properties of online auctions,d1b08ad7d1d5fee6440bdadb247d3b02,http://arxiv.org/abs/physics/0608232v1 16806," We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies. ",andreas schadschneider,,2006.0,10.1142/S012918310600993X,arXiv,Namazi2006,True,,arXiv,Not available,Statistical properties of online auctions,d1b08ad7d1d5fee6440bdadb247d3b02,http://arxiv.org/abs/physics/0608232v1 16807," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",james chappell,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 16808," Creating a loyal customer base is one of the most important, and at the same time, most difficult tasks a company faces. Creating loyalty online (e-loyalty) is especially difficult since customers can ``switch'' to a competitor with the click of a mouse. In this paper we investigate e-loyalty in online auctions. Using a unique data set of over 30,000 auctions from one of the main consumer-to-consumer online auction houses, we propose a novel measure of e-loyalty via the associated network of transactions between bidders and sellers. Using a bipartite network of bidder and seller nodes, two nodes are linked when a bidder purchases from a seller and the number of repeat-purchases determines the strength of that link. We employ ideas from functional principal component analysis to derive, from this network, the loyalty distribution which measures the perceived loyalty of every individual seller, and associated loyalty scores which summarize this distribution in a parsimonious way. We then investigate the effect of loyalty on the outcome of an auction. In doing so, we are confronted with several statistical challenges in that standard statistical models lead to a misrepresentation of the data and a violation of the model assumptions. The reason is that loyalty networks result in an extreme clustering of the data, with few high-volume sellers accounting for most of the individual transactions. We investigate several remedies to the clustering problem and conclude that loyalty networks consist of very distinct segments that can best be understood individually. ",wolfgang jank,,2010.0,10.1214/09-AOAS310,"Annals of Applied Statistics 2010, Vol. 4, No. 1, 151-178",Jank2010,True,,arXiv,Not available,E-loyalty networks in online auctions,625f0874b1fb6469b07d3439afb23a04,http://arxiv.org/abs/1010.1636v1 16809," Creating a loyal customer base is one of the most important, and at the same time, most difficult tasks a company faces. Creating loyalty online (e-loyalty) is especially difficult since customers can ``switch'' to a competitor with the click of a mouse. In this paper we investigate e-loyalty in online auctions. Using a unique data set of over 30,000 auctions from one of the main consumer-to-consumer online auction houses, we propose a novel measure of e-loyalty via the associated network of transactions between bidders and sellers. Using a bipartite network of bidder and seller nodes, two nodes are linked when a bidder purchases from a seller and the number of repeat-purchases determines the strength of that link. We employ ideas from functional principal component analysis to derive, from this network, the loyalty distribution which measures the perceived loyalty of every individual seller, and associated loyalty scores which summarize this distribution in a parsimonious way. We then investigate the effect of loyalty on the outcome of an auction. In doing so, we are confronted with several statistical challenges in that standard statistical models lead to a misrepresentation of the data and a violation of the model assumptions. The reason is that loyalty networks result in an extreme clustering of the data, with few high-volume sellers accounting for most of the individual transactions. We investigate several remedies to the clustering problem and conclude that loyalty networks consist of very distinct segments that can best be understood individually. ",inbal yahav,,2010.0,10.1214/09-AOAS310,"Annals of Applied Statistics 2010, Vol. 4, No. 1, 151-178",Jank2010,True,,arXiv,Not available,E-loyalty networks in online auctions,625f0874b1fb6469b07d3439afb23a04,http://arxiv.org/abs/1010.1636v1 16814," Internet search results are a growing and highly profitable advertising platform. Search providers auction advertising slots to advertisers on their search result pages. Due to the high volume of searches and the users' low tolerance for search result latency, it is imperative to resolve these auctions fast. Current approaches restrict the expressiveness of bids in order to achieve fast winner determination, which is the problem of allocating slots to advertisers so as to maximize the expected revenue given the advertisers' bids. The goal of our work is to permit more expressive bidding, thus allowing advertisers to achieve complex advertising goals, while still providing fast and scalable techniques for winner determination. ",david martin,,2008.0,10.1109/ICDE.2008.4497432,"David J. Martin, Johannes Gehrke, and Joseph Y. Halpern. Toward Expressive and Scalable Sponsored Search Auctions. In Proceedings of the 24th IEEE International Conference on Data Engineering, pages 237--246. April 2008",Martin2008,True,,arXiv,Not available,Toward Expressive and Scalable Sponsored Search Auctions,53d3266e5b4d56b9a811f5ec95f8067f,http://arxiv.org/abs/0809.0116v1 16815," Internet search results are a growing and highly profitable advertising platform. Search providers auction advertising slots to advertisers on their search result pages. Due to the high volume of searches and the users' low tolerance for search result latency, it is imperative to resolve these auctions fast. Current approaches restrict the expressiveness of bids in order to achieve fast winner determination, which is the problem of allocating slots to advertisers so as to maximize the expected revenue given the advertisers' bids. The goal of our work is to permit more expressive bidding, thus allowing advertisers to achieve complex advertising goals, while still providing fast and scalable techniques for winner determination. ",johannes gehrke,,2008.0,10.1109/ICDE.2008.4497432,"David J. Martin, Johannes Gehrke, and Joseph Y. Halpern. Toward Expressive and Scalable Sponsored Search Auctions. In Proceedings of the 24th IEEE International Conference on Data Engineering, pages 237--246. April 2008",Martin2008,True,,arXiv,Not available,Toward Expressive and Scalable Sponsored Search Auctions,53d3266e5b4d56b9a811f5ec95f8067f,http://arxiv.org/abs/0809.0116v1 16816," Internet search results are a growing and highly profitable advertising platform. Search providers auction advertising slots to advertisers on their search result pages. Due to the high volume of searches and the users' low tolerance for search result latency, it is imperative to resolve these auctions fast. Current approaches restrict the expressiveness of bids in order to achieve fast winner determination, which is the problem of allocating slots to advertisers so as to maximize the expected revenue given the advertisers' bids. The goal of our work is to permit more expressive bidding, thus allowing advertisers to achieve complex advertising goals, while still providing fast and scalable techniques for winner determination. ",joseph halpern,,2008.0,10.1109/ICDE.2008.4497432,"David J. Martin, Johannes Gehrke, and Joseph Y. Halpern. Toward Expressive and Scalable Sponsored Search Auctions. In Proceedings of the 24th IEEE International Conference on Data Engineering, pages 237--246. April 2008",Martin2008,True,,arXiv,Not available,Toward Expressive and Scalable Sponsored Search Auctions,53d3266e5b4d56b9a811f5ec95f8067f,http://arxiv.org/abs/0809.0116v1 16817," In this note, we show that any distributive lattice is isomorphic to the set of reachable configurations of an Edge Firing Game. Together with the result of James Propp, saying that the set of reachable configurations of any Edge Firing Game is always a distributive lattice, this shows that the two concepts are equivalent. ",matthieu latapy,,2001.0,,arXiv,Latapy2001,True,,arXiv,Not available,Coding Distributive Lattices with Edge Firing Games,f5fc378124853fb68ef9f3952d70298e,http://arxiv.org/abs/math/0110214v1 16818," The interaction of competing agents is described by classical game theory. It is now well known that this can be extended to the quantum domain, where agents obey the rules of quantum mechanics. This is of emerging interest for exploring quantum foundations, quantum protocols, quantum auctions, quantum cryptography, and the dynamics of quantum cryptocurrency, for example. In this paper, we investigate two-player games in which a strategy pair can exist as a Nash equilibrium when the games obey the rules of quantum mechanics. Using a generalized Einstein-Podolsky-Rosen (EPR) setting for two-player quantum games, and considering a particular strategy pair, we identify sets of games for which the pair can exist as a Nash equilibrium only when Bell's inequality is violated. We thus determine specific games for which the Nash inequality becomes equivalent to Bell's inequality for the considered strategy pair. ",derek abbott,,2015.0,,"Physics Letters A, Vol. 382, Issue 40, pp 2908-2913 (2018)",Iqbal2015,True,,arXiv,Not available,"The equivalence of Bell's inequality and the Nash inequality in a quantum game-theoretic setting",27c0cd284e04078d495498e1b9b21cbc,http://arxiv.org/abs/1507.07341v6 16819," In this note, we show that any distributive lattice is isomorphic to the set of reachable configurations of an Edge Firing Game. Together with the result of James Propp, saying that the set of reachable configurations of any Edge Firing Game is always a distributive lattice, this shows that the two concepts are equivalent. ",clemence magnien,,2001.0,,arXiv,Latapy2001,True,,arXiv,Not available,Coding Distributive Lattices with Edge Firing Games,f5fc378124853fb68ef9f3952d70298e,http://arxiv.org/abs/math/0110214v1 16820," This essay gives a self-contained introduction to quantum game theory, and is primarily oriented to economists with little or no acquaintance with quantum mechanics. It assumes little more than a basic knowledge of vector algebra. Quantum mechanical notation and results are introduced as needed. It is also shown that some fundamental problems of quantum mechanics can be formulated as games. ",j. grabbe,,2005.0,,arXiv,Grabbe2005,True,,arXiv,Not available,An Introduction to Quantum Game Theory,6ac060522072be5e529a77a0f681132f,http://arxiv.org/abs/quant-ph/0506219v1 16821," Entanglement is a digraph complexity measure that origins in fixed-point theory. Its purpose is to count the nested depth of cycles in digraphs. In this paper we prove that the class of undirected graphs of entanglement at most $k$, for arbitrary fixed $k \in \mathbb{N}$, is closed under taking minors. Our proof relies on the game theoretic characterization of entanglement in terms of Robber and Cops games. ",walid belkhir,,2009.0,,arXiv,Belkhir2009,True,,arXiv,Not available,Closure Under Minors of Undirected Entanglement,49721a6d645bbda26c55b66aa7c8f0ff,http://arxiv.org/abs/0904.1703v1 16822," We review and develop a selection of models of systems with competition and cooperation, with origins in economics, where deep insights can be obtained by the mathematical methods of game theory. Some of these models were touched upon in authors' book 'Understanding Game Theory', World Scientific 2010, where also the necessary background on games can be found. ",vassili kolokoltsov,,2012.0,,arXiv,Kolokoltsov2012,True,,arXiv,Not available,On some models of many agent systems with competition and cooperation,36e2d994a2a77e1fc1cde6e3503b2838,http://arxiv.org/abs/1201.1745v1 16823," We review and develop a selection of models of systems with competition and cooperation, with origins in economics, where deep insights can be obtained by the mathematical methods of game theory. Some of these models were touched upon in authors' book 'Understanding Game Theory', World Scientific 2010, where also the necessary background on games can be found. ",oleg malafeyev,,2012.0,,arXiv,Kolokoltsov2012,True,,arXiv,Not available,On some models of many agent systems with competition and cooperation,36e2d994a2a77e1fc1cde6e3503b2838,http://arxiv.org/abs/1201.1745v1 16824," This report presents the results of applying different compression algorithms to the network protocol of an online game. The algorithm implementations compared are zlib, liblzma and my own implementation based on LZ77 and a variation of adaptive Huffman coding. The comparison data was collected from the game TomeNET. The results show that adaptive coding is especially useful for compressing large amounts of very small packets. ",mikael hirki,,2012.0,,arXiv,Hirki2012,True,,arXiv,Not available,Applying Compression to a Game's Network Protocol,2087dee55351a178d658b8940be896ca,http://arxiv.org/abs/1206.2362v1 16825," We investigate the degree of discontinuity of several solution concepts from non-cooperative game theory. While the consideration of Nash equilibria forms the core of our work, also pure and correlated equilibria are dealt with. Formally, we restrict the treatment to two player games, but results and proofs extend to the n-player case. As a side result, the degree of discontinuity of solving systems of linear inequalities is settled. ",arno pauly,,2009.0,,arXiv,Pauly2009,True,,arXiv,Not available,How discontinuous is Computing Nash Equilibria?,05a723f98e662977051f1ffcb6e60198,http://arxiv.org/abs/0907.1482v1 16826," We show that the long time average of solutions of first order mean field game systems in finite horizon is governed by an ergodic system of mean field game type. The well-posedness of this later system and the uniqueness of the ergodic constant rely on weak KAM theory. ",pierre cardaliaguet,,2013.0,,arXiv,Cardaliaguet2013,True,,arXiv,Not available,Long time average of first order mean field games and weak KAM theory,a9c8f9119f8c66fa1bb9597b6aa84fbe,http://arxiv.org/abs/1305.7012v1 16827," Recently Cristian S. Calude, Sanjay Jain, Bakhadyr Khoussainov, Wei Li and Frank Stephan proposed a quasi-polynomial time algorithm for parity games. This paper proposes a short proof of correctness of their algorithm. ",hugo gimbert,,2017.0,,arXiv,Gimbert2017,True,,arXiv,Not available,"A short proof of correctness of the quasi-polynomial time algorithm for parity games",bbd4abc8c9ce4dfbcc387d0c17545970,http://arxiv.org/abs/1702.01953v4 16828," Recently Cristian S. Calude, Sanjay Jain, Bakhadyr Khoussainov, Wei Li and Frank Stephan proposed a quasi-polynomial time algorithm for parity games. This paper proposes a short proof of correctness of their algorithm. ",rasmus ibsen-jensen,,2017.0,,arXiv,Gimbert2017,True,,arXiv,Not available,"A short proof of correctness of the quasi-polynomial time algorithm for parity games",bbd4abc8c9ce4dfbcc387d0c17545970,http://arxiv.org/abs/1702.01953v4 16829," In evolutionary game theory, an important measure of a mutant trait (strategy) is its ability to invade and take over an otherwise-monomorphic population. Typically, one quantifies the success of a mutant strategy via the probability that a randomly occurring mutant will fixate in the population. However, in a structured population, this fixation probability may depend on where the mutant arises. Moreover, the fixation probability is just one quantity by which one can measure the success of a mutant; fixation time, for instance, is another. We define a notion of homogeneity for evolutionary games that captures what it means for two single-mutant states, i.e. two configurations of a single mutant in an otherwise-monomorphic population, to be ""evolutionarily equivalent"" in the sense that all measures of evolutionary success are the same for both configurations. Using asymmetric games, we argue that the term ""homogeneous"" should apply to the evolutionary process as a whole rather than to just the population structure. For evolutionary matrix games in graph-structured populations, we give precise conditions under which the resulting process is homogeneous. Finally, we show that asymmetric matrix games can be reduced to symmetric games if the population structure possesses a sufficient degree of symmetry. ",alex mcavoy,,2015.0,10.1098/rsif.2015.0420,"Journal of the Royal Society Interface vol. 12 no. 111, 20150420 (2015)",McAvoy2015,True,,arXiv,Not available,Structural symmetry in evolutionary games,0d99dac44034ab9a6924e209afbdade9,http://arxiv.org/abs/1509.03777v1 16830," Combinatorial games lead to several interesting, clean problems in algorithms and complexity theory, many of which remain open. The purpose of this paper is to provide an overview of the area to encourage further research. In particular, we begin with general background in Combinatorial Game Theory, which analyzes ideal play in perfect-information games, and Constraint Logic, which provides a framework for showing hardness. Then we survey results about the complexity of determining ideal play in these games, and the related problems of solving puzzles, in terms of both polynomial-time algorithms and computational intractability results. Our review of background and survey of algorithmic results are by no means complete, but should serve as a useful primer. ",erik demaine,,2001.0,,arXiv,Demaine2001,True,,arXiv,Not available,Playing Games with Algorithms: Algorithmic Combinatorial Game Theory,54f78424c0a04e0e865a18ee82fe8b85,http://arxiv.org/abs/cs/0106019v2 16831," Combinatorial games lead to several interesting, clean problems in algorithms and complexity theory, many of which remain open. The purpose of this paper is to provide an overview of the area to encourage further research. In particular, we begin with general background in Combinatorial Game Theory, which analyzes ideal play in perfect-information games, and Constraint Logic, which provides a framework for showing hardness. Then we survey results about the complexity of determining ideal play in these games, and the related problems of solving puzzles, in terms of both polynomial-time algorithms and computational intractability results. Our review of background and survey of algorithmic results are by no means complete, but should serve as a useful primer. ",robert hearn,,2001.0,,arXiv,Demaine2001,True,,arXiv,Not available,Playing Games with Algorithms: Algorithmic Combinatorial Game Theory,54f78424c0a04e0e865a18ee82fe8b85,http://arxiv.org/abs/cs/0106019v2 16832," In recent years methods have been proposed to extend classical game theory into the quantum domain. This paper explores further extensions of these ideas that may have a substantial potential for further research. Upon reformulating quantum game theory as a theory of classical games played by ""quantum players"" I take a constructive approach. The roles of the players and the arbiter are investigated for clues on the nature of the quantum game space. Upon examination of the role of the arbiter, a possible non-commutative nature of pay-off operators can be deduced. I investigate a sub-class of games in which the pay-off operators satisfy non-trivial commutation relations. Non-abelian pay-off operators can be used to generate whole families of quantum games. ",f. witte,,2002.0,,arXiv,Witte2002,True,,arXiv,Not available,On Pay-off induced Quantum Games,4cf70b723b1968c30eca8ab0b454835a,http://arxiv.org/abs/quant-ph/0208171v1 16833," In evolutionary game theory, an important measure of a mutant trait (strategy) is its ability to invade and take over an otherwise-monomorphic population. Typically, one quantifies the success of a mutant strategy via the probability that a randomly occurring mutant will fixate in the population. However, in a structured population, this fixation probability may depend on where the mutant arises. Moreover, the fixation probability is just one quantity by which one can measure the success of a mutant; fixation time, for instance, is another. We define a notion of homogeneity for evolutionary games that captures what it means for two single-mutant states, i.e. two configurations of a single mutant in an otherwise-monomorphic population, to be ""evolutionarily equivalent"" in the sense that all measures of evolutionary success are the same for both configurations. Using asymmetric games, we argue that the term ""homogeneous"" should apply to the evolutionary process as a whole rather than to just the population structure. For evolutionary matrix games in graph-structured populations, we give precise conditions under which the resulting process is homogeneous. Finally, we show that asymmetric matrix games can be reduced to symmetric games if the population structure possesses a sufficient degree of symmetry. ",christoph hauert,,2015.0,10.1098/rsif.2015.0420,"Journal of the Royal Society Interface vol. 12 no. 111, 20150420 (2015)",McAvoy2015,True,,arXiv,Not available,Structural symmetry in evolutionary games,0d99dac44034ab9a6924e209afbdade9,http://arxiv.org/abs/1509.03777v1 16834," Crowdscience games may hold unique potentials as learning opportunities compared to games made for fun or education. They are part of an actual science problem solving process: By playing, players help scientists, and thereby interact with real continuous research processes. This mixes the two worlds of play and science in new ways. During usability testing we discovered that users of the crowdscience game Quantum Dreams tended to answer questions in game terms, even when directed explicitly to give science explanations.We then examined these competing frames of understanding through a mixed correlational and grounded theory analysis. This essay presents the core ideas of crowdscience games as learning opportunities, and reports how a group of players used ""game"", ""science"" and ""conceptual"" frames to interpret their experience. Our results suggest that oscillating between the frames instead of sticking to just one led to the largest number of correct science interpretations, as players could participate legitimately and autonomously at multiple levels of understanding. ",andreas lieberoth,,2015.0,,"Well Played 4(2), 30 (2015)",Lieberoth2015,True,,arXiv,Not available,Play or science?: a study of learning and framing in crowdscience games,12098faed55fc0d22650c38e29627272,http://arxiv.org/abs/1510.06841v1 16835," Crowdscience games may hold unique potentials as learning opportunities compared to games made for fun or education. They are part of an actual science problem solving process: By playing, players help scientists, and thereby interact with real continuous research processes. This mixes the two worlds of play and science in new ways. During usability testing we discovered that users of the crowdscience game Quantum Dreams tended to answer questions in game terms, even when directed explicitly to give science explanations.We then examined these competing frames of understanding through a mixed correlational and grounded theory analysis. This essay presents the core ideas of crowdscience games as learning opportunities, and reports how a group of players used ""game"", ""science"" and ""conceptual"" frames to interpret their experience. Our results suggest that oscillating between the frames instead of sticking to just one led to the largest number of correct science interpretations, as players could participate legitimately and autonomously at multiple levels of understanding. ",mads pedersen,,2015.0,,"Well Played 4(2), 30 (2015)",Lieberoth2015,True,,arXiv,Not available,Play or science?: a study of learning and framing in crowdscience games,12098faed55fc0d22650c38e29627272,http://arxiv.org/abs/1510.06841v1 16836," Crowdscience games may hold unique potentials as learning opportunities compared to games made for fun or education. They are part of an actual science problem solving process: By playing, players help scientists, and thereby interact with real continuous research processes. This mixes the two worlds of play and science in new ways. During usability testing we discovered that users of the crowdscience game Quantum Dreams tended to answer questions in game terms, even when directed explicitly to give science explanations.We then examined these competing frames of understanding through a mixed correlational and grounded theory analysis. This essay presents the core ideas of crowdscience games as learning opportunities, and reports how a group of players used ""game"", ""science"" and ""conceptual"" frames to interpret their experience. Our results suggest that oscillating between the frames instead of sticking to just one led to the largest number of correct science interpretations, as players could participate legitimately and autonomously at multiple levels of understanding. ",jacob sherson,,2015.0,,"Well Played 4(2), 30 (2015)",Lieberoth2015,True,,arXiv,Not available,Play or science?: a study of learning and framing in crowdscience games,12098faed55fc0d22650c38e29627272,http://arxiv.org/abs/1510.06841v1 16837," Electric boolean games are compact representations of games where the players have qualitative objectives described by LTL formulae and have limited resources. We study the complexity of several decision problems related to the analysis of rationality in electric boolean games with LTL objectives. In particular, we report that the problem of deciding whether a profile is a Nash equilibrium in an iterated electric boolean game is no harder than in iterated boolean games without resource bounds. We show that it is a PSPACE-complete problem. As a corollary, we obtain that both rational elimination and rational construction of Nash equilibria by a supervising authority are PSPACE-complete problems. ",youssouf oualhadj,,2016.0,10.4204/EPTCS.218.4,"EPTCS 218, 2016, pp. 41-51",Oualhadj2016,True,,arXiv,Not available,Rational Verification in Iterated Electric Boolean Games,591b9da0055eb5826266122024bd8d87,http://arxiv.org/abs/1604.03773v2 16838," We present a new form of a Parrondo game using discrete-time quantum walk on a line. The two players A and B with different quantum coins operators, individually losing the game can develop a strategy to emerge as joint winners by using their coins alternatively, or in combination for each step of the quantum walk evolution. We also present a strategy for a player A (B) to have a winning probability more than player B (A). Significance of the game strategy in information theory and physical applications are also discussed. ",subhashish banerjee,,2010.0,10.1016/j.physleta.2011.02.071,"Physics Letters A 375 (2011), pp. 1553-1558",Chandrashekar2010,True,,arXiv,Not available,Parrondo's game using a discrete-time quantum walk,ee29402383b7e8d780d57f3d0e386dae,http://arxiv.org/abs/1008.5121v2 16839," Electric boolean games are compact representations of games where the players have qualitative objectives described by LTL formulae and have limited resources. We study the complexity of several decision problems related to the analysis of rationality in electric boolean games with LTL objectives. In particular, we report that the problem of deciding whether a profile is a Nash equilibrium in an iterated electric boolean game is no harder than in iterated boolean games without resource bounds. We show that it is a PSPACE-complete problem. As a corollary, we obtain that both rational elimination and rational construction of Nash equilibria by a supervising authority are PSPACE-complete problems. ",nicolas troquard,,2016.0,10.4204/EPTCS.218.4,"EPTCS 218, 2016, pp. 41-51",Oualhadj2016,True,,arXiv,Not available,Rational Verification in Iterated Electric Boolean Games,591b9da0055eb5826266122024bd8d87,http://arxiv.org/abs/1604.03773v2 16840," In this paper we study how to play (stochastic) games optimally using little space. We focus on repeated games with absorbing states, a type of two-player, zero-sum concurrent mean-payoff games. The prototypical example of these games is the well known Big Match of Gillete (1957). These games may not allow optimal strategies but they always have {\epsilon}-optimal strategies. In this paper we design {\epsilon}-optimal strategies for Player 1 in these games that use only O(log log T ) space. Furthermore, we construct strategies for Player 1 that use space s(T), for an arbitrary small unbounded non-decreasing function s, and which guarantee an {\epsilon}-optimal value for Player 1 in the limit superior sense. The previously known strategies use space {\Omega}(logT) and it was known that no strategy can use constant space if it is {\epsilon}-optimal even in the limit superior sense. We also give a complementary lower bound. Furthermore, we also show that no Markov strategy, even extended with finite memory, can ensure value greater than 0 in the Big Match, answering a question posed by Abraham Neyman. ",kristoffer hansen,,2016.0,,arXiv,Hansen2016,True,,arXiv,Not available,The Big Match in Small Space,d6f1e1854217fe432ce0645daeed41f2,http://arxiv.org/abs/1604.07634v1 16841," In this paper we study how to play (stochastic) games optimally using little space. We focus on repeated games with absorbing states, a type of two-player, zero-sum concurrent mean-payoff games. The prototypical example of these games is the well known Big Match of Gillete (1957). These games may not allow optimal strategies but they always have {\epsilon}-optimal strategies. In this paper we design {\epsilon}-optimal strategies for Player 1 in these games that use only O(log log T ) space. Furthermore, we construct strategies for Player 1 that use space s(T), for an arbitrary small unbounded non-decreasing function s, and which guarantee an {\epsilon}-optimal value for Player 1 in the limit superior sense. The previously known strategies use space {\Omega}(logT) and it was known that no strategy can use constant space if it is {\epsilon}-optimal even in the limit superior sense. We also give a complementary lower bound. Furthermore, we also show that no Markov strategy, even extended with finite memory, can ensure value greater than 0 in the Big Match, answering a question posed by Abraham Neyman. ",rasmus ibsen-jensen,,2016.0,,arXiv,Hansen2016,True,,arXiv,Not available,The Big Match in Small Space,d6f1e1854217fe432ce0645daeed41f2,http://arxiv.org/abs/1604.07634v1 16842," In this paper we study how to play (stochastic) games optimally using little space. We focus on repeated games with absorbing states, a type of two-player, zero-sum concurrent mean-payoff games. The prototypical example of these games is the well known Big Match of Gillete (1957). These games may not allow optimal strategies but they always have {\epsilon}-optimal strategies. In this paper we design {\epsilon}-optimal strategies for Player 1 in these games that use only O(log log T ) space. Furthermore, we construct strategies for Player 1 that use space s(T), for an arbitrary small unbounded non-decreasing function s, and which guarantee an {\epsilon}-optimal value for Player 1 in the limit superior sense. The previously known strategies use space {\Omega}(logT) and it was known that no strategy can use constant space if it is {\epsilon}-optimal even in the limit superior sense. We also give a complementary lower bound. Furthermore, we also show that no Markov strategy, even extended with finite memory, can ensure value greater than 0 in the Big Match, answering a question posed by Abraham Neyman. ",michal koucky,,2016.0,,arXiv,Hansen2016,True,,arXiv,Not available,The Big Match in Small Space,d6f1e1854217fe432ce0645daeed41f2,http://arxiv.org/abs/1604.07634v1 16843," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",xiaoru zhang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 16844," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",lin gao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 16845," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",bin cao,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 16846," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",zhang li,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 16847," Mobile Crowd Sensing (MCS) is a new paradigm of sensing, which can achieve a flexible and scalable sensing coverage with a low deployment cost, by employing mobile users/devices to perform sensing tasks. In this work, we propose a novel MCS framework with data reuse, where multiple tasks with common data requirement can share (reuse) the common data with each other through an MCS platform. We study the optimal assignment of mobile users and tasks (with data reuse) systematically, under both information symmetry and asymmetry, depending on whether the user cost and the task valuation are public information. In the former case, we formulate the assignment problem as a generalized Knapsack problem and solve the problem by using classic algorithms. In the latter case, we propose a truthful and optimal double auction mechanism, built upon the above Knapsack assignment problem, to elicit the private information of both users and tasks and meanwhile achieve the same optimal assignment as under information symmetry. Simulation results show by allowing data reuse among tasks, the social welfare can be increased up to 100~380%, comparing with those without data reuse. We further show that the proposed double auction is not budget balance for the auctioneer, mainly due to the data reuse among tasks. To this end, we further introduce a reserve price into the double auction (for each data item) to achieve a desired tradeoff between the budget balance and the social efficiency. ",mengjing wang,,2017.0,,arXiv,Zhang2017,True,,arXiv,Not available,A Double Auction Mechanism for Mobile Crowd Sensing with Data Reuse,d41ec63bee2052455a38fa1d5e34f22d,http://arxiv.org/abs/1708.08274v1 16848," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",nguyen luong,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 16849," In a polyomino set (1,2)-achievement game the maker and the breaker alternately mark one and two previously unmarked cells respectively. The maker's goal is to mark a set of cells congruent to one of a given set of polyominoes. The breaker tries to prevent the maker from achieving his goal. The teams of polyominoes for which the maker has a winning strategy is determined up to size 4. In set achievement games, it is natural to study infinitely large polyominoes. This enables the construction of super winners that characterize all winning teams up to a certain size. ",edgar fisher,,2010.0,,"Theoretical Computer Science 409 (2008), no.3, 333--340",Fisher2010,True,,arXiv,Not available,"Rectangular Polyomino Set Weak (1,2)-achievement Games",40050086e6a37106da1ba57ddcdf040e,http://arxiv.org/abs/1010.0424v1 16850," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",zehui xiong,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 16851," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",ping wang,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 16852," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",dusit niyato,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 16853," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",yutao jiao,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 16854," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",ping wang,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 16855," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",dusit niyato,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 16856," As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of ""block mining"" by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider. ",kongrath suankaewmanee,,2018.0,,arXiv,Jiao2018,True,,arXiv,Not available,"Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks",0ca98fcca46f928009f2386167d86b5a,http://arxiv.org/abs/1804.09961v2 16857," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",gang bai,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16858," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",zhihui xie,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16859," Sponsored search in E-commerce platforms such as Amazon, Taobao and Tmall provides sellers an effective way to reach potential buyers with most relevant purpose. In this paper, we study the auction mechanism optimization problem in sponsored search on Alibaba's mobile E-commerce platform. Besides generating revenue, we are supposed to maintain an efficient marketplace with plenty of quality users, guarantee a reasonable return on investment (ROI) for advertisers, and meanwhile, facilitate a pleasant shopping experience for the users. These requirements essentially pose a constrained optimization problem. Directly optimizing over auction parameters yields a discontinuous, non-convex problem that denies effective solutions. One of our major contribution is a practical convex optimization formulation of the original problem. We devise a novel re-parametrization of auction mechanism with discrete sets of representative instances. To construct the optimization problem, we build an auction simulation system which estimates the resulted business indicators of the selected parameters by replaying the auctions recorded from real online requests. We summarized the experiments on real search traffics to analyze the effects of fidelity of auction simulation, the efficacy under various constraint targets and the influence of regularization. The experiment results show that with proper entropy regularization, we are able to maximize revenue while constraining other business indicators within given ranges. ",liang wang,,2018.0,,arXiv,Bai2018,True,,arXiv,Not available,"Practical Constrained Optimization of Auction Mechanisms in E-Commerce Sponsored Search Advertising",84850ad79c8e9f9921fe4c6a27dd60b1,http://arxiv.org/abs/1807.11790v1 16860," We study an ensemble of individuals playing the two games of the so-called Parrondo paradox. In our study, players are allowed to choose the game to be played by the whole ensemble in each turn. The choice cannot conform to the preferences of all the players and, consequently, they face a simple frustration phenomenon that requires some strategy to make a collective decision. We consider several such strategies and analyze how fluctuations can be used to improve the performance of the system. ",j. parrondo,,2014.0,10.1140/epjst/e2007-00068-0,"Eur. Phys. J. Special Topics 143, 39 (2007)",Parrondo2014,True,,arXiv,Not available,Collective decision making and paradoxical games,c655f281edf34ee886edc2b09cf69f10,http://arxiv.org/abs/1410.0241v1 16861," In a polyomino set (1,2)-achievement game the maker and the breaker alternately mark one and two previously unmarked cells respectively. The maker's goal is to mark a set of cells congruent to one of a given set of polyominoes. The breaker tries to prevent the maker from achieving his goal. The teams of polyominoes for which the maker has a winning strategy is determined up to size 4. In set achievement games, it is natural to study infinitely large polyominoes. This enables the construction of super winners that characterize all winning teams up to a certain size. ",nandor sieben,,2010.0,,"Theoretical Computer Science 409 (2008), no.3, 333--340",Fisher2010,True,,arXiv,Not available,"Rectangular Polyomino Set Weak (1,2)-achievement Games",40050086e6a37106da1ba57ddcdf040e,http://arxiv.org/abs/1010.0424v1 16862," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",sudhir singh,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 16863," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",vwani roychowdhury,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 16864," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",milan bradonjic,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 16865," We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations. ",behnam rezaei,,2007.0,,arXiv,Singh2007,True,,arXiv,Not available,Exploration via design and the cost of uncertainty in keyword auctions,277df6185c4219da0f7407dffa7bd853,http://arxiv.org/abs/0707.1053v2 16866," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",arupratan ray,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 16867," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",debmalya mandal,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 16868," In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions. ",y. narahari,,2015.0,,arXiv,Ray2015,True,,arXiv,Not available,"Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers",e3ec1995f04ba0b2caedcfd2ee1bf9a3,http://arxiv.org/abs/1504.01020v1 16869," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",nicola gatti,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 16870," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",alessandro lazaric,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 16871," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",marco rocco,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 16872," This paper considers the problem of cooperative power control in distributed small cell wireless networks. We introduce a novel framework, based on repeated games, which models the interactions of the different transmit base stations in the downlink. By exploiting the specific structure of the game, we show that we can improve the system performance by selecting the Pareto optimal solution as well as reduce the price of stability. ",mael treust,,2010.0,,"Future Network and MobileSummit 2010, Italy (2010)",Treust2010,True,,arXiv,Not available,Coverage games in small cells networks,cd3dedd97ed8ced89ca14172805d2e51,http://arxiv.org/abs/1011.4366v1 16873," Sponsored search auctions constitute one of the most successful applications of microeconomic mechanisms. In mechanism design, auctions are usually designed to incentivize advertisers to bid their truthful valuations and to assure both the advertisers and the auctioneer a non-negative utility. Nonetheless, in sponsored search auctions, the click-through-rates (CTRs) of the advertisers are often unknown to the auctioneer and thus standard truthful mechanisms cannot be directly applied and must be paired with an effective learning algorithm for the estimation of the CTRs. This introduces the critical problem of designing a learning mechanism able to estimate the CTRs at the same time as implementing a truthful mechanism with a revenue loss as small as possible compared to an optimal mechanism designed with the true CTRs. Previous work showed that, when dominant-strategy truthfulness is adopted, in single-slot auctions the problem can be solved using suitable exploration-exploitation mechanisms able to achieve a per-step regret (over the auctioneer's revenue) of order $O(T^{-1/3})$ (where T is the number of times the auction is repeated). It is also known that, when truthfulness in expectation is adopted, a per-step regret (over the social welfare) of order $O(T^{-1/2})$ can be obtained. In this paper we extend the results known in the literature to the case of multi-slot auctions. In this case, a model of the user is needed to characterize how the advertisers' valuations change over the slots. We adopt the cascade model that is the most famous model in the literature for sponsored search auctions. We prove a number of novel upper bounds and lower bounds both on the auctioneer's revenue loss and social welfare w.r.t. to the VCG auction and we report numerical simulations investigating the accuracy of the bounds in predicting the dependency of the regret on the auction parameters. ",francesco trovo,,2014.0,,arXiv,Gatti2014,True,,arXiv,Not available,"Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities",64e4b83f203a04afb87315851bae690c,http://arxiv.org/abs/1405.2484v1 16874," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",alon eden,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 16875," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",michal feldman,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 16876," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",ophir friedler,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 16877," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",inbal talgam-cohen,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 16878," A seminal result of Bulow and Klemperer [1989] demonstrates the power of competition for extracting revenue: when selling a single item to $n$ bidders whose values are drawn i.i.d. from a regular distribution, the simple welfare-maximizing VCG mechanism (in this case, a second price-auction) with one additional bidder extracts at least as much revenue in expectation as the optimal mechanism. The beauty of this theorem stems from the fact that VCG is a {\em prior-independent} mechanism, where the seller possesses no information about the distribution, and yet, by recruiting one additional bidder it performs better than any prior-dependent mechanism tailored exactly to the distribution at hand (without the additional bidder). In this work, we establish the first {\em full Bulow-Klemperer} results in {\em multi-dimensional} environments, proving that by recruiting additional bidders, the revenue of the VCG mechanism surpasses that of the optimal (possibly randomized, Bayesian incentive compatible) mechanism. For a given environment with i.i.d. bidders, we term the number of additional bidders needed to achieve this guarantee the environment's {\em competition complexity}. Using the recent duality-based framework of Cai et al. [2016] for reasoning about optimal revenue, we show that the competition complexity of $n$ bidders with additive valuations over $m$ independent, regular items is at most $n+2m-2$ and at least $\log(m)$. We extend our results to bidders with additive valuations subject to downward-closed constraints, showing that these significantly more general valuations increase the competition complexity by at most an additive $m-1$ factor. We further improve this bound for the special case of matroid constraints, and provide additional extensions as well. ",s. weinberg,,2016.0,,arXiv,Eden2016,True,,arXiv,Not available,"The Competition Complexity of Auctions: A Bulow-Klemperer Result for Multi-Dimensional Bidders",f765706bd28e237aab603f412cb10b1d,http://arxiv.org/abs/1612.08821v1 16879," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",thomas nedelec,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16880," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",marc abeille,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16881," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",clement calauzenes,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16882," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",noureddine karoui,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16883," This paper considers the problem of cooperative power control in distributed small cell wireless networks. We introduce a novel framework, based on repeated games, which models the interactions of the different transmit base stations in the downlink. By exploiting the specific structure of the game, we show that we can improve the system performance by selecting the Pareto optimal solution as well as reduce the price of stability. ",hamidou tembine,,2010.0,,"Future Network and MobileSummit 2010, Italy (2010)",Treust2010,True,,arXiv,Not available,Coverage games in small cells networks,cd3dedd97ed8ced89ca14172805d2e51,http://arxiv.org/abs/1011.4366v1 16884," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",benjamin heymann,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16885," Second price auctions with reserve price are widely used by the main Internet actors because of their incentive compatibility property. We show that once reserve price are learned based on past bidder behavior, this auction is not anymore incentive compatible. Through a functional analytic rather than game theoretic approach, we exhibit shading strategies which lead to large increase of revenue for the bidders. In the symmetric case, we show that there exists a simple equilibrium strategy that enables bidders to get the revenue they would get in a second price auction without reserve price. We then study the consequences of this result on recent work on collusion in second price auctions and prove that the proposed bidding strategies are robust to some approximation error of the auctioneer. ",vianney perchet,,2018.0,,arXiv,Nedelec2018,True,,arXiv,Not available,"Thresholding the virtual value: a simple method to increase welfare and lower reserve prices in online auction systems",39d9040751116e9fdf56518f6135089f,http://arxiv.org/abs/1808.06979v1 16886," Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyze it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand vs. price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a nondimensional granularity parameter, is in most cases a more significant determinant of market behavior than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero-intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic-zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable. ",eric smith,,2002.0,10.1088/1469-7688/3/6/307,arXiv,Smith2002,True,,arXiv,Not available,Statistical theory of the continuous double auction,9e918503af2b2e7667b1d414e4b16f62,http://arxiv.org/abs/cond-mat/0210475v1 16887," Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyze it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand vs. price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a nondimensional granularity parameter, is in most cases a more significant determinant of market behavior than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero-intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic-zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable. ",j. farmer,,2002.0,10.1088/1469-7688/3/6/307,arXiv,Smith2002,True,,arXiv,Not available,Statistical theory of the continuous double auction,9e918503af2b2e7667b1d414e4b16f62,http://arxiv.org/abs/cond-mat/0210475v1 16888," Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyze it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand vs. price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a nondimensional granularity parameter, is in most cases a more significant determinant of market behavior than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero-intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic-zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable. ",laszlo gillemot,,2002.0,10.1088/1469-7688/3/6/307,arXiv,Smith2002,True,,arXiv,Not available,Statistical theory of the continuous double auction,9e918503af2b2e7667b1d414e4b16f62,http://arxiv.org/abs/cond-mat/0210475v1 16889," Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyze it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand vs. price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a nondimensional granularity parameter, is in most cases a more significant determinant of market behavior than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero-intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic-zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable. ",supriya krishnamurthy,,2002.0,10.1088/1469-7688/3/6/307,arXiv,Smith2002,True,,arXiv,Not available,Statistical theory of the continuous double auction,9e918503af2b2e7667b1d414e4b16f62,http://arxiv.org/abs/cond-mat/0210475v1 16890," Subtraction games is a class of impartial combinatorial games, They with finite subtraction sets are known to have periodic nim-sequences. So people try to find the regular of the games. But for specific of Sprague-Grundy Theory, it is too difficult to find, they obtained some conclusions just by simple observing. This paper used PTFN algorithm to analyze the period of the Subtraction games. It is more suitable than Sprague-Grundy Theory, and this paper obtained four conclusions by PTFN algorithm . This algorithm provide a new direction to study the subtraction games' period. ",zhihui qin,,2012.0,,arXiv,Qin2012,True,,arXiv,Not available,The Period of the subtraction games,93f19624269e50a6b184e0c05abf0964,http://arxiv.org/abs/1208.6134v1 16891," Subtraction games is a class of impartial combinatorial games, They with finite subtraction sets are known to have periodic nim-sequences. So people try to find the regular of the games. But for specific of Sprague-Grundy Theory, it is too difficult to find, they obtained some conclusions just by simple observing. This paper used PTFN algorithm to analyze the period of the Subtraction games. It is more suitable than Sprague-Grundy Theory, and this paper obtained four conclusions by PTFN algorithm . This algorithm provide a new direction to study the subtraction games' period. ",guanglei he,,2012.0,,arXiv,Qin2012,True,,arXiv,Not available,The Period of the subtraction games,93f19624269e50a6b184e0c05abf0964,http://arxiv.org/abs/1208.6134v1 16892," The recent theory of sequential games and selection functions by Mar- tin Escardo and Paulo Oliva is extended to games in which players move simultaneously. The Nash existence theorem for mixed-strategy equilibria of finite games is generalised to games defined by selection functions. A normal form construction is given which generalises the game-theoretic normal form, and its soundness is proven. Minimax strategies also gener- alise to the new class of games and are computed by the Berardi-Bezem- Coquand functional, studied in proof theory as an interpretation of the axiom of countable choice. ",julian hedges,,2013.0,10.1098/rspa.2013.0041,arXiv,Hedges2013,True,,arXiv,Not available,A generalisation of Nash's theorem with higher-order functionals,25b84a6db239ca358c804ab45302a6f9,http://arxiv.org/abs/1301.4845v1 16893," This paper presents the ""Game Theory Explorer"" software tool to create and analyze games as models of strategic interaction. A game in extensive or strategic form is created and nicely displayed with a graphical user interface in a web browser. State-of-the-art algorithms then compute all Nash equilibria of the game after a mouseclick. In tutorial fashion, we present how the program is used, and the ideas behind its main algorithms. We report on experiences with the architecture of the software and its development as an open-source project. ",rahul savani,,2014.0,10.1007/s10287-014-0206-x,"Computational Management Science 12:1, 5-33 (2015)",Savani2014,True,,arXiv,Not available,Game Theory Explorer - Software for the Applied Game Theorist,e57fa9ab944f1ac8a633b302cab987cb,http://arxiv.org/abs/1403.3969v1 16894," This paper considers the problem of cooperative power control in distributed small cell wireless networks. We introduce a novel framework, based on repeated games, which models the interactions of the different transmit base stations in the downlink. By exploiting the specific structure of the game, we show that we can improve the system performance by selecting the Pareto optimal solution as well as reduce the price of stability. ",samson lasaulce,,2010.0,,"Future Network and MobileSummit 2010, Italy (2010)",Treust2010,True,,arXiv,Not available,Coverage games in small cells networks,cd3dedd97ed8ced89ca14172805d2e51,http://arxiv.org/abs/1011.4366v1 16895," This paper presents the ""Game Theory Explorer"" software tool to create and analyze games as models of strategic interaction. A game in extensive or strategic form is created and nicely displayed with a graphical user interface in a web browser. State-of-the-art algorithms then compute all Nash equilibria of the game after a mouseclick. In tutorial fashion, we present how the program is used, and the ideas behind its main algorithms. We report on experiences with the architecture of the software and its development as an open-source project. ",bernhard stengel,,2014.0,10.1007/s10287-014-0206-x,"Computational Management Science 12:1, 5-33 (2015)",Savani2014,True,,arXiv,Not available,Game Theory Explorer - Software for the Applied Game Theorist,e57fa9ab944f1ac8a633b302cab987cb,http://arxiv.org/abs/1403.3969v1 16896," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",karl tuyls,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16897," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",julien perolat,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16898," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",marc lanctot,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16899," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",georg ostrovski,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16900," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",rahul savani,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16901," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",joel leibo,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16902," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",toby ord,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16903," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",thore graepel,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16904," We introduce new theoretical insights into two-population asymmetric games allowing for an elegant symmetric decomposition into two single population symmetric games. Specifically, we show how an asymmetric bimatrix game (A,B) can be decomposed into its symmetric counterparts by envisioning and investigating the payoff tables (A and B) that constitute the asymmetric game, as two independent, single population, symmetric games. We reveal several surprising formal relationships between an asymmetric two-population game and its symmetric single population counterparts, which facilitate a convenient analysis of the original asymmetric game due to the dimensionality reduction of the decomposition. The main finding reveals that if (x,y) is a Nash equilibrium of an asymmetric game (A,B), this implies that y is a Nash equilibrium of the symmetric counterpart game determined by payoff table A, and x is a Nash equilibrium of the symmetric counterpart game determined by payoff table B. Also the reverse holds and combinations of Nash equilibria of the counterpart games form Nash equilibria of the asymmetric game. We illustrate how these formal relationships aid in identifying and analysing the Nash structure of asymmetric games, by examining the evolutionary dynamics of the simpler counterpart games in several canonical examples. ",shane legg,,2017.0,,arXiv,Tuyls2017,True,,arXiv,Not available,Symmetric Decomposition of Asymmetric Games,af3f694bb8f0bfd4920d1a29c82a7411,http://arxiv.org/abs/1711.05074v3 16905," This paper considers the problem of cooperative power control in distributed small cell wireless networks. We introduce a novel framework, based on repeated games, which models the interactions of the different transmit base stations in the downlink. By exploiting the specific structure of the game, we show that we can improve the system performance by selecting the Pareto optimal solution as well as reduce the price of stability. ",merouane debbah,,2010.0,,"Future Network and MobileSummit 2010, Italy (2010)",Treust2010,True,,arXiv,Not available,Coverage games in small cells networks,cd3dedd97ed8ced89ca14172805d2e51,http://arxiv.org/abs/1011.4366v1 16906," Noncooperative game theory provides a normative framework for analyzing strategic interactions. However, for the toolbox to be operational, the solutions it defines will have to be computed. In this paper, we provide a single reduction that 1) demonstrates NP-hardness of determining whether Nash equilibria with certain natural properties exist, and 2) demonstrates the #P-hardness of counting Nash equilibria (or connected sets of Nash equilibria). We also show that 3) determining whether a pure-strategy Bayes-Nash equilibrium exists is NP-hard, and that 4) determining whether a pure-strategy Nash equilibrium exists in a stochastic (Markov) game is PSPACE-hard even if the game is invisible (this remains NP-hard if the game is finite). All of our hardness results hold even if there are only two players and the game is symmetric. Keywords: Nash equilibrium; game theory; computational complexity; noncooperative game theory; normal form game; stochastic game; Markov game; Bayes-Nash equilibrium; multiagent systems. ",vincent conitzer,,2002.0,,"In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI-03), Acapulco, Mexico, 2003",Conitzer2002,True,,arXiv,Not available,Complexity Results about Nash Equilibria,7804d423392e186b1d2d5cbf5c19710e,http://arxiv.org/abs/cs/0205074v1 16907," Noncooperative game theory provides a normative framework for analyzing strategic interactions. However, for the toolbox to be operational, the solutions it defines will have to be computed. In this paper, we provide a single reduction that 1) demonstrates NP-hardness of determining whether Nash equilibria with certain natural properties exist, and 2) demonstrates the #P-hardness of counting Nash equilibria (or connected sets of Nash equilibria). We also show that 3) determining whether a pure-strategy Bayes-Nash equilibrium exists is NP-hard, and that 4) determining whether a pure-strategy Nash equilibrium exists in a stochastic (Markov) game is PSPACE-hard even if the game is invisible (this remains NP-hard if the game is finite). All of our hardness results hold even if there are only two players and the game is symmetric. Keywords: Nash equilibrium; game theory; computational complexity; noncooperative game theory; normal form game; stochastic game; Markov game; Bayes-Nash equilibrium; multiagent systems. ",tuomas sandholm,,2002.0,,"In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI-03), Acapulco, Mexico, 2003",Conitzer2002,True,,arXiv,Not available,Complexity Results about Nash Equilibria,7804d423392e186b1d2d5cbf5c19710e,http://arxiv.org/abs/cs/0205074v1 16908," The theory of combinatorial game (like board games) and the theory of social games (where one looks for Nash equilibria) are normally considered as two separate theories. Here we shall see what comes out of combining the ideas. The central idea is Conway's observation that real numbers can be interpreted as special types of combinatorial games. Therefore the payoff function of a social game is a combinatorial game. Probability theory should be considered as a safety net that prevents inconsistent decisions via the Dutch Book Argument. This result can be extended to situations where the payoff function is a more general game than a real number. The main difference between number valued payoff and game valued payoff is that a probability distribution that gives non-negative mean payoff does not ensure that the game will be lost due to the existence of infinitisimal games. Also the Ramsay/de Finetti theorem on exchangable sequences is discussed. ",peter harremoes,,2009.0,,arXiv,Harremoes2009,True,,arXiv,Not available,Dutch Books and Combinatorial Games,a78e53091b66301623ab1ecb4a83504f,http://arxiv.org/abs/0903.5429v2 16909," Blackwell games are infinite games of imperfect information. The two players simultaneously make their moves, and are then informed of each other's moves. Payoff is determined by a Borel measurable function $f$ on the set of possible resulting sequences of moves. A standard result in Game Theory is that finite games of this type are determined. Blackwell proved that infinite games are determined, but only for the cases where the payoff function is the indicator function of an open or $G_\delta$ set. For games of perfect information, determinacy has been proven for games of arbitrary Borel complexity. In this paper I prove the determinacy of Blackwell games over a $G_{\delta\sigma}$ set, in a manner similar to Davis' proof of determinacy of games of $G_{\delta\sigma}$ complexity of perfect information. There is also extensive literature about the consequences of assuming AD, the axiom that _all_ such games of perfect information are determined. In the final section of this paper I formulate an analogous axiom for games of imperfect information, and explore some of the consequences of this axiom. ",marco vervoort,,1996.0,,arXiv,Vervoort1996,True,,arXiv,Not available,Blackwell Games,ca81092110a12d56ae8bbbfe4acad267,http://arxiv.org/abs/math/9604208v1 16910," Structured game representations have recently attracted interest as models for multi-agent artificial intelligence scenarios, with rational behavior most commonly characterized by Nash equilibria. This paper presents efficient, exact algorithms for computing Nash equilibria in structured game representations, including both graphical games and multi-agent influence diagrams (MAIDs). The algorithms are derived from a continuation method for normal-form and extensive-form games due to Govindan and Wilson; they follow a trajectory through a space of perturbed games and their equilibria, exploiting game structure through fast computation of the Jacobian of the payoff function. They are theoretically guaranteed to find at least one equilibrium of the game, and may find more. Our approach provides the first efficient algorithm for computing exact equilibria in graphical games with arbitrary topology, and the first algorithm to exploit fine-grained structural properties of MAIDs. Experimental results are presented demonstrating the effectiveness of the algorithms and comparing them to predecessors. The running time of the graphical game algorithm is similar to, and often better than, the running time of previous approximate algorithms. The algorithm for MAIDs can effectively solve games that are much larger than those solvable by previous methods. ",b. blum,,2011.0,10.1613/jair.1947,"Journal Of Artificial Intelligence Research, Volume 25, pages 457-502, 2006",Blum2011,True,,arXiv,Not available,A Continuation Method for Nash Equilibria in Structured Games,2457328a4863a6e775c11c95f2a01cfa,http://arxiv.org/abs/1110.5886v1 16911," Structured game representations have recently attracted interest as models for multi-agent artificial intelligence scenarios, with rational behavior most commonly characterized by Nash equilibria. This paper presents efficient, exact algorithms for computing Nash equilibria in structured game representations, including both graphical games and multi-agent influence diagrams (MAIDs). The algorithms are derived from a continuation method for normal-form and extensive-form games due to Govindan and Wilson; they follow a trajectory through a space of perturbed games and their equilibria, exploiting game structure through fast computation of the Jacobian of the payoff function. They are theoretically guaranteed to find at least one equilibrium of the game, and may find more. Our approach provides the first efficient algorithm for computing exact equilibria in graphical games with arbitrary topology, and the first algorithm to exploit fine-grained structural properties of MAIDs. Experimental results are presented demonstrating the effectiveness of the algorithms and comparing them to predecessors. The running time of the graphical game algorithm is similar to, and often better than, the running time of previous approximate algorithms. The algorithm for MAIDs can effectively solve games that are much larger than those solvable by previous methods. ",d. koller,,2011.0,10.1613/jair.1947,"Journal Of Artificial Intelligence Research, Volume 25, pages 457-502, 2006",Blum2011,True,,arXiv,Not available,A Continuation Method for Nash Equilibria in Structured Games,2457328a4863a6e775c11c95f2a01cfa,http://arxiv.org/abs/1110.5886v1 16912," Structured game representations have recently attracted interest as models for multi-agent artificial intelligence scenarios, with rational behavior most commonly characterized by Nash equilibria. This paper presents efficient, exact algorithms for computing Nash equilibria in structured game representations, including both graphical games and multi-agent influence diagrams (MAIDs). The algorithms are derived from a continuation method for normal-form and extensive-form games due to Govindan and Wilson; they follow a trajectory through a space of perturbed games and their equilibria, exploiting game structure through fast computation of the Jacobian of the payoff function. They are theoretically guaranteed to find at least one equilibrium of the game, and may find more. Our approach provides the first efficient algorithm for computing exact equilibria in graphical games with arbitrary topology, and the first algorithm to exploit fine-grained structural properties of MAIDs. Experimental results are presented demonstrating the effectiveness of the algorithms and comparing them to predecessors. The running time of the graphical game algorithm is similar to, and often better than, the running time of previous approximate algorithms. The algorithm for MAIDs can effectively solve games that are much larger than those solvable by previous methods. ",c. shelton,,2011.0,10.1613/jair.1947,"Journal Of Artificial Intelligence Research, Volume 25, pages 457-502, 2006",Blum2011,True,,arXiv,Not available,A Continuation Method for Nash Equilibria in Structured Games,2457328a4863a6e775c11c95f2a01cfa,http://arxiv.org/abs/1110.5886v1 16913," In some games, additional information hurts a player, e.g., in games with first-mover advantage, the second-mover is hurt by seeing the first-mover's move. What properties of a game determine whether it has such negative ""value of information"" for a particular player? Can a game have negative value of information for all players? To answer such questions, we generalize the definition of marginal utility of a good to define the marginal utility of a parameter vector specifying a game. So rather than analyze the global structure of the relationship between a game's parameter vector and player behavior, as in previous work, we focus on the local structure of that relationship. This allows us to prove that generically, every game can have negative marginal value of information, unless one imposes a priori constraints on allowed changes to the game's parameter vector. We demonstrate these and related results numerically, and discuss their implications. ",nils bertschinger,,2013.0,,arXiv,Bertschinger2013,True,,arXiv,Not available,Value of information in noncooperative games,8177c13c2b4fa5284dfe614bf76cb73b,http://arxiv.org/abs/1401.0001v3 16914," In some games, additional information hurts a player, e.g., in games with first-mover advantage, the second-mover is hurt by seeing the first-mover's move. What properties of a game determine whether it has such negative ""value of information"" for a particular player? Can a game have negative value of information for all players? To answer such questions, we generalize the definition of marginal utility of a good to define the marginal utility of a parameter vector specifying a game. So rather than analyze the global structure of the relationship between a game's parameter vector and player behavior, as in previous work, we focus on the local structure of that relationship. This allows us to prove that generically, every game can have negative marginal value of information, unless one imposes a priori constraints on allowed changes to the game's parameter vector. We demonstrate these and related results numerically, and discuss their implications. ",david wolpert,,2013.0,,arXiv,Bertschinger2013,True,,arXiv,Not available,Value of information in noncooperative games,8177c13c2b4fa5284dfe614bf76cb73b,http://arxiv.org/abs/1401.0001v3 16915," In some games, additional information hurts a player, e.g., in games with first-mover advantage, the second-mover is hurt by seeing the first-mover's move. What properties of a game determine whether it has such negative ""value of information"" for a particular player? Can a game have negative value of information for all players? To answer such questions, we generalize the definition of marginal utility of a good to define the marginal utility of a parameter vector specifying a game. So rather than analyze the global structure of the relationship between a game's parameter vector and player behavior, as in previous work, we focus on the local structure of that relationship. This allows us to prove that generically, every game can have negative marginal value of information, unless one imposes a priori constraints on allowed changes to the game's parameter vector. We demonstrate these and related results numerically, and discuss their implications. ",eckehard olbrich,,2013.0,,arXiv,Bertschinger2013,True,,arXiv,Not available,Value of information in noncooperative games,8177c13c2b4fa5284dfe614bf76cb73b,http://arxiv.org/abs/1401.0001v3 16916," This paper introduced the classical prisoner dilemma with the character and structure of quantum prisoner dilemma's strategy space. Associate with the Dirac spinor field, apply the basic quantum game strategy to the translation of the dynamics of Dirac equation. Decompose the real space and time to lattice we found that the basic interaction of spinor could be translated into quantum game theory. At the same time, we gained the new dynamics of quantized spacial evolutionary game. ",haizhao zhi,,2011.0,,arXiv,Zhi2011,True,,arXiv,Not available,Quantum game interpretation of Dirac spinor field,b78ad2a8e9e6b7188a3c91f7c772b99b,http://arxiv.org/abs/1104.2841v2 16917," In some games, additional information hurts a player, e.g., in games with first-mover advantage, the second-mover is hurt by seeing the first-mover's move. What properties of a game determine whether it has such negative ""value of information"" for a particular player? Can a game have negative value of information for all players? To answer such questions, we generalize the definition of marginal utility of a good to define the marginal utility of a parameter vector specifying a game. So rather than analyze the global structure of the relationship between a game's parameter vector and player behavior, as in previous work, we focus on the local structure of that relationship. This allows us to prove that generically, every game can have negative marginal value of information, unless one imposes a priori constraints on allowed changes to the game's parameter vector. We demonstrate these and related results numerically, and discuss their implications. ",juergen jost,,2013.0,,arXiv,Bertschinger2013,True,,arXiv,Not available,Value of information in noncooperative games,8177c13c2b4fa5284dfe614bf76cb73b,http://arxiv.org/abs/1401.0001v3 16918," Games have always been a popular test bed for artificial intelligence techniques. Game developers are always in constant search for techniques that can automatically create computer games minimizing the developer's task. In this work we present an evolutionary strategy based solution towards the automatic generation of two player board games. To guide the evolutionary process towards games, which are entertaining, we propose a set of metrics. These metrics are based upon different theories of entertainment in computer games. This work also compares the entertainment value of the evolved games with the existing popular board based games. Further to verify the entertainment value of the evolved games with the entertainment value of the human user a human user survey is conducted. In addition to the user survey we check the learnability of the evolved games using an artificial neural network based controller. The proposed metrics and the evolutionary process can be employed for generating new and entertaining board games, provided an initial search space is given to the evolutionary algorithm. ",zahid halim,,2014.0,10.1142/S0218213013500280,arXiv,Halim2014,True,,arXiv,Not available,"Evolutionary Search in the Space of Rules for Creation of New Two-Player Board Games",a86d6f891acdcfa2ce0ef799c5ae17a3,http://arxiv.org/abs/1406.0175v1 16919," We propose a new all-pay auction format in which risk-loving bidders pay a constant fee each time they bid for an object whose monetary value is common knowledge among the bidders, and bidding fees are the only source of benefit for the seller. We show that for the proposed model there exists a {unique} Symmetric Subgame Perfect Equilibrium (SSPE). The characterized SSPE is stationary when re-entry in the auction is allowed, and it is Markov perfect when re-entry is forbidden. Furthermore, we fully characterize the expected revenue of the seller. Generally, with or without re-entry, it is more beneficial for the seller to choose $v$ (value of the object), $s$ (sale price), and $c$ (bidding fee) such that $\frac{v-s}{c}$ becomes sufficiently large. In particular, when re-entry is permitted: the expected revenue of the seller is \emph{independent} of the number of bidders, decreasing in the sale price, increasing in the value of the object, and decreasing in the bidding fee; Moreover, the seller's revenue is equal to the value of the object when players are risk neutral, and it is strictly greater than the value of the object when bidders are risk-loving. We further show that allowing re-entry can be important in practice. Because, if the seller were to run such an auction without allowing re-entry, the auction would last a long time, and for almost all of its duration have only two remaining players. Thus, the seller's revenue relies on those two players being willing to participate, without any breaks, in an auction that might last for thousands of rounds ",ali kakhbod,,2011.0,,arXiv,Kakhbod2011,True,,arXiv,Not available,Resource allocation with costly participation,572a491e2875b8bb2a1246cdc3ba2dae,http://arxiv.org/abs/1108.2018v6 16920," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",ittai abraham,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 16921," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",moshe babaioff,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 16922," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",shaddin dughmi,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 16923," Complements between goods - where one good takes on added value in the presence of another - have been a thorn in the side of algorithmic mechanism designers. On the one hand, complements are common in the standard motivating applications for combinatorial auctions, like spectrum license auctions. On the other, welfare maximization in the presence of complements is notoriously difficult, and this intractability has stymied theoretical progress in the area. For example, there are no known positive results for combinatorial auctions in which bidder valuations are multi-parameter and non-complement-free, other than the relatively weak results known for general valuations. To make inroads on the problem of combinatorial auction design in the presence of complements, we propose a model for valuations with complements that is parameterized by the ""size"" of the complements. A valuation in our model is represented succinctly by a weighted hypergraph, where the size of the hyper-edges corresponds to degree of complementarity. Our model permits a variety of computationally efficient queries, and non-trivial welfare-maximization algorithms and mechanisms. We design the following polynomial-time approximation algorithms and truthful mechanisms for welfare maximization with bidders with hypergraph valuations. 1- For bidders whose valuations correspond to subgraphs of a known graph that is planar (or more generally, excludes a fixed minor), we give a truthful and (1+epsilon)-approximate mechanism. 2- We give a polynomial-time, r-approximation algorithm for welfare maximization with hypergraph-r valuations. Our algorithm randomly rounds a compact linear programming relaxation of the problem. 3- We design a different approximation algorithm and use it to give a polynomial-time, truthful-in-expectation mechanism that has an approximation factor of O(log^r m). ",tim roughgarden,,2012.0,,arXiv,Abraham2012,True,,arXiv,Not available,Combinatorial Auctions with Restricted Complements,685501ee4d224548ebf2ed26de3e6c2a,http://arxiv.org/abs/1205.4104v1 16924," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",moshe babaioff,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 16925," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",yogeshwer sharma,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 16926," We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the ""multi-armed bandit problem"", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by ""regret"", the difference in social welfare between the algorithm and the benchmark which always selects the same ""best"" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret. ",aleksandrs slivkins,,2008.0,,arXiv,Babaioff2008,True,,arXiv,Not available,Characterizing Truthful Multi-Armed Bandit Mechanisms,84a5aada4f4f32e605aaafec04988254,http://arxiv.org/abs/0812.2291v7 16927," We propose a simple model of network co-evolution in a game-dynamical system of interacting agents that play repeated games with their neighbors, and adapt their behaviors and network links based on the outcome of those games. The adaptation is achieved through a simple reinforcement learning scheme. We show that the collective evolution of such a system can be described by appropriately defined replicator dynamics equations. In particular, we suggest an appropriate factorization of the agents' strategies that results in a coupled system of equations characterizing the evolution of both strategies and network structure, and illustrate the framework on two simple examples. ",aram galstyan,,2011.0,,arXiv,Galstyan2011,True,,arXiv,Not available,Replicator Dynamics of Co-Evolving Networks,15c60630db34ddd141e8db04b37518a9,http://arxiv.org/abs/1107.5354v1 16928," The tremendous increase in mobile data traffic coupled with fierce competition in wireless industry brings about spectrum scarcity and bandwidth fragmentation. This inevitably results in asymmetric-valued LTE spectrum allocation that stems from different timing for twice improvement in capacity between competing operators, given spectrum allocations today. This motivates us to study the economic effects of asymmetric-valued LTE spectrum allocation. In this paper, we formulate the interactions between operators and users as a hierarchical dynamic game framework, where two spiteful operators simultaneously make spectrum acquisition decisions in the upper-level first-price sealed-bid auction game, and dynamic pricing decisions in the lower-level differential game, taking into account user subscription dynamics. Using backward induction, we derive the equilibrium of the entire game under mild conditions. Through analytical and numerical results, we verify our studies by comparing the latest result of LTE spectrum auction in South Korea, which serves as the benchmark of asymmetric-valued LTE spectrum auction designs. ",sang jung,,2015.0,,arXiv,Jung2015,True,,arXiv,Not available,"Bidding, Pricing, and User Subscription Dynamics in Asymmetric-valued Korean LTE Spectrum Auction: A Hierarchical Dynamic Game Approach",9c965bb8137a65191576a01422f63664,http://arxiv.org/abs/1507.00379v1 16929," The tremendous increase in mobile data traffic coupled with fierce competition in wireless industry brings about spectrum scarcity and bandwidth fragmentation. This inevitably results in asymmetric-valued LTE spectrum allocation that stems from different timing for twice improvement in capacity between competing operators, given spectrum allocations today. This motivates us to study the economic effects of asymmetric-valued LTE spectrum allocation. In this paper, we formulate the interactions between operators and users as a hierarchical dynamic game framework, where two spiteful operators simultaneously make spectrum acquisition decisions in the upper-level first-price sealed-bid auction game, and dynamic pricing decisions in the lower-level differential game, taking into account user subscription dynamics. Using backward induction, we derive the equilibrium of the entire game under mild conditions. Through analytical and numerical results, we verify our studies by comparing the latest result of LTE spectrum auction in South Korea, which serves as the benchmark of asymmetric-valued LTE spectrum auction designs. ",seong-lyun kim,,2015.0,,arXiv,Jung2015,True,,arXiv,Not available,"Bidding, Pricing, and User Subscription Dynamics in Asymmetric-valued Korean LTE Spectrum Auction: A Hierarchical Dynamic Game Approach",9c965bb8137a65191576a01422f63664,http://arxiv.org/abs/1507.00379v1 16930," We propose a game-theoretic framework that incorporates both incomplete information and general ambiguity attitudes on factors external to all players. Our starting point is players' preferences on payoff-distribution vectors, essentially mappings from states of the world to distributions of payoffs to be received by players. There are two ways in which equilibria for this preference game can be defined. When the preferences possess ever more features, we can gradually add ever more structures to the game. These include real-valued utility-like functions over payoff-distribution vectors, sets of probabilistic priors over states of the world, and eventually the traditional expected-utility framework involving one single prior. We establish equilibrium existence results, show the upper hemi-continuity of equilibrium sets over changing ambiguity attitudes, and uncover relations between the two versions of equilibria. Some attention is paid to the enterprising game, in which players exhibit ambiguity seeking attitudes while betting optimistically on the favorable resolution of ambiguities. The two solution concepts are unified at this game's pure equilibria, whose existence is guaranteed when strategic complementarities are present. The current framework can be applied to settings like auctions involving ambiguity on competitors' assessments of item worths. ",jian yang,,2015.0,,arXiv,Yang2015,True,,arXiv,Not available,Game-theoretic Modeling of Players' Ambiguities on External Factors,dc4fca20490490858f9d43ab035a57c8,http://arxiv.org/abs/1510.06812v4 16931," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",shaddin dughmi,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 16932," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",tim roughgarden,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 16933," We design an expected polynomial-time, truthful-in-expectation, (1-1/e)-approximation mechanism for welfare maximization in a fundamental class of combinatorial auctions. Our results apply to bidders with valuations that are m matroid rank sums (MRS), which encompass most concrete examples of submodular functions studied in this context, including coverage functions, matroid weighted-rank functions, and convex combinations thereof. Our approximation factor is the best possible, even for known and explicitly given coverage valuations, assuming P != NP. Ours is the first truthful-in-expectation and polynomial-time mechanism to achieve a constant-factor approximation for an NP-hard welfare maximization problem in combinatorial auctions with heterogeneous goods and restricted valuations. Our mechanism is an instantiation of a new framework for designing approximation mechanisms based on randomized rounding algorithms. A typical such algorithm first optimizes over a fractional relaxation of the original problem, and then randomly rounds the fractional solution to an integral one. With rare exceptions, such algorithms cannot be converted into truthful mechanisms. The high-level idea of our mechanism design framework is to optimize directly over the (random) output of the rounding algorithm, rather than over the input to the rounding algorithm. This approach leads to truthful-in-expectation mechanisms, and these mechanisms can be implemented efficiently when the corresponding objective function is concave. For bidders with MRS valuations, we give a novel randomized rounding algorithm that leads to both a concave objective function and a (1-1/e)-approximation of the optimal welfare. ",qiqi yan,,2011.0,,arXiv,Dughmi2011,True,,arXiv,Not available,"From Convex Optimization to Randomized Mechanisms: Toward Optimal Combinatorial Auctions",9840843cf5682a74c2ecb5a6cf14de52,http://arxiv.org/abs/1103.0040v3 16934," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",soheil ehsani,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 16935," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",mohammadtaghi hajiaghayi,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 16936," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",thomas kesselheim,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 16937," The secretary and the prophet inequality problems are central to the field of Stopping Theory. Recently, there has been a lot of work in generalizing these models to multiple items because of their applications in mechanism design. The most important of these generalizations are to matroids and to combinatorial auctions (extends bipartite matching). Kleinberg-Weinberg \cite{KW-STOC12} and Feldman et al. \cite{feldman2015combinatorial} show that for adversarial arrival order of random variables the optimal prophet inequalities give a $1/2$-approximation. For many settings, however, it's conceivable that the arrival order is chosen uniformly at random, akin to the secretary problem. For such a random arrival model, we improve upon the $1/2$-approximation and obtain $(1-1/e)$-approximation prophet inequalities for both matroids and combinatorial auctions. This also gives improvements to the results of Yan \cite{yan2011mechanism} and Esfandiari et al. \cite{esfandiari2015prophet} who worked in the special cases where we can fully control the arrival order or when there is only a single item. Our techniques are threshold based. We convert our discrete problem into a continuous setting and then give a generic template on how to dynamically adjust these thresholds to lower bound the expected total welfare. ",sahil singla,,2017.0,,arXiv,Ehsani2017,True,,arXiv,Not available,Prophet Secretary for Combinatorial Auctions and Matroids,d60bc50e728fa2e130d90036f213e0b2,http://arxiv.org/abs/1710.11213v2 16938," We propose a simple model of network co-evolution in a game-dynamical system of interacting agents that play repeated games with their neighbors, and adapt their behaviors and network links based on the outcome of those games. The adaptation is achieved through a simple reinforcement learning scheme. We show that the collective evolution of such a system can be described by appropriately defined replicator dynamics equations. In particular, we suggest an appropriate factorization of the agents' strategies that results in a coupled system of equations characterizing the evolution of both strategies and network structure, and illustrate the framework on two simple examples. ",ardeshir kianercy,,2011.0,,arXiv,Galstyan2011,True,,arXiv,Not available,Replicator Dynamics of Co-Evolving Networks,15c60630db34ddd141e8db04b37518a9,http://arxiv.org/abs/1107.5354v1 16939," In this paper, we investigate optimal resource allocation in a power beacon-assisted wireless-powered communication network (PB-WPCN), which consists of a set of hybrid access point (AP)-source pairs and a power beacon (PB). Each source, which has no embedded power supply, first harvests energy from its associated AP and/or the PB in the downlink (DL) and then uses the harvested energy to transmit information to its AP in the uplink (UL). We consider both cooperative and non-cooperative scenarios based on whether the PB is cooperative with the APs or not. For the cooperative scenario, we formulate a social welfare maximization problem to maximize the weighted sum-throughput of all AP-source pairs, which is subsequently solved by a water-filling based distributed algorithm. In the non-cooperative scenario, all the APs and the PB are assumed to be rational and self-interested such that incentives from each AP are needed for the PB to provide wireless charging service. We then formulate an auction game and propose an auction based distributed algorithm by considering the PB as the auctioneer and the APs as the bidders. Finally, numerical results are performed to validate the convergence of both the proposed algorithms and demonstrate the impacts of various system parameters. ",yuanye ma,,2015.0,10.1109/TCOMM.2015.2468215,arXiv,Ma2015,True,,arXiv,Not available,"Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications",80f513ac21209e8ba66340f378e12707,http://arxiv.org/abs/1508.01617v1 16940," In this paper, we investigate optimal resource allocation in a power beacon-assisted wireless-powered communication network (PB-WPCN), which consists of a set of hybrid access point (AP)-source pairs and a power beacon (PB). Each source, which has no embedded power supply, first harvests energy from its associated AP and/or the PB in the downlink (DL) and then uses the harvested energy to transmit information to its AP in the uplink (UL). We consider both cooperative and non-cooperative scenarios based on whether the PB is cooperative with the APs or not. For the cooperative scenario, we formulate a social welfare maximization problem to maximize the weighted sum-throughput of all AP-source pairs, which is subsequently solved by a water-filling based distributed algorithm. In the non-cooperative scenario, all the APs and the PB are assumed to be rational and self-interested such that incentives from each AP are needed for the PB to provide wireless charging service. We then formulate an auction game and propose an auction based distributed algorithm by considering the PB as the auctioneer and the APs as the bidders. Finally, numerical results are performed to validate the convergence of both the proposed algorithms and demonstrate the impacts of various system parameters. ",he chen,,2015.0,10.1109/TCOMM.2015.2468215,arXiv,Ma2015,True,,arXiv,Not available,"Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications",80f513ac21209e8ba66340f378e12707,http://arxiv.org/abs/1508.01617v1 16941," In this paper, we investigate optimal resource allocation in a power beacon-assisted wireless-powered communication network (PB-WPCN), which consists of a set of hybrid access point (AP)-source pairs and a power beacon (PB). Each source, which has no embedded power supply, first harvests energy from its associated AP and/or the PB in the downlink (DL) and then uses the harvested energy to transmit information to its AP in the uplink (UL). We consider both cooperative and non-cooperative scenarios based on whether the PB is cooperative with the APs or not. For the cooperative scenario, we formulate a social welfare maximization problem to maximize the weighted sum-throughput of all AP-source pairs, which is subsequently solved by a water-filling based distributed algorithm. In the non-cooperative scenario, all the APs and the PB are assumed to be rational and self-interested such that incentives from each AP are needed for the PB to provide wireless charging service. We then formulate an auction game and propose an auction based distributed algorithm by considering the PB as the auctioneer and the APs as the bidders. Finally, numerical results are performed to validate the convergence of both the proposed algorithms and demonstrate the impacts of various system parameters. ",zihuai lin,,2015.0,10.1109/TCOMM.2015.2468215,arXiv,Ma2015,True,,arXiv,Not available,"Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications",80f513ac21209e8ba66340f378e12707,http://arxiv.org/abs/1508.01617v1 16942," In this paper, we investigate optimal resource allocation in a power beacon-assisted wireless-powered communication network (PB-WPCN), which consists of a set of hybrid access point (AP)-source pairs and a power beacon (PB). Each source, which has no embedded power supply, first harvests energy from its associated AP and/or the PB in the downlink (DL) and then uses the harvested energy to transmit information to its AP in the uplink (UL). We consider both cooperative and non-cooperative scenarios based on whether the PB is cooperative with the APs or not. For the cooperative scenario, we formulate a social welfare maximization problem to maximize the weighted sum-throughput of all AP-source pairs, which is subsequently solved by a water-filling based distributed algorithm. In the non-cooperative scenario, all the APs and the PB are assumed to be rational and self-interested such that incentives from each AP are needed for the PB to provide wireless charging service. We then formulate an auction game and propose an auction based distributed algorithm by considering the PB as the auctioneer and the APs as the bidders. Finally, numerical results are performed to validate the convergence of both the proposed algorithms and demonstrate the impacts of various system parameters. ",yonghui li,,2015.0,10.1109/TCOMM.2015.2468215,arXiv,Ma2015,True,,arXiv,Not available,"Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications",80f513ac21209e8ba66340f378e12707,http://arxiv.org/abs/1508.01617v1 16943," In this paper, we investigate optimal resource allocation in a power beacon-assisted wireless-powered communication network (PB-WPCN), which consists of a set of hybrid access point (AP)-source pairs and a power beacon (PB). Each source, which has no embedded power supply, first harvests energy from its associated AP and/or the PB in the downlink (DL) and then uses the harvested energy to transmit information to its AP in the uplink (UL). We consider both cooperative and non-cooperative scenarios based on whether the PB is cooperative with the APs or not. For the cooperative scenario, we formulate a social welfare maximization problem to maximize the weighted sum-throughput of all AP-source pairs, which is subsequently solved by a water-filling based distributed algorithm. In the non-cooperative scenario, all the APs and the PB are assumed to be rational and self-interested such that incentives from each AP are needed for the PB to provide wireless charging service. We then formulate an auction game and propose an auction based distributed algorithm by considering the PB as the auctioneer and the APs as the bidders. Finally, numerical results are performed to validate the convergence of both the proposed algorithms and demonstrate the impacts of various system parameters. ",branka vucetic,,2015.0,10.1109/TCOMM.2015.2468215,arXiv,Ma2015,True,,arXiv,Not available,"Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications",80f513ac21209e8ba66340f378e12707,http://arxiv.org/abs/1508.01617v1 16944," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",satinder singh,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 16945," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",michael kearns,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 16946," Multi-agent games are becoming an increasing prevalent formalism for the study of electronic commerce and auctions. The speed at which transactions can take place and the growing complexity of electronic marketplaces makes the study of computationally simple agents an appealing direction. In this work, we analyze the behavior of agents that incrementally adapt their strategy through gradient ascent on expected payoff, in the simple setting of two-player, two-action, iterated general-sum games, and present a surprising result. We show that either the agents will converge to Nash equilibrium, or if the strategies themselves do not converge, then their average payoffs will nevertheless converge to the payoffs of a Nash equilibrium. ",yishay mansour,,2013.0,,arXiv,Singh2013,True,,arXiv,Not available,Nash Convergence of Gradient Dynamics in Iterated General-Sum Games,7b5c1f3f1b624989464de66367b6744e,http://arxiv.org/abs/1301.3892v1 16947," We study adaptive dynamics in games where players abandon the population at a given rate, and are replaced by naive players characterized by a prior distribution over the admitted strategies. We demonstrate how such process leads macroscopically to a variant of the replicator equation, with an additional term accounting for player turnover. We study how Nash equilibria and the dynamics of the system are modified by this additional term, for prototypical examples such as the rock-scissor-paper game and different classes of two-action games played between two distinct populations. We conclude by showing how player turnover can account for non-trivial departures from Nash equilibria observed in data from lowest unique bid auctions. ",jeppe juul,,2013.0,10.1103/PhysRevE.88.022806,"Physical Review E 88, 022806 (2013)",Juul2013,True,,arXiv,Not available,Replicator dynamics with turnover of players,9040dbf266f297034c3ac73e2b732c66,http://arxiv.org/abs/1303.5656v2 16948," We study adaptive dynamics in games where players abandon the population at a given rate, and are replaced by naive players characterized by a prior distribution over the admitted strategies. We demonstrate how such process leads macroscopically to a variant of the replicator equation, with an additional term accounting for player turnover. We study how Nash equilibria and the dynamics of the system are modified by this additional term, for prototypical examples such as the rock-scissor-paper game and different classes of two-action games played between two distinct populations. We conclude by showing how player turnover can account for non-trivial departures from Nash equilibria observed in data from lowest unique bid auctions. ",ardeshir kianercy,,2013.0,10.1103/PhysRevE.88.022806,"Physical Review E 88, 022806 (2013)",Juul2013,True,,arXiv,Not available,Replicator dynamics with turnover of players,9040dbf266f297034c3ac73e2b732c66,http://arxiv.org/abs/1303.5656v2 16949," We propose a simple model of network co-evolution in a game-dynamical system of interacting agents that play repeated games with their neighbors, and adapt their behaviors and network links based on the outcome of those games. The adaptation is achieved through a simple reinforcement learning scheme. We show that the collective evolution of such a system can be described by appropriately defined replicator dynamics equations. In particular, we suggest an appropriate factorization of the agents' strategies that results in a coupled system of equations characterizing the evolution of both strategies and network structure, and illustrate the framework on two simple examples. ",armen allahverdyan,,2011.0,,arXiv,Galstyan2011,True,,arXiv,Not available,Replicator Dynamics of Co-Evolving Networks,15c60630db34ddd141e8db04b37518a9,http://arxiv.org/abs/1107.5354v1 16950," We study adaptive dynamics in games where players abandon the population at a given rate, and are replaced by naive players characterized by a prior distribution over the admitted strategies. We demonstrate how such process leads macroscopically to a variant of the replicator equation, with an additional term accounting for player turnover. We study how Nash equilibria and the dynamics of the system are modified by this additional term, for prototypical examples such as the rock-scissor-paper game and different classes of two-action games played between two distinct populations. We conclude by showing how player turnover can account for non-trivial departures from Nash equilibria observed in data from lowest unique bid auctions. ",sebastian bernhardsson,,2013.0,10.1103/PhysRevE.88.022806,"Physical Review E 88, 022806 (2013)",Juul2013,True,,arXiv,Not available,Replicator dynamics with turnover of players,9040dbf266f297034c3ac73e2b732c66,http://arxiv.org/abs/1303.5656v2 16951," We study adaptive dynamics in games where players abandon the population at a given rate, and are replaced by naive players characterized by a prior distribution over the admitted strategies. We demonstrate how such process leads macroscopically to a variant of the replicator equation, with an additional term accounting for player turnover. We study how Nash equilibria and the dynamics of the system are modified by this additional term, for prototypical examples such as the rock-scissor-paper game and different classes of two-action games played between two distinct populations. We conclude by showing how player turnover can account for non-trivial departures from Nash equilibria observed in data from lowest unique bid auctions. ",simone pigolotti,,2013.0,10.1103/PhysRevE.88.022806,"Physical Review E 88, 022806 (2013)",Juul2013,True,,arXiv,Not available,Replicator dynamics with turnover of players,9040dbf266f297034c3ac73e2b732c66,http://arxiv.org/abs/1303.5656v2 16952," Admissible strategies, i.e. those that are not dominated by any other strategy, are a typical rationality notion in game theory. In many classes of games this is justified by results showing that any strategy is admissible or dominated by an admissible strategy. However, in games played on finite graphs with quantitative objectives (as used for reactive synthesis), this is not the case. We consider increasing chains of strategies instead to recover a satisfactory rationality notion based on dominance in such games. We start with some order-theoretic considerations establishing sufficient criteria for this to work. We then turn our attention to generalised safety/reachability games as a particular application. We propose the notion of maximal uniform chain as the desired dominance-based rationality concept in these games. Decidability of some fundamental questions about uniform chains is established. ",nicolas basset,,2018.0,,arXiv,Basset2018,True,,arXiv,Not available,Beyond admissibility: Dominance between chains of strategies,a29f1ebedaa7f50c1b44f6e08571a76a,http://arxiv.org/abs/1805.11608v1 16953," Admissible strategies, i.e. those that are not dominated by any other strategy, are a typical rationality notion in game theory. In many classes of games this is justified by results showing that any strategy is admissible or dominated by an admissible strategy. However, in games played on finite graphs with quantitative objectives (as used for reactive synthesis), this is not the case. We consider increasing chains of strategies instead to recover a satisfactory rationality notion based on dominance in such games. We start with some order-theoretic considerations establishing sufficient criteria for this to work. We then turn our attention to generalised safety/reachability games as a particular application. We propose the notion of maximal uniform chain as the desired dominance-based rationality concept in these games. Decidability of some fundamental questions about uniform chains is established. ",ismael jecker,,2018.0,,arXiv,Basset2018,True,,arXiv,Not available,Beyond admissibility: Dominance between chains of strategies,a29f1ebedaa7f50c1b44f6e08571a76a,http://arxiv.org/abs/1805.11608v1 16954," Admissible strategies, i.e. those that are not dominated by any other strategy, are a typical rationality notion in game theory. In many classes of games this is justified by results showing that any strategy is admissible or dominated by an admissible strategy. However, in games played on finite graphs with quantitative objectives (as used for reactive synthesis), this is not the case. We consider increasing chains of strategies instead to recover a satisfactory rationality notion based on dominance in such games. We start with some order-theoretic considerations establishing sufficient criteria for this to work. We then turn our attention to generalised safety/reachability games as a particular application. We propose the notion of maximal uniform chain as the desired dominance-based rationality concept in these games. Decidability of some fundamental questions about uniform chains is established. ",arno pauly,,2018.0,,arXiv,Basset2018,True,,arXiv,Not available,Beyond admissibility: Dominance between chains of strategies,a29f1ebedaa7f50c1b44f6e08571a76a,http://arxiv.org/abs/1805.11608v1 16955," Admissible strategies, i.e. those that are not dominated by any other strategy, are a typical rationality notion in game theory. In many classes of games this is justified by results showing that any strategy is admissible or dominated by an admissible strategy. However, in games played on finite graphs with quantitative objectives (as used for reactive synthesis), this is not the case. We consider increasing chains of strategies instead to recover a satisfactory rationality notion based on dominance in such games. We start with some order-theoretic considerations establishing sufficient criteria for this to work. We then turn our attention to generalised safety/reachability games as a particular application. We propose the notion of maximal uniform chain as the desired dominance-based rationality concept in these games. Decidability of some fundamental questions about uniform chains is established. ",jean-francois raskin,,2018.0,,arXiv,Basset2018,True,,arXiv,Not available,Beyond admissibility: Dominance between chains of strategies,a29f1ebedaa7f50c1b44f6e08571a76a,http://arxiv.org/abs/1805.11608v1 16956," Admissible strategies, i.e. those that are not dominated by any other strategy, are a typical rationality notion in game theory. In many classes of games this is justified by results showing that any strategy is admissible or dominated by an admissible strategy. However, in games played on finite graphs with quantitative objectives (as used for reactive synthesis), this is not the case. We consider increasing chains of strategies instead to recover a satisfactory rationality notion based on dominance in such games. We start with some order-theoretic considerations establishing sufficient criteria for this to work. We then turn our attention to generalised safety/reachability games as a particular application. We propose the notion of maximal uniform chain as the desired dominance-based rationality concept in these games. Decidability of some fundamental questions about uniform chains is established. ",marie bogaard,,2018.0,,arXiv,Basset2018,True,,arXiv,Not available,Beyond admissibility: Dominance between chains of strategies,a29f1ebedaa7f50c1b44f6e08571a76a,http://arxiv.org/abs/1805.11608v1 16957," Combinatorial games are played under two different play conventions: normal play, where the last player to move wins, and \mis play, where the last player to move loses. Combinatorial games are also classified into impartial positions and partizan positions, where a position is impartial if both players have the same available moves and partizan otherwise. \Mis play games lack many of the useful calculational and theoretical properties of normal play games. Until Plambeck's indistinguishability quotient and \mis monoid theory were developed in 2004, research on \mis play games had stalled. This thesis investigates partizan combinatorial \mis play games, by taking Plambeck's indistinguishability and \mis monoid theory for impartial positions and extending it to partizan ones, as well as examining the difficulties in constructing a category of \mis play games in a similar manner to Joyal's category of normal play games. This thesis succeeds in finding an infinite set of positions which each have finite \mis monoid, examining conditions on positions for when $* + *$ is equivalent to 0, finding a set of positions which have Tweedledum-Tweedledee type strategy, and the two most important results of this thesis: giving necessary and sufficient conditions on a set of positions $\Upsilon$ such that the \mis monoid of $\Upsilon$ is the same as the \mis monoid of $*$ and giving a construction theorem which builds all positions $\xi$ such that the \mis monoid of $\xi$ is the same as the \mis monoid of $*$. ",meghan allen,,2010.0,,arXiv,Allen2010,True,,arXiv,Not available,An Investigation of Partizan Misere Games,2a2c41d3e7dd2a86f95008d6cd392f24,http://arxiv.org/abs/1008.4109v1 16958," In this work we aim to analyze the role of noise in the spatial Public Goods Game, one of the most famous games in Evolutionary Game Theory. The dynamics of this game is affected by a number of parameters and processes, namely the topology of interactions among the agents, the synergy factor, and the strategy revision phase. The latter is a process that allows agents to change their strategy. Notably, rational agents tend to imitate richer neighbors, in order to increase the probability to maximize their payoff. By implementing a stochastic revision process, it is possible to control the level of noise in the system, so that even irrational updates may occur. In particular, in this work we study the effect of noise on the macroscopic behavior of a finite structured population playing the Public Goods Game. We consider both the case of a homogeneous population, where the noise in the system is controlled by tuning a parameter representing the level of stochasticity in the strategy revision phase, and a heterogeneous population composed of a variable proportion of rational and irrational agents. In both cases numerical investigations show that the Public Goods Game has a very rich behavior which strongly depends on the amount of noise in the system and on the value of the synergy factor. To conclude, our study sheds a new light on the relations between the microscopic dynamics of the Public Goods Game and its macroscopic behavior, strengthening the link between the field of Evolutionary Game Theory and statistical physics. ",marco javarone,,2016.0,10.1088/1742-5468/2016/07/073404,"Journal of Statistical Mechanics: Theory and Experiment 2016 (7), 073404",Javarone2016,True,,arXiv,Not available,The Role of Noise in the Spatial Public Goods Game,4130074071a5087b4ab45d9cb0318d60,http://arxiv.org/abs/1605.08690v1 16959," In this work we aim to analyze the role of noise in the spatial Public Goods Game, one of the most famous games in Evolutionary Game Theory. The dynamics of this game is affected by a number of parameters and processes, namely the topology of interactions among the agents, the synergy factor, and the strategy revision phase. The latter is a process that allows agents to change their strategy. Notably, rational agents tend to imitate richer neighbors, in order to increase the probability to maximize their payoff. By implementing a stochastic revision process, it is possible to control the level of noise in the system, so that even irrational updates may occur. In particular, in this work we study the effect of noise on the macroscopic behavior of a finite structured population playing the Public Goods Game. We consider both the case of a homogeneous population, where the noise in the system is controlled by tuning a parameter representing the level of stochasticity in the strategy revision phase, and a heterogeneous population composed of a variable proportion of rational and irrational agents. In both cases numerical investigations show that the Public Goods Game has a very rich behavior which strongly depends on the amount of noise in the system and on the value of the synergy factor. To conclude, our study sheds a new light on the relations between the microscopic dynamics of the Public Goods Game and its macroscopic behavior, strengthening the link between the field of Evolutionary Game Theory and statistical physics. ",federico battiston,,2016.0,10.1088/1742-5468/2016/07/073404,"Journal of Statistical Mechanics: Theory and Experiment 2016 (7), 073404",Javarone2016,True,,arXiv,Not available,The Role of Noise in the Spatial Public Goods Game,4130074071a5087b4ab45d9cb0318d60,http://arxiv.org/abs/1605.08690v1 16960," We present an algorithm which attains O(\sqrt{T}) internal (and thus external) regret for finite games with partial monitoring under the local observability condition. Recently, this condition has been shown by (Bartok, Pal, and Szepesvari, 2011) to imply the O(\sqrt{T}) rate for partial monitoring games against an i.i.d. opponent, and the authors conjectured that the same holds for non-stochastic adversaries. Our result is in the affirmative, and it completes the characterization of possible rates for finite partial-monitoring games, an open question stated by (Cesa-Bianchi, Lugosi, and Stoltz, 2006). Our regret guarantees also hold for the more general model of partial monitoring with random signals. ",dean foster,,2011.0,,arXiv,Foster2011,True,,arXiv,Not available,No Internal Regret via Neighborhood Watch,d78b38a4e1c48e48b98ea3f2a9df4f10,http://arxiv.org/abs/1108.6088v1 16961," In nature and society problems arise when different interests are difficult to reconcile, which are modeled in game theory. While most applications assume uncorrelated games, a more detailed modeling is necessary to consider the correlations that influence the decisions of the players. The current theory for correlated games, however, enforces the players to obey the instructions from a third party or ""correlation device"" to reach equilibrium, but this cannot be achieved for all initial correlations. We extend here the existing framework of correlated games and find that there are other interesting and previously unknown Nash equilibria that make use of correlations to obtain the best payoff. This is achieved by allowing the players the freedom to follow or not to follow the suggestions of the correlation device. By assigning independent probabilities to follow every possible suggestion, the players engage in a response game that turns out to have a rich structure of Nash equilibria that goes beyond the correlated equilibrium and mixed-strategy solutions. We determine the Nash equilibria for all possible correlated Snowdrift games, which we find to be describable by Ising Models in thermal equilibrium. We believe that our approach paves the way to a study of correlations in games that uncovers the existence of interesting underlying interaction mechanisms, without compromising the independence of the players. ",a. correia,,2018.0,,arXiv,Correia2018,True,,arXiv,Not available,Nash Equilibria in the Response Strategy of Correlated Games,7700d017220f53bda6d0f01b93abf026,http://arxiv.org/abs/1809.03860v1 16962," In nature and society problems arise when different interests are difficult to reconcile, which are modeled in game theory. While most applications assume uncorrelated games, a more detailed modeling is necessary to consider the correlations that influence the decisions of the players. The current theory for correlated games, however, enforces the players to obey the instructions from a third party or ""correlation device"" to reach equilibrium, but this cannot be achieved for all initial correlations. We extend here the existing framework of correlated games and find that there are other interesting and previously unknown Nash equilibria that make use of correlations to obtain the best payoff. This is achieved by allowing the players the freedom to follow or not to follow the suggestions of the correlation device. By assigning independent probabilities to follow every possible suggestion, the players engage in a response game that turns out to have a rich structure of Nash equilibria that goes beyond the correlated equilibrium and mixed-strategy solutions. We determine the Nash equilibria for all possible correlated Snowdrift games, which we find to be describable by Ising Models in thermal equilibrium. We believe that our approach paves the way to a study of correlations in games that uncovers the existence of interesting underlying interaction mechanisms, without compromising the independence of the players. ",h. stoof,,2018.0,,arXiv,Correia2018,True,,arXiv,Not available,Nash Equilibria in the Response Strategy of Correlated Games,7700d017220f53bda6d0f01b93abf026,http://arxiv.org/abs/1809.03860v1 16963," The ability to compose parts to form a more complex whole, and to analyze a whole as a combination of elements, is desirable across disciplines. This workshop bring together researchers applying compositional approaches to physics, NLP, cognitive science, and game theory. Within NLP, a long-standing aim is to represent how words can combine to form phrases and sentences. Within the framework of distributional semantics, words are represented as vectors in vector spaces. The categorical model of Coecke et al. [2010], inspired by quantum protocols, has provided a convincing account of compositionality in vector space models of NLP. There is furthermore a history of vector space models in cognitive science. Theories of categorization such as those developed by Nosofsky [1986] and Smith et al. [1988] utilise notions of distance between feature vectors. More recently G\""ardenfors [2004, 2014] has developed a model of concepts in which conceptual spaces provide geometric structures, and information is represented by points, vectors and regions in vector spaces. The same compositional approach has been applied to this formalism, giving conceptual spaces theory a richer model of compositionality than previously [Bolt et al., 2018]. Compositional approaches have also been applied in the study of strategic games and Nash equilibria. In contrast to classical game theory, where games are studied monolithically as one global object, compositional game theory works bottom-up by building large and complex games from smaller components. Such an approach is inherently difficult since the interaction between games has to be considered. Research into categorical compositional methods for this field have recently begun [Ghani et al., 2018]. Moreover, the interaction between the three disciplines of cognitive science, linguistics and game theory is a fertile ground for research. Game theory in cognitive science is a well-established area [Camerer, 2011]. Similarly game theoretic approaches have been applied in linguistics [J\""ager, 2008]. Lastly, the study of linguistics and cognitive science is intimately intertwined [Smolensky and Legendre, 2006, Jackendoff, 2007]. Physics supplies compositional approaches via vector spaces and categorical quantum theory, allowing the interplay between the three disciplines to be examined. ",martha lewis,,2018.0,10.4204/EPTCS.283,"EPTCS 283, 2018",Lewis2018,True,,arXiv,Not available,"Proceedings of the 2018 Workshop on Compositional Approaches in Physics, NLP, and Social Sciences",c3af9db6f6ac3928ebe2ea4f6f077ac7,http://arxiv.org/abs/1811.02701v1 16964," The ability to compose parts to form a more complex whole, and to analyze a whole as a combination of elements, is desirable across disciplines. This workshop bring together researchers applying compositional approaches to physics, NLP, cognitive science, and game theory. Within NLP, a long-standing aim is to represent how words can combine to form phrases and sentences. Within the framework of distributional semantics, words are represented as vectors in vector spaces. The categorical model of Coecke et al. [2010], inspired by quantum protocols, has provided a convincing account of compositionality in vector space models of NLP. There is furthermore a history of vector space models in cognitive science. Theories of categorization such as those developed by Nosofsky [1986] and Smith et al. [1988] utilise notions of distance between feature vectors. More recently G\""ardenfors [2004, 2014] has developed a model of concepts in which conceptual spaces provide geometric structures, and information is represented by points, vectors and regions in vector spaces. The same compositional approach has been applied to this formalism, giving conceptual spaces theory a richer model of compositionality than previously [Bolt et al., 2018]. Compositional approaches have also been applied in the study of strategic games and Nash equilibria. In contrast to classical game theory, where games are studied monolithically as one global object, compositional game theory works bottom-up by building large and complex games from smaller components. Such an approach is inherently difficult since the interaction between games has to be considered. Research into categorical compositional methods for this field have recently begun [Ghani et al., 2018]. Moreover, the interaction between the three disciplines of cognitive science, linguistics and game theory is a fertile ground for research. Game theory in cognitive science is a well-established area [Camerer, 2011]. Similarly game theoretic approaches have been applied in linguistics [J\""ager, 2008]. Lastly, the study of linguistics and cognitive science is intimately intertwined [Smolensky and Legendre, 2006, Jackendoff, 2007]. Physics supplies compositional approaches via vector spaces and categorical quantum theory, allowing the interplay between the three disciplines to be examined. ",bob coecke,,2018.0,10.4204/EPTCS.283,"EPTCS 283, 2018",Lewis2018,True,,arXiv,Not available,"Proceedings of the 2018 Workshop on Compositional Approaches in Physics, NLP, and Social Sciences",c3af9db6f6ac3928ebe2ea4f6f077ac7,http://arxiv.org/abs/1811.02701v1 16965," The ability to compose parts to form a more complex whole, and to analyze a whole as a combination of elements, is desirable across disciplines. This workshop bring together researchers applying compositional approaches to physics, NLP, cognitive science, and game theory. Within NLP, a long-standing aim is to represent how words can combine to form phrases and sentences. Within the framework of distributional semantics, words are represented as vectors in vector spaces. The categorical model of Coecke et al. [2010], inspired by quantum protocols, has provided a convincing account of compositionality in vector space models of NLP. There is furthermore a history of vector space models in cognitive science. Theories of categorization such as those developed by Nosofsky [1986] and Smith et al. [1988] utilise notions of distance between feature vectors. More recently G\""ardenfors [2004, 2014] has developed a model of concepts in which conceptual spaces provide geometric structures, and information is represented by points, vectors and regions in vector spaces. The same compositional approach has been applied to this formalism, giving conceptual spaces theory a richer model of compositionality than previously [Bolt et al., 2018]. Compositional approaches have also been applied in the study of strategic games and Nash equilibria. In contrast to classical game theory, where games are studied monolithically as one global object, compositional game theory works bottom-up by building large and complex games from smaller components. Such an approach is inherently difficult since the interaction between games has to be considered. Research into categorical compositional methods for this field have recently begun [Ghani et al., 2018]. Moreover, the interaction between the three disciplines of cognitive science, linguistics and game theory is a fertile ground for research. Game theory in cognitive science is a well-established area [Camerer, 2011]. Similarly game theoretic approaches have been applied in linguistics [J\""ager, 2008]. Lastly, the study of linguistics and cognitive science is intimately intertwined [Smolensky and Legendre, 2006, Jackendoff, 2007]. Physics supplies compositional approaches via vector spaces and categorical quantum theory, allowing the interplay between the three disciplines to be examined. ",jules hedges,,2018.0,10.4204/EPTCS.283,"EPTCS 283, 2018",Lewis2018,True,,arXiv,Not available,"Proceedings of the 2018 Workshop on Compositional Approaches in Physics, NLP, and Social Sciences",c3af9db6f6ac3928ebe2ea4f6f077ac7,http://arxiv.org/abs/1811.02701v1 16966," The ability to compose parts to form a more complex whole, and to analyze a whole as a combination of elements, is desirable across disciplines. This workshop bring together researchers applying compositional approaches to physics, NLP, cognitive science, and game theory. Within NLP, a long-standing aim is to represent how words can combine to form phrases and sentences. Within the framework of distributional semantics, words are represented as vectors in vector spaces. The categorical model of Coecke et al. [2010], inspired by quantum protocols, has provided a convincing account of compositionality in vector space models of NLP. There is furthermore a history of vector space models in cognitive science. Theories of categorization such as those developed by Nosofsky [1986] and Smith et al. [1988] utilise notions of distance between feature vectors. More recently G\""ardenfors [2004, 2014] has developed a model of concepts in which conceptual spaces provide geometric structures, and information is represented by points, vectors and regions in vector spaces. The same compositional approach has been applied to this formalism, giving conceptual spaces theory a richer model of compositionality than previously [Bolt et al., 2018]. Compositional approaches have also been applied in the study of strategic games and Nash equilibria. In contrast to classical game theory, where games are studied monolithically as one global object, compositional game theory works bottom-up by building large and complex games from smaller components. Such an approach is inherently difficult since the interaction between games has to be considered. Research into categorical compositional methods for this field have recently begun [Ghani et al., 2018]. Moreover, the interaction between the three disciplines of cognitive science, linguistics and game theory is a fertile ground for research. Game theory in cognitive science is a well-established area [Camerer, 2011]. Similarly game theoretic approaches have been applied in linguistics [J\""ager, 2008]. Lastly, the study of linguistics and cognitive science is intimately intertwined [Smolensky and Legendre, 2006, Jackendoff, 2007]. Physics supplies compositional approaches via vector spaces and categorical quantum theory, allowing the interplay between the three disciplines to be examined. ",dimitri kartsaklis,,2018.0,10.4204/EPTCS.283,"EPTCS 283, 2018",Lewis2018,True,,arXiv,Not available,"Proceedings of the 2018 Workshop on Compositional Approaches in Physics, NLP, and Social Sciences",c3af9db6f6ac3928ebe2ea4f6f077ac7,http://arxiv.org/abs/1811.02701v1 16967," The ability to compose parts to form a more complex whole, and to analyze a whole as a combination of elements, is desirable across disciplines. This workshop bring together researchers applying compositional approaches to physics, NLP, cognitive science, and game theory. Within NLP, a long-standing aim is to represent how words can combine to form phrases and sentences. Within the framework of distributional semantics, words are represented as vectors in vector spaces. The categorical model of Coecke et al. [2010], inspired by quantum protocols, has provided a convincing account of compositionality in vector space models of NLP. There is furthermore a history of vector space models in cognitive science. Theories of categorization such as those developed by Nosofsky [1986] and Smith et al. [1988] utilise notions of distance between feature vectors. More recently G\""ardenfors [2004, 2014] has developed a model of concepts in which conceptual spaces provide geometric structures, and information is represented by points, vectors and regions in vector spaces. The same compositional approach has been applied to this formalism, giving conceptual spaces theory a richer model of compositionality than previously [Bolt et al., 2018]. Compositional approaches have also been applied in the study of strategic games and Nash equilibria. In contrast to classical game theory, where games are studied monolithically as one global object, compositional game theory works bottom-up by building large and complex games from smaller components. Such an approach is inherently difficult since the interaction between games has to be considered. Research into categorical compositional methods for this field have recently begun [Ghani et al., 2018]. Moreover, the interaction between the three disciplines of cognitive science, linguistics and game theory is a fertile ground for research. Game theory in cognitive science is a well-established area [Camerer, 2011]. Similarly game theoretic approaches have been applied in linguistics [J\""ager, 2008]. Lastly, the study of linguistics and cognitive science is intimately intertwined [Smolensky and Legendre, 2006, Jackendoff, 2007]. Physics supplies compositional approaches via vector spaces and categorical quantum theory, allowing the interplay between the three disciplines to be examined. ",dan marsden,,2018.0,10.4204/EPTCS.283,"EPTCS 283, 2018",Lewis2018,True,,arXiv,Not available,"Proceedings of the 2018 Workshop on Compositional Approaches in Physics, NLP, and Social Sciences",c3af9db6f6ac3928ebe2ea4f6f077ac7,http://arxiv.org/abs/1811.02701v1 16968," This paper unifies the concepts of evolutionary games and quantum strategies. First, we state the formulation and properties of classical evolutionary strategies, with focus on the destinations of evolution in 2-player 2-strategy games. We then introduce a new formalism of quantum evolutionary dynamics, and give an example where an evolving quantum strategy gives reward if played against its classical counterpart. ",ming leung,,2011.0,,arXiv,Leung2011,True,,arXiv,Not available,"Classical vs Quantum Games: Continuous-time Evolutionary Strategy Dynamics",78c0f07ae59dbdf3e89aaa0ea0aed642,http://arxiv.org/abs/1104.3953v1 16969," We consider a wireless channel shared by multiple transmitter-receiver pairs. Their transmissions interfere with each other. Each transmitter-receiver pair aims to maximize its long-term average transmission rate subject to an average power constraint. This scenario is modeled as a stochastic game. We provide sufficient conditions for existence and uniqueness of a Nash equilibrium (NE). We then formulate the problem of finding NE as a variational inequality (VI) problem and present an algorithm to solve the VI using regularization. We also provide distributed algorithms to compute Pareto optimal solutions for the proposed game. ",krishna a,,2014.0,,arXiv,A2014,True,,arXiv,Not available,Algorithms for Stochastic Games on Interference Channels,0299b6c52bbb4fc42f6e1b198143e51f,http://arxiv.org/abs/1409.7551v1 16970," We consider a wireless channel shared by multiple transmitter-receiver pairs. Their transmissions interfere with each other. Each transmitter-receiver pair aims to maximize its long-term average transmission rate subject to an average power constraint. This scenario is modeled as a stochastic game. We provide sufficient conditions for existence and uniqueness of a Nash equilibrium (NE). We then formulate the problem of finding NE as a variational inequality (VI) problem and present an algorithm to solve the VI using regularization. We also provide distributed algorithms to compute Pareto optimal solutions for the proposed game. ",utpal mukherji,,2014.0,,arXiv,A2014,True,,arXiv,Not available,Algorithms for Stochastic Games on Interference Channels,0299b6c52bbb4fc42f6e1b198143e51f,http://arxiv.org/abs/1409.7551v1 16971," We study an ensemble of individuals playing the two games of the so-called Parrondo paradox. In our study, players are allowed to choose the game to be played by the whole ensemble in each turn. The choice cannot conform to the preferences of all the players and, consequently, they face a simple frustration phenomenon that requires some strategy to make a collective decision. We consider several such strategies and analyze how fluctuations can be used to improve the performance of the system. ",l. dinis,,2014.0,10.1140/epjst/e2007-00068-0,"Eur. Phys. J. Special Topics 143, 39 (2007)",Parrondo2014,True,,arXiv,Not available,Collective decision making and paradoxical games,c655f281edf34ee886edc2b09cf69f10,http://arxiv.org/abs/1410.0241v1 16972," We present an algorithm which attains O(\sqrt{T}) internal (and thus external) regret for finite games with partial monitoring under the local observability condition. Recently, this condition has been shown by (Bartok, Pal, and Szepesvari, 2011) to imply the O(\sqrt{T}) rate for partial monitoring games against an i.i.d. opponent, and the authors conjectured that the same holds for non-stochastic adversaries. Our result is in the affirmative, and it completes the characterization of possible rates for finite partial-monitoring games, an open question stated by (Cesa-Bianchi, Lugosi, and Stoltz, 2006). Our regret guarantees also hold for the more general model of partial monitoring with random signals. ",alexander rakhlin,,2011.0,,arXiv,Foster2011,True,,arXiv,Not available,No Internal Regret via Neighborhood Watch,d78b38a4e1c48e48b98ea3f2a9df4f10,http://arxiv.org/abs/1108.6088v1 16973," We consider a wireless channel shared by multiple transmitter-receiver pairs. Their transmissions interfere with each other. Each transmitter-receiver pair aims to maximize its long-term average transmission rate subject to an average power constraint. This scenario is modeled as a stochastic game. We provide sufficient conditions for existence and uniqueness of a Nash equilibrium (NE). We then formulate the problem of finding NE as a variational inequality (VI) problem and present an algorithm to solve the VI using regularization. We also provide distributed algorithms to compute Pareto optimal solutions for the proposed game. ",vinod sharma,,2014.0,,arXiv,A2014,True,,arXiv,Not available,Algorithms for Stochastic Games on Interference Channels,0299b6c52bbb4fc42f6e1b198143e51f,http://arxiv.org/abs/1409.7551v1 16974," In game theory, the notion of a player's beliefs about the game players' beliefs about other players' beliefs arises naturally. In this paper, we present a non-self-referential paradox in epistemic game theory which shows that completely modeling players' epistemic beliefs and assumptions is impossible. Furthermore, we introduce an interactive temporal assumption logic to give an appropriate formalization of the new paradox. Formalizing the new paradox in this logic shows that there is no complete interactive temporal assumption model. ",ahmad karimi,,2016.0,,arXiv,Karimi2016,True,,arXiv,Not available,A Non-Self-Referential Paradox in Epistemic Game Theory,316df663756b53a539442297861562ff,http://arxiv.org/abs/1601.06661v1 16975," We study the problem of \emph{jamming} in multiple independent \emph{Gaussian channels} as a zero-sum game. We show that in the unique Nash equilibrium of the game the best-response strategy of the transmitter is the \emph{waterfilling} to the sum of the jamming and the noise power in each channel and the best-response strategy of the jammer is the \emph{waterfilling} only to the noise power. ",michail fasoulakis,,2018.0,,arXiv,Fasoulakis2018,True,,arXiv,Not available,Jamming in multiple independent Gaussian channels as a game,a5b7431992c93c17c9030f99e6a9fff2,http://arxiv.org/abs/1807.09749v1 16976," We study the problem of \emph{jamming} in multiple independent \emph{Gaussian channels} as a zero-sum game. We show that in the unique Nash equilibrium of the game the best-response strategy of the transmitter is the \emph{waterfilling} to the sum of the jamming and the noise power in each channel and the best-response strategy of the jammer is the \emph{waterfilling} only to the noise power. ",apostolos traganitis,,2018.0,,arXiv,Fasoulakis2018,True,,arXiv,Not available,Jamming in multiple independent Gaussian channels as a game,a5b7431992c93c17c9030f99e6a9fff2,http://arxiv.org/abs/1807.09749v1 16977," We study the problem of \emph{jamming} in multiple independent \emph{Gaussian channels} as a zero-sum game. We show that in the unique Nash equilibrium of the game the best-response strategy of the transmitter is the \emph{waterfilling} to the sum of the jamming and the noise power in each channel and the best-response strategy of the jammer is the \emph{waterfilling} only to the noise power. ",anthony ephremides,,2018.0,,arXiv,Fasoulakis2018,True,,arXiv,Not available,Jamming in multiple independent Gaussian channels as a game,a5b7431992c93c17c9030f99e6a9fff2,http://arxiv.org/abs/1807.09749v1 16978," We explore the possibility that physical phenomena arising from interacting multi-particle systems, can be usefully interpreted in terms of multi-player games. We show how non-cooperative phenomena can emerge from Ising Hamiltonians, even though the individual spins behave cooperatively. Our findings establish a mapping between two fundamental models from condensed matter physics and game theory. ",chiu lee,,2002.0,,arXiv,Lee2002,True,,arXiv,Not available,Interacting many-body systems as non-cooperative games,cb53f0b78842a544fea17ae9c788731e,http://arxiv.org/abs/cond-mat/0212505v1 16979," We explore the possibility that physical phenomena arising from interacting multi-particle systems, can be usefully interpreted in terms of multi-player games. We show how non-cooperative phenomena can emerge from Ising Hamiltonians, even though the individual spins behave cooperatively. Our findings establish a mapping between two fundamental models from condensed matter physics and game theory. ",neil johnson,,2002.0,,arXiv,Lee2002,True,,arXiv,Not available,Interacting many-body systems as non-cooperative games,cb53f0b78842a544fea17ae9c788731e,http://arxiv.org/abs/cond-mat/0212505v1 16980," We build off the game, NimG to create a version named Neighboring Nim. By reducing from Geography, we show that this game is PSPACE-hard. The games created by the reduction share strong similarities with Undirected (Vertex) Geography and regular Nim, both of which are in P. We show how to construct PSPACE-complete versions with nim heaps *1 and *2. This application of graphs can be used as a form of game sum with any games, not only Nim. ",kyle burke,,2011.0,,arXiv,Burke2011,True,,arXiv,Not available,A PSPACE-complete Graph Nim,0c893f1083d7686795b9bf5083a215c6,http://arxiv.org/abs/1101.1507v3 16981," We build off the game, NimG to create a version named Neighboring Nim. By reducing from Geography, we show that this game is PSPACE-hard. The games created by the reduction share strong similarities with Undirected (Vertex) Geography and regular Nim, both of which are in P. We show how to construct PSPACE-complete versions with nim heaps *1 and *2. This application of graphs can be used as a form of game sum with any games, not only Nim. ",olivia george,,2011.0,,arXiv,Burke2011,True,,arXiv,Not available,A PSPACE-complete Graph Nim,0c893f1083d7686795b9bf5083a215c6,http://arxiv.org/abs/1101.1507v3 16982," The price of anarchy (PoA) has been widely used in static games to quantify the loss of efficiency due to noncooperation. Here, we extend this concept to a general differential games framework. In addition, we introduce the price of information (PoI) to characterize comparative game performances under different information structures, as well as the price of cooperation to capture the extent of benefit or loss a player accrues as a result of altruistic behavior. We further characterize PoA and PoI for a class of scalar linear quadratic differential games under open-loop and closed-loop feedback information structures. We also obtain some explicit bounds on these indices in a large population regime. ",tamer basar,,2011.0,,arXiv,Basar2011,True,,arXiv,Not available,"Prices of Anarchy, Information, and Cooperation in Differential Games",b99994dc98f6268f776fd0f00d7a22f5,http://arxiv.org/abs/1103.2579v1 16983," Flip a coin repeatedly, and stop whenever you want. Your payoff is the proportion of heads, and you wish to maximize this payoff in expectation. This so-called Chow-Robbins game is amenable to computer analysis, but while simple-minded number crunching can show that it is best to continue in a given position, establishing rigorously that stopping is optimal seems at first sight to require ""backward induction from infinity"". We establish a simple upper bound on the expected payoff in a given position, allowing efficient and rigorous computer analysis of positions early in the game. In particular we confirm that with 5 heads and 3 tails, stopping is optimal. ",olle haggstrom,,2012.0,,arXiv,Häggström2012,True,,arXiv,Not available,Rigorous computer analysis of the Chow-Robbins game,c357af20bf10a66857534881c09f0326,http://arxiv.org/abs/1201.0626v1 16984," The price of anarchy (PoA) has been widely used in static games to quantify the loss of efficiency due to noncooperation. Here, we extend this concept to a general differential games framework. In addition, we introduce the price of information (PoI) to characterize comparative game performances under different information structures, as well as the price of cooperation to capture the extent of benefit or loss a player accrues as a result of altruistic behavior. We further characterize PoA and PoI for a class of scalar linear quadratic differential games under open-loop and closed-loop feedback information structures. We also obtain some explicit bounds on these indices in a large population regime. ",quanyan zhu,,2011.0,,arXiv,Basar2011,True,,arXiv,Not available,"Prices of Anarchy, Information, and Cooperation in Differential Games",b99994dc98f6268f776fd0f00d7a22f5,http://arxiv.org/abs/1103.2579v1 16985," We investigate the interrelation between graph searching games and games with imperfect information. As key consequence we obtain that parity games with bounded imperfect information can be solved in PTIME on graphs of bounded DAG-width which generalizes several results for parity games on graphs of bounded complexity. We use a new concept of graph searching where several cops try to catch multiple robbers instead of just a single robber. The main technical result is that the number of cops needed to catch r robbers monotonously is at most r times the DAG-width of the graph. We also explore aspects of this new concept as a refinement of directed path-width which accentuates its connection to the concept of imperfect information. ",bernd puchala,,2011.0,,arXiv,Puchala2011,True,,arXiv,Not available,"Graph Searching, Parity Games and Imperfect Information",2b81d0cdea051c92b80715605ef2ec44,http://arxiv.org/abs/1110.5575v1 16986," We investigate the interrelation between graph searching games and games with imperfect information. As key consequence we obtain that parity games with bounded imperfect information can be solved in PTIME on graphs of bounded DAG-width which generalizes several results for parity games on graphs of bounded complexity. We use a new concept of graph searching where several cops try to catch multiple robbers instead of just a single robber. The main technical result is that the number of cops needed to catch r robbers monotonously is at most r times the DAG-width of the graph. We also explore aspects of this new concept as a refinement of directed path-width which accentuates its connection to the concept of imperfect information. ",roman rabinovich,,2011.0,,arXiv,Puchala2011,True,,arXiv,Not available,"Graph Searching, Parity Games and Imperfect Information",2b81d0cdea051c92b80715605ef2ec44,http://arxiv.org/abs/1110.5575v1 16987," We consider transformations of normal form games by binding preplay offers of players for payments of utility to other players conditional on them playing designated in the offers strategies. The game-theoretic effect of such preplay offers is transformation of the payoff matrix of the game by transferring payoffs between players. Here we analyze and completely characterize the possible transformations of the payoff matrix of a normal form game by sets of preplay offers. ",valentin goranko,,2012.0,,arXiv,Goranko2012,True,,arXiv,Not available,"Transformations of normal form games by preplay offers for payments among players",c17804668df80a1f226d35deeb45bdcd,http://arxiv.org/abs/1208.1758v1 16988," In two player bi-matrix games with partial monitoring, actions played are not observed, only some messages are received. Those games satisfy a crucial property of usual bi-matrix games: there are only a finite number of required (mixed) best replies. This is very helpful while investigating sets of Nash equilibria: for instance, in some cases, it allows to relate it to the set of equilibria of some auxiliary game with full monitoring. In the general case, the Lemke-Howson algorithm is extended and, under some genericity assumption, its output are Nash equilibria of the original game. As a by product, we obtain an oddness property on their number. ",vianney perchet,,2013.0,,arXiv,Perchet2013,True,,arXiv,Not available,"Nash equilibria with partial monitoring; Computation and Lemke-Howson algorithm",c601115869f726d680761f795971fa9b,http://arxiv.org/abs/1301.2662v1 16989," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",andris ambainis,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16990," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",arturs backurs,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16991," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",kaspars balodis,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16992," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",dmitry kravcenko,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16993," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",raitis ozols,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16994," Flip a coin repeatedly, and stop whenever you want. Your payoff is the proportion of heads, and you wish to maximize this payoff in expectation. This so-called Chow-Robbins game is amenable to computer analysis, but while simple-minded number crunching can show that it is best to continue in a given position, establishing rigorously that stopping is optimal seems at first sight to require ""backward induction from infinity"". We establish a simple upper bound on the expected payoff in a given position, allowing efficient and rigorous computer analysis of positions early in the game. In particular we confirm that with 5 heads and 3 tails, stopping is optimal. ",johan wastlund,,2012.0,,arXiv,Häggström2012,True,,arXiv,Not available,Rigorous computer analysis of the Chow-Robbins game,c357af20bf10a66857534881c09f0326,http://arxiv.org/abs/1201.0626v1 16995," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",juris smotrovs,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16996," We initiate a study of random instances of nonlocal games. We show that quantum strategies are better than classical for almost any 2-player XOR game. More precisely, for large n, the entangled value of a random 2-player XOR game with n questions to every player is at least 1.21... times the classical value, for 1-o(1) fraction of all 2-player XOR games. ",madars virza,,2011.0,,arXiv,Ambainis2011,True,,arXiv,Not available,Quantum strategies are better than classical in almost any XOR game,5b1f74386050c072c0b10551211d760f,http://arxiv.org/abs/1112.3330v1 16997," For matrix games we study how small nonzero probability must be used in optimal strategies. We show that for nxn win-lose-draw games (i.e. (-1,0,1) matrix games) nonzero probabilities smaller than n^{-O(n)} are never needed. We also construct an explicit nxn win-lose game such that the unique optimal strategy uses a nonzero probability as small as n^{-Omega(n)}. This is done by constructing an explicit (-1,1) nonsingular nxn matrix, for which the inverse has only nonnegative entries and where some of the entries are of value n^{Omega(n)}. ",kristoffer hansen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Patience of Matrix Games,715677d3343d524a5b893f067d272590,http://arxiv.org/abs/1206.1751v1 16998," For matrix games we study how small nonzero probability must be used in optimal strategies. We show that for nxn win-lose-draw games (i.e. (-1,0,1) matrix games) nonzero probabilities smaller than n^{-O(n)} are never needed. We also construct an explicit nxn win-lose game such that the unique optimal strategy uses a nonzero probability as small as n^{-Omega(n)}. This is done by constructing an explicit (-1,1) nonsingular nxn matrix, for which the inverse has only nonnegative entries and where some of the entries are of value n^{Omega(n)}. ",rasmus ibsen-jensen,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Patience of Matrix Games,715677d3343d524a5b893f067d272590,http://arxiv.org/abs/1206.1751v1 16999," For matrix games we study how small nonzero probability must be used in optimal strategies. We show that for nxn win-lose-draw games (i.e. (-1,0,1) matrix games) nonzero probabilities smaller than n^{-O(n)} are never needed. We also construct an explicit nxn win-lose game such that the unique optimal strategy uses a nonzero probability as small as n^{-Omega(n)}. This is done by constructing an explicit (-1,1) nonsingular nxn matrix, for which the inverse has only nonnegative entries and where some of the entries are of value n^{Omega(n)}. ",vladimir podolskii,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Patience of Matrix Games,715677d3343d524a5b893f067d272590,http://arxiv.org/abs/1206.1751v1 17000," For matrix games we study how small nonzero probability must be used in optimal strategies. We show that for nxn win-lose-draw games (i.e. (-1,0,1) matrix games) nonzero probabilities smaller than n^{-O(n)} are never needed. We also construct an explicit nxn win-lose game such that the unique optimal strategy uses a nonzero probability as small as n^{-Omega(n)}. This is done by constructing an explicit (-1,1) nonsingular nxn matrix, for which the inverse has only nonnegative entries and where some of the entries are of value n^{Omega(n)}. ",elias tsigaridas,,2012.0,,arXiv,Hansen2012,True,,arXiv,Not available,Patience of Matrix Games,715677d3343d524a5b893f067d272590,http://arxiv.org/abs/1206.1751v1 17001," We investigate newsvendor games whose payoff function is uncertain due to ambiguity in demand distributions. We discuss the concept of stability under uncertainty and introduce solution concepts for robust cooperative games which could be applied to these newsvendor games. Properties and numerical schemes for finding core solutions of robust newsvendor games are presented. ",xuan doan,,2014.0,,arXiv,Doan2014,True,,arXiv,Not available,Robust Newsvendor Games with Ambiguity in Demand Distributions,82faf9640af07a5781d5d9941d484c28,http://arxiv.org/abs/1403.5906v3 17002," We investigate newsvendor games whose payoff function is uncertain due to ambiguity in demand distributions. We discuss the concept of stability under uncertainty and introduce solution concepts for robust cooperative games which could be applied to these newsvendor games. Properties and numerical schemes for finding core solutions of robust newsvendor games are presented. ",tri-dung nguyen,,2014.0,,arXiv,Doan2014,True,,arXiv,Not available,Robust Newsvendor Games with Ambiguity in Demand Distributions,82faf9640af07a5781d5d9941d484c28,http://arxiv.org/abs/1403.5906v3 17003," Coevolutionary games cast players that may change their strategies as well as their networks of interaction. In this paper a framework is introduced for describing coevolutionary game dynamics by landscape models. It is shown that coevolutionary games invoke dynamic landscapes. Numerical experiments are shown for a prisoner's dilemma (PD) and a snow drift (SD) game that both use either birth-death (BD) or death-birth (DB) strategy updating. The resulting landscapes are analyzed with respect to modality and ruggedness ",hendrik richter,,2016.0,,"Proc. IEEE Congress on Evolutionary Computation, IEEE CEC 2016, (Ed.: Y. S. Ong), IEEE Press, Piscataway, NJ, 2016, 610-616",Richter2016,True,,arXiv,Not available,Analyzing coevolutionary games with dynamic fitness landscapes,61f7ba2f6f23c7661c58ac079b8d0dc1,http://arxiv.org/abs/1603.06374v1 17004," We present several new characterizations of correlated equilibria in games with continuous utility functions. These have the advantage of being more computationally and analytically tractable than the standard definition in terms of departure functions. We use these characterizations to construct effective algorithms for approximating a single correlated equilibrium or the entire set of correlated equilibria of a game with polynomial utility functions. ",noah stein,,2008.0,10.1016/j.geb.2010.04.004,"Games and Economic Behavior, Vol. 71, No. 2, March 2011, Pages 436-455",Stein2008,True,,arXiv,Not available,"Correlated Equilibria in Continuous Games: Characterization and Computation",e6aaff4454659720f735a84c91724451,http://arxiv.org/abs/0812.4279v2 17005," Player ranking can be used to determine the quality of the contributions of a player to a collaborative community. However, collaborative games with no explicit objectives do not support player ranking, as there is no metric to measure the quality of player contributions. An implicit objective of such communities is not being disruptive towards other players. In this paper, we propose a parameterizable approach for real-time player ranking in collaborative games with no explicit objectives. Our method computes a ranking by applying a simple heuristic community quality function. We also demonstrate the capabilities of our approach by applying several parameterizations of it to a case study and comparing the obtained results. ",luis quesada,,2012.0,,arXiv,Quesada2012,True,,arXiv,Not available,"Community-Quality-Based Player Ranking in Collaborative Games with no Explicit Objectives",aa2bf60c15664bae59cbf092b4c21ac0,http://arxiv.org/abs/1205.3180v1 17006," We present several new characterizations of correlated equilibria in games with continuous utility functions. These have the advantage of being more computationally and analytically tractable than the standard definition in terms of departure functions. We use these characterizations to construct effective algorithms for approximating a single correlated equilibrium or the entire set of correlated equilibria of a game with polynomial utility functions. ",pablo parrilo,,2008.0,10.1016/j.geb.2010.04.004,"Games and Economic Behavior, Vol. 71, No. 2, March 2011, Pages 436-455",Stein2008,True,,arXiv,Not available,"Correlated Equilibria in Continuous Games: Characterization and Computation",e6aaff4454659720f735a84c91724451,http://arxiv.org/abs/0812.4279v2 17007," We present several new characterizations of correlated equilibria in games with continuous utility functions. These have the advantage of being more computationally and analytically tractable than the standard definition in terms of departure functions. We use these characterizations to construct effective algorithms for approximating a single correlated equilibrium or the entire set of correlated equilibria of a game with polynomial utility functions. ",asuman ozdaglar,,2008.0,10.1016/j.geb.2010.04.004,"Games and Economic Behavior, Vol. 71, No. 2, March 2011, Pages 436-455",Stein2008,True,,arXiv,Not available,"Correlated Equilibria in Continuous Games: Characterization and Computation",e6aaff4454659720f735a84c91724451,http://arxiv.org/abs/0812.4279v2 17008," We propose a new all-pay auction format in which risk-loving bidders pay a constant fee each time they bid for an object whose monetary value is common knowledge among the bidders, and bidding fees are the only source of benefit for the seller. We show that for the proposed model there exists a {unique} Symmetric Subgame Perfect Equilibrium (SSPE). The characterized SSPE is stationary when re-entry in the auction is allowed, and it is Markov perfect when re-entry is forbidden. Furthermore, we fully characterize the expected revenue of the seller. Generally, with or without re-entry, it is more beneficial for the seller to choose $v$ (value of the object), $s$ (sale price), and $c$ (bidding fee) such that $\frac{v-s}{c}$ becomes sufficiently large. In particular, when re-entry is permitted: the expected revenue of the seller is \emph{independent} of the number of bidders, decreasing in the sale price, increasing in the value of the object, and decreasing in the bidding fee; Moreover, the seller's revenue is equal to the value of the object when players are risk neutral, and it is strictly greater than the value of the object when bidders are risk-loving. We further show that allowing re-entry can be important in practice. Because, if the seller were to run such an auction without allowing re-entry, the auction would last a long time, and for almost all of its duration have only two remaining players. Thus, the seller's revenue relies on those two players being willing to participate, without any breaks, in an auction that might last for thousands of rounds ",ali kakhbod,,2011.0,,arXiv,Kakhbod2011,True,,arXiv,Not available,Resource allocation with costly participation,572a491e2875b8bb2a1246cdc3ba2dae,http://arxiv.org/abs/1108.2018v6 17009," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",yiannis giannakopoulos,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 17010," We develop a general duality-theory framework for revenue maximization in additive Bayesian auctions. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to a multiple-good monopoly setting where the buyer has uniformly distributed valuations for the items, the canonical long-standing open problem in the area. We propose a deterministic selling mechanism called Straight-Jacket Auction (SJA), which we prove to be exactly optimal for up to 6 items, and conjecture its optimality for any number of goods. The duality framework is used not only for proving optimality, but perhaps more importantly for deriving the optimal mechanism itself; as a result, SJA is defined by natural geometric constraints. ",elias koutsoupias,,2014.0,,arXiv,Giannakopoulos2014,True,,arXiv,Not available,Duality and Optimality of Auctions for Uniform Distributions,6ff74bf55d00aebc8c5390d70309be5f,http://arxiv.org/abs/1404.2329v4 17011," The idea of this paper is an advanced game concept. This concept is expected to model non-monetary bilateral cooperations between self-interested agents. Such non-monetary cases are social cooperations like allocation of high level jobs or sexual relationships among humans. In a barter double auction, there is a big amount of agents. Every agent has a vector of parameters which specifies his demand and a vector which specifies his offer. Two agents can achieve a commitment through barter exchange. The subjective satisfaction level (a number between 0% and 100%) of an agent is as high as small is the distance between his demand and the accepted offer. This paper introduces some facets of this complex game concept. ",rustam tagiew,,2009.0,,arXiv,Tagiew2009,True,,arXiv,Not available,Towards Barter Double Auction as Model for Bilateral Social Cooperations,c981e51ee87f644962b38c95e56cff71,http://arxiv.org/abs/0905.3709v1 17012," A fundamental result in mechanism design theory, the so-called revelation principle, asserts that for many questions concerning the existence of mechanisms with a given outcome one can restrict attention to truthful direct revelation-mechanisms. In practice, however, many mechanism use a restricted message space. This motivates the study of the tradeoffs involved in choosing simplified mechanisms, which can sometimes bring benefits in precluding bad or promoting good equilibria, and other times impose costs on welfare and revenue. We study the simplicity-expressiveness tradeoff in two representative settings, sponsored search auctions and combinatorial auctions, each being a canonical example for complete information and incomplete information analysis, respectively. We observe that the amount of information available to the agents plays an important role for the tradeoff between simplicity and expressiveness. ",paul dutting,,2011.0,,arXiv,Dütting2011,True,,arXiv,Not available,Simplicity-Expressiveness Tradeoffs in Mechanism Design,4d3cdb36bcd896bd8517ceddd06bfa0c,http://arxiv.org/abs/1102.3632v1 17013," A fundamental result in mechanism design theory, the so-called revelation principle, asserts that for many questions concerning the existence of mechanisms with a given outcome one can restrict attention to truthful direct revelation-mechanisms. In practice, however, many mechanism use a restricted message space. This motivates the study of the tradeoffs involved in choosing simplified mechanisms, which can sometimes bring benefits in precluding bad or promoting good equilibria, and other times impose costs on welfare and revenue. We study the simplicity-expressiveness tradeoff in two representative settings, sponsored search auctions and combinatorial auctions, each being a canonical example for complete information and incomplete information analysis, respectively. We observe that the amount of information available to the agents plays an important role for the tradeoff between simplicity and expressiveness. ",felix fischer,,2011.0,,arXiv,Dütting2011,True,,arXiv,Not available,Simplicity-Expressiveness Tradeoffs in Mechanism Design,4d3cdb36bcd896bd8517ceddd06bfa0c,http://arxiv.org/abs/1102.3632v1 17014," A fundamental result in mechanism design theory, the so-called revelation principle, asserts that for many questions concerning the existence of mechanisms with a given outcome one can restrict attention to truthful direct revelation-mechanisms. In practice, however, many mechanism use a restricted message space. This motivates the study of the tradeoffs involved in choosing simplified mechanisms, which can sometimes bring benefits in precluding bad or promoting good equilibria, and other times impose costs on welfare and revenue. We study the simplicity-expressiveness tradeoff in two representative settings, sponsored search auctions and combinatorial auctions, each being a canonical example for complete information and incomplete information analysis, respectively. We observe that the amount of information available to the agents plays an important role for the tradeoff between simplicity and expressiveness. ",david parkes,,2011.0,,arXiv,Dütting2011,True,,arXiv,Not available,Simplicity-Expressiveness Tradeoffs in Mechanism Design,4d3cdb36bcd896bd8517ceddd06bfa0c,http://arxiv.org/abs/1102.3632v1 17015," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",marco caminati,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 17016," Player ranking can be used to determine the quality of the contributions of a player to a collaborative community. However, collaborative games with no explicit objectives do not support player ranking, as there is no metric to measure the quality of player contributions. An implicit objective of such communities is not being disruptive towards other players. In this paper, we propose a parameterizable approach for real-time player ranking in collaborative games with no explicit objectives. Our method computes a ranking by applying a simple heuristic community quality function. We also demonstrate the capabilities of our approach by applying several parameterizations of it to a case study and comparing the obtained results. ",pablo villacorta,,2012.0,,arXiv,Quesada2012,True,,arXiv,Not available,"Community-Quality-Based Player Ranking in Collaborative Games with no Explicit Objectives",aa2bf60c15664bae59cbf092b4c21ac0,http://arxiv.org/abs/1205.3180v1 17017," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",manfred kerber,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 17018," We present an original theorem in auction theory: it specifies general conditions under which the sum of the payments of all bidders is necessarily not identically zero, and more generally not constant. Moreover, it explicitly supplies a construction for a finite minimal set of possible bids on which such a sum is not constant. In particular, this theorem applies to the important case of a second-price Vickrey auction, where it reduces to a basic result of which a novel proof is given. To enhance the confidence in this new theorem, it has been formalized in Isabelle/HOL: the main results and definitions of the formal proof are re- produced here in common mathematical language, and are accompanied by an informal discussion about the underlying ideas. ",colin rowat,,2014.0,,arXiv,Caminati2014,True,,arXiv,Not available,Budget Imbalance Criteria for Auctions: A Formalized Theorem,13e50c2afc4150b74b88760002978e9e,http://arxiv.org/abs/1412.0542v1 17019," Real-time bidding (RTB) has become a new norm in display advertising where a publisher uses auction models to sell online user's page view to advertisers. In RTB, the ad with the highest bid price will be displayed to the user. This ad displaying process is biased towards the publisher. In fact, the benefits of the advertiser and the user have been rarely discussed. Towards the global optimization, we argue that all stakeholders' benefits should be considered. To this end, we propose a novel computation framework where multimedia techniques and auction theory are integrated. This doctoral research mainly focus on 1) figuring out the multimedia metrics that affect the effectiveness of online advertising; 2) integrating the discovered metrics into the RTB framework. We have presented some preliminary results and discussed the future directions. ",xiang chen,,2018.0,10.1145/3123266.3123966,arXiv,Chen2018,True,,arXiv,Not available,"Towards Global Optimization in Display Advertising by Integrating Multimedia Metrics with Real-Time Bidding",f07a7b8e69e075d3414f0b9e2c29c019,http://arxiv.org/abs/1805.08632v1 17020," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",yang cai,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 17021," We provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multi-item multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical monotone hazard rate (MHR) distributions. For non-i.i.d. bidders, we also provide a PTAS when the number of bidders is small. Prior to our work, even for a single bidder, only constant factor approximations are known. Another appealing feature of our mechanism is the simple allocation rule. Indeed, the mechanism we use is either the second-price auction with reserve price on every item individually, or VCG allocation with a few outlying items that requires additional treatments. It is surprising that such simple allocation rules suffice to obtain nearly optimal revenue. ",zhiyi huang,,2012.0,,arXiv,Cai2012,True,,arXiv,Not available,Simple and Nearly Optimal Multi-Item Auctions,23a06439d9a36630ce3595f638453e8a,http://arxiv.org/abs/1210.3560v2 17022," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",craig boutilier,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 17023," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",moises goldszmidt,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 17024," Market-based mechanisms such as auctions are being studied as an appropriate means for resource allocation in distributed and mulitagent decision problems. When agents value resources in combination rather than in isolation, they must often deliberate about appropriate bidding strategies for a sequence of auctions offering resources of interest. We briefly describe a discrete dynamic programming model for constructing appropriate bidding policies for resources exhibiting both complementarities and substitutability. We then introduce a continuous approximation of this model, assuming that money (or the numeraire good) is infinitely divisible. Though this has the potential to reduce the computational cost of computing policies, value functions in the transformed problem do not have a convenient closed form representation. We develop {em grid-based} approximation for such value functions, representing value functions using piecewise linear approximations. We show that these methods can offer significant computational savings with relatively small cost in solution quality. ",bikash sabata,,2013.0,,arXiv,Boutilier2013,True,,arXiv,Not available,Continuous Value Function Approximation for Sequential Bidding Policies,a3a7d0aab9b19eceaed8c6be1f19819d,http://arxiv.org/abs/1301.6682v1 17025," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",michael kearns,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 17026," We report the results of a computational study of repacking in the FCC Incentive Auctions. Our interest lies in the structure and constraints of the solution space of feasible repackings. Our analyses are ""mechanism-free"", in the sense that they identify constraints that must hold regardless of the reverse auction mechanism chosen or the prices offered for broadcaster clearing. We examine topics such as the amount of spectrum that can be cleared nationwide, the geographic distribution of broadcaster clearings required to reach a clearing target, and the likelihood of reaching clearing targets under various models for broadcaster participation. Our study uses FCC interference data and a satisfiability-checking approach, and elucidates both the unavoidable mathematical constraints on solutions imposed by interference, as well as additional constraints imposed by assumptions on the participation decisions of broadcasters. ",lili dworkin,,2014.0,,arXiv,Kearns2014,True,,arXiv,Not available,"A Computational Study of Feasible Repackings in the FCC Incentive Auctions",529ff1e694e352d693e588f76bbc109d,http://arxiv.org/abs/1406.4837v1 17027," We introduce a general representation of large-population games in which each player s influence ON the others IS centralized AND limited, but may otherwise be arbitrary.This representation significantly generalizes the class known AS congestion games IN a natural way.Our main results are provably correct AND efficient algorithms FOR computing AND learning approximate Nash equilibria IN this general framework. ",michael kearns,,2012.0,,arXiv,Kearns2012,True,,arXiv,Not available,"Efficient Nash Computation in Large Population Games with Bounded Influence",31a77c697d61031a4cf69450b1e93b59,http://arxiv.org/abs/1301.0577v1 17028," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",mehryar mohri,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 17029," We present an extensive analysis of the key problem of learning optimal reserve prices for generalized second price auctions. We describe two algorithms for this task: one based on density estimation, and a novel algorithm benefiting from solid theoretical guarantees and with a very favorable running-time complexity of $O(n S \log (n S))$, where $n$ is the sample size and $S$ the number of slots. Our theoretical guarantees are more favorable than those previously presented in the literature. Additionally, we show that even if bidders do not play at an equilibrium, our second algorithm is still well defined and minimizes a quantity of interest. To our knowledge, this is the first attempt to apply learning algorithms to the problem of reserve price optimization in GSP auctions. Finally, we present the first convergence analysis of empirical equilibrium bidding functions to the unique symmetric Bayesian-Nash equilibrium of a GSP. ",andres medina,,2015.0,,arXiv,Mohri2015,True,,arXiv,Not available,"Non-parametric Revenue Optimization for Generalized Second Price Auctions",7721fac6429813da80effd0c21197ff4,http://arxiv.org/abs/1506.02719v1 17030," Group-buying auction has become a popular marketing strategy in the last decade. In this paper, a stochastic model is developed for an inventory system subjects to demands from group-buying auctions. The model discussed here takes into the account of the costs of inventory, transportation, dispatching and re-order as well as the penalty cost of non-successful auctions. Since a new cycle begins whenever there is a replenishment of products, the long-run average costs of the model can be obtained by using the renewal theory. A closed form solution of the optimal replenishment quantity is also derived. ",allen tai,,2012.0,,arXiv,Tai2012,True,,arXiv,Not available,An inventory model for group-buying auction,ffe5bb0a189b9f28af95ff3a5c606568,http://arxiv.org/abs/1212.3541v1 17031," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",kay-yut chen,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 17032," We describe human-subject laboratory experiments on probabilistic auctions based on previously proposed auction protocols involving the simulated manipulation and communication of quantum states. These auctions are probabilistic in determining which bidder wins, or having no winner, rather than always having the highest bidder win. Comparing two quantum protocols in the context of first-price sealed bid auctions, we find the one predicted to be superior by game theory also performs better experimentally. We also compare with a conventional first price auction, which gives higher performance. Thus to provide benefits, the quantum protocol requires more complex economic scenarios such as maintaining privacy of bids over a series of related auctions or involving allocative externalities. ",tad hogg,,2007.0,,Quantum Information Processing 7:139-152 (2008),Chen2007,True,,arXiv,Not available,Experiments with Probabilistic Quantum Auctions,c67ee9e4f3e50704e5ba370d8e405bc6,http://arxiv.org/abs/0707.4195v2 17036," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",anand bhalgat,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 17037," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",sreenivas gollapudi,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 17038," We introduce a general representation of large-population games in which each player s influence ON the others IS centralized AND limited, but may otherwise be arbitrary.This representation significantly generalizes the class known AS congestion games IN a natural way.Our main results are provably correct AND efficient algorithms FOR computing AND learning approximate Nash equilibria IN this general framework. ",yishay mansour,,2012.0,,arXiv,Kearns2012,True,,arXiv,Not available,"Efficient Nash Computation in Large Population Games with Bounded Influence",31a77c697d61031a4cf69450b1e93b59,http://arxiv.org/abs/1301.0577v1 17039," We show that the multiplicative weight update method provides a simple recipe for designing and analyzing optimal Bayesian Incentive Compatible (BIC) auctions, and reduces the time complexity of the problem to pseudo-polynomial in parameters that depend on single agent instead of depending on the size of the joint type space. We use this framework to design computationally efficient optimal auctions that satisfy ex-post Individual Rationality in the presence of constraints such as (hard, private) budgets and envy-freeness. We also design optimal auctions when buyers and a seller's utility functions are non-linear. Scenarios with such functions include (a) auctions with ""quitting rights"", (b) cost to borrow money beyond budget, (c) a seller's and buyers' risk aversion. Finally, we show how our framework also yields optimal auctions for variety of auction settings considered in Cai et al, Alaei et al, albeit with pseudo-polynomial running times. ",kamesh munagala,,2012.0,,arXiv,Bhalgat2012,True,,arXiv,Not available,Optimal Auctions via the Multiplicative Weight Method,e16b45ae03f0524fe1c821c46f6dcc2b,http://arxiv.org/abs/1211.1699v3 17040," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",h. mcmahan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 17041," Calibration is a basic property for prediction systems, and algorithms for achieving it are well-studied in both statistics and machine learning. In many applications, however, the predictions are used to make decisions that select which observations are made. This makes calibration difficult, as adjusting predictions to achieve calibration changes future data. We focus on click-through-rate (CTR) prediction for search ad auctions. Here, CTR predictions are used by an auction that determines which ads are shown, and we want to maximize the value generated by the auction. We show that certain natural notions of calibration can be impossible to achieve, depending on the details of the auction. We also show that it can be impossible to maximize auction efficiency while using calibrated predictions. Finally, we give conditions under which calibration is achievable and simultaneously maximizes auction efficiency: roughly speaking, bids and queries must not contain information about CTRs that is not already captured by the predictions. ",omkar muralidharan,,2012.0,,arXiv,McMahan2012,True,,arXiv,Not available,On Calibrated Predictions for Auction Selection Mechanisms,ec434173b4875a963a3f635f26281c3e,http://arxiv.org/abs/1211.3955v1 17042," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",marco caminati,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 17043," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",manfred kerber,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 17044," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",christoph lange,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 17045," Using mechanised reasoning we prove that combinatorial Vickrey auctions are soundly specified in that they associate a unique outcome (allocation and transfers) to any valid input (bids). Having done so, we auto-generate verified executable code from the formally defined auction. This removes a source of error in implementing the auction design. We intend to use formal methods to verify new auction designs. Here, our contribution is to introduce and demonstrate the use of formal methods for auction verification in the familiar setting of a well-known auction. ",colin rowat,,2013.0,,arXiv,Caminati2013,True,,arXiv,Not available,"Proving soundness of combinatorial Vickrey auctions and generating verified executable code",a28fedb138c9ba1bb520a12eebb3e724,http://arxiv.org/abs/1308.1779v2 17046," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",enrico gerding,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 17047," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",rajdeep dash,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 17048," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",andrew byde,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 17049," In robot games on Z, two players add integers to a counter. Each player has a finite set from which he picks the integer to add, and the objective of the first player is to let the counter reach 0. We present an exponential-time algorithm for deciding the winner of a robot game given the initial counter value, and prove a matching lower bound. ",arjun arul,,2013.0,10.4204/EPTCS.117.9,"EPTCS 117, 2013, pp. 132-148",Arul2013,True,,arXiv,Not available,The Complexity of Robot Games on the Integer Line,8bc1a1591336fb6433657bba36f01b8f,http://arxiv.org/abs/1301.7700v4 17050," We derive optimal strategies for a bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We prove that, if everyone else bids locally in a single auction, the global bidder should always place non-zero bids in all available auctions, provided there are no budget constraints. With a budget, however, the optimal strategy is to bid locally if this budget is equal or less than the valuation. Furthermore, for a wide range of valuation distributions, we prove that the problem of finding the optimal bids reduces to two dimensions if all auctions are identical. Finally, we address markets with both sequential and simultaneous auctions, non-identical auctions, and the allocative efficiency of the market. ",nicholas jennings,,2014.0,10.1613/jair.2544,"Journal Of Artificial Intelligence Research, Volume 32, pages 939-982, 2008",Gerding2014,True,,arXiv,Not available,"Optimal Strategies for Simultaneous Vickrey Auctions with Perfect Substitutes",aec809e941bbd718d64892a9d5afcf91,http://arxiv.org/abs/1401.3433v1 17051," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",he huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 17052," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",xiang-yang li,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 17053," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",yu-e sun,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 17054," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",hongli xu,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 17055," Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. Then, we design two schemes based on PPS separately for 1) the Single-Unit Auction model (SUA), where only single channel to be sold in the spectrum market; and 2) the Multi-Unit Auction model (MUA), where the primary user subleases multi-unit channels to the secondary users and each of the secondary users wants to access multi-unit channels either. Since the social efficiency maximization problem is NP-hard in both auction models, we present allocation mechanisms with approximation factors of $(1+\epsilon)$ and 32 separately for SUA and MUA, and further judiciously design strategyproof auction mechanisms with privacy preserving based on them. Our extensive evaluations show that our mechanisms achieve good social efficiency and with low computation and communication overhead. ",liusheng huang,,2013.0,,arXiv,Huang2013,True,,arXiv,Not available,"PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms",39b3fa78e7107dad7c9d6617065dae41,http://arxiv.org/abs/1307.7792v1 17056," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dengji zhao,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 17057," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",dongmo zhang,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 17058," In this paper, we study online double auctions, where multiple sellers and multiple buyers arrive and depart dynamically to exchange one commodity. We show that there is no deterministic online double auction that is truthful and competitive for maximising social welfare in an adversarial model. However, given the prior information that sellers are patient and the demand is not more than the supply, a deterministic and truthful greedy mechanism is actually 2-competitive, i.e. it guarantees that the social welfare of its allocation is at least half of the optimal one achievable offline. Moreover, if the number of incoming buyers is predictable, we demonstrate that an online double auction can be reduced to an online one-sided auction, and the truthfulness and competitiveness of the reduced online double auction follow that of the online one-sided auction. Notably, by using the reduction, we find a truthful mechanism that is almost 1-competitive, when buyers arrive randomly. Finally, we argue that these mechanisms also have a promising applicability in more general settings without assuming that sellers are patient, by decomposing a market into multiple sub-markets. ",laurent perrussel,,2013.0,,arXiv,Zhao2013,True,,arXiv,Not available,Decomposing Truthful and Competitive Online Double Auctions,152bfc45e8a40537cc0bc683a0781adf,http://arxiv.org/abs/1311.0198v1 17059," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",pinyan lu,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 17060," In robot games on Z, two players add integers to a counter. Each player has a finite set from which he picks the integer to add, and the objective of the first player is to let the counter reach 0. We present an exponential-time algorithm for deciding the winner of a robot game given the initial counter value, and prove a matching lower bound. ",julien reichert,,2013.0,10.4204/EPTCS.117.9,"EPTCS 117, 2013, pp. 132-148",Arul2013,True,,arXiv,Not available,The Complexity of Robot Games on the Integer Line,8bc1a1591336fb6433657bba36f01b8f,http://arxiv.org/abs/1301.7700v4 17061," We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of agents by any truthful mechanism. Thus, we follow a recent work by Dobzinski and Leme (ICALP 2014) to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budget. We design a new truthful auction with an approximation ratio of $\frac{\sqrt{5}+1}{2} \approx 1.618$, improving the best previous ratio of $2$ when the budgets for agents are public knowledge and their valuation is linear (additive). In private budget setting, we propose the first constant approximation auction with approximation ratio of $34$. Moreover, this auction works for any valuation function. Previously, only $O(\log n)$ approximation was known for linear and decreasing marginal (concave) valuations, and $O(\log^2 n)$ approximation was known for sub-additive valuations. ",tao xiao,,2014.0,,arXiv,Lu2014,True,,arXiv,Not available,Improved Efficiency Guarantees in Auctions with Budgets,a229d8cbe218f6b2e8bff76900396b6f,http://arxiv.org/abs/1407.8325v3 17062," Parsimonious games are a subset of constant sum homogeneous weighted majority games unequivocally described by their free type representation vector. We show that the minimal winning quota of parsimonious games satisfies a second order, linear, homogeneous, finite difference equation with nonconstant coefficients except for uniform games. We provide the solution of such an equation which may be thought as the generalized version of the polynomial expansion of a proper k-Fibonacci sequence. In addition we show that the minimal winning quota is a symmetric function of the representation vector; exploiting this property it is straightforward to prove that twin Parsimonious games, i.e. a couple of games whose free type representations are each other symmetric, share the same minimal winning quota. ",flavio pressacco,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,K-Fibonacci sequences and minimal winning quota in Parsimonious game,8ee91110be0f5e3eaf001f536384be13,http://arxiv.org/abs/1402.5102v1 17063," Parsimonious games are a subset of constant sum homogeneous weighted majority games unequivocally described by their free type representation vector. We show that the minimal winning quota of parsimonious games satisfies a second order, linear, homogeneous, finite difference equation with nonconstant coefficients except for uniform games. We provide the solution of such an equation which may be thought as the generalized version of the polynomial expansion of a proper k-Fibonacci sequence. In addition we show that the minimal winning quota is a symmetric function of the representation vector; exploiting this property it is straightforward to prove that twin Parsimonious games, i.e. a couple of games whose free type representations are each other symmetric, share the same minimal winning quota. ",giacomo plazzotta,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,K-Fibonacci sequences and minimal winning quota in Parsimonious game,8ee91110be0f5e3eaf001f536384be13,http://arxiv.org/abs/1402.5102v1 17064," Parsimonious games are a subset of constant sum homogeneous weighted majority games unequivocally described by their free type representation vector. We show that the minimal winning quota of parsimonious games satisfies a second order, linear, homogeneous, finite difference equation with nonconstant coefficients except for uniform games. We provide the solution of such an equation which may be thought as the generalized version of the polynomial expansion of a proper k-Fibonacci sequence. In addition we show that the minimal winning quota is a symmetric function of the representation vector; exploiting this property it is straightforward to prove that twin Parsimonious games, i.e. a couple of games whose free type representations are each other symmetric, share the same minimal winning quota. ",laura ziani,,2014.0,,arXiv,Pressacco2014,True,,arXiv,Not available,K-Fibonacci sequences and minimal winning quota in Parsimonious game,8ee91110be0f5e3eaf001f536384be13,http://arxiv.org/abs/1402.5102v1 17065," Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted. Examples of undecidable cases typically feature a situation where players become uncertain about the current state of the game, and this uncertainty lasts forever. Here we consider games where the players attain certainty about the current state over and over again along any play. For finite-state games, we note that this kind of recurring certainty implies a stronger condition of periodic certainty, that is, the events of state certainty ultimately occur at uniform, regular intervals. We show that it is decidable whether a given game presents recurring certainty, and that, if so, the problem of synthesising coordination strategies under w-regular winning conditions is solvable. ",dietmar berwanger,,2014.0,10.4204/EPTCS.146.12,"EPTCS 146, 2014, pp. 91-96",Berwanger2014,True,,arXiv,Not available,Games with recurring certainty,1ece7ce2a1648b45c2d1641806c81533,http://arxiv.org/abs/1404.7770v1 17066," Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted. Examples of undecidable cases typically feature a situation where players become uncertain about the current state of the game, and this uncertainty lasts forever. Here we consider games where the players attain certainty about the current state over and over again along any play. For finite-state games, we note that this kind of recurring certainty implies a stronger condition of periodic certainty, that is, the events of state certainty ultimately occur at uniform, regular intervals. We show that it is decidable whether a given game presents recurring certainty, and that, if so, the problem of synthesising coordination strategies under w-regular winning conditions is solvable. ",anup mathew,,2014.0,10.4204/EPTCS.146.12,"EPTCS 146, 2014, pp. 91-96",Berwanger2014,True,,arXiv,Not available,Games with recurring certainty,1ece7ce2a1648b45c2d1641806c81533,http://arxiv.org/abs/1404.7770v1 17067," Secure equilibrium is a refinement of Nash equilibrium, which provides some security to the players against deviations when a player changes his strategy to another best response strategy. The concept of secure equilibrium is specifically developed for assume-guarantee synthesis and has already been applied in this context. Yet, not much is known about its existence in games with more than two players. In this paper, we establish the existence of secure equilibrium in two classes of multi-player perfect information turn-based games: (1) in games with possibly probabilistic transitions, having countable state and finite action spaces and bounded and continuous payoff functions, and (2) in games with only deterministic transitions, having arbitrary state and action spaces and Borel payoff functions with a finite range (in particular, qualitative Borel payoff functions). We show that these results apply to several types of games studied in the literature. ",julie pril,,2014.0,,arXiv,Pril2014,True,,arXiv,Not available,"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information",c226b1b98843430e5b1790ca8315dbe9,http://arxiv.org/abs/1405.1615v1 17068," Secure equilibrium is a refinement of Nash equilibrium, which provides some security to the players against deviations when a player changes his strategy to another best response strategy. The concept of secure equilibrium is specifically developed for assume-guarantee synthesis and has already been applied in this context. Yet, not much is known about its existence in games with more than two players. In this paper, we establish the existence of secure equilibrium in two classes of multi-player perfect information turn-based games: (1) in games with possibly probabilistic transitions, having countable state and finite action spaces and bounded and continuous payoff functions, and (2) in games with only deterministic transitions, having arbitrary state and action spaces and Borel payoff functions with a finite range (in particular, qualitative Borel payoff functions). We show that these results apply to several types of games studied in the literature. ",janos flesch,,2014.0,,arXiv,Pril2014,True,,arXiv,Not available,"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information",c226b1b98843430e5b1790ca8315dbe9,http://arxiv.org/abs/1405.1615v1 17069," Secure equilibrium is a refinement of Nash equilibrium, which provides some security to the players against deviations when a player changes his strategy to another best response strategy. The concept of secure equilibrium is specifically developed for assume-guarantee synthesis and has already been applied in this context. Yet, not much is known about its existence in games with more than two players. In this paper, we establish the existence of secure equilibrium in two classes of multi-player perfect information turn-based games: (1) in games with possibly probabilistic transitions, having countable state and finite action spaces and bounded and continuous payoff functions, and (2) in games with only deterministic transitions, having arbitrary state and action spaces and Borel payoff functions with a finite range (in particular, qualitative Borel payoff functions). We show that these results apply to several types of games studied in the literature. ",jeroen kuipers,,2014.0,,arXiv,Pril2014,True,,arXiv,Not available,"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information",c226b1b98843430e5b1790ca8315dbe9,http://arxiv.org/abs/1405.1615v1 17070," Secure equilibrium is a refinement of Nash equilibrium, which provides some security to the players against deviations when a player changes his strategy to another best response strategy. The concept of secure equilibrium is specifically developed for assume-guarantee synthesis and has already been applied in this context. Yet, not much is known about its existence in games with more than two players. In this paper, we establish the existence of secure equilibrium in two classes of multi-player perfect information turn-based games: (1) in games with possibly probabilistic transitions, having countable state and finite action spaces and bounded and continuous payoff functions, and (2) in games with only deterministic transitions, having arbitrary state and action spaces and Borel payoff functions with a finite range (in particular, qualitative Borel payoff functions). We show that these results apply to several types of games studied in the literature. ",gijs schoenmakers,,2014.0,,arXiv,Pril2014,True,,arXiv,Not available,"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information",c226b1b98843430e5b1790ca8315dbe9,http://arxiv.org/abs/1405.1615v1 17071," The Rock-Paper-Scissors (RPS) game is a widely used model system in game theory. Evolutionary game theory predicts the existence of persistent cycles in the evolutionary trajectories of the RPS game, but experimental evidence has remained to be rather weak. In this work we performed laboratory experiments on the RPS game and analyzed the social-state evolutionary trajectories of twelve populations of N=6 players. We found strong evidence supporting the existence of persistent cycles. The mean cycling frequency was measured to be $0.029 \pm 0.009$ period per experimental round. Our experimental observations can be quantitatively explained by a simple non-equilibrium model, namely the discrete-time logit dynamical process with a noise parameter. Our work therefore favors the evolutionary game theory over the classical game theory for describing the dynamical behavior of the RPS game. ",bin xu,,2013.0,10.1016/j.physa.2013.06.039,"Physica A: Statistical Mechanics and its Applications, Volume 392, Issue 20, 15 October 2013, Pages 4997-5005",Xu2013,True,,arXiv,Not available,"Cycle frequency in standard Rock-Paper-Scissors games: Evidence from experimental economics",2ca365565f2fef4334130062a868dbd3,http://arxiv.org/abs/1301.3238v3 17072," Secure equilibrium is a refinement of Nash equilibrium, which provides some security to the players against deviations when a player changes his strategy to another best response strategy. The concept of secure equilibrium is specifically developed for assume-guarantee synthesis and has already been applied in this context. Yet, not much is known about its existence in games with more than two players. In this paper, we establish the existence of secure equilibrium in two classes of multi-player perfect information turn-based games: (1) in games with possibly probabilistic transitions, having countable state and finite action spaces and bounded and continuous payoff functions, and (2) in games with only deterministic transitions, having arbitrary state and action spaces and Borel payoff functions with a finite range (in particular, qualitative Borel payoff functions). We show that these results apply to several types of games studied in the literature. ",koos vrieze,,2014.0,,arXiv,Pril2014,True,,arXiv,Not available,"Existence of Secure Equilibrium in Multi-Player Games with Perfect Information",c226b1b98843430e5b1790ca8315dbe9,http://arxiv.org/abs/1405.1615v1 17073," We prove that finding an $\epsilon$-approximate Nash equilibrium is PPAD-complete for constant $\epsilon$ and a particularly simple class of games: polymatrix, degree 3 graphical games, in which each player has only two actions. As corollaries, we also prove similar inapproximability results for Bayesian Nash equilibrium in a two-player incomplete information game with a constant number of actions, for relative $\epsilon$-Well Supported Nash Equilibrium in a two-player game, for market equilibrium in a non-monotone market, for the generalized circuit problem defined by Chen, Deng, and Teng [CDT'09], and for approximate competitive equilibrium from equal incomes with indivisible goods. ",aviad rubinstein,,2014.0,,arXiv,Rubinstein2014,True,,arXiv,Not available,Inapproximability of Nash Equilibrium,192eba199624170d96d743ddde9782f6,http://arxiv.org/abs/1405.3322v5 17074," Dynamic zero-sum games are an important class of problems with applications ranging from evasion-pursuit and heads-up poker to certain adversarial versions of control problems such as multi-armed bandit and multiclass queuing problems. These games are generally very difficult to solve even when one player's strategy is fixed, and so constructing and evaluating good sub-optimal policies for each player is an important practical problem. In this paper, we propose the use of information relaxations to construct dual lower and upper bounds on the optimal value of the game. We note that the information relaxation approach, which has been developed and applied successfully to many large-scale dynamic programming problems, applies immediately to zero-sum game problems. We provide some simple numerical examples and identify interesting issues and complications that arise in the context of zero-sum games. ",martin haugh,,2014.0,,arXiv,Haugh2014,True,,arXiv,Not available,Information Relaxations and Dynamic Zero-Sum Games,e5d921a05e2efb95d47f46df0518c058,http://arxiv.org/abs/1405.4347v2 17075," Dynamic zero-sum games are an important class of problems with applications ranging from evasion-pursuit and heads-up poker to certain adversarial versions of control problems such as multi-armed bandit and multiclass queuing problems. These games are generally very difficult to solve even when one player's strategy is fixed, and so constructing and evaluating good sub-optimal policies for each player is an important practical problem. In this paper, we propose the use of information relaxations to construct dual lower and upper bounds on the optimal value of the game. We note that the information relaxation approach, which has been developed and applied successfully to many large-scale dynamic programming problems, applies immediately to zero-sum game problems. We provide some simple numerical examples and identify interesting issues and complications that arise in the context of zero-sum games. ",chun wang,,2014.0,,arXiv,Haugh2014,True,,arXiv,Not available,Information Relaxations and Dynamic Zero-Sum Games,e5d921a05e2efb95d47f46df0518c058,http://arxiv.org/abs/1405.4347v2 17076," We present a new tool for verification of modal mu-calculus formulae for process specifications, based on symbolic parity games. It enhances an existing method, that first encodes the problem to a Parameterised Boolean Equation System (PBES) and then instantiates the PBES to a parity game. We improved the translation from specification to PBES to preserve the structure of the specification in the PBES, we extended LTSmin to instantiate PBESs to symbolic parity games, and implemented the recursive parity game solving algorithm by Zielonka for symbolic parity games. We use Multi-valued Decision Diagrams (MDDs) to represent sets and relations, thus enabling the tools to deal with very large systems. The transition relation is partitioned based on the structure of the specification, which allows for efficient manipulation of the MDDs. We performed two case studies on modular specifications, that demonstrate that the new method has better time and memory performance than existing PBES based tools and can be faster (but slightly less memory efficient) than the symbolic model checker NuSMV. ",gijs kant,,2014.0,10.4204/EPTCS.159.2,"EPTCS 159, 2014, pp. 2-14",Kant2014,True,,arXiv,Not available,Generating and Solving Symbolic Parity Games,a94e2c4dc1dc0474d18d23bc43c96372,http://arxiv.org/abs/1407.7928v1 17077," We present a new tool for verification of modal mu-calculus formulae for process specifications, based on symbolic parity games. It enhances an existing method, that first encodes the problem to a Parameterised Boolean Equation System (PBES) and then instantiates the PBES to a parity game. We improved the translation from specification to PBES to preserve the structure of the specification in the PBES, we extended LTSmin to instantiate PBESs to symbolic parity games, and implemented the recursive parity game solving algorithm by Zielonka for symbolic parity games. We use Multi-valued Decision Diagrams (MDDs) to represent sets and relations, thus enabling the tools to deal with very large systems. The transition relation is partitioned based on the structure of the specification, which allows for efficient manipulation of the MDDs. We performed two case studies on modular specifications, that demonstrate that the new method has better time and memory performance than existing PBES based tools and can be faster (but slightly less memory efficient) than the symbolic model checker NuSMV. ",jaco pol,,2014.0,10.4204/EPTCS.159.2,"EPTCS 159, 2014, pp. 2-14",Kant2014,True,,arXiv,Not available,Generating and Solving Symbolic Parity Games,a94e2c4dc1dc0474d18d23bc43c96372,http://arxiv.org/abs/1407.7928v1 17078," We study a game with \emph{strategic} vendors who own multiple items and a single buyer with a submodular valuation function. The goal of the vendors is to maximize their revenue via pricing of the items, given that the buyer will buy the set of items that maximizes his net payoff. We show this game may not always have a pure Nash equilibrium, in contrast to previous results for the special case where each vendor owns a single item. We do so by relating our game to an intermediate, discrete game in which the vendors only choose the available items, and their prices are set exogenously afterwards. We further make use of the intermediate game to provide tight bounds on the price of anarchy for the subset games that have pure Nash equilibria; we find that the optimal PoA reached in the previous special cases does not hold, but only a logarithmic one. Finally, we show that for a special case of submodular functions, efficient pure Nash equilibria always exist. ",omer lev,,2014.0,,arXiv,Lev2014,True,,arXiv,Not available,The Pricing War Continues: On Competitive Multi-Item Pricing,792f641016203119a075a13a64709e13,http://arxiv.org/abs/1408.0258v1 17079," We study a game with \emph{strategic} vendors who own multiple items and a single buyer with a submodular valuation function. The goal of the vendors is to maximize their revenue via pricing of the items, given that the buyer will buy the set of items that maximizes his net payoff. We show this game may not always have a pure Nash equilibrium, in contrast to previous results for the special case where each vendor owns a single item. We do so by relating our game to an intermediate, discrete game in which the vendors only choose the available items, and their prices are set exogenously afterwards. We further make use of the intermediate game to provide tight bounds on the price of anarchy for the subset games that have pure Nash equilibria; we find that the optimal PoA reached in the previous special cases does not hold, but only a logarithmic one. Finally, we show that for a special case of submodular functions, efficient pure Nash equilibria always exist. ",joel oren,,2014.0,,arXiv,Lev2014,True,,arXiv,Not available,The Pricing War Continues: On Competitive Multi-Item Pricing,792f641016203119a075a13a64709e13,http://arxiv.org/abs/1408.0258v1 17080," We study a game with \emph{strategic} vendors who own multiple items and a single buyer with a submodular valuation function. The goal of the vendors is to maximize their revenue via pricing of the items, given that the buyer will buy the set of items that maximizes his net payoff. We show this game may not always have a pure Nash equilibrium, in contrast to previous results for the special case where each vendor owns a single item. We do so by relating our game to an intermediate, discrete game in which the vendors only choose the available items, and their prices are set exogenously afterwards. We further make use of the intermediate game to provide tight bounds on the price of anarchy for the subset games that have pure Nash equilibria; we find that the optimal PoA reached in the previous special cases does not hold, but only a logarithmic one. Finally, we show that for a special case of submodular functions, efficient pure Nash equilibria always exist. ",craig boutilier,,2014.0,,arXiv,Lev2014,True,,arXiv,Not available,The Pricing War Continues: On Competitive Multi-Item Pricing,792f641016203119a075a13a64709e13,http://arxiv.org/abs/1408.0258v1 17081," We study a game with \emph{strategic} vendors who own multiple items and a single buyer with a submodular valuation function. The goal of the vendors is to maximize their revenue via pricing of the items, given that the buyer will buy the set of items that maximizes his net payoff. We show this game may not always have a pure Nash equilibrium, in contrast to previous results for the special case where each vendor owns a single item. We do so by relating our game to an intermediate, discrete game in which the vendors only choose the available items, and their prices are set exogenously afterwards. We further make use of the intermediate game to provide tight bounds on the price of anarchy for the subset games that have pure Nash equilibria; we find that the optimal PoA reached in the previous special cases does not hold, but only a logarithmic one. Finally, we show that for a special case of submodular functions, efficient pure Nash equilibria always exist. ",jeffery rosenschein,,2014.0,,arXiv,Lev2014,True,,arXiv,Not available,The Pricing War Continues: On Competitive Multi-Item Pricing,792f641016203119a075a13a64709e13,http://arxiv.org/abs/1408.0258v1 17082," We study an ensemble of individuals playing the two games of the so-called Parrondo paradox. In our study, players are allowed to choose the game to be played by the whole ensemble in each turn. The choice cannot conform to the preferences of all the players and, consequently, they face a simple frustration phenomenon that requires some strategy to make a collective decision. We consider several such strategies and analyze how fluctuations can be used to improve the performance of the system. ",e. garcia-torano,,2014.0,10.1140/epjst/e2007-00068-0,"Eur. Phys. J. Special Topics 143, 39 (2007)",Parrondo2014,True,,arXiv,Not available,Collective decision making and paradoxical games,c655f281edf34ee886edc2b09cf69f10,http://arxiv.org/abs/1410.0241v1 17083," The Rock-Paper-Scissors (RPS) game is a widely used model system in game theory. Evolutionary game theory predicts the existence of persistent cycles in the evolutionary trajectories of the RPS game, but experimental evidence has remained to be rather weak. In this work we performed laboratory experiments on the RPS game and analyzed the social-state evolutionary trajectories of twelve populations of N=6 players. We found strong evidence supporting the existence of persistent cycles. The mean cycling frequency was measured to be $0.029 \pm 0.009$ period per experimental round. Our experimental observations can be quantitatively explained by a simple non-equilibrium model, namely the discrete-time logit dynamical process with a noise parameter. Our work therefore favors the evolutionary game theory over the classical game theory for describing the dynamical behavior of the RPS game. ",hai-jun zhou,,2013.0,10.1016/j.physa.2013.06.039,"Physica A: Statistical Mechanics and its Applications, Volume 392, Issue 20, 15 October 2013, Pages 4997-5005",Xu2013,True,,arXiv,Not available,"Cycle frequency in standard Rock-Paper-Scissors games: Evidence from experimental economics",2ca365565f2fef4334130062a868dbd3,http://arxiv.org/abs/1301.3238v3 17084," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",anna pappa,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17085," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",niraj kumar,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17086," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",thomas lawson,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17087," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",miklos santha,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17088," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",shengyu zhang,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17089," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",eleni diamanti,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17090," Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple conflicting interest game, where quantum strategies outperform classical ones. Moreover, we show that our game has a fair quantum equilibrium with higher payoffs for both players than in any fair classical equilibrium. Finally, we play the game using a commercial entangled photon source and demonstrate experimentally the quantum advantage. ",iordanis kerenidis,,2014.0,10.1103/PhysRevLett.114.020401,"Phys. Rev. Lett. 114, 020401 (2015)",Pappa2014,True,,arXiv,Not available,Nonlocality and conflicting interest games,03d69aa3049628b271a8a8dfb4ebba7d,http://arxiv.org/abs/1408.3281v3 17091," We revisit in this paper the relation between evolution of species and the mathematical tool of evolutionary games, which has been used to model and predict it. We indicate known shortcoming of this model that restricts the capacity of evolutionary games to model groups of individuals that share a common gene or a common fitness function. In this paper we provide a new concept to remedy this shortcoming in the standard evolutionary games in order to cover this kind of behavior. Further, we explore the relationship between this new concept and Nash equilibrium or ESS. We indicate through the study of some example in the biology as Hawk and Dove game, Stag Hunt Game and Prisoner Dilemma, that when taking into account a utility that is common to a group of individuals, the equilibrium structure may change dramatically. We also study the multiple access control in slotted Aloha based wireless networks. We analyze the impact of the altruism behavior on the performance at the equilibrium. ",ilaria brunetti,,2014.0,,arXiv,Brunetti2014,True,,arXiv,Not available,Altruism in groups: an evolutionary games approach,81fbe9038ff8a8c4e5bc83d2049535f4,http://arxiv.org/abs/1409.7288v2 17092," We revisit in this paper the relation between evolution of species and the mathematical tool of evolutionary games, which has been used to model and predict it. We indicate known shortcoming of this model that restricts the capacity of evolutionary games to model groups of individuals that share a common gene or a common fitness function. In this paper we provide a new concept to remedy this shortcoming in the standard evolutionary games in order to cover this kind of behavior. Further, we explore the relationship between this new concept and Nash equilibrium or ESS. We indicate through the study of some example in the biology as Hawk and Dove game, Stag Hunt Game and Prisoner Dilemma, that when taking into account a utility that is common to a group of individuals, the equilibrium structure may change dramatically. We also study the multiple access control in slotted Aloha based wireless networks. We analyze the impact of the altruism behavior on the performance at the equilibrium. ",rachid el-azouzi,,2014.0,,arXiv,Brunetti2014,True,,arXiv,Not available,Altruism in groups: an evolutionary games approach,81fbe9038ff8a8c4e5bc83d2049535f4,http://arxiv.org/abs/1409.7288v2 17093," We revisit in this paper the relation between evolution of species and the mathematical tool of evolutionary games, which has been used to model and predict it. We indicate known shortcoming of this model that restricts the capacity of evolutionary games to model groups of individuals that share a common gene or a common fitness function. In this paper we provide a new concept to remedy this shortcoming in the standard evolutionary games in order to cover this kind of behavior. Further, we explore the relationship between this new concept and Nash equilibrium or ESS. We indicate through the study of some example in the biology as Hawk and Dove game, Stag Hunt Game and Prisoner Dilemma, that when taking into account a utility that is common to a group of individuals, the equilibrium structure may change dramatically. We also study the multiple access control in slotted Aloha based wireless networks. We analyze the impact of the altruism behavior on the performance at the equilibrium. ",eitan altman,,2014.0,,arXiv,Brunetti2014,True,,arXiv,Not available,Altruism in groups: an evolutionary games approach,81fbe9038ff8a8c4e5bc83d2049535f4,http://arxiv.org/abs/1409.7288v2 17094," The Rock-Paper-Scissors (RPS) game is a widely used model system in game theory. Evolutionary game theory predicts the existence of persistent cycles in the evolutionary trajectories of the RPS game, but experimental evidence has remained to be rather weak. In this work we performed laboratory experiments on the RPS game and analyzed the social-state evolutionary trajectories of twelve populations of N=6 players. We found strong evidence supporting the existence of persistent cycles. The mean cycling frequency was measured to be $0.029 \pm 0.009$ period per experimental round. Our experimental observations can be quantitatively explained by a simple non-equilibrium model, namely the discrete-time logit dynamical process with a noise parameter. Our work therefore favors the evolutionary game theory over the classical game theory for describing the dynamical behavior of the RPS game. ",zhijian wang,,2013.0,10.1016/j.physa.2013.06.039,"Physica A: Statistical Mechanics and its Applications, Volume 392, Issue 20, 15 October 2013, Pages 4997-5005",Xu2013,True,,arXiv,Not available,"Cycle frequency in standard Rock-Paper-Scissors games: Evidence from experimental economics",2ca365565f2fef4334130062a868dbd3,http://arxiv.org/abs/1301.3238v3 17095," We study strong equilibria in symmetric capacitated cost-sharing games. In these games, a graph with designated source $s$ and sink $t$ is given, and each edge is associated with some cost. Each agent chooses strategically an $s$-$t$ path, knowing that the cost of each edge is shared equally between all agents using it. Two variants of cost-sharing games have been previously studied: (i) games where coalitions can form, and (ii) games where edges are associated with capacities; both variants are inspired by real-life scenarios. In this work we combine these variants and analyze strong equilibria (profiles where no coalition can deviate) in capacitated games. This combination gives rise to new phenomena that do not occur in the previous variants. Our contribution is two-fold. First, we provide a topological characterization of networks that always admit a strong equilibrium. Second, we establish tight bounds on the efficiency loss that may be incurred due to strategic behavior, as quantified by the strong price of anarchy (and stability) measures. Interestingly, our results are qualitatively different than those obtained in the analysis of each variant alone, and the combination of coalitions and capacities entails the introduction of more refined topology classes than previously studied. ",michal feldman,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Do Capacity Constraints Constrain Coalitions?,2fcb0978720f53779aed16dd1933550c,http://arxiv.org/abs/1411.5712v3 17096," We study strong equilibria in symmetric capacitated cost-sharing games. In these games, a graph with designated source $s$ and sink $t$ is given, and each edge is associated with some cost. Each agent chooses strategically an $s$-$t$ path, knowing that the cost of each edge is shared equally between all agents using it. Two variants of cost-sharing games have been previously studied: (i) games where coalitions can form, and (ii) games where edges are associated with capacities; both variants are inspired by real-life scenarios. In this work we combine these variants and analyze strong equilibria (profiles where no coalition can deviate) in capacitated games. This combination gives rise to new phenomena that do not occur in the previous variants. Our contribution is two-fold. First, we provide a topological characterization of networks that always admit a strong equilibrium. Second, we establish tight bounds on the efficiency loss that may be incurred due to strategic behavior, as quantified by the strong price of anarchy (and stability) measures. Interestingly, our results are qualitatively different than those obtained in the analysis of each variant alone, and the combination of coalitions and capacities entails the introduction of more refined topology classes than previously studied. ",ofir geri,,2014.0,,arXiv,Feldman2014,True,,arXiv,Not available,Do Capacity Constraints Constrain Coalitions?,2fcb0978720f53779aed16dd1933550c,http://arxiv.org/abs/1411.5712v3 17097," Emek et al. presented a model of probabilistic single-item second price auctions where an auctioneer who is informed about the type of an item for sale, broadcasts a signal about this type to uninformed bidders. They proved that finding the optimal (for the purpose of generating revenue) {\em pure} signaling scheme is strongly NP-hard. In contrast, we prove that finding the optimal {\em mixed} signaling scheme can be done in polynomial time using linear programming. For the proof, we show that the problem is strongly related to a problem of optimally bundling divisible goods for auctioning. We also prove that a mixed signaling scheme can in some cases generate twice as much revenue as the best pure signaling scheme and we prove a generally applicable lower bound on the revenue generated by the best mixed signaling scheme. ",peter miltersen,,2012.0,,arXiv,Miltersen2012,True,,arXiv,Not available,"Send Mixed Signals -- Earn More, Work Less",7b313c269e5871f1b8c7943eb1f6cd69,http://arxiv.org/abs/1202.1483v1 17098," Emek et al. presented a model of probabilistic single-item second price auctions where an auctioneer who is informed about the type of an item for sale, broadcasts a signal about this type to uninformed bidders. They proved that finding the optimal (for the purpose of generating revenue) {\em pure} signaling scheme is strongly NP-hard. In contrast, we prove that finding the optimal {\em mixed} signaling scheme can be done in polynomial time using linear programming. For the proof, we show that the problem is strongly related to a problem of optimally bundling divisible goods for auctioning. We also prove that a mixed signaling scheme can in some cases generate twice as much revenue as the best pure signaling scheme and we prove a generally applicable lower bound on the revenue generated by the best mixed signaling scheme. ",or sheffet,,2012.0,,arXiv,Miltersen2012,True,,arXiv,Not available,"Send Mixed Signals -- Earn More, Work Less",7b313c269e5871f1b8c7943eb1f6cd69,http://arxiv.org/abs/1202.1483v1 17099," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",cristina fernandes,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 17100," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",carlos ferreira,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 17101," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",alvaro franco,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 17102," We consider the unit-demand envy-free pricing problem, which is a unit-demand auction where each bidder receives an item that maximizes his utility, and the goal is to maximize the auctioneer's profit. This problem is NP-hard and unlikely to be in APX. We present four new MIP formulations for it and experimentally compare them to a previous one due to Shioda, Tun\c{c}el, and Myklebust. We describe three models to generate different random instances for general unit-demand auctions, that we designed for the computational experiments. Each model has a nice economic interpretation. Aiming approximation results, we consider the variant of the problem where the item prices are restricted to be chosen from a geometric series, and prove that an optimal solution for this variant has value that is a fraction (depending on the series used) of the optimal value of the original problem. So this variant is also unlikely to be in APX. ",rafael schouery,,2013.0,,arXiv,Fernandes2013,True,,arXiv,Not available,The Unit-Demand Envy-Free Pricing Problem,845cbfcbe8e5bfc6a4e881b59c240328,http://arxiv.org/abs/1310.0038v1 17103," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",dan marinescu,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 17104," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",ashkan paya,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 17105," The game-theoretic risk management framework put forth in the precursor work ""Towards a Theory of Games with Payoffs that are Probability-Distributions"" (arXiv:1506.07368 [q-fin.EC]) is herein extended by algorithmic details on how to compute equilibria in games where the payoffs are probability distributions. Our approach is ""data driven"" in the sense that we assume empirical data (measurements, simulation, etc.) to be available that can be compiled into distribution models, which are suitable for efficient decisions about preferences, and setting up and solving games using these as payoffs. While preferences among distributions turn out to be quite simple if nonparametric methods (kernel density estimates) are used, computing Nash-equilibria in games using such models is discovered as inefficient (if not impossible). In fact, we give a counterexample in which fictitious play fails to converge for the (specifically unfortunate) choice of payoff distributions in the game, and introduce a suitable tail approximation of the payoff densities to tackle the issue. The overall procedure is essentially a modified version of fictitious play, and is herein described for standard and multicriteria games, to iteratively deliver an (approximate) Nash-equilibrium. ",stefan rass,,2015.0,,arXiv,Rass2015,True,,arXiv,Not available,"On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs",ef019ca1ec22eefe3c5d9313ac0f5c84,http://arxiv.org/abs/1511.08591v1 17106," In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. ",john morrison,,2014.0,,arXiv,Marinescu2014,True,,arXiv,Not available,"Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing",6b78f2f71b122eb52dc94de14258cc96,http://arxiv.org/abs/1406.7487v3 17107," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",yang cai,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 17108," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",constantinos daskalakis,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 17109," We provide a constructive proof of Border's theorem [Bor91, HR15a] and its generalization to reduced-form auctions with asymmetric bidders [Bor07, MV10, CKM13]. Given a reduced form, we identify a subset of Border constraints that are necessary and sufficient to determine its feasibility. Importantly, the number of these constraints is linear in the total number of bidder types. In addition, we provide a characterization result showing that every feasible reduced form can be induced by an ex-post allocation rule that is a distribution over ironings of the same total ordering of the union of all bidders' types. We show how to leverage our results for single-item reduced forms to design auctions with heterogeneous items and asymmetric bidders with valuations that are additive over items. Appealing to our constructive Border's theorem, we obtain polynomial-time algorithms for computing the revenue-optimal auction. Appealing to our characterization of feasible reduced forms, we characterize feasible multi-item allocation rules. ",s. weinberg,,2011.0,,arXiv,Cai2011,True,,arXiv,Not available,"A Constructive Approach to Reduced-Form Auctions with Applications to Multi-Item Mechanism Design",c41e508484554972f471c2a58031ce6b,http://arxiv.org/abs/1112.4572v2 17110," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",jacob abernethy,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 17111," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",sebastien lahaie,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 17112," We study a class of iterative combinatorial auctions which can be viewed as subgradient descent methods for the problem of pricing bundles to balance supply and demand. We provide concrete convergence rates for auctions in this class, bounding the number of auction rounds needed to reach clearing prices. Our analysis allows for a variety of pricing schemes, including item, bundle, and polynomial pricing, and the respective convergence rates confirm that more expressive pricing schemes come at the cost of slower convergence. We consider two models of bidder behavior. In the first model, bidders behave stochastically according to a random utility model, which includes standard best-response bidding as a special case. In the second model, bidders behave arbitrarily (even adversarially), and meaningful convergence relies on properly designed activity rules. ",matus telgarsky,,2015.0,,arXiv,Abernethy2015,True,,arXiv,Not available,Rate of Price Discovery in Iterative Combinatorial Auctions,c7334ae1c56eee1f13158373e466fc31,http://arxiv.org/abs/1511.06017v2 17113," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",robert kleinberg,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 17114," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",bo waggoner,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 17115," Investigating potential purchases is often a substantial investment under uncertainty. Standard market designs, such as simultaneous or English auctions, compound this with uncertainty about the price a bidder will have to pay in order to win. As a result they tend to confuse the process of search both by leading to wasteful information acquisition on goods that have already found a good purchaser and by discouraging needed investigations of objects, potentially eliminating all gains from trade. In contrast, we show that the Dutch auction preserves all of its properties from a standard setting without information costs because it guarantees, at the time of information acquisition, a price at which the good can be purchased. Calibrations to start-up acquisition and timber auctions suggest that in practice the social losses through poor search coordination in standard formats are an order of magnitude or two larger than the (negligible) inefficiencies arising from ex-ante bidder asymmetries. ",e. weyl,,2016.0,,arXiv,Kleinberg2016,True,,arXiv,Not available,Descending Price Optimally Coordinates Search,e3da2b7ced1e9886b2705741790555d3,http://arxiv.org/abs/1603.07682v3 17116," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The authors have recently proposed a quantum description of financial market in terms of quantum game theory. The paper contain an analysis of such markets that shows that there would be advantage in using quantum computers and quantum strategies. ",edward piotrowski,,2003.0,,arXiv,Piotrowski2003,True,,arXiv,Not available,Quantum computer: an appliance for playing market games,53e1f2dea8335a2a322383370a54f493,http://arxiv.org/abs/quant-ph/0305017v1 17117," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",guillaume basse,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 17118," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",hossein soufiani,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 17119," Buyers (e.g., advertisers) often have limited financial and processing resources, and so their participation in auctions is throttled. Changes to auctions may affect bids or throttling and any change may affect what winners pay. This paper shows that if an A/B experiment affects only bids, then the observed treatment effect is unbiased when all the bidders in an auction are randomly assigned to A or B but it can be severely biased otherwise, even in the absence of throttling. Experiments that affect throttling algorithms can also be badly biased, but the bias can be substantially reduced if the budget for each advertiser in the experiment is allocated to separate pots for the A and B arms of the experiment. ",diane lambert,,2016.0,,arXiv,Basse2016,True,,arXiv,Not available,"Randomization and The Pernicious Effects of Limited Budgets on Auction Experiments",769890534f4756b08d18512f5114bd90,http://arxiv.org/abs/1605.09171v1 17120," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",shiva navabi,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 17121," We study the problem of designing revenue-maximizing auctions for allocating multiple goods to flexible consumers. In our model, each consumer is interested in a subset of goods known as its flexibility set and wants to consume one good from this set. A consumer's flexibility set and its utility from consuming a good from its flexibility set are its private information. We focus on the case of nested flexibility sets --- each consumer's flexibility set can be one of $k$ nested sets. We provide several examples where such nested flexibility sets may arise. We characterize the allocation rule for an incentive compatible, individually rational and revenue-maximizing auction as the solution to an integer program. The corresponding payment rule is described by an integral equation. We then leverage the nestedness of flexibility sets to simplify the optimal auction and provide a complete characterization of allocations and payments in terms of simple thresholds. ",ashutosh nayyar,,2016.0,,arXiv,Navabi2016,True,,arXiv,Not available,Optimal Auction Design for Flexible Consumers,241873d1871430910bdb5c2fdb9e9f0a,http://arxiv.org/abs/1607.02526v4 17122," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",albert lam,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 17123," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",longbo huang,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 17124," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",alonso silva,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 17125," In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs. ",walid saad,,2016.0,10.1109/INFCOMW.2012.6193525,"IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90",Lam2016,True,,arXiv,Not available,"A multi-layer market for vehicle-to-grid energy trading in the smart grid",4b313c31ee1a0701844226cd0863f8c2,http://arxiv.org/abs/1609.01437v1 17127," Recent development in quantum computation and quantum information theory allows to extend the scope of game theory for the quantum world. The authors have recently proposed a quantum description of financial market in terms of quantum game theory. The paper contain an analysis of such markets that shows that there would be advantage in using quantum computers and quantum strategies. ",jan sladkowski,,2003.0,,arXiv,Piotrowski2003,True,,arXiv,Not available,Quantum computer: an appliance for playing market games,53e1f2dea8335a2a322383370a54f493,http://arxiv.org/abs/quant-ph/0305017v1 17129," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",nguyen luong,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 17130," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",zehui xiong,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 17131," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",ping wang,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 17132," Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as a viable solution for offloading the mining tasks from the mobile devices, i.e., miners, in the mobile blockchain environment. However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open. In this paper, we develop an optimal auction based on deep learning for the edge resource allocation. Specifically, we construct a multi-layer neural network architecture based on an analytical solution of the optimal auction. The neural networks first perform monotone transformations of the miners' bids. Then, they calculate allocation and conditional payment rules for the miners. We use valuations of the miners as the data training to adjust parameters of the neural networks so as to optimize the loss function which is the expected, negated revenue of the Edge Computing Service Provider. We show the experimental results to confirm the benefits of using the deep learning for deriving the optimal auction for mobile blockchain with high revenue ",dusit niyato,,2017.0,,arXiv,Luong2017,True,,arXiv,Not available,"Optimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach",a6cbb15dbd9c5cc471ceac74173011c9,http://arxiv.org/abs/1711.02844v2 17133," We consider the problem of a single seller repeatedly selling a single item to a single buyer (specifically, the buyer has a value drawn fresh from known distribution $D$ in every round). Prior work assumes that the buyer is fully rational and will perfectly reason about how their bids today affect the seller's decisions tomorrow. In this work we initiate a different direction: the buyer simply runs a no-regret learning algorithm over possible bids. We provide a fairly complete characterization of optimal auctions for the seller in this domain. Specifically: - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), then the seller can extract expected revenue arbitrarily close to the expected welfare. This auction is independent of the buyer's valuation $D$, but somewhat unnatural as it is sometimes in the buyer's interest to overbid. - There exists a learning algorithm $\mathcal{A}$ such that if the buyer bids according to $\mathcal{A}$ then the optimal strategy for the seller is simply to post the Myerson reserve for $D$ every round. - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), but the seller is restricted to ""natural"" auction formats where overbidding is dominated (e.g. Generalized First-Price or Generalized Second-Price), then the optimal strategy for the seller is a pay-your-bid format with decreasing reserves over time. Moreover, the seller's optimal achievable revenue is characterized by a linear program, and can be unboundedly better than the best truthful auction yet simultaneously unboundedly worse than the expected welfare. ",mark braverman,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,Selling to a No-Regret Buyer,afa9025a209f827cc164357e25036e37,http://arxiv.org/abs/1711.09176v1 17134," We consider the problem of a single seller repeatedly selling a single item to a single buyer (specifically, the buyer has a value drawn fresh from known distribution $D$ in every round). Prior work assumes that the buyer is fully rational and will perfectly reason about how their bids today affect the seller's decisions tomorrow. In this work we initiate a different direction: the buyer simply runs a no-regret learning algorithm over possible bids. We provide a fairly complete characterization of optimal auctions for the seller in this domain. Specifically: - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), then the seller can extract expected revenue arbitrarily close to the expected welfare. This auction is independent of the buyer's valuation $D$, but somewhat unnatural as it is sometimes in the buyer's interest to overbid. - There exists a learning algorithm $\mathcal{A}$ such that if the buyer bids according to $\mathcal{A}$ then the optimal strategy for the seller is simply to post the Myerson reserve for $D$ every round. - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), but the seller is restricted to ""natural"" auction formats where overbidding is dominated (e.g. Generalized First-Price or Generalized Second-Price), then the optimal strategy for the seller is a pay-your-bid format with decreasing reserves over time. Moreover, the seller's optimal achievable revenue is characterized by a linear program, and can be unboundedly better than the best truthful auction yet simultaneously unboundedly worse than the expected welfare. ",jieming mao,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,Selling to a No-Regret Buyer,afa9025a209f827cc164357e25036e37,http://arxiv.org/abs/1711.09176v1 17135," We consider the problem of a single seller repeatedly selling a single item to a single buyer (specifically, the buyer has a value drawn fresh from known distribution $D$ in every round). Prior work assumes that the buyer is fully rational and will perfectly reason about how their bids today affect the seller's decisions tomorrow. In this work we initiate a different direction: the buyer simply runs a no-regret learning algorithm over possible bids. We provide a fairly complete characterization of optimal auctions for the seller in this domain. Specifically: - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), then the seller can extract expected revenue arbitrarily close to the expected welfare. This auction is independent of the buyer's valuation $D$, but somewhat unnatural as it is sometimes in the buyer's interest to overbid. - There exists a learning algorithm $\mathcal{A}$ such that if the buyer bids according to $\mathcal{A}$ then the optimal strategy for the seller is simply to post the Myerson reserve for $D$ every round. - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), but the seller is restricted to ""natural"" auction formats where overbidding is dominated (e.g. Generalized First-Price or Generalized Second-Price), then the optimal strategy for the seller is a pay-your-bid format with decreasing reserves over time. Moreover, the seller's optimal achievable revenue is characterized by a linear program, and can be unboundedly better than the best truthful auction yet simultaneously unboundedly worse than the expected welfare. ",jon schneider,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,Selling to a No-Regret Buyer,afa9025a209f827cc164357e25036e37,http://arxiv.org/abs/1711.09176v1 17136," We consider the problem of a single seller repeatedly selling a single item to a single buyer (specifically, the buyer has a value drawn fresh from known distribution $D$ in every round). Prior work assumes that the buyer is fully rational and will perfectly reason about how their bids today affect the seller's decisions tomorrow. In this work we initiate a different direction: the buyer simply runs a no-regret learning algorithm over possible bids. We provide a fairly complete characterization of optimal auctions for the seller in this domain. Specifically: - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), then the seller can extract expected revenue arbitrarily close to the expected welfare. This auction is independent of the buyer's valuation $D$, but somewhat unnatural as it is sometimes in the buyer's interest to overbid. - There exists a learning algorithm $\mathcal{A}$ such that if the buyer bids according to $\mathcal{A}$ then the optimal strategy for the seller is simply to post the Myerson reserve for $D$ every round. - If the buyer bids according to EXP3 (or any ""mean-based"" learning algorithm), but the seller is restricted to ""natural"" auction formats where overbidding is dominated (e.g. Generalized First-Price or Generalized Second-Price), then the optimal strategy for the seller is a pay-your-bid format with decreasing reserves over time. Moreover, the seller's optimal achievable revenue is characterized by a linear program, and can be unboundedly better than the best truthful auction yet simultaneously unboundedly worse than the expected welfare. ",s. weinberg,,2017.0,,arXiv,Braverman2017,True,,arXiv,Not available,Selling to a No-Regret Buyer,afa9025a209f827cc164357e25036e37,http://arxiv.org/abs/1711.09176v1 17137," Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists to approximate large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders. ",hamidou tembine,,2014.0,,arXiv,Tembine2014,True,,arXiv,Not available,Non-Asymptotic Mean-Field Games,a974311a1f2e668db7edfb68e9a175f0,http://arxiv.org/abs/1404.1449v1 17138," Supermodular games find significant applications in a variety of models, especially in operations research and economic applications of noncooperative game theory, and feature pure strategy Nash equilibria characterized as fixed points of multivalued functions on complete lattices. Pure strategy Nash equilibria of supermodular games are here approximated by resorting to the theory of abstract interpretation, a well established and known framework used for designing static analyses of programming languages. This is obtained by extending the theory of abstract interpretation in order to handle approximations of multivalued functions and by providing some methods for abstracting supermodular games, in order to obtain approximate Nash equilibria which are shown to be correct within the abstract interpretation framework. ",francesco ranzato,,2015.0,,arXiv,Ranzato2015,True,,arXiv,Not available,Abstract Interpretation of Supermodular Games,fc25012572717a267b790712b1ddd2e2,http://arxiv.org/abs/1507.01423v1 17139," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",tad hogg,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 17140," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",pavithra harsha,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 17141," We present a quantum auction protocol using superpositions to represent bids and distributed search to identify the winner(s). Measuring the final quantum state gives the auction outcome while simultaneously destroying the superposition. Thus non-winning bids are never revealed. Participants can use entanglement to arrange for correlations among their bids, with the assurance that this entanglement is not observable by others. The protocol is useful for information hiding applications, such as partnership bidding with allocative externality or concerns about revealing bidding preferences. The protocol applies to a variety of auction types, e.g., first or second price, and to auctions involving either a single item or arbitrary bundles of items (i.e., combinatorial auctions). We analyze the game-theoretical behavior of the quantum protocol for the simple case of a sealed-bid quantum, and show how a suitably designed adiabatic search reduces the possibilities for bidders to game the auction. This design illustrates how incentive rather that computational constraints affect quantum algorithm choices. ",kay-yut chen,,2007.0,,Intl. J. of Quantum Information 5:751-780 (2007),Hogg2007,True,,arXiv,Not available,Quantum Auctions,89ba49c524e6ae40e2d8a1de5b28991d,http://arxiv.org/abs/0704.0800v1 17142," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",jingjing wang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 17143," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",chunxiao jiang,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 17144," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",zhi bie,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 17145," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",tony quek,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 17146," Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory. ",yong ren,,2017.0,,arXiv,Wang2017,True,,arXiv,Not available,"Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction",e9abb205121db3550aa2823e2d19656c,http://arxiv.org/abs/1701.00237v1 17147," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",constantinos daskalakis,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 17148," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",alan deckelbaum,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 17149," We introduce string diagrams as a formal mathematical, graphical language to represent, compose, program and reason about games. The language is well established in quantum physics, quantum computing and quantum linguistic with the semantics given by category theory. We apply this language to the game theoretical setting and show examples how to use it for some economic games where we highlight the compositional nature of our higher-order game theory. ",jules hedges,,2016.0,,arXiv,Hedges2016,True,,arXiv,Not available,Compositionality and String Diagrams for Game Theory,a757b8414bb8a2c0b093952af97c8b6c,http://arxiv.org/abs/1604.06061v1 17150," Myerson's seminal work provides a computationally efficient revenue-optimal auction for selling one item to multiple bidders. Generalizing this work to selling multiple items at once has been a central question in economics and algorithmic game theory, but its complexity has remained poorly understood. We answer this question by showing that a revenue-optimal auction in multi-item settings cannot be found and implemented computationally efficiently, unless ZPP contains P^#P. This is true even for a single additive bidder whose values for the items are independently distributed on two rational numbers with rational probabilities. Our result is very general: we show that it is hard to compute any encoding of an optimal auction of any format (direct or indirect, truthful or non-truthful) that can be implemented in expected polynomial time. In particular, under well-believed complexity-theoretic assumptions, revenue-optimization in very simple multi-item settings can only be tractably approximated. We note that our hardness result applies to randomized mechanisms in a very simple setting, and is not an artifact of introducing combinatorial structure to the problem by allowing correlation among item values, introducing combinatorial valuations, or requiring the mechanism to be deterministic (whose structure is readily combinatorial). Our proof is enabled by a flow-interpretation of the solutions of an exponential-size linear program for revenue maximization with an additional supermodularity constraint. ",christos tzamos,,2012.0,,arXiv,Daskalakis2012,True,,arXiv,Not available,The Complexity of Optimal Mechanism Design,207ed970e98a0f23cde74338c6f537b6,http://arxiv.org/abs/1211.1703v2 17151," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",moshe babaioff,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 17152," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",shahar dobzinski,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 17153," We study combinatorial auctions with bidders that exhibit endowment effect. In most of the previous work on cognitive biases in algorithmic game theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on analyzing the implications and mitigating their negative consequences. In contrast, in this paper we show how in some cases cognitive biases can be harnessed to obtain better outcomes. Specifically, we study Walrasian equilibria in combinatorial markets. It is well known that Walrasian equilibria exist only in limited settings, e.g., when all valuations are gross substitutes, but fails to exist in more general settings, e.g., when the valuations are submodular. We consider combinatorial settings in which bidders exhibit the endowment effect, that is, their value for items increases with ownership. Our main result shows that when the valuations are submodular, even a mild degree of endowment effect is sufficient to guarantee the existence of Walrasian equilibria. In fact, we show that in contrast to Walrasian equilibria with standard utility maximizing bidders -- in which the equilibrium allocation must be efficient -- when bidders exhibit endowment effect any local optimum can be an equilibrium allocation. Our techniques reveal interesting connections between the LP relaxation of combinatorial auctions and local maxima. We also provide lower bounds on the intensity of the endowment effect that the bidders must have in order to guarantee the existence of a Walrasian equilibrium in various settings. ",sigal oren,,2018.0,,arXiv,Babaioff2018,True,,arXiv,Not available,Combinatorial Auctions with Endowment Effect,0e3e75629390173277867257d71c0939,http://arxiv.org/abs/1805.10913v1 17154," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",zhu han,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 17155," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",rong zheng,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 17156," In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness. ",vincent poor,,2009.0,,arXiv,Han2009,True,,arXiv,Not available,"Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks",d4ffa0a1028bbe70d7035f6120451364,http://arxiv.org/abs/0910.2240v1 17157," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",jianwei huang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 17158," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",zhu han,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 17159," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",mung chiang,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 17160," We introduce string diagrams as a formal mathematical, graphical language to represent, compose, program and reason about games. The language is well established in quantum physics, quantum computing and quantum linguistic with the semantics given by category theory. We apply this language to the game theoretical setting and show examples how to use it for some economic games where we highlight the compositional nature of our higher-order game theory. ",evguenia shprits,,2016.0,,arXiv,Hedges2016,True,,arXiv,Not available,Compositionality and String Diagrams for Game Theory,a757b8414bb8a2c0b093952af97c8b6c,http://arxiv.org/abs/1604.06061v1 17161," Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner. ",h. poor,,2008.0,10.1109/ICASSP.2008.4518870,arXiv,Huang2008,True,,arXiv,Not available,"Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks",1256db38f0614260bb1861ed0911bdf4,http://arxiv.org/abs/0801.3097v1 17162," Consider an abstract social choice setting with incomplete information, where the number of alternatives is large. Albeit natural, implementing VCG mechanisms may not be feasible due to the prohibitive communication constraints. However, if players restrict attention to a subset of the alternatives, feasibility may be recovered. This paper characterizes the class of subsets which induce an ex-post equilibrium in the original game. It turns out that a crucial condition for such subsets to exist is the existence of a type-independent optimal social alternative, for each player. We further analyze the welfare implications of these restrictions. This work follows work by Holzman, Kfir-Dahav, Monderer and Tennenholtz (2004) and Holzman and Monderer (2004) where similar analysis is done for combinatorial auctions. ",rakefet rozen,,2012.0,,arXiv,Rozen2012,True,,arXiv,Not available,Ex-Post Equilibrium and VCG Mechanisms,7cc9f8615d32634f22fac2aa8c185de7,http://arxiv.org/abs/1211.3293v1 17163," Consider an abstract social choice setting with incomplete information, where the number of alternatives is large. Albeit natural, implementing VCG mechanisms may not be feasible due to the prohibitive communication constraints. However, if players restrict attention to a subset of the alternatives, feasibility may be recovered. This paper characterizes the class of subsets which induce an ex-post equilibrium in the original game. It turns out that a crucial condition for such subsets to exist is the existence of a type-independent optimal social alternative, for each player. We further analyze the welfare implications of these restrictions. This work follows work by Holzman, Kfir-Dahav, Monderer and Tennenholtz (2004) and Holzman and Monderer (2004) where similar analysis is done for combinatorial auctions. ",rann smorodinsky,,2012.0,,arXiv,Rozen2012,True,,arXiv,Not available,Ex-Post Equilibrium and VCG Mechanisms,7cc9f8615d32634f22fac2aa8c185de7,http://arxiv.org/abs/1211.3293v1 17164," This paper presents recent results from Mean Field Game theory underlying the introduction of common noise that imposes to incorporate the distribution of the agents as a state variable. Starting from the usual mean field games equations introduced by J.M. Lasry and P.L. Lions and adapting them to games on graphs, we introduce a partial differential equation, often referred to as the Master equation, from which the MFG equations can be deduced. Then, this Master equation can be reinterpreted using a global control problem inducing the same behaviors as in the non-cooperative initial mean field game. ",olivier gueant,,2011.0,,arXiv,Guéant2011,True,,arXiv,Not available,"From infinity to one: The reduction of some mean field games to a global control problem",be29370f31b04559b1b04d520a3e0a7b,http://arxiv.org/abs/1110.3441v2 17165," In this paper, we study turn-based quantitative multiplayer non zero-sum games played on finite graphs with both reachability and safety objectives. In this framework a player with a reachability objective aims at reaching his own goal as soon as possible, whereas a player with a safety objective aims at avoiding his bad set or, if impossible, delaying its visit as long as possible. We prove the existence of Nash equilibria with finite memory in quantitative multiplayer reachability/safety games. Moreover, we prove the existence of finite-memory secure equilibria for quantitative two-player reachability games. ",thomas brihaye,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,On Equilibria in Quantitative Games with Reachability/Safety Objectives,1d360bdd1f27a06d72866220d086bd96,http://arxiv.org/abs/1205.4889v1 17166," In this paper, we study turn-based quantitative multiplayer non zero-sum games played on finite graphs with both reachability and safety objectives. In this framework a player with a reachability objective aims at reaching his own goal as soon as possible, whereas a player with a safety objective aims at avoiding his bad set or, if impossible, delaying its visit as long as possible. We prove the existence of Nash equilibria with finite memory in quantitative multiplayer reachability/safety games. Moreover, we prove the existence of finite-memory secure equilibria for quantitative two-player reachability games. ",veronique bruyere,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,On Equilibria in Quantitative Games with Reachability/Safety Objectives,1d360bdd1f27a06d72866220d086bd96,http://arxiv.org/abs/1205.4889v1 17167," In this paper, we study turn-based quantitative multiplayer non zero-sum games played on finite graphs with both reachability and safety objectives. In this framework a player with a reachability objective aims at reaching his own goal as soon as possible, whereas a player with a safety objective aims at avoiding his bad set or, if impossible, delaying its visit as long as possible. We prove the existence of Nash equilibria with finite memory in quantitative multiplayer reachability/safety games. Moreover, we prove the existence of finite-memory secure equilibria for quantitative two-player reachability games. ",julie pril,,2012.0,,arXiv,Brihaye2012,True,,arXiv,Not available,On Equilibria in Quantitative Games with Reachability/Safety Objectives,1d360bdd1f27a06d72866220d086bd96,http://arxiv.org/abs/1205.4889v1 17168," The ordinary game of Nim has a long history and is well-known in the area of combinatorial game theory. The solution to the ordinary game of Nim has been known for many years and lends itself to numerous other solutions to combinatorial games. Nim was extended to graphs by taking a fixed graph with a playing piece on a given vertex and assigning positive integer weight to the edges that correspond to a pile of stones in the ordinary game of Nim. Players move alternately from the playing piece across incident edges, removing weight from edges as they move. This paper solves Nim on hypercubes in the unit weight case completely. We briefly discuss the arbitrary weight case and its ties to known results. ",lindsay erickson,,2012.0,,arXiv,Erickson2012,True,,arXiv,Not available,Nim on hypercubes,75074079658354ad7a4a62e7c3f53f96,http://arxiv.org/abs/1208.5496v1 17169," The ordinary game of Nim has a long history and is well-known in the area of combinatorial game theory. The solution to the ordinary game of Nim has been known for many years and lends itself to numerous other solutions to combinatorial games. Nim was extended to graphs by taking a fixed graph with a playing piece on a given vertex and assigning positive integer weight to the edges that correspond to a pile of stones in the ordinary game of Nim. Players move alternately from the playing piece across incident edges, removing weight from edges as they move. This paper solves Nim on hypercubes in the unit weight case completely. We briefly discuss the arbitrary weight case and its ties to known results. ",warren shreve,,2012.0,,arXiv,Erickson2012,True,,arXiv,Not available,Nim on hypercubes,75074079658354ad7a4a62e7c3f53f96,http://arxiv.org/abs/1208.5496v1 17170," We extend the study of the iterated elimination of strictly dominated strategies (IESDS) from Nash strategic games to a class of qualitative games. Also in this case, the IESDS process leads us to a kind of 'rationalizable' result. We define several types of dominance relation and game reduction and establish conditions under which a unique and nonempty maximal reduction exists. We generalize, in this way, some results due to Dufwenberg and Stegeman (2002) and Apt (2007). ",monica patriche,,2013.0,,arXiv,Patriche2013,True,,arXiv,Not available,The reduction of qualitative games,af3378ce93e914522405b35de06a576d,http://arxiv.org/abs/1303.6976v1 17171," We introduce string diagrams as a formal mathematical, graphical language to represent, compose, program and reason about games. The language is well established in quantum physics, quantum computing and quantum linguistic with the semantics given by category theory. We apply this language to the game theoretical setting and show examples how to use it for some economic games where we highlight the compositional nature of our higher-order game theory. ",viktor winschel,,2016.0,,arXiv,Hedges2016,True,,arXiv,Not available,Compositionality and String Diagrams for Game Theory,a757b8414bb8a2c0b093952af97c8b6c,http://arxiv.org/abs/1604.06061v1 17172," We consider fractional linear programming production games for the single-objective and multiobjective cases. We use the method of Chakraborty and Gupta (2002) in order to transform the fractional linear programming problems into linear programming problems. A cooperative game is attached and we prove the non-emptiness of the core by using the duality theory from the linear programming. In the multiobjective case, we give a characterization of the Stable outcome of the associate cooperative game, which is balanced. We also consider the cooperative game associated to an exchange economy with a finite number of agents. ",monica patriche,,2013.0,,arXiv,Patriche2013,True,,arXiv,Not available,The core of the games with fractional linear utility functions,fc2e0ec9e309b123c2d54e0c10ca645a,http://arxiv.org/abs/1303.7041v1 17173," Two qubit quantum computations are viewed as two player, strictly competitive games and a game-theoretic measure of optimality of these computations is developed. To this end, the geometry of Hilbert space of quantum computations is used to establish the equivalence of game-theoretic solution concepts of Nash equilibrium and mini-max outcomes in games of this type, and quantum mechanisms are designed for realizing these mini-max outcomes. ",faisal khan,,2013.0,10.1007/s11128-013-0640-7,arXiv,Khan2013,True,,arXiv,Not available,Mini-maximizing two qubit quantum computations,aee023740477da75c1fa5262b03b625d,http://arxiv.org/abs/1304.0748v2 17174," Two qubit quantum computations are viewed as two player, strictly competitive games and a game-theoretic measure of optimality of these computations is developed. To this end, the geometry of Hilbert space of quantum computations is used to establish the equivalence of game-theoretic solution concepts of Nash equilibrium and mini-max outcomes in games of this type, and quantum mechanisms are designed for realizing these mini-max outcomes. ",simon phoenix,,2013.0,10.1007/s11128-013-0640-7,arXiv,Khan2013,True,,arXiv,Not available,Mini-maximizing two qubit quantum computations,aee023740477da75c1fa5262b03b625d,http://arxiv.org/abs/1304.0748v2 17175," In cooperative games, the core is the most popular solution concept, and its properties are well known. In the classical setting of cooperative games, it is generally assumed that all coalitions can form, i.e., they are all feasible. In many situations, this assumption is too strong and one has to deal with some unfeasible coalitions. Defining a game on a subcollection of the power set of the set of players has many implications on the mathematical structure of the core, depending on the precise structure of the subcollection of feasible coalitions. Many authors have contributed to this topic, and we give a unified view of these different results. ",michel grabisch,,2013.0,,Annals of Operations Research (2013) 33-64,Grabisch2013,True,,arXiv,Not available,The core of games on ordered structures and graphs,77e0b0509125c0f329c887d7902ea04b,http://arxiv.org/abs/1304.1075v1 17176," We extend the potential-based shaping method from Markov decision processes to multi-player general-sum stochastic games. We prove that the Nash equilibria in a stochastic game remains unchanged after potential-based shaping is applied to the environment. The property of policy invariance provides a possible way of speeding convergence when learning to play a stochastic game. ",xiaosong lu,,2014.0,10.1613/jair.3384,"Journal Of Artificial Intelligence Research, Volume 41, pages 397-406, 2011",Lu2014,True,,arXiv,Not available,"Policy Invariance under Reward Transformations for General-Sum Stochastic Games",413837ab528e9f7fe5a8e466671bd557,http://arxiv.org/abs/1401.3907v1 17177," We extend the potential-based shaping method from Markov decision processes to multi-player general-sum stochastic games. We prove that the Nash equilibria in a stochastic game remains unchanged after potential-based shaping is applied to the environment. The property of policy invariance provides a possible way of speeding convergence when learning to play a stochastic game. ",howard schwartz,,2014.0,10.1613/jair.3384,"Journal Of Artificial Intelligence Research, Volume 41, pages 397-406, 2011",Lu2014,True,,arXiv,Not available,"Policy Invariance under Reward Transformations for General-Sum Stochastic Games",413837ab528e9f7fe5a8e466671bd557,http://arxiv.org/abs/1401.3907v1 17178," We extend the potential-based shaping method from Markov decision processes to multi-player general-sum stochastic games. We prove that the Nash equilibria in a stochastic game remains unchanged after potential-based shaping is applied to the environment. The property of policy invariance provides a possible way of speeding convergence when learning to play a stochastic game. ",sidney jr,,2014.0,10.1613/jair.3384,"Journal Of Artificial Intelligence Research, Volume 41, pages 397-406, 2011",Lu2014,True,,arXiv,Not available,"Policy Invariance under Reward Transformations for General-Sum Stochastic Games",413837ab528e9f7fe5a8e466671bd557,http://arxiv.org/abs/1401.3907v1 17179," We consider zero-sum stochastic games with perfect information and finitely many states and actions. The payoff is computed by a payoff function which associates to each infinite sequence of states and actions a real number. We prove that if the the payoff function is both shift-invariant and submixing, then the game is half-positional, i.e. the first player has an optimal strategy which is both deterministic and stationary. This result relies on the existence of $\epsilon$-subgame-perfect equilibria in shift-invariant games, a second contribution of the paper. ",hugo gimbert,,2014.0,,arXiv,Gimbert2014,True,,arXiv,Not available,"Two-Player Perfect-Information Shift-Invariant Submixing Stochastic Games Are Half-Positional",d026d39b6058ae74f210b0b766b1f111,http://arxiv.org/abs/1401.6575v2 17180," We consider zero-sum stochastic games with perfect information and finitely many states and actions. The payoff is computed by a payoff function which associates to each infinite sequence of states and actions a real number. We prove that if the the payoff function is both shift-invariant and submixing, then the game is half-positional, i.e. the first player has an optimal strategy which is both deterministic and stationary. This result relies on the existence of $\epsilon$-subgame-perfect equilibria in shift-invariant games, a second contribution of the paper. ",edon kelmendi,,2014.0,,arXiv,Gimbert2014,True,,arXiv,Not available,"Two-Player Perfect-Information Shift-Invariant Submixing Stochastic Games Are Half-Positional",d026d39b6058ae74f210b0b766b1f111,http://arxiv.org/abs/1401.6575v2 17181," In the early 1950s Lloyd Shapley proposed an ordinal and set-valued solution concept for zero-sum games called \emph{weak saddle}. We show that all weak saddles of a given zero-sum game are interchangeable and equivalent. As a consequence, every such game possesses a unique set-based value. ",felix brandt,,2014.0,10.1016/j.geb.2015.12.010,Games and Economic Behavior (2016) 95:107-112,Brandt2014,True,,arXiv,Not available,An Ordinal Minimax Theorem,4b5f55a444b10659fcf4586ef0ef6156,http://arxiv.org/abs/1412.4198v5 17182," We introduce string diagrams as a formal mathematical, graphical language to represent, compose, program and reason about games. The language is well established in quantum physics, quantum computing and quantum linguistic with the semantics given by category theory. We apply this language to the game theoretical setting and show examples how to use it for some economic games where we highlight the compositional nature of our higher-order game theory. ",philipp zahn,,2016.0,,arXiv,Hedges2016,True,,arXiv,Not available,Compositionality and String Diagrams for Game Theory,a757b8414bb8a2c0b093952af97c8b6c,http://arxiv.org/abs/1604.06061v1 17183," In the early 1950s Lloyd Shapley proposed an ordinal and set-valued solution concept for zero-sum games called \emph{weak saddle}. We show that all weak saddles of a given zero-sum game are interchangeable and equivalent. As a consequence, every such game possesses a unique set-based value. ",markus brill,,2014.0,10.1016/j.geb.2015.12.010,Games and Economic Behavior (2016) 95:107-112,Brandt2014,True,,arXiv,Not available,An Ordinal Minimax Theorem,4b5f55a444b10659fcf4586ef0ef6156,http://arxiv.org/abs/1412.4198v5 17184," In the early 1950s Lloyd Shapley proposed an ordinal and set-valued solution concept for zero-sum games called \emph{weak saddle}. We show that all weak saddles of a given zero-sum game are interchangeable and equivalent. As a consequence, every such game possesses a unique set-based value. ",warut suksompong,,2014.0,10.1016/j.geb.2015.12.010,Games and Economic Behavior (2016) 95:107-112,Brandt2014,True,,arXiv,Not available,An Ordinal Minimax Theorem,4b5f55a444b10659fcf4586ef0ef6156,http://arxiv.org/abs/1412.4198v5 17185," We study hedonic coalition formation games in which cooperation among the players is restricted by a graph structure: a subset of players can form a coalition if and only if they are connected in the given graph. We investigate the complexity of finding stable outcomes in such games, for several notions of stability. In particular, we provide an efficient algorithm that finds an individually stable partition for an arbitrary hedonic game on an acyclic graph. We also introduce a new stability concept -in-neighbor stability- which is tailored for our setting. We show that the problem of finding an in-neighbor stable outcome admits a polynomial-time algorithm if the underlying graph is a path, but is NP-hard for arbitrary trees even for additively separable hedonic games; for symmetric additively separable games we obtain a PLS-hardness result. ",ayumi igarashi,,2016.0,,arXiv,Igarashi2016,True,,arXiv,Not available,Hedonic Games with Graph-restricted Communication,dae2819904074acf0f517c81f1e6c47a,http://arxiv.org/abs/1602.05342v2 17186," We study hedonic coalition formation games in which cooperation among the players is restricted by a graph structure: a subset of players can form a coalition if and only if they are connected in the given graph. We investigate the complexity of finding stable outcomes in such games, for several notions of stability. In particular, we provide an efficient algorithm that finds an individually stable partition for an arbitrary hedonic game on an acyclic graph. We also introduce a new stability concept -in-neighbor stability- which is tailored for our setting. We show that the problem of finding an in-neighbor stable outcome admits a polynomial-time algorithm if the underlying graph is a path, but is NP-hard for arbitrary trees even for additively separable hedonic games; for symmetric additively separable games we obtain a PLS-hardness result. ",edith elkind,,2016.0,,arXiv,Igarashi2016,True,,arXiv,Not available,Hedonic Games with Graph-restricted Communication,dae2819904074acf0f517c81f1e6c47a,http://arxiv.org/abs/1602.05342v2 17187," We model parking in urban centers as a set of parallel queues and overlay a game theoretic structure that allows us to compare the user-selected (Nash) equilibrium to the socially optimal equilibrium. We model arriving drivers as utility maximizers and consider the game in which observing the queue length is free as well as the game in which drivers must pay to observe the queue length. In both games, drivers must decide between balking and joining. We compare the Nash induced welfare to the socially optimal welfare. We find that gains to welfare do not require full information penetration---meaning, for social welfare to increase, not everyone needs to pay to observe. Through simulation, we explore a more complex scenario where drivers decide based the queueing game whether or not to enter a collection of queues over a network. We examine the occupancy-congestion relationship, an important relationship for determining the impact of parking resources on overall traffic congestion. Our simulated models use parameters informed by real-world data collected by the Seattle Department of Transportation. ",lillian ratliff,,2016.0,,arXiv,Ratliff2016,True,,arXiv,Not available,To Observe or Not to Observe: Queuing Game Framework for Urban Parking,5faa743bc8c828896fb2bd558a5f851c,http://arxiv.org/abs/1603.08995v1 17188," We model parking in urban centers as a set of parallel queues and overlay a game theoretic structure that allows us to compare the user-selected (Nash) equilibrium to the socially optimal equilibrium. We model arriving drivers as utility maximizers and consider the game in which observing the queue length is free as well as the game in which drivers must pay to observe the queue length. In both games, drivers must decide between balking and joining. We compare the Nash induced welfare to the socially optimal welfare. We find that gains to welfare do not require full information penetration---meaning, for social welfare to increase, not everyone needs to pay to observe. Through simulation, we explore a more complex scenario where drivers decide based the queueing game whether or not to enter a collection of queues over a network. We examine the occupancy-congestion relationship, an important relationship for determining the impact of parking resources on overall traffic congestion. Our simulated models use parameters informed by real-world data collected by the Seattle Department of Transportation. ",chase dowling,,2016.0,,arXiv,Ratliff2016,True,,arXiv,Not available,To Observe or Not to Observe: Queuing Game Framework for Urban Parking,5faa743bc8c828896fb2bd558a5f851c,http://arxiv.org/abs/1603.08995v1 17189," We model parking in urban centers as a set of parallel queues and overlay a game theoretic structure that allows us to compare the user-selected (Nash) equilibrium to the socially optimal equilibrium. We model arriving drivers as utility maximizers and consider the game in which observing the queue length is free as well as the game in which drivers must pay to observe the queue length. In both games, drivers must decide between balking and joining. We compare the Nash induced welfare to the socially optimal welfare. We find that gains to welfare do not require full information penetration---meaning, for social welfare to increase, not everyone needs to pay to observe. Through simulation, we explore a more complex scenario where drivers decide based the queueing game whether or not to enter a collection of queues over a network. We examine the occupancy-congestion relationship, an important relationship for determining the impact of parking resources on overall traffic congestion. Our simulated models use parameters informed by real-world data collected by the Seattle Department of Transportation. ",eric mazumdar,,2016.0,,arXiv,Ratliff2016,True,,arXiv,Not available,To Observe or Not to Observe: Queuing Game Framework for Urban Parking,5faa743bc8c828896fb2bd558a5f851c,http://arxiv.org/abs/1603.08995v1 17190," We model parking in urban centers as a set of parallel queues and overlay a game theoretic structure that allows us to compare the user-selected (Nash) equilibrium to the socially optimal equilibrium. We model arriving drivers as utility maximizers and consider the game in which observing the queue length is free as well as the game in which drivers must pay to observe the queue length. In both games, drivers must decide between balking and joining. We compare the Nash induced welfare to the socially optimal welfare. We find that gains to welfare do not require full information penetration---meaning, for social welfare to increase, not everyone needs to pay to observe. Through simulation, we explore a more complex scenario where drivers decide based the queueing game whether or not to enter a collection of queues over a network. We examine the occupancy-congestion relationship, an important relationship for determining the impact of parking resources on overall traffic congestion. Our simulated models use parameters informed by real-world data collected by the Seattle Department of Transportation. ",baosen zhang,,2016.0,,arXiv,Ratliff2016,True,,arXiv,Not available,To Observe or Not to Observe: Queuing Game Framework for Urban Parking,5faa743bc8c828896fb2bd558a5f851c,http://arxiv.org/abs/1603.08995v1 17191," We study stochastic two-player turn-based games in which the objective of one player is to ensure several infinite-horizon total reward objectives, while the other player attempts to spoil at least one of the objectives. The games have previously been shown not to be determined, and an approximation algorithm for computing a Pareto curve has been given. The major drawback of the existing algorithm is that it needs to compute Pareto curves for finite horizon objectives (for increasing length of the horizon), and the size of these Pareto curves can grow unboundedly, even when the infinite-horizon Pareto curve is small. By adapting existing results, we first give an algorithm that computes the Pareto curve for determined games. Then, as the main result of the paper, we show that for the natural class of stopping games and when there are two reward objectives, the problem of deciding whether a player can ensure satisfaction of the objectives with given thresholds is decidable. The result relies on intricate and novel proof which shows that the Pareto curves contain only finitely many points. As a consequence, we get that the two-objective discounted-reward problem for unrestricted class of stochastic games is decidable. ",romain brenguier,,2016.0,,arXiv,Brenguier2016,True,,arXiv,Not available,Decidability Results for Multi-objective Stochastic Games,1d6b613c02c0a3e7e0f1b6c368717fff,http://arxiv.org/abs/1605.03811v1 17192," We study stochastic two-player turn-based games in which the objective of one player is to ensure several infinite-horizon total reward objectives, while the other player attempts to spoil at least one of the objectives. The games have previously been shown not to be determined, and an approximation algorithm for computing a Pareto curve has been given. The major drawback of the existing algorithm is that it needs to compute Pareto curves for finite horizon objectives (for increasing length of the horizon), and the size of these Pareto curves can grow unboundedly, even when the infinite-horizon Pareto curve is small. By adapting existing results, we first give an algorithm that computes the Pareto curve for determined games. Then, as the main result of the paper, we show that for the natural class of stopping games and when there are two reward objectives, the problem of deciding whether a player can ensure satisfaction of the objectives with given thresholds is decidable. The result relies on intricate and novel proof which shows that the Pareto curves contain only finitely many points. As a consequence, we get that the two-objective discounted-reward problem for unrestricted class of stochastic games is decidable. ",vojtech forejt,,2016.0,,arXiv,Brenguier2016,True,,arXiv,Not available,Decidability Results for Multi-objective Stochastic Games,1d6b613c02c0a3e7e0f1b6c368717fff,http://arxiv.org/abs/1605.03811v1 17193,"

I and my brand names, as in iPhone and MySpace, are popular but poorly understood. Although there is an intuitive appeal to using pronouns to reference the consumer, little is known about why the naming tactic works and, in turn, the conditions under which each pronoun should be used. We propose a framework for consumer processing of such brand names, predicting that both I and my influence consumer preference under divergent conditions and psychological mechanisms. In referencing the self as an actor, I should induce narrative self-referencing, wherein one imagines oneself actively using the product. By contrast, my references the self as an owner, so we expect it to give rise to the more inert feeling of subjective ownership. These hypotheses were tested in an online experiment using a representative sample of US consumers. Findings indicate that I produces favorable consumer response via narrative self-referencing, but only when the root word of the brand is a verb (for example, iRead). Meanwhile, my produces favorable consumer response via feelings of subjective ownership, but only when the brand root word is a noun (for example, myReader). Mediation analyses support the proposed divergent psychological processes. Practical implications for branding are discussed, as are theoretical implications.

",luke kachersky,,2013.0,10.1057/bm.2012.61,Journal of Brand Management,Kachersky2013,Not available,,Nature,Not available,How personal pronouns influence brand name preference,eba40137a8ad09d7f4f86547395e2ee8,http://dx.doi.org/10.1057/bm.2012.61 17194,"

I and my brand names, as in iPhone and MySpace, are popular but poorly understood. Although there is an intuitive appeal to using pronouns to reference the consumer, little is known about why the naming tactic works and, in turn, the conditions under which each pronoun should be used. We propose a framework for consumer processing of such brand names, predicting that both I and my influence consumer preference under divergent conditions and psychological mechanisms. In referencing the self as an actor, I should induce narrative self-referencing, wherein one imagines oneself actively using the product. By contrast, my references the self as an owner, so we expect it to give rise to the more inert feeling of subjective ownership. These hypotheses were tested in an online experiment using a representative sample of US consumers. Findings indicate that I produces favorable consumer response via narrative self-referencing, but only when the root word of the brand is a verb (for example, iRead). Meanwhile, my produces favorable consumer response via feelings of subjective ownership, but only when the brand root word is a noun (for example, myReader). Mediation analyses support the proposed divergent psychological processes. Practical implications for branding are discussed, as are theoretical implications.

",nicole palermo,,2013.0,10.1057/bm.2012.61,Journal of Brand Management,Kachersky2013,Not available,,Nature,Not available,How personal pronouns influence brand name preference,eba40137a8ad09d7f4f86547395e2ee8,http://dx.doi.org/10.1057/bm.2012.61 17195,"

An effective Decision Support System (DSS) should help its users improve decision making in complex, information-rich environments. We present a feature gap analysis that shows that current decision support technologies lack important qualities for a new generation of agile business models that require easy, temporary integration across organisational boundaries. We enumerate these qualities as DSS Desiderata, properties that can contribute both effectiveness and flexibility to users in such environments. To address this gap, we describe a new design approach that enables users to compose decision behaviours from separate, configurable components, and allows dynamic construction of analysis and modelling tools from small, single-purpose evaluator services. The result is what we call an ‘evaluator service network’ that can easily be configured to test hypotheses and analyse the impact of various choices for elements of decision processes. We have implemented and tested this design in an interactive version of the MinneTAC trading agent, an agent designed for the Trading Agent Competition for Supply Chain Management.

",maria gini,,2010.0,10.1057/ejis.2010.24,European Journal of Information Systems,Collins2010,Not available,,Nature,Not available,Flexible decision support in dynamic inter-organisational networks,02fa88455c665ac55bd2b00324e9a0a2,http://dx.doi.org/10.1057/ejis.2010.24 17196,"

This paper presents an analytical discussion of IMF conditionality based on the theory of special interest politics. We outline a simple political–economy model of special interest group politics, extended to include the interaction of the IMF with the government of a country making use of IMF resources. Conditional lending turns the IMF into a benevolent lobby that can exert beneficial impacts on the government's policy choices. In addition to addressing the international spillover effects of national economic policies, conditionality can help reduce policy inefficiencies generated by domestic conflicts of interest and limited ownership.

",alex mourmouras,,2004.0,10.1057/palgrave.ces.8100064,Comparative Economic Studies,Mayer2004,Not available,,Nature,Not available,IMF Conditionality and the Theory of Special Interest Politics1,327692dc30b5b89eb7bf157bad371fe3,http://dx.doi.org/10.1057/palgrave.ces.8100064 17197,"

Philanthropic decision-making is important both for its potential to provide insight into human behaviour and for its economic significance. In recent years, investigations of charitable-giving behaviour have expanded substantially, including explorations from a variety of disciplinary perspectives such as economics, marketing, sociology, public administration, anthropology, evolutionary biology, political science and psychology. These investigations have resulted in a wealth of experimental results with each investigation accompanied by a discussion of potential theoretical implications. Most commonly, the various theories employed are helpful with regard to the narrow result of the investigation, but are not always useful in explaining the wider universe of results. Taking a comprehensive view of charitable-giving behaviour is thus limited to either employing a wide assortment of overlapping theoretical models, selectively applying each to fit individual phenomena, or merely referencing an ad hoc assortment of potential motivations. This circumstance suggests the value of a more unified, comprehensive approach to understanding the complete range of experimental and empirical results in charitable giving. This article proposes a comprehensive framework for philanthropic decision-making using a simple evolutionary approach incorporating interrelated fitness-enhancing strategies. The framework is then used in an extensive review of experimental and other empirical results in philanthropic decision-making. This review supports the framework proposition that giving depends on the tangibility of a gift’s impact on altruism (direct or code), reciprocity (transactional or friendship) and possessions relative to its alternatives. Five example principles of fundraising practice demonstrate the practical applicability of this proposition: advance the donor hero story (tangibility of direct or code altruism); make the charity like family (friendship reciprocity); provide compatible publicity and benefits (transactional reciprocity); minimize perceived loss (possessions); and manage decision avoidance (relative to its alternatives). Understanding philanthropic behaviour from this perspective provides explanation and guidance for a wide range of charitable-giving behaviours and fundraising practices even in areas less amenable to traditional experimental investigation, such as charitable bequests and major gifts.

",russell iii,Business and management,2017.0,10.1057/palcomms.2017.50,Palgrave Communications,III2017,Not available,,Nature,Not available,Natural philanthropy: a new evolutionary framework explaining diverse experimental results and informing fundraising practice,af14e0b32759a9e4d89ccd16b3ac2a2b,http://dx.doi.org/10.1057/palcomms.2017.50 17198,"

This article considers the relationship between policy design and the pattern of interests attracted to the political arena. It examines legislation crafted by a large coalition of diverse interests that designed policy favorable to problem solving. This is the kind of policymaking that regime theorists identify with social production—but also one considered a rare circumstance. Previous attempts at passing similar legislation failed because the problem was defined narrowly and the political arena contained only two stakeholders, offering no opportunity to introduce a change that benefited one without harming the other. Success required redefining the problem and changing the nature of the political arena in a manner similar to that described by Schattschneider. By doing so, diverse interests discovered a way to benefit collectively. The present case therefore demonstrates the advantage of coupling the strategic insight of Schattschneider with the normative goals of regime theorists.

",b reno,,2007.0,10.1057/palgrave.polity.2300078,Polity,Reno2007,Not available,,Nature,Not available,A Floor Without a Ceiling: Balancing Normative and Strategic Goals in Policy Design*,1616409fe1ebb8efb4106d99af40c56e,http://dx.doi.org/10.1057/palgrave.polity.2300078 17199,"

Thomas Schelling's two influential books, The Strategy of Conflict and Arms and Influence, remain foundational works for that thriving branch of realism that explores strategic bargaining. They illustrate the pitfalls of deduction in a political, cultural and ethical vacuum. In the real world, signals and reference points are only recognized and understood in context, and that context is a function of the history, culture and the prior experience of actors with one other. Schelling's works on bargaining — and many of the studies in the research program to which he contributed — are unwitting prisoners of a particular language and context: microeconomics and a parochial American Cold War view of the world. They lead Schelling to misrepresent the actual dynamics of the bargaining encounters (Cuba and Vietnam) that he uses to illustrate and justify his approach. Schelling's writing on bargaining is emblematic of a more general and still dominant American approach to the world that seeks, when possible, to substitute a combination of technical fixes and military muscle for political insight and diplomatic finesse.

",richard lebow,,2006.0,10.1057/palgrave.ip.8800164,International Politics,Lebow2006,Not available,,Nature,Not available,Reason Divorced from Reality: Thomas Schelling and Strategic Bargaining,3c37e649ee9de321c86272c17e5594a8,http://dx.doi.org/10.1057/palgrave.ip.8800164 17200,"

A QUICK HISTORY OF THE USE OF COMPUTATION IN ECONOMICS The first digital computers were primarily used by scientists and engineers to solve mathematical equations numerically, that is, to approximate analytical solutions, most commonly for difficult-to-solve differential equations. The economics profession was also an early adopter of digital computing, and many of the first uses of computation by economists involved numerical solution of economic equations that were hard or impossible to solve analytically.

",rob axtell,,2008.0,10.1057/eej.2008.37,Eastern Economic Journal,Axtell2008,Not available,,Nature,Not available,The Rise of Computationally Enabled Economics: Introduction to the Special Issue of the Eastern Economic Journal on Agent-Based Modeling,fe1b4ee15931ca9acf9f956f09dd5d26,http://dx.doi.org/10.1057/eej.2008.37 17201,"

This paper analyses the main consequences for the seaport efficiency of an access regime recently introduced by the Peruvian regulator for the public transportation infrastructure (OSITRAN). Its objective is to make competition viable for services that use, as input, transport infrastructure controlled by a monopolist. It is based on two theoretical contributions, the ‘Coase theorem’ and the ‘Demsetz approach’, and minimises the government intervention risk. Both port operators and providers of port services now have incentives to negotiate conditions of access, which permit competition, or to compete for an exclusivity right when this is desirable. If the parties do not reach an agreement within a reasonable time, the Regulator can enact an access mandate that may punish any of the parties, creating incentives for them to reach a Nash Equilibrium. The model seems to be generating productive and allocative efficiencies in port services, thus contributing to a potential reduction in Peru's maritime transport costs.

",lincoln flor,,2003.0,10.1057/palgrave.mel.9100075,Maritime Economics & Logistics,Flor2003,Not available,,Nature,Not available,Port Infrastructure: An Access Model for the Essential Facility,165f182b452ca6f76e60a9e6e2bb0b02,http://dx.doi.org/10.1057/palgrave.mel.9100075 17202,"

This paper analyses the main consequences for the seaport efficiency of an access regime recently introduced by the Peruvian regulator for the public transportation infrastructure (OSITRAN). Its objective is to make competition viable for services that use, as input, transport infrastructure controlled by a monopolist. It is based on two theoretical contributions, the ‘Coase theorem’ and the ‘Demsetz approach’, and minimises the government intervention risk. Both port operators and providers of port services now have incentives to negotiate conditions of access, which permit competition, or to compete for an exclusivity right when this is desirable. If the parties do not reach an agreement within a reasonable time, the Regulator can enact an access mandate that may punish any of the parties, creating incentives for them to reach a Nash Equilibrium. The model seems to be generating productive and allocative efficiencies in port services, thus contributing to a potential reduction in Peru's maritime transport costs.

",enzo defilippi,,2003.0,10.1057/palgrave.mel.9100075,Maritime Economics & Logistics,Flor2003,Not available,,Nature,Not available,Port Infrastructure: An Access Model for the Essential Facility,165f182b452ca6f76e60a9e6e2bb0b02,http://dx.doi.org/10.1057/palgrave.mel.9100075 17203,"

Subnational governments' access to credit is essential for smoothing out shocks to their revenue and expenditures, including those associated with large infrastructure projects. However, governments might pursue an unsustainable borrowing path unless they face appropriate incentives. Theoretically, credit markets can discourage excessive borrowing by charging risk premia rising with the level of indebtedness. We examine the robustness of this market mechanism under the evolving institutions of decentralised governance in a transitional country. Russia presents a perfect case for such analysis, for the market discipline was the only constraint on subnational borrowing there throughout the 1990s.

",andrey timofeev,,2007.0,10.1057/palgrave.ces.8100188,Comparative Economic Studies,Timofeev2007,Not available,,Nature,Not available,Market-Based Fiscal Discipline Under Evolving Decentralisation: The Case of Russian Regions1,64e7bc1c276be1c2a1a197f777beff9f,http://dx.doi.org/10.1057/palgrave.ces.8100188 17204,"

Participants in international bargaining include different types (nation states, MNEs, NGOs, and multilateral organizations) and different numbers of these actors. Our theoretical contribution is to extend the bargaining power paradigm with a framework that models bargaining in this complex environment as a network. The configuration of supports and constraints among all participating actors in the bargaining environment is captured in the structure of the network. Antecedents of an actor's bargaining influence in the network include the actor's basis of power, network position, bargaining outcome preferences, and motivation to influence bargaining. The network bargaining power (NBP) model uses network theory to build upon and integrate insights from previous literature in a way that allows us to simultaneously apply these different insights to explain bargaining outcomes. These insights include effects of coalitions, strategies of less powerful actors leveraging more powerful allies, integration of international and domestic politics, and applicability to MNE-related issues beyond FDI. Finally, we illustrate NBP in a scenario of privatized utilities in the Dominican Republic, in which the bargaining power outcome predicted by NBP differs from that of the canonical bargaining power perspective.

",james nebus,,2009.0,10.1057/jibs.2009.43,Journal of International Business Studies,Nebus2009,Not available,,Nature,Not available,"Extending the bargaining power model: Explaining bargaining outcomes among nations, MNEs, and NGOs",888df2346689c9d799492df5299c5823,http://dx.doi.org/10.1057/jibs.2009.43 17205,"

Participants in international bargaining include different types (nation states, MNEs, NGOs, and multilateral organizations) and different numbers of these actors. Our theoretical contribution is to extend the bargaining power paradigm with a framework that models bargaining in this complex environment as a network. The configuration of supports and constraints among all participating actors in the bargaining environment is captured in the structure of the network. Antecedents of an actor's bargaining influence in the network include the actor's basis of power, network position, bargaining outcome preferences, and motivation to influence bargaining. The network bargaining power (NBP) model uses network theory to build upon and integrate insights from previous literature in a way that allows us to simultaneously apply these different insights to explain bargaining outcomes. These insights include effects of coalitions, strategies of less powerful actors leveraging more powerful allies, integration of international and domestic politics, and applicability to MNE-related issues beyond FDI. Finally, we illustrate NBP in a scenario of privatized utilities in the Dominican Republic, in which the bargaining power outcome predicted by NBP differs from that of the canonical bargaining power perspective.

",carlos rufin,,2009.0,10.1057/jibs.2009.43,Journal of International Business Studies,Nebus2009,Not available,,Nature,Not available,"Extending the bargaining power model: Explaining bargaining outcomes among nations, MNEs, and NGOs",888df2346689c9d799492df5299c5823,http://dx.doi.org/10.1057/jibs.2009.43 17206,"

We analyse a decentralized supply chain consisting of a supplier and a retailer, each with a satisficing objective, that is, to maximize the probability of achieving a predetermined target profit. The supply chain is examined under two types of commonly used contracts: linear tariff contracts (including wholesale price contracts as special cases) and buy-back contracts. First, we identify the Pareto-optimal contract(s) for each contractual form. In particular, it is shown that there is a unique wholesale price that is Pareto optimal for both contractual types. Second, we evaluate the performance of the Pareto-optimal contracts. In contrast to the well-known results for a supply chain with the traditional expected profit objectives, we show that wholesale price contracts can coordinate the supply chain whereas buy-back contracts cannot. This provides an additional justification for the popularity of wholesale price contracts besides their simplicities and lower administration costs.

",c shi,,2006.0,10.1057/palgrave.jors.2602186,Journal of the Operational Research Society,Shi2006,Not available,,Nature,Not available,Pareto-optimal contracts for a supply chain with satisficing objectives,e6b97a065eee369e735e71757ffa0947,http://dx.doi.org/10.1057/palgrave.jors.2602186 17207,"

We study a sourcing problem where a buyer reserves capacity from a set of suppliers. The suppliers have finite capacity and their unit production cost is a decreasing function of their capacity, implying scale economies. The capacity of each supplier and therefore the cost is his private information. The buyer and other suppliers only know the probability distribution of the supplier’s capacity. The buyer’s demand is random and she has to decide how much capacity to reserve in advance from a subset of suppliers and how much to source from marketplace. In this study we determine the buyer’s optimum reservation quantity and the size of the supply base. We find the presence of such capacity cost correlation leads to supply base reduction.

",tarun jain,,2015.0,10.1057/jors.2015.70,Journal of the Operational Research Society,Jain2015,Not available,,Nature,Not available,Sourcing under incomplete information and negative capacity-cost correlation,6a34c033c059e802cf82622972239129,http://dx.doi.org/10.1057/jors.2015.70 17208,"

We study a sourcing problem where a buyer reserves capacity from a set of suppliers. The suppliers have finite capacity and their unit production cost is a decreasing function of their capacity, implying scale economies. The capacity of each supplier and therefore the cost is his private information. The buyer and other suppliers only know the probability distribution of the supplier’s capacity. The buyer’s demand is random and she has to decide how much capacity to reserve in advance from a subset of suppliers and how much to source from marketplace. In this study we determine the buyer’s optimum reservation quantity and the size of the supply base. We find the presence of such capacity cost correlation leads to supply base reduction.

",jishnu hazra,,2015.0,10.1057/jors.2015.70,Journal of the Operational Research Society,Jain2015,Not available,,Nature,Not available,Sourcing under incomplete information and negative capacity-cost correlation,6a34c033c059e802cf82622972239129,http://dx.doi.org/10.1057/jors.2015.70 17209,"

Small- and medium-sized enterprises (SMEs) play an important role in the European economy. A critical challenge faced by SME leaders, as a consequence of the continuing digital technology revolution, is how to optimally align business strategy with digital technology to fully leverage the potential offered by these technologies in pursuit of longevity and growth. There is a paucity of empirical research examining how e-leadership in SMEs drives successful alignment between business strategy and digital technology fostering longevity and growth. To address this gap, in this paper we develop an empirically derived e-leadership model. Initially we develop a theoretical model of e-leadership drawing on strategic alignment theory. This provides a theoretical foundation on how SMEs can harness digital technology in support of their business strategy enabling sustainable growth. An in-depth empirical study was undertaken interviewing 42 successful European SME leaders to validate, advance and substantiate our theoretically driven model. The outcome of the two stage process – inductive development of a theoretically driven e-leadership model and deductive advancement to develop a complete model through in-depth interviews with successful European SME leaders – is an e-leadership model with specific constructs fostering effective strategic alignment. The resulting diagnostic model enables SME decision makers to exercise effective e-leadership by creating productive alignment between business strategy and digital technology improving longevity and growth prospects.

",weizi li,,2016.0,10.1057/jit.2016.10,Journal of Information Technology,Li2016,Not available,,Nature,Not available,e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age,71f2081718dd7e05dcc921e86199f022,http://dx.doi.org/10.1057/jit.2016.10 17210,"

Small- and medium-sized enterprises (SMEs) play an important role in the European economy. A critical challenge faced by SME leaders, as a consequence of the continuing digital technology revolution, is how to optimally align business strategy with digital technology to fully leverage the potential offered by these technologies in pursuit of longevity and growth. There is a paucity of empirical research examining how e-leadership in SMEs drives successful alignment between business strategy and digital technology fostering longevity and growth. To address this gap, in this paper we develop an empirically derived e-leadership model. Initially we develop a theoretical model of e-leadership drawing on strategic alignment theory. This provides a theoretical foundation on how SMEs can harness digital technology in support of their business strategy enabling sustainable growth. An in-depth empirical study was undertaken interviewing 42 successful European SME leaders to validate, advance and substantiate our theoretically driven model. The outcome of the two stage process – inductive development of a theoretically driven e-leadership model and deductive advancement to develop a complete model through in-depth interviews with successful European SME leaders – is an e-leadership model with specific constructs fostering effective strategic alignment. The resulting diagnostic model enables SME decision makers to exercise effective e-leadership by creating productive alignment between business strategy and digital technology improving longevity and growth prospects.

",kecheng liu,,2016.0,10.1057/jit.2016.10,Journal of Information Technology,Li2016,Not available,,Nature,Not available,e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age,71f2081718dd7e05dcc921e86199f022,http://dx.doi.org/10.1057/jit.2016.10 17211,"

Small- and medium-sized enterprises (SMEs) play an important role in the European economy. A critical challenge faced by SME leaders, as a consequence of the continuing digital technology revolution, is how to optimally align business strategy with digital technology to fully leverage the potential offered by these technologies in pursuit of longevity and growth. There is a paucity of empirical research examining how e-leadership in SMEs drives successful alignment between business strategy and digital technology fostering longevity and growth. To address this gap, in this paper we develop an empirically derived e-leadership model. Initially we develop a theoretical model of e-leadership drawing on strategic alignment theory. This provides a theoretical foundation on how SMEs can harness digital technology in support of their business strategy enabling sustainable growth. An in-depth empirical study was undertaken interviewing 42 successful European SME leaders to validate, advance and substantiate our theoretically driven model. The outcome of the two stage process – inductive development of a theoretically driven e-leadership model and deductive advancement to develop a complete model through in-depth interviews with successful European SME leaders – is an e-leadership model with specific constructs fostering effective strategic alignment. The resulting diagnostic model enables SME decision makers to exercise effective e-leadership by creating productive alignment between business strategy and digital technology improving longevity and growth prospects.

",maksim belitski,,2016.0,10.1057/jit.2016.10,Journal of Information Technology,Li2016,Not available,,Nature,Not available,e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age,71f2081718dd7e05dcc921e86199f022,http://dx.doi.org/10.1057/jit.2016.10 17212,"

Small- and medium-sized enterprises (SMEs) play an important role in the European economy. A critical challenge faced by SME leaders, as a consequence of the continuing digital technology revolution, is how to optimally align business strategy with digital technology to fully leverage the potential offered by these technologies in pursuit of longevity and growth. There is a paucity of empirical research examining how e-leadership in SMEs drives successful alignment between business strategy and digital technology fostering longevity and growth. To address this gap, in this paper we develop an empirically derived e-leadership model. Initially we develop a theoretical model of e-leadership drawing on strategic alignment theory. This provides a theoretical foundation on how SMEs can harness digital technology in support of their business strategy enabling sustainable growth. An in-depth empirical study was undertaken interviewing 42 successful European SME leaders to validate, advance and substantiate our theoretically driven model. The outcome of the two stage process – inductive development of a theoretically driven e-leadership model and deductive advancement to develop a complete model through in-depth interviews with successful European SME leaders – is an e-leadership model with specific constructs fostering effective strategic alignment. The resulting diagnostic model enables SME decision makers to exercise effective e-leadership by creating productive alignment between business strategy and digital technology improving longevity and growth prospects.

",abby ghobadian,,2016.0,10.1057/jit.2016.10,Journal of Information Technology,Li2016,Not available,,Nature,Not available,e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age,71f2081718dd7e05dcc921e86199f022,http://dx.doi.org/10.1057/jit.2016.10 17213,"

Small- and medium-sized enterprises (SMEs) play an important role in the European economy. A critical challenge faced by SME leaders, as a consequence of the continuing digital technology revolution, is how to optimally align business strategy with digital technology to fully leverage the potential offered by these technologies in pursuit of longevity and growth. There is a paucity of empirical research examining how e-leadership in SMEs drives successful alignment between business strategy and digital technology fostering longevity and growth. To address this gap, in this paper we develop an empirically derived e-leadership model. Initially we develop a theoretical model of e-leadership drawing on strategic alignment theory. This provides a theoretical foundation on how SMEs can harness digital technology in support of their business strategy enabling sustainable growth. An in-depth empirical study was undertaken interviewing 42 successful European SME leaders to validate, advance and substantiate our theoretically driven model. The outcome of the two stage process – inductive development of a theoretically driven e-leadership model and deductive advancement to develop a complete model through in-depth interviews with successful European SME leaders – is an e-leadership model with specific constructs fostering effective strategic alignment. The resulting diagnostic model enables SME decision makers to exercise effective e-leadership by creating productive alignment between business strategy and digital technology improving longevity and growth prospects.

",nicholas o'regan,,2016.0,10.1057/jit.2016.10,Journal of Information Technology,Li2016,Not available,,Nature,Not available,e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age,71f2081718dd7e05dcc921e86199f022,http://dx.doi.org/10.1057/jit.2016.10 17214,"

Long queues during holiday shopping events seem undesirable for both shoppers and retailers. However, the following article shows that, under some conditions, long queues benefit retailers for two reasons. First, long queues, by turning away high-time-cost shoppers, serve as a device of segmentation and targeting. Consequently, retailers deliver promotions only to low-time-cost shoppers. High-time-cost shoppers choose to purchase at a regular time (non-holiday shopping event) and pay the full price without having to make the wait. Second, longer queues prompt shoppers who stay in the line buy more products. In addition, the article shows that shoppers tend to wait longer when price discounts are greater. Accounting for the above findings, this article provides a numerical solution to jointly optimizing retailers’ promotional and operational decisions on holiday promotional sales.

",chun qiu,,2015.0,10.1057/rpm.2015.46,Journal of Revenue and Pricing Management,Qiu2015,Not available,,Nature,Not available,Managing long queues for holiday sales shopping,512236111a4b383483898cc21fad0218,http://dx.doi.org/10.1057/rpm.2015.46 17215,"

Long queues during holiday shopping events seem undesirable for both shoppers and retailers. However, the following article shows that, under some conditions, long queues benefit retailers for two reasons. First, long queues, by turning away high-time-cost shoppers, serve as a device of segmentation and targeting. Consequently, retailers deliver promotions only to low-time-cost shoppers. High-time-cost shoppers choose to purchase at a regular time (non-holiday shopping event) and pay the full price without having to make the wait. Second, longer queues prompt shoppers who stay in the line buy more products. In addition, the article shows that shoppers tend to wait longer when price discounts are greater. Accounting for the above findings, this article provides a numerical solution to jointly optimizing retailers’ promotional and operational decisions on holiday promotional sales.

",wenqing zhang,,2015.0,10.1057/rpm.2015.46,Journal of Revenue and Pricing Management,Qiu2015,Not available,,Nature,Not available,Managing long queues for holiday sales shopping,512236111a4b383483898cc21fad0218,http://dx.doi.org/10.1057/rpm.2015.46 17216,"

We analyse a decentralized supply chain consisting of a supplier and a retailer, each with a satisficing objective, that is, to maximize the probability of achieving a predetermined target profit. The supply chain is examined under two types of commonly used contracts: linear tariff contracts (including wholesale price contracts as special cases) and buy-back contracts. First, we identify the Pareto-optimal contract(s) for each contractual form. In particular, it is shown that there is a unique wholesale price that is Pareto optimal for both contractual types. Second, we evaluate the performance of the Pareto-optimal contracts. In contrast to the well-known results for a supply chain with the traditional expected profit objectives, we show that wholesale price contracts can coordinate the supply chain whereas buy-back contracts cannot. This provides an additional justification for the popularity of wholesale price contracts besides their simplicities and lower administration costs.

",b chen,,2006.0,10.1057/palgrave.jors.2602186,Journal of the Operational Research Society,Shi2006,Not available,,Nature,Not available,Pareto-optimal contracts for a supply chain with satisficing objectives,e6b97a065eee369e735e71757ffa0947,http://dx.doi.org/10.1057/palgrave.jors.2602186 17217,Limiting climate change without damaging the world economy depends on stronger and smarter market signals to regulate carbon dioxide,david victor,,2007.0,10.1038/scientificamerican1207-70,Scientific American,Victor2007,Not available,,Nature,Not available,Making Carbon Markets Work,e5839cc21c493a4b15ff50765c7b91b6,http://dx.doi.org/10.1038/scientificamerican1207-70 17218,Limiting climate change without damaging the world economy depends on stronger and smarter market signals to regulate carbon dioxide,danny cullenward,,2007.0,10.1038/scientificamerican1207-70,Scientific American,Victor2007,Not available,,Nature,Not available,Making Carbon Markets Work,e5839cc21c493a4b15ff50765c7b91b6,http://dx.doi.org/10.1038/scientificamerican1207-70 17219,"

This paper studies under what circumstances creditworthy sovereign borrowers may be denied liquidity by rational creditors. It is shown that, when the creditor side of the market consists of many small investors, multiple rational expectations equilibria may exist. In one equilibrium, creditors' pessimistic expectations about the borrower's creditworthiness become self-fulfilling, and the borrower experiences a liquidity crisis. Multiple equilibria can be avoided by marketing the loan appropriately or by developing a reputation for following good policies. Liquidity problems can also arise because international bond markets are temporarily disrupted owing to events unrelated to the borrower's circumstances. Policy responses are discussed.

",enrica detragiache,,1996.0,10.2307/3867553,Staff Papers - International Monetary Fund,Detragiache1996,Not available,,Nature,Not available,Rational Liquidity Crises in the Sovereign Debt Market: In Search of a Theory,534c055ae2932e6a4996b0ed0b1cd9f4,http://dx.doi.org/10.2307/3867553 17220,"

The speed at which the inflation rate adjusts to a reduction in nominal aggregate demand is the central issue in the ongoing debate over the cost of disinflation. Any reduction in the growth of nominal aggregate demand must be divided between a decline in the rate of inflation and a decline in the growth of output. When inflation adjusts sluggishly because of short-run inertia, a slowdown in the growth of nominal spending reduces output growth rather than inflation. In contrast, if inflation adjusts rapidly, the output cost of a disinflationary policy could be negligible. The paper addresses empirically the question of whether inflation adjusts rapidly or sluggishly to changes in nominal aggregate demand. Two alternative hypotheses are considered: the rational expectations market-clearing hypothesis (RE-MC) and the long-run natural rate hypothesis combined with short-run gradual adjustment of prices (NRH-GAP). One version of the RE-MC hypothesis states that the inflation rate responds instantaneously and equiproportionately to an anticipated change in nominal aggregate demand, implying that an expected disinflation could reduce inflation quickly with virtually no loss in output. According to the NRH-GAP hypothesis, however, inflation responds gradually in the short run and fully in the long run to nominal aggregate demand disturbances, whether these disturbances are anticipated or not. This hypothesis implies that the short-run output cost of disinflation could be substantial. A single reduced-form equation for the inflation rate is presented in the paper. The RE-MC and NRH-GAP hypotheses appear as special cases of this equation, which allows coefficient estimates to distinguish between the two. Tests of the two hypotheses, involving a general cross-country analysis of 13 developing countries, offer some support for the view that inflation may persist because of inertia, even if the anti-inflationary demand policy is anticipated. Thus, the control of inflation may be achieved only at the cost of a loss in output, since the adjustment of the inflation rate may be slow rather than instantaneous. This conclusion does not undermine the basic point that to cut inflation it is essential to reduce the growth rate of nominal aggregate demand or the money supply. Furthermore, the tests conducted are not capable of determining the response of the inflation rate to a credible change in the policy regime.

",ajai chopra,,1985.0,10.2307/3866744,Staff Papers - International Monetary Fund,Chopra1985,Not available,,Nature,Not available,The Speed of Adjustment of the Inflation Rate in Developing Countries: A Study of InertiaVitesse d'adjustement du taux d'inflation dans les pays en développement: étude de l'inertieVelocidad de ajuste de la tasa de inflación en los países en desarrollo: Examen de la inercia,ef2c2ae8d1630269acc6ca7e929ce8a6,http://dx.doi.org/10.2307/3866744 17221,"

The paper discusses the cybernetic mechanisms whereby our institutions fail to translate the will of the people into effective policies, and those by which the will of the people is an attenuated version of human potentiality in the first place. A systemic model is developed to account for the observed phenomena in terms of a cybernetic theory of the management process, and this is then exemplified from current dilemmas facing humankind. The model is subsequently extended to encompass the theory of viable systems, the principle of self-reference, and a model of self-hood which promotes new concepts that close the model into its starting point of human potential. The total approach bears on the capability of individuals, groups, institutions, societies and nations to realize themselves, and to thwart the dangers in which our civilization is plunged.

",stafford beer,,1983.0,10.1057/jors.1983.173,Journal of the Operational Research Society,Beer1983,Not available,,Nature,Not available,The Will of the People,64ec263fbeb8c86177d4682a021f3daf,http://dx.doi.org/10.1057/jors.1983.173 17222,"

Over the past 100 years, social science has generated a tremendous number of theories on the topics of individual and collective human behaviour. However, it has been much less successful at reconciling the innumerable inconsistencies and contradictions among these competing explanations, a situation that has not been resolved by recent advances in ‘computational social science’. In this Perspective, I argue that this ‘incoherency problem’ has been perpetuated by an historical emphasis in social science on the advancement of theories over the solution of practical problems. I argue that one way for social science to make progress is to adopt a more solution-oriented approach, starting first with a practical problem and then asking what theories (and methods) must be brought to bear to solve it. Finally, I conclude with a few suggestions regarding the sort of problems on which progress might be made and how we might organize ourselves to solve them.

",duncan watts,,2017.0,10.1038/s41562-016-0015,Nature Human Behaviour,Watts2017,Not available,,Nature,Not available,Should social science be more solution-oriented?,3d71041263608ea9a614d0fa55d2665d,http://dx.doi.org/10.1038/s41562-016-0015 17223,"

In this paper, we extend the general definition of Customer Lifetime Value (CLV) to include the value of influence associated with a consumer's network or connections. We introduce Connected Customer Lifetime Value (CCLV) as the present value of the net contribution associated with purchases made by a customer, plus the present value of the net contribution made by other customers due to the influence of that customer. We highlight social media engagement as an important process associated with that influence, and propose Customer Social Media Value (CSMV) to represent the value derived through said media engagement. Examples to illustrate CSMV and CCLV are provided.

",bruce weinberg,,2011.0,10.1057/dddmp.2011.2,"Journal of Direct, Data and Digital Marketing Practice",Weinberg2011,Not available,,Nature,Not available,Connected customer lifetime value: The impact of social media,cf16d2132f301521c4a4ac0e7c8f9a7e,http://dx.doi.org/10.1057/dddmp.2011.2 17224,"

Natural selection is conventionally assumed to favour the strong and selfish who maximize their own resources at the expense of others. But many biological systems, and especially human societies, are organized around altruistic, cooperative interactions. How can natural selection promote unselfish behaviour? Various mechanisms have been proposed, and a rich analysis of indirect reciprocity has recently emerged: I help you and somebody else helps me. The evolution of cooperation by indirect reciprocity leads to reputation building, morality judgement and complex social interactions with ever-increasing cognitive demands.

",martin nowak,,2005.0,10.1038/nature04131,Nature,Nowak2005,Not available,,Nature,Not available,Evolution of indirect reciprocity,d77c8fecce82a3d7c3eecf49e2d0e5aa,http://dx.doi.org/10.1038/nature04131 17225,"

Natural selection is conventionally assumed to favour the strong and selfish who maximize their own resources at the expense of others. But many biological systems, and especially human societies, are organized around altruistic, cooperative interactions. How can natural selection promote unselfish behaviour? Various mechanisms have been proposed, and a rich analysis of indirect reciprocity has recently emerged: I help you and somebody else helps me. The evolution of cooperation by indirect reciprocity leads to reputation building, morality judgement and complex social interactions with ever-increasing cognitive demands.

",karl sigmund,,2005.0,10.1038/nature04131,Nature,Nowak2005,Not available,,Nature,Not available,Evolution of indirect reciprocity,d77c8fecce82a3d7c3eecf49e2d0e5aa,http://dx.doi.org/10.1038/nature04131 17226,"

Although economics has long been considered as a non-experimental science, the development of experimental economics and behavioral economics is amazingly rapid and affects most fields of research. This paper first attempts at defining the main contributions of experiments to economics. It also identifies four main trends in the development of experimental research in economics. The third contribution of this paper is to identify the major theoretical and methodological challenges faced by behavioral and experimental economics.

",marie-claire villeval,,2007.0,10.1057/palgrave.fp.8200119,French Politics,Villeval2007,Not available,,Nature,Not available,"Experimental Economics: Contributions, Recent Developments, and New Challenges",6f9fdbd26a0bade3652c0115dcf404c0,http://dx.doi.org/10.1057/palgrave.fp.8200119 17227,"

The primary goal of these introductory notes is to promote the clear presentation and rigorous analysis of dynamic economic models, whether expressed in equation or agent-based form. A secondary goal is to promote the use of initial-value state-space modeling with its regard for historical process, for cause leading to effect without the external imposition of global coordination constraints on agent actions. Economists who claim to respect individual rationality should not be doing for their modeled economic agents what in reality these agents must do for themselves.

Eastern Economic Journal advance online publication, 14 March 2016; doi:10.1057/eej.2016.2",leigh tesfatsion,,2016.0,10.1057/eej.2016.2,Eastern Economic Journal,Tesfatsion2016,Not available,,Nature,Not available,Elements of Dynamic Economic Modeling: Presentation and Analysis,559c0b79bb30b269db7117a2808f7b65,http://dx.doi.org/10.1057/eej.2016.2 17228,"

A retailer places a certain product (eg compact rental cars) for sale on the internet. Customers are invited to ‘name-their-own price’ for the product. The retailer will accept a given bid x with probability equal to p(.). It is assumed that customers know the function p(.) and will place bids that maximise their individual expected profits. Knowing that customers will behave this way, the retailer wants to choose the function p(.) that maximises the retailer's expected profit. We demonstrate that there is an explicit ɛ-optimal solution to this problem.

",john wilson,,2008.0,10.1057/rpm.2008.13,Journal of Revenue and Pricing Management,Wilson2008,Not available,,Nature,Not available,Optimal design of a name-your-own price channel,86368f40b88727835a6a7f37f9a67b0e,http://dx.doi.org/10.1057/rpm.2008.13 17229,"

A retailer places a certain product (eg compact rental cars) for sale on the internet. Customers are invited to ‘name-their-own price’ for the product. The retailer will accept a given bid x with probability equal to p(.). It is assumed that customers know the function p(.) and will place bids that maximise their individual expected profits. Knowing that customers will behave this way, the retailer wants to choose the function p(.) that maximises the retailer's expected profit. We demonstrate that there is an explicit ɛ-optimal solution to this problem.

",guoren zhang,,2008.0,10.1057/rpm.2008.13,Journal of Revenue and Pricing Management,Wilson2008,Not available,,Nature,Not available,Optimal design of a name-your-own price channel,86368f40b88727835a6a7f37f9a67b0e,http://dx.doi.org/10.1057/rpm.2008.13 17230,An 'essentially unbeatable' algorithm for the popular card game points to strategies for solving real-life problems without having complete information.,philip ball,,2015.0,10.1038/nature.2015.16683,Nature News,Ball2015,Not available,,Nature,Not available,Game theorists crack poker,052354fb6d4754883bb1a590826e86ac,http://dx.doi.org/10.1038/nature.2015.16683 17231,"

This article deals with the problem of coordinating a vertically separated channel under consignment contracts with a price-dependent revenue-sharing (R-S) function. We consider the retailer being a channel leader who offers the vendor a leave-it-or-take-it contract, and the vendor being a price-setting firm who sells the one-of-a-kind goods through the exclusive channel. Under such a setting, the retailer decides on the term of R-S contract, and the vendor determines the retail price of the product. For each item sold, the retailer deducts an agreed-upon percentage from the price and remits the balance to the vendor. We model the decision-making of the two firms as a Stackelberg game, and carry out equilibrium analysis for both the centralized and decentralized regimes of the channel with consideration of three kinds of contracts: the fixed, the price-increasing, and the price-decreasing R-S percentage. Our analysis reveals that the contract with a price-decreasing R-S function, for example, the fee structure adopted by eBay.com, performs worse than the others. It persists in a consistent bias: the price-decreasing R-S induces the vendor to choose a higher price, and the retailer tends to receive a lower R-S percentage, which leads to less demand quantity, less profit, and channel inefficiency.

",j-m chen,,2010.0,10.1057/jors.2010.174,Journal of the Operational Research Society,Chen2010,Not available,,Nature,Not available,On channel coordination under price-dependent revenue-sharing: can eBay's fee structure coordinate the channel?,e806e372fa5fbd9918851bc733781684,http://dx.doi.org/10.1057/jors.2010.174 17232,"

This article deals with the problem of coordinating a vertically separated channel under consignment contracts with a price-dependent revenue-sharing (R-S) function. We consider the retailer being a channel leader who offers the vendor a leave-it-or-take-it contract, and the vendor being a price-setting firm who sells the one-of-a-kind goods through the exclusive channel. Under such a setting, the retailer decides on the term of R-S contract, and the vendor determines the retail price of the product. For each item sold, the retailer deducts an agreed-upon percentage from the price and remits the balance to the vendor. We model the decision-making of the two firms as a Stackelberg game, and carry out equilibrium analysis for both the centralized and decentralized regimes of the channel with consideration of three kinds of contracts: the fixed, the price-increasing, and the price-decreasing R-S percentage. Our analysis reveals that the contract with a price-decreasing R-S function, for example, the fee structure adopted by eBay.com, performs worse than the others. It persists in a consistent bias: the price-decreasing R-S induces the vendor to choose a higher price, and the retailer tends to receive a lower R-S percentage, which leads to less demand quantity, less profit, and channel inefficiency.

",h-l cheng,,2010.0,10.1057/jors.2010.174,Journal of the Operational Research Society,Chen2010,Not available,,Nature,Not available,On channel coordination under price-dependent revenue-sharing: can eBay's fee structure coordinate the channel?,e806e372fa5fbd9918851bc733781684,http://dx.doi.org/10.1057/jors.2010.174 17233,"

This article deals with the problem of coordinating a vertically separated channel under consignment contracts with a price-dependent revenue-sharing (R-S) function. We consider the retailer being a channel leader who offers the vendor a leave-it-or-take-it contract, and the vendor being a price-setting firm who sells the one-of-a-kind goods through the exclusive channel. Under such a setting, the retailer decides on the term of R-S contract, and the vendor determines the retail price of the product. For each item sold, the retailer deducts an agreed-upon percentage from the price and remits the balance to the vendor. We model the decision-making of the two firms as a Stackelberg game, and carry out equilibrium analysis for both the centralized and decentralized regimes of the channel with consideration of three kinds of contracts: the fixed, the price-increasing, and the price-decreasing R-S percentage. Our analysis reveals that the contract with a price-decreasing R-S function, for example, the fee structure adopted by eBay.com, performs worse than the others. It persists in a consistent bias: the price-decreasing R-S induces the vendor to choose a higher price, and the retailer tends to receive a lower R-S percentage, which leads to less demand quantity, less profit, and channel inefficiency.

",i-c lin,,2010.0,10.1057/jors.2010.174,Journal of the Operational Research Society,Chen2010,Not available,,Nature,Not available,On channel coordination under price-dependent revenue-sharing: can eBay's fee structure coordinate the channel?,e806e372fa5fbd9918851bc733781684,http://dx.doi.org/10.1057/jors.2010.174 17234,"

In this paper, we extend the general definition of Customer Lifetime Value (CLV) to include the value of influence associated with a consumer's network or connections. We introduce Connected Customer Lifetime Value (CCLV) as the present value of the net contribution associated with purchases made by a customer, plus the present value of the net contribution made by other customers due to the influence of that customer. We highlight social media engagement as an important process associated with that influence, and propose Customer Social Media Value (CSMV) to represent the value derived through said media engagement. Examples to illustrate CSMV and CCLV are provided.

",paul berger,,2011.0,10.1057/dddmp.2011.2,"Journal of Direct, Data and Digital Marketing Practice",Weinberg2011,Not available,,Nature,Not available,Connected customer lifetime value: The impact of social media,cf16d2132f301521c4a4ac0e7c8f9a7e,http://dx.doi.org/10.1057/dddmp.2011.2 17235,"

Information Systems enjoyment has been identified as a desirable phenomenon, because it can drive various aspects of system use. In this study, we argue that it can also be a key ingredient in the formation of adverse outcomes, such as technology-related addictions, through the positive reinforcement it generates. We rely on several theoretical mechanisms and, consistent with previous studies, suggest that enjoyment can lead to presumably positive outcomes, such as high engagement. Nevertheless, it can also facilitate the development of a strong habit and reinforce it until it becomes a ‘bad habit’, that can help forming a strong pathological and maladaptive psychological dependency on the use of the IT artifact (i.e., technology addiction). We test and validate this dual effect of enjoyment, with a data set of 194 social networking website users analyzed with SEM techniques. The potential duality of MIS constructs and other implications for research and practice are discussed.

",ofir turel,,2012.0,10.1057/ejis.2012.1,European Journal of Information Systems,Turel2012,Not available,,Nature,Not available,The benefits and dangers of enjoyment with social networking websites,054ff6afc8452cb7a333749e5216db97,http://dx.doi.org/10.1057/ejis.2012.1 17236,"

Information Systems enjoyment has been identified as a desirable phenomenon, because it can drive various aspects of system use. In this study, we argue that it can also be a key ingredient in the formation of adverse outcomes, such as technology-related addictions, through the positive reinforcement it generates. We rely on several theoretical mechanisms and, consistent with previous studies, suggest that enjoyment can lead to presumably positive outcomes, such as high engagement. Nevertheless, it can also facilitate the development of a strong habit and reinforce it until it becomes a ‘bad habit’, that can help forming a strong pathological and maladaptive psychological dependency on the use of the IT artifact (i.e., technology addiction). We test and validate this dual effect of enjoyment, with a data set of 194 social networking website users analyzed with SEM techniques. The potential duality of MIS constructs and other implications for research and practice are discussed.

",alexander serenko,,2012.0,10.1057/ejis.2012.1,European Journal of Information Systems,Turel2012,Not available,,Nature,Not available,The benefits and dangers of enjoyment with social networking websites,054ff6afc8452cb7a333749e5216db97,http://dx.doi.org/10.1057/ejis.2012.1 17237,"

Social dilemmas are central to human society. Depletion of natural resources, climate protection, security of energy supply, and workplace collaborations are all examples of social dilemmas. Since cooperative behaviour in a social dilemma is individually costly, Nash equilibrium predicts that humans should not cooperate. Yet experimental studies show that people do cooperate even in anonymous one-shot interactions. In spite of the large number of participants in many modern social dilemmas, little is known about the effect of group size on cooperation. Does larger group size favour or prevent cooperation? We address this problem both experimentally and theoretically. Experimentally, we find that there is no general answer: it depends on the strategic situation. Specifically, we find that larger groups are more cooperative in the Public Goods game, but less cooperative in the N-person Prisoner's dilemma. Theoretically, we show that this behaviour is not consistent with either the Fehr & Schmidt model or (a one-parameter version of) the Charness & Rabin model, but it is consistent with the cooperative equilibrium model introduced by the second author.

",helene barcelo,Human behaviour,2015.0,10.1038/srep07937,Scientific Reports,Barcelo2015,Not available,,Nature,Not available,Group size effect on cooperation in one-shot social dilemmas,2eeb239be2db76bd8e7531754b422bce,http://dx.doi.org/10.1038/srep07937 17238,"

Social dilemmas are central to human society. Depletion of natural resources, climate protection, security of energy supply, and workplace collaborations are all examples of social dilemmas. Since cooperative behaviour in a social dilemma is individually costly, Nash equilibrium predicts that humans should not cooperate. Yet experimental studies show that people do cooperate even in anonymous one-shot interactions. In spite of the large number of participants in many modern social dilemmas, little is known about the effect of group size on cooperation. Does larger group size favour or prevent cooperation? We address this problem both experimentally and theoretically. Experimentally, we find that there is no general answer: it depends on the strategic situation. Specifically, we find that larger groups are more cooperative in the Public Goods game, but less cooperative in the N-person Prisoner's dilemma. Theoretically, we show that this behaviour is not consistent with either the Fehr & Schmidt model or (a one-parameter version of) the Charness & Rabin model, but it is consistent with the cooperative equilibrium model introduced by the second author.

",helene barcelo,Social evolution,2015.0,10.1038/srep07937,Scientific Reports,Barcelo2015,Not available,,Nature,Not available,Group size effect on cooperation in one-shot social dilemmas,2eeb239be2db76bd8e7531754b422bce,http://dx.doi.org/10.1038/srep07937 17239,"

Social dilemmas are central to human society. Depletion of natural resources, climate protection, security of energy supply, and workplace collaborations are all examples of social dilemmas. Since cooperative behaviour in a social dilemma is individually costly, Nash equilibrium predicts that humans should not cooperate. Yet experimental studies show that people do cooperate even in anonymous one-shot interactions. In spite of the large number of participants in many modern social dilemmas, little is known about the effect of group size on cooperation. Does larger group size favour or prevent cooperation? We address this problem both experimentally and theoretically. Experimentally, we find that there is no general answer: it depends on the strategic situation. Specifically, we find that larger groups are more cooperative in the Public Goods game, but less cooperative in the N-person Prisoner's dilemma. Theoretically, we show that this behaviour is not consistent with either the Fehr & Schmidt model or (a one-parameter version of) the Charness & Rabin model, but it is consistent with the cooperative equilibrium model introduced by the second author.

",valerio capraro,Human behaviour,2015.0,10.1038/srep07937,Scientific Reports,Barcelo2015,Not available,,Nature,Not available,Group size effect on cooperation in one-shot social dilemmas,2eeb239be2db76bd8e7531754b422bce,http://dx.doi.org/10.1038/srep07937 17240,"

Social dilemmas are central to human society. Depletion of natural resources, climate protection, security of energy supply, and workplace collaborations are all examples of social dilemmas. Since cooperative behaviour in a social dilemma is individually costly, Nash equilibrium predicts that humans should not cooperate. Yet experimental studies show that people do cooperate even in anonymous one-shot interactions. In spite of the large number of participants in many modern social dilemmas, little is known about the effect of group size on cooperation. Does larger group size favour or prevent cooperation? We address this problem both experimentally and theoretically. Experimentally, we find that there is no general answer: it depends on the strategic situation. Specifically, we find that larger groups are more cooperative in the Public Goods game, but less cooperative in the N-person Prisoner's dilemma. Theoretically, we show that this behaviour is not consistent with either the Fehr & Schmidt model or (a one-parameter version of) the Charness & Rabin model, but it is consistent with the cooperative equilibrium model introduced by the second author.

",valerio capraro,Social evolution,2015.0,10.1038/srep07937,Scientific Reports,Barcelo2015,Not available,,Nature,Not available,Group size effect on cooperation in one-shot social dilemmas,2eeb239be2db76bd8e7531754b422bce,http://dx.doi.org/10.1038/srep07937 17241,

We provide an overview of the paths taken to understand existence and efficiency of equilibrium in competitive insurance markets with adverse selection since the seminal work by Rothschild and Stiglitz (1976). A stream of recent work reconsiders the strategic foundations of competitive equilibrium by carefully modelling the market game.

,wanda mimra,,2014.0,10.1057/grir.2014.11,The Geneva Risk and Insurance Review,Mimra2014,Not available,,Nature,Not available,New Developments in the Theory of Adverse Selection in Competitive Insurance,b7314c0d99638c57821f946581ff0e27,http://dx.doi.org/10.1057/grir.2014.11 17242,

We provide an overview of the paths taken to understand existence and efficiency of equilibrium in competitive insurance markets with adverse selection since the seminal work by Rothschild and Stiglitz (1976). A stream of recent work reconsiders the strategic foundations of competitive equilibrium by carefully modelling the market game.

,achim wambach,,2014.0,10.1057/grir.2014.11,The Geneva Risk and Insurance Review,Mimra2014,Not available,,Nature,Not available,New Developments in the Theory of Adverse Selection in Competitive Insurance,b7314c0d99638c57821f946581ff0e27,http://dx.doi.org/10.1057/grir.2014.11 17243,"

An increasingly popular venue for advertisers is the keyword advertising on the web pages of search engines. Advertisers bid for keywords, where bid price determines ad placement, which in turn affects the response function, defined as the click-through rate. Advertisers typically have a fixed daily budget that should not be exceeded, so an advertiser must allocate the budget as productively as possible by selecting which keywords to use and then deciding how much to allocate for each keyword. We construct and examine a model for this selection and allocation process.

",ozgur ozluk,,2007.0,10.1057/palgrave.rpm.5160110,Journal of Revenue and Pricing Management,Özlük2007,Not available,,Nature,Not available,Allocating expenditures across keywords in search advertising,0f132c04bbf12b59733229d12ff02531,http://dx.doi.org/10.1057/palgrave.rpm.5160110 17244,"

Bank regulation is supposed to reduce the probability of bank failure and, if a failure occurs, to contain the damage so that system-wide problems are unlikely. The current regulatory framework, known as Basel II, is based, among other things, on risk-adjusted capital requirements. This framework has failed in the recent global financial crisis. Some believe that one of the culprits is the exclusion of so-called shadow banks (for example, hedge funds and investment banks) from regulation. We find little support for this assumption in our simulations. To the contrary, our simulations reveal that extending the same regulation to more entities is likely to produce very synchronous behaviour and thus exacerbate contagion and market crashes. On the other hand, the new size-adjusted regulation (the so-called leverage ratio) that has been proposed in Basel III appears to be more robust.

",yvan lengwiler,,2013.0,10.1057/jbr.2013.20,Journal of Banking Regulation,Lengwiler2013,Not available,,Nature,Not available,Regulation and contagion of banks,5667f86a716bd2edbf4e3b26bc28e80f,http://dx.doi.org/10.1057/jbr.2013.20 17245,"

An increasingly popular venue for advertisers is the keyword advertising on the web pages of search engines. Advertisers bid for keywords, where bid price determines ad placement, which in turn affects the response function, defined as the click-through rate. Advertisers typically have a fixed daily budget that should not be exceeded, so an advertiser must allocate the budget as productively as possible by selecting which keywords to use and then deciding how much to allocate for each keyword. We construct and examine a model for this selection and allocation process.

",susan cholette,,2007.0,10.1057/palgrave.rpm.5160110,Journal of Revenue and Pricing Management,Özlük2007,Not available,,Nature,Not available,Allocating expenditures across keywords in search advertising,0f132c04bbf12b59733229d12ff02531,http://dx.doi.org/10.1057/palgrave.rpm.5160110 17246,"

We are now suffering through economic problems that are worse than those that buffeted us 35 years ago, when the Eastern Economic Association was born. Since then, we have not made a great deal of progress toward methods of observation and analysis that would make economics a truly empirical science and would provide a means to better policy. Much if not most of the profession is still mired in the traditional ways of doing micro (sitting in a chair and making it up) and macro (pretending the economy is a single person, writ large). Factionalism in the profession, based on political leanings, is still rife. Behavioral and experimental economists assume we can learn what we need to know about businesses from watching students playing games made up by their professors. Neuroeconomics is arguably nothing but a diversion from what we should be doing. Very few economists are engaging in direct observation of businesses, as they actually operate. More of such work is needed.

",barbara bergmann,,2009.0,10.1057/eej.2008.49,Eastern Economic Journal,Bergmann2009,Not available,,Nature,Not available,The Economy and the Economics Profession: Both Need Work,d008b6b36acd1ce55b34182ceedbdb1e,http://dx.doi.org/10.1057/eej.2008.49 17247,"

This paper investigates the price formation of an artificial futures market with zero-intelligence traders. It extends the zero-intelligence model to speculative agents trading for immediacy on a futures exchange with open outcry, margin constraints, and real-time settlement. Like prior studies it finds that the imposition of scarcity, not intelligent optimization, is surprisingly good at producing allocative efficiency. The double auction trading mechanism even with open outcry and real-time settlement anchors prices to a dynamic Walrasian equilibrium, even when it is not unique. This study supports zero-intelligence agent-based methodology as a tool to isolate the impact of market microstructure, as opposed to information, on price formation.

",leanne ussher,,2008.0,10.1057/eej.2008.34,Eastern Economic Journal,Ussher2008,Not available,,Nature,Not available,A Speculative Futures Market with Zero-Intelligence,6d4cd1a71ab2274a0ee67de7cd612191,http://dx.doi.org/10.1057/eej.2008.34 17248,

This paper examines the role and impact of taxation on sustainable forest management. It is shown that fiscal instruments neither reinforce nor substitute for traditional regulatory approaches and can actually undermine sustainability. The paper uses the reasoning at the root of the Faustmann solution to draw conclusions on the incentives for sustainable tropical forest exploitation. It proposes a bond mechanism as an alternative market-based instrument to encourage sustainable forest logging while reducing monitoring costs.

,luc leruth,,2001.0,10.2307/4621675,IMF Staff Papers,Leruth2001,Not available,,Nature,Not available,The Complier Pays Principle: The Limits of Fiscal Approaches toward Sustainable Forest Management,d028b95b0dabbfc1bd1a176ecd8e5c4c,http://dx.doi.org/10.2307/4621675 17249,

This paper examines the role and impact of taxation on sustainable forest management. It is shown that fiscal instruments neither reinforce nor substitute for traditional regulatory approaches and can actually undermine sustainability. The paper uses the reasoning at the root of the Faustmann solution to draw conclusions on the incentives for sustainable tropical forest exploitation. It proposes a bond mechanism as an alternative market-based instrument to encourage sustainable forest logging while reducing monitoring costs.

,remi paris,,2001.0,10.2307/4621675,IMF Staff Papers,Leruth2001,Not available,,Nature,Not available,The Complier Pays Principle: The Limits of Fiscal Approaches toward Sustainable Forest Management,d028b95b0dabbfc1bd1a176ecd8e5c4c,http://dx.doi.org/10.2307/4621675 17250,

This paper examines the role and impact of taxation on sustainable forest management. It is shown that fiscal instruments neither reinforce nor substitute for traditional regulatory approaches and can actually undermine sustainability. The paper uses the reasoning at the root of the Faustmann solution to draw conclusions on the incentives for sustainable tropical forest exploitation. It proposes a bond mechanism as an alternative market-based instrument to encourage sustainable forest logging while reducing monitoring costs.

,ivan ruzicka,,2001.0,10.2307/4621675,IMF Staff Papers,Leruth2001,Not available,,Nature,Not available,The Complier Pays Principle: The Limits of Fiscal Approaches toward Sustainable Forest Management,d028b95b0dabbfc1bd1a176ecd8e5c4c,http://dx.doi.org/10.2307/4621675 17251,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",heinrich nax,Statistical physics,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17252,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",heinrich nax,Climate-change mitigation,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17253,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",heinrich nax,Phase transitions and critical phenomena,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17254,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",heinrich nax,Sustainability,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17255,"

Bank regulation is supposed to reduce the probability of bank failure and, if a failure occurs, to contain the damage so that system-wide problems are unlikely. The current regulatory framework, known as Basel II, is based, among other things, on risk-adjusted capital requirements. This framework has failed in the recent global financial crisis. Some believe that one of the culprits is the exclusion of so-called shadow banks (for example, hedge funds and investment banks) from regulation. We find little support for this assumption in our simulations. To the contrary, our simulations reveal that extending the same regulation to more entities is likely to produce very synchronous behaviour and thus exacerbate contagion and market crashes. On the other hand, the new size-adjusted regulation (the so-called leverage ratio) that has been proposed in Basel III appears to be more robust.

",dietmar maringer,,2013.0,10.1057/jbr.2013.20,Journal of Banking Regulation,Lengwiler2013,Not available,,Nature,Not available,Regulation and contagion of banks,5667f86a716bd2edbf4e3b26bc28e80f,http://dx.doi.org/10.1057/jbr.2013.20 17256,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",matjaz perc,Statistical physics,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17257,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",matjaz perc,Climate-change mitigation,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17258,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",matjaz perc,Phase transitions and critical phenomena,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17259,"

We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

",matjaz perc,Sustainability,2015.0,10.1038/srep08010,Scientific Reports,Nax2015,Not available,,Nature,Not available,Directional learning and the provisioning of public goods,b0c9a480142a8a2c5482c1e31d4f5ffe,http://dx.doi.org/10.1038/srep08010 17260,"As the recipients of the 2012 science Nobel prizes gather in Stockholm to celebrate and be celebrated, News & Views shares some expert opinions on the achievements honoured.",yan chen,Economics,2012.0,10.1038/492054a,Nature,Chen2012,Not available,,Nature,Not available,NOBEL 2012 Economics: Stable allocations and market design,59c20c284c8e66f42398c69455fb5d49,http://dx.doi.org/10.1038/492054a 17261,"As the recipients of the 2012 science Nobel prizes gather in Stockholm to celebrate and be celebrated, News & Views shares some expert opinions on the achievements honoured.",jacob goeree,Economics,2012.0,10.1038/492054a,Nature,Chen2012,Not available,,Nature,Not available,NOBEL 2012 Economics: Stable allocations and market design,59c20c284c8e66f42398c69455fb5d49,http://dx.doi.org/10.1038/492054a 17262,"

The paper provides a state-of-the-art review of several innovative advances in culture and international business (IB) to stimulate new avenues for future research. We first review the issues surrounding cultural convergence and divergence, and the processes underlying cultural changes. We then examine novel constructs for characterizing cultures, and how to enhance the precision of cultural models by pinpointing when cultural effects are important. Finally, we examine the usefulness of experimental methods, which are rarely used by IB researchers. Implications of these path-breaking approaches for future research on culture and IB are discussed.

",kwok leung,,2005.0,10.1057/palgrave.jibs.8400150,Journal of International Business Studies,Leung2005,Not available,,Nature,Not available,Culture and international business: recent advances and their implications for future research,3f6893df61dc1eed599c85e84bb30853,http://dx.doi.org/10.1057/palgrave.jibs.8400150 17263,"

The paper provides a state-of-the-art review of several innovative advances in culture and international business (IB) to stimulate new avenues for future research. We first review the issues surrounding cultural convergence and divergence, and the processes underlying cultural changes. We then examine novel constructs for characterizing cultures, and how to enhance the precision of cultural models by pinpointing when cultural effects are important. Finally, we examine the usefulness of experimental methods, which are rarely used by IB researchers. Implications of these path-breaking approaches for future research on culture and IB are discussed.

",rabi bhagat,,2005.0,10.1057/palgrave.jibs.8400150,Journal of International Business Studies,Leung2005,Not available,,Nature,Not available,Culture and international business: recent advances and their implications for future research,3f6893df61dc1eed599c85e84bb30853,http://dx.doi.org/10.1057/palgrave.jibs.8400150 17264,"

The paper provides a state-of-the-art review of several innovative advances in culture and international business (IB) to stimulate new avenues for future research. We first review the issues surrounding cultural convergence and divergence, and the processes underlying cultural changes. We then examine novel constructs for characterizing cultures, and how to enhance the precision of cultural models by pinpointing when cultural effects are important. Finally, we examine the usefulness of experimental methods, which are rarely used by IB researchers. Implications of these path-breaking approaches for future research on culture and IB are discussed.

",nancy buchan,,2005.0,10.1057/palgrave.jibs.8400150,Journal of International Business Studies,Leung2005,Not available,,Nature,Not available,Culture and international business: recent advances and their implications for future research,3f6893df61dc1eed599c85e84bb30853,http://dx.doi.org/10.1057/palgrave.jibs.8400150 17265,"

The paper provides a state-of-the-art review of several innovative advances in culture and international business (IB) to stimulate new avenues for future research. We first review the issues surrounding cultural convergence and divergence, and the processes underlying cultural changes. We then examine novel constructs for characterizing cultures, and how to enhance the precision of cultural models by pinpointing when cultural effects are important. Finally, we examine the usefulness of experimental methods, which are rarely used by IB researchers. Implications of these path-breaking approaches for future research on culture and IB are discussed.

",miriam erez,,2005.0,10.1057/palgrave.jibs.8400150,Journal of International Business Studies,Leung2005,Not available,,Nature,Not available,Culture and international business: recent advances and their implications for future research,3f6893df61dc1eed599c85e84bb30853,http://dx.doi.org/10.1057/palgrave.jibs.8400150 17266,"

While organisational size is a popular construct in information systems (IS) research, findings from its use have been inconsistent. Few studies have explored this inconsistency or attempted to address this problem. This paper uses Churchill's measure development paradigm to conduct three separate but related investigations into the size construct. Study 1 explored the domain and dimensions of size. Some 2000 research papers published in six leading IS journals over an 11-year period were read in order to determine what researchers thought size meant and how they measured it. The study found 21 constructs underpinning the size construct and 25 ways of measuring size, but no clear relationship between size meaning and measurement. Study 2 assessed the construct's content validity using a concept map exercise involving 41 participants. Multidimensional scaling clustered the constructs into three conceptual groups. Study 3 administered the size construct in a survey with a sample of 163 Australian firms. The study found that the data supported the constructs observed in Study 2 and that a group of eight constructs could be used to differentiate between smaller and larger firms in the sample. Analysis revealed that organisational levels, risk aversion, geographic distribution and employment reflected respondents’ self-nominated size.

",sigi goode,,2009.0,10.1057/ejis.2009.2,European Journal of Information Systems,Goode2009,Not available,,Nature,Not available,"Rethinking organisational size in IS research: meaning, measurement and redevelopment",8ff957f6af480044dbe7a57e0fc82cdc,http://dx.doi.org/10.1057/ejis.2009.2 17267,"

The paper provides a state-of-the-art review of several innovative advances in culture and international business (IB) to stimulate new avenues for future research. We first review the issues surrounding cultural convergence and divergence, and the processes underlying cultural changes. We then examine novel constructs for characterizing cultures, and how to enhance the precision of cultural models by pinpointing when cultural effects are important. Finally, we examine the usefulness of experimental methods, which are rarely used by IB researchers. Implications of these path-breaking approaches for future research on culture and IB are discussed.

",cristina gibson,,2005.0,10.1057/palgrave.jibs.8400150,Journal of International Business Studies,Leung2005,Not available,,Nature,Not available,Culture and international business: recent advances and their implications for future research,3f6893df61dc1eed599c85e84bb30853,http://dx.doi.org/10.1057/palgrave.jibs.8400150 17268,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",ji-qiang zhang,Nonlinear phenomena,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17269,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",ji-qiang zhang,Statistical physics,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17270,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",zi-gang huang,Nonlinear phenomena,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17271,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",zi-gang huang,Statistical physics,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17272,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",zhi-xi wu,Nonlinear phenomena,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17273,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",zhi-xi wu,Statistical physics,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17274,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",riqi su,Nonlinear phenomena,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17275,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",riqi su,Statistical physics,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17276,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",ying-cheng lai,Nonlinear phenomena,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17277,"

While organisational size is a popular construct in information systems (IS) research, findings from its use have been inconsistent. Few studies have explored this inconsistency or attempted to address this problem. This paper uses Churchill's measure development paradigm to conduct three separate but related investigations into the size construct. Study 1 explored the domain and dimensions of size. Some 2000 research papers published in six leading IS journals over an 11-year period were read in order to determine what researchers thought size meant and how they measured it. The study found 21 constructs underpinning the size construct and 25 ways of measuring size, but no clear relationship between size meaning and measurement. Study 2 assessed the construct's content validity using a concept map exercise involving 41 participants. Multidimensional scaling clustered the constructs into three conceptual groups. Study 3 administered the size construct in a survey with a sample of 163 Australian firms. The study found that the data supported the constructs observed in Study 2 and that a group of eight constructs could be used to differentiate between smaller and larger firms in the sample. Analysis revealed that organisational levels, risk aversion, geographic distribution and employment reflected respondents’ self-nominated size.

",shirley gregor,,2009.0,10.1057/ejis.2009.2,European Journal of Information Systems,Goode2009,Not available,,Nature,Not available,"Rethinking organisational size in IS research: meaning, measurement and redevelopment",8ff957f6af480044dbe7a57e0fc82cdc,http://dx.doi.org/10.1057/ejis.2009.2 17278,"

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

",ying-cheng lai,Statistical physics,2016.0,10.1038/srep20925,Scientific Reports,Zhang2016,Not available,,Nature,Not available,Controlling herding in minority game systems,bbbce6216ef61705721e52ad651b3fea,http://dx.doi.org/10.1038/srep20925 17279,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",giles story,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17280,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",giles story,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17281,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",giles story,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17282,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ivo vlaev,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17283,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ivo vlaev,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17284,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ivo vlaev,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17285,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",robert metcalfe,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17286,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",robert metcalfe,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17287,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",robert metcalfe,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17288,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",molly crockett,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17289,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",molly crockett,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17290,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",molly crockett,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17291,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",zeb kurth-nelson,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17292,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",zeb kurth-nelson,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17293,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",zeb kurth-nelson,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17294,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ara darzi,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17295,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ara darzi,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17296,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",ara darzi,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17297,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",raymond dolan,Motivation,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17298,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",qinghua he,Brain,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17300,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",raymond dolan,Social behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17301,"

People show empathic responses to others’ pain, yet how they choose to apportion pain between themselves and others is not well understood. To address this question, we observed choices to reapportion social allocations of painful stimuli and, for comparison, also elicited equivalent choices with money. On average people sought to equalize allocations of both pain and money, in a manner which indicated that inequality carried an increasing marginal cost. Preferences for pain were more altruistic than for money, with several participants assigning more than half the pain to themselves. Our data indicate that, given concern for others, the fundamental principle of diminishing marginal utility motivates spreading costs across individuals. A model incorporating this assumption outperformed existing models of social utility in explaining the data. By implementing selected allocations for real, we also found that while inequality per se did not influence pain perception, altruistic behavior had an intrinsic analgesic effect for the recipient.

",raymond dolan,Human behaviour,2015.0,10.1038/srep15389,Scientific Reports,Story2015,Not available,,Nature,Not available,Social redistribution of pain and money,b982504648557e2db54c60febb15f5cf,http://dx.doi.org/10.1038/srep15389 17302,

One of the prime tenets of most economists is that markets can efficiently set prices that match the producer's costs with the benefits the consumers receive. But what is a market anyway?

,paul wallich,,1992.0,10.1038/scientificamerican0892-121,Scientific American,Wallich1992,Not available,,Nature,Not available,Experimenting with the Invisible Hand,1acdafa672b50b5afd44c2333b9fc9a1,http://dx.doi.org/10.1038/scientificamerican0892-121 17303,"

We study dynamic games between two providers — an entrant and an incumbent — each with fixed capacity, who compete to sell in both a forward market and a spot market. We analyse two types of games between the providers: (a) a sequential game where the incumbent plays first followed by the entrant and (b) a repeated game where both providers make simultaneous decisions but do this repeatedly an infinite number of times. Demand is either from a single buyer or a population of independent consumers. We identify outcomes for the sequential game for varying levels of demand. For the repeated game, we identify the existence of subgame-perfect Nash equilibria and show how the two providers can obtain higher average revenues by implicit collusion. The study has implications for revenue management markets where providers have dynamic competitive interactions rather then a single static interaction.

",guillermo gallego,,2006.0,10.1057/palgrave.rpm.5160020,Journal of Revenue and Pricing Management,Gallego2006,Not available,,Nature,Not available,Dynamic revenue management games with forward and spot markets,469072effa62964ad7224bbf317f6ae2,http://dx.doi.org/10.1057/palgrave.rpm.5160020 17304,"

We study dynamic games between two providers — an entrant and an incumbent — each with fixed capacity, who compete to sell in both a forward market and a spot market. We analyse two types of games between the providers: (a) a sequential game where the incumbent plays first followed by the entrant and (b) a repeated game where both providers make simultaneous decisions but do this repeatedly an infinite number of times. Demand is either from a single buyer or a population of independent consumers. We identify outcomes for the sequential game for varying levels of demand. For the repeated game, we identify the existence of subgame-perfect Nash equilibria and show how the two providers can obtain higher average revenues by implicit collusion. The study has implications for revenue management markets where providers have dynamic competitive interactions rather then a single static interaction.

",srinivas krishnamoorthy,,2006.0,10.1057/palgrave.rpm.5160020,Journal of Revenue and Pricing Management,Gallego2006,Not available,,Nature,Not available,Dynamic revenue management games with forward and spot markets,469072effa62964ad7224bbf317f6ae2,http://dx.doi.org/10.1057/palgrave.rpm.5160020 17305,"

We study dynamic games between two providers — an entrant and an incumbent — each with fixed capacity, who compete to sell in both a forward market and a spot market. We analyse two types of games between the providers: (a) a sequential game where the incumbent plays first followed by the entrant and (b) a repeated game where both providers make simultaneous decisions but do this repeatedly an infinite number of times. Demand is either from a single buyer or a population of independent consumers. We identify outcomes for the sequential game for varying levels of demand. For the repeated game, we identify the existence of subgame-perfect Nash equilibria and show how the two providers can obtain higher average revenues by implicit collusion. The study has implications for revenue management markets where providers have dynamic competitive interactions rather then a single static interaction.

",robert phillips,,2006.0,10.1057/palgrave.rpm.5160020,Journal of Revenue and Pricing Management,Gallego2006,Not available,,Nature,Not available,Dynamic revenue management games with forward and spot markets,469072effa62964ad7224bbf317f6ae2,http://dx.doi.org/10.1057/palgrave.rpm.5160020 17306,"

User loyalty or continued use is critical to the survival and development of any website. Focusing on the social network services (SNSs) context, this study proposes a research model for investigating individuals’ use motivations and the moderating role of habit with regard to gratification and continuance intention. This research integrates two influential media communication theories, media system dependency (MSD) and uses and gratifications, to examine SNSs-related behaviors. To comprehend online users’ motivations in depth, three motivations derived from MSD (understanding, orientation and play dependency relations) are operationalized as reflective, second-order constructs. The three motivations are theorized to affect parasocial interaction positively, and parasocial interaction is hypothesized to positively affect the gratification that individuals derive from SNSs usage. Furthermore, this study hypothesizes that gratification positively affects individuals’ continuance intention. Finally, we theorize that habit moderates the impact of gratification on continuance intention. Data collected from 657 Facebook users provide strong support for all six hypotheses. The results indicate that individuals’ motivations (i.e., the understanding, orientation and play dependency relations) positively affect parasocial interaction, which in turn has a positive effect on gratification, and subsequently continuance intention. In addition, the results show that habit has a small but negative moderating effect on the relationship between gratification and continuance intention. Implications for theory and practice are discussed, and suggestions are made for future research.

",chao-min chiu,,2014.0,10.1057/ejis.2014.9,European Journal of Information Systems,Chiu2014,Not available,,Nature,Not available,Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit,28a351c3d170304075b35628dc161356,http://dx.doi.org/10.1057/ejis.2014.9 17307,"

User loyalty or continued use is critical to the survival and development of any website. Focusing on the social network services (SNSs) context, this study proposes a research model for investigating individuals’ use motivations and the moderating role of habit with regard to gratification and continuance intention. This research integrates two influential media communication theories, media system dependency (MSD) and uses and gratifications, to examine SNSs-related behaviors. To comprehend online users’ motivations in depth, three motivations derived from MSD (understanding, orientation and play dependency relations) are operationalized as reflective, second-order constructs. The three motivations are theorized to affect parasocial interaction positively, and parasocial interaction is hypothesized to positively affect the gratification that individuals derive from SNSs usage. Furthermore, this study hypothesizes that gratification positively affects individuals’ continuance intention. Finally, we theorize that habit moderates the impact of gratification on continuance intention. Data collected from 657 Facebook users provide strong support for all six hypotheses. The results indicate that individuals’ motivations (i.e., the understanding, orientation and play dependency relations) positively affect parasocial interaction, which in turn has a positive effect on gratification, and subsequently continuance intention. In addition, the results show that habit has a small but negative moderating effect on the relationship between gratification and continuance intention. Implications for theory and practice are discussed, and suggestions are made for future research.

",hsin-yi huang,,2014.0,10.1057/ejis.2014.9,European Journal of Information Systems,Chiu2014,Not available,,Nature,Not available,Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit,28a351c3d170304075b35628dc161356,http://dx.doi.org/10.1057/ejis.2014.9 17308,"

Information and communication technologies have given rise to a new type of firm, the ibusiness firm. These firms offer a platform that allows users to interact with each other and generate value through user co-creation of content. Because of this, ibusiness firms face different challenges when they internationalize compared with traditional firms, even those online. In this article we extend existing internationalization theory to encompass this new type of organization. We theorize that because ibusiness firms produce value through the creation and coordination of a network of users, these firms tend to suffer greater liabilities of outsidership when expanding abroad and therefore concentrate on network and diffusion-based user adoption processes as they internationalize. Based on a multi-case investigation of a sample of ibusiness firms, we develop new theory and testable hypotheses. Thus, we make an important contribution by expanding internationalization theory to a new set of firms.

",keith brouthers,,2015.0,10.1057/jibs.2015.20,Journal of International Business Studies,Brouthers2015,Not available,,Nature,Not available,Explaining the internationalization of ibusiness firms,ee400dbb7277e9b69414992a610564ed,http://dx.doi.org/10.1057/jibs.2015.20 17309,"

Information and communication technologies have given rise to a new type of firm, the ibusiness firm. These firms offer a platform that allows users to interact with each other and generate value through user co-creation of content. Because of this, ibusiness firms face different challenges when they internationalize compared with traditional firms, even those online. In this article we extend existing internationalization theory to encompass this new type of organization. We theorize that because ibusiness firms produce value through the creation and coordination of a network of users, these firms tend to suffer greater liabilities of outsidership when expanding abroad and therefore concentrate on network and diffusion-based user adoption processes as they internationalize. Based on a multi-case investigation of a sample of ibusiness firms, we develop new theory and testable hypotheses. Thus, we make an important contribution by expanding internationalization theory to a new set of firms.

",kim geisser,,2015.0,10.1057/jibs.2015.20,Journal of International Business Studies,Brouthers2015,Not available,,Nature,Not available,Explaining the internationalization of ibusiness firms,ee400dbb7277e9b69414992a610564ed,http://dx.doi.org/10.1057/jibs.2015.20 17311,"

Information and communication technologies have given rise to a new type of firm, the ibusiness firm. These firms offer a platform that allows users to interact with each other and generate value through user co-creation of content. Because of this, ibusiness firms face different challenges when they internationalize compared with traditional firms, even those online. In this article we extend existing internationalization theory to encompass this new type of organization. We theorize that because ibusiness firms produce value through the creation and coordination of a network of users, these firms tend to suffer greater liabilities of outsidership when expanding abroad and therefore concentrate on network and diffusion-based user adoption processes as they internationalize. Based on a multi-case investigation of a sample of ibusiness firms, we develop new theory and testable hypotheses. Thus, we make an important contribution by expanding internationalization theory to a new set of firms.

",franz rothlauf,,2015.0,10.1057/jibs.2015.20,Journal of International Business Studies,Brouthers2015,Not available,,Nature,Not available,Explaining the internationalization of ibusiness firms,ee400dbb7277e9b69414992a610564ed,http://dx.doi.org/10.1057/jibs.2015.20 17312,"

Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online game addiction among adolescents, which simultaneously focuses on motivating, and prevention and harm reduction forces. First, a sample of 163 adolescents was used for validating and refining a survey instrument. Second, survey data collected from 623 adolescents were analyzed with Partial Least Squares techniques. The findings point to several functional needs (e.g., need for relationship and need for escapism) that drive online game playing and addiction, as well as to several prevention and harm reduction factors (e.g., education, attention switching activities) that reduce game playing time and alleviate online game addiction. The effects of motivation and prevention factors on online game addiction are often partially mediated by online game playing. Implications for research and practice are discussed.

",zhengchuan xu,,2011.0,10.1057/ejis.2011.56,European Journal of Information Systems,Xu2011,Not available,,Nature,Not available,Online game addiction among adolescents: motivation and prevention factors,4de1519eb73295b47e8397c0e15ba715,http://dx.doi.org/10.1057/ejis.2011.56 17313,"

Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online game addiction among adolescents, which simultaneously focuses on motivating, and prevention and harm reduction forces. First, a sample of 163 adolescents was used for validating and refining a survey instrument. Second, survey data collected from 623 adolescents were analyzed with Partial Least Squares techniques. The findings point to several functional needs (e.g., need for relationship and need for escapism) that drive online game playing and addiction, as well as to several prevention and harm reduction factors (e.g., education, attention switching activities) that reduce game playing time and alleviate online game addiction. The effects of motivation and prevention factors on online game addiction are often partially mediated by online game playing. Implications for research and practice are discussed.

",ofir turel,,2011.0,10.1057/ejis.2011.56,European Journal of Information Systems,Xu2011,Not available,,Nature,Not available,Online game addiction among adolescents: motivation and prevention factors,4de1519eb73295b47e8397c0e15ba715,http://dx.doi.org/10.1057/ejis.2011.56 17314,"

Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online game addiction among adolescents, which simultaneously focuses on motivating, and prevention and harm reduction forces. First, a sample of 163 adolescents was used for validating and refining a survey instrument. Second, survey data collected from 623 adolescents were analyzed with Partial Least Squares techniques. The findings point to several functional needs (e.g., need for relationship and need for escapism) that drive online game playing and addiction, as well as to several prevention and harm reduction factors (e.g., education, attention switching activities) that reduce game playing time and alleviate online game addiction. The effects of motivation and prevention factors on online game addiction are often partially mediated by online game playing. Implications for research and practice are discussed.

",yufei yuan,,2011.0,10.1057/ejis.2011.56,European Journal of Information Systems,Xu2011,Not available,,Nature,Not available,Online game addiction among adolescents: motivation and prevention factors,4de1519eb73295b47e8397c0e15ba715,http://dx.doi.org/10.1057/ejis.2011.56 17315,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",carlos cueva,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17316,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",carlos cueva,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17317,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",r. roberts,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17318,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",r. roberts,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17319,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",tom spencer,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17320,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",tom spencer,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17322,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",nisha rani,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17323,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",nisha rani,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17324,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",michelle tempest,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17325,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",michelle tempest,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17326,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",philippe tobler,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17327,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",philippe tobler,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17328,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",joe herbert,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17329,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",joe herbert,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17330,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",aldo rustichini,Human behaviour,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17331,"

It is widely known that financial markets can become dangerously unstable, yet it is unclear why. Recent research has highlighted the possibility that endogenous hormones, in particular testosterone and cortisol, may critically influence traders’ financial decision making. Here we show that cortisol, a hormone that modulates the response to physical or psychological stress, predicts instability in financial markets. Specifically, we recorded salivary levels of cortisol and testosterone in people participating in an experimental asset market (N = 142) and found that individual and aggregate levels of endogenous cortisol predict subsequent risk-taking and price instability. We then administered either cortisol (single oral dose of 100 mg hydrocortisone, N = 34) or testosterone (three doses of 10 g transdermal 1% testosterone gel over 48 hours, N = 41) to young males before they played an asset trading game. We found that both cortisol and testosterone shifted investment towards riskier assets. Cortisol appears to affect risk preferences directly, whereas testosterone operates by inducing increased optimism about future price changes. Our results suggest that changes in both cortisol and testosterone could play a destabilizing role in financial markets through increased risk taking behaviour, acting via different behavioural pathways.

",aldo rustichini,Decision,2015.0,10.1038/srep11206,Scientific Reports,Cueva2015,Not available,,Nature,Not available,Cortisol and testosterone increase financial risk taking and may destabilize markets,889445aa40e1f49144f296fe97e5c8a5,http://dx.doi.org/10.1038/srep11206 17332,"

An understanding of Over-The-Counter (OTC) derivatives – particularly Credit Default Swaps (CDSs) – is essential, because these derivatives are often accused of being toxic and a significant contributor to the financial turmoil of 2008, and therefore also indirectly causing the sickly world economic growth experienced since. This is the position embraced by high-level politicians at G20, in the EU and in the United States; therefore, an overhaul of the OTC derivatives – including the CDS market – appears inevitable. Nonetheless, this article questions this perception of CDSs as an exclusive detrimental product and argues that, although problems of concentration and interconnectedness in the opaque CDS market arguably amplified the crisis, CDSs merely reflected the crash of the US mortgage market. If this is not recognised by politicians and regulators, the likelihood of incomplete reforms causing unintended consequences seems inescapable. This scenario already seems to be playing out in Europe and also potentially in the United States, although an analysis of the US reform is beyond the scope of this article. This conclusion is reached by evaluating three proposals by the European Commission: the European Market Infrastructure Regulation, the Market in Financial Instruments Directive and the Capital Requirement Directive. In short, they intend to mandate or heavily incentivise the trading of CDSs through Central Counterparties (CCPs) and exchanges; enhance OTC-traded CDSs’ capital requirements; and require trades to be reported to designated trade repositories. Although these proposals are well intentioned, the unintended consequences could be considerable, particularly with regard to the extent to which credit risk hedging is possible through CDSs owing to potential prohibitive OTC capital, CCP and exchange-trading requirements. Rather, it is suggested that the reform could be detrimental to its inherent purpose, financial stability, as a concentration of credit risk can accumulate in CDS CCPs. Juxtapose market participants’ ability to hedge credit risk in the regular OTC market is diminished, thus positioning CDSs in a diminishing vacuum between the OTC and exchange traded market. In a worst case scenario, this would undermine the liquidity of the CDS market and make credit risk hedging significantly more difficult and expensive for end-users and ultimately society, at the same time as crucial information on entities creditworthiness deteriorates.

",frederik domler,,2012.0,10.1057/jbr.2012.2,Journal of Banking Regulation,Dømler2012,Not available,,Nature,Not available,A critical evaluation of the European credit default swap reform: Its challenges and adverse effects as a result of insufficient assumptions,1246a8ae04e7dd506256c812e5cade56,http://dx.doi.org/10.1057/jbr.2012.2 17333," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",b kubera,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17334," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",b kubera,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17335," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",j klement,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17336," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",j klement,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17337," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",c wagner,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17338," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",c wagner,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17339," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",c radel,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17340," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",c radel,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17341," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",j eggeling,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17342," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",j eggeling,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17343,"

Flexible pricing plans are commonly observed in service industries. In this article, we argue that the presence of flexible pricing plans can be attributed to consumers being boundedly rational – these consumers do not always select the best available option; rather, they select better options more often. In our model, the seller faces consumers who are heterogeneous in their degrees of intertemporal inconsistency – their ultimate actions can be different from their intended actions. We show that, in response to these boundedly rational consumers the seller may be able to extract more profit by setting different prices in different periods and allowing the consumers to self-select which period to pay. Moreover, a single pricing plan may emerge as an optimal pricing scheme even when the consumers are heterogeneous in their degrees of rationality and the seller is not fully aware of the consumers’ types. We further show that the pricing patterns depend primarily on the relative discounting factor between the seller and the consumers.

",wenbo cai,,2011.0,10.1057/rpm.2011.14,Journal of Revenue and Pricing Management,Cai2011,Not available,,Nature,Not available,Intertemporal pricing with boundedly rational consumers,98019832fd84f26b4d6ab9963bc8dbe4,http://dx.doi.org/10.1057/rpm.2011.14 17344," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",s fullbrunn,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17345," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",s fullbrunn,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17346," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",m kaczmarek,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17347," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",m kaczmarek,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17348," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",r levinsky,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17349," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",r levinsky,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17350," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",a peters,Cognitive neuroscience,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17351," Background:

Employment disparities are known to exist between lean and corpulent people, for example, corpulent people are less likely to be hired and get lower wages. The reasons for these disparities between weight groups are not completely understood. We hypothesize (i) that economic decision making differs between lean and corpulent subjects, (ii) that these differences are influenced by peoples’ blood glucose concentrations and (iii) by the body weight of their opponents.

Methods:

A total of 20 lean and 20 corpulent men were examined, who performed a large set of economic games (ultimatum game, trust game and risk game) under euglycemic and hypoglycemic conditions induced by the glucose clamp technique.

Results:

In the ultimatum game, lean men made less fair decisions and offered 16% less money than corpulent men during euglycemia (P=0.042). During hypoglycemia, study participants of both weight groups accepted smaller amounts of money than during euglycemia (P=0.031), indicating that a lack of energy makes subjects to behave more like a Homo Economicus. In the trust game, lean men allocated twice as much money to lean than to corpulent trustees during hypoglycemia (P<0.001). Risk-seeking behavior did not differ between lean and corpulent men.

Conclusion:

Our data show that economic decision making is affected by both, the body weight of the participants and the body weight of their opponents, and that blood glucose concentrations should be taken into consideration when analyzing economic decision making. When relating these results to the working environment, the weight bias in economic decision making may be also relevant for employment disparities.

",a peters,Metabolism,2016.0,10.1038/ijo.2016.134,International Journal of Obesity,Kubera2016,Not available,,Nature,Not available,Differences in fairness and trust between lean and corpulent men,96787b8decb236e6425f67d1805845d9,http://dx.doi.org/10.1038/ijo.2016.134 17352,"

In this paper, I analyze an inspection game between an insurer and an infinite sequence of policyholders, who can try to misrepresent relevant information in order to obtain coverage or lower insurance premium. Because claim-auditing is costly for the insurer, ex-post moral hazard problem arises. I find that the repeated game effect serves as a commitment device, allowing the insurer to deter fraud completely (for sufficiently high discount rate) but only when the policyholders observe past auditing strategies. Under weaker observability conditions, only partial efficiency gains are generally possible. I conclude that the insurers should spend resources on signaling their anti-fraud attempts to the potential policyholders. Similar conclusions can be drawn with respect to conceptually similar problems, such as tax evasion.

",michal krawczyk,,2009.0,10.1057/grir.2009.1,The Geneva Risk and Insurance Review,Krawczyk2009,Not available,,Nature,Not available,The Role of Repetition and Observability in Deterring Insurance Fraud,b481193b6537528fc8a945055b84300d,http://dx.doi.org/10.1057/grir.2009.1 17353,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christopher hill,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17354,"

Flexible pricing plans are commonly observed in service industries. In this article, we argue that the presence of flexible pricing plans can be attributed to consumers being boundedly rational – these consumers do not always select the best available option; rather, they select better options more often. In our model, the seller faces consumers who are heterogeneous in their degrees of intertemporal inconsistency – their ultimate actions can be different from their intended actions. We show that, in response to these boundedly rational consumers the seller may be able to extract more profit by setting different prices in different periods and allowing the consumers to self-select which period to pay. Moreover, a single pricing plan may emerge as an optimal pricing scheme even when the consumers are heterogeneous in their degrees of rationality and the seller is not fully aware of the consumers’ types. We further show that the pricing patterns depend primarily on the relative discounting factor between the seller and the consumers.

",ying-ju chen,,2011.0,10.1057/rpm.2011.14,Journal of Revenue and Pricing Management,Cai2011,Not available,,Nature,Not available,Intertemporal pricing with boundedly rational consumers,98019832fd84f26b4d6ab9963bc8dbe4,http://dx.doi.org/10.1057/rpm.2011.14 17355,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christopher hill,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17356,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christopher hill,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17357,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",shinsuke suzuki,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17358,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",shinsuke suzuki,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17359,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",shinsuke suzuki,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17360,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",rafael polania,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17361,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",rafael polania,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17362,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",rafael polania,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17363,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",marius moisa,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17364,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",marius moisa,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17365,"

This paper examines the Sachs-Woo hypothesis that the gradual approach to reform, though successful in China, was not possible in the USSR because of structural differences between these two economies. To examine this hypothesis, this paper abstracts from the issue of structural differences by focusing on the industrial sector only and compares the state-owned enterprise (SOE) reforms in China under Deng and in the USSR under Gorbachev. Apart from concerning the same sector, these reforms were roughly contemporaneous, and hence their comparison provides a suitable test of the Sachs-Woo hypothesis. The test shows that the hypothesis does not live up to it.

",nazrul islam,,2011.0,10.1057/ces.2010.30,Comparative Economic Studies,Islam2011,Not available,,Nature,Not available,Was the Gradual Approach Not Possible in the USSR? A Critique of the Sachs-Woo ‘Impossibility Hypothesis’,0d19334356c74faa862b79043e398baa,http://dx.doi.org/10.1057/ces.2010.30 17366,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",marius moisa,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17367,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",john o'doherty,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17368,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",john o'doherty,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17369,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",john o'doherty,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17370,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christian ruff,Social behaviour,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17371,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christian ruff,Cortex,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17372,"

During competitive interactions, humans have to estimate the impact of their own actions on their opponent's strategy. Here we provide evidence that neural computations in the right temporoparietal junction (rTPJ) and interconnected structures are causally involved in this process. By combining inhibitory continuous theta-burst transcranial magnetic stimulation with model-based functional MRI, we show that disrupting neural excitability in the rTPJ reduces behavioral and neural indices of mentalizing-related computations, as well as functional connectivity of the rTPJ with ventral and dorsal parts of the medial prefrontal cortex. These results provide a causal demonstration that neural computations instantiated in the rTPJ are neurobiological prerequisites for the ability to integrate opponent beliefs into strategic choice, through system-level interaction within the valuation and mentalizing networks.

",christian ruff,Decision,2017.0,10.1038/nn.4602,Nature Neuroscience,Hill2017,Not available,,Nature,Not available,A causal account of the brain network computations underlying strategic social behavior,f7fc81fa04f472e8762496ac94b92757,http://dx.doi.org/10.1038/nn.4602 17373,"

Recent developments in the theoretical and empirical analysis of balance of payments crises are reviewed. A simple analytical model highlighting the process leading to such crises is first developed. The basic framework is then extended to deal with a variety of issues, including alternative postcollapse regimes, uncertainty, real sector effects, external borrowing and capital controls, imperfect asset substitutability, sticky prices, and endogenous policy switches. Empirical evidence on the collapse of exchange rate regimes is also examined, and the major implications of the analysis for macroeconomic policy are discussed.

",pierre-richard agenor,,1992.0,10.2307/3867063,Staff Papers - International Monetary Fund,Agénor1992,Not available,,Nature,Not available,Speculative Attacks and Models of Balance of Payments Crises,6b4112b4b6c98258df21fbce514b1515,http://dx.doi.org/10.2307/3867063 17374,"

Recent developments in the theoretical and empirical analysis of balance of payments crises are reviewed. A simple analytical model highlighting the process leading to such crises is first developed. The basic framework is then extended to deal with a variety of issues, including alternative postcollapse regimes, uncertainty, real sector effects, external borrowing and capital controls, imperfect asset substitutability, sticky prices, and endogenous policy switches. Empirical evidence on the collapse of exchange rate regimes is also examined, and the major implications of the analysis for macroeconomic policy are discussed.

",jagdeep bhandari,,1992.0,10.2307/3867063,Staff Papers - International Monetary Fund,Agénor1992,Not available,,Nature,Not available,Speculative Attacks and Models of Balance of Payments Crises,6b4112b4b6c98258df21fbce514b1515,http://dx.doi.org/10.2307/3867063 17375,"

Recent developments in the theoretical and empirical analysis of balance of payments crises are reviewed. A simple analytical model highlighting the process leading to such crises is first developed. The basic framework is then extended to deal with a variety of issues, including alternative postcollapse regimes, uncertainty, real sector effects, external borrowing and capital controls, imperfect asset substitutability, sticky prices, and endogenous policy switches. Empirical evidence on the collapse of exchange rate regimes is also examined, and the major implications of the analysis for macroeconomic policy are discussed.

",robert flood,,1992.0,10.2307/3867063,Staff Papers - International Monetary Fund,Agénor1992,Not available,,Nature,Not available,Speculative Attacks and Models of Balance of Payments Crises,6b4112b4b6c98258df21fbce514b1515,http://dx.doi.org/10.2307/3867063 17376,"

The relation between IMF conditionality and country ownership of assistance programs is considered from a political economy perspective, focusing on the question of why conditionality is needed if it is in a country's best interests to undertake the reform program. It is argued that heterogeneity of interests must form the basis of any discussion of conditionality and ownership. The paper stresses a conflict between a reformist government and domestic interest groups that oppose reform, leading to a distinction between government and country ownership of a program. After discussing conceptual issues, I present a model of lending and policy reform that illustrates the effects of unconditional and conditional assistance first without and then with political constraints. It is shown that conditionality can play a key role even when the IMF and authorities agree on the goals of an assistance program.

",allan drazen,,2002.0,10.2307/3872471,IMF Staff Papers,Drazen2002,Not available,,Nature,Not available,Conditionality and Ownership in IMF Lending: A Political Economy Approach,471ab58fd7cc63369a9238232af9e2fc,http://dx.doi.org/10.2307/3872471 17377,"

A fundamental problem in many disciplines is the classification of objects in a domain of interest into a taxonomy. Developing a taxonomy, however, is a complex process that has not been adequately addressed in the information systems (IS) literature. The purpose of this paper is to present a method for taxonomy development that can be used in IS. First, this paper demonstrates through a comprehensive literature survey that taxonomy development in IS has largely been ad hoc. Then the paper defines the problem of taxonomy development. Next, the paper presents a method for taxonomy development that is based on taxonomy development literature in other disciplines and shows that the method has certain desirable qualities. Finally, the paper demonstrates the efficacy of the method by developing a taxonomy in a domain in IS.

",robert nickerson,,2012.0,10.1057/ejis.2012.26,European Journal of Information Systems,Nickerson2012,Not available,,Nature,Not available,A method for taxonomy development and its application in information systems,2a1ea7c354bff3cdb212aa1626babf3a,http://dx.doi.org/10.1057/ejis.2012.26 17378,"

A fundamental problem in many disciplines is the classification of objects in a domain of interest into a taxonomy. Developing a taxonomy, however, is a complex process that has not been adequately addressed in the information systems (IS) literature. The purpose of this paper is to present a method for taxonomy development that can be used in IS. First, this paper demonstrates through a comprehensive literature survey that taxonomy development in IS has largely been ad hoc. Then the paper defines the problem of taxonomy development. Next, the paper presents a method for taxonomy development that is based on taxonomy development literature in other disciplines and shows that the method has certain desirable qualities. Finally, the paper demonstrates the efficacy of the method by developing a taxonomy in a domain in IS.

",upkar varshney,,2012.0,10.1057/ejis.2012.26,European Journal of Information Systems,Nickerson2012,Not available,,Nature,Not available,A method for taxonomy development and its application in information systems,2a1ea7c354bff3cdb212aa1626babf3a,http://dx.doi.org/10.1057/ejis.2012.26 17379,"

A fundamental problem in many disciplines is the classification of objects in a domain of interest into a taxonomy. Developing a taxonomy, however, is a complex process that has not been adequately addressed in the information systems (IS) literature. The purpose of this paper is to present a method for taxonomy development that can be used in IS. First, this paper demonstrates through a comprehensive literature survey that taxonomy development in IS has largely been ad hoc. Then the paper defines the problem of taxonomy development. Next, the paper presents a method for taxonomy development that is based on taxonomy development literature in other disciplines and shows that the method has certain desirable qualities. Finally, the paper demonstrates the efficacy of the method by developing a taxonomy in a domain in IS.

",jan muntermann,,2012.0,10.1057/ejis.2012.26,European Journal of Information Systems,Nickerson2012,Not available,,Nature,Not available,A method for taxonomy development and its application in information systems,2a1ea7c354bff3cdb212aa1626babf3a,http://dx.doi.org/10.1057/ejis.2012.26 17380,"

Both the use of Web sites and the empirical knowledge as to what constitutes effective Web site design has grown exponentially in recent years. The aim of the current article is to outline the history and key elements of Web site design in an e-commerce context – primarily in the period 2002–2012. It was in 2002 that a Special Issue of ISR was focused on ‘Measuring e-Commerce in Net-Enabled Organizations.’ Before this, work was conducted on Web site design, but much of it was anecdotal. Systematic, empirical research and modeling of Web site design to dependent variables like trust, satisfaction, and loyalty until then had not receive substantial focus – at least in the information systems domain. In addition to an overview of empirical findings, this article has a practical focus on what designers must know about Web site elements if they are to provide compelling user experiences, taking into account the site’s likely users. To this end, the article elaborates components of effective Web site design, user characteristics, and the online context that impact Web usage and acceptance, and design issues as they are relevant to diverse users including those in global markets. Web site elements that result in positive business impact are articulated. This retrospective on Web site design concludes with an overview of future research directions and current developments.

",dianne cyr,,2014.0,10.1057/jit.2013.25,Journal of Information Technology,Cyr2014,Not available,,Nature,Not available,Return visits: a review of how Web site design can engender visitor loyalty,8cca1b3c99d4b8c3239f6c8d9f39e269,http://dx.doi.org/10.1057/jit.2013.25 17381,"

This paper explores the effects of capital controls and policies regulating interest rates and the exchange rate in a model of economic transition applied to China. It builds on Song, Storesletten, and Zilibotti (2011) who construct a growth model consistent with salient features of the recent Chinese growth experience: high output growth, sustained returns on capital investment, extensive reallocation within the manufacturing sector, sluggish wage growth, and accumulation of a large trade surplus. The salient features of the theory are asymmetric financial imperfections and heterogeneous productivity across private and state-owned firms. Capital controls and regulation of banks’ deposit rates stifle competition in the banking sector and hamper the lending to productive private firms. Removing such regulation would accelerate the growth in productivity and output. A temporarily undervalued exchange rate reduces real wages and consumption, stimulating investments in the high-productivity entrepreneurial sector. This fosters productivity growth and a trade surplus. A high interest rate mitigates the disadvantage of financially constrained firms, reduces wages, and increases the speed of transition from low- to high-productivity firms.

",zheng song,,2014.0,10.1057/imfer.2014.18,IMF Economic Review,Song2014,Not available,,Nature,Not available,Growing (with Capital Controls) like China,1742456570d016fdc22b987299d47d8f,http://dx.doi.org/10.1057/imfer.2014.18 17382,"

This paper explores the effects of capital controls and policies regulating interest rates and the exchange rate in a model of economic transition applied to China. It builds on Song, Storesletten, and Zilibotti (2011) who construct a growth model consistent with salient features of the recent Chinese growth experience: high output growth, sustained returns on capital investment, extensive reallocation within the manufacturing sector, sluggish wage growth, and accumulation of a large trade surplus. The salient features of the theory are asymmetric financial imperfections and heterogeneous productivity across private and state-owned firms. Capital controls and regulation of banks’ deposit rates stifle competition in the banking sector and hamper the lending to productive private firms. Removing such regulation would accelerate the growth in productivity and output. A temporarily undervalued exchange rate reduces real wages and consumption, stimulating investments in the high-productivity entrepreneurial sector. This fosters productivity growth and a trade surplus. A high interest rate mitigates the disadvantage of financially constrained firms, reduces wages, and increases the speed of transition from low- to high-productivity firms.

",kjetil storesletten,,2014.0,10.1057/imfer.2014.18,IMF Economic Review,Song2014,Not available,,Nature,Not available,Growing (with Capital Controls) like China,1742456570d016fdc22b987299d47d8f,http://dx.doi.org/10.1057/imfer.2014.18 17383,"

This paper explores the effects of capital controls and policies regulating interest rates and the exchange rate in a model of economic transition applied to China. It builds on Song, Storesletten, and Zilibotti (2011) who construct a growth model consistent with salient features of the recent Chinese growth experience: high output growth, sustained returns on capital investment, extensive reallocation within the manufacturing sector, sluggish wage growth, and accumulation of a large trade surplus. The salient features of the theory are asymmetric financial imperfections and heterogeneous productivity across private and state-owned firms. Capital controls and regulation of banks’ deposit rates stifle competition in the banking sector and hamper the lending to productive private firms. Removing such regulation would accelerate the growth in productivity and output. A temporarily undervalued exchange rate reduces real wages and consumption, stimulating investments in the high-productivity entrepreneurial sector. This fosters productivity growth and a trade surplus. A high interest rate mitigates the disadvantage of financially constrained firms, reduces wages, and increases the speed of transition from low- to high-productivity firms.

",fabrizio zilibotti,,2014.0,10.1057/imfer.2014.18,IMF Economic Review,Song2014,Not available,,Nature,Not available,Growing (with Capital Controls) like China,1742456570d016fdc22b987299d47d8f,http://dx.doi.org/10.1057/imfer.2014.18 17384,"

Humans can reflect on decisions and report variable levels of confidence. But why maintain an explicit representation of confidence for choices that have already been made and therefore cannot be undone? Here we show that an explicit representation of confidence is harnessed for subsequent changes of mind. Specifically, when confidence is low, participants are more likely to change their minds when the same choice is presented again, an effect that is most pronounced in participants with greater fidelity in their confidence reports. Furthermore, we show that choices reported with high confidence follow a more consistent pattern (fewer transitivity violations). Finally, by tracking participants’ eye movements, we demonstrate that lower-level gaze dynamics can track uncertainty but do not directly impact changes of mind. These results suggest that an explicit and accurate representation of confidence has a positive impact on the quality of future value-based decisions.

",tomas folke,,2016.0,10.1038/s41562-016-0002,Nature Human Behaviour,Folke2016,Not available,,Nature,Not available,Explicit representation of confidence informs future value-based decisions,c422a74241a64da65c2198b33fdd17c0,http://dx.doi.org/10.1038/s41562-016-0002 17385,"

We report feedback-assisted adaptive multicasting from a single Gaussian mode to multiple orbital angular momentum (OAM) modes using a single phase-only spatial light modulator loaded with a complex phase pattern. By designing and optimizing the complex phase pattern through the adaptive correction of feedback coefficients, the power of each multicast OAM channel can be arbitrarily controlled. We experimentally demonstrate power-controllable multicasting from a single Gaussian mode to two and six OAM modes with different target power distributions. Equalized power multicasting, “up-down” power multicasting and “ladder” power multicasting are realized in the experiment. The difference between measured power distributions and target power distributions is assessed to be less than 1 dB. Moreover, we demonstrate data-carrying OAM multicasting by employing orthogonal frequency-division multiplexing 64-ary quadrature amplitude modulation (OFDM 64-QAM) signal. The measured bit-error rate curves and observed optical signal-to-noise ratio penalties show favorable operation performance of the proposed adaptive power-controllable OAM multicasting.

",shuhui li,Optical techniques,2015.0,10.1038/srep09677,Scientific Reports,Li2015,Not available,,Nature,Not available,Adaptive power-controllable orbital angular momentum (OAM) multicasting,d58267deae8d8e56bb2cd1fed3aecfec,http://dx.doi.org/10.1038/srep09677 17386,"

We report feedback-assisted adaptive multicasting from a single Gaussian mode to multiple orbital angular momentum (OAM) modes using a single phase-only spatial light modulator loaded with a complex phase pattern. By designing and optimizing the complex phase pattern through the adaptive correction of feedback coefficients, the power of each multicast OAM channel can be arbitrarily controlled. We experimentally demonstrate power-controllable multicasting from a single Gaussian mode to two and six OAM modes with different target power distributions. Equalized power multicasting, “up-down” power multicasting and “ladder” power multicasting are realized in the experiment. The difference between measured power distributions and target power distributions is assessed to be less than 1 dB. Moreover, we demonstrate data-carrying OAM multicasting by employing orthogonal frequency-division multiplexing 64-ary quadrature amplitude modulation (OFDM 64-QAM) signal. The measured bit-error rate curves and observed optical signal-to-noise ratio penalties show favorable operation performance of the proposed adaptive power-controllable OAM multicasting.

",shuhui li,Applied optics,2015.0,10.1038/srep09677,Scientific Reports,Li2015,Not available,,Nature,Not available,Adaptive power-controllable orbital angular momentum (OAM) multicasting,d58267deae8d8e56bb2cd1fed3aecfec,http://dx.doi.org/10.1038/srep09677 17387,"

We report feedback-assisted adaptive multicasting from a single Gaussian mode to multiple orbital angular momentum (OAM) modes using a single phase-only spatial light modulator loaded with a complex phase pattern. By designing and optimizing the complex phase pattern through the adaptive correction of feedback coefficients, the power of each multicast OAM channel can be arbitrarily controlled. We experimentally demonstrate power-controllable multicasting from a single Gaussian mode to two and six OAM modes with different target power distributions. Equalized power multicasting, “up-down” power multicasting and “ladder” power multicasting are realized in the experiment. The difference between measured power distributions and target power distributions is assessed to be less than 1 dB. Moreover, we demonstrate data-carrying OAM multicasting by employing orthogonal frequency-division multiplexing 64-ary quadrature amplitude modulation (OFDM 64-QAM) signal. The measured bit-error rate curves and observed optical signal-to-noise ratio penalties show favorable operation performance of the proposed adaptive power-controllable OAM multicasting.

",jian wang,Optical techniques,2015.0,10.1038/srep09677,Scientific Reports,Li2015,Not available,,Nature,Not available,Adaptive power-controllable orbital angular momentum (OAM) multicasting,d58267deae8d8e56bb2cd1fed3aecfec,http://dx.doi.org/10.1038/srep09677 17388,"

We report feedback-assisted adaptive multicasting from a single Gaussian mode to multiple orbital angular momentum (OAM) modes using a single phase-only spatial light modulator loaded with a complex phase pattern. By designing and optimizing the complex phase pattern through the adaptive correction of feedback coefficients, the power of each multicast OAM channel can be arbitrarily controlled. We experimentally demonstrate power-controllable multicasting from a single Gaussian mode to two and six OAM modes with different target power distributions. Equalized power multicasting, “up-down” power multicasting and “ladder” power multicasting are realized in the experiment. The difference between measured power distributions and target power distributions is assessed to be less than 1 dB. Moreover, we demonstrate data-carrying OAM multicasting by employing orthogonal frequency-division multiplexing 64-ary quadrature amplitude modulation (OFDM 64-QAM) signal. The measured bit-error rate curves and observed optical signal-to-noise ratio penalties show favorable operation performance of the proposed adaptive power-controllable OAM multicasting.

",jian wang,Applied optics,2015.0,10.1038/srep09677,Scientific Reports,Li2015,Not available,,Nature,Not available,Adaptive power-controllable orbital angular momentum (OAM) multicasting,d58267deae8d8e56bb2cd1fed3aecfec,http://dx.doi.org/10.1038/srep09677 17389,"

This paper puts forward a case for using hermeneutics in information systems (IS) research. Unlike case study and action research, which could now be described as ‘mainstream’ interpretive research in IS, hermeneutics is neither well accepted nor much practiced in IS research. A suitable hermeneutic approach is described in detail. A brief account of hermeneutics in action is provided through a description of research investigating notions of convenience in home Internet shopping. The hermeneutic circle enabled the researcher to reveal unexpectedly the practice of using surrogates in Internet shopping and this example illustrates some of the potential of the approach in IS research.

",melissa cole,,2007.0,10.1057/palgrave.ejis.3000725,European Journal of Information Systems,Cole2007,Not available,,Nature,Not available,The potential of hermeneutics in information systems research,30472e7164e3136b31f9db7343e690d9,http://dx.doi.org/10.1057/palgrave.ejis.3000725 17390,"

This paper puts forward a case for using hermeneutics in information systems (IS) research. Unlike case study and action research, which could now be described as ‘mainstream’ interpretive research in IS, hermeneutics is neither well accepted nor much practiced in IS research. A suitable hermeneutic approach is described in detail. A brief account of hermeneutics in action is provided through a description of research investigating notions of convenience in home Internet shopping. The hermeneutic circle enabled the researcher to reveal unexpectedly the practice of using surrogates in Internet shopping and this example illustrates some of the potential of the approach in IS research.

",david avison,,2007.0,10.1057/palgrave.ejis.3000725,European Journal of Information Systems,Cole2007,Not available,,Nature,Not available,The potential of hermeneutics in information systems research,30472e7164e3136b31f9db7343e690d9,http://dx.doi.org/10.1057/palgrave.ejis.3000725 17391,"

This paper traces the journey of the marketing mix paradigm from its inception through continuous debate and discussion over the years. It traces the evolution of marketing mix components and the transformation of the marketing paradigm as society, technology, media, information and money have changed. A significant evolution of technology has changed the face of marketing. The paper uses inputs from marketing experts to trace the all-encompassing and unstoppable expansion of cyberspace that is changing every single dimension of consumers’ lifestyles. The paper outlines the acceleration of the information revolution with the advent of the ‘Read-Write Web’ or ‘Web 2.0’. Within this emergent virtual domain, corporate blogs, online communities, social networks and wikis have redefined the routine lives of individuals and changed the way people relate to information, brands, other people and even themselves. The discussion further proceeds to address three important issues facing the world of marketing today: the implications of today’s technologically inspired environment for marketing in the twenty-first century, the conceptualization of a customer mix as a pre-requisite for the marketing mix and, in conclusion, finally proposes an update to the marketing mix itself. In addition to this, the paper also traces the incorporation of the concepts of relationship marketing, customer relationship management, co-creation, salesforce automation and digital marketing in current-day marketing environments.

",graham jackson,,2016.0,10.1057/dddmp.2016.3,"Journal of Direct, Data and Digital Marketing Practice",Jackson2016,Not available,,Nature,Not available,Dawn of the digital age and the evolution of the marketing mix,6b48f5eb3a7ca84e673de2ef4b66c701,http://dx.doi.org/10.1057/dddmp.2016.3 17392,"

This paper traces the journey of the marketing mix paradigm from its inception through continuous debate and discussion over the years. It traces the evolution of marketing mix components and the transformation of the marketing paradigm as society, technology, media, information and money have changed. A significant evolution of technology has changed the face of marketing. The paper uses inputs from marketing experts to trace the all-encompassing and unstoppable expansion of cyberspace that is changing every single dimension of consumers’ lifestyles. The paper outlines the acceleration of the information revolution with the advent of the ‘Read-Write Web’ or ‘Web 2.0’. Within this emergent virtual domain, corporate blogs, online communities, social networks and wikis have redefined the routine lives of individuals and changed the way people relate to information, brands, other people and even themselves. The discussion further proceeds to address three important issues facing the world of marketing today: the implications of today’s technologically inspired environment for marketing in the twenty-first century, the conceptualization of a customer mix as a pre-requisite for the marketing mix and, in conclusion, finally proposes an update to the marketing mix itself. In addition to this, the paper also traces the incorporation of the concepts of relationship marketing, customer relationship management, co-creation, salesforce automation and digital marketing in current-day marketing environments.

",vandana ahuja,,2016.0,10.1057/dddmp.2016.3,"Journal of Direct, Data and Digital Marketing Practice",Jackson2016,Not available,,Nature,Not available,Dawn of the digital age and the evolution of the marketing mix,6b48f5eb3a7ca84e673de2ef4b66c701,http://dx.doi.org/10.1057/dddmp.2016.3 17393,"

In this paper we review the recent IS literature on knowledge and consider different assumptions that underpin different approaches to this broad research area. In doing this we contrast those who focus on knowledge management with those who focus on knowing as practice and examine how contexts, processes and purposes need to be considered whichever approach to knowledge one is adopting. We also identify how recent IT developments, especially in relation to social software and the digitization of everything, are presenting new opportunities (and challenges) for how organizations can manage both knowledge and knowledge work. This presents IS scholars with new research agendas for examining and understanding the relationships between technology, organization and society.

",sue newell,,2014.0,10.1057/jit.2014.12,Journal of Information Technology,Newell2014,Not available,,Nature,Not available,Managing knowledge and managing knowledge work: what we know and what the future holds,0bddaf028c780bbde4956eb67506b137,http://dx.doi.org/10.1057/jit.2014.12 17394,"

Increasingly, brands are able to embed themselves in consumer brand-centric communities. Subsequently, through networks and socialisation processes, convergences around a brand serve as conduits for defining meaning and identity. Using a methodological approach drawing from inductive reasoning and syllogisms, as a basis for conceptual metaphor theory and critical discourse analysis, evidence is gathered from literature reviews – supported by anecdotal evidence, personal observations and experiences. From this, the authors examine the positioning of brands within brand communities, exploring how they can add meaning and authenticity to their consumer-centric friendships. A proposed test of this friendship lies in how brands respond to consumers, when relationships fall short of expectations, and subsequently how these are addressed. The position of the authors is that the more those brands push themselves towards friendships, consumers will respond by expecting some form of loss mitigation, associated more with the intangible aspects of that brand – led by experiential elements and reputation. In the light of this, brands should consider their role in maintaining friendships, beyond consumption-based loyalty and CSR – towards developing a demonstrable Brand Conscience, supported by stakeholders. Furthermore, new thinking suggests that brands should attempt to mitigate the non-functional and emotional losses that consumers may feel, supported by a Brand Conscience.

",jonathan wilson,,2011.0,10.1057/bm.2011.4,Journal of Brand Management,Wilson2011,Not available,,Nature,Not available,Friends or Freeloaders? Encouraging brand conscience and introducing the concept of emotion-based consumer loss mitigation,91fa39e48ef9852841cc8ef62fb7f161,http://dx.doi.org/10.1057/bm.2011.4 17395,"

Humans can reflect on decisions and report variable levels of confidence. But why maintain an explicit representation of confidence for choices that have already been made and therefore cannot be undone? Here we show that an explicit representation of confidence is harnessed for subsequent changes of mind. Specifically, when confidence is low, participants are more likely to change their minds when the same choice is presented again, an effect that is most pronounced in participants with greater fidelity in their confidence reports. Furthermore, we show that choices reported with high confidence follow a more consistent pattern (fewer transitivity violations). Finally, by tracking participants’ eye movements, we demonstrate that lower-level gaze dynamics can track uncertainty but do not directly impact changes of mind. These results suggest that an explicit and accurate representation of confidence has a positive impact on the quality of future value-based decisions.

",catrine jacobsen,,2016.0,10.1038/s41562-016-0002,Nature Human Behaviour,Folke2016,Not available,,Nature,Not available,Explicit representation of confidence informs future value-based decisions,c422a74241a64da65c2198b33fdd17c0,http://dx.doi.org/10.1038/s41562-016-0002 17396,"

Increasingly, brands are able to embed themselves in consumer brand-centric communities. Subsequently, through networks and socialisation processes, convergences around a brand serve as conduits for defining meaning and identity. Using a methodological approach drawing from inductive reasoning and syllogisms, as a basis for conceptual metaphor theory and critical discourse analysis, evidence is gathered from literature reviews – supported by anecdotal evidence, personal observations and experiences. From this, the authors examine the positioning of brands within brand communities, exploring how they can add meaning and authenticity to their consumer-centric friendships. A proposed test of this friendship lies in how brands respond to consumers, when relationships fall short of expectations, and subsequently how these are addressed. The position of the authors is that the more those brands push themselves towards friendships, consumers will respond by expecting some form of loss mitigation, associated more with the intangible aspects of that brand – led by experiential elements and reputation. In the light of this, brands should consider their role in maintaining friendships, beyond consumption-based loyalty and CSR – towards developing a demonstrable Brand Conscience, supported by stakeholders. Furthermore, new thinking suggests that brands should attempt to mitigate the non-functional and emotional losses that consumers may feel, supported by a Brand Conscience.

",joseph morgan,,2011.0,10.1057/bm.2011.4,Journal of Brand Management,Wilson2011,Not available,,Nature,Not available,Friends or Freeloaders? Encouraging brand conscience and introducing the concept of emotion-based consumer loss mitigation,91fa39e48ef9852841cc8ef62fb7f161,http://dx.doi.org/10.1057/bm.2011.4 17397,"

While the primary effort of all retailers is to generate that initial sales, return management is generally identified as a secondary issue that does not necessarily need the same level of planning and proactive strategies. In this article, we position return management as a process that is at the interface of both inventory and revenue management by explicitly incorporating the return policy of the retailer in consumer's valuation. We consider a retailer that sells a fixed amount of inventory over a finite horizon. We assume that return policy is a decision variable that can be changed dynamically at every period. While flexible return policies generate more demand, it also induces more returns. We characterize the optimal dynamic return policies based on two costs of return scenarios. We show a conditional monotonicity result and discuss how these return policies change with respect to inventory and time. We then propose a heuristic and prove that it is asymptotically optimal. We also study the joint dynamic pricing and dynamic return management problem in the same setting and propose two more heuristics whose performance is tested numerically and found to be close to optimal for higher inventory levels. We extend our model to multiple competing retailers and characterize the resulting equilibrium return policy and prices.

",mehmet altug,,2012.0,10.1057/rpm.2012.37,Journal of Revenue and Pricing Management,Altug2012,Not available,,Nature,Not available,Optimal dynamic return management of fixed inventories,ae83f1cd3345e6bac1da2498027c766e,http://dx.doi.org/10.1057/rpm.2012.37 17398,"

Reputation is an intangible asset that directly affects the market value of the firm. Although reputation evidences belief that the firm is on a sustainable course, it is built on the trust established with all stakeholders through past proper behaviour. It proves more resilient than one might think at first but even menial misconducts, if repeated, can lead to a downfall. The demise of a few can engulf a whole industry when the transactions are based on trust in the fulfilment of future promises. This is why reputation has become an object of research for several branches of management sciences. The key drivers are still in need of refinement. Nevertheless, they can be summarized in one word: authenticity.

",sophie gaultier-gaillard,,2006.0,10.1057/palgrave.gpp.2510090,The Geneva Papers on Risk and Insurance Issues and Practice,Gaultier-Gaillard2006,Not available,,Nature,Not available,Risks to Reputation: A Global Approach,d79c935799c00bf034e01dad4b7de4c2,http://dx.doi.org/10.1057/palgrave.gpp.2510090 17399,"

Reputation is an intangible asset that directly affects the market value of the firm. Although reputation evidences belief that the firm is on a sustainable course, it is built on the trust established with all stakeholders through past proper behaviour. It proves more resilient than one might think at first but even menial misconducts, if repeated, can lead to a downfall. The demise of a few can engulf a whole industry when the transactions are based on trust in the fulfilment of future promises. This is why reputation has become an object of research for several branches of management sciences. The key drivers are still in need of refinement. Nevertheless, they can be summarized in one word: authenticity.

",jean-paul louisot,,2006.0,10.1057/palgrave.gpp.2510090,The Geneva Papers on Risk and Insurance Issues and Practice,Gaultier-Gaillard2006,Not available,,Nature,Not available,Risks to Reputation: A Global Approach,d79c935799c00bf034e01dad4b7de4c2,http://dx.doi.org/10.1057/palgrave.gpp.2510090 17400,"

Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed.

",jennifer gerow,,2012.0,10.1057/ejis.2012.25,European Journal of Information Systems,Gerow2012,Not available,,Nature,Not available,Can we have fun @ work? The role of intrinsic motivation for utilitarian systems,297beaf728219088d9b587c262ffbf11,http://dx.doi.org/10.1057/ejis.2012.25 17401,"

Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed.

",ramakrishna ayyagari,,2012.0,10.1057/ejis.2012.25,European Journal of Information Systems,Gerow2012,Not available,,Nature,Not available,Can we have fun @ work? The role of intrinsic motivation for utilitarian systems,297beaf728219088d9b587c262ffbf11,http://dx.doi.org/10.1057/ejis.2012.25 17402,"

Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed.

",jason thatcher,,2012.0,10.1057/ejis.2012.25,European Journal of Information Systems,Gerow2012,Not available,,Nature,Not available,Can we have fun @ work? The role of intrinsic motivation for utilitarian systems,297beaf728219088d9b587c262ffbf11,http://dx.doi.org/10.1057/ejis.2012.25 17403,"

Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed.

",philip roth,,2012.0,10.1057/ejis.2012.25,European Journal of Information Systems,Gerow2012,Not available,,Nature,Not available,Can we have fun @ work? The role of intrinsic motivation for utilitarian systems,297beaf728219088d9b587c262ffbf11,http://dx.doi.org/10.1057/ejis.2012.25 17404,"

Revenue management systems rely on customer data, and are thus affected by the absence of registered demand that arises when a product is no longer available. In the present work, we review the uncensoring (or unconstraining) techniques that have been proposed to deal with this issue, and develop a taxonomy based on their respective features. This study will be helpful in identifying the relative merits of these techniques, as well as avenues for future research.

",shadi azadeh,,2014.0,10.1057/rpm.2014.8,Journal of Revenue and Pricing Management,Azadeh2014,Not available,,Nature,Not available,A taxonomy of demand uncensoring methods in revenue management,b5f5a6ba431936a945b4de113bc94123,http://dx.doi.org/10.1057/rpm.2014.8 17405,"

Revenue management systems rely on customer data, and are thus affected by the absence of registered demand that arises when a product is no longer available. In the present work, we review the uncensoring (or unconstraining) techniques that have been proposed to deal with this issue, and develop a taxonomy based on their respective features. This study will be helpful in identifying the relative merits of these techniques, as well as avenues for future research.

",patrice marcotte,,2014.0,10.1057/rpm.2014.8,Journal of Revenue and Pricing Management,Azadeh2014,Not available,,Nature,Not available,A taxonomy of demand uncensoring methods in revenue management,b5f5a6ba431936a945b4de113bc94123,http://dx.doi.org/10.1057/rpm.2014.8 17406,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",qinghua he,Brain imaging,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17407,"

Humans can reflect on decisions and report variable levels of confidence. But why maintain an explicit representation of confidence for choices that have already been made and therefore cannot be undone? Here we show that an explicit representation of confidence is harnessed for subsequent changes of mind. Specifically, when confidence is low, participants are more likely to change their minds when the same choice is presented again, an effect that is most pronounced in participants with greater fidelity in their confidence reports. Furthermore, we show that choices reported with high confidence follow a more consistent pattern (fewer transitivity violations). Finally, by tracking participants’ eye movements, we demonstrate that lower-level gaze dynamics can track uncertainty but do not directly impact changes of mind. These results suggest that an explicit and accurate representation of confidence has a positive impact on the quality of future value-based decisions.

",stephen fleming,,2016.0,10.1038/s41562-016-0002,Nature Human Behaviour,Folke2016,Not available,,Nature,Not available,Explicit representation of confidence informs future value-based decisions,c422a74241a64da65c2198b33fdd17c0,http://dx.doi.org/10.1038/s41562-016-0002 17408,"

Revenue management systems rely on customer data, and are thus affected by the absence of registered demand that arises when a product is no longer available. In the present work, we review the uncensoring (or unconstraining) techniques that have been proposed to deal with this issue, and develop a taxonomy based on their respective features. This study will be helpful in identifying the relative merits of these techniques, as well as avenues for future research.

",gilles savard,,2014.0,10.1057/rpm.2014.8,Journal of Revenue and Pricing Management,Azadeh2014,Not available,,Nature,Not available,A taxonomy of demand uncensoring methods in revenue management,b5f5a6ba431936a945b4de113bc94123,http://dx.doi.org/10.1057/rpm.2014.8 17410,"By analyzing previously overlooked fossils and by taking a second look at some old finds, paleontologists are providing the first glimpses of the actual behavior of the tyrannosaurs",gregory erickson,,2014.0,10.1038/scientificamericandinosaurs0514-38,Scientific American,Erickson2014,Not available,,Nature,Not available,Breathing Life into T. rex,7b6edd9d8b3a8ecd180e57d91d0364e7,http://dx.doi.org/10.1038/scientificamericandinosaurs0514-38 17411,"

This paper looks at the short history of the Eurozone through the lens of an evolutionary approach to forming new institutions. The euro has operated as a currency without a state under the dominance of Germany. This by itself may be good news, as long as Germany does not shirk its growing responsibility for the euro’s future. This would require Germany to invest more in upgrading Eurozone institutions and balancing its dominance gains with the economic and political responsibilities that come with it. Germany’s resilience and dominant size within the EU may explain its ‘muddling-through’ approach toward the Eurozone crisis: doing enough to prevent the unraveling of the Eurozone while resisting policies that may mitigate the depth of the crisis if they involve short-run costs to Germany. We review several manifestations of this muddling-through process. Germany’s attitude toward the Eurozone resembles the attitude of the United States toward the Bretton Woods system in the 1960s – benign neglect of the growing tensions, which led to the ultimate demise of the Bretton Woods system. Chances are that unraveling the Eurozone would be much more costly than the end of the Bretton Woods regime. One hopes that the muddling-through process would work as stepping-stones toward a more perfect euro union, yet hope may not be enough to deliver it.

",joshua aizenman,,2015.0,10.1057/ces.2014.37,Comparative Economic Studies,Aizenman2015,Not available,,Nature,Not available,"The Eurocrisis: Muddling through, or on the Way to a More Perfect Euro Union?",c26897829ba3c0cfc9f1bc7c517d2179,http://dx.doi.org/10.1057/ces.2014.37 17413,"

Financial crises have occurred periodically for hundreds of years, and Adam Smith had important insights into their causes. Although by no means all that we know about such crises has been derived from Smith, it is interesting and important to reflect on what he did know and how ignoring his warnings about the creation of excess liquidity has contributed to the current crisis. In addition to the complexity of contemporary finance and the role of central banks and other regulatory institutions, a major difference between Smith's day and ours is the emergence of “moral hazard” as an important policy issue and its corollary, “immoral results.” It is important to realize that the risks of financial crisis, moral hazard, and immoral results cannot be avoided by financial and accounting gimmicks, and that there is no substitute for adequate capital in the creation of liquidity.

",michael mussa,,2009.0,10.1057/be.2008.9,Business Economics,Mussa2009,Not available,,Nature,Not available,Adam Smith and the Political Economy of a Modern Financial Crisis,3114b535e9d3a838bab1d601b87e5f3b,http://dx.doi.org/10.1057/be.2008.9 17414,"

INTRODUCTION In recent years, the importance of income from broadcasting rights for professional sports clubs' revenues has increased significantly both in the U.S. and in Europe [see Cave and Crandall, 2001]. While up to the 1980s gate receipts have constituted the major pillar of revenues, this role has since been taken over by income out of broadcasting rights sales [Andreff and Staudohar, 2000].

",helmut dietl,,2007.0,10.1057/eej.2007.33,Eastern Economic Journal,Dietl2007,Not available,,Nature,Not available,Pay-TV Versus Free-Tv: A Model of Sports Broadcasting Rights Sales,d9b8a36bb5699308f38010fb64230510,http://dx.doi.org/10.1057/eej.2007.33 17415,"

INTRODUCTION In recent years, the importance of income from broadcasting rights for professional sports clubs' revenues has increased significantly both in the U.S. and in Europe [see Cave and Crandall, 2001]. While up to the 1980s gate receipts have constituted the major pillar of revenues, this role has since been taken over by income out of broadcasting rights sales [Andreff and Staudohar, 2000].

",tariq hasan,,2007.0,10.1057/eej.2007.33,Eastern Economic Journal,Dietl2007,Not available,,Nature,Not available,Pay-TV Versus Free-Tv: A Model of Sports Broadcasting Rights Sales,d9b8a36bb5699308f38010fb64230510,http://dx.doi.org/10.1057/eej.2007.33 17416,How Obama and his team can pass climate legislation and reach an international accord by December 2009,chris mooney,,2009.0,10.1038/scientificamericanearth0309-24,Scientific American,Mooney2009,Not available,,Nature,Not available,Winning the Carbon Game,42bea32177778e8422255211cd197b3d,http://dx.doi.org/10.1038/scientificamericanearth0309-24 17417,How Obama and his team can pass climate legislation and reach an international accord by December 2009,chris mooney,,2009.0,10.1038/scientificamericanearth0309-24,Scientific American,Mooney2009,Not available,,Nature,Not available,Winning the Carbon Game,42bea32177778e8422255211cd197b3d,http://dx.doi.org/10.1038/scientificamericanearth0309-24 17418,"

Humans can reflect on decisions and report variable levels of confidence. But why maintain an explicit representation of confidence for choices that have already been made and therefore cannot be undone? Here we show that an explicit representation of confidence is harnessed for subsequent changes of mind. Specifically, when confidence is low, participants are more likely to change their minds when the same choice is presented again, an effect that is most pronounced in participants with greater fidelity in their confidence reports. Furthermore, we show that choices reported with high confidence follow a more consistent pattern (fewer transitivity violations). Finally, by tracking participants’ eye movements, we demonstrate that lower-level gaze dynamics can track uncertainty but do not directly impact changes of mind. These results suggest that an explicit and accurate representation of confidence has a positive impact on the quality of future value-based decisions.

",benedetto martino,,2016.0,10.1038/s41562-016-0002,Nature Human Behaviour,Folke2016,Not available,,Nature,Not available,Explicit representation of confidence informs future value-based decisions,c422a74241a64da65c2198b33fdd17c0,http://dx.doi.org/10.1038/s41562-016-0002 17419,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",yichao zhang,Evolutionary theory,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17420,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",yichao zhang,Statistics,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17421,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",m. aziz-alaoui,Evolutionary theory,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17422,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",m. aziz-alaoui,Statistics,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17423,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",cyrille bertelle,Evolutionary theory,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17424,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",cyrille bertelle,Statistics,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17425,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",jihong guan,Evolutionary theory,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17426,"

Nash equilibrium is widely present in various social disputes. As of now, in structured static populations, such as social networks, regular, and random graphs, the discussions on Nash equilibrium are quite limited. In a relatively stable static gaming network, a rational individual has to comprehensively consider all his/her opponents' strategies before they adopt a unified strategy. In this scenario, a new strategy equilibrium emerges in the system. We define this equilibrium as a local Nash equilibrium. In this paper, we present an explicit definition of the local Nash equilibrium for the two-strategy games in structured populations. Based on the definition, we investigate the condition that a system reaches the evolutionary stable state when the individuals play the Prisoner's dilemma and snow-drift game. The local Nash equilibrium provides a way to judge whether a gaming structured population reaches the evolutionary stable state on one hand. On the other hand, it can be used to predict whether cooperators can survive in a system long before the system reaches its evolutionary stable state for the Prisoner's dilemma game. Our work therefore provides a theoretical framework for understanding the evolutionary stable state in the gaming populations with static structures.

",jihong guan,Statistics,2014.0,10.1038/srep06224,Scientific Reports,Zhang2014,Not available,,Nature,Not available,Local Nash Equilibrium in Social Networks,de74cee6ac1b6582533f7944250f8ba1,http://dx.doi.org/10.1038/srep06224 17427,"

A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction, where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and, consequently, suggest avenues for further research.

",chris anderson,,2010.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,Anderson2010,Not available,,Nature,Not available,Name-your-own price auction mechanisms – Modeling and future implications,121c7a1e1de9dc73f1570768516fcb21,http://dx.doi.org/10.1057/rpm.2010.46 17428,"

A popular method for selling excess inventory over the Internet is via a Name-Your-Own Price auction, where the bidder bids on an item and the seller immediately decides on whether or not to accept the bid. The analytical modeling of such auctions is still in its infancy. A number of papers have appeared over the last few years making various assumptions about buyers and sellers. The intent of this article is to carefully delineate the various assumptions and modeling approaches and, consequently, suggest avenues for further research.

",john wilson,,2010.0,10.1057/rpm.2010.46,Journal of Revenue and Pricing Management,Anderson2010,Not available,,Nature,Not available,Name-your-own price auction mechanisms – Modeling and future implications,121c7a1e1de9dc73f1570768516fcb21,http://dx.doi.org/10.1057/rpm.2010.46 17429,"

Socio–ecological systems are increasingly modelled by games played on complex networks. While the concept of Nash equilibrium assumes perfect rationality, in reality players display heterogeneous bounded rationality. Here we present a topological model of bounded rationality in socio-ecological systems, using the rationality parameter of the Quantal Response Equilibrium. We argue that system rationality could be measured by the average Kullback–-Leibler divergence between Nash and Quantal Response Equilibria, and that the convergence towards Nash equilibria on average corresponds to increased system rationality. Using this model, we show that when a randomly connected socio-ecological system is topologically optimised to converge towards Nash equilibria, scale-free and small world features emerge. Therefore, optimising system rationality is an evolutionary reason for the emergence of scale-free and small-world features in socio-ecological systems. Further, we show that in games where multiple equilibria are possible, the correlation between the scale-freeness of the system and the fraction of links with multiple equilibria goes through a rapid transition when the average system rationality increases. Our results explain the influence of the topological structure of socio–ecological systems in shaping their collective cognitive behaviour, and provide an explanation for the prevalence of scale-free and small-world characteristics in such systems.

",dharshana kasthurirathna,Computational science,2015.0,10.1038/srep10448,Scientific Reports,Kasthurirathna2015,Not available,,Nature,Not available,Emergence of scale-free characteristics in socio-ecological systems with bounded rationality,c0b2114fe9fe59412084edd809ff7de5,http://dx.doi.org/10.1038/srep10448 17430,"

Socio–ecological systems are increasingly modelled by games played on complex networks. While the concept of Nash equilibrium assumes perfect rationality, in reality players display heterogeneous bounded rationality. Here we present a topological model of bounded rationality in socio-ecological systems, using the rationality parameter of the Quantal Response Equilibrium. We argue that system rationality could be measured by the average Kullback–-Leibler divergence between Nash and Quantal Response Equilibria, and that the convergence towards Nash equilibria on average corresponds to increased system rationality. Using this model, we show that when a randomly connected socio-ecological system is topologically optimised to converge towards Nash equilibria, scale-free and small world features emerge. Therefore, optimising system rationality is an evolutionary reason for the emergence of scale-free and small-world features in socio-ecological systems. Further, we show that in games where multiple equilibria are possible, the correlation between the scale-freeness of the system and the fraction of links with multiple equilibria goes through a rapid transition when the average system rationality increases. Our results explain the influence of the topological structure of socio–ecological systems in shaping their collective cognitive behaviour, and provide an explanation for the prevalence of scale-free and small-world characteristics in such systems.

",dharshana kasthurirathna,Computer science,2015.0,10.1038/srep10448,Scientific Reports,Kasthurirathna2015,Not available,,Nature,Not available,Emergence of scale-free characteristics in socio-ecological systems with bounded rationality,c0b2114fe9fe59412084edd809ff7de5,http://dx.doi.org/10.1038/srep10448 17431,"

Socio–ecological systems are increasingly modelled by games played on complex networks. While the concept of Nash equilibrium assumes perfect rationality, in reality players display heterogeneous bounded rationality. Here we present a topological model of bounded rationality in socio-ecological systems, using the rationality parameter of the Quantal Response Equilibrium. We argue that system rationality could be measured by the average Kullback–-Leibler divergence between Nash and Quantal Response Equilibria, and that the convergence towards Nash equilibria on average corresponds to increased system rationality. Using this model, we show that when a randomly connected socio-ecological system is topologically optimised to converge towards Nash equilibria, scale-free and small world features emerge. Therefore, optimising system rationality is an evolutionary reason for the emergence of scale-free and small-world features in socio-ecological systems. Further, we show that in games where multiple equilibria are possible, the correlation between the scale-freeness of the system and the fraction of links with multiple equilibria goes through a rapid transition when the average system rationality increases. Our results explain the influence of the topological structure of socio–ecological systems in shaping their collective cognitive behaviour, and provide an explanation for the prevalence of scale-free and small-world characteristics in such systems.

",mahendra piraveenan,Computational science,2015.0,10.1038/srep10448,Scientific Reports,Kasthurirathna2015,Not available,,Nature,Not available,Emergence of scale-free characteristics in socio-ecological systems with bounded rationality,c0b2114fe9fe59412084edd809ff7de5,http://dx.doi.org/10.1038/srep10448 17432,"

Socio–ecological systems are increasingly modelled by games played on complex networks. While the concept of Nash equilibrium assumes perfect rationality, in reality players display heterogeneous bounded rationality. Here we present a topological model of bounded rationality in socio-ecological systems, using the rationality parameter of the Quantal Response Equilibrium. We argue that system rationality could be measured by the average Kullback–-Leibler divergence between Nash and Quantal Response Equilibria, and that the convergence towards Nash equilibria on average corresponds to increased system rationality. Using this model, we show that when a randomly connected socio-ecological system is topologically optimised to converge towards Nash equilibria, scale-free and small world features emerge. Therefore, optimising system rationality is an evolutionary reason for the emergence of scale-free and small-world features in socio-ecological systems. Further, we show that in games where multiple equilibria are possible, the correlation between the scale-freeness of the system and the fraction of links with multiple equilibria goes through a rapid transition when the average system rationality increases. Our results explain the influence of the topological structure of socio–ecological systems in shaping their collective cognitive behaviour, and provide an explanation for the prevalence of scale-free and small-world characteristics in such systems.

",mahendra piraveenan,Computer science,2015.0,10.1038/srep10448,Scientific Reports,Kasthurirathna2015,Not available,,Nature,Not available,Emergence of scale-free characteristics in socio-ecological systems with bounded rationality,c0b2114fe9fe59412084edd809ff7de5,http://dx.doi.org/10.1038/srep10448 17433,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",tom schonberg,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17434,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",tom schonberg,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17435,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",akram bakkour,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17436,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",akram bakkour,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17437,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",ashleigh hover,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17438,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",ashleigh hover,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17439,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",jeanette mumford,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17440,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",jeanette mumford,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17441,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",lakshya nagar,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17442,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",lakshya nagar,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17443,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",jacob perez,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17444,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",jacob perez,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17445,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",russell poldrack,Attention,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17446,"

It is believed that choice behavior reveals the underlying value of goods. The subjective values of stimuli can be changed through reward-based learning mechanisms as well as by modifying the description of the decision problem, but it has yet to be shown that preferences can be manipulated by perturbing intrinsic values of individual items. Here we show that the value of food items can be modulated by the concurrent presentation of an irrelevant auditory cue to which subjects must make a simple motor response (i.e., cue-approach training). Follow-up tests showed that the effects of this pairing on choice lasted at least 2 months after prolonged training. Eye-tracking during choice confirmed that cue-approach training increased attention to the cued items. Neuroimaging revealed the neural signature of a value change in the form of amplified preference-related activity in ventromedial prefrontal cortex.

",russell poldrack,Decision,2014.0,10.1038/nn.3673,Nature Neuroscience,Schonberg2014,Not available,,Nature,Not available,Changing value through cued approach: an automatic mechanism of behavior change,c60521d9824aeffd15ab9986e4ad4b56,http://dx.doi.org/10.1038/nn.3673 17447,"

This paper proposes a model to compute nodal prices in oligopolistic markets. The model generalizes a previous model aimed at solving the single-bus problem by applying an optimization procedure. Both models can be classified as conjectured supply function models. The conjectured supply functions are assumed to be linear with constant slopes. The conjectured price responses (price sensitivity as seen for each generating unit), however, are assumed to be dependent on the system line's status (congested or not congested). The consideration of such a dependence is one of the main contributions of this paper. Market equilibrium is defined in this framework. A procedure based on solving an optimization problem is proposed. It only requires convexity of cost functions. Existence of equilibrium, however, is not guaranteed in this multi-nodal situation and an iterative search is required to find it if it exists. A two-area multi-period case study is analysed. The model reaches equilibrium for some cases, mainly depending on the number of periods considered and on the value of conjectured supply function slopes. Some oscillation patterns are observed that can be interpreted as quasi-equilibria. This methodology can be applied to the study of the future Iberian electricity market.

",j barquin,,2008.0,10.1057/jors.2008.118,Journal of the Operational Research Society,Barquín2008,Not available,,Nature,Not available,An optimization-based conjectured supply function equilibrium model for network constrained electricity markets,81599ebed3fed5bf40ac968c7d9a32df,http://dx.doi.org/10.1057/jors.2008.118 17448,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",alexander glaser,Imaging techniques,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17449,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",alexander glaser,Experimental nuclear physics,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17450,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",boaz barak,Imaging techniques,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17451,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",boaz barak,Experimental nuclear physics,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17452,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",robert goldston,Imaging techniques,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17453,"

The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring ‘information barriers’, designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

",robert goldston,Experimental nuclear physics,2014.0,10.1038/nature13457,Nature,Glaser2014,Not available,,Nature,Not available,A zero-knowledge protocol for nuclear warhead verification,19c04d3188dc45725c469607ba72c4aa,http://dx.doi.org/10.1038/nature13457 17454,"

Much research has been devoted to the early adoption and the continued and habituated use of information systems (IS). Nevertheless, less is known about quitting the use of IS by individuals, especially in habituated hedonic settings, that is, IS discontinuance. This study focuses on this phenomenon, and argues that in hedonic IS use contexts (1) IS continuance and discontinuance can be considered simultaneously yet independently by current users, and that (2) IS continuance and discontinuance drivers can have differential effects on the respective behavioral intentions. Specifically, social cognitive theory is used to point to key unique drivers of website discontinuance intentions: guilt feelings regarding the use of the website and website-specific discontinuance self-efficacy, which counterbalance the effects of continuance drivers: habit and satisfaction. The distinctiveness of continuance and discontinuance intentions and their respective nomological networks, as well as the proposed research model, were then empirically validated in a study of 510 Facebook users. The findings indicate that satisfaction reduces discontinuance intentions directly and indirectly through habit formation. However, habit can also facilitate the development of ‘addiction’ to the use of the website, which produces guilt feelings and reduces one’s self-efficacy to quit using the website. These factors, in turn, drive discontinuance intentions and possibly the quitting of the use of the website.

",ofir turel,,2014.0,10.1057/ejis.2014.19,European Journal of Information Systems,Turel2014,Not available,,Nature,Not available,Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users,e70374729f408e797aa1b01fe89afdf7,http://dx.doi.org/10.1057/ejis.2014.19 17455,"

This article discusses the changing landscape of US crime, and both describes and evaluates the growth of private security in total security provided. Since the mid-1970s violent and basic property crimes have constantly declined while the number of economic crimes like identity theft, counterfeit goods and cyber misdeeds increased substantially. Monopolistic police have not addressed the changing landscape of crime and continue to deliver their traditional services. As market forces have limited influence on government, private security that is highly competitive and client oriented has been quicker to adopt technology and management innovations and address the new types of crime. Private police are estimated to be three times larger than public law enforcement. The article concludes that the increased penetration of private security is socially beneficial by improving efficiency, delivering client-oriented services and forcing police to improve their performance.

",erwin blackstone,,2012.0,10.1057/sj.2012.5,Security Journal,Blackstone2012,Not available,,Nature,Not available,Competition versus monopoly in the provision of police,c76436f4364a6d43b5b39c32a7871f1e,http://dx.doi.org/10.1057/sj.2012.5 17456,"

This article discusses the changing landscape of US crime, and both describes and evaluates the growth of private security in total security provided. Since the mid-1970s violent and basic property crimes have constantly declined while the number of economic crimes like identity theft, counterfeit goods and cyber misdeeds increased substantially. Monopolistic police have not addressed the changing landscape of crime and continue to deliver their traditional services. As market forces have limited influence on government, private security that is highly competitive and client oriented has been quicker to adopt technology and management innovations and address the new types of crime. Private police are estimated to be three times larger than public law enforcement. The article concludes that the increased penetration of private security is socially beneficial by improving efficiency, delivering client-oriented services and forcing police to improve their performance.

",simon hakim,,2012.0,10.1057/sj.2012.5,Security Journal,Blackstone2012,Not available,,Nature,Not available,Competition versus monopoly in the provision of police,c76436f4364a6d43b5b39c32a7871f1e,http://dx.doi.org/10.1057/sj.2012.5 17457,"

This paper proposes a model to compute nodal prices in oligopolistic markets. The model generalizes a previous model aimed at solving the single-bus problem by applying an optimization procedure. Both models can be classified as conjectured supply function models. The conjectured supply functions are assumed to be linear with constant slopes. The conjectured price responses (price sensitivity as seen for each generating unit), however, are assumed to be dependent on the system line's status (congested or not congested). The consideration of such a dependence is one of the main contributions of this paper. Market equilibrium is defined in this framework. A procedure based on solving an optimization problem is proposed. It only requires convexity of cost functions. Existence of equilibrium, however, is not guaranteed in this multi-nodal situation and an iterative search is required to find it if it exists. A two-area multi-period case study is analysed. The model reaches equilibrium for some cases, mainly depending on the number of periods considered and on the value of conjectured supply function slopes. Some oscillation patterns are observed that can be interpreted as quasi-equilibria. This methodology can be applied to the study of the future Iberian electricity market.

",b vitoriano,,2008.0,10.1057/jors.2008.118,Journal of the Operational Research Society,Barquín2008,Not available,,Nature,Not available,An optimization-based conjectured supply function equilibrium model for network constrained electricity markets,81599ebed3fed5bf40ac968c7d9a32df,http://dx.doi.org/10.1057/jors.2008.118 17458,"

We develop and test a theoretical model to investigate the adoption of government-to-government (G2G) information systems in public administration organizations. Specifically, this model explains how top management commitment (TMC) mediates the impact of external institutional pressures on internal organizational resource allocation, which finally leads to the adoption decision. The hypotheses were tested using survey data from public administration organizations in China. Results from partial least squares analyses suggest that coercive and normative pressures positively affect TMC, which then positively affects financial and information technology (IT) human resources in the G2G adoption process. In turn, financial and IT human resources are confirmed to positively affect the intention to adopt G2G. Surprisingly, we do not find support for our hypothesis that mimetic pressures directly influence TMC. Rather, a post hoc analysis implies that mimetic pressures indirectly influence TMC via the influence of coercive pressures. Our findings provide important managerial implications for public administration organizations.

",daqing zheng,,2012.0,10.1057/ejis.2012.28,European Journal of Information Systems,Zheng2012,Not available,,Nature,Not available,E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view,1f96d311b2e4791392b743aea12b581b,http://dx.doi.org/10.1057/ejis.2012.28 17459,"

We develop and test a theoretical model to investigate the adoption of government-to-government (G2G) information systems in public administration organizations. Specifically, this model explains how top management commitment (TMC) mediates the impact of external institutional pressures on internal organizational resource allocation, which finally leads to the adoption decision. The hypotheses were tested using survey data from public administration organizations in China. Results from partial least squares analyses suggest that coercive and normative pressures positively affect TMC, which then positively affects financial and information technology (IT) human resources in the G2G adoption process. In turn, financial and IT human resources are confirmed to positively affect the intention to adopt G2G. Surprisingly, we do not find support for our hypothesis that mimetic pressures directly influence TMC. Rather, a post hoc analysis implies that mimetic pressures indirectly influence TMC via the influence of coercive pressures. Our findings provide important managerial implications for public administration organizations.

",jin chen,,2012.0,10.1057/ejis.2012.28,European Journal of Information Systems,Zheng2012,Not available,,Nature,Not available,E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view,1f96d311b2e4791392b743aea12b581b,http://dx.doi.org/10.1057/ejis.2012.28 17460,"

We develop and test a theoretical model to investigate the adoption of government-to-government (G2G) information systems in public administration organizations. Specifically, this model explains how top management commitment (TMC) mediates the impact of external institutional pressures on internal organizational resource allocation, which finally leads to the adoption decision. The hypotheses were tested using survey data from public administration organizations in China. Results from partial least squares analyses suggest that coercive and normative pressures positively affect TMC, which then positively affects financial and information technology (IT) human resources in the G2G adoption process. In turn, financial and IT human resources are confirmed to positively affect the intention to adopt G2G. Surprisingly, we do not find support for our hypothesis that mimetic pressures directly influence TMC. Rather, a post hoc analysis implies that mimetic pressures indirectly influence TMC via the influence of coercive pressures. Our findings provide important managerial implications for public administration organizations.

",lihua huang,,2012.0,10.1057/ejis.2012.28,European Journal of Information Systems,Zheng2012,Not available,,Nature,Not available,E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view,1f96d311b2e4791392b743aea12b581b,http://dx.doi.org/10.1057/ejis.2012.28 17461,"

We develop and test a theoretical model to investigate the adoption of government-to-government (G2G) information systems in public administration organizations. Specifically, this model explains how top management commitment (TMC) mediates the impact of external institutional pressures on internal organizational resource allocation, which finally leads to the adoption decision. The hypotheses were tested using survey data from public administration organizations in China. Results from partial least squares analyses suggest that coercive and normative pressures positively affect TMC, which then positively affects financial and information technology (IT) human resources in the G2G adoption process. In turn, financial and IT human resources are confirmed to positively affect the intention to adopt G2G. Surprisingly, we do not find support for our hypothesis that mimetic pressures directly influence TMC. Rather, a post hoc analysis implies that mimetic pressures indirectly influence TMC via the influence of coercive pressures. Our findings provide important managerial implications for public administration organizations.

",cheng zhang,,2012.0,10.1057/ejis.2012.28,European Journal of Information Systems,Zheng2012,Not available,,Nature,Not available,E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view,1f96d311b2e4791392b743aea12b581b,http://dx.doi.org/10.1057/ejis.2012.28 17462,"

To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a requirements engineering method for understanding control problems and designing solutions, based on an economic value perspective. The methodology employs a library of so-called control patterns, inspired by design patterns in software engineering. A control pattern is a generic solution for a common control problem. The usefulness and adequacy of the control patterns is demonstrated by a case study of the governance and control mechanisms of the Dutch public health insurance network for exceptional medical expenses (AWBZ).

",vera kartseva,,2010.0,10.1057/ejis.2010.13,European Journal of Information Systems,Kartseva2010,Not available,,Nature,Not available,Control patterns in a health-care network,60ba2c97e964f6383971d0c7efecef84,http://dx.doi.org/10.1057/ejis.2010.13 17463,"

To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a requirements engineering method for understanding control problems and designing solutions, based on an economic value perspective. The methodology employs a library of so-called control patterns, inspired by design patterns in software engineering. A control pattern is a generic solution for a common control problem. The usefulness and adequacy of the control patterns is demonstrated by a case study of the governance and control mechanisms of the Dutch public health insurance network for exceptional medical expenses (AWBZ).

",joris hulstijn,,2010.0,10.1057/ejis.2010.13,European Journal of Information Systems,Kartseva2010,Not available,,Nature,Not available,Control patterns in a health-care network,60ba2c97e964f6383971d0c7efecef84,http://dx.doi.org/10.1057/ejis.2010.13 17464,"

To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a requirements engineering method for understanding control problems and designing solutions, based on an economic value perspective. The methodology employs a library of so-called control patterns, inspired by design patterns in software engineering. A control pattern is a generic solution for a common control problem. The usefulness and adequacy of the control patterns is demonstrated by a case study of the governance and control mechanisms of the Dutch public health insurance network for exceptional medical expenses (AWBZ).

",jaap gordijn,,2010.0,10.1057/ejis.2010.13,European Journal of Information Systems,Kartseva2010,Not available,,Nature,Not available,Control patterns in a health-care network,60ba2c97e964f6383971d0c7efecef84,http://dx.doi.org/10.1057/ejis.2010.13 17465,"

To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a requirements engineering method for understanding control problems and designing solutions, based on an economic value perspective. The methodology employs a library of so-called control patterns, inspired by design patterns in software engineering. A control pattern is a generic solution for a common control problem. The usefulness and adequacy of the control patterns is demonstrated by a case study of the governance and control mechanisms of the Dutch public health insurance network for exceptional medical expenses (AWBZ).

",yao-hua tan,,2010.0,10.1057/ejis.2010.13,European Journal of Information Systems,Kartseva2010,Not available,,Nature,Not available,Control patterns in a health-care network,60ba2c97e964f6383971d0c7efecef84,http://dx.doi.org/10.1057/ejis.2010.13 17466,"

This qualitative longitudinal study observed the strategy process of several Spanish banks at the turn of the century, where the industry was undergoing a structural transformation due to the threat of Internet banking. We develop a model of organizational learning informed by an integration of findings from a qualitative study with theoretical perspectives from the strategy, knowledge creation, and learning literatures. The model is then used to compare and contrast the different learning processes that led these banks to the development and implementation of diverse Internet banking strategies, and to draw preliminary conclusions regarding the potential relationships between the learning processes used, the strategies chosen, and their performance outcomes.

",maria salmador,,2012.0,10.1057/kmrp.2012.33,Knowledge Management Research & Practice,Salmador2012,Not available,,Nature,Not available,Knowledge creation and competitive advantage in turbulent environments: a process model of organizational learning,de35def34356ea0f41caea92b9997f1b,http://dx.doi.org/10.1057/kmrp.2012.33 17467,"

This qualitative longitudinal study observed the strategy process of several Spanish banks at the turn of the century, where the industry was undergoing a structural transformation due to the threat of Internet banking. We develop a model of organizational learning informed by an integration of findings from a qualitative study with theoretical perspectives from the strategy, knowledge creation, and learning literatures. The model is then used to compare and contrast the different learning processes that led these banks to the development and implementation of diverse Internet banking strategies, and to draw preliminary conclusions regarding the potential relationships between the learning processes used, the strategies chosen, and their performance outcomes.

",juan florin,,2012.0,10.1057/kmrp.2012.33,Knowledge Management Research & Practice,Salmador2012,Not available,,Nature,Not available,Knowledge creation and competitive advantage in turbulent environments: a process model of organizational learning,de35def34356ea0f41caea92b9997f1b,http://dx.doi.org/10.1057/kmrp.2012.33 17468,"

This paper proposes a model to compute nodal prices in oligopolistic markets. The model generalizes a previous model aimed at solving the single-bus problem by applying an optimization procedure. Both models can be classified as conjectured supply function models. The conjectured supply functions are assumed to be linear with constant slopes. The conjectured price responses (price sensitivity as seen for each generating unit), however, are assumed to be dependent on the system line's status (congested or not congested). The consideration of such a dependence is one of the main contributions of this paper. Market equilibrium is defined in this framework. A procedure based on solving an optimization problem is proposed. It only requires convexity of cost functions. Existence of equilibrium, however, is not guaranteed in this multi-nodal situation and an iterative search is required to find it if it exists. A two-area multi-period case study is analysed. The model reaches equilibrium for some cases, mainly depending on the number of periods considered and on the value of conjectured supply function slopes. Some oscillation patterns are observed that can be interpreted as quasi-equilibria. This methodology can be applied to the study of the future Iberian electricity market.

",e centeno,,2008.0,10.1057/jors.2008.118,Journal of the Operational Research Society,Barquín2008,Not available,,Nature,Not available,An optimization-based conjectured supply function equilibrium model for network constrained electricity markets,81599ebed3fed5bf40ac968c7d9a32df,http://dx.doi.org/10.1057/jors.2008.118 17471,"

This paper analyzes Poland's economic performance following the introduction of shock therapy as compared to China's performance under its transformation policies. Both nation's economic policies are evaluated within the context of the goals, perceptions and performance criteria selected by Polish policymakers. Evidence indicates that shock therapy had mixed results and that ideology has influenced previous analyses of such policies. Since China's performance based upon the same criteria has been no less favorable, lessons from its transformation experience deserve attention from Central and East European policymakers comparable to that given Poland.

",james angresano,,1996.0,10.1057/ces.1996.14,Comparative Economic Studies,Angresano1996,Not available,,Nature,Not available,Poland After the Shock,144aaf478d040346044f727abf72d70f,http://dx.doi.org/10.1057/ces.1996.14 17472,

A central bank must decide on the frequency with which it will conduct open market operations and the variability in short-term money market that it will allow. The paper shows how the optimal operating procedure balances the value of attaining an immediate target and broadcasting the central bank's intentions against the informational advantages to the central bank of allowing the free play of market forces to reveal more of the information available to market participants.

,daniel hardy,,1997.0,10.2307/3867464,Staff Papers - International Monetary Fund,Hardy1997,Not available,,Nature,Not available,"Market Information and Signaling in Central Bank Operations, or, How Often Should a Central Bank Intervene?",44164a4bfa5d15c62786bedc9dc8d396,http://dx.doi.org/10.2307/3867464 17473,"

Some public health advocates in tobacco states, having reconsidered the impacts of the federal tobacco price-support program, have negotiated common tobacco regulatory policy stances with tobacco grower representatives. This paper describes the impact of this rapprochement on the state-level negotiations of Master Settlement Agreement funds. It argues that there are indeed two worthy public health goals: tobacco control and the economic viability of tobacco dependent communities (TDCs), but the immediacy of the threat to the latter, the political potency of tobacco growers, and growers' goal of maintaining tobacco as their farms' anchor bring severe risks to the tobacco control portion of Settlement funds. Among three competing philosophies of economic development for TDCs, none are well evaluated, and two potentially create endless demands on Settlement resources. Public health policy advocates are urged to participate in negotiations on TDC economic development and to forcefully advocate for adequate tobacco control resources.

",w austin,,2000.0,10.2307/3343341,Journal of Public Health Policy,Austin2000,Not available,,Nature,Not available,Rural Economic Development vs. Tobacco Control? Tensions Underlying the Use of Tobacco Settlement Funds,f1b2d9e6ae91679355572678b02a6f93,http://dx.doi.org/10.2307/3343341 17474,"

Some public health advocates in tobacco states, having reconsidered the impacts of the federal tobacco price-support program, have negotiated common tobacco regulatory policy stances with tobacco grower representatives. This paper describes the impact of this rapprochement on the state-level negotiations of Master Settlement Agreement funds. It argues that there are indeed two worthy public health goals: tobacco control and the economic viability of tobacco dependent communities (TDCs), but the immediacy of the threat to the latter, the political potency of tobacco growers, and growers' goal of maintaining tobacco as their farms' anchor bring severe risks to the tobacco control portion of Settlement funds. Among three competing philosophies of economic development for TDCs, none are well evaluated, and two potentially create endless demands on Settlement resources. Public health policy advocates are urged to participate in negotiations on TDC economic development and to forcefully advocate for adequate tobacco control resources.

",david altman,,2000.0,10.2307/3343341,Journal of Public Health Policy,Austin2000,Not available,,Nature,Not available,Rural Economic Development vs. Tobacco Control? Tensions Underlying the Use of Tobacco Settlement Funds,f1b2d9e6ae91679355572678b02a6f93,http://dx.doi.org/10.2307/3343341 17475,"

As fisheries generally take place in a common pool resource in which exclusion is by definition difficult, they are a unique entry point to investigating the inclusive development concept. This article discusses the debates and interactions between owners of mechanized fishing boats in Chennai, India, over entry into their ocean fisheries. For the time period under consideration (1995-2014), we demonstrate that the discussion over social boundaries to the profession continued unabated, with moderate and more extreme views alternating and poorer owners standing opposed to the boat-owning elite. Interactive governance theory provides the framework of analysis. We conclude that governors – whether of the state or of the fishing population – need to balance between different policy objectives and between the imperatives of inclusion and exclusion to improve governability.

",maarten bavinck,,2015.0,10.1057/ejdr.2015.46,European Journal of Development Research,Bavinck2015,Not available,,Nature,Not available,"Contesting Inclusiveness: The Anxieties of Mechanised Fishers Over Social Boundaries in Chennai, South India",0ff20de2efaff3202e2dc0c09f716601,http://dx.doi.org/10.1057/ejdr.2015.46 17476,"

As fisheries generally take place in a common pool resource in which exclusion is by definition difficult, they are a unique entry point to investigating the inclusive development concept. This article discusses the debates and interactions between owners of mechanized fishing boats in Chennai, India, over entry into their ocean fisheries. For the time period under consideration (1995-2014), we demonstrate that the discussion over social boundaries to the profession continued unabated, with moderate and more extreme views alternating and poorer owners standing opposed to the boat-owning elite. Interactive governance theory provides the framework of analysis. We conclude that governors – whether of the state or of the fishing population – need to balance between different policy objectives and between the imperatives of inclusion and exclusion to improve governability.

",subramanian karuppiah,,2015.0,10.1057/ejdr.2015.46,European Journal of Development Research,Bavinck2015,Not available,,Nature,Not available,"Contesting Inclusiveness: The Anxieties of Mechanised Fishers Over Social Boundaries in Chennai, South India",0ff20de2efaff3202e2dc0c09f716601,http://dx.doi.org/10.1057/ejdr.2015.46 17477,"

As fisheries generally take place in a common pool resource in which exclusion is by definition difficult, they are a unique entry point to investigating the inclusive development concept. This article discusses the debates and interactions between owners of mechanized fishing boats in Chennai, India, over entry into their ocean fisheries. For the time period under consideration (1995-2014), we demonstrate that the discussion over social boundaries to the profession continued unabated, with moderate and more extreme views alternating and poorer owners standing opposed to the boat-owning elite. Interactive governance theory provides the framework of analysis. We conclude that governors – whether of the state or of the fishing population – need to balance between different policy objectives and between the imperatives of inclusion and exclusion to improve governability.

",svein jentoft,,2015.0,10.1057/ejdr.2015.46,European Journal of Development Research,Bavinck2015,Not available,,Nature,Not available,"Contesting Inclusiveness: The Anxieties of Mechanised Fishers Over Social Boundaries in Chennai, South India",0ff20de2efaff3202e2dc0c09f716601,http://dx.doi.org/10.1057/ejdr.2015.46 17478,"

This paper proposes a model to compute nodal prices in oligopolistic markets. The model generalizes a previous model aimed at solving the single-bus problem by applying an optimization procedure. Both models can be classified as conjectured supply function models. The conjectured supply functions are assumed to be linear with constant slopes. The conjectured price responses (price sensitivity as seen for each generating unit), however, are assumed to be dependent on the system line's status (congested or not congested). The consideration of such a dependence is one of the main contributions of this paper. Market equilibrium is defined in this framework. A procedure based on solving an optimization problem is proposed. It only requires convexity of cost functions. Existence of equilibrium, however, is not guaranteed in this multi-nodal situation and an iterative search is required to find it if it exists. A two-area multi-period case study is analysed. The model reaches equilibrium for some cases, mainly depending on the number of periods considered and on the value of conjectured supply function slopes. Some oscillation patterns are observed that can be interpreted as quasi-equilibria. This methodology can be applied to the study of the future Iberian electricity market.

",f fernandez-menendez,,2008.0,10.1057/jors.2008.118,Journal of the Operational Research Society,Barquín2008,Not available,,Nature,Not available,An optimization-based conjectured supply function equilibrium model for network constrained electricity markets,81599ebed3fed5bf40ac968c7d9a32df,http://dx.doi.org/10.1057/jors.2008.118 17479,"

Technology, standardization, and global integration have created a world of ever-increasing financial and economic complexity. However, measurement and modeling have not kept pace with these developments: new approaches to recognize and embrace the complexity of an open social-economic system are necessary. In particular, it is necessary to address five fundamental challenges to system modeling and forward-looking examinations of human behavior: fallibility, reflexivity, time inconsistency, domain inconsistency, and the “Lucas critique.” It is of particular importance to recognize that human life operates in an integrated domain of economic, political, spiritual, family, social, and cultural aspects. To support the needs of analysis, new types of data are necessary. The article presents several specific areas in which modeling and measurement must be improved to meet the demands for economic analysis in the 21st century.

",gene huang,,2013.0,10.1057/be.2012.37,Business Economics,Huang2013,Not available,,Nature,Not available,In Search of System Understanding and Control,782de9e11c94e2117e7c64d3f20768a4,http://dx.doi.org/10.1057/be.2012.37 17480,"

In many species, individuals express phenotypic characteristics that enhance their competitiveness, that is, the ability to acquire resources in competition with others. Moreover, the degree of competitiveness varies considerably across individuals and in time. By means of an evolutionary model, we provide an explanation for this finding. We make the assumption that investment into competitiveness enhances the probability to acquire a high-quality resource, but at the same time reduces the ability of exploiting acquired resources with maximal efficiency. The model reveals that under a broad range of conditions competitiveness either converges to a polymorphic state, where individuals differing in competitive ability stably coexist, or is subject to perpetual transitions between periods of high and low competitiveness. The dynamics becomes even more complex if females can evolve preferences for (or against) competitive males. In extreme cases, such preferences can even drive the population to extinction.

",sebastian baldauf,Evolution,2014.0,10.1038/ncomms6233,Nature Communications,Baldauf2014,Not available,,Nature,Not available,Diversifying evolution of competitiveness,02b7426a0cfd9b65d9d66d2970745a7b,http://dx.doi.org/10.1038/ncomms6233 17481,"

In many species, individuals express phenotypic characteristics that enhance their competitiveness, that is, the ability to acquire resources in competition with others. Moreover, the degree of competitiveness varies considerably across individuals and in time. By means of an evolutionary model, we provide an explanation for this finding. We make the assumption that investment into competitiveness enhances the probability to acquire a high-quality resource, but at the same time reduces the ability of exploiting acquired resources with maximal efficiency. The model reveals that under a broad range of conditions competitiveness either converges to a polymorphic state, where individuals differing in competitive ability stably coexist, or is subject to perpetual transitions between periods of high and low competitiveness. The dynamics becomes even more complex if females can evolve preferences for (or against) competitive males. In extreme cases, such preferences can even drive the population to extinction.

",leif engqvist,Evolution,2014.0,10.1038/ncomms6233,Nature Communications,Baldauf2014,Not available,,Nature,Not available,Diversifying evolution of competitiveness,02b7426a0cfd9b65d9d66d2970745a7b,http://dx.doi.org/10.1038/ncomms6233 17482,"

In many species, individuals express phenotypic characteristics that enhance their competitiveness, that is, the ability to acquire resources in competition with others. Moreover, the degree of competitiveness varies considerably across individuals and in time. By means of an evolutionary model, we provide an explanation for this finding. We make the assumption that investment into competitiveness enhances the probability to acquire a high-quality resource, but at the same time reduces the ability of exploiting acquired resources with maximal efficiency. The model reveals that under a broad range of conditions competitiveness either converges to a polymorphic state, where individuals differing in competitive ability stably coexist, or is subject to perpetual transitions between periods of high and low competitiveness. The dynamics becomes even more complex if females can evolve preferences for (or against) competitive males. In extreme cases, such preferences can even drive the population to extinction.

",franz weissing,Evolution,2014.0,10.1038/ncomms6233,Nature Communications,Baldauf2014,Not available,,Nature,Not available,Diversifying evolution of competitiveness,02b7426a0cfd9b65d9d66d2970745a7b,http://dx.doi.org/10.1038/ncomms6233 17483,"

Because stock markets in emerging economies are relatively new, under-regulated, and often segmented, investors' responses to public announcements by firms in these economies may differ from responses in developed economies' stock markets. We draw on the institutional and corporate governance literatures to explain investor reactions to announcements of international strategic alliances (ISAs) between foreign and emerging-market firms. We argue that emerging economies' stock markets positively value ISAs; however, information leakages due to weak regulatory environments siphon off the “good news” before the ISA announcement date. The level of state ownership of publicly traded firms and the nationality of foreign partners both affect the size and timing of market reactions.

",stewart miller,,2007.0,10.1057/palgrave.jibs.8400322,Journal of International Business Studies,Miller2007,Not available,,Nature,Not available,Insider trading and the valuation of international strategic alliances in emerging stock markets,f700b76feb97f47661124fbf18348253,http://dx.doi.org/10.1057/palgrave.jibs.8400322 17484,"

Because stock markets in emerging economies are relatively new, under-regulated, and often segmented, investors' responses to public announcements by firms in these economies may differ from responses in developed economies' stock markets. We draw on the institutional and corporate governance literatures to explain investor reactions to announcements of international strategic alliances (ISAs) between foreign and emerging-market firms. We argue that emerging economies' stock markets positively value ISAs; however, information leakages due to weak regulatory environments siphon off the “good news” before the ISA announcement date. The level of state ownership of publicly traded firms and the nationality of foreign partners both affect the size and timing of market reactions.

",dan li,,2007.0,10.1057/palgrave.jibs.8400322,Journal of International Business Studies,Miller2007,Not available,,Nature,Not available,Insider trading and the valuation of international strategic alliances in emerging stock markets,f700b76feb97f47661124fbf18348253,http://dx.doi.org/10.1057/palgrave.jibs.8400322 17485,"

Because stock markets in emerging economies are relatively new, under-regulated, and often segmented, investors' responses to public announcements by firms in these economies may differ from responses in developed economies' stock markets. We draw on the institutional and corporate governance literatures to explain investor reactions to announcements of international strategic alliances (ISAs) between foreign and emerging-market firms. We argue that emerging economies' stock markets positively value ISAs; however, information leakages due to weak regulatory environments siphon off the “good news” before the ISA announcement date. The level of state ownership of publicly traded firms and the nationality of foreign partners both affect the size and timing of market reactions.

",lorraine eden,,2007.0,10.1057/palgrave.jibs.8400322,Journal of International Business Studies,Miller2007,Not available,,Nature,Not available,Insider trading and the valuation of international strategic alliances in emerging stock markets,f700b76feb97f47661124fbf18348253,http://dx.doi.org/10.1057/palgrave.jibs.8400322 17486,"

Because stock markets in emerging economies are relatively new, under-regulated, and often segmented, investors' responses to public announcements by firms in these economies may differ from responses in developed economies' stock markets. We draw on the institutional and corporate governance literatures to explain investor reactions to announcements of international strategic alliances (ISAs) between foreign and emerging-market firms. We argue that emerging economies' stock markets positively value ISAs; however, information leakages due to weak regulatory environments siphon off the “good news” before the ISA announcement date. The level of state ownership of publicly traded firms and the nationality of foreign partners both affect the size and timing of market reactions.

",michael hitt,,2007.0,10.1057/palgrave.jibs.8400322,Journal of International Business Studies,Miller2007,Not available,,Nature,Not available,Insider trading and the valuation of international strategic alliances in emerging stock markets,f700b76feb97f47661124fbf18348253,http://dx.doi.org/10.1057/palgrave.jibs.8400322 17487,"

Available empirical evidence suggests that skewness preference plays an important role in understanding asset pricing and gambling. This paper establishes a skewness-comparability condition on probability distributions that is necessary and sufficient for any decision-maker's preferences over the distributions to depend on their means, variances, and third moments only. Under the condition, an Expected Utility maximizer's preferences for a larger mean, a smaller variance, and a larger third moment are shown to parallel, respectively, his preferences for a first-degree stochastic dominant improvement, a mean-preserving contraction, and a downside risk decrease and are characterized in terms of the von Neumann-Morgenstern utility function in exactly the same way. By showing that all Bernoulli distributions are mutually skewness comparable, we further show that in the wide range of economic models where these distributions are used individuals’ decisions under risk can be understood as trade-offs between mean, variance, and skewness. Our results on skewness-inducing transformations of random variables can also be applied to analyze the effects of progressive tax reforms on the incentive to make risky investments.

",w chiu,,2010.0,10.1057/grir.2009.9,The Geneva Risk and Insurance Review,Chiu2010,Not available,,Nature,Not available,"Skewness Preference, Risk Taking and Expected Utility Maximisation",f7b47d1a98baacee2c6d5396adaff1c5,http://dx.doi.org/10.1057/grir.2009.9 17488,"

Risk attitudes other than risk aversion (e.g. prudence and temperance) are becoming important both in theoretical and empirical work. While the literature has mainly focused its attention on the intensity of such risk attitudes (e.g. the concepts of absolute prudence and absolute temperance), I consider here an alternative approach related to the direction of these attitudes (i.e. the sign of the successive derivatives of the utility function).

",louis eeckhoudt,,2012.0,10.1057/grir.2012.1,The Geneva Risk and Insurance Review,Eeckhoudt2012,Not available,,Nature,Not available,"Beyond Risk Aversion: Why, How and What's Next?*",bcffee0d883abd9dc7a95740cecafe63,http://dx.doi.org/10.1057/grir.2012.1 17489,

Translating university research into a business opportunity almost always involves a technology transfer office (TTO). But there are misconceptions about the role of TTos as well as opportunities for them to be more effective.

,stephen caddick,,2017.0,10.1038/s41570-017-0103,Nature Reviews Chemistry,Caddick2017,Not available,,Nature,Not available,Don't get lost in translation,20924cd5cc0192bc86f1344c40a6c6fc,http://dx.doi.org/10.1038/s41570-017-0103 17490,"

Brokers' reliance on ethical conduct as a critical element of their service package is not new. What has changed for a handful of brokerage firms is the extent to which, in response to client demand, they now operate on a “global basis”, a phrase that has taken on multiple levels of meaning. An unintended consequence of this evolution has been the emergence of a series of challenges, some apparent and some not, to be managed in assuring “utmost good faith” as a consistent deliverable for all of a global broker's numerous constituents.

This paper will first analyze and then suggest some possible solutions for management of the very real risk issues arising out of the following factors for global brokers: the increasing complexities of an already highly fragmented industry “gone global,” a scale of operations with which there is little experience, “utmost good faith” as not just a goal of company culture, but also the objective of process management, and management of sometimes seemingly confused alignments, or as some would argue, conflicts of interest.

",james hutchin,,2005.0,10.1057/palgrave.gpp.2510036,The Geneva Papers on Risk and Insurance Issues and Practice,Hutchin2005,Not available,,Nature,Not available,"Global Brokers, Global Clients: A New Operational and Ethical Context",216f04570490339716da7a98142e8657,http://dx.doi.org/10.1057/palgrave.gpp.2510036 17491,"

Foreign affiliates of Chilean companies operating in Latin America were more profitable than similar local firms, but this difference in profitability has been decreasing over time. Two case studies of Chilean multinationals illustrate our hypothesis that one source of competitive advantage for Chilean firms was their know-how of business strategy during economic liberalization. Using empirical and theoretical considerations, we analyze whether this hypothesis is valid for other firms and industries.

",patricio sol,,2007.0,10.1057/palgrave.jibs.8400299,Journal of International Business Studies,Sol2007,Not available,,Nature,Not available,Regional competitive advantage based on pioneering economic reforms: the case of Chilean FDI,7b718081861ca3c58085706e7986c155,http://dx.doi.org/10.1057/palgrave.jibs.8400299 17492,"

Foreign affiliates of Chilean companies operating in Latin America were more profitable than similar local firms, but this difference in profitability has been decreasing over time. Two case studies of Chilean multinationals illustrate our hypothesis that one source of competitive advantage for Chilean firms was their know-how of business strategy during economic liberalization. Using empirical and theoretical considerations, we analyze whether this hypothesis is valid for other firms and industries.

",joseph kogan,,2007.0,10.1057/palgrave.jibs.8400299,Journal of International Business Studies,Sol2007,Not available,,Nature,Not available,Regional competitive advantage based on pioneering economic reforms: the case of Chilean FDI,7b718081861ca3c58085706e7986c155,http://dx.doi.org/10.1057/palgrave.jibs.8400299 17493,"

We review the fiscal evolution of China and Russia and how the process of creating a separate tax-financed public sector in the two countries differed. China's fiscal budget was consistently smaller than in Russia, and their fiscal decentralisation was consistently greater. In China, local governments that were allowed to keep marginal increases in local tax revenue had incentives to pursue growth-supporting policies, but the absence of financial markets and barriers to investment resulted in protectionism and inefficient use of capital. Interregional fiscal transfers from the centre provided modest fiscal equalisation in China, but not in Russia. Russia's status as a petro-state makes efficient management of the public sector particularly difficult. Rising world energy prices and resource rents have generated growing federal budget surpluses, and fiscal recentralisation has been associated with expanding state control in other areas.

",elliott parker,,2007.0,10.1057/palgrave.ces.8100225,Comparative Economic Studies,Parker2007,Not available,,Nature,Not available,Fiscal Centralisation and Decentralisation in Russia and China,ef328e390dd9511ad1758f156d478e96,http://dx.doi.org/10.1057/palgrave.ces.8100225 17494,"

We review the fiscal evolution of China and Russia and how the process of creating a separate tax-financed public sector in the two countries differed. China's fiscal budget was consistently smaller than in Russia, and their fiscal decentralisation was consistently greater. In China, local governments that were allowed to keep marginal increases in local tax revenue had incentives to pursue growth-supporting policies, but the absence of financial markets and barriers to investment resulted in protectionism and inefficient use of capital. Interregional fiscal transfers from the centre provided modest fiscal equalisation in China, but not in Russia. Russia's status as a petro-state makes efficient management of the public sector particularly difficult. Rising world energy prices and resource rents have generated growing federal budget surpluses, and fiscal recentralisation has been associated with expanding state control in other areas.

",judith thornton,,2007.0,10.1057/palgrave.ces.8100225,Comparative Economic Studies,Parker2007,Not available,,Nature,Not available,Fiscal Centralisation and Decentralisation in Russia and China,ef328e390dd9511ad1758f156d478e96,http://dx.doi.org/10.1057/palgrave.ces.8100225 17495,"Executive Summary

All too often, research on the influence of interest organizations in democratic politics produces null findings. What are we to make of these results? In part, the answer may lie in our conception of influence – what it is and what might constitute evidence for it. But even when more complete conceptions of influence are considered in better research designs, null results will still occur. They merit explanation. To address these issues, I will first try to provide a broader conception of influence and its many possible meanings by exploring the older theoretical literature on urban power from the 1950s and 1960s, considering along the way what the different interpretations might tell us about lobbying. And second, I will develop a catalog of null hypotheses and discuss how these bear on interpreting the many null findings in influence research. Finally, I discuss the implications of this analysis for the future of influence research.

",david lowery,,2013.0,10.1057/iga.2012.20,Interest Groups & Advocacy,Lowery2013,Not available,,Nature,Not available,"Lobbying influence: Meaning, measurement and missing",5106b1ead957ee0bde56795d39430df5,http://dx.doi.org/10.1057/iga.2012.20 17496,"

During the 20 year lifetime of the Journal of Financial Services Marketing the study of online banking adoption has emerged and matured as a field. Now 20 years on, we reflect on the accumulated online banking adoption knowledge and consider what this tells us. On the basis of an audit of published research over a 10-year period, 1998–2008, we identify the core theories and approaches utilised to study online banking. The findings reveal the widespread application of the Technology Adoption Model (TAM). Drawing on the current debate regarding TAM within the Information Systems domain, we critically evaluate the ongoing appropriateness of TAM for online banking adoption research, and call for a refreshed approach to the study of bank technology adoption. The paper concludes by highlighting other theories that offer potential to extend knowledge in this area.

",kathryn waite,,2015.0,10.1057/fsm.2015.19,Journal of Financial Services Marketing,Waite2015,Not available,,Nature,Not available,Online banking adoption: We should know better 20 years on,9398587bb4ede6a964aed02cf339145c,http://dx.doi.org/10.1057/fsm.2015.19 17497,"

During the 20 year lifetime of the Journal of Financial Services Marketing the study of online banking adoption has emerged and matured as a field. Now 20 years on, we reflect on the accumulated online banking adoption knowledge and consider what this tells us. On the basis of an audit of published research over a 10-year period, 1998–2008, we identify the core theories and approaches utilised to study online banking. The findings reveal the widespread application of the Technology Adoption Model (TAM). Drawing on the current debate regarding TAM within the Information Systems domain, we critically evaluate the ongoing appropriateness of TAM for online banking adoption research, and call for a refreshed approach to the study of bank technology adoption. The paper concludes by highlighting other theories that offer potential to extend knowledge in this area.

",tina harrison,,2015.0,10.1057/fsm.2015.19,Journal of Financial Services Marketing,Waite2015,Not available,,Nature,Not available,Online banking adoption: We should know better 20 years on,9398587bb4ede6a964aed02cf339145c,http://dx.doi.org/10.1057/fsm.2015.19 17498,"

Regional governance systems may resolve the dilemmas of global financial integration, and the Eurozone is the most advanced attempt to do so. The Euroland sovereign debt crisis is a test of this proposition but the outcome finds the EU wanting. The first section places EMU in the broader context of financial liberalisation. The next section shows that we have long known that financial liberalisation is associated with financial instability, demanding robust governance. The subsequent section examines the reaction to the Eurozone crisis, and argues that the lessons available were poorly learned. Although the EU and ECB revealed leadership and crisis management capacity in the financial market phase, the sovereign debt phase of the crisis was less successfully handled, producing conflict among Eurozone members. As a result the Eurozone hangs in the balance.

",geoffrey underhill,,2011.0,10.1057/eps.2011.22,European Political Science,Underhill2011,Not available,,Nature,Not available,Paved with Good Intentions: Global Financial Integration and the Eurozone's Response,5d4c7d6142f5b2104bbd3b1dd8d7ce18,http://dx.doi.org/10.1057/eps.2011.22 17499,"

In opaque selling certain characteristics of the product or service are hidden from the consumer until after purchase, transforming a differentiated good into somewhat of a commodity. Opaque selling has become popular in travel service pricing as it allows firms to sell their differentiated products at higher prices to regular brand loyal customers while simultaneously selling to non-loyal customers at discounted prices. At its simplest level, the process can be regarded as a Newsvendor problem where a supplier has to make both pricing and quantity allocation decisions for a perishable good or service. As the originator of opaque selling, Priceline.com provides unique data to sellers that allows them to better utilize their opaque selling mechanism. Recently Priceline has made some changes to their mechanism that have potential impacts on how firms set prices and control inventory within the channel. In this framework, the problem has the characteristics of Newsvendor problems with multiple price points. In this article, we develop optimal pricing and inventory policies for a seller releasing inventory to an opaque sales channel. Furthermore, we investigate the impacts of Priceline’s changes upon optimal prices and inventory allocation policies. The model is empirically illustrated using Priceline data for a 3.5 star hotel.

",chris anderson,,2014.0,10.1057/rpm.2014.32,Journal of Revenue and Pricing Management,Anderson2014,Not available,,Nature,Not available,A newsvendor approach to inventory and pricing decisions in NYOP channels,cf2470b7872d31714e06c3f1cc27562d,http://dx.doi.org/10.1057/rpm.2014.32 17500,"

In opaque selling certain characteristics of the product or service are hidden from the consumer until after purchase, transforming a differentiated good into somewhat of a commodity. Opaque selling has become popular in travel service pricing as it allows firms to sell their differentiated products at higher prices to regular brand loyal customers while simultaneously selling to non-loyal customers at discounted prices. At its simplest level, the process can be regarded as a Newsvendor problem where a supplier has to make both pricing and quantity allocation decisions for a perishable good or service. As the originator of opaque selling, Priceline.com provides unique data to sellers that allows them to better utilize their opaque selling mechanism. Recently Priceline has made some changes to their mechanism that have potential impacts on how firms set prices and control inventory within the channel. In this framework, the problem has the characteristics of Newsvendor problems with multiple price points. In this article, we develop optimal pricing and inventory policies for a seller releasing inventory to an opaque sales channel. Furthermore, we investigate the impacts of Priceline’s changes upon optimal prices and inventory allocation policies. The model is empirically illustrated using Priceline data for a 3.5 star hotel.

",fredrik odegaard,,2014.0,10.1057/rpm.2014.32,Journal of Revenue and Pricing Management,Anderson2014,Not available,,Nature,Not available,A newsvendor approach to inventory and pricing decisions in NYOP channels,cf2470b7872d31714e06c3f1cc27562d,http://dx.doi.org/10.1057/rpm.2014.32 17501,"

In opaque selling certain characteristics of the product or service are hidden from the consumer until after purchase, transforming a differentiated good into somewhat of a commodity. Opaque selling has become popular in travel service pricing as it allows firms to sell their differentiated products at higher prices to regular brand loyal customers while simultaneously selling to non-loyal customers at discounted prices. At its simplest level, the process can be regarded as a Newsvendor problem where a supplier has to make both pricing and quantity allocation decisions for a perishable good or service. As the originator of opaque selling, Priceline.com provides unique data to sellers that allows them to better utilize their opaque selling mechanism. Recently Priceline has made some changes to their mechanism that have potential impacts on how firms set prices and control inventory within the channel. In this framework, the problem has the characteristics of Newsvendor problems with multiple price points. In this article, we develop optimal pricing and inventory policies for a seller releasing inventory to an opaque sales channel. Furthermore, we investigate the impacts of Priceline’s changes upon optimal prices and inventory allocation policies. The model is empirically illustrated using Priceline data for a 3.5 star hotel.

",john wilson,,2014.0,10.1057/rpm.2014.32,Journal of Revenue and Pricing Management,Anderson2014,Not available,,Nature,Not available,A newsvendor approach to inventory and pricing decisions in NYOP channels,cf2470b7872d31714e06c3f1cc27562d,http://dx.doi.org/10.1057/rpm.2014.32 17502,"

This paper examines the enforcement of environmental protection laws under communism and democracy, while exploring the possibilities for cost-shifting between Czech enterprises and their employees as offered by labor contracts. Theory establishes the connection between cost-shifting possibilities and the efficient rule for enforcing water protection laws when the actions of enterprises and their employees combine to cause water-damaging accidents (for example, oil spills). For the years 1988 to 1991, analysis of labor arrangements in the Czech Republic discerns the apparently efficient rule for the communist and democratic periods, while statistical analysis discerns the operative enforcement rule in each period.

",dietrich earnhart,,1996.0,10.1057/ces.1996.37,Comparative Economic Studies,Earnhart1996,Not available,,Nature,Not available,Environmental Penalties Against Enterprises and Employees: Labor Contracts and Cost-Shifting in the Czech Republic*,988702beb343e7537fefbd20a41aa951,http://dx.doi.org/10.1057/ces.1996.37 17503,"

In this study, a model representing military requirements as scenarios and capabilities is offered. Pair-wise comparisons of scenarios are made according to occurrence probabilities by using the Analytical Hierarchy Process (AHP). The weights calculated from AHP are used as the starting weights in a Quality Function Deployment (QFD) matrix. QFD is used to transfer war fighter requirements into the benefit values of projects. Two levels of QFD matrices are used to evaluate new capability areas versus capabilities and capabilities versus projects. The benefit values of the projects are used in a multi-objective problem (multi-objective multiple knapsack problem) that considers the project benefit, implementation risks and environmental impact as multiple objectives. Implementation risk and environmental impact values are also calculated using the same combined AHP and QFD methodology. Finally, the results of the fuzzy multi-objective goal programming suggest a list of projects that offers optimal benefit when carried out within multiple budgets.

",b bakirli,,2013.0,10.1057/jors.2013.36,Journal of the Operational Research Society,Bakirli2013,Not available,,Nature,Not available,A combined approach for fuzzy multi-objective multiple knapsack problems for defence project selection,c47a0a2fd5bd6b3435428cd6038a14fc,http://dx.doi.org/10.1057/jors.2013.36 17504,"

In this study, a model representing military requirements as scenarios and capabilities is offered. Pair-wise comparisons of scenarios are made according to occurrence probabilities by using the Analytical Hierarchy Process (AHP). The weights calculated from AHP are used as the starting weights in a Quality Function Deployment (QFD) matrix. QFD is used to transfer war fighter requirements into the benefit values of projects. Two levels of QFD matrices are used to evaluate new capability areas versus capabilities and capabilities versus projects. The benefit values of the projects are used in a multi-objective problem (multi-objective multiple knapsack problem) that considers the project benefit, implementation risks and environmental impact as multiple objectives. Implementation risk and environmental impact values are also calculated using the same combined AHP and QFD methodology. Finally, the results of the fuzzy multi-objective goal programming suggest a list of projects that offers optimal benefit when carried out within multiple budgets.

",c gencer,,2013.0,10.1057/jors.2013.36,Journal of the Operational Research Society,Bakirli2013,Not available,,Nature,Not available,A combined approach for fuzzy multi-objective multiple knapsack problems for defence project selection,c47a0a2fd5bd6b3435428cd6038a14fc,http://dx.doi.org/10.1057/jors.2013.36 17505,"

In this study, a model representing military requirements as scenarios and capabilities is offered. Pair-wise comparisons of scenarios are made according to occurrence probabilities by using the Analytical Hierarchy Process (AHP). The weights calculated from AHP are used as the starting weights in a Quality Function Deployment (QFD) matrix. QFD is used to transfer war fighter requirements into the benefit values of projects. Two levels of QFD matrices are used to evaluate new capability areas versus capabilities and capabilities versus projects. The benefit values of the projects are used in a multi-objective problem (multi-objective multiple knapsack problem) that considers the project benefit, implementation risks and environmental impact as multiple objectives. Implementation risk and environmental impact values are also calculated using the same combined AHP and QFD methodology. Finally, the results of the fuzzy multi-objective goal programming suggest a list of projects that offers optimal benefit when carried out within multiple budgets.

",e aydogan,,2013.0,10.1057/jors.2013.36,Journal of the Operational Research Society,Bakirli2013,Not available,,Nature,Not available,A combined approach for fuzzy multi-objective multiple knapsack problems for defence project selection,c47a0a2fd5bd6b3435428cd6038a14fc,http://dx.doi.org/10.1057/jors.2013.36 17506,"

In this paper, we study pricing situations where a firm provides a price quote in the presence of uncertainty in the preferences of the buyer and the competitive landscape. We introduce two customised-pricing bid-response models (CPBRMs) used in practice, which can be developed from the historical information available to the firm based on previous bidding opportunities. We show how these models may be used to exploit the differences in the market segments to generate optimal price quotes given the characteristics of the current bid opportunity. We also describe the process of evaluating competing models using an industry data set as a test bed to measure the model fit. Finally, we test the models on the industry data set to compare their performance and estimate the per cent improvement in expected profits that may be possible from their use.

",vishal agrawal,,2007.0,10.1057/palgrave.rpm.5160085,Journal of Revenue and Pricing Management,Agrawal2007,Not available,,Nature,Not available,Bid-response models for customised pricing,23351be11276bca5e71e39d826078d00,http://dx.doi.org/10.1057/palgrave.rpm.5160085 17507,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",ofir turel,Brain,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17508,"

In this paper, we study pricing situations where a firm provides a price quote in the presence of uncertainty in the preferences of the buyer and the competitive landscape. We introduce two customised-pricing bid-response models (CPBRMs) used in practice, which can be developed from the historical information available to the firm based on previous bidding opportunities. We show how these models may be used to exploit the differences in the market segments to generate optimal price quotes given the characteristics of the current bid opportunity. We also describe the process of evaluating competing models using an industry data set as a test bed to measure the model fit. Finally, we test the models on the industry data set to compare their performance and estimate the per cent improvement in expected profits that may be possible from their use.

",mark ferguson,,2007.0,10.1057/palgrave.rpm.5160085,Journal of Revenue and Pricing Management,Agrawal2007,Not available,,Nature,Not available,Bid-response models for customised pricing,23351be11276bca5e71e39d826078d00,http://dx.doi.org/10.1057/palgrave.rpm.5160085 17509,"

We survey the recent literature on the use of spot market operations to manage procurement in supply chains. We present results in two categories: work that deals with optimal procurement strategies and work related to the valuation of procurement contracts. As an example of the latter, we provide new results on valuation of a supply contract with abandonment option. Based on our review, we also discuss the scope for doing further work.

",c haksoz,,2007.0,10.1057/palgrave.jors.2602401,Journal of the Operational Research Society,Haksöz2007,Not available,,Nature,Not available,Supply chain operations in the presence of a spot market: a review with discussion,d21f7c4022195caef1dca44724ea7a9e,http://dx.doi.org/10.1057/palgrave.jors.2602401 17510,"

We survey the recent literature on the use of spot market operations to manage procurement in supply chains. We present results in two categories: work that deals with optimal procurement strategies and work related to the valuation of procurement contracts. As an example of the latter, we provide new results on valuation of a supply contract with abandonment option. Based on our review, we also discuss the scope for doing further work.

",s seshadri,,2007.0,10.1057/palgrave.jors.2602401,Journal of the Operational Research Society,Haksöz2007,Not available,,Nature,Not available,Supply chain operations in the presence of a spot market: a review with discussion,d21f7c4022195caef1dca44724ea7a9e,http://dx.doi.org/10.1057/palgrave.jors.2602401 17511,"

Standard ocean shipping contracts stipulate that a chartered vessel must sail at ‘utmost despatch’, with no consideration for the availability of berths at the destination port. The berthing policies used at many ports, which admit vessels on a first-come, first-served basis, provide an additional incentive for the master to sail at full speed. These legacy contracts and berthing policies constitute a major driver of harbour congestion and marine fuel consumption, with adverse economic, safety, and environmental consequences. We propose a methodology to evaluate the potential benefits of new berthing policies and ocean shipping contracts. Given the importance of stochasticity on the performance of maritime transport systems, and the need to represent the efficient allocation of terminal resources, we have chosen a hybrid simulation-optimization approach. Our discrete event simulation model represents vessels and their principal economic and physical characteristics, the spatial layout of the terminal, performance of the land-side equipment, contractual agreements and associated penalties, and berthing policies. The proposed optimization model – a substantial extension of the traditional berth assignment problem – represents the logic of the terminal planner. The simulation program solves multiple instances of the optimization model successively in order to represent the progression of planning activities at the terminal.

",j alvarez,,2010.0,10.1057/mel.2010.11,Maritime Economics & Logistics,Alvarez2010,Not available,,Nature,Not available,A methodology to assess vessel berthing and speed optimization policies,4da09f1c8bc6e9c62875fc438116ed16,http://dx.doi.org/10.1057/mel.2010.11 17512,"

Standard ocean shipping contracts stipulate that a chartered vessel must sail at ‘utmost despatch’, with no consideration for the availability of berths at the destination port. The berthing policies used at many ports, which admit vessels on a first-come, first-served basis, provide an additional incentive for the master to sail at full speed. These legacy contracts and berthing policies constitute a major driver of harbour congestion and marine fuel consumption, with adverse economic, safety, and environmental consequences. We propose a methodology to evaluate the potential benefits of new berthing policies and ocean shipping contracts. Given the importance of stochasticity on the performance of maritime transport systems, and the need to represent the efficient allocation of terminal resources, we have chosen a hybrid simulation-optimization approach. Our discrete event simulation model represents vessels and their principal economic and physical characteristics, the spatial layout of the terminal, performance of the land-side equipment, contractual agreements and associated penalties, and berthing policies. The proposed optimization model – a substantial extension of the traditional berth assignment problem – represents the logic of the terminal planner. The simulation program solves multiple instances of the optimization model successively in order to represent the progression of planning activities at the terminal.

",tore longva,,2010.0,10.1057/mel.2010.11,Maritime Economics & Logistics,Alvarez2010,Not available,,Nature,Not available,A methodology to assess vessel berthing and speed optimization policies,4da09f1c8bc6e9c62875fc438116ed16,http://dx.doi.org/10.1057/mel.2010.11 17513,"

Standard ocean shipping contracts stipulate that a chartered vessel must sail at ‘utmost despatch’, with no consideration for the availability of berths at the destination port. The berthing policies used at many ports, which admit vessels on a first-come, first-served basis, provide an additional incentive for the master to sail at full speed. These legacy contracts and berthing policies constitute a major driver of harbour congestion and marine fuel consumption, with adverse economic, safety, and environmental consequences. We propose a methodology to evaluate the potential benefits of new berthing policies and ocean shipping contracts. Given the importance of stochasticity on the performance of maritime transport systems, and the need to represent the efficient allocation of terminal resources, we have chosen a hybrid simulation-optimization approach. Our discrete event simulation model represents vessels and their principal economic and physical characteristics, the spatial layout of the terminal, performance of the land-side equipment, contractual agreements and associated penalties, and berthing policies. The proposed optimization model – a substantial extension of the traditional berth assignment problem – represents the logic of the terminal planner. The simulation program solves multiple instances of the optimization model successively in order to represent the progression of planning activities at the terminal.

",erna engebrethsen,,2010.0,10.1057/mel.2010.11,Maritime Economics & Logistics,Alvarez2010,Not available,,Nature,Not available,A methodology to assess vessel berthing and speed optimization policies,4da09f1c8bc6e9c62875fc438116ed16,http://dx.doi.org/10.1057/mel.2010.11 17514,"

Infrastructure-as-a-Service (IaaS) is expected to grow at a rapid pace in the next few years. This is primarily because of the flexibility that it offers satisfying variable demand in computing power without any fixed investments in computing capacity. Our work focuses on a particular customer segment of IaaS – online platform providers (OPP). These businesses experience fluctuations in the number of users of their platforms, which impacts advertising revenues. Therefore, it is necessary for these businesses to support any sudden surge in demand without excessive upfront investments in computing infrastructure. IaaS offers an attractive option for such businesses. Pricing of IaaS for OPP is trickier as IaaS providers must consider the fluctuations in the number of users of such platforms while designing a plan. We model these fluctuations and their impact on the revenue of the platform providers to design an optimal pricing plan.

",soumyakanti chakraborty,,2014.0,10.1057/rpm.2013.37,Journal of Revenue and Pricing Management,Chakraborty2014,Not available,,Nature,Not available,Pricing Infrastructure-as-a-Service for online two-sided platform providers,3572c1d779d87767e6de208eb1988356,http://dx.doi.org/10.1057/rpm.2013.37 17515,"

Infrastructure-as-a-Service (IaaS) is expected to grow at a rapid pace in the next few years. This is primarily because of the flexibility that it offers satisfying variable demand in computing power without any fixed investments in computing capacity. Our work focuses on a particular customer segment of IaaS – online platform providers (OPP). These businesses experience fluctuations in the number of users of their platforms, which impacts advertising revenues. Therefore, it is necessary for these businesses to support any sudden surge in demand without excessive upfront investments in computing infrastructure. IaaS offers an attractive option for such businesses. Pricing of IaaS for OPP is trickier as IaaS providers must consider the fluctuations in the number of users of such platforms while designing a plan. We model these fluctuations and their impact on the revenue of the platform providers to design an optimal pricing plan.

",sumanta basu,,2014.0,10.1057/rpm.2013.37,Journal of Revenue and Pricing Management,Chakraborty2014,Not available,,Nature,Not available,Pricing Infrastructure-as-a-Service for online two-sided platform providers,3572c1d779d87767e6de208eb1988356,http://dx.doi.org/10.1057/rpm.2013.37 17516,"

Infrastructure-as-a-Service (IaaS) is expected to grow at a rapid pace in the next few years. This is primarily because of the flexibility that it offers satisfying variable demand in computing power without any fixed investments in computing capacity. Our work focuses on a particular customer segment of IaaS – online platform providers (OPP). These businesses experience fluctuations in the number of users of their platforms, which impacts advertising revenues. Therefore, it is necessary for these businesses to support any sudden surge in demand without excessive upfront investments in computing infrastructure. IaaS offers an attractive option for such businesses. Pricing of IaaS for OPP is trickier as IaaS providers must consider the fluctuations in the number of users of such platforms while designing a plan. We model these fluctuations and their impact on the revenue of the platform providers to design an optimal pricing plan.

",megha sharma,,2014.0,10.1057/rpm.2013.37,Journal of Revenue and Pricing Management,Chakraborty2014,Not available,,Nature,Not available,Pricing Infrastructure-as-a-Service for online two-sided platform providers,3572c1d779d87767e6de208eb1988356,http://dx.doi.org/10.1057/rpm.2013.37 17517,"

This study proposes a new approach to ‘integrated e-marketing value creation’ processes on the internet in order to provide insights about how to develop successful marketing strategies in the digital world. The study first discusses the changes in traditional marketing (4Ps) with possible complementary e-marketing elements, and then introduces some new marketing value elements (4Cs). The study discusses each element of how these new marketing value creation elements work in the digital world, along with some managerial suggestions. Finally, the study provides a new discussion on how to utilize today's e-value drivers in the light of the transforming of our understanding of marketing in the digital age.

",s kucuk,,2011.0,10.1057/dddmp.2011.3,"Journal of Direct, Data and Digital Marketing Practice",Kucuk2011,Not available,,Nature,Not available,Towards integrated e-marketing value creation process,1fb634a3b5f6ead66b32ff94d36353b3,http://dx.doi.org/10.1057/dddmp.2011.3 17518,"Despite huge obstacles, political forces in Washington may finally get greenhouse-gas legislation moving, says David Goldston.",david goldston,,2009.0,10.1038/458021a,Nature,Goldston2009,Not available,,Nature,Not available,The climate to get things done,90b1d77e9f40952a4a8abdf02854e7ed,http://dx.doi.org/10.1038/458021a 17519,"

This paper offers a paradigmatic analysis of digital application marketplaces for advancing information systems research on digital platforms and ecosystems. We refer to the notion of digital application marketplace, colloquially called ‘appstores,’ as a platform component that offers a venue for exchanging applications between developers and end users belonging to a single or multiple ecosystems. Such marketplaces exhibit diversity in features and assumptions, and we propose that examining this diversity, and its ideal types, will help us to further understand the relationship between application marketplaces, platforms, and platform ecosystems. To this end, we generate a typology that distinguishes four kinds of digital application marketplaces: closed, censored, focused, and open marketplaces. The paper also offers implications for actors wishing to make informed decisions about their relationship to a particular digital application marketplace.

",ahmad ghazawneh,,2015.0,10.1057/jit.2015.16,Journal of Information Technology,Ghazawneh2015,Not available,,Nature,Not available,A paradigmatic analysis of digital application marketplaces,a4175d64358763db715a5eb564c44da1,http://dx.doi.org/10.1057/jit.2015.16 17520,"

This paper offers a paradigmatic analysis of digital application marketplaces for advancing information systems research on digital platforms and ecosystems. We refer to the notion of digital application marketplace, colloquially called ‘appstores,’ as a platform component that offers a venue for exchanging applications between developers and end users belonging to a single or multiple ecosystems. Such marketplaces exhibit diversity in features and assumptions, and we propose that examining this diversity, and its ideal types, will help us to further understand the relationship between application marketplaces, platforms, and platform ecosystems. To this end, we generate a typology that distinguishes four kinds of digital application marketplaces: closed, censored, focused, and open marketplaces. The paper also offers implications for actors wishing to make informed decisions about their relationship to a particular digital application marketplace.

",ola henfridsson,,2015.0,10.1057/jit.2015.16,Journal of Information Technology,Ghazawneh2015,Not available,,Nature,Not available,A paradigmatic analysis of digital application marketplaces,a4175d64358763db715a5eb564c44da1,http://dx.doi.org/10.1057/jit.2015.16 17521,"

Generating sustainable business value from information services is challenging on the web where free information and zero-switching costs are the norm. This study examines the role of free comments given in a commercial information service through the lens of the expectation-confirmation theory and continuance. Data from a question and answer web site are analyzed by structural equations modeling to test the theoretical model whereby customer satisfaction is key to continuance and is predicted largely by social interaction that takes place on the site. The model is supported by the field data retrieved from the site. The data show that people came with equal expectations, received equal service, and continued to use the system if they were satisfied with it. Satisfaction was predicted by conversation. Free activity emerges as an integral part of the service in a fee-based information market, improving satisfaction and continuance, and thereby leading to measurable outcomes for the commercial owners of the site. The findings, based on unobtrusive field data rather than self-report questionnaires, extend expectation confirmation theory by adding a social dimension to it.

",raban ruth,,2011.0,10.1057/ejis.2011.42,European Journal of Information Systems,Ruth2011,Not available,,Nature,Not available,Conversation as a source of satisfaction and continuance in a question-and-answer site,6be99a00e259a31f0bc17c41ea12d684,http://dx.doi.org/10.1057/ejis.2011.42 17522,"

This article introduces and opens discussion on some of the conditions and ambivalences encountered by the rising creative workforce in Shanghai, through engagement with theories of immaterial labour. Drawing from conversations with several Chinese creative workers, the text aims to provoke thought on the potential for political organisation and resistance within fractalised creative sectors mobilised by high levels of innovation, entrepreneurialism, competition and aspiration. By focusing on processes of subjectivation and desire, it calls for considerations of what might constitute political registers in the Shanghainese creative fields.

",anja kanngieser,,2012.0,10.1057/sub.2011.25,Subjectivity,Kanngieser2012,Not available,,Nature,Not available,"Creative labour in Shanghai: Questions on politics, composition and ambivalence",2602606c9724a864377162ed18e913d8,http://dx.doi.org/10.1057/sub.2011.25 17523,An annual survey of books about science for children,philip philip,,1976.0,10.1038/scientificamerican1276-134,Scientific American,Philip1976,Not available,,Nature,Not available,Books,2dc825cce538481274bd380e6b1b7118,http://dx.doi.org/10.1038/scientificamerican1276-134 17524,An annual survey of books about science for children,phylis morrison,,1976.0,10.1038/scientificamerican1276-134,Scientific American,Philip1976,Not available,,Nature,Not available,Books,2dc825cce538481274bd380e6b1b7118,http://dx.doi.org/10.1038/scientificamerican1276-134 17525,"

In 1999, the automotive industry was in a difficult situation: overcapacity and customer demand for faster delivery and better service drove executives to explore the potential business value of the internet. The authors provide a teaching case, which is based on an analysis of the DCXNET initiative which bundled all e-business actions taken by DaimlerChrysler to exploit the opportunities of this then new technology. The teaching case describes the strategic planning process for e-business at DaimlerChrysler, resulting organizational structures and an outline of the components of DCXNET. Furthermore, the authors provide results of the initiative, success factors and lessons learned.

",arnd klein,,2005.0,10.1057/palgrave.jit.2000047,Journal of Information Technology,Klein2005,Not available,,Nature,Not available,DCXNET: e-transformation at DaimlerChrysler,76d5547e34d169736e4d9d6f8eacd137,http://dx.doi.org/10.1057/palgrave.jit.2000047 17526,"

In 1999, the automotive industry was in a difficult situation: overcapacity and customer demand for faster delivery and better service drove executives to explore the potential business value of the internet. The authors provide a teaching case, which is based on an analysis of the DCXNET initiative which bundled all e-business actions taken by DaimlerChrysler to exploit the opportunities of this then new technology. The teaching case describes the strategic planning process for e-business at DaimlerChrysler, resulting organizational structures and an outline of the components of DCXNET. Furthermore, the authors provide results of the initiative, success factors and lessons learned.

",helmut krcmar,,2005.0,10.1057/palgrave.jit.2000047,Journal of Information Technology,Klein2005,Not available,,Nature,Not available,DCXNET: e-transformation at DaimlerChrysler,76d5547e34d169736e4d9d6f8eacd137,http://dx.doi.org/10.1057/palgrave.jit.2000047 17527,"

This paper explores whether labour-management theory provides significant insights into the operation of the Yugoslav economy and into the process of transition in the Yugoslav successor states. It concludes that the literature offered only modest insights into the operation of the Yugoslav economy, primarily because Yugoslavia did not satisfy many of the basic assumptions of the model. The socialist features of the Yugoslav economy remained dominant, suppressing many of the elements of economic democracy. The most significant contributions of the labour-management literature were theoretical, concerning supply responses of worker-controlled firms in a decentralised source allocation mechanism and the incentive, organisational and efficiency aspects of labour-management.

",saul estrin,,2008.0,10.1057/ces.2008.41,Comparative Economic Studies,Estrin2008,Not available,,Nature,Not available,From Illyria towards Capitalism: Did Labour-Management Theory Teach Us Anything about Yugoslavia and Transition in Its Successor States?,bfbfcc0d3870280123148da83b179852,http://dx.doi.org/10.1057/ces.2008.41 17528,"

This paper explores whether labour-management theory provides significant insights into the operation of the Yugoslav economy and into the process of transition in the Yugoslav successor states. It concludes that the literature offered only modest insights into the operation of the Yugoslav economy, primarily because Yugoslavia did not satisfy many of the basic assumptions of the model. The socialist features of the Yugoslav economy remained dominant, suppressing many of the elements of economic democracy. The most significant contributions of the labour-management literature were theoretical, concerning supply responses of worker-controlled firms in a decentralised source allocation mechanism and the incentive, organisational and efficiency aspects of labour-management.

",milica uvalic,,2008.0,10.1057/ces.2008.41,Comparative Economic Studies,Estrin2008,Not available,,Nature,Not available,From Illyria towards Capitalism: Did Labour-Management Theory Teach Us Anything about Yugoslavia and Transition in Its Successor States?,bfbfcc0d3870280123148da83b179852,http://dx.doi.org/10.1057/ces.2008.41 17529,"

Many economists favor higher taxes on energy-related products such as gasoline, while the general public is more skeptical. This essay, based on a talk given at the March 2008 meeting of the Eastern Economic Association, discusses various aspects of this policy debate. It focuses, in particular, on the use of these taxes to correct for various externalities — an idea advocated long ago by British economist Arthur Pigou.

",n mankiw,,2009.0,10.1057/eej.2008.43,Eastern Economic Journal,Mankiw2009,Not available,,Nature,Not available,Smart Taxes: An Open Invitation to Join the Pigou Club,2c08277fbecdd789940025c91ce20c6c,http://dx.doi.org/10.1057/eej.2008.43 17530,"

A survey of tax administration in developing countries from an economic perspective is warranted because tax administrators in developing countries in effect make tax policy by deciding how to apply tax legislation. Tax administration links legal statutes and the “real,” implemented tax system and thus affects fiscal deficits and the tax burdens of different sectors and income classes. A survey of analytical and empirical work concludes that administrative constraints can severely weaken the tax revenue structure with respect to stabilization, efficiency, and equity goals.

",charles mansfield,,1988.0,10.2307/3867282,Staff Papers - International Monetary Fund,Mansfield1988,Not available,,Nature,Not available,Tax Administration in Developing Countries: An Economic Perspective,e9d3c4929c5f790e34396a53c6192074,http://dx.doi.org/10.2307/3867282 17531,"

The European Union has established itself as the leader of attempts to construct a global climate change regime. This has become an important normative stance, part of its self-image and international identity. Yet it has also come to depend on the Union's ability to negotiate internally on the distribution of the burdens necessitated by its external pledges to cut emissions. The paper considers institutionalist hypotheses on cooperative bargaining and normative entrapment in EU internal negotiations before the 1997 Kyoto Protocol negotiations and the more recent approach to negotiations on a post-2012 regime. It finds that there is evidence to support the normative entrapment hypothesis in both cases, but that agreement in 1997 was facilitated by a very favourable context associated with a 1990 baseline.

",john vogler,,2009.0,10.1057/ip.2009.9,International Politics,Vogler2009,Not available,,Nature,Not available,Climate change and EU foreign policy: The negotiation of burden sharing,4910da09f9590f522922ed094f44f0a0,http://dx.doi.org/10.1057/ip.2009.9 17532,"

The presence of quotas on imported inputs that are based on installed capacity can lead to capacity underutilization in manufacturing industries of developing countries. A replacement of such quotas by tariffs leads to full-capacity utilization under both perfectly and imperfectly competitive markets. Furthermore, such a policy also eliminates strategic advantages for oligopolistic firms that arise in quota-based regimes.

",ratna sahay,,1990.0,10.2307/3867262,Staff Papers - International Monetary Fund,Sahay1990,Not available,,Nature,Not available,Trade Policy and Excess Capacity in Developing Countries,f4c82982628dae43021c5ce5c7e8f967,http://dx.doi.org/10.2307/3867262 17533,"

These are exciting times: the worst economic crisis since the Great Depression, the first global recession in the new era of globalization, and a new President committed to restructuring national priorities, reforming our education, health, and energy sectors, eliminating some long standing distortions arising from corporate welfare, and restructuring our tax code. For economists who have fought long for many of these ideas, the President's budget was a moment of celebration.

",joseph stiglitz,,2009.0,10.1057/eej.2009.24,Eastern Economic Journal,Stiglitz2009,Not available,,Nature,Not available,The Current Economic Crisis and Lessons for Economic Theory,9886a885c04e792e906f5b3710e67a94,http://dx.doi.org/10.1057/eej.2009.24 17534,"

This rejoinder restates and develops the central theses of ‘The Myth of 1648: Class, Geopolitics and the Making of Modern International Relations’ in relation to a set of objections raised from the perspective of IR Historical Sociology by Hendrik Spruyt, of Political and Social Theory by Roland Axtmann and of Political Geography by John Agnew. Most centrally, it re-affirms the charge of a defective historicisation and theorisation of ‘Westphalia’ in the discipline of International Relations, while suggesting that a Marxist perspective that emphasises the spatio-temporally differentiated and geopolitically mediated development of Europe is capable of providing a new long-term interpretive framework for the complex co-development of capitalism, state building and the interstate system. It thereby pleads for a paradigm-shift in IR Theory and IR Historical Sociology.

",benno teschke,,2006.0,10.1057/palgrave.ip.8800175,International Politics,Teschke2006,Not available,,Nature,Not available,"Debating ‘The Myth of 1648’: State Formation, the Interstate System and the Emergence of Capitalism in Europe — A Rejoinder",a77c672a6e0d7e94aa7f43e6a719049d,http://dx.doi.org/10.1057/palgrave.ip.8800175 17535,Tired of the constraints of space and time? Intelligently designed network products that understand the needs of individuals will set us free,nicholas negroponte,,1991.0,10.1038/scientificamerican0991-106,Scientific American,Negroponte1991,Not available,,Nature,Not available,Products and Services for Computer Networks,dcbc0320f1344b921b4d10198a7bb616,http://dx.doi.org/10.1038/scientificamerican0991-106 17536,"

Research on brand naming has recently taken center stage in marketing literature. This study formulates a comprehensive classification of brand names that incorporates frameworks from existing literature and current naming methods used by practitioners. A content analysis of the top 500 global brand names based on manifest content, across 11 product categories, was conducted to understand the current brand-naming trends. The results confirm extensive use of the promoter’s name and place of origin (39.7 per cent of all brand names coded), compounding (34.1 per cent), abbreviations (18.2 per cent) and blending (7.9 per cent). Category-wise analysis indicates that certain categories, such as durables, follow the aggregate pattern of 61.5 per cent semantic word names, 53.0 per cent invented word names and 23.6 per cent non-word names. FMCG brands, on the other hand, show differing patterns because of disproportionately low abbreviations in the distribution. Further, χ2 tests using equal expected frequencies of the three dimensions; semantic, invented and non-word names, showed that there appears to be significant differences in frequency between these dimensions. Practitioners may consider using these newly defined categories, such as semantically related acronyms, in creating distinctive brand names. This study also analyzes the use of sound symbolic names for brands.

",sunny arora,,2015.0,10.1057/bm.2015.8,Journal of Brand Management,Arora2015,Not available,,Nature,Not available,A comprehensive framework of brand name classification,9f9db2e264e8d2b3abae6b531e6be8fb,http://dx.doi.org/10.1057/bm.2015.8 17537,"

This paper integrates a number of disparate research streams which collectively confront the notion that brands can be valued in any meaningful sense. This is not to say that brands are unimportant or that the development of brand management competencies is a waste of resource. On the contrary, in a complex and turbulent marketing environment, a powerful brand, built upon customer trust and repeat-purchase loyalty, should be the driving force of any company's strategic intent. In the sections that follow, the forces which conspire against this common sense advice are profiled and evaluated. The internationalisation of the world economy and associated developments in theories of competitive behaviour are examined. Areas which impinge strongly upon the brand valuation debate but which are typically precluded from it are revealed and discussed. Research directions to expand the parochial nature of the current debate are highlighted and it is concluded that behavioural management processes tend to confound rational attempts at brand valuation.

",colin egan,,1998.0,10.1057/bm.1998.10,Journal of Brand Management,Egan1998,Not available,,Nature,Not available,Chasing the Holy Grail: A critical appraisal of ‘the brand’ and the brand valuation debate,3d046ed82158306378fc6964c31f1f84,http://dx.doi.org/10.1057/bm.1998.10 17538,"

Research on brand naming has recently taken center stage in marketing literature. This study formulates a comprehensive classification of brand names that incorporates frameworks from existing literature and current naming methods used by practitioners. A content analysis of the top 500 global brand names based on manifest content, across 11 product categories, was conducted to understand the current brand-naming trends. The results confirm extensive use of the promoter’s name and place of origin (39.7 per cent of all brand names coded), compounding (34.1 per cent), abbreviations (18.2 per cent) and blending (7.9 per cent). Category-wise analysis indicates that certain categories, such as durables, follow the aggregate pattern of 61.5 per cent semantic word names, 53.0 per cent invented word names and 23.6 per cent non-word names. FMCG brands, on the other hand, show differing patterns because of disproportionately low abbreviations in the distribution. Further, χ2 tests using equal expected frequencies of the three dimensions; semantic, invented and non-word names, showed that there appears to be significant differences in frequency between these dimensions. Practitioners may consider using these newly defined categories, such as semantically related acronyms, in creating distinctive brand names. This study also analyzes the use of sound symbolic names for brands.

",arti kalro,,2015.0,10.1057/bm.2015.8,Journal of Brand Management,Arora2015,Not available,,Nature,Not available,A comprehensive framework of brand name classification,9f9db2e264e8d2b3abae6b531e6be8fb,http://dx.doi.org/10.1057/bm.2015.8 17539,"

Research on brand naming has recently taken center stage in marketing literature. This study formulates a comprehensive classification of brand names that incorporates frameworks from existing literature and current naming methods used by practitioners. A content analysis of the top 500 global brand names based on manifest content, across 11 product categories, was conducted to understand the current brand-naming trends. The results confirm extensive use of the promoter’s name and place of origin (39.7 per cent of all brand names coded), compounding (34.1 per cent), abbreviations (18.2 per cent) and blending (7.9 per cent). Category-wise analysis indicates that certain categories, such as durables, follow the aggregate pattern of 61.5 per cent semantic word names, 53.0 per cent invented word names and 23.6 per cent non-word names. FMCG brands, on the other hand, show differing patterns because of disproportionately low abbreviations in the distribution. Further, χ2 tests using equal expected frequencies of the three dimensions; semantic, invented and non-word names, showed that there appears to be significant differences in frequency between these dimensions. Practitioners may consider using these newly defined categories, such as semantically related acronyms, in creating distinctive brand names. This study also analyzes the use of sound symbolic names for brands.

",dinesh sharma,,2015.0,10.1057/bm.2015.8,Journal of Brand Management,Arora2015,Not available,,Nature,Not available,A comprehensive framework of brand name classification,9f9db2e264e8d2b3abae6b531e6be8fb,http://dx.doi.org/10.1057/bm.2015.8 17540,"

This article presents a new revenue management (RM) concept targeted at businesses struggling to maintain profitability. Destination-centric RM expands the earlier concept of customer-centric RM (Venkat, 2007; Vinod, 2008) and proposes co-operation between businesses to maximize profitability. The concept adopts a destination as the focal point of RM, elevating the management of total customer revenue (Cross et al 2009; Milla and Shoemaker, 2008) to a more aggregate level. Practical application of the concept is demonstrated through existing practices in a ski resort. The model offers insight into practices with the potential to become the next step in the continuous evolution of the discipline.

",henri kuokkanen,,2013.0,10.1057/rpm.2013.2,Journal of Revenue and Pricing Management,Kuokkanen2013,Not available,,Nature,Not available,Improving profitability: A conceptual model of destination-centric revenue management,edda142ffef74ae1bf4eb78bd083b84b,http://dx.doi.org/10.1057/rpm.2013.2 17541,"

Many stochastic dynamic sales applications are characterized by time-dependent price elasticities of demand. However, in general, such problems cannot be solved analytically. To determine smart pricing heuristics for general time-dependent dynamic pricing models, we solve a general class of deterministic dynamic pricing problems for perishable and durable goods. The continuous time model has several time-dependent parameters, for example, discount rate, marginal unit costs and price elasticity. We show how to derive the value function and optimal pricing policies. On the basis of the feedback solution to the deterministic model, we propose a method for constructing heuristics to be applied to general stochastic models. For the case of isoelastic demand, we analytically verify the excellent performance of this approach for both small and large inventory levels.

",rainer schlosser,,2015.0,10.1057/rpm.2015.3,Journal of Revenue and Pricing Management,Schlosser2015,Not available,,Nature,Not available,Dynamic pricing with time-dependent elasticities,4d5f643d0e175932fea2ec4a7ace1760,http://dx.doi.org/10.1057/rpm.2015.3 17542,"

This article analyzes a dynamic pricing and advertising model for the sale of perishable products under constant absolute risk aversion. We consider a time-dependent version of Gallego and van Ryzin’s dynamic pricing model with exponential demand and include isoelastic advertising effects as well as marginal unit costs. We derive closed-form expressions of the optimal risk-averse pricing and advertising policies of the value function and of the certainty equivalent. The formulas provide insight into the (complex) interplay between risk-sensitive pricing and advertising decisions. Moreover, to evaluate the optimally controlled sales process over time we propose efficient simulation techniques. These are used to analyze the characteristics of different degrees of risk aversion, particularly the concentration of the profit distribution and the impact on the expected evolution of price and advertising rates.

",rainer schlosser,,2015.0,10.1057/rpm.2015.20,Journal of Revenue and Pricing Management,Schlosser2015,Not available,,Nature,Not available,A stochastic dynamic pricing and advertising model under risk aversion,89ab85fb80efa59bd97bfa87f963c33f,http://dx.doi.org/10.1057/rpm.2015.20 17543,"

Since 1990, Singapore has sought to control motor vehicle ownership by means of an auction quota system, whereby prospective vehicle buyers need to obtain a quota license before they can make their purchase. This paper assesses the success of the vehicle quota system in meeting its objectives of stability in motor vehicle growth, flexibility in the motor vehicle mix, and equity among motor vehicle buyers. Two important implementation issues – quota subcategorization and license transferability – are highlighted, and policy lessons are drawn for the design of auction quotas in general.

",ling tan,,2003.0,10.2307/4149940,IMF Staff Papers,Tan2003,Not available,,Nature,Not available,Rationing Rules and Outcomes: The Experience of Singapore's Vehicle Quota System,e8b2b96e0f585dd3b2c15472e5655d4f,http://dx.doi.org/10.2307/4149940 17544,"

In modern transportation systems, the potential for further decreasing the costs of fulfilling customer requests is severely limited while market competition is constantly reducing revenues. However, increased competitiveness through cost reductions can be achieved if freight carriers cooperate in order to balance their request portfolios. Participation in such coalitions can benefit the entire coalition, as well as each participant individually, thus reinforcing the market position of the partners. The work presented in this paper uniquely combines features of routing and scheduling problems and of cooperative game theory. In the first part, the profit margins resulting from horizontal cooperation among freight carriers are analysed. It is assumed that the structure of customer requests corresponds to that of a pickup and delivery problem with time windows for each freight carrier. In the second part, the possibilities of sharing these profit margins fairly among the partners are discussed. The Shapley value can be used to determine a fair allocation. Numerical results for real-life and artificial instances are presented.

",m krajewska,,2007.0,10.1057/palgrave.jors.2602489,Journal of the Operational Research Society,Krajewska2007,Not available,,Nature,Not available,Horizontal cooperation among freight carriers: request allocation and profit sharing,9750d766080d200d499ec20bcd0ee88e,http://dx.doi.org/10.1057/palgrave.jors.2602489 17545,"

In modern transportation systems, the potential for further decreasing the costs of fulfilling customer requests is severely limited while market competition is constantly reducing revenues. However, increased competitiveness through cost reductions can be achieved if freight carriers cooperate in order to balance their request portfolios. Participation in such coalitions can benefit the entire coalition, as well as each participant individually, thus reinforcing the market position of the partners. The work presented in this paper uniquely combines features of routing and scheduling problems and of cooperative game theory. In the first part, the profit margins resulting from horizontal cooperation among freight carriers are analysed. It is assumed that the structure of customer requests corresponds to that of a pickup and delivery problem with time windows for each freight carrier. In the second part, the possibilities of sharing these profit margins fairly among the partners are discussed. The Shapley value can be used to determine a fair allocation. Numerical results for real-life and artificial instances are presented.

",h kopfer,,2007.0,10.1057/palgrave.jors.2602489,Journal of the Operational Research Society,Krajewska2007,Not available,,Nature,Not available,Horizontal cooperation among freight carriers: request allocation and profit sharing,9750d766080d200d499ec20bcd0ee88e,http://dx.doi.org/10.1057/palgrave.jors.2602489 17546,"

In modern transportation systems, the potential for further decreasing the costs of fulfilling customer requests is severely limited while market competition is constantly reducing revenues. However, increased competitiveness through cost reductions can be achieved if freight carriers cooperate in order to balance their request portfolios. Participation in such coalitions can benefit the entire coalition, as well as each participant individually, thus reinforcing the market position of the partners. The work presented in this paper uniquely combines features of routing and scheduling problems and of cooperative game theory. In the first part, the profit margins resulting from horizontal cooperation among freight carriers are analysed. It is assumed that the structure of customer requests corresponds to that of a pickup and delivery problem with time windows for each freight carrier. In the second part, the possibilities of sharing these profit margins fairly among the partners are discussed. The Shapley value can be used to determine a fair allocation. Numerical results for real-life and artificial instances are presented.

",g laporte,,2007.0,10.1057/palgrave.jors.2602489,Journal of the Operational Research Society,Krajewska2007,Not available,,Nature,Not available,Horizontal cooperation among freight carriers: request allocation and profit sharing,9750d766080d200d499ec20bcd0ee88e,http://dx.doi.org/10.1057/palgrave.jors.2602489 17547,"

In this article we propose a new complementary approach to investigate Inter-Organizational Information Systems (IOIS) adoption called configuration analysis. We motivate the need for a new approach by the common observation that the structure and the strategy of an IOIS are interdependent and that the IOIS adoptions consequently cluster orderly. For example, an IOIS setup with a powerful customer as a hub and many suppliers as spokes frequently surfaces across diffusion studies. Yet, this fact has not been integrated into existing analyses, and its implications have not been fully developed. We propose that IOIS scholars need to look beyond the single adopting organization in IOIS adoption studies and in contrast consider adoption units what we call an adoption configuration. Each such configuration can be further characterized along the following dimensions: (1) vision, (2) key functionality, (3) mode of interaction, (4) structure and (5) mode of appropriation. In addition, these dimensions do not co-vary independently. For example, a particular organizing vision assumes a specific inter-organizational structure. A typology of IOIS configurations for adoption analysis is laid out consisting of dyadic, hub and spoke, industry and community configurations. Specific forms or adoption analysis are suggested for each type of configuration. Overall, configuration analysis redirects IOIS adoption studies both at the theoretical and the methodological level, and a corresponding research agenda is sketched.

",kalle lyytinen,,2011.0,10.1057/ejis.2010.71,European Journal of Information Systems,Lyytinen2011,Not available,,Nature,Not available,Inter-organizational information systems adoption – a configuration analysis approach,7029a38a92e6745ee0a7cd7bc0727a99,http://dx.doi.org/10.1057/ejis.2010.71 17548,"

In modern transportation systems, the potential for further decreasing the costs of fulfilling customer requests is severely limited while market competition is constantly reducing revenues. However, increased competitiveness through cost reductions can be achieved if freight carriers cooperate in order to balance their request portfolios. Participation in such coalitions can benefit the entire coalition, as well as each participant individually, thus reinforcing the market position of the partners. The work presented in this paper uniquely combines features of routing and scheduling problems and of cooperative game theory. In the first part, the profit margins resulting from horizontal cooperation among freight carriers are analysed. It is assumed that the structure of customer requests corresponds to that of a pickup and delivery problem with time windows for each freight carrier. In the second part, the possibilities of sharing these profit margins fairly among the partners are discussed. The Shapley value can be used to determine a fair allocation. Numerical results for real-life and artificial instances are presented.

",s ropke,,2007.0,10.1057/palgrave.jors.2602489,Journal of the Operational Research Society,Krajewska2007,Not available,,Nature,Not available,Horizontal cooperation among freight carriers: request allocation and profit sharing,9750d766080d200d499ec20bcd0ee88e,http://dx.doi.org/10.1057/palgrave.jors.2602489 17549,"

In modern transportation systems, the potential for further decreasing the costs of fulfilling customer requests is severely limited while market competition is constantly reducing revenues. However, increased competitiveness through cost reductions can be achieved if freight carriers cooperate in order to balance their request portfolios. Participation in such coalitions can benefit the entire coalition, as well as each participant individually, thus reinforcing the market position of the partners. The work presented in this paper uniquely combines features of routing and scheduling problems and of cooperative game theory. In the first part, the profit margins resulting from horizontal cooperation among freight carriers are analysed. It is assumed that the structure of customer requests corresponds to that of a pickup and delivery problem with time windows for each freight carrier. In the second part, the possibilities of sharing these profit margins fairly among the partners are discussed. The Shapley value can be used to determine a fair allocation. Numerical results for real-life and artificial instances are presented.

",g zaccour,,2007.0,10.1057/palgrave.jors.2602489,Journal of the Operational Research Society,Krajewska2007,Not available,,Nature,Not available,Horizontal cooperation among freight carriers: request allocation and profit sharing,9750d766080d200d499ec20bcd0ee88e,http://dx.doi.org/10.1057/palgrave.jors.2602489 17550,"

This article investigates the optimal strategy for potential investments that may be adopted by port authorities to attract more carriers. A mathematical model is formulated to represent the main criteria used by carriers to evaluate a specific port. Then, a game theory approach is used to model the competition between several port authorities to attract carriers via maximizing their utility functions. The game type suggested is Sealed-Bid with one round. The results indicate that the optimal investment strategy used by a specific port is dependent on (i) the port’s current state with respect to other competing ports; (ii) resource availability in terms of manpower and funds; (iii) expected profitability and (iv) other players’ reaction toward investment. This study advises the port authority on maximizing the payoff in case of winning the bid by selectively investing in the port and minimizing the potential loss in case of losing the bid by refraining from performing any investment.

Maritime Economics & Logistics advance online publication, 21 May 2015; doi:10.1057/mel.2015.7",isam kaysi,,2015.0,10.1057/mel.2015.7,Maritime Economics & Logistics,Kaysi2015,Not available,,Nature,Not available,Optimal investment strategy in a container terminal: A game theoretic approach,b27929273f4d108033a9ee6d8b253512,http://dx.doi.org/10.1057/mel.2015.7 17551,"

This article investigates the optimal strategy for potential investments that may be adopted by port authorities to attract more carriers. A mathematical model is formulated to represent the main criteria used by carriers to evaluate a specific port. Then, a game theory approach is used to model the competition between several port authorities to attract carriers via maximizing their utility functions. The game type suggested is Sealed-Bid with one round. The results indicate that the optimal investment strategy used by a specific port is dependent on (i) the port’s current state with respect to other competing ports; (ii) resource availability in terms of manpower and funds; (iii) expected profitability and (iv) other players’ reaction toward investment. This study advises the port authority on maximizing the payoff in case of winning the bid by selectively investing in the port and minimizing the potential loss in case of losing the bid by refraining from performing any investment.

Maritime Economics & Logistics advance online publication, 21 May 2015; doi:10.1057/mel.2015.7",nabil nehme,,2015.0,10.1057/mel.2015.7,Maritime Economics & Logistics,Kaysi2015,Not available,,Nature,Not available,Optimal investment strategy in a container terminal: A game theoretic approach,b27929273f4d108033a9ee6d8b253512,http://dx.doi.org/10.1057/mel.2015.7 17552,"

CONTENTS**** Page 1. The Subject and its Interdisciplinary Background 13-19 1.1. The Growing Acceptance of Uncertainty 15 1.2. Statistical and Epistemological Uncertainty 17 1.3. Scope and Content of this Survey 19 2. Uncertainty in Aggregation 20-33 2.1. Cross-Sectional Aggregates 21 2.2. Intertemporal Aggregates 24 2.3. Organizational Aggregates 30 2.4. Value Dependence and the Several Dimensions of Aggregation 32 3. Uncertainty in Estimation 34-45 3.1. Multiple Equilibria, Disequilibrium, and Switching Regimes 35 3.2. Updating Structural Knowledge during Transitions 38 3.3. Learning Behavior in Stochastic Macroeconomics 40 3.4. Latent Variables Models with Extended Learning 43 4. Uncertainty in Policy Formation 45-60 4.1. Measures of Variability for Modelling Economic Behavior and Control 46 4.2. Policy Surprises and Other Macroeconomic Disturbances 51 4.3. Indexation as a Way of Absorbing Uncertainty 55 4.4. Summary 59 5. Closing Observations on Microfoundations and Information 60-66 5.1. Substansive and Nonsubstansive Micro-Macro Relations under Uncertainty 61 5.2. Uncertainty of Inference and Prerequisites for Processing Information 64 References 66 **** Readers whose interests are primarily multidisciplinary may wish to concentrate on Sections 1 and 5, skimming only the first few pages introducing Sections 2, 3, and 4 and the last section (4) of 4. 12 ""Indeed the historian of the modern world is tempted to rgach the depressing conclusion that progress is destructive of certitude."" (Paul Johnson 1983, p. 697) 1. The Subject and its Interdisciplinary Background This survey seeks to show what account is taken of uncertainty in contemporary macroeconomics. Before outlining ist scope and content at the end of this section, it may be useful to provide some historical background on how the treatment of uncertainty, and the contexts in which it has been dealt with, have changed not only in economics but also in other disciplines. For it is difficult to gain perspective on the treatment of uncertainty in one discipline without comparing this with another.

",george furstenberg,,1988.0,10.1057/gpp.1988.2,The Geneva Papers on Risk and Insurance,Furstenberg1988,Not available,,Nature,Not available,Owning Up to Uncertainty in Macroeconomics*,3bdda92b885dff5b489027bea19aa5fb,http://dx.doi.org/10.1057/gpp.1988.2 17553,"

CONTENTS**** Page 1. The Subject and its Interdisciplinary Background 13-19 1.1. The Growing Acceptance of Uncertainty 15 1.2. Statistical and Epistemological Uncertainty 17 1.3. Scope and Content of this Survey 19 2. Uncertainty in Aggregation 20-33 2.1. Cross-Sectional Aggregates 21 2.2. Intertemporal Aggregates 24 2.3. Organizational Aggregates 30 2.4. Value Dependence and the Several Dimensions of Aggregation 32 3. Uncertainty in Estimation 34-45 3.1. Multiple Equilibria, Disequilibrium, and Switching Regimes 35 3.2. Updating Structural Knowledge during Transitions 38 3.3. Learning Behavior in Stochastic Macroeconomics 40 3.4. Latent Variables Models with Extended Learning 43 4. Uncertainty in Policy Formation 45-60 4.1. Measures of Variability for Modelling Economic Behavior and Control 46 4.2. Policy Surprises and Other Macroeconomic Disturbances 51 4.3. Indexation as a Way of Absorbing Uncertainty 55 4.4. Summary 59 5. Closing Observations on Microfoundations and Information 60-66 5.1. Substansive and Nonsubstansive Micro-Macro Relations under Uncertainty 61 5.2. Uncertainty of Inference and Prerequisites for Processing Information 64 References 66 **** Readers whose interests are primarily multidisciplinary may wish to concentrate on Sections 1 and 5, skimming only the first few pages introducing Sections 2, 3, and 4 and the last section (4) of 4. 12 ""Indeed the historian of the modern world is tempted to rgach the depressing conclusion that progress is destructive of certitude."" (Paul Johnson 1983, p. 697) 1. The Subject and its Interdisciplinary Background This survey seeks to show what account is taken of uncertainty in contemporary macroeconomics. Before outlining ist scope and content at the end of this section, it may be useful to provide some historical background on how the treatment of uncertainty, and the contexts in which it has been dealt with, have changed not only in economics but also in other disciplines. For it is difficult to gain perspective on the treatment of uncertainty in one discipline without comparing this with another.

",jin-ho jeong,,1988.0,10.1057/gpp.1988.2,The Geneva Papers on Risk and Insurance,Furstenberg1988,Not available,,Nature,Not available,Owning Up to Uncertainty in Macroeconomics*,3bdda92b885dff5b489027bea19aa5fb,http://dx.doi.org/10.1057/gpp.1988.2 17554,

Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term Personal Loans. The results of the model that fits the data better are evaluated. The utility of the model to practitioners is discussed. Some issues raised by the results about the role of bidding agents and the discriminatory power of Customer Relationship Management systems are considered. Ways to develop the preferred model are outlined. It is suggested that the model has implications for evaluating forecasting methods for use in paid search auctions.

,d laffey,,2008.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,Laffey2008,Not available,,Nature,Not available,Estimating advertisers' values for paid search clickthroughs,8e38778c699c9706633d107295c46414,http://dx.doi.org/10.1057/palgrave.jors.2602570 17555,

Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term Personal Loans. The results of the model that fits the data better are evaluated. The utility of the model to practitioners is discussed. Some issues raised by the results about the role of bidding agents and the discriminatory power of Customer Relationship Management systems are considered. Ways to develop the preferred model are outlined. It is suggested that the model has implications for evaluating forecasting methods for use in paid search auctions.

,c hunka,,2008.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,Laffey2008,Not available,,Nature,Not available,Estimating advertisers' values for paid search clickthroughs,8e38778c699c9706633d107295c46414,http://dx.doi.org/10.1057/palgrave.jors.2602570 17556,

Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term Personal Loans. The results of the model that fits the data better are evaluated. The utility of the model to practitioners is discussed. Some issues raised by the results about the role of bidding agents and the discriminatory power of Customer Relationship Management systems are considered. Ways to develop the preferred model are outlined. It is suggested that the model has implications for evaluating forecasting methods for use in paid search auctions.

,j sharp,,2008.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,Laffey2008,Not available,,Nature,Not available,Estimating advertisers' values for paid search clickthroughs,8e38778c699c9706633d107295c46414,http://dx.doi.org/10.1057/palgrave.jors.2602570 17557,

Paid search is an important form of online advertisement. Clickthroughs from slots are bid for by advertisers. The process of formulating bids is a complex one involving bidders in competing against other advertisers in multiple auctions. It would be helpful in managing the bidding process if it were possible to determine the values placed on a clickthrough by different advertisers. The theory of two models for estimating advertiser values and associated parameters is presented. The models are applied to a set of data for searches on the term Personal Loans. The results of the model that fits the data better are evaluated. The utility of the model to practitioners is discussed. Some issues raised by the results about the role of bidding agents and the discriminatory power of Customer Relationship Management systems are considered. Ways to develop the preferred model are outlined. It is suggested that the model has implications for evaluating forecasting methods for use in paid search auctions.

,z zeng,,2008.0,10.1057/palgrave.jors.2602570,Journal of the Operational Research Society,Laffey2008,Not available,,Nature,Not available,Estimating advertisers' values for paid search clickthroughs,8e38778c699c9706633d107295c46414,http://dx.doi.org/10.1057/palgrave.jors.2602570 17558,"

In this article we propose a new complementary approach to investigate Inter-Organizational Information Systems (IOIS) adoption called configuration analysis. We motivate the need for a new approach by the common observation that the structure and the strategy of an IOIS are interdependent and that the IOIS adoptions consequently cluster orderly. For example, an IOIS setup with a powerful customer as a hub and many suppliers as spokes frequently surfaces across diffusion studies. Yet, this fact has not been integrated into existing analyses, and its implications have not been fully developed. We propose that IOIS scholars need to look beyond the single adopting organization in IOIS adoption studies and in contrast consider adoption units what we call an adoption configuration. Each such configuration can be further characterized along the following dimensions: (1) vision, (2) key functionality, (3) mode of interaction, (4) structure and (5) mode of appropriation. In addition, these dimensions do not co-vary independently. For example, a particular organizing vision assumes a specific inter-organizational structure. A typology of IOIS configurations for adoption analysis is laid out consisting of dyadic, hub and spoke, industry and community configurations. Specific forms or adoption analysis are suggested for each type of configuration. Overall, configuration analysis redirects IOIS adoption studies both at the theoretical and the methodological level, and a corresponding research agenda is sketched.

",jan damsgaard,,2011.0,10.1057/ejis.2010.71,European Journal of Information Systems,Lyytinen2011,Not available,,Nature,Not available,Inter-organizational information systems adoption – a configuration analysis approach,7029a38a92e6745ee0a7cd7bc0727a99,http://dx.doi.org/10.1057/ejis.2010.71 17559,"

Games can be easy to construct but difficult to solve due to current methods available for finding the Nash Equilibrium. This issue is one of many that face modern game theorists and those analysts that need to model situations with multiple decision-makers. This paper explores the use of reinforcement learning, a standard artificial intelligence technique, as a means to solve a simple dynamic airline pricing game. Three different reinforcement learning approaches are compared: SARSA, Q-learning and Monte Carlo Learning. The pricing game solution is surprisingly sophisticated given the game's simplicity and this sophistication is reflected in the learning results. The paper also discusses extra analytical benefit obtained from applying reinforcement learning to these types of problems.

",a collins,,2011.0,10.1057/jors.2011.94,Journal of the Operational Research Society,Collins2011,Not available,,Nature,Not available,Comparing reinforcement learning approaches for solving game theoretic models: a dynamic airline pricing game example,7d831309ba4e5cb5bbde9efd280f43d1,http://dx.doi.org/10.1057/jors.2011.94 17560,"

Games can be easy to construct but difficult to solve due to current methods available for finding the Nash Equilibrium. This issue is one of many that face modern game theorists and those analysts that need to model situations with multiple decision-makers. This paper explores the use of reinforcement learning, a standard artificial intelligence technique, as a means to solve a simple dynamic airline pricing game. Three different reinforcement learning approaches are compared: SARSA, Q-learning and Monte Carlo Learning. The pricing game solution is surprisingly sophisticated given the game's simplicity and this sophistication is reflected in the learning results. The paper also discusses extra analytical benefit obtained from applying reinforcement learning to these types of problems.

",l thomas,,2011.0,10.1057/jors.2011.94,Journal of the Operational Research Society,Collins2011,Not available,,Nature,Not available,Comparing reinforcement learning approaches for solving game theoretic models: a dynamic airline pricing game example,7d831309ba4e5cb5bbde9efd280f43d1,http://dx.doi.org/10.1057/jors.2011.94 17561,"

In 1964, Bell discovered that quantum mechanics is a nonlocal theory. Three years later, in a seemingly unconnected development, Harsanyi introduced the concept of Bayesian games. Here we show that, in fact, there is a deep connection between Bell nonlocality and Bayesian games, and that the same concepts appear in both fields. This link offers interesting possibilities for Bayesian games, namely of allowing the players to receive advice in the form of nonlocal correlations, for instance using entangled quantum particles or more general no-signalling boxes. This will lead to novel joint strategies, impossible to achieve classically. We characterize games for which nonlocal resources offer a genuine advantage over classical ones. Moreover, some of these strategies represent equilibrium points, leading to the notion of quantum/no-signalling Nash equilibrium. Finally, we describe new types of question in the study of nonlocality, namely the consideration of nonlocal advantage given a set of Bell expressions.

",nicolas brunner,Theoretical physics,2013.0,10.1038/ncomms3057,Nature Communications,Brunner2013,Not available,,Nature,Not available,Connection between Bell nonlocality and Bayesian game theory,5a8b6d2e9f24ce1a0b51bef48c4c8edb,http://dx.doi.org/10.1038/ncomms3057 17562,"

In 1964, Bell discovered that quantum mechanics is a nonlocal theory. Three years later, in a seemingly unconnected development, Harsanyi introduced the concept of Bayesian games. Here we show that, in fact, there is a deep connection between Bell nonlocality and Bayesian games, and that the same concepts appear in both fields. This link offers interesting possibilities for Bayesian games, namely of allowing the players to receive advice in the form of nonlocal correlations, for instance using entangled quantum particles or more general no-signalling boxes. This will lead to novel joint strategies, impossible to achieve classically. We characterize games for which nonlocal resources offer a genuine advantage over classical ones. Moreover, some of these strategies represent equilibrium points, leading to the notion of quantum/no-signalling Nash equilibrium. Finally, we describe new types of question in the study of nonlocality, namely the consideration of nonlocal advantage given a set of Bell expressions.

",noah linden,Theoretical physics,2013.0,10.1038/ncomms3057,Nature Communications,Brunner2013,Not available,,Nature,Not available,Connection between Bell nonlocality and Bayesian game theory,5a8b6d2e9f24ce1a0b51bef48c4c8edb,http://dx.doi.org/10.1038/ncomms3057 17563,"

As the title of the book indicates, this is a nontechnical introduction to game theory. It is one of many textbooks on game theory; its niche appears to be students with little background in Mathematics or Economics.

",myong-hun chang,,2013.0,10.1057/eej.2012.26,Eastern Economic Journal,Chang2013,Not available,,Nature,Not available,"Game Theory: A Nontechnical Introduction to the Analysis of Strategy, by Roger A. McCain",9ec0c6768016903067c3983926e4f4ef,http://dx.doi.org/10.1057/eej.2012.26 17564,"A Nash equilibrium is a highly desirable situation in game theory, which earned its discoverer a Nobel prize. Such a fundamental result might seem hard to improve on, but new work has multiplied the situations in which Nash equilibria can apply.",ivar ekeland,,1999.0,10.1038/23154,Nature,Ekeland1999,Not available,,Nature,Not available,Game theory: Agreeing on strategies,59fc8f18bbca30190501d36988f3d53d,http://dx.doi.org/10.1038/23154 17565,"

There has been a gigantic shift from a product based economy to one based on services, specifically digital services. From every indication it is likely to be more than a passing fad and the changes these emerging digital services represent will continue to transform commerce and have yet to reach market saturation. Digital services are being designed for and offered to users, yet very little is known about the design process that goes behind these developments. Is there a science behind designing digital services? By examining 12 leading digital services, we have developed a design taxonomy to be able to classify and contrast digital services. What emerged in the taxonomy were two broad dimensions; a set of fundamental design objectives and a set of fundamental service provider objectives. This paper concludes with an application of the proposed taxonomy to three leading digital services. We hope that the proposed taxonomy will be useful in understanding the science behind the design of digital services.

",kevin williams,,2008.0,10.1057/ejis.2008.38,European Journal of Information Systems,Williams2008,Not available,,Nature,Not available,Design of emerging digital services: a taxonomy,b7dd139687cdb644d973f9a65fbaaa85,http://dx.doi.org/10.1057/ejis.2008.38 17566,"

There has been a gigantic shift from a product based economy to one based on services, specifically digital services. From every indication it is likely to be more than a passing fad and the changes these emerging digital services represent will continue to transform commerce and have yet to reach market saturation. Digital services are being designed for and offered to users, yet very little is known about the design process that goes behind these developments. Is there a science behind designing digital services? By examining 12 leading digital services, we have developed a design taxonomy to be able to classify and contrast digital services. What emerged in the taxonomy were two broad dimensions; a set of fundamental design objectives and a set of fundamental service provider objectives. This paper concludes with an application of the proposed taxonomy to three leading digital services. We hope that the proposed taxonomy will be useful in understanding the science behind the design of digital services.

",samir chatterjee,,2008.0,10.1057/ejis.2008.38,European Journal of Information Systems,Williams2008,Not available,,Nature,Not available,Design of emerging digital services: a taxonomy,b7dd139687cdb644d973f9a65fbaaa85,http://dx.doi.org/10.1057/ejis.2008.38 17567,"

There has been a gigantic shift from a product based economy to one based on services, specifically digital services. From every indication it is likely to be more than a passing fad and the changes these emerging digital services represent will continue to transform commerce and have yet to reach market saturation. Digital services are being designed for and offered to users, yet very little is known about the design process that goes behind these developments. Is there a science behind designing digital services? By examining 12 leading digital services, we have developed a design taxonomy to be able to classify and contrast digital services. What emerged in the taxonomy were two broad dimensions; a set of fundamental design objectives and a set of fundamental service provider objectives. This paper concludes with an application of the proposed taxonomy to three leading digital services. We hope that the proposed taxonomy will be useful in understanding the science behind the design of digital services.

",matti rossi,,2008.0,10.1057/ejis.2008.38,European Journal of Information Systems,Williams2008,Not available,,Nature,Not available,Design of emerging digital services: a taxonomy,b7dd139687cdb644d973f9a65fbaaa85,http://dx.doi.org/10.1057/ejis.2008.38 17568,"

Using panel data, we find evidence for significant direct and indirect effects of trade on carbon emissions. Trade tends to increase the emissions burden, especially in those less industrialized countries. We also find evidence for a U-shaped relationship between income per capita and carbon emissions. We discuss the effectiveness of emission reduction policies in light of these results and advance some proposals to reconcile environmental and trade policymaking.

A partir de données de panel, nous constatons que le commerce a des effets directs et indirects significatifs sur les émissions de carbone. Le commerce tend à accroître la charge des émissions, particulièrement dans les pays moins industrialisés. Les données mettent également en évidence une relation en forme de U entre le revenu par habitant et les émissions de carbone. Au vu de ces résultats, nous évaluons l’efficacité des politiques de réduction des émissions et formulons des propositions pour concilier l’élaboration des politiques commerciales et celle des politiques environnementales

",richard kozul-wright,,2012.0,10.1057/ejdr.2012.15,European Journal of Development Research,Kozul-Wright2012,Not available,,Nature,Not available,International Trade and Carbon Emissions,760c5817d327e1f871907ebac691bd05,http://dx.doi.org/10.1057/ejdr.2012.15 17570,"

Using panel data, we find evidence for significant direct and indirect effects of trade on carbon emissions. Trade tends to increase the emissions burden, especially in those less industrialized countries. We also find evidence for a U-shaped relationship between income per capita and carbon emissions. We discuss the effectiveness of emission reduction policies in light of these results and advance some proposals to reconcile environmental and trade policymaking.

A partir de données de panel, nous constatons que le commerce a des effets directs et indirects significatifs sur les émissions de carbone. Le commerce tend à accroître la charge des émissions, particulièrement dans les pays moins industrialisés. Les données mettent également en évidence une relation en forme de U entre le revenu par habitant et les émissions de carbone. Au vu de ces résultats, nous évaluons l’efficacité des politiques de réduction des émissions et formulons des propositions pour concilier l’élaboration des politiques commerciales et celle des politiques environnementales

",piergiuseppe fortunato,,2012.0,10.1057/ejdr.2012.15,European Journal of Development Research,Kozul-Wright2012,Not available,,Nature,Not available,International Trade and Carbon Emissions,760c5817d327e1f871907ebac691bd05,http://dx.doi.org/10.1057/ejdr.2012.15 17571,"

Citigroup has served as the poster child for the elusive promises and manifold pitfalls of universal banking. When Citicorp merged with Travelers to form Citigroup in 1998, Citigroup’s leaders and supporters asserted that the new financial conglomerate would offer unparalleled convenience to its customers through ‘one-stop shopping’ for banking, securities and insurance services. They also claimed that Citigroup would have a superior ability to withstand financial shocks due to its broadly diversified activities. By 2009, those bold predictions of Citigroup’s success had turned to ashes. Citigroup pursued a high-risk, high-growth strategy during the 2000s that proved to be disastrous. As a result, the bank recorded more than US$130 billion of losses on its loans and investments from 2007 to 2009. To prevent Citigroup’s failure, the federal government provided $45 billion of new capital to the bank and gave the bank $500 billion of additional help in the form of asset guarantees, debt guarantees and emergency loans. The federal government provided more financial assistance to Citigroup than to any other bank during the financial crisis. During its early years, Citigroup was embroiled in a series of high-profile scandals, including tainted transactions with Enron and WorldCom, biased research advice, corrupt allocations of shares in initial public offerings, predatory subprime lending, and market manipulation in foreign bond markets. Notwithstanding a widely publicized plan to improve corporate risk controls in 2005, Citigroup continued to pursue higher profits through a wide range of speculative activities, including leveraged corporate lending, packaging toxic subprime loans into mortgage-backed securities and collateralized debt obligations, and dumping risky assets into off-balance-sheet conduits for which Citigroup had contractual and reputational exposures. Post-mortem evaluations of Citigroup’s near-collapse revealed that neither Citigroup’s managers nor its regulators recognized the systemic risks embedded in the bank’s far-flung operations. Thus, Citigroup was not only too big to fail but also too large and too complex to manage or regulate effectively. Citigroup’s history raises deeply troubling questions about the ability of bank executives and regulators to supervise and control today’s megabanks. Citigroup’s original creators – John Reed of Citicorp and Sandy Weill of Travelers – admitted in recent years that Citigroup’s universal banking model failed, and they called on Congress to reinstate the Glass-Steagall Act’s separation between commercial and investment banks. As Reed and Weill acknowledged, the universal banking model is deeply flawed by its excessive organizational complexity, its vulnerability to culture clashes and conflicts of interest, and its tendency to permit excessive risk-taking within far-flung, semi-autonomous units that lack adequate oversight from either senior managers or regulators.

",arthur jr,,2014.0,10.1057/jbr.2014.16,Journal of Banking Regulation,Jr2014,Not available,,Nature,Not available,Citigroup’s unfortunate history of managerial and regulatory failures,c34a6b0be81e283ac476796ee5f6d7a0,http://dx.doi.org/10.1057/jbr.2014.16 17572,"

Nigeria's response to its 2009 banking crisis, which indicated exogenous and endogenous local and global risk factors for non-performing loans (NPLs), included the apparent orthodoxy of establishing an asset management company (AMCON). This article examines the justifications for and effectiveness of AMCON as a mechanism for resolving NPLs in a developing economy. Having compared Nigeria and Korea, the article argues that relief, restructuring, rehabilitation, recovery, resuscitation, responsibility, restitution and reoccurrence prevention, expressed as RE=7 × ReRe, are critical goals. Doubting a one-size-fits-all model for resolving systemic banking crises, this article suggests a contextual approach that considers asset characteristics, operative legal and regulatory environment, and market capacity.

",onyeka osuji,,2012.0,10.1057/jbr.2011.28,Journal of Banking Regulation,Osuji2012,Not available,,Nature,Not available,"Asset management companies, non-performing loans and systemic crisis: A developing country perspective",4fb256f1f02f3f80cdd18e658fa6986f,http://dx.doi.org/10.1057/jbr.2011.28 17573,"

This article examines the ways in which the increasingly market-based higher education (HE) landscape of UK HE is shaping students’ attitudes and responses towards their HE. Contemporary HE policy has framed HE as a private good that generates largely private benefits. There has also been a concern that these changes will distort institutional relations and the traditional value of participating in HE, reinforcing the growing commodification of UK HE. On the basis of a qualitative study with students in a range of higher education institutions from the four UK countries, it outlines the main impacts recent policy is having on students’ attitudes and relationship to HE. Dominant market-driven discourses around investment, consumerism, employability and competition indicate widespread concerns among contemporary HE students about operating in higher-stakes markets, which are intensified by increased personal financial contribution towards HE. While the data reveal an identification with the student as ‘consumer’ and strigent expectations over what HE provides, it also points to an ethic of self-responsibility that is built on highly individualised discourses of personal application, proactivity and experience optimisation. Goal-driven and instrumental learning are evident, which relate to widespread concerns about future returns and the private good value of HE.

",michael tomlinson,,2015.0,10.1057/hep.2015.17,Higher Education Policy,Tomlinson2015,Not available,,Nature,Not available,"The Impact of Market-Driven Higher Education on Student-University Relations: Investing, Consuming and Competing",39d873433a4d7118174682353939e37a,http://dx.doi.org/10.1057/hep.2015.17 17574,"

Do acquisitions lead to instrumental innovations related to the acquired knowledge? Past arguments on vertical integration espouse how a quest for knowledge drives acquisitions culminating in innovation performance. Using Google and Yahoo as cases-in-point, we examine how facets of acquired innovation knowledge impact post-innovation performance. In particular, the apparently opposing fortunes of Google and Yahoo allow us to investigate the pace of their innovation performance as a hazards model. Results from our investigation highlight Google’s ambidexterity over Yahoo with a swifter, systematic pace of innovation performance – from hastening time to patenting new ideas to the time to releasing new applications from acquisitions.

",pratim datta,,2014.0,10.1057/ejis.2014.32,European Journal of Information Systems,Datta2014,Not available,,Nature,Not available,Knowledge-acquisitions and post-acquisition innovation performance: a comparative hazards model,66df6880c810ebef0b6f750a70fd9a67,http://dx.doi.org/10.1057/ejis.2014.32 17575,"

Do acquisitions lead to instrumental innovations related to the acquired knowledge? Past arguments on vertical integration espouse how a quest for knowledge drives acquisitions culminating in innovation performance. Using Google and Yahoo as cases-in-point, we examine how facets of acquired innovation knowledge impact post-innovation performance. In particular, the apparently opposing fortunes of Google and Yahoo allow us to investigate the pace of their innovation performance as a hazards model. Results from our investigation highlight Google’s ambidexterity over Yahoo with a swifter, systematic pace of innovation performance – from hastening time to patenting new ideas to the time to releasing new applications from acquisitions.

",yaman roumani,,2014.0,10.1057/ejis.2014.32,European Journal of Information Systems,Datta2014,Not available,,Nature,Not available,Knowledge-acquisitions and post-acquisition innovation performance: a comparative hazards model,66df6880c810ebef0b6f750a70fd9a67,http://dx.doi.org/10.1057/ejis.2014.32 17576,"

Two characteristics of e-commerce, the ability to micromarket (ie, customising a marketing plan according to customers’ purchasing patterns) and the ability to selectively offer item availability information (ie, manipulating whether or not to display the total number of items available to customers), considerably increase firms’ potential to improve their performance. This paper considers e-business in the hotel and airline industries, which has two customer segments: one is the leisure segment, which focuses more on price, and the other group is the business segment, which focuses heavily on schedule. We propose an analytical model that determines the optimal pricing and demonstrates that e-business can improve its revenue by taking into account customer segmentation when offering item availability information to customers. We provide numerical examples that demonstrate that accuracy in segmenting customers and the size of each segment will influence the performance of customised marketing planning. We also present managerial implications derived from these analytical findings.

",hisashi kurata,,2007.0,10.1057/palgrave.rpm.5160054,Journal of Revenue and Pricing Management,Kurata2007,Not available,,Nature,Not available,How customisation of pricing and item availability information can improve e-commerce performance,1e47ede11f64f57e807966a7116a6ebf,http://dx.doi.org/10.1057/palgrave.rpm.5160054 17577,"

Two characteristics of e-commerce, the ability to micromarket (ie, customising a marketing plan according to customers’ purchasing patterns) and the ability to selectively offer item availability information (ie, manipulating whether or not to display the total number of items available to customers), considerably increase firms’ potential to improve their performance. This paper considers e-business in the hotel and airline industries, which has two customer segments: one is the leisure segment, which focuses more on price, and the other group is the business segment, which focuses heavily on schedule. We propose an analytical model that determines the optimal pricing and demonstrates that e-business can improve its revenue by taking into account customer segmentation when offering item availability information to customers. We provide numerical examples that demonstrate that accuracy in segmenting customers and the size of each segment will influence the performance of customised marketing planning. We also present managerial implications derived from these analytical findings.

",carolyn bonifield,,2007.0,10.1057/palgrave.rpm.5160054,Journal of Revenue and Pricing Management,Kurata2007,Not available,,Nature,Not available,How customisation of pricing and item availability information can improve e-commerce performance,1e47ede11f64f57e807966a7116a6ebf,http://dx.doi.org/10.1057/palgrave.rpm.5160054 17578,"

This article presents comparative analysis across time of the European Union (EU) and India in energy affairs. Yet, while there have been a number of signed agreements and completed negotiations, the actual achievements of the dialogue in energy matters are still questionable. This article focuses on how two leading Indian newspapers (The Times of India and The Economic Times) represented India’s dialogue with the EU. The three frames of sustainability, competitiveness and security of supply were traced in three peak time periods: (i) the Joint Declaration of Enhanced Energy Cooperation February 2012, (ii) the Doha Climate Change Conference in 2012 and (iii) the Warsaw Climate Change Conference in 2013. The analysis is guided by two questions: (i) whether the EU is recognised as a ‘normative’ power in the Indian influential press and (ii) whether Indian perceptions of the EU’s ‘normative’ power in energy framework have changed over time? The findings highlight the perceptions of the dynamics of EU cooperation with India in the energy field. Manners’ analysis of the EU’s ‘core’ and ‘minor’ norms provides a valuable perspective to analyse the EU’s international identity in energy affairs with external partners.

Comparative European Politics advance online publication, 20 June 2016; doi:10.1057/cep.2016.13",olga gulyaeva,,2016.0,10.1057/cep.2016.13,Comparative European Politics,Gulyaeva2016,Not available,,Nature,Not available,Challenging the EU’s normative power: Media views on the EU in India,9aff22b61f1aae0bb8c928ba6a8082fc,http://dx.doi.org/10.1057/cep.2016.13 17579,"

Deficits in eye contact have been a hallmark of autism since the condition’s initial description. They are cited widely as a diagnostic feature and figure prominently in clinical instruments; however, the early onset of these deficits has not been known. Here we show in a prospective longitudinal study that infants later diagnosed with autism spectrum disorders (ASDs) exhibit mean decline in eye fixation from 2 to 6 months of age, a pattern not observed in infants who do not develop ASD. These observations mark the earliest known indicators of social disability in infancy, but also falsify a prior hypothesis: in the first months of life, this basic mechanism of social adaptive action—eye looking—is not immediately diminished in infants later diagnosed with ASD; instead, eye looking appears to begin at normative levels prior to decline. The timing of decline highlights a narrow developmental window and reveals the early derailment of processes that would otherwise have a key role in canalizing typical social development. Finally, the observation of this decline in eye fixation—rather than outright absence—offers a promising opportunity for early intervention that could build on the apparent preservation of mechanisms subserving reflexive initial orientation towards the eyes.

",warren jones,Autism spectrum disorders,2013.0,10.1038/nature12715,Nature,Jones2013,Not available,,Nature,Not available,Attention to eyes is present but in decline in 2–6-month-old infants later diagnosed with autism,88f9800c420ee8f45980c9ac04d2c9eb,http://dx.doi.org/10.1038/nature12715 17580,"

Deficits in eye contact have been a hallmark of autism since the condition’s initial description. They are cited widely as a diagnostic feature and figure prominently in clinical instruments; however, the early onset of these deficits has not been known. Here we show in a prospective longitudinal study that infants later diagnosed with autism spectrum disorders (ASDs) exhibit mean decline in eye fixation from 2 to 6 months of age, a pattern not observed in infants who do not develop ASD. These observations mark the earliest known indicators of social disability in infancy, but also falsify a prior hypothesis: in the first months of life, this basic mechanism of social adaptive action—eye looking—is not immediately diminished in infants later diagnosed with ASD; instead, eye looking appears to begin at normative levels prior to decline. The timing of decline highlights a narrow developmental window and reveals the early derailment of processes that would otherwise have a key role in canalizing typical social development. Finally, the observation of this decline in eye fixation—rather than outright absence—offers a promising opportunity for early intervention that could build on the apparent preservation of mechanisms subserving reflexive initial orientation towards the eyes.

",warren jones,Psychology,2013.0,10.1038/nature12715,Nature,Jones2013,Not available,,Nature,Not available,Attention to eyes is present but in decline in 2–6-month-old infants later diagnosed with autism,88f9800c420ee8f45980c9ac04d2c9eb,http://dx.doi.org/10.1038/nature12715 17581,"

Deficits in eye contact have been a hallmark of autism since the condition’s initial description. They are cited widely as a diagnostic feature and figure prominently in clinical instruments; however, the early onset of these deficits has not been known. Here we show in a prospective longitudinal study that infants later diagnosed with autism spectrum disorders (ASDs) exhibit mean decline in eye fixation from 2 to 6 months of age, a pattern not observed in infants who do not develop ASD. These observations mark the earliest known indicators of social disability in infancy, but also falsify a prior hypothesis: in the first months of life, this basic mechanism of social adaptive action—eye looking—is not immediately diminished in infants later diagnosed with ASD; instead, eye looking appears to begin at normative levels prior to decline. The timing of decline highlights a narrow developmental window and reveals the early derailment of processes that would otherwise have a key role in canalizing typical social development. Finally, the observation of this decline in eye fixation—rather than outright absence—offers a promising opportunity for early intervention that could build on the apparent preservation of mechanisms subserving reflexive initial orientation towards the eyes.

",ami klin,Autism spectrum disorders,2013.0,10.1038/nature12715,Nature,Jones2013,Not available,,Nature,Not available,Attention to eyes is present but in decline in 2–6-month-old infants later diagnosed with autism,88f9800c420ee8f45980c9ac04d2c9eb,http://dx.doi.org/10.1038/nature12715 17582,"

Deficits in eye contact have been a hallmark of autism since the condition’s initial description. They are cited widely as a diagnostic feature and figure prominently in clinical instruments; however, the early onset of these deficits has not been known. Here we show in a prospective longitudinal study that infants later diagnosed with autism spectrum disorders (ASDs) exhibit mean decline in eye fixation from 2 to 6 months of age, a pattern not observed in infants who do not develop ASD. These observations mark the earliest known indicators of social disability in infancy, but also falsify a prior hypothesis: in the first months of life, this basic mechanism of social adaptive action—eye looking—is not immediately diminished in infants later diagnosed with ASD; instead, eye looking appears to begin at normative levels prior to decline. The timing of decline highlights a narrow developmental window and reveals the early derailment of processes that would otherwise have a key role in canalizing typical social development. Finally, the observation of this decline in eye fixation—rather than outright absence—offers a promising opportunity for early intervention that could build on the apparent preservation of mechanisms subserving reflexive initial orientation towards the eyes.

",ami klin,Psychology,2013.0,10.1038/nature12715,Nature,Jones2013,Not available,,Nature,Not available,Attention to eyes is present but in decline in 2–6-month-old infants later diagnosed with autism,88f9800c420ee8f45980c9ac04d2c9eb,http://dx.doi.org/10.1038/nature12715 17583,"

This paper analyzes the statistical properties of real-world networks of people engaged in product development (PD) activities. We show that complex PD networks display similar statistical patterns to other real-world complex social, information, biological and technological networks. The paper lays out the foundations for understanding the properties of other intra- and inter-organizational networks that are realized by specific network architectures. The paper also provides a general framework towards characterizing the functionality, dynamics, robustness, and fragility of smart business networks.

",dan braha,,2004.0,10.1057/palgrave.jit.2000030,Journal of Information Technology,Braha2004,Not available,,Nature,Not available,Information flow structure in large-scale product development organizational networks,47f6e313ebd6f2e0610a66ba06b1d45c,http://dx.doi.org/10.1057/palgrave.jit.2000030 17584,"

This paper analyzes the statistical properties of real-world networks of people engaged in product development (PD) activities. We show that complex PD networks display similar statistical patterns to other real-world complex social, information, biological and technological networks. The paper lays out the foundations for understanding the properties of other intra- and inter-organizational networks that are realized by specific network architectures. The paper also provides a general framework towards characterizing the functionality, dynamics, robustness, and fragility of smart business networks.

",yaneer bar-yam,,2004.0,10.1057/palgrave.jit.2000030,Journal of Information Technology,Braha2004,Not available,,Nature,Not available,Information flow structure in large-scale product development organizational networks,47f6e313ebd6f2e0610a66ba06b1d45c,http://dx.doi.org/10.1057/palgrave.jit.2000030 17585,"

Intermediaries such as e-Bay and Amazon arise when market system knowledge is dispersed amongst participants (e.g. buyers and suppliers), and generate revenue by providing value-added services to participants in addition to creating and managing the digital infrastructure. Consequently, such intermediaries (which we call electronic marketplaces) play a vital role in facilitating exchanges in networks characterised by disparate knowledge and are essential network orchestrators in peer-to-peer markets and intellectual property exchanges. However, there is a high failure rate associated with electronic marketplaces leading to questions as to the long-term sustainability of emerging inter-organisational networks characterised by dispersed knowledge. This paper draws on research in a number of disciplines as well as a study of eight electronic marketplaces to build a theory of electronic marketplace performance. In doing so, we identify key performance measures for electronic marketplaces as well as the strategic, structural and contextual factors that impact performance. We identify how these factors can be observed, and illustrate how the fit between strategic and contextual factors affects performance. We present our theory as hypotheses and provide the empirical indicators for the constituent constructs.

",philip o'reilly,,2010.0,10.1057/ejis.2010.12,European Journal of Information Systems,O'Reilly2010,Not available,,Nature,Not available,Intermediaries in inter-organisational networks: building a theory of electronic marketplace performance,dafad4a350f38a4e78c840cae31eac77,http://dx.doi.org/10.1057/ejis.2010.12 17586,"

Intermediaries such as e-Bay and Amazon arise when market system knowledge is dispersed amongst participants (e.g. buyers and suppliers), and generate revenue by providing value-added services to participants in addition to creating and managing the digital infrastructure. Consequently, such intermediaries (which we call electronic marketplaces) play a vital role in facilitating exchanges in networks characterised by disparate knowledge and are essential network orchestrators in peer-to-peer markets and intellectual property exchanges. However, there is a high failure rate associated with electronic marketplaces leading to questions as to the long-term sustainability of emerging inter-organisational networks characterised by dispersed knowledge. This paper draws on research in a number of disciplines as well as a study of eight electronic marketplaces to build a theory of electronic marketplace performance. In doing so, we identify key performance measures for electronic marketplaces as well as the strategic, structural and contextual factors that impact performance. We identify how these factors can be observed, and illustrate how the fit between strategic and contextual factors affects performance. We present our theory as hypotheses and provide the empirical indicators for the constituent constructs.

",patrick finnegan,,2010.0,10.1057/ejis.2010.12,European Journal of Information Systems,O'Reilly2010,Not available,,Nature,Not available,Intermediaries in inter-organisational networks: building a theory of electronic marketplace performance,dafad4a350f38a4e78c840cae31eac77,http://dx.doi.org/10.1057/ejis.2010.12 17588,"

This paper develops a temporal perspective to examine information and communication technologies (ICT) adoption and processes of globalization. The foundations of our theoretical approach explicitly draw upon three intersecting planes of temporality implicit in structuration; namely reversibility, irreversibility and institutionalization. We further develop our theoretical perspective by extending the scope of structuration to incorporate temporal features of Adam's social theory on ‘global time’. We then use this temporal perspective to examine the emergence of electronic trading and the process of globalization across London and Chicago futures exchanges. Our analysis provides insights into the IT-enabled reconfiguration of these exchanges during processes of reproduction and change associated with globalization. We conclude with some key implications for e-trading strategy and consider changes in trader work life associated with the adoption of e-trading.

",michael barrett,,2004.0,10.1057/palgrave.ejis.3000487,European Journal of Information Systems,Barrett2004,Not available,,Nature,Not available,Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective,99425ee9089e6e066e8289b1f1220657,http://dx.doi.org/10.1057/palgrave.ejis.3000487 17589,"

This paper develops a temporal perspective to examine information and communication technologies (ICT) adoption and processes of globalization. The foundations of our theoretical approach explicitly draw upon three intersecting planes of temporality implicit in structuration; namely reversibility, irreversibility and institutionalization. We further develop our theoretical perspective by extending the scope of structuration to incorporate temporal features of Adam's social theory on ‘global time’. We then use this temporal perspective to examine the emergence of electronic trading and the process of globalization across London and Chicago futures exchanges. Our analysis provides insights into the IT-enabled reconfiguration of these exchanges during processes of reproduction and change associated with globalization. We conclude with some key implications for e-trading strategy and consider changes in trader work life associated with the adoption of e-trading.

",susan scott,,2004.0,10.1057/palgrave.ejis.3000487,European Journal of Information Systems,Barrett2004,Not available,,Nature,Not available,Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective,99425ee9089e6e066e8289b1f1220657,http://dx.doi.org/10.1057/palgrave.ejis.3000487 17590,"

There has been recent debate about the practical application of academic revenue management. The concern of practitioners is that any approach they employ must be appealing to higher management, thus there is demand for simple and clear approaches to revenue management. Academic revenue management generally focuses on increasingly complex quantitative techniques requiring assumptions that are hard for the practitioner to justify. In this article we argue that practitioners are not the customers of academic revenue management; rather, the actual customers are other academics. We use this claim to argue that this situation will get worse, not better. As an alternative, we discuss the potential use of qualitative techniques as an alternative to current ‘hard science’ methods.

",andrew collins,,2014.0,10.1057/rpm.2014.34,Journal of Revenue and Pricing Management,Collins2014,Not available,,Nature,Not available,Academic revenue management and quantitative worship,1340bf81ae4354bc3733eac4af76fb84,http://dx.doi.org/10.1057/rpm.2014.34 17591,"

This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The institutionalizing practices and operational assumptions of Google Inc. are the primary lens for this analysis as they are rendered in two recent articles authored by Google Chief Economist Hal Varian. Varian asserts four uses that follow from computer-mediated transactions: ‘data extraction and analysis,’ ‘new contractual forms due to better monitoring,’ ‘personalization and customization,’ and ‘continuous experiments.’ An examination of the nature and consequences of these uses sheds light on the implicit logic of surveillance capitalism and the global architecture of computer mediation upon which it depends. This architecture produces a distributed and largely uncontested new expression of power that I christen: ‘Big Other.’ It is constituted by unexpected and often illegible mechanisms of extraction, commodification, and control that effectively exile persons from their own behavior while producing new markets of behavioral prediction and modification. Surveillance capitalism challenges democratic norms and departs in key ways from the centuries-long evolution of market capitalism.

",shoshana zuboff,,2015.0,10.1057/jit.2015.5,Journal of Information Technology,Zuboff2015,Not available,,Nature,Not available,Big other: surveillance capitalism and the prospects of an information civilization,7d4e9d1442579d6328b5115347464e9a,http://dx.doi.org/10.1057/jit.2015.5 17592,"

The Global Financial Crisis has brought about considerable change in consumer behaviour, from increased price sensitivity to the use of price comparison websites. This article goes beyond the surface and identifies 10 consumer behavioural patterns that are occurring now and moving into the future. The pattern of trends, which will impact upon everything from branding to strategy, are: mobile living, price sensitivity, gamification of price, pricing inefficiency, big data and promotions, concierge living, is loyalty dead, discounting forever, managing complexity, and choice and maximising behaviour. Each pattern of behaviour is robustly explained and supported by empirical evidence provided by the Future Foundation. The article concludes with four predictions that the patterns are driving namely, loyalty, temporary permanence, deals and value.

Journal of Revenue and Pricing Management advance online publication, 3 June 2016; doi:10.1057/rpm.2016.35",ian yeoman,,2016.0,10.1057/rpm.2016.35,Journal of Revenue and Pricing Management,Yeoman2016,Not available,,Nature,Not available,Trends in retail pricing: A consumer perspective,9c184106c52a8e53e16de4ef8a9f2fc4,http://dx.doi.org/10.1057/rpm.2016.35 17593,"

The Global Financial Crisis has brought about considerable change in consumer behaviour, from increased price sensitivity to the use of price comparison websites. This article goes beyond the surface and identifies 10 consumer behavioural patterns that are occurring now and moving into the future. The pattern of trends, which will impact upon everything from branding to strategy, are: mobile living, price sensitivity, gamification of price, pricing inefficiency, big data and promotions, concierge living, is loyalty dead, discounting forever, managing complexity, and choice and maximising behaviour. Each pattern of behaviour is robustly explained and supported by empirical evidence provided by the Future Foundation. The article concludes with four predictions that the patterns are driving namely, loyalty, temporary permanence, deals and value.

Journal of Revenue and Pricing Management advance online publication, 3 June 2016; doi:10.1057/rpm.2016.35",carol wheatley,,2016.0,10.1057/rpm.2016.35,Journal of Revenue and Pricing Management,Yeoman2016,Not available,,Nature,Not available,Trends in retail pricing: A consumer perspective,9c184106c52a8e53e16de4ef8a9f2fc4,http://dx.doi.org/10.1057/rpm.2016.35 17594,"

The Global Financial Crisis has brought about considerable change in consumer behaviour, from increased price sensitivity to the use of price comparison websites. This article goes beyond the surface and identifies 10 consumer behavioural patterns that are occurring now and moving into the future. The pattern of trends, which will impact upon everything from branding to strategy, are: mobile living, price sensitivity, gamification of price, pricing inefficiency, big data and promotions, concierge living, is loyalty dead, discounting forever, managing complexity, and choice and maximising behaviour. Each pattern of behaviour is robustly explained and supported by empirical evidence provided by the Future Foundation. The article concludes with four predictions that the patterns are driving namely, loyalty, temporary permanence, deals and value.

Journal of Revenue and Pricing Management advance online publication, 3 June 2016; doi:10.1057/rpm.2016.35",una mcmahon-beattie,,2016.0,10.1057/rpm.2016.35,Journal of Revenue and Pricing Management,Yeoman2016,Not available,,Nature,Not available,Trends in retail pricing: A consumer perspective,9c184106c52a8e53e16de4ef8a9f2fc4,http://dx.doi.org/10.1057/rpm.2016.35 17596,"

The present study investigates the external validity of emotional value measured in economic laboratory experiments by using a physiological indicator of stress, heart rate variability (HRV). While there is ample evidence supporting the external validity of economic experiments, there is little evidence comparing the magnitude of internal levels of emotional stress during decision making with external stress. The current study addresses this gap by comparing the magnitudes of decision stress experienced in the laboratory with the stress from outside the laboratory. To quantify a large change in HRV, measures observed in the laboratory during decision-making are compared to the difference between HRV during a university exam and other mental activity for the same individuals in and outside of the laboratory. The results outside the laboratory inform about the relevance of laboratory findings in terms of their relative magnitude. Results show that psychologically induced HRV changes observed in the laboratory, particularly in connection with social preferences, correspond to large effects outside. This underscores the external validity of laboratory findings and shows the magnitude of emotional value connected to pro-social economic decisions in the laboratory.

",jonas fooken,Social behaviour,2017.0,10.1038/srep44471,Scientific Reports,Fooken2017,Not available,,Nature,Not available,Heart rate variability indicates emotional value during pro-social economic laboratory decisions with large external validity,642edc078a314f38427a80c747b97c76,http://dx.doi.org/10.1038/srep44471 17597,"

The present study investigates the external validity of emotional value measured in economic laboratory experiments by using a physiological indicator of stress, heart rate variability (HRV). While there is ample evidence supporting the external validity of economic experiments, there is little evidence comparing the magnitude of internal levels of emotional stress during decision making with external stress. The current study addresses this gap by comparing the magnitudes of decision stress experienced in the laboratory with the stress from outside the laboratory. To quantify a large change in HRV, measures observed in the laboratory during decision-making are compared to the difference between HRV during a university exam and other mental activity for the same individuals in and outside of the laboratory. The results outside the laboratory inform about the relevance of laboratory findings in terms of their relative magnitude. Results show that psychologically induced HRV changes observed in the laboratory, particularly in connection with social preferences, correspond to large effects outside. This underscores the external validity of laboratory findings and shows the magnitude of emotional value connected to pro-social economic decisions in the laboratory.

",jonas fooken,Cooperation,2017.0,10.1038/srep44471,Scientific Reports,Fooken2017,Not available,,Nature,Not available,Heart rate variability indicates emotional value during pro-social economic laboratory decisions with large external validity,642edc078a314f38427a80c747b97c76,http://dx.doi.org/10.1038/srep44471 17598,"

The present study investigates the external validity of emotional value measured in economic laboratory experiments by using a physiological indicator of stress, heart rate variability (HRV). While there is ample evidence supporting the external validity of economic experiments, there is little evidence comparing the magnitude of internal levels of emotional stress during decision making with external stress. The current study addresses this gap by comparing the magnitudes of decision stress experienced in the laboratory with the stress from outside the laboratory. To quantify a large change in HRV, measures observed in the laboratory during decision-making are compared to the difference between HRV during a university exam and other mental activity for the same individuals in and outside of the laboratory. The results outside the laboratory inform about the relevance of laboratory findings in terms of their relative magnitude. Results show that psychologically induced HRV changes observed in the laboratory, particularly in connection with social preferences, correspond to large effects outside. This underscores the external validity of laboratory findings and shows the magnitude of emotional value connected to pro-social economic decisions in the laboratory.

",jonas fooken,Neurophysiology,2017.0,10.1038/srep44471,Scientific Reports,Fooken2017,Not available,,Nature,Not available,Heart rate variability indicates emotional value during pro-social economic laboratory decisions with large external validity,642edc078a314f38427a80c747b97c76,http://dx.doi.org/10.1038/srep44471 17599,"

In this paper, we consider a start-up service provider that decides whether to advertise its service product by offering temporary daily deal promotion. Based on the repeat purchase mechanism, we show that both the commission rate (ie, the revenue-sharing ratio) charged by the daily deal site and the discount level offered by the service provider play important roles in signalling the initially unobservable quality level of the service provider. A high commission rate can facilitate the signalling of the daily deal promotion, and in equilibrium only the high-quality service provider would do daily deal promotion. We find that if the daily deal site adopts a two-part tariff charging scheme, the high-quality service provider can always signal its quality by offering daily deals. And the two-part tariff leads to a lower signalling cost but a higher repeat purchase rate than those under the revenue-sharing if the variable cost of the low-quality service provider is not too large.

",ming zhao,,2014.0,10.1057/jors.2014.47,Journal of the Operational Research Society,Zhao2014,Not available,,Nature,Not available,Signalling effect of daily deal promotion for a start-up service provider,16414137824534c86d1a5c92d606ee91,http://dx.doi.org/10.1057/jors.2014.47 17600,"

There has been recent debate about the practical application of academic revenue management. The concern of practitioners is that any approach they employ must be appealing to higher management, thus there is demand for simple and clear approaches to revenue management. Academic revenue management generally focuses on increasingly complex quantitative techniques requiring assumptions that are hard for the practitioner to justify. In this article we argue that practitioners are not the customers of academic revenue management; rather, the actual customers are other academics. We use this claim to argue that this situation will get worse, not better. As an alternative, we discuss the potential use of qualitative techniques as an alternative to current ‘hard science’ methods.

",erika frydenlund,,2014.0,10.1057/rpm.2014.34,Journal of Revenue and Pricing Management,Collins2014,Not available,,Nature,Not available,Academic revenue management and quantitative worship,1340bf81ae4354bc3733eac4af76fb84,http://dx.doi.org/10.1057/rpm.2014.34 17601,"

In this paper, we consider a start-up service provider that decides whether to advertise its service product by offering temporary daily deal promotion. Based on the repeat purchase mechanism, we show that both the commission rate (ie, the revenue-sharing ratio) charged by the daily deal site and the discount level offered by the service provider play important roles in signalling the initially unobservable quality level of the service provider. A high commission rate can facilitate the signalling of the daily deal promotion, and in equilibrium only the high-quality service provider would do daily deal promotion. We find that if the daily deal site adopts a two-part tariff charging scheme, the high-quality service provider can always signal its quality by offering daily deals. And the two-part tariff leads to a lower signalling cost but a higher repeat purchase rate than those under the revenue-sharing if the variable cost of the low-quality service provider is not too large.

",yulan wang,,2014.0,10.1057/jors.2014.47,Journal of the Operational Research Society,Zhao2014,Not available,,Nature,Not available,Signalling effect of daily deal promotion for a start-up service provider,16414137824534c86d1a5c92d606ee91,http://dx.doi.org/10.1057/jors.2014.47 17602,"

In this paper, we consider a start-up service provider that decides whether to advertise its service product by offering temporary daily deal promotion. Based on the repeat purchase mechanism, we show that both the commission rate (ie, the revenue-sharing ratio) charged by the daily deal site and the discount level offered by the service provider play important roles in signalling the initially unobservable quality level of the service provider. A high commission rate can facilitate the signalling of the daily deal promotion, and in equilibrium only the high-quality service provider would do daily deal promotion. We find that if the daily deal site adopts a two-part tariff charging scheme, the high-quality service provider can always signal its quality by offering daily deals. And the two-part tariff leads to a lower signalling cost but a higher repeat purchase rate than those under the revenue-sharing if the variable cost of the low-quality service provider is not too large.

",xianghua gan,,2014.0,10.1057/jors.2014.47,Journal of the Operational Research Society,Zhao2014,Not available,,Nature,Not available,Signalling effect of daily deal promotion for a start-up service provider,16414137824534c86d1a5c92d606ee91,http://dx.doi.org/10.1057/jors.2014.47 17603,"

In a previous paper about brand strategy in this Journal, the writers argued that a brand can be considered as an integrated marketing idea, a ‘concept that drives the business’. Along with Jean-Noël Kapferer they conceptualised a brand as a particular sense of ‘meaning and direction’. The purpose of brand strategy lies in defining this essence (sense). In this paper they elaborate further on the strategic role of brands in the contemporary business environment. The emphasis shifts from ‘brand strategy’ to ‘brand based strategy’.

Brands should play an important role in selecting and maintaining a strategic direction for a company. A brand can serve as a reference point for making choices in the area of business development by actualising (effecting) a dynamic fit between the company's capabilities and the changing environment. Brands are shared property of both the seller and the buyer and embody the relationship between the company and the environment.

In order to provide an indication of what role the brand can fulfil in strategic management, the writers initially pursue the concept of the ‘strategic reference point’. Subsequently, the strategic opinions of Porter are compared with those of Prahalad and Hamel, based on the strategic reference point placed at the centre of their theories. It will be demonstrated that the brand concept as a strategic reference point overcomes the shortcomings of both approaches and frameworks the contours of a brand based strategy.

",andy mosmans,,1998.0,10.1057/bm.1998.51,Journal of Brand Management,Mosmans1998,Not available,,Nature,Not available,Brand based strategic management,39e35c110deab90c7b57cf6f4f058f1c,http://dx.doi.org/10.1057/bm.1998.51 17604,"

In a previous paper about brand strategy in this Journal, the writers argued that a brand can be considered as an integrated marketing idea, a ‘concept that drives the business’. Along with Jean-Noël Kapferer they conceptualised a brand as a particular sense of ‘meaning and direction’. The purpose of brand strategy lies in defining this essence (sense). In this paper they elaborate further on the strategic role of brands in the contemporary business environment. The emphasis shifts from ‘brand strategy’ to ‘brand based strategy’.

Brands should play an important role in selecting and maintaining a strategic direction for a company. A brand can serve as a reference point for making choices in the area of business development by actualising (effecting) a dynamic fit between the company's capabilities and the changing environment. Brands are shared property of both the seller and the buyer and embody the relationship between the company and the environment.

In order to provide an indication of what role the brand can fulfil in strategic management, the writers initially pursue the concept of the ‘strategic reference point’. Subsequently, the strategic opinions of Porter are compared with those of Prahalad and Hamel, based on the strategic reference point placed at the centre of their theories. It will be demonstrated that the brand concept as a strategic reference point overcomes the shortcomings of both approaches and frameworks the contours of a brand based strategy.

",roland vorst,,1998.0,10.1057/bm.1998.51,Journal of Brand Management,Mosmans1998,Not available,,Nature,Not available,Brand based strategic management,39e35c110deab90c7b57cf6f4f058f1c,http://dx.doi.org/10.1057/bm.1998.51 17605,"

This paper assesses alternative auction techniques for pricing and allocating various financial instruments, such as government securities, central bank refinance credit, and foreign exchange. Before recommending appropriate formats for auctioning these items, the paper discusses basic auction formats, assessing the advantages and disadvantages of each, based on the existing, mostly theoretical, literature. It is noted that auction techniques can be usefully employed for a broad range of items and that their application is of particular relevance to the impetus in many parts of the world toward establishing market-oriented economies.

",robert feldman,,1993.0,10.2307/3867445,Staff Papers - International Monetary Fund,Feldman1993,Not available,,Nature,Not available,Auctions: Theory and Applications,5110948efc569d3a03b5f168baf1dc2a,http://dx.doi.org/10.2307/3867445 17606,"

This paper assesses alternative auction techniques for pricing and allocating various financial instruments, such as government securities, central bank refinance credit, and foreign exchange. Before recommending appropriate formats for auctioning these items, the paper discusses basic auction formats, assessing the advantages and disadvantages of each, based on the existing, mostly theoretical, literature. It is noted that auction techniques can be usefully employed for a broad range of items and that their application is of particular relevance to the impetus in many parts of the world toward establishing market-oriented economies.

",rajnish mehra,,1993.0,10.2307/3867445,Staff Papers - International Monetary Fund,Feldman1993,Not available,,Nature,Not available,Auctions: Theory and Applications,5110948efc569d3a03b5f168baf1dc2a,http://dx.doi.org/10.2307/3867445 17607,"Life is full of events that are basically games, from paying for a meal to bidding in an auction. Can incorporating a quantum strategy into the rule book increase your chances of winning? Navroz Patel reports.",navroz patel,,2007.0,10.1038/445144a,Nature,Patel2007,Not available,,Nature,Not available,Quantum games: States of play,81bc4aaaf4860e3a894159170071ab0a,http://dx.doi.org/10.1038/445144a 17608,"

This is a study of social facilitation effects in online auctions. We focus on the growth in online auctions, and the emergence of instant messaging and communication availability technologies. These two trends merge to provide a collaborative online social framework in which computer mediated communication may affect the behaviour of participants in online auctions. The interaction between buyers and sellers in traditional, face-to-face markets creates phenomena such as social facilitation, where the presence of others impacts behaviour and performance. In this study we attempt to replicate and measure social facilitation effects under the conditions of virtual presence. Does social facilitation apply to online auctions, and if so, how can it influence the design of online settings? We developed and used a simulated, Java-based Internet Dutch auction. Our findings indicate that social facilitation does indeed occur. In an experimental examination, participants improve their results and stay longer in the auction under conditions of higher virtual presence. Participants also indicate a preference for auction arrangements with higher degrees of virtual presence. Theoretically, this study contributes to the study of social facilitation, adding evidence of the effect when the presence is virtual.

",s rafaeli,,2002.0,10.1057/palgrave.ejis.3000434,European Journal of Information Systems,Rafaeli2002,Not available,,Nature,Not available,"Online auctions, messaging, communication and social facilitation: a simulation and experimental evidence",fb72591604c53101fed68384c6cf222a,http://dx.doi.org/10.1057/palgrave.ejis.3000434 17609,"

This is a study of social facilitation effects in online auctions. We focus on the growth in online auctions, and the emergence of instant messaging and communication availability technologies. These two trends merge to provide a collaborative online social framework in which computer mediated communication may affect the behaviour of participants in online auctions. The interaction between buyers and sellers in traditional, face-to-face markets creates phenomena such as social facilitation, where the presence of others impacts behaviour and performance. In this study we attempt to replicate and measure social facilitation effects under the conditions of virtual presence. Does social facilitation apply to online auctions, and if so, how can it influence the design of online settings? We developed and used a simulated, Java-based Internet Dutch auction. Our findings indicate that social facilitation does indeed occur. In an experimental examination, participants improve their results and stay longer in the auction under conditions of higher virtual presence. Participants also indicate a preference for auction arrangements with higher degrees of virtual presence. Theoretically, this study contributes to the study of social facilitation, adding evidence of the effect when the presence is virtual.

",a noy,,2002.0,10.1057/palgrave.ejis.3000434,European Journal of Information Systems,Rafaeli2002,Not available,,Nature,Not available,"Online auctions, messaging, communication and social facilitation: a simulation and experimental evidence",fb72591604c53101fed68384c6cf222a,http://dx.doi.org/10.1057/palgrave.ejis.3000434 17610,"

A generalised bidding model is developed to calculate a bidder’s expected profit and auctioners expected revenue/payment for both a General Independent Value and Independent Private Value (IPV) kmth price sealed-bid auction (where the mth bidder wins at the kth bid payment) using a linear (affine) mark-up function. The Common Value (CV) assumption, and highbid and lowbid symmetric and asymmetric First Price Auctions and Second Price Auctions are included as special cases. The optimal n bidder symmetric analytical results are then provided for the uniform IPV and CV models in equilibrium. Final comments concern implications, the assumptions involved and prospects for further research.

",martin skitmore,,2013.0,10.1057/jors.2013.163,Journal of the Operational Research Society,Skitmore2013,Not available,,Nature,Not available,kmth price sealed-bid auctions with general independent values and equilibrium linear mark-ups,9f8dd3b6f8defaf9ef5bfbdb094ddb0b,http://dx.doi.org/10.1057/jors.2013.163 17611,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",ofir turel,Brain imaging,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17612,"

The net-enabled business innovation cycle (NEBIC) model describes a path by which firms employ dynamic capabilities to leverage net-enablement. Some firms strategically aspire to follow this path in a more gradual fashion striving for business process improvements (incremental strategy) while others aspire to exploit rapidly net-enablement to achieve business innovation (leapfrogging strategy) that offers completely new market opportunities. Study results suggest that firms adopt accelerated leapfrogging strategies when faced with more severe external competitive pressures. This combined with strong leadership, a propensity to embrace internal user involvement, IT maturity, and an accommodating firm structure, as indicated by path accelerators, result in higher aspirations for business innovation. Firms shying away from leapfrogging strategies tend to protect existing customers and employees from more radical changes. These firms sometimes lacked the internal capability to enact more aggressive strategies and thus had to acquire the necessary capabilities before aspiring for business innovation.

",gary hackbarth,,2004.0,10.1057/palgrave.ejis.3000511,European Journal of Information Systems,Hackbarth2004,Not available,,Nature,Not available,Strategic aspirations for net-enabled business,023b129ef0e1654dcb12b71abb35a899,http://dx.doi.org/10.1057/palgrave.ejis.3000511 17613,"

Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions, eBay, has over 42 million users, and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming, we design algorithms for optimally bidding for a single item in an online auction, and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction, and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.

",dimitris bertsimas,,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Bertsimas2009,Not available,,Nature,Not available,Optimal bidding in online auctions,398c3382dc63cb4ad2dc9dfab0dfbdfe,http://dx.doi.org/10.1057/rpm.2008.49 17614,"

Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions, eBay, has over 42 million users, and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming, we design algorithms for optimally bidding for a single item in an online auction, and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction, and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.

",jeffrey hawkins,,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Bertsimas2009,Not available,,Nature,Not available,Optimal bidding in online auctions,398c3382dc63cb4ad2dc9dfab0dfbdfe,http://dx.doi.org/10.1057/rpm.2008.49 17615,"

Online auctions are arguably one of the most important and distinctly new applications of the Internet. The predominant player in online auctions, eBay, has over 42 million users, and it was the host of over $9.3 billion worth of goods sold just in the year 2001. Using methods from approximate dynamic programming and integer programming, we design algorithms for optimally bidding for a single item in an online auction, and in simultaneous or overlapping multiple online auctions. We report computational evidence using data from eBay's website from 1772 completed auctions for personal digital assistants and from 4208 completed auctions for stamp collections that shows that (a) the optimal dynamic policy outperforms simple but widely used static heuristic rules for a single auction, and (b) a new approach for the multiple auctions problem that uses the value functions of single auctions found by dynamic programming in an integer programming framework produces high-quality solutions fast and reliably.

",georgia perakis,,2009.0,10.1057/rpm.2008.49,Journal of Revenue and Pricing Management,Bertsimas2009,Not available,,Nature,Not available,Optimal bidding in online auctions,398c3382dc63cb4ad2dc9dfab0dfbdfe,http://dx.doi.org/10.1057/rpm.2008.49 17616,"

Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers, the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice, we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.

",e ballestero,,2005.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,Ballestero2005,Not available,,Nature,Not available,A decision approach to competitive electronic sealed-bid auctions for land,37c634b713ef3dd8f094e6f9bb4d5bd7,http://dx.doi.org/10.1057/palgrave.jors.2602097 17617,"

Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers, the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice, we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.

",c bielza,,2005.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,Ballestero2005,Not available,,Nature,Not available,A decision approach to competitive electronic sealed-bid auctions for land,37c634b713ef3dd8f094e6f9bb4d5bd7,http://dx.doi.org/10.1057/palgrave.jors.2602097 17618,"

Electronic markets for land are innovative techniques potentially advantageous to buyers and private sellers, the latter being interested in sealed-bid auctions assuring high levels of competition among many bidders so that coalitions and cooperative games are ruled out. Land electronic tendering requires sufficient online information for bidders such as valuation reports by prestigious surveyors. To help the bidder make his best choice, we propose a decision model for moderately pessimistic players facing tenders where competition among a great number of independent antagonists excludes the use of cooperative games and involves strict uncertainty. A worked example concerning farmland in Spain is presented.

",d pla-santamaria,,2005.0,10.1057/palgrave.jors.2602097,Journal of the Operational Research Society,Ballestero2005,Not available,,Nature,Not available,A decision approach to competitive electronic sealed-bid auctions for land,37c634b713ef3dd8f094e6f9bb4d5bd7,http://dx.doi.org/10.1057/palgrave.jors.2602097 17619,"

The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as sniping, whereby some bidders may wait until the last possible moment before bidding, thereby depriving other bidders of the opportunity to respond and also preventing sellers from obtaining the highest price for an item. This is especially true in the case of the commonly used second-price, fixed-deadline auction. We consider a procedure involving a randomly determined stopping time and show that this approach eliminates the potential benefits to a sniper. The scheme enables all bidders to compete more fairly and promotes an early bidding strategy, which is likely to increase the price received by the seller while providing adequate bidding opportunities for would-be buyers.

",r malaga,,2009.0,10.1057/jors.2009.79,Journal of the Operational Research Society,Malaga2009,Not available,,Nature,Not available,A new end-of-auction model for curbing sniping,7eec756707b7af39efaf1116ddab2307,http://dx.doi.org/10.1057/jors.2009.79 17620,"

The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as sniping, whereby some bidders may wait until the last possible moment before bidding, thereby depriving other bidders of the opportunity to respond and also preventing sellers from obtaining the highest price for an item. This is especially true in the case of the commonly used second-price, fixed-deadline auction. We consider a procedure involving a randomly determined stopping time and show that this approach eliminates the potential benefits to a sniper. The scheme enables all bidders to compete more fairly and promotes an early bidding strategy, which is likely to increase the price received by the seller while providing adequate bidding opportunities for would-be buyers.

",d porter,,2009.0,10.1057/jors.2009.79,Journal of the Operational Research Society,Malaga2009,Not available,,Nature,Not available,A new end-of-auction model for curbing sniping,7eec756707b7af39efaf1116ddab2307,http://dx.doi.org/10.1057/jors.2009.79 17621,"

The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as sniping, whereby some bidders may wait until the last possible moment before bidding, thereby depriving other bidders of the opportunity to respond and also preventing sellers from obtaining the highest price for an item. This is especially true in the case of the commonly used second-price, fixed-deadline auction. We consider a procedure involving a randomly determined stopping time and show that this approach eliminates the potential benefits to a sniper. The scheme enables all bidders to compete more fairly and promotes an early bidding strategy, which is likely to increase the price received by the seller while providing adequate bidding opportunities for would-be buyers.

",k ord,,2009.0,10.1057/jors.2009.79,Journal of the Operational Research Society,Malaga2009,Not available,,Nature,Not available,A new end-of-auction model for curbing sniping,7eec756707b7af39efaf1116ddab2307,http://dx.doi.org/10.1057/jors.2009.79 17622,"

The online auction market has been growing at a spectacular rate. Most auctions are open-bid auctions where all the participants know the current highest bid. This knowledge has led to a phenomenon known as sniping, whereby some bidders may wait until the last possible moment before bidding, thereby depriving other bidders of the opportunity to respond and also preventing sellers from obtaining the highest price for an item. This is especially true in the case of the commonly used second-price, fixed-deadline auction. We consider a procedure involving a randomly determined stopping time and show that this approach eliminates the potential benefits to a sniper. The scheme enables all bidders to compete more fairly and promotes an early bidding strategy, which is likely to increase the price received by the seller while providing adequate bidding opportunities for would-be buyers.

",b montano,,2009.0,10.1057/jors.2009.79,Journal of the Operational Research Society,Malaga2009,Not available,,Nature,Not available,A new end-of-auction model for curbing sniping,7eec756707b7af39efaf1116ddab2307,http://dx.doi.org/10.1057/jors.2009.79 17623,"

The net-enabled business innovation cycle (NEBIC) model describes a path by which firms employ dynamic capabilities to leverage net-enablement. Some firms strategically aspire to follow this path in a more gradual fashion striving for business process improvements (incremental strategy) while others aspire to exploit rapidly net-enablement to achieve business innovation (leapfrogging strategy) that offers completely new market opportunities. Study results suggest that firms adopt accelerated leapfrogging strategies when faced with more severe external competitive pressures. This combined with strong leadership, a propensity to embrace internal user involvement, IT maturity, and an accommodating firm structure, as indicated by path accelerators, result in higher aspirations for business innovation. Firms shying away from leapfrogging strategies tend to protect existing customers and employees from more radical changes. These firms sometimes lacked the internal capability to enact more aggressive strategies and thus had to acquire the necessary capabilities before aspiring for business innovation.

",william kettinger,,2004.0,10.1057/palgrave.ejis.3000511,European Journal of Information Systems,Hackbarth2004,Not available,,Nature,Not available,Strategic aspirations for net-enabled business,023b129ef0e1654dcb12b71abb35a899,http://dx.doi.org/10.1057/palgrave.ejis.3000511 17624,"

INTRODUCTION The reliance on hypothetical choices raises obvious questions regarding the validity of the method and the generalizability of the results. By default, the method of hypothetical choices emerges as the simplest procedure by which a large number of theoretical questions can be investigated.

",mark gillis,,2007.0,10.1057/eej.2007.37,Eastern Economic Journal,Gillis2007,Not available,,Nature,Not available,Hypothetical and Real Incentives in the Ultimatum Game and Andreoni's Public Goods Game: An Experimental Study,f61f1feb8d43e9f2386b5a6ccb9645f0,http://dx.doi.org/10.1057/eej.2007.37 17625,"

INTRODUCTION The reliance on hypothetical choices raises obvious questions regarding the validity of the method and the generalizability of the results. By default, the method of hypothetical choices emerges as the simplest procedure by which a large number of theoretical questions can be investigated.

",paul hettler,,2007.0,10.1057/eej.2007.37,Eastern Economic Journal,Gillis2007,Not available,,Nature,Not available,Hypothetical and Real Incentives in the Ultimatum Game and Andreoni's Public Goods Game: An Experimental Study,f61f1feb8d43e9f2386b5a6ccb9645f0,http://dx.doi.org/10.1057/eej.2007.37 17626,"

Understanding human cooperation is of major interest across the natural and social sciences. But it is unclear to what extent cooperation is actually a general concept. Most research on cooperation has implicitly assumed that a person’s behaviour in one cooperative context is related to their behaviour in other settings, and at later times. However, there is little empirical evidence in support of this assumption. Here, we provide such evidence by collecting thousands of game decisions from over 1,400 individuals. A person’s decisions in different cooperation games are correlated, as are those decisions and both self-report and real-effort measures of cooperation in non-game contexts. Equally strong correlations exist between cooperative decisions made an average of 124 days apart. Importantly, we find that cooperation is not correlated with norm-enforcing punishment or non-competitiveness. We conclude that there is a domain-general and temporally stable inclination towards paying costs to benefit others, which we dub the ‘cooperative phenotype’.

",alexander peysakhovich,,2014.0,10.1038/ncomms5939,Nature Communications,Peysakhovich2014,Not available,,Nature,Not available,Humans display a ‘cooperative phenotype’ that is domain general and temporally stable,b2cd3f88065ce7140d334a1b9882c192,http://dx.doi.org/10.1038/ncomms5939 17627,"

Understanding human cooperation is of major interest across the natural and social sciences. But it is unclear to what extent cooperation is actually a general concept. Most research on cooperation has implicitly assumed that a person’s behaviour in one cooperative context is related to their behaviour in other settings, and at later times. However, there is little empirical evidence in support of this assumption. Here, we provide such evidence by collecting thousands of game decisions from over 1,400 individuals. A person’s decisions in different cooperation games are correlated, as are those decisions and both self-report and real-effort measures of cooperation in non-game contexts. Equally strong correlations exist between cooperative decisions made an average of 124 days apart. Importantly, we find that cooperation is not correlated with norm-enforcing punishment or non-competitiveness. We conclude that there is a domain-general and temporally stable inclination towards paying costs to benefit others, which we dub the ‘cooperative phenotype’.

",martin nowak,,2014.0,10.1038/ncomms5939,Nature Communications,Peysakhovich2014,Not available,,Nature,Not available,Humans display a ‘cooperative phenotype’ that is domain general and temporally stable,b2cd3f88065ce7140d334a1b9882c192,http://dx.doi.org/10.1038/ncomms5939 17628,"

Understanding human cooperation is of major interest across the natural and social sciences. But it is unclear to what extent cooperation is actually a general concept. Most research on cooperation has implicitly assumed that a person’s behaviour in one cooperative context is related to their behaviour in other settings, and at later times. However, there is little empirical evidence in support of this assumption. Here, we provide such evidence by collecting thousands of game decisions from over 1,400 individuals. A person’s decisions in different cooperation games are correlated, as are those decisions and both self-report and real-effort measures of cooperation in non-game contexts. Equally strong correlations exist between cooperative decisions made an average of 124 days apart. Importantly, we find that cooperation is not correlated with norm-enforcing punishment or non-competitiveness. We conclude that there is a domain-general and temporally stable inclination towards paying costs to benefit others, which we dub the ‘cooperative phenotype’.

",david rand,,2014.0,10.1038/ncomms5939,Nature Communications,Peysakhovich2014,Not available,,Nature,Not available,Humans display a ‘cooperative phenotype’ that is domain general and temporally stable,b2cd3f88065ce7140d334a1b9882c192,http://dx.doi.org/10.1038/ncomms5939 17629,"

Network traffic in mobile networks has grown exponentially in recent years which lead to increasing congestion, especially in data services. A pricing network resource could help resolve congestion and potentially increase revenue. However, determining the suitable congestion prices that optimise both performance and revenue of the networks could be challenging. This paper presents an auction-based pricing model that is used as an admission control mechanism for mobile data services. The proposed modelling approach allows mobile operators to improve performance of mobile data services and optimise network revenue by adjusting the reserve prices of the revenue-maximising auction (optimal auction). The paper presents numerical and simulation results illustrating the impact of the auction reserve prices on both network performance and operator's revenue. The methodology for identifying the suitable auction reserve prices for our application is also investigated.

",saravut yaipairoj,,2006.0,10.1057/palgrave.rpm.5160022,Journal of Revenue and Pricing Management,Yaipairoj2006,Not available,,Nature,Not available,An Auction-based pricing model for performance and revenue optimisation in mobile data services,6770c648448594cef8f2e7eaeb24cf9d,http://dx.doi.org/10.1057/palgrave.rpm.5160022 17630,"

Network traffic in mobile networks has grown exponentially in recent years which lead to increasing congestion, especially in data services. A pricing network resource could help resolve congestion and potentially increase revenue. However, determining the suitable congestion prices that optimise both performance and revenue of the networks could be challenging. This paper presents an auction-based pricing model that is used as an admission control mechanism for mobile data services. The proposed modelling approach allows mobile operators to improve performance of mobile data services and optimise network revenue by adjusting the reserve prices of the revenue-maximising auction (optimal auction). The paper presents numerical and simulation results illustrating the impact of the auction reserve prices on both network performance and operator's revenue. The methodology for identifying the suitable auction reserve prices for our application is also investigated.

",fotios harmantzis,,2006.0,10.1057/palgrave.rpm.5160022,Journal of Revenue and Pricing Management,Yaipairoj2006,Not available,,Nature,Not available,An Auction-based pricing model for performance and revenue optimisation in mobile data services,6770c648448594cef8f2e7eaeb24cf9d,http://dx.doi.org/10.1057/palgrave.rpm.5160022 17631,"

The paper finds strong evidence that real currency demand in Mexico remained stable throughout and after the financial crisis in Mexico. Cointegration analysis using the Johansen-Juselius technique indicates a strong cointegration relationship between real currency balances, real private consumption expenditures, and the interest rate. The dynamic model for real currency demand exhibits significant parameter constancy even after the financial crisis as indicated by a number of statistical tests. The paper concludes that the significant reduction in real currency demand under the financial crisis in Mexico could be appropriately explained by the change in the variables that historically explained the demand for real cash balances in Mexico. This result supports the Bank of Mexico's use of a reserve money program to implement monetary policy under the financial crisis.

",may khamis,,2001.0,10.2307/4621673,IMF Staff Papers,Khamis2001,Not available,,Nature,Not available,Can Currency Demand Be Stable under a Financial Crisis? The Case of Mexico,71243225ecb9bae9d8110903e34342e1,http://dx.doi.org/10.2307/4621673 17632,"

The paper finds strong evidence that real currency demand in Mexico remained stable throughout and after the financial crisis in Mexico. Cointegration analysis using the Johansen-Juselius technique indicates a strong cointegration relationship between real currency balances, real private consumption expenditures, and the interest rate. The dynamic model for real currency demand exhibits significant parameter constancy even after the financial crisis as indicated by a number of statistical tests. The paper concludes that the significant reduction in real currency demand under the financial crisis in Mexico could be appropriately explained by the change in the variables that historically explained the demand for real cash balances in Mexico. This result supports the Bank of Mexico's use of a reserve money program to implement monetary policy under the financial crisis.

",alfredo leone,,2001.0,10.2307/4621673,IMF Staff Papers,Khamis2001,Not available,,Nature,Not available,Can Currency Demand Be Stable under a Financial Crisis? The Case of Mexico,71243225ecb9bae9d8110903e34342e1,http://dx.doi.org/10.2307/4621673 17633,"By analyzing previously overlooked fossils and by taking a second look at some old finds, paleontologists are providing the first glimpses of the actual behavior of the tyrannosaurs",gregory erickson,,1999.0,10.1038/scientificamerican0999-42,Scientific American,Erickson1999,Not available,,Nature,Not available,Breathing Life into Tyrannosaurus rex,5c5aa588940da06dc02e8b0bc4d1ea3d,http://dx.doi.org/10.1038/scientificamerican0999-42 17634,"

Nathan P. Myhrvold leans back in his chair, arms folded behind his head, legs stretched out.

",elizabeth corcoran,,1993.0,10.1038/scientificamerican0293-34,Scientific American,Corcoran1993,Not available,,Nature,Not available,The Physicist as a Young Businessman,c85e5cec6c4053aaeef0d8513d683643,http://dx.doi.org/10.1038/scientificamerican0293-34 17635,"By analyzing previously overlooked fossils and by taking a second look at some old finds, paleontologists are providing the first glimpses of the actual behavior of the tyrannosaurs",gregory erickson,,2004.0,10.1038/scientificamerican0304-22sp,Scientific American,Erickson2004,Not available,,Nature,Not available,Breathing Life into Tyrannosaurus Rex,9d71adc2b9e72f47c9e2d7c4418df523,http://dx.doi.org/10.1038/scientificamerican0304-22sp 17636,"

The different economic performance of transitioning Asia versus Central and Eastern Europe and the FSU (CEEFSU) has been arguably the most salient fact of transition. Particularly remarkable has been the contrast between China and Russia. This paper argues that the contrasting experiences of China and Russia can in part be explained by the different roles that governments have played in the transition process of these countries. China gave priority to administrative reform, aligned bureaucratic incentives at all levels with growth and development objectives, and enhanced enterprise and local autonomy while preserving the capacity of the centre to exercise control. This approach transformed government bodies into real owners of the reform process and led to privatisation over time that was largely welfare enhancing. Russia, on the contrary gave priority to economic over state restructuring. Major reforms including mass privatisation were implemented in an environment of a weak state, which did not have the capacity to protect its ownership rights and coordinate reforms. As a result, privatisation was a wasteful process associated with asset stripping and consequently with lack of legitimacy of newly established property rights. These contrasting experiences carry broader lessons for the role of the government in large-scale complex reforms.

",jeffrey miller,,2007.0,10.1057/palgrave.ces.8100230,Comparative Economic Studies,Miller2007,Not available,,Nature,Not available,On the Role of Government in Transition: The Experiences of China and Russia Compared,f0e40ab63d972b0531c1a83478e3d658,http://dx.doi.org/10.1057/palgrave.ces.8100230 17637,"

The different economic performance of transitioning Asia versus Central and Eastern Europe and the FSU (CEEFSU) has been arguably the most salient fact of transition. Particularly remarkable has been the contrast between China and Russia. This paper argues that the contrasting experiences of China and Russia can in part be explained by the different roles that governments have played in the transition process of these countries. China gave priority to administrative reform, aligned bureaucratic incentives at all levels with growth and development objectives, and enhanced enterprise and local autonomy while preserving the capacity of the centre to exercise control. This approach transformed government bodies into real owners of the reform process and led to privatisation over time that was largely welfare enhancing. Russia, on the contrary gave priority to economic over state restructuring. Major reforms including mass privatisation were implemented in an environment of a weak state, which did not have the capacity to protect its ownership rights and coordinate reforms. As a result, privatisation was a wasteful process associated with asset stripping and consequently with lack of legitimacy of newly established property rights. These contrasting experiences carry broader lessons for the role of the government in large-scale complex reforms.

",stoyan tenev,,2007.0,10.1057/palgrave.ces.8100230,Comparative Economic Studies,Miller2007,Not available,,Nature,Not available,On the Role of Government in Transition: The Experiences of China and Russia Compared,f0e40ab63d972b0531c1a83478e3d658,http://dx.doi.org/10.1057/palgrave.ces.8100230 17638,"

The field of time preference is developing rapidly. It concerns important concepts for many economic issues. One important domain of application is health economics. This paper reviews several empirical and theoretical developments for time preference with special attention to the health economics field. In addition, the implications for medical decision making, long-term health-care planning and health economic evaluation are discussed. Recognition of this empirical evidence in health-care policy making is recommended, as well as a more transparent process of the framing and analysis of, and deliberation on, public policy.

",a attema,,2011.0,10.1057/jors.2011.137,Journal of the Operational Research Society,Attema2011,Not available,,Nature,Not available,Developments in time preference and their implications for medical decision making,a8b6aff719ec1ff5ab9b26ff7679148c,http://dx.doi.org/10.1057/jors.2011.137 17640,"

This article considers the regulatory issues raised by the increased use of credit default swaps (CDSs). It argues that the current extensive over-the-counter trading of CDSs raises problems in terms of the opacity of risk, misaligned incentives in the event of default by reference entities, and concentrations of counterparty risk, each of which requires addressing. Among the proposals discussed are the standardisation of CDSs, the use of central counterparties, the introduction of exchange trading of CDSs, the imposition of capital penalties on bespoke CDSs or mandatory collateralisation, limiting the extent to which CDSs can be used to hedge a position fully, the prohibition of naked CDS protection and the introduction of large exposure counterparty limits. The article concludes that while standardisation and exchange trading of CDSs should be promoted, mandatory collateralisation is preferable to the use of capital penalties. Naked CDS protection buying should be prohibited unless measures can be put in place to ensure that it does not have adverse effects in the event of default by reference entities. Systemic risk in the CDS markets should be addressed through the introduction of large exposure counterparty limits.

",david mcilroy,,2010.0,10.1057/jbr.2010.14,Journal of Banking Regulation,McIlroy2010,Not available,,Nature,Not available,The regulatory issues raised by credit default swaps,ed06437d6af179e3e0a453b0163971ac,http://dx.doi.org/10.1057/jbr.2010.14 17641,"

The current financial crisis has been the key global economic event since it unfolded in earnest in early August 2007. The Federal Reserve has taken aggressive actions—both conventional and unconventional—to counteract the economic and financial fallout. Among these actions have been a number of new special lending programs created under section 13(3) of the Federal Reserve Act, which had not been employed since the 1930s. Academics, policymakers, and the general public have shown great interest in the Federal Reserve's new programs. In this paper, I emphasize two medium-term risks that the Federal Reserve now faces as it continues to confront financial market turmoil and recession. The two medium-term risks are opposites of each other, a “two-headed dragon.” One is a Japanese-style deflation trap, and the other is a breakout of inflation like that seen during the 1970s. An explicit inflation target would help mitigate these very real risks.

",james bullard,,2009.0,10.1057/be.2009.5,Business Economics,Bullard2009,Not available,,Nature,Not available,A Two-Headed Dragon for Monetary Policy,2a8e835a760acce336c3f19967b412a6,http://dx.doi.org/10.1057/be.2009.5 17642,"

This article presents a comparative study of two contrasting approaches for modeling the yard crane scheduling problem: centralized and decentralized. It seeks to assess their relative performances and factors that affect their performances. Our analysis shows that the centralized approach outperforms the decentralized approach by 16.5 per cent on average, due to having complete and accurate information about future truck arrivals. While it underperforms the centralized, the decentralized approach can dynamically adapt to real-time truck arrivals, making it better suited for real-life operations. Overall, our analysis suggests that the two approaches offer complementary features that could be integrated into a hybrid approach.

",omor sharif,,2012.0,10.1057/mel.2012.1,Maritime Economics & Logistics,Sharif2012,Not available,,Nature,Not available,Yard crane scheduling at container terminals: A comparative study of centralized and decentralized approaches,3fb6a6ae86427b531964a83605d03415,http://dx.doi.org/10.1057/mel.2012.1 17643,"

This article presents a comparative study of two contrasting approaches for modeling the yard crane scheduling problem: centralized and decentralized. It seeks to assess their relative performances and factors that affect their performances. Our analysis shows that the centralized approach outperforms the decentralized approach by 16.5 per cent on average, due to having complete and accurate information about future truck arrivals. While it underperforms the centralized, the decentralized approach can dynamically adapt to real-time truck arrivals, making it better suited for real-life operations. Overall, our analysis suggests that the two approaches offer complementary features that could be integrated into a hybrid approach.

",nathan huynh,,2012.0,10.1057/mel.2012.1,Maritime Economics & Logistics,Sharif2012,Not available,,Nature,Not available,Yard crane scheduling at container terminals: A comparative study of centralized and decentralized approaches,3fb6a6ae86427b531964a83605d03415,http://dx.doi.org/10.1057/mel.2012.1 17644,"Economists are finding that social concerns often trump selfishness in financial decision making, a view that helps to explain why tens of millions of people send money to strangers they find on the Internet",christoph uhlhaas,,2007.0,10.1038/scientificamericanmind0807-60,Scientific American Mind,Uhlhaas2007,Not available,,Nature,Not available,Is Greed Good?,24482a8071c94ab30dc527248d05b463,http://dx.doi.org/10.1038/scientificamericanmind0807-60 17645,"

Recently, interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however, most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally, the performances of some algorithms are more sensitive to strategic bidding than others.

",m iftekhar,,2012.0,10.1057/jors.2012.121,Journal of the Operational Research Society,Iftekhar2012,Not available,,Nature,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,84d9cb592e20cba918c2e0226b9d2a9d,http://dx.doi.org/10.1057/jors.2012.121 17646,"

Recently, interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however, most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally, the performances of some algorithms are more sensitive to strategic bidding than others.

",a hailu,,2012.0,10.1057/jors.2012.121,Journal of the Operational Research Society,Iftekhar2012,Not available,,Nature,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,84d9cb592e20cba918c2e0226b9d2a9d,http://dx.doi.org/10.1057/jors.2012.121 17647,"

Recently, interest in combinatorial auctions has extended to include trade in multiple units of heterogeneous items. Combinatorial bidding is complex and iterative auctions are used to allow bidders to sequentially express their preferences with the aid of auction market information provided in the form of price feedbacks. There are different competing designs for the provision of item price feedbacks; however, most of these have not been thoroughly studied for multiple unit combinatorial auctions. This paper focuses on addressing this gap by evaluating several feedback schemes or algorithms in the context of multiple unit auctions. We numerically evaluate these algorithms under different scenarios that vary in bidder package selection strategies and in the degree of competition. We observe that auction outcomes are best when bidders use a naïve bidding strategy and competition is strong. Performance deteriorates significantly when bidders strategically select packages to maximize their profit. Finally, the performances of some algorithms are more sensitive to strategic bidding than others.

",r lindner,,2012.0,10.1057/jors.2012.121,Journal of the Operational Research Society,Iftekhar2012,Not available,,Nature,Not available,Choice of item pricing feedback schemes for multiple unit reverse combinatorial auctions,84d9cb592e20cba918c2e0226b9d2a9d,http://dx.doi.org/10.1057/jors.2012.121 17648,"

Transport companies may cooperate to increase their efficiency levels by, for example, the exchange of orders or vehicle capacity. In this paper a new approach to horizontal carrier collaboration is presented: the sharing of distribution centres (DCs) with partnering organisations. This problem can be classified as a cooperative facility location problem and formulated as an innovative mixed integer linear programme. To ensure cooperation sustainability, collaborative costs need to be allocated fairly to the different participants. To analyse the benefits of cooperative facility location and the effects of different cost allocation techniques, numerical experiments based on experimental design are carried out on a UK case study. Sharing DCs may lead to significant cost savings up to 21.6%. In contrast to the case of sharing orders or vehicles, there are diseconomies of scale in terms of the number of partners and more collaborative benefit can be expected when partners are unequal in size. Moreover, results indicate that horizontal collaboration at the level of DCs works well with a limited number of partners and can be based on intuitively appealing cost sharing techniques, which may reduce alliance complexity and enforce the strength of mutual partner relationships.

",lotte verdonck,,2016.0,10.1057/jors.2015.106,Journal of the Operational Research Society,Verdonck2016,Not available,,Nature,Not available,Analysis of collaborative savings and cost allocation techniques for the cooperative carrier facility location problem,4bb1c4d6b9d88556b3bd313e8dd77276,http://dx.doi.org/10.1057/jors.2015.106 17649,"

Transport companies may cooperate to increase their efficiency levels by, for example, the exchange of orders or vehicle capacity. In this paper a new approach to horizontal carrier collaboration is presented: the sharing of distribution centres (DCs) with partnering organisations. This problem can be classified as a cooperative facility location problem and formulated as an innovative mixed integer linear programme. To ensure cooperation sustainability, collaborative costs need to be allocated fairly to the different participants. To analyse the benefits of cooperative facility location and the effects of different cost allocation techniques, numerical experiments based on experimental design are carried out on a UK case study. Sharing DCs may lead to significant cost savings up to 21.6%. In contrast to the case of sharing orders or vehicles, there are diseconomies of scale in terms of the number of partners and more collaborative benefit can be expected when partners are unequal in size. Moreover, results indicate that horizontal collaboration at the level of DCs works well with a limited number of partners and can be based on intuitively appealing cost sharing techniques, which may reduce alliance complexity and enforce the strength of mutual partner relationships.

",patrick beullens,,2016.0,10.1057/jors.2015.106,Journal of the Operational Research Society,Verdonck2016,Not available,,Nature,Not available,Analysis of collaborative savings and cost allocation techniques for the cooperative carrier facility location problem,4bb1c4d6b9d88556b3bd313e8dd77276,http://dx.doi.org/10.1057/jors.2015.106 17650,"

Transport companies may cooperate to increase their efficiency levels by, for example, the exchange of orders or vehicle capacity. In this paper a new approach to horizontal carrier collaboration is presented: the sharing of distribution centres (DCs) with partnering organisations. This problem can be classified as a cooperative facility location problem and formulated as an innovative mixed integer linear programme. To ensure cooperation sustainability, collaborative costs need to be allocated fairly to the different participants. To analyse the benefits of cooperative facility location and the effects of different cost allocation techniques, numerical experiments based on experimental design are carried out on a UK case study. Sharing DCs may lead to significant cost savings up to 21.6%. In contrast to the case of sharing orders or vehicles, there are diseconomies of scale in terms of the number of partners and more collaborative benefit can be expected when partners are unequal in size. Moreover, results indicate that horizontal collaboration at the level of DCs works well with a limited number of partners and can be based on intuitively appealing cost sharing techniques, which may reduce alliance complexity and enforce the strength of mutual partner relationships.

",an caris,,2016.0,10.1057/jors.2015.106,Journal of the Operational Research Society,Verdonck2016,Not available,,Nature,Not available,Analysis of collaborative savings and cost allocation techniques for the cooperative carrier facility location problem,4bb1c4d6b9d88556b3bd313e8dd77276,http://dx.doi.org/10.1057/jors.2015.106 17651,"

Transport companies may cooperate to increase their efficiency levels by, for example, the exchange of orders or vehicle capacity. In this paper a new approach to horizontal carrier collaboration is presented: the sharing of distribution centres (DCs) with partnering organisations. This problem can be classified as a cooperative facility location problem and formulated as an innovative mixed integer linear programme. To ensure cooperation sustainability, collaborative costs need to be allocated fairly to the different participants. To analyse the benefits of cooperative facility location and the effects of different cost allocation techniques, numerical experiments based on experimental design are carried out on a UK case study. Sharing DCs may lead to significant cost savings up to 21.6%. In contrast to the case of sharing orders or vehicles, there are diseconomies of scale in terms of the number of partners and more collaborative benefit can be expected when partners are unequal in size. Moreover, results indicate that horizontal collaboration at the level of DCs works well with a limited number of partners and can be based on intuitively appealing cost sharing techniques, which may reduce alliance complexity and enforce the strength of mutual partner relationships.

",katrien ramaekers,,2016.0,10.1057/jors.2015.106,Journal of the Operational Research Society,Verdonck2016,Not available,,Nature,Not available,Analysis of collaborative savings and cost allocation techniques for the cooperative carrier facility location problem,4bb1c4d6b9d88556b3bd313e8dd77276,http://dx.doi.org/10.1057/jors.2015.106 17652,"

Transport companies may cooperate to increase their efficiency levels by, for example, the exchange of orders or vehicle capacity. In this paper a new approach to horizontal carrier collaboration is presented: the sharing of distribution centres (DCs) with partnering organisations. This problem can be classified as a cooperative facility location problem and formulated as an innovative mixed integer linear programme. To ensure cooperation sustainability, collaborative costs need to be allocated fairly to the different participants. To analyse the benefits of cooperative facility location and the effects of different cost allocation techniques, numerical experiments based on experimental design are carried out on a UK case study. Sharing DCs may lead to significant cost savings up to 21.6%. In contrast to the case of sharing orders or vehicles, there are diseconomies of scale in terms of the number of partners and more collaborative benefit can be expected when partners are unequal in size. Moreover, results indicate that horizontal collaboration at the level of DCs works well with a limited number of partners and can be based on intuitively appealing cost sharing techniques, which may reduce alliance complexity and enforce the strength of mutual partner relationships.

",gerrit janssens,,2016.0,10.1057/jors.2015.106,Journal of the Operational Research Society,Verdonck2016,Not available,,Nature,Not available,Analysis of collaborative savings and cost allocation techniques for the cooperative carrier facility location problem,4bb1c4d6b9d88556b3bd313e8dd77276,http://dx.doi.org/10.1057/jors.2015.106 17653,"

A local electricity distribution company (LDC) can reduce its exposure to the inherent risks of spot-price volatility and uncertain future demand via forward contracts. Management's problem is to determine the optimal forward-contract purchase. We propose a practical three-stage approach for dealing with the problem. The first stage determines an optimal purchase by solving a cost-constrained risk-minimization problem. The second stage derives the efficient frontier of tradeoffs between expected cost and cost risk from the first-stage solution, at various bounds on the expected cost. The optimal solution is found by melding the frontier with management's risk preferences. In the third stage, the model's parameters are estimated from data typically available to an LDC and used to determine its forward-contract purchase.

",c-k woo,,2004.0,10.1057/palgrave.jors.2601769,Journal of the Operational Research Society,Woo2004,Not available,,Nature,Not available,The efficient frontier for spot and forward purchases: an application to electricity,506d88df0a3bfd2482ddddfe94512aaf,http://dx.doi.org/10.1057/palgrave.jors.2601769 17654,"

To many researchers and practitioners in China, revenue management (RM) was not a familiar term until the beginning of the last decade. As the nation's economy is booming at an unprecedented pace, its service sector has grown rapidly. Managing perishable products, which are commonly seen in service industries, is becoming a frequently faced issue in business practice. Research on and applications of RM in China are drawing increasing attention in both academia and industry. This paper surveys the latest development of RM in China. Although from a theoretical and practical point of view research on RM is fairly new and much behind what is needed, the momentum and potential are visible. The broad spectrum of its application has generated various front-line research problems that will enrich the field.

",wei yang,,2008.0,10.1057/rpm.2008.33,Journal of Revenue and Pricing Management,Yang2008,Not available,,Nature,Not available,Revenue management in China: An industry and research overview,026b90150f0fb6fb0fcfd9ba0cd37115,http://dx.doi.org/10.1057/rpm.2008.33 17655,"

To many researchers and practitioners in China, revenue management (RM) was not a familiar term until the beginning of the last decade. As the nation's economy is booming at an unprecedented pace, its service sector has grown rapidly. Managing perishable products, which are commonly seen in service industries, is becoming a frequently faced issue in business practice. Research on and applications of RM in China are drawing increasing attention in both academia and industry. This paper surveys the latest development of RM in China. Although from a theoretical and practical point of view research on RM is fairly new and much behind what is needed, the momentum and potential are visible. The broad spectrum of its application has generated various front-line research problems that will enrich the field.

",xiutian shi,,2008.0,10.1057/rpm.2008.33,Journal of Revenue and Pricing Management,Yang2008,Not available,,Nature,Not available,Revenue management in China: An industry and research overview,026b90150f0fb6fb0fcfd9ba0cd37115,http://dx.doi.org/10.1057/rpm.2008.33 17656,"

To many researchers and practitioners in China, revenue management (RM) was not a familiar term until the beginning of the last decade. As the nation's economy is booming at an unprecedented pace, its service sector has grown rapidly. Managing perishable products, which are commonly seen in service industries, is becoming a frequently faced issue in business practice. Research on and applications of RM in China are drawing increasing attention in both academia and industry. This paper surveys the latest development of RM in China. Although from a theoretical and practical point of view research on RM is fairly new and much behind what is needed, the momentum and potential are visible. The broad spectrum of its application has generated various front-line research problems that will enrich the field.

",baichun xiao,,2008.0,10.1057/rpm.2008.33,Journal of Revenue and Pricing Management,Yang2008,Not available,,Nature,Not available,Revenue management in China: An industry and research overview,026b90150f0fb6fb0fcfd9ba0cd37115,http://dx.doi.org/10.1057/rpm.2008.33 17657,"

To many researchers and practitioners in China, revenue management (RM) was not a familiar term until the beginning of the last decade. As the nation's economy is booming at an unprecedented pace, its service sector has grown rapidly. Managing perishable products, which are commonly seen in service industries, is becoming a frequently faced issue in business practice. Research on and applications of RM in China are drawing increasing attention in both academia and industry. This paper surveys the latest development of RM in China. Although from a theoretical and practical point of view research on RM is fairly new and much behind what is needed, the momentum and potential are visible. The broad spectrum of its application has generated various front-line research problems that will enrich the field.

",youyi feng,,2008.0,10.1057/rpm.2008.33,Journal of Revenue and Pricing Management,Yang2008,Not available,,Nature,Not available,Revenue management in China: An industry and research overview,026b90150f0fb6fb0fcfd9ba0cd37115,http://dx.doi.org/10.1057/rpm.2008.33 17658,"

For the average personal traveler, airfare pricing has some peculiar and unpredictable features. These features may unnecessarily complicate matters for customers in their decision making over whether to purchase a given ticket or not. The objective of this article is to raise the issue whether airlines potentially could be better off by sharing explicitly with their customers what causes these peculiarities. For instance, one scenario could be that when a customer receives an airfare quote they are also provided information regarding, say, the booking curve, the forecast demand and the marginal value of the seat. The purpose of the article is not to provide an in-depth analysis or indisputable conclusion on the topic, but rather to bring the issue to light and comment on a few facets.

",fredrik odegaard,,2014.0,10.1057/rpm.2014.35,Journal of Revenue and Pricing Management,Ødegaard2014,Not available,,Nature,Not available,Better informed customers for improved revenue management?,d40900077a8ec2a9f3fde024e750e74e,http://dx.doi.org/10.1057/rpm.2014.35 17659,"

In the traditional lot sentencing rule, a buyer arrives to one of two decisions regarding lot disposition; either accept or reject a lot. However, it is more appropriate to consider choices between those two extreme decisions. A clear case where the traditional lot sentencing rule is not flexible is when a buyer purchases a lot from an English auction. In this paper, we propose a model that helps a buyer in estimating the value of a production lot. This model can be used by a bidder before the bidding process starts to estimate the value of an auctioned lot. The model provides an action plan that includes the estimated acquisition cost as a function of the number of defective items found in a random sample. Unlike the traditional lot sentencing rule, the proposed rule is more flexible and provides buyers with wider range of possible actions.

",mohammed darwish,,2016.0,10.1057/jors.2015.112,Journal of the Operational Research Society,Darwish2016,Not available,,Nature,Not available,Generalized lot sentencing rule for estimating the value of production lot for sale,8a052b36089bac00e4a73c3b0adfc573,http://dx.doi.org/10.1057/jors.2015.112 17660,"

In the traditional lot sentencing rule, a buyer arrives to one of two decisions regarding lot disposition; either accept or reject a lot. However, it is more appropriate to consider choices between those two extreme decisions. A clear case where the traditional lot sentencing rule is not flexible is when a buyer purchases a lot from an English auction. In this paper, we propose a model that helps a buyer in estimating the value of a production lot. This model can be used by a bidder before the bidding process starts to estimate the value of an auctioned lot. The model provides an action plan that includes the estimated acquisition cost as a function of the number of defective items found in a random sample. Unlike the traditional lot sentencing rule, the proposed rule is more flexible and provides buyers with wider range of possible actions.

",fawaz abdulmalek,,2016.0,10.1057/jors.2015.112,Journal of the Operational Research Society,Darwish2016,Not available,,Nature,Not available,Generalized lot sentencing rule for estimating the value of production lot for sale,8a052b36089bac00e4a73c3b0adfc573,http://dx.doi.org/10.1057/jors.2015.112 17661,"

Understanding the various variables that influence the success of eBay auctions has recently received much interest from academic researchers. Most studies concentrate on the effects of auction characteristics on the success of eBay auctions. A few studies identify consumer demographics that help predict the likelihood of consumers participating in eBay auctions. To date, however, no study has attempted to identify consumer personality traits, values and attitudes that may help predict whether or not a consumer will participate in eBay purchasing. This study examines a set of consumer demographics, values, attitudes and personality traits to assess these variables’ impact on eBay participation by consumers. Findings indicate that a consumer's family size and consumption motivation have an impact on their participation in eBay. Also this study finds that eBay consumers have a more positive attitude towards eBay than do eBay nonconsumers.

",gregory black,,2007.0,10.1057/palgrave.dddmp.4350066,"Journal of Direct, Data and Digital Marketing Practice",Black2007,Not available,,Nature,Not available,A comparison of the characteristics of eBay consumers and eBay nonconsumers,ff029f8361ba7e4e6a7e6b50df1fd5b1,http://dx.doi.org/10.1057/palgrave.dddmp.4350066 17662,"

The market for modern Indian art is an emerging art market, having come into a proper existence only in the late 1990s. This market saw tremendous growth in its initial years, then a downturn that started around 2007–2008. Using data from auctions conducted by a major Indian art auctioneer, we estimate via hedonic regression a price index for paintings and drawings by Indian artists sold during 2000–2013. We are able to thus estimate a rate of return on Indian art as an investment and also shed light on what drives the price of a painting in the Indian market.

",jenny hawkins,,2015.0,10.1057/eej.2015.39,Eastern Economic Journal,Hawkins2015,Not available,,Nature,Not available,Returns on Indian Art during 2000–2013,a7dc293bdeee935b282aebbc40c271ea,http://dx.doi.org/10.1057/eej.2015.39 17663,"

The market for modern Indian art is an emerging art market, having come into a proper existence only in the late 1990s. This market saw tremendous growth in its initial years, then a downturn that started around 2007–2008. Using data from auctions conducted by a major Indian art auctioneer, we estimate via hedonic regression a price index for paintings and drawings by Indian artists sold during 2000–2013. We are able to thus estimate a rate of return on Indian art as an investment and also shed light on what drives the price of a painting in the Indian market.

",viplav saini,,2015.0,10.1057/eej.2015.39,Eastern Economic Journal,Hawkins2015,Not available,,Nature,Not available,Returns on Indian Art during 2000–2013,a7dc293bdeee935b282aebbc40c271ea,http://dx.doi.org/10.1057/eej.2015.39 17664,"

A local electricity distribution company (LDC) can reduce its exposure to the inherent risks of spot-price volatility and uncertain future demand via forward contracts. Management's problem is to determine the optimal forward-contract purchase. We propose a practical three-stage approach for dealing with the problem. The first stage determines an optimal purchase by solving a cost-constrained risk-minimization problem. The second stage derives the efficient frontier of tradeoffs between expected cost and cost risk from the first-stage solution, at various bounds on the expected cost. The optimal solution is found by melding the frontier with management's risk preferences. In the third stage, the model's parameters are estimated from data typically available to an LDC and used to determine its forward-contract purchase.

",i horowitz,,2004.0,10.1057/palgrave.jors.2601769,Journal of the Operational Research Society,Woo2004,Not available,,Nature,Not available,The efficient frontier for spot and forward purchases: an application to electricity,506d88df0a3bfd2482ddddfe94512aaf,http://dx.doi.org/10.1057/palgrave.jors.2601769 17665,Artificial-intelligence programs harness game-theory strategies and deep learning to defeat human professionals in two-player hold 'em.,elizabeth gibney,,2017.0,10.1038/nature.2017.21580,Nature,Gibney2017,Not available,,Nature,Not available,How rival bots battled their way to poker supremacy,106b249d7a6d4dc104d22f43dab819a5,http://dx.doi.org/10.1038/nature.2017.21580 17667,"Climate policy after 2012, when the Kyoto treaty expires, needs a radical rethink. More of the same won't do, argue Gwyn Prins and Steve Rayner.",gwyn prins,,2007.0,10.1038/449973a,Nature,Prins2007,Not available,,Nature,Not available,Time to ditch Kyoto,4c33fff4b77e1a3149111af30f435f0b,http://dx.doi.org/10.1038/449973a 17668,"Climate policy after 2012, when the Kyoto treaty expires, needs a radical rethink. More of the same won't do, argue Gwyn Prins and Steve Rayner.",steve rayner,,2007.0,10.1038/449973a,Nature,Prins2007,Not available,,Nature,Not available,Time to ditch Kyoto,4c33fff4b77e1a3149111af30f435f0b,http://dx.doi.org/10.1038/449973a 17669,"

This article discusses the general legal principles governing the relationships between banks issuing over-the-counter structured derivatives to non-bank clients. After a discussion of the evident informational asymmetries between the counterparties to such deals, a representative sample is presented of recent deals failed from the clent's viewpoint, all the subject of current negotiation or ligitation with banks in Germany. Mathematical (mis)pricing and (asymmetric) counterparty risk asessments for these examples are summarised graphically before discussing the legal implications of their egregious features and their possible mitigation in future deals by appropriate regulation and interpretation in the world's courts.

",michael dempster,,2011.0,10.1057/jbr.2011.9,Journal of Banking Regulation,Dempster2011,Not available,,Nature,Not available,Regulating complex derivatives: Can the opaque be made transparent?,9f4077713d42f6a87ddf713be21539ac,http://dx.doi.org/10.1057/jbr.2011.9 17670,"

A local electricity distribution company (LDC) can reduce its exposure to the inherent risks of spot-price volatility and uncertain future demand via forward contracts. Management's problem is to determine the optimal forward-contract purchase. We propose a practical three-stage approach for dealing with the problem. The first stage determines an optimal purchase by solving a cost-constrained risk-minimization problem. The second stage derives the efficient frontier of tradeoffs between expected cost and cost risk from the first-stage solution, at various bounds on the expected cost. The optimal solution is found by melding the frontier with management's risk preferences. In the third stage, the model's parameters are estimated from data typically available to an LDC and used to determine its forward-contract purchase.

",b horii,,2004.0,10.1057/palgrave.jors.2601769,Journal of the Operational Research Society,Woo2004,Not available,,Nature,Not available,The efficient frontier for spot and forward purchases: an application to electricity,506d88df0a3bfd2482ddddfe94512aaf,http://dx.doi.org/10.1057/palgrave.jors.2601769 17671,"

This article discusses the general legal principles governing the relationships between banks issuing over-the-counter structured derivatives to non-bank clients. After a discussion of the evident informational asymmetries between the counterparties to such deals, a representative sample is presented of recent deals failed from the clent's viewpoint, all the subject of current negotiation or ligitation with banks in Germany. Mathematical (mis)pricing and (asymmetric) counterparty risk asessments for these examples are summarised graphically before discussing the legal implications of their egregious features and their possible mitigation in future deals by appropriate regulation and interpretation in the world's courts.

",elena medova,,2011.0,10.1057/jbr.2011.9,Journal of Banking Regulation,Dempster2011,Not available,,Nature,Not available,Regulating complex derivatives: Can the opaque be made transparent?,9f4077713d42f6a87ddf713be21539ac,http://dx.doi.org/10.1057/jbr.2011.9 17672,"

This article discusses the general legal principles governing the relationships between banks issuing over-the-counter structured derivatives to non-bank clients. After a discussion of the evident informational asymmetries between the counterparties to such deals, a representative sample is presented of recent deals failed from the clent's viewpoint, all the subject of current negotiation or ligitation with banks in Germany. Mathematical (mis)pricing and (asymmetric) counterparty risk asessments for these examples are summarised graphically before discussing the legal implications of their egregious features and their possible mitigation in future deals by appropriate regulation and interpretation in the world's courts.

",julian roberts,,2011.0,10.1057/jbr.2011.9,Journal of Banking Regulation,Dempster2011,Not available,,Nature,Not available,Regulating complex derivatives: Can the opaque be made transparent?,9f4077713d42f6a87ddf713be21539ac,http://dx.doi.org/10.1057/jbr.2011.9 17673,"

Using a threshold citation approach, we rank institutions in economic research based on the influence of research works produced by their staff or faculty members. The top five economics departments are the University of Chicago, Harvard University, Princeton University, MIT, and Northwestern University with research works by scholars at the University of Chicago having the most influence on economic research.

",kam chan,,2008.0,10.1057/palgrave.eej.9050035,Eastern Economic Journal,Chan2008,Not available,,Nature,Not available,Ranking of Institutions in Economic Research: a Threshold Citation Approach,8a6b71f4b591981b727002ad6ca36e02,http://dx.doi.org/10.1057/palgrave.eej.9050035 17674,"

Using a threshold citation approach, we rank institutions in economic research based on the influence of research works produced by their staff or faculty members. The top five economics departments are the University of Chicago, Harvard University, Princeton University, MIT, and Northwestern University with research works by scholars at the University of Chicago having the most influence on economic research.

",kartono liano,,2008.0,10.1057/palgrave.eej.9050035,Eastern Economic Journal,Chan2008,Not available,,Nature,Not available,Ranking of Institutions in Economic Research: a Threshold Citation Approach,8a6b71f4b591981b727002ad6ca36e02,http://dx.doi.org/10.1057/palgrave.eej.9050035 17675,"

The high level of investigative activity to date into information systems and information technology acceptance and diffusion has witnessed the use of a wide range of exploratory techniques, examining many different systems and technologies in countless different contexts and geographical locations. The aim of this paper is to provide a comprehensive and systematic review of the literature pertaining to such adoption and diffusion issues in order to observe trends, ascertain the current ‘state of play’, and to highlight promising lines of inquiry including those lacking investigative activity or simply being in need of renewed interest. Previous research activity was analysed along a number dimensions including units of analysis, research paradigms, methodologies, and methods, theories and theoretical constructs, and technologies/contexts examined. Information on these and other variables was extracted during an examination of 345 papers on innovation adoption, acceptance and diffusion appearing in 19 peer-reviewed journals between 1985 and 2007. Findings suggest that the positivist paradigm, empirical and quantitative research, the survey method and Technology Acceptance Model theory (and its associated constructs) were predominantly used in the body of work examined, revealing clear opportunities for researchers to make original contributions by making greater use of the theoretical and methodological variety available to them, and consequently reducing the risk of research in the area moving toward overall homogeneity.

",michael williams,,2009.0,10.1057/jit.2008.30,Journal of Information Technology,Williams2009,Not available,,Nature,Not available,Contemporary trends and issues in IT adoption and diffusion research,edbba6b02d198eb118fa9f04909cfada,http://dx.doi.org/10.1057/jit.2008.30 17676,"

The high level of investigative activity to date into information systems and information technology acceptance and diffusion has witnessed the use of a wide range of exploratory techniques, examining many different systems and technologies in countless different contexts and geographical locations. The aim of this paper is to provide a comprehensive and systematic review of the literature pertaining to such adoption and diffusion issues in order to observe trends, ascertain the current ‘state of play’, and to highlight promising lines of inquiry including those lacking investigative activity or simply being in need of renewed interest. Previous research activity was analysed along a number dimensions including units of analysis, research paradigms, methodologies, and methods, theories and theoretical constructs, and technologies/contexts examined. Information on these and other variables was extracted during an examination of 345 papers on innovation adoption, acceptance and diffusion appearing in 19 peer-reviewed journals between 1985 and 2007. Findings suggest that the positivist paradigm, empirical and quantitative research, the survey method and Technology Acceptance Model theory (and its associated constructs) were predominantly used in the body of work examined, revealing clear opportunities for researchers to make original contributions by making greater use of the theoretical and methodological variety available to them, and consequently reducing the risk of research in the area moving toward overall homogeneity.

",yogesh dwivedi,,2009.0,10.1057/jit.2008.30,Journal of Information Technology,Williams2009,Not available,,Nature,Not available,Contemporary trends and issues in IT adoption and diffusion research,edbba6b02d198eb118fa9f04909cfada,http://dx.doi.org/10.1057/jit.2008.30 17677,"

The high level of investigative activity to date into information systems and information technology acceptance and diffusion has witnessed the use of a wide range of exploratory techniques, examining many different systems and technologies in countless different contexts and geographical locations. The aim of this paper is to provide a comprehensive and systematic review of the literature pertaining to such adoption and diffusion issues in order to observe trends, ascertain the current ‘state of play’, and to highlight promising lines of inquiry including those lacking investigative activity or simply being in need of renewed interest. Previous research activity was analysed along a number dimensions including units of analysis, research paradigms, methodologies, and methods, theories and theoretical constructs, and technologies/contexts examined. Information on these and other variables was extracted during an examination of 345 papers on innovation adoption, acceptance and diffusion appearing in 19 peer-reviewed journals between 1985 and 2007. Findings suggest that the positivist paradigm, empirical and quantitative research, the survey method and Technology Acceptance Model theory (and its associated constructs) were predominantly used in the body of work examined, revealing clear opportunities for researchers to make original contributions by making greater use of the theoretical and methodological variety available to them, and consequently reducing the risk of research in the area moving toward overall homogeneity.

",banita lal,,2009.0,10.1057/jit.2008.30,Journal of Information Technology,Williams2009,Not available,,Nature,Not available,Contemporary trends and issues in IT adoption and diffusion research,edbba6b02d198eb118fa9f04909cfada,http://dx.doi.org/10.1057/jit.2008.30 17678,"

The high level of investigative activity to date into information systems and information technology acceptance and diffusion has witnessed the use of a wide range of exploratory techniques, examining many different systems and technologies in countless different contexts and geographical locations. The aim of this paper is to provide a comprehensive and systematic review of the literature pertaining to such adoption and diffusion issues in order to observe trends, ascertain the current ‘state of play’, and to highlight promising lines of inquiry including those lacking investigative activity or simply being in need of renewed interest. Previous research activity was analysed along a number dimensions including units of analysis, research paradigms, methodologies, and methods, theories and theoretical constructs, and technologies/contexts examined. Information on these and other variables was extracted during an examination of 345 papers on innovation adoption, acceptance and diffusion appearing in 19 peer-reviewed journals between 1985 and 2007. Findings suggest that the positivist paradigm, empirical and quantitative research, the survey method and Technology Acceptance Model theory (and its associated constructs) were predominantly used in the body of work examined, revealing clear opportunities for researchers to make original contributions by making greater use of the theoretical and methodological variety available to them, and consequently reducing the risk of research in the area moving toward overall homogeneity.

",andrew schwarz,,2009.0,10.1057/jit.2008.30,Journal of Information Technology,Williams2009,Not available,,Nature,Not available,Contemporary trends and issues in IT adoption and diffusion research,edbba6b02d198eb118fa9f04909cfada,http://dx.doi.org/10.1057/jit.2008.30 17679,"

A local electricity distribution company (LDC) can reduce its exposure to the inherent risks of spot-price volatility and uncertain future demand via forward contracts. Management's problem is to determine the optimal forward-contract purchase. We propose a practical three-stage approach for dealing with the problem. The first stage determines an optimal purchase by solving a cost-constrained risk-minimization problem. The second stage derives the efficient frontier of tradeoffs between expected cost and cost risk from the first-stage solution, at various bounds on the expected cost. The optimal solution is found by melding the frontier with management's risk preferences. In the third stage, the model's parameters are estimated from data typically available to an LDC and used to determine its forward-contract purchase.

",r karimov,,2004.0,10.1057/palgrave.jors.2601769,Journal of the Operational Research Society,Woo2004,Not available,,Nature,Not available,The efficient frontier for spot and forward purchases: an application to electricity,506d88df0a3bfd2482ddddfe94512aaf,http://dx.doi.org/10.1057/palgrave.jors.2601769 17680,"

This article aims to disturb the received wisdom ‘tidy house, tidy mind’ by tracing its emergence and consolidation: from psychoanalysis to clinical psychology through to philosophy and reality television. The contention here is that the commanding presence of the mirror as a clinical apparatus serves to eclipse a full consideration of the hoarding situation as one involving not only mental health professionals and clients, that is, ‘hoarders’, but also the materials of the heap – as the ‘hoard’ is read straightforwardly as a reflection of the hoarder’s mind. It is argued, further, that the conspicuous neglect of things, that is, material objects, in the modelling of the hoarding ‘problem’ – the aetiology of Hoarding Disorder is cast in entirely human terms – serves to frame ‘hoarders’ as individually culpable. By extending the forensic logic of both clinical and popular psychology, it is argued that such framing amounts to securing forced confessions, where hoarders are left to bear total responsibility for a situation, which is, ultimately, a question of distributed agency between human and non-human entities.

",tracey potts,,2015.0,10.1057/sub.2015.1,Subjectivity,Potts2015,Not available,,Nature,Not available,"Tidy house, tidy mind? Non-human agency in the hoarding situation",fc2b78695ed476447e920b6b4fe10468,http://dx.doi.org/10.1057/sub.2015.1 17681,"

This article introduces the novel concept of smart business networks. The authors see the future as a developing web of people and organizations, bound together in a dynamic and unpredictable way, creating smart outcomes from quickly (re-) configuring links between actors. The question is: What should be done to make the outcomes of such a network ‘smart’, that is, just a little better than that of your competitor? More agile, with less pain, with more return to all the members of the network, now and over time? The technical answer is to create a ‘business operating system’ that should run business processes on different organizational platforms. Business processes would become portable: The end-to-end management of processes running across many different organizations in many different forms would become possible. This article presents an energizing discussion of smart business networks and the research challenges ahead.

",peter vervest,,2004.0,10.1057/palgrave.jit.2000024,Journal of Information Technology,Vervest2004,Not available,,Nature,Not available,The emergence of smart business networks,a65549cdb429a7fde05e8f27d3c39a1e,http://dx.doi.org/10.1057/palgrave.jit.2000024 17682,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",antoine bechara,Brain,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17683,"

This article introduces the novel concept of smart business networks. The authors see the future as a developing web of people and organizations, bound together in a dynamic and unpredictable way, creating smart outcomes from quickly (re-) configuring links between actors. The question is: What should be done to make the outcomes of such a network ‘smart’, that is, just a little better than that of your competitor? More agile, with less pain, with more return to all the members of the network, now and over time? The technical answer is to create a ‘business operating system’ that should run business processes on different organizational platforms. Business processes would become portable: The end-to-end management of processes running across many different organizations in many different forms would become possible. This article presents an energizing discussion of smart business networks and the research challenges ahead.

",kenneth preiss,,2004.0,10.1057/palgrave.jit.2000024,Journal of Information Technology,Vervest2004,Not available,,Nature,Not available,The emergence of smart business networks,a65549cdb429a7fde05e8f27d3c39a1e,http://dx.doi.org/10.1057/palgrave.jit.2000024 17684,"

This article introduces the novel concept of smart business networks. The authors see the future as a developing web of people and organizations, bound together in a dynamic and unpredictable way, creating smart outcomes from quickly (re-) configuring links between actors. The question is: What should be done to make the outcomes of such a network ‘smart’, that is, just a little better than that of your competitor? More agile, with less pain, with more return to all the members of the network, now and over time? The technical answer is to create a ‘business operating system’ that should run business processes on different organizational platforms. Business processes would become portable: The end-to-end management of processes running across many different organizations in many different forms would become possible. This article presents an energizing discussion of smart business networks and the research challenges ahead.

",eric heck,,2004.0,10.1057/palgrave.jit.2000024,Journal of Information Technology,Vervest2004,Not available,,Nature,Not available,The emergence of smart business networks,a65549cdb429a7fde05e8f27d3c39a1e,http://dx.doi.org/10.1057/palgrave.jit.2000024 17685,"

This article introduces the novel concept of smart business networks. The authors see the future as a developing web of people and organizations, bound together in a dynamic and unpredictable way, creating smart outcomes from quickly (re-) configuring links between actors. The question is: What should be done to make the outcomes of such a network ‘smart’, that is, just a little better than that of your competitor? More agile, with less pain, with more return to all the members of the network, now and over time? The technical answer is to create a ‘business operating system’ that should run business processes on different organizational platforms. Business processes would become portable: The end-to-end management of processes running across many different organizations in many different forms would become possible. This article presents an energizing discussion of smart business networks and the research challenges ahead.

",louis-francois pau,,2004.0,10.1057/palgrave.jit.2000024,Journal of Information Technology,Vervest2004,Not available,,Nature,Not available,The emergence of smart business networks,a65549cdb429a7fde05e8f27d3c39a1e,http://dx.doi.org/10.1057/palgrave.jit.2000024 17686,"

Virtual communities and social networks assume and consume more aspects of people's lives. In these evolving social spaces, the boundaries between actual and virtual reality, between living individuals and their virtual bodies, and between private and public domains are becoming ever more blurred. As a result, users and their presentations of self, as expressed through virtual bodies, are increasingly entangled. Consequently, more and more Internet users are cyborgs. For this reason, the ethical guidelines necessary for Internet research need to be revisited. We contend that the IS community has paid insufficient attention to the ethics of Internet research. To this end, we develop an understanding of issues related to online human subjects research by distinguishing between a disembodied and an entangled view of the Internet. We outline a framework to guide investigators and research ethics committees in answering a key question in the age of cyborgism: When does a proposed Internet study deal with human subjects as opposed to digital material?

",ulrike schultze,,2012.0,10.1057/jit.2012.30,Journal of Information Technology,Schultze2012,Not available,,Nature,Not available,Studying cyborgs: re-examining internet studies as human subjects research,baa4778b07abe8675054036aa05bb4fa,http://dx.doi.org/10.1057/jit.2012.30 17687,"

Virtual communities and social networks assume and consume more aspects of people's lives. In these evolving social spaces, the boundaries between actual and virtual reality, between living individuals and their virtual bodies, and between private and public domains are becoming ever more blurred. As a result, users and their presentations of self, as expressed through virtual bodies, are increasingly entangled. Consequently, more and more Internet users are cyborgs. For this reason, the ethical guidelines necessary for Internet research need to be revisited. We contend that the IS community has paid insufficient attention to the ethics of Internet research. To this end, we develop an understanding of issues related to online human subjects research by distinguishing between a disembodied and an entangled view of the Internet. We outline a framework to guide investigators and research ethics committees in answering a key question in the age of cyborgism: When does a proposed Internet study deal with human subjects as opposed to digital material?

",richard mason,,2012.0,10.1057/jit.2012.30,Journal of Information Technology,Schultze2012,Not available,,Nature,Not available,Studying cyborgs: re-examining internet studies as human subjects research,baa4778b07abe8675054036aa05bb4fa,http://dx.doi.org/10.1057/jit.2012.30 17688,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",jason barr,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17689,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",troy tassier,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17690,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",leanne ussher,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17691,"

This study relies on knowledge regarding the neuroplasticity of dual-system components that govern addiction and excessive behavior and suggests that alterations in the grey matter volumes, i.e., brain morphology, of specific regions of interest are associated with technology-related addictions. Using voxel based morphometry (VBM) applied to structural Magnetic Resonance Imaging (MRI) scans of twenty social network site (SNS) users with varying degrees of SNS addiction, we show that SNS addiction is associated with a presumably more efficient impulsive brain system, manifested through reduced grey matter volumes in the amygdala bilaterally (but not with structural differences in the Nucleus Accumbens). In this regard, SNS addiction is similar in terms of brain anatomy alterations to other (substance, gambling etc.) addictions. We also show that in contrast to other addictions in which the anterior-/ mid- cingulate cortex is impaired and fails to support the needed inhibition, which manifests through reduced grey matter volumes, this region is presumed to be healthy in our sample and its grey matter volume is positively correlated with one’s level of SNS addiction. These findings portray an anatomical morphology model of SNS addiction and point to brain morphology similarities and differences between technology addictions and substance and gambling addictions.

",antoine bechara,Brain imaging,2017.0,10.1038/srep45064,Scientific Reports,He2017,Not available,,Nature,Not available,Brain anatomy alterations associated with Social Networking Site (SNS) addiction,355447eac1ec4959117118d905cd56d1,http://dx.doi.org/10.1038/srep45064 17692,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",blake lebaron,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17693,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",shu-heng chen,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17694,"

INTRODUCTORY REMARKS LeBaron: Agent-based economics, and more generally agent-based social sciences, have been around in various forms for over 30 years. The advent of higher speed computing and new tools for the computational learning fields led to a major increase in activity in the early 1990s through today.

",shyam sunder,,2008.0,10.1057/eej.2008.31,Eastern Economic Journal,Barr2008,Not available,,Nature,Not available,"The Future of Agent-Based Research in Economics: A Panel Discussion, Eastern Economic Association Annual Meetings, Boston, March 7, 20081",68ddd1863e999ebf2758f2f01faad9ea,http://dx.doi.org/10.1057/eej.2008.31 17695,"

Trust is a complex phenomenon that pervades human relations. It is essential for the success of business-to-consumer electronic commerce, where many of the tools that can be used in its absence (contracts, advance payments, insurance, etc.) may not be available. However, research as to how consumer trust can be built in an online environment is limited and varies considerably in terms of the dimensions of the problem that are examined. Consequently, much of our understanding of the antecedents of trust in online shopping context remains fragmented. This study uses a previously validated measurement instrument to investigate, in an Irish context, the existence and importance of specific perceptions and factors that are thought to predict the generation of consumer trust in Internet shopping. The research results provide evidence that Irish consumers' perception of vendor trustworthiness is the result of specific factors that it is possible for vendors to manage. A modified model that addresses the key dimensions of consumer trust in Internet shopping in Ireland is proposed.

",regina connolly,,2006.0,10.1057/palgrave.jit.2000071,Journal of Information Technology,Connolly2006,Not available,,Nature,Not available,Consumer trust in Internet shopping in Ireland: towards the development of a more effective trust measurement instrument,a8062b3821d6eb2422842faac362a16a,http://dx.doi.org/10.1057/palgrave.jit.2000071 17696,"

Trust is a complex phenomenon that pervades human relations. It is essential for the success of business-to-consumer electronic commerce, where many of the tools that can be used in its absence (contracts, advance payments, insurance, etc.) may not be available. However, research as to how consumer trust can be built in an online environment is limited and varies considerably in terms of the dimensions of the problem that are examined. Consequently, much of our understanding of the antecedents of trust in online shopping context remains fragmented. This study uses a previously validated measurement instrument to investigate, in an Irish context, the existence and importance of specific perceptions and factors that are thought to predict the generation of consumer trust in Internet shopping. The research results provide evidence that Irish consumers' perception of vendor trustworthiness is the result of specific factors that it is possible for vendors to manage. A modified model that addresses the key dimensions of consumer trust in Internet shopping in Ireland is proposed.

",frank bannister,,2006.0,10.1057/palgrave.jit.2000071,Journal of Information Technology,Connolly2006,Not available,,Nature,Not available,Consumer trust in Internet shopping in Ireland: towards the development of a more effective trust measurement instrument,a8062b3821d6eb2422842faac362a16a,http://dx.doi.org/10.1057/palgrave.jit.2000071 17697,"

We provide an experimental analysis of competitive insurance markets with adverse selection. Our parameterised version of the lemons’ model of Akerlof in the insurance context predicts total crowding-out of low risks when insurers offer a single full insurance contract. The therapy proposed by Rothschild and Stiglitz consists of adding a partial insurance contract so as to obtain self-selection of risks. We test the theoretical predictions of these two models in two experiments. A clean test is obtained by matching the parameters of these experiments and by controlling for the risk neutrality of insurers and the common risk aversion of their clients by means of the binary lottery procedure. The results reveal a partial crowding-out of low risks in the first experiment. Crowding-out is not eliminated in the second experiment and it is not even significantly reduced. Finally, instead of the predicted separating equilibrium, we find pooling equilibria. The latter can be sustained because insureds who objectively differ in their risk level do not perceive themselves as being so much different.

",dorra riahi,,2013.0,10.1057/grir.2012.5,The Geneva Risk and Insurance Review,Riahi2013,Not available,,Nature,Not available,Competitive Insurance Markets and Adverse Selection in the Lab,4ce52d13710fd3a378b6805a2215ef73,http://dx.doi.org/10.1057/grir.2012.5 17698,"

We provide an experimental analysis of competitive insurance markets with adverse selection. Our parameterised version of the lemons’ model of Akerlof in the insurance context predicts total crowding-out of low risks when insurers offer a single full insurance contract. The therapy proposed by Rothschild and Stiglitz consists of adding a partial insurance contract so as to obtain self-selection of risks. We test the theoretical predictions of these two models in two experiments. A clean test is obtained by matching the parameters of these experiments and by controlling for the risk neutrality of insurers and the common risk aversion of their clients by means of the binary lottery procedure. The results reveal a partial crowding-out of low risks in the first experiment. Crowding-out is not eliminated in the second experiment and it is not even significantly reduced. Finally, instead of the predicted separating equilibrium, we find pooling equilibria. The latter can be sustained because insureds who objectively differ in their risk level do not perceive themselves as being so much different.

",louis levy-garboua,,2013.0,10.1057/grir.2012.5,The Geneva Risk and Insurance Review,Riahi2013,Not available,,Nature,Not available,Competitive Insurance Markets and Adverse Selection in the Lab,4ce52d13710fd3a378b6805a2215ef73,http://dx.doi.org/10.1057/grir.2012.5 17699,"

We provide an experimental analysis of competitive insurance markets with adverse selection. Our parameterised version of the lemons’ model of Akerlof in the insurance context predicts total crowding-out of low risks when insurers offer a single full insurance contract. The therapy proposed by Rothschild and Stiglitz consists of adding a partial insurance contract so as to obtain self-selection of risks. We test the theoretical predictions of these two models in two experiments. A clean test is obtained by matching the parameters of these experiments and by controlling for the risk neutrality of insurers and the common risk aversion of their clients by means of the binary lottery procedure. The results reveal a partial crowding-out of low risks in the first experiment. Crowding-out is not eliminated in the second experiment and it is not even significantly reduced. Finally, instead of the predicted separating equilibrium, we find pooling equilibria. The latter can be sustained because insureds who objectively differ in their risk level do not perceive themselves as being so much different.

",claude montmarquette,,2013.0,10.1057/grir.2012.5,The Geneva Risk and Insurance Review,Riahi2013,Not available,,Nature,Not available,Competitive Insurance Markets and Adverse Selection in the Lab,4ce52d13710fd3a378b6805a2215ef73,http://dx.doi.org/10.1057/grir.2012.5 17700,"

The software industry is changing as a result of the rising influence both of packaged and of Free/Libre/Open Source Software (FLOSS), but the change trajectory of the industry is still not well understood. This paper aims to contribute to clarifying software industry evolution through a longitudinal study, using Industry Change Trajectory Theory to explain and predict the evolution of the Content Management Systems (CMS) segment and the extent to which its results can be generalized to the overall software industry. Our data analysis shows that CMS players are experiencing a modification of their segments’ change trajectory. While McGahan in 2004 recognized that the software industry was in a creative change trajectory, it has subsequently faced strong competition on its core assets, (i.e. applications) and the empirical results of our longitudinal study from 2002 to 2007 show the CMS segment is now in a radical change trajectory, due to the rapid obsolescence of its core activities. Changes affecting the segment include the continuous development of CMS applications, the faster extension of functions for FLOSS CMS than for packaged CMS, the diffusion of the practice of providing services as well as delivering of software solutions.

",claudio vitari,,2009.0,10.1057/ejis.2009.13,European Journal of Information Systems,Vitari2009,Not available,,Nature,Not available,A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment,c8a74cda441aa5b81eb9765041ee6aa3,http://dx.doi.org/10.1057/ejis.2009.13 17701,"

The software industry is changing as a result of the rising influence both of packaged and of Free/Libre/Open Source Software (FLOSS), but the change trajectory of the industry is still not well understood. This paper aims to contribute to clarifying software industry evolution through a longitudinal study, using Industry Change Trajectory Theory to explain and predict the evolution of the Content Management Systems (CMS) segment and the extent to which its results can be generalized to the overall software industry. Our data analysis shows that CMS players are experiencing a modification of their segments’ change trajectory. While McGahan in 2004 recognized that the software industry was in a creative change trajectory, it has subsequently faced strong competition on its core assets, (i.e. applications) and the empirical results of our longitudinal study from 2002 to 2007 show the CMS segment is now in a radical change trajectory, due to the rapid obsolescence of its core activities. Changes affecting the segment include the continuous development of CMS applications, the faster extension of functions for FLOSS CMS than for packaged CMS, the diffusion of the practice of providing services as well as delivering of software solutions.

",aurelio ravarini,,2009.0,10.1057/ejis.2009.13,European Journal of Information Systems,Vitari2009,Not available,,Nature,Not available,A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment,c8a74cda441aa5b81eb9765041ee6aa3,http://dx.doi.org/10.1057/ejis.2009.13 17702,"

An effective Decision Support System (DSS) should help its users improve decision making in complex, information-rich environments. We present a feature gap analysis that shows that current decision support technologies lack important qualities for a new generation of agile business models that require easy, temporary integration across organisational boundaries. We enumerate these qualities as DSS Desiderata, properties that can contribute both effectiveness and flexibility to users in such environments. To address this gap, we describe a new design approach that enables users to compose decision behaviours from separate, configurable components, and allows dynamic construction of analysis and modelling tools from small, single-purpose evaluator services. The result is what we call an ‘evaluator service network’ that can easily be configured to test hypotheses and analyse the impact of various choices for elements of decision processes. We have implemented and tested this design in an interactive version of the MinneTAC trading agent, an agent designed for the Trading Agent Competition for Supply Chain Management.

",john collins,,2010.0,10.1057/ejis.2010.24,European Journal of Information Systems,Collins2010,Not available,,Nature,Not available,Flexible decision support in dynamic inter-organisational networks,02fa88455c665ac55bd2b00324e9a0a2,http://dx.doi.org/10.1057/ejis.2010.24 17703,"

Website designers are beginning to incorporate social cues, such as helpfulness and familiarity, into e-commerce sites to facilitate the exchange relationship. Website socialness elicits a social response from users of the site and this response produces enjoyment. Users patronize websites that are exciting, entertaining and stimulating. The purpose of our study is to explore the effects of website socialness perceptions on the formation of users’ beliefs, attitudes and subsequent behavioral intentions. We manipulate website socialness perceptions across two different online shopping contexts, one for functional products and the other for pleasure-oriented products, and draw from the responses of 300 Internet users. Our findings show that website socialness perceptions lead to enjoyment, have a strong influence on user intentions and these effects are invariant across shopping contexts.

",robin wakefield,,2010.0,10.1057/ejis.2010.47,European Journal of Information Systems,Wakefield2010,Not available,,Nature,Not available,How website socialness leads to website use,82ee69c51e0f5559c46f18d5652073ba,http://dx.doi.org/10.1057/ejis.2010.47 17704,"

Website designers are beginning to incorporate social cues, such as helpfulness and familiarity, into e-commerce sites to facilitate the exchange relationship. Website socialness elicits a social response from users of the site and this response produces enjoyment. Users patronize websites that are exciting, entertaining and stimulating. The purpose of our study is to explore the effects of website socialness perceptions on the formation of users’ beliefs, attitudes and subsequent behavioral intentions. We manipulate website socialness perceptions across two different online shopping contexts, one for functional products and the other for pleasure-oriented products, and draw from the responses of 300 Internet users. Our findings show that website socialness perceptions lead to enjoyment, have a strong influence on user intentions and these effects are invariant across shopping contexts.

",kirk wakefield,,2010.0,10.1057/ejis.2010.47,European Journal of Information Systems,Wakefield2010,Not available,,Nature,Not available,How website socialness leads to website use,82ee69c51e0f5559c46f18d5652073ba,http://dx.doi.org/10.1057/ejis.2010.47 17705,"

Website designers are beginning to incorporate social cues, such as helpfulness and familiarity, into e-commerce sites to facilitate the exchange relationship. Website socialness elicits a social response from users of the site and this response produces enjoyment. Users patronize websites that are exciting, entertaining and stimulating. The purpose of our study is to explore the effects of website socialness perceptions on the formation of users’ beliefs, attitudes and subsequent behavioral intentions. We manipulate website socialness perceptions across two different online shopping contexts, one for functional products and the other for pleasure-oriented products, and draw from the responses of 300 Internet users. Our findings show that website socialness perceptions lead to enjoyment, have a strong influence on user intentions and these effects are invariant across shopping contexts.

",julie baker,,2010.0,10.1057/ejis.2010.47,European Journal of Information Systems,Wakefield2010,Not available,,Nature,Not available,How website socialness leads to website use,82ee69c51e0f5559c46f18d5652073ba,http://dx.doi.org/10.1057/ejis.2010.47 17706,"

Website designers are beginning to incorporate social cues, such as helpfulness and familiarity, into e-commerce sites to facilitate the exchange relationship. Website socialness elicits a social response from users of the site and this response produces enjoyment. Users patronize websites that are exciting, entertaining and stimulating. The purpose of our study is to explore the effects of website socialness perceptions on the formation of users’ beliefs, attitudes and subsequent behavioral intentions. We manipulate website socialness perceptions across two different online shopping contexts, one for functional products and the other for pleasure-oriented products, and draw from the responses of 300 Internet users. Our findings show that website socialness perceptions lead to enjoyment, have a strong influence on user intentions and these effects are invariant across shopping contexts.

",liz wang,,2010.0,10.1057/ejis.2010.47,European Journal of Information Systems,Wakefield2010,Not available,,Nature,Not available,How website socialness leads to website use,82ee69c51e0f5559c46f18d5652073ba,http://dx.doi.org/10.1057/ejis.2010.47 17707,"

There is no more important process than the way a business makes pricing decisions. Companies can no longer afford to fail in their pricing decisions: all products and services must be priced right, all the time. Today's rapidly changing market conditions make determining the right price extremely complicated. Accordingly, the field of scientific pricing is in the midst of revolutionary changes. This paper calls attention to some of these changes and makes ‘guesstimates’ about emerging trends. These involve the topics of competitive pricing, information asymmetry, segmentation, performance evaluation, price sensitivity and pricing education.

",harun kuyumcu,,2007.0,10.1057/palgrave.rpm.5160101,Journal of Revenue and Pricing Management,Kuyumcu2007,Not available,,Nature,Not available,Emerging trends in scientific pricing,21ade9e55925431b708cb93f4b12a812,http://dx.doi.org/10.1057/palgrave.rpm.5160101 17708,"

We consider a market with two capacity providers – an entrant and an incumbent – each with fixed capacity, who compete to sell in a spot market and a forward market. Prices are fixed and the providers make strategic capacity allocation decisions. The model is designed to study the competitive interactions between a low cost entrant, who sells at a lower price in both the forward and the spot market, and an established incumbent. The key question we investigate is the type of equilibrium behaviour we could expect from the two providers under different assumptions about market structure, demand and available capacity. We study two cases: (a) when there is a single buyer and (b) when there are multiple independent consumers. For the single buyer case, we identify the conditions under which the buyer would buy forward solely from the entrant or solely from the incumbent or from both. The conditions for the existence of a pure strategy Nash equilibrium for the game between the two providers are established. For the case of multiple independent consumers, we identify competitive strategies for the entrant and incumbent and establish conditions for a pure strategy Nash equilibrium. The results show how competitive considerations can motivate capacity providers to offer capacity in a forward market even in the absence of market segmentation.

",guillermo gallego,,2009.0,10.1057/rpm.2009.13,Journal of Revenue and Pricing Management,Gallego2009,Not available,,Nature,Not available,Competitive revenue management with forward and spot markets,6a08bcdb7e42171b657e8d381a68a8e0,http://dx.doi.org/10.1057/rpm.2009.13 17709,"

We consider a market with two capacity providers – an entrant and an incumbent – each with fixed capacity, who compete to sell in a spot market and a forward market. Prices are fixed and the providers make strategic capacity allocation decisions. The model is designed to study the competitive interactions between a low cost entrant, who sells at a lower price in both the forward and the spot market, and an established incumbent. The key question we investigate is the type of equilibrium behaviour we could expect from the two providers under different assumptions about market structure, demand and available capacity. We study two cases: (a) when there is a single buyer and (b) when there are multiple independent consumers. For the single buyer case, we identify the conditions under which the buyer would buy forward solely from the entrant or solely from the incumbent or from both. The conditions for the existence of a pure strategy Nash equilibrium for the game between the two providers are established. For the case of multiple independent consumers, we identify competitive strategies for the entrant and incumbent and establish conditions for a pure strategy Nash equilibrium. The results show how competitive considerations can motivate capacity providers to offer capacity in a forward market even in the absence of market segmentation.

",srinivas krishnamoorthy,,2009.0,10.1057/rpm.2009.13,Journal of Revenue and Pricing Management,Gallego2009,Not available,,Nature,Not available,Competitive revenue management with forward and spot markets,6a08bcdb7e42171b657e8d381a68a8e0,http://dx.doi.org/10.1057/rpm.2009.13 17710,"

We consider a market with two capacity providers – an entrant and an incumbent – each with fixed capacity, who compete to sell in a spot market and a forward market. Prices are fixed and the providers make strategic capacity allocation decisions. The model is designed to study the competitive interactions between a low cost entrant, who sells at a lower price in both the forward and the spot market, and an established incumbent. The key question we investigate is the type of equilibrium behaviour we could expect from the two providers under different assumptions about market structure, demand and available capacity. We study two cases: (a) when there is a single buyer and (b) when there are multiple independent consumers. For the single buyer case, we identify the conditions under which the buyer would buy forward solely from the entrant or solely from the incumbent or from both. The conditions for the existence of a pure strategy Nash equilibrium for the game between the two providers are established. For the case of multiple independent consumers, we identify competitive strategies for the entrant and incumbent and establish conditions for a pure strategy Nash equilibrium. The results show how competitive considerations can motivate capacity providers to offer capacity in a forward market even in the absence of market segmentation.

",robert phillips,,2009.0,10.1057/rpm.2009.13,Journal of Revenue and Pricing Management,Gallego2009,Not available,,Nature,Not available,Competitive revenue management with forward and spot markets,6a08bcdb7e42171b657e8d381a68a8e0,http://dx.doi.org/10.1057/rpm.2009.13 17711,"

This paper addresses the issue of truth and knowledge in management generally and knowledge management in particular. Based on ideas from critical realism and critical theory, it argues against the monovalent conceptualization of knowledge implicitly or explicitly held by many authors and aims instead to develop a characterization that recognizes the rich and varied ways in which human beings may be said ‘to know’. It points out and conceptualizes a fundamental dimension of knowledge that is generally ignored or cursorily treated within the literature, that is, ‘truth’. It identifies four forms of knowledge – propositional, experiential, performative and epistemological – and explores their characteristics, especially in terms of truth and validity. It points out some implications for knowledge management.

",john mingers,,2008.0,10.1057/palgrave.kmrp.8500161,Knowledge Management Research & Practice,Mingers2008,Not available,,Nature,Not available,Management knowledge and knowledge management: realism and forms of truth,616d1fd4b005a07860325be3bf9df509,http://dx.doi.org/10.1057/palgrave.kmrp.8500161 17712,"

An effective Decision Support System (DSS) should help its users improve decision making in complex, information-rich environments. We present a feature gap analysis that shows that current decision support technologies lack important qualities for a new generation of agile business models that require easy, temporary integration across organisational boundaries. We enumerate these qualities as DSS Desiderata, properties that can contribute both effectiveness and flexibility to users in such environments. To address this gap, we describe a new design approach that enables users to compose decision behaviours from separate, configurable components, and allows dynamic construction of analysis and modelling tools from small, single-purpose evaluator services. The result is what we call an ‘evaluator service network’ that can easily be configured to test hypotheses and analyse the impact of various choices for elements of decision processes. We have implemented and tested this design in an interactive version of the MinneTAC trading agent, an agent designed for the Trading Agent Competition for Supply Chain Management.

",wolfgang ketter,,2010.0,10.1057/ejis.2010.24,European Journal of Information Systems,Collins2010,Not available,,Nature,Not available,Flexible decision support in dynamic inter-organisational networks,02fa88455c665ac55bd2b00324e9a0a2,http://dx.doi.org/10.1057/ejis.2010.24 17713,"

Within social situations individuals can be punished with social ostracism. Ostracized individuals are removed from social aspects of the group but remain formal members. Social ostracism may occur in the workplace when workers produce a joint good among their inputs. Since workers are homogeneous, no worker has the ability to unilaterally punish free-riding behavior. Yet, the group as a whole has the capacity to punish free-riding group members with social punishments. We examine the effectiveness of social ostracism as a punishment for free-riding. We find that social ostracism helps maintain cooperation but only after prior experience without possible social punishment.

",brent davis,,2014.0,10.1057/eej.2014.2,Eastern Economic Journal,Davis2014,Not available,,Nature,Not available,Water Cooler Ostracism: Social Exclusion as a Punishment Mechanism,1d792ef12641768818c9148ffa434c3d,http://dx.doi.org/10.1057/eej.2014.2 17714,"

Within social situations individuals can be punished with social ostracism. Ostracized individuals are removed from social aspects of the group but remain formal members. Social ostracism may occur in the workplace when workers produce a joint good among their inputs. Since workers are homogeneous, no worker has the ability to unilaterally punish free-riding behavior. Yet, the group as a whole has the capacity to punish free-riding group members with social punishments. We examine the effectiveness of social ostracism as a punishment for free-riding. We find that social ostracism helps maintain cooperation but only after prior experience without possible social punishment.

",david johnson,,2014.0,10.1057/eej.2014.2,Eastern Economic Journal,Davis2014,Not available,,Nature,Not available,Water Cooler Ostracism: Social Exclusion as a Punishment Mechanism,1d792ef12641768818c9148ffa434c3d,http://dx.doi.org/10.1057/eej.2014.2 17715,"

Studies of reward learning have implicated the striatum as part of a neural circuit that guides and adjusts future behavior on the basis of reward feedback. Here we investigate whether prior social and moral information about potential trading partners affects this neural circuitry. Participants made risky choices about whether to trust hypothetical trading partners after having read vivid descriptions of life events indicating praiseworthy, neutral or suspect moral character. Despite equivalent reinforcement rates for all partners, participants were persistently more likely to make risky choices with the 'good' partner. As expected from previous studies, activation of the caudate nucleus differentiated between positive and negative feedback, but only for the 'neutral' partner. Notably, it did not do so for the 'good' partner and did so only weakly for the 'bad' partner, suggesting that prior social and moral perceptions can diminish reliance on feedback mechanisms in the neural circuitry of trial-and-error reward learning.

",m delgado,,2005.0,10.1038/nn1575,Nature Neuroscience,Delgado2005,Not available,,Nature,Not available,Perceptions of moral character modulate the neural systems of reward during the trust game,64e60158a54817fa797767d1965aa2cd,http://dx.doi.org/10.1038/nn1575 17716,"

Studies of reward learning have implicated the striatum as part of a neural circuit that guides and adjusts future behavior on the basis of reward feedback. Here we investigate whether prior social and moral information about potential trading partners affects this neural circuitry. Participants made risky choices about whether to trust hypothetical trading partners after having read vivid descriptions of life events indicating praiseworthy, neutral or suspect moral character. Despite equivalent reinforcement rates for all partners, participants were persistently more likely to make risky choices with the 'good' partner. As expected from previous studies, activation of the caudate nucleus differentiated between positive and negative feedback, but only for the 'neutral' partner. Notably, it did not do so for the 'good' partner and did so only weakly for the 'bad' partner, suggesting that prior social and moral perceptions can diminish reliance on feedback mechanisms in the neural circuitry of trial-and-error reward learning.

",r frank,,2005.0,10.1038/nn1575,Nature Neuroscience,Delgado2005,Not available,,Nature,Not available,Perceptions of moral character modulate the neural systems of reward during the trust game,64e60158a54817fa797767d1965aa2cd,http://dx.doi.org/10.1038/nn1575 17717,"

Studies of reward learning have implicated the striatum as part of a neural circuit that guides and adjusts future behavior on the basis of reward feedback. Here we investigate whether prior social and moral information about potential trading partners affects this neural circuitry. Participants made risky choices about whether to trust hypothetical trading partners after having read vivid descriptions of life events indicating praiseworthy, neutral or suspect moral character. Despite equivalent reinforcement rates for all partners, participants were persistently more likely to make risky choices with the 'good' partner. As expected from previous studies, activation of the caudate nucleus differentiated between positive and negative feedback, but only for the 'neutral' partner. Notably, it did not do so for the 'good' partner and did so only weakly for the 'bad' partner, suggesting that prior social and moral perceptions can diminish reliance on feedback mechanisms in the neural circuitry of trial-and-error reward learning.

",e phelps,,2005.0,10.1038/nn1575,Nature Neuroscience,Delgado2005,Not available,,Nature,Not available,Perceptions of moral character modulate the neural systems of reward during the trust game,64e60158a54817fa797767d1965aa2cd,http://dx.doi.org/10.1038/nn1575 17718,"

INTRODUCTION ONE OF the most striking features of modern society is the growing interest shown by every man and woman in the working of the society of which they are a part. However, when as responsible citizens they try to understand this subject they arefaced with complexities, indeed with apparent contradictions, of a magnitude that makes it difficult for decisions to be made or accepted.

",charles goodeve,,1978.0,10.1057/jors.1978.67,Journal of the Operational Research Society,Goodeve1978,Not available,,Nature,Not available,Science and Social Conflict,10c501ad7a47f067eb730f9479c34ad8,http://dx.doi.org/10.1057/jors.1978.67 17720,"

This paper presents an analytical discussion of IMF conditionality based on the theory of special interest politics. We outline a simple political–economy model of special interest group politics, extended to include the interaction of the IMF with the government of a country making use of IMF resources. Conditional lending turns the IMF into a benevolent lobby that can exert beneficial impacts on the government's policy choices. In addition to addressing the international spillover effects of national economic policies, conditionality can help reduce policy inefficiencies generated by domestic conflicts of interest and limited ownership.

",wolfgang mayer,,2004.0,10.1057/palgrave.ces.8100064,Comparative Economic Studies,Mayer2004,Not available,,Nature,Not available,IMF Conditionality and the Theory of Special Interest Politics1,327692dc30b5b89eb7bf157bad371fe3,http://dx.doi.org/10.1057/palgrave.ces.8100064